How The NSA Collects Your Internet Data

From the WaPo:

Acquiring data from a new target

This slide describes what happens when an NSA analyst "tasks" the PRISM system for information about a new surveillance target. The request to add a new target is passed automatically to a supervisor who reviews the "selectors," or search terms. The supervisor must endorse the analyst's "reasonable belief," defined as 51 percent confidence, that the specified target is a foreign national who is overseas at the time of collection.

http://www.zerohedge.com/sites/default/files/images/user5/imageroot/2013/06-2/Prism%20WaPo%201.jpg


Analyzing information collected from private companies

After communications information is acquired, the data are processed and analyzed by specialized systems that handle voice, text, video and "digital network information" that includes the locations and unique device signatures of targets.

http://www.zerohedge.com/sites/default/files/images/user5/imageroot/2013/06-2/Prism%20WaPo%202.jpg


Each target is assigned a case notation

The PRISM case notation format reflects the availability, confirmed by The Post's reporting, of real-time surveillance as well as stored content.

http://www.zerohedge.com/sites/default/files/images/user5/imageroot/2013/06-2/Prism%20WaPo%203.jpg


Searching the PRISM database

http://www.zerohedge.com/sites/default/files/images/user5/imageroot/2013/06-2/Prism%20WaPo%204.jpgOn April 5, according to this slide, there were 117,675 active surveillance targets in PRISM's counterterrorism database. The slide does not show how many other Internet users, and among them how many Americans, have their communications collected "incidentally" during surveillance of those targets.