Feeds

Silicon Valley slurped millions of NSA cash for PRISM participation

Court documents show first details of your tax dollars at work

Maximizing your infrastructure through virtualization

New documents from Edward Snowden published in The Guardian have shown for the first time the financial relationship between the NSA and some of the largest names in the tech business over the PRISM data-collection scheme.

Google, Yahoo, Microsoft, and Facebook are all named in a document, dated December 2012, relating to the 2011 decision by the secret Foreign Intelligence Surveillance Court (FISC) not to approve a surveillance program because it collected data on US citizens. The judgment, released by the NSA on Wednesday shortly after the Chelsea Manning verdict, also noted that the NSA had been misleading the court.

"Last year's problems resulted in multiple extensions to the certifications' expiration dates which cost millions of dollars for Prism providers to implement each successive extension – costs covered by Special Source Operations," the document reads.

Special Source Operations is the unit within the NSA that handles relations with private firms for data collection, according to Snowden, who described it as the "crown jewels" of the agency. Shortly after the FISC ruling, new PRISM certifications were issued and updated by most partners.

"All Prism providers, except Yahoo and Google, were successfully transitioned to the new certifications. We expect Yahoo and Google to complete transitioning by Friday 6 October," reads another, undated, document.

In a statement to the paper, Facebook said that it had never accepted payment for government data requests. Yahoo! said that it had accepted compensation, as it was allowed to do by federal law – a line Microsoft followed, while noting that it never charges for child-exploitation investigations.

"Microsoft only complies with court orders because it is legally ordered to, not because it is reimbursed for the work. We could have a more informed discussion of these issues if providers could share additional information, including aggregate statistics on the number of any national security orders they may receive," a Microsoft spokesperson told El Reg.

Google told The Register that it has not joined Prism or any government surveillance programs, and that "We do not provide any government with access to our systems and we provide user data to governments only in accordance with the law."

The Chocolate Factory also told us in the emailed statement, "We await the US government's response to our petition to publish more national security request data, which will show that our compliance with American national security laws falls far short of the wild claims still being made in the press today." ®

Top three mobile application threats

More from The Register

next story
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
'Blow it up': Plods pop round for chat with Commonwealth Games tweeter
You'd better not be talking about the council's housing plans
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.