Skip to: Content
Skip to: Site Navigation
Skip to: Search

  • Advertisements

NSA data-mining 101: two 'top secret' programs and what they do

Two US surveillance programs – one scooping up records of Americans' phone calls and the other collecting information on Internet-based activities – came to public attention this week. The aim: data-mining to help the NSA thwart terrorism. But not everyone is cool with it.

By Staff writer / June 7, 2013

A sign stands outside the National Security Administration campus in Fort Meade, Md., June 6.

Patrick Semansky/AP/File

Enlarge

In the name of fighting terrorism, the US government has been mining data collected from phone companies such as Verizon for the past seven years and from Google, Facebook, and other social media firms for at least four years, according to government documents leaked this week to news organizations.

Skip to next paragraph

The two surveillance programs – one that collects detailed records of telephone calls, the other that collects data on Internet-based activities such as e-mail, instant messaging, and video conferencing – were publicly revealed in "top secret" documents leaked to the British newspaper the Guardian and the Washington Post. Both are run by the National Security Agency (NSA), the papers reported. 

The existence of the telephone data-mining program was previously known, and civil libertarians have for years complained that it represents a dangerous and overbroad incursion into the privacy of all Americans. What became clear this week were certain details about its operation – such as that the government sweeps up data daily and that a special court has been renewing the program every 90 days since about 2007. But the reports about the Internet-based data-mining program, called PRISM, represent a new revelation, at least to the general public. 

Data-mining can involve the use of automated algorithms to sift through a database for clues as to the existence of a terrorist plot. One member of Congress claimed this week that the telephone data-mining program helped to thwart a significant terrorism incident in the United States "within the last few years," but could not offer more specifics because the whole program is classified. Others in Congress, as well as President Obama and the director of national intelligence, sought to allay concerns of critics that the surveillance programs represent Big Government run amok.

But it would be wrong to suggest that every member of Congress is on board with the sweep of such data mining programs or with the amount of oversight such national-security endeavors get from other branches of government. Some have hinted for years that they find such programs disturbing and an infringement of people's privacy. Here's an overview of these two data-mining programs, and how much oversight they are known to have. 

Permissions

  • Weekly review of global news and ideas
  • Balanced, insightful and trustworthy
  • Subscribe in print or digital

Special Offer

 

Doing Good

 

What happens when ordinary people decide to pay it forward? Extraordinary change...

Colorado native Colin Flahive sits at the bar of Salvador’s Coffee House in Kunming, the capital of China’s southwestern Yunnan Province.

Jean Paul Samputu practices forgiveness – even for his father's killer

Award-winning musician Jean Paul Samputu lost his family during the genocide in Rwanda. But he overcame rage and resentment by learning to forgive.

 
 
Become a fan! Follow us! Google+ YouTube See our feeds!