we really would. but unfortunately for us, senator king just got on the intel committee. let s open the scope of it. senator, you re not off the hook yet baugh we blame people who have no responsibility for blaming them. think about this, though. if you watching this show placed a telephone call or sent an e-mail, chances are good the u.s. government knows about it. these newly revealed documents show national security agency monitored americans telephone and web data for years. it passed congress in the wake of 9/11 but expanded so much more than the original architects of that bill had planned. as far as online surveillance go, nsa collects data from your e-mails to video chats. it also sweeps up file transfers and log-in information and the so-called prism program reportedly collects records from the largest internet companies including microsoft, yahoo!
chats. it includes an effort to sweep up file transfers and log-in information. the so-called prism program collects records from the largest internet companies from microsoft, yahoo! google and facebook. they collect information from the three largest phone companies with hundreds of millions of phone customers. that data includes a record of the location, the number called, the time of the call and the length of the conversation. officials say the effort does not monitor the content of the e-mails or phone calls but looks for larger trends of communication. the obama administration s embrace of this outraged critics. they used a link between the current president and his pred assessor. that s spooky, by the way. the program has plenty of defenders who say it s a
national security agency and fbi are tapping directly into the computer service. in order to monitor data in realtime. code name had not been made public until now. officials are reel iing after ts leaks. the newspapers obtained copies of a 41-slide powerpoint presentation classified as top secret, which according to the guardian was used to train intelligence operatives on the capabilities of the program. among the data collected which varies by provider, e-mail, audio and video chats, file transfers, video conferencing and personal logins. now, the slides describe prism as the leading source of raw
arab spring. of the companies named in these nsa documents published by the post and the guardian, five of the big names issued statements denying they participate in this program saying they do not provide the government direct access or some sort of secret back door to their servers. nevertheless, the nsa says they re in. both papers were apparently given access to what seems to be the same document or similar document. it appears to be a power point slide show used to train intelligence operatives of capabilities of this computer program called prism that allows officials to monitor not just e-mail traffic in realtime but search histories and file transfers and live chats. nbc news has confirmed the existence of the program. as elaboration, one source is describing this realtime monitoring of computer traffic
back door to their servers. nevertheless, the nsa says they re in. both papers were apparently given access to what seems to be the same document or similar document. it appears to be a power point slide show used to train intelligence operatives of capabilities of this computer program called prism that allows officials to monitor not just e-mail traffic in realtime but search histories and file transfers and live chats. nbc news has confirmed the existence of the program. as elaboration, one source is describing this realtime monitoring of computer traffic as the equivalent of standing in the post office and watching for specific envelopes that come from parts of the world or people that are deemed possible troublemakers. sources also telling nbc news the surveillance is mainly oriented toward communications that originate outside the u.s.