Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Reimagining the Next Generation of Government
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
UK: British spies broke no law by using PRISM data
Wednesday - 7/17/2013, 2:30pm EDT
LONDON (AP) -- British spies are right to draw on the data gathered by the U.S. National Security Agency's PRISM program, a parliamentary committee said Wednesday, one of the first outside assessments of the surveillance program exposed by leaker Edward Snowden.
The U.K.'s Intelligence and Security Committee also said there is nothing to suggest that Britain's eavesdropping agency GCHQ -- the Government Communications Headquarters -- is using PRISM to get around restrictions on domestic espionage.
"It has been alleged that GCHQ circumvented U.K. law by using the NSA's PRISM program to access the content of private communications," the committee said in a three-page statement posted to its website. "From the evidence we have seen, we have concluded that this is unfounded."
The mechanics of PRISM are still little-understood, but initial reports described it as being able to pull private data directly from the servers of Silicon Valley's biggest firms. The exposure of PRISM and other programs by the Guardian and The Washington Post set off a global debate over the explosion of surveillance in the digital age and the role of the United States as the lynchpin of the online economy.
The companies involved have since denied offering the NSA wholesale access to their data, but the news that GCHQ also uses PRISM sparked concern in Britain that privileged access to U.S. companies' data had been used to leapfrog U.K. law.
The Intelligence Committee said it had received detailed evidence from GCHQ about PRISM, including a list of counterterrorism operations for which GCHQ had drawn on U.S. intelligence, a list of all U.K. individuals monitored through the program, and an undisclosed number of intelligence reports which drew on PRISM data. Lawmakers said that they had also discussed the program with its U.S. congressional counterpart and with the NSA.
The committee, chaired by Conservative lawmaker and former minister Malcolm Rifkind, said its review of the evidence left it satisfied that GCHQ was operating within the law. It also flatly denied that PRISM was linked to data mining -- the name given to the process of sifting through mountains of data to look for patterns and hunt for suspicious behavior.
"Access under PRISM is specific and targeted," it said.
Britain's government welcomed the statement, but civil liberties groups expressed reservations. London-based Liberty, which is suing Britain's government over its access to the program, denounced it as a whitewash. Others pointed out that the committee only studied PRISM -- sidestepping questions about other GCHQ programs exposed by Snowden, including a sweeping cable traffic interception campaign codenamed TEMPORA.
GCHQ probably is acting within the law, said Peter Gill, an honorary researcher at the University of Liverpool who's written about intelligence matters, although he noted that the Britain's data intercept rules were broad and vague. He added that he didn't buy the idea that the U.S. and Britain weren't engaged in data mining.
"I don't think we have the full story here," he said.
The Intelligence and Security Committee of Parliament: http://isc.independent.gov.uk/
The Intelligence Committee's statement on PRISM: http://bit.ly/18kHwxJ
Copyright 2013 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.