Google's Chief Architect, Yonatan Zunger in this post: <a href="https://plus.google.com/u/0/+YonatanZunger/posts/huwQsphBron" rel="nofollow">https://plus.google.com/u/0/+YonatanZunger/posts/huwQsphBron</a> notes his suspicions that the second slide ( <a href="http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/m" rel="nofollow">http://www.washingtonpost.com/wp-srv/special/politics/prism-...</a> ) subtly explains how the data collection works.<p>The way I see it is that by extracting data via man-in-the-middle (subject to HTTPs etc..., discussions elsewhere), the NSA and others could target packets that fit certain profiles of data, such as Googles, Facebooks etc...