C13. PRISM (surveillance program)

PRISM (surveillance program)
images (2) Domestic-Spying images  800px-Berlin_2013_PRISM_Demo 800px-DigiGes_PRISM01 800px-Is_Snowden_a_Hero-_SnowdenHK_香港聲援斯諾登遊行_Hong_Kong_Rally_to_Support_Snowden_SML.20130615.7D.42298 NSA_Muscular_Google_Cloud Prism_-_FAA_702_operations Prism-fairview-straight 1024px-Slides-nsa-prism03a-straight Prism-week-in-life-straight Prism-slide-9 Prism-slide-8 Prism-slide-7 Prism-slide-6 Prism_slide_5 PRISM_Collection_Details Prism_slide_2 Cover_slide_of_PRISM Tia_logo_large
PRISM (surveillance program)
PRISM is a clandestine mass electronic surveillance data mining program launched in 2007 by the National Security Agency (NSA), with participation from an unknown date by the British equivalent agency, GCHQ.[1][2][3] PRISM is a government code name for a data-collection effort known officially by the SIGAD US-984XN.[4][5] The Prism program collects stored Internet communications based on demands made to Internet companies such as Google Inc. under Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms.[6] The NSA can use these Prism requests to target communications that were encrypted when they traveled across the Internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier,[7][8] and to get data that is easier to handle, among other things.[9]

PRISM began in 2007 in the wake of the passage of the Protect America Act under the Bush Administration.[10][11] The program is operated under the supervision of the U.S. Foreign Intelligence Surveillance Court (FISA Court, or FISC) pursuant to the Foreign Intelligence Surveillance Act (FISA).[12] Its existence was leaked six years later by NSA contractor Edward Snowden, who warned that the extent of mass data collection was far greater than the public knew and included what he characterized as “dangerous” and “criminal” activities.[13] The disclosures were published by The Guardian and The Washington Post on June 6, 2013. Subsequent documents have demonstrated a financial arrangement between NSA’s Special Source Operations division (SSO) and PRISM partners in the millions of dollars.[14]

Documents indicate that PRISM is “the number one source of raw intelligence used for NSA analytic reports”, and it accounts for 91% of the NSA’s Internet traffic acquired under FISA section 702 authority.”[15][16] The leaked information came to light one day after the revelation that the FISA Court had been ordering a subsidiary of telecommunications company Verizon Communications to turn over to the NSA logs tracking all of its customers’ telephone calls on an ongoing daily basis.[17][18]

U.S. government officials have disputed some aspects of the Guardian and Washington Post stories and have defended the program by asserting it cannot be used on domestic targets without a warrant, that it has helped to prevent acts of terrorism, and that it receives independent oversight from the federal government’s executive, judicial and legislative branches.[19][20] On June 19, 2013, U.S. President Barack Obama, during a visit to Germany, stated that the NSA’s data gathering practices constitute “a circumscribed, narrow system directed at us being able to protect our people.
*** See Also ***

Tia_logo_large 640px-National_Security_Agency.svg
Timeline of NSA Domestic Spying
Surveillance Techniques: How Your Data Becomes Our Data

This entry was posted in Uncategorized. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s