{"id":66926,"date":"2015-10-30T18:44:07","date_gmt":"2015-10-30T22:44:07","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/prism-surveillance-program-wikipedia-the-free-encyclopedia\/"},"modified":"2015-10-30T18:44:07","modified_gmt":"2015-10-30T22:44:07","slug":"prism-surveillance-program-wikipedia-the-free-encyclopedia","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/prism-surveillance-program-wikipedia-the-free-encyclopedia\/","title":{"rendered":"PRISM (surveillance program) &#8211; Wikipedia, the free encyclopedia"},"content":{"rendered":"<p><p>    PRISM is a clandestine[1]surveillance    program under which the United States National Security Agency (NSA)    collects internet communications from at least nine major US    internet companies.[2][3][4]    Since 2001 the United States government has increased its scope    for such surveillance, and so this program was launched in    2007.  <\/p>\n<p>    PRISM is a government code name for a data-collection effort known    officially by the SIGAD US-984XN.[5][6] The    PRISM program collects stored internet communications based on    demands made to internet companies such as Google Inc. under Section 702 of the FISA    Amendments Act of 2008 to turn over any data that match    court-approved search terms.[7] The NSA    can use these PRISM requests to target communications that were    encrypted when they traveled across the internet    backbone, to focus on stored data that telecommunication    filtering systems discarded earlier,[8][9] and to    get data that is easier to handle, among other things.[10]  <\/p>\n<p>    PRISM began in 2007 in the wake of the passage of the Protect America Act under the Bush Administration.[11][12] The    program is operated under the supervision of the U.S.    Foreign Intelligence Surveillance Court (FISA Court, or    FISC) pursuant to the Foreign Intelligence    Surveillance Act (FISA).[13] Its    existence was leaked six years later by NSA contractor    Edward    Snowden, who warned that the extent of mass data collection    was far greater than the public knew and included what he    characterized as \"dangerous\" and \"criminal\" activities.[14]    The disclosures were published by The Guardian    and The Washington Post on June 6,    2013. Subsequent documents have demonstrated a financial    arrangement between NSA's Special Source Operations    division (SSO) and PRISM partners in the millions of    dollars.[15]  <\/p>\n<p>    Documents indicate that PRISM is \"the number one source of raw    intelligence used for NSA analytic reports\", and it accounts    for 91% of the NSA's internet traffic acquired under FISA section 702    authority.\"[16][17]    The leaked information came to light one day after the    revelation that the FISA Court had been ordering a subsidiary    of telecommunications company Verizon Communications to turn    over to the NSA logs tracking all of its customers' telephone    calls.[18][19]  <\/p>\n<p>    U.S. government officials have disputed some aspects of the    Guardian and Washington Post stories and have    defended the program by asserting it cannot be used on domestic    targets without a warrant, that it has helped to prevent    acts of terrorism, and that it receives independent    oversight from the federal government's executive,    judicial and    legislative    branches.[20][21] On    June 19, 2013, U.S. President Barack Obama, during a visit to    Germany, stated that the NSA's data gathering practices    constitute \"a circumscribed, narrow system directed at us being    able to protect our people.\"[22]  <\/p>\n<p>    PRISM was publicly revealed when classified documents about the    program were leaked to journalists of The    Washington Post and The Guardian by Edward    Snowden at the time an NSA contractor during    a visit to Hong    Kong.[2][3]    The leaked documents included 41 PowerPoint slides, four of which    were published in news articles.[2][3]  <\/p>\n<p>    The documents identified several technology companies as    participants in the PRISM program, including Microsoft in 2007,    Yahoo! in 2008,    Google in 2009,    Facebook in 2009,    Paltalk in 2009,    YouTube in 2010,    AOL in 2011, Skype in 2011 and Apple in    2012.[23]    The speaker's notes in the briefing document reviewed by The    Washington Post indicated that \"98 percent of PRISM    production is based on Yahoo, Google, and Microsoft\".[2]  <\/p>\n<p>    The slide presentation stated that much of the world's    electronic communications pass through the U.S., because    electronic communications data tend to follow the least    expensive route rather than the most physically direct route,    and the bulk of the world's internet infrastructure is based in    the United States.[16]    The presentation noted that these facts provide United States    intelligence analysts with opportunities for intercepting the    communications of foreign targets as their electronic data pass    into or through the United States.[3][16]  <\/p>\n<p>    Snowden's subsequent disclosures included statements that    governments such as the United Kingdom's GCHQ also    undertook mass interception and tracking of internet and    communications data[24]    described by Germany as \"nightmarish\" if true[25]    allegations that the NSA engaged in \"dangerous\" and \"criminal\"    activity by \"hacking\" civilian infrastructure networks in other    countries such as \"universities, hospitals, and private    businesses\",[14]    and alleged that compliance offered only very    limited restrictive effect on mass data collection practices    (including of Americans) since restrictions \"are policy-based,    not technically based, and can change at any time\", adding that    \"Additionally, audits    are cursory, incomplete, and easily fooled by fake    justifications\",[14]    with numerous self-granted exceptions, and that NSA policies    encourage staff to assume the benefit of the doubt in cases of    uncertainty.[26][27][28]  <\/p>\n<p>    Below are a number of slides released by Edward Snowden showing    the operation and processes behind the PRISM program.  <\/p>\n<p>            Slide showing that much of the world's communications            flow through the U.S.          <\/p>\n<p>            Details of information collected via PRISM          <\/p>\n<p>            Slide listing companies and the date that PRISM            collection began          <\/p>\n<p>            Slide showing PRISM's tasking process          <\/p>\n<p>            Slide showing the PRISM collection dataflow          <\/p>\n<p>            Slide showing PRISM case numbers          <\/p>\n<p>            Slide showing the REPRISMFISA Web app          <\/p>\n<p>            Slide showing some PRISM targets.          <\/p>\n<p>            Slide fragment mentioning \"upstream collection\",            FAA702, EO 12333, and references yahoo.com explicitly            in the text.          <\/p>\n<p>            FAA702 Operations, and map          <\/p>\n<p>            FAA702 Operations, and map. The subheader reads            \"Collection only possible under FAA702 Authority\".            FAIRVIEW is in the center box.          <\/p>\n<p>            FAA702 Operations, and map. The subheader reads            \"Collection only possible under FAA702 Authority\".            STORMBREW is in the center box.          <\/p>\n<p>            Tasking, Points to Remember. Transcript of body:            Whenever your targets meet FAA criteria, you should            consider asking to FAA. Emergency tasking processes            exist for [imminent \/immediate ] threat to life            situations and targets can be placed on [illegible]            within hours (surveillance and stored comms). Get to            know your Product line FAA adjudicators and FAA            leads.          <\/p>\n<p>    The French newspaper Le Monde disclosed new PRISM slides (See Page 4,    7 and 8) coming from the \"PRISM\/US-984XN Overview\" presentation    on October 21, 2013.[29] The    British newspaper The Guardian disclosed new PRISM slides    (see pages 3 and 6) in November 2013 which on the one hand    compares PRISM with the Upstream program, and    on the other hand deals with collaboration between the NSA's    Threat Operations Center and the FBI.[30]  <\/p>\n<p>    Wikimedia Commons keeps copies of the    leaked PowerPoint slides, and other associated    documents.  <\/p>\n<p>    PRISM is a program from the Special Source Operations (SSO)    division of the NSA, which in the tradition of NSA's    intelligence alliances, cooperates with as many as 100 trusted    U.S. companies since the 1970s.[2] A    prior program, the Terrorist Surveillance    Program,[31][32]    was implemented in the wake of the September 11 attacks under the    George W.    Bush Administration but was widely criticized and    challenged as illegal, because it did not include warrants    obtained from the Foreign Intelligence Surveillance    Court.[32][33][34][35][36]    PRISM was authorized by the Foreign Intelligence Surveillance    Court.[16]  <\/p>\n<p>    PRISM was enabled under President Bush by the Protect America Act of 2007    and by the     FISA Amendments Act of 2008, which immunizes private    companies from legal action when they cooperate with U.S.    government agencies in intelligence collection. In 2012 the act    was renewed by Congress under President Obama for an additional    five years, through December 2017.[3][37][38]    According to The Register, the FISA Amendments Act of    2008 \"specifically authorizes intelligence agencies to monitor    the phone, email, and other communications of U.S. citizens for    up to a week without obtaining a warrant\" when one of the    parties is outside the U.S.[37]  <\/p>\n<p>    The most detailed description of the PRISM program can be found    in a report about NSA's collection efforts under Section 702    FAA, that was released by the Privacy and Civil    Liberties Oversight Board (PCLOB) on July 2, 2014.[39]  <\/p>\n<p>    According to this report, PRISM is only used to collect    internet communications, not telephone conversations. These    internet communications are not collected in bulk, but in a    targeted way: only communications that are to or from specific    selectors, like e-mail addresses, can be gathered. Under PRISM,    there's no collection based upon keywords or names.[39]  <\/p>\n<p>    The actual collection process is done by the Data Intercept Technology    Unit (DITU) of the FBI, which on behalf of the NSA sends    the selectors to the US internet service providers, which were    previously served with a Section 702 Directive. Under this    directive, the provider is legally obliged to hand over (to    DITU) all communications to or from the selectors provided by    the government.[39]    DITU then sends these communications to NSA, where they are    stored in various databases, depending on their type.  <\/p>\n<p>    Data, both content and metadata, that already have been    collected under the PRISM program, may be searched for both US    and Non-US person identifiers. These kind of queries became    known as \"back-door searches\" and are conducted by NSA, FBI and    CIA.[40] Each    of these agencies have slightly different protocols and    safeguards to protect searches with a US person    identifier.[39]  <\/p>\n<p>    Internal NSA presentation slides included in the various media    disclosures show that the NSA could unilaterally access data    and perform \"extensive, in-depth surveillance on live    communications and stored information\" with examples including    email, video and voice chat, videos, photos, voice-over-IP    chats (such as Skype), file transfers, and social networking    details.[3]    Snowden summarized that \"in general, the reality is this: if an    NSA, FBI, CIA, DIA, etc. analyst has access to query raw    SIGINT [signals intelligence] databases, they    can enter and get results for anything they want.\"[14]  <\/p>\n<p>    According to The Washington Post, the intelligence    analysts search PRISM data using terms intended to identify    suspicious communications of targets whom the analysts suspect    with at least 51 percent confidence to not be U.S. citizens,    but in the process, communication data of some U.S. citizens    are also collected unintentionally.[2]    Training materials for analysts tell them that while they    should periodically report such accidental collection of    non-foreign U.S. data, \"it's nothing to worry about.\"[2]  <\/p>\n<p>    According to The Guardian, NSA had access to chats    and emails on Hotmail.com, Skype, because Microsoft    had \"developed a surveillance capability to deal\" with the    interception of chats, and \"for Prism collection against    Microsoft email services will be unaffected because Prism    collects this data prior to encryption.\"[41][42]  <\/p>\n<p>    Also according to The Guardian's Glenn Greenwald even low-level    NSA analysts are allowed to search and listen to the    communications of Americans and other people without court    approval and supervision. Greenwald said low level Analysts    can, via systems like PRISM, \"listen to whatever emails they    want, whatever telephone calls, browsing histories, Microsoft    Word documents.[31]    And it's all done with no need to go to a court, with no need    to even get supervisor approval on the part of the    analyst.\"[43]  <\/p>\n<p>    He added that the NSA databank, with its years of collected    communications, allows analysts to search that database and    listen \"to the calls or read the emails of everything that the    NSA has stored, or look at the browsing histories or Google    search terms that you've entered, and it also alerts them to    any further activity that people connected to that email    address or that IP address do in the future.\"[43]    Greenwald was referring in the context of the foregoing quotes    to the NSA program X-Keyscore.[44]  <\/p>\n<p>          Unified Targeting Tool        <\/p>\n<p>    Shortly after publication of the reports by The Guardian    and The Washington Post, the United States Director of National    Intelligence, James Clapper, on June    7, 2013 released a statement confirming that for nearly six    years the government of the United States had been using large    internet services companies such as Google and Facebook to    collect information on foreigners outside the United States as    a defense against national security threats.[18]    The statement read in part, \"The Guardian and The    Washington Post articles refer to collection of    communications pursuant to Section 702 of the Foreign Intelligence    Surveillance Act. They contain numerous    inaccuracies.\"[46]    He went on to say, \"Section 702 is a provision of FISA that is    designed to facilitate the acquisition of foreign intelligence    information concerning non-U.S. persons located outside the    United States. It cannot be used to intentionally target any    U.S. citizen, any other U.S. person, or anyone located within    the United States.\"[46]    Clapper concluded his statement by stating, \"The unauthorized    disclosure of information about this important and entirely    legal program is reprehensible and risks important protections    for the security of Americans.\"[46]    On March 12, 2013, Clapper had told the United States Senate    Select Committee on Intelligence that the NSA does \"not    wittingly\" collect any type of data on millions or hundreds of    millions of Americans.[47]    Clapper later admitted the statement he made on March 12, 2013    was a lie,[48]    or in his words \"I responded in what I thought was the most    truthful, or least untruthful manner by saying no.\"[49]  <\/p>\n<p>    On June 7, 2013 U.S. President Barack Obama, referring to the PRISM    program[citation    needed] and the NSA's telephone calls    logging program, said, \"What you've got is two programs that    were originally authorized by Congress, have been repeatedly    authorized by Congress. Bipartisan majorities have approved    them. Congress is continually briefed on how these are    conducted. There are a whole range of safeguards involved. And    federal judges are overseeing the entire program    throughout.\"[50]    He also said, \"You can't have 100 percent security and then    also have 100 percent privacy and zero inconvenience. You know,    we're going to have to make some choices as a society.\"[50]    In separate statements, senior Obama administration officials    (not mentioned by name in source) said that Congress had been    briefed 13 times on the programs since 2009.[51]  <\/p>\n<p>    On June 8, 2013, Director of National Intelligence Clapper made    an additional public statement about PRISM and released a    fact sheet    providing further information about the program, which he    described as \"an internal government computer system used to    facilitate the government's statutorily authorized collection    of foreign intelligence information from electronic    communication service providers under court supervision, as    authorized by Section 702 of the Foreign Intelligence    Surveillance Act (FISA) (50 U.S.C.  1881a).\"[52][53]    The fact sheet stated that \"the surveillance activities    published in The Guardian and the Washington Post    are lawful and conducted under authorities widely known and    discussed, and fully debated and authorized by Congress.\"[52]    The fact sheet also stated that \"the United States Government    does not unilaterally obtain information from the servers of    U.S. electronic communication service providers. All such    information is obtained with FISA Court approval and with the    knowledge of the provider based upon a written directive from    the Attorney General and the Director of National    Intelligence.\" It said that the Attorney General provides FISA    Court rulings and semi-annual reports about PRISM activities to    Congress, \"provid[ing] an unprecedented degree of    accountability and transparency.\"[52]    Democratic Senators Udall and Wyden, who serve on the U.S. Senate Select Committee on Intelligence,    subsequently criticized the fact sheet as being    inaccurate.[clarification    needed] NSA Director General    Keith Alexander acknowledged the errors, stating that the    fact sheet \"could have more precisely described\" the    requirements governing the collection of e-mail and other    internet content from U.S. companies. The fact sheet was    withdrawn from the NSA's website around June 26.[54]  <\/p>\n<p>    In a closed-doors Senate hearing around June 11, FBI Director    Robert    Mueller said that Snowden's leaks had caused \"significant    harm to our nation and to our safety.\"[55]    In the same Senate NSA Director Alexander defended the    program.[further    explanation needed] Alexander's defense    was immediately criticized by Senators Udall and Wyden, who    said they saw no evidence that the NSA programs had produced    \"uniquely valuable intelligence.\" In a joint statement, they    wrote, \"Gen Alexander's testimony yesterday suggested that the    NSA's bulk phone records collection program helped thwart    'dozens' of terrorist attacks, but all of the plots that he    mentioned appear to have been identified using other collection    methods.\"[55][56]  <\/p>\n<p>    On June 18, NSA Director Alexander said in an open hearing    before the House Intelligence Committee of Congress that    communications surveillance had helped prevent more than 50    potential terrorist attacks worldwide (at least 10 of them    involving terrorism suspects or targets in the United States)    between 2001 and 2013, and that the PRISM web traffic    surveillance program contributed in over 90 percent of those    cases.[57][58][59]    According to court records, one example Alexander gave    regarding a thwarted attack by al Qaeda on the New York Stock    Exchange was not in fact foiled by surveillance.[60]    Several senators wrote Director of National Intelligence    Clapper asking him to provide other examples.[61]  <\/p>\n<p>    U.S. intelligence officials, speaking on condition of    anonymity, told various news outlets that by June 24 they were    already seeing what they said was evidence that suspected    terrorists had begun changing their communication practices in    order to evade detection by the surveillance tools disclosed by    Snowden.[62][63]  <\/p>\n<p>    In contrast to their swift and forceful reactions the previous    day to allegations that the government had been conducting    surveillance of United States citizens' telephone records,    Congressional leaders initially had little to say about the    PRISM program the day after leaked information about the    program was published. Several lawmakers declined to discuss    PRISM, citing its top-secret classification,[64]    and others said that they had not been aware of the    program.[65] After    statements had been released by the President and the Director    of National Intelligence, some lawmakers began to comment:  <\/p>\n<p>    Senator John    McCain (R-AZ)  <\/p>\n<p>    Senator Dianne Feinstein (D-CA), chair of the    Senate Intelligence Committee  <\/p>\n<p>    Senator Rand    Paul (R-KY)  <\/p>\n<p>    Senator Susan Collins (R-ME), member of Senate    Intelligence Committee and past member of Homeland Security    Committee  <\/p>\n<p>    Representative Jim Sensenbrenner (R-WI), principal    sponsor of the Patriot Act  <\/p>\n<p>    Representative Mike Rogers (R-MI), a    Chairman of the     Permanent Select Committee on Intelligence.  <\/p>\n<p>    Senator Mark    Udall (D-CO)  <\/p>\n<p>    Representative Todd Rokita (R-IN)  <\/p>\n<p>    Representative Luis Gutierrez (D-IL)  <\/p>\n<p>    Senator Ron    Wyden (D-OR)  <\/p>\n<p>    Following these statements some lawmakers from both parties    warned national security officials during a hearing before the    House Judiciary Committee that they must change their use of    sweeping National Security Agency surveillance programs or face    losing the provisions of the Foreign Intelligence Surveillance    Act that have allowed for the agency's mass collection of    telephone metadata.[75]    \"Section 215 expires at the end of 2015, and unless you realize    you've got a problem, that is not going to be renewed,\" Rep.    Jim Sensenbrenner, R-Wis., author of the USA Patriot Act,    threatened during the hearing.[75]    \"It's got to be changed, and you've got to change how you    operate section 215. Otherwise, in two and a half years, you're    not going to have it anymore.\"[75]  <\/p>\n<p>    Leaks of classified documents pointed to the role of a special    court in enabling the government's secret surveillance    programs, but members of the court maintained they were not    collaborating with the executive branch.[76]The    New York Times, however, reported in July 2013 that in    \"more than a dozen classified rulings, the nation's    surveillance court has created a secret body of law giving the    National Security Agency the power to amass vast collections of    data on Americans while pursuing not only terrorism suspects,    but also people possibly involved in nuclear proliferation,    espionage and cyberattacks.\"[77]    After Members of the U.S. Congress pressed the Foreign    Intelligence Surveillance Court to release declassified    versions of its secret ruling, the court dismissed those    requests arguing that the decisions can't be declassified    because they contain classified information.[78]Reggie Walton, the current FISA    presiding judge, said in a statement: \"The perception that the    court is a rubber stamp is absolutely false. There is a    rigorous review process of applications submitted by the    executive branch, spearheaded initially by five judicial branch    lawyers who are national security experts, and then by the    judges, to ensure that the court's authorizations comport with    what the applicable statutes authorize.\"[79] The    accusation of being a \"rubber stamp\" was further rejected by    Walton who wrote in a letter to Senator Patrick J. Leahy: \"The    annual statistics provided to Congress by the Attorney General    [...]frequently cited to in press reports as a suggestion that    the Court's approval rate of application is over 99%reflect    only the number of final applications submitted to and    acted on by the Court. These statistics do not reflect the fact    that many applications are altered to prior or final submission    or even withheld from final submission entirely, often after an    indication that a judge would not approve them.\"[80]  <\/p>\n<p>    The U.S. military has acknowledged blocking access to parts of    The Guardian website for thousands of defense personnel    across the country,[81]    and blocking the entire Guardian website for personnel    stationed throughout Afghanistan, the Middle East, and South    Asia.[82]    A spokesman said the military was filtering out reports and    content relating to government surveillance programs to    preserve \"network hygiene\" and prevent any classified material    from appearing on unclassified parts of its computer    systems.[81]    Access to the Washington Post, which also published    information on classified NSA surveillance programs disclosed    by Edward Snowden, had not been blocked at the time the    blocking of access to The Guardian was reported.[82]  <\/p>\n<p>    The former head of the Austrian     Federal Office for the Protection of the Constitution and    Counterterrorism, Gert-Ren Polli, stated he knew the    PRISM program under a different name and stated that    surveillance activities had occurred in Austria as well. Polli    had publicly stated in 2009 that he had received requests from    US intelligence agencies to do things that would be in    violation of Austrian law, which Polli refused to    allow.[83][84]  <\/p>\n<p>    The Australian government has said it will investigate the    impact of the PRISM program and the use of the Pine Gap surveillance    facility on the privacy of Australian citizens.[85]    Australia's former foreign minister Bob Carr said that Australians shouldn't    be concerned about PRISM but that cybersecurity is high on the    government's list of concerns.[86] An    Australian diplomat stated that the acts of Edward    Snowden were treachery and offered a staunch defence of her    nation's intelligence co-operation with America. [87]  <\/p>\n<p>    Brazil's president,    Dilma    Rousseff, responded by cancelling a planned October 2013    state visit    to the United States, demanding an official apology, which by    October 20, 2013, hadn't come.[88] Also,    Rousseff classified the spying as unacceptable between more    harsh words in a speech before the UN General Assembly on September 24,    2013.[89] As a    result, Boeing lost    out on a US$4.5 billion contract for fighter jets to Sweden's    Saab    Group.[90]  <\/p>\n<p>    Canada's national    cryptologic agency, the Communications Security Establishment (CSEC),    said that commenting on PRISM \"would undermine CSE's ability to    carry out its mandate.\" Privacy    Commissioner Jennifer Stoddart lamented Canada's    standards when it comes to protecting personal online privacy    stating \"We have fallen too far behind\" in her report. \"While    other nations' data protection authorities have the legal power    to make binding orders, levy hefty fines and take meaningful    action in the event of serious data breaches, we are restricted    to a 'soft' approach: persuasion, encouragement and, at the    most, the potential to publish the names of transgressors in    the public interest.\" And, \"when push comes to shove,\" Stoddart    wrote, \"short of a costly and time-consuming court battle, we    have no power to enforce our recommendations.\"[91][92]  <\/p>\n<p>    On 20 October 2013 a committee at the European Parliament backed a measure    that, if it is enacted, would require American companies to    seek clearance from European officials before complying with    United States warrants seeking private data. The legislation    has been under consideration for two years. The vote is part of    efforts in Europe to shield citizens from online surveillance    in the wake of revelations about a far-reaching spying    program by the U.S.    National Security Agency.[93]    Germany and France have also had ongoing mutual talks about how    they can keep European email traffic from going across American    servers.[94]  <\/p>\n<p>    On October 21, 2013 the French Foreign Minister, Laurent    Fabius, summoned the U.S. Ambassador, Charles    Rivkin, to the Quai d'Orsay in Paris to protest large-scale spying on French    citizens by the U.S. National Security Agency (NSA). Paris    prosecutors had opened preliminary inquiries into the NSA    program in July, but Fabius said, \" obviously we need to go    further\" and \"we must quickly assure that these practices    aren't repeated.\"[95]  <\/p>\n<p>    Germany did not receive any raw PRISM data, according to a    Reuters report.[96]German Chancellor Angela Merkel    said that \"the internet is new to all of us\" to explain the    nature of the program; Matthew Schofield of McClatchy    Washington Bureau said, \"She was roundly mocked for that    statement.\"[97]    Gert-Ren Polli, a former Austrian counter-terrorism official,    said in 2013 that it is \"absurd and unnatural\" for the German    authorities to pretend not to have known anything.[83][84]    The German Army was using PRISM to support its operations in    Afghanistan as early as 2011.[98]  <\/p>\n<p>    In October 2013, it was reported that the NSA monitored    Merkel's cell phone.[99] The    United States denied the report, but following the allegations,    Merkel called President Obama and told him that spying on    friends was \"never acceptable, no matter in what    situation.\"[100]  <\/p>\n<p>    Israeli newspaper Calcalist discussed[101]    the Business Insider article[102]    about the possible involvement of technologies from two    secretive Israeli companies in the PRISM programVerint    Systems and Narus.  <\/p>\n<p>    The Mexican Government after finding out about the PRISM    program has started to build its own spying program to spy on    its own citizens. According to Jenaro Villamil a writer from    Proceso(magazine), CISEN the    intelligence agency from Mexico has started to work with    IBM and Hewlett    Packard to develop its own data gathering software.    Facebook, Twitter, Emails and other social network sites are    going to be priority.\"[103]  <\/p>\n<p>    In New Zealand, University of Otago information    science Associate Professor Hank Wolfe said that \"under what    was unofficially known as the Five Eyes Alliance, New Zealand and other    governments, including the United States, Australia, Canada,    and Britain, dealt with internal spying by saying they didn't    do it. But they have all the partners doing it for them and    then they share all the information.\"[104]  <\/p>\n<p>    Edward    Snowden, in a live streamed Google Hangout to Kim Dotcom and    Julian    Assange alleged that he had received intelligence from New    Zealand, and the NSA has listening posts in New Zealand[105]  <\/p>\n<p>    At a meeting of European Union leaders held the week of 21    October 2013, Mariano Rajoy, Spain's prime minister, said    that \"spying activities aren't proper among partner countries    and allies\". On 28 October 2013 the Spanish government summoned    the American ambassador, James Costos, to address allegations that    the U.S. had collected data on 60 million telephone calls in    Spain. Separately, igo Mndez de Vigo, a Spanish    secretary of state, referred to the need to maintain \"a    necessary balance\" between security and privacy concerns, but    said that the recent allegations of spying, \"if proven to be    true, are improper and unacceptable between partners and    friendly countries\".[106]  <\/p>\n<p>    In the United Kingdom, the Government    Communications Headquarters (GCHQ), which also has its own    surveillance program Tempora, had access to the PRISM program on or    before June 2010 and wrote 197 reports with it in 2012 alone.    But after 2014, the    Tempora lost its access to the PRISM    programme.[citation    needed] The Intelligence and Security Committee of the    UK Parliament reviewed    the reports GCHQ produced on the basis of intelligence sought    from the US. They found in each case a warrant for interception    was in place in accordance with the legal safeguards contained    in UK law.[107]  <\/p>\n<p>    In August 2013, The Guardian newspaper's offices were    visited by agents from GCHQ, who ordered and supervised the    destruction of the hard drives containing information acquired    from Snowden.[108]  <\/p>\n<p>    The original Washington Post and Guardian    articles reporting on PRISM noted that one of the leaked    briefing documents said PRISM involves collection of data    \"directly from the servers\" of several major internet services    providers.[2][3]  <\/p>\n<p>    Corporate executives of several companies identified in the    leaked documents told The Guardian that they had no    knowledge of the PRISM program in particular and also denied    making information available to the government on the scale    alleged by news reports.[3][109]    Statements of several of the companies named in the leaked    documents were reported by TechCrunch and The Washington Post as    follows:[110][111]  <\/p>\n<p>    In response to the technology companies' denials of the NSA    being able to directly access the companies' servers, The    New York Times reported that sources had stated the NSA was    gathering the surveillance data from the companies using other    technical means in response to court orders for specific sets    of data.[18]The    Washington Post suggested, \"It is possible that the    conflict between the PRISM slides and the company spokesmen is    the result of imprecision on the part of the NSA author. In    another classified report obtained by The Post, the arrangement    is described as allowing 'collection managers [to send] content    tasking instructions directly to equipment installed at    company-controlled locations,' rather than directly to company    servers.\"[2]    \"[I]n context, 'direct' is more likely to mean that the NSA is    receiving data sent to them deliberately by the tech companies,    as opposed to intercepting communications as they're    transmitted to some other destination.[111]  <\/p>\n<p>    \"If these companies received an order under the FISA amendments    act, they are forbidden by law from disclosing having received    the order and disclosing any information about the order at    all,\" Mark Rumold, staff attorney at the Electronic Frontier    Foundation, told ABC News.[114]  <\/p>\n<p>    On May 28, 2013, Google was ordered by United States District    Court Judge Susan Illston to comply with a National    Security Letter issued by the FBI to provide user data    without a warrant.[115]    Kurt Opsahl, a senior staff attorney at the Electronic Frontier    Foundation, in an interview with VentureBeat said, \"I certainly    appreciate that Google put out a transparency report, but it    appears that the transparency didn't include this. I wouldn't    be surprised if they were subject to a gag order.\"[116]  <\/p>\n<p>    The New York Times reported on June 7, 2013, that    \"Twitter declined to make it easier for the government. But    other companies were more compliant, according to people    briefed on the negotiations.\"[117]    The other companies held discussions with national security    personnel on how to make data available more efficiently and    securely.[117]    In some cases, these companies made modifications to their    systems in support of the intelligence collection    effort.[117]    The dialogues have continued in recent months, as General    Martin Dempsey, the chairman of the Joint    Chiefs of Staff, has met with executives including those at    Facebook, Microsoft, Google and Intel.[117]    These details on the discussions provide insight into the    disparity between initial descriptions of the government    program including a training slide which states, \"Collection    directly from the servers\"[118]    and the companies' denials.[117]  <\/p>\n<p>    While providing data in response to a legitimate FISA request    approved by the FISA Court is a legal requirement, modifying    systems to make it easier for the government to collect the    data is not. This is why Twitter could legally decline to    provide an enhanced mechanism for data transmission.[117]    Other than Twitter, the companies were effectively asked to    construct a locked mailbox and provide the key to the    government, people briefed on the negotiations said.[117]    Facebook, for instance, built such a system for requesting and    sharing the information.[117]    Google does not provide a lockbox system, but instead transmits    required data by hand delivery or ssh.[119]  <\/p>\n<p>    In response to the publicity surrounding media reports of    data-sharing, several companies requested permission to reveal    more public information about the nature and scope of    information provided in response to National Security requests.  <\/p>\n<p>    On June 14, 2013, Facebook reported that the U.S. government    had authorized the communication of \"about these numbers in    aggregate, and as a range.\" In a press release posted to its    web site, the company reported, \"For the six months ending    December 31, 2012, the total number of user-data requests    Facebook received from any and all government entities in the    U.S. (including local, state, and federal, and including    criminal and national security-related requests)  was between    9,000 and 10,000.\" The company further reported that the    requests impacted \"between 18,000 and 19,000\" user accounts, a    \"tiny fraction of one percent\" of more than 1.1 billion active    user accounts.[120]  <\/p>\n<p>    That same day, Microsoft reported that for the same period, it    received \"between 6,000 and 7,000 criminal and national    security warrants, subpoenas and orders affecting between    31,000 and 32,000 consumer accounts from U.S. governmental    entities (including local, state and federal)\" which impacted    \"a tiny fraction of Microsoft's global customer base.\"[121]  <\/p>\n<p>    Google issued a statement criticizing the requirement that data    be reported in aggregated form, stating that lumping national    security requests with criminal request data would be \"a step    backwards\" from its previous, more detailed practices on its    website's transparency    report. The company said that it would continue to seek    government permission to publish the number and extent of FISA    requests.[122]  <\/p>\n<p>    Cisco    Systems has seen a huge drop in export sales because of    spying fears from the National Security Agency using backdoors    in its products.[123]  <\/p>\n<p>    On September 12, 2014, Yahoo! reported the U.S. Government    threatened the imposition of $250,000 in fines per day if Yahoo    didn't hand over user data as part of the NSA's PRISM    program.[124]    It is not known if other companies were threatened or fined for    not providing data in response to a legitimate FISA requests.  <\/p>\n<p>    The New York Times editorial board    charged that the Obama administration \"has now lost all    credibility on this issue,\"[125] and    lamented that \"for years, members of Congress ignored evidence    that domestic intelligence-gathering had grown beyond their    control, and, even now, few seem disturbed to learn that every    detail about the public's calling and texting habits now reside    in a N.S.A. database.\"[126] It    wrote with respect to the FISA-Court    in context of PRISM that it is \"a perversion of the American    justice system\" when \"judicial secrecy is coupled with a    one-sided presentation of the issues.\"[127]    According to the New York Times, \"the result is a court whose    reach is expanding far beyond its original mandate and without    any substantive check.\"[127]  <\/p>\n<p>    James Robertson, a former federal    district judge based in Washington who served on the secret    Foreign Intelligence Surveillance Act court for three years    between 2002 and 2005 and who ruled against the Bush    administration in the landmark Hamdan v.    Rumsfeld case, said FISA court is independent but    flawed because only the government's side is represented    effectively in its deliberations. \"Anyone who has been a judge    will tell you a judge needs to hear both sides of a case,\" said    James Robertson.[128]    Without this judges do not benefit from adversarial debate. He    suggested creating an advocate with security clearance who    would argue against government filings.[129]    Robertson questioned whether the secret FISA court should    provide overall legal approval for the surveillance programs,    saying the court \"has turned into something like an    administrative agency.\" Under the changes brought by the        Foreign Intelligence Surveillance Act of 1978 Amendments Act of    2008, which expanded the US government's authority by    forcing the court to approve entire surveillance systems and    not just surveillance warrants as it previously handled, \"the    court is now approving programmatic surveillance. I don't think    that is a judicial function.\"[128]    Robertson also said he was \"frankly stunned\" by the New York    Times report[77]    that FISA court rulings had created a new body of law    broadening the ability of the NSA to use its surveillance    programs to target not only terrorists but suspects in cases    involving espionage, cyberattacks and weapons of mass    destruction.[128]  <\/p>\n<p>    Former CIA analyst Valerie Plame Wilson and former U.S.    diplomat Joseph Wilson, writing in an op-ed article published in    The Guardian, said that \"Prism and other NSA data-mining    programs might indeed be very effective in hunting and    capturing actual terrorists, but we don't have enough    information as a society to make that decision.\"[130]    Computer security expert John Bambenek from the University of Illinois suggested that    use of data mining in national security cases might be prone to    inaccuracy and manipulation.[131]  <\/p>\n<p>    The Electronic Frontier    Foundation (EFF), an international non-profit digital-rights group based in the U.S., is    hosting a tool, by which an American resident can write to    their government representatives regarding their opposition to    mass spying.[132]  <\/p>\n<p>    The Obama administration's argument that NSA surveillance    programs such as PRISM and Boundless Informant had been    necessary to prevent acts of terrorism was challenged by    several parties. Ed Pilkington and Nicholas Watt of The    Guardian said of the case of Najibullah    Zazi, who had planned to bomb the New    York City Subway, that interviews with involved parties and    U.S. and British court documents indicated that the    investigation into the case had actually been initiated in    response to \"conventional\" surveillance methods such as    \"old-fashioned tip-offs\" of the British intelligence services,    rather than to leads produced by NSA surveillance.[133]    Michael Daly of The Daily Beast stated that even    though Tamerlan Tsarnaev, who is alleged to    have conducted the 2013 Boston marathon    bombings with his brother Dzhokhar Tsarnaev, had visited    the Al Qaeda-affiliated Inspire magazine website, and even    though Russian intelligence officials had raised concerns with    U.S. intelligence officials about Tamerlan Tsarnaev, PRISM did    not prevent him from carrying out the Boston attacks. Daly    observed that, \"The problem is not just what the National    Security Agency is gathering at the risk of our privacy but    what it is apparently unable to monitor at the risk of our    safety.\"[134]  <\/p>\n<p>    Ron Paul, a    former Republican member of Congress and prominent libertarian,    thanked Snowden and Greenwald and denounced the mass    surveillance as unhelpful and damaging, urging instead more    transparency in U.S. government actions.[135]    He called Congress \"derelict in giving that much power to the    government,\" and said that had he been elected president, he    would have ordered searches only when there was probable    cause of a crime having been committed, which he said was    not how the PRISM program was being operated.[136]  <\/p>\n<p>    New York Times columnist Thomas L. Friedman defended limited    government surveillance programs intended to protect the    American people from terrorist acts:  <\/p>\n<p>      Yes, I worry about potential government abuse of privacy from      a program designed to prevent another 9\/11abuse that, so      far, does not appear to have happened. But I worry even more      about another 9\/11. ... If there were another 9\/11, I fear      that 99 percent of Americans would tell their members of      Congress: \"Do whatever you need to do to, privacy be damned,      just make sure this does not happen again.\" That is      what I fear most. That is why I'll reluctantly, very      reluctantly, trade off the government using data mining to      look for suspicious patterns in phone numbers called and      e-mail addressesand then have to go to a judge to get a      warrant to actually look at the content under guidelines set      by Congressto prevent a day where, out of fear, we give      government a license to look at anyone, any e-mail, any phone      call, anywhere, anytime.[137]    <\/p>\n<p>    Political commentator David Brooks similarly    cautioned that government data surveillance programs are a    necessary evil: \"if you don't have mass data sweeps, well, then    these agencies are going to want to go back to the    old-fashioned eavesdropping, which is a lot more    intrusive.\"[138]  <\/p>\n<p>    Conservative commentator Charles Krauthammer worried    less about the legality of PRISM and other NSA surveillance    tools than about the potential for their abuse without more    stringent oversight. \"The problem here is not    constitutionality. ... We need a toughening of both    congressional oversight and judicial review, perhaps even some    independent outside scrutiny. Plus periodic legislative    revisionsay, reauthorization every couple of yearsin light of    the efficacy of the safeguards and the nature of the external    threat. The object is not to abolish these vital programs. It's    to fix them.\"[139]  <\/p>\n<p>    In a blog post, David Simon, the creator of The Wire, compared    the NSA's programs, including PRISM, to a 1980s effort by the    City of Baltimore to add dialed number recorders to all pay    phones to know which individuals were being called by the    callers;[140]    the city believed that drug traffickers were using pay phones    and pagers, and a municipal judge allowed the city to place the    recorders. The placement of the dialers formed the basis of the    show's first season. Simon argued that the media attention    regarding the NSA programs is a \"faux scandal.\"[140][141]    Simon had stated that many classes of people in American    society had already faced constant government surveillance.  <\/p>\n<p>    Political theorist, and frequent critic    of U.S. government policies, Noam Chomsky argued, \"Governments    should not have this capacity. But governments will use    whatever technology is available to them to combat their    primary enemy  which is their own population.\"[142]  <\/p>\n<p>    A CNN\/Opinion Research Corporation    poll conducted June 11 through 13 found that 66% of Americans    generally supported the program.[143][144][Notes    1] However, a Quinnipiac University poll    conducted June 28 through July 8 found that 45% of registered    voters think the surveillance programs have gone too far, with    40% saying they do not go far enough, compared to 25% saying    they had gone too far and 63% saying not far enough in    2010.[145]    Other polls have shown similar shifts in public opinion as    revelations about the programs were leaked.[146][147]  <\/p>\n<p>    In terms of economic impact, a study released in August by the    Information    Technology and Innovation Foundation[148]    found that the disclosure of PRISM could cost the U.S. economy    between $21.5 and $35 billion in lost cloud computing business    over three years.[149][150][151][152]  <\/p>\n<p>    Sentiment around the world was that of general displeasure upon    learning the extent of world communication data mining. Some    national leaders spoke against the NSA and some spoke against    their own national surveillance. One national minister had    scathing comments on the National Security Agency's data-mining    program, citing Benjamin Franklin: \"The more a society    monitors, controls, and observes its citizens, the less free it    is.\"[153] Some    question if the costs of hunting terrorists now overshadows the    loss of citizen privacy.[154][155]  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Excerpt from:<br \/>\n<a target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/PRISM_(surveillance_program)\" title=\"PRISM (surveillance program) - Wikipedia, the free encyclopedia\">PRISM (surveillance program) - Wikipedia, the free encyclopedia<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> PRISM is a clandestine[1]surveillance program under which the United States National Security Agency (NSA) collects internet communications from at least nine major US internet companies.[2][3][4] Since 2001 the United States government has increased its scope for such surveillance, and so this program was launched in 2007. PRISM is a government code name for a data-collection effort known officially by the SIGAD US-984XN.[5][6] The PRISM program collects stored internet communications based on demands made to internet companies such as Google Inc. under Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms.[7] The NSA can use these PRISM requests to target communications that were encrypted when they traveled across the internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier,[8][9] and to get data that is easier to handle, among other things.[10] PRISM began in 2007 in the wake of the passage of the Protect America Act under the Bush Administration.[11][12] The program is operated under the supervision of the U.S.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/prism-surveillance-program-wikipedia-the-free-encyclopedia\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-66926","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/66926"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=66926"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/66926\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=66926"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=66926"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=66926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}