Prism Threats

1151 Words5 Pages
PRISM One in seven intelligence reports released by the NSA sites PRISM for its source of raw material, making it the NSA’s number one source of raw material (Poitras, 2013). PRISM is a classified mass data-mining program created by the NSA in 2007 (MacAskill, 2013) designed to extract and store data from major online service providers for analysis. Some of the companies allegedly involved include Microsoft, Google, Facebook, Apple, and many more. Albeit true PRISM targets foreign suspects, data on U.S citizens (and innocent foreigners) is also collected unintentionally (Poitras, 2013). With personal information such as phone calls, video chats, emails, photographs, documents, and connection logs (Poitras, 2013) easily accessible to the…show more content…
Data mining for surveillance purposes truly began in wake of the September 11th attacks. The Bush Administration, in collaboration with the NSA, created the Terrorist Surveillance Program (TSP) (LICHTBLAU, 2005). Essentially, the TSP enabled NSA officials to eavesdrop on calls (domestic or international) without a warrant. On August 17th, 2006, U.S. District Judge Anna Taylor ruled the program Unconstitutional and Illegal (Hopkins, 2007). Under the impression that the U.S would lose the ability to continue surveillance of terrorists, the Bush Administration passed the Protect America Act, allowing intelligence to be collected on suspected targets reasonably believed to be outside of the United States without a warrant (Congress, 2007). Within one month of the bills passing, the NSA enlisted Microsoft as their first partner with PRISM. (Poitras, 2013). The FISA Amendments Act of 2008 further strengthened the reach of PRISM – giving US intelligence agencies the ability to spy on US citizens without a warrant for up to 7 days, so long as one of the parties is outside of the US (USGOV, 2008). It is crucial to understand that these amendments allowed the NSA to collect an enormous amount of data that they deemed “useful” to any ongoing investigation with no warrant…show more content…
Considering the worst-case scenario for PRISM, assume that all internet firms products are compromised. Albeit true alternatives exist, the scope of the products offered by the co-operating companies is simply too large. One would need to change operating systems to Linux, stop using Android or Apple devices, abandon Facebook, Google, YouTube, and many other beloved services, and that’s merely scratching the surface. Even still, with the knowledge that the NSA can snoop directly through ISP’s, one would have to go to extremes such as using services such as the The Onion Router (TOR) that will completely hide ones identity. While nice in theory, TOR is not publically accepted and is widely regarded as the “darkweb” due to the sheer amount of illicit content accessible. PRISM is an ongoing data-mining program created and heavily used by the NSA. In theory, PRISM is to be used for the investigation of foreign targets, but its scope has been broadened as the data collected by PRISM affects most citizens internationally. With societies current dependence on internet giants such as Microsoft and Google, it is near impossible to avoid
Open Document