• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • December 8th, 2019
  • Home
  • About Us
  • Team
  • Advertise
  • Submit News
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Google+
    • Linkedin
    • Youtube
Home » Surveillance » How the PRISM Surveillance Works? Explained!

How the PRISM Surveillance Works? Explained!

June 17th, 2013 Waqas Surveillance 2 comments
How the PRISM Surveillance Works? Explained!
Share on FacebookShare on Twitter

PRISM_logo_PNGA recently published report in USA has outlined the route it takes for PRISM to get hold of the data from different tech giants. According to the report, PRISM uses nearly all the tech giants for leaking private data of the people in U.S. and outside it. Furthermore, it says Facebook was found to be the smallest part of program. It also confirms that NSA copies all the incoming and outgoing traffic on internet in USA to collect data.

It also rejects all the rumors of PRISM having direct access to the tech giant’s data and says there is a vast different PRISM’s well organized data and unstructured data taken out from internet pipelines.

A PowerPoint slide from a newspaper includes the following words:

  • NSA analysts were encouraged to use data coming from both Prism and from the fiber-optic cables. Prism, as its name suggests, helps narrow and focus the stream.

But, how come PRISM program has been secured by law? Well, each year the attorney general sends a document to the defining all the government planing on surveillance and a judge from federal court secretly approves this. Then after, according to the section 702 of the Foreign Intelligence Surveillance Act (FISA) it becomes legal for government to gather information from different tech giants and internet pipelines.

However, tech giants doesn’t follow the instruction of NSA fully. Less then half data is only supplied by these firms in relevance in the data acquired by the NSA. The firm owners believe they are only liable to provide data that is lawful. Here is what they say: Microsoft said in a statement:

 

  • We only ever comply with orders for requests about specific accounts or identifiers.” Google chief architect Yonatan Zunger wrote that Google only responds to “lawful, specific orders about individuals.” And Facebook revealed it received between 9,000 and 10,000 requests for user data in the second half of last year, and said “we respond only as required by law.

So, it remains to be seen whether NSA would be able gain data from these firms or not. This rivalry might become fierce as the time goes along because providing data might hurt the brand image of these firms which might not be good for them with competition in market getting intense.

Follow @HackRead

  • Tags
  • Government Surveillance
  • NSA
  • PRISM
  • PRISM surveillance
  • Spying
  • Surveillance
Facebook Twitter Google+ LinkedIn Pinterest
Previous article 225 Turkish Websites Hacked by Kurdish Hackers
Next article Anonymous Hacks Brazil's Largest Magazine VEJA's Twitter account, invites people to Protest against Government
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism.

Related Posts
Israeli firm buys Private Internet Access (PIA) VPN raising privacy concerns

Israeli firm buys Private Internet Access (PIA) VPN raising privacy concerns

About Internet Anonymity, Our Life and Its Relativity

About Internet Anonymity, Our Life and Its Relativity

Police confiscate surveillance van loaded with hacking tools

Police confiscate surveillance van loaded with hacking tools

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

LATEST POSTS
New privacy tool exposes which website leaves your data unprotected
Privacy

New privacy tool exposes which website leaves your data unprotected

1011
New Linux vulnerability puts VPN connections at risk of hijacking
Privacy

New Linux vulnerability puts VPN connections at risk of hijacking

742
5 things you should never do when using anonymous operating systems
Security

5 things you should never do when using anonymous operating systems

1178
Israeli firm buys Private Internet Access (PIA) VPN raising privacy concerns
Surveillance

Israeli firm buys Private Internet Access (PIA) VPN raising privacy concerns

14057

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us