PRISM program is a massive surveillance program operated by the United States National Security Agency (NSA). The PRISM program utilizes extensive data mining efforts to collect information and analyze that data for patterns of terrorist or other potential criminal activity.
PRISM: Clouded in Secrecy
PRISM has been clouded in secrecy since its creation in 2007, but it gained widespread attention recently as a result of its suspected use of data obtained from the servers of major internet companies like Google, Facebook, Microsoft, Apple, Yahoo, AOL, Skype and YouTube. This data is believed to include e-mails, documents, photographs, chats (audio and video) and connection logs of users.
Details have also been leaked that PRISM has been actively logging the telephone calls of Verizon customers – and likely customers of other telecommunications companies as well.
The PRISM surveillance program falls under the supervision of the U.S. Foreign Intelligence Surveillance Court as part of the Foreign Intelligence Surveillance Act (FISA). According to the Director of U.S. National Intelligence, PRISM is operated under strict supervision and cannot be used to intentionally target any Americans or anyone in the United States.
Stay up to date on the latest developments in Internet terminology with a free weekly newsletter from Webopedia. Join to subscribe now.
From cute electronic toys to VR gaming, here are 5 hot gifts to give to your special tech enthusiast this holiday season. Read More »What's Hot in Tech: AI Tops the List
Like everything in technology, AI touches on so many other trends, like self-driving cars and automation, and Big Data and the Internet of Things... Read More »DevOp's Role in Application Security
As organizations rush to release new applications, security appears to be getting short shrift. DevSecOps is a new approach that holds promise. Read More »
Java is a high-level programming language. This guide describes the basics of Java, providing an overview of syntax, variables, data types and... Read More »Java Basics, Part 2
This second Study Guide describes the basics of Java, providing an overview of operators, modifiers and control Structures. Read More »The 7 Layers of the OSI Model
The Open System Interconnection (OSI) model defines a networking framework to implement protocols in seven layers. Use this handy guide to compare... Read More »