PRISM program is a massive surveillance program operated by the United States National Security Agency (NSA). The PRISM program utilizes extensive data mining efforts to collect information and analyze that data for patterns of terrorist or other potential criminal activity.
PRISM: Clouded in Secrecy
PRISM has been clouded in secrecy since its creation in 2007, but it gained widespread attention recently as a result of its suspected use of data obtained from the servers of major internet companies like Google, Facebook, Microsoft, Apple, Yahoo, AOL, Skype and YouTube. This data is believed to include e-mails, documents, photographs, chats (audio and video) and connection logs of users.
Details have also been leaked that PRISM has been actively logging the telephone calls of Verizon customers – and likely customers of other telecommunications companies as well.
The PRISM surveillance program falls under the supervision of the U.S. Foreign Intelligence Surveillance Court as part of the Foreign Intelligence Surveillance Act (FISA). According to the Director of U.S. National Intelligence, PRISM is operated under strict supervision and cannot be used to intentionally target any Americans or anyone in the United States.
Stay up to date on the latest developments in Internet terminology with a free weekly newsletter from Webopedia. Join to subscribe now.
Webopedia's student apps roundup will help you to better organize your class schedule and stay on top of assignments and homework. Read More »20 Ways to Shorten a URL
If you need to shorten a long URL try this list of 20 free online redirection services. Read More »Top 10 Tech Terms of 2015
The most popular Webopedia definitions of 2015. Read More »
This Webopedia study guide describes the different parts of a computer system and their relations. Read More »Network Fundamentals Study Guide
Networking fundamentals teaches the building blocks of modern network design. Learn different types of networks, concepts, architecture and... Read More »The Five Generations of Computers
Learn about each of the five generations of computers and major technology developments that have led to the current devices that we use today. Read More »