PRISM Program

PRISM program is a massive surveillance program operated by the United States National Security Agency (NSA). The PRISM program utilizes extensive data mining efforts to collect information and analyze that data for patterns of terrorist or other potential criminal activity.

PRISM: Clouded in Secrecy

PRISM has been clouded in secrecy since its creation in 2007, but it gained widespread attention recently as a result of its suspected use of data obtained from the servers of major internet companies like Google, Facebook, Microsoft, Apple, Yahoo, AOL, Skype and YouTube. This data is believed to include e-mails, documents, photographs, chats (audio and video) and connection logs of users.

Details have also been leaked that PRISM has been actively logging the telephone calls of Verizon customers and likely customers of other telecommunications companies as well.

The PRISM surveillance program falls under the supervision of the U.S. Foreign Intelligence Surveillance Court as part of the Foreign Intelligence Surveillance Act (FISA). According to the Director of U.S. National Intelligence, PRISM is operated under strict supervision and cannot be used to intentionally target any Americans or anyone in the United States.

Forrest Stroud
Forrest Stroud
Forrest is a writer for Webopedia. Experienced, entrepreneurial, and well-rounded, he has 15+ years covering technology, business software, website design, programming, and more.

Top Articles

List of Windows Operating System Versions & History [In Order]

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

What are the Five Generations of Computers? (1st to 5th)

Reviewed by Web Webster Each generation of computer has brought significant advances in speed and power to computing tasks. Learn about each of the...

Hotmail [Outlook] Email Accounts

Launched in 1996, Hotmail was one of the first public webmail services that could be accessed from any web browser. At its peak in...

SHA-256

SHA-256 is an algorithm used for hash functions and is a vital component...

Document Management System

A document management system is an automated software solution businesses and organizations use...

Conti Ransomware

Conti ransomware first emerged in 2020. It uses a ransomware as a service...