

FISA must go to court and get orders before gaining access to the communications of foreigners. The NSA disbanded FISA because it protected some people that are not bounded by the FISA law. It targets both the sender and receiver, whether based in the US or not. Therefore the NSA took advantage of the US technological might to create the PRISM program. Furthermore, the NSA noted that the USA has advantages in tracking down terrorists because most of the big tech companies reside in the U.S.Īside from having the biggest tech companies the US also has most of the internet infrastructure. The NSA wanted to overcome this challenge and have the flexibility of tracking down anyone when the body wants. The FISA warrant is in charge of tracking down and prosecuting foreign terrorists.īut court mandates were needed before they can access and investigate the information of suspected criminals. According to the leak presentation, the NSA claimed that it launched the program to overcome the FISA warrant’s pitfalls. The PRISM program had a code-named US-984XN. PRISM Act of 2007 is an electronic data collection that aims at protecting the USA according to the NSA. It was a top-secret and advanced surveillance program of the NSA. It does not matter what you do, where you live, whether you commit a crime or not, the NSA can access your personal information. However, that has changed with the PRISM program formation. Formerly the NSA was unable to obtain information from people living outside of the USA.

The intelligent bodies can investigate the retrieved information targeting terrorist, criminals, and even those not suspected of anything. Since then, the United States government has drastically increased intelligent bodies’ ability to gain local and foreign information. Section 702 of the FISA (Foreign Intelligence Surveillance Acts), which became law in 2008, allows the Prism Program to gain direct access to the servers of Tech Companies. The constitution governs this unlimited access to information by the NSA through the PRISM program. The information includes email communication, voice calls, SMS, social media communications, metadata, video calls, search preference, etc. The PRISM program aims at gaining direct access to the communication of users. Separating truth from the myths about the Prism Program This article would provide you with all the information you need to know about the NSA PRISM Program. Others believe the PRISM program is real. Some people still think that the NSA can’t wield such powers. However, we have dug deep to provide detailed information about the PRISM program. The actual objective of the Prism program and how the Government collects information is shrouded in secrecy. But the tech companies have been vehemently denying it. Like we said before, the aim of the NSA PRISM program is gathering information from tech organizations. That has led to the confusion of so many individuals and organizations that really cared about privacy. However, the PRISM program’s purpose was not well defined due to the Tech and Internet corporations’ constant denial and contradictions. The Guardian also published similar news about the National security Agency’s privacy (NSA) intrusion. cooperate with the NSA by giving direct access to their servers. Booz Allen compiled slides detailing how the National Security Agency (NSA) body got direct access to tech servers and pulled out information.īig tech and internet firms such as Microsoft, Apple, Verizon, Yahoo, AT&T, Google, etc. The leak was a massive shock in the U.S and around the world. This information was leaked by militarization, who was a private contractor for Booz Allen Hamilton.

In 2013 the Washington Post revealed the existence of a secret act called the Prism program.
