{
	"id": "c7aaca42-4130-4096-a58c-7099e8bb7267",
	"created_at": "2026-04-06T00:21:38.429765Z",
	"updated_at": "2026-04-10T03:30:57.246554Z",
	"deleted_at": null,
	"sha1_hash": "5dd3f5f6b255d8d5d40cdf7ec800bc5e936e3376",
	"title": "PRISM",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 1511070,
	"plain_text": "PRISM\r\nBy Contributors to Wikimedia projects\r\nPublished: 2013-06-06 · Archived: 2026-04-05 14:58:17 UTC\r\nPRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet\r\ncommunications from various U.S. internet companies.[1][2][3] The program is also known by the SIGAD US-984XN.\r\n[4][5]\r\nPRISM collects stored internet communications based on demands made to internet companies such as Google and Apple\r\nunder Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms.[6]\r\nAmong other things, the NSA can use these PRISM requests to target communications that were encrypted when they\r\ntraveled across the internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier,\r\n[7][8]\r\nand to get data that is easier to handle.[9]\r\nPRISM began in 2007 in the wake of the passage of the Protect America Act under the Bush Administration.\r\n[10][11]\r\n The\r\nprogram is operated under the supervision of the U.S. Foreign Intelligence Surveillance Court (FISA Court, or FISC)\r\npursuant to the Foreign Intelligence Surveillance Act (FISA).[12] Its existence was leaked six years later by NSA contractor\r\nEdward Snowden, who warned that the extent of mass data collection was far greater than the public knew and included\r\nwhat he characterized as \"dangerous\" and \"criminal\" activities.[13] The disclosures were published by The Guardian and The\r\nWashington Post on June 6, 2013. Subsequent documents have demonstrated a financial arrangement between the NSA's\r\nSpecial Source Operations (SSO) division and PRISM partners in the millions of dollars.[14]\r\nDocuments indicate that PRISM is \"the number one source of raw intelligence used for NSA analytic reports\", and it\r\naccounts for 91% of the NSA's internet traffic acquired under FISA section 702 authority.\"[15][16] The leaked information\r\ncame after the revelation that the FISA Court had been ordering a subsidiary of telecommunications company Verizon\r\nCommunications to turn over to the NSA the logs tracking all of its customers' telephone calls.[17][18]\r\nU.S. government officials have disputed criticisms of PRISM in the Guardian and Washington Post articles and have\r\ndefended the program, asserting that it cannot be used on domestic targets without a warrant. They additionally claim that\r\nthe program has helped to prevent acts of terrorism, and that it receives independent oversight from the federal government's\r\nexecutive, judicial and legislative branches.[19][20] On June 19, 2013, U.S. president Barack Obama, during a visit to\r\nGermany, stated that the NSA's data gathering practices constitute \"a circumscribed, narrow system directed at us being able\r\nto protect our people\".[21]\r\nEdward Snowden publicly revealed the existence of PRISM through a series of classified documents leaked to journalists of\r\nThe Washington Post and The Guardian while he was an NSA contractor at the time, thus fleeing to Hong Kong.\r\n[1][2]\r\n The\r\nleaked documents included 41 PowerPoint slides, four of which were published in news articles.[1][2]\r\nThe documents identified several technology companies as participants in the PRISM program, including Microsoft in 2007,\r\nYahoo! in 2008, Google in 2009, Facebook in 2009, Paltalk in 2009, YouTube in 2010, AOL in 2011, Skype in 2011 and\r\nApple in 2012.[22] The speaker's notes in the briefing document reviewed by The Washington Post indicated that \"98 percent\r\nof PRISM production is based on Yahoo, Google, and Microsoft\".[1]\r\nThe slide presentation stated that much of the world's electronic communications pass through the U.S., because electronic\r\ncommunications data tend to follow the least expensive route rather than the most physically direct route, and the bulk of the\r\nworld's internet infrastructure is based in the United States.[15] The presentation noted that these facts provide United States\r\nintelligence analysts with opportunities for intercepting the communications of foreign targets as their electronic data pass\r\ninto or through the United States.[2][15]\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 1 of 31\n\nSnowden's subsequent disclosures included statements that government agencies such as the United Kingdom's GCHQ also\r\nundertook mass interception and tracking of internet and communications data[23] – described by Germany as \"nightmarish\"\r\nif true[24] – allegations that the NSA engaged in \"dangerous\" and \"criminal\" activity by \"hacking\" civilian infrastructure\r\nnetworks in other countries such as \"universities, hospitals, and private businesses\",[13] and alleged that compliance offered\r\nonly very limited restrictive effect on mass data collection practices (including of Americans) since restrictions \"are policy-based, not technically based, and can change at any time\", adding that \"Additionally, audits are cursory, incomplete, and\r\neasily fooled by fake justifications\",[13] with numerous self-granted exceptions, and that NSA policies encourage staff to\r\nassume the benefit of the doubt in cases of uncertainty.\r\n[25][26][27]\r\nBelow are a number of slides released by Edward Snowden showing the operation and processes behind the PRISM\r\nprogram. The \"FAA\" referred to is Section 702 of the FISA Amendments Act (\"FAA\"), and not the widely known Federal\r\nAviation Administration (FAA).[28]\r\nIntroduction slide\r\nSlide showing that much of the world's communications flow through the U.S.\r\nDetails of information collected via PRISM\r\nSlide listing companies and the date that PRISM collection began\r\nSlide showing PRISM's tasking process\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 2 of 31\n\nSlide showing the PRISM collection dataflow\r\nSlide showing PRISM case numbers\r\nSlide showing the REPRISMFISA Web app\r\nSlide showing some PRISM targets.\r\nSlide fragment mentioning \"upstream collection\", FAA702, EO 12333, and references yahoo.com explicitly in the\r\ntext\r\nFAA702 Operations, and map\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 3 of 31\n\nFAA702 Operations, and map. The subheader reads \"Collection only possible under FAA702 Authority\". FAIRVIEW\r\nis in the center box.\r\nFAA702 Operations, and map. The subheader reads \"Collection only possible under FAA702 Authority\".\r\nSTORMBREW is in the center box.\r\nTasking, Points to Remember. Transcript of body: \"Whenever your targets meet FAA criteria, you should consider\r\nasking to FAA. Emergency tasking processes exist for [imminent /immediate ] threat to life situations and targets can\r\nbe placed on [illegible] within hours (surveillance and stored comms). Get to know your Product line FAA\r\nadjudicators and FAA leads.\"\r\nThe French newspaper Le Monde disclosed new PRISM slides (see pages 4, 7 and 8) coming from the \"PRISM/US-984XN\r\nOverview\" presentation on October 21, 2013.[29] The British newspaper The Guardian disclosed new PRISM slides (see\r\npages 3 and 6) in November 2013 which on the one hand compares PRISM with the Upstream program, and on the other\r\nhand deals with collaboration between the NSA's Threat Operations Center and the FBI.[30]\r\nPRISM logo\r\nPRISM is a program from the Special Source Operations (SSO) division of the NSA, which in the tradition of NSA's\r\nintelligence alliances, cooperates with as many as 100 trusted U.S. companies since the 1970s.[1] A prior program, the\r\nTerrorist Surveillance Program,\r\n[31][32]\r\n was implemented in the wake of the September 11 attacks under the George W. Bush\r\nAdministration but was widely criticized and challenged as illegal, because it did not include warrants obtained from the\r\nForeign Intelligence Surveillance Court.\r\n[32][33][34][35][36]\r\n PRISM was authorized by the Foreign Intelligence Surveillance\r\nCourt.[15]\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 4 of 31\n\nPRISM was enabled under President Bush by the Protect America Act of 2007 and by the FISA Amendments Act of 2008,\r\nwhich immunizes private companies from legal action when they cooperate with U.S. government agencies in intelligence\r\ncollection. In 2012 the act was renewed by Congress under President Obama for an additional five years, through December\r\n2017.[2][37][38] According to The Register, the FISA Amendments Act of 2008 \"specifically authorizes intelligence agencies\r\nto monitor the phone, email, and other communications of U.S. citizens for up to a week without obtaining a warrant\" when\r\none of the parties is outside the U.S.[37]\r\nThe most detailed description of the PRISM program can be found in a report about NSA's collection efforts under Section\r\n702 FAA, that was released by the Privacy and Civil Liberties Oversight Board (PCLOB) on July 2, 2014.[39]\r\nAccording to this report, PRISM is only used to collect internet communications, not telephone conversations. These\r\ninternet communications are not collected in bulk, but in a targeted way: only communications that are to or from specific\r\nselectors, like e-mail addresses, can be gathered. Under PRISM, there is no collection based on keywords or names.[39]\r\nThe actual collection process is done by the Data Intercept Technology Unit (DITU) of the FBI, which on behalf of the NSA\r\nsends the selectors to the U.S. internet service providers, which were previously served with a Section 702 Directive. Under\r\nthis directive, the provider is legally obliged to hand over (to DITU) all communications to or from the selectors provided by\r\nthe government.[39] DITU then sends these communications to NSA, where they are stored in various databases, depending\r\non their type.\r\nData, both content and metadata, that already have been collected under the PRISM program, may be searched for both US\r\nand non-US person identifiers. These kinds of queries became known as \"back-door searches\" and are conducted by NSA,\r\nFBI and CIA.[40] Each of these agencies has slightly different protocols and safeguards to protect searches with a US person\r\nidentifier.\r\n[39]\r\nExtent of the program\r\n[edit]\r\nInternal NSA presentation slides included in the various media disclosures show that the NSA could unilaterally access data\r\nand perform \"extensive, in-depth surveillance on live communications and stored information\" with examples including\r\nemail, video and voice chat, videos, photos, voice-over-IP chats (such as Skype), file transfers, and social networking\r\ndetails.[2] Snowden summarized that \"in general, the reality is this: if an NSA, FBI, CIA, DIA, etc. analyst has access to\r\nquery raw SIGINT [signals intelligence] databases, they can enter and get results for anything they want.\"[13]\r\nAccording to The Washington Post, the intelligence analysts search PRISM data using terms intended to identify suspicious\r\ncommunications of targets whom the analysts suspect with at least 51 percent confidence to not be U.S. citizens, but in the\r\nprocess, communication data of some U.S. citizens are also collected unintentionally.\r\n[1]\r\n Training materials for analysts tell\r\nthem that while they should periodically report such accidental collection of non-foreign U.S. data, \"it's nothing to worry\r\nabout.\"[1][41]\r\nAccording to The Guardian, NSA had access to chats and emails on Hotmail.com and Skype because Microsoft had\r\n\"developed a surveillance capability to deal\" with the interception of chats, and \"for Prism collection against Microsoft\r\nemail services will be unaffected because Prism collects this data prior to encryption.\"[42][43]\r\nAlso according to The Guardian's Glenn Greenwald even low-level NSA analysts are allowed to search and listen to the\r\ncommunications of Americans and other people without court approval and supervision. Greenwald said low level Analysts\r\ncan, via systems like PRISM, \"listen to whatever emails they want, whatever telephone calls, browsing histories, Microsoft\r\nWord documents.[31] And it's all done with no need to go to a court, with no need to even get supervisor approval on the part\r\nof the analyst.\"[44]\r\nHe added that the NSA databank, with its years of collected communications, allows analysts to search that database and\r\nlisten \"to the calls or read the emails of everything that the NSA has stored, or look at the browsing histories or Google\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 5 of 31\n\nsearch terms that you've entered, and it also alerts them to any further activity that people connected to that email address or\r\nthat IP address do in the future.\"[44] Greenwald was referring in the context of the foregoing quotes to the NSA program\r\nXKeyscore.\r\n[45]\r\nDesignation Legal AuthoritySee Note Key Targets\r\nType of\r\nInformation\r\ncollected\r\nAssociated Databases\r\nAssoc\r\nSoftw\r\nUS-984XN\r\nSection 702 of the FISA\r\nAmendments Act (FAA)\r\nKnown Targets include[46]\r\nVenezuela\r\nMilitary\r\nprocurement\r\nOil\r\nMexico\r\nNarcotics\r\nEnergy\r\nInternal\r\nSecurity\r\nPolitical\r\nAffairs\r\nColombia\r\nTrafficking\r\nFARC\r\nThe exact type of\r\ndata varies by\r\nprovider:\r\nEmail\r\nChat – video,\r\nvoice\r\nVideos\r\nStored data\r\nVoIP\r\nFile transfers\r\nVideo\r\nConferencing\r\nNotifications\r\nof target\r\nactivity,\r\nlogins, etc.\r\nOnline\r\nSocial\r\nNetworking\r\ndetails\r\nSpecial\r\nRequests\r\nKnown:\r\nTRAFFICTHIEF\r\nMARINA\r\nMAINWAY\r\nFALLOUT\r\nPINWALE\r\nCONVEYANCE\r\nNUCLEON\r\nKnow\r\nUnifie\r\nTarget\r\nTool\r\nResponses to disclosures\r\n[edit]\r\nUnited States government\r\n[edit]\r\nExecutive branch life\r\n[edit]\r\nShortly after publication of the reports by The Guardian and The Washington Post, the United States Director of National\r\nIntelligence, James Clapper, on June 7, 2013, released a statement confirming that for nearly six years the government of the\r\nUnited States had been using large internet services companies such as Facebook to collect information on foreigners\r\noutside the United States as a defense against national security threats.[17] The statement read in part, \"The Guardian and\r\nThe Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence\r\nSurveillance Act. They contain numerous inaccuracies.\"[47] He went on to say, \"Section 702 is a provision of FISA that is\r\ndesigned to facilitate the acquisition of foreign intelligence information concerning non-U.S. persons located outside the\r\nUnited States. It cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 6 of 31\n\nUnited States.\"[47]\r\n Clapper concluded his statement by stating, \"The unauthorized disclosure of information about this\r\nimportant and entirely legal program is reprehensible and risks important protections for the security of Americans.\"[47] On\r\nMarch 12, 2013, Clapper had told the United States Senate Select Committee on Intelligence that the NSA does \"not\r\nwittingly\" collect any type of data on millions or hundreds of millions of Americans.[48] Clapper later admitted the statement\r\nhe made on March 12, 2013, was a lie,[49] or in his words \"I responded in what I thought was the most truthful, or least\r\nuntruthful manner by saying no.\"[50]\r\nOn June 7, 2013, U.S. President Barack Obama, referring to the PRISM program[51] and the NSA's telephone calls logging\r\nprogram, said, \"What you've got is two programs that were originally authorized by Congress, have been repeatedly\r\nauthorized by Congress. Bipartisan majorities have approved them. Congress is continually briefed on how these are\r\nconducted. There are a whole range of safeguards involved. And federal judges are overseeing the entire program\r\nthroughout.\"[52] He also said, \"You can't have 100 percent security and then also have 100 percent privacy and zero\r\ninconvenience. You know, we're going to have to make some choices as a society.\"[52] Obama also said that government\r\ncollection of data was needed in order to catch terrorists.[53] In separate statements, senior Obama administration officials\r\n(not mentioned by name in source) said that Congress had been briefed 13 times on the programs since 2009.[54]\r\nOn June 8, 2013, Director of National Intelligence Clapper made an additional public statement about PRISM and released a\r\nfact sheet providing further information about the program, which he described as \"an internal government computer system\r\nused to facilitate the government's statutorily authorized collection of foreign intelligence information from electronic\r\ncommunication service providers under court supervision, as authorized by Section 702 of the Foreign Intelligence\r\nSurveillance Act (FISA) (50 U.S.C. § 1881a).\"[55][56] The fact sheet stated that \"the surveillance activities published in The\r\nGuardian and the Washington Post are lawful and conducted under authorities widely known and discussed, and fully\r\ndebated and authorized by Congress.\"[55] The fact sheet also stated that \"the United States Government does not unilaterally\r\nobtain information from the servers of U.S. electronic communication service providers. All such information is obtained\r\nwith FISA Court approval and with the knowledge of the provider based on a written directive from the Attorney General\r\nand the Director of National Intelligence.\" It said that the attorney general provides FISA Court rulings and semi-annual\r\nreports about PRISM activities to Congress, \"provid[ing] an unprecedented degree of accountability and transparency.\"[55]\r\nDemocratic senators Udall and Wyden, who serve on the U.S. Senate Select Committee on Intelligence, subsequently\r\ncriticized the fact sheet as being inaccurate.[clarification needed] NSA Director General Keith Alexander acknowledged the\r\nerrors, stating that the fact sheet \"could have more precisely described\" the requirements governing the collection of e-mail\r\nand other internet content from US companies. The fact sheet was withdrawn from the NSA's website around June 26.[57]\r\nIn a closed-doors Senate hearing around June 11, FBI Director Robert Mueller said that Snowden's leaks had caused\r\n\"significant harm to our nation and to our safety.\"[58] In the same Senate hearing, NSA Director Alexander defended the\r\nprogram.[further explanation needed] Alexander's defense was immediately criticized by Senators Udall and Wyden, who said\r\nthey saw no evidence that the NSA programs had produced \"uniquely valuable intelligence.\" In a joint statement, they wrote,\r\n\"Gen Alexander's testimony yesterday suggested that the NSA's bulk phone records collection program helped thwart\r\n'dozens' of terrorist attacks, but all of the plots that he mentioned appear to have been identified using other collection\r\nmethods.\"[58][59]\r\nOn June 18, NSA Director Alexander said in an open hearing before the House Intelligence Committee of Congress that\r\ncommunications surveillance had helped prevent more than 50 potential terrorist attacks worldwide (at least 10 of them\r\ninvolving terrorism suspects or targets in the United States) between 2001 and 2013, and that the PRISM web traffic\r\nsurveillance program contributed in over 90 percent of those cases.[60][61][62] According to court records, one example\r\nAlexander gave regarding a thwarted attack by al Qaeda on the New York Stock Exchange was not in fact foiled by\r\nsurveillance.[63] Several senators wrote Director of National Intelligence Clapper asking him to provide other examples.[64]\r\nU.S. intelligence officials, speaking on condition of anonymity, told various news outlets that by June 24 they were already\r\nseeing what they said was evidence that suspected terrorists had begun changing their communication practices in order to\r\nevade detection by the surveillance tools disclosed by Snowden.[65][66]\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 7 of 31\n\nIn contrast to their swift and forceful reactions the previous day to allegations that the government had been conducting\r\nsurveillance of United States citizens' telephone records, Congressional leaders initially had little to say about the PRISM\r\nprogram the day after leaked information about the program was published. Several lawmakers declined to discuss PRISM,\r\nciting its top-secret classification,[67] and others said that they had not been aware of the program.[68] After statements had\r\nbeen released by the president and the Director of National Intelligence, some lawmakers began to comment:\r\nSenator John McCain (R-AZ)\r\nJune 9, 2013, \"We passed the Patriot Act. We passed specific provisions of the act that allowed for this program to\r\ntake place, to be enacted in operation.\"[69]\r\nSenator Dianne Feinstein (D-CA), chair of the Senate Intelligence Committee\r\nJune 9, \"These programs are within the law,\" \"part of our obligation is keeping Americans safe,\" \"Human intelligence\r\nisn't going to do it.\"[70]\r\nJune 9, \"Here's the rub: the instances where this has produced good—has disrupted plots, prevented terrorist attacks,\r\nis all classified, that's what's so hard about this.\"[71]\r\nJune 11, \"It went fine. ... We asked him (Keith Alexander) to declassify things because it would be helpful (for people\r\nand lawmakers to better understand the intelligence programs). ... I've just got to see if the information gets\r\ndeclassified. I'm sure people will find it very interesting.\"[72]\r\nSenator Rand Paul (R-KY)\r\nJune 9, \"I'm going to be seeing if I can challenge this at the Supreme Court level. I'm going to be asking the internet\r\nproviders and all of the phone companies: ask your customers to join me in a class-action lawsuit.\"[69]\r\nSenator Susan Collins (R-ME), member of Senate Intelligence Committee and past member of Homeland Security\r\nCommittee\r\nJune 11, \"I had, along with Joe Lieberman, a monthly threat briefing, but I did not have access to this highly\r\ncompartmentalized information\" and \"How can you ask when you don't know the program exists?\"[73]\r\nRepresentative Jim Sensenbrenner (R-WI), principal sponsor of the Patriot Act\r\nJune 9, \"This is well beyond what the Patriot Act allows.\"[74] \"President Obama's claim that 'this is the most\r\ntransparent administration in history' has once again proven false. In fact, it appears that no administration has ever\r\npeered more closely or intimately into the lives of innocent Americans.\"[74]\r\nRepresentative Mike Rogers (R-MI), a chairman of the Permanent Select Committee on Intelligence.\r\nJune 9, \"One of the things that we're charged with is keeping America safe and keeping our civil liberties and privacy\r\nintact. I think we have done both in this particular case.\"[70]\r\nJune 9, \"Within the last few years this program was used to stop a program, excuse me, to stop a terrorist attack in the\r\nUnited States, we know that. It's, it's, it's important, it fills in a little seam that we have and it's used to make sure that\r\nthere is not an international nexus to any terrorism event that they may believe is ongoing in the United States. So in\r\nthat regard it is a very valuable thing.\"[75]\r\nSenator Mark Udall (D-CO)\r\nJune 9, \"I don't think the American public knows the extent or knew the extent to which they were being surveilled\r\nand their data was being collected. ... I think we ought to reopen the Patriot Act and put some limits on the amount of\r\ndata that the National Security (Agency) is collecting. ... It ought to remain sacred, and there's got to be a balance\r\nhere. That is what I'm aiming for. Let's have the debate, let's be transparent, let's open this up.\"[70]\r\nRepresentative Todd Rokita (R-IN)\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 8 of 31\n\nJune 10, \"We have no idea when they [Foreign Intelligence Surveillance Court] meet, we have no idea what their\r\njudgments are.\"[76]\r\nRepresentative Luis Gutierrez (D-IL)\r\nJune 9, \"We will be receiving secret briefings and we will be asking, I know I'm going to be asking to get more\r\ninformation. I want to make sure that what they're doing is harvesting information that is necessary to keep us safe\r\nand not simply going into everybody's private telephone conversations and Facebook and communications. I mean\r\none of the, you know, the terrorists win when you debilitate freedom of expression and privacy.\"[75]\r\nSenator Ron Wyden (D-OR)\r\nJuly 11, \"I have a feeling that the administration is getting concerned about the bulk phone records collection, and\r\nthat they are thinking about whether to move administratively to stop it. I think we are making a comeback\".[77]\r\nFollowing these statements some lawmakers from both parties warned national security officials during a hearing before the\r\nHouse Judiciary Committee that they must change their use of sweeping National Security Agency surveillance programs or\r\nface losing the provisions of the Foreign Intelligence Surveillance Act that have allowed for the agency's mass collection of\r\ntelephone metadata.[78] \"Section 215 expires at the end of 2015, and unless you realize you've got a problem, that is not\r\ngoing to be renewed,\" Rep. Jim Sensenbrenner, R-Wis., author of the USA Patriot Act, threatened during the hearing.[78]\r\n\"It's got to be changed, and you've got to change how you operate section 215. Otherwise, in two and a half years, you're not\r\ngoing to have it anymore.\"[78]\r\nLeaks of classified documents pointed to the role of a special court in enabling the government's secret surveillance\r\nprograms, but members of the court maintained they were not collaborating with the executive branch.[79] The New York\r\nTimes, however, reported in July 2013 that in \"more than a dozen classified rulings, the nation's surveillance court has\r\ncreated a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans\r\nwhile pursuing not only terrorism suspects, but also people possibly involved in nuclear proliferation, espionage and\r\ncyberattacks.\"[80] After Members of the U.S. Congress pressed the Foreign Intelligence Surveillance Court to release\r\ndeclassified versions of its secret ruling, the court dismissed those requests arguing that the decisions can't be declassified\r\nbecause they contain classified information.[81] Reggie Walton, the current FISA presiding judge, said in a statement: \"The\r\nperception that the court is a rubber stamp is absolutely false. There is a rigorous review process of applications submitted\r\nby the executive branch, spearheaded initially by five judicial branch lawyers who are national security experts, and then by\r\nthe judges, to ensure that the court's authorizations comport with what the applicable statutes authorize.\"[82] The accusation\r\nof being a \"rubber stamp\" was further rejected by Walton who wrote in a letter to Senator Patrick J. Leahy: \"The annual\r\nstatistics provided to Congress by the Attorney General ...—frequently cited to in press reports as a suggestion that the\r\nCourt's approval rate of application is over 99%—reflect only the number of final applications submitted to and acted on by\r\nthe Court. These statistics do not reflect the fact that many applications are altered to prior or final submission or even\r\nwithheld from final submission entirely, often after an indication that a judge would not approve them.\"[83]\r\nThe U.S. military has acknowledged blocking access to parts of The Guardian website for thousands of defense personnel\r\nacross the country,\r\n[84]\r\n and blocking the entire Guardian website for personnel stationed throughout Afghanistan, the Middle\r\nEast, and South Asia.[85] A spokesman said the military was filtering out reports and content relating to government\r\nsurveillance programs to preserve \"network hygiene\" and prevent any classified material from appearing on unclassified\r\nparts of its computer systems.[84] Access to the Washington Post, which also published information on classified NSA\r\nsurveillance programs disclosed by Edward Snowden, had not been blocked at the time the blocking of access to The\r\nGuardian was reported.[85]\r\nResponses and involvement of other countries\r\n[edit]\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 9 of 31\n\nThe former head of the Austrian Federal Office for the Protection of the Constitution and Counterterrorism, Gert-René Polli,\r\nstated he knew the PRISM program under a different name and stated that surveillance activities had occurred in Austria as\r\nwell. Polli had publicly stated in 2009 that he had received requests from US intelligence agencies to do things that would be\r\nin violation of Austrian law, which Polli refused to allow.\r\n[86][87]\r\nThe Australian government has said it will investigate the impact of the PRISM program and the use of the Pine Gap\r\nsurveillance facility on the privacy of Australian citizens.[88] Australia's former foreign minister Bob Carr said that\r\nAustralians should not be concerned about PRISM but that cybersecurity is high on the government's list of concerns.[89]\r\nThe Australian Foreign Minister Julie Bishop stated that the acts of Edward Snowden were treachery and offered a staunch\r\ndefence of her nation's intelligence co-operation with the United States.[90]\r\nBrazil's president at the time, Dilma Rousseff, responded to Snowden's reports that the NSA spied on her phone calls and\r\nemails by cancelling a planned October 2013 state visit to the United States, demanding an official apology, which by\r\nOctober 20, 2013, hadn't come.[91] Also, Rousseff classified the spying as unacceptable between more harsh words in a\r\nspeech before the UN General Assembly on September 24, 2013.[92] As a result, Boeing lost out on a US$4.5 billion\r\ncontract for fighter jets to Sweden's Saab Group.\r\n[93]\r\nCSE headquarters in Ottawa\r\nCanada's national cryptologic agency, the Communications Security Establishment (CSE), said that commenting on PRISM\r\n\"would undermine CSE's ability to carry out its mandate.\" Privacy Commissioner Jennifer Stoddart lamented Canada's\r\nstandards when it comes to protecting personal online privacy stating \"We have fallen too far behind\" in her report. \"While\r\nother nations' data protection authorities have the legal power to make binding orders, levy hefty fines and take meaningful\r\naction in the event of serious data breaches, we are restricted to a 'soft' approach: persuasion, encouragement and, at the\r\nmost, the potential to publish the names of transgressors in the public interest.\" And, \"when push comes to shove,\" Stoddart\r\nwrote, \"short of a costly and time-consuming court battle, we have no power to enforce our recommendations.\"[94][95]\r\nOn 20 October 2013 a committee at the European Parliament backed a measure that, if it is enacted, would require American\r\ncompanies to seek clearance from European officials before complying with United States warrants seeking private data.\r\nThe legislation has been under consideration for two years. The vote is part of efforts in Europe to shield citizens from\r\nonline surveillance in the wake of revelations about a far-reaching spying program by the U.S. National Security Agency.\r\n[96]\r\nGermany and France have also had ongoing mutual talks about how they can keep European email traffic from going across\r\nAmerican servers.[97]\r\nOn October 21, 2013, the French Foreign Minister, Laurent Fabius, summoned the U.S. Ambassador, Charles Rivkin, to the\r\nQuai d'Orsay in Paris to protest large-scale spying on French citizens by the U.S. National Security Agency (NSA). Paris\r\nprosecutors had opened preliminary inquiries into the NSA program in July, but Fabius said, \"... obviously we need to go\r\nfurther\" and \"we must quickly assure that these practices aren't repeated.\"[98]\r\nGermany did not receive any raw PRISM data, according to a Reuters report.[99] German Chancellor Angela Merkel said\r\nthat \"the internet is new to all of us\" to explain the nature of the program; Matthew Schofield of McClatchy Washington\r\nBureau said, \"She was roundly mocked for that statement.\"[100] Gert-René Polli, a former Austrian counter-terrorism\r\nofficial, said in 2013 that it is \"absurd and unnatural\" for the German authorities to pretend not to have known anything.[86]\r\n[87]\r\n The German Army was using PRISM to support its operations in Afghanistan as early as 2011.[101]\r\nIn October 2013, it was reported that the NSA monitored Merkel's cell phone.[102] The United States denied the report, but\r\nfollowing the allegations, Merkel called President Obama and told him that spying on friends was \"never acceptable, no\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 10 of 31\n\nmatter in what situation.\"[103]\r\nIsraeli newspaper Calcalist discussed[104] the Business Insider article[105] about the possible involvement of technologies\r\nfrom two secretive Israeli companies in the PRISM program—Verint Systems and Narus.\r\nAfter finding out about the PRISM program, the Mexican Government has started constructing its own spying program to\r\nspy on its own citizens. According to Jenaro Villamil, a writer from Proceso, CISEN, Mexico's intelligence agency has\r\nstarted to work with IBM and Hewlett Packard to develop its own data gathering software. \"Facebook, Twitter, Emails and\r\nother social network sites are going to be priority.\"[106]\r\nIn New Zealand, University of Otago information science Associate Professor Hank Wolfe said that \"under what was\r\nunofficially known as the Five Eyes Alliance, New Zealand and other governments, including the United States, Australia,\r\nCanada, and Britain, dealt with internal spying by saying they didn't do it. But they have all the partners doing it for them\r\nand then they share all the information.\"[107]\r\nEdward Snowden, in a live streamed Google Hangout to Kim Dotcom and Julian Assange, alleged that he had received\r\nintelligence from New Zealand, and the NSA has listening posts in New Zealand.[108]\r\nAt a meeting of European Union leaders held the week of 21 October 2013, Mariano Rajoy, Spain's prime minister, said that\r\n\"spying activities aren't proper among partner countries and allies\". On 28 October 2013 the Spanish government summoned\r\nthe American ambassador, James Costos, to address allegations that the U.S. had collected data on 60 million telephone calls\r\nin Spain. Separately, Íñigo Méndez de Vigo, a Spanish secretary of state, referred to the need to maintain \"a necessary\r\nbalance\" between security and privacy concerns, but said that the recent allegations of spying, \"if proven to be true, are\r\nimproper and unacceptable between partners and friendly countries\".[109]\r\nIn the United Kingdom, the Government Communications Headquarters (GCHQ), which also has its own surveillance\r\nprogram, Tempora, had access to the PRISM program on or before June 2010 and wrote 197 reports with it in 2012 alone.\r\nThe Intelligence and Security Committee of the UK Parliament reviewed the reports GCHQ produced on the basis of\r\nintelligence sought from the US. They found in each case a warrant for interception was in place in accordance with the\r\nlegal safeguards contained in UK law.\r\n[110]\r\nIn August 2013, The Guardian newspaper's offices were visited by technicians from GCHQ, who ordered and supervised the\r\ndestruction of the hard drives containing information acquired from Snowden.[111]\r\nThe original Washington Post and Guardian articles reporting on PRISM noted that one of the leaked briefing documents\r\nsaid PRISM involves collection of data \"directly from the servers\" of several major internet services providers.[1][2]\r\nInitial public statements\r\n[edit]\r\nCorporate executives of several companies identified in the leaked documents told The Guardian that they had no\r\nknowledge of the PRISM program in particular and also denied making information available to the government on the scale\r\nalleged by news reports.[2][112] Statements of several of the companies named in the leaked documents were reported by\r\nTechCrunch and The Washington Post as follows:[113][114]\r\nMicrosoft: \"We provide customer data only when we receive a legally binding order or subpoena to do so, and never\r\non a voluntary basis. In addition we only ever comply with orders for requests about specific accounts or identifiers.\r\nIf the government has a broader voluntary national security program to gather customer data, we don't participate in\r\nit.\"[113][115]\r\nYahoo!: \"Yahoo! takes users' privacy very seriously. We do not provide the government with direct access to our\r\nservers, systems, or network.\"[113] \"Of the hundreds of millions of users we serve, an infinitesimal percentage will\r\never be the subject of a government data collection directive.\"[114]\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 11 of 31\n\nFacebook: \"We do not provide any government organization with direct access to Facebook servers. When Facebook\r\nis asked for data or information about specific individuals, we carefully scrutinize any such request for compliance\r\nwith all applicable laws, and provide information only to the extent required by law.\"[113]\r\nGoogle: \"Google cares deeply about the security of our users' data. We disclose user data to government in\r\naccordance with the law, and we review all such requests carefully. From time to time, people allege that we have\r\ncreated a government 'back door' into our systems, but Google does not have a backdoor for the government to access\r\nprivate user data.\"[113] \"[A]ny suggestion that Google is disclosing information about our users' internet activity on\r\nsuch a scale is completely false.\"[114]\r\nApple: \"We have never heard of PRISM\"[116] \"We do not provide any government agency with direct access to our\r\nservers, and any government agency requesting customer data must get a court order.\"[116]\r\nDropbox: \"We've seen reports that Dropbox might be asked to participate in a government program called PRISM.\r\nWe are not part of any such program and remain committed to protecting our users' privacy.\"[113]\r\nIn response to the technology companies' confirmation of the NSA being able to directly access the companies' servers, The\r\nNew York Times reported that sources had stated the NSA was gathering the surveillance data from the companies using\r\nother technical means in response to court orders for specific sets of data.[17] The Washington Post suggested, \"It is possible\r\nthat the conflict between the PRISM slides and the company spokesmen is the result of imprecision on the part of the NSA\r\nauthor. In another classified report obtained by The Post, the arrangement is described as allowing 'collection managers [to\r\nsend] content tasking instructions directly to equipment installed at company-controlled locations,' rather than directly to\r\ncompany servers.\"[1] \"[I]n context, 'direct' is more likely to mean that the NSA is receiving data sent to them deliberately by\r\nthe tech companies, as opposed to intercepting communications as they're transmitted to some other destination.[114]\r\n\"If these companies received an order under the FISA amendments act, they are forbidden by law from disclosing having\r\nreceived the order and disclosing any information about the order at all,\" Mark Rumold, staff attorney at the Electronic\r\nFrontier Foundation, told ABC News.\r\n[117]\r\nOn May 28, 2013, Google was ordered by United States District Court Judge Susan Illston to comply with a National\r\nSecurity Letter issued by the FBI to provide user data without a warrant.[118] Kurt Opsahl, a senior staff attorney at the\r\nElectronic Frontier Foundation, in an interview with VentureBeat said, \"I certainly appreciate that Google put out a\r\ntransparency report, but it appears that the transparency didn't include this. I wouldn't be surprised if they were subject to a\r\ngag order.\"[119]\r\nThe New York Times reported on June 7, 2013, that \"Twitter declined to make it easier for the government. But other\r\ncompanies were more compliant, according to people briefed on the negotiations.\"[120] The other companies held\r\ndiscussions with national security personnel on how to make data available more efficiently and securely.\r\n[120]\r\n In some\r\ncases, these companies made modifications to their systems in support of the intelligence collection effort.[120] The\r\ndialogues have continued in recent months, as General Martin Dempsey, the chairman of the Joint Chiefs of Staff, has met\r\nwith executives including those at Facebook, Microsoft, Google and Intel.\r\n[120]\r\n These details on the discussions provide\r\ninsight into the disparity between initial descriptions of the government program including a training slide which states,\r\n\"Collection directly from the servers\"[121] and the companies' denials.[120]\r\nWhile providing data in response to a legitimate FISA request approved by the FISA Court is a legal requirement, modifying\r\nsystems to make it easier for the government to collect the data is not. This is why Twitter could legally decline to provide\r\nan enhanced mechanism for data transmission.[120] Other than Twitter, the companies were effectively asked to construct a\r\nlocked mailbox and provide the key to the government, people briefed on the negotiations said.[120] Facebook, for instance,\r\nbuilt such a system for requesting and sharing the information.[120] Google does not provide a lockbox system, but instead\r\ntransmits required data by hand delivery or ssh.\r\n[122]\r\nPost-PRISM transparency reports\r\n[edit]\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 12 of 31\n\nIn response to the publicity surrounding media reports of data-sharing, several companies requested permission to reveal\r\nmore public information about the nature and scope of information provided in response to National Security requests.\r\nOn June 14, 2013, Facebook reported that the U.S. government had authorized the communication of \"about these numbers\r\nin aggregate, and as a range.\" In a press release posted to its web site, the company reported, \"For the six months ending\r\nDecember 31, 2012, the total number of user-data requests Facebook received from any and all government entities in the\r\nU.S. (including local, state, and federal, and including criminal and national security-related requests) – was between 9,000\r\nand 10,000.\" The company further reported that the requests impacted \"between 18,000 and 19,000\" user accounts, a \"tiny\r\nfraction of one percent\" of more than 1.1 billion active user accounts.[123]\r\nThat same day, Microsoft reported that for the same period, it received \"between 6,000 and 7,000 criminal and national\r\nsecurity warrants, subpoenas and orders affecting between 31,000 and 32,000 consumer accounts from U.S. governmental\r\nentities (including local, state and federal)\" which impacted \"a tiny fraction of Microsoft's global customer base.\"[124]\r\nGoogle issued a statement criticizing the requirement that data be reported in aggregated form, stating that lumping national\r\nsecurity requests with criminal request data would be \"a step backwards\" from its previous, more detailed practices on its\r\nwebsite's transparency report. The company said that it would continue to seek government permission to publish the\r\nnumber and extent of FISA requests.[125]\r\nCisco Systems saw a huge drop in export sales because of fears that the National Security Agency could be using backdoors\r\nin its products.[126]\r\nOn September 12, 2014, Yahoo! reported the U.S. Government threatened the imposition of $250,000 in fines per day if\r\nYahoo didn't hand over user data as part of the NSA's PRISM program.[127] It is not known if other companies were\r\nthreatened or fined for not providing data in response to a legitimate FISA requests.\r\nPublic and media response\r\n[edit]\r\nAn elaborate graffiti in Columbus, Ohio, United States, satirizing comprehensive surveillance of\r\ntelecommunications\r\nThe New York Times editorial board charged that the Obama administration \"has now lost all credibility on this issue,\"[128]\r\nand lamented that \"for years, members of Congress ignored evidence that domestic intelligence-gathering had grown beyond\r\ntheir control, and, even now, few seem disturbed to learn that every detail about the public's calling and texting habits now\r\nreside in a N.S.A. database.\"[129] It wrote with respect to the FISA-Court in context of PRISM that it is \"a perversion of the\r\nAmerican justice system\" when \"judicial secrecy is coupled with a one-sided presentation of the issues.\"[130] According to\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 13 of 31\n\nthe New York Times, \"the result is a court whose reach is expanding far beyond its original mandate and without any\r\nsubstantive check.\"[130]\r\nJames Robertson, a former federal district judge based in Washington who served on the secret Foreign Intelligence\r\nSurveillance Act court for three years between 2002 and 2005 and who ruled against the Bush administration in the\r\nlandmark Hamdan v. Rumsfeld case, said FISA court is independent but flawed because only the government's side is\r\nrepresented effectively in its deliberations. \"Anyone who has been a judge will tell you a judge needs to hear both sides of a\r\ncase,\" said James Robertson.[131] Without this judges do not benefit from adversarial debate. He suggested creating an\r\nadvocate with security clearance who would argue against government filings.[132] Robertson questioned whether the secret\r\nFISA court should provide overall legal approval for the surveillance programs, saying the court \"has turned into something\r\nlike an administrative agency.\" Under the changes brought by the Foreign Intelligence Surveillance Act of 1978\r\nAmendments Act of 2008, which expanded the US government's authority by forcing the court to approve entire\r\nsurveillance systems and not just surveillance warrants as it previously handled, \"the court is now approving programmatic\r\nsurveillance. I don't think that is a judicial function.\"[131] Robertson also said he was \"frankly stunned\" by the New York\r\nTimes report[80] that FISA court rulings had created a new body of law broadening the ability of the NSA to use its\r\nsurveillance programs to target not only terrorists but suspects in cases involving espionage, cyberattacks and weapons of\r\nmass destruction.[131]\r\nFormer CIA analyst Valerie Plame Wilson and former U.S. diplomat Joseph Wilson, writing in an op-ed article published in\r\nThe Guardian, said that \"Prism and other NSA data-mining programs might indeed be very effective in hunting and\r\ncapturing actual terrorists, but we don't have enough information as a society to make that decision.\"[133]\r\nThe Electronic Frontier Foundation (EFF), an international non-profit digital-rights group based in the U.S., is hosting a\r\ntool, by which an American resident can write to their government representatives regarding their opposition to mass spying.\r\n[134]\r\nThe Obama administration's argument that NSA surveillance programs such as PRISM and Boundless Informant had been\r\nnecessary to prevent acts of terrorism was challenged by several parties. Ed Pilkington and Nicholas Watt of The Guardian\r\nsaid of the case of Najibullah Zazi, who had planned to bomb the New York City Subway, that interviews with involved\r\nparties and U.S. and British court documents indicated that the investigation into the case had actually been initiated in\r\nresponse to \"conventional\" surveillance methods such as \"old-fashioned tip-offs\" of the British intelligence services, rather\r\nthan to leads produced by NSA surveillance.[135] Michael Daly of The Daily Beast stated that even though Tamerlan\r\nTsarnaev, who conducted the Boston Marathon bombing with his brother Dzhokhar Tsarnaev, had visited the Al Qaeda-affiliated Inspire magazine website, and even though Russian intelligence officials had raised concerns with U.S.\r\nintelligence officials about Tamerlan Tsarnaev, PRISM did not prevent him from carrying out the Boston attacks. Daly\r\nobserved that, \"The problem is not just what the National Security Agency is gathering at the risk of our privacy but what it\r\nis apparently unable to monitor at the risk of our safety.\"[136]\r\nRon Paul, a former Republican member of Congress and prominent libertarian, thanked Snowden and Greenwald and\r\ndenounced the mass surveillance as unhelpful and damaging, urging instead more transparency in U.S. government actions.\r\n[137]\r\n He called Congress \"derelict in giving that much power to the government,\" and said that had he been elected\r\npresident, he would have ordered searches only when there was probable cause of a crime having been committed, which he\r\nsaid was not how the PRISM program was being operated.[138]\r\nNew York Times columnist Thomas L. Friedman defended limited government surveillance programs intended to protect the\r\nAmerican people from terrorist acts:\r\nYes, I worry about potential government abuse of privacy from a program designed to prevent another 9/11—\r\nabuse that, so far, does not appear to have happened. But I worry even more about another 9/11. ... If there were\r\nanother 9/11, I fear that 99 percent of Americans would tell their members of Congress: \"Do whatever you need to\r\ndo to, privacy be damned, just make sure this does not happen again.\" That is what I fear most. That is why I'll\r\nreluctantly, very reluctantly, trade off the government using data mining to look for suspicious patterns in phone\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 14 of 31\n\nnumbers called and e-mail addresses—and then have to go to a judge to get a warrant to actually look at the\r\ncontent under guidelines set by Congress—to prevent a day where, out of fear, we give government a license to\r\nlook at anyone, any e-mail, any phone call, anywhere, anytime.[139]\r\nPolitical commentator David Brooks similarly cautioned that government data surveillance programs are a necessary evil:\r\n\"if you don't have mass data sweeps, well, then these agencies are going to want to go back to the old-fashioned\r\neavesdropping, which is a lot more intrusive.\"[140]\r\nConservative commentator Charles Krauthammer worried less about the legality of PRISM and other NSA surveillance\r\ntools than about the potential for their abuse without more stringent oversight. \"The problem here is not constitutionality. ...\r\nWe need a toughening of both congressional oversight and judicial review, perhaps even some independent outside scrutiny.\r\nPlus periodic legislative revision—say, reauthorization every couple of years—in light of the efficacy of the safeguards and\r\nthe nature of the external threat. The object is not to abolish these vital programs. It's to fix them.\"[141]\r\nIn a blog post, David Simon, the creator of The Wire, compared the NSA's programs, including PRISM, to a 1980s effort by\r\nthe City of Baltimore to add dialed number recorders to all pay phones to know which individuals were being called by the\r\ncallers;[142] the city believed that drug traffickers were using pay phones and pagers, and a municipal judge allowed the city\r\nto place the recorders. The placement of the dialers formed the basis of the show's first season. Simon argued that the media\r\nattention regarding the NSA programs is a \"faux scandal.\"[142][143] Simon had stated that many classes of people in\r\nAmerican society had already faced constant government surveillance.\r\nPolitical activist, and frequent critic of U.S. government policies, Noam Chomsky argued, \"Governments should not have\r\nthis capacity. But governments will use whatever technology is available to them to combat their primary enemy – which is\r\ntheir own population.\"[144]\r\nA CNN/Opinion Research Corporation poll conducted June 11 through 13 and released in 2013 found that 66% of\r\nAmericans generally supported the program.[145][146][Notes 1] However, a Quinnipiac University poll conducted June 28\r\nthrough July 8 and released in 2013 found that 45% of registered voters think the surveillance programs have gone too far,\r\nwith 40% saying they do not go far enough, compared to 25% saying they had gone too far and 63% saying not far enough\r\nin 2010.[147] Other polls have shown similar shifts in public opinion as revelations about the programs were leaked.[148][149]\r\nIn terms of economic impact, a study released in August by the Information Technology and Innovation Foundation[150]\r\nfound that the disclosure of PRISM could cost the U.S. economy between $21.5 and $35 billion in lost cloud computing\r\nbusiness over three years.[151][152][153][154]\r\nSentiment around the world was that of general displeasure upon learning the extent of world communication data mining.\r\nSome national leaders spoke against the NSA and some spoke against their own national surveillance. One national minister\r\nhad scathing comments on the National Security Agency's data-mining program, citing Benjamin Franklin: \"The more a\r\nsociety monitors, controls, and observes its citizens, the less free it is.\"[155] Some question if the costs of hunting terrorists\r\nnow overshadows the loss of citizen privacy.\r\n[156][157]\r\nNick Xenophon, an Australian independent senator, asked Bob Carr, the Australian Minister of Foreign Affairs, if e-mail\r\naddresses of Australian parliamentarians were exempt from PRISM, Mainway, Marina, and/or Nucleon. After Carr replied\r\nthat there was a legal framework to protect Australians but that the government would not comment on intelligence matters,\r\nXenophon argued that this was not a specific answer to his question.[158]\r\nTaliban spokesperson Zabiullah Mujahid said, \"We knew about their past efforts to trace our system. We have used our\r\ntechnical resources to foil their efforts and have been able to stop them from succeeding so far.\"[159][160] However CNN has\r\nreported that terrorist groups have changed their \"communications behaviors\" in response to the leaks.[65]\r\nIn 2013 the Cloud Security Alliance surveyed cloud computing stakeholders about their reactions to the US PRISM spying\r\nscandal. About 10% of non-US residents indicated that they had cancelled a project with a US-based cloud computing\r\nprovider, in the wake of PRISM; 56% said that they would be less likely to use a US-based cloud computing service. The\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 15 of 31\n\nAlliance predicted that US cloud computing providers might lose as much as €26 billion and 20% of its share of cloud\r\nservices in foreign markets because of the PRISM spying scandal.[161]\r\nHong Kong rally to support Snowden, June 15, 2013\r\nReactions of internet users in China were mixed between viewing a loss of freedom worldwide and seeing state surveillance\r\ncoming out of secrecy. The story broke just before U.S. President Barack Obama and General Secretary of the Chinese\r\nCommunist Party Xi Jinping met in California.[162][163] When asked about NSA hacking China, the spokeswoman of\r\nMinistry of Foreign Affairs of China said, \"China strongly advocates cybersecurity.\"[164] The party-owned newspaper\r\nLiberation Daily described this surveillance like Nineteen Eighty-Four-style.[165] Hong Kong legislators Gary Fan and\r\nClaudia Mo wrote a letter to Obama stating, \"the revelations of blanket surveillance of global communications by the\r\nworld's leading democracy have damaged the image of the U.S. among freedom-loving peoples around the world.\"[166] Ai\r\nWeiwei, a Chinese dissident, said, \"Even though we know governments do all kinds of things I was shocked by the\r\ninformation about the US surveillance operation, Prism. To me, it's abusively using government powers to interfere in\r\nindividuals' privacy. This is an important moment for international society to reconsider and protect individual rights.\"[167]\r\nSophie in 't Veld, a Dutch Member of the European Parliament, called PRISM \"a violation of EU laws.\"[168]\r\nDigital rights group Digitale Gesellschaft protest at Checkpoint Charlie in Berlin, Germany (June 18, 2013)\r\nProtesters against PRISM in Berlin, Germany wearing Chelsea Manning and Edward Snowden masks (June\r\n19, 2013)\r\nThe German Federal Commissioner for Data Protection and Freedom of Information, Peter Schaar, condemned the program\r\nas \"monstrous.\"[169] He further added that White House claims do \"not reassure me at all\" and that \"given the large number\r\nof German users of Google, Facebook, Apple or Microsoft services, I expect the German government ... is committed to\r\nclarification and limitation of surveillance.\" Steffen Seibert, press secretary of the Chancellor's office, announced that\r\nAngela Merkel will put these issues on the agenda of the talks with Barack Obama during his pending visit in Berlin.[170]\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 16 of 31\n\nWolfgang Schmidt, a former lieutenant colonel with the Stasi, said that the Stasi would have seen such a program as a\r\n\"dream come true\" since the Stasi lacked the technology that made PRISM possible.[171] Schmidt expressed opposition,\r\nsaying, \"It is the height of naivete to think that once collected this information won't be used. This is the nature of secret\r\ngovernment organizations. The only way to protect the people's privacy is not to allow the government to collect their\r\ninformation in the first place.\"[100] Many Germans organized protests, including one at Checkpoint Charlie, when Obama\r\nwent to Berlin to speak. Matthew Schofield of the McClatchy Washington Bureau said, \"Germans are dismayed at Obama's\r\nrole in allowing the collection of so much information.\"[100]\r\nThe Italian president of the Guarantor for the protection of personal data, Antonello Soro, said that the surveillance dragnet\r\n\"would not be legal in Italy\" and would be \"contrary to the principles of our legislation and would represent a very serious\r\nviolation.\"[172]\r\nCNIL (French data protection watchdog) ordered Google to change its privacy policies within three months or risk fines up\r\nto 150,000 euros. Spanish Agency of data protection (AEPD) planned to fine Google between 40,000 and 300,000 euros if it\r\nfailed to clear stored data on the Spanish users.[173]\r\nWilliam Hague, the foreign secretary of the United Kingdom, dismissed accusations that British security agencies had been\r\ncircumventing British law by using information gathered on British citizens by PRISM[174] saying, \"Any data obtained by\r\nus from the United States involving UK nationals is subject to proper UK statutory controls and safeguards.\"[174] David\r\nCameron said Britain's spy agencies that received data collected from PRISM acted within the law: \"I'm satisfied that we\r\nhave intelligence agencies that do a fantastically important job for this country to keep us safe, and they operate within the\r\nlaw.\"[174][175] Malcolm Rifkind, the chairman of parliament's Intelligence and Security Committee, said that if the British\r\nintelligence agencies were seeking to know the content of emails about people living in the UK, then they actually have to\r\nget lawful authority.\r\n[175]\r\n The UK's Information Commissioner's Office was more cautious, saying it would investigate\r\nPRISM alongside other European data agencies: \"There are real issues about the extent to which U.S. law agencies can\r\naccess personal data of UK and other European citizens. Aspects of U.S. law under which companies can be compelled to\r\nprovide information to U.S. agencies potentially conflict with European data protection law, including the UK's own Data\r\nProtection Act. The ICO has raised this with its European counterparts, and the issue is being considered by the European\r\nCommission, who are in discussions with the U.S. Government.\"[168]\r\nTim Berners-Lee, the inventor of the World Wide Web, accused western governments of practicing hypocrisy, as they\r\nconducted spying on the internet while they criticized other countries for spying on the internet. He stated that internet\r\nspying can make people feel reluctant to access intimate and private information that is important to them.[176] In a\r\nstatement given to Financial Times following the Snowden revelations, Berners-Lee stated \"Unwarranted government\r\nsurveillance is an intrusion on basic human rights that threatens the very foundations of a democratic society.\"[177]\r\nMinister of External Affairs Salman Khurshid defended the PRISM program saying, \"This is not scrutiny and access to\r\nactual messages. It is only computer analysis of patterns of calls and emails that are being sent. It is not actually snooping\r\nspecifically on content of anybody's message or conversation. Some of the information they got out of their scrutiny, they\r\nwere able to use it to prevent serious terrorist attacks in several countries.\"[178] His comments contradicted his Foreign\r\nMinistry's characterization of violations of privacy as \"unacceptable.\"[179][180] When the then Minister of Communications\r\nand Information Technology Kapil Sibal was asked about Khurshid's comments, he refused to comment on them directly,\r\nbut said, \"We do not know the nature of data or information sought [as part of PRISM]. Even the external ministry does not\r\nhave any idea.\"[181] The media felt that Khurshid's defence of PRISM was because the India government was rolling out the\r\nCentral Monitoring System (CMS), which is similar to the PRISM program.[182][183][184]\r\nKhurshid's comments were criticized by the Indian media,[185][186] as well as opposition party CPI(M) who stated, \"The\r\nUPA government should have strongly protested against such surveillance and bugging. Instead, it is shocking that Khurshid\r\nhas sought to justify it. This shameful remark has come at a time when even the close allies of the US like Germany and\r\nFrance have protested against the snooping on their countries.\"[187]\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 17 of 31\n\nRajya Sabha MP P. Rajeev told The Times of India that \"The act of the USA is a clear violation of Vienna convention on\r\ndiplomatic relations. But Khurshid is trying to justify it. And the speed of the government of India to reject the asylum\r\napplication of Edward Snowden is shameful.\"[188]\r\nApplicable law and practice\r\n[edit]\r\nOn June 8, 2013, the Director of National Intelligence issued a fact sheet stating that PRISM \"is not an undisclosed\r\ncollection or data mining program,\" but rather \"an internal government computer system\" used to facilitate the collection of\r\nforeign intelligence information \"under court supervision, as authorized by Section 702 of the Foreign Intelligence\r\nSurveillance Act (FISA) (50 U.S.C. § 1881a).\"[55] Section 702 provides that \"the Attorney General and the Director of\r\nNational Intelligence may authorize jointly, for a period of up to 1 year from the effective date of the authorization, the\r\ntargeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information.\"\r\n[189]\r\n In order to authorize the targeting, the attorney general and Director of National Intelligence need to obtain an order\r\nfrom the Foreign Intelligence Surveillance Court (FISA Court) pursuant to Section 702 or certify that \"intelligence important\r\nto the national security of the United States may be lost or not timely acquired and time does not permit the issuance of an\r\norder.\"[189] When requesting an order, the attorney general and Director of National Intelligence must certify to the FISA\r\nCourt that \"a significant purpose of the acquisition is to obtain foreign intelligence information.\"[189] They do not need to\r\nspecify which facilities or property will be targeted.[189]\r\nAfter receiving a FISA Court order or determining that there are emergency circumstances, the attorney general and Director\r\nof National Intelligence can direct an electronic communication service provider to give them access to information or\r\nfacilities to carry out the targeting and keep the targeting secret.[189] The provider then has the option to: (1) comply with\r\nthe directive; (2) reject it; or (3) challenge it with the FISA Court. If the provider complies with the directive, it is released\r\nfrom liability to its users for providing the information and is reimbursed for the cost of providing it,[189] while if the\r\nprovider rejects the directive, the attorney general may request an order from the FISA Court to enforce it.[189] A provider\r\nthat fails to comply with the FISA Court's order can be punished with contempt of court.\r\n[189]\r\nFinally, a provider can petition the FISA Court to reject the directive.[189] In case the FISA Court denies the petition and\r\norders the provider to comply with the directive, the provider risks contempt of court if it refuses to comply with the FISA\r\nCourt's order.\r\n[189]\r\n The provider can appeal the FISA Court's denial to the Foreign Intelligence Surveillance Court of Review\r\nand then appeal the Court of Review's decision to the Supreme Court by a writ of certiorari for review under seal.\r\n[189]\r\nThe Senate Select Committee on Intelligence and the FISA Courts had been put in place to oversee intelligence operations in\r\nthe period after the death of J. Edgar Hoover. Beverly Gage of Slate said, \"When they were created, these new mechanisms\r\nwere supposed to stop the kinds of abuses that men like Hoover had engineered. Instead, it now looks as if they have come\r\nto function as rubber stamps for the expansive ambitions of the intelligence community. J. Edgar Hoover no longer rules\r\nWashington, but it turns out we didn't need him anyway.\"[190]\r\nDate Litigant Description\r\nJune 11,\r\n2013\r\nAmerican Civil\r\nLiberties Union\r\nLawsuit filed against the NSA citing that the \"Mass Call Tracking Program\" (as the\r\ncase terms PRISM) \"violates Americans' constitutional rights of free speech,\r\nassociation, and privacy\" and constitutes \"dragnet\" surveillance, in violation of the\r\nFirst and Fourth Amendments to the Constitution, and thereby also \"exceeds the\r\nauthority granted by 50 U.S.C. § 1861, and thereby violates 5 U.S.C. § 706.\"[191] The\r\ncase was joined by Yale Law School, on behalf of its Media Freedom and Information\r\nAccess Clinic.[192]\r\nJune 11,\r\n2013\r\nFreedomWatch\r\nUSA\r\nClass action lawsuit against government bodies and officials believed responsible for\r\nPRISM, and 12 companies (including Apple, Microsoft, Google, Facebook, and\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 18 of 31\n\nSkype and their chief executives) who have been disclosed as providing or making\r\navailable mass information about their users' communications and data to the NSA\r\nunder the PRISM program or related programs. The case cites the First, Fourth, and\r\nFifth Amendments to the Constitution, as well as breach of 18 U.S.C. §§2702\r\n(disclosure of communications records), and asks the court to rule that the program\r\noperates outside its legal authority (s.215 of the Patriot Act). The class includes the\r\nplaintiffs and[193]\r\n\"other American citizens who, in addition to being members of the Nationwide\r\nClass, had their telephone calls and/or emails and/or any other\r\ncommunications made or received through Facebook, Google, Yahoo,\r\nYouTube, Skype, AOL, Sprint, AT\u0026T, Apple, Microsoft and/or PalTalk\r\nactually recorded and/or listened into by or on behalf of [the] Defendants.\"\r\nIn November 2017, the district court dismissed the case.\r\nFebruary\r\n18, 2014\r\nRand Paul and\r\nFreedom Works,\r\nInc.\r\nLawsuit filed against President Barack Obama, James R. Clapper, as Director of\r\nNational Intelligence, Keith B. Alexander, as director of the NSA, James B. Comey,\r\nas director of the FBI, in the United States District Court for the District of Columbia.\r\nThe case contends that the Defendants are violating the Fourth Amendment of the\r\nUnited States by collecting phone metadata. The case is currently stayed pending the\r\noutcome of the government's appeal in the FreedomWatch USA/Klayman case.\r\nJune 2,\r\n2014\r\nElliott J.\r\nSchuchardt\r\nLawsuit filed against President Barack Obama, James R. Clapper, as Director of\r\nNational Intelligence, Admiral Michael R. Rogers, as director of the NSA, James B.\r\nComey, as director of the FBI, in the United States District Court for the Western\r\nDistrict of Pennsylvania. The case contends that the Defendants are violating the\r\nFourth Amendment of the United States by collecting the full content of e-mail in the\r\nUnited States. The complaint asks the Court to find the Defendants' program\r\nunconstitutional, and seeks an injunction. The court is currently considering the\r\ngovernment's motion to dismiss this case.\r\nAnalysis of legal issues\r\n[edit]\r\nLaura Donohue, a law professor at the Georgetown University Law Center and its Center on National Security and the Law,\r\nhas called PRISM and other NSA mass surveillance programs unconstitutional.[194]\r\nWoodrow Hartzog, an affiliate at Stanford Law School's Center for Internet and Society commented that \"[The ACLU will]\r\nlikely have to demonstrate legitimate First Amendment harms (such as chilling effects) or Fourth Amendment harms\r\n(perhaps a violation of a reasonable expectation of privacy) ... Is it a harm to merely know with certainty that you are being\r\nmonitored by the government? There's certainly an argument that it is. People under surveillance act differently, experience\r\na loss of autonomy, are less likely to engage in self exploration and reflection, and are less willing to engage in core\r\nexpressive political activities such as dissenting speech and government criticism. Such interests are what First and Fourth\r\nAmendment seek to protect.\"[195]\r\nLegality of the FISA Amendments Act\r\n[edit]\r\nThe FISA Amendments Act (FAA) Section 702 is referenced in PRISM documents detailing the electronic interception,\r\ncapture and analysis of metadata. Many reports and letters of concern written by members of Congress suggest that this\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 19 of 31\n\nsection of FAA in particular is legally and constitutionally problematic, such as by targeting U.S. persons, insofar as\r\n\"Collections occur in U.S.\" as published documents indicate.[196][197][198][199]\r\nThe ACLU has asserted the following regarding the FAA: \"Regardless of abuses, the problem with the FAA is more\r\nfundamental: the statute itself is unconstitutional.\"[200]\r\nSenator Rand Paul is introducing new legislation called the Fourth Amendment Restoration Act of 2013 to stop the NSA or\r\nother agencies of the United States government from violating the Fourth Amendment to the U.S. Constitution using\r\ntechnology and big data information systems like PRISM and Boundless Informant.[201][202]\r\nPrograms sharing the name PRISM\r\n[edit]\r\nBesides the information collection program started in 2007, there are two other programs sharing the name PRISM:[203]\r\nThe Planning tool for Resource Integration, Synchronization and Management (PRISM), a web tool used by US\r\nmilitary intelligence to send tasks and instructions to data collection platforms deployed to military operations.[204]\r\nThe Portal for Real-time Information Sharing and Management (PRISM), whose existence was revealed by the\r\nNSA in July 2013.[203] This is an internal NSA program for real-time sharing of information which is apparently\r\nlocated in the NSA's Information Assurance Directorate.[203] The NSA's Information Assurance Directorate (IAD) is\r\na very secretive division which is responsible for safeguarding U.S. government and military secrets by\r\nimplementing sophisticated encryption techniques.[203]\r\nIdea behind the MUSCULAR program, which gave direct access to Google and Yahoo private clouds, no\r\nwarrants needed\r\nParallel programs, known collectively as SIGADs gather data and metadata from other sources, each SIGAD has a set of\r\ndefined sources, targets, types of data collected, legal authorities, and software associated with it. Some SIGADs have the\r\nsame name as the umbrella under which they sit, BLARNEY's (the SIGAD) summary, set down in the slides alongside a\r\ncartoon insignia of a shamrock and a leprechaun hat, describes it as \"an ongoing collection program that leverages IC\r\n[intelligence community] and commercial partnerships to gain access and exploit foreign intelligence obtained from global\r\nnetworks.\"\r\nSome SIGADs, like PRISM, collect data at the ISP level, but others take it from the top-level infrastructure. This type of\r\ncollection is known as \"upstream\". Upstream collection includes programs known by the blanket terms BLARNEY,\r\nFAIRVIEW, OAKSTAR and STORMBREW, under each of these are individual SIGADs. Data that is integrated into a\r\nSIGAD can be gathered in other ways besides upstream, and from the service providers, for instance it can be collected from\r\npassive sensors around embassies, or even stolen from an individual computer network in a hacking attack.[205][206][207]\r\n[208][209]\r\n Not all SIGADs involve upstream collection, for instance, data could be taken directly from a service provider,\r\neither by agreement (as is the case with PRISM), by means of hacking, or other ways.[210][211][212] According to the\r\nWashington Post, the much less known MUSCULAR program, which directly taps the unencrypted data inside the Google\r\nand Yahoo private clouds, collects more than twice as many data points compared to PRISM.[213] Because the Google and\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 20 of 31\n\nYahoo clouds span the globe, and because the tap was done outside of the United States, unlike PRISM, the MUSCULAR\r\nprogram requires no (FISA or other type of) warrants.\r\n[214]\r\nCentral Monitoring System\r\nCommunications Assistance for Law Enforcement Act (CALEA), a U.S. wiretapping law passed in 1994\r\nDRDO NETRA\r\nECHELON, a signals intelligence collection and analysis network operated on behalf of Australia, Canada, New\r\nZealand, the United Kingdom, and the United States\r\nEconomic espionage\r\nFourth Amendment to the United States Constitution\r\nINDECT, European Union automatic threat detection research project\r\nInformation Awareness Office, a defunct DARPA project\r\nLaw Enforcement Information Exchange\r\nLawful interception\r\nList of NSA controversies\r\nMass surveillance\r\nMuscular (surveillance program)\r\nNSA call database, contains call detail information for hundreds of billions of telephone calls made through the\r\nlargest U.S. telephone carriers\r\nRoom 641A\r\nSignals intelligence\r\nSORM, Russian telephone and internet surveillance project\r\nSurveillance\r\nTargeted surveillance\r\nTempora, the data-gathering project run by the British GCHQ\r\nTURBINE (US government project)\r\nUtah Data Center, a data storage facility supporting the U.S. Intelligence Community\r\n1. ^ The precise question was: [F]or the past few years the Obama administration has reportedly been gathering and\r\nanalyzing information from major internet companies about audio and video chats, photographs, e-mails, and\r\ndocuments involving people in other countries in an attempt to locate suspected terrorists. The government\r\nreportedly does not target internet usage by US citizens and if such data is collected, it is kept under strict controls.\r\nDo you think the Obama administration was right or wrong in gathering and analyzing that internet data?\r\n1. ^ Jump up to: a\r\n \r\nb\r\n \r\nc\r\n \r\nd\r\n \r\ne\r\n \r\nf\r\n \r\ng\r\n \r\nh\r\n \r\ni\r\n Gellman, Barton; Poitras, Laura (June 6, 2013). \"US Intelligence Mining Data from\r\nNine U.S. Internet Companies in Broad Secret Program\". The Washington Post. Retrieved June 15, 2013. {{cite\r\nnews}} : CS1 maint: deprecated archival service (link)\r\n2. ^ Jump up to: a\r\n \r\nb\r\n \r\nc\r\n \r\nd\r\n \r\ne\r\n \r\nf\r\n \r\ng\r\n \r\nh\r\n Greenwald, Glenn; MacAskill, Ewen (June 6, 2013). \"NSA Taps in to Internet Giants'\r\nSystems to Mine User Data, Secret Files Reveal – Top-Secret Prism Program Claims Direct Access to Servers of\r\nFirms Including Google, Apple and Facebook – Companies Deny Any Knowledge of Program in Operation Since\r\n2007 – Obama Orders US to Draw Up Overseas Target List for Cyber-Attacks\". The Guardian. Archived from the\r\noriginal on February 7, 2019. Retrieved June 15, 2013.\r\n3. ^ Braun, Stephen; Flaherty, Anne; Gillum, Jack; Apuzzo, Matt (June 15, 2013). \"Secret to PRISM Program: Even\r\nBigger Data Seizures\". Associated Press. Archived from the original on September 10, 2013. Retrieved June 18,\r\n2013.\r\n4. ^ Chappell, Bill (June 6, 2013). \"NSA Reportedly Mines Servers of US Internet Firms for Data\". NPR. The Two-Way\r\n(blog of NPR). Archived from the original on June 13, 2013. Retrieved June 15, 2013.\r\n5. ^\r\n6. ^ Barton Gellman \u0026 Ashkan Soltani (October 30, 2013). \"NSA infiltrates links to Yahoo, Google data centers\r\nworldwide, Snowden documents say\". The Washington Post. Archived from the original on April 6, 2014. Retrieved\r\nOctober 31, 2013.\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 21 of 31\n\n7. ^ Siobhan Gorman \u0026 Jennifer Valentiono-Devries (August 20, 2013). \"New Details Show Broader NSA Surveillance\r\nReach - Programs Cover 75% of Nation's Traffic, Can Snare Emails\". The Wall Street Journal. Retrieved August 21,\r\n2013.\r\n8. ^ \"Graphic: How the NSA Scours Internet Traffic in the U.S.\" The Wall Street Journal. August 20, 2013. Retrieved\r\nAugust 21, 2013.\r\n9. ^ Jennifer Valentiono-Devries \u0026 Siobhan Gorman (August 20, 2013). \"What You Need to Know on New Details of\r\nNSA Spying\". The Wall Street Journal. Retrieved August 21, 2013.\r\n10. ^ Lee, Timothy B. (June 6, 2013). \"How Congress Unknowingly Legalized PRISM in 2007\". Wonkblog (blog of The\r\nWashington Post). Retrieved July 4, 2013.\r\n11. ^ Johnson, Luke (July 1, 2013). \"George W. Bush Defends PRISM: 'I Put That Program in Place to Protect the\r\nCountry'\" Archived July 2, 2013, at the Wayback Machine. The Huffington Post. Retrieved July 4, 2013.\r\n12. ^ Office of the Director of National Intelligence (June 8, 2013). \"Facts on the Collection of Intelligence Pursuant to\r\nSection 702 of the Foreign Intelligence Surveillance Act\" (PDF). dni.gov. Archived (PDF) from the original on\r\nOctober 2, 2013. Retrieved July 25, 2013.\r\n13. ^ Jump up to: a\r\n \r\nb\r\n \r\nc\r\n \r\nd\r\n Mezzofiore, Gianluca (June 17, 2013). \"NSA Whistleblower Edward Snowden: Washington\r\nSnoopers Are Criminals\" Archived September 17, 2013, at the Wayback Machine. International Business Times.\r\nRetrieved June 30, 2013.\r\n14. ^ MacAskill, Ewan (August 23, 2013). \"NSA paid millions to cover Prism compliance costs for tech companies\".\r\nArchived from the original on November 3, 2015. Retrieved August 27, 2013.\r\n15. ^ Jump up to: a\r\n \r\nb\r\n \r\nc\r\n \r\nd\r\n Staff (June 6, 2013). \"NSA Slides Explain the PRISM Data-Collection Program\". The\r\nWashington Post. Archived from the original on March 15, 2014. Retrieved June 15, 2013.\r\n16. ^ John D Bates (October 3, 2011). \"[redacted]\" (PDF). p. 71. Archived (PDF) from the original on August 24, 2013.\r\nRetrieved August 21, 2013.\r\n17. ^ Jump up to: a\r\n \r\nb\r\n \r\nc\r\n Savage, Charlie; Wyatt, Edward; Baker, Peter (June 6, 2013). \"U.S. Says It Gathers Online Data\r\nAbroad\". The New York Times. Archived from the original on February 16, 2017. Retrieved June 6, 2013.\r\n18. ^ Greenwald, Glenn (June 5, 2013). \"NSA Collecting Phone Records of Millions of Verizon Customers Daily – Top\r\nSecret Court Order Requiring Verizon to Hand Over All Call Data Shows Scale of Domestic Surveillance under\r\nObama\". The Guardian. Archived from the original on August 16, 2013. Retrieved June 15, 2013.\r\n19. ^ Staff (June 6, 2013). \"Intelligence Chief Blasts NSA Leaks, Declassifies Some Details about Phone Program\r\nLimits\". Associated Press (via The Washington Post). Archived from the original on December 22, 2015. Retrieved\r\nJune 15, 2013.\r\n20. ^ Ovide, Shira (June 8, 2013). \"U.S. Official Releases Details of Prism Program\". The Wall Street Journal. Archived\r\nfrom the original on October 9, 2013. Retrieved June 15, 2013.\r\n21. ^ Madison, Lucy (June 19, 2013). \"Obama defends \"narrow\" surveillance programs\". CBS News. Archived from the\r\noriginal on June 27, 2013. Retrieved June 30, 2013.\r\n22. ^ Johnson, Kevin; Martin, Scott; O'Donnell, Jayne; Winter, Michael (June 15, 2013). \"NSA taps data from 9 major\r\nNet firms\". USA Today. Archived from the original on June 7, 2013. Retrieved June 6, 2013.\r\n23. ^ MacAskill, Ewen; Borger, Julian; Hopkins, Nick; Davies, Nick; Ball, James (June 21, 2013). \"GCHQ taps fibre-optic cables for secret access to world's communications\" Archived October 17, 2017, at the Wayback Machine. The\r\nGuardian. Retrieved June 30, 2013.\r\n24. ^ (June 22, 2013). \"GCHQ data-tapping claims nightmarish, says German justice minister\" Archived January 19,\r\n2019, at the Wayback Machine. BBC News. Retrieved June 30, 2013.\r\n25. ^ Clayton, Mark (June 22, 2013). \"When in doubt, NSA searches information on Americans\". The Christian Science\r\nMonitor. Archived from the original on June 26, 2013. Retrieved June 30, 2013 – via Yahoo! News.\r\n26. ^ \"Procedures used by NSA to target non-US persons: Exhibit A – full document\". The Guardian. June 20, 2013.\r\nArchived from the original on January 3, 2017. Retrieved June 29, 2013.\r\n27. ^ Bump, Philip (June 20, 2013). \"The NSA Guidelines for Spying on You Are Looser Than You've Been Told\". The\r\nAtlantic Wire. Archived from the original on June 23, 2013. Retrieved June 29, 2013.\r\n28. ^ Teodori, Michael. \"The Use of Personal Data in Post 9/11 Counter-Terrorism: European and American approaches\r\ncompared\". Academia.\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 22 of 31\n\n29. ^ \"Espionnage de la NSA: tous les documents publiés par 'Le Monde'\". Le Monde. October 21, 2013. Archived from\r\nthe original on October 22, 2013. Retrieved October 22, 2013.\r\n30. ^ \"NSA Prism program slides\". The Guardian. November 1, 2013. Archived from the original on March 20, 2014.\r\nRetrieved March 19, 2014.\r\n31. ^ Jump up to: a\r\n \r\nb\r\n Gates, David Edgerley (June 26, 2013). \"Through a Glass, Darkly\". Spying. Santa Fe:\r\nSleuthSayers. Archived from the original on January 25, 2014. Retrieved January 4, 2014.\r\n32. ^ Jump up to: a\r\n \r\nb\r\n Lundin, Leigh (July 7, 2013). \"Pam, Prism, and Poindexter\". Spying. Washington: SleuthSayers.\r\nArchived from the original on January 4, 2014. Retrieved January 4, 2014.\r\n33. ^ Dean, John W. (December 30, 2005). \"George W. Bush as the New Richard M. Nixon: Both Wiretapped Illegally,\r\nand Impeachable; Both Claimed That a President May Violate Congress' Laws to Protect National Security\".\r\nFindLaw. Archived from the original on March 4, 2016. Retrieved June 12, 2013.\r\n34. ^ Holtzman, Elizabeth (January 11, 2006). \"The Impeachment of George W. Bush\". The Nation. Archived from the\r\noriginal on July 2, 2013. Retrieved June 12, 2013.\r\n35. ^ \"Adopted by the House of Delegates\" (PDF). American Bar Association. February 13, 2006. Archived from the\r\noriginal (PDF) on March 4, 2016. Retrieved August 26, 2013.\r\n36. ^ Staff (February 14, 2006). \"Lawyers Group Criticizes Surveillance Program\" Archived December 3, 2017, at the\r\nWayback Machine. The Washington Post. Retrieved June 15, 2013.\r\n37. ^ Jump up to: a\r\n \r\nb\r\n McAllister, Neil (December 29, 2012). \"Senate Votes to Continue FISA Domestic Spying Through\r\n2017 – All Proposed Privacy Amendments Rejected\". The Register. Archived from the original on June 7, 2013.\r\nRetrieved June 15, 2013.\r\n38. ^ \"H.R. 5949 (112th Congress): FISA Amendments Act Reauthorization Act of 2012\". Archived from the original on\r\nMay 20, 2013. Retrieved June 19, 2013.\r\n39. ^ Jump up to: a\r\n \r\nb\r\n \r\nc\r\n \r\nd\r\n Privacy and Civil Liberties Oversight Board, \"Report on the Surveillance Program Operated\r\nPursuant to Section 702 of the Foreign Intelligence Surveillance Act\" (PDF). pclob.gov. July 2, 2014. Archived\r\n(PDF) from the original on February 18, 2015. Retrieved February 19, 2015.\r\n40. ^ \"FBI, CIA Use Backdoor Searches To Warrentlessly Spy On Americans' Communications\". TechDirt. June 30,\r\n2014. Archived from the original on February 19, 2015. Retrieved February 19, 2015.\r\n41. ^ \"NSA slides explain the PRISM data-collection program\". July 10, 2013. Archived from the original on March 15,\r\n2014. Retrieved September 7, 2017. An annotated presentation of the NSA PRISM program as published by the\r\nWashington Post on 6 June 2013 and updated on 10 July 2013\r\n42. ^ Glenn Greenwald; Ewen MacAskill; Laura Poitras; Spencer Ackerman; Dominic Rushe (July 11, 2013).\r\n\"Revealed: how Microsoft handed the NSA access to encrypted messages\". The Guardian. Archived from the original\r\non November 19, 2015. Retrieved July 11, 2013.\r\n43. ^ \"The NSA Files\". The Guardian. June 8, 2013. Archived from the original on October 3, 2014. Retrieved December\r\n12, 2016.\r\n44. ^ Jump up to: a\r\n \r\nb\r\n Rea, Kari (July 28, 2013). \"Glenn Greenwald: Low-Level NSA Analysts Have 'Powerful and\r\nInvasive' Search Tool\". ABC News. Archived from the original on July 30, 2013. Retrieved July 30, 2013.\r\n45. ^ Glenn Greenwald (July 31, 2013). \"Revealed: NSA program collects 'nearly everything a user does on the\r\ninternet'\". Theguardian.com. Archived from the original on December 31, 2013. Retrieved January 27, 2014.\r\n46. ^ File:Prism-week-in-life-straight.png\r\n47. ^ Jump up to: a\r\n \r\nb\r\n \r\nc\r\n \"DNI Statement on Activities Authorized Under Section 702 of FISA\". Director of National\r\nIntelligence. June 6, 2013. Archived from the original on June 7, 2013.\r\n48. ^ Greenberg, Andy (June 6, 2013). \"Top U.S. Intelligence Officials Repeatedly Deny NSA Spying on Americans\".\r\nForbes. Archived from the original on June 10, 2013. Retrieved June 7, 2013.\r\n49. ^ Shane, Scott; Sanger, David E. (June 30, 2013). \"Job Title Key to Inner Access Held by Snowden\". The New York\r\nTimes. Archived from the original on July 4, 2013. Retrieved June 30, 2013.\r\n50. ^ \"TRANSCRIPT OF ANDREA MITCHELL'S INTERVIEW WITH DIRECTOR OF NATIONAL INTELLIGENCE\r\nJAMES CLAPPER\". NBC News. June 9, 2013. Archived from the original on September 8, 2015.\r\n51. ^ \"Obama Defends US Surveillance Programs\". Voice of America. Archived from the original on March 31, 2021.\r\nRetrieved November 1, 2020.\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 23 of 31\n\n52. ^ Jump up to: a\r\n \r\nb\r\n Savage, Charlie; Wyatt, Edward; Baker, Peter; Shear, Michael D. (June 7, 2013). \"Obama Calls\r\nSurveillance Programs Legal and Limited\". The New York Times. Archived from the original on June 7, 2013.\r\nRetrieved June 7, 2013.\r\n53. ^ \"Obama defends sweeping surveillance efforts\". The Washington Post. June 7, 2013. Retrieved August 13, 2024.\r\n54. ^ Weisman, Jonathan; Sanger, David (June 8, 2013). \"White House Plays Down Data Program\". The New York\r\nTimes. Archived from the original on January 25, 2014. Retrieved June 8, 2013.\r\n55. ^ Jump up to: a\r\n \r\nb\r\n \r\nc\r\n \r\nd\r\n \"Facts on the Collection of Intelligence Pursuant to Section 702 of the Foreign Intelligence\r\nSurveillance Act\". Director of National Intelligence. June 8, 2013. Archived from the original on June 11, 2013.\r\nRetrieved June 8, 2013.\r\n56. ^ \"DNI Statement on the Collection of Intelligence Pursuant to Section 702 of the Foreign Intelligence Surveillance\r\nAct\". Director of National Intelligence. June 8, 2013. Archived from the original on June 11, 2013. Retrieved June 8,\r\n2013.\r\n57. ^ Miller, Greg; Nakashima, Ellen (June 25, 2013). \"NSA Fact Sheet on Surveillance Program Pulled from Web After\r\nSenators' Criticism\" Archived April 10, 2017, at the Wayback Machine. The Washington Post. Retrieved July 2, 2013.\r\n58. ^ Jump up to: a\r\n \r\nb\r\n Staff (June 13, 2013). \"Snowden Leaks Caused US 'Significant Harm' – Mueller\" Archived\r\nFebruary 18, 2019, at the Wayback Machine. BBC News. Retrieved July 1, 2013.\r\n59. ^ Press release (June 13, 2013). \"Udall, Wyden Call on National Security Agency Director to Clarify Comments on\r\nEffectiveness of Phone Data Collection Program\" Archived February 4, 2016, at the Wayback Machine. Office of\r\nRon Wyden. Retrieved July 1, 2013.\r\n60. ^ Gerstein, Josh (June 18, 2013). \"NSA: PRISM Stopped NYSE Attack\" . Politico. Retrieved July 1, 2013.\r\n61. ^ Nakashima, Ellen (June 18, 2013). \"Officials: surveillance programs foiled more than 50 terrorist attacks\".\r\nWashington Post. Archived from the original on September 30, 2017. Retrieved September 7, 2017.\r\n62. ^ Chang, Ailsa (June 19, 2013). \"Secret Surveillance Credited with Preventing Terror Acts\". NPR. Archived from the\r\noriginal on July 2, 2013. Retrieved July 1, 2013.\r\n63. ^ \"NSA Claim of Thwarted NYSE Plot Contradicted by Court Documents\". ABC News. June 19, 2013. Archived from\r\nthe original on July 14, 2013. Retrieved July 13, 2013.\r\n64. ^ \"Udall, Bipartisan Group of Senators Seek Answers from DNI Clapper on Bulk Data Collection Program\". June\r\n28, 2013. Archived from the original on July 8, 2013. Retrieved July 13, 2013.\r\n65. ^ Jump up to: a\r\n \r\nb\r\n Starr, Barbara (June 25, 2013). \"Terrorists Try Changes After Snowden Leaks, Official Says\"\r\nArchived June 26, 2013, at the Wayback Machine. Security Clearance (blog of CNN). Retrieved June 29, 2013.\r\n66. ^ Nakashima, Ellen; Miller, Greg (June 24, 2013). \"U.S. Worried About Security of Files Snowden Is Thought to\r\nHave\". The Washington Post. Archived from the original on June 27, 2013. Retrieved June 29, 2013.\r\n67. ^ Blake, Aaron (June 7, 2013). \"Congress All But Silent on Surveillance of Internet Records\". Post Politics (blog of\r\nThe Washington Post). Archived from the original on June 11, 2013. Retrieved June 16, 2013.\r\n68. ^ Everett, Burgess; Sherman, Jake (June 7, 2013). \"Republican Lawmakers: NSA Surveillance News to Me\". Politico.\r\nArchived from the original on June 12, 2013. Retrieved June 16, 2013.\r\n69. ^ Jump up to: a\r\n \r\nb\r\n Klinck, Patrick (June 9, 2013). \"Higgins on Surveillance: Balance Is Key\". WGRZ. Retrieved June\r\n16, 2013. {{cite web}} : CS1 maint: deprecated archival service (link)\r\n70. ^ Jump up to: a\r\n \r\nb\r\n \r\nc\r\n Bohan, Caren (June 9, 2013). \"Lawmakers Urge Review of Domestic Spying, Patriot Act\".\r\nChicago Tribune. Reuters. Archived from the original on June 16, 2013. Retrieved June 16, 2013.\r\n71. ^ Knowlton, Brian (June 9, 2013). \"Feinstein 'Open' to Hearings on Surveillance Programs\". The Caucus (blog of\r\nThe New York Times). Archived from the original on June 15, 2013. Retrieved June 16, 2013.\r\n72. ^ Van Susteren, Greta (June 11, 2013). \"Sen. Feinstein Says Declassifying Info on NSA Program Would Show the\r\nBenefits of the Program\". Gretawire (blog of Fox News Channel). Archived from the original on June 16, 2013.\r\nRetrieved June 16, 2013.\r\n73. ^ Chang, Ailsa (June 11, 2013). \"What Did Congress Really Know About NSA Tracking\". NPR. Archived from the\r\noriginal on June 16, 2013. Retrieved June 16, 2013.\r\n74. ^ Jump up to: a\r\n \r\nb\r\n Sensenbrenner, Jim (June 9, 2013). \"This Abuse of the Patriot Act Must End – President Obama\r\nFalsely Claims Congress Authorised All NSA Surveillance – In Fact, Our Law Was Designed to Protect Liberties\".\r\nThe Guardian. Archived from the original on August 22, 2013. Retrieved June 15, 2013.\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 24 of 31\n\n75. ^ Jump up to: a\r\n \r\nb\r\n McClanahan, Mike (June 9, 2013). \"U.S. Leaders React to Leak Detailing NSA Surveillance\r\nProgram\". CBS42 WIAT. WIAT. Archived from the original on January 25, 2014. Retrieved June 15, 2013.\r\n76. ^ Howell, Jr., Tom (June 10, 2013). \"Rep. Todd Rokita: No Government Snooping Without Probable Cause\". The\r\nWashington Times. Retrieved June 12, 2013.\r\n77. ^ Risen, James (June 11, 2013). \"Report Indicates More Extensive Cooperation by Microsoft on Surveillance\". New\r\nYork Times. Archived from the original on July 12, 2013. Retrieved June 12, 2013.\r\n78. ^ Jump up to: a\r\n \r\nb\r\n \r\nc\r\n Watkins, Aiy (July 17, 2013). \"Skeptical Congress turns its spycam on NSA surveillance\".\r\nMcClatchy News Service. Archived from the original on July 18, 2013. Retrieved July 18, 2013.\r\n79. ^ Leonnig, Carol D.; Ellen Nakashima, Ellen; Gellman, Barton (June 29, 2013). \"Secret-Court Judges Upset at\r\nPortrayal of 'Collaboration' with Government\". The Washington Post. Archived from the original on June 30, 2013.\r\nRetrieved July 1, 2013.\r\n80. ^ Jump up to: a\r\n \r\nb\r\n Lichtblau, Eric (July 6, 2013). \"In Secret, Court Vastly Broadens Powers of N.S.A.\" The New York\r\nTimes. Archived from the original on January 25, 2014. Retrieved July 8, 2013.\r\n81. ^ Rosenthal, Andrew (July 9, 2013). \"A Court Without Adversaries\". The New York Times. Archived from the original\r\non January 25, 2014. Retrieved July 10, 2013.\r\n82. ^ John Shiffman \u0026 Kristina Cooke (June 21, 2013). \"The judges who preside over America's secret court\". Reuters.\r\nArchived from the original on June 23, 2013. Retrieved July 13, 2013.\r\n83. ^ Walton, Reggie B. (July 29, 2013). \"2013-07-29 Letter of FISA Court president Reggie B. Walton to the Chairman\r\nof the U.S. Senate Judiciary Committee Patrick J. Leahy about certain operations of the FISA Court\".\r\nwww.leahy.senate.gov. Archived from the original on August 18, 2013. Retrieved August 25, 2013.\r\n84. ^ Jump up to: a\r\n \r\nb\r\n Ackerman, Spencer; Roberts, Dan (June 28, 2013). \"US Army Blocks Access to Guardian Website\r\nto Preserve 'Network Hygiene' – Military Admits to Filtering Reports and Content Relating to Government\r\nSurveillance Programs for Thousands of Personnel\" Archived January 3, 2017, at the Wayback Machine. The\r\nGuardian. Retrieved June 30, 2013.\r\n85. ^ Jump up to: a\r\n \r\nb\r\n Ackerman, Spencer (July 1, 2013). \"US military blocks entire Guardian website for troops stationed\r\nabroad\". The Guardian. Archived from the original on February 2, 2017. Retrieved December 12, 2016.\r\n86. ^ Jump up to: a\r\n \r\nb\r\n Ex-Verfassungsschützer: US-Überwachung auch in Österreich Archived July 9, 2013, at the\r\nWayback Machine, 2013-07-06.(in German)\r\n87. ^ Jump up to: a\r\n \r\nb\r\n Gert Polli rechnet mit der CIA ab: NEWS-Talk mit dem Ex-Verfassungsschutz-Boss Archived July\r\n15, 2013, at the Wayback Machine, 2009-11-11.(in German)\r\n88. ^ Talor, Josh (June 11, 2013). \"Australian Government to Assess Prism Impact\" . ZDNet. Retrieved June 11, 2013.\r\n89. ^ Taylor, Josh. \"Australian government to assess PRISM impact\". ZDnet. Archived from the original on January 25,\r\n2014. Retrieved January 13, 2014.\r\n90. ^ Morning Post, South China (January 23, 2014). \"Australian minister slams 'treachery' of NSA whistleblower\r\nSnowden\". Archived from the original on February 9, 2014. Retrieved March 20, 2014.\r\n91. ^ \"Dilma Rousseff cancels preparations for US trip over spying row\" Archived December 31, 2017, at the Wayback\r\nMachine, Donna Bowater, The Telegraph, September 5, 2013. Retrieved October 20, 2013.\r\n92. ^ \"At U.N. General Assembly, Brazilian President Dilma Rousseff Blasts U.S. Spying Operations\" Archived October\r\n18, 2013, at the Wayback Machine, Dilma Rousseff, Video and transcript, Democracy Now!, September 24, 2013.\r\nRetrieved October 20, 2013.\r\n93. ^ Soto, Alonso (December 18, 2013). \"UPDATE 3-Saab wins Brazil jet deal after NSA spying sours Boeing bid\".\r\nReuters. Archived from the original on January 25, 2014. Retrieved January 27, 2014.\r\n94. ^ Horgan, Colin (June 10, 2013). \"Should Canadians Worry About the NSA's PRISM Program? Maybe\". ipolitics.ca.\r\nArchived from the original on November 10, 2013. Retrieved June 16, 2013.\r\n95. ^ Parsons, Christopher (March 27, 2014). \"Mapping the Canadian Government's Telecommunications Surveillance\".\r\ncitizenlab.org. Archived from the original on July 9, 2014. Retrieved March 28, 2014.\r\n96. ^ \"Rules Shielding Online Data From N.S.A. and Other Prying Eyes Advance in Europe\" Archived November 6,\r\n2016, at the Wayback Machine, James Kanter and Mike Scott, New York Times, 21 October 2013. Retrieved October\r\n22, 2013.\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 25 of 31\n\n97. ^ Loek Essers (February 17, 2014). \"Merkel and Hollande to talk about avoiding US servers\". ITworld. Archived\r\nfrom the original on February 21, 2014. Retrieved February 18, 2014.\r\n98. ^ \"France Calls U.S. Ambassador Over Spying Report\"[permanent dead link], Adrian Croft, Arshad Mohammed,\r\nAlexandria Sage, and Mark John, New York Times (Reuters), October 21, 2013. Retrieved October 21, 2013.\r\n99. ^ Prodhan, Georgina; Davenport, Claire (June 7, 2013). \"U.S. Surveillance Revelations Deepen European Fears of\r\nWeb Giants\" Archived September 24, 2015, at the Wayback Machine. Reuters. Retrieved June 16, 2013.\r\n100. ^ Jump up to: a\r\n \r\nb\r\n \r\nc\r\n Schofield, Matthew. (June 26, 2013). \"Memories of Stasi Color Germans' View of U.S.\r\nSurveillance Programs\" Archived June 28, 2013, at the Wayback Machine. McClatchy Washington Bureau. Retrieved\r\nJune 30, 2013.\r\n101. ^ \"The German Army was using PRISM to support its operations in Afghanistan as early as 2011\". Der Spiegel (in\r\nGerman). July 17, 2013. Archived from the original on July 18, 2013. Retrieved July 18, 2013.\r\n102. ^ Jackson, David (October 23, 2013). \"Obama says NSA not spying on Merkel's cellphone\". USA Today. Archived\r\nfrom the original on October 23, 2013. Retrieved October 24, 2013.\r\n103. ^ Smith-Spark, Laura (October 24, 2013). \"Merkel calls Obama: Spying on friends 'never acceptable'\". CNN.\r\nArchived from the original on October 25, 2013. Retrieved October 24, 2013.\r\n104. ^ Sadan, Nitzan (June 8, 2013). \"Report: 'Big Brother' of the U.S. Government Relies on Israeli Technology\"\r\n(Google English translation of Hebrew article) Archived January 7, 2017, at the Wayback Machine. Calcalist.\r\nRetrieved June 10, 2013.\r\n105. ^ Kelley, Michael (June 7, 2013). \"Did You Know?: Two Secretive Israeli Companies Reportedly Bugged the US\r\nTelecommunications Grid for the NSA\" Archived June 9, 2013, at the Wayback Machine. Business Insider. Retrieved\r\nJune 10, 2013.\r\n106. ^ Villamil, Jenaro (June 18, 2013).\"Big Brother y CISEN millionario negocio en puerta.\" Archived June 23, 2013, at\r\nthe Wayback Machine proceso.com.mx. Retrieved February 19, 2014.\r\n107. ^ McCorkindale, Wilma (June 11, 2013). \"Expert Says Kiwis under Constant Surveillance\" Archived October 6,\r\n2013, at the Wayback Machine. Stuff.co.nz. Retrieved June 12, 2013.\r\n108. ^ \"Dotcom doubts big reveal will hurt Key\". The New Zealand Herald. September 9, 2014. Archived from the\r\noriginal on October 5, 2014. Retrieved October 5, 2014.\r\n109. ^ \"Spain Summons American Ambassador on New Reports of N.S.A. Spying\" Archived March 28, 2017, at the\r\nWayback Machine, Raphael Minder, New York Times, October 28, 2013. Retrieved October 29, 2013.\r\n110. ^ \"Statement on GCHQ's Alleged Interception of Communications under the US PRISM Programme\" (PDF).\r\nIntelligence and Security Committee of Parliament. July 17, 2013. Retrieved December 17, 2013.\r\n111. ^ \"NSA files: why the Guardian in London destroyed hard drives of leaked files\" Archived February 4, 2017, at the\r\nWayback Machine The Guardian, 20 August 2013\r\n112. ^ Farivar, Cyrus (June 6, 2013). \"New Leak Shows Feds Can Access User Accounts for Google, Facebook and More\r\n– Secret Slides Reveal Massive Government Spying, Tech Companies Dispute Reports\". Ars Technica. Archived from\r\nthe original on June 10, 2013. Retrieved June 12, 2013.\r\n113. ^ Jump up to: a\r\n \r\nb\r\n \r\nc\r\n \r\nd\r\n \r\ne\r\n \r\nf\r\n Lardinois, Frederic (June 6, 2013). \"Google, Facebook, Dropbox, Yahoo, Microsoft and\r\nApple Deny Participation in NSA PRISM Surveillance Program\". TechCrunch. Archived from the original on June\r\n13, 2013. Retrieved June 12, 2013.\r\n114. ^ Jump up to: a\r\n \r\nb\r\n \r\nc\r\n \r\nd\r\n Lee, Timothy B. (June 12, 2013). \"Here's Everything We Know About PRISM to Date\".\r\nWonkblog (blog of The Washington Post). Archived from the original on June 14, 2013. Retrieved June 13, 2013.\r\n115. ^ Bekker, Scott (June 20, 2013). \"PRISM and Microsoft: What We Know So Far\". Redmond Channel Partner.\r\nArchived from the original on July 26, 2013. Retrieved July 12, 2013.\r\n116. ^ Jump up to: a\r\n \r\nb\r\n LeFebvre, Rob (June 7, 2013). \"Everything You Need To Know About Apple And PRISM\r\n[Updated]\". Cult of Mac. Archived from the original on June 9, 2013. Retrieved February 26, 2019.\r\n117. ^ Stern, Joanna (June 7, 2013). \"Dissecting Big Tech's Denial of Involvement in NSA's PRISM Spying Program\".\r\nABC News. Archived from the original on June 12, 2013. Retrieved June 13, 2013.\r\n118. ^ Elias, Paul (May 31, 2013). \"Judge Orders Google to Turn Over Data to FBI\". Associated Press (via Yahoo!\r\nNews). Archived from the original on June 8, 2013. Retrieved June 15, 2013.\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 26 of 31\n\n119. ^ Grant, Rebecca (June 6, 2013). \"Google Tried to Resist FBI Requests for Data, But the FBI Took It Anyway\".\r\nVentureBeat. Retrieved June 15, 2013.\r\n120. ^ Jump up to: a\r\n \r\nb\r\n \r\nc\r\n \r\nd\r\n \r\ne\r\n \r\nf\r\n \r\ng\r\n \r\nh\r\n \"Tech Companies Concede to Surveillance Program\". The New York Times. June 7, 2013.\r\nArchived from the original on June 15, 2013. Retrieved June 8, 2013.\r\n121. ^ Ball, James (June 8, 2013). \"NSA's Prism Surveillance Program: How It Works and What It Can Do – Slide from\r\nSecret PowerPoint Presentation Describes How Program Collects Data 'Directly from the Servers' of Tech Firms –\r\nObama Deflects Criticism over NSA Surveillance\". The Guardian. Archived from the original on July 31, 2013.\r\nRetrieved June 15, 2013.\r\n122. ^ Zetter, Kim (June 11, 2013). \"Google's Real Secret Spy Program? Secure FTP\". Wired. Archived from the original\r\non June 14, 2013. Retrieved June 13, 2013.\r\n123. ^ Ullyot, Ted (June 14, 2013). \"Facebook Releases Data, Including All National Security Requests\". Facebook.\r\nArchived from the original on July 4, 2013. Retrieved July 4, 2013.\r\n124. ^ Frank, Jon (June 14, 2013). \"Microsoft's U.S. Law Enforcement and National Security Requests for Last Half of\r\n2012\". Microsoft. Archived from the original on July 3, 2013. Retrieved July 4, 2013.\r\n125. ^ Miller, Claire Cain (June 15, 2013). \"Google Calls U.S. Data Request Disclosures a Step Backward for Users\".\r\nBits (blog of The New York Times). Archived from the original on June 19, 2013. Retrieved July 4, 2013.\r\n126. ^ Mims, Christopher (November 14, 2013). \"Cisco's disastrous quarter shows how NSA spying could freeze US\r\ncompanies out of a trillion-dollar opportunity\". Quartz. Archived from the original on January 25, 2014. Retrieved\r\nJanuary 27, 2014.\r\n127. ^ Ron Bell; General Counsel (September 12, 2014). \"Shedding Light on the Foreign Intelligence Surveillance Court\r\n(FISC): Court Findings from Our 2007-2008 Case\". Yahoo!. Archived from the original on November 14, 2014.\r\nRetrieved September 12, 2014.\r\n128. ^ Editorial (June 6, 2013). \"President Obama's Dragnet\". The New York Times. Archived from the original on June\r\n7, 2013. Retrieved June 6, 2013.\r\n129. ^ Editorial (June 10, 2013). \"A Real Debate on Surveillance\". The New York Times. Archived from the original on\r\nJune 11, 2013. Retrieved June 10, 2013.\r\n130. ^ Jump up to: a\r\n \r\nb\r\n The New York Times Editorial Board (July 8, 2013). \"The Laws You Can't See\". The New York\r\nTimes. Archived from the original on July 9, 2013. Retrieved July 9, 2013.\r\n131. ^ Jump up to: a\r\n \r\nb\r\n \r\nc\r\n Braun, Stephan (July 9, 2013). \"Former Judge Admits Flaws in Secret Court\". Associated Press.\r\nArchived from the original on July 11, 2013. Retrieved July 10, 2013.\r\n132. ^ Savage, Charlie (July 9, 2013). \"Nation Will Gain by Discussing Surveillance, Expert Tells Privacy Board\". The\r\nNew York Times. Archived from the original on July 10, 2013. Retrieved July 10, 2013.\r\n133. ^ Wilson, Valerie Plame and Joe [Joseph C.] Wilson (June 23, 2013). \"The NSA's Metastasised Intelligence-Industrial Complex Is ripe for Abuse – Where Oversight and Accountability Have Failed, Snowden's Leaks Have\r\nOpened Up a Vital Public Debate on Our Rights and Privacy\" Archived February 25, 2017, at the Wayback Machine.\r\nThe Guardian. Retrieved July 1, 2013.\r\n134. ^ Staff (undated). \"Massive Spying Program Exposed – Demand Answers Now\" Archived June 13, 2013, at the\r\nWayback Machine. Electronic Frontier Foundation. Retrieved June 13, 2013.\r\n135. ^ Ed Pilkington; Nicholas Watt (June 12, 2013). \"NSA Surveillance Played Little Role in Foiling Terror Plots,\r\nExperts Say\". The Guardian. Archived from the original on August 1, 2013. Retrieved June 14, 2013. “Obama\r\nAdministration Says NSA Data Helped Make Arrests in Two Important Cases – But Critics Say That Simply Isn't\r\nTrue”\r\n136. ^ Daly, Michael (June 12, 2013). \"NSA Surveillance Program Failed to Invade Tamerlan Tsarnaev's Privacy\"\r\nArchived June 14, 2013, at the Wayback Machine. The Daily Beast. Retrieved June 14, 2013.\r\n137. ^ Weiner, Rachel (June 10, 2013). \"Ron Paul Praises Edward Snowden\". Post Politics (blog of The Washington\r\nPost). Retrieved June 16, 2013. \"We should be thankful for individuals like Edward Snowden and Glenn Greenwald\r\nwho see injustice being carried out by their own government and speak out, despite the risk. ... They have done a\r\ngreat service to the American people by exposing the truth about what our government is doing in secret.\" \"The\r\ngovernment does not need to know more about what we are doing. ... We need to know more about what the\r\ngovernment is doing.\"\r\n138. ^ Malyun, Ali (2020). I Cannot Be Silenced. Page Publishing.\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 27 of 31\n\n139. ^ Friedman, Thomas L. (June 11, 2013). \"Blowing a whistle\". New York Times. Archived from the original on March\r\n19, 2017. Retrieved February 28, 2017.\r\n140. ^ \"Shields and Brooks on Syria, Snowden and surveillance\". PBS NewsHour. June 14, 2013. Archived from the\r\noriginal on January 30, 2014. Retrieved September 7, 2017.\r\n141. ^ Krauthammer, Charles (June 13, 2013). \"Pushing the envelope, NSA-style\". Washington Post. Archived from the\r\noriginal on July 14, 2017. Retrieved September 7, 2017.\r\n142. ^ Jump up to: a\r\n \r\nb\r\n Duncan, Ian (June 8, 2013). \"David Simon Weighs In on NSA Surveillance – Creator of 'The Wire'\r\nDescribes 1980s Data Collection by Baltimore Police in Blog Post\" Archived June 15, 2013, at the Wayback\r\nMachine. The Baltimore Sun. Retrieved June 16, 2013.\r\n143. ^ \"We Are Shocked, Shocked...\" (Archive) David Simon Blog. June 7, 2013. Retrieved June 12, 2013.\r\n144. ^ Harvey, Fiona (June 19, 2013). \"NSA Surveillance Is an Attack on American Citizens, Says Noam Chomsky –\r\nGovernments Will Use Whatever Technology Is Available to Combat Their Primary Enemy – Their Own Population,\r\nSays Critic\" Archived January 12, 2017, at the Wayback Machine. The Guardian. Retrieved June 20, 2013.\r\n145. ^ LoGiurato, Brett (June 17, 2013). \"The NSA's PRISM Program Is Shockingly Uncontroversial with the American\r\nPublic\" Archived June 22, 2013, at the Wayback Machine. Business Insider. Retrieved July 1, 2013.\r\n146. ^ \"CNN/ORC Poll for release June 17, 2013\" (PDF). Archived (PDF) from the original on June 26, 2013. Retrieved\r\nJuly 6, 2013.\r\n147. ^ \"U.S. Voters Say Snowden Is Whistle-Blower, Not Traitor, Quinnipiac University National Poll Finds; Big Shift On\r\nCivil Liberties vs. Counter-Terrorism\". Quinnipiac University. July 10, 2013. Archived from the original on July 14,\r\n2013. Retrieved July 13, 2012.\r\n148. ^ \"Terrorism\". PollingReport.com. Archived from the original on July 28, 2013. Retrieved July 13, 2013.\r\n149. ^ Cohen, Jon; Balz, Dan (July 24, 2013). \"Poll: Privacy concerns rise after NSA leaks\". Washington Post. Archived\r\nfrom the original on January 27, 2014. Retrieved July 25, 2013.\r\n150. ^ Castro, Daniel (August 2013). \"How Much Will PRISM Cost the U.S. Cloud Computing Industry?\" (PDF). The\r\nInformation Technology and Innovation Foundation. Archived (PDF) from the original on August 10, 2013.\r\nRetrieved August 11, 2013.\r\n151. ^ Peterson, Andrea (August 7, 2013). \"NSA snooping could cost U.S. tech companies $35 billion over three years\".\r\nThe Washington Post. Retrieved August 8, 2013.\r\n152. ^ Rosenbush, Steve (August 6, 2013). \"Cloud Industry Could Lose Billions on NSA Disclosures\". The Wall Street\r\nJournal. Archived from the original on August 9, 2013. Retrieved August 8, 2013.\r\n153. ^ Yaron, Oded (August 8, 2013). \"Study: NSA leaks could cost U.S. $22–35 billion\". Haaretz. Archived from the\r\noriginal on August 9, 2013. Retrieved August 8, 2013.\r\n154. ^ Palmer, Danny (August 6, 2013). \"PRISM could cost US cloud firms $35bn but benefit European providers\".\r\ncomputing.co.uk. Archived from the original on August 13, 2013. Retrieved August 11, 2013.\r\n155. ^ Berman, Matt (June 12, 2013). \"International Response to NSA: WTF, America?\". National Journal (via Yahoo!\r\nNews). Archived from the original on June 15, 2013. Retrieved July 1, 2013.\r\n156. ^ Staff (June 25, 2013). \"World from Berlin: 'Do Costs of Hunting Terrorists Exceed Benefits?'\". Der Spiegel.\r\nArchived from the original on July 9, 2013. Retrieved July 1, 2013.\r\n157. ^ Fitsanakis, Joseph (June 20, 2013). \"Analysis: PRISM Revelations Harm US Political, Financial Interests\".\r\nIntelNews. Archived from the original on July 1, 2013. Retrieved July 1, 2013.\r\n158. ^ Murphy, Katherine (June 20, 2013). \"NSA Revelations Prompt Questions about Australian Intelligence Agencies –\r\nSenator Nick Xenophon Seeks Reassurances That Australian MPs Are Not Being Watched in Wake of Prism\r\nDisclosures\" Archived March 15, 2016, at the Wayback Machine. The Guardian. Retrieved July 1, 2013.\r\n159. ^ Sieff, Kevin (June 16, 2013). \"NSA Spying Leaks? Taliban Says: Ho-Hum\" Archived January 27, 2014, at the\r\nWayback Machine. The Washington Post (via the Pittsburgh Post-Gazette). Retrieved June 16, 2013.\r\n160. ^ Staff (June 16, 2013). \"Spy Programmes No Secret to Taliban\" Archived June 16, 2013, at the Wayback Machine.\r\nThe Washington Post (via the South China Morning Post). Retrieved June 16, 2013.\r\n161. ^ Jeremy Fleming (October 29, 2013). \"Brussels to set up security, business networks in push for European cloud\".\r\nEurActiv | EU News \u0026 policy debates, across languages. EurActiv. Archived from the original on January 25, 2014.\r\nRetrieved January 27, 2014.\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 28 of 31\n\n162. ^ FlorCruz, Michelle (June 7, 2013). \"Chinese Netizens Respond to NSA PRISM Data Mining Scandal\".\r\nInternational Business Times. Archived from the original on December 9, 2013. Retrieved June 13, 2013.\r\n163. ^ Staff (June 8, 2013). \"Obama Presses Chinese Leader on Cybersecurity\". Associated Press (via the Fox News\r\nChannel). Archived from the original on June 13, 2013. Retrieved June 13, 2013.\r\n164. ^ Guangjin, Cheng; Chan, Kahon (June 14, 2013). \"US Should 'Explain Hacking Activity'\" Archived December 9,\r\n2013, at the Wayback Machine. China Daily. Retrieved June 16, 2013.\r\n165. ^ Staff (June 11, 2013). \"China Media: US Whistleblower\" Archived March 1, 2019, at the Wayback Machine. BBC\r\nNews. Retrieved June 16, 2013.\r\n166. ^ Staff (June 13, 2013). \"H.K. Lawmakers Petition Obama for Leniency Against Whistleblower\" Archived June 16,\r\n2013, at the Wayback Machine. Kyodo News (via GlobalPost). Retrieved June 16, 2013.\r\n167. ^ Ai, Weiwei (June 11, 2013). \"NSA Surveillance: The US Is Behaving Like China – Both Governments Think They\r\nAre Doing What Is Best for the State and People – But, As I Know, Such Abuse of Power Can Ruin Lives\" Archived\r\nFebruary 1, 2017, at the Wayback Machine (archive). The Guardian. Retrieved June 13, 2013.\r\n168. ^ Jump up to: a\r\n \r\nb\r\n Collier, Kevin (June 7, 2013). \"Does the NSA's PRISM Spying Program Violate EU Law?\". The\r\nDaily Dot. Archived from the original on June 19, 2013. Retrieved June 13, 2013.\r\n169. ^ Meyer, David (June 7, 2013). \"Europeans Call for Answers over U.S. Web Spying Allegations\". GigaOM. Archived\r\nfrom the original on June 12, 2013. Retrieved June 13, 2013.\r\n170. ^ Staff (June 10, 2013). \"Späh-Programm der NSA: Merkel will Prism-Skandal bei Obama-Besuch ansprechen\"\r\n[NSA Spying Program: Merkel Will Address PRISM-Scandal at Obama Visit]. Spiegel Online (in German). Archived\r\nfrom the original on September 25, 2013. Retrieved June 11, 2013.\r\n171. ^ Schofield, Matthew (June 26, 2013). \"Memories of Stasi Color Germans' View of U.S. Surveillance Programs\"\r\nArchived June 28, 2013, at the Wayback Machine. McClatchy Washington Bureau. Retrieved July 1, 2013.\r\n172. ^ Roberts, Dan; MacAskill, Ewen; Ball, James (June 10, 2013). \"Obama Pressured over NSA Snooping as US\r\nSenator Denounces 'Act of Treason' – Information Chiefs Worldwide Sound Alarm While US Senator Dianne\r\nFeinstein Orders NSA to Review Monitoring Program\". The Guardian. Archived from the original on August 22,\r\n2013. Retrieved June 10, 2013.\r\n173. ^ \"Facebook, WhatsApp Fined by Spain for Failure to Obtain Consent\". news.bloomberglaw.com. Retrieved\r\nDecember 12, 2020.\r\n174. ^ Jump up to: a\r\n \r\nb\r\n \r\nc\r\n Osborn, Andrew; Young, Sarah (June 10, 2013). \"UK Government Rejects Accusations Its Use of\r\nU.S. Spy System Was Illegal\". Reuters UK. Archived from the original on June 13, 2013. Retrieved June 13, 2013.\r\n175. ^ Jump up to: a\r\n \r\nb\r\n Young, Sarah (June 10, 2013). \"UK's Cameron Defends Spy Agencies over PRISM Cyber-Snooping\". Reuters (via Yahoo! News). Archived from the original on June 15, 2013. Retrieved July 2, 2013.\r\n176. ^ wcoats (June 11, 2013). \"Government Surveillance and the Right to Privacy\". Warren's space. Retrieved December\r\n12, 2020.\r\n177. ^ Bradshaw, Tim (2013). \"Tim Berners-Lee is \"deeply concerned\" about PRISM\". Financial Times. Retrieved June\r\n15, 2020.\r\n178. ^ \"Salman Khurshid defends US surveillance programme, says 'it is not snooping'\". IBNLive. Ibnlive.in.com. July 2,\r\n2013. Archived from the original on October 27, 2013. Retrieved July 14, 2013.\r\n179. ^ \"India sees 'no reason to say yes' to asylum for Snowden\". Hindustan Times. July 2, 2013. Archived from the\r\noriginal on July 23, 2013. Retrieved July 14, 2013.\r\n180. ^ \"It is not actually snooping: Khurshid on US surveillance\". The Hindu. PTI. July 2, 2013. Archived from the\r\noriginal on July 6, 2013. Retrieved July 14, 2013.\r\n181. ^ \"Khurshid, Sibal at odds over US snooping\". The Times of India. July 3, 2013. Retrieved July 14, 2013. {{cite\r\nnews}} : CS1 maint: deprecated archival service (link)\r\n182. ^ Muzaffar, Maroosha (July 4, 2013). \"Why India is taking the U.S.'s Side in the Snowden Scandal\". New Republic.\r\nArchived from the original on October 29, 2013. Retrieved July 14, 2013.\r\n183. ^ Brindaalakshmi K (July 8, 2013). \"MP Starts Public Petition For Disclosure Of Indian Data Accessed By PRISM\".\r\nMediaNama. Archived from the original on July 9, 2013. Retrieved July 14, 2013.\r\n184. ^ Champion, Marc (July 8, 2013). \"Indians See a Gift in NSA Leaks\". Bloomberg. Archived from the original on July\r\n13, 2013. Retrieved July 14, 2013.\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 29 of 31\n\n185. ^ \"Why India needs to speak up!\". Rediff.com. July 5, 2013. Archived from the original on July 10, 2013. Retrieved\r\nJuly 14, 2013.\r\n186. ^ Shiv Visvanathan (July 4, 2013). \"Why India needs to speak up!\". Firstpost. Archived from the original on July 6,\r\n2013. Retrieved July 15, 2013.\r\n187. ^ \"India rejects Snowden's request for asylum, Khurshid backs surveillance\". Indian Express. July 3, 2013. Archived\r\nfrom the original on July 19, 2013. Retrieved July 14, 2013.\r\n188. ^ \"Rajya Sabha MP P Rajeev slams Khurshid on US surveillance issue\". The Times of India. July 3, 2013. Retrieved\r\nJuly 14, 2013. {{cite news}} : CS1 maint: deprecated archival service (link)\r\n189. ^ Jump up to: a\r\n \r\nb\r\n \r\nc\r\n \r\nd\r\n \r\ne\r\n \r\nf\r\n \r\ng\r\n \r\nh\r\n \r\ni\r\n \r\nj\r\n \r\nk\r\n \"Title 50, section 1881a. Procedures for targeting certain persons outside the United\r\nStates other than United States persons\". US Code. Cornell. Archived from the original on July 16, 2013. Retrieved\r\nJuly 29, 2013.\r\n190. ^ Gage, Beverly (June 7, 2013). \"Somewhere, J. Edgar Hoover Is Smiling Archived June 10, 2013, at the Wayback\r\nMachine – The FBI Director and Notorious Snoop Would Have Loved PRISM.\" Slate. Retrieved June 18, 2013.\r\n191. ^ Kaufman, Brett Max (June 11, 2013). \"ACLU Files Lawsuit Challenging NSA's Patriot Act Phone Surveillance\"\r\nArchived March 25, 2015, at the Wayback Machine. Free Future (blog of the American Civil Liberties Union).\r\nRetrieved June 13, 2013.\r\n192. ^ Press release (June 11, 2013). Media Freedom and Information Access Clinic, ACLU Ask Spy Court to Release\r\nSecret Opinions on Patriot Act Surveillance Powers\". Yale Law School. Retrieved July 2, 2013.\r\n193. ^ \"Second Class Action over Obama/NSA Alleged Privacy Abuse – Klayman Sues Obama, Holder, NSA and 12 More\r\nComplicit 'PRISM' Companies\". freedomwatchusa.org (Press release). June 12, 2013. Archived from the original on\r\nJune 18, 2013. Retrieved July 2, 2013. (direct link to lawsuit Archived August 7, 2013, at the Wayback Machine;\r\nPDF format)\r\n194. ^ Donohue, Laura K. (June 21, 2013). \"NSA Surveillance May Be Legal – But It's Unconstitutional\". The Washington\r\nPost. Retrieved June 29, 2013.\r\n195. ^ Dwoskin, Elizabeth (June 13, 2013). \"Rand Paul Recruits for a Class Action Against NSA\" Archived June 17,\r\n2013, at the Wayback Machine. Bloomberg Businessweek. Retrieved June 29, 2013.\r\n196. ^ Office, Communications (December 10, 2012). \"FISA Correspondence Update | U.S. Senator Ron Wyden\".\r\nWyden.senate.gov. Archived from the original on February 27, 2013. Retrieved June 9, 2013.\r\n197. ^ \"Download | U.S. Senator Ron Wyden\". Wyden.senate.gov. Archived from the original on March 6, 2013. Retrieved\r\nJune 9, 2013.\r\n198. ^ I. Charles McCullough to Ron Wyden \u0026 Mark Udall (June 15, 2012), via Wired.com:\r\nhttps://www.wired.com/images_blogs/dangerroom/2012/06/IC-IG-Letter.pdf (Archive).\r\n199. ^ Briefing on the Foreign Intelligence Surveillance Act (FISA) Amendments Act of 2008 (FAA): Section 702\r\n(September 23, 2010), via ACLU.org: https://www.aclu.org/files/pdfs/natsec/faafoia20101129/FAAFBI0065.pdf\r\n(Archive).\r\n200. ^ \"FAA FOIA Documents | American Civil Liberties Union\". Aclu.org. December 2, 2010. Archived from the original\r\non July 13, 2013. Retrieved June 9, 2013.\r\n201. ^ \"Sen. Paul to Introduce Fourth Amendment Restoration Act of 2013 Rand Paul | United States Senator\".\r\nPaul.senate.gov. Archived from the original on June 9, 2013. Retrieved October 5, 2013.\r\n202. ^ \"113th Congress: 1st Session: A Bill to stop the National Security Agency from spying on citizens of the United\r\nStates and for other purposes\" (PDF). Paul.senate.gov. Archived from the original (PDF) on October 12, 2013.\r\nRetrieved October 5, 2013.\r\n203. ^ Jump up to: a\r\n \r\nb\r\n \r\nc\r\n \r\nd\r\n \"NSA says there are three different PRISMs\". Top Level Telecommunications. July 26, 2013.\r\nArchived from the original on August 10, 2013. Retrieved August 27, 2013.\r\n204. ^ Drum, Kevin (June 10, 2013). \"What Does PRISM Do? How Does It Work? Take 2\". Kevin Drum (blog of Mother\r\nJones). Archived from the original on June 19, 2013. Retrieved June 18, 2013.\r\n205. ^ Ball, James (June 8, 2013). \"NSA's Prism surveillance program: how it works and what it can do\". The Guardian.\r\nArchived from the original on July 31, 2013. Retrieved July 11, 2013.\r\n206. ^ Timberg, Craig (July 10, 2013). \"The NSA slide you haven't seen\". The Washington Post. Archived from the\r\noriginal on July 10, 2013. Retrieved July 11, 2013.\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 30 of 31\n\n207. ^ Craig Timberg \u0026 Ellen Nakashima (July 6, 2013). \"Agreements with private companies protect U.S. access to\r\ncables' data for surveillance\". The Washington Post. Retrieved April 10, 2014.\r\n208. ^ Lindemann, Todd (July 6, 2013). \"A connected world\". The Washington Post. Archived from the original on\r\nDecember 14, 2018. Retrieved February 12, 2014.\r\n209. ^ Bamford, James (July 12, 2013). \"They Know Much More Than You Think\". The New York Review of Books.\r\nArchived from the original on July 27, 2013. Retrieved July 29, 2013.\r\n210. ^ Gellman, Barton; Poitras, Laura (June 6, 2013). \"Codename PRISM: Secret Government Program Mines Data\r\nfrom 9 U.S. Internet Companies, Including Photographs, Email and More\". The Washington Post (via The\r\nRepublican). Archived from the original on June 10, 2013. Retrieved June 13, 2013.\r\n211. ^ Gallagher, Ryan (September 9, 2013). \"New Snowden Documents Show NSA Deemed Google Networks a\r\n\"Target\"\". Archived from the original on October 26, 2013. Retrieved September 10, 2013.\r\n212. ^ \"NSA Documents Show United States Spied Brazilian Oil Giant\". September 8, 2013. Archived from the original on\r\nMarch 11, 2014. Retrieved September 9, 2013.\r\n213. ^ Gellman, Barton; Soltani, Ashkan (October 30, 2013). \"NSA infiltrates links to Yahoo, Google data centers\r\nworldwide, Snowden documents say\". The Washington Post. Archived from the original on April 6, 2014. Retrieved\r\nOctober 31, 2013.\r\n214. ^ Gallagher, Sean (October 31, 2013). \"How the NSA's MUSCULAR tapped Google's and Yahoo's private networks\".\r\nArs Technica. Archived from the original on March 12, 2017. Retrieved November 1, 2013.\r\nGellman, Barton; Lindeman, Todd (June 10, 2013). \"Inner workings of a top-secret spy program\". The Washington\r\nPost. Archived from the original on August 30, 2017. Retrieved September 7, 2017. Annotated presentation how the\r\nNSA PRISM program works.\r\nHallam-Baker, Phillip. \"PRISM-Proof Security Considerations\". Internet Engineering Task Force. Draft. Archived\r\nfrom the original on October 17, 2013.\r\n\"NSA Spying How It Works\". Electronic Frontier Foundation. December 3, 2012. Timeline and details about the\r\nevents.\r\nSottek, T.C. \u0026 Kopfstein, Janus (July 17, 2013). \"Everything you need to know about PRISM (press compilation)\".\r\nThe Verge.\r\n\"Surveillance Self-Defense\". Electronic Frontier Foundation. Detailed how-to enabling average citizens to take steps\r\nto defend their privacy\r\n\"The Government Is Profiling You\". Video.MIT.edu. Video explaining the recent history of domestic spying at NSA.\r\nTop Level Telecommunications. \"What is known about NSA's PRISM program\". Electrospaces. Retrieved April 23,\r\n2014. A detailed explanation of all known slides about the PRISM program and its inner workings.\r\nZhong, Peng. \"A list of alternatives to software and systems that are vulnerable to eavesdropping\". PRISM-break.org.\r\nAdam Hart-Davis. \"DHD Multimedia Gallery: Natural Science: Prism 2\". Source of PRISM logo.\r\n\"Top Secret America\". Frontline. April 30, 2013. PBS. WGBH. Retrieved April 8, 2025.\r\n\"United States of Secrets (Part Two): Privacy Lost\". Frontline. Season 32. Episode 10. May 20, 2014. PBS. WGBH.\r\nRetrieved April 8, 2025.\r\nSource: https://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nhttps://en.wikipedia.org/wiki/PRISM_(surveillance_program)\r\nPage 31 of 31\n\n29. ^ \"Espionnage the original de la NSA: tous on October 22, 2013. les documents Retrieved October publiés par 'Le 22, 2013. Monde'\". Le Monde. October 21, 2013. Archived from\n30. ^ \"NSA Prism program slides\". The Guardian. November 1, 2013. Archived from the original on March 20, 2014.\nRetrieved March 19, 2014.     \n31. ^ Jump up to: a b Gates, David Edgerley (June 26, 2013). \"Through a Glass, Darkly\". Spying. Santa Fe:\nSleuthSayers. Archived from the original on January 25, 2014. Retrieved January 4, 2014. \n32. ^ Jump up to: a b Lundin, Leigh (July 7, 2013). \"Pam, Prism, and Poindexter\". Spying. Washington: SleuthSayers.\nArchived from the original on January 4, 2014. Retrieved January 4, 2014.  \n33. ^ Dean, John W. (December 30, 2005). \"George W. Bush as the New Richard M. Nixon: Both Wiretapped Illegally,\nand Impeachable; Both Claimed That a President May Violate Congress' Laws to Protect National Security\".\nFindLaw. Archived from the original on March 4, 2016. Retrieved June 12, 2013.  \n34. ^ Holtzman, Elizabeth (January 11, 2006). \"The Impeachment of George W. Bush\". The Nation. Archived from the\noriginal on July 2, 2013. Retrieved June 12, 2013.    \n35. ^ \"Adopted by the House of Delegates\" (PDF). American Bar Association. February 13, 2006. Archived from the\noriginal (PDF) on March 4, 2016. Retrieved August 26, 2013.   \n36. ^ Staff (February 14, 2006). \"Lawyers Group Criticizes Surveillance Program\" Archived December 3, 2017, at the\nWayback Machine. The Washington Post. Retrieved June 15, 2013.  \n37. ^ Jump up to: a b McAllister, Neil (December 29, 2012). \"Senate Votes to Continue FISA Domestic Spying Through\n2017-All Proposed Privacy Amendments Rejected\". The Register. Archived from the original on June 7, 2013.\nRetrieved June 15, 2013.     \n38. ^ \"H.R. 5949 (112th Congress): FISA Amendments Act Reauthorization Act of 2012\". Archived from the original on\nMay 20, 2013. Retrieved June 19, 2013.    \n39. ^ Jump up to: a b c d Privacy and Civil Liberties Oversight Board, \"Report on the Surveillance Program Operated\nPursuant to Section 702 of the Foreign Intelligence Surveillance Act\" (PDF). pclob.gov. July 2, 2014. Archived\n(PDF) from the original on February 18, 2015. Retrieved February 19, 2015.  \n40. ^ \"FBI, CIA Use Backdoor Searches To Warrentlessly Spy On Americans' Communications\". TechDirt. June 30,\n2014. Archived from the original on February 19, 2015. Retrieved February 19, 2015. \n41. ^ \"NSA slides explain the PRISM data-collection program\". July 10, 2013. Archived from the original on March 15,\n2014. Retrieved September 7, 2017. An annotated presentation of the NSA PRISM program as published by the\nWashington Post on 6 June 2013 and updated on 10 July 2013   \n42. ^ Glenn Greenwald; Ewen MacAskill; Laura Poitras; Spencer Ackerman; Dominic Rushe (July 11, 2013).\n\"Revealed: how Microsoft handed the NSA access to encrypted messages\". The Guardian. Archived from the original\non November 19, 2015. Retrieved July 11, 2013.    \n43. ^ \"The NSA Files\". The Guardian. June 8, 2013. Archived from the original on October 3, 2014. Retrieved December\n12, 2016.      \n44. ^ Jump up to: a b Rea, Kari (July 28, 2013). \"Glenn Greenwald: Low-Level NSA Analysts Have 'Powerful and\nInvasive' Search Tool\". ABC News. Archived from the original on July 30, 2013. Retrieved July 30, 2013.\n45. ^ Glenn Greenwald (July 31, 2013). \"Revealed: NSA program collects 'nearly everything a user does on the\ninternet'\". Theguardian.com. Archived from the original on December 31, 2013. Retrieved January 27, 2014.\n46. ^ File:Prism-week-in-life-straight.png      \n47. ^ Jump up to: a b c \"DNI Statement on Activities Authorized Under Section 702 of FISA\". Director of National\nIntelligence. June 6, 2013. Archived from the original on June 7, 2013.  \n48. ^ Greenberg, Andy (June 6, 2013). \"Top U.S. Intelligence Officials Repeatedly Deny NSA Spying on Americans\".\nForbes. Archived from the original on June 10, 2013. Retrieved June 7, 2013.  \n49. ^ Shane, Scott; Sanger, David E. (June 30, 2013). \"Job Title Key to Inner Access Held by Snowden\". The New York\nTimes. Archived from the original on July 4, 2013. Retrieved June 30, 2013.  \n50. ^ \"TRANSCRIPT OF ANDREA MITCHELL'S INTERVIEW WITH DIRECTOR OF NATIONAL INTELLIGENCE \nJAMES CLAPPER\". NBC News. June 9, 2013. Archived from the original on September 8, 2015. \n51. ^ \"Obama Defends US Surveillance Programs\". Voice of America. Archived from the original on March 31, 2021.\nRetrieved November 1, 2020.     \n   Page 23 of 31   \n\n  https://en.wikipedia.org/wiki/PRISM_(surveillance_program)    \n97. ^ Loek Essers (February 17, 2014). \"Merkel and Hollande to talk about avoiding US servers\". ITworld. Archived\nfrom the original on February 21, 2014. Retrieved February 18, 2014.  \n98. ^ \"France Calls U.S. Ambassador Over Spying Report\"[permanent dead link] , Adrian Croft, Arshad Mohammed,\nAlexandria Sage, and Mark John, New York Times (Reuters), October 21, 2013. Retrieved October 21, 2013.\n99. ^ Prodhan, Georgina; Davenport, Claire (June 7, 2013). \"U.S. Surveillance Revelations Deepen European Fears of\nWeb Giants\" Archived September 24, 2015, at the Wayback Machine. Reuters. Retrieved June 16, 2013.\n100. ^ Jump up to: a b c Schofield, Matthew. (June 26, 2013). \"Memories of Stasi Color Germans' View of U.S.\nSurveillance Programs\" Archived June 28, 2013, at the Wayback Machine. McClatchy Washington Bureau. Retrieved\nJune 30, 2013.      \n101. ^ \"The German Army was using PRISM to support its operations in Afghanistan as early as 2011\". Der Spiegel (in\nGerman). July 17, 2013. Archived from the original on July 18, 2013. Retrieved July 18, 2013. \n102. ^ Jackson, David (October 23, 2013). \"Obama says NSA not spying on Merkel's cellphone\". USA Today. Archived\nfrom the original on October 23, 2013. Retrieved October 24, 2013.  \n103. ^ Smith-Spark, Laura (October 24, 2013). \"Merkel calls Obama: Spying on friends 'never acceptable'\". CNN.\nArchived from the original on October 25, 2013. Retrieved October 24, 2013.  \n104. ^ Sadan, Nitzan (June 8, 2013). \"Report: 'Big Brother' of the U.S. Government Relies on Israeli Technology\"\n(Google English translation of Hebrew article) Archived January 7, 2017, at the Wayback Machine. Calcalist.\nRetrieved June 10, 2013.     \n105. ^ Kelley, Michael (June 7, 2013). \"Did You Know?: Two Secretive Israeli Companies Reportedly Bugged the US\nTelecommunications Grid for the NSA\" Archived June 9, 2013, at the Wayback Machine. Business Insider. Retrieved\nJune 10, 2013.      \n106. ^ Villamil, Jenaro (June 18, 2013).\"Big Brother y CISEN millionario negocio en puerta.\" Archived June 23, 2013, at\nthe Wayback Machine proceso.com.mx. Retrieved February 19, 2014.  \n107. ^ McCorkindale, Wilma (June 11, 2013). \"Expert Says Kiwis under Constant Surveillance\" Archived October 6,\n2013, at the Wayback Machine. Stuff.co.nz. Retrieved June 12, 2013.  \n108. ^ \"Dotcom doubts big reveal will hurt Key\". The New Zealand Herald. September 9, 2014. Archived from the\noriginal on October 5, 2014. Retrieved October 5, 2014.   \n109. ^ \"Spain Summons American Ambassador on New Reports of N.S.A. Spying\" Archived March 28, 2017, at the\nWayback Machine, Raphael Minder, New York Times, October 28, 2013. Retrieved October 29, 2013.\n110. ^ \"Statement on GCHQ's Alleged Interception of Communications under the US PRISM Programme\" (PDF).\nIntelligence and Security Committee of Parliament. July 17, 2013. Retrieved December 17, 2013. \n111. ^ \"NSA files: why the Guardian in London destroyed hard drives of leaked files\" Archived February 4, 2017, at the\nWayback Machine The Guardian, 20 August 2013   \n112. ^ Farivar, Cyrus (June 6, 2013). \"New Leak Shows Feds Can Access User Accounts for Google, Facebook and More\n-Secret Slides Reveal Massive Government Spying, Tech Companies Dispute Reports\". Ars Technica. Archived from\nthe original on June 10, 2013. Retrieved June 12, 2013.   \n113. ^ Jump up to: a b c d e f Lardinois, Frederic (June 6, 2013). \"Google, Facebook, Dropbox, Yahoo, Microsoft and\nApple Deny Participation in NSA PRISM Surveillance Program\". TechCrunch. Archived from the original on June\n13, 2013. Retrieved June 12, 2013.    \n114. ^ Jump up to: a b c d Lee, Timothy B. (June 12, 2013). \"Here's Everything We Know About PRISM to Date\".\nWonkblog (blog of The Washington Post). Archived from the original on June 14, 2013. Retrieved June 13, 2013.\n115. ^ Bekker, Scott (June 20, 2013). \"PRISM and Microsoft: What We Know So Far\". Redmond Channel Partner.\nArchived from the original on July 26, 2013. Retrieved July 12, 2013.  \n116. ^ Jump up to: a b LeFebvre, Rob (June 7, 2013). \"Everything You Need To Know About Apple And PRISM\n[Updated]\". Cult of Mac. Archived from the original on June 9, 2013. Retrieved February 26, 2019. \n117. ^ Stern, Joanna (June 7, 2013). \"Dissecting Big Tech's Denial of Involvement in NSA's PRISM Spying Program\".\nABC News. Archived from the original on June 12, 2013. Retrieved June 13, 2013.  \n118. ^ Elias, Paul (May 31, 2013). \"Judge Orders Google to Turn Over Data to FBI\". Associated Press (via Yahoo!\nNews). Archived from the original on June 8, 2013. Retrieved June 15, 2013.  \n   Page 26 of 31   \n\n  https://en.wikipedia.org/wiki/PRISM_(surveillance_program)    \n185. ^ \"Why India needs to speak up!\". Rediff.com. July 5, 2013. Archived from the original on July 10, 2013. Retrieved\nJuly 14, 2013.      \n186. ^ Shiv Visvanathan (July 4, 2013). \"Why India needs to speak up!\". Firstpost. Archived from the original on July 6,\n2013. Retrieved July 15, 2013.     \n187. ^ \"India rejects Snowden's request for asylum, Khurshid backs surveillance\". Indian Express. July 3, 2013. Archived\nfrom the original on July 19, 2013. Retrieved July 14, 2013.   \n188. ^ \"Rajya Sabha MP P Rajeev slams Khurshid on US surveillance issue\". The Times of India. July 3, 2013. Retrieved\nJuly 14, 2013. {{cite news}} : CS1 maint: deprecated archival service (link)  \n189. ^ Jump up to: a b c d e f g h i j k \"Title 50, section 1881a. Procedures for targeting certain persons outside the United\nStates other than United States persons\". US Code. Cornell. Archived from the original on July 16, 2013. Retrieved\nJuly 29, 2013.      \n190. ^ Gage, Beverly (June 7, 2013). \"Somewhere, J. Edgar Hoover Is Smiling Archived June 10, 2013, at the Wayback\nMachine- The FBI Director and Notorious Snoop Would Have Loved PRISM.\" Slate. Retrieved June 18, 2013.\n191. ^ Kaufman, Brett Max (June 11, 2013). \"ACLU Files Lawsuit Challenging NSA's Patriot Act Phone Surveillance\"\nArchived March 25, 2015, at the Wayback Machine. Free Future (blog of the American Civil Liberties Union).\nRetrieved June 13, 2013.     \n192. ^ Press release (June 11, 2013). Media Freedom and Information Access Clinic, ACLU Ask Spy Court to Release\nSecret Opinions on Patriot Act Surveillance Powers\". Yale Law School. Retrieved July 2, 2013. \n193. ^ \"Second Class Action over Obama/NSA Alleged Privacy Abuse -Klayman Sues Obama, Holder, NSA and 12 More\nComplicit 'PRISM' Companies\". freedomwatchusa.org (Press release). June 12, 2013. Archived from the original on\nJune 18, 2013. Retrieved July 2, 2013. (direct link to lawsuit Archived August 7, 2013, at the Wayback Machine;\nPDF format)      \n194. ^ Donohue, Laura K. (June 21, 2013). \"NSA Surveillance May Be Legal-But It's Unconstitutional\".  The Washington\nPost. Retrieved June 29, 2013.     \n195. ^ Dwoskin, Elizabeth (June 13, 2013). \"Rand Paul Recruits for a Class Action Against NSA\" Archived June 17,\n2013, at the Wayback Machine. Bloomberg Businessweek. Retrieved June 29, 2013.  \n196. ^ Office, Communications (December 10, 2012). \"FISA Correspondence Update | U.S. Senator Ron Wyden\".\nWyden.senate.gov. Archived from the original on February 27, 2013. Retrieved June 9, 2013. \n197. ^ \"Download | U.S. Senator Ron Wyden\". Wyden.senate.gov. Archived from the original on March 6, 2013. Retrieved\nJune 9, 2013.      \n198. ^ I. Charles McCullough to Ron Wyden \u0026 Mark Udall (June 15, 2012), via Wired.com:  \nhttps://www.wired.com/images_blogs/dangerroom/2012/06/IC-IG-Letter.pdf    (Archive).  \n199. ^ Briefing on the Foreign Intelligence Surveillance Act (FISA) Amendments Act of 2008 (FAA): Section 702\n(September 23, 2010), via ACLU.org: https://www.aclu.org/files/pdfs/natsec/faafoia20101129/FAAFBI0065.pdf    \n(Archive).      \n200. ^ \"FAA FOIA Documents | American Civil Liberties Union\". Aclu.org. December 2, 2010. Archived from the original\non July 13, 2013. Retrieved June 9, 2013.    \n201. ^ \"Sen. Paul to Introduce Fourth Amendment Restoration Act of 2013 Rand Paul | United States Senator\". \nPaul.senate.gov. Archived from the original on June 9, 2013. Retrieved October 5, 2013.  \n202. ^ \"113th Congress: 1st Session: A Bill to stop the National Security Agency from spying on citizens of the United\nStates and for other purposes\" (PDF). Paul.senate.gov. Archived from the original (PDF) on October 12, 2013.\nRetrieved October 5, 2013.     \n203. ^ Jump up to: a b c d \"NSA says there are three different PRISMs\". Top Level Telecommunications. July 26, 2013.\nArchived from the original on August 10, 2013. Retrieved August 27, 2013.  \n204. ^ Drum, Kevin (June 10, 2013). \"What Does PRISM Do? How Does It Work? Take 2\". Kevin Drum (blog of Mother\nJones). Archived from the original on June 19, 2013. Retrieved June 18, 2013.  \n205. ^ Ball, James (June 8, 2013). \"NSA's Prism surveillance program: how it works and what it can do\". The Guardian.\nArchived from the original on July 31, 2013. Retrieved July 11, 2013.  \n206. ^ Timberg, Craig (July 10, 2013). \"The NSA slide you haven't seen\". The Washington Post. Archived from the\noriginal on July 10, 2013. Retrieved July 11, 2013.   \n   Page 30 of 31",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://en.wikipedia.org/wiki/PRISM_(surveillance_program)"
	],
	"report_names": [
		"PRISM_(surveillance_program)"
	],
	"threat_actors": [
		{
			"id": "5d2bd376-fcdc-4c6a-bc2c-17ebbb5b81a4",
			"created_at": "2022-10-25T16:07:23.667223Z",
			"updated_at": "2026-04-10T02:00:04.705778Z",
			"deleted_at": null,
			"main_name": "GCHQ",
			"aliases": [
				"Government Communications Headquarters",
				"Operation Socialist"
			],
			"source_name": "ETDA:GCHQ",
			"tools": [
				"Prax",
				"Regin",
				"WarriorPride"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "f9806b99-e392-46f1-9c13-885e376b239f",
			"created_at": "2023-01-06T13:46:39.431871Z",
			"updated_at": "2026-04-10T02:00:03.325163Z",
			"deleted_at": null,
			"main_name": "Watchdog",
			"aliases": [
				"Thief Libra"
			],
			"source_name": "MISPGALAXY:Watchdog",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775434898,
	"ts_updated_at": 1775791857,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/5dd3f5f6b255d8d5d40cdf7ec800bc5e936e3376.pdf",
		"text": "https://archive.orkl.eu/5dd3f5f6b255d8d5d40cdf7ec800bc5e936e3376.txt",
		"img": "https://archive.orkl.eu/5dd3f5f6b255d8d5d40cdf7ec800bc5e936e3376.jpg"
	}
}