{"id":29956,"date":"2013-06-10T12:00:07","date_gmt":"2013-06-10T11:00:07","guid":{"rendered":"http:\/\/www.transcend.org\/tms\/?p=29956"},"modified":"2015-05-06T12:52:55","modified_gmt":"2015-05-06T11:52:55","slug":"nsa-prism-program-taps-in-to-user-data-of-apple-google-and-others","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2013\/06\/nsa-prism-program-taps-in-to-user-data-of-apple-google-and-others\/","title":{"rendered":"NSA Prism Program Taps In to User Data of Apple, Google and Others"},"content":{"rendered":"<p style=\"text-align: left;\"><i>\u2022 Top-secret Prism program claims direct access to servers of firms including Google, Apple and Facebook<br \/>\n\u2022 Companies deny any knowledge of program in operation since 2007<\/i><br \/>\n<i>\u2022 <a target=\"_blank\" href=\"http:\/\/www.guardian.co.uk\/world\/2013\/jun\/07\/obama-china-targets-cyber-overseas\" >Obama orders US to draw up overseas target list for cyber-attacks<\/a><br \/>\n<\/i><\/p>\n<div id=\"attachment_29957\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2013\/06\/Prism-008.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-29957\" class=\"size-medium wp-image-29957\" src=\"http:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2013\/06\/Prism-008-300x180.jpg\" alt=\"A slide depicting the top-secret PRISM program.\" width=\"300\" height=\"180\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2013\/06\/Prism-008-300x180.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2013\/06\/Prism-008.jpg 460w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-29957\" class=\"wp-caption-text\">A slide depicting the top-secret PRISM program.<\/p><\/div>\n<p style=\"text-align: left;\">The National Security Agency has obtained direct access to the systems of Google, Facebook, <a target=\"_blank\" href=\"http:\/\/www.guardian.co.uk\/technology\/apple\" title=\"More from guardian.co.uk on Apple\" >Apple<\/a> and other US <a target=\"_blank\" href=\"http:\/\/www.guardian.co.uk\/technology\/internet\" title=\"More from guardian.co.uk on Internet\" >internet<\/a> giants, according to a top secret document obtained by the Guardian.<\/p>\n<p style=\"text-align: left;\">The NSA access is part of a previously undisclosed program called Prism, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says.<\/p>\n<p style=\"text-align: left;\">The Guardian has verified the authenticity of the document, a 41-slide PowerPoint presentation \u2013 classified as top secret with no distribution to foreign allies \u2013 which was apparently used to train intelligence operatives on the capabilities of the program. The document claims &#8220;collection directly from the servers&#8221; of major US service providers.<\/p>\n<p style=\"text-align: left;\">Although the presentation claims the program is run with the assistance of the companies, all those who responded to a Guardian request for comment on Thursday denied knowledge of any such program.<\/p>\n<p style=\"text-align: left;\">In a statement, Google said: &#8220;Google cares deeply about the security of our users&#8217; data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government &#8216;back door&#8217; into our systems, but Google does not have a back door for the government to access private user data.&#8221;<\/p>\n<p style=\"text-align: left;\">Several senior tech executives insisted that they had no knowledge of Prism or of any similar scheme. They said they would never have been involved in such a program. &#8220;If they are doing this, they are doing it without our knowledge,&#8221; one said.<\/p>\n<p style=\"text-align: left;\">An Apple spokesman said it had &#8220;never heard&#8221; of Prism.<\/p>\n<p style=\"text-align: left;\">The NSA access was enabled by changes to US surveillance law introduced under President Bush and renewed under Obama in December 2012.<\/p>\n<p style=\"text-align: left;\">The program facilitates extensive, in-depth surveillance on live communications and stored information. The law allows for the targeting of any customers of participating firms who live outside the US, or those Americans whose communications include people outside the US.<\/p>\n<p style=\"text-align: left;\">It also opens the possibility of communications made entirely within the US being collected without warrants.<\/p>\n<p style=\"text-align: left;\">Disclosure of the Prism program follows a leak to the Guardian on Wednesday of a top-secret court order compelling <a target=\"_blank\" href=\"http:\/\/www.guardian.co.uk\/technology\/telecoms\" title=\"More from guardian.co.uk on Telecoms\" >telecoms<\/a> provider Verizon to turn over the telephone records of millions of US customers.<\/p>\n<p style=\"text-align: left;\">The participation of the internet companies in Prism will add to the debate, ignited by the Verizon revelation, about the scale of surveillance by the intelligence services. Unlike the collection of those call records, this surveillance can include the content of communications and not just the metadata.<\/p>\n<p style=\"text-align: left;\">Some of the world&#8217;s largest internet brands are claimed to be part of the information-sharing program since its introduction in 2007. <a target=\"_blank\" href=\"http:\/\/www.guardian.co.uk\/technology\/microsoft\" title=\"More from guardian.co.uk on Microsoft\" >Microsoft<\/a> \u2013 which is currently running an advertising campaign with the slogan &#8220;Your <a target=\"_blank\" href=\"http:\/\/www.guardian.co.uk\/world\/privacy\" title=\"More from guardian.co.uk on Privacy\" >privacy<\/a> is our priority&#8221; \u2013 was the first, with collection beginning in December 2007.<\/p>\n<p style=\"text-align: left;\">It was followed by Yahoo in 2008; Google, Facebook and PalTalk in 2009; YouTube in 2010; Skype and AOL in 2011; and finally Apple, which joined the program in 2012. The program is continuing to expand, with other providers due to come online.<\/p>\n<p style=\"text-align: left;\">Collectively, the companies cover the vast majority of online email, search, video and communications networks.<\/p>\n<p style=\"text-align: left;\">_________________________<\/p>\n<p style=\"text-align: left;\"><i>Glenn Greenwald is a columnist on civil liberties and US national security issues for the Guardian. A former constitutional lawyer, he was until 2012 a contributing writer at <a target=\"_blank\" href=\"http:\/\/www.salon.com\" >Salon<\/a>. He is the author of <\/i>How Would a Patriot Act?<i> (May 2006), a critique of the Bush administration&#8217;s use of executive power.<\/i><\/p>\n<p style=\"text-align: left;\"><a target=\"_blank\" href=\"http:\/\/www.guardian.co.uk\/world\/2013\/jun\/06\/us-tech-giants-nsa-data\" >Go to Original \u2013 guardian.co.uk<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u2022 Top-secret Prism program claims direct access to servers of firms including Google, Apple and Facebook<br \/>\n\u2022 Companies deny any knowledge of program in operation since 2007<br \/>\n\u2022 Obama orders US to draw up overseas target list for cyber-attacks<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[65,62,139,60],"tags":[],"class_list":["post-29956","post","type-post","status-publish","format-standard","hentry","category-anglo-america","category-media","category-justice","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/29956","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=29956"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/29956\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=29956"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=29956"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=29956"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}