The access to the data or information, it is captured using a program called PRISM.
This is the mass electronic surveillance program, operated by US National security agency since the year 2007 (Kopstein, 2013). There are lot of people that still do not know about the PRISM, the basic idea is it collects information regarding an individual or many from world’s major technology companies like Google, Microsoft, Yahoo, Facebook, and Apple etc. whenever requested by National security agency.
As this has become the burning issue, the focus of the people has turned towards PRSIM on how it does and what all it consist of? There were many misunderstandings in the beginning, in some articles it been mentioned that PRISM is just tool for analysing the data rather than collecting the information. Some other has speculated that the companies were not providing the direct access to their servers or database. (Ball, 2013)
PRISM is more likely to be a Web-based application or a search engine rather than like a program, a huge big data operation that uses the algorithms, natural languages and search syntax to transmit data to NSA. (Whittaker, 2013)
PRISM a Big Deal
Former NSA contractor Snowden leaked the presentation slides based on the PRISM. The Washington post has published the report based on these slides on June 6 stating that NSA has direct access to the server of Google, Facebook and other US private companies, but these organizations deny the participation in PRISM (Kopstein, 2013)
NSA uses this PRISM program to target the encrypted communications when they travelled across the internet. It has been also found the NSA collects 2 kinds of Data i.e. metadata and other Content, Metadata is nothing but a sensitive by-product of comm...
... middle of paper ...
...ting you from this surveillance programs
• Using the software’s or websites, which are, not involve directly or indirectly with any global surveillance.
• Using operating systems like Debian, fedora, Open BSD etc...
• Installing Web Browser Add-ons for example Installing Ad block Edge will prevent the users from been tracked. It blocks the advertisements.
• Use the unlogged web searches, like DuckDuckGo. It a SaaS, which provides anonymous search responses. Similar to it the other software named as MetaGer, which is also a SaaS.
• Using open PGP “Pretty Good Privacy”, PGP is as type of Data Encryption and Decryption programs, which provide privacy by applying cryptography.
• Off the Record Messaging provides strong encryption for messaging service, which uses a combination of AES, The Diffie-Hellman key exchange and the SHA-1 hash function e.g. Pidgin (Anon., n.d.)
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Introduction In recent years the National Security Agency (NSA) has received extensive scrutiny as a result of their disclosed participation in nationwide surveillance programs that ultimately violates thousands of innocent American’s privacy rights. Only recently has the exposure been brought the forefront of media headlines, still the NSA privacy violations date back to the early 2000s when the domestic spying program known as the “President’s Surveillance Program,” was implemented by President George W.... [tags: spied computer games, oreign surveillance]
1117 words (3.2 pages)
- In the past few years the National Security Agency has been all over the news, and not in a good way. Former contractor of the National Security Edward Snowden leaked classified documents to several media outlets on such a scale the world took notice. The day the world learned about the Prism program among others was June, 5, 2013 when Ed Snowden gave the specifics of the programs to The Guardian, and the Washington Post. Ed Snowden turned those secrets over as a member of the NSA but fled the country before the leaks so he would not be imprisoned by the authorities.... [tags: Domestic Surveillance]
2540 words (7.3 pages)
- Domestic surveillance has been active in the United States for years now. The Foreign Intelligence Surveillance Act (FISA) was the first step taken by our government to help secure our nation electronically. The Foreign Intelligence Surveillance Act of 1978 is a United States federal law which prescribes procedures for the physical and electronic surveillance collection. Over the years domestic surveillance has evolved due to terrorists act on U.S soil. The September 11 attack in which four coordinated terrorist attacked the twin towers and pentagon that took place in New York and Washington, D.C.... [tags: Terrorism, Civil Liberties, Threat]
1458 words (4.2 pages)
- Sociologists have reached a consensus that America is a surveillance society (Dinev and Mullen). The NSA monitors credit card transactions, customer records, metadata from phone and email logs, GPS locators, bank codes, transportation databases and a host of other electronic services. Telecommunication companies such as AT&T, Sprint, and Verizon, and social networking companies such as Facebook and Google have cooperated with these surveillance operations. Government officials often tell voters that privacy is a necessary tradeoff for security.... [tags: Security, Surveillance]
889 words (2.5 pages)
- Evaluating threats to America’s national security is a challenge that is undertaken by academics, intelligence analysts, policy-makers, and anyone else with the patience. During the Cold War, America’s biggest concern was easy to define, the only other state capable of competing with America, the Soviet Union. Today, America faces threats from states, non-state actors, domestic groups, and even economic conditions. However, two states should always be kept in mind when discussing national security, China and Russia, with China being the biggest threat.... [tags: International Relations]
1183 words (3.4 pages)
- Ever since the horrible events that took place on 9/11, the United States of America has taken more security precautions. The main security change has been in airports. But, not just airports, the National Security agency (NSA) has been invading people’s privacy more and more since then. The NSA was founded by President Truman on November 4th, 1952 as an organization to decrypt code communications in WW2 (wiki/NSA). It was not until soon after 9/11 that the NSA started to become the organization it is today.... [tags: National Security Agency, United States, Terrorism]
1167 words (3.3 pages)
- In the wake of the National Security Agency's (NSA) scandal of 2013, the principles and usage of surveillance programs have been debated on an international level. The debacle began when former NSA contractor, Edward Snowden, released classified security files on the NSA's mass data surveillance programs to journalists at The Guardian, a British newspaper ("The Surveillance State..."). The contents of the leaks reveal intrusive programs, such as PRISM, that obtain large amounts of user data from American companies in the form of telephone numbers, emails, private documents, and videos, all in the name of preventing terrorist activity ("The Surveillance State...").... [tags: National Security Agency, terrorism]
1958 words (5.6 pages)
- Knowledge of the techniques of the information security discipline, including encryption, access control, physical security, training, threat analysis, and authentication. As an Information Technology major at the United States Naval Academy (USNA), the faculty selected me to participate on USNA’s team for the 2010 Cyber Defense Exercise hosted by the National Security Agency. The competition, which we won, required us to design, operate, and defend our virtual network. As File Systems Manager, I was personally responsible for the encryption, user authentication, and intrusion analysis of our web server, exchange services, and databases.... [tags: Security, National security, Computer security]
1605 words (4.6 pages)
- Ques1 Provide a brief overview of the case study This case study is based on European Union Agency for Network and Information Security (ENISA) to examine the current and emerging cyber threats and threat trend for emerging technology areas. This will be followed by the explanation about threat, threat agent, technology areas and attack methods. This case study also provides a description of the procedure followed; also use few descriptions on use- cases of cyber threat intelligence. The primary commitment of the ETL 2014 lies in the recognizable proof of top cyber danger inside the reporting time frame.... [tags: Security, National security, Computer security]
854 words (2.4 pages)
- Introduction: The chapter we will be looking at today will be discussing electronic and image records. We will focus are time on key terms and key idea throughout of the chapter. The first part of this paper we are going to be look at electronic media; the second part will be record security and safety; and the final part will be image media. Electronic media will be addressing the key ideas; such as relationship between “electronic and image records; magnetic and optical media; removable data storage devices; data input; storage and retrieval procedures.”(342-348) The second part we will look at records safety and security.... [tags: electronic media, security, safety, image media]
1428 words (4.1 pages)