Verified Document

Analyzing Prism Edward Snowden Essay

PRISM- Edward Snowden PRISM

PRISM, deployed by the NSA (National Security Agency) of United States, is a tool used for private electronic data gathering which belongs to the people who use leading internet services such as Gmail, Outlook, Facebook, etc. In the wake of 9/11, the latest effort made by the U.S. government for electronic surveillance is the development of PRISM, which initially started in the supremacy of President Bush with the Patriot Act, and later extended to include the (FISA) Foreign Intelligence Surveillance Actordained in 2006 and 2007 (Sottek & Kopstein, 2013)

Though the complete knowledge regarding the functioning of PRISM is still unknown, but the basic impression implies that it allows the NSA to apply for data from leading technology companies such as Google, Microsoft, Facebook, Yahoo, Apple, etc. about specific people. However, U.S. government claims that the data can be collected only after acquiring the permission from the secretive Foreign Intelligence Surveillance Court. (Sottek & Kopstein, 2013)

Importance of PRISM

Edward Snowden, former NSA contractor, leaked confidential presentation slides specifying facets of PRISM. On 6th June, a report based on the evidences presented through the slides was published by The Guardian and The Washington Post. The report specified NSA's "direct access" to the servers of mentioned popular sites: Google, Facebook etc. However, the companies involved have strongly repudiated any knowledge or...

Also, they rejected the accusations regarding any special allowance to U.S. government to directly access or utilize their user's data.
Moreover, U.S. government and companies both insisted of court approval being mandatory for data collection and that too for specific targets. According to The Washington Post, PRISM is nothing but an advanced system that allows them to accelerate requests for the data collection after court-approval, varying between companies. But, as there are only a few technical details available regarding the maneuvers of PRISM and also due to the fact that FISA court FISC) operated secretly, critics are anxious about the degree of the operation of PRISM as well as regarding the defilement of the legitimate rights of U.S. citizens.

It is pertinent to note that, the American citizens were those most influenced by PRISM and other similar programs. On 4 July, citizen-groups of more than 100 cities in U.S. protested through "Restore the Fourth" rallies against the government's surveillance programs, regarding electronic privacy of the users. Though, it is still unclear that these outrageous rallies would result in some reform or not, but we should be grateful to the young intelligence contractor for his courageous actions, as now, we at least have the idea of what U.S. government has been doing secretly in the name of national security (Sottek & Kopstein, 2013)

How PRISM Made it to the…

Sources used in this document:
References

Bicchierai, L.F. (2014). The 10 Biggest Revelations from Edward Snowden's Leaks. Mashable India. Retrieved 1 June 2016 fromhttp://mashable.com/2014/06/05/edward-snowden-revelations/

Elliott, K. & Rupar, T. (2013). Six Months of Revelations on NSA. The Washington Post. Retrieved 1 June 2016 from http://www.washingtonpost.com/wp-srv/special/national/nsa-timeline/

Kelion, L. (2013). Q&A: NSA's Prism Internet Surveillance Scheme. BBC News. Retrieved 1 June 2016 from http://www.bbc.com/news/technology-23051248

NPR. (2014). Debate: Was Edward Snowden Justified? Intelligence Squared U.S.. Retrieved 1 June 2016 from http://www.npr.org/2014/02/18/279151014/debate-was-edward-snowden-justified
Sottek T.C. & Kopstein, J. (2013). Everything You Need to Know about PRISM. The Verge. Retrieved 1 June 2016 from http://www.theverge.com/2013/7/17/4517480/nsa-spying-prism-surveillance-cheat-sheet
Cite this Document:
Copy Bibliography Citation

Related Documents

Edward Snowden Essay
Words: 2741 Length: Document Type: Essays

This essay reviews the relevant literature to provide a background on Edward Snowden and how his high-profile actions adversely affected the work of the National Security Agency (NSA). An analysis of what the NSA was doing prior to the leaks and how it collects intelligence information now is followed by an examination concerning what Snowden leaked and why. Finally, a discussion concerning whether the U.S. government violated Snowden’s constitutional rights

Argument Analysis Applied to Homeland Security
Words: 935 Length: 2 Document Type: Essay

Privacy, Security, Whistleblowing [Surveillance is a necessary evil to prevent terrorist attacks from happening.]A [For example, the secret "PRISM" effort saved New York City's subways from a 2009 terrorist plot led by a young Afghan-American, Najibullah Zazi.] A = Main Argument Surveillance is a necessary evil to prevent terrorist attacks B = Level The secret PRISM effort saved New York City's subways in 2009 from a terrorist plot. Claim B. is Level 1 and supports Argument

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now