According to Natural News, The Guardian has just released a new slide today from its collection of 41 PRISM slides detailing the top secret NSA spy program that has, for years, granted the U.S. government "back door" access to the servers of Google, Yahoo, Microsoft, Apple, AOL, Facebook and others. The new slide reveals that every one of these companies has been blatantly and viciously lying to its users over the last several days, as they have denied that the government has any sort of "direct access" to their servers.
In a brilliant move of strategic journalism, the Guardian held on to this revealing PRISM slide until today, allowing all these tech companies to dig themselves into deep holes of denial regarding participation in the NSA spy program. Once all the companies were on the record claiming government has no "direct access" to their servers, The Guardian slapped down this jaw-dropping top secret slide image shown below. It reveals, in plain English, that the NSA's "FAA702" operations engage in "collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, Pal Talk, AOL, Skype, YouTube, [and] Apple."
For more information, log onto:
While many of the articles regarding the functioning of this tool have provided useful insight and detail into the operation of the program, several of the reports do not tally with the information obtained by The Guardian.
Some articles have claimed that Prism is not a tool used for the collection of information from
companies, but is instead an internal tool used to analyze such information. U.S.
Others have speculated – in the light of denials from technology companies about granting "direct access" to servers – that Prism operates through interception of communication cables.
Both of these theories appear to be contradicted by internal NSA documents.
In the interests of aiding the debate over how Prism works, The Guardian is publishing an additional slide from the 41-slide presentation which details Prism and its operation. We have redacted some program names.
The slide details different methods of data collection under the FISA Amendment Act of 2008 (which was renewed in December 2012). It clearly distinguishes Prism, which involves data collection from servers, as distinct from four different programs involving data collection from "fiber cables and infrastructure as data flows past".
Essentially, the slide suggests that the NSA also collects some information under FAA702 from cable intercepts, but that process is distinct from Prism.
To see some fascinating and interesting clips regarding the horrifying truth about the PRISM issue and more, one can easily log onto: