According to Natural News, The
Guardian has just released a new slide today from its collection of 41
PRISM slides detailing the top secret NSA spy program that has, for years,
granted the U.S. government "back door" access to the servers of Google, Yahoo, Microsoft, Apple, AOL, Facebook
and others. The new slide reveals that every one of these companies has been
blatantly and viciously lying to its users over the last several days, as they
have denied that the government has any sort of "direct access" to
their servers.
In a brilliant move of strategic journalism, the Guardian held on
to this revealing PRISM slide until today, allowing all these tech companies to
dig themselves into deep holes of denial regarding participation in the NSA spy
program. Once all the companies were on the record claiming government has no
"direct access" to their servers, The Guardian slapped down
this jaw-dropping top secret slide
image shown below. It reveals, in plain English, that the NSA's
"FAA702" operations engage in "collection directly from the
servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook,
Pal Talk, AOL, Skype, YouTube, [and] Apple."
For more information, log onto:
While many of the articles
regarding the functioning of this tool have
provided useful insight and detail into the operation of the program,
several of the reports do not tally with the information obtained by The
Guardian.
Some articles have claimed that
Prism is not a tool used for the collection of information from U.S.
companies, but is instead an internal tool used to analyze such information.
Others have speculated – in the
light of denials from technology
companies about granting "direct access" to servers – that Prism
operates through interception of
communication cables.
Both of these theories appear to
be contradicted by internal NSA documents.
In the interests of aiding the debate over how Prism works, The
Guardian is publishing an additional slide from the 41-slide presentation which details Prism and its operation. We
have redacted some program names.
The slide details different
methods of data collection under the FISA Amendment Act of 2008 (which was
renewed in December 2012). It clearly
distinguishes Prism, which involves data collection from servers, as
distinct from four different programs involving data collection from
"fiber cables and infrastructure as data flows past".
Essentially, the slide suggests
that the NSA also collects some information under FAA702 from cable intercepts,
but that process is distinct from Prism.
To see some fascinating and
interesting clips regarding the horrifying truth about the PRISM issue and
more, one can easily log onto:
Comments