1. Overview
PRISM is a clandestine surveillance program operated by the U.S. National Security Agency (NSA) under the Foreign Intelligence Surveillance Act (FISA). Revealed by whistleblower Edward Snowden in 2013, it enables the NSA to collect internet communications from major U.S. tech companies, targeting non-American individuals outside the U.S. for foreign intelligence purposes.
2. Legal Framework
- Section 702 of FISA Amendments Act (2008): Authorizes warrantless surveillance of non-U.S. persons abroad. PRISM operates under this provision, allowing the NSA to compel companies to hand over data via court orders issued by the secretive FISA Court (FISC).
- Minimization Procedures: Designed to protect U.S. persons by requiring deletion of purely domestic communications. However, "incidental collection" of Americans' data (e.g., when communicating with foreign targets) remains contentious.
3. Technical Operation
- Direct Access: PRISM collects stored communications (emails, chats, files) directly from company servers. Participating companies (initially 9, including Microsoft, Google, Facebook, Apple, and later Dropbox) were legally required to comply.
- Distinction from "Upstream" Collection: Unlike PRISM, upstream surveillance involves tapping fiber-optic cables to intercept data in transit, such as emails and metadata.
4. Key Revelations and Impact
- Snowden's Leaks (2013): Exposed PRISM's scope, sparking global debates on privacy vs. national security.
- Corporate Responses: Companies denied direct NSA access, asserting compliance only with lawful requests. Public distrust led to increased adoption of end-to-end encryption (e.g., WhatsApp, Signal).
- International Fallout: Allies like Germany protested NSA surveillance of leaders (e.g., Angela Merkel), straining diplomatic relations.
5. Legal and Policy Reforms
- USA FREEDOM Act (2015): Ended bulk metadata collection under Section 215 but did not dismantle Section 702.
- Reauthorizations: Section 702 was renewed in 2018 and 2023, maintaining PRISM amid debates over oversight and privacy.
6. Controversies and Criticisms
- Incidental Collection: Critics argue U.S. citizens' privacy is violated without warrants.
- FISA Court Oversight: Labeled a "rubber stamp" due to rare denials of government requests.
- Effectiveness Debates: Supporters claim PRISM prevents terrorism; opponents highlight limited transparency and potential abuse.
7. Legacy and Ongoing Issues
- Encryption Wars: Tech firms now prioritize user privacy, clashing with law enforcement seeking backdoors.
- Legal Challenges: Cases like Jewel v. NSA faced hurdles due to standing issues, though some rulings (e.g., bulk metadata) curtailed excesses.
- Global Norms: PRISM influenced international data governance, including the EU’s GDPR and cross-border data flow agreements.
8. Current Status
PRISM remains active under Section 702, reflecting enduring tensions between intelligence needs and civil liberties. Periodic reauthorizations ensure its continuation, albeit with calls for stricter safeguards against abuse.
Conclusion
PRISM epitomizes post-9/11 surveillance paradigms, balancing intelligence-gathering imperatives with fundamental rights. Its legacy underscores the need for robust oversight, transparency, and public discourse in an era of digital interconnectedness.
No comments:
Post a Comment