翻訳と辞書
Words near each other
・ Prison Girl
・ Prison handball
・ Prison Hospital of Tirana
・ Prison Interior
・ Prison Legal News
・ Prison library
・ Prison literature
・ Prison Litigation Reform Act
・ Prison Memoirs of an Anarchist
・ Prison Mindfulness Institute
・ Prison Notebooks
・ Prison Nurse
・ Prison nursery
・ Prison of Anemas
・ Prism (Ryo Kawasaki album)
PRISM (surveillance program)
・ PRISM (TV network)
・ PRISM (website)
・ Prism adaptation
・ Prism Ark
・ Prism Comics
・ Prism compressor
・ Prism correction
・ Prism coupler
・ Prism cover test
・ Prism fusion range
・ Prism graph
・ Prism Heart
・ Prism International
・ Prism Leisure Corporation


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

PRISM (surveillance program) : ウィキペディア英語版
PRISM (surveillance program)


PRISM is a clandestine surveillance program under which the United States National Security Agency (NSA) collects internet communications from at least nine major US internet companies.〔 Since 2001 the United States government has increased its scope for such surveillance, and so this program was launched in 2007.
PRISM is a government code name for a data-collection effort known officially by the SIGAD . The PRISM program collects stored internet communications based on demands made to internet companies such as Google Inc. under Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms. The NSA can use these PRISM requests to target communications that were encrypted when they traveled across the internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier, and to get data that is easier to handle, among other things.
PRISM began in 2007 in the wake of the passage of the Protect America Act under the Bush Administration.〔Lee, Timothy B. (June 6, 2013). ("How Congress Unknowingly Legalized PRISM in 2007" ). ''Wonkblog'' (blog of ''The Washington Post''). Retrieved July 4, 2013.〕〔Johnson, Luke (July 1, 2013). ("George W. Bush Defends PRISM: 'I Put That Program in Place to Protect the Country'" ). ''The Huffington Post''. Retrieved July 4, 2013.〕 The program is operated under the supervision of the U.S. Foreign Intelligence Surveillance Court (FISA Court, or FISC) pursuant to the Foreign Intelligence Surveillance Act (FISA). Its existence was leaked six years later by NSA contractor Edward Snowden, who warned that the extent of mass data collection was far greater than the public knew and included what he characterized as "dangerous" and "criminal" activities.〔Mezzofiore, Gianluca (June 17, 2013). ("NSA Whistleblower Edward Snowden: Washington Snoopers Are Criminals" ). ''International Business Times''. Retrieved June 30, 2013.〕 The disclosures were published by ''The Guardian'' and ''The Washington Post'' on June 6, 2013. Subsequent documents have demonstrated a financial arrangement between NSA's Special Source Operations division (SSO) and PRISM partners in the millions of dollars.
Documents indicate that PRISM is "the number one source of raw intelligence used for NSA analytic reports", and it accounts for 91% of the NSA's internet traffic acquired under FISA section 702 authority."〔 The leaked information came to light one day after the revelation that the FISA Court had been ordering a subsidiary of telecommunications company Verizon Communications to turn over to the NSA logs tracking all of its customers' telephone calls.〔
U.S. government officials have disputed some aspects of the ''Guardian'' and ''Washington Post'' stories and have defended the program by asserting it cannot be used on domestic targets without a warrant, that it has helped to prevent acts of terrorism, and that it receives independent oversight from the federal government's executive, judicial and legislative branches. On June 19, 2013, U.S. President Barack Obama, during a visit to Germany, stated that the NSA's data gathering practices constitute "a circumscribed, narrow system directed at us being able to protect our people."
== Media disclosure of PRISM ==

PRISM was publicly revealed when classified documents about the program were leaked to journalists of ''The Washington Post'' and ''The Guardian'' by Edward Snowden at the time an NSA contractor during a visit to Hong Kong.〔〔 The leaked documents included 41 PowerPoint slides, four of which were published in news articles.〔〔
The documents identified several technology companies as participants in the PRISM program, including Microsoft in 2007, Yahoo! in 2008, Google in 2009, Facebook in 2009, Paltalk in 2009, YouTube in 2010, AOL in 2011, Skype in 2011 and Apple in 2012. The speaker's notes in the briefing document reviewed by ''The Washington Post'' indicated that "98 percent of PRISM production is based on Yahoo, Google, and Microsoft".〔
The slide presentation stated that much of the world's electronic communications pass through the U.S., because electronic communications data tend to follow the least expensive route rather than the most physically direct route, and the bulk of the world's internet infrastructure is based in the United States.〔 The presentation noted that these facts provide United States intelligence analysts with opportunities for intercepting the communications of foreign targets as their electronic data pass into or through the United States.〔〔
Snowden's subsequent disclosures included statements that governments such as the United Kingdom's GCHQ also undertook mass interception and tracking of internet and communications data〔MacAskill, Ewen; Borger, Julian; Hopkins, Nick; Davies, Nick; Ball, James (June 21, 2013). ("GCHQ Taps Fibre-Optic Cables for Secret Access to World's Communications Exclusive: British Spy Agency Collects and Stores Vast Quantities of Global Email Messages, Facebook Posts, Internet Histories and Calls, and Shares Them with NSA, Latest Documents from Edward Snowden Reveal" ). ''The Guardian''. Retrieved June 30, 2013.〕 described by Germany as "nightmarish" if true〔Staff (June 22, 2013). ("GCHQ Data-Tapping Claims Nightmarish, Says German Justice Minister" ). BBC News. Retrieved June 30, 2013.〕 allegations that the NSA engaged in "dangerous" and "criminal" activity by "hacking" civilian infrastructure networks in other countries such as "universities, hospitals, and private businesses",〔 and alleged that compliance offered only very limited restrictive effect on mass data collection practices (including of Americans) since restrictions "are policy-based, not technically based, and can change at any time", adding that "Additionally, audits are cursory, incomplete, and easily fooled by fake justifications",〔 with numerous self-granted exceptions, and that NSA policies encourage staff to assume the benefit of the doubt in cases of uncertainty.〔Clayton, Mark (June 22, 2013). . ''The Christian Science Monitor'' (via Yahoo! News). Retrieved June 30, 2013.〕〔Staff (June 20, 2013). ("Procedures Used by NSA to Target Non-US Persons: Exhibit A Full Document Top-Secret Documents Show FISA Judges Have Signed Off on Broad Orders Allowing the NSA to Make Use of Information 'Inadvertently' Collected from Domestic US Communications Without a Warrant" ). ''The Guardian''. Retrieved June 29, 2013.〕〔Bump, Philip (June 20, 2013). ("The NSA Guidelines for Spying on You Are Looser Than You've Been Told" ). ''The Atlantic Wire''. Retrieved June 29, 2013.〕

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「PRISM (surveillance program)」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.