The U.S. program PRISM NSA seems to be a set of specialized filters to inspect the packages combined with in-depth points of wiretaps pre-existing high-level internet operators in the United States. Even if you’re not doing anything wrong, you’re watched and recorded, and the capacityof thesestorage systemsis increasing everyyear more and more . This system can be used to go back in time and scrutinize every decision you have ever made, every friend with whom you’ve never discussed anything suspicious , to derive from an innocent life .



klThe top-secret PRISM program allows the U.S. intelligence community to gain access from nine Internet companies to a wide range of digital information, including e-mails and stored data, on foreign targets operating also outside the United States. The program is court-approved but does not require individual warrants. Instead, it operates under a broader authorization from federal judges who oversee the use of the Foreign Intelligence Surveillance Act (FISA).

Just think about the enormous use of Internet that every single user makes: e-mail, voice or video chat, video
photo, data stored, VoIP calls (Skype), file transfers, videoconferencing and more. All of these actions is used with the help of a centralized telecommunication service, and this means that every user can be intercepted.

Much of the attention in the history of PRISM is focused on the United States, the NSA and Obama. The Obama Administration in fact, for over two years allowed the NSA to collect enormous amounts of metadata on e-mail usage by Americans and also phones, Internet search records etc. , according to the latest leaks of government documents by Edward J. Snowden, the new “good-hacker”.

One of the broader mysteries about the NSA revelations is the extent to which the American public is really upset about the government’s secret national security data collection and analysis. Civil libertarians and privacy experts have been up in arms about the disclosures, but a recent research found that Americans remain sharply divided about the government’s use of the surveillance programs. Forty-eight percent of Americans approve of the surveillance programs, while 44% disapprove, with a four-point margin of error. And a majority of respondents said that the surveillance programs have helped protect national security.

This ambivalence about the government’s secret surveillance programs reflects the broader tension , highlighted repeatedly by lawmakers in recent weeks , between national security and individual privacy. One thing is clear: the vast scope of the surveillance programs could not be possible without the participation of the nation’s largest technology and telecommunications companies.

Anyway, following the disclosure of the Prism program, Google and other large Internet companies, including Apple, Facebook, Paltalk, hjjkYouTube, Skype, Yahoo, AOL and Microsoft vigorously objected to the notion that they allow the government unfettered or “direct” access to their servers.

This carries us out to the fact that PRISM seems to be a method of analysis of massive interception of the Internet we already knew, a method of analysis that specifically addresses the traffic to and from nine departments of social communication.

The main point however isn’t who provokes the damage, but that the damage is still in life and it has been in life since a lot of years ago, letting our privacy in the hand of unknowns .

It must be said that a system that requires privacy, but is built on the assumption of a trusted third party, is already bad as it is designed.

If you want your data to be private, you cannot trust anyone. You should ensure you encrypt them on your own using not-centralized cryptographic systems : only then is it possible to give them in custody to someone else. Put a plaintext file on Dropbox, Google Drive, sending it via e-mail, etc., is and has been the equivalent of shouting to the whole world.

Unfortunately, with the state in which you find these tools, even if there are still open source programs on internet that works with this type of structure, billions of people will continue to choose convenience over security.

The communications should become easier as it is a chat in Facebook: once it is so, it will be possible to use cryptography and stay quiet about our data.

Useful Links




About Vanessa Lumini

The genius build the world, the clever turn around, and the stupid think that the world revolves around them .. Laureata e appassionata in Informatica, contabile amministrativa di professione da 5 anni, con la voglia di diffondere le mie passioni in tutte le lingue a me possibili.

Leave a Reply

Your email address will not be published. Required fields are marked *


Scroll To Top