What Else Can the NSA Access?

Tweezers pinching the phrase NSA in a series of computer code.
Tweezers pinching the phrase NSA in a series of computer code.

Originally published on Friday, July 05, 2013

What else can the NSA access? A few weeks ago, it was revealed that the NSA has been participating in a program that collects the phone records of millions of U.S. citizens. One news article stated that Verizon was required on an “ongoing, daily basis” to give the NSA information on all telephone calls in its systems, both within the U.S. and between the U.S. and other countries.1 While the news has centered around Verizon mostly, it is important to note some recent articles that have slowly started to uncover more details regarding this popular topic. The Washington Post and The Guardian recently reported the existence of another program used by the NSA and the FBI that scours the nation’s main Internet companies, extracting audio, video, photographs, emails, documents and connection logs to help analysts track a person’s movements and contacts. It was not clear whether the program, called PRISM, targets known suspects or broadly collects data from other Americans. This program apparently collects data directly from well-known corporations. Many are surprised to learn that not just Verizon, but also other familiar companies such as Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple are included in this program and are just as susceptible to the NSA. Dropbox is rumored to be added to this program soon also.2 Obviously, these newly released reports have left many citizens wanting more information. Click here to read the full article, with details from The Washington Post, and here to learn about PRISM. 1 Source 2 Source

Corsica Technologies
Corsica Technologies is a strategic technology partner specializing in consulting and managed services. With an integrated team of experts in cybersecurity, IT services, AI solutions, digital transformation, EDI, and data integration, Corsica offers comprehensive coverage and unlimited service consumption for one predictable monthly price—whether fully managed or co-managed.

Related Cybersecurity and IT Reads

IT consulting vs. managed IT services
Consulting
Garrett Wiesenberg

IT Consulting vs. Managed IT Services

In today’s complex technology environment, it’s tough to know how to fill your gaps. Are you facing one specific challenge? Or do you need ongoing, flexible support? The answer will help you determine whether you need IT consulting, managed IT

Read more
A CIO's technology playbook for the modern university
Education IT Support
Garrett Wiesenberg

A CIO’s Playbook for the Modern University 🎓

When you picture a college campus, you might think of lecture halls, dorm rooms, and football games. But behind all of that is an IT operation that rivals many Fortune 500 companies. We’re talking about the networks, security, and systems that keep

Read more

Sign Up For Our Newsletter

Stay up-to-date on the Managed Services and Cybersecurity landscape, and be the first to find out about events and special offers.

Ready to talk to an expert?

We’ll respond within 1 business day, or you can grab time on our calendar.