What Else Can the NSA Access?

Tweezers pinching the phrase NSA in a series of computer code.
Tweezers pinching the phrase NSA in a series of computer code.

Originally published on Friday, July 05, 2013

What else can the NSA access? A few weeks ago, it was revealed that the NSA has been participating in a program that collects the phone records of millions of U.S. citizens. One news article stated that Verizon was required on an “ongoing, daily basis” to give the NSA information on all telephone calls in its systems, both within the U.S. and between the U.S. and other countries.1 While the news has centered around Verizon mostly, it is important to note some recent articles that have slowly started to uncover more details regarding this popular topic. The Washington Post and The Guardian recently reported the existence of another program used by the NSA and the FBI that scours the nation’s main Internet companies, extracting audio, video, photographs, emails, documents and connection logs to help analysts track a person’s movements and contacts. It was not clear whether the program, called PRISM, targets known suspects or broadly collects data from other Americans. This program apparently collects data directly from well-known corporations. Many are surprised to learn that not just Verizon, but also other familiar companies such as Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple are included in this program and are just as susceptible to the NSA. Dropbox is rumored to be added to this program soon also.2 Obviously, these newly released reports have left many citizens wanting more information. Click here to read the full article, with details from The Washington Post, and here to learn about PRISM. 1 Source 2 Source

Corsica Technologies
Corsica Technologies is a strategic technology partner specializing in consulting and managed services. With an integrated team of experts in cybersecurity, IT services, AI solutions, digital transformation, EDI, and data integration, Corsica offers comprehensive coverage and unlimited service consumption for one predictable monthly price—whether fully managed or co-managed.

Related Cybersecurity and IT Reads

Microsoft Copilot vs. ChatGPT - 2026 update
AI
Brian Harmison

Copilot vs. ChatGPT for Business: UPDATED 2026

💡 Compare Copilot vs. ChatGPT  Get Your FREE Chart Originally published November 1, 2023. Completely refreshed March 31, 2026. Short answers: ChatGPT is better for general-purpose tasks and non-Microsoft users. Copilot is the clear winner for Microsoft 365 environments. Both

Read more
AI as a force multiplier for business growth
AI
Garrett Wiesenberg

AI as a Force Multiplier: How Business Leaders Can Scale Without Chaos

💡 Ready to grow with AI? Let’s talk about your transformation. Book a Consultation Technology isn’t the finish line. It’s the force multiplier—and that’s especially true of AI solutions. For modern business leaders, the goal isn’t simply to accumulate more tools. Rather, it’s to create more impact, drive faster decisions, and generate outcomes that actually

Read more
Stryker cyber attack takeaways - Corsica Technologies
Cybersecurity
Ross Filipek

The Stryker Cyberattack: Takeaways for Businesses

💡 Ready to improve your security?  Talk to us about your challenges. Book a Consultation The recent cyberattack on Stryker, a leading manufacturer of medical equipment, offers a sobering window into the vulnerabilities that companies tolerate every day. As I

Read more

Sign Up For Our Newsletter

Stay up-to-date on the Managed Services and Cybersecurity landscape, and be the first to find out about events and special offers.

Ready to talk to an expert?

We’ll respond within 1 business day, or you can grab time on our calendar.