Fact-checked by Grok 2 weeks ago

PRISM

PRISM is a surveillance program implemented by the United States National Security Agency (NSA) under Section 702 of the Foreign Intelligence Surveillance Act (FISA) Amendments Act of 2008, authorizing the targeted collection of electronic communications content and metadata from non-U.S. persons located abroad for foreign intelligence purposes via compelled disclosures from U.S. electronic communication service providers. The program, which began operations in 2007, involves legal demands issued through the Foreign Intelligence Surveillance Court (FISC) to major technology firms such as Microsoft, Yahoo, Google, Facebook, and others, requiring them to provide data linked to specific selectors like email addresses or IP addresses associated with validated foreign targets. Disclosed to the public in June 2013 through classified documents leaked by former NSA contractor Edward Snowden, PRISM exemplified the scale of post-9/11 intelligence gathering, with the leaks revealing an internal NSA slide deck outlining collection volumes and processes that fueled accusations of overbroad domestic surveillance despite statutory safeguards against intentional U.S. person targeting. Although officially described as precise and selector-based to minimize incidental collection of Americans' data—retained only under strict procedures—PRISM has been central to ongoing disputes over the balance between counterterrorism efficacy and Fourth Amendment protections, including documented compliance errors and "backdoor searches" of U.S. persons' communications by other agencies. The program's renewal through periodic congressional reauthorizations of Section 702 underscores its enduring role in U.S. signals intelligence, even as technical implementations evolved from the originally named PRISM framework to broader "downstream" collection methods.

Program Overview

Description and Objectives

PRISM, internally designated as SIGAD US-984XN, constitutes a targeted foreign intelligence collection program administered by the U.S. National Security Agency (NSA) pursuant to Section 702 of the Foreign Intelligence Surveillance Act (FISA) Amendments Act of 2008. This authority permits the acquisition of communications content from U.S.-based electronic communication service providers, including major technology firms, through the issuance of directives compelling the disclosure of data associated with non-U.S. persons reasonably believed to be located abroad. The program, which commenced operations in 2007 ahead of the formal enactment of Section 702, focuses on downstream collection methods distinct from upstream internet cable taps. The core objectives of PRISM center on obtaining foreign information to address imperatives, encompassing efforts, the prevention of weapons of mass destruction proliferation, and mitigation of transnational threats. Collection targets validated foreign selectors, such as email addresses or account identifiers linked to non-U.S. persons outside the , yielding content from communications including emails, voice-over-IP calls, video files, and instant messages. This supports broader U.S. government priorities in disrupting terrorist networks, tracking illicit technology transfers, and identifying hostile actors, with annual certifications from the Attorney General and specifying prioritized foreign needs. In contrast to bulk metadata acquisition programs under separate legal authorities like Section 215 of the USA PATRIOT Act, which involved the amassing of domestic telephony records irrespective of targeting, PRISM employs a selector-based tasking mechanism. Directives are issued only for communications involving pre-approved foreign targets, minimizing incidental collection of purely domestic content while prioritizing relevance to validated intelligence requirements over comprehensive data hoarding. This targeted approach ensures that provider compliance is calibrated to specific foreign intelligence objectives rather than indiscriminate retention of metadata or content flows.

Scope and Data Collection Mechanisms

PRISM enabled the (NSA) to acquire internet communications from at least nine major U.S.-based technology providers, including starting September 11, 2007, from March 12, 2008, from January 14, 2009, from September 2009, from December 7, 2009, and Apple from October 2012. The program focused on "downstream" collection, obtaining targeted data directly from these companies' servers rather than intercepting transit communications. Targeting under PRISM relied on "selectors" such as addresses, addresses, and telephone numbers associated with non-U.S. persons reasonably believed to be located outside the for foreign purposes. These selectors were tasked through annual certifications and directives jointly issued by the Attorney General and , approved by the Foreign Intelligence Surveillance Court (FISC) pursuant to Section 702 of the FISA Amendments Act. Collection was restricted to communications where at least one party was a valid foreign , though incidental acquisition of U.S. persons' occurred when they communicated with those targets. The types of data collected included , video and voice communications, uploaded photos and files, log-in notifications, and details from online social networking sites. By 2011, the NSA reported acquiring approximately 250 million internet communications annually under Section 702 authorities, with accounting for about 91% of that volume. To address incidental U.S. data, the program incorporated minimization procedures designed to protect , such as masking identifiers and limiting retention and dissemination of domestic content unless it met specific foreign exceptions. The PRISM program operates under Section 702 of the Foreign Intelligence Surveillance Act (FISA) Amendments Act of 2008, which authorizes the targeted acquisition of foreign intelligence from non-U.S. persons reasonably believed to be located outside the United States without individual warrants for such targets. This statutory framework permits electronic surveillance directed at foreign targets for national security purposes, such as counterterrorism and counterproliferation, provided the Attorney General (AG) and Director of National Intelligence (DNI) jointly certify compliance with specified procedures. The Foreign Intelligence Surveillance Court (FISC) reviews and approves the government's targeting procedures, which require selectors like email addresses or phone numbers to be associated with non-U.S. persons abroad and linked to foreign intelligence activities, as well as minimization procedures that limit the retention, dissemination, and use of incidentally acquired data involving U.S. persons. These procedures are designed to ensure acquisitions focus on valid foreign intelligence objectives while applying safeguards, such as masking U.S. person identifiers in most disseminations and requiring destruction of certain collected data unless it meets retention criteria tied to national security needs. The FISC's approval is granted annually upon submission of certifications that detail these mechanisms, confirming their adherence to statutory limits that prohibit intentional targeting of U.S. persons or persons in the U.S. Operational implementation integrates PRISM into the Agency's (NSA) (SIGINT) framework, enabling real-time collection from upstream providers to address time-sensitive threats, with oversight enforced through annual certifications executed by the AG and DNI that specify categories of foreign and affirm procedural compliance. Queries of raw Section 702 data for U.S. person information—often termed "backdoor searches"—are regulated by separate querying procedures approved by the FISC, which mandate that such searches be reasonably likely to return foreign or evidence of criminal activity, without requiring warrants for queries but subject to post-query audits and compliance reviews to mitigate incidental impacts. This structure prioritizes the causal efficacy of collection against foreign adversaries over ex post facto restrictions, as validated by recurring FISC endorsements of the program's protocols.

Historical Development

Origins and Authorization

The PRISM surveillance program emerged in response to perceived deficiencies in U.S. foreign intelligence collection highlighted by the , 2001, attacks, where failures in inter-agency information sharing and over-reliance on traditional telephony surveillance impeded threat detection. With communications migrating toward platforms dominated by U.S. tech firms, the (NSA) sought expanded access to electronic data from these providers to target non-U.S. persons abroad believed to pose risks. Initiated in 2007 under the administration, PRISM built upon earlier warrantless surveillance efforts by formalizing NSA directives to internet companies for user data acquisition. The program's legal foundation was laid by the Protect America Act (PAA), signed into law on August 5, 2007, which authorized the Attorney General to direct electronic communications service providers to furnish foreign intelligence information without prior judicial review for targets reasonably believed to be located outside the . On , 2007, the NSA secured as its inaugural PRISM partner, marking the onset of systematic collection. PRISM's authorization evolved with the expiration of the temporary PAA, transitioning to the FISA Amendments Act (FAA) of 2008, enacted on July 10, 2008, which codified Section 702 to permit warrantless acquisition of foreign communications "to acquire foreign intelligence information." Under Section 702, the NSA submits annual certifications to the Foreign Intelligence Surveillance Court (FISC) outlining targeting procedures, minimization guidelines, and compliance measures, with the FISC issuing orders approving these for up to one year. This framework addressed imperatives for proactive, comprehensive monitoring while nominally restricting incidental U.S. person data handling.

Expansion Post-9/11

Following the , 2001, terrorist attacks, the U.S. community expanded authorities to address evolving threats from foreign actors increasingly using communications. PRISM, operationalized under Section 702 of the FISA Amendments Act enacted on December 30, 2008, enabled the NSA to compel U.S. companies to provide data on non-U.S. persons abroad, marking a significant scaling from prior warrant-based limitations. This legal framework facilitated rapid program growth, with initial corporate participation by in September 2007 expanding to include in January 2009 and in September 2009, reflecting adaptation to the migration of terrorist communications to mainstream platforms. The program's directives, or selectors targeting foreign intelligence, surged post-2008, driven by the exponential rise in online foreign communications volume. NSA analyses indicated PRISM's data intake grew substantially from 2007 onward, with the program yielding 24,005 intelligence reports in 2012 alone—a 27% increase from 2011—contributing to over 77,000 total reports citing PRISM data by that year. By 2011, the Foreign Intelligence Surveillance Court determined PRISM accounted for 91% of approximately 250 million communications acquired annually under the FISA Amendments Act, underscoring its centrality to refined U.S. intelligence reporting on threats. This expansion demonstrated an adaptive response to threat landscapes, including integrated analysis of foreign and incidentally collected domestic data. U.S. officials attributed the 2009 thwarting of the plot to bomb the to insights from Section 702 surveillance, including PRISM, which uncovered Zazi's communications with operatives abroad. Such outcomes, part of broader claims of disrupting over 50 attacks, justified the program's scaling amid rising digital threats, though reliant on NSA assessments of causal efficacy.

Pre-2013 Implementation

The PRISM program, operating under Section 702 of the FISA Amendments Act enacted on July 10, 2008, achieved operational maturity through annual certifications renewed by the Attorney General and Director of National Intelligence, with approvals and modifications by the Foreign Intelligence Surveillance Court (FISC). These certifications authorized targeted collection of communications from non-U.S. persons reasonably believed to be located abroad, with initial FISC procedures approved in 2008. By 2011, the FISC mandated modifications to NSA minimization procedures following identification of compliance issues in upstream collection, including multi-communication transactions and inadvertent domestic acquisitions, as outlined in Judge John Bates' October 3, 2011, opinion. This ensured ongoing adherence to statutory targeting restrictions, with internal NSA compliance rates exceeding 99% since program inception through rigorous audits by the Office of the Director of Compliance. Minimization rules required the prompt destruction or masking of U.S. person data unless relevant to foreign intelligence or criminal investigations, with default retention limited to five years for PRISM-acquired content. Incidental collection of U.S. person communications, arising from foreigners' interactions with , constituted a small percentage of total acquisitions, estimated in the low single digits based on oversight reviews, while wholly domestic communications numbered in the tens of thousands annually. PRISM functioned as a downstream collection mechanism, complementing upstream efforts like FAIRVIEW by obtaining data directly from U.S. service providers using validated selectors, often derived from and trap-and-trace orders under separate authorities. By mid-2011, PRISM accounted for 91% of the NSA's internet-based tasking, reflecting its central role in routine foreign intelligence gathering.

Technical and Operational Details

Collection Processes

The PRISM collection process operates under Section 702 of the Amendments Act of 2008, which authorizes the acquisition of foreign communications from U.S.-based electronic communication service providers through court-approved directives rather than real-time taps or unauthorized access. Following approval of broad certifications by the Foreign Intelligence Surveillance Court (FISC), the NSA identifies specific selectors—such as addresses or numbers—associated with non-U.S. persons reasonably believed to be located abroad. These selectors are tasked via internal systems, prompting the issuance of binding directives to relevant providers, which compel the production of stored or in-transit communications content linked to the targets. Directives require providers to furnish data "as soon as practicable," typically involving batch extractions or "slides" of full-take content—distinguishing from metadata-focused collections—without granting the NSA direct, unmediated server access or hacking capabilities. Providers certify with targeting restrictions, ensuring efforts focus on foreign targets, and transmit data through secure portals or designed for legal disclosures, with internal logs documenting near-complete adherence rates exceeding 99% in audited periods. This directive-driven model filters acquisitions upstream via provider queries, minimizing incidental U.S. person data at the point of collection, though subsequent minimization procedures apply. Tasking and processing occur through tools like the REPRISM FISA , where analysts submit and validate selectors before directives activate collection, yielding structured content such as emails, chats, and files for analysis. Empirical data from program oversight indicates that PRISM yields targeted content acquisitions, with case numbers tracking discrete foreign intelligence operations rather than indiscriminate bulk pulls.

Participating Entities and Compliance

The PRISM program compelled participation from nine major U.S. technology companies for the collection of stored communications under Section 702 of the (FISA). These entities included , starting in 2007; in 2008; , , and in 2009; and in 2010; in 2011; and Apple in 2012. The (NSA) issued directives to these providers, approved by the Foreign Intelligence Surveillance Court (FISC), requiring them to furnish data on foreign targets without individual warrants. Compliance was enforced through legal obligations rather than voluntary cooperation, with the NSA reimbursing companies millions of dollars annually for associated costs, such as infrastructure modifications and personnel. For instance, between 2011 and 2012, reimbursements totaled over $250 million across providers including , , , and to cover FISC-mandated certifications. While most firms adhered to directives, some mounted legal challenges; Yahoo contested a 2008 FISC order, arguing it violated the Fourth , but lost after facing threats of $250,000 daily fines for non-compliance, as declassified in 2014. Declassified documents reveal no instances of outright refusal or unwilling participation post-challenges, with providers integrating tasking into operations via secure portals or data handoffs. Following 2013 disclosures, expanded to encompass cloud service providers under reauthorized Section 702 authorities, maintaining compelled disclosures without evidence of systemic resistance in official records. This framework underscores statutory mandates over corporate discretion, countering narratives of proactive complicity.

Integration with Broader NSA Systems

PRISM-collected internet communications from U.S. technology companies are routed into the NSA's primary databases, enabling seamless fusion with data from upstream collection programs such as those tapping international fiber optic cables. This ingested content, including email, chats, and file transfers, supports targeted querying via , the NSA's expansive search platform that aggregates full-take feeds from diverse global collection points for real-time analysis by authorized personnel. While operates under Section 702 of the FISA Amendments Act for foreign-targeted content acquisition, its outputs remain distinct from bulk telephony metadata programs governed by Section 215, stored in separate repositories like to enforce legal silos between internet content and call detail records. Integration occurs through analytical workflows allowing cross-correlation for foreign intelligence purposes, with automated tools detecting behavioral patterns indicative of high-value targets such as terrorism facilitators or proliferation networks. Downstream PRISM data enhances the NSA's ecosystem by feeding into shared repositories accessible by counterparts via secure channels, amplifying coverage of transnational threats without reliance solely on U.S.-based infrastructure. Advanced analytics prioritize selectors linked to validated foreign intelligence requirements, minimizing incidental domestic collection through compliance filters embedded in the processing pipeline.

2013 Public Disclosures

Edward Snowden's Role

, a systems administrator employed as a contractor by for the (NSA), accessed classified documents detailing PRISM while stationed in , where he began work on March 1, 2013, at an annual salary rate of $122,000. In early 2013, Snowden contacted journalists and , providing them with thousands of documents, including PRISM-related slides, which were first published by The Guardian and The Washington Post on June 5 and 6, 2013, respectively. Snowden publicly identified himself as the source on June 9, 2013, via video interview from , where he had arrived on May 20, 2013, stating that his actions were driven by concerns over unconstitutional . Booz Allen terminated his employment on June 10, 2013, citing violations of company policy. Snowden asserted that he had raised surveillance-related concerns internally at the NSA multiple times prior to leaking the materials, claiming in a that he did so over 10 times through proper channels but received no meaningful response. However, NSA officials and a review by the House Committee found limited of such complaints, identifying only a single 2009 from Snowden seeking clarification on versus statutes, with no records of formal whistleblower submissions during his Booz Allen tenure. These disclosures, unauthorized under his clearance, exposed operational details of PRISM's from tech companies but also prompted debates over their selective nature and potential harm to methods. On June 21, 2013, the U.S. Department of Justice charged Snowden with three felonies under the : unauthorized communication of national defense information, willful communication of classified intelligence to an unauthorized party, and theft of government property. After transiting through Moscow's Sheremetyevo Airport, Snowden was granted one-year temporary asylum in on August 1, 2013, which was extended to in 2020; he has resided there since, facing ongoing U.S. efforts. Public perceptions of Snowden's role remain divided, with supporters framing his leaks as necessary exposure of overreach and critics viewing them as treasonous betrayal of oaths and intelligence capabilities.

Leaked Materials and Initial Revelations

The leaked materials primarily consisted of a classified 41-slide PowerPoint presentation dated April 2013, which detailed the PRISM program's structure, operational processes, and data acquisition methods. The slides identified nine major U.S. technology companies—Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, and Apple—as participants, specifying the start dates for NSA collection from each: Microsoft on September 28, 2007; Yahoo on March 12, 2008; Google and Facebook on both January 9, 2009; PalTalk on December 7, 2009; YouTube on September 12, 2010; Skype on February 6, 2011; and AOL on May 31, 2011. Apple was listed without a specific start date in the initial slides but confirmed as involved post-revelation. The presentation outlined PRISM's targeting of foreign intelligence selectors, such as addresses, across 204 countries, with collection encompassing emails, chats, videos, photos, and video calls, file transfers, and social networking data. It described a tasking where NSA directives prompted companies to provide specific user data stored on their servers, routed through NSA compliance systems, rather than implying indiscriminate bulk access. Initial slide excerpts suggested expansive capabilities, including phrases like "full take, full content," but subsequent government clarifications emphasized that access occurred via targeted (FISA) court-approved directives, limited to non-U.S. persons abroad, with incidental collection of U.S. persons' communications acknowledged when interacting with valid targets. Accompanying leaks included data from the NSA's Boundless Informant tool, which visualized global collection volumes, reporting 97.5 billion internet and telephony metadata records acquired worldwide over a 30-day period in March 2013, with 3 billion from U.S. networks attributed to upstream cable collection rather than PRISM specifically. The metrics highlighted PRISM's contribution to foreign-focused acquisitions but did not initially disclose granular targeting statistics, which later declassifications confirmed as predominantly non-U.S. persons under Section 702 authority.

Media Dissemination and Immediate Aftermath

The initial public disclosure of PRISM occurred on June 6, 2013, when published an article based on leaked NSA documents detailing the program's collection of user data from major U.S. tech companies, including , , , , and Apple, under Section 702 of the FISA Amendments Act. followed on June 7, 2013, releasing several of the 41 briefing slides from an April 2013 NSA presentation that outlined PRISM's operations, targets, and data flow processes. These reports rapidly disseminated globally, with publishing details on June 10, 2013, highlighting PRISM's implications for international data and confirming U.S. access to foreign communications routed through American servers. In the immediate aftermath, implicated tech companies issued denials of granting the NSA direct, unfettered access to servers, asserting compliance only with targeted legal requests under court orders. Public reaction emphasized privacy violations, amplifying fears of indiscriminate mass surveillance despite the program's focus on foreign intelligence targets; a Gallup poll conducted June 7-9, 2013, found 53% of Americans disapproving of the government's collection of phone and internet data for counterterrorism, though a contemporaneous Pew survey indicated 44% approval for such programs when framed against terrorism threats. On June 9, 2013, revealed as the source and published a video interview in which he described as enabling a societal shift toward unchecked omniscience, invoking tropes of dystopian overreach without citing specific instances of domestic abuse or misuse of collected data. Media coverage prioritized these narratives, often downplaying the empirical context of 's role in thwarting 50+ terror plots as later detailed by intelligence officials, contributing to short-term scrutiny of efficacy versus trade-offs.

Official and Governmental Responses

United States Executive Branch

President defended the program shortly after its public disclosure on June 7, 2013, describing it as a narrowly targeted tool for foreign collection authorized under Section 702 of the FISA Amendments Act of 2008, with strict oversight by and the to prevent abuse. He emphasized that did not involve indiscriminate of U.S. persons, framing it as an essential trade-off between and in the era, while rejecting calls for immediate termination. , in a March 12, 2013, Senate Intelligence Committee hearing, responded to Senator Wyden's question about whether the NSA collected data on millions of Americans by stating, "No, sir... not wittingly," referring to intentional direct targeting; Clapper later apologized for the answer as erroneous, attributing it to a misunderstanding of the query's focus on bulk rather than collection under foreign authorities. In response to the revelations, the Obama administration declassified key documents, including Foreign Intelligence Surveillance Court (FISC) orders and opinions from 2011 validating Section 702 procedures, as well as summaries of PRISM collection volumes exceeding 200 million internet communications annually, to demonstrate legal compliance and built-in safeguards like targeting non-U.S. persons abroad. These releases, initiated by the in June and August 2013, aimed to balance transparency with operational secrecy, confirming that PRISM adhered to minimization rules limiting incidental U.S. person data retention and use. While a federal court ruling in 2013 temporarily halted bulk telephony metadata collection under Section 215 of the —prompting a brief operational pause pending FISC approval— operations under Section 702 continued uninterrupted, as the programs served distinct purposes with the latter focused on upstream and downstream internet content from foreign targets. Post-disclosure reviews, including the December 2013 White House-commissioned Liberty and Security report, proposed enhanced oversight but rejected warrant requirements for querying incidentally collected U.S. person data in Section 702 repositories, with administration officials arguing that such mandates would delay responses to imminent threats and undermine the program's effectiveness against and foreign . This stance prioritized continuity of intelligence capabilities, viewing existing FISC-approved procedures as adequate protections against overreach.

Legislative Actions and Oversight

The , enacted on June 2, 2015, curtailed the National Security Agency's bulk collection of domestic telephony metadata under Section 215 of the Patriot Act but preserved the authorities underpinning PRISM under Section 702 of the Foreign Intelligence Surveillance Act (FISA). This legislation shifted metadata storage to private providers with targeted government requests, reflecting congressional intent to address post-Snowden concerns over domestic bulk collection while maintaining foreign-targeted surveillance capabilities essential for . Section 702, which enables PRISM's upstream and downstream collection from electronic communication service providers, has undergone periodic reauthorizations demonstrating bipartisan congressional consensus on its operational necessity despite privacy debates. Initially set to expire on December 31, 2023, following a six-year extension in the 2018 FISA Amendments Reauthorization signed January 19, 2018, the authority faced delays amid negotiations over query restrictions and transparency. A short-term extension in late 2023 pushed the deadline to April 19, 2024, after which passed the Reforming and Securing , reauthorizing Section 702 for two years without mandating warrants for U.S. person queries—a proposal rejected in favor of enhanced FBI training and query minimization procedures to curb misuse. This outcome underscored pragmatic support across party lines, with proponents citing empirical contributions to and cybersecurity, including over 200 foreign intelligence targets identified annually via U.S. person queries in some years. Oversight mechanisms, including annual reports from the and reviews by the Privacy and Civil Liberties Oversight Board (PCLOB), have affirmed Section 702's effectiveness while identifying compliance gaps. The PCLOB's 2023 report, updating its 2014 assessment, concluded that the program yields critical foreign with limited incidental collection of U.S. persons' communications—estimated at under 0.01% of total acquisitions in audited samples—primarily when interact with valid foreign targets. U.S. person queries of Section 702 repositories, permitted for foreign purposes, totaled approximately 3.4 million by the FBI in 2021 (later adjusted downward for batch query overcounting), declining sharply to under 2 million in 2023 following procedural reforms like supervisor approvals. Critics, including Senator , have leveraged these figures to advocate stricter reforms, such as warrant requirements for domestic queries, arguing they evidence overreach despite official minimization efforts. Nonetheless, congressional reauthorizations reflect a calculated balance prioritizing causal links between the program and thwarted threats over expansive privacy mandates.

Judicial Proceedings and Rulings

The Foreign Intelligence Surveillance Court (FISC) oversees Section 702 certifications authorizing PRISM collection, approving them annually after reviewing targeting, minimization, and querying procedures submitted by the Attorney General and . These approvals typically include modifications to address compliance deficiencies, such as unauthorized querying of U.S. persons' data, but affirm the program's constitutionality under its foreign intelligence purpose. For instance, in a 2011 opinion by Presiding Judge John Bates, the FISC curtailed certain upstream collection practices under Section 702—distinct from but related to PRISM's direct acquisition from providers—by prohibiting the retention of communications merely "about" a target, while upholding the core targeting framework as compliant with statutory limits. FISC proceedings have recurrently highlighted implementation issues, prompting remedial orders; in 2016, the court mandated government reporting on -related compliance shortfalls, including over-collection incidents. More recently, the April 2024 FISC opinion approved recertifications for the Section 702 programs, including , citing improved FBI adherence to querying rules following prior violations, though it noted ongoing risks from expanded agency access. The September 2024 opinion, issued after Congress's April 20, 2024, reauthorization via the Reforming Intelligence and Securing America Act, further validated updated procedures amid debates over warrant requirements for domestic queries, rejecting broader challenges to the program's structure. Federal district and appellate courts have handled post-disclosure challenges to PRISM, yielding mixed outcomes often hinging on standing rather than merits. Cases like Clapper v. (2013) saw the affirm dismissal for lack of injury-in-fact, blocking substantive review of upstream and PRISM collection. In Jewel v. NSA, a Northern District of suit alleging Fourth violations from PRISM-like dragnet , courts dismissed claims on state-secrets grounds and standing, with the Ninth Circuit upholding in 2021 and the denying in 2022. A 2020 ruling in United States v. Moalin deemed aspects of Section 702 upstream collection unlawful due to incidental domestic acquisitions, suppressing evidence in that terrorism prosecution, though convictions stood and the decision did not directly invalidate PRISM's provider-based targeting. Overall, FISC approvals have predominated, embedding iterative safeguards that reinforce the program's legal foundation, while Article III courts' frequent standing dismissals have insulated PRISM from wholesale invalidation, preserving its operational continuity despite acknowledged incidental U.S. person impacts.

International Dimensions

Cooperation Among Allies

The PRISM program's integration with the Five Eyes intelligence alliance—encompassing the United States' (NSA), the United Kingdom's (GCHQ), Australia's (ASD), Canada's (CSE), and New Zealand's (GCSB)—enables seamless dissemination of collected internet communications data among partners. This sharing amplifies collective (SIGINT) capabilities by allowing each agency to leverage PRISM queries for targets beyond their primary jurisdictional focus, fostering reciprocal access to allied collections. GCHQ, in particular, utilized extensively, with leaked documents indicating direct querying privileges granted as early as the program's operational phase post-2007 FISA Amendments Act authorization. This access complemented GCHQ's initiative, which buffers data from transatlantic fiber-optic cables landing in the , creating bidirectional flows where PRISM-sourced content from U.S. tech firms enriches Tempora holdings and vice versa. Australia's similarly drew on PRISM, reportedly querying the system over 100,000 times in a single month during late , exceeding UK volumes in subsequent periods and underscoring the alliance's operational depth. and maintain comparable interfaces, though granular usage metrics for these partners remain classified. Such synergies yield tangible security gains through joint operations, as shared PRISM-derived intelligence supports real-time threat disruption across borders, exemplified by coordinated taskings where allied inputs multiply analytic efficacy against transnational networks. Friction among partners is minimal, with each nation operating parallel domestic programs—such as the UK's Regulation of Investigatory Powers Act equivalents—framed as necessary extensions of sovereign authority rather than extraterritorial overreach. This alignment sustains robust defense of the arrangement against external scrutiny, prioritizing operational continuity.

Reactions from Foreign Governments

German Chancellor expressed concerns over U.S. surveillance practices in June 2013, stating that German citizens appeared to receive fewer protections than Americans under such programs. officials reacted with outrage to reports of NSA spying on EU offices in and , demanding explanations from the U.S. in late June 2013. In October 2013, the German government indicated it had evidence suggesting the NSA monitored Merkel's mobile phone, prompting her to affirm that "spying among friends is not acceptable." Brazilian President denounced U.S. surveillance as a "breach of " during her September 24, 2013, address to the , citing NSA interception of her communications and those of executives. Rousseff canceled a planned to in response and, alongside , co-sponsored a UN in October 2013 affirming online privacy rights as a right. Despite these protests, pursued measures like mandating local data storage for foreign firms to mitigate foreign access risks, indicating pragmatic adjustments rather than severance of ties. French officials displayed limited indignation toward despite public reports, as disclosures in July 2013 revealed France's operated a comparable domestic program collecting billions of records annually from citizens since 2008. This program, dubbed France's "," targeted phone and without individualized warrants, prompting minimal public outcry and underscoring selective criticism of foreign practices. In October 2013, condemned reported NSA bulk collection of citizens' as unacceptable but maintained ongoing cooperation with the U.S. Several governments, including those in and , issued formal protests over 's extraterritorial reach but continued bilateral intelligence-sharing arrangements with the U.S., prioritizing imperatives. Post-2013 revelations, nations like expanded metadata retention laws, framing enhanced surveillance as essential for amid evolving digital threats, with serving as a referenced for operational scale rather than a deterrent.

Global Intelligence Sharing Implications

The PRISM revelations highlighted the depth of intelligence sharing within the Five Eyes alliance—encompassing the , , , , and —revealing joint surveillance operations that persisted despite public exposure. Leaked documents demonstrated that PRISM data contributed to raw intelligence comprising 91% of the NSA's internet-based analytic reports, underscoring the alliance's operational value in aggregating from global communications flows. The endurance of these arrangements post-2013 affirmed their strategic necessity, as member states recalibrated protocols to address vulnerabilities without abandoning reciprocal data exchanges essential for and threat detection. In parallel, the disclosures spurred refinements in bilateral intelligence pacts beyond partners, including the European Union's 2023 adequacy decision under the EU-U.S. Data Privacy Framework, which enabled continued transatlantic data transfers while incorporating safeguards against indiscriminate . This framework addressed concerns raised by PRISM by limiting U.S. to proportionate needs, facilitating over €7 trillion in annual EU-U.S. data-dependent trade without halting cooperation. Such developments reflect a pragmatic recalibration toward mutual adequacy standards, prioritizing secure data flows amid realities over absolute ideals that could asymmetrically constrain allied intelligence. Causal analysis reveals that adversaries like and operate analogous systems without transparency or restraint, as seen in China's Skynet and Sharp Eyes initiatives, which integrate over 200 million public cameras for real-time behavioral monitoring and data aggregation from tech platforms. Russia's system mandates internet providers to enable access to communications and content, mirroring PRISM's compelled collection but absent judicial oversight or disclosure. These opaque programs underscore the reciprocal nature of global , where unilateral democratic restraint—driven by absolutism—would cede advantages to non-disclosing states unburdened by accountability. PRISM's exposure, rather than eroding capabilities, heightened awareness of such dynamics, contributing to enhanced global as evidenced by rising commitments in the ITU's 2024 Global Cybersecurity Index and frameworks like the World Economic Forum's 2025 Outlook, which note accelerated defenses against state-sponsored threats.

Corporate and Technological Perspectives

Tech Companies' Involvement

Under the PRISM program, authorized by Section 702 of the FISA Amendments Act, the NSA obtained court-approved directives compelling U.S. technology companies to disclose user communications matching specific selectors such as addresses or identifiers provided by analysts. Companies including , starting in 2007; in 2008; , , and in 2009; in 2010; and in 2011; and Apple in 2012, received these directives and queried their internal databases to identify and forward relevant data, including , chats, videos, and files, without granting the NSA direct server access. This process involved significant operational burdens, with the NSA reimbursing companies millions of dollars annually to cover , such as secure systems and legal reviews required for handling classified requests. Overall, payments to telecom and firms for such access reached hundreds of millions yearly, reflecting the scale of and certification efforts to meet FISA standards. Tech firms resisted aspects of the regime through legal filings, including amicus briefs supporting challenges to bulk collection authorities, arguing for narrower interpretations of laws to limit incidental collection of U.S. persons' data. Following disclosures, companies invested billions in enhanced protocols—such as Apple's end-to-end implemented in 2014 and Google's similar advances for and services—which reduced the feasibility of content extraction under directives, though metadata collection and upstream interception persisted via other authorities. Following the June 6, 2013, public disclosure of PRISM via leaked documents, senior executives from major technology firms including , , and issued statements explicitly denying that the (NSA) possessed "direct access" to their user data servers. 's chief legal officer, David Drummond, asserted that " does not provide any government, including the U.S. government, with any direct access to our systems." 's chief security officer, Joe Sullivan, similarly stated that the company "did not provide any government organization access to our servers containing user information." spokesperson emphasized compliance solely "when we receive a legally binding order or ." These responses highlighted that data production occurred pursuant to reviewed legal directives under Section 702 of the (FISA) Amendments Act of 2008, rather than through automated or unrestricted mechanisms. Constrained by statutory nondisclosure requirements, affected companies initiated to contest the breadth and of FISA orders. In 2013, a Foreign Intelligence Surveillance Court (FISC) panel ruled in favor of Yahoo's challenge, mandating the U.S. government to declassify portions of opinions related to compelled PRISM participation, thereby allowing limited public insight into compliance processes. and other firms filed motions seeking permission to disclose aggregate FISA request volumes, arguing that would demonstrate adherence to lawful bounds without compromising . These efforts underscored companies' positions that while obligated to respond to valid court directives, they sought judicial validation of order scopes to affirm legal compliance. The , signed into law on June 2, 2015, addressed such challenges by authorizing electronic communication service providers to publish banded aggregate statistics on requests, including FISA Section 702 directives, in semiannual or annual reports. This provision enabled firms like and to report receipt of thousands of such orders annually without specifying targets or content, marking a shift from total secrecy to constrained disclosure. Office of the Director of National Intelligence (ODNI) annual statistical transparency reports, mandated under Section 702 oversight, quantify directive scales through non-U.S. person target counts, which proxy issuance volumes to providers. These figures rose from 232,432 targets in calendar year (CY) 2021 to 246,073 in CY2022, 268,590 in CY2023, and 291,824 in CY2024, indicating sustained expansion in program utilization amid renewals. Providers' compliance with these directives remains governed by FISC-approved minimization procedures to limit incidental U.S. person data handling.

Post-Disclosure Transparency Measures

Following the 2013 disclosures, U.S. technology companies, compelled by Section 702 directives for PRISM collection, sought and obtained partial permission from the Foreign Intelligence Surveillance Court to publish aggregated transparency reports on requests, including those under FISA Section 702. These reports, starting in 2014, detail ranges of orders received, such as Apple's semi-annual disclosures of letters and FISA processes, which encompass 702-related directives; for example, Apple reported 0-249 such orders in the first half of 2014, with subsequent reports showing consistent bands in the hundreds annually across providers like and . The Office of the also began issuing annual statistical transparency reports on 702 surveillance, revealing targeted acquisitions primarily against non-U.S. persons, with over 246,000 such targets in one reported year, underscoring the program's foreign focus amid incidental U.S. person collections subject to minimization rules. Industry groups, including coalitions of tech firms under initiatives like Reform Government Surveillance, advocated for enhanced disclosures and warrant requirements for querying incidentally collected U.S. person data in 702 repositories, arguing for stricter protections against domestic overreach. However, empirical assessments from oversight bodies indicate that direct targeting of U.S. persons remains prohibited, with incidental collections forming a limited subset relative to foreign acquisitions—estimated through Privacy and Civil Liberties Oversight Board analyses as manageable under existing procedures, though exact U.S. person volumes are not fully disaggregated publicly. These measures, including FBI querying limits and annual certifications, have sustained program operations with incremental reforms, affirming operational legitimacy through verifiable, bounded application rather than wholesale suspension. In the 2020s, the 2018 further supported transparency-compliant access by clarifying U.S. providers' obligations to disclose and produce data stored abroad under lawful orders, bypassing protracted mutual legal assistance treaties and enabling efficient compliance akin to PRISM's domestic frameworks for overseas-stored communications. This legislation, integrated into broader authorizations, has facilitated executive agreements with allies for reciprocal while mandating safeguards, extending PRISM-like mechanisms without eroding core efficacy.

Effectiveness and Security Outcomes

Documented Counterterrorism Successes

The has attributed disruptions of more than 50 potential terrorist attacks worldwide to intelligence collected under programs authorized by Section 702 of the , which encompasses PRISM's acquisition of communications content from U.S. tech companies targeting non-U.S. persons abroad. In congressional testimony, NSA Director General Keith Alexander specified that these efforts included 13 plots targeting the U.S. , with PRISM's intercepts playing a key role in providing actionable foreign intelligence leads to domestic . A prominent example is the 2009 New York City subway bombing plot led by , an Afghan-American operative linked to . PRISM collection yielded email communications between Zazi and his handlers in , revealing bomb-making instructions and travel plans, which prompted FBI intervention and Zazi's arrest on September 9, 2009, averting an attack involving hydrogen peroxide-based explosives in backpacks. Similarly, in September 2010, Section 702-derived intelligence, including content from online communications, disrupted a plot by extremists to conduct coordinated shootings at a Danish newspaper office, mirroring the ' tactics of multiple gunmen targeting public sites. From 2013 onward, declassified examples highlight and related 702 collections' role in countering evolving threats. NSA analysts used foreign-targeted internet communications to track ISIS operative Hajji Muter, identifying his bomb-making activities in from 2014 to 2016 and enabling partner forces to neutralize him, thereby disrupting recruitment and attack planning networks. The Privacy and Oversight Board, in its review of Section 702, affirmed that such collections provide "unique foreign intelligence" essential for , including real-time content that accelerates tip generation and shortens operational timelines compared to metadata alone. This has extended to identifying cyber-enabled terrorist financing and ISIS online recruiters through and data, contributing to captures in multiple cases through 2024.

Empirical Evidence of Value

Audits conducted by the Office of the (ODNI) and the Privacy and Civil Liberties Oversight Board (PCLOB) demonstrate Section 702 collections, including those under the PRISM program, provide substantial foreign value. In 2022, Section 702 data supported 59% of articles in the and contributed to nearly 20% of all (NSA) reporting, either entirely or in part. These figures underscore PRISM's role in generating actionable insights on foreign threats, with ODNI vignettes documenting its use in identifying plots, disrupting threats, and revealing internal foreign discussions of value. Targeting under Section 702 exhibits high accuracy and low error rates, as validated by Foreign Intelligence Surveillance Court (FISC) reviews and agency compliance assessments. NSA targeting compliance exceeded 99.85% from summer 2019 to fall 2021, with incident rates ranging from 0.05% to 0.15%, while targeting achieved 99.99% compliance over similar periods, rejecting only 0.07% of proposed targets since 2008. These low false positive rates in selector validation ensure collections focus on non-U.S. persons abroad reasonably believed to possess foreign intelligence, minimizing extraneous acquisitions. Operational impacts include contributions to and disruptions, with Section 702-derived intelligence aiding in the identification of threats such as a late October 2023 foreign terrorist plot against U.S. in the . Analyses from institutions like Brookings highlight PRISM's targeted nature—retrieving specific data like archived communications rather than indiscriminate bulk collection—and its utility in post-incident investigations, such as analyzing call patterns in the bombing to rule out broader networks. data gaps in threat attribution persist without such tools, as evidenced by the reliance on electronic communications for tracking non-state actors, where traditional diplomatic or alternatives often prove insufficient or delayed.

Assessments of Operational Impact

Following the 2013 disclosures, adversaries such as terrorist organizations accelerated adoption of end-to-end encrypted platforms like and Telegram, reducing the accessibility of plaintext communications for . This shift prompted U.S. countermeasures, including NSA investments in cryptographic exploitation, vulnerability discovery, and collaboration with private sector entities to access encrypted data streams without routine backdoors. Despite these adaptations, PRISM collection under Section 702 sustained high operational yield, accounting for approximately 91% of communications acquired by the NSA in 2011 and supporting over 77,000 intelligence reports by 2012 through targeted foreign intelligence tasking. By 2023-2025, Section 702 authorities enabling PRISM expanded beyond counterterrorism to address transnational threats, including foreign narcotics cartels trafficking fentanyl precursors and finished products into the U.S. Intelligence derived from these collections revealed smuggling techniques, cartel hierarchies, and involvement of foreign officials, facilitating disruptions such as interdictions and indictments. Legislative adjustments in the 2024 Reforming Intelligence and Securing America Act explicitly certified narco-traffickers as valid targets under Section 702 when linked to national security priorities, affirming the program's adaptability amid reauthorization debates. The U.S. intelligence community maintains that PRISM's contributions—ranging from thwarting specific terrorist operations to yielding unique foreign intelligence on and risks—result in a net enhancement of , outweighing evasion challenges through iterative targeting refinements and minimal incidental domestic collection. This assessment, drawn from declassified vignettes and oversight reports, underscores causal links between collection and actionable outcomes, such as military strikes and threat warnings, while acknowledging persistent needs for technological evolution against encrypted evasion.

Criticisms and Debates

Privacy and Civil Liberties Concerns

The and have criticized PRISM, as part of Section 702 surveillance, for enabling warrantless "backdoor" searches of Americans' communications incidentally collected while targeting non-U.S. persons abroad. These groups argue that the lack of individualized warrants for U.S. person queries undermines Fourth Amendment protections, as federal agencies like the FBI can access vast troves of domestic data without . Office of the Director of National Intelligence (ODNI) transparency reports indicate that U.S. person queries of Section 702 data, including from collections, numbered over 200,000 annually by agencies such as the NSA and FBI in recent years, with FBI queries alone exceeding 119,000 in one reported period. Critics, including the , highlight the risk of abuse in these queries, citing NSA reports documenting thousands of incidents from 2011 to 2018, including unauthorized disseminations and improper querying that exposed U.S. persons' . Concerns over have focused on the program's expansion beyond foreign intelligence to domestic criminal investigations, such as narcotics cases, despite statutory limits. The Foreign Intelligence Surveillance Court (FISC) has addressed flaws in upstream collection under Section 702—related to PRISM's broader framework—noting in opinions that practices like acquiring entire transactions involving U.S. persons violated minimization procedures, prompting operational halts in certain "about" collections by 2017. Public opinion polls reflect widespread apprehension, with a 2013 Pew Research Center survey finding 53% of Americans disapproving of government collection of telephone and data for anti- purposes, marking a shift where concerns surpassed fears post-Snowden disclosures. These revelations have intensified debates over encryption, as privacy advocates argue that PRISM's reliance on compelled access from tech firms underscores the need for to block such government demands.

Claims of Overreach and Abuse

Critics have alleged overreach in PRISM operations, citing instances where the NSA collected data beyond authorized foreign intelligence targets, though such errors were addressed through mandatory purges and represented a small fraction of overall acquisitions. In a 2011 Foreign Intelligence Surveillance Court (FISC) ruling, the NSA's upstream Section 702 collection—distinct from but related to PRISM's downstream mechanisms—incidentally acquired tens of thousands of wholly domestic communications due to technical misconfigurations in filtering person identifiers; the court ordered segregation and eventual deletion of this overcollected data to rectify the violation. Similar compliance lapses persisted into 2012 and 2013, including unauthorized retention of certain Section 702 data subject to purge requirements, prompting the NSA to delete affected datasets and refine targeting procedures as remedial actions. Personnel abuses were rare amid the program's vast scale. Between 2003 and 2013, internal NSA audits documented approximately 12 confirmed cases of "," where analysts improperly queried PRISM-derived data on personal romantic interests, a minuscule number relative to the agency's handling of billions of intelligence tasks annually; violators faced administrative sanctions, and no evidence emerged of widespread exploitation beyond isolated incidents. These errors, while highlighting risks in access controls, were self-reported and mitigated through enhanced oversight, underscoring their infrequency against the backdrop of targeted foreign-focused operations. Snowden's disclosures fueled claims of blanket domestic spying, portraying as indiscriminately vacuuming all communications, yet declassified documents reveal targeting confined to specific non-US person selectors overseas, with incidental US person data comprising under 0.01% of the US population based on annual target counts hovering around 200,000-250,000 foreign entities. amplification of totalitarian overreach narratives often overlooked this empirical targeting precision, reflecting a tendency in left-leaning outlets to prioritize over foreign imperatives despite official reports confirming purge protocols and minimal systemic deviance.

Counterarguments on Necessity and Proportionality

Defenders of PRISM's implementation under Section 702 of the Foreign Intelligence Surveillance Act argue that its necessity stems from the exigencies of countering agile foreign threats, where traditional warrant-based processes—designed for domestic targets—cannot accommodate the speed and scale required for overseas intelligence collection, allowing targets to be tasked or detasked in minutes based on evolving indicators. In a threat landscape marked by terrorism, cyberattacks, and proliferation, alternatives like individualized warrants for non-U.S. persons abroad would introduce prohibitive delays, as jurisdictional barriers and the volume of global communications render such mechanisms impractical for real-time foreign intelligence. Proportionality is upheld through court-approved targeting limited to non-U.S. persons reasonably believed to be located outside the , coupled with minimization rules that purge or restrict access to incidentally acquired U.S. persons' data unless it meets foreign intelligence criteria, achieving compliance rates above 99% in targeting procedures. The program's empirical contributions include providing pivotal intelligence that foiled the 2009 bombing by intercepting an courier's email to a U.S.-based operative, enabling arrests and convictions, as well as identifying ISIS recruiter Shawn Parson and his network, averting attacks in the U.S. and through shared leads with allies. It also supported the 2016 elimination of ISIS leader Hajji Iman by tracking his communications over two years, yielding actionable insights into his operations. Bipartisan evaluations, including Privacy and Civil Liberties Oversight Board assessments, conclude that these security benefits—such as informing 59% of 2022 presidential daily brief articles and over 20% of NSA reporting—outweigh incidental encroachments when mitigated by oversight, with no verified evidence of intentional political abuse in collection or targeting. Claims of systemic overreach for domestic political ends remain unsubstantiated, as reviews attribute compliance lapses primarily to post-collection querying rather than the upstream acquisition process itself. Absolutist postures, by contrast, risk eroding deterrence against adversaries who route operations through foreign channels, as the program's track record in disrupting plots demonstrates that calibrated preserves without feasible substitutes.

Key Lawsuits and Court Decisions

One prominent lawsuit challenging the NSA's surveillance practices, including those akin to , is , filed in 2008 by the on behalf of plaintiff Tashia Jewel and others, alleging Fourth Amendment violations through warrantless bulk collection of communications from U.S. persons via programs like . The U.S. District Court for the Northern District of California initially dismissed the case in 2011, ruling that plaintiffs failed to establish standing under the (FISA) by not proving they were specifically aggrieved parties. The Ninth Circuit Court of Appeals reversed in part in 2015, finding that Jewel had alleged a sufficiently injury for standing on Fourth Amendment claims, allowing the case to proceed past the pleadings stage despite government assertions of . The case encountered further procedural obstacles, including government invocations of the state secrets doctrine, drawing on precedents like Al-Haramain Islamic Foundation v. Bush (2007-2012), where the Ninth Circuit held that FISA partially displaces the state secrets privilege for surveillance disputes but still permitted dismissal of sensitive evidence claims. In Jewel, the district court in 2019 granted partial summary judgment to the government on FISA claims due to lack of evidence of illegal targeting, while allowing constitutional claims to advance, but the Ninth Circuit affirmed dismissal of core dragnet allegations in 2021, citing insufficient particularized injury traceable to PRISM-specific collection. The U.S. Supreme Court denied certiorari in June 2022, effectively ending the case without reaching the merits of PRISM's constitutionality and underscoring courts' reluctance to grant standing in mass surveillance suits absent direct proof of victimization. The 2018 Supreme Court decision in Carpenter v. United States, which required warrants for historical cell-site location data as a Fourth search, has been invoked in subsequent 702-related challenges but distinguished by courts due to PRISM's focus on foreign targets under FISA, where incidental U.S. person collection is authorized without individualized warrants. Lower courts have declined to extend Carpenter's reasoning to Section 702 upstream or PRISM acquisitions, viewing them as categorical foreign intelligence tools rather than domestic tracking, thus preserving the program's framework. Challenges to Section 702 renewals persisted into 2023-2024, with suits like those from the ACLU questioning compliance and querying of U.S. persons' data, but the Foreign Intelligence Surveillance Court (FISC) approved certifications with mandated reforms, such as enhanced FBI query restrictions, without invalidating core operations. These rulings highlight procedural survivability, as courts have upheld the program amid compliance tweaks rather than substantive overhauls, often deferring to national security equities over broad injunctions.

FISA Amendments Act Reauthorizations

The FISA Amendments Act of 2008, which includes Section 702 authorizing programs like PRISM, initially contained a set to expire on December 31, 2012. reauthorized Section 702 through the FISA Amendments Act Reauthorization Act of 2012, extending its provisions until December 31, 2017, with added transparency measures such as semiannual reports on acquisition and dissemination of U.S. person data. A subsequent reauthorization in 2017, enacted as the FISA Amendments Reauthorization Act of 2017, further extended Section 702 until December 31, 2023, while imposing restrictions on queries of U.S. person identifiers and enhancing oversight by the Foreign Intelligence Surveillance Court (FISC). As the 2023 expiration approached, reauthorization efforts faced significant delays amid debates over requiring warrants for domestic queries of Section 702 data involving U.S. persons, with proponents arguing such measures would address incidental collection without halting foreign-targeted surveillance. The initially advanced a in February 2024 mandating warrants for certain queries, but it stalled in the ; subsequent votes rejected amendments, with the House passing a cleaner extension on April 12, 2024, by a 273-147 margin. The Senate followed suit, and President Biden signed the Reforming Intelligence and Securing America Act (RISAA) on April 20, 2024, reauthorizing Section 702 for two years until April 19, 2026, alongside reforms like expanded FBI query training and penalties for misuse. These delays, while prompting incremental compliance enhancements, did not result in a lapse of authority, as existing certifications remained operative during negotiations. In 2025, Section 702 operates under the 2024 certifications approved by the FISC in March, with ongoing joint compliance assessments by the Department of Justice and Office of the confirming adherence to minimization procedures by agencies including the NSA, FBI, CIA, and NCTC. Discussions for the next reauthorization, due by 2026, have begun amid heightened emphasis on cyber threats from state actors, with proposals like Senator Cotton's 2025 plan suggesting an additional 18-month extension to allow further review. These periodic sunsets have facilitated and targeted adjustments, such as limits on FBI backdoor searches, without undermining the program's continuity for foreign intelligence collection.

Reforms and Ongoing Adjustments

Following the 2013 disclosures, the U.S. government implemented several procedural adjustments to Section 702 surveillance, including PRISM, to enhance compliance and address incidental collection of U.S. persons' data. In 2015, the Director of National Intelligence and Attorney General directed the NSA to cease certain "about" collection practices—where communications were acquired if they referenced a foreign intelligence selector without being to or from it—and to purge previously collected data lacking foreign intelligence value. These changes, formalized in amended targeting procedures approved by the Foreign Intelligence Surveillance Court, applied across Section 702 acquisitions to minimize retention of non-pertinent information. Purge rules were further tightened through updated minimization procedures, requiring expedited deletion of communications from U.S. persons when they were solely domestic or deemed wholly unconnected to foreign intelligence purposes. The and Oversight Board noted in its 2023 report that these post-disclosure audits led to internal discoveries and remediation of the majority of compliance shortfalls, with NSA's oversight mechanisms identifying issues before external reporting. Empirical data from semiannual assessments show NSA targeting incident rates remained low in subsequent periods, with routine reminders and procedural refinements contributing to sustained adherence. Regarding Section 702(b)(5), which permits queries of acquired data using U.S. person identifiers for foreign intelligence, proposed limits focused on FBI practices amid concerns over improper domestic law enforcement queries. In 2021 and 2022, the FBI enacted major querying reforms, including mandatory training, supervisory approvals for certain searches, and technological filters, resulting in a marked decline in reported violations—down from over 3,000 in 2019 to fewer than 100 by early 2023. These adjustments, upheld in Foreign Intelligence Surveillance Court rulings, balanced access for valid foreign intelligence needs without mandating warrants, preserving operational flexibility. The 2024 reauthorization of the FISA Amendments Act introduced ongoing refinements, such as expanded reporting on querying volumes, involvement in court proceedings, and prohibitions on purchasing commercially available data to circumvent Section 702 restrictions. These evolutions reflect adaptive oversight, with semiannual joint assessments by the Attorney General and confirming that compliance enhancements did not impair the program's capacity for targeted foreign intelligence collection. Emerging integrations of advanced analytics, including for pattern detection in large datasets, continue to refine targeting precision while adhering to tightened procedural safeguards.

References

  1. [1]
    [PDF] NSA's Implementation of Foreign Intelligence Surveillance Act ...
    The service providers are compelled to provide NSA with communications to or from these selectors. This has been generally referred to as the PRISM program.<|separator|>
  2. [2]
    NSA Stops Certain Section 702 "Upstream" Activities
    Apr 28, 2017 · Under Section 702, NSA collects internet communications in two ways: "downstream" (previously referred to as PRISM) and "upstream." Under ...
  3. [3]
    NSA Prism program taps in to user data of Apple, Google and others
    Jun 7, 2013 · The Prism program allows the NSA, the world's largest surveillance organisation, to obtain targeted communications without having to request ...
  4. [4]
    EPIC v. DOJ – PRISM
    Under the PRISM program, the National Security Agency (“NSA”) obtains electronic communications in real-time from Internet service providers, including ...
  5. [5]
    The NSA Continues to Violate Americans' Internet Privacy Rights
    Aug 22, 2018 · PRISM is a warrantless wiretapping program that operates around the clock, vacuuming up emails, Facebook messages, Google chats, Skype calls, ...
  6. [6]
    Decoding 702: What is Section 702? - Electronic Frontier Foundation
    Section 702 is a surveillance authority passed as part of the FISA Amendments Act in 2008. That law amended the Foreign Intelligence Surveillance Act of 1978.
  7. [7]
    [PDF] Section 702 Basics - DNI.gov
    Section 702 is a key provision of the FISA Amendments Act of 2008 that permits the government to conduct targeted surveillance of foreign persons located ...
  8. [8]
    [PDF] Section 702 and the Collection of International Telephone and ...
    Jun 27, 2013 · PowerPoint slides attributed to the NSA, describing a program called “PRISM” (also known by its SIGAD, US-984XN).3 The title. 1. Barton ...
  9. [9]
    [PDF] PRISM/US-984XN Overview
    A target's phone call, e-mail or chat will take the cheapest path, not the physically most direct path - you can't always predict the path. • Your target's.Missing: Section | Show results with:Section
  10. [10]
    Overview of Constitutional Challenges to NSA Collection Activities
    Apr 1, 2014 · This program is frequently described as collecting telephony metadata "in bulk" to distinguish it from the narrower collection of metadata ...
  11. [11]
    What is known about NSA's PRISM program - Electrospaces.net
    Apr 23, 2014 · ... dates when PRISM collection began for each provider: - Microsoft: September 11, 2007 - Yahoo: March 12, 2008 - Google: January 14, 2009 - ...
  12. [12]
    NSA files decoded: Edward Snowden's surveillance revelations ...
    Nov 1, 2013 · It is a “downstream” program – which means the agency collects the data from Google, Facebook, Apple, Yahoo and other US internet giants.
  13. [13]
    Reforming 702: An Overview - Epic.org
    Feb 9, 2023 · Section 702 of the FISA Amendments Act authorizes surveillance programs targeting non-US persons reasonably believed to be outside the United States.
  14. [14]
    Are They Allowed to Do That? A Breakdown of Selected ...
    Jul 15, 2013 · Section 702 allows the government to acquire foreign intelligence by targeting non-U.S. persons “reasonably believed” to be outside U.S. borders ...
  15. [15]
    Reforming Surveillance Authorities | Cato Institute
    A 2014 review by the Privacy and Civil Liberties Oversight Board (PCLOB) noted that, by 2011, the NSA was collecting more than 250 million internet ...
  16. [16]
    Foreign Intelligence Surveillance Act / FISA Section 702 - INTEL.gov
    Section 702 authorizes targeted intelligence collection of specific types of foreign intelligence information—such as information concerning international ...Missing: PRISM | Show results with:PRISM
  17. [17]
    Surveillance of Foreigners Outside the United States Under Section ...
    Apr 13, 2016 · Significant details about the use and implementation of Section 702 of Title VII, which provides procedures for targeting non-U.S. persons who ...<|separator|>
  18. [18]
    None
    ### Summary of Pre-2013 NSA PRISM Operational Details under Section 702
  19. [19]
    Reauthorization of Title VII of the Foreign Intelligence Surveillance Act
    Mar 17, 2023 · Section 702 may only be used to target non-U.S. persons who are reasonably believed to be outside the United States in order to obtain foreign ...<|control11|><|separator|>
  20. [20]
    ODNI Releases April 2024 FISC Opinion on FISA 702 Recertifications
    Nov 12, 2024 · Under FISA Section 702, the Government may annually submit one or more certifications to the FISC which specify the categories of foreign ...
  21. [21]
    Oversight of Section 702 of the Foreign Intelligence Surveillance Act ...
    Jun 13, 2023 · Under Section 702, the FISC approves annual certifications submitted by the Attorney General and the Director of National Intelligence (DNI) ...<|separator|>
  22. [22]
    [PDF] Annual Statistical Transparency Report - DNI.gov
    Apr 4, 2024 · CERTIFICATIONS. Under Section 702, the Attorney General and DNI jointly execute certifications under which the IC intends to acquire ...
  23. [23]
    U.S., British intelligence mining data from nine U.S. Internet ...
    Jun 7, 2013 · PRISM was launched from the ashes of President George W. Bush's secret program of warrantless domestic surveillance in 2007, after news media ...Missing: authorization | Show results with:authorization
  24. [24]
    NSA Reportedly Mines Servers Of U.S. Internet Firms For Data - NPR
    Jun 6, 2013 · The program has grown rapidly since it was begun in 2007, The Post reports, with the NSA using PRISM "as its leading source of raw material, ...Missing: origins authorization
  25. [25]
    What is the Protect America Act? - Department of Justice
    The Protect America Act modernized the Foreign Intelligence Surveillance Act (FISA) to provide our intelligence community essential tools to acquire important ...
  26. [26]
    U.S. NSA Internet spying foiled plot to attack New York subways
    Jun 7, 2013 · ... surveillance helped foil an Islamist militant plot to bomb the New York City subway system in 2009, U.S. government sources said on Friday.
  27. [27]
    [PDF] 54 Attacks in 20 Countries Thwarted By NSA Collection
    Zazi and his co-conspirators were subsequently arrested, and the attack thwarted. Upon indictment, Zazi pled guilty to conspiring to bomb the New York City ...
  28. [28]
    [PDF] PCLOB-Section-702-Report-PRE-RELEASE.pdf - Just Security
    Jul 2, 2014 · Under one program, implemented under Section 215 of the USA PATRIOT Act, the NSA collects domestic telephone metadata (i.e., call records) in ...
  29. [29]
  30. [30]
  31. [31]
    Reforming Section 702 of the Foreign Intelligence Surveillance Act ...
    Dec 8, 2023 · Under Section 702, the National Security Agency (NSA) can intercept emails, phone calls, and text messages from specific non-Americans overseas— ...
  32. [32]
    No evidence of NSA's 'direct access' to tech companies - CNET
    Jun 7, 2013 · Recent reports in The Washington Post and The Guardian claimed a classified program called PRISM grants "intelligence services direct access to ...Missing: directives | Show results with:directives
  33. [33]
    US tech giants knew of NSA data collection, agency's top lawyer ...
    Mar 19, 2014 · NSA general counsel Rajesh De says big tech companies like Yahoo and Google provided 'full assistance' in legally mandated collection of data.
  34. [34]
    Upstream vs. PRISM - Electronic Frontier Foundation
    Both also fall under a surveillance authority known as Section 702 , a provision of law that was enacted by the FISA Amendments Act of 2008 and is set to expire ...
  35. [35]
    NSA paid millions to cover Prism compliance costs for tech companies
    Aug 23, 2013 · The National Security Agency paid millions of dollars to cover the costs of major internet companies involved in the Prism surveillance programMissing: volume 250
  36. [36]
    Internet Giants Got Millions From Taxpayers to Cover PRISM Spying ...
    Aug 23, 2013 · Internet giants like Google and Yahoo received millions of dollars from the NSA to cover their surveillance under the PRISM program.
  37. [37]
    Yahoo $250000 daily fine over NSA data refusal was set to double ...
    Sep 11, 2014 · Company releases 1,500 documents from failed suit against NSA over user data requests and cooperation with Prism compliance.
  38. [38]
    Tech companies received millions for PRISM compliance costs
    Aug 26, 2013 · The NSA reimbursed the costs that Google, Facebook, Microsoft and Yahoo incurred for having to meet new certification demands following a FISC ...
  39. [39]
    A Guide to What We Now Know About the NSA's Dragnet Searches ...
    Aug 9, 2013 · According to renowned surveillance journalist James Bamford, Prism was designed to fill "gaps in the coverage" provided by the NSA's Upstream ...Missing: FAIRVIEW PRTT
  40. [40]
    XKeyscore: NSA tool collects 'nearly everything a user does on the ...
    Jul 31, 2013 · "XKeyscore is used as a part of NSA's lawful foreign signals intelligence collection system. "Allegations of widespread, unchecked analyst ...
  41. [41]
    NSA Spying FAQ - Electronic Frontier Foundation
    Are ordinary American's domestic communications included in the surveillance? Yes. The lawsuits alleges that AT&T, plus Verizon and other major ...<|separator|>
  42. [42]
    Booz Allen Statement on Reports of Leaked Information
    Snowden, who had a salary at the rate of $122,000, was terminated June 10, 2013 for violations of the firm's code of ethics and firm policy. News reports that ...
  43. [43]
    Contractor fires Snowden from $122,000-a-year job - USA Today
    Jun 11, 2013 · Edward Snowden, 29, worked as a contract employee at the National Security Agency. ... The consulting firm Booz Allen Hamilton issued a statement ...
  44. [44]
    Edward Snowden and the NSA files – timeline - The Guardian
    Jun 24, 2013 · 8 June Another of Snowden's leaks reveals the existence of an internal NSA tool – Boundless Informant – that allows it to record and analyse ...
  45. [45]
    Edward Snowden: the whistleblower behind the NSA surveillance ...
    Jun 9, 2013 · The 29-year-old source behind the biggest intelligence leak in the NSA's history explains his motives, his uncertain future and why he never intended on hiding ...
  46. [46]
    Snowden: I raised NSA concerns internally over 10 times before ...
    Mar 7, 2014 · He was working for Booz Allen Hamilton at an NSA facility in Hawaii at the time he leaked information about government programs to the press.
  47. [47]
    'No Evidence' Snowden Raised Concerns While At NSA - NPR
    May 29, 2014 · In it, Snowden asks if the NSA's Office of General Counsel can "clarify" his understanding that presidential executive orders may supersede ...
  48. [48]
    [PDF] House Intelligence Committee Review of Edward Snowden ...
    Snowden's disclosures did tremendous damage to U.S. national security, and the Committee remains concerned that more than three years after the start of the ...
  49. [49]
    Snowden charged with 3 felonies - POLITICO
    Jun 22, 2013 · Snowden was charged with conveying classified information to an unauthorized party, disclosing communications intelligence information, and ...
  50. [50]
    Russia gives whistleblower Edward Snowden permanent residency ...
    Oct 22, 2020 · Snowden, 37, fled the United States and was given asylum in Russia after leaking secret files in 2013 that revealed vast domestic and ...
  51. [51]
    A decade on, Edward Snowden remains in Russia, though U.S. laws ...
    Jun 4, 2023 · Snowden fled the US in 2013 and revealed highly classified US surveillance programs. He's been living in Russia for the past decade, and received Russian ...
  52. [52]
    United States Obtains Final Judgment and Permanent Injunction ...
    Oct 1, 2020 · The US District Court for the Eastern District of Virginia entered a final judgment and permanent injunction against Edward Snowden.
  53. [53]
    What's in the Rest of the Top-Secret NSA PowerPoint Deck? - WIRED
    Jun 10, 2013 · A still mostly unpublished 41-slide presentation, classified top secret, that Snowden gave to the Washington Post and the Guardian to expose the NSA's internet ...
  54. [54]
    Washington Post releases four new slides from NSA's Prism ...
    Newly published top-secret documents detail how NSA interfaces with tech giants such as Google, Apple and Microsoft.Missing: cloud declassified
  55. [55]
    Boundless Informant: the NSA's secret tool to track ... - The Guardian
    Jun 8, 2013 · The Boundless Informant documents show the agency collecting almost 3 billion pieces of intelligence from US computer networks over a 30-day ...Missing: PRISM | Show results with:PRISM
  56. [56]
    Boundless Informant: US gov't collects 100 billion surveillance ...
    Jun 8, 2013 · Boundless Informant: US gov't collects 100 billion surveillance records a month. Meet the U.S. National Security Agency's global intelligence ...Missing: metrics | Show results with:metrics
  57. [57]
    Prism Leak: Inside the Controversial US Data Surveillance Program
    Jun 10, 2013 · The value of big data analysis for US intelligence agencies can be seen in the amount the NSA and CIA are investing in it. Not only does this ...Missing: analytics | Show results with:analytics<|separator|>
  58. [58]
    PRISM scandal: tech giants flatly deny allowing NSA direct access to ...
    Silicon Valley executives insist they did not know of secret PRISM program that grants access to emails and search history.
  59. [59]
    Americans Disapprove of Government Surveillance Programs
    Jun 12, 2013 · More Americans disapprove (53%) than approve (37%) of the government program that obtained telephone call logs and Internet communication ...Missing: PRISM | Show results with:PRISM
  60. [60]
    Few See Adequate Limits on NSA Surveillance Program
    Jul 26, 2013 · Overall, Democrats approve of the government's data collection program by a 57%-36% margin, while Republicans (44% approve, 50% disapprove) and ...
  61. [61]
    NSA whistleblower Edward Snowden: 'I don't want to live in a society ...
    Jun 9, 2013 · NSA whistleblower Edward Snowden: 'I don't want to live in a society that does these sort of things' – video ... Guardian US. Sun 9 Jun 2013 13.26 ...Missing: date | Show results with:date
  62. [62]
    Obama defends surveillance effort as 'trade-off' for security | Reuters
    Jun 7, 2013 · President Barack Obama on Friday staunchly defended the sweeping U.S. government surveillance of Americans' phone and internet activity, ...
  63. [63]
    Barack Obama defends US surveillance tactics - BBC News
    Jun 8, 2013 · President Barack Obama has defended newly revealed US government phone and internet surveillance programmes, saying they are closely overseen by Congress and ...
  64. [64]
    Clapper Apologizes For Answer On NSA's Data Collection - NPR
    Jul 2, 2013 · ... Americans," he answered, "No sir," before adding, "Not wittingly." Clapper says that answer was clearly wrong.
  65. [65]
    Clapper: I gave 'erroneous' answer because I forgot about Patriot Act
    Jul 2, 2013 · Intelligence chief tries to explain false Senate testimony by saying he 'simply didn't think' of NSA's efforts to collect phone data.
  66. [66]
    NSA Documents Released to the Public Since June 2013 - ACLU
    On June 5, 2013, The Guardian released the first in a series of documents detailing the NSA's spying activities. Listed below are all of the documents released ...
  67. [67]
    NSA used PRISM to collect more than 200 million internet ...
    Aug 21, 2013 · NSA used PRISM to collect more than 200 million internet communications a year as of 2011 ... 250 million “internet communications” each ...Missing: annual volume
  68. [68]
    [PDF] Report on the Telephone Records Program Conducted under ...
    Jan 23, 2014 · ... data collection by the NSA. As we believe the foregoing analysis has demonstrated, sanctioning the NSAss program under. Section 215 requires ...
  69. [69]
    [PDF] LIBERTY AND SECURITY IN A CHANGING WORLD
    Dec 12, 2013 · Consistent with your memorandum of August 27, 2013, our recommendations are designed to protect our national security and advance our foreign ...
  70. [70]
    The New USA Freedom Act: A Step in the Right Direction, but More ...
    Apr 30, 2015 · The new USA Freedom Act does not address Section 702 of the FISA Amendments Act, the problematic 2008 law that the government uses for PRISM ...
  71. [71]
    Biden signs reauthorization of surveillance program into law despite ...
    Apr 20, 2024 · "This reauthorization of Section 702 gives the United States the authority to continue to collect foreign intelligence information about non-U. ...
  72. [72]
    [PDF] FISA SECTION 702 VALUE - INTEL.gov
    Feb 14, 2024 · HACKS TARGETING U.S. OFFICIALS: The Deputy Attorney General personally attested to the immense value of Section 702 and U.S. person queries.
  73. [73]
    [PDF] report on the surveillance program operated pursuant to section 702
    Sep 28, 2023 · ... FISA Amendments Act into law in July 2008.47 The. FISA Amendments Act replaced the expired Protect America Act provisions with the new Section.
  74. [74]
    An Opportunity to Stop Warrantless Spying on Americans
    Feb 14, 2023 · The report revealed that the FBI performed up to 3.4 million U.S. person queries of Section 702 data in 2021 alone. ODNI cautioned that this ...
  75. [75]
    A Look at the PCLOB Report on Section 702 | Lawfare
    Oct 3, 2023 · Section 702 aims to maintain the nimbleness of overseas collection, where targets can be added or deleted in minutes based on new intelligence ...
  76. [76]
    ODNI Releases March 2025 FISC Section 702 Certification Opinion ...
    Sep 12, 2025 · With any submitted Section 702 certification, the Government also must submit targeting, minimization, and querying procedures, which ensure ...
  77. [77]
    Intelligence Court Orders Government to Report on PRISM Collection
    Apr 20, 2016 · The Court identified serious “compliance and implementation issues” related to the Section 702 ("PRISM") surveillance program. The FISC ...<|separator|>
  78. [78]
    ODNI Releases September 2024 FISC Opinion on FISA 702 ...
    May 2, 2025 · The September 2024 FISC Opinion is the first FISC opinion issued after the re-authorization of Section 702 on April 20, 2024, and discusses many of the changes ...
  79. [79]
    [PDF] FISA Section 702 and the 2024 Reforming Intelligence and Securing ...
    Jul 8, 2025 · The last time Congress reauthorized Section 702 was on April 20, 2024, via the Reforming Intelligence and Securing America Act (RISAA), which ...
  80. [80]
    Five Things to Know About NSA Mass Surveillance and the Coming ...
    Apr 11, 2023 · Section 702 of the Foreign Intelligence Surveillance Act permits the US government to engage in mass, warrantless surveillance of Americans' international ...
  81. [81]
    EFF's Flagship Jewel v. NSA Dragnet Spying Case Rejected by the ...
    Jun 13, 2022 · NSA Dragnet Spying Case Rejected by the Supreme Court. We all deserve the right to have a private conversation online. That's why EFF has taken ...Missing: PRISM | Show results with:PRISM<|separator|>
  82. [82]
    U.S. court: Mass surveillance program exposed by Snowden was ...
    Sep 2, 2020 · The ruling will not affect the convictions of Moalin and his fellow defendants; the court ruled the illegal surveillance did not taint the ...
  83. [83]
    British spy agency taps cables, shares with NSA: Guardian | Reuters
    Jun 21, 2013 · They also collaborate with eavesdropping agencies in Canada, Australia and New Zealand under an arrangement known as the "Five Eyes" alliance.
  84. [84]
    Five Eyes | Privacy International
    In 1946, an alliance was formed between five anglophone countries and their security agencies: the US (NSA), the UK (GCHQ), Australia (ASD), Canada (CSEC) ...
  85. [85]
    GCHQ taps fibre-optic cables for secret access to world's ...
    Jun 21, 2013 · Britain's spy agency GCHQ has secretly gained access to the network of cables which carry the world's phone calls and internet traffic and has ...
  86. [86]
    Australian intelligence revealed to have access to PRISM
    Oct 15, 2015 · The next day it was revealed that NSA had provided PRISM access to the UK intelligence agency GCHQ. The Guardian wrote: "the British agency ...
  87. [87]
    Australia accessed NSA spy data more than UK over 12 months
    Oct 15, 2015 · Australia accessed private internet data gathered by the NSA even more than Britain, according to a previously unreported document released ...
  88. [88]
    Merkel, other European leaders raise concerns on U.S. surveillance
    Jun 10, 2013 · Other German officials said they were unhappy that their citizens appeared to have fewer rights than Americans. “I cannot be happy that U.S. ...
  89. [89]
    Europe furious, 'shocked' by report of U.S. spying | CNN
    Jul 1, 2013 · European officials reacted with fury Sunday to a report that the US National Security Agency spied on EU offices.Missing: PRISM | Show results with:PRISM
  90. [90]
    Germany says U.S. may have monitored Merkel's phone - Reuters
    Oct 23, 2013 · The German government has obtained information that the United States may have monitored the mobile phone of Chancellor Angela Merkel and ...
  91. [91]
    Snowden NSA: Germany drops Merkel phone-tapping probe - BBC
    Jun 12, 2015 · Mrs Merkel told the US government angrily that "spying between friends just isn't on". And the alleged spying shocked public opinion in Germany.
  92. [92]
    Brazilian president: US surveillance a 'breach of international law'
    Sep 24, 2013 · Brazil's president, Dilma Rousseff, has launched a blistering attack on US espionage at the UN general assembly, accusing the NSA of violating international ...
  93. [93]
    NSA surveillance: Merkel's phone may have been monitored 'for ...
    Oct 26, 2013 · Merkel's phone may have been monitored 'for over 10 years' as German officials prepare to travel to the US, Der Spiegel cites a previously secret NSA document.
  94. [94]
    Brazilian President Lashes Out Over U.S. Spying - WLRN
    Sep 24, 2013 · President Dilma Rousseff of Brazil was so angry about reports that the National Security Agency was spying on her and others in her country ...
  95. [95]
    Brazil to insist on local Internet data storage after US spying - DAWN ...
    Rousseff's insistence follows disclosures of surveillance by the United States in Brazil that went as far as tracking the personal phone calls and emails of ...
  96. [96]
    Report: France runs surveillance program like PRISM - CNN
    Jul 5, 2013 · “If revelations on the U.S. spying system (PRISM) led to a chorus of indignation in Europe, France only showed weak signs of protest. For two ...
  97. [97]
    Here's the building where the PRISM of France is storing all ... - Quartz
    French officials have denied that the country's own electronic surveillance program is illegal, but Le Monde reports that there are seven other French ...
  98. [98]
    France calls reported U.S. National Security Agency spying on its ...
    Oct 22, 2013 · LONDON – France reacted angrily Monday to a news report of mass electronic surveillance of its residents by the U.S. National Security ...Missing: PRISM | Show results with:PRISM<|separator|>
  99. [99]
    Global Responses to NSA Surveillance: Three Things to Know
    Oct 25, 2013 · The revelations regarding the NSA's PRISM surveillance program have triggered a series of strong reactions from states, including U.S. ...
  100. [100]
    [PDF] Global Cybersecurity Index 2024 - ITU
    The fifth edition of the GCI explores the current level of cybersecurity commitment among. 193 Member States and the State of Palestine and the progress made ...
  101. [101]
  102. [102]
    European Commission gives EU-US data transfers third round at ...
    Jul 10, 2023 · The US insisted that EU data would stay subject to US mass surveillance and "non-US" persons will not have the same protections as US persons.
  103. [103]
    China's 'Sharp Eyes' Program Aims to Surveil 100% of Public Space
    Mar 2, 2021 · Projects like the Golden Shield Project, Safe Cities, SkyNet, Smart Cities, and now Sharp Eyes mean that there are more than 200 million public ...
  104. [104]
    Symmetry in State Surveillance: The US and Russia - GeoHistory
    Jan 18, 2022 · PRISM is the code name for a state-run US surveillance program revealed in 2013 by former NSA contractor Edward Snowden. The program collects ...
  105. [105]
    [PDF] Global Cybersecurity Outlook 2025
    Jan 10, 2025 · 66% of respondents believe that AI will affect cybersecurity in the next 12 months, but only 37% have processes in place for safe AI deployment.
  106. [106]
    Edward Snowden & the NSA PRISM Program: 2025 Update
    Nov 21, 2024 · From the slides released by Snowden, we know that nine services collaborated: Microsoft, Yahoo, Google, Facebook, PalTalk, YouTube, Skype, AOL ...
  107. [107]
    Tech Giants Built Segregated Systems For NSA Instead Of ...
    Jun 8, 2013 · My sources confirm that the NSA did not have direct access or any special instant access to data or servers at the PRISM targets, but instead ...Missing: FISC | Show results with:FISC
  108. [108]
    NSA paying U.S. companies for access to communications networks
    Aug 29, 2013 · The National Security Agency is paying hundreds of millions of dollars a year to US companies for clandestine access to their communications networks.
  109. [109]
    Revelations of N.S.A. Spying Cost U.S. Tech Companies
    Mar 21, 2014 · Security analysts say tech companies have collectively spent millions and possibly billions of dollars adding state-of-the-art encryption ...
  110. [110]
    [PDF] TWO YEARS AFTER SNOWDEN | Amnesty International
    Companies – including Facebook, Google and Microsoft – were forced to handover their customers' data under secret orders through the NSA's Prism programme;
  111. [111]
    Dissecting Big Tech's Denial of Involvement in NSA's PRISM Spying ...
    Jun 7, 2013 · Apple, Google and more deny providing direct access to surveillance program. But experts say they might have had to.Missing: directives | Show results with:directives
  112. [112]
    Tech Giants Deny Granting NSA 'Direct Access' To Servers - NPR
    Jun 8, 2013 · Google, Facebook and others say they only allowed the government access to user data after reviewing legal requests for information under ...Missing: statements | Show results with:statements
  113. [113]
    Secret court sides with Yahoo, orders U.S. to declassify Prism ...
    A secret U.S. court overseeing government domestic surveillance activities has sided with Yahoo Inc and ordered the Obama administration to declassify and ...
  114. [114]
    Tech Giants Unite in Court Fight Against Government Surveillance ...
    Sep 10, 2013 · On Monday, Google, Yahoo, Facebook, and Microsoft filed motions asking to be allowed to release information showing how many requests they have ...
  115. [115]
    Key Changes Needed to The USA FREEDOM Act (H.R. 3361)
    Jun 26, 2014 · Transparency: Sec. 604 of the USA FREEDOM Act provides valuable improvements to transparency by permitting new company reporting, however ...
  116. [116]
    Google, Microsoft, Facebook Want 'Transparency' on US Requests
    Jun 11, 2013 · Three of the largest Internet companies called on the U.S. government to provide greater transparency on national security requests on ...
  117. [117]
    [PDF] Annual Statistical Transparency Report - INTEL.gov
    May 2, 2025 · Figure 7: How NSA and CIA Count U.S. Person Queries of Section 702 ... Figure 9: Number of U.S. Person Queries of Section 702 Combined ...
  118. [118]
    No, Apple probably didn't get new secret gov't orders to hand over data
    Sep 18, 2014 · The newest transparency report states in a table that Apple received "0-249" National Security Orders from January 1, 2014 through June 30, 2014 ...
  119. [119]
    [PDF] Apple Transparency Report: Government and Private Party Requests
    Jun 30, 2024 · We count each individual order and. National Security Letter received for Apple users/accounts and report the total number of orders and.
  120. [120]
    Government watchdog calls out dangers in Section 702 surveillance
    Oct 2, 2023 · The report points out that the definition of "foreign intelligence information" is very broad and that 246,073 non-U.S. persons were targeted ...<|separator|>
  121. [121]
    Bipartisan Coalition Reacts to FBI's New Section 702 Procedures
    Jun 13, 2023 · The Brennan Center and twelve other national organizations oppose reauthorization of 702 without wide-ranging reforms to FISA and related authorities.
  122. [122]
    None
    Below is a merged summary of Section 702 statistics from the PCLOB reports (primarily 2023, with some data from earlier reports), consolidating all provided information into a dense, organized format. To maximize detail and clarity, I’ve used tables in CSV-like text format where appropriate, alongside narrative summaries. All data points, including compliance rates, targeting accuracy, operational value, and useful URLs, are retained and integrated.
  123. [123]
    The Case for Reforming Section 702 of U.S. Foreign Intelligence ...
    Section 702 prohibits backdoor searches—that is, targeting non-U.S. persons overseas with the intent of placing U.S. persons under surveillance. In 2013, former ...
  124. [124]
    How FBI Querying Under FISA Section 702 Works | Lawfare
    Jul 10, 2023 · Understanding the FBI's new search rules regarding Americans' communications is critical to the debate on Section 702 renewal.
  125. [125]
    Clarifying Lawful Overseas Use of Data (CLOUD) Act - AWS
    The CLOUD Act updated the Stored Communications Act (SCA), which protects data held by service providers, absent a legally authorized exception.
  126. [126]
    Seven Years of the CLOUD Act: How It's Modernizing Access to ...
    Apr 4, 2025 · The CLOUD Act fundamentally changed how law enforcement agencies can access digital data stored across borders.
  127. [127]
    Untapping the Full Potential of CLOUD Act Agreements - CSIS
    Jun 6, 2024 · There will be a concrete negative effect if there is a perception that the CLOUD Act creates a fast lane only for countries that have gained ...
  128. [128]
    NSA: 'Over 50' Terror Plots Foiled by Data Dragnets - ABC News
    Jun 18, 2013 · The director of the National Security Administration today told Congress that more than 50 potential terrorist attacks have been thwarted by ...
  129. [129]
    NSA chief claims 'focused' surveillance disrupted more than 50 ...
    Jun 19, 2013 · Keith Alexander testifies to Congress that programs revealed by Edward Snowden have stopped 'more than 50' attacks.
  130. [130]
    Officials: Surveillance programs foiled more than 50 terrorist plots
    Jun 18, 2013 · Head of the NSA and others defend the effectiveness and oversight of leaked surveillance programs.
  131. [131]
    PRISM Stopped Najibullah Zazi From Blowing Up Backpacks in the ...
    Jun 7, 2013 · A secret U.S. intelligence program to collect emails that is at the heart of an uproar over government surveillance helped foil an Islamist ...<|separator|>
  132. [132]
    [PDF] Guide to Section 702 Value Examples October 2017 - DNI.gov
    It also made him a top focus of the. NSA's counter terrorism efforts. NSA, along with its IC partners, spent over two years from 2014 to 2016 looking for Hajji ...
  133. [133]
    Privacy panel sees value in foreign surveillance program, but splits ...
    Jul 2, 2014 · “The program has proven valuable in the government's efforts to combat terrorism as well as in other areas of foreign intelligence,” the report ...
  134. [134]
    "Section 702" Saves Lives, Protects the Nation and Allies
    Dec 12, 2017 · The US Intelligence Community relies on Section 702 of the Foreign Intelligence Surveillance Act in the constant hunt for information about foreign adversaries.
  135. [135]
    [PDF] FISA Section 702 Fact Sheet - INTEL.gov
    Section 702-acquired information has been used to identify multiple foreign ransomware attacks on U.S. critical infrastructure. This intelligence positioned the.
  136. [136]
    PRISM and Boundless Informant: Is NSA Surveillance a Threat?
    Jun 13, 2013 · The NSA's recently revealed PRISM project allows the NSA to monitor the internet traffic of foreigners, but sweeps up American communicators ...
  137. [137]
    How Terrorists Use Encryption - Combating Terrorism Center
    This article provides a primer on the various forms of encryption, including end-to-end encryption, full device encryption, anonymization, and various secure ...
  138. [138]
    NSA Has Cracked Much Of The World's Computer Encryption - NPR
    Sep 6, 2013 · It says: It should hardly be surprising that our intelligence agencies seek ways to counteract our adversaries' use of encryption. And then ...
  139. [139]
    The NSA Is Breaking Most Encryption on the Internet
    Sep 5, 2013 · I would be surprised if a serious adversary with adequate resources (financial and educational) couldn't circumvent the surveillance. This means ...
  140. [140]
    Opinion | FISA Section 702 is critical to the war on fentanyl trafficking
    Nov 1, 2023 · ... drugs, and exposed smuggling techniques. Section 702 intelligence also has linked at least one foreign government official to the drug trade.
  141. [141]
    House passes Crenshaw Amendment to include Narco-Traffickers ...
    Apr 12, 2024 · Today, the intelligence community can only target narco-traffickers if they have a connection to the above three certifications. This ...
  142. [142]
    How Many U.S. Persons Does Section 702 Spy On? The ODNI ...
    Oct 22, 2024 · Section 702 allows the government to conduct surveillance of foreigners abroad from inside the United States. It operates, in part, through the ...
  143. [143]
    [PDF] Annual Statistical Transparency Report - DNI.gov
    Past Joint Assessments of Section 702 Compliance have been publicly ... counts each of the Section 702 certifications associated with the FISC's order.
  144. [144]
    [PDF] Foreign Intelligence Surveillance Act Section 702
    Apr 27, 2024 · This Note proceeds in four parts. Part I discusses the history of. FISA Section 702 and how it functions today. Part II discusses var- ious ...
  145. [145]
  146. [146]
    The FISA Court's 702 Opinions, Part I: A History of Non-Compliance ...
    Oct 15, 2019 · A look at the newly released FISA Court opinions and what they reveal about the FBI's non-compliance with its legal requirements.
  147. [147]
  148. [148]
    All About "About" Collection | Electronic Frontier Foundation
    The NSA decided that it will no longer conduct “about” collection in order to meet the court's low bar for protecting privacy.<|separator|>
  149. [149]
    Americans' Attitudes About Privacy, Security and Surveillance
    May 20, 2015 · Just 6% of adults say they are “very confident” that government agencies can keep their records private and secure, while another 25% say they ...
  150. [150]
    Major opinion shifts, in the US and Congress, on NSA surveillance ...
    Jul 29, 2013 · Pew finds that, for the first time since 9/11, Americans are now more worried about civil liberties abuses than terrorism.Missing: PRISM | Show results with:PRISM
  151. [151]
    Update: Polls Continue to Show Majority of Americans Against NSA ...
    Jan 22, 2014 · A recent Pew poll found—yet again—that a majority of Americans oppose the government's collection of phone and Internet data as a part of anti- ...Missing: PRISM | Show results with:PRISM
  152. [152]
    NSA illegally collected thousands of emails before Fisa court halted ...
    Aug 21, 2013 · Declassified court ruling from 2011 found government 'disclosed substantial misrepresentation' of data collection program.Missing: PRISM | Show results with:PRISM
  153. [153]
    [PDF] UNCLAS SIFIED (U) The Government's use of Section 702 ... - DNI.gov
    ¯ Assessing the Intelligence Community implementation of appropriate remedial actions to address compliance matters, including purging non-compliant data and.
  154. [154]
    [PDF] Section 702 Compliance Violation Chart - AWS
    Apr 26, 2017 · The NSA deleted all data that were collected as a result of unauthorized surveillance, and data subject to a purge requirement pursuant to ...
  155. [155]
    NSA misused PRISM - Spied on Al Jazeera, bugged UN ...
    Aug 31, 2013 · The National Security Agency (NSA) has admitted some of their officers misused the agency's massive spying powers to keep tabs on their love interests.Missing: minimal | Show results with:minimal<|control11|><|separator|>
  156. [156]
    Maintaining America's Ability to Collect Foreign Intelligence
    May 13, 2016 · The benefits of the Section 702 program greatly outweigh its (theoretical) costs and the program should continue as currently authorized.
  157. [157]
    PCLOB Report on Surveillance Pursuant to Section 702 - ACLU
    While the Board finds no evidence of intentional abuse, it raises concern about certain aspects of the program that threaten privacy.
  158. [158]
    Jewel v. NSA | Electronic Frontier Foundation
    The District Court ruled that the case should be dismissed on different grounds, specifically that it did not present a concrete injury sufficient for standing ...
  159. [159]
    JEWEL v. NATIONAL SECURITY AGENCY (2011) - FindLaw Caselaw
    The district court held that Jewel failed to make out prima facie allegations necessary to establish that she was an “aggrieved person” under the FISA. The ...
  160. [160]
    [PDF] Case 4:08-cv-04373-JSW Document 462 Filed 04/25/19 Page 1 of 26
    Apr 25, 2019 · The appeals court concluded that, at the pleadings stage, “Jewel [had] alleged a sufficiently concrete and particularized injury. Jewel's.
  161. [161]
    Al Haramain v. Obama | Electronic Frontier Foundation
    This case alleges alleges that the Bush Administration illegally targeted the leaders of an Islamic charity and their lawyers for warrantless surveillance ...Missing: PRISM | Show results with:PRISM
  162. [162]
    Jewel v. NSA - United States Courts
    Mar 29, 2019 · This case involves claims by numerous citizens that their constitutional rights were violated by the United States government through unauthorized surveillance.
  163. [163]
    [PDF] 16-402 Carpenter v. United States (06/22/2018) - Supreme Court
    Jun 22, 2018 · The case involves whether obtaining cell-site location information (CSLI) without a warrant supported by probable cause violates the Fourth ...
  164. [164]
    The Impact of Carpenter v. United States in the Lower Courts and ...
    Nov 3, 2021 · Carpenter held that individuals can retain Fourth Amendment rights in information they disclose to a third party, at least in some situations.
  165. [165]
    FISA Section 702 Reauthorization Resource Page - Lawfare
    Last month, Congress extended the Dec. 31 deadline to reauthorize Section 702 of the FISA Amendments Act until Jan. 19.Missing: details | Show results with:details<|separator|>
  166. [166]
    ODNI Releases 29th Joint Assessment of Section 702 Compliance
    Jul 11, 2025 · ODNI Releases 29th Joint Assessment of Section 702 Compliance ... This Joint Assessment covers the period of 1 June 2022 through 30 November 2022.
  167. [167]
    New plan would give Congress another 18 months to revisit Section ...
    Sep 22, 2025 · Section 702 allows the U.S. government, without obtaining warrants, to track the electronic communications of foreign terrorists, spies and ...<|control11|><|separator|>
  168. [168]
    FISA Section 702 and the 2024 Reforming Intelligence and Securing ...
    Jul 8, 2025 · Section 702 of FISA allows the U.S. to conduct electronic surveillance of non-U.S. persons abroad, collecting foreign intelligence from ...
  169. [169]
    [PDF] TOP SECRET//SI//NOFORN (U) 28th SEMIANNUAL ASSESSMENT ...
    Jan 16, 2025 · For example, NSA is required to report to NSD and ODNI all instances in which Section 702 acquisition continued while a targeted individual was ...
  170. [170]
    Foreign Intelligence Surveillance Act (FISA) and Section 702 - FBI
    It authorizes the targeted collection of foreign intelligence information from non-U.S. persons located abroad. Section 702 will expire on December 31, 2023, ...
  171. [171]
    F.B.I. Violations of Rules for Searching Surveillance Data Drop ...
    May 11, 2023 · The reason for its push is that Section 702 is set to expire at the end of 2023 unless Congress enacts new legislation to extend it. Lawmakers ...<|separator|>
  172. [172]
    [PDF] Section 702, 29th Joint Assessment, September 2024 - INTEL.gov
    Jul 11, 2025 · In response to compliance incidents, NSA routinely reminds its personnel about the requirements in the Section 702 procedures and to exercise ...
  173. [173]
    Artificial Intelligence Security Center | National Security Agency
    Promote the secure development, integration, and adoption of AI capabilities within U.S. National Security Systems and the Defense Industrial Base.Missing: targeting PRISM 2025<|separator|>