Skip to main content

Snooping scandal: US Internet giants all deny PRISM involvement

prismThink the intelligence services aren’t snooping on your private online data? Think again.

Unnamed sources have supplied several leading publications with information purporting to show that the National Security Agency (NSA) and FBI have for the last six years been mining information from the servers of some of the world’s biggest Internet companies.

The Guardian and Washington Post on Thursday reported that Microsoft, Yahoo, Google, Facebook, AOL, Skype, YouTube, and Apple are all part of PRISM, a top secret domestic surveillance program that allows the government agencies to collect information “including search history, the content of emails, file transfers and live chats.”

The document, a 41-slide PowerPoint presentation classified as top secret and prohibited from being shared with overseas allies, reportedly refers to the collection of data “directly from the servers.”

Denials

However, since the Guardian and Post reported the story, several of the Internet giants have been quick to deny any knowledge of PRISM, which was launched in 2007 during George W. Bush’s presidency and continued under President Obama. Of those who have so far issued statements, all are flatly denying that they provide agencies with direct access to servers, though the PRISM documents clearly suggest otherwise.

In a bid to reassure users of its plethora of online services, Google on Thursday evening issued the following statement: “Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a back door for the government to access private user data.”

Apple spokesman Steve Dowling said his company had “never heard of PRISM.” In a statement, Dowling said, “We do not provide any government agency with direct access to our servers, and any government agency requesting customer data must get a court order.”

Facebook, too, has gone on the record to say it doesn’t directly share its data with government agencies. The social networking giant’s chief security officer, Joe Sullivan, said in a statement: “We do not provide any government organization with direct access to Facebook servers. When Facebook is asked for data or information about specific individuals, we carefully scrutinize any such request for compliance with all applicable laws, and provide information only to the extent required by law.”

The apparent depth and quality of material available to the intelligence services will shock many, with details and content relating to emails, images, video and voice chats, VoIP chats (eg. Skype), videos, file transfers, and social networking details all, it appears, available to the intelligence services.

The news comes just a day after another Guardian report revealed an NSA order requiring Verizon to supply the government agency with data related to all calls made in the US over its network.

Trevor Mogg
Contributing Editor
Not so many moons ago, Trevor moved from one tea-loving island nation that drives on the left (Britain) to another (Japan)…
A dangerous new jailbreak for AI chatbots was just discovered
the side of a Microsoft building

Microsoft has released more details about a troubling new generative AI jailbreak technique it has discovered, called "Skeleton Key." Using this prompt injection method, malicious users can effectively bypass a chatbot's safety guardrails, the security features that keeps ChatGPT from going full Taye.

Skeleton Key is an example of a prompt injection or prompt engineering attack. It's a multi-turn strategy designed to essentially convince an AI model to ignore its ingrained safety guardrails, "[causing] the system to violate its operators’ policies, make decisions unduly influenced by a user, or execute malicious instructions," Mark Russinovich, CTO of Microsoft Azure, wrote in the announcement.

Read more