Close this search box.

What Else Can the NSA Access?

Tweezers pinching the phrase NSA in a series of computer code.

Originally published on Friday, July 05, 2013

What else can the NSA access? A few weeks ago, it was revealed that the NSA has been participating in a program that collects the phone records of millions of U.S. citizens. One news article stated that Verizon was required on an “ongoing, daily basis” to give the NSA information on all telephone calls in its systems, both within the U.S. and between the U.S. and other countries.1 While the news has centered around Verizon mostly, it is important to note some recent articles that have slowly started to uncover more details regarding this popular topic. The Washington Post and The Guardian recently reported the existence of another program used by the NSA and the FBI that scours the nation’s main Internet companies, extracting audio, video, photographs, emails, documents and connection logs to help analysts track a person’s movements and contacts. It was not clear whether the program, called PRISM, targets known suspects or broadly collects data from other Americans. This program apparently collects data directly from well-known corporations. Many are surprised to learn that not just Verizon, but also other familiar companies such as Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple are included in this program and are just as susceptible to the NSA. Dropbox is rumored to be added to this program soon also.2 Obviously, these newly released reports have left many citizens wanting more information. Click here to read the full article, with details from The Washington Post, and here to learn about PRISM. 1 Source 2 Source

Corsica Technologies
Corsica provides personalized service and a virtual CIO (vCIO) who serves as a strategic advisor. When it comes to the complex integration of solutions for IT and cybersecurity, the whole is greater than the sum of its parts. We offer cybersecurity solutions, managed services, digital transformation, resale services, and one-off technology projects. Corsica unifies any combination of these services into a complete, seamless solution.

Related Reads

Unlimited IT Support Services - Corsica Technologies

The End Of Metered Billing In Technology Services

Let’s be honest. When it comes to technology services, something is broken. Customers aren’t getting the consistency, responsiveness, and cost transparency they deserve. Meanwhile, MSPs (managed IT service providers) promise the moon with “all-in” pricing, yet they still allow tons

Read more
CPCSC - Canadian Program for Cyber Security Certification - Corsica Technologies

CPCSC For Canadian Defense Contractors: What We Know Today

With cybersecurity threats evolving rapidly, governments are taking steps to protect sensitive but unclassified information that they must share with their suppliers. This is a critical undertaking, as hackers can use sensitive information to inform their strategies—plus they can execute

Read more
EDI Software - 5 steps to choosing the right solution - Corsica Technologies

5 Steps To Choosing The Right EDI Software

How do you understand EDI and choose the right solution for your business? Whether you’re just starting with EDI or replacing an outdated solution, it’s crucial to get this right. Picking the wrong EDI software for your situation can saddle

Read more

Sign Up For Our Newsletter

Stay up-to-date on the Managed Services and Cybersecurity landscape, and be the first to find out about events and special offers.