{"id":1531,"date":"2023-10-10T11:57:59","date_gmt":"2023-10-10T03:57:59","guid":{"rendered":"https:\/\/cathayvista.top\/?p=1531"},"modified":"2023-12-08T16:43:43","modified_gmt":"2023-12-08T08:43:43","slug":"prism-zhen","status":"publish","type":"post","link":"https:\/\/cathayvista.top\/index.php\/2023\/10\/10\/prism-zhen\/","title":{"rendered":"\u68f1\u955c\u9879\u76ee \/ PRISM &#8211; \uff08\u5168\u6587\uff09\u4e2d\u82f1\u6587\u8bcd\u6761\u878d\u5408"},"content":{"rendered":"\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">\u4e2d\u6587\u8bcd\u6761\u539f\u6587\u94fe\u63a5\uff08\u65e0\u6cd5\u4ece\u4e2d\u56fd\u5185\u5730\u8bbf\u95ee\uff09\uff1a<a rel=\"noreferrer noopener\" href=\"https:\/\/zh.wikipedia.org\/wiki\/%E7%A8%9C%E9%8F%A1%E8%A8%88%E7%95%AB\" target=\"_blank\">\u70b9\u51fb\u8fd9\u91cc\u8bbf\u95ee<\/a>\u3002 <br>\u82f1\u6587\u8bcd\u6761\u539f\u6587\u94fe\u63a5\uff08\u65e0\u6cd5\u4ece\u4e2d\u56fd\u5185\u5730\u8bbf\u95ee\uff09\uff1a<a rel=\"noreferrer noopener\" href=\"https:\/\/en.wikipedia.org\/wiki\/Prism\" target=\"_blank\">\u70b9\u51fb\u8fd9\u91cc\u8bbf\u95ee<\/a>\u3002<\/p>\n\n\n\n<p class=\"has-small-font-size\">\u672c\u6587\u57fa\u4e8e<strong>\u82f1\u6587<\/strong>\u8bcd\u6761\u7684\u7ebf\u7d22\uff0c\u5e76\u8865\u5145\u90e8\u5206\u6765\u81ea<strong>\u4e2d\u6587<\/strong>\u8bcd\u6761\u7684\u5185\u5bb9\u3002\u8fbd\u89c2\u642c\u8fd0\u65f6\u8fdb\u884c\u4e86\u5fc5\u8981\u7684\u5408\u89c4\u5316\u5904\u7406\uff0c\u4ee5\u4f7f\u5176\u80fd\u591f\u5728\u4e2d\u56fd\u5185\u5730\u4e0a\u4f20\u3002<\/p>\n\n\n\n<p class=\"has-small-font-size\"><a target=\"_blank\" href=\"https:\/\/cathayvista.top\/index.php\/2023\/06\/25\/wei2-ji1-bai3-ke1\/\" rel=\"noreferrer noopener\">\u7ef4\u57fa\u767e\u79d1\uff08Wikipedia\uff09\u662f\u7f8e\u56fd\u7ef4\u57fa\u5a92\u4f53\u57fa\u91d1\u4f1a\u7684\u4e92\u8054\u7f51\u767e\u79d1\u9879\u76ee\uff08\u70b9\u51fb\u8fd9\u91cc\u4e86\u89e3\u66f4\u591a\uff09<\/a>\uff0c\u5176\u5185\u5bb9\u53ef\u80fd\u53d7\u5230\u7acb\u573a\u3001\u4fe1\u606f\u6765\u6e90\u7b49\u56e0\u7d20\u5f71\u54cd\uff0c\u8bf7\u5ba2\u89c2\u770b\u5f85\u3002\u6b63\u6587\u5185\u5bb9\u4e0d\u4ee3\u8868\u8bd1\u8005\u89c2\u70b9\u3002<\/p>\n\n\n\n<p class=\"has-small-font-size\">\u8fbd\u89c2\u63d0\u4f9b\u7684\u7ffb\u8bd1\u4ec5\u4f9b\u53c2\u8003\u3002\u6587\u4e2d\u53ef\u80fd\u5305\u542b<strong>\u65e0\u6cd5\u4ece\u4e2d\u56fd\u5185\u5730\u8bbf\u95ee<\/strong>\u7684\u94fe\u63a5\u3002<\/p>\n\n\n\n<p class=\"has-small-font-size\">\u8fbd\u89c2\u6240\u642c\u8fd0\u7684\u8bcd\u6761\u4e0e\u539f\u7ef4\u57fa\u767e\u79d1\u8bcd\u6761\u540c\u6837\u9075\u5faa<a target=\"_blank\" href=\"https:\/\/zhuanlan.zhihu.com\/p\/653887754\" rel=\"noreferrer noopener\">CC-BY-SA 4.0\u534f\u8bae<\/a>\uff0c\u5728\u7b26\u5408\u534f\u8bae\u8981\u6c42\u7684\u60c5\u51b5\u4e0b\u60a8\u53ef\u4ee5\u514d\u8d39\u4f7f\u7528\u5176\u5185\u5bb9\uff08\u5305\u62ec\u5546\u7528\uff09\u3002<\/p>\n<cite>\u5c01\u9762\u56fe\u7247\uff1aPRISM\u8ba1\u5212\u7684\u6807\u5fd7\u3002\u56fe\u7247\u6765\u6e90\uff1aNSA, US government; prism photograph:<a rel=\"noreferrer noopener\" href=\"https:\/\/en.wikipedia.org\/wiki\/Adam_Hart-Davis\" target=\"_blank\">Adam Hart-Davis<\/a><\/cite><\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">\u5728\u5176\u4ed6\u5e73\u53f0\u53d1\u5e03\u7684\u90e8\u5206<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.toutiao.com\/article\/7294173933505593908\/\" data-type=\"link\" data-id=\"https:\/\/www.toutiao.com\/article\/7294173933505593908\/\">\u7b2c\u4e00\u90e8\u5206\uff1a\u53d1\u5e03\u4e8e\u4eca\u65e5\u5934\u6761<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.toutiao.com\/article\/7294215820685869620\/\" data-type=\"link\" data-id=\"https:\/\/www.toutiao.com\/article\/7294215820685869620\/\">\u7b2c\u4e8c\u90e8\u5206\uff1a\u53d1\u5e03\u4e8e\u4eca\u65e5\u5934\u6761<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/mbd.baidu.com\/newspage\/data\/landingshare?preview=1&amp;pageType=1&amp;isBdboxFrom=1&amp;context=%7B%22nid%22%3A%22news_9113353833784364233%22%2C%22sourceFrom%22%3A%22bjh%22%7D\" data-type=\"link\" data-id=\"https:\/\/mbd.baidu.com\/newspage\/data\/landingshare?preview=1&amp;pageType=1&amp;isBdboxFrom=1&amp;context=%7B%22nid%22%3A%22news_9113353833784364233%22%2C%22sourceFrom%22%3A%22bjh%22%7D\">\u7b2c\u4e09\u90e8\u5206\uff1a\u53d1\u5e03\u4e8e\u767e\u5ea6\u767e\u5bb6\u53f7<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">0. \u6982\u8ff0<\/h2>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">\u8fbd\u89c2\u6ce8\uff1a\u6b64\u6807\u9898\u662f\u6211\u4eec\u642c\u8fd0\u3001\u6574\u5408\u8fc7\u7a0b\u4e2d\u6dfb\u52a0\u7684\u3002<\/p>\n<\/blockquote>\n\n\n\n<p><strong>\u68f1\u955c\u8ba1\u5212<\/strong>\uff08\u82f1\u8bed\uff1aPRISM\uff09\u662f\u4e00\u9879\u7531<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E7%25BE%258E%25E5%259B%25BD%25E5%259B%25BD%25E5%25AE%25B6%25E5%25AE%2589%25E5%2585%25A8%25E5%25B1%2580\" target=\"_blank\" rel=\"noreferrer noopener\">\u7f8e\u56fd\u56fd\u5bb6\u5b89\u5168\u5c40<\/a>\u81ea2007\u5e74\u5f00\u59cb\u5b9e\u65bd\u7684<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E7%25BB%259D%25E5%25AF%2586%25E7%25BA%25A7\" target=\"_blank\" rel=\"noreferrer noopener\">\u7edd\u5bc6\u7ea7<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E7%25BD%2591%25E7%25BB%259C%25E7%259B%2591%25E6%258E%25A7\" target=\"_blank\" rel=\"noreferrer noopener\">\u7f51\u7edc\u76d1\u63a7<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E7%259B%25A3%25E8%2581%25BD\" target=\"_blank\" rel=\"noreferrer noopener\">\u76d1\u542c<\/a>\u8ba1\u5212\u3002<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E6%25A3%25B1%25E9%2595%259C%25E8%25AE%25A1%25E5%2588%2592%23cite_note-1\" target=\"_blank\" rel=\"noreferrer noopener\">[1]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E6%25A3%25B1%25E9%2595%259C%25E8%25AE%25A1%25E5%2588%2592%23cite_note-nytsavage060613-2\" target=\"_blank\" rel=\"noreferrer noopener\">[2]<\/a>\u8be5\u8ba1\u5212\u7684\u6b63\u5f0f\u540d\u79f0\u4e3a\u201cUS-984XN\u201d\u3002<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E6%25A3%25B1%25E9%2595%259C%25E8%25AE%25A1%25E5%2588%2592%23cite_note-3\" target=\"_blank\" rel=\"noreferrer noopener\">[3]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E6%25A3%25B1%25E9%2595%259C%25E8%25AE%25A1%25E5%2588%2592%23cite_note-4\" target=\"_blank\" rel=\"noreferrer noopener\">[4]<\/a><\/p>\n\n\n\n<p>\u6839\u636e\u62a5\u5bfc\uff0c\u6cc4\u9732\u7684\u6587\u4ef6\u4e2d\u63cf\u8ff0PRISM\u8ba1\u5212\u80fd\u591f\u5bf9\u5373\u65f6\u901a\u4fe1\u548c\u65e2\u5b58\u8d44\u6599\u8fdb\u884c\u6df1\u5ea6\u7684\u76d1\u542c\u3002<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E6%25A3%25B1%25E9%2595%259C%25E8%25AE%25A1%25E5%2588%2592%23cite_note-Greenwald1-5\" target=\"_blank\" rel=\"noreferrer noopener\">[5]<\/a>\u8bb8\u53ef\u7684\u76d1\u542c\u5bf9\u8c61\u5305\u62ec\u4efb\u4f55\u5728<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E7%25BE%258E%25E5%259C%258B\" target=\"_blank\" rel=\"noreferrer noopener\">\u7f8e\u56fd<\/a>\u4ee5\u5916\u5730\u533a\u4f7f\u7528\u53c2\u4e0e\u8ba1\u5212\u516c\u53f8\u670d\u52a1\u7684\u5ba2\u6237\uff0c\u6216\u662f\u4efb\u4f55\u4e0e\u56fd\u5916\u4eba\u58eb\u901a\u4fe1\u7684<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E7%25BE%258E%25E5%259B%25BD%25E5%2585%25AC%25E6%25B0%2591\" target=\"_blank\" rel=\"noreferrer noopener\">\u7f8e\u56fd\u516c\u6c11<\/a>\u3002<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E6%25A3%25B1%25E9%2595%259C%25E8%25AE%25A1%25E5%2588%2592%23cite_note-Greenwald1-5\" target=\"_blank\" rel=\"noreferrer noopener\">[5]<\/a>\u56fd\u5bb6\u5b89\u5168\u5c40\u5728PRISM\u8ba1\u5212\u4e2d\u53ef\u4ee5\u83b7\u5f97\u7535\u5b50\u90ae\u4ef6\u3001\u89c6\u9891\u548c\u8bed\u97f3\u4ea4\u8c08\u3001\u5f71\u7247\u3001\u7167\u7247\u3001<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/VoIP\" target=\"_blank\" rel=\"noreferrer noopener\">VoIP<\/a>\u4ea4\u8c08\u5185\u5bb9\u3001\u6587\u4ef6\u4f20\u8f93\u3001\u767b\u5f55\u901a\u77e5\u7684\u6570\u636e\uff0c\u4ee5\u53ca<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E7%25A4%25BE%25E7%25BE%25A4%25E7%25B6%25B2%25E8%25B7%25AF\" target=\"_blank\" rel=\"noreferrer noopener\">\u793e\u4ea4\u7f51\u7edc<\/a>\u7ec6\u8282\uff0c\u5e76\u900f\u8fc7\u5404\u79cd\u8054\u7f51\u8bbe\u5907\uff0c\u5982\u667a\u80fd\u624b\u673a\u3001\u7535\u5b50\u5f0f\u624b\u8868\u7b49\u5404\u5f0f\u8054\u7f51\u8bbe\u5907\u5bf9\u7279\u5b9a\u76ee\u6807\u8fdb\u884c\u653b\u51fb\u3002<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E6%25A3%25B1%25E9%2595%259C%25E8%25AE%25A1%25E5%2588%2592%23cite_note-Greenwald1-5\" target=\"_blank\" rel=\"noreferrer noopener\">[5]<\/a>\u7efc\u5408\u60c5\u62a5\u6587\u4ef6\u300a<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E6%2580%25BB%25E7%25BB%259F%25E6%25AF%258F%25E6%2597%25A5%25E7%25AE%2580%25E6%258A%25A5\" target=\"_blank\" rel=\"noreferrer noopener\">\u603b\u7edf\u6bcf\u65e5\u7b80\u62a5<\/a>\u300b\u4e2d\u57282012\u5e74\u4e2d\u76841,477\u4e2a\u8ba1\u5212\u91cc\u4f7f\u7528\u4e86\u6765\u81ea\u68f1\u955c\u8ba1\u5212\u7684\u8d44\u6599\u3002<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E6%25A3%25B1%25E9%2595%259C%25E8%25AE%25A1%25E5%2588%2592%23cite_note-chi_trib-6\" target=\"_blank\" rel=\"noreferrer noopener\">[6]<\/a><\/p>\n\n\n\n<p>\u5173\u4e8ePRISM\u7684\u62a5\u9053\uff0c\u662f\u5728\u7f8e\u56fd\u653f\u5e9c\u6301\u7eed\u79d8\u5bc6\u8981\u6c42<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E5%25A8%2581%25E8%25A8%258A\" target=\"_blank\" rel=\"noreferrer noopener\">\u5a01\u8baf<\/a>\u5411\u56fd\u5bb6\u5b89\u5168\u5c40\u63d0\u4f9b\u6240\u6709\u5ba2\u6237\u6bcf\u65e5\u7535\u8bdd\u8bb0\u5f55\u7684\u6d88\u606f\u66dd\u5149\u540e\u4e0d\u4e45\u51fa\u73b0\u7684\u3002<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E6%25A3%25B1%25E9%2595%259C%25E8%25AE%25A1%25E5%2588%2592%23cite_note-nsaphones-7\" target=\"_blank\" rel=\"noreferrer noopener\">[7]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E6%25A3%25B1%25E9%2595%259C%25E8%25AE%25A1%25E5%2588%2592%23cite_note-nytsavage060613-2\" target=\"_blank\" rel=\"noreferrer noopener\">[2]<\/a>\u6cc4\u9732\u8fd9\u4e9b\u7edd\u5bc6\u6587\u4ef6\u7684\u662f\u56fd\u5bb6\u5b89\u5168\u5c40\u5408\u7ea6\u5916\u5305\u5546\u5458\u5de5<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E6%2584%259B%25E5%25BE%25B7%25E8%258F%25AF%25C2%25B7%25E6%2596%25AF%25E8%25AB%25BE%25E7%2599%25BB\" target=\"_blank\" rel=\"noreferrer noopener\">\u7231\u5fb7\u534e\u00b7\u65af\u8bfa\u767b<\/a>\uff0c\u4e8e2013\u5e746\u67086\u65e5\u5728\u82f1\u56fd\u300a<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E8%25A1%259B%25E5%25A0%25B1\" target=\"_blank\" rel=\"noreferrer noopener\">\u536b\u62a5<\/a>\u300b\u548c\u7f8e\u56fd\u300a<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E8%258F%25AF%25E7%259B%259B%25E9%25A0%2593%25E9%2583%25B5%25E5%25A0%25B1\" target=\"_blank\" rel=\"noreferrer noopener\">\u534e\u76db\u987f\u90ae\u62a5<\/a>\u300b\u516c\u5f00\u3002<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E6%25A3%25B1%25E9%2595%259C%25E8%25AE%25A1%25E5%2588%2592%23cite_note-guardian-snowden-reveal-8\" target=\"_blank\" rel=\"noreferrer noopener\">[8]<\/a><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/pic4.zhimg.com\/80\/v2-e1fb28b9e4eca8ffef865c4b6bee68db_720w.webp\" alt=\"\"\/><figcaption class=\"wp-element-caption\">\u6b64\u56fe\u7247\u9002\u7528CC0\u5206\u4eab\u534f\u8bae\u3002\u8fbd\u89c2\u4e0a\u4f20\u65f6\u5bf9\u56fe\u7247\u90e8\u5206\u533a\u57df\u8fdb\u884c\u4e86\u906e\u6321\u3002<\/figcaption><\/figure>\n<\/div>\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">\u56fe\u7247\u9898\u6ce8\uff1aRecreation of boundless information global heat map of data collection from its snapshot from 2007 data. The color scheme ranges from green (least subjected to surveillance by the NSA) through yellow and orange to red (most surveillance by the NSA).<br>\u53c2\u8003\u8bd1\u6587\uff1a\u65e0\u8fb9\u754c\u4fe1\u606f\u5168\u7403\u70ed\u70b9\u56fe\u6570\u636e\u91c7\u96c6\u7684\u91cd\u73b0\uff0c\u4ee52007\u5e74\u7684\u6570\u636e\u5feb\u7167\u4e3a\u57fa\u7840\u3002\u989c\u8272\u4ece\u7eff\u8272\uff08\u53d7\u5230NSA\u76d1\u89c6\u6700\u5c11\uff09\u5230\u9ec4\u8272\u548c\u6a59\u8272\u518d\u5230\u7ea2\u8272\uff08\u53d7\u5230NSA\u76d1\u89c6\u6700\u591a\uff09\u3002<br>\u56fe\u7247\u6765\u6e90\uff1a<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/commons.wikimedia.org\/wiki\/User%3ARezonansowy\" target=\"_blank\" rel=\"noreferrer noopener\">Rezonansowy<\/a>-\u81ea\u5df1\u7684\u4f5c\u54c1 \u672c\u6587\u4ef6\u884d\u751f\u81ea\uff1a<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/commons.wikimedia.org\/wiki\/File%3ABoundless_Informant_data_collection_-_DNI.jpg\" target=\"_blank\" rel=\"noreferrer noopener\">Boundless Informant data collection &#8211; DNI.jpg<\/a><\/p>\n<\/blockquote>\n\n\n\n<p><strong>PRISM<\/strong> is a <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Code_name\" target=\"_blank\" rel=\"noreferrer noopener\">code name<\/a> for a program under which the United States <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/National_Security_Agency\" target=\"_blank\" rel=\"noreferrer noopener\">National Security Agency<\/a>(NSA) collects <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Internet\" target=\"_blank\" rel=\"noreferrer noopener\">internet<\/a> communications from various U.S. internet companies.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-WaPo1-1\" target=\"_blank\" rel=\"noreferrer noopener\">[1]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Greenwald1-2\" target=\"_blank\" rel=\"noreferrer noopener\">[2]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-apbraun061513-3\" target=\"_blank\" rel=\"noreferrer noopener\">[3]<\/a> The program is also known by the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/SIGINT_Activity_Designator\" target=\"_blank\" rel=\"noreferrer noopener\">SIGAD<\/a> US-984XN.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-4\" target=\"_blank\" rel=\"noreferrer noopener\">[4]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-5\" target=\"_blank\" rel=\"noreferrer noopener\">[5]<\/a> PRISM collects stored internet communications based on demands made to internet companies such as <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Google_LLC\" target=\"_blank\" rel=\"noreferrer noopener\">Google LLC<\/a> and <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Apple_Inc.\" target=\"_blank\" rel=\"noreferrer noopener\">Apple<\/a> under Section 702 of the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/FISA_Amendments_Act_of_2008\" target=\"_blank\" rel=\"noreferrer noopener\">FISA Amendments Act of 2008<\/a> to turn over any data that match court-approved search terms.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-6\" target=\"_blank\" rel=\"noreferrer noopener\">[6]<\/a>Among other things, the NSA can use these PRISM requests to target communications that were encrypted when they traveled across the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Internet_backbone\" target=\"_blank\" rel=\"noreferrer noopener\">internet backbone<\/a>, to focus on stored data that telecommunication filtering systems discarded earlier,<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-WSJ20130821-7\" target=\"_blank\" rel=\"noreferrer noopener\">[7]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-8\" target=\"_blank\" rel=\"noreferrer noopener\">[8]<\/a> and to get data that is easier to handle.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-9\" target=\"_blank\" rel=\"noreferrer noopener\">[9]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1aPRISM\u662f\u7f8e\u56fd\u56fd\u5bb6\u5b89\u5168\u5c40\uff08NSA\uff09\u5f00\u5c55\u7684\u4e00\u4e2a\u9879\u76ee\u4ee3\u53f7\uff0c\u8be5\u9879\u76ee\u901a\u8fc7\u5411\u7f8e\u56fd\u5404\u5927\u4e92\u8054\u7f51\u516c\u53f8\u6536\u96c6\u4e92\u8054\u7f51\u901a\u4fe1\u6570\u636e[1][2][3]\u3002\u8be5\u9879\u76ee\u8fd8\u4ee5SIGAD US-984XN\u7684\u4ee3\u53f7\u4e3a\u4eba\u6240\u77e5[4][5]\u3002PRISM\u6839\u636e\u5bf9\u4e92\u8054\u7f51\u516c\u53f8\uff08\u5982Google LLC\u548cApple\uff09\u63d0\u51fa\u7684\u8981\u6c42\uff0c\u6536\u96c6\u5b58\u50a8\u7684\u4e92\u8054\u7f51\u901a\u4fe1\u6570\u636e\uff0c\u4ee5\u4fbf\u63d0\u4f9b\u4e0e\u7ecf\u6cd5\u9662\u6279\u51c6\u7684\u641c\u7d22\u8bcd\u5339\u914d\u7684\u6570\u636e\uff0c\u8fd9\u662f\u6839\u636e2008\u5e74\u300a\u5916\u56fd\u60c5\u62a5\u76d1\u89c6\u6cd5\u4fee\u6b63\u6848\u300b\u7b2c702\u6761\u7684\u89c4\u5b9a\u8fdb\u884c\u7684[6]\u3002\u9664\u5176\u4ed6\u7528\u9014\u5916\uff0cNSA\u53ef\u4ee5\u5229\u7528\u8fd9\u4e9bPRISM\u8bf7\u6c42\u6765\u9488\u5bf9\u4e92\u8054\u7f51\u9aa8\u5e72\u4f20\u8f93\u65f6\u5df2\u52a0\u5bc6\u7684\u901a\u4fe1\u8fdb\u884c\u76d1\u63a7\uff0c\u5173\u6ce8\u4e4b\u524d\u7535\u4fe1\u8fc7\u6ee4\u7cfb\u7edf\u4e22\u5f03\u7684\u5b58\u50a8\u6570\u636e[7][8]\uff0c\u5e76\u83b7\u53d6\u66f4\u6613\u5904\u7406\u7684\u6570\u636e[9]\u3002<\/p>\n\n\n\n<p>PRISM began in 2007 in the wake of the passage of the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Protect_America_Act\" target=\"_blank\" rel=\"noreferrer noopener\">Protect America Act<\/a> under the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Presidency_of_George_W._Bush\" target=\"_blank\" rel=\"noreferrer noopener\">Bush Administration<\/a>.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-10\" target=\"_blank\" rel=\"noreferrer noopener\">[10]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-11\" target=\"_blank\" rel=\"noreferrer noopener\">[11]<\/a> The program is operated under the supervision of the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/United_States_Foreign_Intelligence_Surveillance_Court\" target=\"_blank\" rel=\"noreferrer noopener\">U.S. Foreign Intelligence Surveillance Court<\/a> (FISA Court, or FISC) pursuant to the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Foreign_Intelligence_Surveillance_Act\" target=\"_blank\" rel=\"noreferrer noopener\">Foreign Intelligence Surveillance Act<\/a> (FISA).<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-12\" target=\"_blank\" rel=\"noreferrer noopener\">[12]<\/a> Its existence was leaked six years later by NSA contractor <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Edward_Snowden\" target=\"_blank\" rel=\"noreferrer noopener\">Edward Snowden<\/a>, who warned that the extent of mass data collection was far greater than the public knew and included what he characterized as &#8220;dangerous&#8221; and &#8220;criminal&#8221; activities.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-ibtimes_17_june-13\" target=\"_blank\" rel=\"noreferrer noopener\">[13]<\/a> The disclosures were published by <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/The_Guardian\" target=\"_blank\" rel=\"noreferrer noopener\">The Guardian<\/a> and <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/The_Washington_Post\" target=\"_blank\" rel=\"noreferrer noopener\">The Washington Post<\/a> on June 6, 2013. Subsequent documents have demonstrated a financial arrangement between the NSA&#8217;s <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Special_Source_Operations\" target=\"_blank\" rel=\"noreferrer noopener\">Special Source Operations<\/a> (SSO) division and PRISM partners in the millions of dollars.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Guardian20130823-14\" target=\"_blank\" rel=\"noreferrer noopener\">[14]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1aPRISM\u9879\u76ee\u59cb\u4e8e2007\u5e74\uff0c\u5728\u5e03\u4ec0\u653f\u5e9c\u9881\u5e03\u300a\u4fdd\u62a4\u7f8e\u56fd\u6cd5\u6848\u300b\u4e4b\u540e\u5c55\u5f00[10][11]\u3002\u8be5\u9879\u76ee\u5728\u7f8e\u56fd\u5916\u56fd\u60c5\u62a5\u76d1\u89c6\u6cd5\u5ead\uff08FISA\u6cd5\u9662\uff0c\u6216FISC\uff09\u7684\u76d1\u7763\u4e0b\u8fd0\u884c\uff0c\u4f9d\u636e\u5916\u56fd\u60c5\u62a5\u76d1\u89c6\u6cd5\uff08FISA\uff09[12]\u3002\u8be5\u9879\u76ee\u7684\u5b58\u5728\u5728\u516d\u5e74\u540e\u88abNSA\u627f\u5305\u5546\u7231\u5fb7\u534e\u00b7\u65af\u8bfa\u767b\u6cc4\u9732\u51fa\u6765\uff0c\u4ed6\u8b66\u544a\u79f0\u5927\u89c4\u6a21\u6570\u636e\u6536\u96c6\u7684\u7a0b\u5ea6\u8fdc\u8d85\u516c\u4f17\u6240\u77e5\uff0c\u5e76\u5305\u542b\u4ed6\u6240\u79f0\u7684&#8221;\u5371\u9669&#8221;\u548c&#8221;\u72af\u7f6a&#8221;\u6d3b\u52a8[13]\u3002\u8fd9\u4e9b\u62ab\u9732\u7531\u300a\u536b\u62a5\u300b\u548c\u300a\u534e\u76db\u987f\u90ae\u62a5\u300b\u4e8e2013\u5e746\u67086\u65e5\u53d1\u5e03\u3002\u968f\u540e\u7684\u6587\u4ef6\u663e\u793a\uff0cNSA\u7684\u7279\u6b8a\u6765\u6e90\u884c\u52a8\uff08SSO\uff09\u90e8\u95e8\u4e0ePRISM\u5408\u4f5c\u4f19\u4f34\u4e4b\u95f4\u5b58\u5728\u7740\u6570\u4ee5\u767e\u4e07\u7f8e\u5143\u8ba1\u7684\u8d22\u52a1\u5b89\u6392[14]<\/p>\n\n\n\n<p>Documents indicate that PRISM is &#8220;the number one source of raw intelligence used for NSA analytic reports&#8221;, and it accounts for 91% of the NSA&#8217;s internet traffic acquired under FISA section 702 authority.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-wp_slides-15\" target=\"_blank\" rel=\"noreferrer noopener\">[15]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-FiscPrivacyRuling2011-16\" target=\"_blank\" rel=\"noreferrer noopener\">[16]<\/a> The leaked information came after the revelation that the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/United_States_Foreign_Intelligence_Surveillance_Court\" target=\"_blank\" rel=\"noreferrer noopener\">FISA Court<\/a> had been ordering a subsidiary of telecommunications company <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Verizon_Communications\" target=\"_blank\" rel=\"noreferrer noopener\">Verizon Communications<\/a> to turn over logs tracking all of its customers&#8217; telephone calls to the NSA.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-nytsavage060613-17\" target=\"_blank\" rel=\"noreferrer noopener\">[17]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-nsaphones-18\" target=\"_blank\" rel=\"noreferrer noopener\">[18]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u6587\u4ef6\u8868\u660e\uff0cPRISM\u662f&#8221;NSA\u5206\u6790\u62a5\u544a\u4e2d\u7528\u4e8e\u539f\u59cb\u60c5\u62a5\u7684\u4e3b\u8981\u6765\u6e90&#8221;\uff0c\u5e76\u4e14\u5b83\u5360\u636e\u4e86\u6839\u636eFISA\u7b2c702\u6761\u6388\u6743\u83b7\u53d6\u7684NSA\u4e92\u8054\u7f51\u6d41\u91cf\u768491%&#8221;[15][16]\u3002\u6b64\u6b21\u6cc4\u9732\u7684\u4fe1\u606f\u662f\u5728\u66dd\u5149FISA\u6cd5\u9662\u66fe\u547d\u4ee4\u7535\u4fe1\u516c\u53f8Verizon Communications\u7684\u5b50\u516c\u53f8\u63d0\u4ea4\u8ddf\u8e2a\u6240\u6709\u5ba2\u6237\u7535\u8bdd\u8bb0\u5f55\u7ed9NSA\u4e4b\u540e\u53d1\u751f\u7684[17][18]\u3002<\/p>\n\n\n\n<p>U.S. government officials have disputed criticisms of PRISM in the <em>Guardian<\/em> and <em>Washington Post<\/em> articles and have defended the program, asserting that it cannot be used on domestic targets without a <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Search_warrant\" target=\"_blank\" rel=\"noreferrer noopener\">warrant<\/a>. Additionally claiming the program has helped to prevent acts of <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Terrorism\" target=\"_blank\" rel=\"noreferrer noopener\">terrorism<\/a>, and that it receives independent oversight from the federal government&#8217;s <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/U.S._Executive_Branch%23Executive_branch\" target=\"_blank\" rel=\"noreferrer noopener\">executive<\/a>, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/U.S._Executive_Branch%23Judicial_branch\" target=\"_blank\" rel=\"noreferrer noopener\">judicial<\/a> and <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/U.S._Executive_Branch%23Legislative_branch\" target=\"_blank\" rel=\"noreferrer noopener\">legislative<\/a> branches.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Intelligence-19\" target=\"_blank\" rel=\"noreferrer noopener\">[19]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-20\" target=\"_blank\" rel=\"noreferrer noopener\">[20]<\/a> On June 19, 2013, U.S. President <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Barack_Obama\" target=\"_blank\" rel=\"noreferrer noopener\">Barack Obama<\/a>, during a visit to Germany, stated that the NSA&#8217;s data gathering practices constitute &#8220;a circumscribed, narrow system directed at us being able to protect our people.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-cbsberlin-21\" target=\"_blank\" rel=\"noreferrer noopener\">[21]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u7f8e\u56fd\u653f\u5e9c\u5b98\u5458\u5bf9\u300a\u536b\u62a5\u300b\u548c\u300a\u534e\u76db\u987f\u90ae\u62a5\u300b\u7684\u6587\u7ae0\u4e2d\u5bf9PRISM\u7684\u6279\u8bc4\u63d0\u51fa\u4e86\u5f02\u8bae\uff0c\u5e76\u4e3a\u8be5\u9879\u76ee\u8fdb\u884c\u4e86\u8fa9\u62a4\uff0c\u58f0\u79f0\u5728\u6ca1\u6709\u6388\u6743\u4ee4\u7684\u60c5\u51b5\u4e0b\u4e0d\u80fd\u7528\u4e8e\u56fd\u5185\u76ee\u6807\u3002\u6b64\u5916\uff0c\u4ed6\u4eec\u8fd8\u58f0\u79f0\u8be5\u9879\u76ee\u6709\u52a9\u4e8e\u963b\u6b62\u6050\u6016\u4e3b\u4e49\u884c\u4e3a\uff0c\u5e76\u63a5\u53d7\u8054\u90a6\u653f\u5e9c\u7684\u884c\u653f\u3001\u53f8\u6cd5\u548c\u7acb\u6cd5\u90e8\u95e8\u7684\u72ec\u7acb\u76d1\u7763[19][20]\u30022013\u5e746\u670819\u65e5\uff0c\u7f8e\u56fd\u603b\u7edf\u5df4\u62c9\u514b\u00b7\u5965\u5df4\u9a6c\u5728\u8bbf\u95ee\u5fb7\u56fd\u671f\u95f4\u8868\u793a\uff0cNSA\u7684\u6570\u636e\u6536\u96c6\u505a\u6cd5\u6784\u6210\u4e86&#8221;\u4e00\u4e2a\u6709\u9650\u5236\u3001\u72ed\u7a84\u7684\u7cfb\u7edf\uff0c\u65e8\u5728\u4fdd\u62a4\u6211\u4eec\u7684\u4eba\u6c11&#8221;[21]\u3002<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h_660333086_0\">1. \u68f1\u955c\u9879\u76ee\u7684\u5a92\u4f53\u66dd\u5149 \uff5c Media disclosure of PRISM<\/h2>\n\n\n\n<p><em>Further information:<\/em> <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Global_surveillance_disclosure\" target=\"_blank\" rel=\"noreferrer noopener\">Global surveillance disclosure<\/a><br><em>\u66f4\u591a\u4fe1\u606f\uff1a\u5168\u7403\u76d1\u63a7\u7684\u66dd\u5149<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Edward_Snowden\" target=\"_blank\" rel=\"noreferrer noopener\">Edward Snowden<\/a> publicly revealed the existence of PRISM through a series of classified documents leaked to journalists of <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/The_Washington_Post\" target=\"_blank\" rel=\"noreferrer noopener\">The Washington Post<\/a> and <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/The_Guardian\" target=\"_blank\" rel=\"noreferrer noopener\">The Guardian<\/a> while Snowden, who was an NSA contractor at the time, was visiting <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Hong_Kong\" target=\"_blank\" rel=\"noreferrer noopener\">Hong Kong<\/a>.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-WaPo1-1\" target=\"_blank\" rel=\"noreferrer noopener\">[1]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Greenwald1-2\" target=\"_blank\" rel=\"noreferrer noopener\">[2]<\/a> The leaked documents included 41 <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Microsoft_PowerPoint\" target=\"_blank\" rel=\"noreferrer noopener\">PowerPoint slides<\/a>, four of which were published in news articles.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-WaPo1-1\" target=\"_blank\" rel=\"noreferrer noopener\">[1]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Greenwald1-2\" target=\"_blank\" rel=\"noreferrer noopener\">[2]<\/a><\/p>\n\n\n\n<p>\u53c2\u8003\u8bd1\u6587\uff1a\u7231\u5fb7\u534e\u00b7\u65af\u8bfa\u767b\u66fe\u662f\u7f8e\u56fd\u56fd\u5bb6\u5b89\u5168\u5c40\u7684\u4e00\u540d\u627f\u5305\u5546\uff0c\u4ed6\u5728\u8bbf\u95ee\u9999\u6e2f\u671f\u95f4\u901a\u8fc7\u4e00\u7cfb\u5217\u6cc4\u9732\u7ed9\u300a\u534e\u76db\u987f\u90ae\u62a5\u300b\u548c\u300a\u536b\u62a5\u300b\u8bb0\u8005\u7684\u673a\u5bc6\u6587\u4ef6\u516c\u5f00\u63ed\u793a\u4e86PRISM\u7684\u5b58\u5728[1][2]\u3002\u8fd9\u4e9b\u6cc4\u9732\u7684\u6587\u4ef6\u4e2d\u5305\u62ec41\u5f20\u5e7b\u706f\u7247\uff0c\u5176\u4e2d\u6709\u56db\u5f20\u5728\u65b0\u95fb\u6587\u7ae0\u4e2d\u53d1\u8868[1][2]\u3002<\/p>\n\n\n\n<p>The documents identified several technology companies as participants in the PRISM program, including <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Microsoft\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft<\/a> in 2007, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Yahoo%21\" target=\"_blank\" rel=\"noreferrer noopener\">Yahoo!<\/a> in 2008, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Google\" target=\"_blank\" rel=\"noreferrer noopener\">Google<\/a> in 2009, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Facebook\" target=\"_blank\" rel=\"noreferrer noopener\">Facebook<\/a> in 2009, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Paltalk\" target=\"_blank\" rel=\"noreferrer noopener\">Paltalk<\/a> in 2009, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/YouTube\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a> in 2010, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/AOL\" target=\"_blank\" rel=\"noreferrer noopener\">AOL<\/a> in 2011, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Skype\" target=\"_blank\" rel=\"noreferrer noopener\">Skype<\/a> in 2011 and <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Apple_Inc.\" target=\"_blank\" rel=\"noreferrer noopener\">Apple<\/a> in 2012.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-usa1-22\" target=\"_blank\" rel=\"noreferrer noopener\">[22]<\/a> The speaker&#8217;s notes in the briefing document reviewed by <em>The Washington Post<\/em> indicated that &#8220;98 percent of PRISM production is based on Yahoo, Google, and Microsoft&#8221;.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-WaPo1-1\" target=\"_blank\" rel=\"noreferrer noopener\">[1]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u8fd9\u4e9b\u6587\u4ef6\u786e\u5b9a\u4e86\u51e0\u5bb6\u79d1\u6280\u516c\u53f8\u4f5c\u4e3aPRISM\u8ba1\u5212\u7684\u53c2\u4e0e\u8005\uff0c\u5305\u62ec\u5fae\u8f6f\u57282007\u5e74\u3001\u96c5\u864e\u57282008\u5e74\u3001\u8c37\u6b4c\u57282009\u5e74\u3001Facebook\u57282009\u5e74\u3001Paltalk\u57282009\u5e74\u3001YouTube\u57282010\u5e74\u3001AOL\u57282011\u5e74\u3001Skype\u57282011\u5e74\u548c\u82f9\u679c\u57282012\u5e74[22]\u3002\u300a\u534e\u76db\u987f\u90ae\u62a5\u300b\u5ba1\u67e5\u7684\u7b80\u62a5\u6587\u4ef6\u4e2d\u6f14\u8bb2\u8005\u7684\u5907\u6ce8\u663e\u793a\uff0c\u201c98%\u7684PRISM\u4ea7\u51fa\u57fa\u4e8e\u96c5\u864e\u3001\u8c37\u6b4c\u548c\u5fae\u8f6f\u201d[1]\u3002<\/p>\n\n\n\n<p>The slide presentation stated that much of the world&#8217;s electronic communications pass through the U.S., because electronic communications data tend to follow the least expensive route rather than the most physically direct route, and the bulk of the world&#8217;s internet infrastructure is based in the United States.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-wp_slides-15\" target=\"_blank\" rel=\"noreferrer noopener\">[15]<\/a> The presentation noted that these facts provide United States intelligence analysts with opportunities for intercepting the communications of foreign targets as their electronic data pass into or through the United States.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Greenwald1-2\" target=\"_blank\" rel=\"noreferrer noopener\">[2]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-wp_slides-15\" target=\"_blank\" rel=\"noreferrer noopener\">[15]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u5e7b\u706f\u7247\u6f14\u793a\u6307\u51fa\uff0c\u4e16\u754c\u4e0a\u5927\u90e8\u5206\u7684\u7535\u5b50\u901a\u4fe1\u7ecf\u8fc7\u7f8e\u56fd\uff0c\u8fd9\u662f\u56e0\u4e3a\u7535\u5b50\u901a\u4fe1\u6570\u636e\u5f80\u5f80\u9075\u5faa\u6700\u7ecf\u6d4e\u7684\u8def\u7ebf\u800c\u4e0d\u662f\u6700\u76f4\u63a5\u7684\u7269\u7406\u8def\u7ebf\uff0c\u800c\u4e14\u4e16\u754c\u4e0a\u5927\u90e8\u5206\u7684\u4e92\u8054\u7f51\u57fa\u7840\u8bbe\u65bd\u90fd\u4f4d\u4e8e\u7f8e\u56fd[15]\u3002\u6f14\u793a\u6307\u51fa\uff0c\u8fd9\u4e9b\u4e8b\u5b9e\u4e3a\u7f8e\u56fd\u60c5\u62a5\u5206\u6790\u5e08\u63d0\u4f9b\u4e86\u62e6\u622a\u5916\u56fd\u76ee\u6807\u901a\u4fe1\u7684\u673a\u4f1a\uff0c\u56e0\u4e3a\u5b83\u4eec\u7684\u7535\u5b50\u6570\u636e\u5728\u8fdb\u5165\u6216\u7ecf\u8fc7\u7f8e\u56fd\u65f6\u4f1a\u88ab\u62e6\u622a[2][15]\u3002<\/p>\n\n\n\n<p>Snowden&#8217;s subsequent disclosures included statements that government agencies such as the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/United_Kingdom\" target=\"_blank\" rel=\"noreferrer noopener\">United Kingdom<\/a>&#8216;s <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Government_Communications_Headquarters\" target=\"_blank\" rel=\"noreferrer noopener\">GCHQ<\/a> also undertook mass interception and tracking of internet and communications data<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-23\" target=\"_blank\" rel=\"noreferrer noopener\">[23]<\/a> \u2013 described by <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Germany\" target=\"_blank\" rel=\"noreferrer noopener\">Germany<\/a> as &#8220;nightmarish&#8221; if true<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-24\" target=\"_blank\" rel=\"noreferrer noopener\">[24]<\/a> \u2013 allegations that the NSA engaged in &#8220;dangerous&#8221; and &#8220;criminal&#8221; activity by &#8220;hacking&#8221; civilian infrastructure networks in other countries such as &#8220;universities, hospitals, and private businesses&#8221;,<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-ibtimes_17_june-13\" target=\"_blank\" rel=\"noreferrer noopener\">[13]<\/a> and alleged that <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Regulatory_compliance\" target=\"_blank\" rel=\"noreferrer noopener\">compliance<\/a> offered only very limited restrictive effect on mass data collection practices (including of Americans) since restrictions &#8220;are policy-based, not technically based, and can change at any time&#8221;, adding that &#8220;Additionally, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Audit\" target=\"_blank\" rel=\"noreferrer noopener\">audits<\/a> are cursory, incomplete, and easily fooled by fake justifications&#8221;,<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-ibtimes_17_june-13\" target=\"_blank\" rel=\"noreferrer noopener\">[13]<\/a> with numerous self-granted exceptions, and that NSA policies encourage staff to assume the benefit of the doubt in cases of uncertainty.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-25\" target=\"_blank\" rel=\"noreferrer noopener\">[25]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-26\" target=\"_blank\" rel=\"noreferrer noopener\">[26]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-27\" target=\"_blank\" rel=\"noreferrer noopener\">[27]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u65af\u8bfa\u767b\u968f\u540e\u7684\u62ab\u9732\u5305\u62ec\u653f\u5e9c\u673a\u6784\u5982\u82f1\u56fd\u7684GCHQ\u4e5f\u8fdb\u884c\u5927\u89c4\u6a21\u62e6\u622a\u548c\u8ffd\u8e2a\u4e92\u8054\u7f51\u548c\u901a\u4fe1\u6570\u636e[23]\uff0c\u5fb7\u56fd\u5c06\u6b64\u63cf\u8ff0\u4e3a\u201c\u5982\u82e5\u771f\u5b9e\uff0c\u771f\u662f\u5669\u68a6\u822c\u7684\u201d[24]\u3002\u4ed6\u8fd8\u58f0\u79f0\u7f8e\u56fd\u56fd\u5bb6\u5b89\u5168\u5c40\u8fdb\u884c\u4e86\u201c\u5371\u9669\u201d\u548c\u201c\u72af\u7f6a\u201d\u7684\u6d3b\u52a8\uff0c\u901a\u8fc7\u201c\u9ed1\u5ba2\u653b\u51fb\u201d\u5176\u4ed6\u56fd\u5bb6\u7684\u6c11\u7528\u57fa\u7840\u8bbe\u65bd\u7f51\u7edc\uff0c\u5982\u201c\u5927\u5b66\u3001\u533b\u9662\u548c\u79c1\u8425\u4f01\u4e1a\u201d[13]\u3002\u4ed6\u8fd8\u58f0\u79f0\u5408\u89c4\u6027\u5bf9\u5927\u89c4\u6a21\u6570\u636e\u6536\u96c6\u5b9e\u8df5\uff08\u5305\u62ec\u7f8e\u56fd\u4eba\uff09\u7684\u9650\u5236\u4f5c\u7528\u975e\u5e38\u6709\u9650\uff0c\u56e0\u4e3a\u9650\u5236\u201c\u662f\u57fa\u4e8e\u653f\u7b56\u800c\u4e0d\u662f\u6280\u672f\uff0c\u5e76\u4e14\u53ef\u4ee5\u968f\u65f6\u6539\u53d8\u201d\uff0c\u5e76\u8865\u5145\u8bf4\u201c\u6b64\u5916\uff0c\u5ba1\u6838\u662f\u7c97\u7565\u3001\u4e0d\u5b8c\u6574\u7684\uff0c\u5f88\u5bb9\u6613\u88ab\u865a\u5047\u7684\u8fa9\u89e3\u6240\u6b3a\u9a97\u201d[13]\uff0c\u5e76\u5b58\u5728\u5f88\u591a\u81ea\u6211\u6388\u6743\u7684\u4f8b\u5916\u60c5\u51b5\uff0cNSA\u7684\u653f\u7b56\u9f13\u52b1\u5458\u5de5\u5728\u4e0d\u786e\u5b9a\u60c5\u51b5\u4e0b\u5047\u5b9a\u6000\u597d\u610f[25][26][27]\u3002<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h_660333086_1\"><strong>1.1 \u5e7b\u706f\u7247 | The slides<\/strong><\/h3>\n\n\n\n<p>Below are a number of slides released by Edward Snowden showing the operation and processes behind the PRISM program. The &#8220;FAA&#8221; referred to is Section 702 of the FISA Amendments Act (&#8220;FAA&#8221;), and not the Federal Aviation Administration, which is more widely known by the same FAA initialism.<br>\u53c2\u8003\u8bd1\u6587\uff1a\u4ee5\u4e0b\u662f\u7231\u5fb7\u534e\u00b7\u65af\u8bfa\u767b\u53d1\u5e03\u7684\u4e00\u4e9b\u5e7b\u706f\u7247\uff0c\u5c55\u793a\u4e86PRISM\u8ba1\u5212\u7684\u64cd\u4f5c\u548c\u6d41\u7a0b\u3002\u8fd9\u91cc\u63d0\u5230\u7684\u201cFAA\u201d\u662f\u300a\u5916\u56fd\u60c5\u62a5\u76d1\u89c6\u6cd5\u4fee\u6b63\u6848\u6cd5\u6848\u300b\uff08FISA\u4fee\u6b63\u6cd5\u6848\uff09\u7b2c702\u8282\uff0c\u800c\u4e0d\u662f\u66f4\u4e3a\u5e7f\u4e3a\u4eba\u77e5\u7684\u8054\u90a6\u822a\u7a7a\u7ba1\u7406\u5c40\uff08Federal Aviation Administration\uff09\uff0c\u5b83\u4eec\u90fd\u4f7f\u7528\u4e86\u76f8\u540c\u7684FAA\u9996\u5b57\u6bcd\u7f29\u5199\u3002<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/pic2.zhimg.com\/80\/v2-97675fe964081fcf820e9829426cef21_720w.webp\" alt=\"\"\/><figcaption class=\"wp-element-caption\">\u6b64\u56fe\u7247\u5c5e\u4e8e\u516c\u5171\u9886\u57df<\/figcaption><\/figure>\n<\/div>\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">\u56fe\u7247\u9898\u6ce8\uff1aCover slide of the US Federal Government&#8217;s data collection program PRISM.<br>\u53c2\u8003\u8bd1\u6587\uff1a\u7f8e\u56fd\u8054\u90a6\u653f\u5e9c\u6570\u636e\u6536\u96c6\u8ba1\u5212PRISM\u7684\u5c01\u9762\u5e7b\u706f\u7247\u3002<\/p>\n<\/blockquote>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/pic1.zhimg.com\/80\/v2-d5b472796e034448a1cc544e94154bdc_720w.webp\" alt=\"\"\/><figcaption class=\"wp-element-caption\">\u6b64\u56fe\u7247\u5c5e\u4e8e\u516c\u5171\u9886\u57df<\/figcaption><\/figure>\n<\/div>\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">\u56fe\u7247\u9898\u6ce8\uff1aPRISM: Introduction<br>\u53c2\u8003\u8bd1\u6587\uff1aPRISM\u9879\u76ee\u4ecb\u7ecd<\/p>\n<\/blockquote>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/pic3.zhimg.com\/80\/v2-94e9f24d7e8d289e77a06337ec7c946e_720w.webp\" alt=\"\"\/><figcaption class=\"wp-element-caption\">\u6b64\u56fe\u7247\u5c5e\u4e8e\u516c\u5171\u9886\u57df<\/figcaption><\/figure>\n<\/div>\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">\u56fe\u7247\u9898\u6ce8\uff1aSlide showing companies participating in the PRISM program and the types of data they provide.<br>\u53c2\u8003\u8bd1\u6587\uff1a\u5e7b\u706f\u7247\u5c55\u793a\u53c2\u4e0ePRISM\u9879\u76ee\u7684\u516c\u53f8\u4ee5\u53ca\u5b83\u4eec\u63d0\u4f9b\u7684\u6570\u636e\u7c7b\u578b\u3002<\/p>\n<\/blockquote>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/pic2.zhimg.com\/80\/v2-e0e8668bbbc514ae62bbc31b4cbb1075_720w.webp\" alt=\"\"\/><figcaption class=\"wp-element-caption\">\u6b64\u56fe\u7247\u5c5e\u4e8e\u516c\u5171\u9886\u57df<\/figcaption><\/figure>\n<\/div>\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">\u56fe\u7247\u9898\u6ce8\uff1aPRISM: Dates When PRISM Collection Began For Each Provider<br>\u53c2\u8003\u8bd1\u6587\uff1aPRISM\uff1a\u6bcf\u4e2a\u670d\u52a1\u63d0\u4f9b\u5546\u5f00\u59cbPRISM\u6570\u636e\u6536\u96c6\u7684\u65e5\u671f<\/p>\n<\/blockquote>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/pic1.zhimg.com\/80\/v2-1cd97e6212584a2a74645865e7d0bd08_720w.webp\" alt=\"\"\/><figcaption class=\"wp-element-caption\">\u6b64\u56fe\u7247\u5c5e\u4e8e\u516c\u5171\u9886\u57df<\/figcaption><\/figure>\n<\/div>\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">\u56fe\u7247\u9898\u6ce8\uff1aSlide illustrating PRISM\u2019s tasking process<br>\u53c2\u8003\u8bd1\u6587\uff1a\u5e7b\u706f\u7247\u5c55\u793aPRISM\u7684\u4efb\u52a1\u5206\u914d\u8fc7\u7a0b\u3002<\/p>\n<\/blockquote>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/pic2.zhimg.com\/80\/v2-4e07c55ed8b8ab972511792872cfdd69_720w.webp\" alt=\"\"\/><figcaption class=\"wp-element-caption\">\u6b64\u56fe\u7247\u5c5e\u4e8e\u516c\u5171\u9886\u57df<\/figcaption><\/figure>\n<\/div>\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">\u56fe\u7247\u9898\u6ce8\uff1aSlide illustrating PRISM collection dataflow<br>\u53c2\u8003\u8bd1\u6587\uff1a\u5e7b\u706f\u7247\u5c55\u793aPRISM\u6570\u636e\u6536\u96c6\u7684\u6d41\u7a0b\u3002<\/p>\n<\/blockquote>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/pic3.zhimg.com\/80\/v2-667a25ad28730bf3e8b48b55ac49df36_720w.webp\" alt=\"\"\/><figcaption class=\"wp-element-caption\">\u6b64\u56fe\u7247\u5c5e\u4e8e\u516c\u5171\u9886\u57df<\/figcaption><\/figure>\n<\/div>\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">\u56fe\u7247\u9898\u6ce8\uff1aA slide illustrating how PRISM cases are named.<br>\u53c2\u8003\u8bd1\u6587\uff1a\u5e7b\u706f\u7247\u5c55\u793aPRISM\u6848\u4ef6\u7684\u547d\u540d\u65b9\u5f0f\u3002<\/p>\n<\/blockquote>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/pic3.zhimg.com\/80\/v2-4465c9e0e42f57ec8392e1e6c1600d26_720w.webp\" alt=\"\"\/><figcaption class=\"wp-element-caption\">\u6b64\u56fe\u7247\u5c5e\u4e8e\u516c\u5171\u9886\u57df<\/figcaption><\/figure>\n<\/div>\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">\u56fe\u7247\u9898\u6ce8\uff1aSlide illustrating how to search PRISM\u2019s counterterrorism database<br>\u53c2\u8003\u8bd1\u6587\uff1a\u5e7b\u706f\u7247\u5c55\u793a\u5982\u4f55\u641c\u7d22PRISM\u7684\u53cd\u6050\u6570\u636e\u5e93\u3002<\/p>\n<\/blockquote>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/pic1.zhimg.com\/80\/v2-c5bf75b59e5b5af492dbfce121f3fb50_720w.webp\" alt=\"\"\/><figcaption class=\"wp-element-caption\">\u6b64\u56fe\u7247\u5c5e\u4e8e\u516c\u5171\u9886\u57df<\/figcaption><\/figure>\n<\/div>\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">\u56fe\u7247\u9898\u6ce8\uff1aA week in the life of Prism. Published first in O Globo, Since rebroadcast on Brazilian TV<br>\u53c2\u8003\u8bd1\u6587\uff1a\u300aPrism\u4e00\u5468\u751f\u6d3b\u300b\u3002\u9996\u6b21\u53d1\u8868\u5728\u300aO Globo\u300b\uff0c\u540e\u5728\u5df4\u897f\u7535\u89c6\u53f0\u91cd\u64ad\u3002<\/p>\n<\/blockquote>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/pic1.zhimg.com\/80\/v2-f151265269a4316a5907634fb3bfd890_720w.webp\" alt=\"\"\/><figcaption class=\"wp-element-caption\">\u6b64\u56fe\u7247\u5c5e\u4e8e\u516c\u5171\u9886\u57df<\/figcaption><\/figure>\n<\/div>\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">\u56fe\u7247\u9898\u6ce8\uff1aSlide fragment mentioning &#8220;upstream collection&#8221;, FAA702, EO 12333, and references <a href=\"https:\/\/link.zhihu.com\/?target=http%3A\/\/yahoo.com\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/yahoo.com<\/a> explicitly in the text<br>\u53c2\u8003\u8bd1\u6587\uff1a\u5e7b\u706f\u7247\u7247\u6bb5\uff0c\u63d0\u5230\u201c\u4e0a\u6e38\u6536\u96c6\u201d\u3001FAA702\u3001EO 12333\uff0c\u5e76\u5728\u6587\u672c\u4e2d\u660e\u786e\u63d0\u5230<a href=\"https:\/\/link.zhihu.com\/?target=http%3A\/\/yahoo.com\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/yahoo.com<\/a>\u3002<\/p>\n<\/blockquote>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/pic3.zhimg.com\/80\/v2-9367d74e322ae80bf00ca3e04eb411ae_720w.webp\" alt=\"\"\/><figcaption class=\"wp-element-caption\">\u6b64\u56fe\u7247\u5c5e\u4e8e\u516c\u5171\u9886\u57df<\/figcaption><\/figure>\n<\/div>\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">\u56fe\u7247\u9898\u6ce8\uff1aFAA 702 authority\uff1bCollection only possible under FAA 702 Authority\uff1bFAA702 Operations, and map<br>\u53c2\u8003\u8bd1\u6587\uff1aFAA702\u6388\u6743\uff1b\u53ea\u6709\u5728FAA702\u6388\u6743\u4e0b\u624d\u53ef\u80fd\u8fdb\u884c\u6536\u96c6\uff1bFAA702\u64cd\u4f5c\u548c\u5730\u56fe\u3002<\/p>\n<\/blockquote>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/pic4.zhimg.com\/80\/v2-4200a5164badb3959b8dfee7eeb3c287_720w.webp\" alt=\"\"\/><figcaption class=\"wp-element-caption\">\u6b64\u56fe\u7247\u5c5e\u4e8e\u516c\u5171\u9886\u57df<\/figcaption><\/figure>\n<\/div>\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">\u56fe\u7247\u9898\u6ce8\uff1aFAA702 Operations, and map. The subheader reads &#8220;Collection only possible under FAA702 Authority&#8221;. FAIRVIEW is in the center box.<br>\u53c2\u8003\u8bd1\u6587\uff1aFAA702\u64cd\u4f5c\u548c\u5730\u56fe\u3002\u526f\u6807\u9898\u5199\u7740\u201c\u53ea\u6709\u5728FAA702\u6388\u6743\u4e0b\u624d\u53ef\u80fd\u8fdb\u884c\u6536\u96c6\u201d\u3002FAIRVIEW\u4f4d\u4e8e\u4e2d\u5fc3\u65b9\u6846\u4e2d\u3002<\/p>\n<\/blockquote>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/pic4.zhimg.com\/80\/v2-8288c7fc3be6683554532aa4859588cf_720w.webp\" alt=\"\"\/><figcaption class=\"wp-element-caption\">\u6b64\u56fe\u7247\u5c5e\u4e8e\u516c\u5171\u9886\u57df<\/figcaption><\/figure>\n<\/div>\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">\u56fe\u7247\u9898\u6ce8\uff1aPRISM Slide. Collection only possible under FAA702 Authority STORMBREW (probably)<br>\u53c2\u8003\u8bd1\u6587\uff1aPRISM\u5e7b\u706f\u7247\u3002\u53ea\u6709\u5728FAA702\u7684\u6388\u6743\u4e0b\uff0c\u624d\u53ef\u80fd\u8fdb\u884c\u6536\u96c6\uff0c\u53ef\u80fd\u662f\u4f7f\u7528STORMBREW\uff08\u53ef\u80fd\uff09\u3002<\/p>\n<\/blockquote>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img decoding=\"async\" src=\"https:\/\/pic1.zhimg.com\/80\/v2-d22a7a471b06b8558956992c40e15694_720w.webp\" alt=\"\" style=\"width:620px;height:auto\"\/><figcaption class=\"wp-element-caption\">\u6b64\u56fe\u7247\u5c5e\u4e8e\u516c\u5171\u9886\u57df<\/figcaption><\/figure>\n<\/div>\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">\u56fe\u7247\u9898\u6ce8\uff1aTasking, Points to Remember. Transcript of body: &#8220;Whenever your targets meet FAA criteria, you should consider asking to FAA. Emergency tasking processes exist for [imminent \/immediate ] threat to life situations and targets can be placed on [illegible] within hours (surveillance and stored comms). Get to know your Product line FAA adjudicators and FAA leads.&#8221;<br>\u53c2\u8003\u8bd1\u6587\uff1a\u4efb\u52a1\u5206\u914d\uff0c\u8981\u8bb0\u4f4f\u7684\u8981\u70b9\u3002\u6b63\u6587\u7684\u6587\u5b57\u8bb0\u5f55\uff1a\u201c\u6bcf\u5f53\u60a8\u7684\u76ee\u6807\u7b26\u5408FAA\u7684\u6807\u51c6\u65f6\uff0c\u60a8\u5e94\u8be5\u8003\u8651\u8981\u6c42FAA\u3002\u7d27\u6025\u4efb\u52a1\u5206\u914d\u8fc7\u7a0b\u9002\u7528\u4e8e\u5a01\u80c1\u5230\u751f\u547d\u7684\u60c5\u51b5\uff0c\u76ee\u6807\u53ef\u4ee5\u5728\u51e0\u5c0f\u65f6\u5185\uff08\u76d1\u89c6\u548c\u5b58\u50a8\u901a\u4fe1\uff09\u88ab\u653e\u7f6e\u5728[\u65e0\u6cd5\u8fa8\u8ba4]\u4e2d\u3002\u8981\u4e86\u89e3\u60a8\u7684\u4ea7\u54c1\u7ebfFAA\u88c1\u51b3\u8005\u548cFAA\u8d1f\u8d23\u4eba\u3002\u201d<\/p>\n<\/blockquote>\n\n\n\n<p>The French newspaper <em><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Le_Monde\" target=\"_blank\" rel=\"noreferrer noopener\">Le Monde<\/a><\/em> disclosed new PRISM slides (see pages 4, 7 and 8) coming from the &#8220;PRISM\/US-984XN Overview&#8221; presentation on October 21, 2013.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-28\" target=\"_blank\" rel=\"noreferrer noopener\">[28]<\/a> The British newspaper <em><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/The_Guardian\" target=\"_blank\" rel=\"noreferrer noopener\">The Guardian<\/a><\/em> disclosed new PRISM slides (see pages 3 and 6) in November 2013 which on the one hand compares PRISM with the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM_%28surveillance_program%29%23Related_U.S._government_surveillance_programs\" target=\"_blank\" rel=\"noreferrer noopener\">Upstream program<\/a>, and on the other hand deals with collaboration between the NSA&#8217;s Threat Operations Center and the FBI.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-29\" target=\"_blank\" rel=\"noreferrer noopener\">[29]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u6cd5\u56fd\u62a5\u7eb8\u300a\u4e16\u754c\u62a5\u300b\u62ab\u9732\u4e86\u6765\u81ea2013\u5e7410\u670821\u65e5\u7684\u201cPRISM\/US-984XN\u6982\u8ff0\u201d\u6f14\u793a\u6587\u7a3f\u7684\u65b0\u5e7b\u706f\u7247\uff08\u8bf7\u53c2\u9605\u7b2c4\u9875\u3001\u7b2c7\u9875\u548c\u7b2c8\u9875\uff09\u3002\u82f1\u56fd\u62a5\u7eb8\u300a\u536b\u62a5\u300b\u4e8e2013\u5e7411\u6708\u62ab\u9732\u4e86\u65b0\u7684PRISM\u5e7b\u706f\u7247\uff08\u8bf7\u53c2\u9605\u7b2c3\u9875\u548c\u7b2c6\u9875\uff09\uff0c\u5176\u4e2d\u4e00\u65b9\u9762\u6bd4\u8f83\u4e86PRISM\u548c\u4e0a\u6e38\u8ba1\u5212\uff0c\u53e6\u4e00\u65b9\u9762\u6d89\u53ca\u4e86\u7f8e\u56fd\u56fd\u5bb6\u5b89\u5168\u5c40\u5a01\u80c1\u884c\u52a8\u4e2d\u5fc3\u4e0e\u8054\u90a6\u8c03\u67e5\u5c40\u4e4b\u95f4\u7684\u5408\u4f5c\u5173\u7cfb\u3002<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h_660333086_2\">2. \u9879\u76ee\u672c\u8eab | the Program<\/h2>\n\n\n\n<p>PRISM\u7684\u524d\u8eab\u662f<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E4%25B9%2594%25E6%25B2%25BB%25C2%25B7%25E6%25B2%2583%25E5%2585%258B%25C2%25B7%25E5%25B8%2583%25E4%25BB%2580\" target=\"_blank\" rel=\"noreferrer noopener\">\u5c0f\u5e03\u4ec0<\/a>\u4efb\u5185\u5728<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E4%25B9%259D%25E4%25B8%2580%25E4%25B8%2580%25E4%25BA%258B%25E4%25BB%25B6\" target=\"_blank\" rel=\"noreferrer noopener\">\u4e5d\u4e00\u4e00\u4e8b\u4ef6<\/a>\u540e\u7684<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/w\/index.php%3Ftitle%3D%25E6%2581%2590%25E6%2580%2596%25E5%2588%2586%25E5%25AD%2590%25E7%259B%2591%25E5%2590%25AC%25E8%25A8%2588%25E5%258A%2583%26action%3Dedit%26redlink%3D1\" target=\"_blank\" rel=\"noreferrer noopener\">\u6050\u6016\u5206\u5b50\u76d1\u542c\u8ba1\u5212<\/a>\uff08Terrorist Surveillance Program\uff09\u3002\u5728\u5f53\u65f6\u8fd9\u4e2a\u8ba1\u5212\u66fe\u906d\u5230\u5e7f\u6cdb\u6279\u8bc4\uff0c\u4e14\u5176\u5408\u6cd5\u6027\u56e0\u672a\u7ecf\u8fc7<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/w\/index.php%3Ftitle%3D%25E7%25BE%258E%25E5%259B%25BD%25E5%25A4%2596%25E5%259B%25BD%25E6%2583%2585%25E6%258A%25A5%25E7%259B%2591%25E6%258E%25A7%25E6%25B3%2595%25E5%25BA%25AD%26action%3Dedit%26redlink%3D1\" target=\"_blank\" rel=\"noreferrer noopener\">\u5916\u56fd\u60c5\u62a5\u76d1\u63a7\u6cd5\u5ead<\/a>\uff08Foreign Intelligence Surveillance Court\uff09\u6279\u51c6\u800c\u53d7\u5230\u8d28\u7591\uff0c<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E7%25A8%259C%25E9%258F%25A1%25E8%25A8%2588%25E7%2595%25AB%23cite_note-Dean1-9\" target=\"_blank\" rel=\"noreferrer noopener\">[9]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E7%25A8%259C%25E9%258F%25A1%25E8%25A8%2588%25E7%2595%25AB%23cite_note-Holtzman1-10\" target=\"_blank\" rel=\"noreferrer noopener\">[10]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E7%25A8%259C%25E9%258F%25A1%25E8%25A8%2588%25E7%2595%25AB%23cite_note-ABA1-11\" target=\"_blank\" rel=\"noreferrer noopener\">[11]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E7%25A8%259C%25E9%258F%25A1%25E8%25A8%2588%25E7%2595%25AB%23cite_note-Lawyers1-12\" target=\"_blank\" rel=\"noreferrer noopener\">[12]<\/a>\u4f46\u4e4b\u540e\u7684PRISM\u5219\u5f97\u5230\u4e86\u8be5\u6cd5\u5ead\u7684\u6388\u6743\u4ee4\u3002<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E7%25A8%259C%25E9%258F%25A1%25E8%25A8%2588%25E7%2595%25AB%23cite_note-wp_slides-13\" target=\"_blank\" rel=\"noreferrer noopener\">[13]<\/a>\u5728<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E5%25B7%25B4%25E6%258B%2589%25E5%2585%258B%25C2%25B7%25E6%25AC%25A7%25E5%25B7%25B4%25E9%25A9%25AC\" target=\"_blank\" rel=\"noreferrer noopener\">\u5965\u5df4\u9a6c<\/a>\u4efb\u5185\uff0c\u56fd\u5bb6\u5b89\u5168\u5c40\u6301\u7eed\u8fd0\u4f5cPRISM\u3002<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E7%25A8%259C%25E9%258F%25A1%25E8%25A8%2588%25E7%2595%25AB%23cite_note-Greenwald1-5\" target=\"_blank\" rel=\"noreferrer noopener\">[5]<\/a><\/p>\n\n\n\n<p>PRISM\u8ba1\u5212\u57282013\u5e746\u67083\u65e5\u9996\u6b21\u88ab\u300a<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E5%258D%258E%25E7%259B%259B%25E9%25A1%25BF%25E9%2582%25AE%25E6%258A%25A5\" target=\"_blank\" rel=\"noreferrer noopener\">\u534e\u76db\u987f\u90ae\u62a5<\/a>\u300b\u548c\u300a<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E5%258D%25AB%25E6%258A%25A5\" target=\"_blank\" rel=\"noreferrer noopener\">\u536b\u62a5<\/a>\u300b\u5bf9\u5916\u63ed\u9732\uff1b<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E7%25A8%259C%25E9%258F%25A1%25E8%25A8%2588%25E7%2595%25AB%23cite_note-WaPo1-14\" target=\"_blank\" rel=\"noreferrer noopener\">[14]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E7%25A8%259C%25E9%258F%25A1%25E8%25A8%2588%25E7%2595%25AB%23cite_note-Greenwald1-5\" target=\"_blank\" rel=\"noreferrer noopener\">[5]<\/a>\u4e24\u5bb6\u5a92\u4f53\u83b7\u53d6\u4e86\u4e0ePRISM\u6709\u5173\u7684\u79d8\u5bc6\u6587\u6863\u3002\u8fd9\u4e9b\u6587\u6863\u6307\u51fa\uff0c\u6570\u5bb6\u79d1\u6280\u516c\u53f8\u53c2\u4e0e\u4e86PRISM\u8ba1\u5212\uff0c\u5305\u62ec\uff08\u6309\u52a0\u5165\u9879\u76ee\u7684\u65f6\u95f4\uff09<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E5%25BE%25AE%25E8%25BB%259F\" target=\"_blank\" rel=\"noreferrer noopener\">\u5fae\u8f6f<\/a>\uff082007\u5e74\uff09\u3001<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E9%259B%2585%25E8%2599%258E\" target=\"_blank\" rel=\"noreferrer noopener\">\u96c5\u864e<\/a>\uff082008\u5e74\uff09\u3001<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/Google\" target=\"_blank\" rel=\"noreferrer noopener\">Google<\/a>\uff082009\u5e74\uff09\u3001<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/Facebook\" target=\"_blank\" rel=\"noreferrer noopener\">Facebook<\/a>\uff082009\u5e74\uff09\u3001<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/w\/index.php%3Ftitle%3DPaltalk%26action%3Dedit%26redlink%3D1\" target=\"_blank\" rel=\"noreferrer noopener\">Paltalk<\/a>\uff082009\u5e74\uff09\u3001<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/YouTube\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>\uff082010\u5e74\uff09\u3001<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/Skype\" target=\"_blank\" rel=\"noreferrer noopener\">Skype<\/a>\uff082011\u5e74\uff09\u3001<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E7%25BE%258E%25E5%259B%25BD%25E5%259C%25A8%25E7%25BA%25BF\" target=\"_blank\" rel=\"noreferrer noopener\">\u7f8e\u56fd\u5728\u7ebf<\/a>\uff082011\u5e74\uff09\u4ee5\u53ca<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E8%2598%258B%25E6%259E%259C%25E5%2585%25AC%25E5%258F%25B8\" target=\"_blank\" rel=\"noreferrer noopener\">\u82f9\u679c\u516c\u53f8<\/a>\uff082012\u5e74\uff09\u3002<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E7%25A8%259C%25E9%258F%25A1%25E8%25A8%2588%25E7%2595%25AB%23cite_note-usa1-15\" target=\"_blank\" rel=\"noreferrer noopener\">[15]<\/a>\u6b64\u5916\uff0c<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/Dropbox\" target=\"_blank\" rel=\"noreferrer noopener\">Dropbox<\/a>\u4e5f\u88ab\u6307\u63a7\u201c\u5373\u5c06\u52a0\u5165\u201d\u8fd9\u9879\u8ba1\u5212\u3002<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E7%25A8%259C%25E9%258F%25A1%25E8%25A8%2588%25E7%2595%25AB%23cite_note-WaPo1-14\" target=\"_blank\" rel=\"noreferrer noopener\">[14]<\/a><\/p>\n\n\n\n<p>\u5728\u6cc4\u9732\u7684\u79d8\u5bc6\u6587\u6863\u5185\u7684\u4e00\u9875\u5e7b\u706f\u7247\u4e2d\uff0c\u663e\u793a\u4e86\u4e24\u79cd\u6570\u636e\u6765\u6e90\uff1a<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/Upstream_%28%25E7%259B%2591%25E5%2590%25AC%25E9%25A1%25B9%25E7%259B%25AE%29\" target=\"_blank\" rel=\"noreferrer noopener\">Upstream<\/a>\uff08\u53e6\u4e00\u4e2a\u76d1\u542c\u9879\u76ee\u7684\u4ee3\u53f7\uff09\u548cPRISM\u3002\u201cUpstream\u201d\u9879\u76ee\u5728\u627f\u8f7d\u4e92\u8054\u7f51\u9aa8\u5e72\u901a\u4fe1\u5185\u5bb9\u7684\u5149\u7f06\u4e0a\u5b89\u88c5\u5206\u5149\u955c\uff0c\u590d\u5236\u5176\u901a\u4fe1\u5185\u5bb9\uff1bPRISM\u5219\u662f\u4ece\u4e0a\u8ff0\u7f8e\u56fd\u670d\u52a1\u63d0\u4f9b\u5546\u7684\u670d\u52a1\u5668\u76f4\u63a5\u8fdb\u884c\u6536\u96c6\u3002<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E7%25A8%259C%25E9%258F%25A1%25E8%25A8%2588%25E7%2595%25AB%23cite_note-Rushe1-16\" target=\"_blank\" rel=\"noreferrer noopener\">[16]<\/a><\/p>\n\n\n\n<p>PRISM\u8ba9\u60c5\u62a5\u673a\u6784\u80fd\u5bf9\u5b9e\u65f6\u901a\u4fe1\u548c\u5b58\u50a8\u5728\u670d\u52a1\u5668\u4e0a\u7684\u4fe1\u606f\u8fdb\u884c\u6df1\u5165\u76d1\u89c6\u3002<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E7%25A8%259C%25E9%258F%25A1%25E8%25A8%2588%25E7%2595%25AB%23cite_note-Greenwald1-5\" target=\"_blank\" rel=\"noreferrer noopener\">[5]<\/a>\u4efb\u4f55\u4f7f\u7528\u4e0a\u8ff0\u670d\u52a1\u5546\u7684\u7f8e\u56fd\u5883\u5916\u5ba2\u6237\u53ca\u4e0e\u56fd\u5916\u4eba\u58eb\u901a\u4fe1\u7684\u7f8e\u56fd\u516c\u6c11\u90fd\u662f\u8be5\u8ba1\u5212\u5141\u8bb8\u7684\u76d1\u542c\u5bf9\u8c61\u3002<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E7%25A8%259C%25E9%258F%25A1%25E8%25A8%2588%25E7%2595%25AB%23cite_note-Greenwald1-5\" target=\"_blank\" rel=\"noreferrer noopener\">[5]<\/a>\u56fd\u5bb6\u5b89\u5168\u5c40\u7ecf\u7531PRISM\u83b7\u5f97\u7684\u6570\u636e\u5305\u62ec<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E7%2594%25B5%25E5%25AD%2590%25E9%2582%25AE%25E4%25BB%25B6\" target=\"_blank\" rel=\"noreferrer noopener\">\u7535\u5b50\u90ae\u4ef6<\/a>\u3001\u89c6\u8baf\u548c\u8bed\u97f3\u4ea4\u8c08\u3001\u89c6\u8baf\u3001\u7167\u7247\u3001<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/VoIP\" target=\"_blank\" rel=\"noreferrer noopener\">VoIP<\/a>\u901a\u8bdd\u3001\u6587\u4ef6\u4f20\u8f93\u3001\u548c\u793e\u4ea4\u7f51\u7edc\u4e0a\u7684\u8be6\u7ec6\u4fe1\u606f<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E7%25A8%259C%25E9%258F%25A1%25E8%25A8%2588%25E7%2595%25AB%23cite_note-Greenwald1-5\" target=\"_blank\" rel=\"noreferrer noopener\">[5]<\/a>\u3002\u5176\u4e2d98%\u7684PRISM\u7ed3\u679c\u662f\u57fa\u4e8e\u6765\u81ea\u96c5\u864e\u3001Google\u548c\u5fae\u8f6f\u63d0\u4f9b\u7684\u6570\u636e\u3002<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E7%25A8%259C%25E9%258F%25A1%25E8%25A8%2588%25E7%2595%25AB%23cite_note-WaPo1-14\" target=\"_blank\" rel=\"noreferrer noopener\">[14]<\/a>2012\u5e74\u95f4\u7684\u300a<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E6%2580%25BB%25E7%25BB%259F%25E6%25AF%258F%25E6%2597%25A5%25E7%25AE%2580%25E6%258A%25A5\" target=\"_blank\" rel=\"noreferrer noopener\">\u603b\u7edf\u6bcf\u65e5\u7b80\u62a5<\/a>\u300b\u5185\u5171\u5f15\u7528\u4e861,477\u9879\u6765\u81eaPRISM\u7684\u6570\u636e\u3002<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E7%25A8%259C%25E9%258F%25A1%25E8%25A8%2588%25E7%2595%25AB%23cite_note-chi_trib-6\" target=\"_blank\" rel=\"noreferrer noopener\">[6]<\/a><\/p>\n\n\n\n<p>PRISM\u7684\u5e74\u5ea6\u82b1\u8d39\u7ea6\u4e3a2000\u4e07\u7f8e\u5143\u3002<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/zh.wikipedia.org\/wiki\/%25E7%25A8%259C%25E9%258F%25A1%25E8%25A8%2588%25E7%2595%25AB%23cite_note-wp_slides-13\" target=\"_blank\" rel=\"noreferrer noopener\">[13]<\/a><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/pic1.zhimg.com\/80\/v2-53d7575904e91a61c95d735543a8b448_720w.webp\" alt=\"\"\/><figcaption class=\"wp-element-caption\">PRISM logo. \u6b64\u56fe\u7247\u5c5e\u4e8e\u516c\u5171\u9886\u57df\u3002<\/figcaption><\/figure>\n<\/div>\n\n\n<p>PRISM is a program from the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Special_Source_Operations\" target=\"_blank\" rel=\"noreferrer noopener\">Special Source Operations<\/a> (SSO) division of the NSA, which in the tradition of NSA&#8217;s intelligence alliances, cooperates with as many as 100 trusted U.S. companies since the 1970s.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-WaPo1-1\" target=\"_blank\" rel=\"noreferrer noopener\">[1]<\/a> A prior program, the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Terrorist_Surveillance_Program\" target=\"_blank\" rel=\"noreferrer noopener\">Terrorist Surveillance Program<\/a>,<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-SS2-30\" target=\"_blank\" rel=\"noreferrer noopener\">[30]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-SS1-31\" target=\"_blank\" rel=\"noreferrer noopener\">[31]<\/a> was implemented in the wake of the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/September_11_attacks\" target=\"_blank\" rel=\"noreferrer noopener\">September 11 attacks<\/a> under the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/George_W._Bush_Administration\" target=\"_blank\" rel=\"noreferrer noopener\">George W. Bush Administration<\/a> but was widely criticized and challenged as illegal, because it did not include warrants obtained from the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Foreign_Intelligence_Surveillance_Court\" target=\"_blank\" rel=\"noreferrer noopener\">Foreign Intelligence Surveillance Court<\/a>.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-SS1-31\" target=\"_blank\" rel=\"noreferrer noopener\">[31]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Dean1-32\" target=\"_blank\" rel=\"noreferrer noopener\">[32]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Holtzman1-33\" target=\"_blank\" rel=\"noreferrer noopener\">[33]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-ABA1-34\" target=\"_blank\" rel=\"noreferrer noopener\">[34]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Lawyers1-35\" target=\"_blank\" rel=\"noreferrer noopener\">[35]<\/a> PRISM was authorized by the Foreign Intelligence Surveillance Court.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-wp_slides-15\" target=\"_blank\" rel=\"noreferrer noopener\">[15]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u68f1\u955c\u8ba1\u5212\u662f\u7f8e\u56fd\u56fd\u5bb6\u5b89\u5168\u5c40\uff08NSA\uff09\u7279\u6b8a\u6e90\u8fd0\u8425\uff08SSO\uff09\u90e8\u95e8\u7684\u4e00\u4e2a\u9879\u76ee\uff0c\u5728NSA\u7684\u60c5\u62a5\u8054\u76df\u4f20\u7edf\u4e0b\uff0c\u81ea\u4e0a\u4e16\u7eaa70\u5e74\u4ee3\u4ee5\u6765\u4e0e\u591a\u8fbe100\u5bb6\u53d7\u4fe1\u4efb\u7684\u7f8e\u56fd\u516c\u53f8\u5408\u4f5c\u3002\u4e4b\u524d\u7684\u4e00\u4e2a\u9879\u76ee\uff0c\u6050\u6016\u5206\u5b50\u76d1\u89c6\u8ba1\u5212\uff0c\u5728\u4e5d\u4e00\u4e00\u88ad\u51fb\u4e8b\u4ef6\u540e\u7531\u4e54\u6cbb\u00b7W\u00b7\u5e03\u4ec0\u653f\u5e9c\u5b9e\u65bd\uff0c\u4f46\u56e0\u4e3a\u6ca1\u6709\u4ece\u5916\u56fd\u60c5\u62a5\u76d1\u89c6\u6cd5\u5ead\u83b7\u5f97\u6388\u6743\u800c\u53d7\u5230\u5e7f\u6cdb\u6279\u8bc4\u548c\u8d28\u7591\u3002\u800c\u68f1\u955c\u8ba1\u5212\u662f\u7ecf\u8fc7\u5916\u56fd\u60c5\u62a5\u76d1\u89c6\u6cd5\u5ead\u6388\u6743\u7684\u3002<\/p>\n\n\n\n<p>PRISM was enabled under <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/George_W._Bush\" target=\"_blank\" rel=\"noreferrer noopener\">President Bush<\/a> by the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Protect_America_Act_of_2007\" target=\"_blank\" rel=\"noreferrer noopener\">Protect America Act of 2007<\/a> and by the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Foreign_Intelligence_Surveillance_Act_of_1978_Amendments_Act_of_2008\" target=\"_blank\" rel=\"noreferrer noopener\">FISA Amendments Act of 2008<\/a>, which immunizes private companies from legal action when they cooperate with U.S. government agencies in intelligence collection. In 2012 the act was renewed by <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/United_States_Congress\" target=\"_blank\" rel=\"noreferrer noopener\">Congress<\/a> under <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Barack_Obama\" target=\"_blank\" rel=\"noreferrer noopener\">President Obama<\/a> for an additional five years, through December 2017.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Greenwald1-2\" target=\"_blank\" rel=\"noreferrer noopener\">[2]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-McAllister-36\" target=\"_blank\" rel=\"noreferrer noopener\">[36]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-37\" target=\"_blank\" rel=\"noreferrer noopener\">[37]<\/a> According to <em><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/The_Register\" target=\"_blank\" rel=\"noreferrer noopener\">The Register<\/a><\/em>, the FISA Amendments Act of 2008 &#8220;specifically authorizes intelligence agencies to monitor the phone, email, and other communications of U.S. citizens for up to a week without obtaining a warrant&#8221; when one of the parties is outside the U.S.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-McAllister-36\" target=\"_blank\" rel=\"noreferrer noopener\">[36]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u68f1\u955c\u8ba1\u5212\u662f\u57282007\u5e74\u7684\u300a\u4fdd\u62a4\u7f8e\u56fd\u6cd5\u6848\u300b\u548c2008\u5e74\u7684\u300a\u5916\u56fd\u60c5\u62a5\u76d1\u89c6\u6cd5\u4fee\u6b63\u6848\u300b\u7684\u652f\u6301\u4e0b\u7531\u5e03\u4ec0\u603b\u7edf\u542f\u52a8\u7684\u3002\u8be5\u6cd5\u6848\u4f7f\u5f97\u79c1\u8425\u516c\u53f8\u5728\u4e0e\u7f8e\u56fd\u653f\u5e9c\u673a\u6784\u5408\u4f5c\u8fdb\u884c\u60c5\u62a5\u6536\u96c6\u65f6\u514d\u53d7\u6cd5\u5f8b\u8bc9\u8bbc\u7684\u7ea6\u675f\u30022012\u5e74\uff0c\u5965\u5df4\u9a6c\u603b\u7edf\u4e0b\uff0c\u56fd\u4f1a\u5c06\u8be5\u6cd5\u6848\u5ef6\u957f\u4e86\u4e94\u5e74\uff0c\u76f4\u52302017\u5e7412\u6708\u3002\u636e\u300a\u6ce8\u518c\u300b\u62a5\u9053\uff0c2008\u5e74\u7684\u300a\u5916\u56fd\u60c5\u62a5\u76d1\u89c6\u6cd5\u4fee\u6b63\u6848\u300b\u201c\u660e\u786e\u6388\u6743\u60c5\u62a5\u673a\u6784\u5728\u6ca1\u6709\u83b7\u5f97\u6388\u6743\u7684\u60c5\u51b5\u4e0b\uff0c\u5728\u4e00\u65b9\u4f4d\u4e8e\u7f8e\u56fd\u4e4b\u5916\u7684\u60c5\u51b5\u4e0b\uff0c\u76d1\u89c6\u7f8e\u56fd\u516c\u6c11\u7684\u7535\u8bdd\u3001\u7535\u5b50\u90ae\u4ef6\u548c\u5176\u4ed6\u901a\u4fe1\u957f\u8fbe\u4e00\u5468\u201d\u3002<\/p>\n\n\n\n<p>The most detailed description of the PRISM program can be found in a report about NSA&#8217;s collection efforts under Section 702 FAA, that was released by the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Privacy_and_Civil_Liberties_Oversight_Board\" target=\"_blank\" rel=\"noreferrer noopener\">Privacy and Civil Liberties Oversight Board<\/a> (PCLOB) on July 2, 2014.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-pclob-38\" target=\"_blank\" rel=\"noreferrer noopener\">[38]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u6709\u5173\u68f1\u955c\u8ba1\u5212\u7684\u6700\u8be6\u7ec6\u63cf\u8ff0\u53ef\u4ee5\u5728\u9690\u79c1\u4e0e\u516c\u6c11\u81ea\u7531\u76d1\u7763\u59d4\u5458\u4f1a\uff08PCLOB\uff09\u4e8e2014\u5e747\u67082\u65e5\u53d1\u5e03\u7684\u4e00\u4efd\u5173\u4e8e\u56fd\u5bb6\u5b89\u5168\u5c40\u6839\u636e702\u6cd5\u6848\u6536\u96c6\u60c5\u62a5\u7684\u62a5\u544a\u4e2d\u627e\u5230\u3002<\/p>\n\n\n\n<p>According to this report, PRISM is only used to collect internet communications, not telephone conversations. These internet communications are not collected in bulk, but in a targeted way: only communications that are to or from specific selectors, like e-mail addresses, can be gathered. Under PRISM, there&#8217;s no collection based on keywords or names.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-pclob-38\" target=\"_blank\" rel=\"noreferrer noopener\">[38]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u6839\u636e\u8fd9\u4efd\u62a5\u544a\uff0c\u68f1\u955c\u8ba1\u5212\u4ec5\u7528\u4e8e\u6536\u96c6\u4e92\u8054\u7f51\u901a\u4fe1\uff0c\u800c\u4e0d\u662f\u7535\u8bdd\u5bf9\u8bdd\u3002\u8fd9\u4e9b\u4e92\u8054\u7f51\u901a\u4fe1\u5e76\u975e\u5927\u89c4\u6a21\u6536\u96c6\uff0c\u800c\u662f\u6709\u9488\u5bf9\u6027\u5730\u8fdb\u884c\uff1a\u53ea\u6709\u4e0e\u7279\u5b9a\u9009\u62e9\u5668\uff08\u5982\u7535\u5b50\u90ae\u4ef6\u5730\u5740\uff09\u6709\u5173\u7684\u901a\u4fe1\u624d\u80fd\u88ab\u6536\u96c6\u3002\u5728\u68f1\u955c\u8ba1\u5212\u4e0b\uff0c\u6ca1\u6709\u57fa\u4e8e\u5173\u952e\u8bcd\u6216\u59d3\u540d\u7684\u6536\u96c6\u3002<\/p>\n\n\n\n<p>The actual collection process is done by the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Data_Intercept_Technology_Unit\" target=\"_blank\" rel=\"noreferrer noopener\">Data Intercept Technology Unit<\/a> (DITU) of the FBI, which on behalf of the NSA sends the selectors to the U.S. internet service providers, which were previously served with a Section 702 Directive. Under this directive, the provider is legally obliged to hand over (to DITU) all communications to or from the selectors provided by the government.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-pclob-38\" target=\"_blank\" rel=\"noreferrer noopener\">[38]<\/a> DITU then sends these communications to NSA, where they are stored in various databases, depending on their type.<br>\u53c2\u8003\u8bd1\u6587\uff1a\u5b9e\u9645\u7684\u6536\u96c6\u8fc7\u7a0b\u7531\u8054\u90a6\u8c03\u67e5\u5c40\uff08FBI\uff09\u7684\u6570\u636e\u62e6\u622a\u6280\u672f\u90e8\u95e8\uff08DITU\uff09\u5b8c\u6210\uff0c\u8be5\u90e8\u95e8\u4ee3\u8868\u56fd\u5bb6\u5b89\u5168\u5c40\u5411\u7f8e\u56fd\u4e92\u8054\u7f51\u670d\u52a1\u63d0\u4f9b\u5546\u53d1\u9001\u9009\u62e9\u5668\uff08selectors\uff09\uff0c\u8fd9\u4e9b\u9009\u62e9\u5668\u5728\u4e4b\u524d\u5df2\u7ecf\u6536\u5230702\u6cd5\u6848\u6307\u4ee4\u3002\u6839\u636e\u8be5\u6307\u4ee4\uff0c\u4e92\u8054\u7f51\u670d\u52a1\u63d0\u4f9b\u5546\u6709\u6cd5\u5f8b\u4e49\u52a1\u5c06\u4e0e\u653f\u5e9c\u63d0\u4f9b\u7684\u9009\u62e9\u5668\u76f8\u5173\u7684\u6240\u6709\u901a\u4fe1\u4ea4\u7ed9DITU\u3002\u7136\u540e\uff0cDITU\u5c06\u8fd9\u4e9b\u901a\u4fe1\u53d1\u9001\u7ed9\u56fd\u5bb6\u5b89\u5168\u5c40\uff0c\u5728\u90a3\u91cc\u6839\u636e\u7c7b\u578b\u5b58\u50a8\u5728\u5404\u79cd\u6570\u636e\u5e93\u4e2d\u3002<\/p>\n\n\n\n<p>Data, both content and metadata, that already have been collected under the PRISM program, may be searched for both US and non-US person identifiers. These kinds of queries became known as &#8220;back-door searches&#8221; and are conducted by NSA, FBI and CIA.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-39\" target=\"_blank\" rel=\"noreferrer noopener\">[39]<\/a> Each of these agencies has slightly different protocols and safeguards to protect searches with a US person identifier.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-pclob-38\" target=\"_blank\" rel=\"noreferrer noopener\">[38]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u5728\u68f1\u955c\u8ba1\u5212\u4e0b\u5df2\u7ecf\u6536\u96c6\u7684\u6570\u636e\uff0c\u5305\u62ec\u5185\u5bb9\u548c\u5143\u6570\u636e\uff0c\u53ef\u4ee5\u6839\u636e\u7f8e\u56fd\u548c\u975e\u7f8e\u56fd\u4eba\u7684\u8eab\u4efd\u4fe1\u606f\u8fdb\u884c\u641c\u7d22\u3002\u8fd9\u79cd\u67e5\u8be2\u88ab\u79f0\u4e3a\u201c\u540e\u95e8\u641c\u7d22\u201d\uff0c\u7531\u56fd\u5bb6\u5b89\u5168\u5c40\u3001\u8054\u90a6\u8c03\u67e5\u5c40\u548c\u4e2d\u592e\u60c5\u62a5\u5c40\u8fdb\u884c\u3002\u6bcf\u4e2a\u673a\u6784\u90fd\u6709\u7a0d\u6709\u4e0d\u540c\u7684\u534f\u8bae\u548c\u4fdd\u969c\u63aa\u65bd\uff0c\u4ee5\u4fdd\u62a4\u4f7f\u7528\u7f8e\u56fd\u4eba\u8eab\u4efd\u4fe1\u606f\u8fdb\u884c\u7684\u641c\u7d22\u3002<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h_660333086_3\">2.1 \u8ba1\u5212\u7684\u5e7f\u5ea6 | Extent of the program<\/h3>\n\n\n\n<p>Internal NSA presentation slides included in the various media disclosures show that the NSA could unilaterally access data and perform &#8220;extensive, in-depth surveillance on live communications and stored information&#8221; with examples including email, video and voice chat, videos, photos, voice-over-IP chats (such as <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Skype\" target=\"_blank\" rel=\"noreferrer noopener\">Skype<\/a>), file transfers, and social networking details.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Greenwald1-2\" target=\"_blank\" rel=\"noreferrer noopener\">[2]<\/a> Snowden summarized that &#8220;in general, the reality is this: if an NSA, FBI, CIA, DIA, etc. analyst has access to query raw <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/SIGINT\" target=\"_blank\" rel=\"noreferrer noopener\">SIGINT<\/a> [signals intelligence] databases, they can enter and get results for anything they want.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-ibtimes_17_june-13\" target=\"_blank\" rel=\"noreferrer noopener\">[13]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u5404\u79cd\u5a92\u4f53\u62ab\u9732\u7684\u5185\u90e8\u56fd\u5bb6\u5b89\u5168\u5c40\uff08NSA\uff09\u7684\u6f14\u793a\u6587\u7a3f\u663e\u793a\uff0cNSA\u53ef\u4ee5\u5355\u65b9\u9762\u8bbf\u95ee\u6570\u636e\u5e76\u5bf9\u5b9e\u65f6\u901a\u4fe1\u548c\u5b58\u50a8\u4fe1\u606f\u8fdb\u884c\u201c\u5e7f\u6cdb\u800c\u6df1\u5165\u7684\u76d1\u89c6\u201d\uff0c\u4f8b\u5982\u7535\u5b50\u90ae\u4ef6\u3001\u89c6\u9891\u548c\u8bed\u97f3\u804a\u5929\u3001\u89c6\u9891\u3001\u7167\u7247\u3001\u8bed\u97f3IP\u804a\u5929\uff08\u5982Skype\uff09\u3001\u6587\u4ef6\u4f20\u8f93\u548c\u793e\u4ea4\u7f51\u7edc\u8be6\u7ec6\u4fe1\u606f\u3002\u65af\u8bfa\u767b\u603b\u7ed3\u9053\uff1a\u201c\u603b\u4f53\u800c\u8a00\uff0c\u4e8b\u5b9e\u662f\u8fd9\u6837\u7684\uff1a\u5982\u679cNSA\u3001FBI\u3001CIA\u3001DIA\u7b49\u5206\u6790\u5e08\u53ef\u4ee5\u8bbf\u95ee\u539f\u59cbSIGINT\uff08\u4fe1\u53f7\u60c5\u62a5\uff09\u6570\u636e\u5e93\u5e76\u8fdb\u884c\u67e5\u8be2\uff0c\u4ed6\u4eec\u53ef\u4ee5\u8f93\u5165\u4efb\u4f55\u60f3\u8981\u7684\u5185\u5bb9\u5e76\u83b7\u5f97\u7ed3\u679c\u3002\u201d<\/p>\n\n\n\n<p>According to <em>The Washington Post<\/em>, the intelligence analysts search PRISM data using terms intended to identify suspicious communications of targets whom the analysts suspect with at least 51 percent confidence to not be U.S. citizens, but in the process, communication data of some U.S. citizens are also collected unintentionally.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-WaPo1-1\" target=\"_blank\" rel=\"noreferrer noopener\">[1]<\/a> Training materials for analysts tell them that while they should periodically report such accidental collection of non-foreign U.S. data, &#8220;it&#8217;s nothing to worry about.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-WaPo1-1\" target=\"_blank\" rel=\"noreferrer noopener\">[1]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-40\" target=\"_blank\" rel=\"noreferrer noopener\">[40]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u6839\u636e\u300a\u534e\u76db\u987f\u90ae\u62a5\u300b\u7684\u62a5\u9053\uff0c\u60c5\u62a5\u5206\u6790\u5e08\u4f7f\u7528\u65e8\u5728\u8bc6\u522b\u53ef\u7591\u901a\u4fe1\u7684\u672f\u8bed\u6765\u641c\u7d22\u68f1\u955c\u6570\u636e\uff0c\u4ed6\u4eec\u5bf9\u88ab\u6000\u7591\u4e0d\u662f\u7f8e\u56fd\u516c\u6c11\u7684\u76ee\u6807\u6301\u6709\u81f3\u5c1151%\u7684\u786e\u4fe1\u5ea6\uff0c\u4f46\u5728\u6b64\u8fc7\u7a0b\u4e2d\uff0c\u4e00\u4e9b\u7f8e\u56fd\u516c\u6c11\u7684\u901a\u4fe1\u6570\u636e\u4e5f\u4f1a\u88ab\u65e0\u610f\u4e2d\u6536\u96c6\u3002\u5206\u6790\u5e08\u7684\u57f9\u8bad\u6750\u6599\u544a\u8bc9\u4ed6\u4eec\uff0c\u5c3d\u7ba1\u4ed6\u4eec\u5e94\u8be5\u5b9a\u671f\u62a5\u544a\u610f\u5916\u6536\u96c6\u5230\u7684\u975e\u5916\u56fd\u4eba\u7684\u7f8e\u56fd\u6570\u636e\uff0c\u4f46\u201c\u8fd9\u5e76\u65e0\u9700\u62c5\u5fc3\u201d\u3002<\/p>\n\n\n\n<p>According to <em><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/The_Guardian\" target=\"_blank\" rel=\"noreferrer noopener\">The Guardian<\/a><\/em>, NSA had access to chats and emails on <a href=\"https:\/\/link.zhihu.com\/?target=http%3A\/\/Hotmail.com\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/Hotmail.com<\/a> and Skype because Microsoft had &#8220;developed a surveillance capability to deal&#8221; with the interception of chats, and &#8220;for Prism collection against Microsoft email services will be unaffected because Prism collects this data prior to encryption.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Greenwald2-41\" target=\"_blank\" rel=\"noreferrer noopener\">[41]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-42\" target=\"_blank\" rel=\"noreferrer noopener\">[42]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u6839\u636e\u300a\u536b\u62a5\u300b\u7684\u62a5\u9053\uff0cNSA\u53ef\u4ee5\u8bbf\u95ee<a href=\"https:\/\/link.zhihu.com\/?target=http%3A\/\/Hotmail.com\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/Hotmail.com<\/a>\u548cSkype\u4e0a\u7684\u804a\u5929\u548c\u7535\u5b50\u90ae\u4ef6\uff0c\u56e0\u4e3a\u5fae\u8f6f\u5df2\u7ecf\u201c\u5f00\u53d1\u4e86\u4e00\u4e2a\u76d1\u89c6\u80fd\u529b\u6765\u5904\u7406\u201d\u5bf9\u804a\u5929\u7684\u62e6\u622a\uff0c\u5e76\u4e14\u201c\u5bf9\u4e8ePrism\u6536\u96c6\u5fae\u8f6f\u7535\u5b50\u90ae\u4ef6\u670d\u52a1\u7684\u6570\u636e\u4e0d\u4f1a\u53d7\u5230\u5f71\u54cd\uff0c\u56e0\u4e3aPrism\u5728\u52a0\u5bc6\u4e4b\u524d\u6536\u96c6\u8fd9\u4e9b\u6570\u636e\u3002\u201d<\/p>\n\n\n\n<p>Also according to The Guardian&#8217;s <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Glenn_Greenwald\" target=\"_blank\" rel=\"noreferrer noopener\">Glenn Greenwald<\/a> even low-level NSA analysts are allowed to search and listen to the communications of Americans and other people without court approval and supervision. Greenwald said low level Analysts can, via systems like PRISM, &#8220;listen to whatever emails they want, whatever telephone calls, browsing histories, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Microsoft_Word\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Word<\/a> documents.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-SS2-30\" target=\"_blank\" rel=\"noreferrer noopener\">[30]<\/a> And it&#8217;s all done with no need to go to a court, with no need to even get supervisor approval on the part of the analyst.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-ABCNews20130728-43\" target=\"_blank\" rel=\"noreferrer noopener\">[43]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u6839\u636e\u300a\u536b\u62a5\u300b\u7684\u683c\u4f26\u00b7\u683c\u6797\u6c83\u5c14\u5fb7\uff08Glenn Greenwald\uff09\u7684\u62a5\u9053\uff0c\u5373\u4f7f\u662f\u4f4e\u7ea7\u522b\u7684NSA\u5206\u6790\u5e08\u4e5f\u53ef\u4ee5\u5728\u6ca1\u6709\u6cd5\u5ead\u6279\u51c6\u548c\u76d1\u7763\u7684\u60c5\u51b5\u4e0b\u641c\u7d22\u548c\u76d1\u542c\u7f8e\u56fd\u4eba\u548c\u5176\u4ed6\u4eba\u7684\u901a\u4fe1\u3002\u683c\u6797\u6c83\u5c14\u5fb7\u8868\u793a\uff0c\u901a\u8fc7\u50cfPRISM\u8fd9\u6837\u7684\u7cfb\u7edf\uff0c\u4f4e\u7ea7\u522b\u7684\u5206\u6790\u5e08\u53ef\u4ee5\u201c\u542c\u53d6\u4ed6\u4eec\u60f3\u8981\u7684\u4efb\u4f55\u7535\u5b50\u90ae\u4ef6\uff0c\u4efb\u4f55\u7535\u8bdd\u901a\u8bdd\uff0c\u6d4f\u89c8\u5386\u53f2\u8bb0\u5f55\uff0c\u5fae\u8f6fWord\u6587\u6863\u3002\u6240\u6709\u8fd9\u4e9b\u90fd\u53ef\u4ee5\u5728\u4e0d\u9700\u8981\u53bb\u6cd5\u5ead\uff0c\u751a\u81f3\u4e0d\u9700\u8981\u5206\u6790\u5e08\u7684\u4e3b\u7ba1\u6279\u51c6\u7684\u60c5\u51b5\u4e0b\u5b8c\u6210\u3002\u201d<\/p>\n\n\n\n<p>He added that the NSA databank, with its years of collected communications, allows analysts to search that database and listen &#8220;to the calls or read the emails of everything that the NSA has stored, or look at the browsing histories or Google search terms that you&#8217;ve entered, and it also alerts them to any further activity that people connected to that email address or that IP address do in the future.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-ABCNews20130728-43\" target=\"_blank\" rel=\"noreferrer noopener\">[43]<\/a> Greenwald was referring in the context of the foregoing quotes to the NSA program <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/XKeyscore\" target=\"_blank\" rel=\"noreferrer noopener\">XKeyscore<\/a>.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-44\" target=\"_blank\" rel=\"noreferrer noopener\">[44]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u4ed6\u8865\u5145\u8bf4\uff0cNSA\u7684\u6570\u636e\u5e93\u62e5\u6709\u591a\u5e74\u7684\u901a\u4fe1\u8bb0\u5f55\uff0c\u4f7f\u5206\u6790\u5e08\u80fd\u591f\u641c\u7d22\u8be5\u6570\u636e\u5e93\u5e76\u76d1\u542c\u201cNSA\u6240\u5b58\u50a8\u7684\u4e00\u5207\u901a\u8bdd\u6216\u9605\u8bfb\u7684\u7535\u5b50\u90ae\u4ef6\uff0c\u6216\u67e5\u770b\u60a8\u8f93\u5165\u7684\u6d4f\u89c8\u5386\u53f2\u8bb0\u5f55\u6216\u8c37\u6b4c\u641c\u7d22\u8bcd\uff0c\u5b83\u8fd8\u4f1a\u8b66\u793a\u4ed6\u4eec\u672a\u6765\u4e0e\u8be5\u7535\u5b50\u90ae\u4ef6\u5730\u5740\u6216IP\u5730\u5740\u76f8\u5173\u7684\u4efb\u4f55\u8fdb\u4e00\u6b65\u6d3b\u52a8\u3002\u201d\u683c\u6797\u6c83\u5c14\u5fb7\u5728\u4e0a\u8ff0\u5f15\u8ff0\u4e2d\u63d0\u5230\u7684NSA\u8ba1\u5212\u662fXKeyscore\u3002<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h_660333086_4\">2.2 \u6982\u89c8\u68f1\u955c\u8ba1\u5212 | PRISM overview<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><th>Designation<br>\u9879\u76ee<\/th><th>Legal Authority See Note<br>\u6cd5\u5f8b\u6743\u9650\u6ce8\u91ca<\/th><th>Key Targets<br>\u5173\u952e\u76ee\u6807<\/th><th>Type of Information collected<br>\u6536\u96c6\u7684\u4fe1\u606f\u7c7b\u578b<\/th><th>Associated Databases<br>\u76f8\u5173\u6570\u636e\u5e93<\/th><th>Associated Software<br>\u76f8\u5173\u8f6f\u4ef6<\/th><\/tr><tr><td>US-984XN<\/td><td>Section 702 of the FISA Amendments Act (FAA)<br>FISA \u4fee\u6b63\u6848 (FAA) \u7b2c 702 \u6761<\/td><td>Known Targets include[45]\u5df2\u77e5\u76ee\u6807\u5305\u62ec\uff1a<br>\uff08\u8be6\u89c1\u8868\u6ce81\uff09<\/td><td>The exact type of data varies by provider:\u6570\u636e\u7684\u786e\u5207\u7c7b\u578b\u56e0\u63d0\u4f9b\u5546\u800c\u5f02\uff1a<br>\uff08\u8be6\u89c1\u8868\u6ce82\uff09<\/td><td>Known: \u5df2\u77e5\u7684\u6709\uff1a<br>\uff08\u8be6\u89c1\u8868\u6ce83\uff09<\/td><td>Known:<br>Unified Targeting Tool<br>\u5df2\u77e5\uff1a<br>\u7edf\u4e00\u5b9a\u4f4d\u5de5\u5177<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>\u8868\u6ce81\uff1a<\/strong><\/p>\n\n\n\n<ul class=\"has-small-font-size wp-block-list\">\n<li>Venezuela \u59d4\u5185\u745e\u62c9<\/li>\n\n\n\n<li>Military procurement \u519b\u4e8b\u91c7\u8d2d<\/li>\n\n\n\n<li>Oil \u6cb9<\/li>\n\n\n\n<li>Mexico \u58a8\u897f\u54e5<\/li>\n\n\n\n<li>Narcotics \u6bd2\u54c1<\/li>\n\n\n\n<li>Energy \u80fd\u6e90<\/li>\n\n\n\n<li>Internal Security \u5185\u90e8\u5b89\u5168<\/li>\n\n\n\n<li>Political Affairs \u653f\u6cbb\u4e8b\u52a1<\/li>\n\n\n\n<li>Colombia \u54e5\u4f26\u6bd4\u4e9a<\/li>\n\n\n\n<li>Trafficking \u4eba\u53e3\u8d29\u5356<\/li>\n\n\n\n<li>FARC \u54e5\u4f26\u6bd4\u4e9a\u9769\u547d\u6b66\u88c5\u529b\u91cf<\/li>\n<\/ul>\n\n\n\n<p><strong>\u8868\u6ce82\uff1a<\/strong><\/p>\n\n\n\n<ul class=\"has-small-font-size wp-block-list\">\n<li>Email \u7535\u5b50\u90ae\u4ef6<\/li>\n\n\n\n<li>Chat \u2013 video, voice \u804a\u5929 \u2013 \u89c6\u9891\u3001\u8bed\u97f3<\/li>\n\n\n\n<li>Videos \u89c6\u9891<\/li>\n\n\n\n<li>Stored data \u5b58\u50a8\u6570\u636e<\/li>\n\n\n\n<li>VoIP \u7f51\u7edc\u7535\u8bdd<\/li>\n\n\n\n<li>File transfers \u6587\u4ef6\u4f20\u8f93<\/li>\n\n\n\n<li>Video Conferencing \u89c6\u9891\u4f1a\u8bae<\/li>\n\n\n\n<li>Notifications of target activity, logins, etc. \u76ee\u6807\u6d3b\u52a8\u3001\u767b\u5f55\u7b49\u7684\u901a\u77e5<\/li>\n\n\n\n<li>Online Social Networking details \u5728\u7ebf\u793e\u4ea4\u7f51\u7edc\u8be6\u7ec6\u4fe1\u606f<\/li>\n\n\n\n<li>Special Requests \u7279\u522b\u8981\u6c42<\/li>\n<\/ul>\n\n\n\n<p><strong>\u8868\u6ce83\uff1a<\/strong><\/p>\n\n\n\n<ul class=\"has-small-font-size wp-block-list\">\n<li>TRAFFICTHIEF \u201c\u4ea4\u901a\u7a83\u8d3c\u201d<\/li>\n\n\n\n<li>MARINA \u201c\u7801\u5934\u201d<\/li>\n\n\n\n<li>MAINWAY \u201c\u4e3b\u8def\u201d<\/li>\n\n\n\n<li>FALLOUT \u201c\u6389\u51fa\u6765\u201d<\/li>\n\n\n\n<li>PINWALE \u201c\u72ec\u9488\u201d<\/li>\n\n\n\n<li>CONVEYANCE \u201c\u8f93\u9001\u201d<\/li>\n\n\n\n<li>NUCLEON \u201c\u6838\u5b50\u201d<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h_660481013_1\">3. \u5bf9\uff08\u68f1\u955c\uff09\u66dd\u5149\u7684\u53cd\u5e94 | Responses to disclosures<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h_660481013_2\">3.1 \u7f8e\u56fd\u653f\u5e9c | United States government<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3.1.1 \u884c\u653f\u90e8\u95e8\u751f\u6d3b | Executive branch life<\/strong><\/h4>\n\n\n\n<p>Shortly after publication of the reports by <em>The Guardian<\/em> and <em>The Washington Post<\/em>, the United States <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Director_of_National_Intelligence\" target=\"_blank\" rel=\"noreferrer noopener\">Director of National Intelligence<\/a>, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/James_Clapper\" target=\"_blank\" rel=\"noreferrer noopener\">James Clapper<\/a>, on June 7, 2013, released a statement confirming that for nearly six years the government of the United States had been using large internet services companies such as Facebook to collect information on foreigners outside the United States as a defense against national security threats.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-nytsavage060613-17\" target=\"_blank\" rel=\"noreferrer noopener\">[17]<\/a> The statement read in part, &#8220;<em>The Guardian<\/em> and <em>The Washington Post<\/em> articles refer to collection of communications pursuant to Section 702 of the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Foreign_Intelligence_Surveillance_Act\" target=\"_blank\" rel=\"noreferrer noopener\">Foreign Intelligence Surveillance Act<\/a>. They contain numerous inaccuracies.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Clapper-46\" target=\"_blank\" rel=\"noreferrer noopener\">[46]<\/a> He went on to say, &#8220;Section 702 is a provision of FISA that is designed to facilitate the acquisition of foreign intelligence information concerning non-U.S. persons located outside the United States. It cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Clapper-46\" target=\"_blank\" rel=\"noreferrer noopener\">[46]<\/a> Clapper concluded his statement by stating, &#8220;The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Clapper-46\" target=\"_blank\" rel=\"noreferrer noopener\">[46]<\/a> On March 12, 2013, Clapper had told the United States Senate Select Committee on Intelligence that the NSA does &#8220;not wittingly&#8221; collect any type of data on millions or hundreds of millions of Americans.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Denial-47\" target=\"_blank\" rel=\"noreferrer noopener\">[47]<\/a> Clapper later admitted the statement he made on March 12, 2013, was a lie,<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-nytinfrastructure-48\" target=\"_blank\" rel=\"noreferrer noopener\">[48]<\/a> or in his words &#8220;I responded in what I thought was the most truthful, or least untruthful manner by saying no.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-49\" target=\"_blank\" rel=\"noreferrer noopener\">[49]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u5728\u300a\u536b\u62a5\u300b\u548c\u300a\u534e\u76db\u987f\u90ae\u62a5\u300b\u7684\u62a5\u9053\u53d1\u5e03\u540e\u4e0d\u4e45\uff0c\u7f8e\u56fd\u56fd\u5bb6\u60c5\u62a5\u603b\u76d1\u8a79\u59c6\u65af\u00b7\u514b\u62c9\u73c0\u4e8e2013\u5e746\u67087\u65e5\u53d1\u8868\u58f0\u660e\uff0c\u786e\u8ba4\u7f8e\u56fd\u653f\u5e9c\u5728\u8fd1\u516d\u5e74\u6765\u4e00\u76f4\u5728\u5229\u7528Facebook\u7b49\u5927\u578b\u4e92\u8054\u7f51\u670d\u52a1\u516c\u53f8\u6536\u96c6\u9488\u5bf9\u7f8e\u56fd\u4ee5\u5916\u5916\u56fd\u4eba\u7684\u4fe1\u606f\uff0c\u4ee5\u5e94\u5bf9\u56fd\u5bb6\u5b89\u5168\u5a01\u80c1\u3002\u58f0\u660e\u90e8\u5206\u5185\u5bb9\u5982\u4e0b\uff1a\u201c\u300a\u536b\u62a5\u300b\u548c\u300a\u534e\u76db\u987f\u90ae\u62a5\u300b\u7684\u6587\u7ae0\u63d0\u5230\u4e86\u6839\u636e\u300a\u5916\u56fd\u60c5\u62a5\u76d1\u89c6\u6cd5\u300b\u7b2c702\u6761\u6b3e\u6536\u96c6\u901a\u4fe1\u7684\u60c5\u51b5\u3002\u5b83\u4eec\u5305\u542b\u4e86\u8bb8\u591a\u4e0d\u51c6\u786e\u7684\u4fe1\u606f\u3002\u201d\u4ed6\u7ee7\u7eed\u8868\u793a\uff1a\u201c\u7b2c702\u6761\u6b3e\u662f\u300a\u5916\u56fd\u60c5\u62a5\u76d1\u89c6\u6cd5\u300b\u7684\u4e00\u9879\u89c4\u5b9a\uff0c\u65e8\u5728\u4fc3\u8fdb\u5bf9\u4f4d\u4e8e\u7f8e\u56fd\u4ee5\u5916\u7684\u975e\u7f8e\u56fd\u4eba\u7684\u5916\u56fd\u60c5\u62a5\u4fe1\u606f\u7684\u83b7\u53d6\u3002\u5b83\u4e0d\u80fd\u88ab\u7528\u4e8e\u6709\u610f\u9488\u5bf9\u4efb\u4f55\u7f8e\u56fd\u516c\u6c11\u3001\u5176\u4ed6\u7f8e\u56fd\u4eba\u6216\u4f4d\u4e8e\u7f8e\u56fd\u5883\u5185\u7684\u4eba\u3002\u201d\u514b\u62c9\u73c0\u5728\u58f0\u660e\u4e2d\u603b\u7ed3\u8bf4\uff1a\u201c\u5bf9\u8fd9\u4e00\u91cd\u8981\u4e14\u5b8c\u5168\u5408\u6cd5\u7684\u8ba1\u5212\u7684\u672a\u7ecf\u6388\u6743\u7684\u4fe1\u606f\u6cc4\u9732\u662f\u53ef\u803b\u7684\uff0c\u5e76\u5371\u53ca\u5bf9\u7f8e\u56fd\u5b89\u5168\u7684\u91cd\u8981\u4fdd\u62a4\u63aa\u65bd\u3002\u201d\u57282013\u5e743\u670812\u65e5\uff0c\u514b\u62c9\u73c0\u66fe\u544a\u8bc9\u7f8e\u56fd\u53c2\u8bae\u9662\u60c5\u62a5\u59d4\u5458\u4f1a\uff0cNSA\u201c\u5e76\u6ca1\u6709\u201d\u6709\u610f\u6536\u96c6\u6570\u767e\u4e07\u6216\u6570\u4ebf\u7f8e\u56fd\u4eba\u7684\u4efb\u4f55\u7c7b\u578b\u6570\u636e\u3002\u514b\u62c9\u73c0\u540e\u6765\u627f\u8ba4\uff0c\u4ed6\u57282013\u5e743\u670812\u65e5\u53d1\u8868\u7684\u58f0\u660e\u662f\u4e00\u4e2a\u8c0e\u8a00\uff0c\u6216\u7528\u4ed6\u7684\u8bdd\u8bf4\uff1a\u201c\u6211\u5728\u6211\u8ba4\u4e3a\u6700\u771f\u5b9e\u3001\u6216\u6700\u4e0d\u5931\u5b9e\u7684\u65b9\u5f0f\u4e0a\u56de\u7b54\u8bf4\u6ca1\u6709\u3002\u201d<\/p>\n\n\n\n<p>On June 7, 2013, U.S. President <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Barack_Obama\" target=\"_blank\" rel=\"noreferrer noopener\">Barack Obama<\/a>, referring to the PRISM program<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-50\" target=\"_blank\" rel=\"noreferrer noopener\">[50]<\/a> and the NSA&#8217;s telephone calls logging program, said, &#8220;What you&#8217;ve got is two programs that were originally authorized by Congress, have been repeatedly authorized by Congress. Bipartisan majorities have approved them. Congress is continually briefed on how these are conducted. There are a whole range of safeguards involved. And federal judges are overseeing the entire program throughout.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-nytobama060713-51\" target=\"_blank\" rel=\"noreferrer noopener\">[51]<\/a> He also said, &#8220;You can&#8217;t have 100 percent security and then also have 100 percent privacy and zero inconvenience. You know, we&#8217;re going to have to make some choices as a society.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-nytobama060713-51\" target=\"_blank\" rel=\"noreferrer noopener\">[51]<\/a> In separate statements, senior Obama administration officials (not mentioned by name in source) said that Congress had been briefed 13 times on the programs since 2009.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-nytobama060813-52\" target=\"_blank\" rel=\"noreferrer noopener\">[52]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u57282013\u5e746\u67087\u65e5\uff0c\u7f8e\u56fd\u603b\u7edf\u5df4\u62c9\u514b\u00b7\u5965\u5df4\u9a6c\u63d0\u5230PRISM\u8ba1\u5212\u548cNSA\u7684\u7535\u8bdd\u8bb0\u5f55\u8ba1\u5212\u65f6\u8868\u793a\uff1a\u201c\u4f60\u6240\u62e5\u6709\u7684\u662f\u4e24\u4e2a\u6700\u521d\u7531\u56fd\u4f1a\u6388\u6743\uff0c\u5df2\u7ecf\u591a\u6b21\u83b7\u5f97\u56fd\u4f1a\u6388\u6743\u7684\u8ba1\u5212\u3002\u4e24\u515a\u591a\u6570\u6d3e\u5df2\u7ecf\u6279\u51c6\u4e86\u5b83\u4eec\u3002\u56fd\u4f1a\u4e0d\u65ad\u63a5\u53d7\u8fd9\u4e9b\u8ba1\u5212\u7684\u7b80\u62a5\u3002\u8fd9\u5176\u4e2d\u6d89\u53ca\u4e86\u4e00\u7cfb\u5217\u7684\u4fdd\u969c\u63aa\u65bd\u3002\u8054\u90a6\u6cd5\u5b98\u4e00\u76f4\u5728\u76d1\u7763\u6574\u4e2a\u8ba1\u5212\u3002\u201d\u4ed6\u8fd8\u8bf4\uff1a\u201c\u4f60\u4e0d\u80fd\u767e\u5206\u4e4b\u767e\u5730\u62e5\u6709\u5b89\u5168\uff0c\u540c\u65f6\u4e5f\u767e\u5206\u4e4b\u767e\u5730\u62e5\u6709\u9690\u79c1\u548c\u96f6\u4e0d\u4fbf\u3002\u4f60\u77e5\u9053\u7684\uff0c\u4f5c\u4e3a\u4e00\u4e2a\u793e\u4f1a\uff0c\u6211\u4eec\u5fc5\u987b\u505a\u51fa\u4e00\u4e9b\u9009\u62e9\u3002\u201d\u5728\u53e6\u5916\u7684\u58f0\u660e\u4e2d\uff0c\u5965\u5df4\u9a6c\u653f\u5e9c\u9ad8\u7ea7\u5b98\u5458\uff08\u672a\u5728\u6d88\u606f\u6765\u6e90\u4e2d\u63d0\u53ca\u59d3\u540d\uff09\u8868\u793a\uff0c\u81ea2009\u5e74\u4ee5\u6765\uff0c\u56fd\u4f1a\u5df2\u7ecf13\u6b21\u63a5\u53d7\u4e86\u8fd9\u4e9b\u8ba1\u5212\u7684\u7b80\u62a5\u3002<\/p>\n\n\n\n<p>On June 8, 2013, Director of National Intelligence Clapper made an additional public statement about PRISM and released a <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Fact_sheet\" target=\"_blank\" rel=\"noreferrer noopener\">fact sheet<\/a> providing further information about the program, which he described as &#8220;an internal government computer system used to facilitate the government&#8217;s statutorily authorized collection of foreign intelligence information from electronic communication service providers under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. \u00a7 1881a).&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Fact_Sheet-53\" target=\"_blank\" rel=\"noreferrer noopener\">[53]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Clapper2-54\" target=\"_blank\" rel=\"noreferrer noopener\">[54]<\/a> The fact sheet stated that &#8220;the surveillance activities published in <em>The Guardian<\/em> and the <em>Washington Post<\/em> are lawful and conducted under authorities widely known and discussed, and fully debated and authorized by <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/United_States_Congress\" target=\"_blank\" rel=\"noreferrer noopener\">Congress<\/a>.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Fact_Sheet-53\" target=\"_blank\" rel=\"noreferrer noopener\">[53]<\/a> The fact sheet also stated that &#8220;the United States Government does not unilaterally obtain information from the servers of U.S. electronic communication service providers. All such information is obtained with FISA Court approval and with the knowledge of the provider based on a written directive from the Attorney General and the Director of National Intelligence.&#8221; It said that the attorney general provides FISA Court rulings and semi-annual reports about PRISM activities to Congress, &#8220;provid[ing] an unprecedented degree of accountability and transparency.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Fact_Sheet-53\" target=\"_blank\" rel=\"noreferrer noopener\">[53]<\/a> Democratic senators <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Mark_Udall\" target=\"_blank\" rel=\"noreferrer noopener\">Udall<\/a> and <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Ron_Wyden\" target=\"_blank\" rel=\"noreferrer noopener\">Wyden<\/a>, who serve on the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/U.S._Senate_Select_Committee_on_Intelligence\" target=\"_blank\" rel=\"noreferrer noopener\">U.S. Senate Select Committee on Intelligence<\/a>, subsequently criticized the fact sheet as being inaccurate.[<em><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Wikipedia%3APlease_clarify\" target=\"_blank\" rel=\"noreferrer noopener\">clarification needed<\/a><\/em>] NSA Director <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Keith_B._Alexander\" target=\"_blank\" rel=\"noreferrer noopener\">General Keith Alexander<\/a> acknowledged the errors, stating that the fact sheet &#8220;could have more precisely described&#8221; the requirements governing the collection of e-mail and other internet content from US companies. The fact sheet was withdrawn from the NSA&#8217;s website around June 26.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-55\" target=\"_blank\" rel=\"noreferrer noopener\">[55]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u57282013\u5e746\u67088\u65e5\uff0c\u56fd\u5bb6\u60c5\u62a5\u603b\u76d1\u514b\u62c9\u73c0\u53d1\u8868\u4e86\u4e00\u4efd\u5173\u4e8ePRISM\u7684\u989d\u5916\u516c\u5f00\u58f0\u660e\uff0c\u5e76\u53d1\u5e03\u4e86\u4e00\u4efd\u4e8b\u5b9e\u8bf4\u660e\u4e66\uff0c\u63d0\u4f9b\u4e86\u6709\u5173\u8be5\u8ba1\u5212\u7684\u8fdb\u4e00\u6b65\u4fe1\u606f\u3002\u4ed6\u5c06\u5176\u63cf\u8ff0\u4e3a\u201c\u4e00\u79cd\u5185\u90e8\u653f\u5e9c\u8ba1\u7b97\u673a\u7cfb\u7edf\uff0c\u7528\u4e8e\u5728\u6cd5\u5ead\u76d1\u7763\u4e0b\u4fc3\u8fdb\u653f\u5e9c\u6839\u636e\u300a\u5916\u56fd\u60c5\u62a5\u76d1\u89c6\u6cd5\u300b702\u6761\u6b3e\uff0850 U.S.C. \u00a7 1881a\uff09\u7684\u6388\u6743\uff0c\u4ece\u7535\u5b50\u901a\u4fe1\u670d\u52a1\u63d0\u4f9b\u5546\u83b7\u53d6\u5916\u56fd\u60c5\u62a5\u4fe1\u606f\u3002\u201d\u4e8b\u5b9e\u8bf4\u660e\u4e66\u6307\u51fa\uff0c\u201c\u300a\u536b\u62a5\u300b\u548c\u300a\u534e\u76db\u987f\u90ae\u62a5\u300b\u53d1\u5e03\u7684\u76d1\u89c6\u6d3b\u52a8\u662f\u5408\u6cd5\u7684\uff0c\u662f\u6839\u636e\u5e7f\u4e3a\u4eba\u77e5\u3001\u5e7f\u4e3a\u8ba8\u8bba\u548c\u7ecf\u8fc7\u56fd\u4f1a\u5145\u5206\u8fa9\u8bba\u548c\u6388\u6743\u7684\u6743\u5a01\u8fdb\u884c\u7684\u3002\u201d\u8be5\u4e8b\u5b9e\u8bf4\u660e\u4e66\u8fd8\u6307\u51fa\uff0c\u201c\u7f8e\u56fd\u653f\u5e9c\u4e0d\u4f1a\u5355\u65b9\u9762\u4ece\u7f8e\u56fd\u7535\u5b50\u901a\u4fe1\u670d\u52a1\u63d0\u4f9b\u5546\u7684\u670d\u52a1\u5668\u83b7\u53d6\u4fe1\u606f\u3002\u6240\u6709\u8fd9\u4e9b\u4fe1\u606f\u90fd\u662f\u5728FISA\u6cd5\u5ead\u6279\u51c6\u548c\u63d0\u4f9b\u5546\u77e5\u60c5\u7684\u60c5\u51b5\u4e0b\u83b7\u5f97\u7684\uff0c\u57fa\u4e8e\u53f8\u6cd5\u90e8\u957f\u548c\u56fd\u5bb6\u60c5\u62a5\u603b\u76d1\u7684\u4e66\u9762\u6307\u4ee4\u3002\u201d\u5b83\u8fd8\u6307\u51fa\uff0c\u53f8\u6cd5\u90e8\u957f\u5411\u56fd\u4f1a\u63d0\u4f9b\u6709\u5173PRISM\u6d3b\u52a8\u7684FISA\u6cd5\u5ead\u88c1\u51b3\u548c\u534a\u5e74\u62a5\u544a\uff0c\u201c\u63d0\u4f9b\u4e86\u524d\u6240\u672a\u6709\u7684\u95ee\u8d23\u548c\u900f\u660e\u5ea6\u3002\u201d\u968f\u540e\uff0c\u53c2\u8bae\u9662\u60c5\u62a5\u59d4\u5458\u4f1a\u7684\u6c11\u4e3b\u515a\u53c2\u8bae\u5458\u4e4c\u5fb7\u5c14\u548c\u6000\u767b\u6279\u8bc4\u8be5\u4e8b\u5b9e\u8bf4\u660e\u4e66\u4e0d\u51c6\u786e\u3002NSA\u5c40\u957f\u57fa\u601d\u00b7\u4e9a\u5386\u5c71\u5927\u627f\u8ba4\u4e86\u8fd9\u4e9b\u9519\u8bef\uff0c\u8868\u793a\u4e8b\u5b9e\u8bf4\u660e\u4e66\u201c\u672c\u53ef\u4ee5\u66f4\u51c6\u786e\u5730\u63cf\u8ff0\u201d\u5bf9\u7f8e\u56fd\u516c\u53f8\u7684\u7535\u5b50\u90ae\u4ef6\u548c\u5176\u4ed6\u4e92\u8054\u7f51\u5185\u5bb9\u7684\u6536\u96c6\u8981\u6c42\u3002\u8be5\u4e8b\u5b9e\u8bf4\u660e\u4e66\u57286\u670826\u65e5\u5de6\u53f3\u4eceNSA\u7684\u7f51\u7ad9\u4e0a\u64a4\u4e0b\u3002<\/p>\n\n\n\n<p>In a closed-doors Senate hearing around June 11, FBI Director <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Robert_Mueller\" target=\"_blank\" rel=\"noreferrer noopener\">Robert Mueller<\/a> said that Snowden&#8217;s leaks had caused &#8220;significant harm to our nation and to our safety.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Mueller-56\" target=\"_blank\" rel=\"noreferrer noopener\">[56]<\/a> In the same Senate hearing, NSA Director Alexander defended the program.[<em><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Wikipedia%3APlease_clarify\" target=\"_blank\" rel=\"noreferrer noopener\">further explanation needed<\/a><\/em>] Alexander&#8217;s defense was immediately criticized by Senators Udall and Wyden, who said they saw no evidence that the NSA programs had produced &#8220;uniquely valuable intelligence.&#8221; In a joint statement, they wrote, &#8220;Gen Alexander&#8217;s testimony yesterday suggested that the NSA&#8217;s bulk phone records collection program helped thwart &#8216;dozens&#8217; of terrorist attacks, but all of the plots that he mentioned appear to have been identified using other collection methods.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Mueller-56\" target=\"_blank\" rel=\"noreferrer noopener\">[56]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-57\" target=\"_blank\" rel=\"noreferrer noopener\">[57]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u57286\u670811\u65e5\u5de6\u53f3\u7684\u4e00\u6b21\u95ed\u95e8\u53c2\u8bae\u9662\u542c\u8bc1\u4f1a\u4e0a\uff0c\u8054\u90a6\u8c03\u67e5\u5c40\u5c40\u957f\u7f57\u4f2f\u7279\u00b7\u7a46\u52d2\u8868\u793a\uff0c\u65af\u8bfa\u767b\u7684\u6cc4\u9732\u7ed9\u6211\u4eec\u56fd\u5bb6\u548c\u5b89\u5168\u9020\u6210\u4e86\u201c\u91cd\u5927\u635f\u5bb3\u201d\u3002\u5728\u540c\u4e00\u6b21\u53c2\u8bae\u9662\u542c\u8bc1\u4f1a\u4e0a\uff0cNSA\u5c40\u957f\u4e9a\u5386\u5c71\u5927\u4e3a\u8be5\u8ba1\u5212\u8fdb\u884c\u4e86\u8fa9\u62a4\u3002\u4e4c\u5fb7\u5c14\u548c\u6000\u767b\u53c2\u8bae\u5458\u7acb\u5373\u6279\u8bc4\u4e86\u4e9a\u5386\u5c71\u5927\u7684\u8fa9\u62a4\uff0c\u4ed6\u4eec\u8868\u793a\u4ed6\u4eec\u6ca1\u6709\u770b\u5230NSA\u8ba1\u5212\u4ea7\u751f\u4e86\u201c\u72ec\u7279\u6709\u4ef7\u503c\u7684\u60c5\u62a5\u201d\u7684\u8bc1\u636e\u3002\u4ed6\u4eec\u5728\u4e00\u4efd\u8054\u5408\u58f0\u660e\u4e2d\u5199\u9053\uff1a\u201c\u4e9a\u5386\u5c71\u5927\u5c06\u519b\u6628\u5929\u7684\u8bc1\u8bcd\u8868\u660e\uff0cNSA\u7684\u5927\u89c4\u6a21\u7535\u8bdd\u8bb0\u5f55\u6536\u96c6\u8ba1\u5212\u5e2e\u52a9\u632b\u8d25\u4e86\u2018\u6570\u5341\u8d77\u2019\u6050\u6016\u88ad\u51fb\uff0c\u4f46\u4ed6\u63d0\u5230\u7684\u6240\u6709\u9634\u8c0b\u4f3c\u4e4e\u90fd\u662f\u901a\u8fc7\u5176\u4ed6\u6536\u96c6\u65b9\u6cd5\u786e\u5b9a\u7684\u3002\u201d<\/p>\n\n\n\n<p>On June 18, NSA Director Alexander said in an open hearing before the House Intelligence Committee of Congress that communications surveillance had helped prevent more than 50 potential terrorist attacks worldwide (at least 10 of them involving terrorism suspects or targets in the United States) between 2001 and 2013, and that the PRISM web traffic surveillance program contributed in over 90 percent of those cases.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-58\" target=\"_blank\" rel=\"noreferrer noopener\">[58]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-waponumbers-59\" target=\"_blank\" rel=\"noreferrer noopener\">[59]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-nprnumbers-60\" target=\"_blank\" rel=\"noreferrer noopener\">[60]<\/a> According to court records, one example Alexander gave regarding a thwarted attack by al Qaeda on the New York Stock Exchange was not in fact foiled by surveillance.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-61\" target=\"_blank\" rel=\"noreferrer noopener\">[61]<\/a> Several senators wrote Director of National Intelligence Clapper asking him to provide other examples.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-62\" target=\"_blank\" rel=\"noreferrer noopener\">[62]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u57286\u670818\u65e5\uff0cNSA\u5c40\u957f\u4e9a\u5386\u5c71\u5927\u5728\u56fd\u4f1a\u7684\u4f17\u8bae\u9662\u60c5\u62a5\u59d4\u5458\u4f1a\u7684\u516c\u5f00\u542c\u8bc1\u4f1a\u4e0a\u8868\u793a\uff0c\u901a\u4fe1\u76d1\u89c6\u5e2e\u52a9\u963b\u6b62\u4e862001\u5e74\u81f32013\u5e74\u95f4\u5168\u7403\u8d85\u8fc750\u8d77\u6f5c\u5728\u7684\u6050\u6016\u88ad\u51fb\uff08\u5176\u4e2d\u81f3\u5c11\u670910\u8d77\u6d89\u53ca\u7f8e\u56fd\u7684\u6050\u6016\u5acc\u7591\u4eba\u6216\u76ee\u6807\uff09\uff0c\u800cPRISM\u7f51\u7edc\u6d41\u91cf\u76d1\u89c6\u8ba1\u5212\u5728\u8fd9\u4e9b\u6848\u4ef6\u4e2d\u8d21\u732e\u8d85\u8fc790\uff05\u3002\u6839\u636e\u6cd5\u5ead\u8bb0\u5f55\uff0c\u4e9a\u5386\u5c71\u5927\u63d0\u5230\u7684\u4e00\u8d77\u5173\u4e8e\u57fa\u5730\u7ec4\u7ec7\u5728\u7ebd\u7ea6\u8bc1\u5238\u4ea4\u6613\u6240\u7684\u88ad\u51fb\u672a\u88ab\u76d1\u89c6\u963b\u6b62\u3002\u51e0\u4f4d\u53c2\u8bae\u5458\u81f4\u51fd\u56fd\u5bb6\u60c5\u62a5\u603b\u76d1\u514b\u62c9\u73c0\uff0c\u8981\u6c42\u4ed6\u63d0\u4f9b\u5176\u4ed6\u4f8b\u5b50\u3002<\/p>\n\n\n\n<p>U.S. intelligence officials, speaking on condition of anonymity, told various news outlets that by June 24 they were already seeing what they said was evidence that suspected terrorists had begun changing their communication practices in order to evade detection by the surveillance tools disclosed by Snowden.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-starr-cnn-2013-6025-63\" target=\"_blank\" rel=\"noreferrer noopener\">[63]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-wapochanges-64\" target=\"_blank\" rel=\"noreferrer noopener\">[64]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u7f8e\u56fd\u60c5\u62a5\u5b98\u5458\u5728\u533f\u540d\u6761\u4ef6\u4e0b\u544a\u8bc9\u5404\u4e2a\u65b0\u95fb\u5a92\u4f53\uff0c\u5230\u4e866\u670824\u65e5\uff0c\u4ed6\u4eec\u5df2\u7ecf\u770b\u5230\u636e\u79f0\u662f\u8bc1\u636e\u8868\u660e\uff0c\u5acc\u7591\u6050\u6016\u5206\u5b50\u5df2\u7ecf\u5f00\u59cb\u6539\u53d8\u4ed6\u4eec\u7684\u901a\u4fe1\u65b9\u5f0f\uff0c\u4ee5\u9003\u907f\u65af\u8bfa\u767b\u62ab\u9732\u7684\u76d1\u89c6\u5de5\u5177\u7684\u4fa6\u6d4b\u3002<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3.1.2 \u7acb\u6cd5\u90e8\u95e8 | Legislative branch<\/strong><\/h4>\n\n\n\n<p>In contrast to their swift and forceful reactions the previous day to allegations that the government had been conducting surveillance of United States citizens&#8217; telephone records, Congressional leaders initially had little to say about the PRISM program the day after leaked information about the program was published. Several lawmakers declined to discuss PRISM, citing its top-secret classification,<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-waposilence-65\" target=\"_blank\" rel=\"noreferrer noopener\">[65]<\/a> and others said that they had not been aware of the program.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-66\" target=\"_blank\" rel=\"noreferrer noopener\">[66]<\/a> After statements had been released by the president and the Director of National Intelligence, some lawmakers began to comment:<br>\u53c2\u8003\u8bd1\u6587\uff1a\u4e0e\u524d\u4e00\u5929\u5bf9\u653f\u5e9c\u6d89\u5acc\u76d1\u89c6\u7f8e\u56fd\u516c\u6c11\u7535\u8bdd\u8bb0\u5f55\u7684\u6307\u63a7\u4f5c\u51fa\u7684\u8fc5\u901f\u548c\u6709\u529b\u56de\u5e94\u5f62\u6210\u9c9c\u660e\u5bf9\u6bd4\u7684\u662f\uff0c\u56fd\u4f1a\u9886\u5bfc\u4eba\u5728\u6cc4\u9732\u7684\u6709\u5173PRISM\u8ba1\u5212\u7684\u4fe1\u606f\u53d1\u8868\u540e\u7684\u7b2c\u4e8c\u5929\u51e0\u4e4e\u6ca1\u6709\u53d1\u8868\u8bc4\u8bba\u3002\u4e00\u4e9b\u8bae\u5458\u62d2\u7edd\u8ba8\u8bbaPRISM\uff0c\u79f0\u5176\u4e3a\u6700\u9ad8\u673a\u5bc6\uff0c\u800c\u5176\u4ed6\u4e00\u4e9b\u8bae\u5458\u5219\u8868\u793a\u4ed6\u4eec\u5e76\u4e0d\u77e5\u60c5\u3002\u5728\u603b\u7edf\u548c\u56fd\u5bb6\u60c5\u62a5\u603b\u76d1\u53d1\u8868\u58f0\u660e\u540e\uff0c\u4e00\u4e9b\u8bae\u5458\u5f00\u59cb\u53d1\u8868\u8bc4\u8bba\uff1a<\/p>\n\n\n\n<p>Senator <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/John_McCain\" target=\"_blank\" rel=\"noreferrer noopener\">John McCain<\/a> (R-AZ)<br>\u53c2\u8003\u8bd1\u6587\uff1a\u53c2\u8bae\u5458\u7ea6\u7ff0\u00b7\u9ea6\u51ef\u6069 (R-AZ)<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">June 9, 2013, &#8220;We passed the Patriot Act. We passed specific provisions of the act that allowed for this program to take place, to be enacted in operation.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-klinck-wgrz-2013-6-9-67\" target=\"_blank\" rel=\"noreferrer noopener\">[67]<\/a><\/p>\n<cite>\u53c2\u8003\u8bd1\u6587\uff1a2013\u5e746\u67089\u65e5\uff0c&#8221;\u6211\u4eec\u901a\u8fc7\u4e86\u300a\u7231\u56fd\u8005\u6cd5\u6848\u300b\u3002\u6211\u4eec\u901a\u8fc7\u4e86\u5141\u8bb8\u8be5\u8ba1\u5212\u5b9e\u65bd\u7684\u6cd5\u6848\u4e2d\u7684\u5177\u4f53\u6761\u6b3e\u3002&#8221;<br><\/cite><\/blockquote>\n\n\n\n<p>Senator <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Dianne_Feinstein\" target=\"_blank\" rel=\"noreferrer noopener\">Dianne Feinstein<\/a> (D-CA), chair of the Senate Intelligence Committee<br>\u53c2\u8003\u8bd1\u6587\uff1a\u53c2\u8bae\u5458\u9edb\u5b89\u00b7\u8303\u65af\u5766 (D-CA)\uff0c\u53c2\u8bae\u9662\u60c5\u62a5\u59d4\u5458\u4f1a\u4e3b\u5e2d<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">June 9 &#8220;These programs are within the law,&#8221; &#8220;part of our obligation is keeping Americans safe,&#8221; &#8220;Human intelligence isn&#8217;t going to do it.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-chicagotribune1-68\" target=\"_blank\" rel=\"noreferrer noopener\">[68]<\/a><\/p>\n<cite>\u53c2\u8003\u8bd1\u6587\uff1a6 \u6708 9 \u65e5\u201c\u8fd9\u4e9b\u8ba1\u5212\u662f\u5728\u6cd5\u5f8b\u8303\u56f4\u5185\u7684\u201d\uff0c\u201c\u6211\u4eec\u7684\u90e8\u5206\u4e49\u52a1\u662f\u4fdd\u8bc1\u7f8e\u56fd\u4eba\u7684\u5b89\u5168\u201d\uff0c\u201c\u4eba\u7c7b\u667a\u529b\u65e0\u6cd5\u505a\u5230\u8fd9\u4e00\u70b9\u3002\u201d[68]<\/cite><\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">June 11 &#8220;It went fine. &#8230; We asked him (<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Keith_B._Alexander\" target=\"_blank\" rel=\"noreferrer noopener\">Keith Alexander<\/a>) to declassify things because it would be helpful (for people and lawmakers to better understand the intelligence programs). &#8230; I&#8217;ve just got to see if the information gets declassified. I&#8217;m sure people will find it very interesting.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-70\" target=\"_blank\" rel=\"noreferrer noopener\">[70]<\/a><\/p>\n<cite>\u53c2\u8003\u8bd1\u6587\uff1a6\u670811\u65e5\uff0c&#8221;\u60c5\u51b5\u8fd8\u4e0d\u9519&#8230;\u6211\u4eec\u8981\u6c42\u4ed6\uff08Keith Alexander\uff09\u89e3\u5bc6\u4e00\u4e9b\u4e1c\u897f\uff0c\u56e0\u4e3a\u8fd9\u5bf9\u4eba\u4eec\u548c\u7acb\u6cd5\u8005\u66f4\u597d\u5730\u4e86\u89e3\u60c5\u62a5\u8ba1\u5212\u4f1a\u6709\u5e2e\u52a9&#8230;\u6211\u53ea\u662f\u8981\u770b\u8fd9\u4e9b\u4fe1\u606f\u662f\u5426\u88ab\u89e3\u5bc6\u3002\u6211\u76f8\u4fe1\u4eba\u4eec\u4f1a\u89c9\u5f97\u5b83\u975e\u5e38\u6709\u8da3\u3002&#8221;<\/cite><\/blockquote>\n\n\n\n<p>Senator <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Rand_Paul\" target=\"_blank\" rel=\"noreferrer noopener\">Rand Paul<\/a> (R-KY)<br>\u53c2\u8003\u8bd1\u6587\uff1a\u53c2\u8bae\u5458\u5170\u5fb7\u00b7\u4fdd\u7f57 (R-KY)<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">June 9 &#8220;I&#8217;m going to be seeing if I can challenge this at the Supreme Court level. I&#8217;m going to be asking the internet providers and all of the phone companies: ask your customers to join me in a class-action lawsuit.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-klinck-wgrz-2013-6-9-67\" target=\"_blank\" rel=\"noreferrer noopener\">[67]<\/a><\/p>\n<cite>\u53c2\u8003\u8bd1\u6587\uff1a6\u67089\u65e5\uff0c&#8221;\u6211\u5c06\u5c1d\u8bd5\u5728\u6700\u9ad8\u6cd5\u9662\u5c42\u9762\u4e0a\u5bf9\u6b64\u63d0\u51fa\u8d28\u7591\u3002\u6211\u5c06\u8981\u6c42\u4e92\u8054\u7f51\u670d\u52a1\u63d0\u4f9b\u5546\u548c\u6240\u6709\u7535\u8bdd\u516c\u53f8\uff1a\u8ba9\u4f60\u4eec\u7684\u5ba2\u6237\u52a0\u5165\u6211\u63d0\u8d77\u7684\u96c6\u4f53\u8bc9\u8bbc\u3002&#8221;<\/cite><\/blockquote>\n\n\n\n<p>Senator <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Susan_Collins\" target=\"_blank\" rel=\"noreferrer noopener\">Susan Collins<\/a> (R-ME), member of Senate Intelligence Committee and past member of Homeland Security Committee<br>\u53c2\u8003\u8bd1\u6587\uff1a\u53c2\u8bae\u5458\u82cf\u73ca\u00b7\u67ef\u6797\u65af\uff08R-ME\uff09\uff0c\u53c2\u8bae\u9662\u60c5\u62a5\u59d4\u5458\u4f1a\u6210\u5458\u548c\u56fd\u571f\u5b89\u5168\u59d4\u5458\u4f1a\u524d\u6210\u5458<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">June 11 &#8220;I had, along with Joe Lieberman, a monthly threat briefing, but I did not have access to this highly compartmentalized information&#8221; and &#8220;How can you ask when you don&#8217;t know the program exists?&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-npr061113-71\" target=\"_blank\" rel=\"noreferrer noopener\">[71]<\/a><\/p>\n<cite>\u53c2\u8003\u8bd1\u6587\uff1a6\u670811\u65e5\uff0c&#8221;\u6211\u548c\u4e54\u00b7\u5229\u4f2f\u66fc\u4e00\u8d77\u8fdb\u884c\u4e86\u6bcf\u6708\u7684\u5a01\u80c1\u7b80\u62a5\uff0c\u4f46\u6211\u6ca1\u6709\u83b7\u5f97\u8fd9\u4e9b\u9ad8\u5ea6\u5206\u9694\u7684\u4fe1\u606f&#8221;\u548c&#8221;\u5f53\u4f60\u4e0d\u77e5\u9053\u8fd9\u4e2a\u8ba1\u5212\u5b58\u5728\u65f6\uff0c\u4f60\u600e\u4e48\u80fd\u63d0\u51fa\u95ee\u9898\u5462\uff1f&#8221;<\/cite><\/blockquote>\n\n\n\n<p>Representative <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Jim_Sensenbrenner\" target=\"_blank\" rel=\"noreferrer noopener\">Jim Sensenbrenner<\/a> (R-WI), principal sponsor of the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Patriot_Act\" target=\"_blank\" rel=\"noreferrer noopener\">Patriot Act<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u4f17\u8bae\u5458\u5409\u59c6\u00b7\u68ee\u68ee\u5e03\u4f26\u7eb3 (R-WI)\uff0c\u300a\u7231\u56fd\u8005\u6cd5\u6848\u300b\u7684\u4e3b\u8981\u53d1\u8d77\u4eba<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">June 9, &#8220;This is well beyond what the Patriot Act allows.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-guard_sense-72\" target=\"_blank\" rel=\"noreferrer noopener\">[72]<\/a> &#8220;President Obama&#8217;s claim that &#8216;this is the most transparent administration in history&#8217; has once again proven false. In fact, it appears that no administration has ever peered more closely or intimately into the lives of innocent Americans.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-guard_sense-72\" target=\"_blank\" rel=\"noreferrer noopener\">[72]<\/a><\/p>\n<cite>\u53c2\u8003\u8bd1\u6587\uff1a6 \u6708 9 \u65e5\uff0c\u201c\u8fd9\u8fdc\u8fdc\u8d85\u51fa\u4e86\u300a\u7231\u56fd\u8005\u6cd5\u6848\u300b\u6240\u5141\u8bb8\u7684\u8303\u56f4\u3002\u201d[72]\u201c\u5965\u5df4\u9a6c\u603b\u7edf\u5173\u4e8e\u2018\u8fd9\u662f\u5386\u53f2\u4e0a\u6700\u900f\u660e\u7684\u653f\u5e9c\u2019\u7684\u8bf4\u6cd5\u518d\u6b21\u88ab\u8bc1\u660e\u662f\u9519\u8bef\u7684\u3002\u4e8b\u5b9e\u4e0a\uff0c\u4f3c\u4e4e\u6ca1\u6709\u54ea\u5c4a\u653f\u5e9c\u66fe\u4e0e\u4e4b\u5339\u654c\u8fc7\u3002 \u66f4\u5bc6\u5207\u5730\u878d\u5165\u65e0\u8f9c\u7f8e\u56fd\u4eba\u7684\u751f\u6d3b\u3002\u201d[72]<\/cite><\/blockquote>\n\n\n\n<p>Representative <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Mike_Rogers_%28Michigan_politician%29\" target=\"_blank\" rel=\"noreferrer noopener\">Mike Rogers<\/a> (R-MI), a chairman of the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/United_States_House_Permanent_Select_Committee_on_Intelligence\" target=\"_blank\" rel=\"noreferrer noopener\">Permanent Select Committee on Intelligence<\/a>.<br>\u53c2\u8003\u8bd1\u6587\uff1aMike Rogers\u8bae\u5458\uff08\u5bc6\u6b47\u6839\u5dde\u5171\u548c\u515a\u4eba\uff09\u662f\u60c5\u62a5\u6c38\u4e45\u9009\u62e9\u59d4\u5458\u4f1a\u7684\u4e3b\u5e2d\u3002<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">June 9 &#8220;One of the things that we&#8217;re charged with is keeping America safe and keeping our civil liberties and privacy intact. I think we have done both in this particular case.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-chicagotribune1-68\" target=\"_blank\" rel=\"noreferrer noopener\">[68]<\/a><\/p>\n<cite>\u53c2\u8003\u8bd1\u6587\uff1a6\u67089\u65e5\uff0c&#8221;\u6211\u4eec\u6240\u8d1f\u8d23\u7684\u5176\u4e2d\u4e00\u9879\u4efb\u52a1\u662f\u786e\u4fdd\u7f8e\u56fd\u7684\u5b89\u5168\uff0c\u540c\u65f6\u4fdd\u62a4\u6211\u4eec\u7684\u516c\u6c11\u81ea\u7531\u548c\u9690\u79c1\u3002\u6211\u8ba4\u4e3a\u5728\u8fd9\u4e2a\u7279\u5b9a\u6848\u4f8b\u4e2d\uff0c\u6211\u4eec\u4e24\u8005\u517c\u987e\u5f97\u5f88\u597d\u3002&#8221;<\/cite><\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\"><br>June 9 &#8220;Within the last few years this program was used to stop a program, excuse me, to stop a terrorist attack in the United States, we know that. It&#8217;s, it&#8217;s, it&#8217;s important, it fills in a little seam that we have and it&#8217;s used to make sure that there is not an international nexus to any terrorism event that they may believe is ongoing in the United States. So in that regard it is a very valuable thing.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-mcclanahan-wiat-2013-6-9-73\" target=\"_blank\" rel=\"noreferrer noopener\">[73]<\/a><\/p>\n<cite>\u53c2\u8003\u8bd1\u6587\uff1a6\u67089\u65e5\uff0c&#8221;\u5728\u8fc7\u53bb\u51e0\u5e74\u4e2d\uff0c\u8fd9\u4e2a\u8ba1\u5212\u88ab\u7528\u4e8e\u963b\u6b62\u4e00\u8d77\u5728\u7f8e\u56fd\u53d1\u751f\u7684\u6050\u6016\u88ad\u51fb\uff0c\u6211\u4eec\u77e5\u9053\u8fd9\u4e00\u70b9\u3002\u5b83\u586b\u8865\u4e86\u6211\u4eec\u7684\u4e00\u4e2a\u5c0f\u7f3a\u53e3\uff0c\u7528\u4e8e\u786e\u4fdd\u4efb\u4f55\u53ef\u80fd\u6b63\u5728\u7f8e\u56fd\u53d1\u751f\u7684\u6050\u6016\u4e3b\u4e49\u4e8b\u4ef6\u4e0e\u56fd\u9645\u6050\u6016\u4e3b\u4e49\u6709\u5173\u3002\u56e0\u6b64\uff0c\u5728\u8fd9\u65b9\u9762\uff0c\u5b83\u662f\u975e\u5e38\u6709\u4ef7\u503c\u7684\u3002&#8221;<\/cite><\/blockquote>\n\n\n\n<p>Senator <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Mark_Udall\" target=\"_blank\" rel=\"noreferrer noopener\">Mark Udall<\/a> (D-CO)<br>\u53c2\u8003\u8bd1\u6587\uff1a\u53c2\u8bae\u5458\u9a6c\u514b\u00b7\u5c24\u5fb7\u5c14 (D-CO)<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">June 9 &#8220;I don&#8217;t think the American public knows the extent or knew the extent to which they were being surveilled and their data was being collected. &#8230; I think we ought to reopen the Patriot Act and put some limits on the amount of data that the National Security (Agency) is collecting. &#8230; It ought to remain sacred, and there&#8217;s got to be a balance here. That is what I&#8217;m aiming for. Let&#8217;s have the debate, let&#8217;s be transparent, let&#8217;s open this up.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-chicagotribune1-68\" target=\"_blank\" rel=\"noreferrer noopener\">[68]<\/a><\/p>\n<cite>\u53c2\u8003\u8bd1\u6587\uff1a6\u67089\u65e5\uff0c&#8221;\u6211\u4e0d\u8ba4\u4e3a\u7f8e\u56fd\u516c\u4f17\u77e5\u9053\u4ed6\u4eec\u88ab\u76d1\u89c6\u548c\u4ed6\u4eec\u7684\u6570\u636e\u88ab\u6536\u96c6\u7684\u7a0b\u5ea6\u3002&#8230;\u6211\u8ba4\u4e3a\u6211\u4eec\u5e94\u8be5\u91cd\u65b0\u5ba1\u89c6\u300a\u7231\u56fd\u8005\u6cd5\u6848\u300b\uff0c\u9650\u5236\u56fd\u5bb6\u5b89\u5168\u5c40\u6536\u96c6\u7684\u6570\u636e\u91cf\u3002&#8230;\u5b83\u5e94\u8be5\u4fdd\u6301\u795e\u5723\uff0c\u800c\u4e14\u9700\u8981\u5728\u8fd9\u65b9\u9762\u53d6\u5f97\u5e73\u8861\u3002\u8fd9\u5c31\u662f\u6211\u7684\u76ee\u6807\u3002\u8ba9\u6211\u4eec\u8fdb\u884c\u8fa9\u8bba\uff0c\u8ba9\u6211\u4eec\u900f\u660e\uff0c\u8ba9\u6211\u4eec\u5f00\u653e\u8fd9\u4e2a\u95ee\u9898\u3002&#8221;<\/cite><\/blockquote>\n\n\n\n<p>Representative <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Todd_Rokita\" target=\"_blank\" rel=\"noreferrer noopener\">Todd Rokita<\/a> (R-IN)<br>\u53c2\u8003\u8bd1\u6587\uff1a\u4f17\u8bae\u5458\u6258\u5fb7\u00b7\u7f57\u57fa\u5854 (R-IN)<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">June 10 &#8220;We have no idea when they [<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Foreign_Intelligence_Surveillance_Court\" target=\"_blank\" rel=\"noreferrer noopener\">Foreign Intelligence Surveillance Court<\/a>] meet, we have no idea what their judgments are.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-74\" target=\"_blank\" rel=\"noreferrer noopener\">[74]<\/a><\/p>\n<cite>\u53c2\u8003\u8bd1\u6587\uff1a6\u670810\u65e5\u201c\u6211\u4eec\u4e0d\u77e5\u9053\u4ed6\u4eec[\u5916\u56fd\u60c5\u62a5\u76d1\u89c6\u6cd5\u5ead]\u4ec0\u4e48\u65f6\u5019\u5f00\u4f1a\uff0c\u6211\u4eec\u4e0d\u77e5\u9053\u4ed6\u4eec\u7684\u5224\u51b3\u662f\u4ec0\u4e48\u3002\u201d[74]<\/cite><\/blockquote>\n\n\n\n<p>Representative <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Luis_Gutierrez\" target=\"_blank\" rel=\"noreferrer noopener\">Luis Gutierrez<\/a> (D-IL)<br>\u53c2\u8003\u8bd1\u6587\uff1a\u4f17\u8bae\u5458\u8def\u6613\u65af\u00b7\u53e4\u94c1\u96f7\u65af (D-IL)<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">June 9 &#8220;We will be receiving secret briefings and we will be asking, I know I&#8217;m going to be asking to get more information. I want to make sure that what they&#8217;re doing is harvesting information that is necessary to keep us safe and not simply going into everybody&#8217;s private telephone conversations and Facebook and communications. I mean one of the, you know, the terrorists win when you debilitate freedom of expression and privacy.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-mcclanahan-wiat-2013-6-9-73\" target=\"_blank\" rel=\"noreferrer noopener\">[73]<\/a><\/p>\n<cite>\u53c2\u8003\u8bd1\u6587\uff1a6\u67089\u65e5\uff0c&#8221;\u6211\u4eec\u5c06\u63a5\u53d7\u79d8\u5bc6\u7b80\u62a5\uff0c\u5e76\u4e14\u6211\u77e5\u9053\u6211\u5c06\u8981\u6c42\u83b7\u53d6\u66f4\u591a\u4fe1\u606f\u3002\u6211\u8981\u786e\u4fdd\u4ed6\u4eec\u6240\u505a\u7684\u662f\u6536\u96c6\u5fc5\u8981\u7684\u4fe1\u606f\u6765\u786e\u4fdd\u6211\u4eec\u7684\u5b89\u5168\uff0c\u800c\u4e0d\u4ec5\u4ec5\u662f\u8fdb\u5165\u6bcf\u4e2a\u4eba\u7684\u7535\u8bdd\u3001Facebook\u548c\u901a\u8baf\u3002\u6211\u7684\u610f\u601d\u662f\uff0c\u5f53\u4f60\u524a\u5f31\u8a00\u8bba\u81ea\u7531\u548c\u9690\u79c1\u6743\u65f6\uff0c\u6050\u6016\u5206\u5b50\u5c31\u83b7\u80dc\u4e86\u3002&#8221;<\/cite><\/blockquote>\n\n\n\n<p>Senator <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Ron_Wyden\" target=\"_blank\" rel=\"noreferrer noopener\">Ron Wyden<\/a> (D-OR)<br>\u53c2\u8003\u8bd1\u6587\uff1a\u53c2\u8bae\u5458\u7f57\u6069\u00b7\u6000\u767b (D-OR)<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">July 11 &#8220;I have a feeling that the administration is getting concerned about the bulk phone records collection, and that they are thinking about whether to move administratively to stop it. I think we are making a comeback&#8221;.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-nyt130711-75\" target=\"_blank\" rel=\"noreferrer noopener\">[75]<\/a><\/p>\n<cite>\u53c2\u8003\u8bd1\u6587\uff1a7\u670811\u65e5\uff0c&#8221;\u6211\u6709\u4e00\u79cd\u611f\u89c9\uff0c\u653f\u5e9c\u6b63\u5728\u5bf9\u5927\u89c4\u6a21\u7535\u8bdd\u8bb0\u5f55\u6536\u96c6\u8868\u793a\u62c5\u5fe7\uff0c\u5e76\u4e14\u4ed6\u4eec\u6b63\u5728\u8003\u8651\u662f\u5426\u5728\u884c\u653f\u4e0a\u505c\u6b62\u8fd9\u4e00\u505a\u6cd5\u3002\u6211\u8ba4\u4e3a\u6211\u4eec\u6b63\u5728\u4e1c\u5c71\u518d\u8d77\u3002&#8221;<\/cite><\/blockquote>\n\n\n\n<p>Following these statements some lawmakers from both parties warned national security officials during a hearing before the House Judiciary Committee that they must change their use of sweeping National Security Agency surveillance programs or face losing the provisions of the Foreign Intelligence Surveillance Act that have allowed for the agency&#8217;s mass collection of telephone metadata.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-McClatchy20130717-76\" target=\"_blank\" rel=\"noreferrer noopener\">[76]<\/a> &#8220;Section 215 expires at the end of 2015, and unless you realize you&#8217;ve got a problem, that is not going to be renewed,&#8221; Rep. Jim Sensenbrenner, R-Wis., author of the USA Patriot Act, threatened during the hearing.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-McClatchy20130717-76\" target=\"_blank\" rel=\"noreferrer noopener\">[76]<\/a> &#8220;It&#8217;s got to be changed, and you&#8217;ve got to change how you operate section 215. Otherwise, in two and a half years, you&#8217;re not going to have it anymore.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-McClatchy20130717-76\" target=\"_blank\" rel=\"noreferrer noopener\">[76]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u5728\u4f17\u8bae\u9662\u53f8\u6cd5\u59d4\u5458\u4f1a\u542c\u8bc1\u4f1a\u4e0a\uff0c\u6765\u81ea\u4e24\u515a\u7684\u4e00\u4e9b\u7acb\u6cd5\u8005\u8b66\u544a\u56fd\u5bb6\u5b89\u5168\u5b98\u5458\uff0c\u4ed6\u4eec\u5fc5\u987b\u6539\u53d8\u5bf9\u5168\u9762\u56fd\u5bb6\u5b89\u5168\u5c40\u76d1\u63a7\u8ba1\u5212\u7684\u4f7f\u7528\uff0c\u5426\u5219\u5c06\u5931\u53bb\u300a\u5916\u56fd\u60c5\u62a5\u76d1\u89c6\u6cd5\u300b\u7684\u89c4\u5b9a\uff0c\u8fd9\u4e9b\u89c4\u5b9a\u5141\u8bb8\u8be5\u673a\u6784\u8fdb\u884c\u5927\u89c4\u6a21\u7684\u7535\u8bdd\u5143\u6570\u636e\u6536\u96c6\u3002&#8221;\u7b2c215\u6761\u6b3e\u5c06\u4e8e2015\u5e74\u5e95\u5230\u671f\uff0c\u9664\u975e\u4f60\u4eec\u610f\u8bc6\u5230\u95ee\u9898\u5e76\u52a0\u4ee5\u89e3\u51b3\uff0c\u5426\u5219\u5b83\u5c06\u4e0d\u4f1a\u518d\u7eed\u7b7e\u3002\u201d\u7f8e\u56fd\u56fd\u4f1a\u8bae\u5458\u5409\u59c6\u00b7\u68ee\u68ee\u5e03\u4f26\u7eb3\uff08Jim Sensenbrenner\uff09\u5728\u542c\u8bc1\u4f1a\u4e0a\u5a01\u80c1\u9053\u3002\u201c\u5b83\u5fc5\u987b\u6539\u53d8\uff0c\u4f60\u4eec\u5fc5\u987b\u6539\u53d8\u5bf9\u7b2c215\u6761\u7684\u64cd\u4f5c\u65b9\u5f0f\u3002\u5426\u5219\uff0c\u4e24\u5e74\u534a\u540e\uff0c\u4f60\u4eec\u5c06\u4e0d\u518d\u62e5\u6709\u5b83\u3002\u201d<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3.1.3 \u53f8\u6cd5\u90e8\u95e8 | Judicial branch<\/strong><\/h4>\n\n\n\n<p>Leaks of classified documents pointed to the role of a special court in enabling the government&#8217;s secret surveillance programs, but members of the court maintained they were not collaborating with the executive branch.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-77\" target=\"_blank\" rel=\"noreferrer noopener\">[77]<\/a> <em>The New York Times<\/em>, however, reported in July 2013 that in &#8220;more than a dozen classified rulings, the nation&#8217;s surveillance court has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans while pursuing not only terrorism suspects, but also people possibly involved in nuclear proliferation, espionage and cyberattacks.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-NYT20130706-78\" target=\"_blank\" rel=\"noreferrer noopener\">[78]<\/a> After Members of the U.S. Congress pressed the Foreign Intelligence Surveillance Court to release declassified versions of its secret ruling, the court dismissed those requests arguing that the decisions can&#8217;t be declassified because they contain classified information.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-79\" target=\"_blank\" rel=\"noreferrer noopener\">[79]<\/a> <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Reggie_Walton\" target=\"_blank\" rel=\"noreferrer noopener\">Reggie Walton<\/a>, the current FISA presiding judge, said in a statement: &#8220;The perception that the court is a rubber stamp is absolutely false. There is a rigorous review process of applications submitted by the executive branch, spearheaded initially by five judicial branch lawyers who are national security experts, and then by the judges, to ensure that the court&#8217;s authorizations comport with what the applicable statutes authorize.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-80\" target=\"_blank\" rel=\"noreferrer noopener\">[80]<\/a> The accusation of being a &#8220;rubber stamp&#8221; was further rejected by Walton who wrote in a letter to Senator Patrick J. Leahy: &#8220;The annual statistics provided to Congress by the Attorney General &#8230;\u2014frequently cited to in press reports as a suggestion that the Court&#8217;s approval rate of application is over 99%\u2014reflect only the number of <em>final<\/em> applications submitted to and acted on by the Court. These statistics do not reflect the fact that many applications are altered to prior or final submission or even withheld from final submission entirely, often after an indication that a judge would not approve them.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-81\" target=\"_blank\" rel=\"noreferrer noopener\">[81]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u6cc4\u5bc6\u7684\u673a\u5bc6\u6587\u4ef6\u63ed\u793a\u4e86\u4e00\u4e2a\u7279\u522b\u6cd5\u9662\u5728\u4f7f\u653f\u5e9c\u7684\u79d8\u5bc6\u76d1\u89c6\u8ba1\u5212\u6210\u4e3a\u53ef\u80fd\u65b9\u9762\u7684\u89d2\u8272\uff0c\u4f46\u6cd5\u9662\u6210\u5458\u575a\u79f0\u4ed6\u4eec\u5e76\u672a\u4e0e\u884c\u653f\u673a\u6784\u5408\u4f5c\u3002\u7136\u800c\uff0c\u7ebd\u7ea6\u65f6\u62a5\u57282013\u5e747\u6708\u62a5\u9053\u79f0\uff0c\u5728&#8221;\u5341\u51e0\u4e2a\u673a\u5bc6\u88c1\u51b3\u4e2d\uff0c\u56fd\u5bb6\u76d1\u89c6\u6cd5\u9662\u5236\u5b9a\u4e86\u4e00\u5957\u79d8\u5bc6\u6cd5\u5f8b\uff0c\u8d4b\u4e88\u56fd\u5bb6\u5b89\u5168\u5c40\u96c6\u4e2d\u5927\u91cf\u7f8e\u56fd\u4eba\u6570\u636e\u7684\u6743\u529b\uff0c\u4e0d\u4ec5\u8ffd\u8e2a\u6050\u6016\u4e3b\u4e49\u5acc\u7591\u4eba\uff0c\u8fd8\u5305\u62ec\u53ef\u80fd\u4e0e\u6838\u6269\u6563\u3001\u95f4\u8c0d\u6d3b\u52a8\u548c\u7f51\u7edc\u653b\u51fb\u6709\u5173\u7684\u4eba\u3002&#8221;\u5728\u7f8e\u56fd\u56fd\u4f1a\u8bae\u5458\u6566\u4fc3\u5916\u56fd\u60c5\u62a5\u76d1\u89c6\u6cd5\u5ead\u53d1\u5e03\u89e3\u5bc6\u7248\u672c\u7684\u79d8\u5bc6\u88c1\u51b3\u540e\uff0c\u6cd5\u5ead\u9a73\u56de\u4e86\u8fd9\u4e9b\u8bf7\u6c42\uff0c\u7406\u7531\u662f\u8fd9\u4e9b\u51b3\u5b9a\u4e0d\u80fd\u89e3\u5bc6\uff0c\u56e0\u4e3a\u5b83\u4eec\u5305\u542b\u673a\u5bc6\u4fe1\u606f\u3002\u76ee\u524d\u7684FISA\u9996\u5e2d\u6cd5\u5b98\u96f7\u5409\u00b7\u6c83\u5c14\u987f\u5728\u4e00\u4efd\u58f0\u660e\u4e2d\u8868\u793a\uff1a&#8221;\u6cd5\u9662\u53ea\u662f\u4e00\u4e2a\u6a61\u76ae\u56fe\u7ae0\u7684\u89c2\u70b9\u662f\u7edd\u5bf9\u9519\u8bef\u7684\u3002\u884c\u653f\u673a\u6784\u63d0\u4ea4\u7684\u7533\u8bf7\u7ecf\u8fc7\u4e86\u4e00\u4e2a\u4e25\u683c\u7684\u5ba1\u67e5\u8fc7\u7a0b\uff0c\u6700\u521d\u7531\u4e94\u4f4d\u53f8\u6cd5\u90e8\u5f8b\u5e08\u9886\u5bfc\uff0c\u4ed6\u4eec\u662f\u56fd\u5bb6\u5b89\u5168\u4e13\u5bb6\uff0c\u7136\u540e\u7531\u6cd5\u5b98\u4eec\uff0c\u4ee5\u786e\u4fdd\u6cd5\u5ead\u7684\u6388\u6743\u7b26\u5408\u9002\u7528\u6cd5\u89c4\u7684\u89c4\u5b9a\u3002&#8221;\u5bf9\u4e8e&#8221;\u6a61\u76ae\u56fe\u7ae0&#8221;\u7684\u6307\u8d23\uff0c\u6c83\u5c14\u987f\u5728\u5199\u7ed9\u53c2\u8bae\u5458\u5e15\u7279\u91cc\u514b\u00b7J\u00b7\u83b1\u5e0c\u7684\u4fe1\u4e2d\u8fdb\u4e00\u6b65\u4e88\u4ee5\u5426\u8ba4\uff1a&#8221;\u53f8\u6cd5\u90e8\u957f\u63d0\u4f9b\u7ed9\u56fd\u4f1a\u7684\u5e74\u5ea6\u7edf\u8ba1\u6570\u636e&#8230;\u7ecf\u5e38\u5728\u65b0\u95fb\u62a5\u9053\u4e2d\u88ab\u5f15\u7528\uff0c\u6697\u793a\u6cd5\u5ead\u7684\u6279\u51c6\u7387\u8d85\u8fc799%\u3002\u7136\u800c\uff0c\u8fd9\u4e9b\u7edf\u8ba1\u6570\u636e\u4ec5\u53cd\u6620\u4e86\u63d0\u4ea4\u7ed9\u6cd5\u5ead\u5e76\u7ecf\u6cd5\u5ead\u5904\u7406\u7684\u6700\u7ec8\u7533\u8bf7\u7684\u6570\u91cf\u3002\u8fd9\u4e9b\u7edf\u8ba1\u6570\u636e\u5e76\u672a\u53cd\u6620\u8bb8\u591a\u7533\u8bf7\u5728\u6700\u7ec8\u63d0\u4ea4\u4e4b\u524d\u6216\u4e4b\u540e\u8fdb\u884c\u4fee\u6539\uff0c\u751a\u81f3\u5b8c\u5168\u88ab\u4fdd\u7559\uff0c\u5f80\u5f80\u662f\u5728\u6cd5\u5b98\u8868\u660e\u4e0d\u4f1a\u6279\u51c6\u5b83\u4eec\u4e4b\u540e\u3002&#8221;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3.1.4 \u7f8e\u519b | The U.S. military<\/strong><\/h4>\n\n\n\n<p>The U.S. military has acknowledged blocking access to parts of <em>The Guardian<\/em> website for thousands of defense personnel across the country,<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-guardarmy-82\" target=\"_blank\" rel=\"noreferrer noopener\">[82]<\/a> and blocking the entire <em>Guardian<\/em> website for personnel stationed throughout Afghanistan, the Middle East, and South Asia.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-guardmil-83\" target=\"_blank\" rel=\"noreferrer noopener\">[83]<\/a> A spokesman said the military was filtering out reports and content relating to government surveillance programs to preserve &#8220;network hygiene&#8221; and prevent any classified material from appearing on unclassified parts of its computer systems.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-guardarmy-82\" target=\"_blank\" rel=\"noreferrer noopener\">[82]<\/a> Access to <em>the Washington Post<\/em>, which also published information on classified NSA surveillance programs disclosed by Edward Snowden, had not been blocked at the time the blocking of access to <em>The Guardian<\/em> was reported.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-guardmil-83\" target=\"_blank\" rel=\"noreferrer noopener\">[83]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u7f8e\u56fd\u519b\u65b9\u627f\u8ba4\u5c01\u9501\u4e86\u300a\u536b\u62a5\u300b\u7f51\u7ad9\u7684\u90e8\u5206\u5185\u5bb9\uff0c\u5f71\u54cd\u4e86\u5168\u56fd\u6570\u5343\u540d\u56fd\u9632\u4eba\u5458\u7684\u8bbf\u95ee[82]\uff0c\u5e76\u5c01\u9501\u4e86\u300a\u536b\u62a5\u300b\u7f51\u7ad9\u7684\u6574\u4e2a\u5185\u5bb9\uff0c\u5f71\u54cd\u4e86\u9a7b\u963f\u5bcc\u6c57\u3001\u4e2d\u4e1c\u548c\u5357\u4e9a\u5730\u533a\u7684\u519b\u4e8b\u4eba\u5458[83]\u3002\u4e00\u4f4d\u53d1\u8a00\u4eba\u8868\u793a\uff0c\u519b\u65b9\u6b63\u5728\u8fc7\u6ee4\u4e0e\u653f\u5e9c\u76d1\u89c6\u8ba1\u5212\u76f8\u5173\u7684\u62a5\u9053\u548c\u5185\u5bb9\uff0c\u4ee5\u4fdd\u62a4\u7f51\u7edc\u5b89\u5168\uff0c\u5e76\u9632\u6b62\u673a\u5bc6\u6750\u6599\u51fa\u73b0\u5728\u975e\u673a\u5bc6\u90e8\u5206\u7684\u8ba1\u7b97\u673a\u7cfb\u7edf\u4e0a[82]\u3002\u636e\u62a5\u9053\uff0c\u5728\u5c01\u9501\u300a\u536b\u62a5\u300b\u8bbf\u95ee\u4e4b\u65f6\uff0c\u300a\u534e\u76db\u987f\u90ae\u62a5\u300b\u53d1\u5e03\u7684\u6709\u5173\u7231\u5fb7\u534e\u00b7\u65af\u8bfa\u767b\u900f\u9732\u7684NSA\u76d1\u89c6\u8ba1\u5212\u7684\u673a\u5bc6\u4fe1\u606f\u5c1a\u672a\u88ab\u5c01\u9501[83]\u3002<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h_660481013_3\">3.2 \u5176\u4ed6\u56fd\u5bb6\u7684\u56de\u5e94\u548c\u53c2\u4e0e | Responses and involvement of other countries<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3.2.1 \u5965\u5730\u5229 | Austria<\/strong><\/h4>\n\n\n\n<p>The former head of the Austrian <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Federal_Office_for_the_Protection_of_the_Constitution_and_Counterterrorism\" target=\"_blank\" rel=\"noreferrer noopener\">Federal Office for the Protection of the Constitution and Counterterrorism<\/a>, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Gert-Ren%25C3%25A9_Polli\" target=\"_blank\" rel=\"noreferrer noopener\">Gert-Ren\u00e9 Polli<\/a>, stated he knew the PRISM program under a different name and stated that surveillance activities had occurred in Austria as well. Polli had publicly stated in 2009 that he had received requests from US intelligence agencies to do things that would be in violation of Austrian law, which Polli refused to allow.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-orf-at-84\" target=\"_blank\" rel=\"noreferrer noopener\">[84]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-news-at-85\" target=\"_blank\" rel=\"noreferrer noopener\">[85]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u5965\u5730\u5229\u8054\u90a6\u5baa\u6cd5\u548c\u53cd\u6050\u4fdd\u62a4\u5c40\u7684\u524d\u8d1f\u8d23\u4eba\u683c\u7279-\u96f7\u5185\u00b7\u6ce2\u5229\u8868\u793a\uff0c\u4ed6\u77e5\u9053PRISM\u8ba1\u5212\u7684\u53e6\u4e00\u4e2a\u540d\u79f0\uff0c\u5e76\u8868\u793a\u5965\u5730\u5229\u4e5f\u53d1\u751f\u4e86\u76d1\u63a7\u6d3b\u52a8\u3002\u6ce2\u5229\u66fe\u516c\u5f00\u8868\u793a\uff0c2009\u5e74\u4ed6\u66fe\u6536\u5230\u7f8e\u56fd\u60c5\u62a5\u673a\u6784\u7684\u8bf7\u6c42\uff0c\u8981\u6c42\u4ed6\u505a\u8fdd\u53cd\u5965\u5730\u5229\u6cd5\u5f8b\u7684\u4e8b\u60c5\uff0c\u4f46\u6ce2\u5229\u62d2\u7edd\u4e86\u8fd9\u4e9b\u8bf7\u6c42\u3002[84][85]<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3.2.2 \u6fb3\u5927\u5229\u4e9a | Australia<\/strong><\/h4>\n\n\n\n<p>The Australian government has said it will investigate the impact of the PRISM program and the use of the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Pine_Gap\" target=\"_blank\" rel=\"noreferrer noopener\">Pine Gap<\/a> surveillance facility on the privacy of Australian citizens.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-86\" target=\"_blank\" rel=\"noreferrer noopener\">[86]<\/a> Australia&#8217;s former foreign minister <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Bob_Carr\" target=\"_blank\" rel=\"noreferrer noopener\">Bob Carr<\/a> said that Australians should not be concerned about PRISM but that cybersecurity is high on the government&#8217;s list of concerns.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-87\" target=\"_blank\" rel=\"noreferrer noopener\">[87]<\/a> The Australian Foreign Minister Julie Bishop stated that the acts of <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Edward_Snowden\" target=\"_blank\" rel=\"noreferrer noopener\">Edward Snowden<\/a> were treachery and offered a staunch defence of her nation&#8217;s intelligence co-operation with the United States.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-88\" target=\"_blank\" rel=\"noreferrer noopener\">[88]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u6fb3\u5927\u5229\u4e9a\u653f\u5e9c\u8868\u793a\u5c06\u8c03\u67e5PRISM\u8ba1\u5212\u548cPine Gap\u76d1\u89c6\u8bbe\u65bd\u5bf9\u6fb3\u5927\u5229\u4e9a\u516c\u6c11\u9690\u79c1\u7684\u5f71\u54cd[86]\u3002\u6fb3\u5927\u5229\u4e9a\u524d\u5916\u4ea4\u90e8\u957f\u9c8d\u52c3\u00b7\u5361\u5c14\u8868\u793a\uff0c\u6fb3\u5927\u5229\u4e9a\u4eba\u4e0d\u5e94\u8be5\u5bf9PRISM\u611f\u5230\u62c5\u5fe7\uff0c\u4f46\u7f51\u7edc\u5b89\u5168\u662f\u653f\u5e9c\u5173\u6ce8\u7684\u91cd\u70b9\u95ee\u9898[87]\u3002\u6fb3\u5927\u5229\u4e9a\u5916\u4ea4\u90e8\u957f\u6731\u8389\u00b7\u6bd5\u6653\u666e\u8868\u793a\uff0c\u7231\u5fb7\u534e\u00b7\u65af\u8bfa\u767b\u7684\u884c\u4e3a\u662f\u80cc\u53db\uff0c\u5e76\u575a\u51b3\u634d\u536b\u5979\u7684\u56fd\u5bb6\u4e0e\u7f8e\u56fd\u7684\u60c5\u62a5\u5408\u4f5c[88]\u3002<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3.2.3 \u5df4\u897f | Brazil<\/strong><\/h4>\n\n\n\n<p><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Brazil\" target=\"_blank\" rel=\"noreferrer noopener\">Brazil<\/a>&#8216;s president at the time, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Dilma_Rousseff\" target=\"_blank\" rel=\"noreferrer noopener\">Dilma Rousseff<\/a>, responded to Snowden&#8217;s reports that the NSA spied on her phone calls and emails by cancelling a planned October 2013 <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/State_visit\" target=\"_blank\" rel=\"noreferrer noopener\">state visit<\/a> to the United States, demanding an official apology, which by October 20, 2013, hadn&#8217;t come.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-89\" target=\"_blank\" rel=\"noreferrer noopener\">[89]<\/a> Also, Rousseff classified the spying as unacceptable between more harsh words in a speech before the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/UN_General_Assembly\" target=\"_blank\" rel=\"noreferrer noopener\">UN General Assembly<\/a> on September 24, 2013.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-90\" target=\"_blank\" rel=\"noreferrer noopener\">[90]<\/a> As a result, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Boeing\" target=\"_blank\" rel=\"noreferrer noopener\">Boeing<\/a> lost out on a US$4.5 billion contract for fighter jets to Sweden&#8217;s <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Saab_Group\" target=\"_blank\" rel=\"noreferrer noopener\">Saab Group<\/a>.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-91\" target=\"_blank\" rel=\"noreferrer noopener\">[91]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u5df4\u897f\u5f53\u65f6\u7684\u603b\u7edf\u8fea\u5c14\u739b\u00b7\u7f57\u585e\u592b\u56de\u5e94\u65af\u8bfa\u767b\u7684\u62a5\u9053\u79f0\uff0c\u7f8e\u56fd\u56fd\u5bb6\u5b89\u5168\u5c40\u76d1\u89c6\u4e86\u5979\u7684\u7535\u8bdd\u548c\u7535\u5b50\u90ae\u4ef6\uff0c\u53d6\u6d88\u4e86\u539f\u5b9a\u4e8e2013\u5e7410\u6708\u7684\u5bf9\u7f8e\u56fd\u7684\u56fd\u4e8b\u8bbf\u95ee\uff0c\u5e76\u8981\u6c42\u7f8e\u56fd\u6b63\u5f0f\u9053\u6b49\uff0c\u4f46\u52302013\u5e7410\u670820\u65e5\uff0c\u4ecd\u672a\u6536\u5230\u9053\u6b49[89]\u3002\u6b64\u5916\uff0c\u7f57\u585e\u592b\u57282013\u5e749\u670824\u65e5\u8054\u5408\u56fd\u5927\u4f1a\u4e0a\u7684\u8bb2\u8bdd\u4e2d\uff0c\u5c06\u6b64\u6b21\u76d1\u89c6\u884c\u4e3a\u5b9a\u6027\u4e3a\u4e0d\u53ef\u63a5\u53d7\u7684\uff0c\u5e76\u4f7f\u7528\u66f4\u52a0\u4e25\u5389\u7684\u63aa\u8f9e\u8868\u8fbe\u4e86\u4e0d\u6ee1[90]\u3002\u7531\u4e8e\u6b64\u4e8b\uff0c\u6ce2\u97f3\u516c\u53f8\u5931\u53bb\u4e86\u4e00\u4efd\u4ef7\u503c45\u4ebf\u7f8e\u5143\u7684\u6218\u6597\u673a\u5408\u540c\uff0c\u8be5\u5408\u540c\u88ab\u4ea4\u7ed9\u4e86\u745e\u5178\u7684\u8428\u535a\u96c6\u56e2[91]\u3002<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3.2.3 \u52a0\u62ff\u5927 | Canada<\/strong><\/h4>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/pic3.zhimg.com\/80\/v2-1124744d6d0d1ae08d80657c07fe3352_720w.webp\" alt=\"\"\/><figcaption class=\"wp-element-caption\">CSE headquarters in Ottawa\uff08CSE \u6e25\u592a\u534e\u603b\u90e8\uff09<br>\u56fe\u7247\u4f5c\u8005\uff1aEshko Timiou\uff08https:\/\/commons.wikimedia.org\/wiki\/User:Eshko_Timiou\uff09<\/figcaption><\/figure>\n<\/div>\n\n\n<p><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Canada\" target=\"_blank\" rel=\"noreferrer noopener\">Canada<\/a>&#8216;s national cryptologic agency, the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Communications_Security_Establishment\" target=\"_blank\" rel=\"noreferrer noopener\">Communications Security Establishment<\/a> (CSE), said that commenting on PRISM &#8220;would undermine CSE&#8217;s ability to carry out its mandate.&#8221; <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Privacy_Commissioner_of_Canada\" target=\"_blank\" rel=\"noreferrer noopener\">Privacy Commissioner<\/a> <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Jennifer_Stoddart\" target=\"_blank\" rel=\"noreferrer noopener\">Jennifer Stoddart<\/a> lamented Canada&#8217;s standards when it comes to protecting personal online privacy stating &#8220;We have fallen too far behind&#8221; in her report. &#8220;While other nations&#8217; data protection authorities have the legal power to make binding orders, levy hefty fines and take meaningful action in the event of serious data breaches, we are restricted to a &#8216;soft&#8217; approach: persuasion, encouragement and, at the most, the potential to publish the names of transgressors in the public interest.&#8221; And, &#8220;when push comes to shove,&#8221; Stoddart wrote, &#8220;short of a costly and time-consuming court battle, we have no power to enforce our recommendations.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-92\" target=\"_blank\" rel=\"noreferrer noopener\">[92]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-The_Citizen_Lab-93\" target=\"_blank\" rel=\"noreferrer noopener\">[93]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u52a0\u62ff\u5927\u7684\u56fd\u5bb6\u5bc6\u7801\u673a\u6784\u2014\u2014\u901a\u4fe1\u5b89\u5168\u5c40\uff08CSE\uff09\u8868\u793a\uff0c\u5bf9\u4e8ePRISM\u8ba1\u5212\u7684\u8bc4\u8bba\u201c\u5c06\u524a\u5f31CSE\u5c65\u884c\u5176\u804c\u8d23\u7684\u80fd\u529b\u201d\u3002\u52a0\u62ff\u5927\u9690\u79c1\u4e13\u5458\u8a79\u59ae\u5f17\u00b7\u65af\u6258\u8fbe\u7279\u5bf9\u4e8e\u52a0\u62ff\u5927\u5728\u4fdd\u62a4\u4e2a\u4eba\u5728\u7ebf\u9690\u79c1\u65b9\u9762\u7684\u6807\u51c6\u8868\u793a\u9057\u61be\uff0c\u5e76\u5728\u5979\u7684\u62a5\u544a\u4e2d\u79f0\u201c\u6211\u4eec\u5df2\u7ecf\u843d\u540e\u592a\u591a\u4e86\u201d\u3002\u5979\u5199\u9053\uff1a\u201c\u867d\u7136\u5176\u4ed6\u56fd\u5bb6\u7684\u6570\u636e\u4fdd\u62a4\u673a\u6784\u5728\u4e25\u91cd\u6570\u636e\u6cc4\u9732\u4e8b\u4ef6\u53d1\u751f\u65f6\u5177\u6709\u6cd5\u5f8b\u6743\u529b\u4f5c\u51fa\u7ea6\u675f\u6027\u547d\u4ee4\u3001\u5904\u4ee5\u5de8\u989d\u7f5a\u6b3e\u5e76\u91c7\u53d6\u6709\u610f\u4e49\u7684\u884c\u52a8\uff0c\u4f46\u6211\u4eec\u88ab\u9650\u5236\u5728\u2018\u8f6f\u6027\u2019\u65b9\u6cd5\u4e0a\uff1a\u529d\u8bf4\u3001\u9f13\u52b1\uff0c\u6700\u591a\u53ef\u80fd\u4f1a\u4e3a\u4e86\u516c\u5171\u5229\u76ca\u516c\u5f00\u8fdd\u89c4\u8005\u7684\u59d3\u540d\u3002\u201d\u5e76\u4e14\uff0c\u201c\u5f53\u5f62\u52bf\u7d27\u8feb\u65f6\u201d\uff0c\u65af\u6258\u8fbe\u7279\u5199\u9053\uff0c\u201c\u9664\u4e86\u6602\u8d35\u4e14\u8017\u65f6\u7684\u6cd5\u5ead\u6218\u6597\u4e4b\u5916\uff0c\u6211\u4eec\u6ca1\u6709\u6743\u529b\u6267\u884c\u6211\u4eec\u7684\u5efa\u8bae\u3002\u201d[92][93]<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3.2.4 \u6b27\u76df | European Union<\/strong><\/h4>\n\n\n\n<p>On 20 October 2013 a committee at the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/European_Parliament\" target=\"_blank\" rel=\"noreferrer noopener\">European Parliament<\/a> backed a measure that, if it is enacted, would require American companies to seek clearance from European officials before complying with United States warrants seeking private data. The legislation has been under consideration for two years. The vote is part of efforts in Europe to shield citizens from online surveillance in the wake of <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/2013_mass_surveillance_disclosures\" target=\"_blank\" rel=\"noreferrer noopener\">revelations about a far-reaching spying program<\/a> by the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/U.S._National_Security_Agency\" target=\"_blank\" rel=\"noreferrer noopener\">U.S. National Security Agency<\/a>.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-94\" target=\"_blank\" rel=\"noreferrer noopener\">[94]<\/a> Germany and France have also had ongoing mutual talks about how they can keep European email traffic from going across American servers.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-95\" target=\"_blank\" rel=\"noreferrer noopener\">[95]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a2013\u5e7410\u670820\u65e5\uff0c\u6b27\u6d32\u8bae\u4f1a\u7684\u4e00\u4e2a\u59d4\u5458\u4f1a\u652f\u6301\u4e00\u9879\u63aa\u65bd\uff0c\u5982\u679c\u5b9e\u65bd\uff0c\u5c06\u8981\u6c42\u7f8e\u56fd\u516c\u53f8\u5728\u9075\u5faa\u7f8e\u56fd\u7684\u641c\u67e5\u4ee4\u83b7\u53d6\u79c1\u4eba\u6570\u636e\u4e4b\u524d\uff0c\u9700\u5f81\u5f97\u6b27\u6d32\u5b98\u5458\u7684\u6279\u51c6\u3002\u8fd9\u9879\u7acb\u6cd5\u5df2\u7ecf\u8003\u8651\u4e86\u4e24\u5e74\u3002\u8fd9\u6b21\u6295\u7968\u662f\u6b27\u6d32\u4e3a\u4e86\u5728\u7f8e\u56fd\u56fd\u5bb6\u5b89\u5168\u5c40\u5e7f\u6cdb\u76d1\u89c6\u8ba1\u5212\u66dd\u5149\u540e\u4fdd\u62a4\u516c\u6c11\u514d\u53d7\u5728\u7ebf\u76d1\u89c6\u7684\u52aa\u529b\u7684\u4e00\u90e8\u5206[94]\u3002\u5fb7\u56fd\u548c\u6cd5\u56fd\u4e5f\u4e00\u76f4\u5728\u5c31\u5982\u4f55\u9632\u6b62\u6b27\u6d32\u7684\u7535\u5b50\u90ae\u4ef6\u6d41\u91cf\u901a\u8fc7\u7f8e\u56fd\u7684\u670d\u52a1\u5668\u8fdb\u884c\u4e92\u76f8\u8ba8\u8bba[95]\u3002<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3.2.5 \u6cd5\u56fd | France<\/strong><\/h4>\n\n\n\n<p>On October 21, 2013, the French Foreign Minister, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Laurent_Fabius\" target=\"_blank\" rel=\"noreferrer noopener\">Laurent Fabius<\/a>, summoned the U.S. Ambassador, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Charles_Rivkin\" target=\"_blank\" rel=\"noreferrer noopener\">Charles Rivkin<\/a>, to the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Ministry_of_Foreign_and_European_Affairs_%28France%29\" target=\"_blank\" rel=\"noreferrer noopener\">Quai d&#8217;Orsay<\/a> in <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Paris\" target=\"_blank\" rel=\"noreferrer noopener\">Paris<\/a> to protest large-scale spying on French citizens by the U.S. National Security Agency (NSA). Paris prosecutors had opened preliminary inquiries into the NSA program in July, but Fabius said, &#8220;&#8230; obviously we need to go further&#8221; and &#8220;we must quickly assure that these practices aren&#8217;t repeated.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-96\" target=\"_blank\" rel=\"noreferrer noopener\">[96]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a2013\u5e7410\u670821\u65e5\uff0c\u6cd5\u56fd\u5916\u4ea4\u90e8\u957f\u52b3\u4f26\u00b7\u6cd5\u6bd4\u5c24\u65af\u53ec\u89c1\u4e86\u7f8e\u56fd\u5927\u4f7f\u67e5\u5c14\u65af\u00b7\u91cc\u592b\u91d1\u524d\u5f80\u5df4\u9ece\u7684\u6cd5\u56fd\u5916\u4ea4\u90e8\uff0c\u6297\u8bae\u7f8e\u56fd\u56fd\u5bb6\u5b89\u5168\u5c40\u5bf9\u6cd5\u56fd\u516c\u6c11\u8fdb\u884c\u5927\u89c4\u6a21\u76d1\u89c6\u7684\u884c\u4e3a\u3002\u5df4\u9ece\u68c0\u5bdf\u5b98\u57287\u6708\u4efd\u5df2\u7ecf\u5bf9NSA\u7684\u76d1\u89c6\u8ba1\u5212\u5c55\u5f00\u4e86\u521d\u6b65\u8c03\u67e5\uff0c\u4f46\u6cd5\u6bd4\u5c24\u65af\u8868\u793a\uff0c\u201c\u663e\u7136\u6211\u4eec\u9700\u8981\u7ee7\u7eed\u6df1\u5165\u8c03\u67e5\u201d\uff0c\u201c\u6211\u4eec\u5fc5\u987b\u8fc5\u901f\u786e\u4fdd\u8fd9\u4e9b\u505a\u6cd5\u4e0d\u4f1a\u518d\u6b21\u53d1\u751f\u3002\u201d[96]<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3.2.6 \u5fb7\u56fd | Germany<\/strong><\/h4>\n\n\n\n<p>Germany did not receive any raw PRISM data, according to a Reuters report.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-97\" target=\"_blank\" rel=\"noreferrer noopener\">[97]<\/a> <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Chancellor_of_Germany\" target=\"_blank\" rel=\"noreferrer noopener\">German Chancellor<\/a> <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Angela_Merkel\" target=\"_blank\" rel=\"noreferrer noopener\">Angela Merkel<\/a> said that &#8220;the internet is new to all of us&#8221; to explain the nature of the program; Matthew Schofield of <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/McClatchy_Washington_Bureau\" target=\"_blank\" rel=\"noreferrer noopener\">McClatchy Washington Bureau<\/a> said, &#8220;She was roundly mocked for that statement.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Schofieldmemories-98\" target=\"_blank\" rel=\"noreferrer noopener\">[98]<\/a> Gert-Ren\u00e9 Polli, a former Austrian counter-terrorism official, said in 2013 that it is &#8220;absurd and unnatural&#8221; for the German authorities to pretend not to have known anything.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-orf-at-84\" target=\"_blank\" rel=\"noreferrer noopener\">[84]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-news-at-85\" target=\"_blank\" rel=\"noreferrer noopener\">[85]<\/a> The German Army was using PRISM to support its operations in Afghanistan as early as 2011.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-99\" target=\"_blank\" rel=\"noreferrer noopener\">[99]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u6839\u636e\u8def\u900f\u793e\u7684\u62a5\u9053\uff0c\u5fb7\u56fd\u6ca1\u6709\u6536\u5230\u4efb\u4f55\u539f\u59cb\u7684PRISM\u6570\u636e\u3002\u5fb7\u56fd\u603b\u7406\u5b89\u683c\u62c9\u00b7\u9ed8\u514b\u5c14\u8868\u793a\uff0c\u201c\u4e92\u8054\u7f51\u5bf9\u6211\u4eec\u6240\u6709\u4eba\u6765\u8bf4\u90fd\u662f\u65b0\u7684\u201d\uff0c\u4ee5\u89e3\u91ca\u8be5\u8ba1\u5212\u7684\u6027\u8d28\uff1b\u9ea6\u514b\u62c9\u5947\u534e\u76db\u987f\u5206\u5c40\u7684\u9a6c\u4fee\u00b7\u65af\u79d1\u83f2\u5c14\u5fb7\u8868\u793a\uff0c\u201c\u5979\u7684\u8fd9\u756a\u8bdd\u53d7\u5230\u4e86\u5e7f\u6cdb\u5632\u7b11\u3002\u201d[97][98] \u524d\u5965\u5730\u5229\u53cd\u6050\u5b98\u5458\u683c\u7279-\u96f7\u5185\u00b7\u6ce2\u5229\u57282013\u5e74\u8868\u793a\uff0c\u5fb7\u56fd\u5f53\u5c40\u5047\u88c5\u5bf9\u6b64\u4e00\u65e0\u6240\u77e5\u662f\u201c\u8352\u8c2c\u548c\u4e0d\u81ea\u7136\u7684\u201d[84][85]\u3002\u81ea2011\u5e74\u4ee5\u6765\uff0c\u5fb7\u56fd\u519b\u961f\u4e00\u76f4\u5728\u4f7f\u7528PRISM\u6765\u652f\u6301\u5176\u5728\u963f\u5bcc\u6c57\u7684\u884c\u52a8\u3002[99]<\/p>\n\n\n\n<p>In October 2013, it was reported that the NSA monitored Merkel&#8217;s cell phone.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-100\" target=\"_blank\" rel=\"noreferrer noopener\">[100]<\/a> The United States denied the report, but following the allegations, Merkel called President Obama and told him that spying on friends was &#8220;never acceptable, no matter in what situation.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-101\" target=\"_blank\" rel=\"noreferrer noopener\">[101]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a2013\u5e7410\u6708\uff0c\u7f8e\u56fd\u56fd\u5bb6\u5b89\u5168\u5c40\u76d1\u89c6\u4e86\u9ed8\u514b\u5c14\u7684\u624b\u673a\u3002\u7f8e\u56fd\u5426\u8ba4\u4e86\u8fd9\u4e00\u62a5\u9053\uff0c\u4f46\u5728\u8fd9\u4e9b\u6307\u63a7\u4e4b\u540e\uff0c\u9ed8\u514b\u5c14\u81f4\u7535\u5965\u5df4\u9a6c\u603b\u7edf\uff0c\u5e76\u544a\u8bc9\u4ed6\uff0c\u5bf9\u670b\u53cb\u8fdb\u884c\u76d1\u89c6\u201c\u6c38\u8fdc\u662f\u4e0d\u53ef\u63a5\u53d7\u7684\uff0c\u65e0\u8bba\u5728\u4ec0\u4e48\u60c5\u51b5\u4e0b\u3002\u201d[100][101]<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3.2.7 \u4ee5\u8272\u5217 | Israel<\/strong><\/h4>\n\n\n\n<p>Israeli newspaper <em><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Calcalist\" target=\"_blank\" rel=\"noreferrer noopener\">Calcalist<\/a><\/em> discussed<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Sadan-102\" target=\"_blank\" rel=\"noreferrer noopener\">[102]<\/a> the <em><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Business_Insider\" target=\"_blank\" rel=\"noreferrer noopener\">Business Insider<\/a><\/em> article<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Kelley-103\" target=\"_blank\" rel=\"noreferrer noopener\">[103]<\/a> about the possible involvement of technologies from two secretive Israeli companies in the PRISM program\u2014<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Verint_Systems\" target=\"_blank\" rel=\"noreferrer noopener\">Verint Systems<\/a> and <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Narus_%28company%29\" target=\"_blank\" rel=\"noreferrer noopener\">Narus<\/a>.<br>\u53c2\u8003\u8bd1\u6587\uff1a\u4ee5\u8272\u5217\u62a5\u7eb8Calcalist\u8ba8\u8bba\u4e86Business Insider\u5173\u4e8e\u4e24\u5bb6\u79d8\u5bc6\u4ee5\u8272\u5217\u516c\u53f8Verint Systems\u548cNarus\u53ef\u80fd\u53c2\u4e0ePRISM\u8ba1\u5212\u7684\u6280\u672f\u7684\u6587\u7ae0\u3002[102][103]<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3.2.8 \u58a8\u897f\u54e5 | Mexico<\/strong><\/h4>\n\n\n\n<p>After finding out about the PRISM program, the Mexican Government has started constructing its own spying program to spy on its own citizens. According to Jenaro Villamil, a writer from <em><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Proceso_%28magazine%29\" target=\"_blank\" rel=\"noreferrer noopener\">Proceso<\/a><\/em>, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/CISEN\" target=\"_blank\" rel=\"noreferrer noopener\">CISEN<\/a>, Mexico&#8217;s intelligence agency has started to work with <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/IBM\" target=\"_blank\" rel=\"noreferrer noopener\">IBM<\/a> and <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Hewlett-Packard\" target=\"_blank\" rel=\"noreferrer noopener\">Hewlett Packard<\/a> to develop its own data gathering software. &#8220;Facebook, Twitter, Emails and other social network sites are going to be priority.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-104\" target=\"_blank\" rel=\"noreferrer noopener\">[104]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u5728\u5f97\u77e5PRISM\u8ba1\u5212\u540e\uff0c\u58a8\u897f\u54e5\u653f\u5e9c\u5df2\u5f00\u59cb\u6784\u5efa\u81ea\u5df1\u7684\u95f4\u8c0d\u8ba1\u5212\uff0c\u4ee5\u76d1\u89c6\u672c\u56fd\u516c\u6c11\u3002\u636eProceso\u7684\u4f5c\u5bb6Jenaro Villamil\u79f0\uff0c\u58a8\u897f\u54e5\u7684\u60c5\u62a5\u673a\u6784CISEN\u5df2\u5f00\u59cb\u4e0eIBM\u548c\u60e0\u666e\u5408\u4f5c\u5f00\u53d1\u81ea\u5df1\u7684\u6570\u636e\u6536\u96c6\u8f6f\u4ef6\u3002\u201cFacebook\u3001Twitter\u3001\u7535\u5b50\u90ae\u4ef6\u548c\u5176\u4ed6\u793e\u4ea4\u7f51\u7edc\u7f51\u7ad9\u5c06\u6210\u4e3a\u4f18\u5148\u8003\u8651\u7684\u5bf9\u8c61\u3002\u201d[104]<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3.2.9 \u65b0\u897f\u5170 | New Zealand<\/strong><\/h4>\n\n\n\n<p>In New Zealand, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/University_of_Otago\" target=\"_blank\" rel=\"noreferrer noopener\">University of Otago<\/a> information science Associate Professor Hank Wolfe said that &#8220;under what was unofficially known as the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Five_Eyes\" target=\"_blank\" rel=\"noreferrer noopener\">Five Eyes<\/a> Alliance, New Zealand and other governments, including the United States, Australia, Canada, and Britain, dealt with internal spying by saying they didn&#8217;t do it. But they have all the partners doing it for them and then they share all the information.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-105\" target=\"_blank\" rel=\"noreferrer noopener\">[105]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u5728\u65b0\u897f\u5170\uff0c\u5965\u5854\u54e5\u5927\u5b66\u4fe1\u606f\u79d1\u5b66\u526f\u6559\u6388\u6c49\u514b\u00b7\u6c83\u5c14\u592b\u8868\u793a\uff0c\u201c\u6839\u636e\u975e\u6b63\u5f0f\u79f0\u4e4b\u4e3a\u2018\u4e94\u773c\u8054\u76df\u2019\u7684\u534f\u8bae\uff0c\u65b0\u897f\u5170\u548c\u5176\u4ed6\u56fd\u5bb6\uff0c\u5305\u62ec\u7f8e\u56fd\u3001\u6fb3\u5927\u5229\u4e9a\u3001\u52a0\u62ff\u5927\u548c\u82f1\u56fd\uff0c\u901a\u8fc7\u58f0\u79f0\u81ea\u5df1\u4e0d\u4ece\u4e8b\u5185\u90e8\u76d1\u89c6\u6765\u5904\u7406\u8fd9\u4e2a\u95ee\u9898\u3002\u4f46\u5b9e\u9645\u4e0a\u4ed6\u4eec\u662f\u8ba9\u5408\u4f5c\u4f19\u4f34\u4ee3\u4e3a\u6267\u884c\u76d1\u89c6\uff0c\u5e76\u5171\u4eab\u6240\u6709\u7684\u4fe1\u606f\u3002\u201d[105]<\/p>\n\n\n\n<p><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Edward_Snowden\" target=\"_blank\" rel=\"noreferrer noopener\">Edward Snowden<\/a>, in a live streamed Google Hangout to <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Kim_Dotcom\" target=\"_blank\" rel=\"noreferrer noopener\">Kim Dotcom<\/a> and <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Julian_Assange\" target=\"_blank\" rel=\"noreferrer noopener\">Julian Assange<\/a>, alleged that he had received intelligence from New Zealand, and the NSA has listening posts in New Zealand.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-106\" target=\"_blank\" rel=\"noreferrer noopener\">[106]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u7231\u5fb7\u534e\u00b7\u65af\u8bfa\u767b\u901a\u8fc7Google Hangout\u4e0e\u91d1\u00b7\u591a\u7279\u5eb7\u59c6\u548c\u6731\u5229\u5b89\u00b7\u963f\u6851\u5947\u8fdb\u884c\u4e86\u76f4\u64ad\u8fde\u7ebf\uff0c\u58f0\u79f0\u4ed6\u66fe\u4ece\u65b0\u897f\u5170\u83b7\u5f97\u60c5\u62a5\uff0c\u5e76\u4e14\u7f8e\u56fd\u56fd\u5bb6\u5b89\u5168\u5c40\u5728\u65b0\u897f\u5170\u8bbe\u6709\u76d1\u542c\u7ad9\u3002[106]<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3.2.10 \u897f\u73ed\u7259 | Spain<\/strong><\/h4>\n\n\n\n<p>At a meeting of European Union leaders held the week of 21 October 2013, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Mariano_Rajoy\" target=\"_blank\" rel=\"noreferrer noopener\">Mariano Rajoy<\/a>, Spain&#8217;s prime minister, said that &#8220;spying activities aren&#8217;t proper among partner countries and allies&#8221;. On 28 October 2013 the Spanish government summoned the American ambassador, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/James_Costos\" target=\"_blank\" rel=\"noreferrer noopener\">James Costos<\/a>, to address allegations that the U.S. had collected data on 60 million telephone calls in Spain. Separately, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/%25C3%258D%25C3%25B1igo_M%25C3%25A9ndez_de_Vigo\" target=\"_blank\" rel=\"noreferrer noopener\">\u00cd\u00f1igo M\u00e9ndez de Vigo<\/a>, a Spanish secretary of state, referred to the need to maintain &#8220;a necessary balance&#8221; between security and privacy concerns, but said that the recent allegations of spying, &#8220;if proven to be true, are improper and unacceptable between partners and friendly countries&#8221;.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-107\" target=\"_blank\" rel=\"noreferrer noopener\">[107]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u57282013\u5e7410\u670821\u65e5\u7684\u6b27\u76df\u9886\u5bfc\u4eba\u4f1a\u8bae\u4e0a\uff0c\u897f\u73ed\u7259\u603b\u7406\u9a6c\u91cc\u4e9a\u8bfa\u00b7\u62c9\u970d\u4f0a\u8868\u793a\uff1a\u201c\u95f4\u8c0d\u6d3b\u52a8\u5728\u5408\u4f5c\u4f19\u4f34\u548c\u76df\u53cb\u4e4b\u95f4\u662f\u4e0d\u9002\u5f53\u7684\u3002\u201d2013\u5e7410\u670828\u65e5\uff0c\u897f\u73ed\u7259\u653f\u5e9c\u53ec\u89c1\u7f8e\u56fd\u5927\u4f7f\u8a79\u59c6\u65af\u00b7\u79d1\u65af\u6258\u65af\uff0c\u5c31\u7f8e\u56fd\u5728\u897f\u73ed\u7259\u6536\u96c6\u4e866000\u4e07\u901a\u7535\u8bdd\u7684\u6570\u636e\u4e00\u4e8b\u63d0\u51fa\u8d28\u8be2\u3002\u4e0e\u6b64\u540c\u65f6\uff0c\u897f\u73ed\u7259\u56fd\u52a1\u79d8\u4e66\u4f0a\u5c3c\u6208\u00b7\u95e8\u5fb7\u65af\u00b7\u5fb7\u7ef4\u6208\u8c08\u5230\u4e86\u5728\u5b89\u5168\u548c\u9690\u79c1\u5173\u5207\u4e4b\u95f4\u4fdd\u6301\u201c\u5fc5\u8981\u5e73\u8861\u201d\u7684\u9700\u6c42\uff0c\u4f46\u4ed6\u8868\u793a\u6700\u8fd1\u7684\u95f4\u8c0d\u6307\u63a7\u201c\u5982\u679c\u88ab\u8bc1\u660e\u662f\u771f\u5b9e\u7684\uff0c\u5c06\u662f\u5728\u5408\u4f5c\u4f19\u4f34\u548c\u53cb\u597d\u56fd\u5bb6\u4e4b\u95f4\u4e0d\u9002\u5f53\u548c\u4e0d\u53ef\u63a5\u53d7\u7684\u3002\u201d[107]<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3.2.11 \u82f1\u56fd | United Kingdom<\/strong><\/h4>\n\n\n\n<p><em>Further information: <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Mass_surveillance_in_the_United_Kingdom\" target=\"_blank\" rel=\"noreferrer noopener\">Mass surveillance in the United Kingdom<\/a><\/em><br><em>\u66f4\u591a\u4fe1\u606f\uff1a\u82f1\u56fd\u7684\u5927\u89c4\u6a21\u76d1\u89c6<\/em><\/p>\n\n\n\n<p>In the United Kingdom, the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Government_Communications_Headquarters\" target=\"_blank\" rel=\"noreferrer noopener\">Government Communications Headquarters<\/a> (GCHQ), which also has its own surveillance program, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Tempora\" target=\"_blank\" rel=\"noreferrer noopener\">Tempora<\/a>, had access to the PRISM program on or before June 2010 and wrote 197 reports with it in 2012 alone. The <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Intelligence_and_Security_Committee\" target=\"_blank\" rel=\"noreferrer noopener\">Intelligence and Security Committee<\/a> of the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Parliament_of_the_United_Kingdom\" target=\"_blank\" rel=\"noreferrer noopener\">UK Parliament<\/a> reviewed the reports GCHQ produced on the basis of intelligence sought from the US. They found in each case a warrant for interception was in place in accordance with the legal safeguards contained in UK law.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-108\" target=\"_blank\" rel=\"noreferrer noopener\">[108]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u5728\u82f1\u56fd\uff0c\u653f\u5e9c\u901a\u4fe1\u603b\u90e8\uff08GCHQ\uff09\u4e5f\u6709\u81ea\u5df1\u7684\u76d1\u89c6\u8ba1\u5212\u201cTempora\u201d\uff0c\u57282010\u5e746\u6708\u4e4b\u524d\u5c31\u80fd\u591f\u8bbf\u95eePRISM\u8ba1\u5212\uff0c\u5e76\u4e14\u4ec5\u57282012\u5e74\u5c31\u4ee5\u6b64\u7f16\u5199\u4e86197\u4efd\u62a5\u544a\u3002\u82f1\u56fd\u8bae\u4f1a\u7684\u60c5\u62a5\u4e0e\u5b89\u5168\u59d4\u5458\u4f1a\u5ba1\u67e5\u4e86GCHQ\u6839\u636e\u4ece\u7f8e\u56fd\u83b7\u53d6\u7684\u60c5\u62a5\u6240\u4ea7\u751f\u7684\u62a5\u544a\u3002\u4ed6\u4eec\u53d1\u73b0\u6bcf\u4e2a\u6848\u4f8b\u4e2d\u90fd\u6709\u6839\u636e\u82f1\u56fd\u6cd5\u5f8b\u4e2d\u7684\u6cd5\u5f8b\u4fdd\u969c\u63aa\u65bd\u8fdb\u884c\u62e6\u622a\u6388\u6743\u3002[108]<\/p>\n\n\n\n<p>In August 2013, <em>The Guardian<\/em> newspaper&#8217;s offices were visited by technicians from GCHQ, who ordered and supervised the destruction of the hard drives containing information acquired from Snowden.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-109\" target=\"_blank\" rel=\"noreferrer noopener\">[109]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a \u57282013\u5e748\u6708\uff0c\u653f\u5e9c\u901a\u4fe1\u603b\u90e8\uff08GCHQ\uff09\u7684\u6280\u672f\u4eba\u5458\u66fe\u8bbf\u95ee\u300a\u536b\u62a5\u300b\u7684\u529e\u516c\u5ba4\uff0c\u4ed6\u4eec\u4e0b\u4ee4\u5e76\u76d1\u7763\u9500\u6bc1\u4e86\u5305\u542b\u7231\u5fb7\u534e\u00b7\u65af\u8bfa\u767b\u6240\u63d0\u4f9b\u4fe1\u606f\u7684\u786c\u76d8\u9a71\u52a8\u5668\u3002[109]<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h_660481013_4\">3.3 \u516c\u53f8 | Companies<\/h3>\n\n\n\n<p>The original <em>Washington Post<\/em> and <em>Guardian<\/em> articles reporting on PRISM noted that one of the leaked briefing documents said PRISM involves collection of data &#8220;directly from the servers&#8221; of several major internet services providers.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-WaPo1-1\" target=\"_blank\" rel=\"noreferrer noopener\">[1]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Greenwald1-2\" target=\"_blank\" rel=\"noreferrer noopener\">[2]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u6700\u521d\u7684\u300a\u534e\u76db\u987f\u90ae\u62a5\u300b\u548c\u300a\u536b\u62a5\u300b\u62a5\u9053PRISM\u8ba1\u5212\u65f6\u6307\u51fa\uff0c\u6cc4\u9732\u7684\u4e00\u4efd\u7b80\u62a5\u6587\u4ef6\u79f0PRISM\u8ba1\u5212\u6d89\u53ca\u4ece\u51e0\u5bb6\u4e3b\u8981\u4e92\u8054\u7f51\u670d\u52a1\u63d0\u4f9b\u5546\u7684\u670d\u52a1\u5668\u4e0a\u201c\u76f4\u63a5\u6536\u96c6\u6570\u636e\u201d\u3002[1][2]<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3.3.1 \u6700\u521d\u7684\u516c\u5f00\u58f0\u660e | Initial public statements<\/strong><\/h4>\n\n\n\n<p>Corporate executives of several companies identified in the leaked documents told <em>The Guardian<\/em> that they had no knowledge of the PRISM program in particular and also denied making information available to the government on the scale alleged by news reports.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Greenwald1-2\" target=\"_blank\" rel=\"noreferrer noopener\">[2]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-GenCoop-110\" target=\"_blank\" rel=\"noreferrer noopener\">[110]<\/a> Statements of several of the companies named in the leaked documents were reported by <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/TechCrunch\" target=\"_blank\" rel=\"noreferrer noopener\">TechCrunch<\/a> and <em>The Washington Post<\/em> as follows:<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-TechCrunch-111\" target=\"_blank\" rel=\"noreferrer noopener\">[111]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-WaPoJune12-112\" target=\"_blank\" rel=\"noreferrer noopener\">[112]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u5728\u6cc4\u9732\u6587\u4ef6\u4e2d\u88ab\u63d0\u53ca\u7684\u591a\u5bb6\u516c\u53f8\u7684\u4f01\u4e1a\u9ad8\u7ba1\u544a\u8bc9\u300a\u536b\u62a5\u300b\u8bb0\u8005\uff0c\u4ed6\u4eec\u5bf9PRISM\u8ba1\u5212\u5e76\u4e0d\u4e86\u89e3\uff0c\u4e5f\u5426\u8ba4\u6309\u7167\u65b0\u95fb\u62a5\u9053\u6240\u79f0\u7684\u90a3\u6837\u5411\u653f\u5e9c\u63d0\u4f9b\u5927\u91cf\u4fe1\u606f\u3002TechCrunch\u548c\u300a\u534e\u76db\u987f\u90ae\u62a5\u300b\u5bf9\u51e0\u5bb6\u88ab\u63d0\u53ca\u7684\u516c\u53f8\u7684\u58f0\u660e\u8fdb\u884c\u4e86\u62a5\u9053\uff0c\u5185\u5bb9\u5982\u4e0b\uff1a[111][112]<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\"><strong><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Microsoft\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft<\/a><\/strong>: &#8220;We provide customer data only when we receive a legally binding order or subpoena to do so, and never on a voluntary basis. In addition we only ever comply with orders for requests about specific accounts or identifiers. If the government has a broader voluntary national security program to gather customer data, we don&#8217;t participate in it.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-TechCrunch-111\" target=\"_blank\" rel=\"noreferrer noopener\">[111]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-113\" target=\"_blank\" rel=\"noreferrer noopener\">[113]<\/a><\/p>\n<cite>\u53c2\u8003\u8bd1\u6587\uff1a\u5fae\u8f6f\uff1a\u6211\u4eec\u53ea\u5728\u6536\u5230\u6cd5\u5f8b\u7ea6\u675f\u7684\u547d\u4ee4\u6216\u4f20\u7968\u65f6\u63d0\u4f9b\u5ba2\u6237\u6570\u636e\uff0c\u5e76\u4e14\u7edd\u4e0d\u4f1a\u81ea\u613f\u63d0\u4f9b\u3002\u6b64\u5916\uff0c\u6211\u4eec\u53ea\u4f1a\u6309\u7167\u7279\u5b9a\u8d26\u6237\u6216\u6807\u8bc6\u7b26\u7684\u8bf7\u6c42\u6267\u884c\u547d\u4ee4\u3002\u5982\u679c\u653f\u5e9c\u6709\u4e00\u4e2a\u66f4\u5e7f\u6cdb\u7684\u81ea\u613f\u6027\u56fd\u5bb6\u5b89\u5168\u8ba1\u5212\u6765\u6536\u96c6\u5ba2\u6237\u6570\u636e\uff0c\u6211\u4eec\u4e0d\u53c2\u4e0e\u5176\u4e2d\u3002[111][113]<\/cite><\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\"><strong><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Yahoo%21\" target=\"_blank\" rel=\"noreferrer noopener\">Yahoo!<\/a><\/strong>: &#8220;Yahoo! takes users\u2019 privacy very seriously. We do not provide the government with direct access to our servers, systems, or network.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-TechCrunch-111\" target=\"_blank\" rel=\"noreferrer noopener\">[111]<\/a> &#8220;Of the hundreds of millions of users we serve, an infinitesimal percentage will ever be the subject of a government data collection directive.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-WaPoJune12-112\" target=\"_blank\" rel=\"noreferrer noopener\">[112]<\/a><\/p>\n<cite>\u53c2\u8003\u8bd1\u6587\uff1a\u96c5\u864e\uff1a\u96c5\u864e\u975e\u5e38\u91cd\u89c6\u7528\u6237\u7684\u9690\u79c1\u3002\u6211\u4eec\u4e0d\u4f1a\u76f4\u63a5\u5411\u653f\u5e9c\u63d0\u4f9b\u670d\u52a1\u5668\u3001\u7cfb\u7edf\u6216\u7f51\u7edc\u7684\u8bbf\u95ee\u6743\u9650\u3002\u5728\u6211\u4eec\u670d\u52a1\u7684\u6570\u4ebf\u7528\u6237\u4e2d\uff0c\u53ea\u6709\u6781\u5c11\u6570\u4f1a\u6210\u4e3a\u653f\u5e9c\u6570\u636e\u6536\u96c6\u6307\u4ee4\u7684\u5bf9\u8c61\u3002[111][112]<\/cite><\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\"><strong><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Facebook\" target=\"_blank\" rel=\"noreferrer noopener\">Facebook<\/a><\/strong>: &#8220;We do not provide any government organization with direct access to Facebook servers. When Facebook is asked for data or information about specific individuals, we carefully scrutinize any such request for compliance with all applicable laws, and provide information only to the extent required by law.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-TechCrunch-111\" target=\"_blank\" rel=\"noreferrer noopener\">[111]<\/a><\/p>\n<cite>\u53c2\u8003\u8bd1\u6587\uff1aFacebook\uff1a\u6211\u4eec\u4e0d\u4f1a\u5411\u4efb\u4f55\u653f\u5e9c\u673a\u6784\u63d0\u4f9b\u5bf9Facebook\u670d\u52a1\u5668\u7684\u76f4\u63a5\u8bbf\u95ee\u6743\u9650\u3002\u5f53\u653f\u5e9c\u8981\u6c42\u83b7\u53d6\u7279\u5b9a\u4e2a\u4eba\u7684\u6570\u636e\u6216\u4fe1\u606f\u65f6\uff0c\u6211\u4eec\u4f1a\u4ed4\u7ec6\u5ba1\u67e5\u4efb\u4f55\u6b64\u7c7b\u8bf7\u6c42\uff0c\u786e\u4fdd\u5176\u7b26\u5408\u6240\u6709\u9002\u7528\u6cd5\u5f8b\uff0c\u5e76\u4e14\u53ea\u63d0\u4f9b\u6cd5\u5f8b\u8981\u6c42\u7684\u4fe1\u606f\u3002[111]<\/cite><\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\"><strong><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Google\" target=\"_blank\" rel=\"noreferrer noopener\">Google<\/a><\/strong>: &#8220;Google cares deeply about the security of our users&#8217; data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government &#8216;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Backdoor_%28computing%29\" target=\"_blank\" rel=\"noreferrer noopener\">back door<\/a>&#8216; into our systems, but Google does not have a backdoor for the government to access private user data.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-TechCrunch-111\" target=\"_blank\" rel=\"noreferrer noopener\">[111]<\/a> &#8220;[A]ny suggestion that Google is disclosing information about our users&#8217; internet activity on such a scale is completely false.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-WaPoJune12-112\" target=\"_blank\" rel=\"noreferrer noopener\">[112]<\/a><\/p>\n<cite>\u53c2\u8003\u8bd1\u6587\uff1a\u8c37\u6b4c\uff1a\u8c37\u6b4c\u975e\u5e38\u91cd\u89c6\u7528\u6237\u6570\u636e\u7684\u5b89\u5168\u3002\u6211\u4eec\u9075\u5b88\u6cd5\u5f8b\u5411\u653f\u5e9c\u62ab\u9732\u7528\u6237\u6570\u636e\uff0c\u5e76\u4e14\u6211\u4eec\u4f1a\u4ed4\u7ec6\u5ba1\u67e5\u6240\u6709\u8fd9\u7c7b\u8bf7\u6c42\u3002\u6709\u65f6\uff0c\u6709\u4eba\u58f0\u79f0\u6211\u4eec\u5728\u7cfb\u7edf\u4e2d\u521b\u5efa\u4e86\u4e00\u4e2a\u653f\u5e9c\u7684\u201c\u540e\u95e8\u201d\uff0c\u4f46\u8c37\u6b4c\u6ca1\u6709\u4e3a\u653f\u5e9c\u63d0\u4f9b\u8bbf\u95ee\u79c1\u4eba\u7528\u6237\u6570\u636e\u7684\u540e\u95e8\u3002[111]\u201c\u4efb\u4f55\u6697\u793a\u8c37\u6b4c\u5728\u5982\u6b64\u5927\u89c4\u6a21\u4e0a\u62ab\u9732\u7528\u6237\u7684\u4e92\u8054\u7f51\u6d3b\u52a8\u4fe1\u606f\u7684\u8bf4\u6cd5\u90fd\u662f\u5b8c\u5168\u9519\u8bef\u7684\u3002\u201d[112]<\/cite><\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\"><strong><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Apple_Inc.\" target=\"_blank\" rel=\"noreferrer noopener\">Apple<\/a><\/strong>: &#8220;We have never heard of PRISM&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-%3A0-114\" target=\"_blank\" rel=\"noreferrer noopener\">[114]<\/a> &#8220;We do not provide any government agency with direct access to our servers, and any government agency requesting customer data must get a court order.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-%3A0-114\" target=\"_blank\" rel=\"noreferrer noopener\">[114]<\/a><\/p>\n<cite>\u53c2\u8003\u8bd1\u6587\uff1a\u82f9\u679c\uff1a\u201c\u6211\u4eec\u4ece\u672a\u542c\u8bf4\u8fc7 PRISM\u201d[114]\u201c\u6211\u4eec\u4e0d\u5411\u4efb\u4f55\u653f\u5e9c\u673a\u6784\u63d0\u4f9b\u76f4\u63a5\u8bbf\u95ee\u6211\u4eec\u670d\u52a1\u5668\u7684\u6743\u9650\uff0c\u4efb\u4f55\u8981\u6c42\u5ba2\u6237\u6570\u636e\u7684\u653f\u5e9c\u673a\u6784\u90fd\u5fc5\u987b\u83b7\u5f97\u6cd5\u9662\u547d\u4ee4\u3002\u201d[114]<\/cite><\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\"><strong><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Dropbox_%28service%29\" target=\"_blank\" rel=\"noreferrer noopener\">Dropbox<\/a><\/strong>: &#8220;We\u2019ve seen reports that Dropbox might be asked to participate in a government program called PRISM. We are not part of any such program and remain committed to protecting our users\u2019 privacy.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-TechCrunch-111\" target=\"_blank\" rel=\"noreferrer noopener\">[111]<\/a><\/p>\n<cite>\u53c2\u8003\u8bd1\u6587\uff1aDropbox\uff1a\u6211\u4eec\u6ce8\u610f\u5230\u6709\u62a5\u9053\u79f0Dropbox\u53ef\u80fd\u4f1a\u88ab\u8981\u6c42\u53c2\u4e0e\u540d\u4e3aPRISM\u7684\u653f\u5e9c\u8ba1\u5212\u3002\u6211\u4eec\u5e76\u4e0d\u53c2\u4e0e\u4efb\u4f55\u8fd9\u6837\u7684\u8ba1\u5212\uff0c\u5e76\u5c06\u7ee7\u7eed\u81f4\u529b\u4e8e\u4fdd\u62a4\u7528\u6237\u7684\u9690\u79c1\u3002[111]<\/cite><\/blockquote>\n\n\n\n<p>In response to the technology companies&#8217; confirmation of the NSA being able to directly access the companies&#8217; servers, <em>The New York Times<\/em> reported that sources had stated the NSA was gathering the surveillance data from the companies using other technical means in response to court orders for specific sets of data.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-nytsavage060613-17\" target=\"_blank\" rel=\"noreferrer noopener\">[17]<\/a> <em>The Washington Post<\/em> suggested, &#8220;It is possible that the conflict between the PRISM slides and the company spokesmen is the result of imprecision on the part of the NSA author. In another classified report obtained by The Post, the arrangement is described as allowing &#8216;collection managers [to send] content tasking instructions directly to equipment installed at company-controlled locations,&#8217; rather than directly to company servers.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-WaPo1-1\" target=\"_blank\" rel=\"noreferrer noopener\">[1]<\/a> &#8220;[I]n context, &#8216;direct&#8217; is more likely to mean that the NSA is receiving data sent to them deliberately by the tech companies, as opposed to intercepting communications as they&#8217;re transmitted to some other destination.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-WaPoJune12-112\" target=\"_blank\" rel=\"noreferrer noopener\">[112]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u9488\u5bf9\u79d1\u6280\u516c\u53f8\u786e\u8ba4\u56fd\u5bb6\u5b89\u5168\u5c40\u80fd\u591f\u76f4\u63a5\u8bbf\u95ee\u5176\u670d\u52a1\u5668\u7684\u56de\u5e94\uff0c\u636e\u300a\u7ebd\u7ea6\u65f6\u62a5\u300b\u62a5\u9053\uff0c\u6d88\u606f\u4eba\u58eb\u79f0\uff0c\u56fd\u5bb6\u5b89\u5168\u5c40\u662f\u901a\u8fc7\u5176\u4ed6\u6280\u672f\u624b\u6bb5\u6536\u96c6\u8fd9\u4e9b\u516c\u53f8\u7684\u76d1\u89c6\u6570\u636e\uff0c\u4ee5\u5e94\u5bf9\u7279\u5b9a\u6570\u636e\u96c6\u7684\u6cd5\u5ead\u547d\u4ee4\u3002\u300a\u534e\u76db\u987f\u90ae\u62a5\u300b\u5219\u6697\u793a\uff1a\u201cPRISM\u5e7b\u706f\u7247\u548c\u516c\u53f8\u53d1\u8a00\u4eba\u4e4b\u95f4\u7684\u51b2\u7a81\u53ef\u80fd\u662fNSA\u4f5c\u8005\u8868\u8ff0\u4e0d\u51c6\u786e\u7684\u7ed3\u679c\u3002\u300a\u90ae\u62a5\u300b\u83b7\u5f97\u7684\u53e6\u4e00\u4efd\u673a\u5bc6\u62a5\u544a\u4e2d\uff0c\u5b89\u6392\u88ab\u63cf\u8ff0\u4e3a\u5141\u8bb8\u2018\u6536\u96c6\u7ba1\u7406\u4eba\u5458\u76f4\u63a5\u5411\u5b89\u88c5\u5728\u516c\u53f8\u63a7\u5236\u5730\u70b9\u7684\u8bbe\u5907\u53d1\u9001\u5185\u5bb9\u7684\u4efb\u52a1\u6307\u4ee4\u2019\uff0c\u800c\u4e0d\u662f\u76f4\u63a5\u53d1\u9001\u5230\u516c\u53f8\u670d\u52a1\u5668\u3002\u201d\u201c\u5728\u8fd9\u79cd\u80cc\u666f\u4e0b\uff0c\u2018\u76f4\u63a5\u2019\u66f4\u53ef\u80fd\u610f\u5473\u7740NSA\u6b63\u5728\u6709\u610f\u5730\u63a5\u6536\u79d1\u6280\u516c\u53f8\u53d1\u9001\u7ed9\u4ed6\u4eec\u7684\u6570\u636e\uff0c\u800c\u4e0d\u662f\u62e6\u622a\u4f20\u8f93\u5230\u5176\u4ed6\u76ee\u7684\u5730\u7684\u901a\u4fe1\u3002\u201d[17][1][112]<\/p>\n\n\n\n<p>&#8220;If these companies received an order under the FISA amendments act, they are forbidden by law from disclosing having received the order and disclosing any information about the order at all,&#8221; Mark Rumold, staff attorney at the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Electronic_Frontier_Foundation\" target=\"_blank\" rel=\"noreferrer noopener\">Electronic Frontier Foundation<\/a>, told <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/ABC_News\" target=\"_blank\" rel=\"noreferrer noopener\">ABC News<\/a>.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-abc_wordplay-115\" target=\"_blank\" rel=\"noreferrer noopener\">[115]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u201c\u5982\u679c\u8fd9\u4e9b\u516c\u53f8\u6839\u636e\u300a\u5916\u56fd\u60c5\u62a5\u76d1\u89c6\u6cd5\u4fee\u6b63\u6848\u300b\u6536\u5230\u4e86\u4e00\u9879\u547d\u4ee4\uff0c\u6839\u636e\u6cd5\u5f8b\u89c4\u5b9a\uff0c\u5b83\u4eec\u88ab\u7981\u6b62\u900f\u9732\u63a5\u6536\u5230\u8be5\u547d\u4ee4\u7684\u4e8b\u5b9e\uff0c\u5e76\u900f\u9732\u4efb\u4f55\u4e0e\u8be5\u547d\u4ee4\u6709\u5173\u7684\u4fe1\u606f\u3002\u201d\u7535\u5b50\u524d\u6cbf\u57fa\u91d1\u4f1a\u7684\u804c\u5458\u5f8b\u5e08\u9a6c\u514b\u00b7\u9c81\u83ab\u5c14\u5fb7\u5728\u63a5\u53d7ABC\u65b0\u95fb\u91c7\u8bbf\u65f6\u8868\u793a\u3002[115]<\/p>\n\n\n\n<p>On May 28, 2013, Google was ordered by United States District Court Judge <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Susan_Illston\" target=\"_blank\" rel=\"noreferrer noopener\">Susan Illston<\/a> to comply with a <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/National_Security_Letters\" target=\"_blank\" rel=\"noreferrer noopener\">National Security Letter<\/a> issued by the FBI to provide user data without a warrant.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Google_NSLs-116\" target=\"_blank\" rel=\"noreferrer noopener\">[116]<\/a> Kurt Opsahl, a senior staff attorney at the Electronic Frontier Foundation, in an interview with <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/VentureBeat\" target=\"_blank\" rel=\"noreferrer noopener\">VentureBeat<\/a> said, &#8220;I certainly appreciate that Google put out a <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Transparency_report\" target=\"_blank\" rel=\"noreferrer noopener\">transparency report<\/a>, but it appears that the transparency didn&#8217;t include this. I wouldn&#8217;t be surprised if they were subject to a <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Gag_order\" target=\"_blank\" rel=\"noreferrer noopener\">gag order<\/a>.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-vb_goog-117\" target=\"_blank\" rel=\"noreferrer noopener\">[117]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a2013 \u5e74 5 \u6708 28 \u65e5\uff0c\u7f8e\u56fd\u5730\u65b9\u6cd5\u9662\u6cd5\u5b98\u82cf\u73ca\u00b7\u4f0a\u5c14\u65af\u987f (Susan Illston) \u547d\u4ee4 Google \u9075\u5b88 FBI \u53d1\u51fa\u7684\u56fd\u5bb6\u5b89\u5168\u4fe1\u51fd\uff0c\u5728\u6ca1\u6709\u641c\u67e5\u4ee4\u7684\u60c5\u51b5\u4e0b\u63d0\u4f9b\u7528\u6237\u6570\u636e\u3002 [116] \u7535\u5b50\u524d\u6cbf\u57fa\u91d1\u4f1a\u9ad8\u7ea7\u4e13\u804c\u5f8b\u5e08\u5e93\u5c14\u7279\u00b7\u5965\u666e\u8428\u5c14 (Kurt Opsahl) \u5728\u63a5\u53d7 VentureBeat \u91c7\u8bbf\u65f6\u8868\u793a\uff1a\u201c\u6211\u5f53\u7136\u611f\u8c22\u8c37\u6b4c\u53d1\u5e03\u900f\u660e\u5ea6\u62a5\u544a\uff0c\u4f46\u4f3c\u4e4e\u900f\u660e\u5ea6\u62a5\u544a\u4e2d\u4e0d\u5305\u62ec\u8fd9\u4e00\u70b9\u3002\u5982\u679c\u4ed6\u4eec\u53d7\u5230\u7981\u8a00\u4ee4\u7684\u8bdd\u6211\u4e0d\u4f1a\u611f\u5230\u60ca\u8bb6\u3002\u201d[117]<\/p>\n\n\n\n<p><em>The New York Times<\/em> reported on June 7, 2013, that &#8220;Twitter declined to make it easier for the government. But other companies were more compliant, according to people briefed on the negotiations.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-nyt_techconcede-118\" target=\"_blank\" rel=\"noreferrer noopener\">[118]<\/a> The other companies held discussions with national security personnel on how to make data available more efficiently and securely.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-nyt_techconcede-118\" target=\"_blank\" rel=\"noreferrer noopener\">[118]<\/a> In some cases, these companies made modifications to their systems in support of the intelligence collection effort.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-nyt_techconcede-118\" target=\"_blank\" rel=\"noreferrer noopener\">[118]<\/a> The dialogues have continued in recent months, as General <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Martin_Dempsey\" target=\"_blank\" rel=\"noreferrer noopener\">Martin Dempsey<\/a>, the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Chairman_of_the_Joint_Chiefs_of_Staff\" target=\"_blank\" rel=\"noreferrer noopener\">chairman of the Joint Chiefs of Staff<\/a>, has met with executives including those at Facebook, Microsoft, Google and <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Intel\" target=\"_blank\" rel=\"noreferrer noopener\">Intel<\/a>.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-nyt_techconcede-118\" target=\"_blank\" rel=\"noreferrer noopener\">[118]<\/a> These details on the discussions provide insight into the disparity between initial descriptions of the government program including a training slide which states, &#8220;Collection directly from the servers&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Ball-Guardian-2013-6-8-119\" target=\"_blank\" rel=\"noreferrer noopener\">[119]<\/a> and the companies&#8217; denials.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-nyt_techconcede-118\" target=\"_blank\" rel=\"noreferrer noopener\">[118]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u636e\u300a\u7ebd\u7ea6\u65f6\u62a5\u300b\u4e8e2013\u5e746\u67087\u65e5\u62a5\u9053\uff1a\u201cTwitter\u62d2\u7edd\u4e3a\u653f\u5e9c\u63d0\u4f9b\u65b9\u4fbf\u3002\u4f46\u662f\u6839\u636e\u77e5\u60c5\u4eba\u58eb\u7684\u4ecb\u7ecd\uff0c\u5176\u4ed6\u516c\u53f8\u66f4\u4e3a\u5408\u4f5c\u3002\u201d\u8fd9\u4e9b\u516c\u53f8\u4e0e\u56fd\u5bb6\u5b89\u5168\u4eba\u5458\u5c31\u5982\u4f55\u66f4\u9ad8\u6548\u3001\u66f4\u5b89\u5168\u5730\u63d0\u4f9b\u6570\u636e\u8fdb\u884c\u4e86\u8ba8\u8bba\u3002\u5728\u67d0\u4e9b\u60c5\u51b5\u4e0b\uff0c\u8fd9\u4e9b\u516c\u53f8\u5bf9\u5176\u7cfb\u7edf\u8fdb\u884c\u4e86\u4fee\u6539\uff0c\u4ee5\u652f\u6301\u60c5\u62a5\u6536\u96c6\u5de5\u4f5c\u3002\u8fd9\u4e9b\u5bf9\u8bdd\u5728\u6700\u8fd1\u51e0\u4e2a\u6708\u4e2d\u7ee7\u7eed\u8fdb\u884c\uff0c\u7f8e\u56fd\u8054\u5408\u53c2\u8c0b\u957f\u8054\u5e2d\u4f1a\u8bae\u4e3b\u5e2d\u9a6c\u4e01\u00b7\u767b\u666e\u897f\u5c06\u519b\u4e0eFacebook\u3001\u5fae\u8f6f\u3001\u8c37\u6b4c\u548c\u82f1\u7279\u5c14\u7b49\u516c\u53f8\u7684\u9ad8\u7ba1\u8fdb\u884c\u4e86\u4f1a\u6664\u3002\u8fd9\u4e9b\u5bf9\u8bdd\u7684\u7ec6\u8282\u63ed\u793a\u4e86\u6700\u521d\u5bf9\u653f\u5e9c\u8ba1\u5212\u7684\u63cf\u8ff0\uff0c\u5305\u62ec\u4e00\u5f20\u57f9\u8bad\u5e7b\u706f\u7247\u4e2d\u660e\u786e\u63d0\u5230\u7684\u201c\u76f4\u63a5\u4ece\u670d\u52a1\u5668\u6536\u96c6\u201d\u4ee5\u53ca\u516c\u53f8\u7684\u5426\u8ba4\u4e4b\u95f4\u7684\u5dee\u5f02\u3002<\/p>\n\n\n\n<p>While providing data in response to a legitimate FISA request approved by the FISA Court is a legal requirement, modifying systems to make it easier for the government to collect the data is not. This is why Twitter could legally decline to provide an enhanced mechanism for data transmission.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-nyt_techconcede-118\" target=\"_blank\" rel=\"noreferrer noopener\">[118]<\/a> Other than Twitter, the companies were effectively asked to construct a locked mailbox and provide the key to the government, people briefed on the negotiations said.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-nyt_techconcede-118\" target=\"_blank\" rel=\"noreferrer noopener\">[118]<\/a> Facebook, for instance, built such a system for requesting and sharing the information.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-nyt_techconcede-118\" target=\"_blank\" rel=\"noreferrer noopener\">[118]<\/a> Google does not provide a lockbox system, but instead transmits required data by hand delivery or <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/OpenSSH\" target=\"_blank\" rel=\"noreferrer noopener\">ssh<\/a>.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Wired-120\" target=\"_blank\" rel=\"noreferrer noopener\">[120]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u6839\u636e\u300a\u5916\u56fd\u60c5\u62a5\u76d1\u89c6\u6cd5\u6cd5\u9662\u300b\u6279\u51c6\u7684\u5408\u6cd5FISA\u8bf7\u6c42\uff0c\u63d0\u4f9b\u6570\u636e\u662f\u6cd5\u5f8b\u8981\u6c42\uff0c\u800c\u4fee\u6539\u7cfb\u7edf\u4ee5\u65b9\u4fbf\u653f\u5e9c\u6536\u96c6\u6570\u636e\u5219\u4e0d\u662f\u6cd5\u5f8b\u8981\u6c42\u3002\u8fd9\u5c31\u662f\u4e3a\u4ec0\u4e48Twitter\u53ef\u4ee5\u5408\u6cd5\u5730\u62d2\u7edd\u63d0\u4f9b\u589e\u5f3a\u7684\u6570\u636e\u4f20\u8f93\u673a\u5236\u3002\u9664\u4e86Twitter\u4e4b\u5916\uff0c\u636e\u77e5\u60c5\u4eba\u58eb\u4ecb\u7ecd\uff0c\u5176\u4ed6\u516c\u53f8\u88ab\u8981\u6c42\u6784\u5efa\u4e00\u4e2a\u52a0\u5bc6\u90ae\u7bb1\uff0c\u5e76\u5411\u653f\u5e9c\u63d0\u4f9b\u89e3\u9501\u5bc6\u94a5\u3002\u4f8b\u5982\uff0cFacebook\u5c31\u4e3a\u8bf7\u6c42\u548c\u5171\u4eab\u4fe1\u606f\u800c\u6784\u5efa\u4e86\u8fd9\u6837\u7684\u7cfb\u7edf\u3002\u8c37\u6b4c\u5e76\u672a\u63d0\u4f9b\u52a0\u5bc6\u90ae\u7bb1\u7cfb\u7edf\uff0c\u800c\u662f\u901a\u8fc7\u624b\u5de5\u9012\u9001\u6216ssh\u4f20\u8f93\u6240\u9700\u6570\u636e\u3002<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3.3.2 \u68f1\u955c\u540e\u7684\u900f\u660e\u5ea6\u62a5\u544a | Post-PRISM transparency reports<\/strong><\/h4>\n\n\n\n<p>In response to the publicity surrounding media reports of data-sharing, several companies requested permission to reveal more public information about the nature and scope of information provided in response to National Security requests.<br>\u53c2\u8003\u8bd1\u6587\uff1a\u9488\u5bf9\u5a92\u4f53\u62a5\u9053\u7684\u6570\u636e\u5171\u4eab\u95ee\u9898\uff0c\u4e00\u4e9b\u516c\u53f8\u8bf7\u6c42\u83b7\u5f97\u8bb8\u53ef\uff0c\u4ee5\u516c\u5f00\u66f4\u591a\u5173\u4e8e\u56de\u5e94\u56fd\u5bb6\u5b89\u5168\u8bf7\u6c42\u63d0\u4f9b\u7684\u4fe1\u606f\u6027\u8d28\u548c\u8303\u56f4\u7684\u516c\u5171\u4fe1\u606f\u3002<\/p>\n\n\n\n<p>On June 14, 2013, Facebook reported that the U.S. government had authorized the communication of &#8220;about these numbers in aggregate, and as a range.&#8221; In a press release posted to its web site, the company reported, &#8220;For the six months ending December 31, 2012, the total number of user-data requests Facebook received from any and all government entities in the U.S. (including local, state, and federal, and including criminal and national security-related requests) \u2013 was between 9,000 and 10,000.&#8221; The company further reported that the requests impacted &#8220;between 18,000 and 19,000&#8221; user accounts, a &#8220;tiny fraction of one percent&#8221; of more than 1.1 billion active user accounts.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-FB-Release-121\" target=\"_blank\" rel=\"noreferrer noopener\">[121]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a2013\u5e746\u670814\u65e5\uff0cFacebook\u62a5\u544a\u79f0\u7f8e\u56fd\u653f\u5e9c\u5df2\u7ecf\u6388\u6743\u201c\u6309\u603b\u4f53\u548c\u8303\u56f4\u201d\u901a\u4fe1\u76f8\u5173\u6570\u636e\u3002\u5728\u53d1\u5e03\u5728\u5176\u7f51\u7ad9\u4e0a\u7684\u65b0\u95fb\u7a3f\u4e2d\uff0c\u8be5\u516c\u53f8\u62a5\u9053\u79f0\uff1a\u201c\u622a\u81f32012\u5e7412\u670831\u65e5\u7684\u516d\u4e2a\u6708\u5185\uff0cFacebook\u4ece\u5305\u62ec\u5730\u65b9\u3001\u5dde\u548c\u8054\u90a6\u653f\u5e9c\u5728\u5185\u7684\u4efb\u4f55\u548c\u6240\u6709\u653f\u5e9c\u673a\u6784\uff08\u5305\u62ec\u5211\u4e8b\u548c\u56fd\u5bb6\u5b89\u5168\u76f8\u5173\u8bf7\u6c42\uff09\u6536\u5230\u7684\u7528\u6237\u6570\u636e\u8bf7\u6c42\u603b\u6570\u57289,000\u81f310,000\u4e4b\u95f4\u3002\u201d \u8be5\u516c\u53f8\u8fdb\u4e00\u6b65\u62a5\u544a\u79f0\uff0c\u8fd9\u4e9b\u8bf7\u6c42\u5f71\u54cd\u4e86\u201c18,000\u81f319,000\u201d\u4e2a\u7528\u6237\u8d26\u6237\uff0c\u4ec5\u5360\u8d85\u8fc711\u4ebf\u6d3b\u8dc3\u7528\u6237\u8d26\u6237\u7684\u201c\u6781\u5c0f\u90e8\u5206\u201d\u3002<\/p>\n\n\n\n<p>That same day, Microsoft reported that for the same period, it received &#8220;between 6,000 and 7,000 criminal and national security warrants, subpoenas and orders affecting between 31,000 and 32,000 consumer accounts from U.S. governmental entities (including local, state and federal)&#8221; which impacted &#8220;a tiny fraction of Microsoft&#8217;s global customer base.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Microsoft-14Jun-122\" target=\"_blank\" rel=\"noreferrer noopener\">[122]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u540c\u4e00\u5929\uff0c\u5fae\u8f6f\u4e5f\u62a5\u544a\u79f0\uff0c\u5728\u540c\u4e00\u65f6\u671f\u5185\uff0c\u5b83\u6536\u5230\u4e86\u6765\u81ea\u7f8e\u56fd\u653f\u5e9c\u673a\u6784\uff08\u5305\u62ec\u5730\u65b9\u3001\u5dde\u548c\u8054\u90a6\uff09\u7684\u201c6,000\u81f37,000\u4efd\u5211\u4e8b\u548c\u56fd\u5bb6\u5b89\u5168\u4ee4\u72b6\u3001\u4f20\u7968\u548c\u547d\u4ee4\uff0c\u6d89\u53ca31,000\u81f332,000\u4e2a\u6d88\u8d39\u8005\u8d26\u6237\u201d\uff0c\u8fd9\u5bf9\u201c\u5fae\u8f6f\u5168\u7403\u5ba2\u6237\u7fa4\u4f53\u7684\u6781\u5c0f\u90e8\u5206\u201d\u4ea7\u751f\u4e86\u5f71\u54cd\u3002<\/p>\n\n\n\n<p>Google issued a statement criticizing the requirement that data be reported in aggregated form, stating that lumping national security requests with criminal request data would be &#8220;a step backwards&#8221; from its previous, more detailed practices on its website&#8217;s <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/www.google.com\/transparencyreport\/userdatarequests\/\" target=\"_blank\" rel=\"noreferrer noopener\">transparency report<\/a>. The company said that it would continue to seek government permission to publish the number and extent of FISA requests.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-123\" target=\"_blank\" rel=\"noreferrer noopener\">[123]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u8c37\u6b4c\u53d1\u8868\u4e86\u4e00\u4efd\u58f0\u660e\uff0c\u6279\u8bc4\u4e86\u8981\u6c42\u4ee5\u805a\u5408\u5f62\u5f0f\u62a5\u544a\u6570\u636e\u7684\u8981\u6c42\uff0c\u5e76\u8868\u793a\u5c06\u56fd\u5bb6\u5b89\u5168\u8bf7\u6c42\u4e0e\u5211\u4e8b\u8bf7\u6c42\u6570\u636e\u5408\u5e76\u5c06\u662f\u201c\u5012\u9000\u201d\uff0c\u76f8\u5bf9\u4e8e\u5176\u7f51\u7ad9\u900f\u660e\u5ea6\u62a5\u544a\u4e2d\u66f4\u8be6\u7ec6\u7684\u505a\u6cd5\u3002\u8be5\u516c\u53f8\u8868\u793a\u5c06\u7ee7\u7eed\u5bfb\u6c42\u653f\u5e9c\u8bb8\u53ef\uff0c\u4ee5\u516c\u5f00\u53d1\u5e03FISA\u8bf7\u6c42\u7684\u6570\u91cf\u548c\u8303\u56f4\u3002<\/p>\n\n\n\n<p><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Cisco_Systems\" target=\"_blank\" rel=\"noreferrer noopener\">Cisco Systems<\/a> saw a huge drop in export sales because of fears that the National Security Agency could be using backdoors in its products.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-124\" target=\"_blank\" rel=\"noreferrer noopener\">[124]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u7531\u4e8e\u62c5\u5fc3\u7f8e\u56fd\u56fd\u5bb6\u5b89\u5168\u5c40\u53ef\u80fd\u5728\u5176\u4ea7\u54c1\u4e2d\u4f7f\u7528\u540e\u95e8\uff0c\u601d\u79d1\u7cfb\u7edf\u7684\u51fa\u53e3\u9500\u552e\u51fa\u73b0\u4e86\u5927\u5e45\u4e0b\u964d\u3002<\/p>\n\n\n\n<p>On September 12, 2014, Yahoo! reported the U.S. Government threatened the imposition of $250,000 in fines per day if Yahoo didn&#8217;t hand over user data as part of the NSA&#8217;s PRISM program.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Yahoo_Policy_statement-125\" target=\"_blank\" rel=\"noreferrer noopener\">[125]<\/a> It is not known if other companies were threatened or fined for not providing data in response to a legitimate FISA requests.<br>\u53c2\u8003\u8bd1\u6587\uff1a2014\u5e749\u670812\u65e5\uff0c\u96c5\u864e\u516c\u53f8\u62a5\u544a\u79f0\uff0c\u7f8e\u56fd\u653f\u5e9c\u5a01\u80c1\u8981\u6bcf\u5929\u5bf9\u96c5\u864e\u516c\u53f8\u5904\u4ee525\u4e07\u7f8e\u5143\u7684\u7f5a\u6b3e\uff0c\u5982\u679c\u96c5\u864e\u4e0d\u6309\u7167\u7f8e\u56fd\u56fd\u5bb6\u5b89\u5168\u5c40\u7684PRISM\u8ba1\u5212\u8981\u6c42\u63d0\u4f9b\u7528\u6237\u6570\u636e\u3002\u76ee\u524d\u5c1a\u4e0d\u6e05\u695a\u662f\u5426\u6709\u5176\u4ed6\u516c\u53f8\u56e0\u672a\u80fd\u6309\u5408\u6cd5FISA\u8bf7\u6c42\u63d0\u4f9b\u6570\u636e\u800c\u53d7\u5230\u5a01\u80c1\u6216\u7f5a\u6b3e\u3002<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h_660481013_5\">3.4 \u516c\u4f17\u548c\u5a92\u4f53\u53cd\u5e94 | Public and media response<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3.4.1 \u7f8e\u56fd\u56fd\u5185 | Domestic<\/strong><\/h4>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/pic1.zhimg.com\/80\/v2-3c9c1019de084d9b364c1e06d0511ad0_720w.webp\" alt=\"\"\/><figcaption class=\"wp-element-caption\">\u6b64\u56fe\u7247\u9002\u7528CC-BY 2.0\u534f\u8bae<\/figcaption><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">\u56fe\u7247\u9898\u6ce8\uff1aAn elaborate <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Graffiti\" target=\"_blank\" rel=\"noreferrer noopener\">graffiti<\/a> in <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Columbus%2C_Ohio\" target=\"_blank\" rel=\"noreferrer noopener\">Columbus<\/a>, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Ohio\" target=\"_blank\" rel=\"noreferrer noopener\">Ohio<\/a>, United States, satirizing comprehensive <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Surveillance\" target=\"_blank\" rel=\"noreferrer noopener\">surveillance<\/a> of <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Telecommunications\" target=\"_blank\" rel=\"noreferrer noopener\">telecommunications<\/a> <\/p>\n\n\n\n<p class=\"has-small-font-size\">\u53c2\u8003\u8bd1\u6587\uff1a\u7f8e\u56fd\u4fc4\u4ea5\u4fc4\u5dde\u54e5\u4f26\u5e03\u5e02\u7cbe\u7f8e\u6d82\u9e26\uff0c\u8bbd\u523a\u7535\u4fe1\u5168\u9762\u76d1\u63a7<\/p>\n<cite>\u56fe\u7247\u6765\u6e90\uff1aJeff Schuler &#8211; <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/secure.flickr.com\/photos\/jeffschuler\/2585181312\/in\/set-72157604249628154\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/secure.flickr.com\/photos\/jeffschuler\/2585181312\/in\/set-72157604249628154<\/a><\/cite><\/blockquote>\n\n\n\n<p><em><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/The_New_York_Times\" target=\"_blank\" rel=\"noreferrer noopener\">The New York Times<\/a><\/em> editorial board charged that the Obama administration &#8220;has now lost all credibility on this issue,&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-126\" target=\"_blank\" rel=\"noreferrer noopener\">[126]<\/a> and lamented that &#8220;for years, members of Congress ignored evidence that domestic intelligence-gathering had grown beyond their control, and, even now, few seem disturbed to learn that every detail about the public&#8217;s calling and texting habits now reside in a N.S.A. database.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-127\" target=\"_blank\" rel=\"noreferrer noopener\">[127]<\/a> It wrote with respect to the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/United_States_Foreign_Intelligence_Surveillance_Court\" target=\"_blank\" rel=\"noreferrer noopener\">FISA-Court<\/a> in context of PRISM that it is &#8220;a perversion of the American justice system&#8221; when &#8220;judicial secrecy is coupled with a one-sided presentation of the issues.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-NYTEB20130708-128\" target=\"_blank\" rel=\"noreferrer noopener\">[128]<\/a> According to the New York Times, &#8220;the result is a court whose reach is expanding far beyond its original mandate and without any substantive check.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-NYTEB20130708-128\" target=\"_blank\" rel=\"noreferrer noopener\">[128]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u300a\u7ebd\u7ea6\u65f6\u62a5\u300b\u793e\u8bba\u677f\u6307\u8d23\u5965\u5df4\u9a6c\u653f\u5e9c\u201c\u5728\u8fd9\u4e2a\u95ee\u9898\u4e0a\u5df2\u7ecf\u5931\u53bb\u4e86\u6240\u6709\u7684\u4fe1\u8a89\u201d\uff0c\u5e76\u60b2\u53f9\u201c\u591a\u5e74\u6765\uff0c\u56fd\u4f1a\u8bae\u5458\u5ffd\u89c6\u4e86\u56fd\u5185\u60c5\u62a5\u6536\u96c6\u5df2\u7ecf\u8d85\u51fa\u4ed6\u4eec\u63a7\u5236\u8303\u56f4\u7684\u8bc1\u636e\uff0c\u751a\u81f3\u73b0\u5728\uff0c\u5f88\u5c11\u6709\u4eba\u5bf9\u5f97\u77e5\u516c\u4f17\u901a\u8bdd\u548c\u77ed\u4fe1\u4e60\u60ef\u7684\u6bcf\u4e00\u4e2a\u7ec6\u8282\u90fd\u5b58\u50a8\u5728N.S.A.\u6570\u636e\u5e93\u4e2d\u611f\u5230\u4e0d\u5b89\u3002\u201d\u793e\u8bba\u6307\u51fa\uff0c\u5c31PRISM\u8ba1\u5212\u800c\u8a00\uff0cFISA\u6cd5\u5ead\u662f\u201c\u7f8e\u56fd\u53f8\u6cd5\u7cfb\u7edf\u7684\u4e00\u79cd\u53d8\u6001\u201d\uff0c\u56e0\u4e3a\u201c\u53f8\u6cd5\u4fdd\u5bc6\u4e0e\u5355\u65b9\u9762\u9648\u8ff0\u7684\u95ee\u9898\u76f8\u7ed3\u5408\u3002\u201d\u300a\u7ebd\u7ea6\u65f6\u62a5\u300b\u8fd8\u6307\u51fa\uff0c\u201c\u7ed3\u679c\u662f\u4e00\u4e2a\u6cd5\u9662\u7684\u6743\u529b\u8d85\u51fa\u4e86\u6700\u521d\u7684\u6388\u6743\u8303\u56f4\uff0c\u5e76\u4e14\u6ca1\u6709\u4efb\u4f55\u5b9e\u8d28\u6027\u7684\u9650\u5236\u3002\u201d<\/p>\n\n\n\n<p><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/James_Robertson_%28judge%29\" target=\"_blank\" rel=\"noreferrer noopener\">James Robertson<\/a>, a former federal district judge based in Washington who served on the secret Foreign Intelligence Surveillance Act court for three years between 2002 and 2005 and who ruled against the Bush administration in the landmark <em><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Hamdan_v._Rumsfeld\" target=\"_blank\" rel=\"noreferrer noopener\">Hamdan v. Rumsfeld<\/a><\/em> case, said FISA court is independent but flawed because only the government&#8217;s side is represented effectively in its deliberations. &#8220;Anyone who has been a judge will tell you a judge needs to hear both sides of a case,&#8221; said James Robertson.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-APRobertson20130709-129\" target=\"_blank\" rel=\"noreferrer noopener\">[129]<\/a> Without this judges do not benefit from adversarial debate. He suggested creating an advocate with security clearance who would argue against government filings.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-NYTAPRobertson20130709-130\" target=\"_blank\" rel=\"noreferrer noopener\">[130]<\/a> Robertson questioned whether the secret FISA court should provide overall legal approval for the surveillance programs, saying the court &#8220;has turned into something like an administrative agency.&#8221; Under the changes brought by the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Foreign_Intelligence_Surveillance_Act_of_1978_Amendments_Act_of_2008\" target=\"_blank\" rel=\"noreferrer noopener\">Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008<\/a>, which expanded the US government&#8217;s authority by forcing the court to approve entire surveillance systems and not just surveillance warrants as it previously handled, &#8220;the court is now approving programmatic surveillance. I don&#8217;t think that is a judicial function.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-APRobertson20130709-129\" target=\"_blank\" rel=\"noreferrer noopener\">[129]<\/a> Robertson also said he was &#8220;frankly stunned&#8221; by the New York Times report<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-NYT20130706-78\" target=\"_blank\" rel=\"noreferrer noopener\">[78]<\/a> that FISA court rulings had created a new body of law broadening the ability of the NSA to use its surveillance programs to target not only terrorists but suspects in cases involving espionage, cyberattacks and weapons of mass destruction.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-APRobertson20130709-129\" target=\"_blank\" rel=\"noreferrer noopener\">[129]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u8a79\u59c6\u65af\u00b7\u7f57\u4f2f\u900a\uff08James Robertson\uff09\u662f\u4e00\u4f4d\u524d\u8054\u90a6\u5730\u533a\u6cd5\u5b98\uff0c\u66fe\u57282002\u5e74\u81f32005\u5e74\u671f\u95f4\u62c5\u4efb\u79d8\u5bc6\u7684\u5916\u56fd\u60c5\u62a5\u76d1\u89c6\u6cd5\u5ead\u6210\u5458\uff0c\u4ed6\u5728\u5177\u6709\u91cc\u7a0b\u7891\u610f\u4e49\u7684\u6c49\u59c6\u4e39\u8bc9\u62c9\u59c6\u65af\u83f2\u5c14\u5fb7\u6848\u4e2d\u53cd\u5bf9\u4e86\u5e03\u4ec0\u653f\u5e9c\u7684\u89c2\u70b9\u3002\u4ed6\u8868\u793a\uff0cFISA\u6cd5\u5ead\u662f\u72ec\u7acb\u7684\uff0c\u4f46\u5b58\u5728\u7f3a\u9677\uff0c\u56e0\u4e3a\u5b83\u7684\u8ba8\u8bba\u53ea\u6709\u653f\u5e9c\u4e00\u65b9\u6709\u6548\u5730\u8868\u8fbe\u4e86\u89c2\u70b9\u3002\u7f57\u4f2f\u900a\u8bf4\uff1a\u201c\u4efb\u4f55\u4e00\u4e2a\u62c5\u4efb\u8fc7\u6cd5\u5b98\u7684\u4eba\u90fd\u4f1a\u544a\u8bc9\u4f60\uff0c\u6cd5\u5b98\u9700\u8981\u542c\u53d6\u6848\u4ef6\u7684\u53cc\u65b9\u89c2\u70b9\u3002\u201d\u6ca1\u6709\u8fd9\u4e00\u70b9\uff0c\u6cd5\u5b98\u65e0\u6cd5\u53d7\u76ca\u4e8e\u5bf9\u7acb\u7684\u8fa9\u8bba\u3002\u4ed6\u5efa\u8bae\u8bbe\u7acb\u4e00\u4e2a\u62e5\u6709\u5b89\u5168\u8bb8\u53ef\u7684\u8fa9\u62a4\u5f8b\u5e08\uff0c\u8d1f\u8d23\u53cd\u9a73\u653f\u5e9c\u7684\u6587\u4ef6\u3002\u7f57\u4f2f\u900a\u5bf9\u4e8e\u79d8\u5bc6\u7684FISA\u6cd5\u5ead\u662f\u5426\u5e94\u8be5\u5bf9\u76d1\u89c6\u8ba1\u5212\u63d0\u4f9b\u6574\u4f53\u7684\u6cd5\u5f8b\u6279\u51c6\u8868\u793a\u8d28\u7591\uff0c\u4ed6\u79f0\u6cd5\u5ead\u201c\u5df2\u7ecf\u53d8\u6210\u4e86\u7c7b\u4f3c\u884c\u653f\u673a\u6784\u7684\u4e1c\u897f\u201d\u3002\u6839\u636e2008\u5e74\u300a\u5916\u56fd\u60c5\u62a5\u76d1\u89c6\u6cd5\u4fee\u6b63\u6cd5\u6848\u300b\uff0c\u6269\u5927\u4e86\u7f8e\u56fd\u653f\u5e9c\u7684\u6743\u529b\uff0c\u8981\u6c42\u6cd5\u9662\u6279\u51c6\u6574\u4e2a\u76d1\u89c6\u7cfb\u7edf\uff0c\u800c\u4e0d\u4ec5\u4ec5\u662f\u4e4b\u524d\u5904\u7406\u7684\u76d1\u89c6\u4ee4\uff0c\u201c\u6cd5\u5ead\u73b0\u5728\u6b63\u5728\u6279\u51c6\u8ba1\u5212\u6027\u7684\u76d1\u89c6\u3002\u6211\u8ba4\u4e3a\u8fd9\u4e0d\u662f\u4e00\u4e2a\u53f8\u6cd5\u804c\u80fd\u3002\u201d\u7f57\u4f2f\u900a\u8fd8\u8868\u793a\uff0c\u4ed6\u5bf9\u300a\u7ebd\u7ea6\u65f6\u62a5\u300b\u7684\u62a5\u5bfc\u611f\u5230\u201c\u975e\u5e38\u9707\u60ca\u201d\uff0c\u8be5\u62a5\u62a5\u9053\u79f0FISA\u6cd5\u5ead\u7684\u88c1\u51b3\u521b\u7acb\u4e86\u4e00\u6279\u65b0\u7684\u6cd5\u5f8b\uff0c\u4ece\u800c\u6269\u5927\u4e86NSA\u5229\u7528\u5176\u76d1\u89c6\u8ba1\u5212\u4e0d\u4ec5\u9488\u5bf9\u6050\u6016\u5206\u5b50\uff0c\u8fd8\u5305\u62ec\u95f4\u8c0d\u6d3b\u52a8\u3001\u7f51\u7edc\u653b\u51fb\u548c\u5927\u89c4\u6a21\u6740\u4f24\u6027\u6b66\u5668\u7591\u72af\u7684\u80fd\u529b\u3002<\/p>\n\n\n\n<p>Former <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Central_Intelligence_Agency\" target=\"_blank\" rel=\"noreferrer noopener\">CIA<\/a> analyst <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Valerie_Plame_Wilson\" target=\"_blank\" rel=\"noreferrer noopener\">Valerie Plame Wilson<\/a> and former U.S. diplomat <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Joseph_C._Wilson\" target=\"_blank\" rel=\"noreferrer noopener\">Joseph Wilson<\/a>, writing in an <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Op-ed\" target=\"_blank\" rel=\"noreferrer noopener\">op-ed<\/a> article published in <em>The Guardian<\/em>, said that &#8220;Prism and other NSA data-mining programs might indeed be very effective in hunting and capturing actual terrorists, but we don&#8217;t have enough information as a society to make that decision.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-131\" target=\"_blank\" rel=\"noreferrer noopener\">[131]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u524d\u4e2d\u60c5\u5c40\u5206\u6790\u5458\u74e6\u83b1\u4e3d\u00b7\u666e\u83b1\u59c6\u00b7\u5a01\u5c14\u900a\uff08Valerie Plame Wilson\uff09\u548c\u524d\u7f8e\u56fd\u5916\u4ea4\u5b98\u7ea6\u745f\u592b\u00b7\u5a01\u5c14\u900a\uff08Joseph Wilson\uff09\u5728\u300a\u536b\u62a5\u300b\u4e0a\u53d1\u8868\u7684\u4e00\u7bc7\u8bc4\u8bba\u6587\u7ae0\u4e2d\u5199\u9053\uff1a\u201cPrism\u548c\u5176\u4ed6NSA\u7684\u6570\u636e\u6316\u6398\u8ba1\u5212\u53ef\u80fd\u786e\u5b9e\u5728\u8ffd\u6355\u548c\u6355\u83b7\u771f\u6b63\u7684\u6050\u6016\u5206\u5b50\u65b9\u9762\u975e\u5e38\u6709\u6548\uff0c\u4f46\u4f5c\u4e3a\u4e00\u4e2a\u793e\u4f1a\uff0c\u6211\u4eec\u6ca1\u6709\u8db3\u591f\u7684\u4fe1\u606f\u6765\u505a\u51fa\u8fd9\u4e2a\u51b3\u5b9a\u3002\u201d<\/p>\n\n\n\n<p>The <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Electronic_Frontier_Foundation\" target=\"_blank\" rel=\"noreferrer noopener\">Electronic Frontier Foundation<\/a> (EFF), an international non-profit <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Digital_rights\" target=\"_blank\" rel=\"noreferrer noopener\">digital-rights<\/a> group based in the U.S., is hosting a tool, by which an American resident can write to their government representatives regarding their opposition to mass spying.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-132\" target=\"_blank\" rel=\"noreferrer noopener\">[132]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u7535\u5b50\u524d\u6cbf\u57fa\u91d1\u4f1a\uff08Electronic Frontier Foundation\uff0cEFF\uff09\u662f\u4e00\u4e2a\u603b\u90e8\u4f4d\u4e8e\u7f8e\u56fd\u7684\u56fd\u9645\u975e\u8425\u5229\u6570\u5b57\u6743\u5229\u7ec4\u7ec7\uff0c\u4ed6\u4eec\u63d0\u4f9b\u4e86\u4e00\u79cd\u5de5\u5177\uff0c\u8ba9\u7f8e\u56fd\u5c45\u6c11\u53ef\u4ee5\u81f4\u4fe1\u4ed6\u4eec\u7684\u653f\u5e9c\u4ee3\u8868\uff0c\u8868\u8fbe\u4ed6\u4eec\u53cd\u5bf9\u5927\u89c4\u6a21\u76d1\u89c6\u7684\u7acb\u573a\u3002<\/p>\n\n\n\n<p>The Obama administration&#8217;s argument that NSA surveillance programs such as PRISM and <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Boundless_Informant\" target=\"_blank\" rel=\"noreferrer noopener\">Boundless Informant<\/a> had been necessary to prevent acts of terrorism was challenged by several parties. Ed Pilkington and Nicholas Watt of <em>The Guardian<\/em> said of the case of <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Najibullah_Zazi\" target=\"_blank\" rel=\"noreferrer noopener\">Najibullah Zazi<\/a>, who had planned to bomb the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/New_York_City_Subway\" target=\"_blank\" rel=\"noreferrer noopener\">New York City Subway<\/a>, that interviews with involved parties and U.S. and British court documents indicated that the investigation into the case had actually been initiated in response to &#8220;conventional&#8221; surveillance methods such as &#8220;old-fashioned tip-offs&#8221; of the British intelligence services, rather than to leads produced by NSA surveillance.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-PilkingtonWatt-133\" target=\"_blank\" rel=\"noreferrer noopener\">[133]<\/a> Michael Daly of <em><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/The_Daily_Beast\" target=\"_blank\" rel=\"noreferrer noopener\">The Daily Beast<\/a><\/em> stated that even though <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Tamerlan_Tsarnaev\" target=\"_blank\" rel=\"noreferrer noopener\">Tamerlan Tsarnaev<\/a>, who conducted the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Boston_Marathon_bombing\" target=\"_blank\" rel=\"noreferrer noopener\">Boston Marathon bombing<\/a> with his brother <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Dzhokhar_Tsarnaev\" target=\"_blank\" rel=\"noreferrer noopener\">Dzhokhar Tsarnaev<\/a>, had visited the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Al_Qaeda\" target=\"_blank\" rel=\"noreferrer noopener\">Al Qaeda<\/a>-affiliated <em><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Inspire_%28magazine%29\" target=\"_blank\" rel=\"noreferrer noopener\">Inspire<\/a><\/em> magazine website, and even though Russian intelligence officials had raised concerns with U.S. intelligence officials about Tamerlan Tsarnaev, PRISM did not prevent him from carrying out the Boston attacks. Daly observed that, &#8220;The problem is not just what the National Security Agency is gathering at the risk of our privacy but what it is apparently unable to monitor at the risk of our safety.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-134\" target=\"_blank\" rel=\"noreferrer noopener\">[134]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u5965\u5df4\u9a6c\u653f\u5e9c\u58f0\u79f0\uff0cPRISM\u548cBoundless Informant\u7b49NSA\u76d1\u89c6\u8ba1\u5212\u662f\u4e3a\u4e86\u9884\u9632\u6050\u6016\u4e3b\u4e49\u884c\u4e3a\u800c\u5fc5\u8981\u7684\uff0c\u4f46\u8fd9\u4e00\u89c2\u70b9\u53d7\u5230\u591a\u65b9\u8d28\u7591\u3002\u300a\u536b\u62a5\u300b\u7684\u57c3\u5fb7\u00b7\u76ae\u5c14\u91d1\u987f\uff08Ed Pilkington\uff09\u548c\u5c3c\u53e4\u62c9\u65af\u00b7\u74e6\u7279\uff08Nicholas Watt\uff09\u5728\u5bf9\u7eb3\u5409\u5e03\u62c9\u00b7\u624e\u5179\uff08Najullah Zazi\uff09\u4e00\u6848\u8fdb\u884c\u7684\u91c7\u8bbf\u4ee5\u53ca\u7f8e\u56fd\u548c\u82f1\u56fd\u6cd5\u5ead\u6587\u4ef6\u4e2d\u6307\u51fa\uff0c\u8c03\u67e5\u6b64\u6848\u5b9e\u9645\u4e0a\u662f\u7531\u4e8e\u82f1\u56fd\u60c5\u62a5\u673a\u6784\u7684\u4f20\u7edf\u76d1\u89c6\u65b9\u6cd5\uff0c\u5982\u201c\u8001\u5f0f\u7ebf\u62a5\u201d\uff0c\u800c\u4e0d\u662fNSA\u76d1\u89c6\u4ea7\u751f\u7684\u7ebf\u7d22\uff0c\u8fd9\u4e00\u70b9\u5bf9\u5965\u5df4\u9a6c\u653f\u5e9c\u7684\u89c2\u70b9\u63d0\u51fa\u4e86\u8d28\u7591\u3002\u300a\u6bcf\u65e5\u91ce\u517d\u300b\u7684\u8fc8\u514b\u5c14\u00b7\u6234\u5229\uff08Michael Daly\uff09\u6307\u51fa\uff0c\u5c3d\u7ba1\u6267\u884c\u6ce2\u58eb\u987f\u9a6c\u62c9\u677e\u7206\u70b8\u6848\u7684\u5854\u739b\u5170\u00b7\u624e\u5c14\u7eb3\u8036\u592b\uff08Tamerlan Tsarnaev\uff09\u66fe\u8bbf\u95ee\u8fc7\u4e0e\u57fa\u5730\u7ec4\u7ec7\u6709\u5173\u7cfb\u7684\u300a\u9f13\u821e\u300b\u6742\u5fd7\u7684\u7f51\u7ad9\uff0c\u800c\u4e14\u4fc4\u7f57\u65af\u60c5\u62a5\u5b98\u5458\u66fe\u5411\u7f8e\u56fd\u60c5\u62a5\u5b98\u5458\u63d0\u51fa\u5bf9\u5854\u739b\u5170\u00b7\u624e\u5c14\u7eb3\u8036\u592b\u7684\u62c5\u5fe7\uff0c\u4f46PRISM\u5e76\u6ca1\u6709\u963b\u6b62\u4ed6\u5b9e\u65bd\u6ce2\u58eb\u987f\u88ad\u51fb\u3002\u6234\u5229\u89c2\u5bdf\u5230\uff1a\u201c\u95ee\u9898\u4e0d\u4ec5\u4ec5\u662f\u56fd\u5bb6\u5b89\u5168\u5c40\u5728\u4fb5\u72af\u6211\u4eec\u7684\u9690\u79c1\u7684\u540c\u65f6\u6536\u96c6\u4e86\u54ea\u4e9b\u4fe1\u606f\uff0c\u800c\u4e14\u662f\u4ed6\u4eec\u663e\u7136\u65e0\u6cd5\u76d1\u6d4b\u5230\u53ef\u80fd\u5371\u53ca\u6211\u4eec\u5b89\u5168\u7684\u4fe1\u606f\u3002\u201d<\/p>\n\n\n\n<p><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Ron_Paul\" target=\"_blank\" rel=\"noreferrer noopener\">Ron Paul<\/a>, a former Republican member of Congress and prominent <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Libertarianism\" target=\"_blank\" rel=\"noreferrer noopener\">libertarian<\/a>, thanked Snowden and Greenwald and denounced the mass surveillance as unhelpful and damaging, urging instead more transparency in U.S. government actions.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-paulpraises-135\" target=\"_blank\" rel=\"noreferrer noopener\">[135]<\/a> He called Congress &#8220;derelict in giving that much power to the government,&#8221; and said that had he been elected president, he would have ordered searches only when there was <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Probable_cause\" target=\"_blank\" rel=\"noreferrer noopener\">probable cause<\/a> of a crime having been committed, which he said was not how the PRISM program was being operated.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-136\" target=\"_blank\" rel=\"noreferrer noopener\">[136]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u524d\u5171\u548c\u515a\u56fd\u4f1a\u8bae\u5458\u3001\u8457\u540d\u81ea\u7531\u4e3b\u4e49\u8005\u7f57\u6069\u00b7\u4fdd\u7f57\uff08Ron Paul\uff09\u611f\u8c22\u65af\u8bfa\u767b\u548c\u683c\u6797\u6c83\u5c14\u5fb7\uff08Greenwald\uff09\uff0c\u8c34\u8d23\u5927\u89c4\u6a21\u76d1\u89c6\u7684\u65e0\u76ca\u548c\u6709\u5bb3\uff0c\u5e76\u6566\u4fc3\u7f8e\u56fd\u653f\u5e9c\u66f4\u52a0\u900f\u660e\u5730\u884c\u4e8b\u3002\u4ed6\u79f0\u56fd\u4f1a\u201c\u5bf9\u653f\u5e9c\u8d4b\u4e88\u4e86\u5982\u6b64\u5927\u7684\u6743\u529b\u662f\u5931\u804c\u7684\u201d\uff0c\u5e76\u8868\u793a\u5982\u679c\u4ed6\u5f53\u9009\u603b\u7edf\uff0c\u4ed6\u53ea\u4f1a\u5728\u6709\u72af\u7f6a\u53ef\u80fd\u7684\u60c5\u51b5\u4e0b\u624d\u4e0b\u4ee4\u641c\u67e5\uff0c\u800c\u8fd9\u5e76\u4e0d\u662fPRISM\u8ba1\u5212\u7684\u8fd0\u4f5c\u65b9\u5f0f\u3002<\/p>\n\n\n\n<p><em>New York Times<\/em> columnist <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Thomas_L._Friedman\" target=\"_blank\" rel=\"noreferrer noopener\">Thomas L. Friedman<\/a> defended limited government surveillance programs intended to protect the American people from terrorist acts:<br>\u53c2\u8003\u8bd1\u6587\uff1a\u300a\u7ebd\u7ea6\u65f6\u62a5\u300b\u4e13\u680f\u4f5c\u5bb6\u6258\u9a6c\u65af\u00b7L\u00b7\u5f17\u91cc\u5fb7\u66fc (Thomas L. Friedman) \u4e3a\u65e8\u5728\u4fdd\u62a4\u7f8e\u56fd\u4eba\u6c11\u514d\u53d7\u6050\u6016\u4e3b\u4e49\u884c\u4e3a\u4fb5\u5bb3\u7684\u6709\u9650\u653f\u5e9c\u76d1\u63a7\u8ba1\u5212\u8fdb\u884c\u4e86\u8fa9\u62a4\uff1a<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">Yes, I worry about potential government abuse of privacy from a program designed to prevent another 9\/11\u2014abuse that, so far, does not appear to have happened. But I worry even more about another 9\/11. &#8230; If there were another 9\/11, I fear that 99 percent of Americans would tell their members of Congress: &#8220;Do whatever you need to do to, privacy be damned, just make sure this does not happen again.&#8221; <em>That<\/em> is what I fear most. That is why I&#8217;ll reluctantly, very reluctantly, trade off the government using data mining to look for suspicious patterns in phone numbers called and e-mail addresses\u2014and then have to go to a judge to get a warrant to actually look at the content under guidelines set by Congress\u2014to prevent a day where, out of fear, we give government a license to look at anyone, any e-mail, any phone call, anywhere, anytime.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-fried-137\" target=\"_blank\" rel=\"noreferrer noopener\">[137]<\/a><\/p>\n<cite>\u53c2\u8003\u8bd1\u6587\uff1a\u662f\u7684\uff0c\u6211\u62c5\u5fc3\u4e00\u4e2a\u65e8\u5728\u9632\u6b62\u53e6\u4e00\u6b219\/11\u7684\u8ba1\u5212\u53ef\u80fd\u4f1a\u88ab\u653f\u5e9c\u6ee5\u7528\u9690\u79c1\u6743\uff0c\u4f46\u8fc4\u4eca\u4e3a\u6b62\uff0c\u4f3c\u4e4e\u5e76\u6ca1\u6709\u53d1\u751f\u6ee5\u7528\u7684\u60c5\u51b5\u3002\u4f46\u6211\u66f4\u62c5\u5fc3\u7684\u662f\u53e6\u4e00\u6b219\/11\u7684\u53d1\u751f\u3002\u2026\u2026\u5982\u679c\u518d\u6b21\u53d1\u751f9\/11\uff0c\u6211\u62c5\u5fc399%\u7684\u7f8e\u56fd\u4eba\u4f1a\u544a\u8bc9\u4ed6\u4eec\u7684\u56fd\u4f1a\u8bae\u5458\uff1a\u201c\u4e0d\u7ba1\u4f60\u4eec\u9700\u8981\u505a\u4ec0\u4e48\uff0c\u9690\u79c1\u6743\u90fd\u53ef\u4ee5\u4e0d\u987e\uff0c\u53ea\u8981\u786e\u4fdd\u8fd9\u79cd\u60c5\u51b5\u4e0d\u518d\u53d1\u751f\u3002\u201d\u8fd9\u662f\u6211\u6700\u62c5\u5fc3\u7684\u3002\u8fd9\u5c31\u662f\u4e3a\u4ec0\u4e48\u6211\u4e0d\u60c5\u613f\u3001\u975e\u5e38\u4e0d\u60c5\u613f\u5730\u4f1a\u4ea4\u6362\u653f\u5e9c\u4f7f\u7528\u6570\u636e\u6316\u6398\u6765\u5bfb\u627e\u7535\u8bdd\u53f7\u7801\u548c\u7535\u5b50\u90ae\u4ef6\u5730\u5740\u4e2d\u7684\u53ef\u7591\u6a21\u5f0f\uff0c\u5e76\u4e14\u5fc5\u987b\u6839\u636e\u56fd\u4f1a\u5236\u5b9a\u7684\u6307\u5bfc\u65b9\u9488\u5411\u6cd5\u5b98\u7533\u8bf7\u8bb8\u53ef\u624d\u80fd\u67e5\u770b\u5185\u5bb9\uff0c\u4ee5\u9632\u6b62\u4e00\u5929\uff0c\u51fa\u4e8e\u6050\u60e7\uff0c\u6211\u4eec\u7ed9\u4e88\u653f\u5e9c\u67e5\u770b\u4efb\u4f55\u4eba\u3001\u4efb\u4f55\u7535\u5b50\u90ae\u4ef6\u3001\u4efb\u4f55\u7535\u8bdd\u7684\u8bb8\u53ef\u6743\uff0c\u65e0\u8bba\u4f55\u65f6\u4f55\u5730\u3002<\/cite><\/blockquote>\n\n\n\n<p>Political commentator <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/David_Brooks_%28journalist%29\" target=\"_blank\" rel=\"noreferrer noopener\">David Brooks<\/a> similarly cautioned that government data surveillance programs are a necessary evil: &#8220;if you don&#8217;t have mass data sweeps, well, then these agencies are going to want to go back to the old-fashioned eavesdropping, which is a lot more intrusive.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-138\" target=\"_blank\" rel=\"noreferrer noopener\">[138]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u653f\u6cbb\u8bc4\u8bba\u5bb6\u5927\u536b\u00b7\u5e03\u9c81\u514b\u65af\uff08David Brooks\uff09\u540c\u6837\u8b66\u544a\u79f0\uff0c\u653f\u5e9c\u7684\u6570\u636e\u76d1\u89c6\u8ba1\u5212\u662f\u4e00\u79cd\u5fc5\u8981\u7684\u6076\uff1a\u201c\u5982\u679c\u6ca1\u6709\u5927\u89c4\u6a21\u7684\u6570\u636e\u626b\u63cf\uff0c\u90a3\u4e48\u8fd9\u4e9b\u673a\u6784\u5c06\u4f1a\u5e0c\u671b\u56de\u5230\u4f20\u7edf\u7684\u7a83\u542c\u65b9\u5f0f\uff0c\u8fd9\u79cd\u65b9\u5f0f\u66f4\u52a0\u4fb5\u5165\u6027\u3002\u201d<\/p>\n\n\n\n<p>Conservative commentator <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Charles_Krauthammer\" target=\"_blank\" rel=\"noreferrer noopener\">Charles Krauthammer<\/a> worried less about the legality of PRISM and other NSA surveillance tools than about the potential for their abuse without more stringent oversight. &#8220;The problem here is not constitutionality. &#8230; We need a toughening of both congressional oversight and judicial review, perhaps even some independent outside scrutiny. Plus periodic legislative revision\u2014say, reauthorization every couple of years\u2014in light of the efficacy of the safeguards and the nature of the external threat. The object is not to abolish these vital programs. It&#8217;s to fix them.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-139\" target=\"_blank\" rel=\"noreferrer noopener\">[139]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u4fdd\u5b88\u6d3e\u8bc4\u8bba\u5bb6\u67e5\u5c14\u65af\u00b7\u514b\u52b3\u585e\u9ed8\uff08Charles Krauthammer\uff09\u66f4\u62c5\u5fc3PRISM\u548c\u5176\u4ed6NSA\u76d1\u89c6\u5de5\u5177\u7684\u6ee5\u7528\u53ef\u80fd\u6027\uff0c\u800c\u4e0d\u662f\u5176\u5408\u6cd5\u6027\u95ee\u9898\u3002\u4ed6\u8bf4\uff1a\u201c\u95ee\u9898\u4e0d\u5728\u4e8e\u5408\u5baa\u6027\u2026\u2026\u6211\u4eec\u9700\u8981\u52a0\u5f3a\u56fd\u4f1a\u76d1\u7763\u548c\u53f8\u6cd5\u5ba1\u67e5\uff0c\u751a\u81f3\u53ef\u80fd\u9700\u8981\u4e00\u4e9b\u72ec\u7acb\u7684\u5916\u90e8\u5ba1\u67e5\u3002\u6b64\u5916\uff0c\u8fd8\u9700\u8981\u5b9a\u671f\u7684\u7acb\u6cd5\u4fee\u8ba2\uff0c\u6bd4\u5982\u6bcf\u9694\u51e0\u5e74\u91cd\u65b0\u6388\u6743\uff0c\u4ee5\u9002\u5e94\u4fdd\u969c\u63aa\u65bd\u7684\u6709\u6548\u6027\u548c\u5916\u90e8\u5a01\u80c1\u7684\u6027\u8d28\u3002\u76ee\u6807\u4e0d\u662f\u5e9f\u9664\u8fd9\u4e9b\u91cd\u8981\u7684\u8ba1\u5212\uff0c\u800c\u662f\u4fee\u590d\u5b83\u4eec\u3002\u201d<\/p>\n\n\n\n<p>In a blog post, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/David_Simon\" target=\"_blank\" rel=\"noreferrer noopener\">David Simon<\/a>, the creator of <em><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/The_Wire\" target=\"_blank\" rel=\"noreferrer noopener\">The Wire<\/a><\/em>, compared the NSA&#8217;s programs, including PRISM, to a 1980s effort by the City of Baltimore to add dialed number recorders to all pay phones to know which individuals were being called by the callers;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-DuncanDavidSimon-140\" target=\"_blank\" rel=\"noreferrer noopener\">[140]<\/a> the city believed that drug traffickers were using pay phones and pagers, and a municipal judge allowed the city to place the recorders. The placement of the dialers formed the basis of the show&#8217;s first season. Simon argued that the media attention regarding the NSA programs is a &#8220;faux scandal.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-DuncanDavidSimon-140\" target=\"_blank\" rel=\"noreferrer noopener\">[140]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-141\" target=\"_blank\" rel=\"noreferrer noopener\">[141]<\/a> Simon had stated that many classes of people in American society had already faced constant government surveillance.<br>\u53c2\u8003\u8bd1\u6587\uff1a\u5728\u4e00\u7bc7\u535a\u5ba2\u6587\u7ae0\u4e2d\uff0c\u300a\u706b\u7ebf\u300b\u7684\u521b\u4f5c\u8005\u5927\u536b\u00b7\u897f\u8499\uff08David Simon\uff09\u5c06NSA\u7684\u8ba1\u5212\uff0c\u5305\u62ecPRISM\u8ba1\u5212\uff0c\u4e0e20\u4e16\u7eaa80\u5e74\u4ee3\u5df4\u5c14\u7684\u6469\u5e02\u653f\u5e9c\u7684\u52aa\u529b\u8fdb\u884c\u4e86\u5bf9\u6bd4\uff0c\u5f53\u65f6\u4ed6\u4eec\u5728\u6240\u6709\u516c\u7528\u7535\u8bdd\u4e0a\u6dfb\u52a0\u4e86\u62e8\u53f7\u8bb0\u5f55\u5668\uff0c\u4ee5\u4e86\u89e3\u88ab\u547c\u53eb\u8005\u7684\u8eab\u4efd\uff1b\u57ce\u5e02\u8ba4\u4e3a\u6bd2\u8d29\u5728\u4f7f\u7528\u516c\u7528\u7535\u8bdd\u548c\u5bfb\u547c\u673a\uff0c\u4e00\u4f4d\u5e02\u653f\u6cd5\u5b98\u5141\u8bb8\u57ce\u5e02\u5b89\u88c5\u8bb0\u5f55\u5668\u3002\u8bbe\u7f6e\u8fd9\u4e9b\u62e8\u53f7\u5668\u6210\u4e3a\u8be5\u5267\u7b2c\u4e00\u5b63\u7684\u57fa\u7840\u3002\u897f\u8499\u8ba4\u4e3a\uff0c\u5a92\u4f53\u5bf9NSA\u8ba1\u5212\u7684\u5173\u6ce8\u662f\u4e00\u4e2a\u201c\u5047\u7684\u4e11\u95fb\u201d\u3002\u897f\u8499\u66fe\u8868\u793a\uff0c\u8bb8\u591a\u7f8e\u56fd\u793e\u4f1a\u7684\u9636\u5c42\u5df2\u7ecf\u9762\u4e34\u7740\u6301\u7eed\u7684\u653f\u5e9c\u76d1\u89c6\u3002<\/p>\n\n\n\n<p>Political activist, and frequent critic of U.S. government policies, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Noam_Chomsky\" target=\"_blank\" rel=\"noreferrer noopener\">Noam Chomsky<\/a> argued, &#8220;Governments should not have this capacity. But governments will use whatever technology is available to them to combat their primary enemy \u2013 which is their own population.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-142\" target=\"_blank\" rel=\"noreferrer noopener\">[142]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u653f\u6cbb\u6d3b\u52a8\u5bb6\u3001\u7ecf\u5e38\u6279\u8bc4\u7f8e\u56fd\u653f\u5e9c\u653f\u7b56\u7684\u8bfa\u59c6\u00b7\u4e54\u59c6\u65af\u57fa\u8ba4\u4e3a\uff0c\u201c\u653f\u5e9c\u4e0d\u5e94\u8be5\u62e5\u6709\u8fd9\u79cd\u80fd\u529b\u3002\u4f46\u653f\u5e9c\u5c06\u4f7f\u7528\u4ed6\u4eec\u53ef\u4ee5\u5229\u7528\u7684\u4efb\u4f55\u6280\u672f\u6765\u6253\u51fb\u4ed6\u4eec\u7684\u4e3b\u8981\u654c\u4eba\u2014\u2014\u4e5f\u5c31\u662f\u4ed6\u4eec\u81ea\u5df1\u7684\u4eba\u6c11\u3002\u201d[142]<\/p>\n\n\n\n<p>A <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/CNN\" target=\"_blank\" rel=\"noreferrer noopener\">CNN<\/a>\/<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Opinion_Research_Corporation\" target=\"_blank\" rel=\"noreferrer noopener\">Opinion Research Corporation<\/a> poll conducted June 11 through 13 and released in 2013 found that 66% of Americans generally supported the program.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-143\" target=\"_blank\" rel=\"noreferrer noopener\">[143]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-144\" target=\"_blank\" rel=\"noreferrer noopener\">[144]<\/a><sup><a href=\"https:\/\/zhuanlan.zhihu.com\/p\/660481013#ref_1\">[1]<\/a><\/sup> However, a Quinnipiac University poll conducted June 28 through July 8 and released in 2013 found that 45% of registered voters think the surveillance programs have gone too far, with 40% saying they do not go far enough, compared to 25% saying they had gone too far and 63% saying not far enough in 2010.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-146\" target=\"_blank\" rel=\"noreferrer noopener\">[145]<\/a> Other polls have shown similar shifts in public opinion as revelations about the programs were leaked.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-147\" target=\"_blank\" rel=\"noreferrer noopener\">[146]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-148\" target=\"_blank\" rel=\"noreferrer noopener\">[147]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a2013\u5e746\u670811\u65e5\u81f313\u65e5\u8fdb\u884c\u7684CNN\/\u610f\u89c1\u7814\u7a76\u516c\u53f8\u6c11\u610f\u8c03\u67e5\u53d1\u73b0\uff0c66%\u7684\u7f8e\u56fd\u4eba\u603b\u4f53\u4e0a\u652f\u6301\u8be5\u8ba1\u5212\u3002\u7136\u800c\uff0c2013\u5e746\u670828\u65e5\u81f37\u67088\u65e5\u671f\u95f4\u8fdb\u884c\u7684\u6606\u5c3c\u76ae\u4e9a\u514b\u5927\u5b66\u6c11\u610f\u8c03\u67e5\u53d1\u73b0\uff0c45%\u7684\u6ce8\u518c\u9009\u6c11\u8ba4\u4e3a\u76d1\u89c6\u8ba1\u5212\u5df2\u7ecf\u8fc7\u5206\uff0c40%\u7684\u4eba\u8868\u793a\u8fd9\u8fd8\u4e0d\u591f\uff0c\u800c\u57282010\u5e74\uff0c25%\u7684\u4eba\u8ba4\u4e3a\u5df2\u7ecf\u8fc7\u5206\uff0c63%\u7684\u4eba\u8ba4\u4e3a\u8fd8\u4e0d\u591f\u3002\u5176\u4ed6\u6c11\u610f\u8c03\u67e5\u4e5f\u663e\u793a\uff0c\u968f\u7740\u6709\u5173\u8fd9\u4e9b\u8ba1\u5212\u7684\u6cc4\u9732\uff0c\u516c\u4f17\u8206\u8bba\u51fa\u73b0\u4e86\u7c7b\u4f3c\u7684\u8f6c\u53d8\u3002<\/p>\n\n\n\n<p>In terms of economic impact, a study released in August by the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Information_Technology_and_Innovation_Foundation\" target=\"_blank\" rel=\"noreferrer noopener\">Information Technology and Innovation Foundation<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-149\" target=\"_blank\" rel=\"noreferrer noopener\">[148]<\/a> found that the disclosure of PRISM could cost the U.S. economy between $21.5 and $35 billion in lost cloud computing business over three years.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-150\" target=\"_blank\" rel=\"noreferrer noopener\">[149]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-151\" target=\"_blank\" rel=\"noreferrer noopener\">[150]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-152\" target=\"_blank\" rel=\"noreferrer noopener\">[151]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-153\" target=\"_blank\" rel=\"noreferrer noopener\">[152]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u5c31\u7ecf\u6d4e\u5f71\u54cd\u800c\u8a00\uff0c\u4fe1\u606f\u6280\u672f\u4e0e\u521b\u65b0\u57fa\u91d1\u4f1a[148] 8 \u6708\u4efd\u53d1\u5e03\u7684\u4e00\u9879\u7814\u7a76\u53d1\u73b0\uff0cPRISM \u7684\u62ab\u9732\u53ef\u80fd\u4f1a\u4f7f\u7f8e\u56fd\u7ecf\u6d4e\u5728\u4e09\u5e74\u5185\u56e0\u4e91\u8ba1\u7b97\u4e1a\u52a1\u635f\u5931\u800c\u635f\u5931 21.5 \u81f3 350 \u4ebf\u7f8e\u5143\u3002[149][ 150][151][152]<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3.4.2 \u56fd\u9645 | International<\/strong><\/h4>\n\n\n\n<p>Sentiment around the world was that of general displeasure upon learning the extent of world communication data mining. Some national leaders spoke against the NSA and some spoke against their own national surveillance. One national minister had scathing comments on the National Security Agency&#8217;s data-mining program, citing Benjamin Franklin: &#8220;The more a society monitors, controls, and observes its citizens, the less free it is.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-154\" target=\"_blank\" rel=\"noreferrer noopener\">[153]<\/a> Some question if the costs of hunting terrorists now overshadows the loss of citizen privacy.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-155\" target=\"_blank\" rel=\"noreferrer noopener\">[154]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-156\" target=\"_blank\" rel=\"noreferrer noopener\">[155]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u4e00\u65e6\u4e86\u89e3\u5230\u5168\u7403\u901a\u4fe1\u6570\u636e\u6316\u6398\u7684\u7a0b\u5ea6\uff0c\u4e16\u754c\u5404\u5730\u7684\u60c5\u7eea\u666e\u904d\u662f\u4e0d\u6ee1\u7684\u3002\u4e00\u4e9b\u56fd\u5bb6\u9886\u5bfc\u4eba\u5bf9NSA\u8868\u793a\u4e0d\u6ee1\uff0c\u4e00\u4e9b\u5219\u5bf9\u672c\u56fd\u7684\u76d1\u89c6\u6d3b\u52a8\u8868\u793a\u53cd\u5bf9\u3002\u4e00\u4f4d\u56fd\u5bb6\u90e8\u957f\u5bf9\u56fd\u5bb6\u5b89\u5168\u5c40\u7684\u6570\u636e\u6316\u6398\u8ba1\u5212\u53d1\u8868\u4e86\u5c16\u9510\u7684\u6279\u8bc4\uff0c\u5f15\u7528\u4e86\u672c\u6770\u660e\u00b7\u5bcc\u5170\u514b\u6797\u7684\u8bdd\uff1a\u201c\u4e00\u4e2a\u793e\u4f1a\u5bf9\u5176\u516c\u6c11\u8fdb\u884c\u76d1\u63a7\u3001\u63a7\u5236\u548c\u89c2\u5bdf\u7684\u7a0b\u5ea6\u8d8a\u9ad8\uff0c\u5b83\u7684\u81ea\u7531\u5c31\u8d8a\u5c11\u3002\u201d\u4e00\u4e9b\u4eba\u8d28\u7591\uff0c\u73b0\u5728\u6253\u51fb\u6050\u6016\u5206\u5b50\u7684\u6210\u672c\u662f\u5426\u8d85\u8fc7\u4e86\u516c\u6c11\u9690\u79c1\u7684\u635f\u5931\u3002<\/p>\n\n\n\n<p><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Nick_Xenophon\" target=\"_blank\" rel=\"noreferrer noopener\">Nick Xenophon<\/a>, an Australian independent senator, asked <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Bob_Carr\" target=\"_blank\" rel=\"noreferrer noopener\">Bob Carr<\/a>, the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Ministry_of_Foreign_Affairs_%28Australia%29\" target=\"_blank\" rel=\"noreferrer noopener\">Australian Minister of Foreign Affairs<\/a>, if e-mail addresses of Australian parliamentarians were exempt from PRISM, Mainway, Marina, and\/or Nucleon. After Carr replied that there was a legal framework to protect Australians but that the government would not comment on intelligence matters, Xenophon argued that this was not a specific answer to his question.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-157\" target=\"_blank\" rel=\"noreferrer noopener\">[156]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u6fb3\u5927\u5229\u4e9a\u72ec\u7acb\u53c2\u8bae\u5458\u5c3c\u514b\u00b7\u514b\u68ee\u7eb3\u95ee\u6fb3\u5927\u5229\u4e9a\u5916\u4ea4\u90e8\u957f\u9c8d\u52c3\u00b7\u5361\u5c14\uff0c\u6fb3\u5927\u5229\u4e9a\u8bae\u5458\u7684\u7535\u5b50\u90ae\u4ef6\u5730\u5740\u662f\u5426\u88ab\u8c41\u514d\u514d\u53d7PRISM\u3001Mainway\u3001Marina\u548c\/\u6216Nucleon\u7684\u5f71\u54cd\u3002\u5361\u5c14\u56de\u7b54\u8bf4\uff0c\u6709\u4e00\u4e2a\u6cd5\u5f8b\u6846\u67b6\u6765\u4fdd\u62a4\u6fb3\u5927\u5229\u4e9a\u4eba\uff0c\u4f46\u653f\u5e9c\u4e0d\u4f1a\u5bf9\u60c5\u62a5\u4e8b\u52a1\u53d1\u8868\u8bc4\u8bba\u3002\u514b\u68ee\u7eb3\u8ba4\u4e3a\u8fd9\u5e76\u4e0d\u662f\u5bf9\u4ed6\u95ee\u9898\u7684\u5177\u4f53\u56de\u7b54\u3002<\/p>\n\n\n\n<p><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Taliban\" target=\"_blank\" rel=\"noreferrer noopener\">Taliban<\/a> spokesperson Zabiullah Mujahid said, &#8220;We knew about their past efforts to trace our system. We have used our technical resources to foil their efforts and have been able to stop them from succeeding so far.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-158\" target=\"_blank\" rel=\"noreferrer noopener\">[157]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-159\" target=\"_blank\" rel=\"noreferrer noopener\">[158]<\/a> However CNN has reported that terrorist groups have changed their &#8220;communications behaviors&#8221; in response to the leaks.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-starr-cnn-2013-6025-63\" target=\"_blank\" rel=\"noreferrer noopener\">[63]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u5854\u5229\u73ed\u53d1\u8a00\u4eba\u624e\u6bd4\u4e4c\u62c9\u00b7\u7a46\u8d3e\u5e0c\u5fb7\u8868\u793a\uff1a\u201c\u6211\u4eec\u77e5\u9053\u4ed6\u4eec\u8fc7\u53bb\u8ffd\u8e2a\u6211\u4eec\u7cfb\u7edf\u7684\u52aa\u529b\u3002\u6211\u4eec\u5229\u7528\u6211\u4eec\u7684\u6280\u672f\u8d44\u6e90\u632b\u8d25\u4e86\u4ed6\u4eec\u7684\u52aa\u529b\uff0c\u5e76\u4e14\u4e00\u76f4\u6210\u529f\u5730\u963b\u6b62\u4e86\u4ed6\u4eec\u3002\u201d\u7136\u800c\uff0cCNN\u62a5\u9053\u79f0\uff0c\u6050\u6016\u7ec4\u7ec7\u5df2\u7ecf\u6539\u53d8\u4e86\u4ed6\u4eec\u7684\u201c\u901a\u4fe1\u884c\u4e3a\u201d\u4ee5\u5e94\u5bf9\u8fd9\u4e9b\u6cc4\u9732\u3002<\/p>\n\n\n\n<p>In 2013 the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Cloud_Security_Alliance\" target=\"_blank\" rel=\"noreferrer noopener\">Cloud Security Alliance<\/a> surveyed <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Cloud_computing\" target=\"_blank\" rel=\"noreferrer noopener\">cloud computing<\/a> stakeholders about their reactions to the US PRISM spying scandal. About 10% of non-US residents indicated that they had cancelled a project with a US-based cloud computing provider, in the wake of PRISM; 56% said that they would be less likely to use a US-based cloud computing service. The Alliance predicted that US cloud computing providers might lose as much as \u20ac26 billion and 20% of its share of cloud services in foreign markets because of the PRISM spying scandal.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-160\" target=\"_blank\" rel=\"noreferrer noopener\">[159]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a2013\u5e74\uff0c\u4e91\u5b89\u5168\u8054\u76df\u5bf9\u4e91\u8ba1\u7b97\u5229\u76ca\u76f8\u5173\u8005\u5c31\u7f8e\u56fdPRISM\u76d1\u63a7\u4e11\u95fb\u91c7\u53d6\u4e86\u8c03\u67e5\u3002\u7ea610%\u7684\u975e\u7f8e\u56fd\u5c45\u6c11\u8868\u793a\uff0c\u5728PRISM\u4e11\u95fb\u7206\u53d1\u540e\uff0c\u4ed6\u4eec\u53d6\u6d88\u4e86\u4e0e\u603b\u90e8\u4f4d\u4e8e\u7f8e\u56fd\u7684\u4e91\u8ba1\u7b97\u670d\u52a1\u63d0\u4f9b\u5546\u7684\u9879\u76ee\uff1b56%\u7684\u53d7\u8bbf\u8005\u8868\u793a\uff0c\u4ed6\u4eec\u5c06\u4e0d\u592a\u53ef\u80fd\u4f7f\u7528\u603b\u90e8\u4f4d\u4e8e\u7f8e\u56fd\u7684\u4e91\u8ba1\u7b97\u670d\u52a1\u3002\u4e91\u5b89\u5168\u8054\u76df\u9884\u6d4b\uff0c\u7531\u4e8ePRISM\u76d1\u63a7\u4e11\u95fb\uff0c\u7f8e\u56fd\u4e91\u8ba1\u7b97\u670d\u52a1\u63d0\u4f9b\u5546\u5728\u6d77\u5916\u5e02\u573a\u53ef\u80fd\u635f\u5931\u9ad8\u8fbe260\u4ebf\u6b27\u5143\u548c20%\u7684\u5e02\u573a\u4efd\u989d\u3002<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"hidden343\">3.4.3 \u4e2d\u56fd | China<\/h4>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/cathayvista.top\/wp-content\/uploads\/2023\/10\/Is_Snowden_a_Hero-_SnowdenHK_\u9999\u6e2f\u8072\u63f4\u65af\u8afe\u767b\u904a\u884c_Hong_Kong_Rally_to_Support_Snowden_SML.20130615.7D.42298-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/cathayvista.top\/wp-content\/uploads\/2023\/10\/Is_Snowden_a_Hero-_SnowdenHK_\u9999\u6e2f\u8072\u63f4\u65af\u8afe\u767b\u904a\u884c_Hong_Kong_Rally_to_Support_Snowden_SML.20130615.7D.42298-1024x683.jpg\" alt=\"\" class=\"wp-image-1535\" srcset=\"https:\/\/cathayvista.top\/wp-content\/uploads\/2023\/10\/Is_Snowden_a_Hero-_SnowdenHK_\u9999\u6e2f\u8072\u63f4\u65af\u8afe\u767b\u904a\u884c_Hong_Kong_Rally_to_Support_Snowden_SML.20130615.7D.42298-1024x683.jpg 1024w, https:\/\/cathayvista.top\/wp-content\/uploads\/2023\/10\/Is_Snowden_a_Hero-_SnowdenHK_\u9999\u6e2f\u8072\u63f4\u65af\u8afe\u767b\u904a\u884c_Hong_Kong_Rally_to_Support_Snowden_SML.20130615.7D.42298-300x200.jpg 300w, https:\/\/cathayvista.top\/wp-content\/uploads\/2023\/10\/Is_Snowden_a_Hero-_SnowdenHK_\u9999\u6e2f\u8072\u63f4\u65af\u8afe\u767b\u904a\u884c_Hong_Kong_Rally_to_Support_Snowden_SML.20130615.7D.42298-768x512.jpg 768w, https:\/\/cathayvista.top\/wp-content\/uploads\/2023\/10\/Is_Snowden_a_Hero-_SnowdenHK_\u9999\u6e2f\u8072\u63f4\u65af\u8afe\u767b\u904a\u884c_Hong_Kong_Rally_to_Support_Snowden_SML.20130615.7D.42298-1536x1024.jpg 1536w, https:\/\/cathayvista.top\/wp-content\/uploads\/2023\/10\/Is_Snowden_a_Hero-_SnowdenHK_\u9999\u6e2f\u8072\u63f4\u65af\u8afe\u767b\u904a\u884c_Hong_Kong_Rally_to_Support_Snowden_SML.20130615.7D.42298-2048x1365.jpg 2048w, https:\/\/cathayvista.top\/wp-content\/uploads\/2023\/10\/Is_Snowden_a_Hero-_SnowdenHK_\u9999\u6e2f\u8072\u63f4\u65af\u8afe\u767b\u904a\u884c_Hong_Kong_Rally_to_Support_Snowden_SML.20130615.7D.42298-1000x667.jpg 1000w, https:\/\/cathayvista.top\/wp-content\/uploads\/2023\/10\/Is_Snowden_a_Hero-_SnowdenHK_\u9999\u6e2f\u8072\u63f4\u65af\u8afe\u767b\u904a\u884c_Hong_Kong_Rally_to_Support_Snowden_SML.20130615.7D.42298-230x153.jpg 230w, https:\/\/cathayvista.top\/wp-content\/uploads\/2023\/10\/Is_Snowden_a_Hero-_SnowdenHK_\u9999\u6e2f\u8072\u63f4\u65af\u8afe\u767b\u904a\u884c_Hong_Kong_Rally_to_Support_Snowden_SML.20130615.7D.42298-350x233.jpg 350w, https:\/\/cathayvista.top\/wp-content\/uploads\/2023\/10\/Is_Snowden_a_Hero-_SnowdenHK_\u9999\u6e2f\u8072\u63f4\u65af\u8afe\u767b\u904a\u884c_Hong_Kong_Rally_to_Support_Snowden_SML.20130615.7D.42298-480x320.jpg 480w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">\u56fe\u7247\u9898\u6ce8\uff1a<a rel=\"noreferrer noopener\" href=\"https:\/\/en.wikipedia.org\/wiki\/Hong_Kong\" target=\"_blank\">Hong Kong<\/a> rally to support Snowden, June 15, 2013 <br>\u53c2\u8003\u8bd1\u6587\uff1a\u9999\u6e2f\u96c6\u4f1a\u652f\u6301\u65af\u8bfa\u767b\uff0c2013 \u5e74 6 \u6708 15 \u65e5<br>\u56fe\u7247\u6765\u6e90\uff1a<a rel=\"noreferrer noopener\" href=\"https:\/\/www.flickr.com\/people\/48973657@N00\" target=\"_blank\">See-ming Lee<\/a> &#8211; <a rel=\"noreferrer noopener\" href=\"https:\/\/www.flickr.com\/photos\/48973657@N00\/9064434601\" target=\"_blank\">Flickr\u539f\u56fe\u94fe\u63a5<\/a><br>\u6b64\u56fe\u7247\u9002\u7528CC-BY 2.0\u534f\u8bae<\/figcaption><\/figure>\n<\/div>\n\n\n<p>Reactions of internet users in China were mixed between viewing a loss of freedom worldwide and seeing state surveillance coming out of secrecy. The story broke just before U.S. President <a href=\"https:\/\/en.wikipedia.org\/wiki\/Barack_Obama\">Barack Obama<\/a> and Chinese President <a href=\"https:\/\/en.wikipedia.org\/wiki\/Xi_Jinping\">Xi Jinping<\/a> met in California.<sup><a href=\"https:\/\/en.wikipedia.org\/wiki\/PRISM#cite_note-161\">[160]<\/a><a href=\"https:\/\/en.wikipedia.org\/wiki\/PRISM#cite_note-162\">[161]<\/a><\/sup> When asked about NSA hacking China, the spokeswoman of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Ministry_of_Foreign_Affairs_of_the_People%27s_Republic_of_China\">Ministry of Foreign Affairs of the People&#8217;s Republic of China<\/a> said, &#8220;China strongly advocates cybersecurity.&#8221;<sup><a href=\"https:\/\/en.wikipedia.org\/wiki\/PRISM#cite_note-163\">[162]<\/a><\/sup> The party-owned newspaper <em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Liberation_Daily\">Liberation Daily<\/a><\/em> described this surveillance like <em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Nineteen_Eighty-Four\">Nineteen Eighty-Four<\/a><\/em>-style.<sup><a href=\"https:\/\/en.wikipedia.org\/wiki\/PRISM#cite_note-164\">[163]<\/a><\/sup> Hong Kong legislators <a href=\"https:\/\/en.wikipedia.org\/wiki\/Gary_Fan\">Gary Fan<\/a> and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Claudia_Mo\">Claudia Mo<\/a> wrote a letter to Obama stating, &#8220;the revelations of blanket surveillance of global communications by the world&#8217;s leading democracy have damaged the image of the U.S. among freedom-loving peoples around the world.&#8221;<sup><a href=\"https:\/\/en.wikipedia.org\/wiki\/PRISM#cite_note-165\">[164]<\/a><\/sup><a href=\"https:\/\/en.wikipedia.org\/wiki\/Ai_Weiwei\">Ai Weiwei<\/a>, a Chinese dissident, said, &#8220;Even though we know governments do all kinds of things I was shocked by the information about the US surveillance operation, Prism. To me, it&#8217;s abusively using government powers to interfere in individuals&#8217; privacy. This is an important moment for international society to reconsider and protect individual rights.&#8221;<sup><a href=\"https:\/\/en.wikipedia.org\/wiki\/PRISM#cite_note-166\">[165]<\/a><\/sup><br>\u53c2\u8003\u8bd1\u6587\uff1a\u4e2d\u56fd\u7f51\u6c11\u5bf9\u6b64\u6709\u7740\u4e0d\u540c\u7684\u53cd\u5e94\uff0c\u4e00\u65b9\u9762\u8ba4\u4e3a\u8fd9\u4ee3\u8868\u4e86\u5168\u7403\u81ea\u7531\u7684\u4e27\u5931\uff0c\u53e6\u4e00\u65b9\u9762\u5219\u8ba4\u4e3a\u8fd9\u63ed\u793a\u4e86\u56fd\u5bb6\u76d1\u63a7\u884c\u4e3a\u7684\u79d8\u5bc6\u3002\u8fd9\u4e00\u6d88\u606f\u5728\u7f8e\u56fd\u603b\u7edf\u5965\u5df4\u9a6c\u548c\u4e2d\u56fd\u56fd\u5bb6\u4e3b\u5e2d\u4e60\u8fd1\u5e73\u5728\u52a0\u5229\u798f\u5c3c\u4e9a\u4f1a\u6664\u524d\u5915\u66dd\u5149\u3002\u4e2d\u56fd\u5916\u4ea4\u90e8\u53d1\u8a00\u4eba\u5728\u88ab\u95ee\u5230\u7f8e\u56fd\u56fd\u5bb6\u5b89\u5168\u5c40\u662f\u5426\u9ed1\u5ba2\u653b\u51fb\u4e2d\u56fd\u65f6\u8868\u793a\uff0c\u201c\u4e2d\u56fd\u575a\u51b3\u5021\u5bfc\u7f51\u7edc\u5b89\u5168\u201d\u3002\u4e2d\u56fd\u515a\u62a5\u300a\u89e3\u653e\u65e5\u62a5\u300b\u5f62\u5bb9\u8fd9\u79cd\u76d1\u63a7\u884c\u4e3a\u5c31\u50cf\u300a1984\u300b\u4e00\u6837\u3002\u9999\u6e2f\u7acb\u6cd5\u8005\u8303\u56fd\u5a01\u548c\u6bdb\u5b5f\u9759\u7ed9\u5965\u5df4\u9a6c\u5199\u4e86\u4e00\u5c01\u4fe1\u79f0\uff0c\u201c\u8fd9\u4e2a\u4e16\u754c\u9886\u5148\u7684\u6c11\u4e3b\u56fd\u5bb6\u5bf9\u5168\u7403\u901a\u4fe1\u8fdb\u884c\u7684\u5168\u9762\u76d1\u63a7\u7684\u66dd\u5149\uff0c\u5df2\u7ecf\u635f\u5bb3\u4e86\u7f8e\u56fd\u5728\u81ea\u7531\u7231\u597d\u8005\u4e2d\u7684\u5f62\u8c61\u201d\u3002\u4e2d\u56fd\u5f02\u8bae\u4eba\u58eb\u827e\u672a\u672a\u8bf4\uff1a\u201c\u5c3d\u7ba1\u6211\u4eec\u77e5\u9053\u653f\u5e9c\u4f1a\u505a\u5404\u79cd\u5404\u6837\u7684\u4e8b\u60c5\uff0c\u4f46\u6211\u5bf9\u7f8e\u56fd\u7684\u76d1\u63a7\u884c\u52a8\u2014\u2014\u68f1\u955c\u8ba1\u5212\u7684\u4fe1\u606f\u611f\u5230\u9707\u60ca\u3002\u5bf9\u6211\u6765\u8bf4\uff0c\u8fd9\u662f\u653f\u5e9c\u6ee5\u7528\u6743\u529b\u5e72\u9884\u4e2a\u4eba\u9690\u79c1\u7684\u884c\u4e3a\u3002\u8fd9\u662f\u56fd\u9645\u793e\u4f1a\u91cd\u65b0\u8003\u8651\u548c\u4fdd\u62a4\u4e2a\u4eba\u6743\u5229\u7684\u91cd\u8981\u65f6\u523b\u3002\u201d<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3.4.4 \u6b27\u6d32 | Europe<\/strong><\/h4>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/pic4.zhimg.com\/80\/v2-7d2af331721815e9a48269a4e349bd5b_720w.webp\" alt=\"\"\/><figcaption class=\"wp-element-caption\">\u6b64\u56fe\u7247\u9002\u7528CC BY-SA 2.0\u534f\u8bae<\/figcaption><\/figure>\n<\/div>\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">\u56fe\u7247\u9898\u6ce8\uff1aDigital rights group <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Digitale_Gesellschaft\" target=\"_blank\" rel=\"noreferrer noopener\">Digitale Gesellschaft<\/a> protest at <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Checkpoint_Charlie\" target=\"_blank\" rel=\"noreferrer noopener\">Checkpoint Charlie<\/a> in <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Berlin\" target=\"_blank\" rel=\"noreferrer noopener\">Berlin<\/a>, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Germany\" target=\"_blank\" rel=\"noreferrer noopener\">Germany<\/a> (June 18, 2013)<br>\u53c2\u8003\u8bd1\u6587\uff1a\u6570\u5b57\u7248\u6743\u7ec4\u7ec7 Digitale Gesellschaft \u5728\u5fb7\u56fd\u67cf\u6797\u67e5\u7406\u68c0\u67e5\u7ad9\u6297\u8bae\uff082013 \u5e74 6 \u6708 18 \u65e5\uff09<\/p>\n<cite>\u56fe\u7247\u4f5c\u8005\uff1a<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/www.flickr.com\/People\/68827006%40N07\" target=\"_blank\" rel=\"noreferrer noopener\">Digitale Gesellschaft<\/a><\/cite><\/blockquote>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/pic2.zhimg.com\/80\/v2-3b89c51ceed516c64e40028218cad6a9_720w.webp\" alt=\"\"\/><figcaption class=\"wp-element-caption\">\u6b64\u56fe\u7247\u9002\u7528CC BY-SA 2.0\u534f\u8bae<\/figcaption><\/figure>\n<\/div>\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">\u56fe\u7247\u9898\u6ce8\uff1aProtesters against PRISM in <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Berlin\" target=\"_blank\" rel=\"noreferrer noopener\">Berlin<\/a>, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Germany\" target=\"_blank\" rel=\"noreferrer noopener\">Germany<\/a> wearing <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Chelsea_Manning\" target=\"_blank\" rel=\"noreferrer noopener\">Chelsea Manning<\/a> and <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Edward_Snowden\" target=\"_blank\" rel=\"noreferrer noopener\">Edward Snowden<\/a> masks (June 19, 2013)<br>\u53c2\u8003\u8bd1\u6587\uff1a\u5fb7\u56fd\u67cf\u6797\u53cd\u5bf9\u68f1\u955c\u8fd0\u52a8\u7684\u6297\u8bae\u8005\u6234\u7740\u5207\u5c14\u897f\u00b7\u66fc\u5b81\u548c\u7231\u5fb7\u534e\u00b7\u65af\u8bfa\u767b\u9762\u5177\uff082013 \u5e74 6 \u6708 19 \u65e5\uff09<\/p>\n<cite>\u56fe\u7247\u6765\u6e90\uff1a<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/www.flickr.com\/people\/21604182%40N04\" target=\"_blank\" rel=\"noreferrer noopener\">Mike Herbst<\/a> from Berlin, Germany<\/cite><\/blockquote>\n\n\n\n<p><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Sophie_in_%2527t_Veld\" target=\"_blank\" rel=\"noreferrer noopener\">Sophie in &#8216;t Veld<\/a>, a Dutch <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Member_of_the_European_Parliament\" target=\"_blank\" rel=\"noreferrer noopener\">Member of the European Parliament<\/a>, called PRISM &#8220;a violation of EU laws.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-DailyDot-167\" target=\"_blank\" rel=\"noreferrer noopener\">[166]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u6b27\u6d32\u8bae\u4f1a\u8377\u5170\u8bae\u5458 Sophie in &#8216;t Veld \u79f0 PRISM\u201c\u8fdd\u53cd\u4e86\u6b27\u76df\u6cd5\u5f8b\u3002\u201d[166]<\/p>\n\n\n\n<p>The German <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Federal_Commissioner_for_Data_Protection_and_Freedom_of_Information\" target=\"_blank\" rel=\"noreferrer noopener\">Federal Commissioner for Data Protection and Freedom of Information<\/a>, Peter Schaar, condemned the program as &#8220;monstrous.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-168\" target=\"_blank\" rel=\"noreferrer noopener\">[167]<\/a> He further added that White House claims do &#8220;not reassure me at all&#8221; and that &#8220;given the large number of German users of Google, Facebook, Apple or Microsoft services, I expect the German government &#8230; is committed to clarification and limitation of surveillance.&#8221; <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Steffen_Seibert\" target=\"_blank\" rel=\"noreferrer noopener\">Steffen Seibert<\/a>, press secretary of the Chancellor&#8217;s office, announced that <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Angela_Merkel\" target=\"_blank\" rel=\"noreferrer noopener\">Angela Merkel<\/a> will put these issues on the agenda of the talks with <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Barack_Obama\" target=\"_blank\" rel=\"noreferrer noopener\">Barack Obama<\/a> during his pending visit in Berlin.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-169\" target=\"_blank\" rel=\"noreferrer noopener\">[168]<\/a> Wolfgang Schmidt, a former lieutenant colonel with the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Stasi\" target=\"_blank\" rel=\"noreferrer noopener\">Stasi<\/a>, said that the Stasi would have seen such a program as a &#8220;dream come true&#8221; since the Stasi lacked the technology that made PRISM possible.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-autogenerated2-170\" target=\"_blank\" rel=\"noreferrer noopener\">[169]<\/a> Schmidt expressed opposition, saying, &#8220;It is the height of naivete to think that once collected this information won&#8217;t be used. This is the nature of secret government organizations. The only way to protect the people&#8217;s privacy is not to allow the government to collect their information in the first place.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Schofieldmemories-98\" target=\"_blank\" rel=\"noreferrer noopener\">[98]<\/a> Many Germans organized protests, including one at <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Checkpoint_Charlie\" target=\"_blank\" rel=\"noreferrer noopener\">Checkpoint Charlie<\/a>, when Obama went to Berlin to speak. Matthew Schofield of the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/McClatchy_Washington_Bureau\" target=\"_blank\" rel=\"noreferrer noopener\">McClatchy Washington Bureau<\/a> said, &#8220;Germans are dismayed at Obama&#8217;s role in allowing the collection of so much information.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Schofieldmemories-98\" target=\"_blank\" rel=\"noreferrer noopener\">[98]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u5fb7\u56fd\u8054\u90a6\u6570\u636e\u4fdd\u62a4\u548c\u4fe1\u606f\u81ea\u7531\u4e13\u5458\u5f7c\u5f97\u00b7\u590f\u5c14\u8c34\u8d23\u8be5\u8ba1\u5212\u4e3a\u201c\u53ef\u6015\u7684\u201d[167]\u3002\u4ed6\u8fdb\u4e00\u6b65\u8868\u793a\uff0c\u767d\u5bab\u7684\u58f0\u660e\u201c\u4e00\u70b9\u4e5f\u4e0d\u80fd\u8ba9\u6211\u653e\u5fc3\u201d\uff0c\u5e76\u4e14\u201c\u8003\u8651\u5230\u5fb7\u56fd\u4f7f\u7528\u8c37\u6b4c\u3001Facebook\u3001\u82f9\u679c\u6216\u5fae\u8f6f\u670d\u52a1\u7684\u5927\u91cf\u7528\u6237\uff0c\u6211\u5e0c\u671b\u5fb7\u56fd\u653f\u5e9c\u2026\u2026\u81f4\u529b\u4e8e\u6f84\u6e05\u548c\u9650\u5236\u76d1\u63a7\u3002\u201d\u603b\u7406\u529e\u516c\u5ba4\u65b0\u95fb\u79d8\u4e66\u65af\u7279\u82ac\u00b7\u585e\u4f2f\u7279\u5ba3\u5e03\uff0c\u5b89\u683c\u62c9\u00b7\u9ed8\u514b\u5c14\u5c06\u5728\u5df4\u62c9\u514b\u00b7\u5965\u5df4\u9a6c\u5373\u5c06\u8bbf\u95ee\u67cf\u6797\u671f\u95f4\u5c06\u8fd9\u4e9b\u95ee\u9898\u7f6e\u4e8e\u8ba8\u8bba\u8bae\u7a0b\u4e0a[168]\u3002\u524d\u4e1c\u5fb7\u56fd\u5bb6\u5b89\u5168\u5c40\u4e2d\u6821\u6c83\u5c14\u592b\u5188\u00b7\u65bd\u5bc6\u7279\u8868\u793a\uff0c\u4e1c\u5fb7\u56fd\u5bb6\u5b89\u5168\u5c40\u5c06\u89c6\u8fd9\u6837\u7684\u8ba1\u5212\u4e3a\u201c\u68a6\u60f3\u6210\u771f\u201d\uff0c\u56e0\u4e3a\u4e1c\u5fb7\u56fd\u5bb6\u5b89\u5168\u5c40\u7f3a\u4e4f\u4f7fPRISM\u6210\u4e3a\u53ef\u80fd\u7684\u6280\u672f[169]\u3002\u65bd\u5bc6\u7279\u8868\u793a\u53cd\u5bf9\uff0c\u79f0\u201c\u8ba4\u4e3a\u4e00\u65e6\u6536\u96c6\u4e86\u8fd9\u4e9b\u4fe1\u606f\u5c31\u4e0d\u4f1a\u88ab\u4f7f\u7528\u662f\u975e\u5e38\u5929\u771f\u7684\u3002\u8fd9\u662f\u79d8\u5bc6\u653f\u5e9c\u7ec4\u7ec7\u7684\u672c\u8d28\u3002\u4fdd\u62a4\u4eba\u6c11\u9690\u79c1\u7684\u552f\u4e00\u65b9\u6cd5\u5c31\u662f\u4e0d\u8ba9\u653f\u5e9c\u9996\u5148\u6536\u96c6\u4ed6\u4eec\u7684\u4fe1\u606f\u3002\u201d[98]\u8bb8\u591a\u5fb7\u56fd\u4eba\u7ec4\u7ec7\u4e86\u6297\u8bae\u6d3b\u52a8\uff0c\u5305\u62ec\u5728\u67e5\u7406\u68c0\u67e5\u7ad9\u4e3e\u884c\u7684\u4e00\u6b21\u6297\u8bae\u6d3b\u52a8\uff0c\u5f53\u5965\u5df4\u9a6c\u524d\u5f80\u67cf\u6797\u6f14\u8bb2\u65f6\u3002\u9ea6\u5361\u9521\u534e\u76db\u987f\u5206\u793e\u7684\u9a6c\u4fee\u00b7\u65af\u79d1\u83f2\u5c14\u5fb7\u8bf4\uff1a\u201c\u5fb7\u56fd\u4eba\u5bf9\u5965\u5df4\u9a6c\u5728\u5141\u8bb8\u6536\u96c6\u5982\u6b64\u591a\u4fe1\u606f\u65b9\u9762\u7684\u89d2\u8272\u611f\u5230\u5931\u671b\u3002\u201d[98]<\/p>\n\n\n\n<p>The Italian president of the Guarantor for the protection of personal data, Antonello Soro, said that the surveillance dragnet &#8220;would not be legal in Italy&#8221; and would be &#8220;contrary to the principles of our legislation and would represent a very serious violation.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-guardian_ObamaPressure-171\" target=\"_blank\" rel=\"noreferrer noopener\">[170]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u610f\u5927\u5229\u4e2a\u4eba\u6570\u636e\u4fdd\u62a4\u62c5\u4fdd\u4eba\u4e3b\u5e2d\u5b89\u4e1c\u5185\u6d1b\u00b7\u7d22\u7f57 (Antonello Soro) \u8868\u793a\uff0c\u76d1\u89c6\u548c\u62c9\u53d6\u7f51\u7edc\u6570\u636e\u201c\u5728\u610f\u5927\u5229\u662f\u4e0d\u5408\u6cd5\u7684\u201d\uff0c\u5e76\u4e14\u201c\u8fdd\u53cd\u6211\u4eec\u7684\u7acb\u6cd5\u539f\u5219\uff0c\u6784\u6210\u975e\u5e38\u4e25\u91cd\u7684\u8fdd\u89c4\u884c\u4e3a\u201d\u3002 170]<\/p>\n\n\n\n<p><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/CNIL\" target=\"_blank\" rel=\"noreferrer noopener\">CNIL<\/a> (French data protection watchdog) ordered Google to change its privacy policies within three months or risk fines up to 150,000 euros. <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Spanish_Agency_of_data_protection\" target=\"_blank\" rel=\"noreferrer noopener\">Spanish Agency of data protection<\/a> (AEPD) planned to fine Google between 40,000 and 300,000 euros if it failed to clear stored data on the Spanish users.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-172\" target=\"_blank\" rel=\"noreferrer noopener\">[171]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1aCNIL\uff08\u6cd5\u56fd\u6570\u636e\u4fdd\u62a4\u76d1\u7ba1\u673a\u6784\uff09\u8981\u6c42\u8c37\u6b4c\u5728\u4e09\u4e2a\u6708\u5185\u66f4\u6539\u5176\u9690\u79c1\u653f\u7b56\uff0c\u5426\u5219\u5c06\u9762\u4e34\u6700\u9ad8 15 \u4e07\u6b27\u5143\u7684\u7f5a\u6b3e\u3002 \u5982\u679c\u8c37\u6b4c\u672a\u80fd\u6e05\u9664\u897f\u73ed\u7259\u7528\u6237\u5b58\u50a8\u7684\u6570\u636e\uff0c\u897f\u73ed\u7259\u6570\u636e\u4fdd\u62a4\u5c40 (AEPD) \u8ba1\u5212\u5bf9\u8c37\u6b4c\u5904\u4ee5 40,000 \u81f3 300,000 \u6b27\u5143\u7684\u7f5a\u6b3e\u3002 [171]<\/p>\n\n\n\n<p><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/William_Hague\" target=\"_blank\" rel=\"noreferrer noopener\">William Hague<\/a>, the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Secretary_of_State_for_Foreign_and_Commonwealth_Affairs\" target=\"_blank\" rel=\"noreferrer noopener\">foreign secretary<\/a> of the United Kingdom, dismissed accusations that British security agencies had been circumventing British law by using information gathered on British citizens by PRISM<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-ReutersUK-173\" target=\"_blank\" rel=\"noreferrer noopener\">[172]<\/a> saying, &#8220;Any data obtained by us from the United States involving UK nationals is subject to proper UK statutory controls and safeguards.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-ReutersUK-173\" target=\"_blank\" rel=\"noreferrer noopener\">[172]<\/a> <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/David_Cameron\" target=\"_blank\" rel=\"noreferrer noopener\">David Cameron<\/a> said Britain&#8217;s spy agencies that received data collected from PRISM acted within the law: &#8220;I&#8217;m satisfied that we have intelligence agencies that do a fantastically important job for this country to keep us safe, and they operate within the law.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-ReutersUK-173\" target=\"_blank\" rel=\"noreferrer noopener\">[172]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Yahoo-174\" target=\"_blank\" rel=\"noreferrer noopener\">[173]<\/a> <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Malcolm_Rifkind\" target=\"_blank\" rel=\"noreferrer noopener\">Malcolm Rifkind<\/a>, the chairman of parliament&#8217;s <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Intelligence_and_Security_Committee\" target=\"_blank\" rel=\"noreferrer noopener\">Intelligence and Security Committee<\/a>, said that if the British intelligence agencies were seeking to know the content of emails about people living in the UK, then they actually have to get lawful authority.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Yahoo-174\" target=\"_blank\" rel=\"noreferrer noopener\">[173]<\/a> The UK&#8217;s <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Information_Commissioner%2527s_Office\" target=\"_blank\" rel=\"noreferrer noopener\">Information Commissioner&#8217;s Office<\/a> was more cautious, saying it would investigate PRISM alongside other European data agencies: &#8220;There are real issues about the extent to which U.S. law agencies can access personal data of UK and other European citizens. Aspects of U.S. law under which companies can be compelled to provide information to U.S. agencies potentially conflict with <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Data_Protection_Directive\" target=\"_blank\" rel=\"noreferrer noopener\">European data protection law<\/a>, including the UK&#8217;s own <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Data_Protection_Act_1998\" target=\"_blank\" rel=\"noreferrer noopener\">Data Protection Act<\/a>. The ICO has raised this with its European counterparts, and the issue is being considered by the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/European_Commission\" target=\"_blank\" rel=\"noreferrer noopener\">European Commission<\/a>, who are in discussions with the U.S. Government.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-DailyDot-167\" target=\"_blank\" rel=\"noreferrer noopener\">[166]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u82f1\u56fd\u5916\u4ea4\u5927\u81e3\u5a01\u5ec9\u00b7\u9ed1\u683c\u9a73\u65a5\u4e86\u82f1\u56fd\u5b89\u5168\u673a\u6784\u5229\u7528PRISM\u6536\u96c6\u5230\u7684\u82f1\u56fd\u516c\u6c11\u4fe1\u606f\u6765\u89c4\u907f\u82f1\u56fd\u6cd5\u5f8b\u7684\u6307\u63a7\uff0c\u4ed6\u8868\u793a\uff1a\u201c\u6211\u4eec\u4ece\u7f8e\u56fd\u83b7\u53d6\u7684\u4efb\u4f55\u6d89\u53ca\u82f1\u56fd\u516c\u6c11\u7684\u6570\u636e\u90fd\u53d7\u5230\u9002\u5f53\u7684\u82f1\u56fd\u6cd5\u5b9a\u63a7\u5236\u548c\u4fdd\u62a4\u3002\u201d[172] \u82f1\u56fd\u9996\u76f8\u6234\u7ef4\u00b7\u5361\u6885\u4f26\u8868\u793a\uff0c\u63a5\u6536\u4ecePRISM\u6536\u96c6\u5230\u7684\u6570\u636e\u7684\u82f1\u56fd\u95f4\u8c0d\u673a\u6784\u662f\u5728\u6cd5\u5f8b\u8303\u56f4\u5185\u884c\u4e8b\u7684\uff1a\u201c\u6211\u5bf9\u6211\u4eec\u7684\u60c5\u62a5\u673a\u6784\u975e\u5e38\u6ee1\u610f\uff0c\u4ed6\u4eec\u4e3a\u4e86\u4fdd\u62a4\u6211\u4eec\u7684\u56fd\u5bb6\u5b89\u5168\u505a\u4e86\u6781\u5176\u91cd\u8981\u7684\u5de5\u4f5c\uff0c\u800c\u4e14\u4ed6\u4eec\u662f\u5728\u6cd5\u5f8b\u7684\u6846\u67b6\u4e0b\u8fd0\u4f5c\u7684\u3002\u201d[172][173] \u82f1\u56fd\u8bae\u4f1a\u60c5\u62a5\u548c\u5b89\u5168\u59d4\u5458\u4f1a\u4e3b\u5e2d\u9a6c\u5c14\u79d1\u59c6\u00b7\u91cc\u592b\u91d1\u5fb7\u8868\u793a\uff0c\u5982\u679c\u82f1\u56fd\u60c5\u62a5\u673a\u6784\u8bd5\u56fe\u4e86\u89e3\u5728\u82f1\u56fd\u5c45\u4f4f\u7684\u4eba\u7684\u7535\u5b50\u90ae\u4ef6\u5185\u5bb9\uff0c\u90a3\u4e48\u4ed6\u4eec\u5fc5\u987b\u83b7\u5f97\u5408\u6cd5\u7684\u6388\u6743[173]\u3002\u82f1\u56fd\u4fe1\u606f\u4e13\u5458\u529e\u516c\u5ba4\u5219\u66f4\u52a0\u8c28\u614e\uff0c\u8868\u793a\u5c06\u4e0e\u5176\u4ed6\u6b27\u6d32\u6570\u636e\u673a\u6784\u4e00\u8d77\u8c03\u67e5PRISM\uff1a\u201c\u7f8e\u56fd\u6267\u6cd5\u673a\u6784\u8bbf\u95ee\u82f1\u56fd\u548c\u5176\u4ed6\u6b27\u6d32\u516c\u6c11\u7684\u4e2a\u4eba\u6570\u636e\u7684\u7a0b\u5ea6\u5b58\u5728\u771f\u5b9e\u95ee\u9898\u3002\u7f8e\u56fd\u6cd5\u5f8b\u6839\u636e\u5176\u53ef\u4ee5\u5f3a\u5236\u516c\u53f8\u63d0\u4f9b\u4fe1\u606f\u7ed9\u7f8e\u56fd\u673a\u6784\u7684\u6761\u6b3e\uff0c\u53ef\u80fd\u4e0e\u6b27\u6d32\u6570\u636e\u4fdd\u62a4\u6cd5\u76f8\u51b2\u7a81\uff0c\u5305\u62ec\u82f1\u56fd\u81ea\u5df1\u7684\u6570\u636e\u4fdd\u62a4\u6cd5\u3002\u4fe1\u606f\u4e13\u5458\u529e\u516c\u5ba4\u5df2\u4e0e\u5176\u6b27\u6d32\u540c\u884c\u63d0\u51fa\u4e86\u8fd9\u4e2a\u95ee\u9898\uff0c\u5e76\u4e14\u8fd9\u4e2a\u95ee\u9898\u6b63\u5728\u6b27\u6d32\u59d4\u5458\u4f1a\u8fdb\u884c\u8ba8\u8bba\uff0c\u4ed6\u4eec\u6b63\u5728\u4e0e\u7f8e\u56fd\u653f\u5e9c\u8fdb\u884c\u78cb\u5546\u3002\u201d[166]<\/p>\n\n\n\n<p><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Tim_Berners-Lee\" target=\"_blank\" rel=\"noreferrer noopener\">Tim Berners-Lee<\/a>, the inventor of the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/World_Wide_Web\" target=\"_blank\" rel=\"noreferrer noopener\">World Wide Web<\/a>, accused western governments of practicing hypocrisy, as they conducted spying on the internet while they criticized other countries for spying on the internet. He stated that internet spying can make people feel reluctant to access intimate and private information that is important to them.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-175\" target=\"_blank\" rel=\"noreferrer noopener\">[174]<\/a> In a statement given to <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Financial_Times\" target=\"_blank\" rel=\"noreferrer noopener\">Financial Times<\/a> following the Snowden revelations, Berners-Lee stated &#8220;Unwarranted government surveillance is an intrusion on basic human rights that threatens the very foundations of a democratic society.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-176\" target=\"_blank\" rel=\"noreferrer noopener\">[175]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u4e07\u7ef4\u7f51\u7684\u53d1\u660e\u8005\u8482\u59c6\u00b7\u4f2f\u7eb3\u65af-\u674e\u6307\u8d23\u897f\u65b9\u653f\u5e9c\u5b9e\u884c\u865a\u4f2a\uff0c\u4ed6\u4eec\u5728\u6279\u8bc4\u5176\u4ed6\u56fd\u5bb6\u5bf9\u4e92\u8054\u7f51\u8fdb\u884c\u76d1\u63a7\u7684\u540c\u65f6\uff0c\u81ea\u5df1\u4e5f\u5728\u8fdb\u884c\u4e92\u8054\u7f51\u76d1\u63a7\u3002\u4ed6\u8868\u793a\uff0c\u4e92\u8054\u7f51\u76d1\u63a7\u53ef\u80fd\u4f1a\u8ba9\u4eba\u4eec\u4e0d\u613f\u610f\u8bbf\u95ee\u5bf9\u4ed6\u4eec\u6765\u8bf4\u91cd\u8981\u7684\u4eb2\u5bc6\u548c\u79c1\u4eba\u4fe1\u606f[174]\u3002\u5728\u65af\u8bfa\u767b\u66dd\u5149\u540e\u5411\u82f1\u56fd\u300a\u91d1\u878d\u65f6\u62a5\u300b\u53d1\u8868\u7684\u58f0\u660e\u4e2d\uff0c\u4f2f\u7eb3\u65af-\u674e\u8868\u793a\uff1a\u201c\u65e0\u7406\u7531\u7684\u653f\u5e9c\u76d1\u89c6\u4fb5\u72af\u4e86\u57fa\u672c\u4eba\u6743\uff0c\u5a01\u80c1\u5230\u6c11\u4e3b\u793e\u4f1a\u7684\u57fa\u77f3\u3002\u201d[175]<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3.4.5 \u5370\u5ea6 | India<\/strong><\/h4>\n\n\n\n<p><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Minister_of_External_Affairs_%28India%29\" target=\"_blank\" rel=\"noreferrer noopener\">Minister of External Affairs<\/a> <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Salman_Khurshid\" target=\"_blank\" rel=\"noreferrer noopener\">Salman Khurshid<\/a> defended the PRISM program saying, &#8220;This is not scrutiny and access to actual messages. It is only computer analysis of patterns of calls and emails that are being sent. It is not actually snooping specifically on content of anybody&#8217;s message or conversation. Some of the information they got out of their scrutiny, they were able to use it to prevent serious terrorist attacks in several countries.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-177\" target=\"_blank\" rel=\"noreferrer noopener\">[176]<\/a> His comments contradicted his <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Ministry_of_External_Affairs_%28India%29\" target=\"_blank\" rel=\"noreferrer noopener\">Foreign Ministry&#8217;s<\/a> characterization of violations of privacy as &#8220;unacceptable.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-178\" target=\"_blank\" rel=\"noreferrer noopener\">[177]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-179\" target=\"_blank\" rel=\"noreferrer noopener\">[178]<\/a> When the then <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Ministry_of_Communications_and_Information_Technology_%28India%29\" target=\"_blank\" rel=\"noreferrer noopener\">Minister of Communications and Information Technology<\/a> <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Kapil_Sibal\" target=\"_blank\" rel=\"noreferrer noopener\">Kapil Sibal<\/a> was asked about Khurshid&#8217;s comments, he refused to comment on them directly, but said, &#8220;We do not know the nature of data or information sought [as part of PRISM]. Even the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Ministry_of_External_Affairs_%28India%29\" target=\"_blank\" rel=\"noreferrer noopener\">external ministry<\/a> does not have any idea.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-180\" target=\"_blank\" rel=\"noreferrer noopener\">[179]<\/a> The media felt that Khurshid&#8217;s defence of PRISM was because the India government was rolling out the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Central_Monitoring_System\" target=\"_blank\" rel=\"noreferrer noopener\">Central Monitoring System<\/a> (CMS), which is similar to the PRISM program.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-181\" target=\"_blank\" rel=\"noreferrer noopener\">[180]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-medianama1-182\" target=\"_blank\" rel=\"noreferrer noopener\">[181]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-183\" target=\"_blank\" rel=\"noreferrer noopener\">[182]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u5370\u5ea6\u5916\u4ea4\u90e8\u957f\u8428\u5c14\u66fc\u00b7\u5e93\u5c14\u5e0c\u5fb7\u4e3aPRISM\u8ba1\u5212\u8fdb\u884c\u4e86\u8fa9\u62a4\uff0c\u4ed6\u8868\u793a\uff1a\u201c\u8fd9\u5e76\u4e0d\u662f\u5bf9\u771f\u5b9e\u4fe1\u606f\u7684\u5ba1\u67e5\u548c\u83b7\u53d6\u3002\u5b83\u53ea\u662f\u5bf9\u901a\u8bdd\u548c\u7535\u5b50\u90ae\u4ef6\u6a21\u5f0f\u7684\u8ba1\u7b97\u673a\u5206\u6790\u3002\u5b9e\u9645\u4e0a\uff0c\u5e76\u6ca1\u6709\u4e13\u95e8\u7aa5\u63a2\u4efb\u4f55\u4eba\u4fe1\u606f\u6216\u5bf9\u8bdd\u5185\u5bb9\u3002\u4ed6\u4eec\u901a\u8fc7\u5bf9\u8fd9\u4e9b\u4fe1\u606f\u8fdb\u884c\u5206\u6790\uff0c\u6210\u529f\u963b\u6b62\u4e86\u591a\u4e2a\u56fd\u5bb6\u53d1\u751f\u4e25\u91cd\u7684\u6050\u6016\u88ad\u51fb\u3002\u201d[176] \u4ed6\u7684\u8a00\u8bba\u4e0e\u5370\u5ea6\u5916\u4ea4\u90e8\u5c06\u4fb5\u72af\u9690\u79c1\u884c\u4e3a\u63cf\u8ff0\u4e3a\u201c\u4e0d\u53ef\u63a5\u53d7\u201d[177][178]\u7684\u8bf4\u6cd5\u76f8\u77db\u76fe\u3002\u5f53\u65f6\u7684\u901a\u4fe1\u548c\u4fe1\u606f\u6280\u672f\u90e8\u957f\u5361\u76ae\u5c14\u00b7\u897f\u5df4\u5c14\u5728\u88ab\u95ee\u53ca\u5bf9\u5e93\u5c14\u5e0c\u5fb7\u7684\u8bc4\u8bba\u65f6\u62d2\u7edd\u76f4\u63a5\u53d1\u8868\u8bc4\u8bba\uff0c\u4f46\u4ed6\u8868\u793a\uff1a\u201c\u6211\u4eec\u4e0d\u77e5\u9053\u6240\u5bfb\u6c42\u7684\u6570\u636e\u6216\u4fe1\u606f\u7684\u6027\u8d28[\u4f5c\u4e3aPRISM\u7684\u4e00\u90e8\u5206]\u3002\u5373\u4f7f\u5916\u4ea4\u90e8\u4e5f\u4e0d\u77e5\u9053\u3002\u201d[179] \u5a92\u4f53\u8ba4\u4e3a\u5e93\u5c14\u5e0c\u5fb7\u4e3aPRISM\u8fa9\u62a4\u662f\u56e0\u4e3a\u5370\u5ea6\u653f\u5e9c\u6b63\u5728\u63a8\u51fa\u7c7b\u4f3cPRISM\u8ba1\u5212\u7684\u4e2d\u592e\u76d1\u63a7\u7cfb\u7edf\uff08CMS\uff09[180][181][182]\u3002<\/p>\n\n\n\n<p>Khurshid&#8217;s comments were criticized by the Indian media,<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-184\" target=\"_blank\" rel=\"noreferrer noopener\">[183]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-185\" target=\"_blank\" rel=\"noreferrer noopener\">[184]<\/a> as well as opposition party <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Communist_Party_of_India_%28Marxist%29\" target=\"_blank\" rel=\"noreferrer noopener\">CPI(M)<\/a> who stated, &#8220;The <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/United_Progressive_Alliance\" target=\"_blank\" rel=\"noreferrer noopener\">UPA<\/a> government should have strongly protested against such surveillance and bugging. Instead, it is shocking that Khurshid has sought to justify it. This shameful remark has come at a time when even the close allies of the US like Germany and France have protested against the snooping on their countries.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-186\" target=\"_blank\" rel=\"noreferrer noopener\">[185]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u5e93\u5c14\u5e0c\u5fb7\u7684\u8a00\u8bba\u53d7\u5230\u5370\u5ea6\u5a92\u4f53[183][184]\u4ee5\u53ca\u53cd\u5bf9\u515a\u5370\u5ea6\u5171\u4ea7\u515a\uff08\u9a6c\u514b\u601d\u4e3b\u4e49\uff09\u7684\u6279\u8bc4\u3002\u5370\u5ea6\u5171\u4ea7\u515a\uff08\u9a6c\u514b\u601d\u4e3b\u4e49\uff09\u8868\u793a\uff1a\u201c\u8054\u5408\u8fdb\u6b65\u8054\u76df\u653f\u5e9c\u5e94\u8be5\u5f3a\u70c8\u6297\u8bae\u8fd9\u79cd\u76d1\u89c6\u548c\u7a83\u542c\u884c\u4e3a\u3002\u7136\u800c\uff0c\u4ee4\u4eba\u9707\u60ca\u7684\u662f\uff0c\u5e93\u5c14\u5e0c\u5fb7\u7adf\u7136\u8bd5\u56fe\u4e3a\u6b64\u8fa9\u62a4\u3002\u8fd9\u79cd\u53ef\u803b\u7684\u8a00\u8bba\u51fa\u73b0\u5728\u8fde\u7f8e\u56fd\u7684\u4eb2\u5bc6\u76df\u53cb\u5fb7\u56fd\u548c\u6cd5\u56fd\u90fd\u5bf9\u5176\u5bf9\u672c\u56fd\u7684\u76d1\u63a7\u8868\u793a\u6297\u8bae\u4e4b\u9645\u3002\u201d[185]<\/p>\n\n\n\n<p><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Rajya_Sabha\" target=\"_blank\" rel=\"noreferrer noopener\">Rajya Sabha<\/a> <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Member_of_Parliament\" target=\"_blank\" rel=\"noreferrer noopener\">MP<\/a> P. Rajeev told <em><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/The_Times_of_India\" target=\"_blank\" rel=\"noreferrer noopener\">The Times of India<\/a><\/em> that &#8220;The act of the USA is a clear violation of <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Vienna_convention_on_diplomatic_relations\" target=\"_blank\" rel=\"noreferrer noopener\">Vienna convention on diplomatic relations<\/a>. But Khurshid is trying to justify it. And the speed of the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Government_of_India\" target=\"_blank\" rel=\"noreferrer noopener\">government of India<\/a> to reject the asylum application of Edward Snowden is shameful.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-187\" target=\"_blank\" rel=\"noreferrer noopener\">[186]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u5370\u5ea6\u8054\u90a6\u9662\u8bae\u5458 P. Rajeev \u544a\u8bc9\u300a\u5370\u5ea6\u65f6\u62a5\u300b\uff0c\u201c\u7f8e\u56fd\u7684\u884c\u4e3a\u660e\u663e\u8fdd\u53cd\u4e86\u7ef4\u4e5f\u7eb3\u5916\u4ea4\u5173\u7cfb\u516c\u7ea6\u3002\u4f46\u5e93\u5e0c\u5fb7\u6b63\u5728\u8bd5\u56fe\u4e3a\u5176\u8fa9\u62a4\u3002\u5370\u5ea6\u653f\u5e9c\u62d2\u7edd\u5e87\u62a4\u7533\u8bf7\u7684\u901f\u5ea6 \u7231\u5fb7\u534e\u00b7\u65af\u8bfa\u767b\u7684\u884c\u4e3a\u662f\u53ef\u803b\u7684\u3002\u201d[186]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h_660480327_2\">4. \u6cd5\u5f8b\u65b9\u9762 | Legal aspects<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h_660480327_3\">4.1 \u6240\u9002\u7528\u7684\u6cd5\u5f8b\u548c\u5b9e\u8df5 | Applicable law and practice<\/h3>\n\n\n\n<p>On June 8, 2013, the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Director_of_National_Intelligence\" target=\"_blank\" rel=\"noreferrer noopener\">Director of National Intelligence<\/a> issued a fact sheet stating that PRISM &#8220;is not an undisclosed collection or data mining program,&#8221; but rather &#8220;an internal government computer system&#8221; used to facilitate the collection of foreign intelligence information &#8220;under court supervision, as authorized by Section 702 of the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Foreign_Intelligence_Surveillance_Act\" target=\"_blank\" rel=\"noreferrer noopener\">Foreign Intelligence Surveillance Act<\/a> (FISA) (50 U.S.C. \u00a7 1881a).&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Fact_Sheet-53\" target=\"_blank\" rel=\"noreferrer noopener\">[53]<\/a> Section 702 provides that &#8220;the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/United_States_Attorney_General\" target=\"_blank\" rel=\"noreferrer noopener\">Attorney General<\/a> and the Director of National Intelligence may authorize jointly, for a period of up to 1 year from the effective date of the authorization, the targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Section_702-188\" target=\"_blank\" rel=\"noreferrer noopener\">[187]<\/a> In order to authorize the targeting, the attorney general and Director of National Intelligence need to obtain an order from the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Foreign_Intelligence_Surveillance_Court\" target=\"_blank\" rel=\"noreferrer noopener\">Foreign Intelligence Surveillance Court<\/a> (FISA Court) pursuant to Section 702 or certify that &#8220;intelligence important to the national security of the United States may be lost or not timely acquired and time does not permit the issuance of an order.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Section_702-188\" target=\"_blank\" rel=\"noreferrer noopener\">[187]<\/a> When requesting an order, the attorney general and Director of National Intelligence must certify to the FISA Court that &#8220;a significant purpose of the acquisition is to obtain foreign intelligence information.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Section_702-188\" target=\"_blank\" rel=\"noreferrer noopener\">[187]<\/a> They do not need to specify which facilities or property will be targeted.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Section_702-188\" target=\"_blank\" rel=\"noreferrer noopener\">[187]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a2013\u5e746\u67088\u65e5\uff0c\u7f8e\u56fd\u56fd\u5bb6\u60c5\u62a5\u603b\u76d1\u53d1\u8868\u4e86\u4e00\u4efd\u8bf4\u660e\u4e66\uff0c\u6307\u51faPRISM\u201c\u4e0d\u662f\u4e00\u4e2a\u672a\u516c\u5f00\u7684\u6570\u636e\u6536\u96c6\u6216\u6570\u636e\u6316\u6398\u7a0b\u5e8f\u201d\uff0c\u800c\u662f\u4e00\u4e2a\u201c\u5185\u90e8\u653f\u5e9c\u8ba1\u7b97\u673a\u7cfb\u7edf\u201d\uff0c\u7528\u4e8e\u5728\u300a\u5916\u56fd\u60c5\u62a5\u76d1\u89c6\u6cd5\u300b\u7b2c702\u6761\u7684\u6388\u6743\u548c\u6cd5\u9662\u76d1\u7763\u4e0b\uff0c\u6536\u96c6\u5916\u56fd\u60c5\u62a5\u4fe1\u606f\uff0850 U.S.C. \u00a7 1881a\uff09[53]\u3002\u6839\u636e\u7b2c702\u6761\uff0c\u7f8e\u56fd\u53f8\u6cd5\u90e8\u957f\u548c\u56fd\u5bb6\u60c5\u62a5\u603b\u76d1\u201c\u53ef\u4ee5\u5171\u540c\u6388\u6743\uff0c\u5728\u6388\u6743\u751f\u6548\u7684\u4e00\u5e74\u5185\uff0c\u9488\u5bf9\u5408\u7406\u76f8\u4fe1\u4f4d\u4e8e\u7f8e\u56fd\u4ee5\u5916\u5730\u533a\u7684\u4eba\u8fdb\u884c\u5b9a\u5411\u76d1\u63a7\uff0c\u4ee5\u83b7\u53d6\u5916\u56fd\u60c5\u62a5\u4fe1\u606f\u3002\u201d[187] \u4e3a\u4e86\u6388\u6743\u5b9a\u5411\u76d1\u63a7\uff0c\u53f8\u6cd5\u90e8\u957f\u548c\u56fd\u5bb6\u60c5\u62a5\u603b\u76d1\u9700\u8981\u5411\u5916\u56fd\u60c5\u62a5\u76d1\u89c6\u6cd5\u5ead\uff08FISA\u6cd5\u5ead\uff09\u83b7\u5f97\u4e00\u4e2a\u547d\u4ee4\uff0c\u6839\u636e\u7b2c702\u6761\u6216\u8005\u8bc1\u660e\u201c\u5bf9\u4e8e\u7f8e\u56fd\u56fd\u5bb6\u5b89\u5168\u81f3\u5173\u91cd\u8981\u7684\u60c5\u62a5\u53ef\u80fd\u4f1a\u4e27\u5931\u6216\u65e0\u6cd5\u53ca\u65f6\u83b7\u53d6\uff0c\u800c\u65f6\u95f4\u53c8\u4e0d\u5141\u8bb8\u53d1\u5e03\u547d\u4ee4\u3002\u201d[187] \u5728\u8bf7\u6c42\u547d\u4ee4\u65f6\uff0c\u53f8\u6cd5\u90e8\u957f\u548c\u56fd\u5bb6\u60c5\u62a5\u603b\u76d1\u5fc5\u987b\u5411FISA\u6cd5\u5ead\u8bc1\u660e\u201c\u6536\u96c6\u7684\u4e00\u4e2a\u91cd\u8981\u76ee\u7684\u662f\u83b7\u53d6\u5916\u56fd\u60c5\u62a5\u4fe1\u606f\u3002\u201d[187] \u4ed6\u4eec\u4e0d\u9700\u8981\u5177\u4f53\u6307\u5b9a\u5c06\u76d1\u63a7\u54ea\u4e9b\u8bbe\u65bd\u6216\u8d22\u4ea7\u3002[187]<\/p>\n\n\n\n<p>After receiving a FISA Court order or determining that there are emergency circumstances, the attorney general and Director of National Intelligence can direct an electronic communication service provider to give them access to information or facilities to carry out the targeting and keep the targeting secret.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Section_702-188\" target=\"_blank\" rel=\"noreferrer noopener\">[187]<\/a> The provider then has the option to: (1) comply with the directive; (2) reject it; or (3) challenge it with the FISA Court. If the provider complies with the directive, it is released from liability to its users for providing the information and is reimbursed for the cost of providing it,<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Section_702-188\" target=\"_blank\" rel=\"noreferrer noopener\">[187]<\/a> while if the provider rejects the directive, the attorney general may request an order from the FISA Court to enforce it.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Section_702-188\" target=\"_blank\" rel=\"noreferrer noopener\">[187]<\/a> A provider that fails to comply with the FISA Court&#8217;s order can be punished with <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Contempt_of_court\" target=\"_blank\" rel=\"noreferrer noopener\">contempt of court<\/a>.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Section_702-188\" target=\"_blank\" rel=\"noreferrer noopener\">[187]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u5728\u83b7\u5f97FISA\u6cd5\u5ead\u7684\u547d\u4ee4\u6216\u786e\u5b9a\u5b58\u5728\u7d27\u6025\u60c5\u51b5\u540e\uff0c\u53f8\u6cd5\u90e8\u957f\u548c\u56fd\u5bb6\u60c5\u62a5\u603b\u76d1\u53ef\u4ee5\u6307\u793a\u7535\u5b50\u901a\u4fe1\u670d\u52a1\u63d0\u4f9b\u5546\u63d0\u4f9b\u4fe1\u606f\u6216\u8bbe\u65bd\uff0c\u4ee5\u6267\u884c\u5b9a\u5411\u76d1\u63a7\u5e76\u4fdd\u6301\u76d1\u63a7\u7684\u4fdd\u5bc6\u6027\u3002[187] \u7136\u540e\uff0c\u670d\u52a1\u63d0\u4f9b\u5546\u53ef\u4ee5\u9009\u62e9\uff1a\uff081\uff09\u9075\u5b88\u6307\u793a\uff1b\uff082\uff09\u62d2\u7edd\u6307\u793a\uff1b\u6216\u8005\uff083\uff09\u5411FISA\u6cd5\u5ead\u63d0\u51fa\u6311\u6218\u3002\u5982\u679c\u670d\u52a1\u63d0\u4f9b\u5546\u9075\u5b88\u6307\u793a\uff0c\u5b83\u5c06\u514d\u9664\u5bf9\u5176\u7528\u6237\u63d0\u4f9b\u4fe1\u606f\u7684\u8d23\u4efb\uff0c\u5e76\u83b7\u5f97\u63d0\u4f9b\u4fe1\u606f\u7684\u6210\u672c\u7684\u62a5\u9500\uff0c[187] \u800c\u5982\u679c\u670d\u52a1\u63d0\u4f9b\u5546\u62d2\u7edd\u6307\u793a\uff0c\u53f8\u6cd5\u90e8\u957f\u53ef\u4ee5\u5411FISA\u6cd5\u5ead\u8bf7\u6c42\u5f3a\u5236\u6267\u884c\u547d\u4ee4\u3002[187] \u4e0d\u9075\u5b88FISA\u6cd5\u5ead\u547d\u4ee4\u7684\u63d0\u4f9b\u5546\u53ef\u80fd\u4f1a\u88ab\u5224\u5904\u85d0\u89c6\u6cd5\u5ead\u7684\u5904\u7f5a\u3002[187]<\/p>\n\n\n\n<p>Finally, a provider can petition the FISA Court to reject the directive.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Section_702-188\" target=\"_blank\" rel=\"noreferrer noopener\">[187]<\/a> In case the FISA Court denies the petition and orders the provider to comply with the directive, the provider risks contempt of court if it refuses to comply with the FISA Court&#8217;s order.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Section_702-188\" target=\"_blank\" rel=\"noreferrer noopener\">[187]<\/a> The provider can appeal the FISA Court&#8217;s denial to the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/United_States_Foreign_Intelligence_Surveillance_Court_of_Review\" target=\"_blank\" rel=\"noreferrer noopener\">Foreign Intelligence Surveillance Court of Review<\/a> and then appeal the Court of Review&#8217;s decision to the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/US_Supreme_Court\" target=\"_blank\" rel=\"noreferrer noopener\">Supreme Court<\/a> by a <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Writ_of_certiorari\" target=\"_blank\" rel=\"noreferrer noopener\">writ of certiorari<\/a> for review <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Under_seal\" target=\"_blank\" rel=\"noreferrer noopener\">under seal<\/a>.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Section_702-188\" target=\"_blank\" rel=\"noreferrer noopener\">[187]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u6700\u540e\uff0c\u670d\u52a1\u63d0\u4f9b\u5546\u53ef\u4ee5\u5411FISA\u6cd5\u5ead\u7533\u8bf7\u62d2\u7edd\u6307\u793a\u3002[187] \u5982\u679cFISA\u6cd5\u5ead\u62d2\u7edd\u7533\u8bf7\u5e76\u547d\u4ee4\u63d0\u4f9b\u5546\u9075\u5b88\u6307\u793a\uff0c\u5728\u62d2\u7edd\u9075\u5b88FISA\u6cd5\u5ead\u547d\u4ee4\u7684\u60c5\u51b5\u4e0b\uff0c\u63d0\u4f9b\u5546\u9762\u4e34\u85d0\u89c6\u6cd5\u5ead\u7684\u98ce\u9669\u3002[187] \u63d0\u4f9b\u5546\u53ef\u4ee5\u5c06FISA\u6cd5\u5ead\u7684\u62d2\u7edd\u51b3\u5b9a\u4e0a\u8bc9\u81f3\u5916\u56fd\u60c5\u62a5\u76d1\u89c6\u6cd5\u5ead\u5ba1\u67e5\uff0c\u5e76\u901a\u8fc7\u4fdd\u5bc6\u7684\u8ba4\u8bc1\u8bf7\u6c42\u4e0a\u8bc9\u6cd5\u5ead\u5ba1\u67e5\u7684\u51b3\u5b9a\u3002[187]<\/p>\n\n\n\n<p>The Senate Select Committee on Intelligence and the FISA Courts had been put in place to oversee intelligence operations in the period after the death of <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/J._Edgar_Hoover\" target=\"_blank\" rel=\"noreferrer noopener\">J. Edgar Hoover<\/a>. Beverly Gage of <em><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Slate_%28magazine%29\" target=\"_blank\" rel=\"noreferrer noopener\">Slate<\/a><\/em> said, &#8220;When they were created, these new mechanisms were supposed to stop the kinds of abuses that men like Hoover had engineered. Instead, it now looks as if they have come to function as <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Rubber_stamp_%28politics%29\" target=\"_blank\" rel=\"noreferrer noopener\">rubber stamps<\/a> for the expansive ambitions of the intelligence community. J. Edgar Hoover no longer rules Washington, but it turns out we didn&#8217;t need him anyway.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-189\" target=\"_blank\" rel=\"noreferrer noopener\">[188]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h_660480327_4\">4.2 \u8bc9\u8bbc | Litigation<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><th>Date \u65e5\u671f<\/th><th>Litigant \u5f53\u4e8b\u4eba<\/th><th>Description \u63cf\u8ff0<\/th><\/tr><tr><td>June 11, 2013<br>2013\u5e746\u670811\u65e5<\/td><td>American Civil Liberties Union<br>\u7f8e\u56fd\u516c\u6c11\u81ea\u7531\u8054\u76df<\/td><td>\u8868\u6ce81<\/td><\/tr><tr><td>June 11, 2013<br>2013\u5e746\u670811\u65e5<\/td><td>FreedomWatch USA<br>\u7f8e\u56fd\u81ea\u7531\u89c2\u5bdf<\/td><td>\u8868\u6ce82<\/td><\/tr><tr><td>February 18, 2014<br>2014\u5e742\u670818\u65e5<\/td><td>Rand Paul and Freedom Works, Inc.<br>\u5170\u5fb7\u00b7\u4fdd\u7f57\u548c\u81ea\u7531\u4f5c\u54c1\u56fd\u9645\u516c\u53f8<\/td><td>\u8868\u6ce83<\/td><\/tr><tr><td>June 2, 2014<br>2014\u5e746\u67082\u65e5<\/td><td>Elliott J. Schuchardt<br>\u57c3\u5229\u5965\u7279\u00b7J\u00b7\u8212\u67e5\u7279<\/td><td>\u8868\u6ce84<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>\u8868\u6ce81\uff1a<\/strong><\/p>\n\n\n\n<p>Lawsuit filed against the NSA citing that the &#8220;Mass Call Tracking Program&#8221; (as the case terms PRISM) &#8220;violates Americans&#8217; constitutional rights of free speech, association, and privacy&#8221; and constitutes &#8220;dragnet&#8221; surveillance, in violation of the First and Fourth Amendments to the Constitution, and thereby also &#8220;exceeds the authority granted by 50 U.S.C. \u00a7 1861, and thereby violates 5 U.S.C. \u00a7 706.&#8221;[189] The case was joined by Yale Law School, on behalf of its Media Freedom and Information Access Clinic.[190]<br>\u53c2\u8003\u8bd1\u6587\uff1a\u5bf9\u7f8e\u56fd\u56fd\u5bb6\u5b89\u5168\u5c40\u63d0\u8d77\u8bc9\u8bbc\uff0c\u79f0\u201c\u5927\u4f17\u7535\u8bdd\u8ffd\u8e2a\u8ba1\u5212\u201d\uff08\u672c\u6848\u4e2d\u79f0\u4e3a\u201c\u68f1\u955c\u95e8\u201d\uff09\u201c\u4fb5\u72af\u4e86\u7f8e\u56fd\u4eba\u7684\u8a00\u8bba\u81ea\u7531\u3001\u7ed3\u793e\u81ea\u7531\u548c\u9690\u79c1\u7684\u5baa\u6cd5\u6743\u5229\u201d\uff0c\u5e76\u6784\u6210\u201c\u5929\u7f57\u5730\u7f51\u201d\u76d1\u89c6\uff0c\u8fdd\u53cd\u4e86\u7b2c\u4e00\u548c\u7b2c\u56db\u6761 \u5baa\u6cd5\u4fee\u6b63\u6848\uff0c\u56e0\u6b64\u4e5f\u201c\u8d85\u51fa\u4e86\u300a\u7f8e\u56fd\u6cd5\u5178\u300b\u7b2c 50 \u6761\u7b2c 1861 \u6761\u6388\u4e88\u7684\u6743\u529b\uff0c\u4ece\u800c\u8fdd\u53cd\u4e86\u300a\u7f8e\u56fd\u6cd5\u5178\u300b\u7b2c 5 \u6761\u7b2c 706 \u6761\u3002\u201d[189] \u8036\u9c81\u5927\u5b66\u6cd5\u5b66\u9662\u4ee3\u8868\u5176\u5a92\u4f53\u81ea\u7531\u548c\u4fe1\u606f\u83b7\u53d6\u8bca\u6240\u52a0\u5165\u4e86\u6b64\u6848 .[190]<\/p>\n\n\n\n<p><strong>\u8868\u6ce82\uff1a<\/strong><\/p>\n\n\n\n<p>Class action lawsuit against government bodies and officials believed responsible for PRISM, and 12 companies (including Apple, Microsoft, Google, Facebook, and Skype and their chief executives) who have been disclosed as providing or making available mass information about their users&#8217; communications and data to the NSA under the PRISM program or related programs. The case cites the First, Fourth, and Fifth Amendments to the Constitution, as well as breach of 18 U.S.C. \u00a7\u00a72702 (disclosure of communications records), and asks the court to rule that the program operates outside its legal authority (s.215 of the Patriot Act). The class includes the plaintiffs and[191] &#8220;other American citizens who, in addition to being members of the Nationwide Class, had their telephone calls and\/or emails and\/or any other communications made or received through Facebook, Google, Yahoo, YouTube, Skype, AOL, Sprint, AT&amp;T, Apple, Microsoft and\/or PalTalk actually recorded and\/or listened into by or on behalf of [the] Defendants.&#8221; In November 2017, the district court dismissed the case.<br>\u53c2\u8003\u8bd1\u6587\uff1a\u5bf9\u88ab\u8ba4\u4e3a\u5bf9PRISM\u8d1f\u6709\u8d23\u4efb\u7684\u653f\u5e9c\u673a\u6784\u548c\u5b98\u5458\u4ee5\u53ca12\u5bb6\u516c\u53f8\uff08\u5305\u62ec\u82f9\u679c\u3001\u5fae\u8f6f\u3001\u8c37\u6b4c\u3001Facebook\u548cSkype\u53ca\u5176\u9996\u5e2d\u6267\u884c\u5b98\uff09\u63d0\u8d77\u4e86\u96c6\u4f53\u8bc9\u8bbc\u3002\u8fd9\u4e9b\u516c\u53f8\u5df2\u7ecf\u88ab\u62ab\u9732\u4e3a\u5728PRISM\u8ba1\u5212\u6216\u76f8\u5173\u8ba1\u5212\u4e0b\u5411NSA\u63d0\u4f9b\u6216\u63d0\u4f9b\u5927\u91cf\u5173\u4e8e\u5176\u7528\u6237\u901a\u4fe1\u548c\u6570\u636e\u7684\u4fe1\u606f\u3002\u8be5\u6848\u5f15\u7528\u4e86\u300a\u5baa\u6cd5\u300b\u7b2c\u4e00\u3001\u7b2c\u56db\u548c\u7b2c\u4e94\u4fee\u6b63\u6848\uff0c\u4ee5\u53ca\u8fdd\u53cd\u4e8618 U.S.C. \u00a7\u00a72702\uff08\u62ab\u9732\u901a\u4fe1\u8bb0\u5f55\uff09\u7684\u89c4\u5b9a\uff0c\u5e76\u8981\u6c42\u6cd5\u9662\u88c1\u5b9a\u8be5\u8ba1\u5212\u8d85\u51fa\u5176\u6cd5\u5b9a\u6743\u9650\uff08\u300a\u7231\u56fd\u8005\u6cd5\u6848\u300b\u7b2c215\u6761\uff09\u3002\u8be5\u96c6\u4f53\u8bc9\u8bbc\u5305\u62ec\u539f\u544a\u548c\u201c\u5176\u4ed6\u7f8e\u56fd\u516c\u6c11\uff0c\u4ed6\u4eec\u9664\u4e86\u4f5c\u4e3a\u5168\u56fd\u7c7b\u7684\u6210\u5458\u5916\uff0c\u8fd8\u901a\u8fc7Facebook\u3001\u8c37\u6b4c\u3001\u96c5\u864e\u3001YouTube\u3001Skype\u3001AOL\u3001Sprint\u3001AT&amp;T\u3001\u82f9\u679c\u3001\u5fae\u8f6f\u548c\/\u6216PalTalk\u8fdb\u884c\u7684\u7535\u8bdd\u3001\u7535\u5b50\u90ae\u4ef6\u548c\/\u6216\u4efb\u4f55\u5176\u4ed6\u901a\u4fe1\u5b9e\u9645\u4e0a\u88ab\u88ab\u544a\u6216\u4ee3\u8868\u88ab\u544a\u5f55\u5236\u548c\/\u6216\u76d1\u542c\u7684\u4eba\u3002\u201d2017\u5e7411\u6708\uff0c\u5730\u65b9\u6cd5\u9662\u9a73\u56de\u4e86\u8be5\u6848\u3002<\/p>\n\n\n\n<p><strong>\u8868\u6ce83\uff1a<\/strong><\/p>\n\n\n\n<p>Lawsuit filed against President Barack Obama, James R. Clapper, as Director of National Intelligence, Keith B. Alexander, as director of the NSA, James B. Comey, as director of the FBI, in the United States District Court for the District of Columbia. The case contends that the Defendants are violating the Fourth Amendment of the United States by collecting phone metadata. The case is currently stayed pending the outcome of the government&#8217;s appeal in the FreedomWatch USA\/Klayman case.<br>\u53c2\u8003\u8bd1\u6587\uff1a\u8be5\u8bc9\u8bbc\u662f\u9488\u5bf9\u7f8e\u56fd\u603b\u7edf\u5df4\u62c9\u514b\u00b7\u5965\u5df4\u9a6c\u3001\u56fd\u5bb6\u60c5\u62a5\u603b\u76d1\u8a79\u59c6\u65af\u00b7\u514b\u62c9\u73c0\u3001\u56fd\u5bb6\u5b89\u5168\u5c40\u5c40\u957f\u57fa\u65af\u00b7\u4e9a\u5386\u5c71\u5927\u548c\u8054\u90a6\u8c03\u67e5\u5c40\u5c40\u957f\u8a79\u59c6\u65af\u00b7\u79d1\u7c73\u5728\u54e5\u4f26\u6bd4\u4e9a\u7279\u533a\u8054\u90a6\u5730\u533a\u6cd5\u9662\u63d0\u8d77\u7684\u3002\u8be5\u6848\u79f0\u88ab\u544a\u901a\u8fc7\u6536\u96c6\u7535\u8bdd\u5143\u6570\u636e\u8fdd\u53cd\u4e86\u7f8e\u56fd\u5baa\u6cd5\u7b2c\u56db\u4fee\u6b63\u6848\u3002\u8be5\u6848\u76ee\u524d\u6682\u505c\uff0c\u7b49\u5f85\u653f\u5e9c\u5728FreedomWatch USA\/Klayman\u6848\u4ef6\u7684\u4e0a\u8bc9\u7ed3\u679c\u3002<\/p>\n\n\n\n<p><strong>\u8868\u6ce84\uff1a<\/strong><\/p>\n\n\n\n<p>Lawsuit filed against President Barack Obama, James R. Clapper, as Director of National Intelligence, Admiral Michael R. Rogers, as director of the NSA, James B. Comey, as director of the FBI, in the United States District Court for the Western District of Pennsylvania. The case contends that the Defendants are violating the Fourth Amendment of the United States by collecting the full content of e-mail in the United States. The complaint asks the Court to find the Defendants&#8217; program unconstitutional, and seeks an injunction. The court is currently considering the government&#8217;s motion to dismiss this case.<br>\u53c2\u8003\u8bd1\u6587\uff1a\u8be5\u8bc9\u8bbc\u662f\u9488\u5bf9\u7f8e\u56fd\u603b\u7edf\u5df4\u62c9\u514b\u00b7\u5965\u5df4\u9a6c\u3001\u56fd\u5bb6\u60c5\u62a5\u603b\u76d1\u8a79\u59c6\u65af\u00b7\u514b\u62c9\u73c0\u3001\u56fd\u5bb6\u5b89\u5168\u5c40\u5c40\u957f\u8fc8\u514b\u5c14\u00b7\u7f57\u6770\u65af\u4e0a\u5c06\u548c\u8054\u90a6\u8c03\u67e5\u5c40\u5c40\u957f\u8a79\u59c6\u65af\u00b7\u79d1\u7c73\u5728\u5bbe\u5915\u6cd5\u5c3c\u4e9a\u5dde\u897f\u533a\u8054\u90a6\u5730\u533a\u6cd5\u9662\u63d0\u8d77\u7684\u3002\u8be5\u6848\u58f0\u79f0\u88ab\u544a\u901a\u8fc7\u5728\u7f8e\u56fd\u6536\u96c6\u7535\u5b50\u90ae\u4ef6\u7684\u5168\u90e8\u5185\u5bb9\u6765\u8fdd\u53cd\u7f8e\u56fd\u5baa\u6cd5\u7b2c\u56db\u4fee\u6b63\u6848\u3002\u8d77\u8bc9\u4e66\u8981\u6c42\u6cd5\u9662\u8ba4\u5b9a\u88ab\u544a\u7684\u8ba1\u5212\u8fdd\u5baa\uff0c\u5e76\u5bfb\u6c42\u7981\u4ee4\u3002\u6cd5\u9662\u76ee\u524d\u6b63\u5728\u8003\u8651\u653f\u5e9c\u5bf9\u6b64\u6848\u7684\u9a73\u56de\u52a8\u8bae\u3002<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h_660480327_5\">4.3 \u5bf9\u6cd5\u5f8b\u95ee\u9898\u7684\u5206\u6790 | Analysis of legal issues<\/h3>\n\n\n\n<p>Laura Donohue, a law professor at the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Georgetown_University_Law_Center\" target=\"_blank\" rel=\"noreferrer noopener\">Georgetown University Law Center<\/a> and its <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/w\/index.php%3Ftitle%3DCenter_on_National_Security_and_the_Law%26action%3Dedit%26redlink%3D1\" target=\"_blank\" rel=\"noreferrer noopener\">Center on National Security and the Law<\/a>, has called PRISM and other NSA mass surveillance programs unconstitutional.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-donohue-193\" target=\"_blank\" rel=\"noreferrer noopener\">[192]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u4e54\u6cbb\u6566\u5927\u5b66\u6cd5\u5b66\u4e2d\u5fc3\u53ca\u5176\u56fd\u5bb6\u5b89\u5168\u4e0e\u6cd5\u5f8b\u4e2d\u5fc3\u7684\u6cd5\u5b66\u6559\u6388\u52b3\u62c9\u00b7\u591a\u8bfa\u4f11\u79f0PRISM\u548c\u5176\u4ed6NSA\u7684\u5927\u89c4\u6a21\u76d1\u89c6\u8ba1\u5212\u8fdd\u5baa\u3002<\/p>\n\n\n\n<p>Woodrow Hartzog, an affiliate at <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Stanford_Law_School\" target=\"_blank\" rel=\"noreferrer noopener\">Stanford Law School<\/a>&#8216;s <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Stanford_Center_for_Internet_and_Society\" target=\"_blank\" rel=\"noreferrer noopener\">Center for Internet and Society<\/a> commented that &#8220;[The ACLU will] likely have to demonstrate legitimate First Amendment harms (such as <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Chilling_effect_%28law%29\" target=\"_blank\" rel=\"noreferrer noopener\">chilling effects<\/a>) or Fourth Amendment harms (perhaps a violation of a reasonable expectation of privacy) &#8230; Is it a harm to merely know with certainty that you are being monitored by the government? There&#8217;s certainly an argument that it is. People under surveillance act differently, experience a loss of autonomy, are less likely to engage in self exploration and reflection, and are less willing to engage in core expressive political activities such as dissenting speech and government criticism. Such interests are what First and Fourth Amendment seek to protect.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-194\" target=\"_blank\" rel=\"noreferrer noopener\">[193]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u65af\u5766\u798f\u6cd5\u5b66\u9662\u4e92\u8054\u7f51\u4e0e\u793e\u4f1a\u4e2d\u5fc3\u7684\u8054\u7edc\u4eba\u4f0d\u5fb7\u7f57\u00b7\u54c8\u5c14\u4f50\u683c\u8bc4\u8bba\u9053\uff1a\u201c\uff08\u7f8e\u56fd\u516c\u6c11\u81ea\u7531\u8054\u76df\uff09\u53ef\u80fd\u5fc5\u987b\u8bc1\u660e\u5408\u6cd5\u7684\u7b2c\u4e00\u4fee\u6b63\u6848\u4f24\u5bb3\uff08\u6bd4\u5982\u6050\u5413\u6548\u5e94\uff09\u6216\u7b2c\u56db\u4fee\u6b63\u6848\u4f24\u5bb3\uff08\u53ef\u80fd\u662f\u5bf9\u5408\u7406\u9690\u79c1\u671f\u671b\u7684\u4fb5\u72af\uff09\u2026\u2026\u4ec5\u4ec5\u660e\u786e\u5730\u77e5\u9053\u81ea\u5df1\u6b63\u5728\u88ab\u653f\u5e9c\u76d1\u63a7\uff0c\u662f\u5426\u6784\u6210\u4e00\u79cd\u4f24\u5bb3\uff1f\u8fd9\u5f53\u7136\u662f\u6709\u4e89\u8bae\u7684\u3002\u53d7\u5230\u76d1\u89c6\u7684\u4eba\u4f1a\u6709\u4e0d\u540c\u7684\u884c\u4e3a\uff0c\u4f1a\u4e27\u5931\u81ea\u4e3b\u6743\uff0c\u4e0d\u592a\u53ef\u80fd\u8fdb\u884c\u81ea\u6211\u63a2\u7d22\u548c\u53cd\u601d\uff0c\u5e76\u4e14\u4e0d\u592a\u613f\u610f\u53c2\u4e0e\u6838\u5fc3\u8868\u8fbe\u653f\u6cbb\u6d3b\u52a8\uff0c\u6bd4\u5982\u53d1\u8868\u5f02\u8bae\u8a00\u8bba\u548c\u6279\u8bc4\u653f\u5e9c\u3002\u8fd9\u4e9b\u5229\u76ca\u6b63\u662f\u7b2c\u4e00\u4fee\u6b63\u6848\u548c\u7b2c\u56db\u4fee\u6b63\u6848\u6240\u81f4\u529b\u4fdd\u62a4\u7684\u3002\u201d<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h_660480327_6\">4.4 FISA \u4fee\u6b63\u6848\u7684\u5408\u6cd5\u6027 | Legality of the FISA Amendments Act<\/h3>\n\n\n\n<p>The <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/FISA_Amendments_Act_of_2008\" target=\"_blank\" rel=\"noreferrer noopener\">FISA Amendments Act<\/a> (FAA) Section 702 is referenced in PRISM documents detailing the electronic interception, capture and analysis of <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Metadata\" target=\"_blank\" rel=\"noreferrer noopener\">metadata<\/a>. Many reports and letters of concern written by members of Congress suggest that this section of FAA in particular is legally and constitutionally problematic, such as by targeting U.S. persons, insofar as &#8220;Collections occur in U.S.&#8221; as published documents indicate.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-195\" target=\"_blank\" rel=\"noreferrer noopener\">[194]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-196\" target=\"_blank\" rel=\"noreferrer noopener\">[195]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-197\" target=\"_blank\" rel=\"noreferrer noopener\">[196]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-198\" target=\"_blank\" rel=\"noreferrer noopener\">[197]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u300a\u5916\u56fd\u60c5\u62a5\u76d1\u89c6\u6cd5\u4fee\u6b63\u6848\u300b\uff08FAA\uff09\u7b2c702\u6761\u6b3e\u5728PRISM\u6587\u4ef6\u4e2d\u88ab\u5f15\u7528\uff0c\u8be6\u7ec6\u63cf\u8ff0\u4e86\u5143\u6570\u636e\u7684\u7535\u5b50\u62e6\u622a\u3001\u6355\u83b7\u548c\u5206\u6790\u3002\u8bb8\u591a\u56fd\u4f1a\u8bae\u5458\u64b0\u5199\u7684\u62a5\u544a\u548c\u5173\u6ce8\u4fe1\u4ef6\u8868\u660e\uff0c\u7279\u522b\u662fFAA\u7684\u8fd9\u4e00\u6761\u6b3e\u5728\u6cd5\u5f8b\u548c\u5baa\u6cd5\u4e0a\u5b58\u5728\u95ee\u9898\uff0c\u4f8b\u5982\u9488\u5bf9\u7f8e\u56fd\u4eba\u7684\u95ee\u9898\uff0c\u201c\u6536\u96c6\u6d3b\u52a8\u53d1\u751f\u5728\u7f8e\u56fd\u201d\uff0c\u6b63\u5982\u516c\u5f00\u6587\u4ef6\u6240\u793a\u3002<\/p>\n\n\n\n<p>The ACLU has asserted the following regarding the FAA: &#8220;Regardless of abuses, the problem with the FAA is more fundamental: the statute itself is unconstitutional.&#8221;<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-199\" target=\"_blank\" rel=\"noreferrer noopener\">[198]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u7f8e\u56fd\u516c\u6c11\u81ea\u7531\u8054\u76df\u5c31\u8054\u90a6\u822a\u7a7a\u5c40\u63d0\u51fa\u4e86\u4ee5\u4e0b\u4e3b\u5f20\uff1a\u201c\u65e0\u8bba\u662f\u5426\u5b58\u5728\u6ee5\u7528\u884c\u4e3a\uff0c\u8054\u90a6\u822a\u7a7a\u5c40\u7684\u95ee\u9898\u66f4\u4e3a\u6839\u672c\uff1a\u8be5\u6cd5\u89c4\u672c\u8eab\u662f\u8fdd\u5baa\u7684\u3002\u201d[198]<\/p>\n\n\n\n<p>Senator <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Rand_Paul\" target=\"_blank\" rel=\"noreferrer noopener\">Rand Paul<\/a> is introducing new legislation called the Fourth Amendment Restoration Act of 2013 to stop the NSA or other agencies of the United States government from violating the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Fourth_Amendment_to_the_United_States_Constitution\" target=\"_blank\" rel=\"noreferrer noopener\">Fourth Amendment<\/a> to the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/U.S._Constitution\" target=\"_blank\" rel=\"noreferrer noopener\">U.S. Constitution<\/a> using technology and <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Big_data\" target=\"_blank\" rel=\"noreferrer noopener\">big data<\/a> information systems like PRISM and Boundless Informant.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-200\" target=\"_blank\" rel=\"noreferrer noopener\">[199]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-201\" target=\"_blank\" rel=\"noreferrer noopener\">[200]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u53c2\u8bae\u5458\u5170\u5fb7\u00b7\u4fdd\u7f57\u6b63\u5728\u63a8\u51fa\u4e00\u9879\u540d\u4e3a\u300a\u7b2c\u56db\u4fee\u6b63\u6848\u6062\u590d\u6cd5\u6848\u300b\u7684\u65b0\u7acb\u6cd5\uff0c\u65e8\u5728\u963b\u6b62NSA\u6216\u5176\u4ed6\u7f8e\u56fd\u653f\u5e9c\u673a\u6784\u5229\u7528\u50cfPRISM\u548c\u65e0\u5c3d\u6e05\u7b97\u8fd9\u6837\u7684\u6280\u672f\u548c\u5927\u6570\u636e\u4fe1\u606f\u7cfb\u7edf\u4fb5\u72af\u7f8e\u56fd\u5baa\u6cd5\u7b2c\u56db\u4fee\u6b63\u6848\u3002<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h_660480327_7\">5. \u540c\u6837\u4f7f\u7528\u540d\u79f0\u201cPRISM\u201d\u7684\u9879\u76ee | Programs sharing the name PRISM<\/h2>\n\n\n\n<p>Besides the information collection program started in 2007, there are two other programs sharing the name PRISM:<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-TLT20130726-202\" target=\"_blank\" rel=\"noreferrer noopener\">[201]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u9664\u4e86 2007 \u5e74\u542f\u52a8\u7684\u4fe1\u606f\u6536\u96c6\u8ba1\u5212\u5916\uff0c\u8fd8\u6709\u53e6\u5916\u4e24\u4e2a\u8ba1\u5212\u5171\u7528 PRISM\uff1a[201]<\/p>\n\n\n\n<p>(1) The <strong>Planning tool for Resource Integration, Synchronization and Management (PRISM)<\/strong>, a web tool used by US military intelligence to send tasks and instructions to data collection platforms deployed to military operations.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-MJ-Prism-203\" target=\"_blank\" rel=\"noreferrer noopener\">[202]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u8d44\u6e90\u6574\u5408\u3001\u540c\u6b65\u548c\u7ba1\u7406\u89c4\u5212\u5de5\u5177\uff08PRISM\uff09\u662f\u7f8e\u56fd\u519b\u4e8b\u60c5\u62a5\u90e8\u95e8\u4f7f\u7528\u7684\u4e00\u4e2a\u7f51\u7edc\u5de5\u5177\uff0c\u7528\u4e8e\u5411\u90e8\u7f72\u5728\u519b\u4e8b\u884c\u52a8\u4e2d\u7684\u6570\u636e\u6536\u96c6\u5e73\u53f0\u53d1\u9001\u4efb\u52a1\u548c\u6307\u4ee4\u3002<\/p>\n\n\n\n<p>(2) The <strong>Portal for Real-time Information Sharing and Management (PRISM)<\/strong>, whose existence was revealed by the NSA in July 2013.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-TLT20130726-202\" target=\"_blank\" rel=\"noreferrer noopener\">[201]<\/a> This is an internal NSA program for real-time sharing of information which is apparently located in the NSA&#8217;s Information Assurance Directorate.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-TLT20130726-202\" target=\"_blank\" rel=\"noreferrer noopener\">[201]<\/a> The NSA&#8217;s Information Assurance Directorate (IAD) is a very secretive division which is responsible for safeguarding U.S. government and military secrets by implementing sophisticated encryption techniques.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-TLT20130726-202\" target=\"_blank\" rel=\"noreferrer noopener\">[201]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u5373\u65f6\u4fe1\u606f\u5171\u4eab\u548c\u7ba1\u7406\u95e8\u6237\uff08PRISM\uff09\u662f\u7531NSA\u57282013\u5e747\u6708\u62ab\u9732\u7684\u4e00\u4e2a\u5b58\u5728\u3002\u8fd9\u662fNSA\u7684\u4e00\u4e2a\u5185\u90e8\u8ba1\u5212\uff0c\u7528\u4e8e\u5b9e\u65f6\u5171\u4eab\u4fe1\u606f\uff0c\u636e\u8bf4\u4f4d\u4e8eNSA\u7684\u4fe1\u606f\u4fdd\u969c\u603b\u5c40\u3002NSA\u7684\u4fe1\u606f\u4fdd\u969c\u603b\u5c40\uff08IAD\uff09\u662f\u4e00\u4e2a\u975e\u5e38\u795e\u79d8\u7684\u90e8\u95e8\uff0c\u8d1f\u8d23\u901a\u8fc7\u5b9e\u65bd\u590d\u6742\u7684\u52a0\u5bc6\u6280\u672f\u6765\u4fdd\u62a4\u7f8e\u56fd\u653f\u5e9c\u548c\u519b\u4e8b\u673a\u5bc6\u3002<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h_660480327_8\">6. \u7f8e\u56fd\u56fd\u5b89\u5c40\u7684\u76f8\u5173\u9879\u76ee | Related NSA programs<\/h2>\n\n\n\n<p><em>Main article: List of government mass surveillance projects<\/em><br><em>\u4e3b\u6761\u76ee\uff1a\u7f8e\u56fd\u653f\u5e9c\u5927\u89c4\u6a21\u76d1\u89c6\u9879\u76ee\u5217\u8868<\/em><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/pic1.zhimg.com\/80\/v2-edb58013b6b5a6ae62a696985cea9224_720w.webp\" alt=\"\"\/><figcaption class=\"wp-element-caption\">\u6b64\u56fe\u7247\u5c5e\u4e8e\u516c\u5171\u9886\u57df<\/figcaption><\/figure>\n<\/div>\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-small-font-size\">\u56fe\u7247\u9898\u6ce8\uff1aIdea behind the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Muscular_%28surveillance_program%29\" target=\"_blank\" rel=\"noreferrer noopener\">MUSCULAR<\/a> program, which gave direct access to Google and Yahoo private clouds, no warrants needed<br>\u53c2\u8003\u8bd1\u6587\uff1aMUSCULAR \u8ba1\u5212\u80cc\u540e\u7684\u60f3\u6cd5\uff0c\u8be5\u8ba1\u5212\u53ef\u4ee5\u76f4\u63a5\u8bbf\u95ee Google \u548c Yahoo \u79c1\u6709\u4e91\uff0c\u65e0\u9700\u4efb\u4f55\u6388\u6743<\/p>\n<cite>\u56fe\u7247\u6765\u6e90\uff1aU.S. National Security Agency &#8211; <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/www.washingtonpost.com\/world\/national-security\/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say\/2013\/10\/30\/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u539f\u56fe\u94fe\u63a5\uff08\u534e\u76db\u987f\u90ae\u62a5\uff09<\/a><\/cite><\/blockquote>\n\n\n\n<p>Parallel programs, known collectively as <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/SIGAD\" target=\"_blank\" rel=\"noreferrer noopener\">SIGADs<\/a> gather data and <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Metadata\" target=\"_blank\" rel=\"noreferrer noopener\">metadata<\/a> from other sources, each SIGAD has a set of defined sources, targets, types of data collected, legal authorities, and software associated with it. Some SIGADs have the same name as the umbrella under which they sit, BLARNEY&#8217;s (the SIGAD) summary, set down in the slides alongside a cartoon insignia of a shamrock and a leprechaun hat, describes it as &#8220;an ongoing collection program that leverages IC [intelligence community] and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks.&#8221;<br>\u53c2\u8003\u8bd1\u6587\uff1a\u5e76\u884c\u8ba1\u5212\uff0c\u96c6\u4f53\u79f0\u4e3aSIGADs\uff0c\u4ece\u5176\u4ed6\u6765\u6e90\u6536\u96c6\u6570\u636e\u548c\u5143\u6570\u636e\uff0c\u6bcf\u4e2aSIGAD\u90fd\u6709\u4e00\u7ec4\u5b9a\u4e49\u7684\u6765\u6e90\u3001\u76ee\u6807\u3001\u6536\u96c6\u7684\u6570\u636e\u7c7b\u578b\u3001\u6cd5\u5f8b\u6388\u6743\u548c\u4e0e\u4e4b\u76f8\u5173\u7684\u8f6f\u4ef6\u3002\u4e00\u4e9bSIGAD\u4e0e\u5b83\u4eec\u6240\u5c5e\u7684\u4f1e\u5f62\u673a\u6784\u5177\u6709\u76f8\u540c\u7684\u540d\u79f0\uff0cBLARNEY\uff08SIGAD\uff09\u7684\u603b\u7ed3\u5728\u5e7b\u706f\u7247\u4e2d\u9644\u6709\u4e00\u4e2a\u4e09\u53f6\u8349\u548c\u5c0f\u77ee\u4eba\u5e3d\u5b50\u7684\u5361\u901a\u5fbd\u7ae0\uff0c\u63cf\u8ff0\u5b83\u4e3a\u201c\u4e00\u4e2a\u6301\u7eed\u7684\u6536\u96c6\u8ba1\u5212\uff0c\u5229\u7528\u60c5\u62a5\u793e\u533a\u548c\u5546\u4e1a\u5408\u4f5c\u4f19\u4f34\u5173\u7cfb\u6765\u83b7\u5f97\u5e76\u5229\u7528\u4ece\u5168\u7403\u7f51\u7edc\u83b7\u53d6\u7684\u5916\u56fd\u60c5\u62a5\u201d\u3002<\/p>\n\n\n\n<p>Some SIGADs, like PRISM, collect data at the <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Internet_service_provider\" target=\"_blank\" rel=\"noreferrer noopener\">ISP<\/a> level, but others take it from the top-level infrastructure. This type of collection is known as &#8220;upstream&#8221;. Upstream collection includes programs known by the blanket terms <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Blarney_%28code_name%29\" target=\"_blank\" rel=\"noreferrer noopener\">BLARNEY<\/a>, FAIRVIEW, <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/OAKSTAR\" target=\"_blank\" rel=\"noreferrer noopener\">OAKSTAR<\/a> and <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/STORMBREW\" target=\"_blank\" rel=\"noreferrer noopener\">STORMBREW<\/a>, under each of these are individual <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/SIGAD\" target=\"_blank\" rel=\"noreferrer noopener\">SIGADs<\/a>. Data that is integrated into a SIGAD can be gathered in other ways besides upstream, and from the service providers, for instance it can be collected from passive sensors around embassies, or even stolen from an individual computer network in a hacking attack.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-autogenerated1-204\" target=\"_blank\" rel=\"noreferrer noopener\">[203]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-WPSlide20130710-205\" target=\"_blank\" rel=\"noreferrer noopener\">[204]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-autogenerated3-206\" target=\"_blank\" rel=\"noreferrer noopener\">[205]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-207\" target=\"_blank\" rel=\"noreferrer noopener\">[206]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-NYBookReview20130729-208\" target=\"_blank\" rel=\"noreferrer noopener\">[207]<\/a> Not all SIGADs involve upstream collection, for instance, data could be taken directly from a service provider, either by agreement (as is the case with PRISM), by means of hacking, or other ways.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-Gellman6Jun13-209\" target=\"_blank\" rel=\"noreferrer noopener\">[208]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-slate1-210\" target=\"_blank\" rel=\"noreferrer noopener\">[209]<\/a><a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-fantastico1-211\" target=\"_blank\" rel=\"noreferrer noopener\">[210]<\/a> According to <em>the Washington Post<\/em>, the much less known <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Muscular_%28surveillance_program%29\" target=\"_blank\" rel=\"noreferrer noopener\">MUSCULAR<\/a> program, which directly taps the unencrypted data inside the Google and Yahoo <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Private_cloud\" target=\"_blank\" rel=\"noreferrer noopener\">private clouds<\/a>, collects more than twice as many data points compared to PRISM.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-wapoSSL-212\" target=\"_blank\" rel=\"noreferrer noopener\">[211]<\/a> Because the Google and Yahoo clouds span the globe, and because the tap was done outside of the United States, unlike PRISM, the MUSCULAR program requires no (FISA or other type of) <a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/Warrant_%28law%29\" target=\"_blank\" rel=\"noreferrer noopener\">warrants<\/a>.<a href=\"https:\/\/link.zhihu.com\/?target=https%3A\/\/en.wikipedia.org\/wiki\/PRISM%23cite_note-213\" target=\"_blank\" rel=\"noreferrer noopener\">[212]<\/a><br>\u53c2\u8003\u8bd1\u6587\uff1a\u4e00\u4e9bSIGADs\uff08\u5982PRISM\uff09\u5728\u4e92\u8054\u7f51\u670d\u52a1\u63d0\u4f9b\u5546\uff08ISP\uff09\u7ea7\u522b\u6536\u96c6\u6570\u636e\uff0c\u800c\u5176\u4ed6\u4e00\u4e9bSIGADs\u5219\u4ece\u9876\u5c42\u57fa\u7840\u8bbe\u65bd\u83b7\u53d6\u6570\u636e\u3002\u8fd9\u79cd\u7c7b\u578b\u7684\u6536\u96c6\u88ab\u79f0\u4e3a\u201c\u4e0a\u6e38\u201d\u3002\u4e0a\u6e38\u6536\u96c6\u5305\u62ecBLARNEY\u3001FAIRVIEW\u3001OAKSTAR\u548cSTORMBREW\u7b49\u901a\u7528\u672f\u8bed\u4e0b\u7684\u7a0b\u5e8f\uff0c\u6bcf\u4e2a\u7a0b\u5e8f\u4e0b\u90fd\u6709\u4e2a\u522b\u7684SIGADs\u3002\u6574\u5408\u5230SIGAD\u4e2d\u7684\u6570\u636e\u53ef\u4ee5\u901a\u8fc7\u4e0a\u6e38\u4e4b\u5916\u7684\u5176\u4ed6\u65b9\u5f0f\u4ece\u670d\u52a1\u63d0\u4f9b\u5546\u90a3\u91cc\u6536\u96c6\uff0c\u4f8b\u5982\u53ef\u4ee5\u4ece\u5927\u4f7f\u9986\u5468\u56f4\u7684\u88ab\u52a8\u4f20\u611f\u5668\u6536\u96c6\uff0c\u751a\u81f3\u53ef\u4ee5\u901a\u8fc7\u9ed1\u5ba2\u653b\u51fb\u4ece\u4e2a\u522b\u8ba1\u7b97\u673a\u7f51\u7edc\u4e2d\u7a83\u53d6\u3002\u5e76\u975e\u6240\u6709\u7684SIGADs\u90fd\u6d89\u53ca\u4e0a\u6e38\u6536\u96c6\uff0c\u4f8b\u5982\uff0c\u6570\u636e\u53ef\u4ee5\u76f4\u63a5\u4ece\u670d\u52a1\u63d0\u4f9b\u5546\u90a3\u91cc\u83b7\u53d6\uff0c\u53ef\u4ee5\u901a\u8fc7\u534f\u8bae\uff08\u5982PRISM\u7684\u60c5\u51b5\uff09\uff0c\u901a\u8fc7\u9ed1\u5ba2\u653b\u51fb\u6216\u5176\u4ed6\u65b9\u5f0f\u3002\u6839\u636e\u300a\u534e\u76db\u987f\u90ae\u62a5\u300b\u7684\u62a5\u9053\uff0cMUSCULAR\u8ba1\u5212\u662f\u4e00\u4e2a\u4e0d\u592a\u4e3a\u4eba\u6240\u77e5\u7684\u8ba1\u5212\uff0c\u5b83\u76f4\u63a5\u7a83\u53d6\u8c37\u6b4c\u548c\u96c5\u864e\u79c1\u6709\u4e91\u4e2d\u7684\u672a\u52a0\u5bc6\u6570\u636e\uff0c\u4e0ePRISM\u76f8\u6bd4\uff0cMUSCULAR\u8ba1\u5212\u6536\u96c6\u7684\u6570\u636e\u70b9\u6570\u91cf\u8d85\u8fc7\u4e24\u500d\u3002\u7531\u4e8e\u8c37\u6b4c\u548c\u96c5\u864e\u4e91\u8986\u76d6\u5168\u7403\uff0c\u5e76\u4e14\u7a83\u542c\u662f\u5728\u7f8e\u56fd\u5883\u5916\u8fdb\u884c\u7684\uff0c\u4e0ePRISM\u4e0d\u540c\uff0cMUSCULAR\u8ba1\u5212\u4e0d\u9700\u8981\uff08FISA\u6216\u5176\u4ed6\u7c7b\u578b\u7684\uff09\u6388\u6743\u3002<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"seealso\">2. \u53c2\u89c1 | See also<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">2.1 \u82f1\u6587\u8bcd\u6761<\/h3>\n\n\n\n<ul class=\"has-small-font-size wp-block-list\">\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Portal:United_States\">United States portal<\/a> \u7f8e\u56fd\u4e3b\u9898<\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/File:A_coloured_voting_box.svg\"><\/a><a href=\"https:\/\/en.wikipedia.org\/wiki\/Portal:Politics\">Politics portal<\/a> \u653f\u6cbb\u4e3b\u9898<\/li>\n<\/ul>\n\n\n\n<ul class=\"has-small-font-size wp-block-list\">\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Central_Monitoring_System\">Central Monitoring System<\/a> \u4e2d\u592e\u76d1\u63a7\u7cfb\u7edf<\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Communications_Assistance_for_Law_Enforcement_Act\">Communications Assistance for Law Enforcement Act<\/a> (CALEA), a U.S. wiretapping law passed in 1994<br>\u6267\u6cd5\u901a\u4fe1\u63f4\u52a9\u6cd5 (CALEA)\uff0c\u7f8e\u56fd 1994 \u5e74\u901a\u8fc7\u7684\u7a83\u542c\u6cd5<\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/DRDO_NETRA\">DRDO NETRA<\/a> DRDO\u7f51\u7edc<\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/ECHELON\">ECHELON<\/a>, a signals intelligence collection and analysis network operated on behalf of Australia, Canada, New Zealand, the United Kingdom, and the United States<br>ECHELON\uff0c\u4ee3\u8868\u6fb3\u5927\u5229\u4e9a\u3001\u52a0\u62ff\u5927\u3001\u65b0\u897f\u5170\u3001\u82f1\u56fd\u548c\u7f8e\u56fd\u8fd0\u8425\u7684\u4fe1\u53f7\u60c5\u62a5\u6536\u96c6\u548c\u5206\u6790\u7f51\u7edc<\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Economic_espionage\">Economic espionage<\/a> \u7ecf\u6d4e\u95f4\u8c0d\u6d3b\u52a8<\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Fourth_Amendment_to_the_United_States_Constitution\">Fourth Amendment to the United States Constitution<\/a> \u7f8e\u56fd\u5baa\u6cd5\u7b2c\u56db\u4fee\u6b63\u6848<\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/INDECT\">INDECT<\/a>, European Union automatic threat detection research project INDECT\uff0c\u6b27\u76df\u81ea\u52a8\u5a01\u80c1\u68c0\u6d4b\u7814\u7a76\u9879\u76ee<\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Information_Awareness_Office\">Information Awareness Office<\/a>, a defunct <a href=\"https:\/\/en.wikipedia.org\/wiki\/DARPA\">DARPA<\/a> project \u4fe1\u606f\u610f\u8bc6\u529e\u516c\u5ba4\uff0c\u4e00\u4e2a\u5df2\u89e3\u6563\u7684 DARPA \u9879\u76ee<\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Law_Enforcement_Information_Exchange\">Law Enforcement Information Exchange<\/a> \u6267\u6cd5\u4fe1\u606f\u4ea4\u6362<\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Lawful_interception\">Lawful interception<\/a> \u5408\u6cd5\u62e6\u622a<\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Mass_surveillance\">Mass surveillance<\/a> \u5927\u89c4\u6a21\u76d1\u89c6<\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Muscular_(surveillance_program)\">Muscular (surveillance program)<\/a> \u808c\u8089\u53d1\u8fbe\uff08\u76d1\u89c6\u7a0b\u5e8f\uff09<\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/NSA_call_database\">NSA call database<\/a>, contains <a href=\"https:\/\/en.wikipedia.org\/wiki\/Call_detail_record\">call detail information<\/a> for hundreds of billions of telephone calls made through the largest U.S. telephone carriers<br>NSA \u547c\u53eb\u6570\u636e\u5e93\u5305\u542b\u901a\u8fc7\u7f8e\u56fd\u6700\u5927\u7684\u7535\u8bdd\u8fd0\u8425\u5546\u62e8\u6253\u7684\u6570\u5343\u4ebf\u4e2a\u7535\u8bdd\u7684\u8be6\u7ec6\u4fe1\u606f<\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Room_641A\">Room 641A<\/a> 641A\u5ba4<\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Signals_intelligence\">Signals intelligence<\/a> \u4fe1\u53f7\u60c5\u62a5<\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/SORM\">SORM<\/a>, Russian telephone and internet surveillance project SORM\uff0c\u4fc4\u7f57\u65af\u7535\u8bdd\u548c\u4e92\u8054\u7f51\u76d1\u63a7\u9879\u76ee<\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Surveillance\">Surveillance<\/a> \u76d1\u89c6<\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Targeted_surveillance\">Targeted surveillance<\/a> \u6709\u9488\u5bf9\u6027\u7684\u76d1\u89c6<\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Tempora\">Tempora<\/a>, the data-gathering project run by the British <a href=\"https:\/\/en.wikipedia.org\/wiki\/Government_Communications_Headquarters\">GCHQ<\/a> Tempora\uff0c\u82f1\u56fd GCHQ \u8fd0\u8425\u7684\u6570\u636e\u6536\u96c6\u9879\u76ee<\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/TURBINE_(US_government_project)\">TURBINE (US government project)<\/a> \u6da1\u8f6e\u673a\uff08\u7f8e\u56fd\u653f\u5e9c\u9879\u76ee\uff09<\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Utah_Data_Center\">Utah Data Center<\/a>, a data storage facility supporting the U.S. Intelligence Community<br>\u72b9\u4ed6\u6570\u636e\u4e2d\u5fc3\uff0c\u652f\u6301\u7f8e\u56fd\u60c5\u62a5\u754c\u7684\u6570\u636e\u5b58\u50a8\u8bbe\u65bd<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">2.2 \u4e2d\u6587\u8bcd\u6761<\/h3>\n\n\n\n<ul class=\"has-small-font-size wp-block-list\">\n<li><a href=\"https:\/\/zh.wikipedia.org\/wiki\/%E7%88%B1%E5%BE%B7%E5%8D%8E%C2%B7%E6%96%AF%E8%AF%BA%E7%99%BB\">\u7231\u5fb7\u534e\u00b7\u65af\u8bfa\u767b<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zh.wikipedia.org\/wiki\/%E7%B6%B2%E8%B7%AF%E4%B8%BB%E6%AC%8A\">\u7f51\u7edc\u4e3b\u6743<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zh.wikipedia.org\/wiki\/%E5%A4%A7%E8%A7%84%E6%A8%A1%E7%9B%91%E6%8E%A7\">\u5927\u89c4\u6a21\u76d1\u63a7<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zh.wikipedia.org\/wiki\/%E6%A2%AF%E9%9A%8A%E7%B3%BB%E7%B5%B1\">\u68af\u961f\u7cfb\u7edf<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zh.wikipedia.org\/wiki\/%E7%8A%B9%E4%BB%96%E6%95%B0%E6%8D%AE%E4%B8%AD%E5%BF%83\">\u72b9\u4ed6\u6570\u636e\u4e2d\u5fc3<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zh.wikipedia.org\/wiki\/%E6%81%92%E6%98%9F%E9%A3%8E_(%E6%83%85%E6%8A%A5%E6%B4%BB%E5%8A%A8%E4%BB%A3%E5%8F%B7)\">\u6052\u661f\u98ce<\/a>\uff08\u60c5\u62a5\u6d3b\u52a8\u4ee3\u53f7\uff09<\/li>\n\n\n\n<li><a href=\"https:\/\/zh.wikipedia.org\/wiki\/%E6%97%B6%E4%BB%A3%E8%AE%A1%E5%88%92\">\u65f6\u4ee3\u8ba1\u5212<\/a>\uff08\u82f1\u56fd\u540c\u7c7b\u8ba1\u5212\uff09<\/li>\n\n\n\n<li><a href=\"https:\/\/zh.wikipedia.org\/wiki\/%E7%94%B5%E5%AD%90%E9%80%9A%E4%BF%A1%E9%9A%90%E7%A7%81%E6%B3%95\">\u7535\u5b50\u901a\u4fe1\u9690\u79c1\u6cd5<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zh.wikipedia.org\/wiki\/%E9%80%9A%E4%BF%A1%E5%8D%8F%E5%8A%A9%E6%89%A7%E6%B3%95%E6%B3%95\">\u901a\u4fe1\u534f\u52a9\u6267\u6cd5\u6cd5<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zh.wikipedia.org\/wiki\/%E7%BE%8E%E5%9B%BD%E5%9B%BD%E5%AE%B6%E5%AE%89%E5%85%A8%E5%B1%80%E6%97%A0%E8%AF%81%E7%9B%91%E5%90%AC%E4%BA%89%E8%AE%AE\">\u7f8e\u56fd\u56fd\u5bb6\u5b89\u5168\u5c40\u65e0\u8bc1\u76d1\u542c\u4e89\u8bae<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zh.wikipedia.org\/wiki\/%E7%BE%8E%E5%9B%BD%E5%9B%BD%E5%AE%B6%E5%AE%89%E5%85%A8%E5%B1%80\">\u7f8e\u56fd\u56fd\u5bb6\u5b89\u5168\u5c40<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zh.wikipedia.org\/wiki\/%E7%BE%8E%E5%9B%BD%E8%81%94%E9%82%A6%E8%B0%83%E6%9F%A5%E5%B1%80\">\u7f8e\u56fd\u8054\u90a6\u8c03\u67e5\u5c40<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zh.wikipedia.org\/wiki\/%E7%BE%8E%E5%9C%8B%E4%B8%AD%E5%A4%AE%E6%83%85%E5%A0%B1%E5%B1%80\">\u7f8e\u56fd\u4e2d\u592e\u60c5\u62a5\u5c40<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zh.wikipedia.org\/wiki\/%E7%BE%8E%E5%9C%8B%E5%9C%8B%E5%8B%99%E9%99%A2\">\u7f8e\u56fd\u56fd\u52a1\u9662<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zh.wikipedia.org\/wiki\/%E7%BE%8E%E5%9C%8B%E5%9C%8B%E9%98%B2%E9%83%A8\">\u7f8e\u56fd\u56fd\u9632\u90e8<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zh.wikipedia.org\/wiki\/%E8%9C%BB%E8%9C%93%E8%A8%88%E7%95%AB\">\u873b\u8713\u9879\u76ee<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zh.wikipedia.org\/wiki\/%E6%94%BF%E6%B2%BB%E5%AA%92%E9%AB%94%E8%A4%87%E5%90%88%E9%AB%94\">\u653f\u6cbb\u5a92\u4f53\u590d\u5408\u4f53<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">3. \u53c2\u8003\u6587\u732e | References<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"enref\">3.1 \u82f1\u6587\u8bcd\u6761<\/h3>\n\n\n\n<ol class=\"has-small-font-size wp-block-list\">\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Barton_Gellman\"><u>Gellman, Barton<\/u><\/a><em>; <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Laura_Poitras\"><u>Poitras, Laura<\/u><\/a><em>&nbsp;(June 6, 2013). <\/em><a href=\"https:\/\/www.washingtonpost.com\/investigations\/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program\/2013\/06\/06\/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html\"><u>&#8220;US Intelligence Mining Data from Nine U.S. Internet Companies in Broad Secret Program&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Washington_Post\"><em><u><em>The Washington Post<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/www.webcitation.org\/6Hhl2Lwpl?url=http:\/\/www.washingtonpost.com\/investigations\/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program\/2013\/06\/06\/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 28, 2013<\/em>. Retrieved June 15, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Glenn_Greenwald\"><u>Greenwald, Glenn<\/u><\/a><em>; MacAskill, Ewen (June 6, 2013). <\/em><a href=\"https:\/\/www.theguardian.com\/world\/2013\/jun\/06\/us-tech-giants-nsa-data\"><u>&#8220;NSA Taps in to Internet Giants&#8217; Systems to Mine User Data, Secret Files Reveal \u2013 Top-Secret Prism Program Claims Direct Access to Servers of Firms Including Google, Apple and Facebook \u2013 Companies Deny Any Knowledge of Program in Operation Since 2007 \u2013 Obama Orders US to Draw Up Overseas Target List for Cyber-Attacks&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Guardian\"><em><u><em>The Guardian<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20190207210041\/https:\/\/www.theguardian.com\/world\/2013\/jun\/06\/us-tech-giants-nsa-data\"><u>Archived<\/u><\/a><em>&nbsp;from the original on February 7, 2019<\/em>. Retrieved June 15, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Braun, Stephen; Flaherty, Anne; Gillum, Jack; Apuzzo, Matt (June 15, 2013). <\/em><a href=\"http:\/\/bigstory.ap.org\/article\/secret-prism-success-even-bigger-data-seizure\"><u>&#8220;Secret to PRISM Program: Even Bigger Data Seizures&#8221;<\/u><\/a><em>. Associated Press. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130910083307\/http:\/\/bigstory.ap.org\/article\/secret-prism-success-even-bigger-data-seizure\"><u>Archived<\/u><\/a><em>&nbsp;from the original on September 10, 2013<\/em>. Retrieved June 18, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Chappell, Bill (June 6, 2013). <\/em><a href=\"https:\/\/www.npr.org\/blogs\/thetwo-way\/2013\/06\/06\/189321612\/nsa-reportedly-mines-servers-of-u-s-internet-firms-for-data\"><u>&#8220;NSA Reportedly Mines Servers of US Internet Firms for Data&#8221;<\/u><\/a><em>. <\/em><em>NPR<\/em><em>. The Two-Way (blog of <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/NPR\"><u>NPR<\/u><\/a><em>). <\/em><a href=\"https:\/\/web.archive.org\/web\/20130613051646\/http:\/\/www.npr.org\/blogs\/thetwo-way\/2013\/06\/06\/189321612\/nsa-reportedly-mines-servers-of-u-s-internet-firms-for-data\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 13, 2013<\/em>. Retrieved June 15, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>ZDNet Community; Whittaker, Zack (June 8, 2013). <\/em><a href=\"https:\/\/www.zdnet.com\/prism-heres-how-the-nsa-wiretapped-the-internet-7000016565\/\"><u>&#8220;PRISM: Here&#8217;s How the NSA Wiretapped the Internet&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/ZDNet\"><em><u><em>ZDNet<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/CBS_Interactive\"><u>CBS Interactive<\/u><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130614052001\/http:\/\/www.zdnet.com\/prism-heres-how-the-nsa-wiretapped-the-internet-7000016565\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 14, 2013<\/em>. Retrieved June 15, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Barton Gellman &amp; Ashkan Soltani (October 30, 2013). <\/em><a href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say\/2013\/10\/30\/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html\"><u>&#8220;NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say&#8221;<\/u><\/a><em>. <\/em><em>The Washington Post<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20140406050541\/http:\/\/www.washingtonpost.com\/world\/national-security\/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say\/2013\/10\/30\/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on April 6, 2014<\/em>. Retrieved October 31, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Siobhan Gorman &amp; Jennifer Valentiono-Devries (August 20, 2013). <\/em><a href=\"https:\/\/www.wsj.com\/articles\/SB10001424127887324108204579022874091732470\"><u>&#8220;New Details Show Broader NSA Surveillance Reach &#8211; Programs Cover 75% of Nation&#8217;s Traffic, Can Snare Emails&#8221;<\/u><\/a><em>. <\/em><em>The Wall Street Journal<\/em>. Retrieved August 21, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/www.wsj.com\/articles\/SB10001424127887324108204579022874091732470\"><u>&#8220;Graphic: How the NSA Scours Internet Traffic in the U.S.&#8221;<\/u><\/a><em>&nbsp;<\/em><em>The Wall Street Journal<\/em><em>. August 20, 2013<\/em>. Retrieved August 21, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Jennifer Valentiono-Devries &amp; Siobhan Gorman (August 20, 2013). <\/em><a href=\"https:\/\/www.wsj.com\/articles\/SB10001424127887324108204579025222244858490\"><u>&#8220;What You Need to Know on New Details of NSA Spying&#8221;<\/u><\/a><em>. <\/em><em>The Wall Street Journal<\/em>. Retrieved August 21, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Lee, Timothy B. (June 6, 2013). <a href=\"https:\/\/www.washingtonpost.com\/blogs\/wonkblog\/wp\/2013\/06\/06\/how-congress-unknowingly-legalized-prism-in-2007\/\"><u>&#8220;How Congress Unknowingly Legalized PRISM in 2007&#8221;<\/u><\/a>. <em>Wonkblog<\/em>&nbsp;(blog of <a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Washington_Post\"><em><u><em>The Washington Post<\/em><\/u><\/em><\/a>). Retrieved July 4, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Johnson, Luke (July 1, 2013). <a href=\"http:\/\/www.huffingtonpost.com\/2013\/07\/01\/george-bush-prism_n_3528249.html\"><u>&#8220;George W. Bush Defends PRISM: &#8216;I Put That Program in Place to Protect the Country'&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130702232322\/http:\/\/www.huffingtonpost.com\/2013\/07\/01\/george-bush-prism_n_3528249.html\"><u>Archived<\/u><\/a>&nbsp;July 2, 2013, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Huffington_Post\"><em><u><em>The Huffington Post<\/em><\/u><\/em><\/a>. Retrieved July 4, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Office_of_the_Director_of_National_Intelligence\"><u>Office of the Director of National Intelligence<\/u><\/a><em>&nbsp;(June 8, 2013). <\/em><a href=\"http:\/\/www.dni.gov\/files\/documents\/Facts on the Collection of Intelligence Pursuant to Section 702.pdf\"><u>&#8220;Facts on the Collection of Intelligence Pursuant to Section 702 of the Foreign Intelligence Surveillance Act&#8221;<\/u><\/a><em>&nbsp;<\/em>(PDF)<em>. dni.gov. <\/em><a href=\"https:\/\/web.archive.org\/web\/20131002221851\/http:\/\/www.dni.gov\/files\/documents\/Facts on the Collection of Intelligence Pursuant to Section 702.pdf\"><u>Archived<\/u><\/a><em>&nbsp;<\/em>(PDF)<em>&nbsp;from the original on October 2, 2013<\/em>. Retrieved July 25, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Mezzofiore, Gianluca (June 17, 2013). <a href=\"http:\/\/www.ibtimes.co.uk\/articles\/479709\/20130617\/nsa-whistleblower-edward-snowden.htm\"><u>&#8220;NSA Whistleblower Edward Snowden: Washington Snoopers Are Criminals&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130917104436\/http:\/\/www.ibtimes.co.uk\/articles\/479709\/20130617\/nsa-whistleblower-edward-snowden.htm\"><u>Archived<\/u><\/a>&nbsp;September 17, 2013, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/International_Business_Times\"><em><u><em>International Business Times<\/em><\/u><\/em><\/a>. Retrieved June 30, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>MacAskill, Ewan (August 23, 2013). <\/em><a href=\"https:\/\/www.theguardian.com\/world\/2013\/aug\/23\/nsa-prism-costs-tech-companies-paid\"><u>&#8220;NSA paid millions to cover Prism compliance costs for tech companies&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20151103204045\/http:\/\/www.theguardian.com\/world\/2013\/aug\/23\/nsa-prism-costs-tech-companies-paid\"><u>Archived<\/u><\/a><em>&nbsp;from the original on November 3, 2015<\/em>. Retrieved August 27, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Staff (June 6, 2013). <\/em><a href=\"https:\/\/www.washingtonpost.com\/wp-srv\/special\/politics\/prism-collection-documents\/\"><u>&#8220;NSA Slides Explain the PRISM Data-Collection Program&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Washington_Post\"><em><u><em>The Washington Post<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20140315231728\/http:\/\/www.washingtonpost.com\/wp-srv\/special\/politics\/prism-collection-documents\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on March 15, 2014<\/em>. Retrieved June 15, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>John D Bates (October 3, 2011). <\/em><a href=\"https:\/\/www.eff.org\/sites\/default\/files\/filenode\/fisc_opinion_-_unconstitutional_surveillance_0.pdf\"><u>&#8220;[redacted]&#8221;<\/u><\/a><em>&nbsp;<\/em>(PDF)<em>. p.&nbsp;71. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130824171345\/https:\/\/www.eff.org\/sites\/default\/files\/filenode\/fisc_opinion_-_unconstitutional_surveillance_0.pdf\"><u>Archived<\/u><\/a><em>&nbsp;<\/em>(PDF)<em>&nbsp;from the original on August 24, 2013<\/em>. Retrieved August 21, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Charlie_Savage_(author)\"><u>Savage, Charlie<\/u><\/a><em>; Wyatt, Edward; <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Peter_Baker_(author)\"><u>Baker, Peter<\/u><\/a><em>&nbsp;(June 6, 2013). <\/em><a href=\"https:\/\/www.nytimes.com\/2013\/06\/07\/us\/nsa-verizon-calls.html\"><u>&#8220;U.S. Says It Gathers Online Data Abroad&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_New_York_Times\"><em><u><em>The New York Times<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20170216072437\/http:\/\/www.nytimes.com\/2013\/06\/07\/us\/nsa-verizon-calls.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on February 16, 2017<\/em>. Retrieved June 6, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Glenn_Greenwald\"><u>Greenwald, Glenn<\/u><\/a><em>&nbsp;(June 5, 2013). <\/em><a href=\"https:\/\/www.theguardian.com\/world\/2013\/jun\/06\/nsa-phone-records-verizon-court-order\"><u>&#8220;NSA Collecting Phone Records of Millions of Verizon Customers Daily \u2013 Top Secret Court Order Requiring Verizon to Hand Over All Call Data Shows Scale of Domestic Surveillance under Obama&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Guardian\"><em><u><em>The Guardian<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130816045641\/http:\/\/www.theguardian.com\/world\/2013\/jun\/06\/nsa-phone-records-verizon-court-order\"><u>Archived<\/u><\/a><em>&nbsp;from the original on August 16, 2013<\/em>. Retrieved June 15, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Staff (June 6, 2013). <\/em><a href=\"https:\/\/news.yahoo.com\/intelligence-chief-blasts-nsa-leaks-declassifies-details-phone-025804881.html\"><u>&#8220;Intelligence Chief Blasts NSA Leaks, Declassifies Some Details about Phone Program Limits&#8221;<\/u><\/a><em>. Associated Press (via <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Washington_Post\"><u>The Washington Post<\/u><\/a><em>). <\/em><a href=\"https:\/\/web.archive.org\/web\/20151222130621\/http:\/\/news.yahoo.com\/intelligence-chief-blasts-nsa-leaks-declassifies-details-phone-025804881.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on December 22, 2015<\/em>. Retrieved June 15, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Ovide, Shira (June 8, 2013). <\/em><a href=\"https:\/\/online.wsj.com\/news\/articles\/SB10001424127887324299104578533802289432458\"><u>&#8220;U.S. Official Releases Details of Prism Program&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Wall_Street_Journal\"><em><u><em>The Wall Street Journal<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20131009211420\/http:\/\/online.wsj.com\/news\/articles\/SB10001424127887324299104578533802289432458\"><u>Archived<\/u><\/a><em>&nbsp;from the original on October 9, 2013<\/em>. Retrieved June 15, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Madison, Lucy (June 19, 2013). <\/em><a href=\"http:\/\/www.cbsnews.com\/8301-250_162-57590025\/obama-defends-narrow-surveillance-programs\/\"><u>&#8220;Obama Defends &#8216;Narrow&#8217; Surveillance Programs&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/CBS_News\"><em><u><em>CBS News<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130627182800\/http:\/\/www.cbsnews.com\/8301-250_162-57590025\/obama-defends-narrow-surveillance-programs\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 27, 2013<\/em>. Retrieved June 30, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Johnson, Kevin; Martin, Scott; O&#8217;Donnell, Jayne; Winter, Michael (June 15, 2013). <\/em><a href=\"https:\/\/www.usatoday.com\/story\/news\/2013\/06\/06\/nsa-surveillance-internet-companies\/2398345\/\"><u>&#8220;Reports: NSA Siphons Data from 9 Major Net Firms&#8221;<\/u><\/a><em>. <\/em><em>USA Today<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130607113440\/http:\/\/www.usatoday.com\/story\/news\/2013\/06\/06\/nsa-surveillance-internet-companies\/2398345\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 7, 2013<\/em>. Retrieved June 6, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;MacAskill, Ewen; Borger, Julian; Hopkins, Nick; <a href=\"https:\/\/en.wikipedia.org\/wiki\/Nick_Davies\"><u>Davies, Nick<\/u><\/a>; Ball, James (June 21, 2013). <a href=\"https:\/\/www.theguardian.com\/uk\/2013\/jun\/21\/gchq-cables-secret-world-communications-nsa\"><u>&#8220;GCHQ Taps Fibre-Optic Cables for Secret Access to World&#8217;s Communications\u2002\u2013 Exclusive: British Spy Agency Collects and Stores Vast Quantities of Global Email Messages, Facebook Posts, Internet Histories and Calls, and Shares Them with NSA, Latest Documents from Edward Snowden Reveal&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20171017143724\/https:\/\/www.theguardian.com\/uk\/2013\/jun\/21\/gchq-cables-secret-world-communications-nsa\"><u>Archived<\/u><\/a>&nbsp;October 17, 2017, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Guardian\"><em><u><em>The Guardian<\/em><\/u><\/em><\/a>. Retrieved June 30, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Staff (June 22, 2013). <a href=\"https:\/\/www.bbc.co.uk\/news\/uk-23017108\"><u>&#8220;GCHQ Data-Tapping Claims Nightmarish, Says German Justice Minister&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20190119175532\/https:\/\/www.bbc.co.uk\/news\/uk-23017108\"><u>Archived<\/u><\/a>&nbsp;January 19, 2019, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/BBC_News\"><u>BBC News<\/u><\/a>. Retrieved June 30, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Clayton, Mark (June 22, 2013). <a href=\"https:\/\/web.archive.org\/web\/20130626032506\/http:\/\/news.yahoo.com\/doubt-nsa-searches-information-americans-123943655.html\"><u>&#8220;When in Doubt, NSA Searches Information on Americans\u2002\u2013 According to Newly Revealed Secret Documents, the NSA Retains Wide Discretion over Targeting Individuals for Surveillance \u2013 Including, Potentially, Americans\u2002\u2013 Civil Libertarians Say &#8216;It Confirms Our Worst Fears'&#8221;<\/u><\/a><em>. Archived from the original on June 26, 2013<\/em>. Retrieved June 25, 2013<em>.<\/em>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Christian_Science_Monitor\"><em><u><em>The Christian Science Monitor<\/em><\/u><\/em><\/a>&nbsp;(via <a href=\"https:\/\/en.wikipedia.org\/wiki\/Yahoo!_News\"><u>Yahoo! News<\/u><\/a>). Retrieved June 30, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Staff (June 20, 2013). <a href=\"https:\/\/www.theguardian.com\/world\/interactive\/2013\/jun\/20\/exhibit-a-procedures-nsa-document\"><u>&#8220;Procedures Used by NSA to Target Non-US Persons: Exhibit A\u2002\u2013 Full Document\u2002\u2013 Top-Secret Documents Show FISA Judges Have Signed Off on Broad Orders Allowing the NSA to Make Use of Information &#8216;Inadvertently&#8217; Collected from Domestic US Communications Without a Warrant&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20170103043118\/https:\/\/www.theguardian.com\/world\/interactive\/2013\/jun\/20\/exhibit-a-procedures-nsa-document\"><u>Archived<\/u><\/a>&nbsp;January 3, 2017, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Guardian\"><em><u><em>The Guardian<\/em><\/u><\/em><\/a>. Retrieved June 29, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Bump, Philip (June 20, 2013). <a href=\"http:\/\/www.theatlanticwire.com\/national\/2013\/06\/guardian-leak-nsa-fisa-court-rules\/66456\"><u>&#8220;The NSA Guidelines for Spying on You Are Looser Than You&#8217;ve Been Told&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130623185439\/http:\/\/www.theatlanticwire.com\/national\/2013\/06\/guardian-leak-nsa-fisa-court-rules\/66456\/\"><u>Archived<\/u><\/a>&nbsp;June 23, 2013, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Atlantic_Wire\"><em><u><em>The Atlantic Wire<\/em><\/u><\/em><\/a>. Retrieved June 29, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/www.lemonde.fr\/technologies\/article\/2013\/10\/21\/espionnage-de-la-nsa-tous-les-documents-publies-par-le-monde_3499986_651865.html\"><u>&#8220;Espionnage de la NSA\u2002: tous les documents publi\u00e9s par &#8216;Le Monde'&#8221;<\/u><\/a><em>. <\/em><em>Le Monde<\/em><em>. October 21, 2013. <\/em><a href=\"https:\/\/web.archive.org\/web\/20131022024830\/http:\/\/www.lemonde.fr\/technologies\/article\/2013\/10\/21\/espionnage-de-la-nsa-tous-les-documents-publies-par-le-monde_3499986_651865.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on October 22, 2013<\/em>. Retrieved October 22, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/www.theguardian.com\/world\/interactive\/2013\/nov\/01\/prism-slides-nsa-document\"><u>&#8220;NSA Prism program slides&#8221;<\/u><\/a><em>. <\/em><em>The Guardian<\/em><em>. November 1, 2013. <\/em><a href=\"https:\/\/web.archive.org\/web\/20140320040225\/http:\/\/www.theguardian.com\/world\/interactive\/2013\/nov\/01\/prism-slides-nsa-document\"><u>Archived<\/u><\/a><em>&nbsp;from the original on March 20, 2014<\/em>. Retrieved March 19, 2014<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Gates, David Edgerley (June 26, 2013). <\/em><a href=\"http:\/\/www.sleuthsayers.org\/2013\/06\/through-glass-darkly.html\"><u>&#8220;Through a Glass, Darkly&#8221;<\/u><\/a><em>. <\/em><em>Spying<\/em><em>. Santa Fe: SleuthSayers. <\/em><a href=\"https:\/\/web.archive.org\/web\/20140125115912\/http:\/\/www.sleuthsayers.org\/2013\/06\/through-glass-darkly.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on January 25, 2014<\/em>. Retrieved January 4, 2014<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Lundin, Leigh (July 7, 2013). <\/em><a href=\"http:\/\/www.sleuthsayers.org\/2013\/07\/pam-prism-and-poindexter.html\"><u>&#8220;Pam, Prism, and Poindexter&#8221;<\/u><\/a><em>. <\/em><em>Spying<\/em><em>. Washington: SleuthSayers. <\/em><a href=\"https:\/\/web.archive.org\/web\/20140104063848\/http:\/\/www.sleuthsayers.org\/2013\/07\/pam-prism-and-poindexter.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on January 4, 2014<\/em>. Retrieved January 4, 2014<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/John_Dean\"><u>Dean, John W.<\/u><\/a><em>&nbsp;(December 30, 2005). <\/em><a href=\"http:\/\/writ.corporate.findlaw.com\/dean\/20051230.html\"><u>&#8220;George W. Bush as the New Richard M. Nixon: Both Wiretapped Illegally, and Impeachable; Both Claimed That a President May Violate Congress&#8217; Laws to Protect National Security&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/FindLaw\"><em><u><em>FindLaw<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20160304064700\/http:\/\/writ.corporate.findlaw.com\/dean\/20051230.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on March 4, 2016<\/em>. Retrieved June 12, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Elizabeth_Holtzman\"><u>Holtzman, Elizabeth<\/u><\/a><em>&nbsp;(January 11, 2006). <\/em><a href=\"http:\/\/www.thenation.com\/article\/impeachment-george-w-bush\"><u>&#8220;The Impeachment of George W. Bush&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Nation\"><em><u><em>The Nation<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130702172422\/http:\/\/www.thenation.com\/article\/impeachment-george-w-bush\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 2, 2013<\/em>. Retrieved June 12, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20160304040914\/https:\/\/apps.americanbar.org\/op\/greco\/memos\/aba_house302-0206.pdf\"><u>&#8220;Adopted by the House of Delegates&#8221;<\/u><\/a><em>&nbsp;<\/em>(PDF)<em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/American_Bar_Association\"><u>American Bar Association<\/u><\/a><em>. February 13, 2006. Archived from <\/em><a href=\"https:\/\/apps.americanbar.org\/op\/greco\/memos\/aba_house302-0206.pdf\"><u>the original<\/u><\/a><em>&nbsp;<\/em>(PDF)<em>&nbsp;on March 4, 2016<\/em>. Retrieved August 26, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Staff (February 14, 2006). <a href=\"https:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2006\/02\/13\/AR2006021302006.html\"><u>&#8220;Lawyers Group Criticizes Surveillance Program&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20171203142901\/http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2006\/02\/13\/AR2006021302006.html\"><u>Archived<\/u><\/a>&nbsp;December 3, 2017, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Washington_Post\"><em><u><em>The Washington Post<\/em><\/u><\/em><\/a>. Retrieved June 15, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>McAllister, Neil (December 29, 2012). <\/em><a href=\"https:\/\/www.theregister.co.uk\/2012\/12\/29\/senate_fisa_extension_vote\/\"><u>&#8220;Senate Votes to Continue FISA Domestic Spying Through 2017 \u2013 All Proposed Privacy Amendments Rejected&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Register\"><em><u><em>The Register<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130607102505\/http:\/\/www.theregister.co.uk\/2012\/12\/29\/senate_fisa_extension_vote\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 7, 2013<\/em>. Retrieved June 15, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/www.govtrack.us\/congress\/bills\/112\/hr5949\"><u>&#8220;H.R. 5949 (112th Congress): FISA Amendments Act Reauthorization Act of 2012&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130520122927\/http:\/\/www.govtrack.us\/congress\/bills\/112\/hr5949\"><u>Archived<\/u><\/a><em>&nbsp;from the original on May 20, 2013<\/em>. Retrieved June 19, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Privacy and Civil Liberties Oversight Board, <a href=\"http:\/\/www.pclob.gov\/library\/702-Report.pdf\"><u>&#8220;Report on the Surveillance Program Operated Pursuant to Section 702 of the Foreign Intelligence Surveillance Act&#8221;<\/u><\/a><em>&nbsp;<\/em>(PDF)<em>. <\/em><em>pclob.gov<\/em><em>. July 2, 2014. <\/em><a href=\"https:\/\/web.archive.org\/web\/20150218223115\/http:\/\/www.pclob.gov\/library\/702-Report.pdf\"><u>Archived<\/u><\/a><em>&nbsp;<\/em>(PDF)<em>&nbsp;from the original on February 18, 2015<\/em>. Retrieved February 19, 2015<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/www.techdirt.com\/articles\/20140630\/12101627734\/fbi-cia-also-make-use-backdoor-searches-nsa-data-to-access-us-communications-without-warrant.shtml\"><u>&#8220;FBI, CIA Use Backdoor Searches To Warrentlessly Spy On Americans&#8217; Communications&#8221;<\/u><\/a><em>. <\/em><em>TechDirt<\/em><em>. June 30, 2014. <\/em><a href=\"https:\/\/web.archive.org\/web\/20150219070214\/https:\/\/www.techdirt.com\/articles\/20140630\/12101627734\/fbi-cia-also-make-use-backdoor-searches-nsa-data-to-access-us-communications-without-warrant.shtml\"><u>Archived<\/u><\/a><em>&nbsp;from the original on February 19, 2015<\/em>. Retrieved February 19, 2015<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/www.washingtonpost.com\/wp-srv\/special\/politics\/prism-collection-documents\/\"><u>&#8220;NSA slides explain the PRISM data-collection program&#8221;<\/u><\/a><em>. July 10, 2013. <\/em><a href=\"https:\/\/web.archive.org\/web\/20140315231728\/http:\/\/www.washingtonpost.com\/wp-srv\/special\/politics\/prism-collection-documents\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on March 15, 2014<\/em>. Retrieved September 7, 2017<em>.<\/em>&nbsp;An annotated presentation of the NSA PRISM program as published by the Washington Post on 6 June 2013 and updated on 10 July 2013<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Glenn_Greenwald\"><u>Glenn Greenwald<\/u><\/a><em>, Ewen MacAskill, Laura Poitras, Spencer Ackerman and Dominic Rushe (July 11, 2013). <\/em><a href=\"https:\/\/www.theguardian.com\/world\/2013\/jul\/11\/microsoft-nsa-collaboration-user-data\"><u>&#8220;Revealed: how Microsoft handed the NSA access to encrypted messages&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Guardian\"><em><u><em>The Guardian<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20151119014627\/http:\/\/www.theguardian.com\/world\/2013\/jul\/11\/microsoft-nsa-collaboration-user-data\"><u>Archived<\/u><\/a><em>&nbsp;from the original on November 19, 2015<\/em>. Retrieved July 11, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/www.theguardian.com\/world\/the-nsa-files\"><u>&#8220;The NSA Files&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Guardian\"><em><u><em>The Guardian<\/em><\/u><\/em><\/a><em>. June 8, 2013. <\/em><a href=\"https:\/\/web.archive.org\/web\/20141003122712\/http:\/\/www.theguardian.com\/world\/the-nsa-files\"><u>Archived<\/u><\/a><em>&nbsp;from the original on October 3, 2014<\/em>. Retrieved December 12, 2016<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Rea, Kari (July 28, 2013). <\/em><a href=\"https:\/\/abcnews.go.com\/blogs\/politics\/2013\/07\/glenn-greenwald-low-level-nsa-analysts-have-powerful-and-invasive-search-tool\/\"><u>&#8220;Glenn Greenwald: Low-Level NSA Analysts Have &#8216;Powerful and Invasive&#8217; Search Tool&#8221;<\/u><\/a><em>. <\/em><em>ABC News<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130730024448\/https:\/\/abcnews.go.com\/blogs\/politics\/2013\/07\/glenn-greenwald-low-level-nsa-analysts-have-powerful-and-invasive-search-tool\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 30, 2013<\/em>. Retrieved July 30, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Glenn Greenwald (July 31, 2013). <\/em><a href=\"https:\/\/www.theguardian.com\/world\/2013\/jul\/31\/nsa-top-secret-program-online-data\"><u>&#8220;Revealed: NSA program collects &#8216;nearly everything a user does on the internet'&#8221;<\/u><\/a><em>. <\/em><em>Theguardian.com<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20131231025636\/http:\/\/www.theguardian.com\/world\/2013\/jul\/31\/nsa-top-secret-program-online-data\"><u>Archived<\/u><\/a><em>&nbsp;from the original on December 31, 2013<\/em>. Retrieved January 27, 2014<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/File:Prism-week-in-life-straight.png\"><u>File:Prism-week-in-life-straight.png<\/u><\/a>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130607010101\/http:\/\/www.dni.gov\/index.php\/newsroom\/press-releases\/191-press-releases-2013\/869-dni-statement-on-activities-authorized-under-section-702-of-fisa\"><u>&#8220;DNI Statement on Activities Authorized Under Section 702 of FISA&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Director_of_National_Intelligence\"><u>Director of National Intelligence<\/u><\/a><em>. June 6, 2013. Archived from <\/em><a href=\"http:\/\/www.dni.gov\/index.php\/newsroom\/press-releases\/191-press-releases-2013\/869-dni-statement-on-activities-authorized-under-section-702-of-fisa\"><u>the original<\/u><\/a><em>&nbsp;on June 7, 2013.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Greenberg, Andy (June 6, 2013). <\/em><a href=\"https:\/\/www.forbes.com\/sites\/andygreenberg\/2013\/06\/06\/watch-top-u-s-intelligence-officials-repeatedly-deny-nsa-spying-on-americans-over-the-last-year-videos\"><u>&#8220;Top U.S. Intelligence Officials Repeatedly Deny NSA Spying on Americans&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Forbes\"><em><u><em>Forbes<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130610080412\/http:\/\/www.forbes.com\/sites\/andygreenberg\/2013\/06\/06\/watch-top-u-s-intelligence-officials-repeatedly-deny-nsa-spying-on-americans-over-the-last-year-videos\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 10, 2013<\/em>. Retrieved June 7, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Scott_Shane\"><u>Shane, Scott<\/u><\/a><em>; <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/David_E._Sanger\"><u>Sanger, David E.<\/u><\/a><em>&nbsp;(June 30, 2013). <\/em><a href=\"https:\/\/www.nytimes.com\/2013\/07\/01\/us\/job-title-key-to-inner-access-held-by-snowden.html\"><u>&#8220;Job Title Key to Inner Access Held by Snowden&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_New_York_Times\"><em><u><em>The New York Times<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130704042802\/http:\/\/www.nytimes.com\/2013\/07\/01\/us\/job-title-key-to-inner-access-held-by-snowden.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 4, 2013<\/em>. Retrieved June 30, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20150908174404\/http:\/\/www.dni.gov\/index.php\/newsroom\/speeches-and-interviews\/195-speeches-interviews-2013\/874-director-james-r-clapper-interview-with-andrea-mitchell\"><u>&#8220;TRANSCRIPT OF ANDREA MITCHELL&#8217;S INTERVIEW WITH DIRECTOR OF NATIONAL INTELLIGENCE JAMES CLAPPER&#8221;<\/u><\/a><em>. <\/em><em>NBC News<\/em><em>. June 9, 2013. Archived from <\/em><a href=\"http:\/\/www.dni.gov\/index.php\/newsroom\/speeches-and-interviews\/195-speeches-interviews-2013\/874-director-james-r-clapper-interview-with-andrea-mitchell\"><u>the original<\/u><\/a><em>&nbsp;on September 8, 2015.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/www.voanews.com\/usa\/obama-defends-us-surveillance-programs\"><u>&#8220;Obama Defends US Surveillance Programs | Voice of America &#8211; English&#8221;<\/u><\/a><em>. <\/em><em>www.voanews.com<\/em>. Retrieved November 1, 2020<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Charlie_Savage_(author)\"><u>Savage, Charlie<\/u><\/a><em>; Wyatt, Edward; <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Peter_Baker_(author)\"><u>Baker, Peter<\/u><\/a><em>; Shear, Michael D. (June 7, 2013). <\/em><a href=\"https:\/\/www.nytimes.com\/2013\/06\/08\/us\/national-security-agency-surveillance.html\"><u>&#8220;Obama Calls Surveillance Programs Legal and Limited&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_New_York_Times\"><em><u><em>The New York Times<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130607145310\/http:\/\/www.nytimes.com\/2013\/06\/08\/us\/national-security-agency-surveillance.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 7, 2013<\/em>. Retrieved June 7, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Weisman, Jonathan; <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/David_E._Sanger\"><u>Sanger, David<\/u><\/a><em>&nbsp;(June 8, 2013). <\/em><a href=\"https:\/\/www.nytimes.com\/2013\/06\/09\/us\/politics\/officials-say-congress-was-fully-briefed-on-surveillance.html?smid=tw-share&amp;_r=0\"><u>&#8220;White House Plays Down Data Program&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_New_York_Times\"><em><u><em>The New York Times<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20140125111107\/http:\/\/www.nytimes.com\/2013\/06\/09\/us\/politics\/officials-say-congress-was-fully-briefed-on-surveillance.html?smid=tw-share&amp;_r=0\"><u>Archived<\/u><\/a><em>&nbsp;from the original on January 25, 2014<\/em>. Retrieved June 8, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130611065954\/http:\/\/www.dni.gov\/index.php\/newsroom\/press-releases\/191-press-releases-2013\/871-facts-on-the-collection-of-intelligence-pursuant-to-section-702-of-the-foreign-intelligence-surveillance-act\"><u>&#8220;Facts on the Collection of Intelligence Pursuant to Section 702 of the Foreign Intelligence Surveillance Act&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Director_of_National_Intelligence\"><u>Director of National Intelligence<\/u><\/a><em>. June 8, 2013. Archived from <\/em><a href=\"http:\/\/www.dni.gov\/index.php\/newsroom\/press-releases\/191-press-releases-2013\/871-facts-on-the-collection-of-intelligence-pursuant-to-section-702-of-the-foreign-intelligence-surveillance-act\"><u>the original<\/u><\/a><em>&nbsp;on June 11, 2013<\/em>. Retrieved June 8, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130611060537\/http:\/\/www.dni.gov\/index.php\/newsroom\/press-releases\/191-press-releases-2013\/872-dni-statement-on-the-collection-of-intelligence-pursuant-to-section-702-of-the-foreign-intelligence-surveillance-act\"><u>&#8220;DNI Statement on the Collection of Intelligence Pursuant to Section 702 of the Foreign Intelligence Surveillance Act&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Director_of_National_Intelligence\"><u>Director of National Intelligence<\/u><\/a><em>. June 8, 2013. Archived from <\/em><a href=\"http:\/\/www.dni.gov\/index.php\/newsroom\/press-releases\/191-press-releases-2013\/872-dni-statement-on-the-collection-of-intelligence-pursuant-to-section-702-of-the-foreign-intelligence-surveillance-act\"><u>the original<\/u><\/a><em>&nbsp;on June 11, 2013<\/em>. Retrieved June 8, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Miller, Greg; Nakashima, Ellen (June 25, 2013). <a href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/nsa-fact-sheet-on-surveillance-program-pulled-from-web-after-senators-criticism\/2013\/06\/25\/afe95d9e-ddda-11e2-b797-cbd4cb13f9c6_story.html\"><u>&#8220;NSA Fact Sheet on Surveillance Program Pulled from Web After Senators&#8217; Criticism&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20170410025458\/https:\/\/www.washingtonpost.com\/world\/national-security\/nsa-fact-sheet-on-surveillance-program-pulled-from-web-after-senators-criticism\/2013\/06\/25\/afe95d9e-ddda-11e2-b797-cbd4cb13f9c6_story.html\"><u>Archived<\/u><\/a>&nbsp;April 10, 2017, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Washington_Post\"><em><u><em>The Washington Post<\/em><\/u><\/em><\/a>. Retrieved July 2, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Staff (June 13, 2013). <a href=\"https:\/\/www.bbc.co.uk\/news\/world-us-canada-22884566\"><u>&#8220;Snowden Leaks Caused US &#8216;Significant Harm&#8217;\u2002\u2013 Mueller&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20190218224301\/https:\/\/www.bbc.co.uk\/news\/world-us-canada-22884566\"><u>Archived<\/u><\/a>&nbsp;February 18, 2019, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/BBC_News\"><u>BBC News<\/u><\/a>. Retrieved July 1, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Press release (June 13, 2013). <a href=\"http:\/\/www.wyden.senate.gov\/news\/press-releases\/udall-wyden-call-on-national-security-agency-director-to-clarify-comments-on-effectiveness-of-phone-data-collection-program\"><u>&#8220;Udall, Wyden Call on National Security Agency Director to Clarify Comments on Effectiveness of Phone Data Collection Program&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20160204134046\/https:\/\/www.wyden.senate.gov\/news\/press-releases\/udall-wyden-call-on-national-security-agency-director-to-clarify-comments-on-effectiveness-of-phone-data-collection-program\"><u>Archived<\/u><\/a>&nbsp;February 4, 2016, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. Office of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Ron_Wyden\"><u>Ron Wyden<\/u><\/a>. Retrieved July 1, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Gerstein, Josh (June 18, 2013). <a href=\"http:\/\/www.politico.com\/story\/2013\/06\/nsa-leak-keith-alexander-92971.html\"><u>&#8220;NSA: PRISM Stopped NYSE Attack&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130621221716\/http:\/\/www.politico.com\/story\/2013\/06\/nsa-leak-keith-alexander-92971.html\"><u>Archived<\/u><\/a>&nbsp;June 21, 2013, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Politico\"><em><u><em>Politico<\/em><\/u><\/em><\/a>. Retrieved July 1, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Nakashima, Ellen (June 18, 2013). <\/em><a href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/officials-surveillance-programs-foiled-more-than-50-terrorist-plots\/2013\/06\/18\/d657cb56-d83e-11e2-9df4-895344c13c30_story.html\"><u>&#8220;Officials: surveillance programs foiled more than 50 terrorist attacks&#8221;<\/u><\/a><em>. <\/em><em>Washington Post<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20170930002305\/https:\/\/www.washingtonpost.com\/world\/national-security\/officials-surveillance-programs-foiled-more-than-50-terrorist-plots\/2013\/06\/18\/d657cb56-d83e-11e2-9df4-895344c13c30_story.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on September 30, 2017<\/em>. Retrieved September 7, 2017<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Chang, Ailsa (June 19, 2013). <\/em><a href=\"https:\/\/www.npr.org\/2013\/06\/19\/193347739\/secret-surveillance-credited-with-preventing-terror-acts\"><u>&#8220;Secret Surveillance Credited with Preventing Terror Acts&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/NPR\"><u>NPR<\/u><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130702053547\/http:\/\/www.npr.org\/2013\/06\/19\/193347739\/secret-surveillance-credited-with-preventing-terror-acts\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 2, 2013<\/em>. Retrieved July 1, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/abcnews.go.com\/m\/story?id=19436557\"><u>&#8220;NSA Claim of Thwarted NYSE Plot Contradicted by Court Documents&#8221;<\/u><\/a><em>. <\/em><em>ABC News<\/em><em>. June 19, 2013. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130714222317\/https:\/\/abcnews.go.com\/m\/story?id=19436557\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 14, 2013<\/em>. Retrieved July 13, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130708003807\/http:\/\/www.markudall.senate.gov\/?p=press_release&amp;id=3542\"><u>&#8220;Udall, Bipartisan Group of Senators Seek Answers from DNI Clapper on Bulk Data Collection Program&#8221;<\/u><\/a><em>. June 28, 2013. Archived from <\/em><a href=\"http:\/\/www.markudall.senate.gov\/?p=press_release&amp;id=3542\"><u>the original<\/u><\/a><em>&nbsp;on July 8, 2013<\/em>. Retrieved July 13, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Barbara_Starr\"><u>Starr, Barbara<\/u><\/a>&nbsp;(June 25, 2013). <a href=\"http:\/\/security.blogs.cnn.com\/2013\/06\/25\/terrorists-try-changes-after-snowden-leaks-official-says\"><u>&#8220;Terrorists Try Changes After Snowden Leaks, Official Says&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130626050412\/http:\/\/security.blogs.cnn.com\/2013\/06\/25\/terrorists-try-changes-after-snowden-leaks-official-says\/\"><u>Archived<\/u><\/a>&nbsp;June 26, 2013, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <em>Security Clearance<\/em>&nbsp;(blog of <a href=\"https:\/\/en.wikipedia.org\/wiki\/CNN\"><u>CNN<\/u><\/a>). Retrieved June 29, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Nakashima, Ellen; Miller, Greg (June 24, 2013). <\/em><a href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/us-officials-worried-about-security-of-files-snowden-is-thought-to-have\/2013\/06\/24\/1e036964-dd09-11e2-85de-c03ca84cb4ef_story.html\"><u>&#8220;U.S. Worried About Security of Files Snowden Is Thought to Have&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Washington_Post\"><em><u><em>The Washington Post<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130627162556\/http:\/\/www.washingtonpost.com\/world\/national-security\/us-officials-worried-about-security-of-files-snowden-is-thought-to-have\/2013\/06\/24\/1e036964-dd09-11e2-85de-c03ca84cb4ef_story.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 27, 2013<\/em>. Retrieved June 29, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Blake, Aaron (June 7, 2013). <\/em><a href=\"https:\/\/www.washingtonpost.com\/blogs\/post-politics\/wp\/2013\/06\/07\/congress-all-but-silent-on-surveillance-of-internet-records\/\"><u>&#8220;Congress All But Silent on Surveillance of Internet Records&#8221;<\/u><\/a><em>. Post Politics (blog of <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Washington_Post\"><u>The Washington Post<\/u><\/a><em>). <\/em><a href=\"https:\/\/web.archive.org\/web\/20130611012232\/http:\/\/www.washingtonpost.com\/blogs\/post-politics\/wp\/2013\/06\/07\/congress-all-but-silent-on-surveillance-of-internet-records\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 11, 2013<\/em>. Retrieved June 16, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Everett, Burgess; Sherman, Jake (June 7, 2013). <\/em><a href=\"http:\/\/www.politico.com\/story\/2013\/06\/republicans-nsa-surveillance-92418.html\"><u>&#8220;Republican Lawmakers: NSA Surveillance News to Me&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Politico\"><em><u><em>Politico<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130612045858\/http:\/\/www.politico.com\/story\/2013\/06\/republicans-nsa-surveillance-92418.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 12, 2013<\/em>. Retrieved June 16, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Klinck, Patrick (June 9, 2013). <\/em><a href=\"https:\/\/archive.today\/20130615114518\/http:\/\/www.wgrz.com\/news\/article\/217041\/1\/Higgins-on-Surveillance-Balance-Is-Key\"><u>&#8220;Higgins on Surveillance: Balance Is Key&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/WGRZ\"><u>WGRZ<\/u><\/a><em>. Archived from <\/em><a href=\"http:\/\/www.wgrz.com\/news\/article\/217041\/1\/Higgins-on-Surveillance-Balance-Is-Key\"><u>the original<\/u><\/a><em>&nbsp;on June 15, 2013<\/em>. Retrieved June 16, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Bohan, Caren (June 9, 2013). <\/em><a href=\"http:\/\/articles.chicagotribune.com\/2013-06-09\/news\/sns-rt-us-usa-security-lawmakersbre9580ab-20130609_1_guardian-national-security-agency-surveillance\"><u>&#8220;Lawmakers Urge Review of Domestic Spying, Patriot Act&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Chicago_Tribune\"><em><u><em>Chicago Tribune<\/em><\/u><\/em><\/a><em>. Reuters. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130616074150\/http:\/\/articles.chicagotribune.com\/2013-06-09\/news\/sns-rt-us-usa-security-lawmakersbre9580ab-20130609_1_guardian-national-security-agency-surveillance\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 16, 2013<\/em>. Retrieved June 16, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Knowlton, Brian (June 9, 2013). <\/em><a href=\"http:\/\/thecaucus.blogs.nytimes.com\/2013\/06\/09\/lawmaker-calls-for-renewed-debate-over-patriot-act\/\"><u>&#8220;Feinstein &#8216;Open&#8217; to Hearings on Surveillance Programs&#8221;<\/u><\/a><em>. The Caucus (blog of <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_New_York_Times\"><u>The New York Times<\/u><\/a><em>). <\/em><a href=\"https:\/\/web.archive.org\/web\/20130615001823\/http:\/\/thecaucus.blogs.nytimes.com\/2013\/06\/09\/lawmaker-calls-for-renewed-debate-over-patriot-act\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 15, 2013<\/em>. Retrieved June 16, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Greta_Van_Susteren\"><u>Van Susteren, Greta<\/u><\/a><em>&nbsp;(June 11, 2013). <\/em><a href=\"https:\/\/web.archive.org\/web\/20130616022141\/http:\/\/gretawire.foxnewsinsider.com\/2013\/06\/11\/sen-feinstein-says-declassifying-info-on-nsa-program-would-show-the-benefits-of-the-program\/\"><u>&#8220;Sen. Feinstein Says Declassifying Info on NSA Program Would Show the Benefits of the Program&#8221;<\/u><\/a><em>. Gretawire (blog of <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Fox_News_Channel\"><u>Fox News Channel<\/u><\/a><em>). Archived from <\/em><a href=\"http:\/\/gretawire.foxnewsinsider.com\/2013\/06\/11\/sen-feinstein-says-declassifying-info-on-nsa-program-would-show-the-benefits-of-the-program\/\"><u>the original<\/u><\/a><em>&nbsp;on June 16, 2013<\/em>. Retrieved June 16, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Chang, Ailsa (June 11, 2013). <\/em><a href=\"https:\/\/www.npr.org\/blogs\/itsallpolitics\/2013\/06\/11\/190742087\/what-did-congress-really-know-about-nsa-tracking\"><u>&#8220;What Did Congress Really Know About NSA Tracking&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/NPR\"><u>NPR<\/u><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130616010105\/http:\/\/www.npr.org\/blogs\/itsallpolitics\/2013\/06\/11\/190742087\/what-did-congress-really-know-about-nsa-tracking\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 16, 2013<\/em>. Retrieved June 16, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Jim_Sensenbrenner\"><u>Sensenbrenner, Jim<\/u><\/a><em>&nbsp;(June 9, 2013). <\/em><a href=\"https:\/\/www.theguardian.com\/commentisfree\/2013\/jun\/09\/abuse-patriot-act-must-end\"><u>&#8220;This Abuse of the Patriot Act Must End \u2013 President Obama Falsely Claims Congress Authorised All NSA Surveillance \u2013 In Fact, Our Law Was Designed to Protect Liberties&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Guardian\"><em><u><em>The Guardian<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130822013449\/http:\/\/www.theguardian.com\/commentisfree\/2013\/jun\/09\/abuse-patriot-act-must-end\"><u>Archived<\/u><\/a><em>&nbsp;from the original on August 22, 2013<\/em>. Retrieved June 15, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>McClanahan, Mike (June 9, 2013). <\/em><a href=\"https:\/\/web.archive.org\/web\/20140125153922\/http:\/\/cbs42.com\/2013\/06\/09\/u-s-leaders-react-to-leak-detailing-nsa-surveillance-program\/\"><u>&#8220;U.S. Leaders React to Leak Detailing NSA Surveillance Program&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/WIAT\"><u>WIAT<\/u><\/a><em>. Archived from <\/em><a href=\"http:\/\/www.cbs42.com\/2013\/06\/09\/u-s-leaders-react-to-leak-detailing-nsa-surveillance-program\/\"><u>the original<\/u><\/a><em>&nbsp;on January 25, 2014<\/em>. Retrieved June 15, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Howell, Jr., Tom (June 10, 2013). <a href=\"#ixzz2VpVrooVK\"><u>&#8220;Rep. Todd Rokita: No Government Snooping Without Probable Cause&#8221;<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Washington_Times\"><em><u><em>The Washington Times<\/em><\/u><\/em><\/a>. Retrieved June 12, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Risen, James (June 11, 2013). <\/em><a href=\"https:\/\/www.nytimes.com\/2013\/07\/12\/us\/report-indicates-more-extensive-cooperation-by-microsoft-on-surveillance.html\"><u>&#8220;Report Indicates More Extensive Cooperation by Microsoft on Surveillance&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/New_York_Times\"><em><u><em>New York Times<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130712103127\/http:\/\/www.nytimes.com\/2013\/07\/12\/us\/report-indicates-more-extensive-cooperation-by-microsoft-on-surveillance.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 12, 2013<\/em>. Retrieved June 12, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Watkins, Aiy (July 17, 2013). <\/em><a href=\"#.UeecsI2pqSo\"><u>&#8220;Skeptical Congress turns its spycam on NSA surveillance&#8221;<\/u><\/a><em>. McClatchy News Service. <\/em><a href=\"#.UeecsI2pqSo\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 18, 2013<\/em>. Retrieved July 18, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Carol_D._Leonnig\"><u>Leonnig, Carol D.<\/u><\/a><em>; Ellen Nakashima, Ellen; <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Barton_Gellman\"><u>Gellman, Barton<\/u><\/a><em>&nbsp;(June 29, 2013). <\/em><a href=\"https:\/\/www.washingtonpost.com\/politics\/secret-court-judges-upset-at-portrayal-of-collaboration-with-government\/2013\/06\/29\/ed73fb68-e01b-11e2-b94a-452948b95ca8_print.html\"><u>&#8220;Secret-Court Judges Upset at Portrayal of &#8216;Collaboration&#8217; with Government&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Washington_Post\"><em><u><em>The Washington Post<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130630191209\/http:\/\/www.washingtonpost.com\/politics\/secret-court-judges-upset-at-portrayal-of-collaboration-with-government\/2013\/06\/29\/ed73fb68-e01b-11e2-b94a-452948b95ca8_print.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 30, 2013<\/em>. Retrieved July 1, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Lichtblau, Eric (July 6, 2013). <\/em><a href=\"https:\/\/www.nytimes.com\/2013\/07\/07\/us\/in-secret-court-vastly-broadens-powers-of-nsa.html?src=mb&amp;_r=0&amp;pagewanted=all\"><u>&#8220;In Secret, Court Vastly Broadens Powers of N.S.A.&#8221;<\/u><\/a><em>&nbsp;<\/em><em>The New York Times<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20140125132449\/http:\/\/www.nytimes.com\/2013\/07\/07\/us\/in-secret-court-vastly-broadens-powers-of-nsa.html?src=mb&amp;_r=0&amp;pagewanted=all\"><u>Archived<\/u><\/a><em>&nbsp;from the original on January 25, 2014<\/em>. Retrieved July 8, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Rosenthal, Andrew (July 9, 2013). <\/em><a href=\"http:\/\/takingnote.blogs.nytimes.com\/2013\/07\/09\/a-court-without-adversaries\/?src=recg&amp;gwh=650D45C4EE080588144D61FA7A1AC5AF\"><u>&#8220;A Court Without Adversaries&#8221;<\/u><\/a><em>. <\/em><em>The New York Times<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20140125140823\/http:\/\/takingnote.blogs.nytimes.com\/2013\/07\/09\/a-court-without-adversaries\/?src=recg&amp;gwh=650D45C4EE080588144D61FA7A1AC5AF\"><u>Archived<\/u><\/a><em>&nbsp;from the original on January 25, 2014<\/em>. Retrieved July 10, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>John Shiffman &amp; Kristina Cooke (June 21, 2013). <\/em><a href=\"https:\/\/www.reuters.com\/article\/usa-security-fisa-judges-idUSL2N0EV1TG20130621\"><u>&#8220;The judges who preside over America&#8217;s secret court&#8221;<\/u><\/a><em>. <\/em><em>Reuters<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130623010333\/https:\/\/www.reuters.com\/article\/2013\/06\/21\/usa-security-fisa-judges-idUSL2N0EV1TG20130621\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 23, 2013<\/em>. Retrieved July 13, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Walton, Reggie B. (July 29, 2013). <\/em><a href=\"http:\/\/www.leahy.senate.gov\/download\/honorable-patrick-j-leahy\"><u>&#8220;2013-07-29 Letter of FISA Court president Reggie B. Walton to the Chairman of the U.S. Senate Judiciary Committee Patrick J. Leahy about certain operations of the FISA Court&#8221;<\/u><\/a><em>. <\/em><em>www.leahy.senate.gov<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130818103512\/http:\/\/www.leahy.senate.gov\/download\/honorable-patrick-j-leahy\"><u>Archived<\/u><\/a><em>&nbsp;from the original on August 18, 2013<\/em>. Retrieved August 25, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Spencer_Ackerman\"><u>Ackerman, Spencer<\/u><\/a>; Roberts, Dan (June 28, 2013). <a href=\"https:\/\/www.theguardian.com\/world\/2013\/jun\/28\/us-army-blocks-guardian-website-access\"><u>&#8220;US Army Blocks Access to Guardian Website to Preserve &#8216;Network Hygiene&#8217;\u2002\u2013 Military Admits to Filtering Reports and Content Relating to Government Surveillance Programs for Thousands of Personnel&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20170103143200\/https:\/\/www.theguardian.com\/world\/2013\/jun\/28\/us-army-blocks-guardian-website-access\"><u>Archived<\/u><\/a>&nbsp;January 3, 2017, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Guardian\"><em><u><em>The Guardian<\/em><\/u><\/em><\/a>. Retrieved June 30, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Ackerman, Spencer (July 1, 2013). <\/em><a href=\"https:\/\/www.theguardian.com\/world\/2013\/jul\/01\/us-military-blocks-guardian-troops\"><u>&#8220;US military blocks entire Guardian website for troops stationed abroad&#8221;<\/u><\/a><em>. <\/em><em>The Guardian<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20170202141818\/https:\/\/www.theguardian.com\/world\/2013\/jul\/01\/us-military-blocks-guardian-troops\"><u>Archived<\/u><\/a><em>&nbsp;from the original on February 2, 2017<\/em>. Retrieved December 12, 2016<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/orf.at\/stories\/2189880\/\"><u>Ex-Verfassungssch\u00fctzer: US-\u00dcberwachung auch in \u00d6sterreich<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130709091127\/http:\/\/orf.at\/stories\/2189880\"><u>Archived<\/u><\/a>&nbsp;July 9, 2013, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>, 2013-07-06.(in German)<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/www.news.at\/a\/gert-polli-cia-news-talk-ex-verfassungsschutz-boss-255323\"><u>Gert Polli rechnet mit der CIA ab: NEWS-Talk mit dem Ex-Verfassungsschutz-Boss<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130715225053\/http:\/\/www.news.at\/a\/gert-polli-cia-news-talk-ex-verfassungsschutz-boss-255323\"><u>Archived<\/u><\/a>&nbsp;July 15, 2013, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>, 2009-11-11.(in German)<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Talor, Josh (June 11, 2013). <a href=\"https:\/\/www.zdnet.com\/au\/australian-government-to-assess-prism-impact-7000016637\/\"><u>&#8220;Australian Government to Assess Prism Impact&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130614222125\/http:\/\/www.zdnet.com\/au\/australian-government-to-assess-prism-impact-7000016637\/\"><u>Archived<\/u><\/a>&nbsp;June 14, 2013, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/ZDNet\"><u>ZDNet<\/u><\/a>. Retrieved June 11, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Taylor, Josh. <\/em><a href=\"https:\/\/www.zdnet.com\/au\/australian-government-to-assess-prism-impact-7000016637\/\"><u>&#8220;Australian government to assess PRISM impact&#8221;<\/u><\/a><em>. <\/em><em>ZDnet<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20140125133746\/http:\/\/www.zdnet.com\/au\/australian-government-to-assess-prism-impact-7000016637\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on January 25, 2014<\/em>. Retrieved January 13, 2014<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Morning Post, South China (January 23, 2014). <\/em><a href=\"http:\/\/www.scmp.com\/news\/world\/article\/1411682\/australian-minister-slams-treachery-nsa-whistleblower-snowden\"><u>&#8220;Australian minister slams &#8216;treachery&#8217; of NSA whistleblower Snowden&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20140209034539\/http:\/\/www.scmp.com\/news\/world\/article\/1411682\/australian-minister-slams-treachery-nsa-whistleblower-snowden\"><u>Archived<\/u><\/a><em>&nbsp;from the original on February 9, 2014<\/em>. Retrieved March 20, 2014<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/www.telegraph.co.uk\/news\/worldnews\/southamerica\/brazil\/10289391\/Dilma-Rousseff-cancels-preparations-for-US-trip-over-spying-row.html\"><u>&#8220;Dilma Rousseff cancels preparations for US trip over spying row&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20171231103833\/http:\/\/www.telegraph.co.uk\/news\/worldnews\/southamerica\/brazil\/10289391\/Dilma-Rousseff-cancels-preparations-for-US-trip-over-spying-row.html\"><u>Archived<\/u><\/a>&nbsp;December 31, 2017, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>, Donna Bowater, <em>The Telegraph<\/em>, September 5, 2013. Retrieved October 20, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/www.democracynow.org\/blog\/2013\/9\/24\/video_at_un_brazilian_president_dilma\"><u>&#8220;At U.N. General Assembly, Brazilian President Dilma Rousseff Blasts U.S. Spying Operations&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20131018235939\/http:\/\/www.democracynow.org\/blog\/2013\/9\/24\/video_at_un_brazilian_president_dilma\"><u>Archived<\/u><\/a>&nbsp;October 18, 2013, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>, Dilma Rousseff, Video and transcript, <em>Democracy Now!<\/em>, September 24, 2013. Retrieved October 20, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Soto, Alonso (December 18, 2013). <\/em><a href=\"https:\/\/www.reuters.com\/article\/brazil-jets-idUSL2N0JX17W20131218\"><u>&#8220;UPDATE 3-Saab wins Brazil jet deal after NSA spying sours Boeing bid&#8221;<\/u><\/a><em>. <\/em><em>Reuters<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20140125021402\/http:\/\/www.reuters.com\/article\/2013\/12\/18\/brazil-jets-idUSL2N0JX17W20131218\"><u>Archived<\/u><\/a><em>&nbsp;from the original on January 25, 2014<\/em>. Retrieved January 27, 2014<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Horgan, Colin (June 10, 2013). <\/em><a href=\"http:\/\/www.ipolitics.ca\/2013\/06\/10\/should-canadians-worry-about-the-nsas-prism-program-maybe\/\"><u>&#8220;Should Canadians Worry About the NSA&#8217;s PRISM Program? Maybe&#8221;<\/u><\/a><em>. <\/em><em>ipolitics.ca<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20131110151549\/http:\/\/www.ipolitics.ca\/2013\/06\/10\/should-canadians-worry-about-the-nsas-prism-program-maybe\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on November 10, 2013<\/em>. Retrieved June 16, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Parsons, Christopher (March 27, 2014). <\/em><a href=\"https:\/\/citizenlab.org\/2014\/03\/mapping-canadian-governments-telecommunications-surveillance\/\"><u>&#8220;Mapping the Canadian Government&#8217;s Telecommunications Surveillance&#8221;<\/u><\/a><em>. <\/em><em>citizenlab.org<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20140709024754\/https:\/\/citizenlab.org\/2014\/03\/mapping-canadian-governments-telecommunications-surveillance\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 9, 2014<\/em>. Retrieved March 28, 2014<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/www.nytimes.com\/2013\/10\/22\/business\/international\/eu-panel-backs-plan-to-shield-online-data.html\"><u>&#8220;Rules Shielding Online Data From N.S.A. and Other Prying Eyes Advance in Europe&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20161106204529\/http:\/\/www.nytimes.com\/2013\/10\/22\/business\/international\/eu-panel-backs-plan-to-shield-online-data.html\"><u>Archived<\/u><\/a>&nbsp;November 6, 2016, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>, James Kanter and Mike Scott, <em>New York Times<\/em>, 21 October 2013. Retrieved October 22, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Loek Essers (February 17, 2014). <\/em><a href=\"http:\/\/www.itworld.com\/security\/405353\/merkel-and-hollande-talk-about-avoiding-us-servers\"><u>&#8220;Merkel and Hollande to talk about avoiding US servers&#8221;<\/u><\/a><em>. <\/em><em>ITworld<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20140221104005\/http:\/\/www.itworld.com\/security\/405353\/merkel-and-hollande-talk-about-avoiding-us-servers\"><u>Archived<\/u><\/a><em>&nbsp;from the original on February 21, 2014<\/em>. Retrieved February 18, 2014<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/www.nytimes.com\/reuters\/2013\/10\/21\/world\/europe\/21reuters-france-nsa.html\"><u>&#8220;France Calls U.S. Ambassador Over Spying Report&#8221;<\/u><\/a>[<a href=\"https:\/\/en.wikipedia.org\/wiki\/Wikipedia:Link_rot\"><em><u><em>permanent dead link<\/em><\/u><\/em><\/a>], Adrian Croft, Arshad Mohammed, Alexandria Sage, and Mark John, <em>New York Times<\/em>&nbsp;(Reuters), October 21, 2013. Retrieved October 21, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Prodhan, Georgina; Davenport, Claire (June 7, 2013). <a href=\"https:\/\/www.reuters.com\/article\/europe-surveillance-prism-idUSL5N0EJ3G520130607\"><u>&#8220;U.S. Surveillance Revelations Deepen European Fears of Web Giants&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20150924181929\/http:\/\/www.reuters.com\/article\/2013\/06\/07\/europe-surveillance-prism-idUSL5N0EJ3G520130607\"><u>Archived<\/u><\/a>&nbsp;September 24, 2015, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Reuters\"><u>Reuters<\/u><\/a>. Retrieved June 16, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Schofield, Matthew. (June 26, 2013). <a href=\"#.Uc1vEHy9KK1#storylink=cpy\"><u>&#8220;Memories of Stasi Color Germans&#8217; View of U.S. Surveillance Programs&#8221;<\/u><\/a>&nbsp;<a href=\"#.Uc1vEHy9KK1\"><u>Archived<\/u><\/a>&nbsp;June 28, 2013, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/McClatchy_Washington_Bureau\"><u>McClatchy Washington Bureau<\/u><\/a>. Retrieved June 30, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/www.spiegel.de\/politik\/deutschland\/bild-bericht-bundeswehr-soll-von-prism-gewusst-haben-a-911531.html\"><u>&#8220;The German Army was using PRISM to support its operations in Afghanistan as early as 2011&#8221;<\/u><\/a><em>. <\/em><em>Der Spiegel<\/em><em>&nbsp;(in German). July 17, 2013. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130718190958\/http:\/\/www.spiegel.de\/politik\/deutschland\/bild-bericht-bundeswehr-soll-von-prism-gewusst-haben-a-911531.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 18, 2013<\/em>. Retrieved July 18, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Jackson, David (October 23, 2013). <\/em><a href=\"https:\/\/www.usatoday.com\/story\/news\/2013\/10\/23\/obama-merkel-national-security-agency\/3171477\/\"><u>&#8220;Obama says NSA not spying on Merkel&#8217;s cellphone&#8221;<\/u><\/a><em>. <\/em><em>USA Today<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20131023211737\/http:\/\/www.usatoday.com\/story\/news\/2013\/10\/23\/obama-merkel-national-security-agency\/3171477\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on October 23, 2013<\/em>. Retrieved October 24, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Smith-Spark, Laura (October 24, 2013). <\/em><a href=\"http:\/\/www.cnn.com\/2013\/10\/24\/world\/europe\/europe-summit-nsa-surveillance\/\"><u>&#8220;Merkel calls Obama: Spying on friends &#8216;never acceptable'&#8221;<\/u><\/a><em>. CNN. <\/em><a href=\"https:\/\/web.archive.org\/web\/20131025072021\/http:\/\/www.cnn.com\/2013\/10\/24\/world\/europe\/europe-summit-nsa-surveillance\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on October 25, 2013<\/em>. Retrieved October 24, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Sadan, Nitzan (June 8, 2013). <a href=\"https:\/\/translate.google.com\/translate?sl=auto&amp;tl=en&amp;js=n&amp;prev=_t&amp;hl=en&amp;ie=UTF-8&amp;u=www.calcalist.co.il\/internet\/articles\/0,7340,L-3604528,00.html&amp;safe=off\"><u>&#8220;Report: &#8216;Big Brother&#8217; of the U.S. Government Relies on Israeli Technology&#8221; (Google English translation of Hebrew article)<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20170107014317\/http:\/\/translate.google.com\/translate?sl=auto&amp;tl=en&amp;js=n&amp;prev=_t&amp;hl=en&amp;ie=UTF-8&amp;u=www.calcalist.co.il\/internet\/articles\/0,7340,L-3604528,00.html&amp;safe=off\"><u>Archived<\/u><\/a>&nbsp;January 7, 2017, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Calcalist\"><em><u><em>Calcalist<\/em><\/u><\/em><\/a>. Retrieved June 10, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Kelley, Michael (June 7, 2013). <a href=\"http:\/\/www.businessinsider.com\/israelis-bugged-the-us-for-the-nsa-2013-6\"><u>&#8220;Did You Know?: Two Secretive Israeli Companies Reportedly Bugged the US Telecommunications Grid for the NSA&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130609093000\/http:\/\/www.businessinsider.com\/israelis-bugged-the-us-for-the-nsa-2013-6\"><u>Archived<\/u><\/a>&nbsp;June 9, 2013, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Business_Insider\"><em><u><em>Business Insider<\/em><\/u><\/em><\/a>. Retrieved June 10, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Villamil, Jenaro (June 18, 2013).<a href=\"http:\/\/www.proceso.com.mx\/?p=345205\"><u>&#8220;Big Brother y CISEN millionario negocio en puerta.&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130623015709\/http:\/\/www.proceso.com.mx\/?p=345205\"><u>Archived<\/u><\/a>&nbsp;June 23, 2013, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>&nbsp;proceso.com.mx. Retrieved February 19, 2014.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;McCorkindale, Wilma (June 11, 2013). <a href=\"http:\/\/www.stuff.co.nz\/national\/politics\/8782798\/Expert-says-Kiwis-under-constant-surveillance\"><u>&#8220;Expert Says Kiwis under Constant Surveillance&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20131006194038\/http:\/\/www.stuff.co.nz\/national\/politics\/8782798\/Expert-says-Kiwis-under-constant-surveillance\"><u>Archived<\/u><\/a>&nbsp;October 6, 2013, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Stuff.co.nz\"><u>Stuff.co.nz<\/u><\/a>. Retrieved June 12, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/www.nzherald.co.nz\/nz\/news\/article.cfm?c_id=1&amp;objectid=11321712\"><u>&#8220;Dotcom doubts big reveal will hurt Key&#8221;<\/u><\/a><em>. <\/em><em>The New Zealand Herald<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20141005162837\/http:\/\/www.nzherald.co.nz\/nz\/news\/article.cfm?c_id=1&amp;objectid=11321712\"><u>Archived<\/u><\/a><em>&nbsp;from the original on October 5, 2014<\/em>. Retrieved October 5, 2014<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/www.nytimes.com\/2013\/10\/29\/world\/europe\/spain-calls-in-us-ambassador-in-spying-scandal.html\"><u>&#8220;Spain Summons American Ambassador on New Reports of N.S.A. Spying&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20170328105051\/http:\/\/www.nytimes.com\/2013\/10\/29\/world\/europe\/spain-calls-in-us-ambassador-in-spying-scandal.html\"><u>Archived<\/u><\/a>&nbsp;March 28, 2017, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>, Raphael Minder, <em>New York Times<\/em>, October 28, 2013. Retrieved October 29, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/sites.google.com\/a\/independent.gov.uk\/isc\/files\/20130717_ISC_statement_GCHQ.pdf\"><u>&#8220;Statement on GCHQ&#8217;s Alleged Interception of Communications under the US PRISM Programme&#8221;<\/u><\/a><em>&nbsp;<\/em>(PDF)<em>. Intelligence and Security Committee of Parliament. July 17, 2013<\/em>. Retrieved December 17, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/www.theguardian.com\/world\/2013\/aug\/20\/nsa-snowden-files-drives-destroyed-london\"><u>&#8220;NSA files: why the Guardian in London destroyed hard drives of leaked files&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20170204030346\/https:\/\/www.theguardian.com\/world\/2013\/aug\/20\/nsa-snowden-files-drives-destroyed-london\"><u>Archived<\/u><\/a>&nbsp;February 4, 2017, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>&nbsp;<em>The Guardian<\/em>, 20 August 2013<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Farivar, Cyrus (June 6, 2013). <\/em><a href=\"https:\/\/arstechnica.com\/tech-policy\/2013\/06\/new-leak-feds-can-access-anything-in-your-google-facebook-and-more\/\"><u>&#8220;New Leak Shows Feds Can Access User Accounts for Google, Facebook and More \u2013 Secret Slides Reveal Massive Government Spying, Tech Companies Dispute Reports&#8221;<\/u><\/a><em>. <\/em><em>Ars Technica<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130610055301\/http:\/\/arstechnica.com\/tech-policy\/2013\/06\/new-leak-feds-can-access-anything-in-your-google-facebook-and-more\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 10, 2013<\/em>. Retrieved June 12, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Lardinois, Frederic (June 6, 2013). <\/em><a href=\"https:\/\/techcrunch.com\/2013\/06\/06\/google-facebook-apple-deny-participation-in-nsa-prism-program\/\"><u>&#8220;Google, Facebook, Dropbox, Yahoo, Microsoft and Apple Deny Participation in NSA PRISM Surveillance Program&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/TechCrunch\"><em><u><em>TechCrunch<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130613004834\/http:\/\/techcrunch.com\/2013\/06\/06\/google-facebook-apple-deny-participation-in-nsa-prism-program\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 13, 2013<\/em>. Retrieved June 12, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Lee, Timothy B. (June 12, 2013). <\/em><a href=\"https:\/\/www.washingtonpost.com\/blogs\/wonkblog\/wp\/2013\/06\/12\/heres-everything-we-know-about-prism-to-date\/\"><u>&#8220;Here&#8217;s Everything We Know About PRISM to Date&#8221;<\/u><\/a><em>. Wonkblog (blog of <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Washington_Post\"><u>The Washington Post<\/u><\/a><em>). <\/em><a href=\"https:\/\/web.archive.org\/web\/20130614073616\/http:\/\/www.washingtonpost.com\/blogs\/wonkblog\/wp\/2013\/06\/12\/heres-everything-we-know-about-prism-to-date\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 14, 2013<\/em>. Retrieved June 13, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Bekker, Scott (June 20, 2013). <\/em><a href=\"http:\/\/rcpmag.com\/blogs\/scott-bekker\/2013\/06\/prism-and-microsoft.aspx\"><u>&#8220;PRISM and Microsoft: What We Know So Far&#8221;<\/u><\/a><em>. Redmond Channel Partner. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130726054454\/http:\/\/rcpmag.com\/Blogs\/Scott-Bekker\/2013\/06\/PRISM-and-Microsoft.aspx\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 26, 2013<\/em>. Retrieved July 12, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>LeFebvre, Rob (June 7, 2013). <\/em><a href=\"https:\/\/web.archive.org\/web\/20130609061546\/https:\/\/www.cultofmac.com\/230358\/everything-you-need-to-know-about-apple-and-prism\/\"><u>&#8220;Everything You Need To Know About Apple And PRISM [Updated]&#8221;<\/u><\/a><em>. <\/em><em>Cult of Mac<\/em><em>. Archived from <\/em><a href=\"https:\/\/www.cultofmac.com\/230358\/everything-you-need-to-know-about-apple-and-prism\/\"><u>the original<\/u><\/a><em>&nbsp;on June 9, 2013<\/em>. Retrieved February 26, 2019<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Stern, Joanna (June 7, 2013). <\/em><a href=\"https:\/\/abcnews.go.com\/Technology\/nsa-prism-dissecting-technology-companies-adamant-denial-involvement\/story?id=19350095\"><u>&#8220;Dissecting Big Tech&#8217;s Denial of Involvement in NSA&#8217;s PRISM Spying Program&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/ABC_News\"><em><u><em>ABC News<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130612172047\/https:\/\/abcnews.go.com\/Technology\/nsa-prism-dissecting-technology-companies-adamant-denial-involvement\/story?id=19350095\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 12, 2013<\/em>. Retrieved June 13, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Elias, Paul (May 31, 2013). <\/em><a href=\"https:\/\/news.yahoo.com\/judge-orders-google-turn-over-data-fbi-000951138.html\"><u>&#8220;Judge Orders Google to Turn Over Data to FBI&#8221;<\/u><\/a><em>. Associated Press (via <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Yahoo!_News\"><u>Yahoo! News<\/u><\/a><em>). <\/em><a href=\"https:\/\/web.archive.org\/web\/20130608091855\/http:\/\/news.yahoo.com\/judge-orders-google-turn-over-data-fbi-000951138.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 8, 2013<\/em>. Retrieved June 15, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Grant, Rebecca (June 6, 2013). <\/em><a href=\"https:\/\/venturebeat.com\/2013\/06\/06\/google-tried-to-resist-fbi-requests-for-data-but-the-fbi-took-it-anyway\/\"><u>&#8220;Google Tried to Resist FBI Requests for Data, But the FBI Took It Anyway&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/VentureBeat\"><em><u><em>VentureBeat<\/em><\/u><\/em><\/a>. Retrieved June 15, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/www.nytimes.com\/2013\/06\/08\/technology\/tech-companies-bristling-concede-to-government-surveillance-efforts.html?ref=global-home&amp;_r=1&amp;&amp;pagewanted=all\"><u>&#8220;Tech Companies Concede to Surveillance Program&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_New_York_Times\"><em><u><em>The New York Times<\/em><\/u><\/em><\/a><em>. June 7, 2013. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130615072702\/http:\/\/www.nytimes.com\/2013\/06\/08\/technology\/tech-companies-bristling-concede-to-government-surveillance-efforts.html?ref=global-home&amp;_r=1&amp;&amp;pagewanted=all\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 15, 2013<\/em>. Retrieved June 8, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Ball, James (June 8, 2013). <\/em><a href=\"https:\/\/www.theguardian.com\/world\/2013\/jun\/08\/nsa-prism-server-collection-facebook-google\"><u>&#8220;NSA&#8217;s Prism Surveillance Program: How It Works and What It Can Do \u2013 Slide from Secret PowerPoint Presentation Describes How Program Collects Data &#8216;Directly from the Servers&#8217; of Tech Firms \u2013 Obama Deflects Criticism over NSA Surveillance&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Guardian\"><em><u><em>The Guardian<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130731013812\/http:\/\/www.theguardian.com\/world\/2013\/jun\/08\/nsa-prism-server-collection-facebook-google\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 31, 2013<\/em>. Retrieved June 15, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Kim_Zetter\"><u>Zetter, Kim<\/u><\/a><em>&nbsp;(June 11, 2013). <\/em><a href=\"https:\/\/www.wired.com\/threatlevel\/2013\/06\/google-uses-secure-ftp-to-feds\/\"><u>&#8220;Google&#8217;s Real Secret Spy Program? Secure FTP&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Wired_(magazine)\"><em><u><em>Wired<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130614065829\/http:\/\/www.wired.com\/threatlevel\/2013\/06\/google-uses-secure-ftp-to-feds\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 14, 2013<\/em>. Retrieved June 13, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Ted_Ullyot\"><u>Ullyot, Ted<\/u><\/a><em>&nbsp;(Facebook General Counsel) (June 14, 2013). <\/em><a href=\"http:\/\/newsroom.fb.com\/News\/636\/Facebook-Releases-Data-Including-All-National-Security-Requests\"><u>&#8220;Facebook Releases Data, Including All National Security Requests&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Facebook\"><u>Facebook<\/u><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130704153628\/http:\/\/newsroom.fb.com\/News\/636\/Facebook-Releases-Data-Including-All-National-Security-Requests\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 4, 2013<\/em>. Retrieved July 4, 2013<em>.<\/em>&nbsp;{{<a href=\"https:\/\/en.wikipedia.org\/wiki\/Template:Cite_web\"><u>cite web<\/u><\/a>}}: |author=&nbsp;has generic name (<a href=\"#generic_name\"><u>help<\/u><\/a>)<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Frank, Jon (Vice President and Deputy General Counsel, Microsoft) (June 14, 2013). <\/em><a href=\"https:\/\/web.archive.org\/web\/20130703170612\/http:\/\/blogs.technet.com\/b\/microsoft_on_the_issues\/archive\/2013\/06\/14\/microsoft-s-u-s-law-enforcement-and-national-security-requests-for-last-half-of-2012.aspx\"><u>&#8220;Microsoft&#8217;s U.S. Law Enforcement and National Security Requests for Last Half of 2012&#8221;<\/u><\/a><em>. Microsoft on the Issues (blog of <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Microsoft\"><u>Microsoft<\/u><\/a><em>). Archived from <\/em><a href=\"http:\/\/blogs.technet.com\/b\/microsoft_on_the_issues\/archive\/2013\/06\/14\/microsoft-s-u-s-law-enforcement-and-national-security-requests-for-last-half-of-2012.aspx\"><u>the original<\/u><\/a><em>&nbsp;on July 3, 2013<\/em>. Retrieved July 4, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Miller, Claire Cain (June 15, 2013). <\/em><a href=\"http:\/\/bits.blogs.nytimes.com\/2013\/06\/15\/google-calls-u-s-data-request-disclosures-a-step-backward-for-users\/\"><u>&#8220;Google Calls U.S. Data Request Disclosures a Step Backward for Users&#8221;<\/u><\/a><em>. Bits (blog of <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_New_York_Times\"><u>The New York Times<\/u><\/a><em>). <\/em><a href=\"https:\/\/web.archive.org\/web\/20130619042008\/http:\/\/bits.blogs.nytimes.com\/2013\/06\/15\/google-calls-u-s-data-request-disclosures-a-step-backward-for-users\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 19, 2013<\/em>. Retrieved July 4, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Mims, Christopher (November 14, 2013). <\/em><a href=\"http:\/\/qz.com\/147313\/ciscos-disastrous-quarter-shows-how-nsa-spying-could-freeze-us-companies-out-of-a-trillion-dollar-opportunity\/\"><u>&#8220;Cisco&#8217;s disastrous quarter shows how NSA spying could freeze US companies out of a trillion-dollar opportunity&#8221;<\/u><\/a><em>. <\/em><em>Quartz<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20140125021309\/http:\/\/qz.com\/147313\/ciscos-disastrous-quarter-shows-how-nsa-spying-could-freeze-us-companies-out-of-a-trillion-dollar-opportunity\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on January 25, 2014<\/em>. Retrieved January 27, 2014<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Ron Bell; General Counsel (September 12, 2014). <\/em><a href=\"https:\/\/web.archive.org\/web\/20141114023157\/http:\/\/yahoopolicy.tumblr.com\/post\/97238899258\/shedding-light-on-the-foreign-intelligence-surveillance\"><u>&#8220;Shedding Light on the Foreign Intelligence Surveillance Court (FISC): Court Findings from Our 2007-2008 Case&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Yahoo!\"><u>Yahoo!<\/u><\/a><em>. Archived from <\/em><a href=\"https:\/\/yahoopolicy.tumblr.com\/post\/97238899258\/shedding-light-on-the-foreign-intelligence-surveillance\"><u>the original<\/u><\/a><em>&nbsp;on November 14, 2014<\/em>. Retrieved September 12, 2014<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Editorial (June 6, 2013). <\/em><a href=\"https:\/\/www.nytimes.com\/2013\/06\/07\/opinion\/president-obamas-dragnet.html\"><u>&#8220;President Obama&#8217;s Dragnet&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_New_York_Times\"><em><u><em>The New York Times<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130607093645\/http:\/\/www.nytimes.com\/2013\/06\/07\/opinion\/president-obamas-dragnet.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 7, 2013<\/em>. Retrieved June 6, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Editorial (June 10, 2013). <\/em><a href=\"https:\/\/www.nytimes.com\/2013\/06\/11\/opinion\/a-real-debate-on-surveillance.html\"><u>&#8220;A Real Debate on Surveillance&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_New_York_Times\"><em><u><em>The New York Times<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130611014338\/http:\/\/www.nytimes.com\/2013\/06\/11\/opinion\/a-real-debate-on-surveillance.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 11, 2013<\/em>. Retrieved June 10, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>The New York Times Editorial Board (July 8, 2013). <\/em><a href=\"https:\/\/www.nytimes.com\/2013\/07\/09\/opinion\/the-laws-you-cant-see.html\"><u>&#8220;The Laws You Can&#8217;t See&#8221;<\/u><\/a><em>. <\/em><em>The New York Times<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130709064730\/http:\/\/www.nytimes.com\/2013\/07\/09\/opinion\/the-laws-you-cant-see.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 9, 2013<\/em>. Retrieved July 9, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Braun, Stephan (July 9, 2013). <\/em><a href=\"https:\/\/web.archive.org\/web\/20130711211028\/https:\/\/abcnews.go.com\/Politics\/wireStory\/oversight-board-hears-testimony-nsa-spying-19613092\"><u>&#8220;Former Judge Admits Flaws in Secret Court&#8221;<\/u><\/a><em>. Associated Press. Archived from <\/em><a href=\"https:\/\/abcnews.go.com\/Politics\/wireStory\/oversight-board-hears-testimony-nsa-spying-19613092\"><u>the original<\/u><\/a><em>&nbsp;on July 11, 2013<\/em>. Retrieved July 10, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Savage, Charlie (July 9, 2013). <\/em><a href=\"https:\/\/www.nytimes.com\/2013\/07\/10\/us\/nation-will-gain-by-discussing-surveillance-expert-tells-privacy-board.html\"><u>&#8220;Nation Will Gain by Discussing Surveillance, Expert Tells Privacy Board&#8221;<\/u><\/a><em>. <\/em><em>The New York Times<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130710122100\/http:\/\/www.nytimes.com\/2013\/07\/10\/us\/nation-will-gain-by-discussing-surveillance-expert-tells-privacy-board.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 10, 2013<\/em>. Retrieved July 10, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Valerie_Plame\"><u>Wilson, Valerie Plame<\/u><\/a>&nbsp;and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Joseph_C._Wilson\"><u>Joe [Joseph C.] Wilson<\/u><\/a>&nbsp;(June 23, 2013). <a href=\"https:\/\/www.theguardian.com\/commentisfree\/2013\/jun\/23\/nsa-intelligence-industrial-complex-abuse\"><u>&#8220;The NSA&#8217;s Metastasised Intelligence-Industrial Complex Is ripe for Abuse \u2013 Where Oversight and Accountability Have Failed, Snowden&#8217;s Leaks Have Opened Up a Vital Public Debate on Our Rights and Privacy&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20170225062222\/https:\/\/www.theguardian.com\/commentisfree\/2013\/jun\/23\/nsa-intelligence-industrial-complex-abuse\"><u>Archived<\/u><\/a>&nbsp;February 25, 2017, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Guardian\"><em><u><em>The Guardian<\/em><\/u><\/em><\/a>. Retrieved July 1, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Staff (undated). <a href=\"https:\/\/action.eff.org\/o\/9042\/p\/dia\/action3\/common\/public\/?action_KEY=9260\"><u>&#8220;Massive Spying Program Exposed \u2013 Demand Answers Now&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130613075727\/https:\/\/action.eff.org\/o\/9042\/p\/dia\/action3\/common\/public\/?action_KEY=9260\"><u>Archived<\/u><\/a>&nbsp;June 13, 2013, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Electronic_Frontier_Foundation\"><u>Electronic Frontier Foundation<\/u><\/a>. Retrieved June 13, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Ed Pilkington; Nicholas Watt (June 12, 2013). <\/em><a href=\"https:\/\/www.theguardian.com\/world\/2013\/jun\/12\/nsa-surveillance-data-terror-attack\"><u>&#8220;NSA Surveillance Played Little Role in Foiling Terror Plots, Experts Say&#8221;<\/u><\/a><em>. <\/em><em>The Guardian<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130801165509\/http:\/\/www.theguardian.com\/world\/2013\/jun\/12\/nsa-surveillance-data-terror-attack\"><u>Archived<\/u><\/a><em>&nbsp;from the original on August 1, 2013<\/em>. Retrieved June 14, 2013<em>. Obama Administration Says NSA Data Helped Make Arrests in Two Important Cases \u2013 But Critics Say That Simply Isn&#8217;t True<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Daly, Michael (June 12, 2013). <a href=\"http:\/\/www.thedailybeast.com\/articles\/2013\/06\/12\/nsa-surveillance-program-failed-to-invade-tamerlan-tsarnaev-s-privacy.html\"><u>&#8220;NSA Surveillance Program Failed to Invade Tamerlan Tsarnaev&#8217;s Privacy&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130614141653\/http:\/\/www.thedailybeast.com\/articles\/2013\/06\/12\/nsa-surveillance-program-failed-to-invade-tamerlan-tsarnaev-s-privacy.html\"><u>Archived<\/u><\/a>&nbsp;June 14, 2013, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Daily_Beast\"><u>The Daily Beast<\/u><\/a>. Retrieved June 14, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Weiner, Rachel (June 10, 2013). <\/em><a href=\"https:\/\/www.washingtonpost.com\/blogs\/post-politics\/wp\/2013\/06\/10\/ron-paul-praises-edward-snowden\/\"><u>&#8220;Ron Paul Praises Edward Snowden&#8221;<\/u><\/a><em>. Post Politics (blog of <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Washington_Post\"><u>The Washington Post<\/u><\/a><em>)<\/em>. Retrieved June 16, 2013<em>.<\/em>&nbsp;&#8220;We should be thankful for individuals like Edward Snowden and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Glenn_Greenwald\"><u>Glenn Greenwald<\/u><\/a>&nbsp;who see injustice being carried out by their own government and speak out, despite the risk. &#8230; They have done a great service to the American people by exposing the truth about what our government is doing in secret.&#8221; &#8220;The government does not need to know more about what we are doing. &#8230; We need to know more about what the government is doing.&#8221;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Malyun, Ali (2020). <\/em><em>I Cannot Be Silenced<\/em><em>. Page Publishing.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Friedman, Thomas L. (June 11, 2013). <\/em><a href=\"https:\/\/www.nytimes.com\/2013\/06\/12\/opinion\/friedman-blowing-a-whistle.html\"><u>&#8220;Blowing a whistle&#8221;<\/u><\/a><em>. <\/em><em>New York Times<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20170319140711\/http:\/\/www.nytimes.com\/2013\/06\/12\/opinion\/friedman-blowing-a-whistle.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on March 19, 2017<\/em>. Retrieved February 28, 2017<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/www.pbs.org\/newshour\/bb\/politics\/jan-june13\/shieldsbrooks_06-14.html\"><u>&#8220;Shields and Brooks on Syria, Snowden and surveillance&#8221;<\/u><\/a><em>. <\/em><em>PBS NewsHour<\/em><em>. June 14, 2013. <\/em><a href=\"https:\/\/web.archive.org\/web\/20140130185542\/http:\/\/www.pbs.org\/newshour\/bb\/politics\/jan-june13\/shieldsbrooks_06-14.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on January 30, 2014<\/em>. Retrieved September 7, 2017<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Krauthammer, Charles (June 13, 2013). <\/em><a href=\"https:\/\/www.washingtonpost.com\/opinions\/charles-krauthammer-pushing-the-envelope-nsa-style\/2013\/06\/13\/ac1ecf5c-d45f-11e2-8cbe-1bcbee06f8f8_story.html\"><u>&#8220;Pushing the envelope, NSA-style&#8221;<\/u><\/a><em>. <\/em><em>Washington Post<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20170714155537\/https:\/\/www.washingtonpost.com\/opinions\/charles-krauthammer-pushing-the-envelope-nsa-style\/2013\/06\/13\/ac1ecf5c-d45f-11e2-8cbe-1bcbee06f8f8_story.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 14, 2017<\/em>. Retrieved September 7, 2017<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Duncan, Ian (June 8, 2013). <a href=\"http:\/\/articles.baltimoresun.com\/2013-06-08\/news\/bal-david-simon-weighs-in-on-nsa-surveillance-20130608_1_david-simon-dna-law-maryland-dna\"><u>&#8220;David Simon Weighs In on NSA Surveillance \u2013 Creator of &#8216;The Wire&#8217; Describes 1980s Data Collection by Baltimore Police in Blog Post&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130615211347\/http:\/\/articles.baltimoresun.com\/2013-06-08\/news\/bal-david-simon-weighs-in-on-nsa-surveillance-20130608_1_david-simon-dna-law-maryland-dna\"><u>Archived<\/u><\/a>&nbsp;June 15, 2013, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Baltimore_Sun\"><em><u><em>The Baltimore Sun<\/em><\/u><\/em><\/a>. Retrieved June 16, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/davidsimon.com\/we-are-shocked-shocked\/\"><u>&#8220;We Are Shocked, Shocked&#8230;<\/u><\/a>&#8221; (<a href=\"https:\/\/web.archive.org\/web\/20130612225129\/http:\/\/davidsimon.com\/we-are-shocked-shocked\/\"><u>Archive<\/u><\/a>) David Simon Blog. June 7, 2013. Retrieved June 12, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Harvey, Fiona (June 19, 2013). <a href=\"https:\/\/www.theguardian.com\/world\/2013\/jun\/19\/nsa-surveillance-attack-american-citizens-noam-chomsky\"><u>&#8220;NSA Surveillance Is an Attack on American Citizens, Says Noam Chomsky \u2013 Governments Will Use Whatever Technology Is Available to Combat Their Primary Enemy \u2013 Their Own Population, Says Critic&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20170112091028\/https:\/\/www.theguardian.com\/world\/2013\/jun\/19\/nsa-surveillance-attack-american-citizens-noam-chomsky\"><u>Archived<\/u><\/a>&nbsp;January 12, 2017, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Guardian\"><em><u><em>The Guardian<\/em><\/u><\/em><\/a>. Retrieved June 20, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;LoGiurato, Brett (June 17, 2013). <a href=\"http:\/\/www.businessinsider.com\/prism-surveillance-poll-nsa-obama-approval-2013-6\"><u>&#8220;The NSA&#8217;s PRISM Program Is Shockingly Uncontroversial with the American Public&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130622015729\/http:\/\/www.businessinsider.com\/prism-surveillance-poll-nsa-obama-approval-2013-6\"><u>Archived<\/u><\/a>&nbsp;June 22, 2013, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Business_Insider\"><u>Business Insider<\/u><\/a>. Retrieved July 1, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/i2.cdn.turner.com\/cnn\/2013\/images\/06\/17\/rel7a.pdf\"><u>&#8220;CNN\/ORC Poll for release June 17, 2013&#8221;<\/u><\/a><em>&nbsp;<\/em>(PDF)<em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130626162336\/http:\/\/i2.cdn.turner.com\/cnn\/2013\/images\/06\/17\/rel7a.pdf\"><u>Archived<\/u><\/a><em>&nbsp;<\/em>(PDF)<em>&nbsp;from the original on June 26, 2013<\/em>. Retrieved July 6, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/www.quinnipiac.edu\/institutes-and-centers\/polling-institute\/national\/release-detail?ReleaseID=1919\"><u>&#8220;U.S. Voters Say Snowden Is Whistle-Blower, Not Traitor, Quinnipiac University National Poll Finds; Big Shift On Civil Liberties vs. Counter-Terrorism&#8221;<\/u><\/a><em>. Quinnipiac University. July 10, 2013. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130714050548\/http:\/\/www.quinnipiac.edu\/institutes-and-centers\/polling-institute\/national\/release-detail?ReleaseID=1919\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 14, 2013<\/em>. Retrieved July 13, 2012<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/www.pollingreport.com\/terror.htm\"><u>&#8220;Terrorism&#8221;<\/u><\/a><em>. PollingReport.com. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130728224809\/http:\/\/www.pollingreport.com\/terror.htm\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 28, 2013<\/em>. Retrieved July 13, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Cohen, Jon; Balz, Dan (July 24, 2013). <\/em><a href=\"https:\/\/www.washingtonpost.com\/politics\/poll-privacy-concerns-rise-after-nsa-leaks\/2013\/07\/23\/3a1b64a6-f3c7-11e2-a2f1-a7acf9bd5d3a_story.html\"><u>&#8220;Poll: Privacy concerns rise after NSA leaks&#8221;<\/u><\/a><em>. <\/em><em>Washington Post<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20140127143424\/http:\/\/www.washingtonpost.com\/politics\/poll-privacy-concerns-rise-after-nsa-leaks\/2013\/07\/23\/3a1b64a6-f3c7-11e2-a2f1-a7acf9bd5d3a_story.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on January 27, 2014<\/em>. Retrieved July 25, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Castro, Daniel (August 2013). <\/em><a href=\"http:\/\/www2.itif.org\/2013-cloud-computing-costs.pdf\"><u>&#8220;How Much Will PRISM Cost the U.S. Cloud Computing Industry?&#8221;<\/u><\/a><em>&nbsp;<\/em>(PDF)<em>. The Information Technology and Innovation Foundation. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130810030644\/http:\/\/www2.itif.org\/2013-cloud-computing-costs.pdf\"><u>Archived<\/u><\/a><em>&nbsp;<\/em>(PDF)<em>&nbsp;from the original on August 10, 2013<\/em>. Retrieved August 11, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Peterson, Andrea (August 7, 2013). <\/em><a href=\"https:\/\/www.washingtonpost.com\/blogs\/the-switch\/wp\/2013\/08\/07\/nsa-snooping-could-cost-u-s-tech-companies-35-billion-over-three-years\/\"><u>&#8220;NSA snooping could cost U.S. tech companies $35 billion over three years&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Washington_Post\"><em><u><em>The Washington Post<\/em><\/u><\/em><\/a>. Retrieved August 8, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Rosenbush, Steve (August 6, 2013). <\/em><a href=\"https:\/\/blogs.wsj.com\/cio\/2013\/08\/06\/the-morning-download-cloud-industry-could-lose-billions-on-nsa-disclosures\/\"><u>&#8220;Cloud Industry Could Lose Billions on NSA Disclosures&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Wall_Street_Journal\"><em><u><em>The Wall Street Journal<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130809044610\/http:\/\/blogs.wsj.com\/cio\/2013\/08\/06\/the-morning-download-cloud-industry-could-lose-billions-on-nsa-disclosures\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on August 9, 2013<\/em>. Retrieved August 8, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Yaron, Oded (August 8, 2013). <\/em><a href=\"http:\/\/www.haaretz.com\/news\/world\/.premium-1.540571\"><u>&#8220;Study: NSA leaks could cost U.S. $22\u201335 billion&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Haaretz\"><em><u><em>Haaretz<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130809062045\/http:\/\/www.haaretz.com\/news\/world\/.premium-1.540571\"><u>Archived<\/u><\/a><em>&nbsp;from the original on August 9, 2013<\/em>. Retrieved August 8, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Palmer, Danny (August 6, 2013). <\/em><a href=\"http:\/\/www.computing.co.uk\/ctg\/news\/2287148\/prism-could-cost-us-cloud-firms-usd35bn-but-benefit-european-providers\"><u>&#8220;PRISM could cost US cloud firms $35bn but benefit European providers&#8221;<\/u><\/a><em>. computing.co.uk. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130813110041\/http:\/\/www.computing.co.uk\/ctg\/news\/2287148\/prism-could-cost-us-cloud-firms-usd35bn-but-benefit-european-providers\"><u>Archived<\/u><\/a><em>&nbsp;from the original on August 13, 2013<\/em>. Retrieved August 11, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Berman, Matt (June 12, 2013). <\/em><a href=\"https:\/\/news.yahoo.com\/international-response-nsa-wtf-america-112300308.html\"><u>&#8220;International Response to NSA: WTF, America?&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/National_Journal\"><u>National Journal<\/u><\/a><em>&nbsp;(via <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Yahoo!_News\"><u>Yahoo! News<\/u><\/a><em>). <\/em><a href=\"https:\/\/web.archive.org\/web\/20130615044159\/http:\/\/news.yahoo.com\/international-response-nsa-wtf-america-112300308.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 15, 2013<\/em>. Retrieved July 1, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Staff (June 25, 2013). <\/em><a href=\"https:\/\/web.archive.org\/web\/20130709231555\/http:\/\/www.spiegel.de\/international\/german-press-reactions-to-tempora-data-surveillance-scandal-a-907720.html\"><u>&#8220;World from Berlin: &#8216;Do Costs of Hunting Terrorists Exceed Benefits?'&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Der_Spiegel\"><em><u><em>Der Spiegel<\/em><\/u><\/em><\/a><em>. Archived from <\/em><a href=\"http:\/\/www.spiegel.de\/international\/german-press-reactions-to-tempora-data-surveillance-scandal-a-907720.html\"><u>the original<\/u><\/a><em>&nbsp;on July 9, 2013<\/em>. Retrieved July 1, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Fitsanakis, Joseph (June 20, 2013). <\/em><a href=\"http:\/\/intelnews.org\/2013\/06\/20\/01-1283\/\"><u>&#8220;Analysis: PRISM Revelations Harm US Political, Financial Interests&#8221;<\/u><\/a><em>. IntelNews. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130701062810\/http:\/\/intelnews.org\/2013\/06\/20\/01-1283\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 1, 2013<\/em>. Retrieved July 1, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Murphy, Katherine (June 20, 2013). <a href=\"https:\/\/www.theguardian.com\/world\/2013\/jun\/20\/nsa-australian-intelligence-agencies\"><u>&#8220;NSA Revelations Prompt Questions about Australian Intelligence Agencies\u2002\u2013 Senator Nick Xenophon Seeks Reassurances That Australian MPs Are Not Being Watched in Wake of Prism Disclosures&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20160315124251\/http:\/\/www.theguardian.com\/world\/2013\/jun\/20\/nsa-australian-intelligence-agencies\"><u>Archived<\/u><\/a>&nbsp;March 15, 2016, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Guardian\"><em><u><em>The Guardian<\/em><\/u><\/em><\/a>. Retrieved July 1, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Sieff, Kevin (June 16, 2013). <a href=\"http:\/\/www.post-gazette.com\/morning-file\/2013\/06\/15\/NSA-spying-leaks-Taliban-says-ho-hum\/stories\/201306150154\"><u>&#8220;NSA Spying Leaks? Taliban Says: Ho-Hum&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20140127183215\/http:\/\/www.post-gazette.com\/morning-file\/2013\/06\/15\/NSA-spying-leaks-Taliban-says-ho-hum\/stories\/201306150154\"><u>Archived<\/u><\/a>&nbsp;January 27, 2014, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Washington_Post\"><em><u><em>The Washington Post<\/em><\/u><\/em><\/a>&nbsp;(via the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Pittsburgh_Post-Gazette\"><em><u><em>Pittsburgh Post-Gazette<\/em><\/u><\/em><\/a>). Retrieved June 16, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Staff (June 16, 2013). <a href=\"http:\/\/www.scmp.com\/news\/world\/article\/1261784\/spy-programmes-no-secret-taliban\"><u>&#8220;Spy Programmes No Secret to Taliban&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130616170614\/http:\/\/www.scmp.com\/news\/world\/article\/1261784\/spy-programmes-no-secret-taliban\"><u>Archived<\/u><\/a>&nbsp;June 16, 2013, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Washington_Post\"><em><u><em>The Washington Post<\/em><\/u><\/em><\/a>&nbsp;(via the <a href=\"https:\/\/en.wikipedia.org\/wiki\/South_China_Morning_Post\"><em><u><em>South China Morning Post<\/em><\/u><\/em><\/a>). Retrieved June 16, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Jeremy Fleming (October 29, 2013). <\/em><a href=\"http:\/\/www.euractiv.com\/specialreport-digital-single-mar\/commission-establish-security-bu-news-531370\"><u>&#8220;Brussels to set up security, business networks in push for European cloud&#8221;<\/u><\/a><em>. EurActiv. <\/em><a href=\"https:\/\/web.archive.org\/web\/20140125085337\/http:\/\/www.euractiv.com\/specialreport-digital-single-mar\/commission-establish-security-bu-news-531370\"><u>Archived<\/u><\/a><em>&nbsp;from the original on January 25, 2014<\/em>. Retrieved January 27, 2014<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>FlorCruz, Michelle (June 7, 2013). <\/em><a href=\"http:\/\/www.ibtimes.com\/chinese-netizens-respond-nsa-prism-data-mining-scandal-1296761\"><u>&#8220;Chinese Netizens Respond to NSA PRISM Data Mining Scandal&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/International_Business_Times\"><em><u><em>International Business Times<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20131209112633\/http:\/\/www.ibtimes.com\/chinese-netizens-respond-nsa-prism-data-mining-scandal-1296761\"><u>Archived<\/u><\/a><em>&nbsp;from the original on December 9, 2013<\/em>. Retrieved June 13, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Staff (June 8, 2013). <\/em><a href=\"http:\/\/www.foxnews.com\/politics\/2013\/06\/08\/obama-chinese-president-xi-jinping-begin-2-day-summit-at-california-desert\/\"><u>&#8220;Obama Presses Chinese Leader on Cybersecurity&#8221;<\/u><\/a><em>. Associated Press (via the <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Fox_News_Channel\"><u>Fox News Channel<\/u><\/a><em>). <\/em><a href=\"https:\/\/web.archive.org\/web\/20130613061435\/http:\/\/www.foxnews.com\/politics\/2013\/06\/08\/obama-chinese-president-xi-jinping-begin-2-day-summit-at-california-desert\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 13, 2013<\/em>. Retrieved June 13, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Guangjin, Cheng; Chan, Kahon (June 14, 2013). <a href=\"http:\/\/usa.chinadaily.com.cn\/epaper\/2013-06\/14\/content_16621289.htm\"><u>&#8220;US Should &#8216;Explain Hacking Activity'&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20131209111527\/http:\/\/usa.chinadaily.com.cn\/epaper\/2013-06\/14\/content_16621289.htm\"><u>Archived<\/u><\/a>&nbsp;December 9, 2013, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/China_Daily\"><em><u><em>China Daily<\/em><\/u><\/em><\/a>. Retrieved June 16, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Staff (June 11, 2013). <a href=\"https:\/\/www.bbc.co.uk\/news\/world-asia-china-22851674\"><u>&#8220;China Media: US Whistleblower&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20190301015553\/https:\/\/www.bbc.co.uk\/news\/world-asia-china-22851674\"><u>Archived<\/u><\/a>&nbsp;March 1, 2019, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/BBC_News\"><u>BBC News<\/u><\/a>. Retrieved June 16, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Staff (June 13, 2013). <a href=\"http:\/\/www.globalpost.com\/dispatch\/news\/kyodo-news-international\/130615\/hk-lawmakers-petition-obama-leniency-against-whistlebl\"><u>&#8220;H.K. Lawmakers Petition Obama for Leniency Against Whistleblower&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130616145110\/http:\/\/www.globalpost.com\/dispatch\/news\/kyodo-news-international\/130615\/hk-lawmakers-petition-obama-leniency-against-whistlebl\"><u>Archived<\/u><\/a>&nbsp;June 16, 2013, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Kyodo_News\"><u>Kyodo News<\/u><\/a>&nbsp;(via <a href=\"https:\/\/en.wikipedia.org\/wiki\/GlobalPost\"><u>GlobalPost<\/u><\/a>). Retrieved June 16, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Ai_Weiwei\"><u>Ai, Weiwei<\/u><\/a>&nbsp;(June 11, 2013). <a href=\"https:\/\/www.theguardian.com\/commentisfree\/2013\/jun\/11\/nsa-surveillance-us-behaving-like-china\"><u>&#8220;NSA Surveillance: The US Is Behaving Like China\u2002\u2013 Both Governments Think They Are Doing What Is Best for the State and People\u2002\u2013 But, As I Know, Such Abuse of Power Can Ruin Lives&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20170201010331\/https:\/\/www.theguardian.com\/commentisfree\/2013\/jun\/11\/nsa-surveillance-us-behaving-like-china\"><u>Archived<\/u><\/a>&nbsp;February 1, 2017, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>&nbsp;(<a href=\"https:\/\/web.archive.org\/web\/20130611232528\/http:\/\/www.guardian.co.uk\/commentisfree\/2013\/jun\/11\/nsa-surveillance-us-behaving-like-china\"><u>archive<\/u><\/a>). <a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Guardian\"><em><u><em>The Guardian<\/em><\/u><\/em><\/a>. Retrieved June 13, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Collier, Kevin (June 7, 2013). <\/em><a href=\"http:\/\/www.dailydot.com\/news\/prism-nsa-government-surveillance-europe-law\/\"><u>&#8220;Does the NSA&#8217;s PRISM Spying Program Violate EU Law?&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Daily_Dot\"><em><u><em>The Daily Dot<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130619130318\/http:\/\/www.dailydot.com\/news\/prism-nsa-government-surveillance-europe-law\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 19, 2013<\/em>. Retrieved June 13, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Meyer, David (June 7, 2013). <\/em><a href=\"http:\/\/gigaom.com\/2013\/06\/07\/europeans-call-for-answers-over-u-s-web-spying-allegations\/\"><u>&#8220;Europeans Call for Answers over U.S. Web Spying Allegations&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/GigaOM\"><em><u><em>GigaOM<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130612055157\/http:\/\/gigaom.com\/2013\/06\/07\/europeans-call-for-answers-over-u-s-web-spying-allegations\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 12, 2013<\/em>. Retrieved June 13, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Staff (June 10, 2013). <\/em><a href=\"http:\/\/www.spiegel.de\/politik\/ausland\/merkel-will-prism-skandal-bei-obama-besuch-ansprechen-a-904811.html\"><u>&#8220;Sp\u00e4h-Programm der NSA: Merkel will Prism-Skandal bei Obama-Besuch ansprechen&#8221;<\/u><\/a><em>&nbsp;[NSA Spying Program: Merkel Will Address PRISM-Scandal at Obama Visit]. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Spiegel_Online\"><em><u><em>Spiegel Online<\/em><\/u><\/em><\/a><em>&nbsp;(in German). <\/em><a href=\"https:\/\/web.archive.org\/web\/20130925163002\/http:\/\/www.spiegel.de\/politik\/ausland\/merkel-will-prism-skandal-bei-obama-besuch-ansprechen-a-904811.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on September 25, 2013<\/em>. Retrieved June 11, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Schofield, Matthew (June 26, 2013). <a href=\"#.Uc1vEHy9KK1#storylink=cpy\"><u>&#8220;Memories of Stasi Color Germans&#8217; View of U.S. Surveillance Programs&#8221;<\/u><\/a>&nbsp;<a href=\"#.Uc1vEHy9KK1\"><u>Archived<\/u><\/a>&nbsp;June 28, 2013, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/McClatchy_Washington_Bureau\"><u>McClatchy Washington Bureau<\/u><\/a>. Retrieved July 1, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Roberts, Dan; MacAskill, Ewen; Ball, James (June 10, 2013). <\/em><a href=\"https:\/\/www.theguardian.com\/world\/2013\/jun\/10\/obama-pressured-explain-nsa-surveillance\"><u>&#8220;Obama Pressured over NSA Snooping as US Senator Denounces &#8216;Act of Treason&#8217; \u2013 Information Chiefs Worldwide Sound Alarm While US Senator Dianne Feinstein Orders NSA to Review Monitoring Program&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Guardian\"><em><u><em>The Guardian<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130822013547\/http:\/\/www.theguardian.com\/world\/2013\/jun\/10\/obama-pressured-explain-nsa-surveillance\"><u>Archived<\/u><\/a><em>&nbsp;from the original on August 22, 2013<\/em>. Retrieved June 10, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/news.bloomberglaw.com\/business-and-practice\/facebook-whatsapp-fined-by-spain-for-failure-to-obtain-consent\"><u>&#8220;Facebook, WhatsApp Fined by Spain for Failure to Obtain Consent&#8221;<\/u><\/a><em>. <\/em><em>news.bloomberglaw.com<\/em>. Retrieved December 12, 2020<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Osborn, Andrew; Young, Sarah (June 10, 2013). <\/em><a href=\"http:\/\/uk.reuters.com\/article\/uk-usa-security-britain-idUKBRE9590DQ20130610\"><u>&#8220;UK Government Rejects Accusations Its Use of U.S. Spy System Was Illegal&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Reuters_UK\"><em><u><em>Reuters UK<\/em><\/u><\/em><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130613121823\/http:\/\/uk.reuters.com\/article\/2013\/06\/10\/uk-usa-security-britain-idUKBRE9590DQ20130610\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 13, 2013<\/em>. Retrieved June 13, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Young, Sarah (June 10, 2013). <\/em><a href=\"https:\/\/web.archive.org\/web\/20130615060736\/http:\/\/news.yahoo.com\/british-government-faces-questions-over-prism-cyber-snooping-104503717.html\"><u>&#8220;UK&#8217;s Cameron Defends Spy Agencies over PRISM Cyber-Snooping&#8221;<\/u><\/a><em>. Reuters (via <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Yahoo!_News\"><u>Yahoo! News<\/u><\/a><em>). Archived from <\/em><a href=\"https:\/\/news.yahoo.com\/british-government-faces-questions-over-prism-cyber-snooping-104503717.html\"><u>the original<\/u><\/a><em>&nbsp;on June 15, 2013<\/em>. Retrieved July 2, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>wcoats (June 11, 2013). <\/em><a href=\"https:\/\/wcoats.blog\/2013\/06\/11\/government-surveillance-and-the-right-to-privacy\/\"><u>&#8220;Government Surveillance and the Right to Privacy&#8221;<\/u><\/a><em>. <\/em><em>Warren&#8217;s space<\/em>. Retrieved December 12, 2020<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Bradshaw, Tim (2013). <\/em><a href=\"https:\/\/www.ft.com\/content\/93c6a63b-8e29-31a0-b689-24db23d73ec0\"><u>&#8220;Tim Berners-Lee is &#8220;deeply concerned&#8221; about PRISM&#8221;<\/u><\/a><em>. <\/em><em>Financial Times<\/em>. Retrieved June 15, 2020<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20131027092115\/http:\/\/ibnlive.in.com\/news\/salman-khurshid-defends-us-surveillance-programme-says-it-is-not-snooping\/403544-37-64.html\"><u>&#8220;Salman Khurshid defends US surveillance programme, says &#8216;it is not snooping'&#8221;<\/u><\/a><em>. Ibnlive.in.com. July 2, 2013. Archived from <\/em><a href=\"http:\/\/ibnlive.in.com\/news\/salman-khurshid-defends-us-surveillance-programme-says-it-is-not-snooping\/403544-37-64.html\"><u>the original<\/u><\/a><em>&nbsp;on October 27, 2013<\/em>. Retrieved July 14, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130723215337\/http:\/\/www.hindustantimes.com\/India-news\/NewDelhi\/India-sees-no-reason-to-say-yes-to-asylum-for-Snowden\/Article1-1085761.aspx\"><u>&#8220;India sees &#8216;no reason to say yes&#8217; to asylum for Snowden&#8221;<\/u><\/a><em>. <\/em><em>Hindustan Times<\/em><em>. July 2, 2013. Archived from <\/em><a href=\"http:\/\/www.hindustantimes.com\/India-news\/NewDelhi\/India-sees-no-reason-to-say-yes-to-asylum-for-Snowden\/Article1-1085761.aspx\"><u>the original<\/u><\/a><em>&nbsp;on July 23, 2013<\/em>. Retrieved July 14, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/www.thehindu.com\/news\/national\/it-is-not-actually-snooping-khurshid-on-us-surveillance\/article4873351.ece\"><u>&#8220;It is not actually snooping: Khurshid on US surveillance&#8221;<\/u><\/a><em>. <\/em><em>The Hindu<\/em><em>. PTI. July 2, 2013. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130706001702\/http:\/\/www.thehindu.com\/news\/national\/it-is-not-actually-snooping-khurshid-on-us-surveillance\/article4873351.ece\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 6, 2013<\/em>. Retrieved July 14, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/archive.today\/20130711132724\/http:\/\/articles.timesofindia.indiatimes.com\/2013-07-03\/india\/40329684_1_salman-khurshid-kapil-sibal-computer\"><u>&#8220;Khurshid, Sibal at odds over US snooping&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Times_of_India\"><em><u><em>The Times of India<\/em><\/u><\/em><\/a><em>. July 3, 2013. Archived from <\/em><a href=\"http:\/\/articles.timesofindia.indiatimes.com\/2013-07-03\/india\/40329684_1_salman-khurshid-kapil-sibal-computer\"><u>the original<\/u><\/a><em>&nbsp;on July 11, 2013<\/em>. Retrieved July 14, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Muzaffar, Maroosha (July 4, 2013). <\/em><a href=\"https:\/\/newrepublic.com\/article\/113764\/why-india-taking-uss-side-snowden-scandal\"><u>&#8220;Why India is taking the U.S.&#8217;s Side in the Snowden Scandal&#8221;<\/u><\/a><em>. <\/em><em>New Republic<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20131029195846\/http:\/\/www.newrepublic.com\/article\/113764\/why-india-taking-uss-side-snowden-scandal\"><u>Archived<\/u><\/a><em>&nbsp;from the original on October 29, 2013<\/em>. Retrieved July 14, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Brindaalakshmi K (July 8, 2013). <\/em><a href=\"http:\/\/www.medianama.com\/2013\/07\/223-mp-starts-public-petition-for-disclosure-of-indian-data-accessed-by-prism\/\"><u>&#8220;MP Starts Public Petition For Disclosure Of Indian Data Accessed By PRISM&#8221;<\/u><\/a><em>. MediaNama. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130709171257\/http:\/\/www.medianama.com\/2013\/07\/223-mp-starts-public-petition-for-disclosure-of-indian-data-accessed-by-prism\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 9, 2013<\/em>. Retrieved July 14, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Champion, Marc (July 8, 2013). <\/em><a href=\"https:\/\/web.archive.org\/web\/20130713124919\/http:\/\/www.bloomberg.com\/news\/2013-07-08\/indians-see-a-gift-in-nsa-leaks.html\"><u>&#8220;Indians See a Gift in NSA Leaks&#8221;<\/u><\/a><em>. Bloomberg. Archived from <\/em><a href=\"https:\/\/www.bloomberg.com\/news\/2013-07-08\/indians-see-a-gift-in-nsa-leaks.html\"><u>the original<\/u><\/a><em>&nbsp;on July 13, 2013<\/em>. Retrieved July 14, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/www.rediff.com\/news\/column\/why-india-needs-to-speak-up\/20130705.htm\"><u>&#8220;Why India needs to speak up!&#8221;<\/u><\/a><em>. <\/em><em>Rediff.com<\/em><em>. July 5, 2013. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130710023423\/http:\/\/www.rediff.com\/news\/column\/why-india-needs-to-speak-up\/20130705.htm\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 10, 2013<\/em>. Retrieved July 14, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Shiv Visvanathan (July 4, 2013). <\/em><a href=\"http:\/\/www.firstpost.com\/politics\/the-cowardice-of-salman-khurshid-betraying-snowden-nehru-and-india-928525.html\"><u>&#8220;Why India needs to speak up!&#8221;<\/u><\/a><em>. <\/em><em>Firstpost<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130706011641\/http:\/\/www.firstpost.com\/politics\/the-cowardice-of-salman-khurshid-betraying-snowden-nehru-and-india-928525.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 6, 2013<\/em>. Retrieved July 15, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/www.indianexpress.com\/news\/india-rejects-snowden-s-request-for-asylum-khurshid-backs-surveillance\/1136890\/\"><u>&#8220;India rejects Snowden&#8217;s request for asylum, Khurshid backs surveillance&#8221;<\/u><\/a><em>. <\/em><em>Indian Express<\/em><em>. July 3, 2013. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130719055227\/http:\/\/www.indianexpress.com\/news\/india-rejects-snowden-s-request-for-asylum-khurshid-backs-surveillance\/1136890\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 19, 2013<\/em>. Retrieved July 14, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/archive.today\/20130712054907\/http:\/\/articles.timesofindia.indiatimes.com\/2013-07-03\/india\/40350583_1_salman-khurshid-spying-issue-vienna-convention\"><u>&#8220;Rajya Sabha MP P Rajeev slams Khurshid on US surveillance issue&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Times_of_India\"><em><u><em>The Times of India<\/em><\/u><\/em><\/a><em>. July 3, 2013. Archived from <\/em><a href=\"http:\/\/articles.timesofindia.indiatimes.com\/2013-07-03\/india\/40350583_1_salman-khurshid-spying-issue-vienna-convention\"><u>the original<\/u><\/a><em>&nbsp;on July 12, 2013<\/em>. Retrieved July 14, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/www.law.cornell.edu\/uscode\/text\/50\/1881a\"><u>&#8220;Title 50, section 1881a. Procedures for targeting certain persons outside the United States other than United States persons&#8221;<\/u><\/a><em>. <\/em><em>US Code<\/em><em>. Cornell. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130716031200\/http:\/\/www.law.cornell.edu\/uscode\/text\/50\/1881a\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 16, 2013<\/em>. Retrieved July 29, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Gage, Beverly (June 7, 2013). &#8220;<a href=\"http:\/\/www.slate.com\/articles\/news_and_politics\/history\/2013\/06\/prism_j_edgar_hoover_would_have_loved_the_nsa_s_surveillance_program_topic.html\"><u>Somewhere, J. Edgar Hoover Is Smiling<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130610121015\/http:\/\/www.slate.com\/articles\/news_and_politics\/history\/2013\/06\/prism_j_edgar_hoover_would_have_loved_the_nsa_s_surveillance_program_topic.html\"><u>Archived<\/u><\/a>&nbsp;June 10, 2013, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>&nbsp;\u2013 The FBI Director and Notorious Snoop Would Have Loved PRISM.&#8221; <a href=\"https:\/\/en.wikipedia.org\/wiki\/Slate_(magazine)\"><em><u><em>Slate<\/em><\/u><\/em><\/a>. Retrieved June 18, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Kaufman, Brett Max (June 11, 2013). <a href=\"https:\/\/www.aclu.org\/blog\/national-security-technology-and-liberty\/aclu-files-lawsuit-challenging-nsas-patriot-act-phone\"><u>&#8220;ACLU Files Lawsuit Challenging NSA&#8217;s Patriot Act Phone Surveillance&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20150325101944\/https:\/\/www.aclu.org\/blog\/national-security-technology-and-liberty\/aclu-files-lawsuit-challenging-nsas-patriot-act-phone\"><u>Archived<\/u><\/a>&nbsp;March 25, 2015, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <em>Free Future<\/em>&nbsp;(blog of the <a href=\"https:\/\/en.wikipedia.org\/wiki\/American_Civil_Liberties_Union\"><u>American Civil Liberties Union<\/u><\/a>). Retrieved June 13, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Press release (June 11, 2013). <a href=\"https:\/\/web.archive.org\/web\/20130614085620\/http:\/\/www.law.yale.edu\/intellectuallife\/16937.htm\"><u>Media Freedom and Information Access Clinic, ACLU Ask Spy Court to Release Secret Opinions on Patriot Act Surveillance Powers&#8221;<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Yale_Law_School\"><u>Yale Law School<\/u><\/a>. Retrieved July 2, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/www.freedomwatchusa.org\/second-class-action-over-obama-nsa-alleged-privacy-abuse\"><u>&#8220;Second Class Action over Obama\/NSA Alleged Privacy Abuse \u2013 Klayman Sues Obama, Holder, NSA and 12 More Complicit &#8216;PRISM&#8217; Companies&#8221;<\/u><\/a><em>. <\/em><em>freedomwatchusa.org<\/em><em>&nbsp;(Press release). June 12, 2013. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130618075908\/http:\/\/www.freedomwatchusa.org\/second-class-action-over-obama-nsa-alleged-privacy-abuse\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 18, 2013<\/em>. Retrieved July 2, 2013<em>.<\/em>&nbsp;(direct link to <a href=\"http:\/\/www.freedomwatchusa.org\/pdf\/130612-PRISM Complaint.pdf\"><u>lawsuit<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130807104154\/http:\/\/freedomwatchusa.org\/pdf\/130612-PRISM Complaint.pdf\"><u>Archived<\/u><\/a>&nbsp;August 7, 2013, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>; <a href=\"https:\/\/en.wikipedia.org\/wiki\/PDF_format\"><u>PDF format<\/u><\/a>)<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Donohue, Laura K. (June 21, 2013). <\/em><a href=\"https:\/\/www.washingtonpost.com\/opinions\/nsa-surveillance-may-be-legal--but-its-unconstitutional\/2013\/06\/21\/b9ddec20-d44d-11e2-a73e-826d299ff459_story.html\"><u>&#8220;NSA Surveillance May Be Legal \u2013 But It&#8217;s Unconstitutional&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Washington_Post\"><em><u><em>The Washington Post<\/em><\/u><\/em><\/a>. Retrieved June 29, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Dwoskin, Elizabeth (June 13, 2013). <a href=\"http:\/\/www.businessweek.com\/articles\/2013-06-13\/rand-paul-recuits-for-class-action-lawsuit-against-nsa\"><u>&#8220;Rand Paul Recruits for a Class Action Against NSA&#8221;<\/u><\/a>&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130617220622\/http:\/\/www.businessweek.com\/articles\/2013-06-13\/rand-paul-recuits-for-class-action-lawsuit-against-nsa\"><u>Archived<\/u><\/a>&nbsp;June 17, 2013, at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wayback_Machine\"><u>Wayback Machine<\/u><\/a>. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Bloomberg_Businessweek\"><em><u><em>Bloomberg Businessweek<\/em><\/u><\/em><\/a>. Retrieved June 29, 2013.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Office, Communications (December 10, 2012). <\/em><a href=\"http:\/\/www.wyden.senate.gov\/news\/blog\/post\/fisa-correspondence-update\"><u>&#8220;FISA Correspondence Update | U.S. Senator Ron Wyden&#8221;<\/u><\/a><em>. Wyden.senate.gov. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130227155059\/http:\/\/www.wyden.senate.gov\/news\/blog\/post\/fisa-correspondence-update\"><u>Archived<\/u><\/a><em>&nbsp;from the original on February 27, 2013<\/em>. Retrieved June 9, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/www.wyden.senate.gov\/download\/nsa-response-to-senators-oct-10-letter-about-fisa-reauthorization\"><u>&#8220;Download | U.S. Senator Ron Wyden&#8221;<\/u><\/a><em>. Wyden.senate.gov. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130306190533\/http:\/\/www.wyden.senate.gov\/download\/nsa-response-to-senators-oct-10-letter-about-fisa-reauthorization\"><u>Archived<\/u><\/a><em>&nbsp;from the original on March 6, 2013<\/em>. Retrieved June 9, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;I. Charles McCullough to Ron Wyden &amp; Mark Udall (June 15, 2012), via Wired.com: <a href=\"https:\/\/www.wired.com\/images_blogs\/dangerroom\/2012\/06\/IC-IG-Letter.pdf\"><u>https:\/\/www.wired.com\/images_blogs\/dangerroom\/2012\/06\/IC-IG-Letter.pdf<\/u><\/a>&nbsp;(<a href=\"https:\/\/web.archive.org\/web\/20121031210045\/http:\/\/www.wired.com\/images_blogs\/dangerroom\/2012\/06\/IC-IG-Letter.pdf\"><u>Archive<\/u><\/a>).<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Briefing on the Foreign Intelligence Surveillance Act (FISA) Amendments Act of 2008 (FAA): Section 702 (September 23, 2010), via ACLU.org: <a href=\"https:\/\/www.aclu.org\/files\/pdfs\/natsec\/faafoia20101129\/FAAFBI0065.pdf\"><u>https:\/\/www.aclu.org\/files\/pdfs\/natsec\/faafoia20101129\/FAAFBI0065.pdf<\/u><\/a>&nbsp;(<a href=\"https:\/\/web.archive.org\/web\/20110506145438\/http:\/\/www.aclu.org\/files\/pdfs\/natsec\/faafoia20101129\/FAAFBI0065.pdf\"><u>Archive<\/u><\/a>).<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/www.aclu.org\/national-security\/faa-foia-documents\"><u>&#8220;FAA FOIA Documents | American Civil Liberties Union&#8221;<\/u><\/a><em>. Aclu.org. December 2, 2010. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130713215927\/http:\/\/www.aclu.org\/national-security\/faa-foia-documents\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 13, 2013<\/em>. Retrieved June 9, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/www.paul.senate.gov\/?p=press_release&amp;id=838\"><u>&#8220;Sen. Paul to Introduce Fourth Amendment Restoration Act of 2013 Rand Paul | United States Senator&#8221;<\/u><\/a><em>. Paul.senate.gov. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130609085431\/http:\/\/www.paul.senate.gov\/?p=press_release&amp;id=838\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 9, 2013<\/em>. Retrieved October 5, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20131012012522\/http:\/\/www.paul.senate.gov\/files\/documents\/EAS13699.pdf\"><u>&#8220;113th Congress: 1st Session: A Bill to stop the National Security Agency from spying on citizens of the United States and for other purposes&#8221;<\/u><\/a><em>&nbsp;<\/em>(PDF)<em>. Paul.senate.gov. Archived from <\/em><a href=\"http:\/\/www.paul.senate.gov\/files\/documents\/EAS13699.pdf\"><u>the original<\/u><\/a><em>&nbsp;<\/em>(PDF)<em>&nbsp;on October 12, 2013<\/em>. Retrieved October 5, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/electrospaces.blogspot.nl\/2013\/07\/nsa-says-there-are-three-different.html\"><u>&#8220;NSA says there are three different PRISMs&#8221;<\/u><\/a><em>. Top Level Telecommunications. July 26, 2013. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130810231506\/http:\/\/electrospaces.blogspot.nl\/2013\/07\/nsa-says-there-are-three-different.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on August 10, 2013<\/em>. Retrieved August 27, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Kevin_Drum\"><u>Drum, Kevin<\/u><\/a><em>&nbsp;(June 10, 2013). <\/em><a href=\"https:\/\/www.motherjones.com\/kevin-drum\/2013\/06\/what-prism-do-2\"><u>&#8220;What Does PRISM Do? How Does It Work? Take 2&#8221;<\/u><\/a><em>. Kevin Drum (blog of <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Mother_Jones_(magazine)\"><u>Mother Jones<\/u><\/a><em>). <\/em><a href=\"https:\/\/web.archive.org\/web\/20130619010550\/http:\/\/www.motherjones.com\/kevin-drum\/2013\/06\/what-prism-do-2\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 19, 2013<\/em>. Retrieved June 18, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Ball, James (June 8, 2013). <\/em><a href=\"https:\/\/www.theguardian.com\/world\/2013\/jun\/08\/nsa-prism-server-collection-facebook-google\"><u>&#8220;NSA&#8217;s Prism surveillance program: how it works and what it can do&#8221;<\/u><\/a><em>. <\/em><em>The Guardian<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130731013812\/http:\/\/www.theguardian.com\/world\/2013\/jun\/08\/nsa-prism-server-collection-facebook-google\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 31, 2013<\/em>. Retrieved July 11, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Timberg, Craig (July 10, 2013). <\/em><a href=\"https:\/\/www.washingtonpost.com\/business\/economy\/the-nsa-slide-you-havent-seen\/2013\/07\/10\/32801426-e8e6-11e2-aa9f-c03a72e2d342_story.html\"><u>&#8220;The NSA slide you haven&#8217;t seen&#8221;<\/u><\/a><em>. <\/em><em>The Washington Post<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130710225123\/http:\/\/www.washingtonpost.com\/business\/economy\/the-nsa-slide-you-havent-seen\/2013\/07\/10\/32801426-e8e6-11e2-aa9f-c03a72e2d342_story.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 10, 2013<\/em>. Retrieved July 11, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Craig Timberg &amp; Ellen Nakashima (July 6, 2013). <\/em><a href=\"https:\/\/www.washingtonpost.com\/business\/technology\/agreements-with-private-companies-protect-us-access-to-cables-data-for-surveillance\/2013\/07\/06\/aa5d017a-df77-11e2-b2d4-ea6d8f477a01_story.html\"><u>&#8220;Agreements with private companies protect U.S. access to cables&#8217; data for surveillance&#8221;<\/u><\/a><em>. <\/em><em>The Washington Post<\/em>. Retrieved April 10, 2014<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Lindemann, Todd (July 6, 2013). <\/em><a href=\"https:\/\/web.archive.org\/web\/20181214190508\/http:\/\/apps.washingtonpost.com\/g\/page\/business\/a-connected-world\/305\/\"><u>&#8220;A connected world&#8221;<\/u><\/a><em>. <\/em><em>The Washington Post<\/em><em>. Archived from <\/em><a href=\"https:\/\/apps.washingtonpost.com\/g\/page\/business\/a-connected-world\/305\/\"><u>the original<\/u><\/a><em>&nbsp;on December 14, 2018<\/em>. Retrieved February 12, 2014<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Bamford, James (July 12, 2013). <\/em><a href=\"http:\/\/www.nybooks.com\/articles\/archives\/2013\/aug\/15\/nsa-they-know-much-more-you-think\/?pagination=false\"><u>&#8220;They Know Much More Than You Think&#8221;<\/u><\/a><em>. <\/em><em>The New York Review of Books<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20130727212122\/http:\/\/www.nybooks.com\/articles\/archives\/2013\/aug\/15\/nsa-they-know-much-more-you-think\/?pagination=false\"><u>Archived<\/u><\/a><em>&nbsp;from the original on July 27, 2013<\/em>. Retrieved July 29, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Barton_Gellman\"><u>Gellman, Barton<\/u><\/a><em>; <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Laura_Poitras\"><u>Poitras, Laura<\/u><\/a><em>&nbsp;(June 6, 2013). <\/em><a href=\"http:\/\/www.masslive.com\/politics\/index.ssf\/2013\/06\/codename_prism_secret_program_data_mining.html\"><u>&#8220;Codename PRISM: Secret Government Program Mines Data from 9 U.S. Internet Companies, Including Photographs, Email and More&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Washington_Post\"><u>The Washington Post<\/u><\/a><em>&nbsp;(via <\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Republican_(Springfield,_Massachusetts)\"><u>The Republican<\/u><\/a><em>). <\/em><a href=\"https:\/\/web.archive.org\/web\/20130610205016\/http:\/\/www.masslive.com\/politics\/index.ssf\/2013\/06\/codename_prism_secret_program_data_mining.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on June 10, 2013<\/em>. Retrieved June 13, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Gallagher, Ryan (September 9, 2013). <\/em><a href=\"http:\/\/www.slate.com\/blogs\/future_tense\/2013\/09\/09\/shifting_shadow_stormbrew_flying_pig_new_snowden_documents_show_nsa_deemed.html\"><u>&#8220;New Snowden Documents Show NSA Deemed Google Networks a &#8220;Target&#8221;&#8221;<\/u><\/a><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20131026152910\/http:\/\/www.slate.com\/blogs\/future_tense\/2013\/09\/09\/shifting_shadow_stormbrew_flying_pig_new_snowden_documents_show_nsa_deemed.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on October 26, 2013<\/em>. Retrieved September 10, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/g1.globo.com\/fantastico\/noticia\/2013\/09\/nsa-documents-show-united-states-spied-brazilian-oil-giant.html\"><u>&#8220;NSA Documents Show United States Spied Brazilian Oil Giant&#8221;<\/u><\/a><em>. September 8, 2013. <\/em><a href=\"https:\/\/web.archive.org\/web\/20140311011818\/http:\/\/g1.globo.com\/fantastico\/noticia\/2013\/09\/nsa-documents-show-united-states-spied-brazilian-oil-giant.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on March 11, 2014<\/em>. Retrieved September 9, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Gellman, Barton; Soltani, Ashkan (October 30, 2013). <\/em><a href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say\/2013\/10\/30\/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html\"><u>&#8220;NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say&#8221;<\/u><\/a><em>. <\/em><em>The Washington Post<\/em><em>. <\/em><a href=\"https:\/\/web.archive.org\/web\/20140406050541\/http:\/\/www.washingtonpost.com\/world\/national-security\/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say\/2013\/10\/30\/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html\"><u>Archived<\/u><\/a><em>&nbsp;from the original on April 6, 2014<\/em>. Retrieved October 31, 2013<em>.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Gallagher, Sean (October 31, 2013). <\/em><a href=\"https:\/\/arstechnica.com\/information-technology\/2013\/10\/how-the-nsas-muscular-tapped-googles-and-yahoos-private-networks\/\"><u>&#8220;How the NSA&#8217;s MUSCULAR tapped Google&#8217;s and Yahoo&#8217;s private networks&#8221;<\/u><\/a><em>. Ars Technica. <\/em><a href=\"https:\/\/web.archive.org\/web\/20170312042912\/https:\/\/arstechnica.com\/information-technology\/2013\/10\/how-the-nsas-muscular-tapped-googles-and-yahoos-private-networks\/\"><u>Archived<\/u><\/a><em>&nbsp;from the original on March 12, 2017<\/em>. Retrieved November 1, 2013<em>.<\/em><\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"zhref\">3.2 \u4e2d\u6587\u8bcd\u6761<\/h3>\n\n\n\n<ol class=\"has-small-font-size wp-block-list\">\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/www.apdnews.com\/news\/28181.html\"><u>\u7f8e\u56fd\u201c\u68f1\u955c\u201d\u9879\u76ee\u5f15\u53d1\u6b27\u6d32\u62c5\u5fe7<\/u><\/a>&nbsp;<a href=\"https:\/\/zh.wikipedia.org\/wiki\/Wayback_Machine\"><u>\u4e92\u8054\u7f51\u6863\u6848\u9986<\/u><\/a>\u7684<a href=\"https:\/\/web.archive.org\/web\/20160304202323\/http:\/\/www.apdnews.com\/news\/28181.html\"><u>\u5b58\u6863<\/u><\/a>\uff0c\u5b58\u6863\u65e5\u671f2016-03-04.\uff0c\u4e9a\u592a\u65e5\u62a5\uff0c2013\u5e746\u670814\u65e5<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Savage, Charlie; Wyatt, Edward; Baker, Peter. <\/em><a href=\"http:\/\/www.nytimes.com\/2013\/06\/07\/us\/nsa-verizon-calls.html\"><u>U.S. says it gathers online data abroad<\/u><\/a><em>. New York Times. June 6, 2013 <\/em>[2013-06-07]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/web.archive.org\/web\/20130607095921\/http:\/\/www.nytimes.com\/2013\/06\/07\/us\/nsa-verizon-calls.html\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2013-06-07\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/www.theblaze.com\/stories\/2013\/06\/07\/11-questions-you-probably-have-about-u-s-domestic-spying-answered\/\"><u>GOVERNMENT: 11 THINGS YOU NEED TO KNOW ABOUT U.S. DOMESTIC SPYING<\/u><\/a><em>. The Blaze, Inc. 2013-06-07 <\/em>[2013-06-09]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/www.webcitation.org\/6HqTeRK2M?url=http:\/\/www.theblaze.com\/stories\/2013\/06\/07\/11-questions-you-probably-have-about-u-s-domestic-spying-answered\/\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2013-07-03\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/www.npr.org\/blogs\/thetwo-way\/2013\/06\/06\/189321612\/nsa-reportedly-mines-servers-of-u-s-internet-firms-for-data\"><u>NSA Reportedly Mines Servers Of U.S. Internet Firms For Data<\/u><\/a><em>. NPR. 6 June 2013 <\/em>[2013-06-09]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/web.archive.org\/web\/20130811080630\/http:\/\/www.npr.org\/blogs\/thetwo-way\/2013\/06\/06\/189321612\/nsa-reportedly-mines-servers-of-u-s-internet-firms-for-data\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2013-08-11\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Greenwald, Glenn. <\/em><a href=\"http:\/\/www.guardian.co.uk\/world\/2013\/jun\/06\/us-tech-giants-nsa-data\"><u>NSA taps in to internet giants&#8217; systems to mine user data, secret files reveal<\/u><\/a><em>. The Guardian. June 6, 2013 <\/em>[June 6, 2013]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/web.archive.org\/web\/20190106214526\/https:\/\/www.theguardian.com\/world\/2013\/jun\/06\/us-tech-giants-nsa-data+\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2019-01-06\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130607141339\/http:\/\/www.chicagotribune.com\/news\/chi-nsa-prism-scandal-20130607,0,301166.story\"><u>Prism scandal: Government program secretly probes Internet servers<\/u><\/a><em>. 06-07-2013. \uff08<\/em><a href=\"http:\/\/www.chicagotribune.com\/news\/chi-nsa-prism-scandal-20130607,0,301166.story\"><u>\u539f\u59cb\u5185\u5bb9<\/u><\/a><em>\u5b58\u6863\u4e8e2013-06-07\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Greenwald, Glenn. <\/em><a href=\"http:\/\/www.guardian.co.uk\/world\/2013\/jun\/06\/nsa-phone-records-verizon-court-order\"><u>NSA collecting phone records of millions of Verizon customers daily<\/u><\/a><em>. The Guardian. June 6, 2013 <\/em>[2013-06-09]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/web.archive.org\/web\/20130726213056\/http:\/\/www.guardian.co.uk\/world\/2013\/jun\/06\/nsa-phone-records-verizon-court-order\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2013-07-26\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Greenwald, Glenn; Ewen MacAskill. <\/em><a href=\"http:\/\/www.guardian.co.uk\/world\/2013\/jun\/09\/edward-snowden-nsa-whistleblower-surveillance?CMP=twt_gu\"><u>Edward Snowden: the whistleblower behind revelations of NSA surveillance<\/u><\/a><em>. The Guardian (<\/em><a href=\"https:\/\/zh.wikipedia.org\/wiki\/Hong_Kong\"><u>Hong Kong<\/u><\/a><em>: Guardian Media Group). 9 June 2013 <\/em>[9 June 2013]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/web.archive.org\/web\/20181225024946\/https:\/\/www.theguardian.com\/world\/2013\/jun\/09\/edward-snowden-nsa-whistleblower-surveillance?CMP=twt_gu\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2018-12-25\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;Dean, John W. <a href=\"http:\/\/writ.corporate.findlaw.com\/dean\/20051230.html\"><u>George W. Bush as the New Richard M. Nixon: Both Wiretapped Illegally, and Impeachable; Both Claimed That a President May Violate Congress&#8217; Laws to Protect National Security<\/u><\/a>&nbsp;\uff08<a href=\"https:\/\/web.archive.org\/web\/20160304064700\/http:\/\/writ.corporate.findlaw.com\/dean\/20051230.html\"><u>\u9875\u9762\u5b58\u6863\u5907\u4efd<\/u><\/a>\uff0c\u5b58\u4e8e<a href=\"https:\/\/zh.wikipedia.org\/wiki\/%E4%BA%92%E8%81%94%E7%BD%91%E6%A1%A3%E6%A1%88%E9%A6%86\"><u>\u4e92\u8054\u7f51\u6863\u6848\u9986<\/u><\/a>\uff09, FindLaw, December 30, 2005<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/www.thenation.com\/doc\/20060130\/holtzman\"><u>The Impeachment of George W. Bush<\/u><\/a>&nbsp;\uff08<a href=\"https:\/\/web.archive.org\/web\/20060318101931\/http:\/\/www.thenation.com\/doc\/20060130\/holtzman\"><u>\u9875\u9762\u5b58\u6863\u5907\u4efd<\/u><\/a>\uff0c\u5b58\u4e8e<a href=\"https:\/\/zh.wikipedia.org\/wiki\/%E4%BA%92%E8%81%94%E7%BD%91%E6%A1%A3%E6%A1%88%E9%A6%86\"><u>\u4e92\u8054\u7f51\u6863\u6848\u9986<\/u><\/a>\uff09 by Elizabeth Holtzman, The Nation, January 11, 2006<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/www.abanet.org\/op\/greco\/memos\/aba_house302-0206.pdf\"><u>Adopted By The House Of Delegates<\/u><\/a>&nbsp;\uff08<a href=\"https:\/\/web.archive.org\/web\/20090326213933\/http:\/\/www.abanet.org\/op\/greco\/memos\/aba_house302-0206.pdf\"><u>\u9875\u9762\u5b58\u6863\u5907\u4efd<\/u><\/a>\uff0c\u5b58\u4e8e<a href=\"https:\/\/zh.wikipedia.org\/wiki\/%E4%BA%92%E8%81%94%E7%BD%91%E6%A1%A3%E6%A1%88%E9%A6%86\"><u>\u4e92\u8054\u7f51\u6863\u6848\u9986<\/u><\/a>\uff09, American Bar Association, February 13, 2006<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2006\/02\/13\/AR2006021302006.html\"><u>Lawyers Group Criticizes Surveillance Program<\/u><\/a>&nbsp;\uff08<a href=\"https:\/\/web.archive.org\/web\/20130624180015\/http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2006\/02\/13\/AR2006021302006.html\"><u>\u9875\u9762\u5b58\u6863\u5907\u4efd<\/u><\/a>\uff0c\u5b58\u4e8e<a href=\"https:\/\/zh.wikipedia.org\/wiki\/%E4%BA%92%E8%81%94%E7%BD%91%E6%A1%A3%E6%A1%88%E9%A6%86\"><u>\u4e92\u8054\u7f51\u6863\u6848\u9986<\/u><\/a>\uff09, Washington Post, February 14, 2006<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/www.washingtonpost.com\/wp-srv\/special\/politics\/prism-collection-documents\/\"><u>NSA slides explain the PRISM data-collection program<\/u><\/a><em>. The Washington Post. June 6, 2013 <\/em>[2013-06-07]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/archive.today\/20130724190316\/http:\/\/www.washingtonpost.com\/wp-srv\/special\/politics\/prism-collection-documents\/\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2013-07-24\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/www.washingtonpost.com\/investigations\/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program\/2013\/06\/06\/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html?hpid=z1\"><u>U.S. intelligence mining data from nine U.S. Internet companies in broad secret program<\/u><\/a><em>. The Washington Post. June 6, 2013 <\/em>[June 6, 2013]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/archive.today\/20130615061900\/http:\/\/www.washingtonpost.com\/investigations\/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program\/2013\/06\/06\/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html?hpid=z1\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2013-06-15\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Winter, Michael. <\/em><a href=\"http:\/\/www.usatoday.com\/story\/news\/2013\/06\/06\/nsa-surveillance-internet-companies\/2398345\/\"><u>Reports: NSA siphons data from 9 major Net firms<\/u><\/a><em>. USA Today. June 6, 2013 <\/em>[June 6, 2013]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/web.archive.org\/web\/20180211172454\/https:\/\/www.usatoday.com\/story\/news\/2013\/06\/06\/nsa-surveillance-internet-companies\/2398345\/\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2018-02-11\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Rushe, Dominic. <\/em><a href=\"http:\/\/www.guardian.co.uk\/world\/2013\/jun\/07\/google-facebook-prism-surveillance-program\"><u>Facebook and Google insist they did not know of Prism surveillance program<\/u><\/a><em>. The Guardian. June 7, 2013 <\/em>[June 8, 2013]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/web.archive.org\/web\/20130608121615\/http:\/\/www.guardian.co.uk\/world\/2013\/jun\/07\/google-facebook-prism-surveillance-program\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2013-06-08\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/www.techbang.com\/posts\/19994\"><u>Yahoo \u8b49\u5be6\u7f8e\u570b\u653f\u5e9c\u5a01\u8105\u52a0\u5165\u7a1c\u93e1\u8a08\u5283\uff0c\u4e0d\u53c3\u8207\u5c31\u6bcf\u5929\u7f70 25 \u842c\u7f8e\u5143 &#8211; T\u5ba2\u90a6<\/u><\/a><em>. T\u5ba2\u90a6 &#8211; \u6211\u53ea\u63a8\u8350\u597d\u4e1c\u897f. 2014-09-12 <\/em>[2014-09-19]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/web.archive.org\/web\/20140917001654\/http:\/\/www.techbang.com\/posts\/19994\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2014-09-17\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"#_=_\"><u>Shedding Light on the Foreign Intelligence&#8230; &#8211; Yahoo Global Public Policy<\/u><\/a><em>. yahoopolicy.tumblr.com. <\/em>[2019-08-05]<em>. \uff08<\/em><a href=\"#_=_\"><u>\u539f\u59cb\u5185\u5bb9<\/u><\/a><em>\u5b58\u6863\u4e8e2019-08-08\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Hopkins, Nick. <\/em><a href=\"http:\/\/www.guardian.co.uk\/technology\/2013\/jun\/07\/uk-gathering-secret-intelligence-nsa-prism\"><u>UK gathering secret intelligence via covert NSA operation<\/u><\/a><em>. The Guardian. 7 June 2013 <\/em>[7 June 2013]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/web.archive.org\/web\/20130608014513\/http:\/\/www.guardian.co.uk\/technology\/2013\/jun\/07\/uk-gathering-secret-intelligence-nsa-prism\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2013-06-08\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Morris, Nigel; Sengupta, Kim; Burrell, Ian. <\/em><a href=\"http:\/\/www.independent.co.uk\/news\/uk\/politics\/thousands-of-britains-may-have-been-spied-on-by-gchq-as-link-to-prism-scandal-is-laid-bare-8650001.html\"><u>Thousands of Britain&#8217;s may have been spied on by GCHQ as link to Prism scandal is laid bare<\/u><\/a><em>. Independent. 06-07-2013 <\/em>[06-07-2013]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/web.archive.org\/web\/20130607211941\/http:\/\/www.independent.co.uk\/news\/uk\/politics\/thousands-of-britains-may-have-been-spied-on-by-gchq-as-link-to-prism-scandal-is-laid-bare-8650001.html\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2013-06-07\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/techcrunch.com\/2013\/06\/06\/google-facebook-apple-deny-participation-in-nsa-prism-program\/\"><u>Google, Facebook, Dropbox, Yahoo, Microsoft And Apple Deny Participation In NSA PRISM Surveillance Program<\/u><\/a><em>. Tech Crunch. June 6, 2013 <\/em>[June 6, 2013]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/web.archive.org\/web\/20130607163445\/http:\/\/techcrunch.com\/2013\/06\/06\/google-facebook-apple-deny-participation-in-nsa-prism-program\/\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2013-06-07\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/googleblog.blogspot.com\/2013\/06\/what.html\"><u>What the &#8230;?<\/u><\/a><em>. Google Official Blog. June 7, 2013 <\/em>[June 8, 2013]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/web.archive.org\/web\/20130608041835\/http:\/\/googleblog.blogspot.com\/2013\/06\/what.html\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2013-06-08\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/allthingsd.com\/20130606\/google-and-apple-outright-deny-theyre-helping-the-nsa-mine-data\/\"><u>Google, Apple and Facebook Outright Deny They&#8217;re Helping the NSA Mine Data<\/u><\/a><em>. AllThingsD. June 6, 2013 <\/em>[June 6, 2013]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/web.archive.org\/web\/20130613024517\/http:\/\/allthingsd.com\/20130606\/google-and-apple-outright-deny-theyre-helping-the-nsa-mine-data\/\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2013-06-13\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Michael Liedtke. <\/em><a href=\"http:\/\/news.yahoo.com\/denials-surveillance-program-require-decoding-000528228.html\"><u>Denials in surveillance program require decoding<\/u><\/a><em>. Yahoo! News. June 7, 2013 <\/em>[June 8, 2013]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/web.archive.org\/web\/20130614030055\/http:\/\/news.yahoo.com\/denials-surveillance-program-require-decoding-000528228.html\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2013-06-14\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/googleblog.blogspot.com\/2013\/06\/asking-us-government-to-allow-google-to.html\"><u>Asking the U.S. government to allow Google to publish more national security request data<\/u><\/a><em>. Google Blog. June 11, 2013 <\/em>[2013-06-13]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/web.archive.org\/web\/20130612014724\/http:\/\/googleblog.blogspot.com\/2013\/06\/asking-us-government-to-allow-google-to.html\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2013-06-12\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130615192557\/http:\/\/cn.wsj.com\/gb\/20130612\/bus151436.asp\"><u>\u7f8e\u56fd\u5b89\u5c40\u76d1\u63a7\u9879\u76ee\u906d\u7845\u8c37\u548c\u6c11\u6743\u7ec4\u7ec7\u6311\u6218<\/u><\/a><em>. \u534e\u5c14\u8857\u65e5\u62a5\u4e2d\u6587\u7248. 2013\u5e746\u670812\u65e5 <\/em>[2013-06-13]<em>. \uff08<\/em><a href=\"http:\/\/cn.wsj.com\/gb\/20130612\/bus151436.asp\"><u>\u539f\u59cb\u5185\u5bb9<\/u><\/a><em>\u5b58\u6863\u4e8e2013\u5e746\u670815\u65e5\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130607090238\/http:\/\/www.dni.gov\/index.php\/newsroom\/press-releases\/191-press-releases-2013\/869-dni-statement-on-activities-authorized-under-section-702-of-fisa\"><u>DNI Statement on Activities Authorized Under Section 702 of FISA<\/u><\/a><em>. Office of the Director of National Intelligence. June 6, 2013 <\/em>[June 7, 2013]<em>. \uff08<\/em><a href=\"http:\/\/www.dni.gov\/index.php\/newsroom\/press-releases\/191-press-releases-2013\/869-dni-statement-on-activities-authorized-under-section-702-of-fisa\"><u>\u539f\u59cb\u5185\u5bb9<\/u><\/a><em>\u5b58\u6863\u4e8e2013\u5e746\u67087\u65e5\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Zetter, Kim. <\/em><a href=\"http:\/\/www.wired.com\/threatlevel\/2013\/06\/prism-faq\/\"><u>Intel Director Sets Record Straight on PRISM, Sort Of<\/u><\/a><em>. Wired. June 8, 2013 <\/em>[2013-06-09]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/web.archive.org\/web\/20130611001439\/http:\/\/www.wired.com\/threatlevel\/2013\/06\/prism-faq\/\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2013-06-11\uff09.<\/em>\uff08<a href=\"http:\/\/www.wired.com\/images_blogs\/threatlevel\/2013\/06\/PRISM-FAQ.pdf\"><u>\u58f0\u660e\u539f\u6587<\/u><\/a>&nbsp;\uff08<a href=\"https:\/\/web.archive.org\/web\/20130626220501\/http:\/\/www.wired.com\/images_blogs\/threatlevel\/2013\/06\/PRISM-FAQ.pdf\"><u>\u9875\u9762\u5b58\u6863\u5907\u4efd<\/u><\/a>\uff0c\u5b58\u4e8e<a href=\"https:\/\/zh.wikipedia.org\/wiki\/%E4%BA%92%E8%81%94%E7%BD%91%E6%A1%A3%E6%A1%88%E9%A6%86\"><u>\u4e92\u8054\u7f51\u6863\u6848\u9986<\/u><\/a>\uff09\uff09<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/rt.com\/usa\/obama-surveillance-nsa-monitoring-385\/\"><u>Obama on NSA surveillance: Can&#8217;t have 100% security and 100% privacy<\/u><\/a><em>. RT USA. June 7, 2013 <\/em>[June 8, 2013]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/web.archive.org\/web\/20130609165407\/http:\/\/rt.com\/usa\/obama-surveillance-nsa-monitoring-385\/\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2013-06-09\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/libertasutah.org\/interview\/nsa-whistleblower-speaks-out-on-verizon-prism-and-the-utah-data-center\/\"><u>NSA Whistleblower Speaks Out on Verizon, PRISM, and the Utah Data Center<\/u><\/a><em>. libertasutah.org. <\/em>[2019-08-05]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/web.archive.org\/web\/20190805083844\/https:\/\/libertasutah.org\/interview\/nsa-whistleblower-speaks-out-on-verizon-prism-and-the-utah-data-center\/\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2019-08-05\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/www.nytimes.com\/2011\/09\/22\/us\/politics\/justice-dept-is-accused-of-misleading-public-on-patriot-act.html?_r=0\"><u>\u5b58\u6863\u526f\u672c<\/u><\/a><em>. <\/em>[2013-06-09]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/web.archive.org\/web\/20130609122918\/http:\/\/www.nytimes.com\/2011\/09\/22\/us\/politics\/justice-dept-is-accused-of-misleading-public-on-patriot-act.html?_r=0\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2013-06-09\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/www.zerohedge.com\/contributed\/2013-06-08\/we-call-top-nsa-whistleblower-and-get-real-scoop-spying\"><u>We Call a Top NSA Whistleblower &#8230; And Get the REAL SCOOP on Spying &#8211; Zero Hedge &#8211; Zero Hedge<\/u><\/a><em>. www.zerohedge.com. <\/em>[2019-08-05]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/web.archive.org\/web\/20190805083848\/https:\/\/www.zerohedge.com\/contributed\/2013-06-08\/we-call-top-nsa-whistleblower-and-get-real-scoop-spying\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2019-08-05\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/www.aclu.org\/national-security\/nsa-can-access-much-americans-digital-lives\"><u>NSA Can Access Much of Americans\u2019 Digital Lives<\/u><\/a><em>. American Civil Liberties Union website. June 7, 2013 <\/em>[June 7, 2013]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/web.archive.org\/web\/20130607152833\/http:\/\/www.aclu.org\/national-security\/nsa-can-access-much-americans-digital-lives\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2013-06-07\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/www.youtube.com\/watch?v=m4SRCOouw5I\"><u>Biden in 2006 schools Obama in 2013 over NSA spying program<\/u><\/a><em>. <\/em>[2019-08-05]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/web.archive.org\/web\/20191108194628\/https:\/\/www.youtube.com\/watch?v=m4SRCOouw5I\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2019-11-08\uff09 \u2013\u901a\u8fc7www.youtube.com.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/thenextweb.com\/insider\/2013\/06\/11\/mozilla-moving-persona-servers-outside-the-us-to-escape-surveillance-wont-work-but-changing-the-law-will\/\"><u>Mozilla: Moving Persona servers outside the US to escape surveillance won\u2019t work, but changing the law will<\/u><\/a><em>. The Next Web. <\/em>[2013-06-13]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/web.archive.org\/web\/20130615201412\/http:\/\/thenextweb.com\/insider\/2013\/06\/11\/mozilla-moving-persona-servers-outside-the-us-to-escape-surveillance-wont-work-but-changing-the-law-will\/\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2013-06-15\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/www.ifanr.com\/news\/303172\"><u>\u53cd\u5bf9\u653f\u5e9c\u76d1\u89c6\uff0cMozilla \u53d1\u5e03 StopWatching.US \u6536\u96c6\u6c11\u4f17\u7b7e\u540d<\/u><\/a><em>. ifanr. 2013-06-12 <\/em>[2013-06-13]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/web.archive.org\/web\/20130613113827\/http:\/\/www.ifanr.com\/news\/303172\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2013-06-13\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Alexander Hanff. <\/em><a href=\"https:\/\/web.archive.org\/web\/20131111235332\/http:\/\/www.alexanderhanff.com\/prism-break-dangerously-misleading\"><u>PRISM-Break List is dangerously misleading<\/u><\/a><em>. 2013\u5e746\u670813\u65e5. \uff08<\/em><a href=\"http:\/\/www.alexanderhanff.com\/prism-break-dangerously-misleading\"><u>\u539f\u59cb\u5185\u5bb9<\/u><\/a><em>\u5b58\u6863\u4e8e2013\u5e7411\u670811\u65e5\uff09. There is a big Electronic Frontier Foundation (EFF) logo at the top which led myself and according to EFF&#8217;s Parker Higgins many other people to believe this was an EFF web site. As such I wrote to EFF last night expressing my concerns that the site is dangerously misleading &#8211; EFF replied that they shared my concerns and explained it was not their site.<\/em><strong>\uff08\u82f1\u6587\uff09<\/strong>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;\u539f\u6587 Opt out of PRISM, the NSA\u2019s global data surveillance program. Stop reporting your online activities to the American government with these free alternatives to proprietary software.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20130709130513\/http:\/\/www.maxkeiser.com\/2013\/06\/site-of-the-day-prism-break-org\/\"><u>Site of the day: prism-break.org &#8211; Max Keiser<\/u><\/a><em>. www.maxkeiser.com. <\/em>[2013-07-02]<em>. \uff08<\/em><a href=\"http:\/\/www.maxkeiser.com\/2013\/06\/site-of-the-day-prism-break-org\/\"><u>\u539f\u59cb\u5185\u5bb9<\/u><\/a><em>\u5b58\u6863\u4e8e2013-07-09\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Meyer, David. <\/em><a href=\"http:\/\/gigaom.com\/2013\/06\/07\/europeans-call-for-answers-over-u-s-web-spying-allegations\/\"><u>Europeans call for answers over U.S. web spying allegations<\/u><\/a><em>. GigaOM. 7 June 2013 <\/em>[2013-06-09]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/web.archive.org\/web\/20130612055157\/http:\/\/gigaom.com\/2013\/06\/07\/europeans-call-for-answers-over-u-s-web-spying-allegations\/\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2013-06-12\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<em>Collier, Kevin. <\/em><a href=\"http:\/\/www.dailydot.com\/news\/prism-nsa-government-surveillance-europe-law\/\"><u>Does the NSA&#8217;s PRISM spying program violate EU law?<\/u><\/a><em>. The Daily Dot. 7 June 2013 <\/em>[2013-06-09]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/web.archive.org\/web\/20130619130318\/http:\/\/www.dailydot.com\/news\/prism-nsa-government-surveillance-europe-law\/\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2013-06-19\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"http:\/\/news.tvb.com\/story\/51b930126db28cf374000001\/51b9fd616db28ce074000006\/\u5916\u4ea4\u90e8\u56de\u61c9\u7f8e\u76e3\u63a7\u7db2\u7d61\u4e8b\u4ef6\u6697\u6279\u96d9\u91cd\u6a19\u6e96\"><u>\u7121\u7dab\u65b0\u805e &#8211; &#8211; \u5916\u4ea4\u90e8\u56de\u61c9\u7f8e\u76e3\u63a7\u7db2\u7d61\u4e8b\u4ef6\u6697\u6279\u96d9\u91cd\u6a19\u6e96<\/u><\/a><em>. news.tvb.com. <\/em>[2020-09-16]<em>. \uff08\u539f\u59cb\u5185\u5bb9<\/em><a href=\"https:\/\/web.archive.org\/web\/20200807130023\/http:\/\/news.tvb.com\/story\/51b930126db28cf374000001\/51b9fd616db28ce074000006\/%E5%A4%96%E4%BA%A4%E9%83%A8%E5%9B%9E%E6%87%89%E7%BE%8E%E7%9B%A3%E6%8E%A7%E7%B6%B2%E7%B5%A1%E4%BA%8B%E4%BB%B6%E6%9A%97%E6%89%B9%E9%9B%99%E9%87%8D%E6%A8%99%E6%BA%96\"><u>\u5b58\u6863<\/u><\/a><em>\u4e8e2020-08-07\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20220628140650\/http:\/\/news.sina.com.cn\/c\/2013-06-15\/192127407099.shtml\"><u>\u6881\u632f\u82f1:\u5c06\u6309\u9999\u6e2f\u6cd5\u5f8b\u548c\u65e2\u5b9a\u7a0b\u5e8f\u5904\u7406\u65af\u8bfa\u767b\u4e8b\u4ef6<\/u><\/a><em>. news.sina.com.cn. <\/em>[2022-06-28]<em>. \uff08<\/em><a href=\"http:\/\/news.sina.com.cn\/c\/2013-06-15\/192127407099.shtml\"><u>\u539f\u59cb\u5185\u5bb9<\/u><\/a><em>\u5b58\u6863\u4e8e2022-06-28\uff09.<\/em>&nbsp;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;big5.chinanews.com:89\/gj\/2013\/09-05\/5250787.shtml<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"external\">4. \u5916\u90e8\u94fe\u63a5 | External links<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">4.1 \u82f1\u6587\u8bcd\u6761<\/h3>\n\n\n\n<p>Wikimedia Commons has media related to <strong><em><a href=\"https:\/\/commons.wikimedia.org\/wiki\/Category:PRISM_(surveillance_program)\">PRISM (surveillance program)<\/a><\/em><\/strong>.<br>\u7ef4\u57fa\u5171\u4eab\u8d44\u6e90\u6709\u4e0e PRISM\uff08\u76d1\u89c6\u7a0b\u5e8f\uff09\u76f8\u5173\u7684\u5a92\u4f53\u3002<\/p>\n\n\n\n<ul class=\"has-small-font-size wp-block-list\">\n<li>Gellman, Barton; Lindeman, Todd (June 10, 2013). <a href=\"https:\/\/web.archive.org\/web\/20170830105407\/https:\/\/apps.washingtonpost.com\/g\/page\/national\/inner-workings-of-a-top-secret-spy-program\/282\/\">&#8220;Inner workings of a top-secret spy program&#8221;<\/a>. <em><a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Washington_Post\">The Washington Post<\/a><\/em>. Archived from <a href=\"https:\/\/apps.washingtonpost.com\/g\/page\/national\/inner-workings-of-a-top-secret-spy-program\/282\/\">the original<\/a> on August 30, 2017. Retrieved September 7, 2017. Annotated presentation how the NSA PRISM program works.<br>\u683c\u5c14\u66fc\uff0c\u5df4\u987f\uff1b \u6258\u5fb7\u00b7\u6797\u5fb7\u66fc\uff082013 \u5e74 6 \u6708 10 \u65e5\uff09\u3002 \u201c\u7edd\u5bc6\u95f4\u8c0d\u8ba1\u5212\u7684\u5185\u90e8\u8fd0\u4f5c\u201d\u3002 \u534e\u76db\u987f\u90ae\u62a5\u3002 \u539f\u59cb\u5b58\u6863\u4e8e 2017 \u5e74 8 \u6708 30 \u65e5\u3002\u68c0\u7d22\u4e8e 2017 \u5e74 9 \u6708 7 \u65e5\u3002\u5e26\u6ce8\u91ca\u7684\u6f14\u793a\u5982\u4f55 NSA PRISM \u8ba1\u5212\u7684\u8fd0\u4f5c\u3002<\/li>\n\n\n\n<li>Hallam-Baker, Phillip. <a href=\"https:\/\/web.archive.org\/web\/20131017033653\/http:\/\/www.ietf.org\/id\/draft-hallambaker-prismproof-req-00.txt\">&#8220;PRISM-Proof Security Considerations&#8221;<\/a>. Draft (<a href=\"https:\/\/en.wikipedia.org\/wiki\/IETF\">IETF<\/a> Internet&nbsp;ed.). Comodo Group, Inc. Archived from <a href=\"http:\/\/www.ietf.org\/id\/draft-hallambaker-prismproof-req-00.txt\">the original<\/a> on October 17, 2013.<br>\u54c8\u52d2\u59c6-\u8d1d\u514b\uff0c\u83f2\u5229\u666e. \u201c\u68f1\u955c\u8bc1\u660e\u5b89\u5168\u8003\u8651\u201d\u3002 \u8349\u6848\uff08IETF \u4e92\u8054\u7f51\u7248\uff09\u3002 Comodo Group, Inc. \u539f\u59cb\u5b58\u6863\u4e8e2013\u5e7410\u670817\u65e5\u3002<\/li>\n\n\n\n<li><a href=\"https:\/\/www.eff.org\/nsa-spying\/how-it-works\">&#8220;NSA Spying How It Works&#8221;<\/a>. <em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Electronic_Frontier_Foundation\">Electronic Frontier Foundation<\/a><\/em>. December 3, 2012. Timeline and details about the events.<br>\u201c\u56fd\u5bb6\u5b89\u5168\u5c40\u95f4\u8c0d\u6d3b\u52a8\u662f\u5982\u4f55\u8fd0\u4f5c\u7684\u201d\u3002 \u7535\u5b50\u524d\u6cbf\u57fa\u91d1\u4f1a\u3002 2012 \u5e74 12 \u6708 3 \u65e5\u3002\u6709\u5173\u4e8b\u4ef6\u7684\u65f6\u95f4\u8868\u548c\u8be6\u7ec6\u4fe1\u606f\u3002<\/li>\n\n\n\n<li>Sottek, T.C. &amp; Kopfstein, Janus (July 17, 2013). <a href=\"https:\/\/www.theverge.com\/2013\/7\/17\/4517480\/nsa-spying-prism-surveillance-cheat-sheet\">&#8220;Everything you need to know about PRISM (press compilation)&#8221;<\/a>. <em>The Verge<\/em>.<br>\u7d22\u7279\u514b\uff0cT.C. &amp; Kopfstein, Janus\uff082013 \u5e74 7 \u6708 17 \u65e5\uff09\u3002 \u201c\u5173\u4e8e PRISM \u60a8\u9700\u8981\u4e86\u89e3\u7684\u4e00\u5207\uff08\u65b0\u95fb\u7f16\u8bd1\uff09\u201d\u3002 \u8fb9\u7f18\u3002<\/li>\n\n\n\n<li><a href=\"https:\/\/ssd.eff.org\/\">&#8220;Surveillance Self-Defense&#8221;<\/a>. <em>Electronic Frontier Foundation<\/em>. Detailed how-to enabling average citizens to take steps to defend their privacy<br>\u201c\u76d1\u89c6\u81ea\u536b\u201d\u3002\u7535\u5b50\u524d\u6cbf\u57fa\u91d1\u4f1a\u3002\u8be6\u7ec6\u8bf4\u660e\u5982\u4f55\u8ba9\u666e\u901a\u516c\u6c11\u91c7\u53d6\u63aa\u65bd\u4fdd\u62a4\u81ea\u5df1\u7684\u9690\u79c1<\/li>\n\n\n\n<li><a href=\"http:\/\/video.mit.edu\/watch\/the-government-is-profiling-you-13260\/\">&#8220;The Government Is Profiling You&#8221;<\/a>. <em>Video.MIT.edu<\/em>. Video explaining the recent history of domestic spying at NSA.<br>\u201c\u653f\u5e9c\u6b63\u5728\u5bf9\u4f60\u8fdb\u884c\u5206\u6790\u201d\u3002 \u89c6\u9891.MIT.edu\u3002 \u89c6\u9891\u89e3\u91ca\u4e86\u56fd\u5bb6\u5b89\u5168\u5c40\u8fd1\u671f\u56fd\u5185\u95f4\u8c0d\u6d3b\u52a8\u7684\u5386\u53f2\u3002<\/li>\n\n\n\n<li>Top Level Telecommunications. <a href=\"http:\/\/electrospaces.blogspot.com\/2014\/04\/what-is-known-about-nsas-prism-program.html\">&#8220;What is known about NSA&#8217;s PRISM program&#8221;<\/a>. <em>Electrospaces<\/em>. Retrieved April 23, 2014. A detailed explanation of all known slides about the PRISM program and its inner workings.<br>\u9876\u7ea7\u7535\u4fe1\u3002 \u201c\u5173\u4e8e NSA \u68f1\u955c\u8ba1\u5212\u7684\u5df2\u77e5\u4fe1\u606f\u201d\u3002 \u7535\u7a7a\u95f4\u3002 \u68c0\u7d22\u4e8e 2014 \u5e74 4 \u6708 23 \u65e5\u3002\u6709\u5173 PRISM \u8ba1\u5212\u53ca\u5176\u5185\u90e8\u8fd0\u4f5c\u7684\u6240\u6709\u5df2\u77e5\u5e7b\u706f\u7247\u7684\u8be6\u7ec6\u89e3\u91ca\u3002<\/li>\n\n\n\n<li>Zhong, Peng. <a href=\"https:\/\/prism-break.org\/\">&#8220;A list of alternatives to software and systems that are vulnerable to eavesdropping&#8221;<\/a>. <em>PRISM-break.org<\/em>.<br>\u949f\u3001\u5f6d. \u201c\u6613\u53d7\u7a83\u542c\u7684\u8f6f\u4ef6\u548c\u7cfb\u7edf\u7684\u66ff\u4ee3\u54c1\u5217\u8868\u201d\u3002 PRISM-break.org\u3002<\/li>\n\n\n\n<li>Adam Hart-Davis. <a href=\"http:\/\/gallery.hd.org\/_c\/natural-science\/prism-and-refraction-of-light-into-rainbow-2-AJHD.jpg.html\">&#8220;DHD Multimedia Gallery: Natural Science: Prism 2&#8221;<\/a>. Source of PRISM logo.<br>\u4e9a\u5f53\u00b7\u54c8\u7279-\u6234\u7ef4\u65af\u3002 \u201cDHD\u591a\u5a92\u4f53\u753b\u5eca\uff1a\u81ea\u7136\u79d1\u5b66\uff1a\u68f1\u955c2\u201d\u3002 PRISM \u6807\u5fd7\u7684\u6765\u6e90\u3002<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">4.2 \u4e2d\u6587\u8bcd\u6761<\/h3>\n\n\n\n<ul class=\"has-small-font-size wp-block-list\">\n<li><a href=\"https:\/\/www.eff.org\/nsa-spying\/timeline\">\u56fd\u5bb6\u5b89\u5168\u5c40\u56fd\u5185\u95f4\u8c0d\u6d3b\u52a8\u65f6\u95f4\u8868<\/a> \uff08<a href=\"https:\/\/web.archive.org\/web\/20130607163308\/https:\/\/www.eff.org\/nsa-spying\/timeline\">\u9875\u9762\u5b58\u6863\u5907\u4efd<\/a>\uff0c\u5b58\u4e8e<a href=\"https:\/\/zh.wikipedia.org\/wiki\/%E4%BA%92%E8%81%94%E7%BD%91%E6%A1%A3%E6%A1%88%E9%A6%86\">\u4e92\u8054\u7f51\u6863\u6848\u9986<\/a>\uff09<strong>\uff08\u82f1\u6587\uff09<\/strong><\/li>\n\n\n\n<li><a href=\"https:\/\/prism-break.org\/\">\u201c\u7c89\u788e\u68f1\u955c\u201d\u7f51\u7ad9<\/a> \uff08<a href=\"https:\/\/web.archive.org\/web\/20190917142003\/https:\/\/prism-break.org\/\">\u9875\u9762\u5b58\u6863\u5907\u4efd<\/a>\uff0c\u5b58\u4e8e<a href=\"https:\/\/zh.wikipedia.org\/wiki\/%E4%BA%92%E8%81%94%E7%BD%91%E6%A1%A3%E6%A1%88%E9%A6%86\">\u4e92\u8054\u7f51\u6863\u6848\u9986<\/a>\uff09 <strong>\uff08\u82f1\u6587\uff09<\/strong><\/li>\n\n\n\n<li><a href=\"http:\/\/trollthensa.com\/\">\u201cTroll the NSA\u201d\u7f51\u7ad9<\/a> \uff08<a href=\"https:\/\/web.archive.org\/web\/20130612145452\/http:\/\/trollthensa.com\/\">\u9875\u9762\u5b58\u6863\u5907\u4efd<\/a>\uff0c\u5b58\u4e8e<a href=\"https:\/\/zh.wikipedia.org\/wiki\/%E4%BA%92%E8%81%94%E7%BD%91%E6%A1%A3%E6%A1%88%E9%A6%86\">\u4e92\u8054\u7f51\u6863\u6848\u9986<\/a>\uff09 \uff08\u547c\u5401\u5bf9\u56fd\u5bb6\u5b89\u5168\u5c40\u7684\u76d1\u542c\u7cfb\u7edf\u5b9e\u65bd <a href=\"https:\/\/zh.wikipedia.org\/wiki\/DDoS\">DDoS<\/a> \u653b\u51fb\uff09<strong>\uff08\u82f1\u6587\uff09<\/strong><\/li>\n\n\n\n<li><a href=\"https:\/\/optin.stopwatching.us\/\">Stop Watching Us\u7f51\u7ad9<\/a> \uff08<a href=\"https:\/\/web.archive.org\/web\/20130614044808\/https:\/\/optin.stopwatching.us\/\">\u9875\u9762\u5b58\u6863\u5907\u4efd<\/a>\uff0c\u5b58\u4e8e<a href=\"https:\/\/zh.wikipedia.org\/wiki\/%E4%BA%92%E8%81%94%E7%BD%91%E6%A1%A3%E6%A1%88%E9%A6%86\">\u4e92\u8054\u7f51\u6863\u6848\u9986<\/a>\uff09<strong>\uff08\u82f1\u6587\uff09<\/strong><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\u68f1\u955c\u8ba1\u5212\uff08\u82f1\u8bed\uff1aPRISM\uff09\u662f\u4e00\u9879\u7531\u7f8e\u56fd\u56fd\u5bb6\u5b89\u5168\u5c40\u81ea2007\u5e74\u5f00\u59cb\u5b9e\u65bd\u7684\u7edd\u5bc6\u7ea7\u7f51\u7edc\u76d1\u63a7\u76d1\u542c\u8ba1\u5212\u3002\u6839\u636e\u62a5\u5bfc\uff0c\u6cc4\u9732\u7684\u6587\u4ef6\u4e2d\u63cf\u8ff0PRISM\u8ba1\u5212\u80fd\u591f\u5bf9\u5373\u65f6\u901a\u4fe1\u548c\u65e2\u5b58\u8d44\u6599\u8fdb\u884c\u6df1\u5ea6\u7684\u76d1\u542c\u3002\u8bb8\u53ef\u7684\u76d1\u542c\u5bf9\u8c61\u5305\u62ec\u4efb\u4f55\u5728\u7f8e\u56fd\u4ee5\u5916\u5730\u533a\u4f7f\u7528\u53c2\u4e0e\u8ba1\u5212\u516c\u53f8\u670d\u52a1\u7684\u5ba2\u6237\uff0c\u6216\u662f\u4efb\u4f55\u4e0e\u56fd\u5916\u4eba\u58eb\u901a\u4fe1\u7684\u7f8e\u56fd\u516c\u6c11\u3002<\/p>\n","protected":false},"author":1,"featured_media":1532,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[48,45,44],"tags":[11,12],"class_list":["post-1531","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fulltext","category-usa-and-canada","category-political-event","tag-11","tag-12"],"_links":{"self":[{"href":"https:\/\/cathayvista.top\/index.php\/wp-json\/wp\/v2\/posts\/1531","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cathayvista.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cathayvista.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cathayvista.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cathayvista.top\/index.php\/wp-json\/wp\/v2\/comments?post=1531"}],"version-history":[{"count":0,"href":"https:\/\/cathayvista.top\/index.php\/wp-json\/wp\/v2\/posts\/1531\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cathayvista.top\/index.php\/wp-json\/wp\/v2\/media\/1532"}],"wp:attachment":[{"href":"https:\/\/cathayvista.top\/index.php\/wp-json\/wp\/v2\/media?parent=1531"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cathayvista.top\/index.php\/wp-json\/wp\/v2\/categories?post=1531"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cathayvista.top\/index.php\/wp-json\/wp\/v2\/tags?post=1531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}