Like HowStuffWorks on Facebook!

How the PRISM Surveillance System Works

Season 4: The Surprise Ending

There we have it. The government, we learned, seems to be using a little bit of legal chicanery to create broad orders (reviewed by a court) that let the NSA request specific, targeted information from companies. By pretty much every account, government agents are not getting direct access to servers as initially reported. They are making it really easy to obtain lots of information without some slow-reading judge reviewing every single request, or an engineer sifting through tons of data to find it. No problem, you might say, if you're the kind of person who doesn't mind Agent Z from the Maryland field office knowing you plan on eating ice cream for dinner and watching "The Bachelorette" after work.

And let's be straight: After the initial leak and subsequent outrage, the PRISM program began to look a little less intrusive on further review. Pretty much every company rather forcefully denied giving access to nontargeted data, in general [source: McCullagh]. People even began to question Edward Snowden's own knowledge of how the NSA works and his lack of discretion when deciding what to actually leak [source: Toobin, Drum].

But let's pretend, for one moment, we're all on the "encrypt everything including the throw pillows" side of protecting privacy. Wouldn't it follow suit that these companies would have to lie about their involvement to protect a top secret program? Wouldn't the government also lie about the existence of it, or at least fudge some details to make it more appetizing (or legal) to media outlets and the general public? Why, in other words, should we trust the technology conglomerates and the government when presented with some data that says they're lying? (This sounds like a job for the Stuff They Don't Want You to Know team!)

And thus -- our series continues to unfold. We won't know the answers for a good long while, and it's doubtful any resolution will come in the finale. But in the meantime, it's probably best to assume that if government security analysts want to read your e-mail, listen to your phone calls or check your calendar -- they can.

More to Explore