SHARE
Facebook X Pinterest WhatsApp

Apple Sounds Off on PRISM

In the wake of the U.S. National Security Agency’s (NSA) PRISM scandal, tech heavyweights are scrambling to respond to allegations that U.S. government agencies have privileged access to user data. Apple shot down the notion in a statement that addressed the recent controversies surrounding U.S. intelligence gathering. Apple was caught up in the widening PRISM […]

Jun 17, 2013
Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

In the wake of the U.S. National Security Agency’s (NSA) PRISM scandal, tech heavyweights are scrambling to respond to allegations that U.S. government agencies have privileged access to user data. Apple shot down the notion in a statement that addressed the recent controversies surrounding U.S. intelligence gathering.

Apple was caught up in the widening PRISM controversy following reports that the NSA could collect data directly from the servers powering some of the tech industry’s biggest online services providers, including Facebook, Microsoft and Google.

“The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other US Internet giants, according to a top secret document obtained by the Guardian. The NSA access is part of a previously undisclosed program called PRISM, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says,” reported Glenn Greenwald and Ewen MacAskill of The Guardian.

Not so, countered Apple. “We do not provide any government agency with direct access to our servers, and any government agency requesting customer content must get a court order,” said the company in a posting on Apple.com.

Noting that the U.S. government agreed to allow the iPhone maker to share some statistics pertaining to requests for data related to national security, Apple revealed that it “received between 4,000 and 5,000 requests from U.S. law enforcement for customer data” from December 1, 2012 to May 31, 2013. The company went on to disclose that the requests encompassed 9,000 to 10,000 “accounts or devices” and were initiated by “federal, state and local authorities and included both criminal investigations and national security matters.”

Apple suggested that the bulk of those requests involved routine law enforcement activities. “The most common form of request comes from police investigating robberies and other crimes, searching for missing children, trying to locate a patient with Alzheimer’s disease, or hoping to prevent a suicide,” stated the company.

Apple asserts that its legal team handles each and every request, occasionally refusing to fulfill requests because of “inconsistencies or inaccuracies.” If and when the company shares data with law enforcement and U.S. government agencies, it “delivers the narrowest possible set of information,” claims Apple.

Moreover, there’s some customer information Apple doesn’t supply simply because it doesn’t hang on to it as a matter of course.

“For example, conversations which take place over iMessage and FaceTime are protected by end-to-end encryption so no one but the sender and receiver can see or read them. Apple cannot decrypt that data. Similarly, we do not store data related to customers’ location, Map searches or Siri requests in any identifiable form,” said Apple.

Pedro Hernandez is a contributing editor at Enterprise Apps Today and InternetNews.com. Follow him on Twitter @ecoINSITE.

  SEE ALL
ARTICLES
 
thumbnail Pedro Hernandez

Pedro Hernandez is a contributor to Datamation, eWEEK, and the IT Business Edge Network, the network for technology professionals. Previously, he served as a managing editor for the Internet.com network of IT-related websites and as the Green IT curator for GigaOM Pro.

Recommended for you...

AI in Cybersecurity: The Comprehensive Guide to Modern Security
Liz Ticong
Apr 29, 2024
What Is Cybersecurity? Definitions, Practices, Threats
Liz Ticong
Apr 8, 2024
How to Secure a Network: 9 Key Actions to Secure Your Data
Liz Ticong
Mar 21, 2024
7 Best Data Security Software: Solutions For 2024
Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.