The National Security Agency’s cloud computing program: _____

A. was undertaken pursuant to a secret court-ordered search warrant.
B. was initially developed to monitor transactions in banks.
C. was initially developed to monitor phone calls in U.S prisons.