SlideShare a Scribd company logo
1 of 16
NSA Surveillance
- Prasidh
Information is the oxygen of the modern age. It seeps through the walls topped by barbed wire, it wafts across the electrified borders.
1
Motivation: GAG order eased ( Feb 3rd )
 Microsoft, Facebook, LinkedIn, Google and Yahoo join Apple in revealing more on NSA requests.
 Gag order restricting freedom of press eased.
 Tech companies have started to show increased transparency about their reporting to National
Security Letters (NSL) and sharing of customer data in their respective transparency reports.
 Latest Update: FB CEO Mark Zuckerberg criticizes US government surveillance.
 A quick peek into the Global government requests report of Facebook.
Facebook: While governments have an important responsibility to keep people safe, it is possible to do so while also being transparent
2
A few things to ponder about
 You should know who has your personal data, what data they have, and how it is used.
 You should be able to prevent information collected about you for one purpose from
being used for others.
 You should be able to correct inaccurate information about you.
 Your data should be secure.
 ..while it's illegal to use Brad Pitt's image to sell a watch without his permission, Facebook is
free to use your name to sell one to your friends.”
The NSA and Israel wrote Stuxnet together.
3
(Global government Requests Reports from Facebook)
Steps in NSA surveillance
 Hack into computer networks and tap into large fiber optic cables.
 Installed specialized malware known as “implants” on devices in order to perform Computer Network
Exploitation (CNE).
 The attack tools used for these implants are developed by a specialized NSA team called Tailored Access
Operations.
 They are designed to compromise routers, switches, firewalls to monitor entire networks and siphon out
data.
 NSA has even posed as a fake FB server and infected computer’s to hack into files from a hard drive.
 Send spam emails with malware which covertly record audio from a computer’s microphone.
 NSA is capable of launching cyber attacks by corrupting and disrupting file downloads or denying access
to websites.
If you want total security, go to prison. There you're fed, clothed, given medical care and so on. The only thing lacking... is freedom.
8
Embassy Espionage: The NSA's Secret Spy
Hub in Berlin
 US intelligence agencies have used American Embassy in Berlin as a listening station.
 Cellphones monitored by a unit known as the "Special Collection Service" (SCS).
 listening devices with which they can intercept virtually every popular method of communication:
cellular signals, wireless networks and satellite communication.
‘Nothing is perfect’-Tim Berners Lee on 25 years of the web
9
NSA’s malware infection plan
 SIGINT - For intercepting electronic communications of foreign computer networks ( But how to scale ? )
 Turbine – An “intelligent command and control capability” that enables “industrial-scale exploitation.”
 Computer Network Exploitation ( CNE ) – Mines intelligence from computers and networks.
 Computer Network Attack ( CNA ) – Seeks to disrupt, damage and destroy them.
(Intelligent command and control to automate implants)
10
Overview of technical details
11
Circumventing encryption
12
NSA hacking tools
13
Advanced hacking techniques
 Instead of using these implants, use “Man in the middle” and “Man in the side” attacks to
covertly force a user’s internet browser to route to NSA computer servers.
 “QUANTUMHAND” is the codename of the NSA project in which the agency disguises itself
as a fake facebook server.
 Man in the side attack: http://vimeo.com/88822483 (A short video on how NSA posed as
Facebook)
14
References
 “Tech Crunch article- Microsoft, Facebook, LinkedIn, Google and Yahoo Join Apple in revealing more on NSA
requests”,http://techcrunch.com/2014/02/03/microsoft-facebook-linkedin-google-and-yahoo-join-apple-in-revealing-more-on-nsa-
requests/?source=gravity
 “Security Analyst Summit 2014-Justice department eases gag order on FISA, National Security letter
reporting”, http://threatpost.com/justice-dept-eases-gag-order-on-fisa-national-security-letter-reporting/103903
 “Apple-Update on national security and law enforcement orders”, “Jan 27,
2014”, http://images.apple.com/pr/pdf/140127upd_nat_sec_and_law_enf_orders.pdf
 “Microsoft on the issues-Providing additional customer transparency on US Government requests for customer
data”,http://blogs.technet.com/b/microsoft_on_the_issues/archive/2014/02/03/providing-additional-transparency-on-us-government-
requests-for-customer-data.aspx
 “Obama orders NSA reforms, but metadata collection to continue”, http://threatpost.com/obama-orders-nsa-reforms-but-metadata-
collection-to-continue/103700
 "NSA spying on Americans", https://www.eff.org/nsa-spying
 "How the NSA's domestic spying program work", https://www.eff.org/nsa-spying/how-it-works
 "Wikipedia article on deep packet inspection", https://en.wikipedia.org/wiki/Deep_packet_inspection
Only the insecure strive for security
15
Thank you
“People won’t use technology they don’t trust. Governments
have put this trust at risk, and governments need to help
restore it.”
—Brad Smith, General Counsel and Executive Vice President,
Legal and Corporate Affairs, Microsoft
16

More Related Content

What's hot

Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"CloudCamp Chicago
 
Icreach — nsa's secret google like search engine for metadata analysis
Icreach — nsa's secret google like search engine for metadata analysisIcreach — nsa's secret google like search engine for metadata analysis
Icreach — nsa's secret google like search engine for metadata analysisMichael Holt
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trendsShreedeep Rayamajhi
 
Cybercrime and data sharing
Cybercrime and data sharingCybercrime and data sharing
Cybercrime and data sharingblogzilla
 
Underground malware economy
Underground malware economyUnderground malware economy
Underground malware economyNgongang Guy
 
2600 v07 n1 (spring 1990)
2600 v07 n1 (spring 1990)2600 v07 n1 (spring 1990)
2600 v07 n1 (spring 1990)Felipe Prado
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security Sanguine_Eva
 
If A Network Falls In The Internet does it make a sound?
If A Network Falls In The Internet does it make a sound?If A Network Falls In The Internet does it make a sound?
If A Network Falls In The Internet does it make a sound?jaysonstreet
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniAdam Nurudini
 
Cyber Security
Cyber SecurityCyber Security
Cyber Securityfrcarlson
 
The dark side of social networking
The dark side of social networkingThe dark side of social networking
The dark side of social networkingJames Ruffer
 
AusCERT - Mikko Hypponen
AusCERT - Mikko HypponenAusCERT - Mikko Hypponen
AusCERT - Mikko HypponenMikko Hypponen
 

What's hot (20)

Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 
Cyber warfare
Cyber warfareCyber warfare
Cyber warfare
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
 
Anonymizers
AnonymizersAnonymizers
Anonymizers
 
Icreach — nsa's secret google like search engine for metadata analysis
Icreach — nsa's secret google like search engine for metadata analysisIcreach — nsa's secret google like search engine for metadata analysis
Icreach — nsa's secret google like search engine for metadata analysis
 
Haaretz
HaaretzHaaretz
Haaretz
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 
Cybercrime and data sharing
Cybercrime and data sharingCybercrime and data sharing
Cybercrime and data sharing
 
Communication security 2021
Communication security 2021Communication security 2021
Communication security 2021
 
Hacking
Hacking Hacking
Hacking
 
Underground malware economy
Underground malware economyUnderground malware economy
Underground malware economy
 
2600 v07 n1 (spring 1990)
2600 v07 n1 (spring 1990)2600 v07 n1 (spring 1990)
2600 v07 n1 (spring 1990)
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
If A Network Falls In The Internet does it make a sound?
If A Network Falls In The Internet does it make a sound?If A Network Falls In The Internet does it make a sound?
If A Network Falls In The Internet does it make a sound?
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudini
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
The dark side of social networking
The dark side of social networkingThe dark side of social networking
The dark side of social networking
 
digital stega
digital stegadigital stega
digital stega
 
Cybersecurity winter is not coming…
Cybersecurity winter is not coming…Cybersecurity winter is not coming…
Cybersecurity winter is not coming…
 
AusCERT - Mikko Hypponen
AusCERT - Mikko HypponenAusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
 

Viewers also liked

Fashion and self perception
Fashion and self perceptionFashion and self perception
Fashion and self perceptionNikki Vergakes
 
Struyen.Com -áC thủ tiểu tử tuyết nhạn
Struyen.Com -áC thủ tiểu tử   tuyết nhạnStruyen.Com -áC thủ tiểu tử   tuyết nhạn
Struyen.Com -áC thủ tiểu tử tuyết nhạnstruyen68
 
Alisha roy photo album
Alisha roy   photo albumAlisha roy   photo album
Alisha roy photo albumAlisha Roy
 
Visualizing and drawing of symmetrical designs
Visualizing and drawing of symmetrical designsVisualizing and drawing of symmetrical designs
Visualizing and drawing of symmetrical designsEllen Cruz
 
GRIEVANCE MECHANISM - Total
GRIEVANCE MECHANISM - TotalGRIEVANCE MECHANISM - Total
GRIEVANCE MECHANISM - TotalEthical Sector
 
Nagata, Company Profile - Thein Sann
Nagata, Company Profile - Thein SannNagata, Company Profile - Thein Sann
Nagata, Company Profile - Thein SannEthical Sector
 
Disabili al lavoro, missione impossibile?
Disabili al lavoro, missione impossibile?Disabili al lavoro, missione impossibile?
Disabili al lavoro, missione impossibile?Antonino Leone
 
The ‘Roundtable: Tourism on Human Rights’ (Europe) – how it began via Skype -...
The ‘Roundtable: Tourism on Human Rights’ (Europe) – how it began via Skype -...The ‘Roundtable: Tourism on Human Rights’ (Europe) – how it began via Skype -...
The ‘Roundtable: Tourism on Human Rights’ (Europe) – how it began via Skype -...Ethical Sector
 
McDonalds Company Analysis
McDonalds Company AnalysisMcDonalds Company Analysis
McDonalds Company AnalysisYanxin Jiang
 
Self introduction
Self introductionSelf introduction
Self introduction汪 汪
 

Viewers also liked (20)

Fashion and self perception
Fashion and self perceptionFashion and self perception
Fashion and self perception
 
А.Р. Белявский
А.Р. БелявскийА.Р. Белявский
А.Р. Белявский
 
Struyen.Com -áC thủ tiểu tử tuyết nhạn
Struyen.Com -áC thủ tiểu tử   tuyết nhạnStruyen.Com -áC thủ tiểu tử   tuyết nhạn
Struyen.Com -áC thủ tiểu tử tuyết nhạn
 
Alisha roy photo album
Alisha roy   photo albumAlisha roy   photo album
Alisha roy photo album
 
LAN
LANLAN
LAN
 
Kbdh b4 tin10
Kbdh b4 tin10Kbdh b4 tin10
Kbdh b4 tin10
 
Al lavoro in
Al lavoro inAl lavoro in
Al lavoro in
 
Conductive 3D Printer Filament
Conductive 3D Printer FilamentConductive 3D Printer Filament
Conductive 3D Printer Filament
 
Visualizing and drawing of symmetrical designs
Visualizing and drawing of symmetrical designsVisualizing and drawing of symmetrical designs
Visualizing and drawing of symmetrical designs
 
GRIEVANCE MECHANISM - Total
GRIEVANCE MECHANISM - TotalGRIEVANCE MECHANISM - Total
GRIEVANCE MECHANISM - Total
 
Question 4
Question 4Question 4
Question 4
 
Nagata, Company Profile - Thein Sann
Nagata, Company Profile - Thein SannNagata, Company Profile - Thein Sann
Nagata, Company Profile - Thein Sann
 
Disabili al lavoro, missione impossibile?
Disabili al lavoro, missione impossibile?Disabili al lavoro, missione impossibile?
Disabili al lavoro, missione impossibile?
 
Gagadget 2015.
Gagadget 2015.Gagadget 2015.
Gagadget 2015.
 
The ‘Roundtable: Tourism on Human Rights’ (Europe) – how it began via Skype -...
The ‘Roundtable: Tourism on Human Rights’ (Europe) – how it began via Skype -...The ‘Roundtable: Tourism on Human Rights’ (Europe) – how it began via Skype -...
The ‘Roundtable: Tourism on Human Rights’ (Europe) – how it began via Skype -...
 
My storyboard
My storyboardMy storyboard
My storyboard
 
Boxnews 2015
Boxnews 2015Boxnews 2015
Boxnews 2015
 
McDonalds Company Analysis
McDonalds Company AnalysisMcDonalds Company Analysis
McDonalds Company Analysis
 
Additional Skills
Additional SkillsAdditional Skills
Additional Skills
 
Self introduction
Self introductionSelf introduction
Self introduction
 

Similar to Internet in news

Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniquesNSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniquesMichael Holt
 
Warrantless governmental surveillance through the use of emerging technology ...
Warrantless governmental surveillance through the use of emerging technology ...Warrantless governmental surveillance through the use of emerging technology ...
Warrantless governmental surveillance through the use of emerging technology ...Vania_Chaker
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)Takeshi Takahashi
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youSheher Bano
 
ghostsinthemachine2
ghostsinthemachine2ghostsinthemachine2
ghostsinthemachine2Shane Kite
 
INSECURE Magazine - 39
INSECURE Magazine - 39INSECURE Magazine - 39
INSECURE Magazine - 39Felipe Prado
 
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docxAssignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docxannrodgerson
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywordskhansalman19
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza Belayneh
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Michele Chubirka
 
Secureview 2q 2011
Secureview 2q 2011Secureview 2q 2011
Secureview 2q 2011Felipe Prado
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeMurray Security Services
 

Similar to Internet in news (20)

Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniquesNSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
 
Warrantless governmental surveillance through the use of emerging technology ...
Warrantless governmental surveillance through the use of emerging technology ...Warrantless governmental surveillance through the use of emerging technology ...
Warrantless governmental surveillance through the use of emerging technology ...
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on you
 
ghostsinthemachine2
ghostsinthemachine2ghostsinthemachine2
ghostsinthemachine2
 
China Cyber
China CyberChina Cyber
China Cyber
 
INSECURE Magazine - 39
INSECURE Magazine - 39INSECURE Magazine - 39
INSECURE Magazine - 39
 
RSTREET17
RSTREET17RSTREET17
RSTREET17
 
Device Hacking
Device HackingDevice Hacking
Device Hacking
 
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docxAssignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
 
privtechsomeassemb
privtechsomeassembprivtechsomeassemb
privtechsomeassemb
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Cyber
CyberCyber
Cyber
 
Secureview 2q 2011
Secureview 2q 2011Secureview 2q 2011
Secureview 2q 2011
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 

Recently uploaded

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 

Recently uploaded (20)

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 

Internet in news

  • 1. NSA Surveillance - Prasidh Information is the oxygen of the modern age. It seeps through the walls topped by barbed wire, it wafts across the electrified borders. 1
  • 2. Motivation: GAG order eased ( Feb 3rd )  Microsoft, Facebook, LinkedIn, Google and Yahoo join Apple in revealing more on NSA requests.  Gag order restricting freedom of press eased.  Tech companies have started to show increased transparency about their reporting to National Security Letters (NSL) and sharing of customer data in their respective transparency reports.  Latest Update: FB CEO Mark Zuckerberg criticizes US government surveillance.  A quick peek into the Global government requests report of Facebook. Facebook: While governments have an important responsibility to keep people safe, it is possible to do so while also being transparent 2
  • 3. A few things to ponder about  You should know who has your personal data, what data they have, and how it is used.  You should be able to prevent information collected about you for one purpose from being used for others.  You should be able to correct inaccurate information about you.  Your data should be secure.  ..while it's illegal to use Brad Pitt's image to sell a watch without his permission, Facebook is free to use your name to sell one to your friends.” The NSA and Israel wrote Stuxnet together. 3
  • 4. (Global government Requests Reports from Facebook)
  • 5.
  • 6.
  • 7.
  • 8. Steps in NSA surveillance  Hack into computer networks and tap into large fiber optic cables.  Installed specialized malware known as “implants” on devices in order to perform Computer Network Exploitation (CNE).  The attack tools used for these implants are developed by a specialized NSA team called Tailored Access Operations.  They are designed to compromise routers, switches, firewalls to monitor entire networks and siphon out data.  NSA has even posed as a fake FB server and infected computer’s to hack into files from a hard drive.  Send spam emails with malware which covertly record audio from a computer’s microphone.  NSA is capable of launching cyber attacks by corrupting and disrupting file downloads or denying access to websites. If you want total security, go to prison. There you're fed, clothed, given medical care and so on. The only thing lacking... is freedom. 8
  • 9. Embassy Espionage: The NSA's Secret Spy Hub in Berlin  US intelligence agencies have used American Embassy in Berlin as a listening station.  Cellphones monitored by a unit known as the "Special Collection Service" (SCS).  listening devices with which they can intercept virtually every popular method of communication: cellular signals, wireless networks and satellite communication. ‘Nothing is perfect’-Tim Berners Lee on 25 years of the web 9
  • 10. NSA’s malware infection plan  SIGINT - For intercepting electronic communications of foreign computer networks ( But how to scale ? )  Turbine – An “intelligent command and control capability” that enables “industrial-scale exploitation.”  Computer Network Exploitation ( CNE ) – Mines intelligence from computers and networks.  Computer Network Attack ( CNA ) – Seeks to disrupt, damage and destroy them. (Intelligent command and control to automate implants) 10
  • 11. Overview of technical details 11
  • 14. Advanced hacking techniques  Instead of using these implants, use “Man in the middle” and “Man in the side” attacks to covertly force a user’s internet browser to route to NSA computer servers.  “QUANTUMHAND” is the codename of the NSA project in which the agency disguises itself as a fake facebook server.  Man in the side attack: http://vimeo.com/88822483 (A short video on how NSA posed as Facebook) 14
  • 15. References  “Tech Crunch article- Microsoft, Facebook, LinkedIn, Google and Yahoo Join Apple in revealing more on NSA requests”,http://techcrunch.com/2014/02/03/microsoft-facebook-linkedin-google-and-yahoo-join-apple-in-revealing-more-on-nsa- requests/?source=gravity  “Security Analyst Summit 2014-Justice department eases gag order on FISA, National Security letter reporting”, http://threatpost.com/justice-dept-eases-gag-order-on-fisa-national-security-letter-reporting/103903  “Apple-Update on national security and law enforcement orders”, “Jan 27, 2014”, http://images.apple.com/pr/pdf/140127upd_nat_sec_and_law_enf_orders.pdf  “Microsoft on the issues-Providing additional customer transparency on US Government requests for customer data”,http://blogs.technet.com/b/microsoft_on_the_issues/archive/2014/02/03/providing-additional-transparency-on-us-government- requests-for-customer-data.aspx  “Obama orders NSA reforms, but metadata collection to continue”, http://threatpost.com/obama-orders-nsa-reforms-but-metadata- collection-to-continue/103700  "NSA spying on Americans", https://www.eff.org/nsa-spying  "How the NSA's domestic spying program work", https://www.eff.org/nsa-spying/how-it-works  "Wikipedia article on deep packet inspection", https://en.wikipedia.org/wiki/Deep_packet_inspection Only the insecure strive for security 15
  • 16. Thank you “People won’t use technology they don’t trust. Governments have put this trust at risk, and governments need to help restore it.” —Brad Smith, General Counsel and Executive Vice President, Legal and Corporate Affairs, Microsoft 16

Editor's Notes

  1. http://techcrunch.com/2014/02/03/microsoft-facebook-linkedin-google-and-yahoo-join-apple-in-revealing-more-on-nsa-requests/?source=gravityhttp://newsroom.fb.com/news/2014/02/facebook-releases-new-data-about-national-security-requests/Latest Update on Mark’s comments covered in the latter part of the presentation.Transparency report provides a breakdown within ranges of how many of those FISA requests sought the content of accounts and how many sought non-content information (such as subscriber name)https://www.facebook.com/about/government_requests
  2. https://www.goodreads.com/quotes/tag/internet-securityhttp://www.brainyquote.com/quotes/keywords/nsa.html
  3. http://www.computerworld.com/s/article/9244333/NSA_reportedly_compromised_more_than_50_000_networks_worldwide
  4. http://www.spiegel.de/international/germany/cover-story-how-nsa-spied-on-merkel-cell-phone-from-berlin-embassy-a-930205.htmlThe spying on top of the chancellor’s neighbourhood.
  5. https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/TAO- Tailored Access Operations developed malware tools and implants
  6. Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.
  7. https://www.schneier.com/blog/archives/2013/10/how_the_nsa_att.html
  8. http://peacepink.ning.com/profiles/blogs/mind-control-torture-and-wireless-communication-abuses
  9. https://www.reformgovernmentsurveillance.com/