SlideShare a Scribd company logo
1 of 1
Download to read offline
INDIA AMONG
TOP 5 COUNTRIES
THE US SPIES ON
PoliticalfalloutofUSsurveillancecontinuedonTuesday,
asBrazilianPresidentDilmaRousseffattackeditinthe
UN.InIndia,TheHindu carriedrevelationsofUSspying
"In the overall list of
countries spied on
by NSA programs,
India stands at
fifth place, with
billions of pieces of
information
plucked from its
telephone and
internet networks
just in 30 days."
GLENN GREENWALD
Reporter, The Guardian,
who broke the Snowden
story, in his column on
Monday
WHAT IS THE NSA?
TheUSNationalSecurityAgency,whichgathers
informationonUS'adversariesandprotectsits
securityinformationfromtheft,isinthemidstofa
stormforitscontroversialspyprogramme,PRISM
sinceEdwardSnowdenrevealeditsextensive
spyingonitsowncitizensandothercountries
WHO WAS SPIED ON AND HOW?
WHY Access to vast quantities of internet traffic, e-mails, telephone and office conversations and
official documents stored digitally
Permanent Mission
of India at the
United Nations
(Houses the Indian Ambassador,
Defence Attaches)
Located between
2nd and 3rd
Avenue, 43rd Street,
Manhattan
4 kinds of electronic snooping devices used: where they were used
LIFESAVER
facilitates
imaging of hard
drive of
computers
HIGHLANDS
makes digital
collection from
implants
VAGRANT
collects data of
open computer
screens
MAGNETIC
a collection of
digital signals
INDIAN EMBASSY:
Chancery building – 2107,
Massachusetts Avenue
and also by PRISM
INDIAN EMBASSY:
Annex – 2536, Massachusetts
Avenue (Houses an Isro office)
Sources: The Hindu newspaper, and columns of Glenn Greenwald

More Related Content

What's hot

The Security Era
The Security EraThe Security Era
The Security Era
jk_welder
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-war
MarioEliseo3
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacy
netapprad
 
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
Matthew Kurnava
 

What's hot (16)

Why Are We Being Watched?
Why Are We Being Watched?Why Are We Being Watched?
Why Are We Being Watched?
 
Privatising Privacy
Privatising PrivacyPrivatising Privacy
Privatising Privacy
 
Privacy vs Security
Privacy vs SecurityPrivacy vs Security
Privacy vs Security
 
The Security Era
The Security EraThe Security Era
The Security Era
 
Sec Wars Episode 3
Sec Wars Episode 3Sec Wars Episode 3
Sec Wars Episode 3
 
Vol7no2 ball
Vol7no2 ballVol7no2 ball
Vol7no2 ball
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-war
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human Rights
 
Windows of Opportunity in Hallways of Distractions: the race between threats,...
Windows of Opportunity in Hallways of Distractions: the race between threats,...Windows of Opportunity in Hallways of Distractions: the race between threats,...
Windows of Opportunity in Hallways of Distractions: the race between threats,...
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacy
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 
Threat Assessment: The New Normal
Threat Assessment: The New NormalThreat Assessment: The New Normal
Threat Assessment: The New Normal
 
Tagged!
Tagged!Tagged!
Tagged!
 
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareLooking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
 
Right to privacy - By Suavely Dash
Right to privacy - By Suavely DashRight to privacy - By Suavely Dash
Right to privacy - By Suavely Dash
 
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
 

Viewers also liked

20130909a a001101003
20130909a a00110100320130909a a001101003
20130909a a001101003
neeraj tiwari
 
20130925a e004101004
20130925a e00410100420130925a e004101004
20130925a e004101004
neeraj tiwari
 
M e-d-i-c-i-n-a-l-e-g-a-l1834
M e-d-i-c-i-n-a-l-e-g-a-l1834M e-d-i-c-i-n-a-l-e-g-a-l1834
M e-d-i-c-i-n-a-l-e-g-a-l1834
Huexos AdaMe
 
Computer Security in Banking and bookkeeping
Computer Security in Banking and bookkeepingComputer Security in Banking and bookkeeping
Computer Security in Banking and bookkeeping
Yogi Pratama
 

Viewers also liked (17)

Gerencia estratègica
Gerencia estratègica Gerencia estratègica
Gerencia estratègica
 
20130909a a001101003
20130909a a00110100320130909a a001101003
20130909a a001101003
 
20130925a e004101004
20130925a e00410100420130925a e004101004
20130925a e004101004
 
20130927a 010101010
20130927a 01010101020130927a 010101010
20130927a 010101010
 
Summer Youth Camp - Murder
Summer Youth Camp - MurderSummer Youth Camp - Murder
Summer Youth Camp - Murder
 
Summer Youth Camp - Leap of Faith
Summer Youth Camp - Leap of FaithSummer Youth Camp - Leap of Faith
Summer Youth Camp - Leap of Faith
 
Anantara Vacation Club Bophut Koh Samui Facilities Review
Anantara Vacation Club Bophut Koh Samui Facilities ReviewAnantara Vacation Club Bophut Koh Samui Facilities Review
Anantara Vacation Club Bophut Koh Samui Facilities Review
 
Summer Youth Camp - Knock Down, or Build Up
Summer Youth Camp - Knock Down, or Build UpSummer Youth Camp - Knock Down, or Build Up
Summer Youth Camp - Knock Down, or Build Up
 
Summer Youth Camp - Old Testament Men Trivia
Summer Youth Camp - Old Testament Men TriviaSummer Youth Camp - Old Testament Men Trivia
Summer Youth Camp - Old Testament Men Trivia
 
Summer Youth Camp - LifeSavers Candy Tournament
Summer Youth Camp - LifeSavers Candy TournamentSummer Youth Camp - LifeSavers Candy Tournament
Summer Youth Camp - LifeSavers Candy Tournament
 
M e-d-i-c-i-n-a-l-e-g-a-l1834
M e-d-i-c-i-n-a-l-e-g-a-l1834M e-d-i-c-i-n-a-l-e-g-a-l1834
M e-d-i-c-i-n-a-l-e-g-a-l1834
 
El poder del ahora PM
El poder del ahora PMEl poder del ahora PM
El poder del ahora PM
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Computer Security in Banking and bookkeeping
Computer Security in Banking and bookkeepingComputer Security in Banking and bookkeeping
Computer Security in Banking and bookkeeping
 
resume
resumeresume
resume
 

Similar to 20130926a e004101010

Reply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docxReply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docx
carlt4
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
Callum Craigie
 
Snowden -Hero OR Traitor
Snowden -Hero OR TraitorSnowden -Hero OR Traitor
Snowden -Hero OR Traitor
Apijay Kumar
 
The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security Agency
Toya Shamberger
 
Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandCons
Kati Mccarthy
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS
Jun Hao Lim
 
Edward Snowden Revelations in Cyber security. Traitor or Patr
Edward Snowden Revelations in Cyber security. Traitor or PatrEdward Snowden Revelations in Cyber security. Traitor or Patr
Edward Snowden Revelations in Cyber security. Traitor or Patr
eleanorabarrington
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia G
OllieShoresna
 

Similar to 20130926a e004101010 (12)

Reply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docxReply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docx
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Snowden -Hero OR Traitor
Snowden -Hero OR TraitorSnowden -Hero OR Traitor
Snowden -Hero OR Traitor
 
The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security Agency
 
Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandCons
 
Uk ordered guardian to destroy hard drives in effort to stop snowden revelations
Uk ordered guardian to destroy hard drives in effort to stop snowden revelationsUk ordered guardian to destroy hard drives in effort to stop snowden revelations
Uk ordered guardian to destroy hard drives in effort to stop snowden revelations
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS
 
Edward Snowden Revelations in Cyber security. Traitor or Patr
Edward Snowden Revelations in Cyber security. Traitor or PatrEdward Snowden Revelations in Cyber security. Traitor or Patr
Edward Snowden Revelations in Cyber security. Traitor or Patr
 
RSTREET17
RSTREET17RSTREET17
RSTREET17
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia G
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 

20130926a e004101010

  • 1. INDIA AMONG TOP 5 COUNTRIES THE US SPIES ON PoliticalfalloutofUSsurveillancecontinuedonTuesday, asBrazilianPresidentDilmaRousseffattackeditinthe UN.InIndia,TheHindu carriedrevelationsofUSspying "In the overall list of countries spied on by NSA programs, India stands at fifth place, with billions of pieces of information plucked from its telephone and internet networks just in 30 days." GLENN GREENWALD Reporter, The Guardian, who broke the Snowden story, in his column on Monday WHAT IS THE NSA? TheUSNationalSecurityAgency,whichgathers informationonUS'adversariesandprotectsits securityinformationfromtheft,isinthemidstofa stormforitscontroversialspyprogramme,PRISM sinceEdwardSnowdenrevealeditsextensive spyingonitsowncitizensandothercountries WHO WAS SPIED ON AND HOW? WHY Access to vast quantities of internet traffic, e-mails, telephone and office conversations and official documents stored digitally Permanent Mission of India at the United Nations (Houses the Indian Ambassador, Defence Attaches) Located between 2nd and 3rd Avenue, 43rd Street, Manhattan 4 kinds of electronic snooping devices used: where they were used LIFESAVER facilitates imaging of hard drive of computers HIGHLANDS makes digital collection from implants VAGRANT collects data of open computer screens MAGNETIC a collection of digital signals INDIAN EMBASSY: Chancery building – 2107, Massachusetts Avenue and also by PRISM INDIAN EMBASSY: Annex – 2536, Massachusetts Avenue (Houses an Isro office) Sources: The Hindu newspaper, and columns of Glenn Greenwald