SlideShare a Scribd company logo
AMERICAN SPY AGENCY WATCHING US 
Guided by 
Vishwadeep C. Badgujar 
Present by 
Kalyani V. Mali
Content 
 What is PRISM- NSA Surveillance 
 Goal of Seminar 
 Why its an issue 
 Major online company involvement 
 Effects of PRISM in our life 
 How to bypass internet Surveillance (tools) 
 Outcome
Goal of This Presentation 
 To aware Electronic spying program operated by other countries 
 Importance of our internet privacy 
 Types of data collected by PRISM – NS 
 How to Protect online Privacy and Data 
 How to Protect Corporate and Government electronic data 
 How we can bypass PRISM and another Spying Programs
What is PRISM NSA Surveillance
What is PRISM NSA Surveillance 
 PRISM is a clandestine mass electronic 
surveillance data mining program launched in 
2007 by the National Security Agency(NSA), with 
participation from an unknown date by the 
British equivalent agency, GCHQ
 The Prism program collects stored Internet 
communications based on demands made to 
Internet companies such as Google Inc. under 
Section 702 of the FISA Amendments Act of 
2008 to turn over any data that match court-approved 
search terms 
What is PRISM NSA Surveillance
 The NSA can use these Prism requests to target 
communications that were encrypted when 
they traveled across the Internet backbone. 
What is PRISM NSA Surveillance
Goal Behind PRISM
Goal Behind PRISM 
Having profile of each person on earth who is connected via any devices to network. It contains 
information about each person like: 
• Name, Address and Office address 
• How many bank accounts he owns and how much money he has in each of bank account. 
• What kind of job he does, researcher? Developer? Politician? etc. 
• His family and relation among other people. 
• His photo, his family photos 
• What does he speak more often? What is the content of his talks? 
• Whom he speaks to more often? 
• Where do you travel?
Goal Behind PRISM 
• A record of most calls made in the U.S 
• Email, Facebook posts and instant message 
• Massive amounts of raw Internet traffic 
• The contents of an unknown number of phone calls
Why its an issue ?
 Think, if CCTV surveillance cameras are fitted in your all house. And 
the recorded data stored and watch to another unknown place. 
 Then how you feel? Safe or Unsafe? 
 Are you feel secured ? 
 or you feel privacy lost ? 
Why its an Issue
Companies That Support NSA PRISM
Companies supports PRISM 
All Major American Internet Companies
Affects of NSA on our Privacy 
 NSA are continuously collect and analysis our data 
 NSA Collectects & Maintain following types of data 
 Our habits, where we travel, about our family 
 NSA can collect passwords of every online accounts 
 Our business details , sales details, targets etc 
 Call records, 
 The NSA monitors financial transactions. 
 The NSA intercepts troves of personal webcam video from innocent people. 
 Etc and more
How to bypass NSA surveillance 
N 
S 
A 
N 
S 
A
Tools 
 We need so tools and methods 
 Use proxy servers for confidential works 
 Use strong key AIS 256 bit for cloud data 
 Use Proxy Changer before surf on internet 
 Big organization can use VPN Services for protect there Networks 
 Corporate world can use disposal email for confidential email 
Bypassing PRISM
Bypassing PRISM - tools 
Tools 
Tor browser 
Proxy server in Japan 
Proxy server in Israel 
Proxy server in Russia 
Proxy server in Africa 
Proxy server in India 
Proxy server in Africa 
Encrypted browsing on internet
Bypassing PRISM - tools 
 DoNot Track browser plug-in 
 Prohibit internet companies to track you 
 Protect online traction tracking 
 cookies destructor browser plug-in 
 Best antivirus & anti malware
Use Private Search engine like 
Duduckgo.com 
Duduckgo never try to track you 
Bypassing PRISM - tools
 Use Private Cloud Storage like 
Spideroak 
Sperderoak never compromise our data 
Can only access by authorized device 
Bypassing PRISM - tools 
256 bit Encrypted
 Use only BBM 
Blackberry Massinger 
Protected with Triple DES 
3 Data Encryption Standards 
Never Compromise with NSA 
Bypassing PRISM - tools
Outcome of this presentation 
 For Business 
 Aware what Prism NSA surveillance spying 
 Available tools to bypass NSA surveillance 
 Protect confidential data by watching spy Agencies 
 Now businessman are confidant doing work on internet 
 For Private & Family 
 Importance of our online privacy 
 Methods how to leave secure and private on internet

More Related Content

What's hot

Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
Stephen Thomas, CISSP
 
"Cyber crime- how to combat the menace"
"Cyber crime- how to combat the menace""Cyber crime- how to combat the menace"
"Cyber crime- how to combat the menace"
Dr. Sushma N Jogan
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
Tayyab Farooq
 
cyber crime - slideshare by jayed hossain jibon
cyber crime - slideshare  by  jayed hossain jiboncyber crime - slideshare  by  jayed hossain jibon
cyber crime - slideshare by jayed hossain jibon
Jayed Hossain Jibon
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
FaMulan2
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Damir Delija
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Jay Nagar
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
NetLockSmith
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Zeeshan Khan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
JoyBhowmik4
 
Cyber Crime - How to Prevent
Cyber Crime - How to PreventCyber Crime - How to Prevent
Cyber Crime - How to Prevent
Shamiul Lajib
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
DEEKSHAASHOKA
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
Mohammed Adam
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTAimee Shuck
 
Cyber Security & Hygine
Cyber Security & HygineCyber Security & Hygine
Cyber Security & Hygine
Amit Arya
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaEvan Pathiratne
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
sanjana mun
 
Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"
Jisc
 
Security Bytes - July 2013
Security Bytes -  July 2013Security Bytes -  July 2013
Security Bytes - July 2013
n|u - The Open Security Community
 

What's hot (20)

Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
"Cyber crime- how to combat the menace"
"Cyber crime- how to combat the menace""Cyber crime- how to combat the menace"
"Cyber crime- how to combat the menace"
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
 
cyber crime - slideshare by jayed hossain jibon
cyber crime - slideshare  by  jayed hossain jiboncyber crime - slideshare  by  jayed hossain jibon
cyber crime - slideshare by jayed hossain jibon
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime - How to Prevent
Cyber Crime - How to PreventCyber Crime - How to Prevent
Cyber Crime - How to Prevent
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
Cyber Security & Hygine
Cyber Security & HygineCyber Security & Hygine
Cyber Security & Hygine
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"
 
Security Bytes - July 2013
Security Bytes -  July 2013Security Bytes -  July 2013
Security Bytes - July 2013
 

Viewers also liked

PRiSM Practitioner
PRiSM PractitionerPRiSM Practitioner
PRiSM Practitioner
asapm
 
The Prism
The PrismThe Prism
The Prism
shwetalib
 
PRISM seed-stage Investor Deck
PRISM seed-stage Investor DeckPRISM seed-stage Investor Deck
PRISM seed-stage Investor Deck
David Coallier
 
2012 Coachmen Prism Class C Motorhome
2012 Coachmen Prism Class C Motorhome2012 Coachmen Prism Class C Motorhome
2012 Coachmen Prism Class C MotorhomeDave Arbogast RV
 
Mrs. folluo's prism project
Mrs. folluo's prism projectMrs. folluo's prism project
Mrs. folluo's prism projectdarenwolf
 
PRISM and Silverlight
PRISM and SilverlightPRISM and Silverlight
PRISM and Silverlight
mark mann
 
Prism Credentials 2012
Prism  Credentials 2012Prism  Credentials 2012
Prism Credentials 2012
Prism
 
Digital Citizenship and Surveillance Society: Media
Digital Citizenship and Surveillance Society: MediaDigital Citizenship and Surveillance Society: Media
Digital Citizenship and Surveillance Society: Media
Karin Wahl-Jorgensen
 
10 Spying Strategies To Generate More Profit
10 Spying Strategies To Generate More Profit10 Spying Strategies To Generate More Profit
10 Spying Strategies To Generate More Profit
WhatRunsWhere
 
Corporate espionage versus competitive intelligence
Corporate espionage versus competitive intelligenceCorporate espionage versus competitive intelligence
Corporate espionage versus competitive intelligence
Martin Brunet
 
FLAME Conference Program
FLAME Conference ProgramFLAME Conference Program
FLAME Conference ProgramLee Mordechai
 
Human as a virus
Human as a  virusHuman as a  virus
Human as a virusYaniv sela
 
Cinema Volano - Programma Dicembre-Febbraio
Cinema Volano - Programma Dicembre-Febbraio Cinema Volano - Programma Dicembre-Febbraio
Cinema Volano - Programma Dicembre-Febbraio
kennywhite
 
Why prism for xamarin.forms
Why prism for xamarin.formsWhy prism for xamarin.forms
Why prism for xamarin.forms
Atsushi Nakamura
 
Cyber attack
Cyber attackCyber attack
Cyber attack
Avinash Navin
 
Stuxnet flame
Stuxnet flameStuxnet flame
Stuxnet flame
Santosh Khadsare
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
b coatesworth
 

Viewers also liked (20)

PRiSM Practitioner
PRiSM PractitionerPRiSM Practitioner
PRiSM Practitioner
 
The Prism
The PrismThe Prism
The Prism
 
Ophthalmic prism
Ophthalmic prismOphthalmic prism
Ophthalmic prism
 
Prism.ppt
Prism.pptPrism.ppt
Prism.ppt
 
PRISM seed-stage Investor Deck
PRISM seed-stage Investor DeckPRISM seed-stage Investor Deck
PRISM seed-stage Investor Deck
 
2012 Coachmen Prism Class C Motorhome
2012 Coachmen Prism Class C Motorhome2012 Coachmen Prism Class C Motorhome
2012 Coachmen Prism Class C Motorhome
 
Mrs. folluo's prism project
Mrs. folluo's prism projectMrs. folluo's prism project
Mrs. folluo's prism project
 
PRISM and Silverlight
PRISM and SilverlightPRISM and Silverlight
PRISM and Silverlight
 
Prism Credentials 2012
Prism  Credentials 2012Prism  Credentials 2012
Prism Credentials 2012
 
Digital Citizenship and Surveillance Society: Media
Digital Citizenship and Surveillance Society: MediaDigital Citizenship and Surveillance Society: Media
Digital Citizenship and Surveillance Society: Media
 
10 Spying Strategies To Generate More Profit
10 Spying Strategies To Generate More Profit10 Spying Strategies To Generate More Profit
10 Spying Strategies To Generate More Profit
 
Corporate espionage versus competitive intelligence
Corporate espionage versus competitive intelligenceCorporate espionage versus competitive intelligence
Corporate espionage versus competitive intelligence
 
FLAME Conference Program
FLAME Conference ProgramFLAME Conference Program
FLAME Conference Program
 
Human as a virus
Human as a  virusHuman as a  virus
Human as a virus
 
Cinema Volano - Programma Dicembre-Febbraio
Cinema Volano - Programma Dicembre-Febbraio Cinema Volano - Programma Dicembre-Febbraio
Cinema Volano - Programma Dicembre-Febbraio
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
Why prism for xamarin.forms
Why prism for xamarin.formsWhy prism for xamarin.forms
Why prism for xamarin.forms
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Stuxnet flame
Stuxnet flameStuxnet flame
Stuxnet flame
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 

Similar to Vishwadeep Presentation On NSA PRISM Spying

Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
Priyab Satoshi
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
Jeremy Quadri
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
OMNIRISC SECURITY SERVICES
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
PECB
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
- Mark - Fullbright
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
AEGILITY
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
mapletronics
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
Abzetdin Adamov
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
Kanishk Raj
 
Ghostery Data Privacy Day 2014
Ghostery Data Privacy Day 2014Ghostery Data Privacy Day 2014
Ghostery Data Privacy Day 2014Ghostery
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
GDSCCVR
 
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Insurance Technologies Corporation (ITC)
 
018 CYBER SAFETY.pdf
018 CYBER SAFETY.pdf018 CYBER SAFETY.pdf
018 CYBER SAFETY.pdf
YashikaTanwar2
 
How to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentationHow to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentation
Griffin LaFleur
 
The Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyThe Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet Privacy
eBoost Consulting
 
Information security awareness training
Information security awareness trainingInformation security awareness training
Information security awareness training
Sandeep Taileng
 
Protecting your online identity - Managing your passwords
Protecting your online identity -  Managing your passwordsProtecting your online identity -  Managing your passwords
Protecting your online identity - Managing your passwords
Bunmi Sowande
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
Kevin Wharram
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats07Deeps
 
How can i hide my ip on permanent basis
How can i hide my ip on permanent basisHow can i hide my ip on permanent basis
How can i hide my ip on permanent basis
hidemyipaddress
 

Similar to Vishwadeep Presentation On NSA PRISM Spying (20)

Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 
Ghostery Data Privacy Day 2014
Ghostery Data Privacy Day 2014Ghostery Data Privacy Day 2014
Ghostery Data Privacy Day 2014
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
 
018 CYBER SAFETY.pdf
018 CYBER SAFETY.pdf018 CYBER SAFETY.pdf
018 CYBER SAFETY.pdf
 
How to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentationHow to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentation
 
The Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyThe Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet Privacy
 
Information security awareness training
Information security awareness trainingInformation security awareness training
Information security awareness training
 
Protecting your online identity - Managing your passwords
Protecting your online identity -  Managing your passwordsProtecting your online identity -  Managing your passwords
Protecting your online identity - Managing your passwords
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats
 
How can i hide my ip on permanent basis
How can i hide my ip on permanent basisHow can i hide my ip on permanent basis
How can i hide my ip on permanent basis
 

Recently uploaded

6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 

Recently uploaded (20)

6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 

Vishwadeep Presentation On NSA PRISM Spying

  • 1. AMERICAN SPY AGENCY WATCHING US Guided by Vishwadeep C. Badgujar Present by Kalyani V. Mali
  • 2. Content  What is PRISM- NSA Surveillance  Goal of Seminar  Why its an issue  Major online company involvement  Effects of PRISM in our life  How to bypass internet Surveillance (tools)  Outcome
  • 3. Goal of This Presentation  To aware Electronic spying program operated by other countries  Importance of our internet privacy  Types of data collected by PRISM – NS  How to Protect online Privacy and Data  How to Protect Corporate and Government electronic data  How we can bypass PRISM and another Spying Programs
  • 4. What is PRISM NSA Surveillance
  • 5. What is PRISM NSA Surveillance  PRISM is a clandestine mass electronic surveillance data mining program launched in 2007 by the National Security Agency(NSA), with participation from an unknown date by the British equivalent agency, GCHQ
  • 6.  The Prism program collects stored Internet communications based on demands made to Internet companies such as Google Inc. under Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms What is PRISM NSA Surveillance
  • 7.  The NSA can use these Prism requests to target communications that were encrypted when they traveled across the Internet backbone. What is PRISM NSA Surveillance
  • 9. Goal Behind PRISM Having profile of each person on earth who is connected via any devices to network. It contains information about each person like: • Name, Address and Office address • How many bank accounts he owns and how much money he has in each of bank account. • What kind of job he does, researcher? Developer? Politician? etc. • His family and relation among other people. • His photo, his family photos • What does he speak more often? What is the content of his talks? • Whom he speaks to more often? • Where do you travel?
  • 10. Goal Behind PRISM • A record of most calls made in the U.S • Email, Facebook posts and instant message • Massive amounts of raw Internet traffic • The contents of an unknown number of phone calls
  • 11. Why its an issue ?
  • 12.  Think, if CCTV surveillance cameras are fitted in your all house. And the recorded data stored and watch to another unknown place.  Then how you feel? Safe or Unsafe?  Are you feel secured ?  or you feel privacy lost ? Why its an Issue
  • 14. Companies supports PRISM All Major American Internet Companies
  • 15. Affects of NSA on our Privacy  NSA are continuously collect and analysis our data  NSA Collectects & Maintain following types of data  Our habits, where we travel, about our family  NSA can collect passwords of every online accounts  Our business details , sales details, targets etc  Call records,  The NSA monitors financial transactions.  The NSA intercepts troves of personal webcam video from innocent people.  Etc and more
  • 16. How to bypass NSA surveillance N S A N S A
  • 17. Tools  We need so tools and methods  Use proxy servers for confidential works  Use strong key AIS 256 bit for cloud data  Use Proxy Changer before surf on internet  Big organization can use VPN Services for protect there Networks  Corporate world can use disposal email for confidential email Bypassing PRISM
  • 18. Bypassing PRISM - tools Tools Tor browser Proxy server in Japan Proxy server in Israel Proxy server in Russia Proxy server in Africa Proxy server in India Proxy server in Africa Encrypted browsing on internet
  • 19. Bypassing PRISM - tools  DoNot Track browser plug-in  Prohibit internet companies to track you  Protect online traction tracking  cookies destructor browser plug-in  Best antivirus & anti malware
  • 20. Use Private Search engine like Duduckgo.com Duduckgo never try to track you Bypassing PRISM - tools
  • 21.  Use Private Cloud Storage like Spideroak Sperderoak never compromise our data Can only access by authorized device Bypassing PRISM - tools 256 bit Encrypted
  • 22.  Use only BBM Blackberry Massinger Protected with Triple DES 3 Data Encryption Standards Never Compromise with NSA Bypassing PRISM - tools
  • 23. Outcome of this presentation  For Business  Aware what Prism NSA surveillance spying  Available tools to bypass NSA surveillance  Protect confidential data by watching spy Agencies  Now businessman are confidant doing work on internet  For Private & Family  Importance of our online privacy  Methods how to leave secure and private on internet