1. AMERICAN SPY AGENCY WATCHING US
Guided by
Vishwadeep C. Badgujar
Present by
Kalyani V. Mali
2. Content
What is PRISM- NSA Surveillance
Goal of Seminar
Why its an issue
Major online company involvement
Effects of PRISM in our life
How to bypass internet Surveillance (tools)
Outcome
3. Goal of This Presentation
To aware Electronic spying program operated by other countries
Importance of our internet privacy
Types of data collected by PRISM – NS
How to Protect online Privacy and Data
How to Protect Corporate and Government electronic data
How we can bypass PRISM and another Spying Programs
5. What is PRISM NSA Surveillance
PRISM is a clandestine mass electronic
surveillance data mining program launched in
2007 by the National Security Agency(NSA), with
participation from an unknown date by the
British equivalent agency, GCHQ
6. The Prism program collects stored Internet
communications based on demands made to
Internet companies such as Google Inc. under
Section 702 of the FISA Amendments Act of
2008 to turn over any data that match court-approved
search terms
What is PRISM NSA Surveillance
7. The NSA can use these Prism requests to target
communications that were encrypted when
they traveled across the Internet backbone.
What is PRISM NSA Surveillance
9. Goal Behind PRISM
Having profile of each person on earth who is connected via any devices to network. It contains
information about each person like:
• Name, Address and Office address
• How many bank accounts he owns and how much money he has in each of bank account.
• What kind of job he does, researcher? Developer? Politician? etc.
• His family and relation among other people.
• His photo, his family photos
• What does he speak more often? What is the content of his talks?
• Whom he speaks to more often?
• Where do you travel?
10. Goal Behind PRISM
• A record of most calls made in the U.S
• Email, Facebook posts and instant message
• Massive amounts of raw Internet traffic
• The contents of an unknown number of phone calls
12. Think, if CCTV surveillance cameras are fitted in your all house. And
the recorded data stored and watch to another unknown place.
Then how you feel? Safe or Unsafe?
Are you feel secured ?
or you feel privacy lost ?
Why its an Issue
15. Affects of NSA on our Privacy
NSA are continuously collect and analysis our data
NSA Collectects & Maintain following types of data
Our habits, where we travel, about our family
NSA can collect passwords of every online accounts
Our business details , sales details, targets etc
Call records,
The NSA monitors financial transactions.
The NSA intercepts troves of personal webcam video from innocent people.
Etc and more
17. Tools
We need so tools and methods
Use proxy servers for confidential works
Use strong key AIS 256 bit for cloud data
Use Proxy Changer before surf on internet
Big organization can use VPN Services for protect there Networks
Corporate world can use disposal email for confidential email
Bypassing PRISM
18. Bypassing PRISM - tools
Tools
Tor browser
Proxy server in Japan
Proxy server in Israel
Proxy server in Russia
Proxy server in Africa
Proxy server in India
Proxy server in Africa
Encrypted browsing on internet
19. Bypassing PRISM - tools
DoNot Track browser plug-in
Prohibit internet companies to track you
Protect online traction tracking
cookies destructor browser plug-in
Best antivirus & anti malware
20. Use Private Search engine like
Duduckgo.com
Duduckgo never try to track you
Bypassing PRISM - tools
21. Use Private Cloud Storage like
Spideroak
Sperderoak never compromise our data
Can only access by authorized device
Bypassing PRISM - tools
256 bit Encrypted
22. Use only BBM
Blackberry Massinger
Protected with Triple DES
3 Data Encryption Standards
Never Compromise with NSA
Bypassing PRISM - tools
23. Outcome of this presentation
For Business
Aware what Prism NSA surveillance spying
Available tools to bypass NSA surveillance
Protect confidential data by watching spy Agencies
Now businessman are confidant doing work on internet
For Private & Family
Importance of our online privacy
Methods how to leave secure and private on internet