Wikileaks - The Spy Files # Civil Liberties in the Digital World

Wikileaks - The Spy Files

Sunday 17 June 2012 Traduction français

The war of the future will not be played on the field.

Terrorists organize themselves through the cyberspace Entire states can fall if their communication system are violated. In such scenario the principal weapon is intelligence Defence against such attack is crucial. But offensive capabilities are required too. The winner will be who knows the antagonist’s move a second ahead. Information gathering is the key to succeed.

Enter remote control system. A stealth for attacking, infecting and monitoring computers and smartphones. Full intelligence on target users even for encrypted communications (Skype, PGP, Secure Web Mail, etc,...)

How does it work.

1 - Step : infection of the system. Can be installed remotely. Computers can be infected through several vectors. Can be installed locally : Bootable CD-ROM, USB Pendrive, Direct HD infection tampering with computer case

2 - Step : invisibility of the system. Cannot be detected by any computer user. Existing files are not modified. No new files appear on the computer. No new processes are executed. No new network connections are estabishled. Cannot be detected by Antivirus, Antimalware, Anti-keyloggers.

3 - Step : Monitoring and logging. Connections to websites. Send and received e-mail messages. Written documents. Keystrokes, including passwords for accessing sensitive / classified information. Printed documents. Encrypted VOIP traffic, such as Skype conversation. Chat, instant messaging. Remote audio spy,...

Tor hidden-service - Onion.IRC #CgAn - Free speech servers

Anonymous Server






CyberGuerrilla 9050 6dvj6v5imhny3anf.onion 6697

Tor protects your privacy

Tor Browser is an easy-to-use, portable package of Tor. By downloading and using Tor, you can protect the people who need anonymity, like activists, journalists and bloggers...

Tor Project

Lauri Love - Trial At Home with Naomi Colvin

This is an urgent call : Lauri Love’s appeal is in two weeks’ time and we need your help. The US government is seeking to extradite British citizen Lauri Love to face what many (...)

KPFA Radio - Freedom in Catalonia

Guest: Liz Castro is an expert on the Catalan independence movement. Major protest in Catalonia: Live report back from the ground, from inside the Free Catalonia Movement. (...)

CyberGuerrilla - Cgan-Lessons listings

Mission Statement: This article has essential information for anyone associated with interest in pen-testing, security, hacking, Social Engineering or other tech topics. We (...)

Secure your Internet Connection.

PureVPN creates a secure, encrypted tunnel to hide your real IP address and location, and makes it impossible for third-party websites and ISPs to monitor your online activities.

Heroes for the people, enemies for the state...

Jeremy Hammond
Matt DeHart
Martin Gottesfeld
Barrett Brown
Higinio Ochoa III
Ryan Ackroyd
Jake Davis
Christopher Weatherhead
Jon Cowden
John Anthony Borell III
Raynaldo Rivera
Fidel Salinas

Jeremy Hammond, Martin Gottesfeld and Matt DeHart, some of our bravest heroes and activists are now in jail and they need your help...


Submit documents to WikiLeaks

WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed.

Anonymous t-shirt

T-Shirt and Hooded Jacket
T-Shirt and Hooded Jacket
Guy Fawkes
We accept donations in Bitcoin
Tails is an irreplaceable security tool as it allows anyone to use computers safely
You need PureVPN for Online Security
Virtual Private Network