Wikileaks - The Spy Files # Civil Liberties in the Digital World

Wikileaks - The Spy Files

Sunday 17 June 2012 > français

The war of the future will not be played on the field.

Terrorists organize themselves through the cyberspace Entire states can fall if their communication system are violated. In such scenario the principal weapon is intelligence Defence against such attack is crucial. But offensive capabilities are required too. The winner will be who knows the antagonist’s move a second ahead. Information gathering is the key to succeed.

Enter remote control system. A stealth for attacking, infecting and monitoring computers and smartphones. Full intelligence on target users even for encrypted communications (Skype, PGP, Secure Web Mail, etc,...)

How does it work.

1 - Step : infection of the system. Can be installed remotely. Computers can be infected through several vectors. Can be installed locally : Bootable CD-ROM, USB Pendrive, Direct HD infection tampering with computer case

2 - Step : invisibility of the system. Cannot be detected by any computer user. Existing files are not modified. No new files appear on the computer. No new processes are executed. No new network connections are estabishled. Cannot be detected by Antivirus, Antimalware, Anti-keyloggers.

3 - Step : Monitoring and logging. Connections to websites. Send and received e-mail messages. Written documents. Keystrokes, including passwords for accessing sensitive / classified information. Printed documents. Encrypted VOIP traffic, such as Skype conversation. Chat, instant messaging. Remote audio spy,...

Tor hidden-service - Onion.IRC #CgAn - Free speech servers

Anonymous Server






CyberGuerrilla 9050 6dvj6v5imhny3anf.onion 6697

Tor Guide - Freedom & Privacy Online

Tor Powering Digital Resistance. “The Onion Router” protects your privacy. Tor is an invaluable tool for protecting online freedom and guarding against state surveillance and censorship (...)

Tor Project

NordVPN is an excellent VPN for online privacy

Warning – Numerous VPN service providers assure not to keep users’ log files of their connections and it is generally false! Many VPN services that promise anonymity for (...)

eelo - mobile OS and associated web-services

eelo - mobile OS and associated web-services

Your data is YOUR data! eelo in short. eelo recognises the need shared by everyone for better data privacy. The eelo project will provide an alternative mobile operating (...)

A secret British spy unit has waged war on the hacktivists

34c3 - Ethics, Society & Politics - Chaos Computer Club.Uncovering British spies’ web of sockpuppet social media personas. A secret British spy unit created to mount cyber (...)

With Love and Hope, The Riseup Collective

With Love and Hope, The Riseup Collective

There is a war being fought over your communication. One side wants control, so they can profit from and watch everything you say and do online. They want to sell you stuff, (...)

Anonymous t-shirt

T-Shirt and Hooded Jacket
T-Shirt and Hooded Jacket
Guy Fawkes
We accept donations in Bitcoin
Tails is an irreplaceable security tool as it allows anyone to use computers safely
Virtual Private Network

Secure your Internet Connection.

Read more Close