Wikileaks - The Spy Files # Civil Liberties in the Digital World

Wikileaks - The Spy Files

Sunday 17 June 2012 > français

The war of the future will not be played on the field.

Terrorists organize themselves through the cyberspace Entire states can fall if their communication system are violated. In such scenario the principal weapon is intelligence Defence against such attack is crucial. But offensive capabilities are required too. The winner will be who knows the antagonist’s move a second ahead. Information gathering is the key to succeed.

Enter remote control system. A stealth for attacking, infecting and monitoring computers and smartphones. Full intelligence on target users even for encrypted communications (Skype, PGP, Secure Web Mail, etc,...)

How does it work.

1 - Step : infection of the system. Can be installed remotely. Computers can be infected through several vectors. Can be installed locally : Bootable CD-ROM, USB Pendrive, Direct HD infection tampering with computer case

2 - Step : invisibility of the system. Cannot be detected by any computer user. Existing files are not modified. No new files appear on the computer. No new processes are executed. No new network connections are estabishled. Cannot be detected by Antivirus, Antimalware, Anti-keyloggers.

3 - Step : Monitoring and logging. Connections to websites. Send and received e-mail messages. Written documents. Keystrokes, including passwords for accessing sensitive / classified information. Printed documents. Encrypted VOIP traffic, such as Skype conversation. Chat, instant messaging. Remote audio spy,...

Tor hidden-service - Onion.IRC #CgAn - Free speech servers

Anonymous Server

Tor

Socks5

Hostname

Port

SSL

CyberGuerrilla 9050 epynixtbonxn4odv34z4eqnlamnpuwfz6uwmsamcqd62si7cbix5hqad.onion 6697
NordVPN, shield your browsing from hackers and surveillance.

Protect all your devices.

3-Year Plan | Discount -70%
NordVPN, shield your browsing from hackers and surveillance.

Protect all your devices.

3-Year Plan | Discount -70%
Security Alert: Sextortion is on the rise

Security Alert: Sextortion is on the rise

Security Alert: Lucrative Scam of Sextortion Is on the Rise. January 21, 2019. The latest report from cybersecurity company Symantec shows that extortion scams are on the (...)


Why the NordVPN network is safe

Why the NordVPN network is safe

Why the NordVPN network is safe after a third-party provider breach. Information has recently surfaced about a NordVPN breach caused by vulnerabilities in a third-party (...)


Riseup - Radical tech collective

Riseup - Radical tech collective

Support the friendly, radical, tech collective that supports you. This email is the first of several in Riseup’s fall fundraising drive, where every donation carries other (...)


Tails - donation campaign for 2019

Tails - donation campaign for 2019

Tails-news: donation campaign for 2019 begins today. Every day, Tails helps thousands of people to safely use their computers online and offline. Tails is available for (...)


WikiLeaks

Submit documents to WikiLeaks

WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed.


Tails
Tails is an irreplaceable security tool as it allows anyone to use computers safely

Tor Browser
Tor Browser
Tor protects your privacy

NordVPN
Protect all your devices.
3-Year Plan | Discount -70%

Anonymous T-Shirts
Anonymous T-Shirts