Wikileaks - The Spy Files

Wikileaks - The Spy Files

Sunday 17 June 2012 > français

The war of the future will not be played on the field.

Terrorists organize themselves through the cyberspace Entire states can fall if their communication system are violated. In such scenario the principal weapon is intelligence Defence against such attack is crucial. But offensive capabilities are required too. The winner will be who knows the antagonist’s move a second ahead. Information gathering is the key to succeed.

Enter remote control system. A stealth for attacking, infecting and monitoring computers and smartphones. Full intelligence on target users even for encrypted communications (Skype, PGP, Secure Web Mail, etc,...)

How does it work.

1 - Step : infection of the system. Can be installed remotely. Computers can be infected through several vectors. Can be installed locally : Bootable CD-ROM, USB Pendrive, Direct HD infection tampering with computer case

2 - Step : invisibility of the system. Cannot be detected by any computer user. Existing files are not modified. No new files appear on the computer. No new processes are executed. No new network connections are estabishled. Cannot be detected by Antivirus, Antimalware, Anti-keyloggers.

3 - Step : Monitoring and logging. Connections to websites. Send and received e-mail messages. Written documents. Keystrokes, including passwords for accessing sensitive / classified information. Printed documents. Encrypted VOIP traffic, such as Skype conversation. Chat, instant messaging. Remote audio spy,...

Tor Guide - Freedom & Privacy Online

Tor Powering Digital Resistance. “The Onion Router” protects your privacy. Tor is an invaluable tool for protecting online freedom and guarding against state surveillance and censorship (...)

Tor Project
Anonymous Public DNS

Anonymous Public DNS

A message from Anonymous and RedHack Turkey. Anonymous Public DNS with OpenNIC: Are you looking for an alternative DNS provider that is open (...)


Mastodon social network

Mastodon social network

Mastodon is a free, open-source social network. Mastodon, a distributed, open-source version of Twitter, is almost identical to the platform (...)


Riseup - Online communication tools

Riseup - Online communication tools

Dear Riseup Users, The internet can be a cold and hard place full of nasty people, surveillance, and data mining. Last summer, Riseup was in a (...)


A secret British spy unit has waged war on the hacktivists

A secret British spy unit has waged war on the hacktivists

34c3 - Ethics, Society & Politics - Chaos Computer Club.Uncovering British spies’ web of sockpuppet social media personas. A secret British (...)


Croix Rouge

We stand with Ukraine

The Russian government’s attack on Ukraine has put millions of innocent lives in danger. We stand with Ukraine to support their freedom and to defend democracy. If you wish to support Ukraine and its people in their time of need, please consider donating to the Red Cross.


/e/ Foundation
eFoundation is a non-profit organization leading the development of Open Source mobile operating systems that respect users’ data privacy.

Tor Browser
Tor Browser
Tor protects your privacy

NordVPN
Protect all your devices.
2-Year Plan | Discount -72%