Wikileaks - The Spy Files

Wikileaks - The Spy Files

Sunday 17 June 2012 > français

The war of the future will not be played on the field.

Terrorists organize themselves through the cyberspace Entire states can fall if their communication system are violated. In such scenario the principal weapon is intelligence Defence against such attack is crucial. But offensive capabilities are required too. The winner will be who knows the antagonist’s move a second ahead. Information gathering is the key to succeed.

Enter remote control system. A stealth for attacking, infecting and monitoring computers and smartphones. Full intelligence on target users even for encrypted communications (Skype, PGP, Secure Web Mail, etc,...)

How does it work.

1 - Step : infection of the system. Can be installed remotely. Computers can be infected through several vectors. Can be installed locally : Bootable CD-ROM, USB Pendrive, Direct HD infection tampering with computer case

2 - Step : invisibility of the system. Cannot be detected by any computer user. Existing files are not modified. No new files appear on the computer. No new processes are executed. No new network connections are estabishled. Cannot be detected by Antivirus, Antimalware, Anti-keyloggers.

3 - Step : Monitoring and logging. Connections to websites. Send and received e-mail messages. Written documents. Keystrokes, including passwords for accessing sensitive / classified information. Printed documents. Encrypted VOIP traffic, such as Skype conversation. Chat, instant messaging. Remote audio spy,...


Anonymous Shop

One-of-a-Kind Products. Unique designs on trendy gear you simply can’t get anywhere else. Powered by Pros. Spreadshirt prints and ships your order fast and on-demand.

NordVPN, shield your browsing from hackers and surveillance.

Protect all your devices.

2-Year Plan | Discount -72%
Anonymous Shop

One-of-a-Kind Products. Unique designs on trendy gear you simply can’t get anywhere else. Powered by Pros. Spreadshirt prints and ships your order fast and on-demand.

NordVPN, shield your browsing from hackers and surveillance.

Protect all your devices.

2-Year Plan | Discount -72%
Tails - donation campaign for 2019

Tails - donation campaign for 2019

Tails-news: donation campaign for 2019 begins today. Every day, Tails helps thousands of people to safely use their computers online and (...)


Alert - Riseup financial update

Alert - Riseup financial update

Riseup financial update - The news is not good. Riseup provides online communication tools for people and groups working on liberatory social (...)


Mastodon social network

Mastodon social network

Mastodon is a free, open-source social network. Mastodon, a distributed, open-source version of Twitter, is almost identical to the platform (...)


Why the NordVPN network is safe

Why the NordVPN network is safe

Why the NordVPN network is safe after a third-party provider breach. Information has recently surfaced about a NordVPN breach caused by (...)


Stop Censorship Machine

Stop Censorship Machine

EU copyright threatens our freedoms #SavetheMeme. Xnet launches video campaign “Stop #CensorshipMachine” to defend our rights and freedom of (...)


Anonymous Public DNS

Anonymous Public DNS

A message from Anonymous and RedHack Turkey. Anonymous Public DNS with OpenNIC: Are you looking for an alternative DNS provider that is open (...)


WikiLeaks

Submit documents to WikiLeaks

WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed.


/e/ Foundation
eFoundation is a non-profit organization leading the development of Open Source mobile operating systems that respect users’ data privacy.

Tor Browser
Tor Browser
Tor protects your privacy

NordVPN
Protect all your devices.
2-Year Plan | Discount -72%