Wikileaks has begun dumping a large number of files on the CIA's hacking tools. The dump is called Vault 7. It is a goldmine, not only for information about the CIA's activities, but also for information on things like how to set up a development environment or properly use Git in your everyday programming workflow. Here are a couple highlights from some cursory searches of the document dump:
CIA Git Tutorials
CIA Vim Tutorials
CIA Setting Up a Development Environment
Showing posts with label Wikileaks. Show all posts
Showing posts with label Wikileaks. Show all posts
How to Make Sense of the Wikileaks Clinton Campaign Email Document Dump and Controversy

NSA = Not So Adept: Hackers Loot Brash Stash Of NSA Exploits & Data
Who watches the watchers?
Apparently, now it’s…well, everybody with a computer. A massive hack against the NSA has revealed a
treasure trove of previously-private exploits and other data, and it doesn’t
make our “security agency” look very secure at all…
If the future won't let us have space-war, we'll have cyberspace-war. (Image courtesy techworm.com.) |
Eyes In The Sky That Pry Via Wifi: Malware-Injecting Drones Swoop In To Spy
WikiLeaks Publishes CIA Travel Tips: Nervous Travelers Beware

The leaked documents have been put online as part of the anti-secrecy organization’s ongoing “CIA Series,” which is planned to continue into the new year, according to a press release. The two CIA documents published yesterday provide insight on how the spy organization trains agents to navigate the heightened airport security protocols that we have all come to know and love over the last 15 years. The first provides an overview on how to survive the "secondary screening" process in general, while the second provides pointers on how to pass airport security specifically when infiltrating the European Union.
Anyone who's ever traveled at all is familiar with the primary screening process. (If you're not, consider watching this George Carlin bit for a quick overview.) You wait in a series of lines, provide your boarding pass and ID to the relevant official, proceed through the new-fangled Rapiscan nude scanners and so on. A subset of passengers are then taken aside for secondary screening either because of flags raised during the primary screening process, or because they have been selected for random secondary screening.
However, the CIA writes: "Travelers can minimize the possibility of secondary by knowing how to prepare for and navigate the primary inspection and by avoiding to the extent possible the various triggers for secondary." Among these triggers, the document lists: possession of contraband (including weapons, drugs and electronics), irregularities with official identification documents, suspicious behavior (nervousness, anxiety), baggage (with contents that are inconsistent with the passenger's appearance, profession, ticket class, stated reason for travel and so on), country of origin, suspicious past travel patterns, and so on. The agency also notes the following factoids:
- Inspectors focus on body language.
- Travelers can legally be held in secondary screening for hours.
- Officials may telephone travelers' contacts to verify their stories.
- Officials can access national and international databases on the internet.
- Officials can collect additional biographic data and biometrics.
- Officials can examine belongings.
- Officials can copy or confiscate a traveler's personal electronics.
Sink "Fin Fisher": Wikileaks Combats Spy Platforms By Releasing Software To Public
It's no secret now that governments routinely spy on their citizens, for reasons ranging from interest in actual criminal activities to simply wanting to try to intercept naked selfies. However, now the team at Wikileaks has released the exact software used to spy on you, hoping that once it is more completely understood, it can be more effectively stopped.
As reported by engadget.com, Julian Assange and his colleagues have openly posted the FinSpy PC and Fin Fisher spy platforms in an effort to spur developers to update more thorough privacy measures against them. The Wikileaks team also hopes to make it more difficult for governments to abuse the technology to root out whom they consider undesirable. Australia, Italy, Pakistan and other nations have been proven to use the software against "dissidents" on their turf, regardless of what computer platform the suspicious party is running.
Although keylogging and webcam monitoring are among the elements of the revealed software, it is hoped that these will not be abused by the masses and if they are, that a quick antidote will be available soon. Now we know what weapons the powers-that-be have chosen, we can fight them more intelligently.
As reported by engadget.com, Julian Assange and his colleagues have openly posted the FinSpy PC and Fin Fisher spy platforms in an effort to spur developers to update more thorough privacy measures against them. The Wikileaks team also hopes to make it more difficult for governments to abuse the technology to root out whom they consider undesirable. Australia, Italy, Pakistan and other nations have been proven to use the software against "dissidents" on their turf, regardless of what computer platform the suspicious party is running.
Although keylogging and webcam monitoring are among the elements of the revealed software, it is hoped that these will not be abused by the masses and if they are, that a quick antidote will be available soon. Now we know what weapons the powers-that-be have chosen, we can fight them more intelligently.
Sometimes the surveillance state needs a faceful of e-mace. |
Subscribe to:
Posts (Atom)