WikiLeaks Spy files

seeders: 0
leechers: 1
Added on July 22, 2015 by Cryptomein Books
Torrent verified.



WikiLeaks Spy files (Size: 1.5 GB)
 metadata.csv94.58 KB
 list.7z32.91 KB
 docs.7z362.23 KB
 metadata.xml270.01 KB
 index.html43.34 KB
 291_GAMMA-201110-FinSpy_Mobile.pdf247.03 KB
 290_GAMMA-201110-FinTraining.pdf46.26 KB
 28_200810-ISS-PRG-ETSI3.pdf458.21 KB
 292_GAMMA-201110-FinUSB_Suite.pdf470.68 KB
 296_GAMMA-201110-FinFly_Web.pdf1008.59 KB
 289_GAMMA-201110-FinSpy.pdf415.49 KB
 295_GAMMA-201110-FinFly_LAN.pdf283.18 KB
 294_GAMMA-201110-FinFly_USB.pdf152.14 KB
 293_GAMMA-201110-FinFireWire.pdf186.09 KB
 283_FOXIT-FoxReplay-WS-Protection.pdf253.5 KB
 297_GAMMA-201110-FinFly_ISP.pdf298.27 KB
 282_FOXIT-FoxReplay-Personal-WS.pdf270.68 KB
 281_FOXIT-FoxReplay-Covert.pdf370.24 KB
 284_VASTECH-ZEBRA1.pdf13.07 MB
 285_VASTECH-ZEBRA2.pdf12.27 MB
 287_HACKINGTEAM-RCS.mp424.55 MB
 286_HP-INVESTIGATION-SOLUTIONS-2011.pdf1.6 MB
 288_GAMMA-201110-FinIntrusion_Kit.pdf242.76 KB
 301_GAMMA-201110-FinSpy.mp46.59 MB
 308_GAMMA-201110-FinFly_Web.mp49.11 MB
 307_GAMMA-201110-FinFly_LAN.mp412.08 MB
 306_GAMMA-201110-FinFly_USB.mp425.47 MB
 309_GAMMA-201110-FinFly_ISP.mp443.04 MB
 30_200810-ISS-PRG-GROUP2000.pdf1.34 MB
 32_200810-ISS-PRG-NETI.pdf313.96 KB
 31_200810-ISS-PRG-HACKINGTEAM.pdf2.2 MB
 310_ELAMAN-IT_INTRUSION_FINFISHER_INTRODUCTION_V02-08.pdf1.51 MB
 305_GAMMA-201110-FinFireWire.mp48.57 MB
 304_GAMMA-201110-FinUSB_Suite.mp410.54 MB
 2_200702-ISS-DXB-ATIS1.pdf20.85 MB
 17.html1.64 KB
 17_big.webm19.58 MB
 17_big.ogg22.06 MB
 17.jpg34.51 KB
 17_big.mp421.92 MB


Description

International surveillance companies are based in the more technologically sophisticated countries, and they sell their technology on to every country of the world. This industry is, in practice, unregulated. Intelligence agencies, military forces and police authorities are able to silently, and on mass, and secretly intercept calls and take over computers without the help or knowledge of the telecommunication providers. Users’ physical location can be tracked if they are carrying a mobile phone, even if it is only on stand by.

Selling Surveillance to Dictators

When citizens overthrew the dictatorships in Egypt and Libya this year, they uncovered listening rooms where devices from Gamma corporation of the UK, Amesys of France, VASTech of South Africa and ZTE Corp of China monitored their every move online and on the phone.

Surveillance companies like SS8 in the U.S., Hacking Team in Italy and Vupen in France manufacture viruses (Trojans) that hijack individual computers and phones (including iPhones, Blackberries and Androids), take over the device, record its every use, movement, and even the sights and sounds of the room it is in. Other companies like Phoenexia in the Czech Republic collaborate with the military to create speech analysis tools. They identify individuals by gender, age and stress levels and track them based on ‘voiceprints’. Blue Coat in the U.S. and Ipoque in Germany sell tools to governments in countries like China and Iran to prevent dissidents from organizing online.

Trovicor, previously a subsidiary of Nokia Siemens Networks, supplied the Bahraini government with interception technologies that tracked human rights activist Abdul Ghani Al Khanjar. He was shown details of personal mobile phone conversations from before he was interrogated and beaten in the winter of 2010-2011.

How Mass Surveillance Contractors Share Your Data with the State

In January 2011, the National Security Agency broke ground on a $1.5 billion facility in the Utah desert that is designed to store terabytes of domestic and foreign intelligence data forever and process it for years to come.

Telecommunication companies are forthcoming when it comes to disclosing client information to the authorities - no matter the country. Headlines during August’s unrest in the UK exposed how Research in Motion (RIM), makers of the Blackberry, offered to help the government identify their clients. RIM has been in similar negotiations to share BlackBerry Messenger data with the governments of India, Lebanon, Saudi Arabia, and the United Arab Emirates.
Weaponizing Data Kills Innocent People

There are commercial firms that now sell special software that analyze this data and turn it into powerful tools that can be used by military and intelligence agencies.

For example, in military bases across the U.S., Air Force pilots use a video link and joystick to fly Predator drones to conduct surveillance over the Middle East and Central Asia. This data is available to Central Intelligence Agency officials who use it to fire Hellfire missiles on targets.

The CIA officials have bought software that allows them to match phone signals and voice prints instantly and pinpoint the specific identity and location of individuals. Intelligence Integration Systems, Inc., based in Massachusetts - sells a “location-based analytics” software called Geospatial Toolkit for this purpose. Another Massachusetts company named Netezza, which bought a copy of the software, allegedly reverse engineered the code and sold a hacked version to the Central Intelligence Agency for use in remotely piloted drone aircraft.

IISI, which says that the software could be wrong by a distance of up to 40 feet, sued Netezza to prevent the use of this software. Company founder Rich Zimmerman stated in court that his “reaction was one of stun, amazement that they (CIA) want to kill people with my software that doesn’t work."

Related Torrents

torrent name size seed leech

Sharing Widget


Download torrent
1.5 GB
seeders:0
leechers:1
WikiLeaks Spy files