Saturday, February 27, 2016

so, fingerprints access:

"For a fake fingertip, however, you need jelly stiff like gummi candy. I used a one-to-one mix of water and gelatine, weight for weight."


LET'S SIMPLIFLY:

Everybody knows the fingerprints cand be stolen out of androids and laptops....so, here the scheme would be glue the gelatine to the scanner, and then tape it to the fake finger


read at:
http://www.puttyworld.com/thinputdeffi.html

Friday, February 26, 2016

welcome back to war! Again, roberring! smile emoticon
look : " the device needs to have a motor with the magnets on the rotor. Most DC motors have the magnets on the stator and brushes to create an AC current through the coils on the rotor. The rotor does not have a magnetic field alone and thus the external ring magnet has nothing to influence.
A brushless DC motors with the coils on the stator needs special inverter circuitry to create an alternating magnetic field around the magnets on the rotor. I doubt many manufacturers would introduce more complexity and cost for no apparent reason.
In scenario 2, even if there is a coil in the circuit of the motor, you still need a closed circuit. The motor will be driven either by a diode-clamped power transistor, or a relay switch. When the transistor is saturated, it will not conduct current, hence the whole field of semiconductors. And obviously, if the relay is open, the circuit is open.
...use electromagnets, they can generate a far stronger magnetic field in the same size and weight (if the batteries are not included), and don't require drills to rotate them, because it is far easier to make the field rotate instead."

two questions: this does not activate the thremal sensor? and the relock internal alarm?

another question : do they have a software detector " ... an end switch that they monitor, and they power up the motor if the end switch contact is broken" ? ....probably not, because of energy blackouts right?

SABOTAGE : STEAL THE SAFE VAULT CODE BEHUND THE WALL

Ultracam Videoscope

PKI 8050Print
Often it is necessary to visually control a room before entering. There are many reasons, e.g. to check whether there are one or more persons in the room, which objects are in the room, etc. The PKI Ultracam Videoscope system is equipped with IR power diodes and can also be used at night when the room is totally dark without being recognized by present people. Just slide the very flat strip light of only 4 mm with integrated camera under the door and you can monitor the room due to its IR-light.

Specifications

  • Dimensions of strip light: 4.0 mm flat x 50 x 27 mm with integrated camera
  • Camera: CCD, 420 TV lines
  • Monitor recorder: 2,5″ TFT LCD display with integrated video recorder for 4,5 hours recording time
  • Power supply: Li-ion batteries, rechargeable, charger included
welcome back to war!!! so fuckin NATO in Kabul!!! they only control the airport, all the rest is bullshit! so, eveybody thinks irst on the command tower!!! how many ties there wre already? how many IED's??? Let's see then: 

1. bypassing airplane tracks
2. changing electonics cicuits at the control lights
3 triggering alarms, so the army gets close to targets traps
4. chemical meltdown of tracks spots
5 spent fuel fuel sabotage with aerosols , the aerosol liquids is a specie of glue that with the spent fuel on the tracks destroys take offs
7 concerts industrial torch to unable visibility

And now there’s a powerful offering that beams white light so strong that it can fry an egg and start a small fire.
The Flashtorch is rugged enough for a trip with Bear Grylls as it is made from military-grade anodised aluminium and its creators claim it can survive in the harshest of environments.

Light fantastic! This powerful torch beams white light so strong that it can fry an egg and start a small fire.The light is 20,000 times more powerful than a standard torch
Light fantastic! This powerful torch beams white light so strong that it can fry an egg and start a small fire.The light is 20,000 times more powerful than a standard torch


Read more: http://www.dailymail.co.uk/sciencetech/article-2640462/The-torch-bright-FRY-AN-EGG-Flashtorch-beams-white-light-20-000-times-powerful-standard-light.html#ixzz41JSBR7Bp
Follow us: @MailOnline on Twitter | DailyMail on Facebook

Wednesday, February 24, 2016

INVISIBLE TO RADAR

....to test the invisibility idea by making sheets of the material. Each sheet consists of arrays of tiny copper cubes—individually about 4 millimeters on each side—all connected together by thin, square-shaped copper rods. The copper array was sandwiched between two polysulfone covers that act as a dielectric material coating, creating a solid slab of material. Each slab was about the size of a sheet of paper.

shield of spaceship :
http://www.alibaba.com/product-detail/100-Virgin-PSU-Sheet-with-Good_1949417545.html?spm=a2700.7724838.38.1.BCgVIe

Tuesday, February 23, 2016

How to Deploy a Keylogger from a USB Flash Drive Quickly

This guide will explain how to configure a USB Flash Drive / Memory Stick so that you can run a keylogger within just a few seconds of plugging it in any computer.
It is important to note that in some countries, including the U.S., covertly intercepting electronic information is against the law. This guide is therefore intended to instruct you on how to use a keylogger on your own computer.

Step 1: You Will Need...

For this guide you will need a few things first:
  • A cheap memory stick / USB flash drive (any capacity)
  • Shadow Keylogger (free) which you can download free from here
  • The computer you want to record (i.e, your own)

Step 2: A Few More Things Before We Start...

You will also need to ensure that the computer you want to record:
  • Is running some version of Windows (this will not work on Mac or Linux)
  • Has the .NET Framework 2.0 or later (almost all do, but if not you candownload free from here)

Step 3: Download Shadow Keylogger

We will need to set things up on the USB Flash Drive first, so on anothercomputer, plug in your Flash Drive and open it through 'My Computer' or it may pop up a small window automatically. Leave this window open.
Now, download the keylogger from this link. This will download a .ZIP folder, which you will need to open. Inside the folder there will be a file called 'sk.exe', this is the keylogger program.
Click on the program and drag it across into your USB Flash Drive. Once it has been copied, you can close the .ZIP folder.

Step 4: Create an Automatic Setup File

Although the program will run fine at the moment, when you open Shadow Keylogger, you will have to create a password in order to start recording. However, this will take a little bit of time, which you may not have. So Shadow Keylogger has a clever feature where you can tell it to run automatically with a few pre-defined settings. For a full guide on how to create one of these files, you can watch our YouTube video.
In this guide, I will show you how you can configure it to start recording automatically. Open Notepad, or any other half-decent text editor, thencopy this block of XML and paste it into your document:


password123
1
Automatic

1
0


0


I have highlighted the password bit above, since this is where you enter your own password. You will need to remember the password you chose, because after you have finished recording, you need to type it on the keyboard to see all of the recorded keystrokes.
For this guide, you don't need to change any of the other values.
Lastly, click 'Save As' and navigate to the USB Flash Drive and make sure it is in exactly the same folder as the program (sk.exe). Save the file as'config.xml' (without the quotation marks) and make sure the dropdown menu is changed to 'All Files', and not 'Text files'. Then hit 'Save'!

Step 5: Now Try It!

You're done! Now, just pull the USB Flash Drive out of your computer. Approach the target computer, plug the USB Flash Drive in any available port.
On some computers, it may open the drive folder automatically, on others it may have a small prompt box, where you need to click on the 'Open Files and Folders' option. In a handful of cases, you may even need to open 'My Computer'.
When the drive folder opens, just double-click on the 'sk.exe', or click it and hit enter.
Shadow Keylogger will open immediately, realise you've already given it a password, and just start recording automatically.
You can then immediately pull out your USB Flash Drive from the computer. The folder will close automatically, and you can walk away.
Return later (for this particular setup, it has to be before the user shuts the computer down) and simply type your password onto the keyboard, it doesn't matter where.
The results window will then appear with all of the recorded keystrokes.

http://cons.wonderhowto.com/how-to/deploy-keylogger-from-usb-flash-drive-quickly-0140972/

Good evening! Nice hour to work !!! Please ATTENTION



The Door 
1. Combination dial (0-99) 
2. Keyed lock 
3. Seismic sensor (built-in) 
4. Locked steel grate
5. Magnetic sensor
6. External security camera
The Vault
7. Keypad for disarming sensors
8. Light sensor
9. Internal security camera
10. Heat/motion sensor (approximate location)


 Approached it slowly from behind a large, homemade polyester shield. The low thermal conductivity of the polyester blocked his body heat from reaching the sensor (...) placed the shield directly in front of the detector, preventing it from sensing anything.

covered the security cameras with black plastic bags and flipped on the lights




used this custom-made slab of aluminum to reposition the magnetic field away from the vault door.


women's hair spray to temporarily disable the vault's combined heat/motion sensor.
(body... projecting heat into the vault—the hair spray on the infrared sensor won't last)

bypassed the vault security system's main inbound and outbound wires and then covered this light sensor with tape, rendering it useless



used a tool to strip the plastic coating off the wires. (...) One slip could cut through, instantly breaking the circuit and tripping the alarm.

Once the copper wires were exposed,,,, clipped a new, precut piece of wire between the inbound and outbound cables. This bridge rerouted the incoming electric pulse over to the outbound wire before the signal reached the sensors

 blinded the heat/motion detector with a Styrofoam box, covered the light detector with tape

unloaded a homemade, hand-cranked drill and fitted it with a thin shaft of metal. ...jammed the shaft into one of the locks and cranked for about three minutes—until the lock broke, snapping open the box.

ATTENTION turned off the lights—DO NOT want to trigger the light detector in the vault when the door opened....turned the key and spun a four-pronged handle


safe manufacturers ... that their precious key could be copied ???????????????
NOW guys!!!!!! the vault combination !!!!! FORGET IT!!!! use very hot water (HOT HOT BURNING)  to fuck the lock!!!!

Sunday, February 21, 2016

Anonymizing your attacks with Tor and Proxychains Are you using some anomyzer?

think you could split your network and lets say half that packet goes through china and the other half goes through Finland and then come together again as the same packet.
What you could do is have the network traffic go from US to China to Finland to destination. The traffic itself would be encrypted and would only become unencrypted once it reaches the destination.
Maybe not even split the packet, just split groups of packets.


If you use a proxy that is not on port 80 or 443, it may work



http://www.behindthefirewalls.com/2013/06/anonymizing-your-attacks-with-tor-and.html

roxychains ng (new generation) - a preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies. continuation of the unmaintained proxychains project

https://github.com/rofl0r/proxychains-ng
Achieve a 100% Vapor Barrier with polyethylene coated radiant barrier from Ecofoil. ... later as a top secret material for insulating military radar used in airplanes....

http://www.ecofoil.com/Applications/Polyethylene-Vapor-Barrier
  so its like reaching 15 miles nautics from shore and then the drone does the rest

PETN Synthesis

HOW TO MAKE C4

INGREDIENTS:

12 oz. spackling putty or 20 packs of Silly Putty

1 container Petroleum Jelly (Vasaline)

Candle Wax

12 Oz. Isopropol (rubbing) alcohol

A heat source (hot plate, stove, etc.)

A hydrometer or battery hydrometer

A large Pyrex, or enameled steel container

6 inch length of polyester yarn

Flour or Corn Starch

24 Oz. cooking oil (Canola Oil works best)

1 package wire pipe cleaners

2 packages (2.8 Oz) clear gelatin

Place four cups of tap water in your Pyrex container, and begin heating it until it boils. Add the gelatin, and mix thoroughly. Remove from heat, and allow it to cool completely, then add 4 Oz. of cooking oil, and stir. You should notice a thin layer of solids beginning to form near the top. Scrape off the solids, and place them in a small container. Place them in the freezer.

Next, light your candle, allowing the melted wax to accumulate. In your bowl, mix the petroleum jelly, cooking oil, putty, and corn starch until well blended. Test the mixture with the hydrometer. You should get a reading of 17. If you do not get this reading, keep mixing.

Now remove the chilled mixture from the freezer. BE CAREFUL. The mixture is highly unstable at this point. Add it to the compound in the bowl - the blend should have the consistency of ice cream. Stir in the mixture VERY CAREFULLY.

Now, take approximately 1/3 of your compound, and form it into a ball shape. Often you will see C4 molded into a square, but a sphere-type charge guarantees the highest detonation velocity. You should mold the shape to a density of 1.3 grams in a cube. Dip the ball into the candle wax to seal the compound from moisture. Form a second ball, slightly smaller than the first, and also dip it into the wax. Stack this ball on top of the first. Finally, make a third ball, smaller than the first two, and stack it on top. This three-tiered formation will cause a cascading detonation effect that is absolutely devastating.



You will need your pipe cleaners now. You will insert them into each side of the middle ball - this is where your detonator will attach to the device. There will be three hookups for each side, so you must twist together three pipe cleaners so that they branch out (see Illustration).



Insert the pipe cleaners on opposite sides of the 3-tiered shape. Next you will need your yarn. Tie the yarn around the compound, at the joint between the top second and third sections. Tie it loosely, and let the remaining yarn hang down in front of the charge. This will form a secondary fuse, should it become necessary.

Now, to mark your bomb. This is extremely important. You will need to identify your device according to the internatinal munitions protocol. The first marking will be two black dots near the top of the charge, on the top sphere (use a fine-point black magic marker for this). These dots should be horizontal, about one inch apart. This signifies that it is a class 2 explosive (meaning it’s homemade). Below these dots, place a single third dot. This means it is a class 1 hazardous material (meaning the most dangerous). Then, below this formation line up five dots close together - that will indicate that this is Composition 4. REMEMBER: IT IS ILLEGAL TO MAKE YOUR OWN EXPLOSIVES IF YOU DO NOT MARK THEM PROPERLY.

The finished product is below. As I stated before, it is dangerous to store this material in a closed area. The ideal storage medium is out in the open, preferably on a coffee table, where you can keep a close eye on it. You will probably want to leave it there during the winter and holiday months, but it is wise to dispose of it during spring and summer, when the chemicals become the most volatile. 

Friday, February 19, 2016

 Agent Staining is a technique that
involves writing a unique marker (or stain)
onto a target machine. Each stain is
visible in passively collected SIGINT
and is stamped into every packet, which
enables all the events from that stained
machine to be brought back together to
recreate a browsing session.”
  
http://cryptome.org/2013/10/gchq-mullenize.pdf
  
http://s3.documentcloud.org/documents/801762/mullenize-28redacted-29.pdf
  
¤ Packet Staining ::
  
http://prezi.com/p5et9yawg2c6/ip-packet-staining/
http://tools.ietf.org/html/draft-macaulay-6man-packet-stain-00
http://tools.ietf.org/html/draft-macaulay-6man-packet-stain-01
http://cryptome.org/2013/10/packet-stain/packet-staining.htm
  
¤ NSA Peeling Back the Layers of Tor ::
  
http://cryptome.org/2013/10/nsa-egotisticalgiraffe.pdf
http://www.theguardian.com/world/interactive/2013/oct/04/egotistical-giraffe-nsa-tor-document
http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity
http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption
  
¤ NSA ; Tor Source Code Vulnerabilities ::
  
 “We have seen several targets using Tor.
Our goal was to analyze Tor source code
and determine any vulnerabilities in
the system. We set up an internal Tor
network to analyze Tor traffic, in the
hopes of discovering ways to passively
identify it. We also worked to create
a custom Tor client which allows the
user finer control.” ... ...
  
 “This accomplishes several things.
Most basically, the Tor servers, many
of which are listed on publicly advertised
directory servers, are chosen to act as
a series of proxies. This may seem to
be excessively complex, as a single
proxy server can be used to hide one’s
location, but a single-hop proxy is
vulnerable in two ways. First, by
analyzing the pattern of the traffic
going to and from the proxy server,
it is possible to deduce which clients
are making which requests. Second, if
an attacker owns the proxy server, then
it certainly knows who is asking for what,
and anonymization is ruined. By using
multiple hops, Tor is much more resistant
to both of these attacks. Traffic analysis
becomes extraordinarily difficult, as it
must be coordinated across several machines,
and an attacker must own all the hops
along the circuit in order to trace
requests back to the originating client.”
  
... ...
  
 “In our time in the lab, we found that
running an nmap on a node that is offering
a hidden service will turn up the port
that the hidden service is using to deal
with incoming connections. It can then be
directly connected to, outside of Tor.”
  
... ...
  
 “We would have to try to connect to
each of the ports we see open on a
machine to determine if there is a
hidden service being run. We would not
even know which protocol the hidden
service is running. It may be an HTTP
server, an FTP server, an SMTP server,
etc. The only thing we know is that
the protocol must run over TCP. It is
not enough to attempt to connect once
to each port, using an HTTP GET request.
Several protocols must be tried.”
  
... ...
  
 “It may also be useful to study Tor
directory servers in more detail. Our
work focused solely on the client, but
many attacks would be much easier with
access to more Tor servers. The directory
servers ultimately control which Tor
servers are used by clients. We have found
that a server can put itself on a directory
server multiple times; all it takes is the
server running several Tor processes, each
having a different nickname, open port,
fingerprint, and LOG FILE. This only
requires different configuration files
for the different processes, which are
easy to set up. That machine will handle
a disproportionate amount of traffic,
since it is listed several times. This
increases the density of friendly servers
in the cloud without increasing the number
of servers we have set up. Unfortunately,
each listing has the same IP address,
which would be very noticeable to anyone
who inspecting the directories.”
  
http://cryptome.org/2013/10/nsa-tor.pdf
http://s3.documentcloud.org/documents/802061/ces-summer-2006-tor-paper-28redacted-29-1.pdf
http://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html
  
¤ NSA ; Types of IAT ::
  
http://cryptome.org/2013/10/nsa-iat-tor.pdf
  
¤ NSA Link Removed by Guardian ::
  
http://cryptome.org/2013/10/nsa-link-removed.htm
  


The classified files – provided previously by NSA
whistleblower Edward Snowden – contain new details
about groundbreaking surveillance technology the
agency has developed to infect potentially millions
of computers worldwide with malware “implants.” The
clandestine initiative enables the NSA to break into
targeted computers and to siphon out data from foreign
Internet and phone networks.
  
https://prod01-cdn02.cdn.firstlook.org/wp-uploads/2014/03/nsa_malware_feature.jpg
https://prod01-cdn01.cdn.firstlook.org/wp-uploads/2014/03/turbine-large.jpg
https://prod01-cdn01.cdn.firstlook.org/wp-uploads/2014/03/tao-2-1024x768.png
https://s3.amazonaws.com/s3.documentcloud.org/documents/1076889/nsa-technology-directorate-analysis-of-converged.pdf
https://s3.amazonaws.com/s3.documentcloud.org/documents/1077724/industry-scale-exploitation.pdf
https://s3.amazonaws.com/s3.documentcloud.org/documents/1077721/thousands-of-implants.pdf
https://s3.amazonaws.com/s3.documentcloud.org/documents/1076859/nsa-phishing-tactics-and-man-in-the-middle-attacks.pdf
https://s3.amazonaws.com/s3.documentcloud.org/documents/1076891/there-is-more-than-one-way-to-quantum.pdf
https://s3.amazonaws.com/s3.documentcloud.org/documents/1076862/quantum-insert-diagrams.pdf

NSA TURBINE Automated Hacking Documents (Mirrored) ::
  
http://cryptome.org/2014/03/nsa-turbine-turmoil.pdf
http://cryptome.org/2014/03/nsa-industry-exploit.pdf
http://cryptome.org/2014/03/nsa-converged.pdf
http://cryptome.org/2014/03/nsa-quantum-insert.pdf
http://cryptome.org/2014/03/nsa-thousands-implants.pdf
http://cryptome.org/2014/03/nsa-gchq-quantumtheory.pdf
http://cryptome.org/2014/03/nsa-more-than-one-way.pdf
http://cryptome.org/2014/03/nsa-hammerchant.pdf
http://cryptome.org/2014/03/nsa-phishing-mtm.pdf
http://cryptome.org/2014/03/tao-quantuminsert-bonanza.htm

NSA Hacking Routers & Social Media (Misc) ::
  
http://cryptome.org/2014/03/nsa-5-eyes-hacking.pdf
http://cryptome.org/2014/03/nsa-menwith-xkeyscore.pdf
http://cryptome.org/2014/03/nsa-selector.pdf

GCHQ ROYAL CONCIERGE Diplomatic Hotel Spy ::
  
http://cryptome.org/2013/11/gchq-royal-concierge-de.pdf
  
http://cryptome.org/2013/11/gchq-royal-concierge.jpg
  
¤ GCHQ Monitors Diplomats Hotel Bookings ::
  
 Britain’s GCHQ intelligence service monitors
diplomats’ travels using a sophisticated
automated system that tracks hotel bookings.
Once a room has been identified, it opens
the door to a variety of spying options.
So the non radioactive detected constainer is made of :
Lead container with 5.7% antimony;
Paraffin wax charged with 23% barium chromate;
— Polyurethane foam;
— Borosilicate glass


on cargo : air condicioners mislead the gamma detectors

Thursday, February 18, 2016

no radioactive trace can be detected by thermal sensors satellites cargo cover with kilos of wax, on the north atlantic.
There is a vessel with traces of radiocative detected by thermal satellite, coming to Europe's West Coast, belonging to a danish transportation company, that stopped in Bermudas coming from Mexico, probably get payed on offshore, hack the ship software and unbalance the cargo, so it can be dropped on the water.
I got an operation: an Eclelon agent run away from southeast asia, went with an old passaport to south africa, there was hint on the old passaport detection system; He got if from a drug mule, that got it from someone looked like him in cape town, he insisted to get payed cash for the passport on BND, he's asking for political asylim in Tadijkstan staying inside an heavy guard army building; he's supposed to having someone passing intel; two options, get inside an killing him or payed Tadjisktan, probably don't want to loose him.

Wednesday, February 17, 2016

Do you know what is setting up a double agent? Someone sends an email to a journalist, or several emails, telling a story about an american organization fucking south america! but the story is fake, and has no possible damage . Now she goes to the editor and he stalls the publishing wiating for the newspaper admistration clear the story! then the editor is treathd by anonimouse calls! then her laptop disseapers! so the sender is not revealed. Then the local journalist woman , on american payroll,, releases the story, and then she is hired to investigate for the local government; and so, double agent set up!

Tuesday, February 16, 2016

Portuguese company DEFEX, using a host of fake companies in Austria and Holland ...; and suspected role in having financed and supplied the explosives used to blow up the Israeli Embassy in Buenos Aires in 1992
.... Just eight days after the assassination, the vehicle used in the embassy bombing was purchased in Buenos Aires by an individual with a Portuguese accent who signed documents with a last name different from the one on his identification. Three weeks later, the embassy was in ruins

Monday, February 15, 2016

depleted uranium dioxide from Portugal

concelho de Nelas, tomaram conhecimento da existência de um stock de urânio guardado nas instalações da antiga Empresa Nacional do Urânio (ENU). Este stock, de cerca de 200 toneladas de concentrado de urânio (também chamado “yellow cake”), é o que resta das 4370 toneladas produzidas durante 50 anos nas instalações da ENU junto da antiga mina da Urgeiriça.
A existência do stock de urânio, talvez desconhecido de muita gente, originou interrogações sobre a perigosidade do material armazenado, a vulnerabilidade do local e a possibilidade de grupos terroristas dele se apossarem para fabrico de bombas atómicas artesanais a usar em hipotéticos e devastadores atentados.


depleted” uranium dioxide from Portugal ...tal como o report da CIA que conduziu à guerra do Iraque

Many other countries contributed as well; since Iraq's nuclear program in the early 1980s was officially viewed internationally as for power production, not weapons, there were no UN prohibitions against it. An Austrian company gave Iraq calutrons for enriching uranium. The nation also provided heat exchangers, tanks, condensers, and columns for the Iraqi chemical weapons infrastructure, 16% of the international sales. Singapore gave 4,515 tons of precursors for VX, sarin, tabun, and mustard gasses to Iraq. The Dutch gave 4,261 tons of precursors for sarin, tabun, mustard, and tear gasses to Iraq. Egypt gave 2,400 tons of tabun and sarin precursors to Iraq and 28,500 tons of weapons designed for carrying chemical munitions. India gave 2,343 tons of precursors to VX, tabun, Sarin, and mustard gasses. Luxembourg gave Iraq 650 tons of mustard gas precursors. Spain gave Iraq 57,500 munitions designed for carrying chemical weapons. In addition, they provided reactors, condensers, columns and tanks for Iraq’s chemical warfare program, 4.4% of the international sales. China provided 45,000 munitions designed for chemical warfare. Portugal provided yellowcake between 1980 and 1982. Niger provided yellowcake in 1981.

Man in the Rain