Friday, February 19, 2016



The classified files – provided previously by NSA
whistleblower Edward Snowden – contain new details
about groundbreaking surveillance technology the
agency has developed to infect potentially millions
of computers worldwide with malware “implants.” The
clandestine initiative enables the NSA to break into
targeted computers and to siphon out data from foreign
Internet and phone networks.
  
https://prod01-cdn02.cdn.firstlook.org/wp-uploads/2014/03/nsa_malware_feature.jpg
https://prod01-cdn01.cdn.firstlook.org/wp-uploads/2014/03/turbine-large.jpg
https://prod01-cdn01.cdn.firstlook.org/wp-uploads/2014/03/tao-2-1024x768.png
https://s3.amazonaws.com/s3.documentcloud.org/documents/1076889/nsa-technology-directorate-analysis-of-converged.pdf
https://s3.amazonaws.com/s3.documentcloud.org/documents/1077724/industry-scale-exploitation.pdf
https://s3.amazonaws.com/s3.documentcloud.org/documents/1077721/thousands-of-implants.pdf
https://s3.amazonaws.com/s3.documentcloud.org/documents/1076859/nsa-phishing-tactics-and-man-in-the-middle-attacks.pdf
https://s3.amazonaws.com/s3.documentcloud.org/documents/1076891/there-is-more-than-one-way-to-quantum.pdf
https://s3.amazonaws.com/s3.documentcloud.org/documents/1076862/quantum-insert-diagrams.pdf

NSA TURBINE Automated Hacking Documents (Mirrored) ::
  
http://cryptome.org/2014/03/nsa-turbine-turmoil.pdf
http://cryptome.org/2014/03/nsa-industry-exploit.pdf
http://cryptome.org/2014/03/nsa-converged.pdf
http://cryptome.org/2014/03/nsa-quantum-insert.pdf
http://cryptome.org/2014/03/nsa-thousands-implants.pdf
http://cryptome.org/2014/03/nsa-gchq-quantumtheory.pdf
http://cryptome.org/2014/03/nsa-more-than-one-way.pdf
http://cryptome.org/2014/03/nsa-hammerchant.pdf
http://cryptome.org/2014/03/nsa-phishing-mtm.pdf
http://cryptome.org/2014/03/tao-quantuminsert-bonanza.htm

NSA Hacking Routers & Social Media (Misc) ::
  
http://cryptome.org/2014/03/nsa-5-eyes-hacking.pdf
http://cryptome.org/2014/03/nsa-menwith-xkeyscore.pdf
http://cryptome.org/2014/03/nsa-selector.pdf

GCHQ ROYAL CONCIERGE Diplomatic Hotel Spy ::
  
http://cryptome.org/2013/11/gchq-royal-concierge-de.pdf
  
http://cryptome.org/2013/11/gchq-royal-concierge.jpg
  
¤ GCHQ Monitors Diplomats Hotel Bookings ::
  
 Britain’s GCHQ intelligence service monitors
diplomats’ travels using a sophisticated
automated system that tracks hotel bookings.
Once a room has been identified, it opens
the door to a variety of spying options.

No comments:

Man in the Rain