deep-state
deep-state
TS//SI//NOFORN
238 posts
fragments & echoes from the deep state // trevor paglen fanfic // i read the intercept so u dont have to
Don't wanna be here? Send us removal request.
deep-state · 8 years ago
Link
Source code and analysis for CIA software projects including those described in the Vault7 series.
This publication will enable investigative journalists, forensic experts and the general public to better identify and understand covert CIA infrastructure components.
Source code published in this series contains software designed to run on servers controlled by the CIA. Like WikiLeaks' earlier Vault7 series, the material published by WikiLeaks does not contain 0-days or similar security vulnerabilities which could be repurposed by others.
9 notes · View notes
deep-state · 8 years ago
Link
a twitter account with content from the cia’s recent dump of files from bin laden’s computer
7 notes · View notes
deep-state · 8 years ago
Photo
Tumblr media
3 notes · View notes
deep-state · 8 years ago
Link
7 notes · View notes
deep-state · 8 years ago
Link
Today, August 31st 2017, WikiLeaks publishes documents from the Angelfire project of the CIA. Angelfire is an implant comprised of five components: Solartime, Wolfcreek, Keystone (previously MagicWand), BadMFS, and the Windows Transitory File system. Like previously published CIA projects (Grasshopper and AfterMidnight) in the Vault7 series, it is a persistent framework that can load and execute custom implants on target computers running the Microsoft Windows operating system (XP or Win7).
4 notes · View notes
deep-state · 8 years ago
Video
youtube
there’s a seriously excellent documentary about bill binney and his associates, highly recommended
12 notes · View notes
deep-state · 8 years ago
Link
Can we expect more NSA employees to blow the whistle? Perhaps, but the people in power there are “corrupt,” Binney said. During the portion of the talk when attendees could ask questions, he talked about how the NSA has employed a lot of introverts, people with ISTJ personalities, making them easy to threaten. Binney added that the See Something, Say Something (about your fellow workers) program inside the NSA is “what the Stasi did. They’re picking up all the techniques from the Stasi and the KGB and the Gestapo and the SS; they just aren’t getting violent yet — that we know of — internally in the U.S.; outside is another story.”
binney did a survey in the early 90s and found that 80% of nsa employees were istj’s then, lol
10 notes · View notes
deep-state · 8 years ago
Link
SECRET//NOFORN
1.0 (U) Overview
(S//NF) CouchPotato is a remote tool for collection against RTSP/H.264 video streams. Itprovides the ability to collect either the stream as a video file (AVI) or capture still images (JPG) of frames from the stream that are of significant change from a previously captured frame. CouchPotato utilizes ffmpeg for video and image encoding and decoding as well as RTSP connectivity. In order to minimize size of the DLL binary, many of the audio and video codecs along with other unnecessary features have been removed from the version of ffmpeg that CouchPotato is built with. pHash, an image hashing algorithm, has been incorporated into ffmpeg’s image2 demuxer to provide image change detection capabilities. CouchPotato relies on being launched in an ICE v3 Fire and Collect compatible loader
5 notes · View notes
deep-state · 8 years ago
Link
Qualified experts working independently of one another began to examine the DNC case immediately after the July 2016 events. Prominent among these is a group comprising former intelligence officers, almost all of whom previously occupied senior positions. Veteran Intelligence Professionals for Sanity (VIPS), founded in 2003, now has 30 members, including a few associates with backgrounds in national-security fields other than intelligence. The chief researchers active on the DNC case are four: William Binney, formerly the NSA’s technical director for world geopolitical and military analysis and designer of many agency programs now in use; Kirk Wiebe, formerly a senior analyst at the NSA’s SIGINT Automation Research Center; Edward Loomis, formerly technical director in the NSA’s Office of Signal Processing; and Ray McGovern, an intelligence analyst for nearly three decades and formerly chief of the CIA’s Soviet Foreign Policy Branch. Most of these men have decades of experience in matters concerning Russian intelligence and the related technologies. This article reflects numerous interviews with all of them conducted in person, via Skype, or by telephone.
The customary VIPS format is an open letter, typically addressed to the president. The group has written three such letters on the DNC incident, all of which were first published by Robert Parry at www.consortiumnews.com. Here is the latest, dated July 24; it blueprints the forensic work this article explores in detail. They have all argued that the hack theory is wrong and that a locally executed leak is the far more likely explanation. In a letter to Barack Obama dated January 17, three days before he left office, the group explained that the NSA’s known programs are fully capable of capturing all electronic transfers of data. “We strongly suggest that you ask NSA for any evidence it may have indicating that the results of Russian hacking were given to WikiLeaks,” the letter said. “If NSA cannot produce such evidence—and quickly—this would probably mean it does not have any.”
4 notes · View notes
deep-state · 8 years ago
Link
OutlawCountry allows for the redirection of all outbound network traffic on the target computer to CIA controlled machines for ex- and infiltration purposes. The malware consists of a kernel module that creates a hidden netfilter table on a Linux target; with knowledge of the table name, an operator can create rules that take precedence over existing netfilter/iptables rules and are concealed from an user or even system administrator.
36 notes · View notes
deep-state · 8 years ago
Link
ELSA is a geo-location malware for WiFi-enabled devices like laptops running the Micorosoft Windows operating system. Once persistently installed on a target machine using separate CIA exploits, the malware scans visible WiFi access points and records the ESS identifier, MAC address and signal strength at regular intervals. To perform the data collection the target machine does not have to be online or connected to an access point; it only needs to be running with an enabled WiFi device. If it is connected to the internet, the malware automatically tries to use public geo-location databases from Google or Microsoft to resolve the position of the device and stores the longitude and latitude data along with the timestamp. The collected access point/geo-location information is stored in encrypted form on the device for later exfiltration. The malware itself does not beacon this data to a CIA back-end; instead the operator must actively retrieve the log file from the device - again using separate CIA exploits and backdoors.
The ELSA project allows the customization of the implant to match the target environment and operational objectives like sampling interval, maximum size of the logfile and invocation/persistence method. Additional back-end software (again using public geo-location databases from Google and Microsoft) converts unprocessed access point information from exfiltrated logfiles to geo-location data to create a tracking profile of the target device.
4 notes · View notes
deep-state · 8 years ago
Photo
Tumblr media
0 notes
deep-state · 8 years ago
Photo
Tumblr media
9 notes · View notes
deep-state · 8 years ago
Link
CherryBlossom provides a means of monitoring the Internet activity of and performing software exploits on Targets of interest. In particular, CherryBlossom is focused on compromising wireless networking devices, such as wireless routers and access points (APs), to achieve these goals. Such Wi-Fi devices are commonly used as part of the Internet infrastructure in private homes, public spaces (bars, hotels or airports), small and medium sized companies as well as enterprise offices. Therefore these devices are the ideal spot for "Man-In-The-Middle" attacks, as they can easily monitor, control and manipulate the Internet traffic of connected users. By altering the data stream between the user and Internet services, the infected device can inject malicious content into the stream to exploit vulnerabilities in applications or the operating system on the computer of the targeted user.
5 notes · View notes
deep-state · 8 years ago
Photo
Tumblr media
The Electronic Frontier Foundation stated in 2015 that "the documents that we previously received through a (Freedom of Information Request)[2] suggested that all major manufacturers of color laser printers entered a secret agreement with governments to ensure that the output of those printers is forensically traceable....it is probably safest to assume that all modern color laser printers do include some form of tracking information that associates documents with the printer's serial number."[3]
9 notes · View notes
deep-state · 8 years ago
Link
The Justice Department announced charges Monday against a federal contractor with Top Secret security clearance, after she allegedly leaked classified information to an online media outlet.
Reality Leigh Winner, 25, a contractor with Pluribus International Corporation in Georgia, is accused of "removing classified material from a government facility and mailing it to a news outlet," according to a federal complaint. CNN is told by sources that the document Winner allegedly leaked is the same one used as the basis for the article published Monday by The Intercept, detailing a classified National Security Agency memo. The NSA report, dated May 5, provides details of a 2016 Russian military intelligence cyberattack on a US voting software supplier, though there is no evidence that any votes were affected by the hack.
this woman is the source of nsa docs about russian hackers targeting the presidential election published today by the intercept
3 notes · View notes
deep-state · 8 years ago
Photo
Tumblr media
4 notes · View notes