Author Topic: WikiLeaks releases Spy Files 3  (Read 3697 times)

0 Members and 1 Guest are viewing this topic.

Offline mayya

  • Administrator
  • *****
  • Posts: 7874
WikiLeaks releases Spy Files 3
« on: September 05, 2013, 21:19:35 PM »

Yesterday, 23:22   
WikiLeaks releases Spy Files 3

Collage "Voice of Russia"

The WikiLeaks organization has released what they are calling “Spy Files #3”. The latest offering of documents showing nefarious US Government illegality contains 249 documents from 92 global intelligence contractors. According to WikiLeaks these documents reveal how, as the intelligence world has privatized, the US, the EU and the developing world’s intelligence agencies and governments have rushed into buying millions of dollars worth of next generation mass surveillance technology to target communities, groups and whole populations.

The further revelations make it clear that anything you do online is subject to interception, manipulation, recording and a threat to the actual physical security of the user. In a press release WikiLeaks briefly detailed some of the revelations uncovered in the release as they continue their fight to expose the massive illegality and the nefarious activities of certain governments who continue to claim they are democratic.

WikiLeaks continues to fight the Orwellian security state and as the tyrants in power attempt to launch yet another act of aggression on a defenseless nation while lying to the citizens of “Oceania” it is important that we listen and support their efforts. WikiLeaks is providing proof and evidence of illegality, that is noble. They are doing what the annexed 4th Estate has obediently stropped doing as they have acquiesced their role in society.

WikiLeaks stated the following:

WikiLeaks publisher Julian Assange stated "WikiLeaks' Spy Files 3 is part of our ongoing commitment to shining a light on the secretive mass surveillance industry. This publication doubles the WikiLeaks Spy Files database. WikiLeaks Spy Files form a valuable resource for journalists and citizens alike, detailing and explaining how secretive state intelligence agencies are merging with the corporate world in their bid to harvest all human electronic communication."

WikiLeaks Counter Intelligence Unit has been tracking the trackers. The WLCIU has collected data on the movements of key players in the surveillance contractor industry, including senior employees of Gamma, Hacking Team and others as they travel through Azerbaijan, Bahrain, Brazil, Spain, Mexico and other countries.

WikiLeaks publiser, Julian Assange stated "WikiLeaks Counter Intelligence Unit operates to defend WikiLeaks' assets, staff and sources, and, more broadly, to counter threats against investigative journalism and the public's right to know."

Documents in Spy Files 3 include sensitive sales brochures and presentations used to woo state intelligence agencies into buying mass surveillance services and technologies. Spy Files 3 also includes contracts and deployment documents, detailing specifics on how certain systems are installed and operated.

Internet spying technologies now being sold on the intelligence market include detecting encrypted and obfuscated internet usage such as Skype, BitTorrent, VPN, SSH and SSL. The documents reveal how contractors work with intelligence and policing agencies to obtain decryption keys.

The documents also detail bulk interception methods for voice, SMS, MMS, email, fax and satellite phone communications. The released documents also show intelligence contractors selling the ability to analyze web and mobile interceptions in real time.

Contracts and deployment documents in the release show evidence of these technologies being used to indiscriminately infect users in Oman with remote controlled spyware. The FinFly 'iproxy' installation by Dreamlab shows how a target is identified and malware is silently inserted alongside a legitimate download, whilst keeping the intended download functioning as expected. The target identification methods mean that anybody connecting through the same network would be systematically and automatically intercepted and infected as well, even unintended targets.

Any opinions and views expressed here are my own. I can be reached at [email protected]