hookednosedjoooo

Wow more bullshit from mossadleaks about non important bullshit that everyone already knew about.

Yea bro my mind is blown that the CIA can hack shit and spy on me through devices they created to spy on me with. This is a huge revelation, I am so surprised.

seekingpeace

Provide evidence that Mossad is involved with Wikileaks or ...... You can't? Thought so.

seekingpeace

If you had more information about the "back-end" of Wikileaks, you would know that many are outspoken regarding the treatment of Palestinians. What is it with Americans and their obsession with Jews?

Stop looking at the world from an Ameri-centric position.

badkangaroo

excuse the ignorance, what's a PAG deployment?

Blacksmith21

Oops. WL published those programs' existence. What is not mentioned is that the toolkits with the .EXE for these programs was stolen over a year ago. Along with NSAs toolbox.

Like a culture of leaking, this culture of theft was facilitated by the former kleptocracy.

When all of this is said and done, I truly hope to see the senior members from the last administration lined up against a wall and shot. In the back.

10083668?

Dumbo can identify, control and manipulate monitoring and detection systems on a target computer running the Microsoft Windows operating sytem. It identifies installed devices like webcams and microphones, either locally or connected by wireless (Bluetooth, WiFi) or wired networks. All processes related to the detected devices (usually recording, monitoring or detection of video/audio/network streams) are also identified and can be stopped by the operator. By deleting or manipulating recordings the operator is aided in creating fake or destroying actual evidence of the intrusion operation.

Dumbo is run by the field agent directly from an USB stick; it requires administrator privileges to perform its task. It supports 32bit Windows XP, Windows Vista, and newer versions of Windows operating system. 64bit Windows XP, or Windows versions prior to XP are not supported.

AnUnconcernedCitizen

A USB stick? Admin privileges? So, basically, you need direct access to the target. You know what else works great if you're within arm's reach of a target laptop? A ball-peen hammer. Someone should inform the CIA. XD

HamFistedIdiot

Awesome! Like giving the car keys to a two year old! Technology will set humankind free! Actually, we need to revisit those Digital Bill of Rights again, starting with cutting out the duplicate feed of everything housed in the USA to Israel. Perhaps not storing anything at all without a warrant. http://keepthewebopen.com/digital-bill-of-rights