Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Dumbo : how the CIA blind surveillance cameras
Remember all those times the surveillance cameras did not record any thing or were conveniently not on at the time?

Quote:Dumbo : how the CIA blind surveillance cameras

magictr | August 13, 2017 | Techno | 0 Comments
Lovers of political thrillers and conspiracy theories will lick their lips : Wikileaks has unveiled the August 3, 2017 a new part of the now famous Vault 7, which is supposed to contain all of the tools of espionage and piracy of the u.s. secret service. This time, it is the CIA (Central Intelligence Agency), which is referred to by the revelations.
The program revealed is called Dumbo and it would simply serve to cover the traces of the CIA during special operations, or for any reason which appears to it to be justified.
Dumbo : software piracy that blocks the cameras

The principle of Dumbo is not really one of spy on targets or ordinary people : the aim is to cover the special operations of the CIA, so as to leave no trace. Dumbo has the ability to take control of a surveillance system and take control of the cameras and microphones.
Dumbo may, according to the documents revealed by Wikileaks, to cancel the records, delete, or corrupt records or even cut off the microphones. It will automatically identify all devices targeted, whether they are connected to the network, wired, Wifi or Bluetooth. Dumbo would, in addition, a simple USB key, which makes it easy to deploy.
[Image: dcc4246258fbaf781b35c4e8a1b94125.jpg]
An attack is 100% physical on a system

Unlike some of the tools of espionage of the CIA or the NSA, Dumbo may not be deployed at a distance : the USB flash drive containing the program must be inserted into the system and it needs the access SYSTEM to operate. As the single administrator access is not enough, Dumbo will try to himself to gain the access necessary to operate.

[URL=""]READ Intel : processors of 8th generation before the end of the year ?
Deploying 100 physical % of this malware requires a team of special intervention. The officers of the PAG (Physical Access Group or Group "physical access" in French), a branch of the CCI (Center for Cyber Intelligence) of the CIA, in charge at special operations.
"The philosophers have only interpreted the world, in various ways. The point, however, is to change it." Karl Marx

"He would, wouldn't he?" Mandy Rice-Davies. When asked in court whether she knew that Lord Astor had denied having sex with her.

“I think it would be a good idea” Ghandi, when asked about Western Civilisation.

Possibly Related Threads…
Thread Author Replies Views Last Post
  CIA funds chatroom surveillance Magda Hassan 0 5,247 Less than 1 minute ago
Last Post:
  "Fusion Center" Analysts Paid for Surveillance of Facebook Pages Peter Lemkin 0 4,873 Less than 1 minute ago
Last Post:
  US spy chief Clapper defends Prism and phone surveillance David Guyatt 0 84,288 Less than 1 minute ago
Last Post:
  Panopticon of global surveillance Magda Hassan 0 61,917 Less than 1 minute ago
Last Post:
  Secret EU surveillance drone project revealed David Guyatt 0 3,954 Less than 1 minute ago
Last Post:
  Biggest anti-mass surveillance event in the U.K. Magda Hassan 0 5,249 Less than 1 minute ago
Last Post:
  Surveillance Capitalism Magda Hassan 0 2,775 Less than 1 minute ago
Last Post:
  Carlyle Group. How cash secretly rules surveillance policy Magda Hassan 0 3,287 Less than 1 minute ago
Last Post:
  Defensive Shift - Turning the Tables on Surveillance Magda Hassan 0 3,262 Less than 1 minute ago
Last Post:
  'Five Eyes' surveillance pact should be published, Strasbourg court told Magda Hassan 0 3,570 Less than 1 minute ago
Last Post:

Forum Jump:

Users browsing this thread: 1 Guest(s)