This key's fingerprint is A04C 5E09 ED02 B328 03EB 6116 93ED 732E 9231 8DBA

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=BLTH
-----END PGP PUBLIC KEY BLOCK-----
		

Contact

If you need help using Tor you can contact WikiLeaks for assistance in setting it up using our simple webchat available at: https://wikileaks.org/talk

If you can use Tor, but need to contact WikiLeaks for other reasons use our secured webchat available at http://wlchatc3pjwpli5r.onion

We recommend contacting us over Tor if you can.

Tor

Tor is an encrypted anonymising network that makes it harder to intercept internet communications, or see where communications are coming from or going to.

In order to use the WikiLeaks public submission system as detailed above you can download the Tor Browser Bundle, which is a Firefox-like browser available for Windows, Mac OS X and GNU/Linux and pre-configured to connect using the anonymising system Tor.

Tails

If you are at high risk and you have the capacity to do so, you can also access the submission system through a secure operating system called Tails. Tails is an operating system launched from a USB stick or a DVD that aim to leaves no traces when the computer is shut down after use and automatically routes your internet traffic through Tor. Tails will require you to have either a USB stick or a DVD at least 4GB big and a laptop or desktop computer.

Tips

Our submission system works hard to preserve your anonymity, but we recommend you also take some of your own precautions. Please review these basic guidelines.

1. Contact us if you have specific problems

If you have a very large submission, or a submission with a complex format, or are a high-risk source, please contact us. In our experience it is always possible to find a custom solution for even the most seemingly difficult situations.

2. What computer to use

If the computer you are uploading from could subsequently be audited in an investigation, consider using a computer that is not easily tied to you. Technical users can also use Tails to help ensure you do not leave any records of your submission on the computer.

3. Do not talk about your submission to others

If you have any issues talk to WikiLeaks. We are the global experts in source protection – it is a complex field. Even those who mean well often do not have the experience or expertise to advise properly. This includes other media organisations.

After

1. Do not talk about your submission to others

If you have any issues talk to WikiLeaks. We are the global experts in source protection – it is a complex field. Even those who mean well often do not have the experience or expertise to advise properly. This includes other media organisations.

2. Act normal

If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. In particular, you should try to stick to your normal routine and behaviour.

3. Remove traces of your submission

If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.

In particular, hard drives retain data after formatting which may be visible to a digital forensics team and flash media (USB sticks, memory cards and SSD drives) retain data even after a secure erasure. If you used flash media to store sensitive data, it is important to destroy the media.

If you do this and are a high-risk source you should make sure there are no traces of the clean-up, since such traces themselves may draw suspicion.

4. If you face legal action

If a legal action is brought against you as a result of your submission, there are organisations that may help you. The Courage Foundation is an international organisation dedicated to the protection of journalistic sources. You can find more details at https://www.couragefound.org.

WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed. We specialise in strategic global publishing and large archives.

The following is the address of our secure site where you can anonymously upload your documents to WikiLeaks editors. You can only access this submissions system through Tor. (See our Tor tab for more information.) We also advise you to read our tips for sources before submitting.

wlupld3ptjvsgwqw.onion
Copy this address into your Tor browser. Advanced users, if they wish, can also add a further layer of encryption to their submission using our public PGP key.

If you cannot use Tor, or your submission is very large, or you have specific requirements, WikiLeaks provides several alternative methods. Contact us to discuss how to proceed.

Vault7: CIA Hacking Tools Revealed

Navigation: » Latest version


Owner: User #71473

NERDS (Networking, Engineering, Research, and Development Symposium)

Have you ever...

  • had a great idea for a product that you wanted to implement, but wanted some feedback?
  • developed a solution to share with other developers who may encounter the same or similar problems?
  • written a neat piece of code that you wanted to show it off to some of your peers?

 

Previously, you’d have to organize a brainstorming session, design review, and/or code review by picking a time and date when interested folks might be available, reserve a space for it, etc. We all know how difficult that stuff can be.... We’d like to solve all those problems for you!

('image' missing)

 

Announcing the NERDStech talk series

Starting Friday, 5 Jun 2009, 1:15 PM - 2:30 PM (yes, that’s squeezed between lunch and Cookie Time – you know you weren’t doing anything productive anyway!); we’re hosting the first Networking, Engineering, Research, and Development Symposium (NERDS) tech talk!

The intent is to provide an informal and voluntary group to talk about projects, tools, techniques, or interesting aspects of a project that a wider audience (beyond the development team) might be interested in learning more about. There won’t be a right way or a wrong way, just examples. We don’t anticipate much structure or a set format, so come to the first session and see how it works out.

For example, if you want to present an architectural idea, bring some slides if you have ‘em, or just be prepared to diagram it on the whiteboard. If you want to show off some code, bring it on a CDCompact Disk or make sure it’s checked in somewhere.

To start, we are organizing 10 sessions and looking for ideas, topics, and presenters across AEDApplied Engineering Devision to fill out the first several sessions.

Details

  • What: Network, Engineering, Research, and Development Symposium tech talk series
  • When: non-payday Fridays, 1:15 PM to 2:30 PM
  • Where: 9E53C demonstration room (EDBEmbedded Devices Branch Lab, 9E53C in DD2)
  • Questions: See co-chairs User #71840,, User #71841, User #71842, User #71879, User #71839, User #71852, or User #71838
  • Mailing List: The NERDS mailing list can be found on CWE at S:\DO\IOC\EDG ALL\EDG AE\NERDS\NERDS-mail-list.txt

 

For presenters, the demonstration room does have a DEVLAN drop, so if your slides/demos/whatever are on a DEVLAN machine with network access, you should be fine. The NERDS staff has a classified laptop running Ubuntu Linux, though you may also feel free to bring your own devices. The presentation stand has a VGA input, and any VGA-compatible laptop should work. (The NERDS team can also put our hands on a DVI-VGA adapter if necessary. Just make sure that your machine has working network drivers.

('image' missing)

)

 

(Incidentally, the NERDS team is also working on finding a MacBook Pro that we can set up to triple-boot into Mac OSOperating System X, Linux, and Windows, so that we’ll have the right environment for almost any presentation. We’ll let you know when we have such a machine up and running.)

 

Schedule of Upcoming Talks

 

Date Topic Branch Responsible Party Scheduler
Jan. 18, 2013 Available  
Jan. 22, 2013 PensiveTrace (ROP compiler toolchain) (User #71881., User #71888.) EDB/SNL
Feb. 1, 2013 Windows 8 briefing by NSANational Security Agency (User #71848., POSTPONED) NSA
Feb. 15, 2013 Available  
Mar. 1, 2013 Kaspersky Defeats (User #71884.) EDG/RDB
Mar. 15, 2013 EIB TownHall [Devlan modifications/upgrades] (User #71856.) EDG/EIB User #?
Mar. 29, 2013 AFD Malware RE tour (User #71875.) EDG/RDB User #?
Apr. 12, 2013 JQC as a rootkit and KitV (User #71866./ User #71862.) EDG/ESD/SDB User #71852
Apr. 26, 2013 Forensics Overview of the Alternate Data Stream (User #71578) EDG/SED User #71835 User #?
May 10, 2013 Overview of the OXF data standard. (User #71567, User #71867., User #71870.) EDG/SED User #? User #?
May 15, 2013 Out of Cycle - AEDApplied Engineering Devision Source Control: Bamboo/Stash (User #?, User #71843., User #71828) OSB/RDB   User #?
May 24, 2013 CANCELLED   User #? User #?
Jun. 7, 2013 IOS False Off (User #71859.) AED/MDB User #71852 User #?
Jun. 21, 2013 Available   User #71836 User #?
Jul. 5, 2013 CANCELED
Jul. 19, 2013 RAVAGE - A Hosted Network Implementation Prototype (User #? ) ESD User #? User #?
Aug. 2, 2013 CANCELED
Aug. 16, 2013 Black Hat Outbriefs   User #? User #?
Aug. 30, 2013 CANCELED  
Sep. 13, 2013 RainKing - Signature Diversity Compiler - NEW FEATURES + more! (User #71873.) EDG/RDB User #71827 User #71833
Sep. 27, 2013 Available   ? ?
Oct. 11, 2013 Available   ? ?
Oct. 25, 2013 Available   ? ?
Nov. 8, 2013 Available   ? ?
Nov. 22, 2013 Available   ? ?
Dec. 6, 2013 Available   ? ?
Dec. 20, 2013 CANCELED
Jan. 3, 2014 CANCELED

 

Talks to be Scheduled

 

Man in the Middle Extravaganza (User #71838.) EDB
Windows 8 briefing by NSA (User #71848.) NSA
JQC (User #71851.) ET
Jenkins/Hudson (User #71852., User #71845.) EDB,MDB
Intro to Parallel Computing APIs (User #71844.) EDB
Red Hat VMWare Briefing (Norman St. Laurent msl@redhat.com) Red Hat
Brewmiester (User #71865.) TBD
Hive Lessons Learned (User #71843., User #71841., User #71852., User #71838.) RDB,EDB
RSA (User #71882.) AIB
Memory Forensics AFD
User #71532  

 

Other Topics: Black hat, Shmoocon, JDW, DEFCON, Scamp, SWSW

Previous Presentations

 

Date Topic Branch
Jun. 05, 2009 Building Cross-platform collection tools with CMAKE (User #?, User #71834, User #?) UDB
Jun. 19, 2009 Cancelled due to CBOC (Any Guesses what this stands for?)  
Jul. 03, 2009 Federal Holiday - Enjoy the Day off  
Jul. 17, 2009 Scunnel - Automated Testing, Tracking + Fixing Bugs, & PEID usage (User #71837, User #71869) WRB
Jul. 31, 2009 User #71830’s talk moved to 8/14/09  
Aug. 14, 2009 Babel and SourceForge (User #71863.) NB
Aug. 28, 2009 Something about Stack Security (User #?, on stack overflows from Black Hat’s Exploit Lab) UDB
Sep. 11, 2009 ExpressLane - USBUniversal Serial Bus Data Exfiltration From a Biometric Border Crossing System (User #71832 and User #71831) WAB
Sep. 25, 2009 Building Small-footprint Bootable Media Collection Tools with Linux (User #?, User #71875.) UDB
Oct. 09, 2009 More Tricks for Defeating SSL (Moxie Marlinspike, Black Hat Video [Exploitation]) (Cancelled due to equipment issues)  
Oct. 23, 2009 Advanced Windows Implementation Details - Highlights from the Windows Internals Class (User #71837.) WRB
Nov. 06, 2009 Attacking the Eye-Fi Wireless SD Card Firmware (User #71861) NB
Nov. 20, 2009 BadMFS - A Covert File System for the MARATHON Base Implant (User #71867., User #71872.) Note that meeting will be in 4C82!!! AIB
Dec. 4, 2009 MagicBox and Assymmetric Crypto (User #71853., User #71886.) AIB, MDB
Jan 15, 2010 Agile-An Introduction to Scrum (User #71891.) AED SI
Jan 29, 2010 CIB - COG‘s Covert Infrastructure for Network Attacks (User #71876., User #71887.[COG/NOD/CIB]) AIB, CIB
Feb 12, 2010 MOS - A Mobile Framework Library for the DS&T (User #71826) EDB
Feb 26, 2010 Collide (User #71847., User #71864.) AIB
Mar 12, 2010 EDG AllHands (Nerds Postponed) EDG
Mar 26, 2010 Ergostar (Geoff) AIB
Apr 9, 2010 gPXE TLSTransport Layer Security Crypto Vulnerability (User #71838) EDB
Apr 23, 2010 Synchronizing iPhone source code across isolated development machines with git (User #?, User #71852.) MDB/EDB
May 7, 2010 Development Best Practices, Tools, & What AEDApplied Engineering Devision wants from Contractor tools (User #71849.) ET
May 21, 2010 Babel: Automated Continuous Integration and Testing (User #71863.) AIB
Jul. 16, 2010 **Does AEDApplied Engineering Devision want a cross-platform communications library? ** (User #71860.) Additional Notes/Comments SED
Jul. 29, 2010 (Thurs) (Non-Black Hat) Training and Conference Roundup AED
Aug. 06, 2010 How C3 Does Software Engineering (User #71826 S.) EDB
Aug. 13, 2010 Handling International Data Collection (User #71840., User #71837.) MDB, RDB
Aug. 27, 2010 Embeddable RAM-based Linker (User #71851.) TDB
Sep. 10, 2010 Black Hat Outbriefs (Black Hat Attendees) AED
Sep. 24, 2010 Southwest Summer Workshop Report: User #?’s Summer Vacation (User #71886.) MDB
Oct. 1, 2010 (OOC) JDW Outbriefs (JDWDevelopment Facility of GCHQ Attendees) AED
Oct. 22, 2010 Survey of Embedded Devices (User #71877.) EDB
Nov. 14, 2010 (Thurs) Holstein: Apple iPod Covert Storage (User #71858.) MDB
Dec. 3, 2010 TenCent QQ (User #71850.) ESD/SDB
Feb. 25, 2011 Lessons Learned While Porting Miniloader From 32- to 64-bit (User #71889.) AIB
Mar. 3, 2011 Black Hat and ShmooCon Round Table (User #71878., User #71857., User #71852., User #71829, User #71839.) EDB, AIB
Mar. 18, 2011 Torpedo (User #71832.) OSB
Apr. 1, 2011 Fluxwire (User #71883.) COG
Apr. 15, 2011 Core Jacking (Pikewerks) SED/ETB
Apr. 22, 2011 Field Software Engineering Lessons from NEUROMANCER (User #71890.) EDG
Apr. 29, 2011 Wiki/Jabber/Network Infrastructure (User #1179825., User #71892., User #71871., User #71852.) EIB/EDB
May 13, 2011 C+ +0x and The RAII Idiom (User #71893.) :collaboration:nerds-cpp-raii.pdf OSB
Jun 3, 2011 PSPs in Your Cloud: The Rise of Cloud-Based AntiVirus and Personal Security Products (User #?) NSA/TAO
Jun. 10, 2011 Investigation of Embedded Databases on iOS and Android Devices (TBD) MITRE
Jun. 24, 2011 Thread Monkey (User #71851.) TBD
Jul. 8, 2011 TBD (TBD) TBD
Jul. 22, 2011 Canceled  
Aug. 5, 2011 BowmanHeir (User #71879.) RDB
Aug. 19, 2011 Eliminating Code Bloat (User #71874.) RDB
Sep. 2, 2011 Holiday  
Sep. 9, 2011 Remote iOS Exploit (User #71878.) EDB
Sep. 16, 2011 Sandia Work (User #71847.) EDB
Sep. 30, 2011 Remote iOS Exploit Part II (User #71878.) EDB
Oct. 14, 2011 IPV6 (User #71846.) EDB
Oct. 21, 2011 Evolution of Cellular Networks (User #71868.)  
Oct. 28, 2011 Canceled EIB
Nov. 11, 2011 Holiday  
Nov. 18, 2011 Intro to Parallel Computing APIs CANCELLED DUE TO SICKNESS (User #71844.) EDB
Nov. 25, 2011 Holiday  
Dec. 9, 2011 TBD (TBD) TBD
Dec. 23, 2011 Holiday  
TBD VMware updates/upgrades (User #71856.) EIB
Feb. 3, 2012 EDG Only: Career as a Field Officer and 2013 Field Engineer Position at NeuroMancer (Vihn B.) AED
Feb. 16, 2012 DVR (Out-of-Cycle, Off by One) (User #71858.) MDB
Mar. 2, 2012 :Ergostar II (User #71880.) AIB
Mar. 16, 2012 Horizon: A proof of concept Tool management system for AEDApplied Engineering Devision (User #71853.) AIB
Mar. 30, 2012 The Adventures of C-runtime Linking (User #71874.) RDB
Apr. 13, 2012 Milestone (User #71885.) EDB
Apr. 20, 2012 TIO observations (User #71832.) AED
Apr. 27, 2012    
May 11, 2012    
May 24, 2012 Research@Intel Conference-staff only (User #71844.) EDB
May 25, 2012 CANCELLED  
Jun. 8, 2012 User #71859 Coordinated–Raytheon Pikewerks
Jun. 22, 2012    
Jul. 6, 2012 CANCELLED  
Jul. 20, 2012 Hacking Virtual Machines (Mark St. Laurent-Red Hat)  
Jul. 30, 2012 AEDApplied Engineering Devision Software Development Workshop User #71841
Aug. 3, 2012    
Aug. 17, 2012    
Aug. 24, 2012 Nvidia GPU ESD
Sep. 7, 2012 Black Hat Presentations AED
Sep. 14, 2012    
Sep. 20, 2012 Red Hat  
Sep. 28, 2012    
Oct. 19, 2012 Python Crypto Importer (User #71878 and User #71855.) EDB
Oct. 26, 2012 Hacking a Parking Meter (Ben C. Coordinated) Raytheon
Nov. 9, 2012 Mocana Cryptographic Library (User #71837 and User #71585) Mocana
Nov. 15, 2012 PSPPersonal Security Product (Anti-Virus) Whitelisting ESD
Nov. 23, 2012 CANCELLED  
Nov. 30, 2012 Grasshopper (not kung fu) (User #71854.) RDB
Dec. 7, 2012 RabbitHole, A Windows Exploitation Library (User #71867.)  
Dec. 14, 2012 Windows 8 (EIB(Branch) Coordinated) External
Dec. 21, 2012 CANCELLED  

 

Proposed Topics

Seeking Feedback, Ideas, & Presenters

  • Source Forge
  • Ruby on Rails
  • Key Logger implementation considerations
  • Listening post communication protocols
  • Configuration files
  • Implant configuration & deployment mechanisms
  • Patchers
  • Strings
  • USB Covert channels, covert data storage
  • Covert store-and-forward package routing
  • Babel
  • Packet chunking (breaking long uploads/downloads into smaller pieces).
  • Automated Build and Regression Testing Systems
  • Google Test Framework
  • Happiness

Recent space activity

('recently-updated' missing)

Space contributors

('contributors' missing)

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh