Thursday, 3 August 2017
2 comments

Wikileaks Unveiled 'Dumbo' Tool Which CIA Used To Spy Webcams And Microphones

Wikileaks Unveiled 'Dumbo' Tool Which CIA Used To Spy Webcams And Microphones

Wikileaks Unveiled 'Dumbo' Tool Which CIA Used To Spy Webcams And Microphones

What Dumbo Can Do?


  1. To identify, control the webcam and microphones.
  2. Disables all network adapters
  3. Suspends any processes using a camera recording device
  4. Selectively corrupted or delete recordings
  5. Support Windows 



WikiLeaks publishes documents from the Dumbo project of the CIA. Dumbo is a capability to suspend processes utilizing webcams and corrupt any video recordings that could compromise a PAG deployment. The PAG (Physical Access Group) is a special branch within the CCI (Center for Cyber Intelligence); its task is to gain and exploit physical access to target computers in CIA field operations.

Dumbo can identify, control and manipulate monitoring and detection systems on a target computer running the Microsoft Windows operating sytem. It identifies installed devices like webcams and microphones, either locally or connected by wireless (Bluetooth, WiFi) or wired networks. All processes related to the detected devices (usually recording, monitoring or detection of video/audio/network streams) are also identified and can be stopped by the operator. By deleting or manipulating recordings the operator is aided in creating fake or destroying actual evidence of the intrusion operation.

Dumbo is run by the field agent directly from an USB stick; it requires administrator privileges to perform its task. It supports 32bit Windows XP, Windows Vista, and newer versions of Windows operating system. 64bit Windows XP, or Windows versions prior to XP are not supported.

2 comments:

  1. Are you desperately in need of a hacker in any area of your life???

    then you can contact; [email protected]

    I will help you at affordable prices, i offer services like
    -hack into your cheating partner's phone(whatsapp,bbm.gmail,icloud,facebook, twitter,snap chat and others)
    -Sales of Blank ATM cards.

    -hack into email accounts and trace email location -all social media accounts,

    -school database to clear or change grades,

    -Retrieval of lost file/documents

    -DUIs -company records and systems,

    -Bank accounts,Paypal accounts -Credit cards hacker

    -Credit score hack -Monitor any phone and email address

    -Websites hacking, pentesting.

    -IP addresses and people tracking.

    -Hacking courses and classes.

    my services are the best on the market and 100% security and discreet work is guaranteed.,...

    ReplyDelete

 
Toggle Footer
Top