際際滷

際際滷Share a Scribd company logo
Spying the world - CIA security organization in nutshell
CIA Hacking Organization in the Nutshell
CIA Hacking Organization in the Nutshell
CIA Hacking Organization in the Nutshell
CIA Hacking Organization in the Nutshell
CIA Hacking Organization in the Nutshell
CIA Hacking Organization in the Nutshell
CIA Hacking Organization in the Nutshell
CIA Hacking Organization in the Nutshell
CIA Hacking Organization in the Nutshell
Part 1:Year	Zero
CIA Hacking Organization in the Nutshell
Part 2
CIA Hacking Organization in the Nutshell
Mobile	Development	Branch
CIA Hacking Organization in the Nutshell
CIA Hacking Organization in the Nutshell
CIA Hacking Organization in the Nutshell
CIA's	Desperation	To	Crack	Apple's	Encryption
CIA Hacking Organization in the Nutshell
CIA	Develops	Malware	to	targets	Windows,	Linux	
&	MacOS
Part3:	Marble
CIA Hacking Organization in the Nutshell
CIA Hacking Organization in the Nutshell
CIA Hacking Organization in the Nutshell
Part	4:	Grasshopper
Physical	penetration	- Fine	Dining
VLC Player Portable
Irfanview
Chrome Portable
Opera Portable
Firefox Portable
ClamWin Portable
Kaspersky TDSS Killer Portable
McAfee Stinger Portable
Sophos Virus Removal
Thunderbird Portable
Opera Mail
Foxit Reader
LibreOffice Portable
Prezi
Babel Pad
Notepad++
Skype
Iperius Backup
Sandisk Secure Access
U3 Software
2048
LBreakout2
7-Zip Portable
Portable Linux CMD PromptOSB (Operational Support Branch)
US	embassies
Part	5:HIVE	by	Embedded	Development	Branch
Part	6:	Weeping	Angel
Hacking	'Anyone,	Anywhere,'	Thanks	to	
Internet	Of	'Insecure'	Things
CIA Hacking Organization in the Nutshell
Part	7:	Scribbles
Part	8:	Archimedes
Part 9
Part	10:
CIA Hacking Organization in the Nutshell
CIA Hacking Organization in the Nutshell
CIA	developers	also	hate process
CIA Hacking Organization in the Nutshell
They	do	Code	Reviews	&	prefer	small	
Pull Requests
They	need	git cheatsheets too
The	Oh	crap	I	didnt	mean	to	commit	yet	Trick
They	store	passwords	in	clear text
They	also	used	pirated	versions	of Windows
Yes,	they	search	answers	on	StackOverflow
too
CIA	Borrowed	Codes	from	Public	Malware	
Samples
CIA	Borrowed	Codes	
from	Public	Malware	
Samples
They	do	use	IRC,	like	in	the movies
Why IRC?
For colloboration! We can easily chat with each
other now!
CIA Hacking Organization in the Nutshell
Projects
CIA Hacking Organization in the Nutshell
CIA Hacking Organization in the Nutshell
CIA Hacking Organization in the Nutshell
CIA Hacking Organization in the Nutshell
CIA Hacking Organization in the Nutshell
CIA Hacking Organization in the Nutshell
CIA Hacking Organization in the Nutshell
CIA Hacking Organization in the Nutshell
CIA Hacking Organization in the Nutshell

More Related Content

CIA Hacking Organization in the Nutshell