Belgrade Fair

Spy gadgets from the NSA

Among the documents published by Edward Snowden, a former CIA and National Security Agency, have been found materials describing some details of the technology used by the NSA spying. List of software and hardware is designed as a small catalog. Only forty-eight pages marked “classified” and “top secret”, which gives a brief description of a technology for the surveillance.

This list is not exhaustive. Presented technology associated with obtaining access to the hidden computers and networks, as well as methods and devices electronic intelligence related to mobile communications and surveillance equipment. In this article I will talk about these methods of espionage, then there will be four dozen slides (carefully, traffic).

“Original” documents describing spyware technician hidden under the spoilers. Names technologies designated by capital letters, but not for all these technologies in the slide text description available. Hardware tab is hidden technical device, a kind of beetle, which allows access to the target, or information about it. Under the program laying understood hidden programs that allow access to the target program method, such as using Trojan horses and backdoors.


GINSU – technique allows to recover soft tab called KONGUR on the target system with the hardware tab BULLDOZZER on PCI-bus. For example, when you upgrade or reinstall the operating system on the target computer. These technologies are designed to provide remote access to a computer running Windows 9x on to Vista.

IRATEMONK allows for the presence of software to spy on desktop and laptop computers by using the tabs in the firmware of the hard drive, which allows you to get the possibility of execution of the code by replacing the MBR. The method works on different disks Western Digital, Seagate, Maxtor and Samsung. Because file systems are supported by FAT, NTFS, EXT3 and UFS. RAID systems are not supported. After the introduction of IRATEMONK will launch its functional part every time you turn the target computer.

SWAP allows the presence of spy software by using the motherboard BIOS and the HPA area of ​​the hard disk by the execution of the code to run the operating system. This tab allows you to gain remote access to different operating systems (Windows, FreeBSD, Linux, Solaris) c different file systems (FAT32, NTFS, EXT2, EXT3, UFS 1.0). To install using two tools: ARKSTREAM reflash the BIOS, TWISTEDKILT writes SWAP HPA area of ​​the disc and its functional part.

Little Smart Spy Camera

Modern instruments, devices manufactured smaller and smaller, and sometimes it is very difficult the first time to say that this little thing – a video – camera or some – some other spy gear, which is the most unobtrusive way are watching your every move.

Suggests that men – jealous, who noticed that their beloved began to dress a little brighter and without measure splash of perfume before going out, see the novelty is quite a useful thing. So men should be in your arsenal, add a wireless camera that can freely connect to «Wi-Fi» – «£ 79.99 Smart-i Wireless Spy Camera».

Little Spy Camera Smart-i

You may ask: so the camera has a small size? The camera, in fact, nothing more than a simple walnut, but it has good features to shoot video, but the very resolution of the camera is 640 x 480 pixels (VGA). Image of the video will be sent to you in the direct mode, on «Mac», «iPhone», «PC», or any other device that works on the basis of «Android». Filmed material also remain in the memory of relieving device, and you do not even need to buy additional «SD» – cards.

When fully charged, the «Smart-i Wireless Spy Camera», the camera can shoot for two hours, when, what can burn, when poor lighting conditions and from a distance up to 100 m. When installing the camera, be sure that the room (room) temperature does not drop below 10 ° C, and does not rise above 50° C, otherwise the camera will cause interference. This amazing gadget can be useful both for you and for your family, loved ones and acquaintances friends.