• News Categories
    ▼
    • Surveillance & Technology
    • U.S. News & Reports
    • International News
    • Finance
    • Defense & Security
    • Politics
    • Videos
  • Blog
  • Directory
  • Support Us
  • About
  • Contact

T-Room

The Best in Alternative News

  • News Categories
    • Surveillance & Technology
    • U.S. News & Reports
    • International News
    • Finance
    • Defense & Security
    • Politics
    • Videos
  • Blog
  • Directory
  • Support Us
  • About
  • Contact
Dumbo_CIA_Vault7_WikiLeaks

This Is How CIA Disables Security Cameras During Hollywood-Style Operations…

August 3, 2017 at 7:23 pm

In last 20 years, we have seen hundreds of caper/heist movies where spies or bank robbers hijack surveillance cameras of secure premises to either stop recording or set up an endless loop for covert operations without leaving any evidence. Whenever I see such scenes in a movie, I wonder and ask myself: Does this happen […]

Vault7_WikiLeaks_CIA_The_Hacker_News

WikiLeaks Vault 7 Release: 3 New CIA-Developed Hacking Tools for MacOS & Linux Exposed…

July 27, 2017 at 8:51 pm

WikiLeaks has just published a new set of classified documents linked to another CIA project, dubbed ‘Imperial,’ which reveals details of at least three CIA-developed hacking tools and implants designed to target computers running Apple Mac OS X and different flavours of Linux operating systems. If you are a regular reader of THN, you must […]

Screenshot_07102017_The_Hacker_News

Vault 7: WikiLeaks Unveils CIA Implants That Steal SSH Credentials from Windows & Linux PCs…

July 10, 2017 at 8:08 pm

WikiLeaks has today published the 15th batch of its ongoing Vault 7 leak, this time detailing two alleged CIA implants that allowed the agency to intercept and exfiltrate SSH (Secure Shell) credentials from targeted Windows and Linux operating systems using different attack vectors. Secure Shell or SSH is a cryptographic network protocol used for remote […]

computers

Wikileaks Publishes Secret CIA Tools That Attacked Computers Inside Offices…

May 5, 2017 at 11:28 am

WikiLeaks published on May 5 “Archimedes”, a tool used by the CIA to attack a computer inside a Local Area Network (LAN), usually used in offices. It allows the re-directing of traffic from the target computer inside the LAN through a computer infected with this malware and controlled by the CIA…

iphone_fingerprints

iPhones Are iSpies (VIDEO)…

April 26, 2017 at 11:42 am

Most of us carry smartphones and watch web-enabled TVs without much thought. But the revelations found in Wikileaks’ “Vault 7” release warn that we should consider the sinister capabilities that such devices could lend to those who might abuse them. Since launching in 2006, Wikileaks has reportedly released over 10 million documents, including controversial disclosures […]

CIA_Hive_Beacon_Operational_Infrastructure

#Vault 7: The CIA’s HIVE Project…

April 14, 2017 at 2:52 pm

HIVE is a back-end infrastructure malware with a public-facing HTTPS interface which is used by CIA implants to transfer exfiltrated information from target machines to the CIA and to receive commands from its operators to execute specific tasks on the targets. HIVE is used across multiple malware implants and CIA operations. The public HTTPS interface […]

vault

WikiLeaks Vault 7: CIA Tool ‘Marble Framework’ Used in Code to Hide Origin of Viruses, Trojans and Hacking…

March 31, 2017 at 9:56 am

676 source code files for the CIA’s secret anti-forensic Marble Framework. Marble is used to hamper forensic investigators and anti-virus companies from attributing viruses, trojans and hacking attacks to the CIA. Marble does this by hiding (“obfuscating”) text fragments used in CIA malware from visual inspection. This is the digital equivallent of a specalized CIA […]

Julian_Assange_WikiLeaks_GettyImages

Whoops: The DOJ May Have Confirmed Some of the Wikileaks CIA Dump…

March 28, 2017 at 1:40 pm

The US government says it wants to keep some of the now-public documents out of court because they contain classified material, suggesting that they could be authentic. Last week, the US government may have confirmed the authenticity of a number of CIA documents concerning the agency’s hacking operations, but not in the way you might […]

Amazon_Echo

Amazon Echo Shuts Down Over CIA Connection Query (VIDEO)…

March 9, 2017 at 8:56 pm

The WikiLeaks ‘Vault 7’ data dump allegedly detailing CIA hacking tactics has again thrown the privacy of electronic devices into focus. One viral video showing an Amazon Echo refusing to confirm a link to the US spy agency is summing up people’s fears. On Tuesday, Wikileaks unexpectedly released 8,761 documents claiming to reveal “CIA hacking […]

Binney and McGovern Award in DC

Ray McGovern, Former CIA, and Bill Binney, Former NSA, Discuss Latest WikiLeaks Disclosures (MUST LISTEN)…

March 9, 2017 at 7:24 pm

Yep, “they” really are keeping track of all of us and what we are doing, and have developed computer technology that can do things like take control of your automobile. On March 7, after the WikiLeaks release earlier that day, Bill and Ray discussed the release, and more, in a relaxed conversation moderated by WBAI’s […]

  • 1
  • 2
  • Next Page »

Your Ad Here

Any publication posted at The T-Room and/or opinions expressed therein do not necessarily reflect the views of The T-Room. Such publications and all information within the publications (e.g. titles, dates, statistics, conclusions, sources, opinions, etc) are solely the responsibility of the author of the article, not The T-Room.

Twitter Icon

View Old Archives

Copyright © 2025 T-Room

Site by Creative Visual Design