Spies!

Last Updated: 12/13/2021 12:16:52 AM



spysat.txt
6553 bytes. by Tradeser
Spy Satellites
Privacy  
keykatch.gif
35987 bytes. (2001)
The KeyKatch
Espionage   Listening Devices   Specimen  
The Keykatch Monitors computer use in the home or the office and insures computer usage policy compliance This device records all keystrokes in a non-volatile memory for later retrieval. While intended for use as a policy compliance assurance device, it could also be used to snarf passwords, confidential outgoing emails, the filenames of accessed documents, and so on. Because it can be installed in 10 seconds, stealth installation is possible. Unlike software keyloggers, this device does not require shell access to the compromised machine - it just plugs in and works...
hanssena.pdf
159997 bytes. by S. Pluta (2001)
The Hanssen Affidavit
Espionage  
How Robert Hanssen got away with spying for the Russians for 15 years - The affidavit in support of his arrest
amesxsm1.htm
38430 bytes. by DoJ (1997)
A Review of the FBI's Performance in Uncovering the Espionage Activities of Aldrich Hazen Ames
Espionage  
hanssenl.txt
2634 bytes. by R. Hanssen (2001)
Robert Hanssen's last letter to his Russian handlers
Espionage  
Feb. 18, 2001
espionge.htm
42927 bytes. (2001)
ESP of Espionage - Have the Russians and CIA been working on the ultimate Wetware hack?
Big Brother   Wetware Hacking  
kimstamp.jpg
11920 bytes. (1990)
The Kim Philby stamp
Espionage  
British turncoat spy "Kim" Philby was so loved by the Russians that they put him on a stamp after his death!
road.htm
23549 bytes. (2002)
Are you being set up to be recruited as a spy?
Espionage  
insider.htm
19680 bytes. (2002)
Insider Espionage
Espionage  
135310.pdf
79849 bytes. (2002)
Under-Door Remote Viewing Kit Manual!
Espionage  
codename.htm
5193 bytes.
How the DOD assigns Code names

spyware.htm
20718 bytes. (2001)
A list of known spyware
Privacy  
hayden.pdf
376022 bytes. (2002)
The NSA tries to get congress to let them aim Echelon at Americans!
Big Brother  
Testimony before Congress of Lieutenant General Michael Hayden, Oct. 17, 2002
echelone.pdf
888271 bytes. (2001)
Working Document in preparation for a report on the existence
Espionage  
of a global system for intercepting private and commercial communications (ECHELON interception system)
nightvis.txt
5564 bytes.
Night Vision techniques
Espionage  
sschools.txt
79270 bytes.
Spy Schools

intcom.htm
5969 bytes. by Texas A&M (1997)
Intercepting your Communications - Overview and Countermeasures [Texas A&M]
Espionage  
usarinr.htm
205633 bytes. by 434th Military Intelligence Detachment
Open Source Intelligence Resources for the Intelligence Professional

embook.pdf
567645 bytes. (2002)
Offender Supervision With Electronic Technology
Big Brother   Privacy  
05-01.pdf
295320 bytes. (2001)
Biometrics - Technologies for Highly Secure Personal Identification
Privacy  
szady0.htm
16197 bytes. by Szady (2002)
Congressional Statement: Changes the FBI is Making to the Counterintelligence Program
Espionage  
spookapt.gif
25679 bytes. (2002)
What the neighbours are doing...
Espionage   Humor  
tia_ca~1.gif
21280 bytes. (2002)
Diagram removed from DARPA's TIA site - TIA's organizational categories
Espionage  
tia_gr~1.gif
64154 bytes. (2002)
Here's the diagram they put up in its place
Espionage  
xray.htm
26020 bytes. (2002)
Through-the-wall detection of humans - X-Ray Vision is here!
Espionage   Privacy  
millivis.htm
22301 bytes. (2002)
Millimeter wave imaging systems can see through walls
Espionage   Privacy  
carniv.htm
25347 bytes. (2000)
Who's Afraid of Carnivore?
Big Brother  
spywarev.txt
7937 bytes. (2002)
Spyware: The Evolution
Privacy  
lying.htm
43360 bytes. by G.Maschke (1999)
The Lying Game
Privacy   Wetware Hacking  
r195_6.pdf
1468071 bytes. by US Army (1995)
Department of the Army Polygraph Activities
Privacy   Wetware Hacking  
dodpi95.htm
90783 bytes. by DoDPI (1995)
A Comparison Of Psychophysiological Detection Of Deception Accuracy Rates
Privacy   Wetware Hacking  
Obtained Using The Counterintelligence Scope Polygraph And The Test For Espionage And Sabotage Question Formats
dodpi95a.htm
19326 bytes. by DoDPI (1995)
Psychophysiological Detection of Deception Accuracy Rates Obtained Using the Test for Espionage and Sabotage
Privacy   Wetware Hacking  
d0222.pdf
313355 bytes. by GAO (2001)
INVESTIGATIVE TECHNIQUES
Privacy   Wetware Hacking  
Federal Agency Views on the Potential Application of "Brain Fingerprinting"
tes-exv.htm
9379 bytes.
Test of Espionage and Sabotage (TES) Expansion and Validation Study
Privacy   Wetware Hacking  
tes-br.htm
19271 bytes. (1994)
A New Psychophysiological Detection of Deception Examination for Security Screening
Privacy   Wetware Hacking  
dodpi97.pdf
1368108 bytes. (1997)
Psychophysiological Detection of Deception accuracy Rates
Privacy   Wetware Hacking  
dodpi97a.pdf
29156 bytes. (1997)
TES Administration Guidelines
Privacy   Wetware Hacking  
dodpi97b.pdf
567247 bytes. by DoD
PDD Test Data Analysis
Privacy   Wetware Hacking  
polyfaq.htm
54537 bytes. (2002)
Polygraph FAQ
Privacy   Frequently Asked Questions   Wetware Hacking  
liebld.pdf
738982 bytes. (2002)
The Lie Behind the Lie Detector
Privacy   Wetware Hacking  
dodpim.pdf
5175549 bytes. (1991)
DOD Interview and Interrogation Manual
Privacy   Wetware Hacking  
Questioning Techniques for Polygraphers
terroris.pdf
1258950 bytes. by Janet Reno (1995)
Attorney General Guidelines for FBI Foreign Intelligence Collection
Espionage  
and Foreign Counterintelligence Investigations
art024.pdf
1658010 bytes. (1953)
Can Criminals Beat Lie Detectors?
Privacy   Wetware Hacking  
161746.htm
230720 bytes. (1963)
CIA Manual - KUBARK Counterintelligence Interrogation

vaneck1.txt
2594 bytes. (2002)
What is Van Eck Phreaking?
Espionage   TEMPEST  
whattemp.txt
5478 bytes. (2001)
What was TEMPEST?
Espionage   TEMPEST  
ih98-tmp.pdf
477348 bytes. (1999)
Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations
Espionage   TEMPEST  
emr.pdf
719375 bytes. by W. Van Eck (1985)
Wim Van Eck's original paper on the basis of TEMPEST
Espionage   TEMPEST  
mmwave.jpg
4430 bytes. (2003)
The first picture taken with a T-Ray (millimeter wave) sensor
Espionage  
beatimag.txt
2416 bytes. (2003)
Defeating classified US Government X-Ray Vision
Espionage  
(most likely refers to recent millimeter-wave imaging developments)
trktemp1.pdf
414450 bytes. by TšBITAK UEKAE (1999)
The Turkish TEMPEST files
Espionage   TEMPEST  
Signal Processing Applications for Information Extraction from the Radiation of VDUs
trktemp2.pdf
240023 bytes. by TšBITAK UEKAE (1999)
The Turkish TEMPEST files
Espionage   TEMPEST  
Information Extraction from the Radiation of VDUs by Pattern Recognition Methods
opt-temp.pdf
411957 bytes. (2002)
Optical TEMPEST?
Espionage  
Everyone knows you can eavesdrop on a computer monitor with a telescope. But did you know it is possible to reconstruct what is on a screen that is facing away from you by its diffuse reflection on a nearby wall? EMR shielding can't protect you from this method!
opttemp2.pdf
382771 bytes. (2002)
More Optical Tempest
Espionage  
This paper deals with the analysis of patterns of LED status indicators to reconstruct serial data.
trdcraft.txt
6679 bytes. (2003)
Tradecraft Jargon
Espionage  
spycraft.txt
8713 bytes. (2001)
The Compleat Spy: Tradecraft
Espionage  
axioms.txt
12975 bytes. (2003)
15 Axioms for Intelligence Analysts
Espionage  
fboi.zip
1500216 bytes. by CIA
Factbook on Intelligence
Espionage  
anonbkd.txt
4636 bytes. (2003)
Popular Net Anonymity Service Backdoored by court order!
Privacy  
bt951.txt
2253 bytes. (2003)
WorldFlash - Spyware
Advisory   Privacy   Windows  
barbro.txt
4199 bytes. (2003)
Have a Drink with Big Brother
Privacy  
060500-1.jpg
93800 bytes. (2000)
Carnivore FOIA Test Report 2000/06/05 1/3
Privacy   Scanned Document  
060500-2.jpg
114837 bytes. (2000)
Carnivore FOIA Test Report 2000/06/05 2/3
Privacy   Scanned Document  
060500-3.jpg
59848 bytes. (2000)
Carnivore FOIA Test Report 2000/06/05 3/3
Privacy   Scanned Document  
army.jpg
63760 bytes. (2000)
Carnivore FOIA document - US Army's request for Carnivore
Privacy   Scanned Document  
carnivr1.jpg
69000 bytes. (2000)
Carnivore 1.3 Features
Privacy   Scanned Document  
carnivr2.jpg
49516 bytes. (2000)
Carnivore 2.0 Features
Privacy   Scanned Document  
carnivr3.jpg
26347 bytes. (2000)
Carnivore 3.0 Features
Privacy   Scanned Document  
carnrvw1.jpg
40283 bytes. (2000)
Carnivore Review FOIA
Privacy   Scanned Document  
carnrvw2.jpg
28723 bytes. (2000)
Carnivore Review FOIA
Privacy   Scanned Document  
carnrvw3.jpg
112519 bytes. (2000)
Carnivore Review FOIA
Privacy   Scanned Document  
carntst1.jpg
77357 bytes. (2000)
Carnivore Testing FOIA
Privacy   Scanned Document  
carntst2.jpg
46687 bytes. (2000)
Carnivore Testing FOIA
Privacy   Scanned Document  
carntst3.jpg
89444 bytes. (2000)
Carnivore Testing FOIA
Privacy   Scanned Document  
carntst4.jpg
83818 bytes. (2000)
Carnivore Testing FOIA
Privacy   Scanned Document  
carntst5.jpg
103559 bytes. (2000)
Carnivore Testing FOIA
Privacy   Scanned Document  
carntst6.jpg
80031 bytes. (2000)
Carnivore Testing FOIA
Privacy   Scanned Document  
carntst7.jpg
66764 bytes. (2000)
Carnivore Testing FOIA
Privacy   Scanned Document  
deploy1.jpg
63131 bytes. (2000)
Carnivore FOIA Deployment records 1/4
Privacy   Scanned Document  
deploy2.jpg
54757 bytes. (2000)
Carnivore FOIA Deployment records 2/4
Privacy   Scanned Document  
deploy3.jpg
58015 bytes. (2000)
Carnivore FOIA Deployment records 3/4
Privacy   Scanned Document  
deploy4.jpg
38190 bytes. (2000)
Carnivore FOIA Deployment records 4/4
Privacy   Scanned Document  
diagram1.jpg
36232 bytes. (2000)
Carnivore FOIA Diagrams 1/4
Privacy   Scanned Document  
diagram2.jpg
80607 bytes. (2000)
Carnivore FOIA Diagrams 2/4
Privacy   Scanned Document  
diagram3.jpg
107586 bytes. (2000)
Carnivore FOIA Diagrams 3/4
Privacy   Scanned Document  
diagram4.jpg
51905 bytes. (2000)
Carnivore FOIA Diagrams 4/4
Privacy   Scanned Document  
dragon1.jpg
112031 bytes. (2000)
Carnivore FOIA Dragon Net Proposal 1/2
Privacy   Scanned Document  
dragon2.jpg
53064 bytes. (2000)
Carnivore FOIA Dragon Net Proposal 2/2
Privacy   Scanned Document  
notes1.jpg
79411 bytes. (2000)
Carnivore FOIA notes 1/3
Privacy   Scanned Document  
notes2.jpg
68413 bytes. (2000)
Carnivore FOIA notes 2/3
Privacy   Scanned Document  
notes3.jpg
57912 bytes. (2000)
Carnivore FOIA notes 3/3
Privacy   Scanned Document  
omnicls1.jpg
43113 bytes. (2000)
Omnivore Project Closeout 1/8 FOIA
Privacy   Scanned Document  
omnicls2.jpg
36853 bytes. (2000)
Omnivore Project Closeout 2/8 FOIA
Privacy   Scanned Document  
omnicls3.jpg
59574 bytes. (2000)
Omnivore Project Closeout 3/8 FOIA
Privacy   Scanned Document  
omnicls4.jpg
76685 bytes. (2000)
Omnivore Project Closeout 4/8 FOIA
Privacy   Scanned Document  
omnicls5.jpg
107014 bytes. (2000)
Omnivore Project Closeout 5/8 FOIA
Privacy   Scanned Document  
omnicls6.jpg
63894 bytes. (2000)
Omnivore Project Closeout 6/8 FOIA
Privacy   Scanned Document  
omnicls7.jpg
75992 bytes. (2000)
Omnivore Project Closeout 7/8 FOIA
Privacy   Scanned Document  
omnicls8.jpg
46397 bytes. (2000)
Omnivore Project Closeout 8/8 FOIA
Privacy   Scanned Document  
omnidsn.jpg
62374 bytes. (2000)
Omnivore Design FOIA
Privacy   Scanned Document  
omnilog.jpg
96801 bytes. (2000)
Omnivore Logon Window FOIA
Privacy   Scanned Document  
omnirvw1.jpg
49502 bytes. (2000)
Omnivore Review FOIA
Privacy   Scanned Document  
omnirvw2.jpg
63163 bytes. (2000)
Omnivore Review FOIA
Privacy   Scanned Document  
omnirvw3.jpg
43831 bytes. (2000)
Omnivore Review FOIA
Privacy   Scanned Document  
omnirvw4.jpg
69093 bytes. (2000)
Omnivore Review FOIA
Privacy   Scanned Document  
omniv01.jpg
31060 bytes. (2000)
Omnivore Capabilities 1/11 FOIA
Privacy   Scanned Document  
omniv02.jpg
74469 bytes. (2000)
Omnivore Capabilities 2/11 FOIA
Privacy   Scanned Document  
omniv03.jpg
69974 bytes. (2000)
Omnivore Capabilities 3/11 FOIA
Privacy   Scanned Document  
omniv04.jpg
58249 bytes. (2000)
Omnivore Capabilities 4/11 FOIA
Privacy   Scanned Document  
omniv05.jpg
57551 bytes. (2000)
Omnivore Capabilities 5/11 FOIA
Privacy   Scanned Document  
omniv06.jpg
57515 bytes. (2000)
Omnivore Capabilities 6/11 FOIA
Privacy   Scanned Document  
omniv07.jpg
61962 bytes. (2000)
Omnivore Capabilities 7/11 FOIA
Privacy   Scanned Document  
omniv08.jpg
88432 bytes. (2000)
Omnivore Capabilities 8/11 FOIA
Privacy   Scanned Document  
omniv09.jpg
27960 bytes. (2000)
Omnivore Capabilities 9/11 FOIA
Privacy   Scanned Document  
omniv10.jpg
26688 bytes. (2000)
Omnivore Capabilities 10/11 FOIA
Privacy   Scanned Document  
omniv11.jpg
24775 bytes. (2000)
Omnivore Capabilities 11/11 FOIA
Privacy   Scanned Document  
omnivor1.jpg
92103 bytes. (2000)
Carnivore FOIA Omnivore Proposal 1/5
Privacy   Scanned Document  
omnivor2.jpg
92889 bytes. (2000)
Carnivore FOIA Omnivore Proposal 2/5
Privacy   Scanned Document  
omnivor3.jpg
79320 bytes. (2000)
Carnivore FOIA Omnivore Proposal 3/5
Privacy   Scanned Document  
omnivor4.jpg
93294 bytes. (2000)
Carnivore FOIA Omnivore Proposal 4/5
Privacy   Scanned Document  
omnivor5.jpg
28129 bytes. (2000)
Carnivore FOIA Omnivore Proposal 5/5
Privacy   Scanned Document  
phiple1.jpg
68564 bytes. (2000)
Phiple Troenix - transition from Omnivore to Carnivore FOIA
Privacy   Scanned Document  
phiple2.jpg
70315 bytes. (2000)
Phiple Troenix - transition from Omnivore to Carnivore FOIA
Privacy   Scanned Document  
phiple3.jpg
45233 bytes. (2000)
Phiple Troenix - transition from Omnivore to Carnivore FOIA
Privacy   Scanned Document  
project1.jpg
28536 bytes. (1999)
Carnivore FOIA Related Projects 1/3
Privacy   Scanned Document  
project2.jpg
65829 bytes. (1999)
Carnivore FOIA Related Projects 2/3
Privacy   Scanned Document  
project3.jpg
47158 bytes. (1999)
Carnivore FOIA Related Projects 3/3
Privacy   Scanned Document  
purpose.jpg
111610 bytes. (2000)
Carnivore Purpose FOIA
Privacy   Scanned Document  
questns1.jpg
67338 bytes. (2000)
Carnivore FOIA Questions about Enhanced Carnivore 1/3
Privacy   Scanned Document  
questns2.jpg
73912 bytes. (2000)
Carnivore FOIA Questions about Enhanced Carnivore 2/3
Privacy   Scanned Document  
questns3.jpg
30922 bytes. (2000)
Carnivore FOIA Questions about Enhanced Carnivore 3/3
Privacy   Scanned Document  
smchart.jpg
9640 bytes. by FBI (2001)
The FBI's diagram of how DCS1000 (formerly Carnivore) works
Privacy  
carnivrv.pdf
9670917 bytes. by IITRI (2000)
Independent Technical Review of the Carnivore System
Privacy  
echelonf.htm
33455 bytes. by ACLU (2001)
ECHELON FAQ
Big Brother   Espionage   Frequently Asked Questions  
echcp.htm
14716 bytes. by ACLU (2001)
Echelon's Counterparts in the USA and abroad
Big Brother   Espionage  
p415.htm
13283 bytes.
Project P415, or Echelon
Big Brother  
originsa.pdf
9047015 bytes. by NSA
The Origins of the NSA

intern~1.pdf
222192 bytes. (2003)
Intelligence Resources on the Internet
Espionage  
biometry.txt
14227 bytes.
Video Surveillance, Biometrics, Voiceprinting - terrifying information on how Big Brother will track your every move wtih ease

echelon.doc
90112 bytes. (2000)
About ECHELON
Privacy  
scanning.txt
10417 bytes.
Scanning: The art of non-selective intervention
Privacy  
getinfo.txt
5978 bytes. (1989)
The Hacker's Guide to Investigations
Investigations  
nsarmail.txt
1739 bytes.
The CIA and NSA are running popular remailers! Can you really get net privacy???
Big Brother  
spytop10.txt
18243 bytes. (1999)
The top 10 things that corporate spies don't want their targets to know!
Investigations  
comint.txt
41743 bytes. (1999)
Covert Government/Military Interception of International Telecommunications
Big Brother  
lookup.txt
1764 bytes.
Sources for looking people up
Investigations  
5espion.txt
10470 bytes.
Espionage Awareness Programs
Privacy  
contel~1.txt
54455 bytes.
The FBI's Counterintelligence Program
Big Brother  
unshred.txt
2236 bytes. (2001)
The "Unshredder" software seen on "The Lone Gunmen" DOES exist!
Privacy  

Site design & layout copyright © 2024 TUCoPS