div class=trans-pagebuttonPage 1button div class=trans-image amp-img class=trans-thumb alt=Page 1: wikileaksorg · 2015 8 21 · HOW DOES ITWORK Deployment and Capabilities Just as it sounds engaging in a man-in-the-middle attack requires the interception device to be placed src=https:reader033fdocumentsinreader033viewer20220608186097875935ccfe13074c5889html5thumbnails1jpg width=142 height=106 layout=responsive amp-img divdivdiv class=trans-pagebuttonPage 2button div class=trans-image amp-img class=trans-thumb alt=Page 2: wikileaksorg · 2015 8 21 · HOW DOES ITWORK Deployment and Capabilities Just as it sounds engaging in a man-in-the-middle attack requires the interception device to be placed src=https:reader033fdocumentsinreader033viewer20220608186097875935ccfe13074c5889html5thumbnails2jpg width=142 height=106 layout=responsive amp-img divdivdiv class=trans-pagebuttonPage 3button div class=trans-image amp-img class=trans-thumb alt=Page 3: wikileaksorg · 2015 8 21 · HOW DOES ITWORK Deployment and Capabilities Just as it sounds engaging in a man-in-the-middle attack requires the interception device to be placed src=https:reader033fdocumentsinreader033viewer20220608186097875935ccfe13074c5889html5thumbnails3jpg width=142 height=106 layout=responsive amp-img divdivdiv class=trans-pagebuttonPage 4button div class=trans-image amp-img class=trans-thumb alt=Page 4: wikileaksorg · 2015 8 21 · HOW DOES ITWORK Deployment and Capabilities Just as it sounds engaging in a man-in-the-middle attack requires the interception device to be placed src=https:reader033fdocumentsinreader033viewer20220608186097875935ccfe13074c5889html5thumbnails4jpg width=142 height=106 layout=responsive amp-img divdiv