.

New Documents From Wikileaks Expose How The CIA Exploits Wireless Devices

In the latest ongoing WikiLeaks whistleblowing scandal, the website has published documents from the CIA’s CherryBlossom project, exposing a...

In the latest ongoing WikiLeaks whistleblowing scandal, the website has published documents from the CIA’s CherryBlossom project, exposing agency’s exploitation of Wi-Fi device security vulnerabilities. 

Released on Thursday, the new batch of CIA classified documents comes from the Vault 7 project.

In a press release, WikiLeaks said:

“Today, June 15th 2017, WikiLeaks publishes documents from the CherryBlossom project of the CIA that was developed and implemented with the help of the US nonprofit Stanford Research Institute (SRI International).”


CherryBlossom monitors the Internet activity of, and performs software exploits on, targets of interest. According to the press release:

In particular, CherryBlossom is focused on compromising wireless networking devices, such as wireless routers and access points (APs), to achieve these goals.

Such Wi-Fi devices are commonly used as part of the Internet infrastructure in private homes, public spaces (bars, hotels or airports), small and medium sized companies as well as enterprise offices.

Therefore these devices are the ideal spot for “Man-In-The-Middle” attacks, as they can easily monitor, control and manipulate the Internet traffic of connected users.

The devices work by compromising the data stream between the user and Internet services. The end result is control and manipulation of  router user traffic.

According to WikiLeaks, CherryBlossom has been infecting Wi-Fi routers of D-Link, Belkin, and Linskys companies for years.

To implant the customized CherryBlossom firmware on a wireless device, no physical access is required, making the operation dangerously stealthy.

This is because some devices allow their firmware to be upgraded over a wireless link.

The new firmware on the device can be used to ignite the router into a “FlyTrap,” which can scan for “email addresses, chat usernames, MAC addresses and VoIP numbers” in passing network traffic.

WikiLeaks has been releasing documents of the Vault 7 since March 7, its first full part revealing 8,761 documents.

The most recent release prior to CherryBlossom occurred on June 1, and involved the “Pandemic” spyware.

By Alexa Erickson, Guest author

Dear Friends,
HumansAreFree is and will always be free to access and use. If you appreciate my work, please help me continue.

Stay updated via Email Newsletter:

Related

Wi-Fi Dangers 3143910859583816187

recommended

Sponsors

Donate PayPal

Sponsors

Translate

Sponsor

Recommended

Tag cloud

About me (3) Agenda 2030 (14) Alzheimer's (8) Art. in German (33) Ayahuasca (9) Big Brother (71) Big Pharma (5) Bilderberg (22) Black Knight (2) Brexit (1) Brzezinski (1) Caeli Francisco (24) Cancer (271) Censorship (4) Chemtrails (55) Clinton (36) Cold War 2 (56) Consciousness (13) Conspiracy (1022) Control (785) Cosmos (198) Crisis Actors (7) Crop Circles (9) Crystal Skulls (1) Dejan Davchevski (29) Depopulation (117) Diabetes (5) Documentaries (112) DuPont (2) Ebola (5) Education (70) Empaths (27) ETs UFOs (529) False Flags (99) Fasting (9) FEMA (4) Finance (155) Fluoride (18) Forbidden History (539) Free Energy (52) Free Spirit (8) Freemasonry (8) Fukushima (52) Geoengineering (49) George Soros (18) Global Warming Hoax (33) GMO (53) Guest Writers (5) HAARP (15) Healthcare (1311) Hemp (110) Henry Kissinger (3) Hollow Earth (13) Illuminati (49) Inspiration (683) Inspirational Public Figures (23) JFK (9) Julian Websdale (16) Julie Alexander (12) Khali Carol (7) Lisa Morris (1) Makia Freeman (4) Mandela Effect (3) Mari A. Raphael (2) Mark Nestmann (11) Meditation (20) Michael Martin (6) Microchip Implant (14) Mind Control (108) Monsanto (31) MSM (75) Mysteries (451) News (1105) Nikola Tesla (15) Nuclear Hazard (45) NWO (270) OOPArt (15) Orlando Shooting (6) PhD Anonymous (20) Pienaar Arno (16) Pineal Gland (11) PizzaGate (18) Planet X (4) Pole Shift (8) Police State (53) Preppers (25) Project MKUltra (25) Propaganda (18) Pyramids (73) Q and A (6) Quotes (12) Recent Articles (5487) Reincarnation (49) Religion (2) Rene’ Descartes (10) Rockefeller (20) Rothschild (63) Sacred Geometry (1) Sacred Water (7) Sandy Hook (5) Satanism (52) Satanist Pedophiles (146) Science (186) Secret Societies (27) Spirituality (832) Sponsor Books (3) Strange Murders (3) Sun-gazing (1) Sustainable Housing (6) Symbolism (1) Synchronicity (3) The Anunnaki (103) The Bush Family (2) The Matrix (91) The Vatican (35) Time Travel (10) TROLLS (7) Vaccines (124) Videos (270) Voting is Rigged (23) War (83) War on Cash (6) War on Drugs (13) Wheatgrass (1) Wi-Fi Dangers (9) Wisdom (51) WTC (9/11) (54) Zephyr Prayers (3) Zika Virus (16) Zionism (8) Zodiac (9)

Like & Follow

Sponsors

Pageviews

item