recentpopularlog in


« earlier   
The Torturers Speak - The New York Times
When pushed to confront the horror and uselessness of what they had done, the psychologists fell back on one of the oldest justifications of wartime. “We were soldiers doing what we were instructed to do,” Dr. Jessen said. Perhaps, but they were also soldiers whose contracting business was paid more than $81 million.
torture  corruption  capitalism  war  cia  tradecraft 
23 hours ago by craniac
Apple’s AirPort not cracked by CIA program that compromised many other routers | iLounge News
The latest round of Vault 7 WikiLeaks documents details how the CIA was able to break into routers and use them to monitor a subject’s web browsing history and intercept passwords, but Apple’s AirPort appears to have been unaffected by the efforts. The agency’s “Cherry Blossom” project ended up gaining access to routers from Asus, Belkin, Buffalo, Dell, DLink, Linksys, Motorola, Netgear, Senao, and US Robotics through one of two methods — use of a still-unknown tool called a “Claymore” or through a direct “supply-chain operation” by accessing a production factory or other part of a company’s distribution chain. While the list of affected hardware was extensive, the “Harpy Eagle” operation targeting Apple’s AirPort never proved successful. After the initial release of the CIA documents confirmed Apple to be a target of the overall program, the company confirmed that most of the exploits that had been revealed were already patched in iOS 10. [via Apple Insider]
CIA  firmware  gov2.0  hack  privacy  router  security  wi-fi  wikileaks  apple 
6 days ago by rgl7194
Vladimir Putin: The Most Powerful Person In The World -
Former CIA official John Stockwell wrote: “It is the function of the CIA to keep the world unstable, and to propagandize and teach the American people to hate, so we will let the Establishment spend any amount of money on arms.” The hatred and distrust of Russia that the West is currently being force-fed reflects Stockwell’s revelation, as does the orchestrated hatred and distrust of Muslims that has supported Washington’s destruction in whole or part of seven countries and trillions of dollars in new US war debt.
cia  russia  putin  conspiracy 
6 days ago by foliovision
CIA Created Toolkit for Hacking Hundreds of Routers Models
After a two-week hiatus, WikiLeaks dumped new files as part of the Vault 7 series that supposedly contains CIA-made hacking tools the organization claims it received from hackers and agency insiders.
Today's dump includes the documentation for a CIA tool named CherryBlossom, a multi-purpose framework developed for hacking hundreds of home router models.
The tool is by far one of the most sophisticated CIA malware frameworks in the CIA's possession. The purpose of CherryBlossom is to allow operatives to interact and control SOHO routers on the victim's network.
hack  security  privacy  router  wi-fi  gov2.0  CIA  firmware  wikileaks 
7 days ago by rgl7194
Wikileaks Unveils 'Cherry Blossom' — Wireless Hacking System Used by CIA
WikiLeaks has published a new batch of the ongoing Vault 7 leak, this time detailing a framework – which is being used by the CIA for monitoring the Internet activity of the targeted systems by exploiting vulnerabilities in Wi-Fi devices.
Dubbed "Cherry Blossom," the framework was allegedly designed by the Central Intelligence Agency (CIA) with the help of Stanford Research Institute (SRI International), an American nonprofit research institute, as part of its ‘Cherry Bomb’ project.
Cherry Blossom is basically a remotely controllable firmware-based implant for wireless networking devices, including routers and wireless access points (APs), which exploits router vulnerabilities to gain unauthorized access and then replace firmware with custom Cherry Blossom firmware.
hack  security  privacy  router  wi-fi  gov2.0  CIA  firmware  wikileaks 
7 days ago by rgl7194
Advanced CIA firmware has been infecting Wi-Fi routers for years | Ars Technica
Latest Vault7 release exposes network-spying operation CIA kept secret since 2007.
Home routers from 10 manufacturers, including Linksys, DLink, and Belkin, can be turned into covert listening posts that allow the Central Intelligence Agency to monitor and manipulate incoming and outgoing traffic and infect connected devices. That's according to secret documents posted Thursday by WikiLeaks.
hack  security  privacy  router  wi-fi  gov2.0  CIA  firmware  wikileaks 
7 days ago by rgl7194

Copy this bookmark:

to read