{"id":75755,"date":"2017-06-19T20:00:24","date_gmt":"2017-06-20T00:00:24","guid":{"rendered":"https:\/\/stateofthenation2012.com\/?p=75755"},"modified":"2017-06-19T20:00:24","modified_gmt":"2017-06-20T00:00:24","slug":"new-documents-from-wikileaks-expose-how-the-cia-exploits-wireless-devices","status":"publish","type":"post","link":"https:\/\/stateofthenation2012.com\/?p=75755","title":{"rendered":"New Documents From WikiLeaks Expose How The CIA Exploits Wireless Devices"},"content":{"rendered":"<p><!--more--><\/p>\n<figure class=\"entry-thumbnail\"><img decoding=\"async\" title=\"Wiki cherry feat 6 17 17 (1)\" src=\"http:\/\/www.thelibertybeacon.com\/wp-content\/uploads\/2017\/06\/Wiki-cherry-feat-6-17-17-1.jpg\" alt=\"\" \/><\/figure>\n<h2>New Documents From WikiLeaks Expose How The CIA Exploits Wireless Devices<\/h2>\n<h4><em>by Alexa Erickson<br \/>\n<\/em>The Liberty Free Beacon<\/h4>\n<h4>In the latest ongoing WikiLeaks whistleblowing scandal, the website has published documents from the CIA\u2019s CherryBlossom project, exposing agency\u2019s exploitation of Wi-Fi device security\u00a0vulnerabilities. Released on Thursday, the new batch of CIA classified documents comes from the <a href=\"http:\/\/www.thelastamericanvagabond.com\/technology\/real-point-wikileaks-vault-7\/\" target=\"_blank\" rel=\"noopener\">Vault 7 project<\/a>.<\/h4>\n<h4 class=\"b-article__lead\">In <a href=\"http:\/\/wikileaks.org\/vault7\/#CherryBlossom\" target=\"_blank\" rel=\"noopener\">a press release<\/a>, WikiLeaks said: \u201cToday, June 15th 2017, WikiLeaks publishes documents from the <em>CherryBlossom\u00a0<\/em>project of the CIA that was developed and implemented with the help of the US nonprofit <a href=\"http:\/\/www.sri.com\/\" target=\"_blank\" rel=\"noopener\">Stanford Research Institute (SRI International)<\/a>.\u201d<\/h4>\n<h4 class=\"b-article__lead\">CherryBlossom\u00a0monitors the Internet activity of, and performs software exploits on, targets of interest.\u00a0According to the press release:<\/h4>\n<blockquote>\n<p class=\"b-article__lead\"><strong>In particular, <em>CherryBlossom<\/em> is focused on compromising wireless networking devices, such as wireless routers and access points (APs), to achieve these goals. Such Wi-Fi devices are commonly used as part of the Internet infrastructure in private homes, public spaces (bars, hotels or airports), small and medium sized companies as well as enterprise offices. Therefore these devices are the ideal spot for \u201cMan-In-The-Middle\u201d attacks, as they can easily monitor, control and manipulate the Internet traffic of connected users.<\/strong><\/p>\n<\/blockquote>\n<h4 class=\"b-article__lead\">The devices work by compromising the data stream between the user and Internet services. The end result is <strong>control and manipulation of router user\u00a0traffic<\/strong>.<\/h4>\n<h4 class=\"b-article__lead\">According to WikiLeaks, CherryBlossom has been infecting Wi-Fi routers of D-Link, Belkin, and Linskys companies for years.<\/h4>\n<h4 class=\"b-article__lead\">To implant the customized CherryBlossom firmware on a wireless device, no physical access is required, making the operation dangerously stealthy. This is because some devices allow their firmware to be upgraded over a wireless link.<\/h4>\n<h4 class=\"b-article__lead\">The new firmware on the device can be used to ignite the router into a \u201cFlyTrap,\u201d which can scan for\u00a0\u201cemail addresses, chat usernames, MAC addresses and VoIP numbers\u201d in passing network traffic.<\/h4>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-23588\" src=\"http:\/\/i1.wp.com\/www.thelastamericanvagabond.com\/wp-content\/uploads\/2017\/06\/Screen-Shot-2017-06-15-at-9.47.31-AM.png?resize=500%2C464\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" srcset=\"http:\/\/i1.wp.com\/www.thelastamericanvagabond.com\/wp-content\/uploads\/2017\/06\/Screen-Shot-2017-06-15-at-9.47.31-AM.png?w=1032 1032w, http:\/\/i1.wp.com\/www.thelastamericanvagabond.com\/wp-content\/uploads\/2017\/06\/Screen-Shot-2017-06-15-at-9.47.31-AM.png?resize=280%2C260 280w, http:\/\/i1.wp.com\/www.thelastamericanvagabond.com\/wp-content\/uploads\/2017\/06\/Screen-Shot-2017-06-15-at-9.47.31-AM.png?resize=600%2C557 600w\" alt=\"\" width=\"500\" height=\"464\" data-attachment-id=\"23588\" data-permalink=\"http:\/\/www.thelastamericanvagabond.com\/wikileaks\/new-documents-wikileaks-expose-cia-exploits-wireless-devices\/attachment\/screen-shot-2017-06-15-at-9-47-31-am\/\" data-orig-file=\"http:\/\/i1.wp.com\/www.thelastamericanvagabond.com\/wp-content\/uploads\/2017\/06\/Screen-Shot-2017-06-15-at-9.47.31-AM.png?fit=1032%2C958\" data-orig-size=\"1032,958\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screen-Shot-2017-06-15-at-9.47.31-AM\" data-image-description=\"\" data-medium-file=\"http:\/\/i1.wp.com\/www.thelastamericanvagabond.com\/wp-content\/uploads\/2017\/06\/Screen-Shot-2017-06-15-at-9.47.31-AM.png?fit=280%2C260\" data-large-file=\"http:\/\/i1.wp.com\/www.thelastamericanvagabond.com\/wp-content\/uploads\/2017\/06\/Screen-Shot-2017-06-15-at-9.47.31-AM.png?fit=600%2C557\" \/><\/p>\n<h4>WikiLeaks has been releasing documents of the Vault 7 since March 7, its first full part revealing 8,761 documents. The most recent release prior to CherryBlossom occurred on June 1, and involved the \u201cPandemic\u201d spyware.<\/h4>\n<p>*********<\/p>\n<p><strong>TLB published <a href=\"http:\/\/www.thelastamericanvagabond.com\/wikileaks\/new-documents-wikileaks-expose-cia-exploits-wireless-devices\/\" target=\"_blank\" rel=\"noopener\">this article<\/a> with our thanks to <a href=\"http:\/\/www.thelastamericanvagabond.com\/\" target=\"_blank\" rel=\"noopener\">The Last American Vagabond<\/a> and the writer <a title=\"Visit Alexa Erickson\u2019s website\" href=\"http:\/\/www.collective-evolution.com\/author\/alexaerickson\/\" target=\"_blank\" rel=\"author external noopener\">Alexa Erickson<\/a><\/strong><\/p>\n<p>About the writer: Inspired by balance, Alexa finds that her true inner peace comes from executing a well-rounded lifestyle. An avid yogi, hiker, beach bum, music and art enthusiast, salad aficionado, adventure seeker, animal lover, and professional writer, she is an active individual who loves to express herself through the power of words.<\/p>\n<p>___<br \/>\n<a href=\"http:\/\/www.thelibertybeacon.com\/new-documents-from-wikileaks-expose-how-the-cia-exploits-wireless-devices\/\">http:\/\/www.thelibertybeacon.com\/new-documents-from-wikileaks-expose-how-the-cia-exploits-wireless-devices\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-75755","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/75755","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=75755"}],"version-history":[{"count":0,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/75755\/revisions"}],"wp:attachment":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=75755"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=75755"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=75755"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}