#CIA hacking the router
Explore tagged Tumblr posts
boycottdivestsanctions · 6 months ago
Text
ALL routers can be hacked
The CIA has ALL certs necessary to break into most websites
Even air-gapped systems can be broken into by ultra sensitve listening
0 notes
universelove420 · 8 years ago
Text
Most routers in the USA are "hacked" by the CIA and they know EVERYTHING about you, listen to conversations, read messages, make a list of your political views whether you are for or against obama-care, ect https://youtu.be/_vLpzKo6NI8
13 notes · View notes
gangstalking2021 · 5 years ago
Text
NSA
• Works extremely close to the CIA to monitor American citizens. Uses Zero day hacks and backdoors in smart phones, routers, and computers to monitor you. Per NSA whistle blower, they hack members of Congress and the Supreme Court to make sure their budget doesn’t shrink. Also per whistle blower, they can hack computers with an “air gap” (no internet connection) using Van Ecks/TEMPEST (distant wireless monitoring of wired computer monitors) and wireless keyboard Hacking. A whistle blower also became aTI. Veterans It is believed that the private sector hires veterans who are looking for work to do gangstalking for them.
Define: Gangstalking
Gangstalking - stalking by a group of people in such a way that the victim is aware of it. Meant to cause mental distress to the point of suicide. A “clean” kill for those in power.
Tumblr media Tumblr media
Https://www.Hacker411.com 《《《《 Visit site for more
5 notes · View notes
techiedeepank-blog · 8 years ago
Photo
Tumblr media
CherryBlossom: CIA hacking into our system by Techie Deepank Wikileaks publishes a document from CherryBlossom project of the CIA that was developed and implemented with the help of the US non – profit Stanford Research Institute (SRI).
0 notes
tastydregs · 2 years ago
Text
China building cyberweapons to hijack enemy satellites, says US leak
Tumblr media
Enlarge / The Dragon SpaceX satellite. China’s ambitious cyber attacks aim to mimic the signals that satellites receive from their operators, tricking them into being taken over or to malfunction.
European Space Agency.
China is building sophisticated cyber weapons to “seize control” of enemy satellites, rendering them useless for data signals or surveillance during wartime, according to a leaked US intelligence report.
The US assesses that China’s push to develop capabilities to “deny, exploit or hijack” enemy satellites is a core part of its goal to control information, which Beijing considers to be a key “war-fighting domain.”
The CIA-marked document, which was issued this year and has been reviewed by the Financial Times, was one of dozens allegedly shared by a 21-year-old US Air Guardsman in the most significant American intelligence disclosures in more than a decade.
A cyber capability of this nature would far exceed anything Russia has deployed in Ukraine, where electronic warfare teams have taken a brute-force approach with little effect.
These attacks, first developed in the 1980s, attempt to drown out signals between low-orbit SpaceX satellites and their on-ground terminals by broadcasting on similar frequencies from truck-borne jamming systems such as the Tirada-2.
China’s more ambitious cyber attacks aim to mimic the signals that enemy satellites receive from their operators, tricking them into either being taken over completely or malfunctioning during crucial moments in combat.
The classified US document said this cyber capability would allow China “to seize control of a satellite, rendering it ineffective to support communications, weapons, or intelligence, surveillance, and reconnaissance systems.” The US has never disclosed whether it has similar capabilities.
Taiwan, which has taken note of how indispensable satellite communications have been to the Ukrainian military, is seeking to build out communications infrastructure that can survive an attack from China.
It is courting investors to establish its own satellite provider, while experimenting with non-geostationary satellite receivers in 700 locations around Taiwan to guarantee bandwidth in the event of war or disasters, the Financial Times reported in January.
In a sign of how crucial satellite communications have become in warfare, a Russian cyber attack succeeded in rendering thousands of Ukrainian military routers from US-based Viasat ineffective in the hours before it launched its full-scale invasion on February 24 last year. A Ukrainian official described the attack at the time as “catastrophic.”
It also knocked out service to thousands of Viasat customers in Poland, Italy and Germany, where several hundred wind turbines were affected.
The Viasat hack, while sophisticated, involved breaking into the company’s computer systems and sending out instructions to the modems that caused them to malfunction.
China’s goals, according to the leaked assessment, are far more advanced. They would seek to knock out the ability of satellites—which tend to operate in interconnected clusters—to communicate with each other, to relay signals and orders to weapons systems, or to send back visual and intercepted electronic data, according to experts.
US military officials have warned that China has made significant progress in developing military space technology, including in satellite communications.
General B Chance Saltzman, commander of the US Space Force, told Congress last month that Beijing was aggressively pursuing counter-space capabilities in an effort to realize its “space dream” of becoming the foremost power beyond the Earth’s atmosphere by 2045.
“China continues to aggressively invest in technology meant to disrupt, degrade and destroy our space capabilities,” he said.
Saltzman said China’s military had deployed 347 satellites, including 35 launched in the past six months, aimed at monitoring, tracking, targeting and attacking US forces in any future conflict.
Charlie Moore, a retired Air Force general who served as deputy of US cyber command, said China was making huge efforts to counter the asymmetric advantage that the US had in the cyber and space domains.
“China understands the superiority that the United States has in the space and cyber domains, so they are very interested in not only improving their own capabilities but in capitalizing on what we refer to as a first-mover advantage in both domains,” said Moore, now a visiting professor at Vanderbilt University in Tennessee.
“They are working on all the capabilities that they want to have from a defensive and offensive standpoint, and from an ISR [intelligence, surveillance and reconnaissance] standpoint. They’re firing on all cylinders,” he said.
The National Security Council, the CIA and the Pentagon declined to comment. The Chinese government had no immediate comment.
Additional reporting from Joe Leahy in Beijing.
© 2023 The Financial Times Ltd. All rights reserved. Not to be redistributed, copied, or modified in any way.
0 notes
foreverwhelmed · 6 years ago
Text
Die a Hero Chapter 12!
"What are you doing out here?" Bette asks, gesturing to the empty hallway. "People normally go to the library during study hall."
I nod at the wifi router on the ceiling above us, using my other hand to close the page before she can see my screen.
"I'm doing a coding project. The wifi's better here."
"Ooh! Are you hacking the school's system to give yourself A's? Or turning the air conditioning on remotely so the whole school isn't an oven?" She raises her eyebrows and grins like she's in on a big secret.
"Nope. Just finding backdoors into the CIA's mainframe."
"Of course! That's what I meant to say." Bette corrects. "You should join the coding club. I think they made it to nationals or something last year."
I snort. Another club is literally the last thing I need right now.
"I think I'm busy enough."
Keep Reading or Start at the Beginning
1 note · View note
holmoris · 4 years ago
Note
this is the fbi and we want to know why you are hacking baby monitors with a weeks worth of web exploitation knowledge and where did you learn web exploitation in a week – please tell us we gotta get our guys trained and you are going to hacker jail anyway so don't play coy we'll know. -----sincerely, the cia
I suck at it but it interests me and every once in a while I'll pick it up if I find something like that dog camera at a rummage sale. My general method is just looking around GitHub to see if anyone's already solved the problem and if not, check it out with nmap and see if it has any interesting open ports and then just hammer the crap out of them with pentesting tools to see if they do anything interesting. If that fails you can always look at the web interface in chrome inspector and see if it does something really stupid like disabling the interface via CSS if you're not logged in (I had a laser printer that actually did this..). https://book.hacktricks.xyz/ is a good resource in general and has a bunch of info on what kinds of things you can do if you find an exposed service (iirc their RTSP page is what worked for the dog camera). https://0x00sec.org/ is another good resource with a lot of friendly people posting cool stuff and tutorials. Also because it's the funniest and probably most terrifying thing I've ever found pentesting something - This specific router has a hidden link on its login page to a page called 'obama.asp' that's just a straight-up administrator shell that lets you do anything you want on the underlying system, no login required.
Tumblr media
0 notes
siva3155 · 5 years ago
Text
300+ TOP FortiMail Interview Questions and Answers
FortiMail Interview Questions for freshers experienced :-
1. What is bulk mailing? What are the challenges associated? The process of sending email to multiple users at the same time for conveying a message or anything is considering as bulk mailing. This is a very common approach in large-scale organizations and in business promotions. Sending emails internally doesn’t have many issues that are associated. However, sending emails to outside users can create a few issues sometimes. The sender must be aware of the fact that the email account actually exists and is used by the authorized user only. 2. Is there any approach that can be considered for securing the information before transferring it to another user or server? There are certain techniques available depending on the type and size of data or information that needs to be sent over a network. The most common one is securing a document with a username and a password. Second is using cryptography. 3. Are you familiar with the key challenges associated with the email-security? There can be so many challenges related to data security and the most common one is when anyone else is using an email account than the one who is authorized to do so. This leads to information leakage and security concerns that can often put down the entire business at risk. 4. Name one security measure which you will take for securing emails and information from being leaked while mailing anything internally Requesting suspension of all the accounts that are no longer in use. 5. Suppose there are some issues with the server and the intranet is not working. Do you proceed with sending information through personal e-mail in case the data is confidential? No, sharing of data should be through intranet only otherwise it leads o a lot of concerns about the information security. 6. How will you find out a breakdown in communication? It all depends on the type of task or the medium. Most of the time issues are with the medium only. A medium is actually a link which connects a sender and a destination. The breakdown in communication reflects slower transmission speed and thus actions can be taken based on that. 7. What components in a network are always more prone to attacks and why? Well, a network can be a large connection of various nodes and devices that work for a similar or different operation. There are networking devices such as a router, SFPT, as well as stitches that are always more prone to attacks. This is because these devices don’t have any inbuilt protocol for information security. Hacking or accessing the control over them can leak entire data. 8. Is there any technique to find out whether a remote server is running Apache or IIS? Yes, it’s possible to do so. The website administrator has to match the information as provided by the remote server. In case it matches, it can simply be known after that whether it’s an Apache or IIS. 9. What exactly do you know about Symmetrical and Asymmetric encryption? Both these approaches are meant to enhance the information security and especially before it needs to be transferred over a link or a network. In symmetric approach, the same key is used for both encryption as well as decryption. On the other side, in asymmetric approach, the encryption and decryption keys are different depending on the type of data or information. Generally, it has been seen that an Asymmetric connection is first established and the same is converted into symmetric at a later stage. 10. Email accounts often need to be linked with other accounts for functionality. Do you support this approach? Name one method by which the associated challenges can be eliminated? Well, it’s quite true that functionality and accuracy always matter in an organization. The linking of accounts is necessary to keep up the pace at various stages. The most common example is social media sites which are used for promotional purposes by the businesses in the current scenario. In realm of information and data security, it leads to leakage of same. The challenges related to information security can simply be avoided up to a great extent by making sure that these applications are not running in their default configuration. Locking the permissions on all such applications is also necessary.
Tumblr media
FortiMail Interview Questions 11. Do you know what exactly a POST code is? What is its significance? It is basically an approach to ensure the proper working of a system to ensure uninterrupted functionality. Generally, it is considered in systems that need to be up all the time such as a server. It is also considered when the system fails to boot. 12. Can you tell the difference between a White Hat and a Black Hat attacker or hacker? When it comes to freedom of information, this is a very complicated question. White hack hackers generally work for the welfare of an organization in terms of getting the information. They usually get it from other sources to understand the security measures. Black Hat hackers on the other side steal a company’s information through an unauthorized access to their database. 13. What is the abbreviation of WAP? How can it be protected? WAP stands for Wireless Access Point. The broadcasting of SSID could be stopped for its protection. In addition to this, MAC address filtering is another approach that can be adopted to keep up the pace when it comes to the security of WAP. 14. Do you have any idea about the Salt Hashes? Salt is generally considered as random data. When the system receives a new password request, the same is created with a hashed value and a fresh salt random value gets created automatically. This is actually a useful approach for defending the attack that is concerned with a dictionary. They are also considered as hash attacks. It is because of salt hashes a user is not able to login on multiple systems with same login details at the same time. 15. What exactly do you know about SSL? Is it enough for encryption when it comes to email security? SSL stands for Secure Socket Layers and the fact is it’s an identity verification approach that is quite common in email security. Its prime purpose is to make sure that the user at the other end is truly the same to whom access has been provided. Thus it always contributes in enhancing the security up to a great extent. Although it’s a good and trusted approach, it has been seen that it gets stripped in some cases. Therefore the need of some additional approaches is always realized when it comes to implementing this. 16. Suggest some methods for authenticating a user? This is a common practice. There are a few strategies that work for this and they are Through Passwords Through token Biometrics In addition to this, a two-way authentication which can be the combination of a password and a token can also be considered to assure additional security. 17. Explain the significance of using SSH? It is a good approach that is always considered especially when it comes to email security. The fact is it creates a secure connection and all the sensitive information has to pass the TCP port no 22 which in fact is a secure approach. The chances of information leak can be reduced up to an excellent extent and monitoring can be made simple. 18. Would to allow a basic user to login as a root in case of any situation? Why or why not? Well, the fact is a root has a lot of powers that a basic user is not allowed. Therefore this practice must not be considered. The fact is, root is considered as admin and thus admin login cannot be provided to a basic user under any situation. 19. What is the significance of XSS approach? Well, the Cross site scripting is a protocol that makes sure that the administrators and developers don’t have to face issues in case the variables changed while they perform their task. Many times it has been seen that variables changed on the webpage of the client. Input validation through XSS is a useful approach that can assure protection against the same and thus enhance the security. 20. Is it wise to open the attached files from an unknown sender without scanning? Why In the present scenario, a lot of auspicious emails keep on circulating all the time on the internet. They can appear in any email account. Clicking on the links that are unrecognizable and downloading the files attached can create several security issues. This could even lead to spreading of viruses in the database that would be a very daunting situation. So it is not good to do so for obvious reasons. 21. Do you have any idea about the CIA triangle? What does it stands for and what is its significance? CIA stands for Confidentiality, Integrity and Availability. It is an approach to keep the information that needs to be shared on a network secure in all the aspects. It makes sure of accessibility of data, secure structure, as well as data intact. 22. What exactly do you know about NIDS and HIDS? The primary aim of both of them is to enhance information security. Actually, they are Intrusion Detection systems. HIDS stands for Host Intrusion Detection System and basically runs a background utility similar to anti-virus software. On the other side, NIDS is Network Intrusion Detection System and is responsible for the security of the network. Both NIDS and HIDS come with anomaly based and signature based variants. They are best in performing their tasks and attacks can be stopped up to a great extent. 23. Suppose you find a security problem on a network which is out of your concerns, what would be your actions during such a situation? The person in charge of that particular department or the network administrator should immediately be informed and that is exactly what I will do. Sharing such concerns with other parties is always a helping hand for assuring secure data environment in an organization. 24. What does FTP stand for? It stands for File Transfer Protocol. 25. Would you allow your team to bring their home laptops in the organization and using them for business processes? No, it should be allowed especially when the information is highly confidential. There are extreme chances of data leak in such a scenario. 26. What factors can cause email data leakage Basically, it happens when an IP is departed from its actual position. The true reasons for this could be: Technology mishaps Inadequate security control Human and Gross errors Assure backups Corrupt hard drive System breach from hackers Misconfiguration 27. Is it possible to access the data stored at an organization server from a remote location? Yes, this can be done. There are various applications that can help in this matter. They couldn’t create security concerns if the administrators make sure of strong security policies. 28. What is the true purpose of Information Assurance? It simply aims to keep the data reliable under all the situations. Some examples include backup, configuration, as well as encryption. 29. What is a penetration test? What is its significance? It is nothing but auditing email accounts for security and other similar purposes. It can be done with the help of outside contractors. 30. What exactly do you know about data protection at rest and data protection in transit? In case data is protected when it is present in the hard drive or in the database, it is regarded as data protection at rest. When the same is transferred from source to destination, the protection at that instant with some concerned approaches is known as data protection in transit. The Data protection in transit is a common approach in email security. FortiMail Questions and Answers Pdf Download Read the full article
0 notes
elesoundgirl-blog1 · 6 years ago
Photo
Tumblr media
Latest WikiLeaks Release Shows How the CIA Hacks Your Router
Routers aren’t great at security—and apparently no one knows that better than the CIA
http://www.wired.com/story/wikileaks-cia-router-hack
0 notes
kieranewing · 8 years ago
Text
Most people would think that the CIA was difficult to hack, but they’d be wrong. Although Kieran hadn’t been working with them for very long, he was well aware that there were some big holes in the CIA’s security; it just depended on the department on security issues. He knew not everyone knew as much about computers as he did, but they could at least do a simple Google search to know that certain configurations were not secure. After a long day at work, where he literally spent all day updating wireless routers to use WAP-Enterprise and configuring the authentication server, he was ready for some sort of break. He normally wasn’t the type to hang out in a bar, but today was different. 
“I always thought the security at the CIA would be more intense, but some people are just idiots. WAP is easily hacked. No matter, the problem was fixed. I don’t know why we even use wireless... Sorry, it’s probably not interesting to hear about that.” 
Tumblr media
8 notes · View notes
topofreddit · 8 years ago
Text
CIA discovered to be routinely hacking home Wi-Fi routers made by Linksys, DLink and Belkin to monitor all your internet traffic
Original post | Reddit thread
2 notes · View notes
the-psychic-project · 6 years ago
Text
Network TAP vendors in the United States and International Wire Fraud (Ver. 9)
Overview:
Vendors for Network TAP solutions that allow security professionals and network admins to monitor wireless and data networks appear to be isolated to former California, outside the Peninsula region. We need these Network TAP vendors inside the United States or a similar solution for network monitoring.
I suspect that a modified network TAP monitor port (and A and B ports) were the intrusion points for International Wire Fraud, this explains why when the recent VW payments were exchanged it was still defrauded after they removed all their personnel. The International Wire fraud still occurred I suspect because it’s not committed at the network endpoints but at the Network TAP. 
Also, I don’t believe the newly implemented quantum encryption HW/SW will allow for this sort of Network TAP solution, as the TED speaker (Vikram Sharma), spoke he states that quantum encryption changes the signal/spectrum when it is “touched” or in this case, viewed for a Network TAP.
Note#1:
A handheld fibre tester TBERD was also utilized to manipulate packet data on the network. It was placed in the network by a network technician and removed leaving no evidence. The TBERD had specific firmware updates for encryption decoding and encoding allowing for International Wire Fraud. An example device is provided below it has remote access capabilities once placed on the network (without the modifications). The key is knowing the network “VLAN” for the bank traffic and using a modified TBERD unit.
Note#2:
The above-modified network TAP hypothesis has been verified as correct by a vendor visit to one of these suspected data center locations. Along with verifying the network TAP was modified, a plausible scenario was presented. Psychic network technicians were telepathically signalled in the PSi to put the network gear in place (TBERD) and leave it running until informed later via the Psi to remove it. 
“A very creepy proposition” - over and over
Note#3:
“They are removing all the Network TAP’s throughout the networks” - Psi Quote 
“This is how it’s done” - over and over
“The Bay Area collective knows how it's done, but it's not going to reveal it unless authorized by its government. China authorized the network to be checked” - Psi Quote
“Check every last TAP for every vendor in the country” - POTUS#44 Barack Obama
Note#4:
Along with the “modified network TAP and modified TBERD” scenario, we must look at IP based network monitoring tools, some of these tools have moved access into the Cloud making them vulnerable. Moving access for these network TAP’s from the corporate LAN environment to the Cloud seems a recipe for disaster.
The proposition is a “hacked” IP based network monitoring tool in the cloud-connected to network TAPS that have been modified. These IP based tools are the BMC TrueSight Operations Management tools that are prevalent throughout the Network Operation Centers of many corporations, and other similar tools. Below is information on the implementation of network TAP’s and Cloud network monitoring tools from the vendor.  
https://docs.bmc.com/docs/display/TSOMD107/Traffic+capture+and+tapping+points+for+BMC+Real+End+User+Experience+Monitoring+Software+Edition#TrafficcaptureandtappingpointsforBMCRealEndUserExperienceMonitoringSoftwareEdition-Trafficcapturemethods
http://documents.bmc.com/products/documents/73/90/477390/477390.pdf
An Example:
The example would have the hacked Cloud network tools injecting manipulated packet data (for International Wire Transfers) into the modified network TAP. This could be done remotely and fits the scenario of the large-scale undermining of International Wire Transfers in former California, versus the four or five network technicians that have gone rogue using a modified and networked TBERD. I suspect we have a dual issue or one that has migrated to the cloud as the network TAP access migrated there in 2017 (as purposed in the above documentation).
The Solution:
“Replacing the modified network TAP’s and moving access back to the corporate premise should fix many issues, but that depends on network topology. Execute the 'config' command on the router to identify incorrectly configured SPAN ports."
“The SPAN ports were mirroring all the video and photo images” - Google Psychic Technology
“Remedy is a big problem” - over and over
“Remedy is BMC/Truesight and BMC/Helix they are all apart of the same suite of applications” - The Psychic Project
“Remedy has been Subversified by network hackers” - over and over
“Its a network administrators nightmare” - over and over
"That's what we do watch boxes" - over and over
"SPAN ports that should not be there were capturing everything" - over and over
Tumblr media
Note#5:
As we move to quantum encryption and its inability to be monitored without changing the data in the packet we must look at government surveillance. The same network TAP’s that were undermined for International Wire Fraud, we used for government surveillance. I’m positive this is how CIA-California operatives began their corruption activities, from the knowledge of these ports for target surveillance.
With the implementation of quantum encryption beyond the banking industry into data communication networks. The FBI, CIA, DOJ, NSA and others will not be able to monitor; email, wireless calls, landline calls, applications, and the internet.  
https://en.wikipedia.org/wiki/NSA_warrantless_surveillance_(2001%E2%80%932007)
Note#6:
The SPAN S/W ports were disassembled and TAP ports were implemented for the Facebook 10G routers. 
“That's why we were oversubscribed so much” -over and over
https://www.garlandtechnology.com/tap-vs-span
Note#7:
Reported by Telekinesis Jeff Bezos, SPAN ports were found in the virtual machine environment. These SPAN ports were both a performance and a security issue. The virtual mirroring of a port is CPU intensive degrading the performance of the virtual environment. Furthermore, the security issue is related to ill configured SPAN ports sending VLAN data to unknown sources. 
The guidance is to review the virtual environment for Port Mirroring (SPAN port).
Below are resources for greater understanding:
https://www.youtube.com/watch?v=rlxndbdy2zc
https://packetzapper.wordpress.com/2012/03/19/how-to-span-a-physical-port-to-a-virtual-machine/
Resource:
https://en.m.wikipedia.org/wiki/Network_tap
https://en.wikipedia.org/wiki/Virtual_LAN
https://en.wikipedia.org/wiki/Gigamon
https://en.wikipedia.org/wiki/NetScreen_Technologies
https://www.viavisolutions.com/en-us/products/t-berd-mts-5800-handheld-network-tester
https://www.viavisolutions.com/en-us/products/multi-services-application-module-msam-t-berd-mts-6000a-8000-platform
https://www.youtube.com/watch?v=SQB9zNWw9MA&t=94s
https://twitter.com/PsychicProject/status/1165616201105584128
(Google Psychic Technology)
(Psi Performed by Tracee Ellis Ross and Monica Hitz)
(Psychic Active Monica Hitz)
(Psychic Active Lashaunda Johnson)
Tumblr media
0 notes
dailytechnologynews · 8 years ago
Photo
Tumblr media
CIA discovered to be routinely hacking home Wi-Fi routers made by Linksys, DLink and Belkin to monitor all your internet traffic http://ift.tt/2hb7TkT
1 note · View note
sotina886 · 3 years ago
Text
U.S. surveillance program revealer: The U.S. government
Sina Technology News Beijing time on the morning of June 13, according to the Hong Kong "South China Morning Post" report, exposing the US government's surveillance program, the former CIA (hereinafter referred to as "CIA") analyst Edward Snowden (Edward Snowden) He said he would stay in Hong Kong to deal with possible extraditions by the U.S. government for leaking state secrets.
In an exclusive interview with the South China Morning Post at an undisclosed location that day, the former CIA analyst also revealed that the U.S. government began hacking computers in Hong Kong and mainland China years ago.
At Snowden's request, the South China Morning Post did not disclose details of the interview process.
It has been a week since Snowden disclosed that the U.S. government collects people's phone and Internet data. In an interview, he said that he will continue to stay in Hong Kong "until I am asked to leave." He also added: "I have had many opportunities. Fleeing Hong Kong, but I still want to stay and fight the U.S. government in court because I believe in the laws of Hong Kong."
The U.S. government has confirmed that Snowden was involved in a criminal offense. In an hour-long interview, the 29-year-old said he was neither a hero nor a traitor, but an American. He also revealed the following:
1. The controversial "Prism" project of the National Security Agency (hereinafter referred to as "NSA") also covers people and institutions in Hong Kong, China and mainland China.
2. The United States is exerting diplomatic pressure on the Hong Kong government to extradite him back to China.
3. The laws of Hong Kong can protect him from falling into the hands of the US government.
4. He has been very worried about the safety of himself and his family.
Snowden fled to Hong Kong from his home in Hawaii on May 20 and has lived there since. But many have questioned that, worrying that Hong Kong will not be enough to protect him.
"Some people think I made a mistake in choosing Hong Kong. They misunderstand my intentions. I'm not here to evade justice, but to expose criminal behavior," he said.
Snowden said the NSA has been hacking computers in Hong Kong and mainland China since 2009, according to unverified documents seen by The Washington Post. But none of the documents disclosed any information about Chinese military systems.
Snowden said the NSA's intrusions in Hong Kong included the Chinese University of Hong Kong and civil servants, as well as businesses and students. The documents also revealed some of the NSA's intrusion targets in mainland China.
Snowden believes the NSA has conducted more than 61,000 hacking operations around the world, including targets in Hong Kong and mainland China.
"We're going to hack into the backbone of the network, such as the big Internet routers, which provide communication services for tens of thousands of computers. But we're not going to hack every single computer," he said. (Ding Hong)
0 notes
pinkys143 · 8 years ago
Photo
Tumblr media
This week in Homeland-ish Headlines:
- The CIA could hack your router, Wired.com
'Everything you’re doing on the internet is going through the CIA.' —Matthew Hickey, Hacker House.  Even you, Gansa, even you.
- Trump says he is being investigated over Comey firing, CNN.com
A President at odds with the intelligence community?  Firing people to stop investigations, daily leaks to the press...will President Keane be back in Season 7?  If so and if the Homeland powers that be continue their pursuit of relevancy, President Keane better watch her back.
- Russia says it may have killed ISIS leader Abu Bakr al-Baghdadi, CNN.com
Season 4, Episode 4, Iron in the Fire: 
Carrie: “That’s when we stop tracking terrorists: when we think they’re dead.”
What is Russia up to?  Is this ISIS leader dead?  If not, why do they want people to think he is?
5 notes · View notes
ericvanderburg · 8 years ago
Text
Wikileaks Alleges Years of CIA D-Link and Linksys Router Hacking Via ‘Cherry Blossom’ Program
http://i.securitythinkingcap.com/PMrLpf
2 notes · View notes