Jun 20, 2017

ZDnet | June 15, 2017 | CIA has been hacking into Wi-Fi routers for years, leaked documents show | .. The hacking tools target hundreds of models developed by dozens of router manufacturers .. | Blogger: Not a breaking news, but I still assume, many people how absolutely no clue to the crude facts. Remember we just learned about the 'positively charged' plasma energy devices (Plasma Batteries, Plasma Reactors) from Keshe Foundations that will revolutionize how humanity lives?.. Anywho, extracts from a old COBRA 2015 Q/A interview: | Q: The plasma devices in cell phones laptops and wifi routers, are they turned off when you turn off the devices that they are in ? A: No, they are turned on 24h a day. Q: Even if you remove the battery? A: Even if you remove the battery. Also your phone can spy on you even if you close it down or even if you remove the battery, the newer versions of smart phones are spying devices for the cabal 24h a day. Q: Ok. The plasma devices, were they put there by distance? A: They were not put there by distance, the actual manufactory and process for certain components of these phones include the plasma aspect. When the physical chip is being made, the plasma chip is being made at the same time, in the same factory. Q: When did this start? A: This was gradually being introduced, but I would say it’s been fully operational in the last 2 years. So if you have an older version of the phone you might be lucky. Q: And are the plasma devices gonna be removed by distance? A: The Light forces have technology and they will remove this very soon... |

Leaked secret documents have revealed that the CIA has been targeting and compromising home, office, and public wireless routers for years in an effort to carry out clandestine surveillance.

The documents, which could not be immediately verified, are part of an ongoing series of leaks released by the website WikiLeaks, revealing the work of the CIA's elite hacking unit, dubbed the Engineering Development Group.

Among the dozens of files are user and installation guides, manuals, and other "secret"-marked maps and charts that reveal several hacking tool suites, which allow the agency to conduct targeted exploitation of networks and computers.

One of the tools, dubbed CherryBlossom, allows the agency to monitor the internet activity of a target, redirect their browser, scan for email addresses and phone numbers, and other software exploits.....[READ MORE]