Wikileaks Reveals That CIA Is Using Messaging Apps To Spy On Their Owners
On Tuesday, Mar. 7, the anti-secrecy group Wikileaks announced that it had obtained top-secret hacking tools used by the Central Intelligence Agency (CIA) to break into communication apps, smartphones, and other electronic devices. Wikileaks published confidential documents on all those programs.
Wikileaks Reveals New CIA Spying Scandal
According to The Washington Post, the latest revelations about U.S. government's powerful hacking tools suggest that a variety of everyday devices can be turned to spy on their owners. This means that surveillance tools can potentially move into hip pockets of billions of users worldwide as well as right into the homes. Internet-connected vehicles, smartphones, and smart TVs are all vulnerable to CIA hacking.
According to Bloomberg, the 8,761 documents and files posted by Wikileaks on Tuesday are allegedly coming from the CIA's Center for Cyber Intelligence. The capabilities described include recording the private text messages, images and sounds of users, even when encrypted apps are used to communicate. The CIA also studied the possibility to infect vehicle control systems used by modern vehicles in order to perform "nearly undetectable assassinations."
CIA Center For Cyber Intelligence's Tools
Wikileaks wrote that in the case of a tool called "Weeping Angel" for attacking Samsung SmartTVs, the target TV is placed after infestation in a "Fake-Off" mode. The TV is then recording conversations in the room. The recordings are sent over the Internet to a covert CIA server.
Other documents list supposed tools for cracking into such widely popular devices as the Android smartphones and Apple's iPhone. However, there are some differences from the revelations made in 2013 by the National Security Agency's former contractor Edward Snowden. His documents largely described mass surveillance of Internet-based communications systems, while the focus of the CIA appears to be the individual devices.
Well-encrypted communications on popular apps like WhatsApp or Signal can be accessed by CIA by targeting devices, without having to crack the encryption itself. As opposed to defeating encryption technologies, the CIA just "bypassed" them. The revelations of yet another government attempt to use modern technology in order to spy on citizens have been met with criticism by privacy advocate agencies.
CIA's Latest Hack Targets Apple Products; Are You Safe?
WikiLeaks has just released a set of leaked documents that insinuate that the CIA had tools within its disposal to infect Apple products, such as iPhones and MacBooks, for an estimated four years.
Wikileaks' Allegations Against CIA: Should You Be Worried?
A trove of new Wikileaks documents reveal that the CIA is capable of committing “undetectable assassinations” by hacking into the computer systems of autonomous cars. While the CIA has neither confirmed nor debunked the allegations, a number of security experts said they know enough about the CIA to know that the agency could actually murder people by hacking into peoples’ cars. This has raised a number of concerns about the future of autonomous cars and how well they could protect their owners from hackers and malicious programs.
CIA’s ‘Vault 7’ WikiLeak Files Released On Twitter; Details Inside
With the number of CIA documents recently being leaked to the public, what’s the truth behind the allegations that WikiLeak was behind such posts trove of CIA documents detailing mass hacking? Could it pave the way for other top secret files from CIA to be uncovered soon? Here’s what authorities have to say
CIA Alien Hunters Reveal Contact With "Tall Shadow People From Mars"
Previously top secret CIA documents tell of an alien hunter agent who have made contact with "tall shadow people" from the Red Planet. The experiment was conducted during the Cold War when psychics were employed by the government.
WikiLeaks Could Get Support From Kim Dotcom´s Lawsuit Against New Zealand Government
While Kim Dotcom is facing extradition to the U.S., WikiLeaks leader Julian Assange might be convicted for publishing classified material regarding the American government, politicians, and military.
MORE IN ITECHPOST
A simple, Yet Versatile, New Design for Chaotic Oscillating Circuitry Inspired by Prime Numbers
Researchers at Tokyo Institute of Technology have found a simple, yet highly versatile, way to generate "chaotic signals" with various features. The technique consists of interconnecting three "ring oscillators," effectively making them compete against each other while controlling their respective strengths and their linkages. The resulting device is rather small and efficient, thus suitable for emerging applications such as realizing wireless networks of sensors.
Tip Sheet: Recent Research on How DNA is Read and Copied
Two scientists at the Johns Hopkins University School of Medicine have unraveled aspects of how DNA organizes and preserves genetic information. Newly published research by Cynthia Wolberger, Ph.D., and James Berger, Ph.D., whose labs sit side by side, takes a closer look at how the puzzle pieces of DNA machinery fit together.