Wikileaks Reveals That CIA Is Using Messaging Apps To Spy On Their Owners
On Tuesday, Mar. 7, the anti-secrecy group Wikileaks announced that it had obtained top-secret hacking tools used by the Central Intelligence Agency (CIA) to break into communication apps, smartphones, and other electronic devices. Wikileaks published confidential documents on all those programs.
Wikileaks Reveals New CIA Spying Scandal
According to The Washington Post, the latest revelations about U.S. government's powerful hacking tools suggest that a variety of everyday devices can be turned to spy on their owners. This means that surveillance tools can potentially move into hip pockets of billions of users worldwide as well as right into the homes. Internet-connected vehicles, smartphones, and smart TVs are all vulnerable to CIA hacking.
According to Bloomberg, the 8,761 documents and files posted by Wikileaks on Tuesday are allegedly coming from the CIA's Center for Cyber Intelligence. The capabilities described include recording the private text messages, images and sounds of users, even when encrypted apps are used to communicate. The CIA also studied the possibility to infect vehicle control systems used by modern vehicles in order to perform "nearly undetectable assassinations."
CIA Center For Cyber Intelligence's Tools
Wikileaks wrote that in the case of a tool called "Weeping Angel" for attacking Samsung SmartTVs, the target TV is placed after infestation in a "Fake-Off" mode. The TV is then recording conversations in the room. The recordings are sent over the Internet to a covert CIA server.
Other documents list supposed tools for cracking into such widely popular devices as the Android smartphones and Apple's iPhone. However, there are some differences from the revelations made in 2013 by the National Security Agency's former contractor Edward Snowden. His documents largely described mass surveillance of Internet-based communications systems, while the focus of the CIA appears to be the individual devices.
Well-encrypted communications on popular apps like WhatsApp or Signal can be accessed by CIA by targeting devices, without having to crack the encryption itself. As opposed to defeating encryption technologies, the CIA just "bypassed" them. The revelations of yet another government attempt to use modern technology in order to spy on citizens have been met with criticism by privacy advocate agencies.
New Leak Leads To Another NSA Spying Scandal
Another NSA spying scandal emerges after the latest Shadow Brokers' leak.
Spy Tech Allows Governments To See Everything On Your Smartphone
Governments can spy on your smartphone due to phone-spy tech tools sold by various companies.
Yahoo Involved In Spying Emails Scandal
According to reports, on behalf of U.S. intelligence agency, Yahoo scanned all of the incoming emails of its users.
CIA's Latest Hack Targets Apple Products; Are You Safe?
WikiLeaks has just released a set of leaked documents that insinuate that the CIA had tools within its disposal to infect Apple products, such as iPhones and MacBooks, for an estimated four years.
Wikileaks' Allegations Against CIA: Should You Be Worried?
A trove of new Wikileaks documents reveal that the CIA is capable of committing “undetectable assassinations” by hacking into the computer systems of autonomous cars. While the CIA has neither confirmed nor debunked the allegations, a number of security experts said they know enough about the CIA to know that the agency could actually murder people by hacking into peoples’ cars. This has raised a number of concerns about the future of autonomous cars and how well they could protect their owners from hackers and malicious programs.
CIA’s ‘Vault 7’ WikiLeak Files Released On Twitter; Details Inside
With the number of CIA documents recently being leaked to the public, what’s the truth behind the allegations that WikiLeak was behind such posts trove of CIA documents detailing mass hacking? Could it pave the way for other top secret files from CIA to be uncovered soon? Here’s what authorities have to say
MORE IN ITECHPOST
Smart Monitoring Tools That Make Sense
There are plenty of monitoring tools out there, some better than others. But the initial challenge is figuring out which ones work for certain kinds of tasks. There is a lot of functional overlap, and you don't want to spend time doing the same task twice. Of all the debugging and Python monitoring tools, you'll likely end up needing just a few, not dozens. The answer lies in categorizing the tools. After that, we can examine the different jobs that each kind of tool is designed for.
How Do Personal Emergency Response Systems Work?
Personal emergency response systems, known as PERS for short, are systems that help people to raise the alarm and get immediate help when a medical or personal emergency occurs. They are ideal for older people and anyone with a mobility issue or an injury or illness that can cause falls.
'The Outer Worlds' Pre-Order Guide Plus Game Details Roundup
"The Outer Worlds" is only days away, and fans can pre-order the game.
Advantages of Team Sports for Students
Most students are aware that physical exercise is a beneficial activity that does not only improves physical and mental health but also provides plenty of more benefits. Good fitness, energy, focus, self-discipline - these are just some of the few listed advantages from a significantly bigger list.