Wikileaks' Allegations Against CIA: Should You Be Worried?
A trove of new Wikileaks documents reveal that the CIA is capable of committing "undetectable assassinations" by hacking into the computer systems of autonomous cars. While the CIA has neither confirmed nor debunked the allegations, a number of security experts said they know enough about the CIA to know that the agency could actually murder people by hacking into peoples' cars. This has raised a number of concerns about the future of autonomous cars and how well they could protect their owners from hackers and malicious programs.
What are Wikileaks allegations against the CIA?
Wikileaks has always been known as a whistle-blower, and many of its revelations have sent chills up the spines of government organizations. Wikileaks revealed in October 2014 that the CIA's Center for Cyber Intelligence has the capability to exploit security loopholes in autonomous cars to wreak havoc on targeted owners. To this extent, the federal agency is also alleged to be exploiting vulnerabilities in smart TVs, smartphones and vehicle computer systems to gain control of their owners, Computerworld reveals.
To drive home this assertion, Wikileaks disclosed over 8,700 documents earlier this week to nail the CIA over its capabilities to hack into the mobile devices and auto vehicles of people. Considering that about 250 million vehicles equipped with cellular, Wi-Fi and Bluetooth connectivity will have left production lines by 2020, it is considered that many people will be under the mercy of the CIA and illegal hackers. Unethical hackers may hack into the security equipment of people for financial gain and ransoms, but the CIA can only do so for eliminating people, security experts say.
Security experts say there is reason to be worried with this development
Kit Walsh, an attorney with Electronic Frontier Foundation (EFF), says people should be worried about their security considering that vehicles are getting more computerized than ever before. She added that the duty of the government is to identify security vulnerabilities in products and alert manufacturers on how to plug these loopholes, not to exploit the loopholes as the CIA and other hackers are capable of doing. Walsh noted the government should only use security loopholes in devices and vehicles to bolster national defense, not to harm people or put them at risks of harm.
Bruce Schneier, a computer security specialist and cryptographer, states that the CIA had always been ahead at exploiting technologies to spy on people and eliminate perceived enemies of the state. And that hacking the computer systems of autonomous cars to harm people wouldn't be beyond what the CIA could do with leisure. He added that if Charlie Miller and Chris Valasek could demonstrate hacking into the braking system of the Jeep Cherokee, then the CIA could do the same to achieve their security purposes for good or for bad.
CIA's Latest Hack Targets Apple Products; Are You Safe?
WikiLeaks has just released a set of leaked documents that insinuate that the CIA had tools within its disposal to infect Apple products, such as iPhones and MacBooks, for an estimated four years.
CIA’s ‘Vault 7’ WikiLeak Files Released On Twitter; Details Inside
With the number of CIA documents recently being leaked to the public, what’s the truth behind the allegations that WikiLeak was behind such posts trove of CIA documents detailing mass hacking? Could it pave the way for other top secret files from CIA to be uncovered soon? Here’s what authorities have to say
Wikileaks Reveals That CIA Is Using Messaging Apps To Spy On Their Owners
According to Wikileaks, the CIA is spying on citizens by using messaging apps, smart TVs, smart cars and smartphones.
CIA Alien Hunters Reveal Contact With "Tall Shadow People From Mars"
Previously top secret CIA documents tell of an alien hunter agent who have made contact with "tall shadow people" from the Red Planet. The experiment was conducted during the Cold War when psychics were employed by the government.
WikiLeaks Could Get Support From Kim Dotcom´s Lawsuit Against New Zealand Government
While Kim Dotcom is facing extradition to the U.S., WikiLeaks leader Julian Assange might be convicted for publishing classified material regarding the American government, politicians, and military.
MORE IN ITECHPOST
Smart Monitoring Tools That Make Sense
There are plenty of monitoring tools out there, some better than others. But the initial challenge is figuring out which ones work for certain kinds of tasks. There is a lot of functional overlap, and you don't want to spend time doing the same task twice. Of all the debugging and Python monitoring tools, you'll likely end up needing just a few, not dozens. The answer lies in categorizing the tools. After that, we can examine the different jobs that each kind of tool is designed for.
How Do Personal Emergency Response Systems Work?
Personal emergency response systems, known as PERS for short, are systems that help people to raise the alarm and get immediate help when a medical or personal emergency occurs. They are ideal for older people and anyone with a mobility issue or an injury or illness that can cause falls.
'The Outer Worlds' Pre-Order Guide Plus Game Details Roundup
"The Outer Worlds" is only days away, and fans can pre-order the game.
Advantages of Team Sports for Students
Most students are aware that physical exercise is a beneficial activity that does not only improves physical and mental health but also provides plenty of more benefits. Good fitness, energy, focus, self-discipline - these are just some of the few listed advantages from a significantly bigger list.