Wikileaks' Allegations Against CIA: Should You Be Worried?
A trove of new Wikileaks documents reveal that the CIA is capable of committing "undetectable assassinations" by hacking into the computer systems of autonomous cars. While the CIA has neither confirmed nor debunked the allegations, a number of security experts said they know enough about the CIA to know that the agency could actually murder people by hacking into peoples' cars. This has raised a number of concerns about the future of autonomous cars and how well they could protect their owners from hackers and malicious programs.
What are Wikileaks allegations against the CIA?
Wikileaks has always been known as a whistle-blower, and many of its revelations have sent chills up the spines of government organizations. Wikileaks revealed in October 2014 that the CIA's Center for Cyber Intelligence has the capability to exploit security loopholes in autonomous cars to wreak havoc on targeted owners. To this extent, the federal agency is also alleged to be exploiting vulnerabilities in smart TVs, smartphones and vehicle computer systems to gain control of their owners, Computerworld reveals.
To drive home this assertion, Wikileaks disclosed over 8,700 documents earlier this week to nail the CIA over its capabilities to hack into the mobile devices and auto vehicles of people. Considering that about 250 million vehicles equipped with cellular, Wi-Fi and Bluetooth connectivity will have left production lines by 2020, it is considered that many people will be under the mercy of the CIA and illegal hackers. Unethical hackers may hack into the security equipment of people for financial gain and ransoms, but the CIA can only do so for eliminating people, security experts say.
Security experts say there is reason to be worried with this development
Kit Walsh, an attorney with Electronic Frontier Foundation (EFF), says people should be worried about their security considering that vehicles are getting more computerized than ever before. She added that the duty of the government is to identify security vulnerabilities in products and alert manufacturers on how to plug these loopholes, not to exploit the loopholes as the CIA and other hackers are capable of doing. Walsh noted the government should only use security loopholes in devices and vehicles to bolster national defense, not to harm people or put them at risks of harm.
Bruce Schneier, a computer security specialist and cryptographer, states that the CIA had always been ahead at exploiting technologies to spy on people and eliminate perceived enemies of the state. And that hacking the computer systems of autonomous cars to harm people wouldn't be beyond what the CIA could do with leisure. He added that if Charlie Miller and Chris Valasek could demonstrate hacking into the braking system of the Jeep Cherokee, then the CIA could do the same to achieve their security purposes for good or for bad.
CIA's Latest Hack Targets Apple Products; Are You Safe?
WikiLeaks has just released a set of leaked documents that insinuate that the CIA had tools within its disposal to infect Apple products, such as iPhones and MacBooks, for an estimated four years.
CIA’s ‘Vault 7’ WikiLeak Files Released On Twitter; Details Inside
With the number of CIA documents recently being leaked to the public, what’s the truth behind the allegations that WikiLeak was behind such posts trove of CIA documents detailing mass hacking? Could it pave the way for other top secret files from CIA to be uncovered soon? Here’s what authorities have to say
Wikileaks Reveals That CIA Is Using Messaging Apps To Spy On Their Owners
According to Wikileaks, the CIA is spying on citizens by using messaging apps, smart TVs, smart cars and smartphones.
CIA Alien Hunters Reveal Contact With "Tall Shadow People From Mars"
Previously top secret CIA documents tell of an alien hunter agent who have made contact with "tall shadow people" from the Red Planet. The experiment was conducted during the Cold War when psychics were employed by the government.
WikiLeaks Could Get Support From Kim Dotcom´s Lawsuit Against New Zealand Government
While Kim Dotcom is facing extradition to the U.S., WikiLeaks leader Julian Assange might be convicted for publishing classified material regarding the American government, politicians, and military.
MORE IN ITECHPOST
Mobile Phone App Designed to Boost Physical Activity in Women Shows Promise in Trial
Activity trackers and mobile phone apps are all the rage, but do they really help users increase and maintain physical activity? A new study has found that one mobile phone app designed for inactive women did help when combined with an activity tracker and personal counseling.
AI and High-Performance Computing Extend Evolution to Superconductors
Materials by design: Argonne researchers use genetic algorithms for better superconductors.
Owners of thoroughbred stallions carefully breed prizewinning horses over generations to eke out fractions of a second in million-dollar races. Materials scientists have taken a page from that playbook, turning to the power of evolution and artificial selection to develop superconductors that can transmit electric current as efficiently as possible.