Wikileaks' Allegations Against CIA: Should You Be Worried?
A trove of new Wikileaks documents reveal that the CIA is capable of committing "undetectable assassinations" by hacking into the computer systems of autonomous cars. While the CIA has neither confirmed nor debunked the allegations, a number of security experts said they know enough about the CIA to know that the agency could actually murder people by hacking into peoples' cars. This has raised a number of concerns about the future of autonomous cars and how well they could protect their owners from hackers and malicious programs.
What are Wikileaks allegations against the CIA?
Wikileaks has always been known as a whistle-blower, and many of its revelations have sent chills up the spines of government organizations. Wikileaks revealed in October 2014 that the CIA's Center for Cyber Intelligence has the capability to exploit security loopholes in autonomous cars to wreak havoc on targeted owners. To this extent, the federal agency is also alleged to be exploiting vulnerabilities in smart TVs, smartphones and vehicle computer systems to gain control of their owners, Computerworld reveals.
To drive home this assertion, Wikileaks disclosed over 8,700 documents earlier this week to nail the CIA over its capabilities to hack into the mobile devices and auto vehicles of people. Considering that about 250 million vehicles equipped with cellular, Wi-Fi and Bluetooth connectivity will have left production lines by 2020, it is considered that many people will be under the mercy of the CIA and illegal hackers. Unethical hackers may hack into the security equipment of people for financial gain and ransoms, but the CIA can only do so for eliminating people, security experts say.
Security experts say there is reason to be worried with this development
Kit Walsh, an attorney with Electronic Frontier Foundation (EFF), says people should be worried about their security considering that vehicles are getting more computerized than ever before. She added that the duty of the government is to identify security vulnerabilities in products and alert manufacturers on how to plug these loopholes, not to exploit the loopholes as the CIA and other hackers are capable of doing. Walsh noted the government should only use security loopholes in devices and vehicles to bolster national defense, not to harm people or put them at risks of harm.
Bruce Schneier, a computer security specialist and cryptographer, states that the CIA had always been ahead at exploiting technologies to spy on people and eliminate perceived enemies of the state. And that hacking the computer systems of autonomous cars to harm people wouldn't be beyond what the CIA could do with leisure. He added that if Charlie Miller and Chris Valasek could demonstrate hacking into the braking system of the Jeep Cherokee, then the CIA could do the same to achieve their security purposes for good or for bad.
CIA's Latest Hack Targets Apple Products; Are You Safe?
WikiLeaks has just released a set of leaked documents that insinuate that the CIA had tools within its disposal to infect Apple products, such as iPhones and MacBooks, for an estimated four years.
CIA’s ‘Vault 7’ WikiLeak Files Released On Twitter; Details Inside
With the number of CIA documents recently being leaked to the public, what’s the truth behind the allegations that WikiLeak was behind such posts trove of CIA documents detailing mass hacking? Could it pave the way for other top secret files from CIA to be uncovered soon? Here’s what authorities have to say
Wikileaks Reveals That CIA Is Using Messaging Apps To Spy On Their Owners
According to Wikileaks, the CIA is spying on citizens by using messaging apps, smart TVs, smart cars and smartphones.
CIA Alien Hunters Reveal Contact With "Tall Shadow People From Mars"
Previously top secret CIA documents tell of an alien hunter agent who have made contact with "tall shadow people" from the Red Planet. The experiment was conducted during the Cold War when psychics were employed by the government.
WikiLeaks Could Get Support From Kim Dotcom´s Lawsuit Against New Zealand Government
While Kim Dotcom is facing extradition to the U.S., WikiLeaks leader Julian Assange might be convicted for publishing classified material regarding the American government, politicians, and military.
MORE IN ITECHPOST
Tricks to Spy on iPhone without Installing Software
Nowadays, increasing trust issues are forcing people to turn into a spy. Everyone, including spouse, parents, and employers need a suitable spy app like Cocospy to spy on iPhone without installing the software.
A New Material for the Battery of the Future, Made in UCLouvain
Renewable sources of energy such as wind or photovoltaic are intermittent. The production peaks do not necessarily follow the demand peaks.
Top 5 Video Games to Play for a Truly Unique First Date
Video games have a way of taking us outside of ourselves and live in a fantasy world. It's even better when you're playing a game with someone special!