Wikileaks has just published a whole bunch of documents in which it claims to outline CIA’s hacking methodologies. The documents, which have reached the organization’ website under the category name Vault 7, are said to include over 7,000 files and yet, Wikileaks has promised more soon.
According to the documents inside Vault 7, the CIA was able to hack iOS and Android smartphones in a multitude of ways, What’s more, a program called ‘Weeping Angel’ let CIA operatives listen in on citizens using the microphones of their Smart TVs.
Coming from anyone else, such claims would be instantly shouted down as ridiculous and maybe even delusional., However, it is Wikileaks we are talking about here. The organization has built quite a fearsome reputation for itself over the course of the years. The Vault 7 documents could very well be real and contain documents that are in fact relevant to the CIA.
WikiLeaks says Samsung smart TVs were hacked to enable spying on consumers.
In a trove of documents released Tuesday, WikiLeaks included code that it says shows the CIA worked with U.K. intelligence officials to turn microphones in TVs into listening devices.
Samsung smart TVs have microphones so viewers can make voice commands, such as requests for movie recommendations. The commands typically aren’t transmitted outside the home unless users activate the feature. If the TV is off, there’s no listening being done.
But WikiLeaks claims that documents it obtained show that through a program called Weeping Angel, the target TV appears to be off when it is actually on — and listening.
WikiLeaks says the audio goes to a covert CIA server rather than a party authorized by Samsung. In such cases, audio isn’t limited to TV commands but could include everyday conversations.
The totality of the information, code-named “Vault7,” included more than 8,700 documents and files. WikiLeaks, in a press release announcing the documents, said the CIA “lost control” of its vast array of hacking and spying tools. “The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive,” WikiLeaks said.
In an unusual move, WikiLeaks said it was withholding some secrets inside the documents. Among them, it said it had withheld details of tens of thousands of “CIA targets and attack machines throughout Latin America, Europe and the United States.”
Other tools in the CIA’s arsenal target PCs running Microsoft’s Windows system, according to WikiLeaks, which says many of the attacks are in the form of viruses designed to spread through CDs and USB drives.
WikiLeaks also says the CIA was also targeting control systems used by cars and trucks. Although WikiLeaks didn’t have details on how that might be used, it said the capability might allow the CIA to “engage in nearly undetectable assassinations.”
The authenticity of the documents published by Wikileaks has yet to be confirmed. In a statement to CBS News, CIA spokesman Jonathan Liu said, “We do not comment on the authenticity or content of purported intelligence documents.”
Jake Williams of security firm Rendition Infosec said the extensive references to operation security in the documents released by Wikileaks suggest they came from a government source. “I can’t fathom anyone fabricated that amount of operational security concern,” he said. “It rings true to me.”
Microsoft said it was aware of the reports and was looking into them. Apple and Google didn’t immediately respond to requests for comment. In a statement, General Motors said it would be premature to comment on the documents, including their authenticity. But GM added that it knew of no injuries or death resulting from the hacking of a vehicle.
Samsung issued a statement saying, “Protecting consumers’ privacy and the security of our devices is a top priority at Samsung. We are aware of the report in question and are urgently looking into the matter.”
Meanwhile, the data dump also questions the vast and sweeping powers possessed by the US spy agency. Breaking into smartphones? listening in from the television? Well, I am quite sure no one is going to like this kind of intrusiveness into their personal lives, national security quite apart.
After all, the cast majority of citizens are innocent and these tactics, even when used under the guise of national security, violate the right to privacy of a huge number of US citizens — who are probably not going to be all to happy about this piece of news.
As far as the intent of the leak is concerned, Wikileaks said that it wanted to spark off a public debate over the matter.
The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.
Although, the source could also be the person/people who have provided Wikileaks with these documents. Meanwhile, with President Trump — who doesn’t pay particular attention to mainstream media let alone websites –in the White House, chances of anything major happening to change the status quo is pretty low.
Shared from Mudit Mohilay