WikiLeaks reveals Central Intelligence Agency tools used to hack phones, TVs

WikiLeaks reveals Central Intelligence Agency tools used to hack phones, TVs

WikiLeaks reveals Central Intelligence Agency tools used to hack phones, TVs

In the release, WikiLeaks claimed the CIA Center for Cyber Intelligence had "lost control of the majority of its hacking arsenal".

WikiLeaks will provide technology companies with exclusive access to Central Intelligence Agency hacking tools it possesses, allowing them to patch software flaws, founder Julian Assange says.

If sharing were to occur, it would be an unusual alliance that would give companies like Apple, Google, Microsoft, Samsung and others an opportunity to identify and fix any flaws in their software and devices that were being exploited by USA spy agencies and some foreign allies, as described in the material.

"The American public should be deeply troubled by any WikiLeaks disclosure created to damage the Intelligence Community's ability to protect America against terrorists and other adversaries", the CIA said in a terse statement.

"The worst thing that could happen is for users lose faith in encryption-enabled tools and stop using them". Some of the material was redacted by WikiLeaks to avoid releasing the actual computer code used in the programs. The archive appears to have been circulated among former US government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive. WikiLeaks has also been accused of aiding covert Russian intelligence efforts to undermine the latest USA presidential election, and came under fire recently for publishing documents without first redacting sensitive information that critics argue is not pertinent to the broader privacy and civil liberties issues at stake.

The hacking abilities and programs apparently occurred between 2013 and 2016, where a variety of devices, including Apple's iPhone, Google's Android, Microsoft's Windows and Samsung's TVs, became microphones known as zero day exploits.

Syrian War Over? Assad Winning As US, Russia Join Forces Against Turkey
Some Russian and Syrian regime aircraft mistakenly bombed a village that Syrian Arab Coalition forces had liberated from ISIS. It marks the second meeting in a month between Dunford and Gerasimov.

Titans of oil world meet in Houston after two-year price war
OPEC and Russian Federation began freezing their output levels in January, in order to increase crude prices. Brent for May settlement rose 11 cents to $56.01 a barrel on the London-based ICE Futures Europe exchange.

Aguero to hold showdown talks with Manchester City in June
It would be good if he wasn't playing, that's for sure. "It's (getting) much better and that makes me confident", Guardiola said. Guardiola and City have stated they want the Argentine to stay at the club, but the striker says they've not told him this.

One attack detailed by WikiLeaks turns a Samsung Smart TV into a listening device, fooling the owner to believe the device is switched off using a "Fake-Off" mode.

But a CIA spokesman would not confirm the authenticity of the materials published by WikiLeaks, which said they were leaked from the spy agency's hacking operations.

A number of anecdotal examples of the CIA's hacking technology were revealed in the data dump.

That pledge means "security flaws should get back to the companies so they can get fixed, and not languish for years", Hall said. This protects the messages from man-in-the-middle attacks that intercept communications between a device and an app's servers while also preventing companies from reading the information themselves.

Google's response is nearly identical to Apple's, but isn't particularly comforting given that the documents WikiLeaks has released are at least a year old, and more are on their way.

Related news