Wikileaks: The CIA Is Using Popular TVs, Smartphones And Cars To Spy On Their Owners

(THIS ARTICLE IS COURTESY OF THE WASHINGTON POST)

Wikileaks: The CIA is using popular TVs, smartphones and cars to spy on their owners

March 7 2017

Wikileaks posts alleged trove of CIA hacking tools

Embed Share

 
Anti-secrecy group Wikileaks on Tuesday said it had obtained a top-secret trove of hacking tools used by the CIA to break into phones, communication apps and other electronic devices, and published confidential documents on those programs. (Reuters)

The latest revelations about U.S. government’s powerful hacking tools potentially takes surveillance right into the homes and hip pockets of billions of users worldwide, showing how a remarkable variety of every day devices can be turned to spy on their owners.

Televisions, smartphones and Internet-connected vehicles are all vulnerable to CIA hacking, according to the Wikileaks documents released Tuesday. The capabilities described include recording the sounds, images and the private text messages of users, even when they use encrypted apps to communicate. The CIA also studied whether it could infect vehicle control systems used by modern cars and trucks, which Wikileaks said could allow “nearly undetectable assassinations.”

In the case of a tool called “Weeping Angel” for attacking Samsung SmartTVs, Wikileaks wrote, “After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on, In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.”

The documents, which The Washington Post could not independently verify and the CIA has declined to confirm, list supposed tools for cracking into such widely popular devices as Apple’s iPhone or the Android smartphones whose operating system is made by Google, but there are marked differences from the 2013 revelations by the National Security Agency’s former contractor Edward Snowden.

His documents largely described mass surveillance of Internet-based communications systems, more often than the individual devices that appear to have been the focus of the CIA. By targeting devices, the CIA could gain access to even well-encrypted communications, on such popular apps as Signal and WhatsApp, without having to crack the encryption itself. The Wikileaks reports appear to acknowledge that difference by saying the CIA “bypassed” as opposed to defeated encryption technologies.

Resignation and frustration rippled through Silicon Valley on Tuesday as technologists grappled with revelations of yet another government attempt to exploit their systems.

“The argument that there is some terrorist using a Samsung TV somewhere – as a reason to not disclose that vulnerability to the company, when it puts thousands of Americans at risk — I fundamentally disagree with it, “ said Alex Rice, chief technology officer for Hacker One, a startup that enlists hackers to report security gaps to companies and organizations in exchange for cash.

Privacy experts say the CIA may have been forced into focusing on vulnerable devices because the Internet overall has become more secure through more widespread deployment of encryption. In this new world, devices have become the most vulnerable link.

“The idea that the CIA and NSA can hack into devices is kind of old news,” said Johns Hopkins cryptography expert Matthew Green. “Anyone who thought they couldn’t was living in a fantasy world.”

Snowden’s revelations and the backlash made strong encryption a major, well-funded cause for both privacy advocates and, perhaps more importantly, technology companies that had the engineering expertise and budgets to protect data as it flowed across the world.

Google, Microsoft, Facebook, Yahoo and many other companies announced major new initiatives, in part to protect their brands against accusations by some users that they had made it too easy for the NSA to collect information from their systems. Many Web sites, meanwhile, began encrypting their data flows to users to prevent snooping. Encryption tools such as Tor were strengthened.

Encrypting apps for private messaging, such as Signal, Telegram and WhatsApp exploded in popularity, especially among users around the world who were fearful of government intrusion. In the days following the U.S. presidential election, Signal was among the most downloaded in Apple’s app store and downloads grew by more than 300 percent.

Open Whispers Systems, which developed Signal, released a statement: “The CIA/Wikileaks story today is about getting malware onto phones, none of the exploits are in Signal or break Signal Protocol encryption.” WhatsApp declined to comment, and Telegram did not respond to requests for comment. Google declined to comment, while Samsung and Apple did not immediately respond to requests for comment.

U.S. government authorities complained loudly that the new wave of encryption was undermining their ability to investigate serious crimes, such as terrorism and child pornography. The FBI sued Apple in hopes of forcing it to unlock an iPhone used by the San Bernadino killers before announcing it had other ways to crack the device amid heavy public criticism.

Against that backdrop, many privacy advocates argued that devices — often called “endpoints” for their place on chains of communications that can criss-cross continents — were the best available target left in a world with widespread online encryption. The Wikileaks documents suggests that the CIA may have reached the same conclusion.

“It would certainly be consistent with the hypothesis that we’ve made real progress in the encryption we’ve been introducing,” said Peter Eckersley, technology projects director for the Electronic Frontier Foundation, a San Francisco-based civil liberties group. “It’s impossible to be 100 percent certain, but reading the tea leaves, it’s plausible.”

The Wikileaks revelations also will serve as a reminder that, for whatever the political backlash to revelations about digital spying, it is not going away and probably will continue to grow. The focus on hacking into individual devices — rather than the messages traveling between them — is likely to increase pressure on companies to make those devices safer because, as experts have long said, they are the most vulnerable target in a long chain of digital interactions.

That could be especially important for U.S. tech companies, such as Google, Apple and Facebook, that have worked to rebuild their reputations as stewards of their users’ privacy in recent years.

Cybersecurity experts, meanwhile, reacted with alarm to the news of the Wikileaks release.

“This is explosive,” said Jake Williams, founder of Rendition Infosec, a cybersecurity firm. The material highlights specific antivirus products that can be defeated, going further than a release of NSA hacking tools last year, he said.

The CIA hackers, according to WikiLeaks, even “discussed what the NSA’s …hackers did wrong and how the CIA’s malware makers could avoid similar exposure.”

Hackers who worked at NSA’s Tailored Access Operations unit said the CIA’s library of tools looked comparable. The description of the implants, which are software that enable a hacker to remotely control a compromised device, and other attack tools appear to be “very, very complex” and “at least on par with the NSA,” said one former TAO hacker who spoke on condition his name not be used.

The WikiLeaks release revealed that they have sophisticated “stealth” capabilities that enable hackers not only to infiltrate systems, but evade detection, as well as abilities to “escalate privileges” or move inside a system as if they owned it.

“The only thing that separates NSA from commodity malware in the first place is their ability to remain hidden,” the former TAO hacker said. “So when you talk about the stealth components, it’s huge that you’re seeing a tangible example here of them using and researching stealth.”

Computer security experts noted that the release includes no actual tools or exploits, “so we don’t know if WikiLeaks did not get them or is just not choosing to publish them,” Nicholas Weaver, a computer security researcher at the University of California at Berkeley. “However we should assume that whoever stole this data has access to the exploits and tools.”

He noted that the dates in the files suggest the tools were taken in February or March 2016 and that there are at least two documents marked Top Secret, “which suggests that somebody in early 2016 managed to compromise a Top Secret CIA development system and is willing to say that they did.”

One internal CIA document listed a set of Apple iPhone “exploits” — or tools that can be used to compromise the device by taking advantage of software flaws. Some of the tools are based on “zero-days,” which are software vulnerabilities that have not been shared with the manufacturer. So “some of these descriptions will allow Apple to fix the vulnerabilities,” Weaver said. “But at the same time, they’re out in the public and whoever stole this data could use them against U.S. interests.”

Success Leaves Clues

Jeremy Mcgilvrey

success-leaves-clues

Let’s talk about success. I’m sure you know by now that successful people do – what unsuccessful people won’t do. That’s just a fact of life!

George Washington Carver said: “When you do the common things in life, in an uncommon way, you’ll command the attention of the world.” Pat Riley, one of the few coaches who’s won NBA titles as a player, and a coach put it another way. Riley said: “Do the ordinary things, extraordinarily well.”
Something I’ve learned is: Success will not lower its standards to us, we must raise our standards to success.
I’m sure you’re well aware of who Napoleon Hill is, the author of the highly influential book: Think and Grow Rich. Napoleon Hill spent his life studying, and observing the determinants of success. And in an interesting survey Hill conducted – he talked with people who had earned over 1 million dollars…

View original post 253 more words

70 of the absolute BEST #ActuallyAutistic blog posts I’ve ever read (300th post)

the silent wave

In the very first post on this blog and on my currently-pinned Twitter tweet, I state that “The Silent Wave”, on a grander scale, is not about me; it’s about all of us (especially those of us who are either recently diagnosed or otherwise adult-diagnosed on the Asperger’s/autism spectrum), as we find ourselves and chart a new route through the waters of life.

In my attempt to live up to that statement not just by saying it, but by following through with evidential action, I’ve tried to start a little informal tradition in which, every hundredth post or so, I write a post that hands over the megaphone from my loud mouth to the well-deserving voices.  These commemorative posts have actually become my favorite ones to write!

Today, for my 300th post, I’d like to celebrate (oh god, there’s so much to celebrate–the community, the feedback, the cohesion, the variance…

View original post 1,339 more words

What’s the Big Deal About Premarital Sex?

Source: What’s the Big Deal About Premarital Sex?

Examine Yourself

Source: Examine Yourself

Examine Yourself

Source: Examine Yourself

Examine Yourself

Life Less Ordinary

Examine yourselves as to whether you are in the faith. Test yourselves…
2 Corinthians 13:5

According to seventeenth-century British clergyman Joseph Hall, there are three reasons we aren’t as thankful as we should be: envy, pride, and covetousness. Envy, said Hall, is looking more at someone else’s blessings than at our own. Pride is looking more at ourselves than at our blessings. And covetousness is looking more at what we wish we had than at what we actually have.

When church members, coworkers, schoolmates, or family members become jealous of each other, it eats away at the foundation of a loving relationship. This spirit can only be replaced when we recognize it for what it is—the sin of coveting. We want something possessed by another person—time, money, popularity, success, or whatever it is.

When it exists, covetous jealousy is a sin to be confessed. Loving compassion is an attitude to…

View original post 42 more words

Who Need to do an USA ESTA Application and how to Work ESTA Visa?

U.S.Visa information that might be helpful to travelers.

ESTA US TRAVEL

This modification is applicable to people who come from the 22 European nations taking part in the Visa Waiver program participating as properly in travelers from 5 Asian nations.

Registration for ESTA is mandatory for each person, no matter age or gender, important or minor, and whether a person is supervised or not. Absolutely everyone needs their own private ESTA Authorization USA. To get this permission you have to fill ESTA form, by using clicking right here this application is also required for transit passengers visiting by using plane or ship. But, passengers on the road are exempt.

ESTA is changed if so by using the identity checks at the border. Men and women including the U.S by car from Canada enter are not required to show an approval of stay.

american-878059_1920

ESTA entitles visitor travel or work trips with length of much less than 90 days. For longer remains…

View original post 112 more words

President Trump Seeking To Slash NOAA Budget By 17-22% Putting Many American Lives At Risk

(THIS ARTICLE IS COURTESY OF THE WASHINGTON POST)

The Trump administration is seeking to slash the budget of one of the government’s premier climate science agencies by 17 percent, delivering steep cuts to research funding and satellite programs, according to a four-page budget memo obtained by The Washington Post.

The proposed cuts to the National Oceanic and Atmospheric Administration would also eliminate funding for a variety of smaller programs, including external research, coastal management, estuary reserves and “coastal resilience,” which seeks to bolster the ability of coastal areas to withstand major storms and rising seas.

NOAA is part of the Commerce Department, which would be hit by an overall 18 percent budget reduction from its current funding level.

The Office of Management and Budget also asked the Commerce Department to provide information about how much it would cost to lay off employees, while saying those employees who do remain with the department should get a 1.9 percent pay increase in January 2018. It requested estimates for terminating leases and government “property disposal.”

The OMB outline for the Commerce Department for fiscal 2018 proposed sharp reductions in specific areas within NOAA such as spending on education, grants and research. NOAA’s Office of Oceanic and Atmospheric Research would lose $126 million, or 26 percent, of the funds it has under the current budget. Its satellite data division would lose $513 million, or 22 percent, of its current funding under the proposal.

The National Marine Fisheries Service and National Weather Service would be fortunate by comparison, facing only 5 percent cuts.

The figures are part of the OMB’s “passback” document, a key part of the annual budget process in which the White House instructs agencies to draw up detailed budgets for submission to Congress. The numbers often change during the course of negotiations between the agency and the White House and between lawmakers and the administration later on. The 2018 fiscal year starts Oct. 1.

A spokesperson for the Commerce Department declined to comment. A White House official who spoke on the condition of anonymity said that the process was “evolving” and cautioned against specific numbers. The official would not respond to questions about the four-page passback document.

The biggest single cut proposed by the passback document comes from NOAA’s satellite division, known as the National Environmental Satellite, Data and Information Service, which includes a key repository of climate and environmental information, the National Centers for Environmental Information. Researchers there were behind a study suggesting that there has been no recent slowdown in the rate of climate change — research that drew the ire of Republicans in Congress.

Another proposed cut would eliminate a $73 million program called Sea Grant, which supports coastal research conducted through 33 university programs across the country. That includes institutions in many swing states that went for President Trump, such as the University of Wisconsin at Madison, the University of Michigan, Ohio State University, the University of Florida and North Carolina State University.

The OMB passback said that the administration wanted to “prioritize rebuilding the military” and would seek “savings and efficiencies to keep the Nation on a responsible fiscal path.” It said that its proposed funding cut for the Commerce Department “highlights the tradeoffs and choices inherent in pursuing these goals.”

The OMB also said that the White House would come up with ideas to modernize “outdated infrastructure,” but it said that agencies should not expect increases in their fiscal 2018 discretionary-spending “toplines” as a result.

On Wednesday, after his confirmation, Commerce Secretary Wilbur Ross said that drawing up a budget would be a top priority. “One of the first steps,” he said, “will be securing adequate appropriations from the Congress. In a period of budgetary constraint, that will be a major challenge.”

The OMB passback document said that the Commerce Department, like other agencies, should “buy and manage like a business.” It urged the department to explore greater use of privately owned commercial satellites and commercial cloud services while submitting to the OMB a plan to retire or replace “at least one high priority legacy IT system” beginning in 2018.

Many scientists warned that the deep cuts at NOAA could hurt safety as well as academic programs.

Conrad Lautenbacher, a retired vice admiral who was the NOAA administrator under President George W. Bush, said, “I think the cuts are ill timed given the needs of society, economy and the military.” He added, “It will be very hard for NOAA to manage and maintain the kind of services the country requires” with the proposed cuts.

Jane Lubchenco, NOAA administrator under President Barack Obama, said that 90 percent of the information for weather forecasts comes from satellites. “Cutting NOAA’s satellite budget will compromise NOAA’s mission of keeping Americans safe from extreme weather and providing forecasts that allow businesses and citizens to make smart plans,” she said.

Rick Spinrad, a former chief scientist for NOAA, said: “NOAA’s research and operations, including satellite data management, support critical safety needs. A reduced investment now would virtually guarantee jeopardizing the safety of the American public.”

Time-lapse images show Tropical Storm Matthew turning into a hurricane

Embed Share

Play Video0:36
NOAA released a time lapse of satellite imagery from Sept. 27 to Sept. 30 that shows Tropical Storm Matthew moving into the Caribbean Sea, where it became a hurricane. (NOAA)

He said that weather warnings for tornadoes and hurricanes could be compromised and that navigational capacity used to help guide commercial ships and other mariners would suffer, leaving them without the “improved forecasts they need to safely maneuver coastal waters.” It could become harder to warn of tsunamis and forecast weather that will cause power outages.

David Titley, a professor of meteorology at Pennsylvania State University who served as NOAA’s chief operating officer in the Obama administration, said that “oddly” the White House budget office, despite the president’s commitment to building infrastructure, would cut NOAA’s budget for ships and satellites. “These cuts will impact good private-sector jobs in the U.S.,” Titley said. “The loss of capability will make America weaker both in space and on the sea — a strange place to be for an administration that campaigned to ‘make America great again.’ ”

Chris Mooney and Abby Phillip contributed to this report.

Encounters with like-minded travellers !!!

Miles from our home

img_20160912_123311We travel, some of us to escape routine life, to wander and to seek inner peace !!!

The Road That Never Ends

My very first post, an experience to remember forever.

While returning from Tso Moriri (Karzok) on 7th September, my bike’s ignition key broke in two pieces due to the heavy vibration on off roads. It was 50 KMs before Pang, no mechanical help for next 300 KMs. No sign of life for next 30 KMs. There was no way we could start our engine because i didn’t have a spare key. But there are people who are always there to lend their hand. We met three cool people. Fabian from Switzerland, Ralf from Germany (To my right) and Angelina from vietnam. These guys somehow managed to break the ignition which made it free and loose and could start the engine with broken key, which was the only option…

View original post 128 more words

This blog, trouthtroubles.com is owned, written, and operated by oldpoet56. All articles, posts, and materials found here, except for those that I have pressed here from someone else’s blog for the purpose of showing off their work, are under copyright and this website must be credited if my articles are re-blogged, pressed, or shared.

—Thank You, oldpoet56, T.R.S.

truthforallus

The Truth.

Pawan Belala Says

Welcome to Feel the flow of fresh Pawan!

there is enough for you,think about others.

welcome to the new world.its all about human values,philanthropy.nature gave you everything,now its your time to do something for people.let the live people.#poems #hindi #nation #inspirational #motivation #indian #human

Millennial Millions

Everything MIillenial

Scribblings

The official blog of fantasy/sf/horror (and dog blog) writer James Viscosi

The Ballistic Racers Flyball Team - San Diego

The official website and blog of the Ballistic Racers Flyball Team

Dennis's Diary of Destruction

Featuring Dennis the Rescue Vizsla and his imaginary friends.

Darwin on the rocks and around the world

Photography and travel blog

Removing Blocks

A Blog about me on a journey to remove my emotional blocks, once I figure this out only then I can achieve happiness...

%d bloggers like this: