Wikileaks: The CIA Is Using Popular TVs, Smartphones And Cars To Spy On Their Owners

(THIS ARTICLE IS COURTESY OF THE WASHINGTON POST)

Wikileaks: The CIA is using popular TVs, smartphones and cars to spy on their owners

March 7 2017

Wikileaks posts alleged trove of CIA hacking tools

Embed Share

 
Anti-secrecy group Wikileaks on Tuesday said it had obtained a top-secret trove of hacking tools used by the CIA to break into phones, communication apps and other electronic devices, and published confidential documents on those programs. (Reuters)

The latest revelations about U.S. government’s powerful hacking tools potentially takes surveillance right into the homes and hip pockets of billions of users worldwide, showing how a remarkable variety of every day devices can be turned to spy on their owners.

Televisions, smartphones and Internet-connected vehicles are all vulnerable to CIA hacking, according to the Wikileaks documents released Tuesday. The capabilities described include recording the sounds, images and the private text messages of users, even when they use encrypted apps to communicate. The CIA also studied whether it could infect vehicle control systems used by modern cars and trucks, which Wikileaks said could allow “nearly undetectable assassinations.”

In the case of a tool called “Weeping Angel” for attacking Samsung SmartTVs, Wikileaks wrote, “After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on, In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.”

The documents, which The Washington Post could not independently verify and the CIA has declined to confirm, list supposed tools for cracking into such widely popular devices as Apple’s iPhone or the Android smartphones whose operating system is made by Google, but there are marked differences from the 2013 revelations by the National Security Agency’s former contractor Edward Snowden.

His documents largely described mass surveillance of Internet-based communications systems, more often than the individual devices that appear to have been the focus of the CIA. By targeting devices, the CIA could gain access to even well-encrypted communications, on such popular apps as Signal and WhatsApp, without having to crack the encryption itself. The Wikileaks reports appear to acknowledge that difference by saying the CIA “bypassed” as opposed to defeated encryption technologies.

Resignation and frustration rippled through Silicon Valley on Tuesday as technologists grappled with revelations of yet another government attempt to exploit their systems.

“The argument that there is some terrorist using a Samsung TV somewhere – as a reason to not disclose that vulnerability to the company, when it puts thousands of Americans at risk — I fundamentally disagree with it, “ said Alex Rice, chief technology officer for Hacker One, a startup that enlists hackers to report security gaps to companies and organizations in exchange for cash.

Privacy experts say the CIA may have been forced into focusing on vulnerable devices because the Internet overall has become more secure through more widespread deployment of encryption. In this new world, devices have become the most vulnerable link.

“The idea that the CIA and NSA can hack into devices is kind of old news,” said Johns Hopkins cryptography expert Matthew Green. “Anyone who thought they couldn’t was living in a fantasy world.”

Snowden’s revelations and the backlash made strong encryption a major, well-funded cause for both privacy advocates and, perhaps more importantly, technology companies that had the engineering expertise and budgets to protect data as it flowed across the world.

Google, Microsoft, Facebook, Yahoo and many other companies announced major new initiatives, in part to protect their brands against accusations by some users that they had made it too easy for the NSA to collect information from their systems. Many Web sites, meanwhile, began encrypting their data flows to users to prevent snooping. Encryption tools such as Tor were strengthened.

Encrypting apps for private messaging, such as Signal, Telegram and WhatsApp exploded in popularity, especially among users around the world who were fearful of government intrusion. In the days following the U.S. presidential election, Signal was among the most downloaded in Apple’s app store and downloads grew by more than 300 percent.

Open Whispers Systems, which developed Signal, released a statement: “The CIA/Wikileaks story today is about getting malware onto phones, none of the exploits are in Signal or break Signal Protocol encryption.” WhatsApp declined to comment, and Telegram did not respond to requests for comment. Google declined to comment, while Samsung and Apple did not immediately respond to requests for comment.

U.S. government authorities complained loudly that the new wave of encryption was undermining their ability to investigate serious crimes, such as terrorism and child pornography. The FBI sued Apple in hopes of forcing it to unlock an iPhone used by the San Bernadino killers before announcing it had other ways to crack the device amid heavy public criticism.

Against that backdrop, many privacy advocates argued that devices — often called “endpoints” for their place on chains of communications that can criss-cross continents — were the best available target left in a world with widespread online encryption. The Wikileaks documents suggests that the CIA may have reached the same conclusion.

“It would certainly be consistent with the hypothesis that we’ve made real progress in the encryption we’ve been introducing,” said Peter Eckersley, technology projects director for the Electronic Frontier Foundation, a San Francisco-based civil liberties group. “It’s impossible to be 100 percent certain, but reading the tea leaves, it’s plausible.”

The Wikileaks revelations also will serve as a reminder that, for whatever the political backlash to revelations about digital spying, it is not going away and probably will continue to grow. The focus on hacking into individual devices — rather than the messages traveling between them — is likely to increase pressure on companies to make those devices safer because, as experts have long said, they are the most vulnerable target in a long chain of digital interactions.

That could be especially important for U.S. tech companies, such as Google, Apple and Facebook, that have worked to rebuild their reputations as stewards of their users’ privacy in recent years.

Cybersecurity experts, meanwhile, reacted with alarm to the news of the Wikileaks release.

“This is explosive,” said Jake Williams, founder of Rendition Infosec, a cybersecurity firm. The material highlights specific antivirus products that can be defeated, going further than a release of NSA hacking tools last year, he said.

The CIA hackers, according to WikiLeaks, even “discussed what the NSA’s …hackers did wrong and how the CIA’s malware makers could avoid similar exposure.”

Hackers who worked at NSA’s Tailored Access Operations unit said the CIA’s library of tools looked comparable. The description of the implants, which are software that enable a hacker to remotely control a compromised device, and other attack tools appear to be “very, very complex” and “at least on par with the NSA,” said one former TAO hacker who spoke on condition his name not be used.

The WikiLeaks release revealed that they have sophisticated “stealth” capabilities that enable hackers not only to infiltrate systems, but evade detection, as well as abilities to “escalate privileges” or move inside a system as if they owned it.

“The only thing that separates NSA from commodity malware in the first place is their ability to remain hidden,” the former TAO hacker said. “So when you talk about the stealth components, it’s huge that you’re seeing a tangible example here of them using and researching stealth.”

Computer security experts noted that the release includes no actual tools or exploits, “so we don’t know if WikiLeaks did not get them or is just not choosing to publish them,” Nicholas Weaver, a computer security researcher at the University of California at Berkeley. “However we should assume that whoever stole this data has access to the exploits and tools.”

He noted that the dates in the files suggest the tools were taken in February or March 2016 and that there are at least two documents marked Top Secret, “which suggests that somebody in early 2016 managed to compromise a Top Secret CIA development system and is willing to say that they did.”

One internal CIA document listed a set of Apple iPhone “exploits” — or tools that can be used to compromise the device by taking advantage of software flaws. Some of the tools are based on “zero-days,” which are software vulnerabilities that have not been shared with the manufacturer. So “some of these descriptions will allow Apple to fix the vulnerabilities,” Weaver said. “But at the same time, they’re out in the public and whoever stole this data could use them against U.S. interests.”

Success Leaves Clues

Jeremy Mcgilvrey

success-leaves-clues

Let’s talk about success. I’m sure you know by now that successful people do – what unsuccessful people won’t do. That’s just a fact of life!

George Washington Carver said: “When you do the common things in life, in an uncommon way, you’ll command the attention of the world.” Pat Riley, one of the few coaches who’s won NBA titles as a player, and a coach put it another way. Riley said: “Do the ordinary things, extraordinarily well.”
Something I’ve learned is: Success will not lower its standards to us, we must raise our standards to success.
I’m sure you’re well aware of who Napoleon Hill is, the author of the highly influential book: Think and Grow Rich. Napoleon Hill spent his life studying, and observing the determinants of success. And in an interesting survey Hill conducted – he talked with people who had earned over 1 million dollars…

View original post 253 more words

70 of the absolute BEST #ActuallyAutistic blog posts I’ve ever read (300th post)

the silent wave

In the very first post on this blog and on my currently-pinned Twitter tweet, I state that “The Silent Wave”, on a grander scale, is not about me; it’s about all of us (especially those of us who are either recently diagnosed or otherwise adult-diagnosed on the Asperger’s/autism spectrum), as we find ourselves and chart a new route through the waters of life.

In my attempt to live up to that statement not just by saying it, but by following through with evidential action, I’ve tried to start a little informal tradition in which, every hundredth post or so, I write a post that hands over the megaphone from my loud mouth to the well-deserving voices.  These commemorative posts have actually become my favorite ones to write!

Today, for my 300th post, I’d like to celebrate (oh god, there’s so much to celebrate–the community, the feedback, the cohesion, the variance…

View original post 1,339 more words

What’s the Big Deal About Premarital Sex?

Source: What’s the Big Deal About Premarital Sex?

Examine Yourself

Source: Examine Yourself

Examine Yourself

Source: Examine Yourself

Examine Yourself

Life Less Ordinary

Examine yourselves as to whether you are in the faith. Test yourselves…
2 Corinthians 13:5

According to seventeenth-century British clergyman Joseph Hall, there are three reasons we aren’t as thankful as we should be: envy, pride, and covetousness. Envy, said Hall, is looking more at someone else’s blessings than at our own. Pride is looking more at ourselves than at our blessings. And covetousness is looking more at what we wish we had than at what we actually have.

When church members, coworkers, schoolmates, or family members become jealous of each other, it eats away at the foundation of a loving relationship. This spirit can only be replaced when we recognize it for what it is—the sin of coveting. We want something possessed by another person—time, money, popularity, success, or whatever it is.

When it exists, covetous jealousy is a sin to be confessed. Loving compassion is an attitude to…

View original post 42 more words

Who Need to do an USA ESTA Application and how to Work ESTA Visa?

U.S.Visa information that might be helpful to travelers.

ESTA US TRAVEL

This modification is applicable to people who come from the 22 European nations taking part in the Visa Waiver program participating as properly in travelers from 5 Asian nations.

Registration for ESTA is mandatory for each person, no matter age or gender, important or minor, and whether a person is supervised or not. Absolutely everyone needs their own private ESTA Authorization USA. To get this permission you have to fill ESTA form, by using clicking right here this application is also required for transit passengers visiting by using plane or ship. But, passengers on the road are exempt.

ESTA is changed if so by using the identity checks at the border. Men and women including the U.S by car from Canada enter are not required to show an approval of stay.

american-878059_1920

ESTA entitles visitor travel or work trips with length of much less than 90 days. For longer remains…

View original post 112 more words

President Trump Seeking To Slash NOAA Budget By 17-22% Putting Many American Lives At Risk

(THIS ARTICLE IS COURTESY OF THE WASHINGTON POST)

The Trump administration is seeking to slash the budget of one of the government’s premier climate science agencies by 17 percent, delivering steep cuts to research funding and satellite programs, according to a four-page budget memo obtained by The Washington Post.

The proposed cuts to the National Oceanic and Atmospheric Administration would also eliminate funding for a variety of smaller programs, including external research, coastal management, estuary reserves and “coastal resilience,” which seeks to bolster the ability of coastal areas to withstand major storms and rising seas.

NOAA is part of the Commerce Department, which would be hit by an overall 18 percent budget reduction from its current funding level.

The Office of Management and Budget also asked the Commerce Department to provide information about how much it would cost to lay off employees, while saying those employees who do remain with the department should get a 1.9 percent pay increase in January 2018. It requested estimates for terminating leases and government “property disposal.”

The OMB outline for the Commerce Department for fiscal 2018 proposed sharp reductions in specific areas within NOAA such as spending on education, grants and research. NOAA’s Office of Oceanic and Atmospheric Research would lose $126 million, or 26 percent, of the funds it has under the current budget. Its satellite data division would lose $513 million, or 22 percent, of its current funding under the proposal.

The National Marine Fisheries Service and National Weather Service would be fortunate by comparison, facing only 5 percent cuts.

The figures are part of the OMB’s “passback” document, a key part of the annual budget process in which the White House instructs agencies to draw up detailed budgets for submission to Congress. The numbers often change during the course of negotiations between the agency and the White House and between lawmakers and the administration later on. The 2018 fiscal year starts Oct. 1.

A spokesperson for the Commerce Department declined to comment. A White House official who spoke on the condition of anonymity said that the process was “evolving” and cautioned against specific numbers. The official would not respond to questions about the four-page passback document.

The biggest single cut proposed by the passback document comes from NOAA’s satellite division, known as the National Environmental Satellite, Data and Information Service, which includes a key repository of climate and environmental information, the National Centers for Environmental Information. Researchers there were behind a study suggesting that there has been no recent slowdown in the rate of climate change — research that drew the ire of Republicans in Congress.

Another proposed cut would eliminate a $73 million program called Sea Grant, which supports coastal research conducted through 33 university programs across the country. That includes institutions in many swing states that went for President Trump, such as the University of Wisconsin at Madison, the University of Michigan, Ohio State University, the University of Florida and North Carolina State University.

The OMB passback said that the administration wanted to “prioritize rebuilding the military” and would seek “savings and efficiencies to keep the Nation on a responsible fiscal path.” It said that its proposed funding cut for the Commerce Department “highlights the tradeoffs and choices inherent in pursuing these goals.”

The OMB also said that the White House would come up with ideas to modernize “outdated infrastructure,” but it said that agencies should not expect increases in their fiscal 2018 discretionary-spending “toplines” as a result.

On Wednesday, after his confirmation, Commerce Secretary Wilbur Ross said that drawing up a budget would be a top priority. “One of the first steps,” he said, “will be securing adequate appropriations from the Congress. In a period of budgetary constraint, that will be a major challenge.”

The OMB passback document said that the Commerce Department, like other agencies, should “buy and manage like a business.” It urged the department to explore greater use of privately owned commercial satellites and commercial cloud services while submitting to the OMB a plan to retire or replace “at least one high priority legacy IT system” beginning in 2018.

Many scientists warned that the deep cuts at NOAA could hurt safety as well as academic programs.

Conrad Lautenbacher, a retired vice admiral who was the NOAA administrator under President George W. Bush, said, “I think the cuts are ill timed given the needs of society, economy and the military.” He added, “It will be very hard for NOAA to manage and maintain the kind of services the country requires” with the proposed cuts.

Jane Lubchenco, NOAA administrator under President Barack Obama, said that 90 percent of the information for weather forecasts comes from satellites. “Cutting NOAA’s satellite budget will compromise NOAA’s mission of keeping Americans safe from extreme weather and providing forecasts that allow businesses and citizens to make smart plans,” she said.

Rick Spinrad, a former chief scientist for NOAA, said: “NOAA’s research and operations, including satellite data management, support critical safety needs. A reduced investment now would virtually guarantee jeopardizing the safety of the American public.”

Time-lapse images show Tropical Storm Matthew turning into a hurricane

Embed Share

Play Video0:36
NOAA released a time lapse of satellite imagery from Sept. 27 to Sept. 30 that shows Tropical Storm Matthew moving into the Caribbean Sea, where it became a hurricane. (NOAA)

He said that weather warnings for tornadoes and hurricanes could be compromised and that navigational capacity used to help guide commercial ships and other mariners would suffer, leaving them without the “improved forecasts they need to safely maneuver coastal waters.” It could become harder to warn of tsunamis and forecast weather that will cause power outages.

David Titley, a professor of meteorology at Pennsylvania State University who served as NOAA’s chief operating officer in the Obama administration, said that “oddly” the White House budget office, despite the president’s commitment to building infrastructure, would cut NOAA’s budget for ships and satellites. “These cuts will impact good private-sector jobs in the U.S.,” Titley said. “The loss of capability will make America weaker both in space and on the sea — a strange place to be for an administration that campaigned to ‘make America great again.’ ”

Chris Mooney and Abby Phillip contributed to this report.

Encounters with like-minded travellers !!!

Miles from our home

img_20160912_123311We travel, some of us to escape routine life, to wander and to seek inner peace !!!

The Road That Never Ends

My very first post, an experience to remember forever.

While returning from Tso Moriri (Karzok) on 7th September, my bike’s ignition key broke in two pieces due to the heavy vibration on off roads. It was 50 KMs before Pang, no mechanical help for next 300 KMs. No sign of life for next 30 KMs. There was no way we could start our engine because i didn’t have a spare key. But there are people who are always there to lend their hand. We met three cool people. Fabian from Switzerland, Ralf from Germany (To my right) and Angelina from vietnam. These guys somehow managed to break the ignition which made it free and loose and could start the engine with broken key, which was the only option…

View original post 128 more words

Follow me on Twitter

Social

Follow Truth Troubles: Why people hate the truths' of the real world on WordPress.com
oldpoet56

oldpoet56

truthtroubles.wordpress.com/ Just an average man who tries to do his best at being the kind of person the Bible tells us we are all suppose to be. Not perfect, never have been, don't expect anyone else to be perfect either. Always try to be very easy going type of a person if allowed to be.

View Full Profile →

Karina Pinella

Writing the Wrong, Right, and Ridiculous

Web Development Ebooks

“Life is like riding a bicycle. To keep your balance, you must keep moving.” — Albert Einstein

Jardinagem Poeta

Este sítio refere-se à jardins e ao trabalho do jardineiro.

Actually Autistic Blogs List

A list of blogs by Autistic adults

The Best Articles Of Collection

A collection of articles that are interesting to read, provide motivation and encouragement for you.

Viviaggia.com

Send us your trip's photos

desert mice and dreams

a few virtual stories and wanderings

#FILMose

Crítica para quem gosta de Cinema.

Danger Kit

- Poetry -

Behind The Words

Sandy Masia's author blog...

malave.com

humanista

themomfred

Rain Makes Applesauce

Chainsoff's Blog

A topnotch WordPress.com site

Natuurfreak

Mijn fotoblog

Hisamullah's Blog

Just another WordPress.com site

The Next 366 Days

A Remarkable Journey With God

SOulBLINDministry.com

The Bible you've been missing

Things Made Known

Making sense of God's world with God's word

The Phantom Rem

Stories From Within

harshuweb

Hello bloggers! How are you all doing? I hope everything is fine! Please do visit my blog.Comment,like,share anything you want.

Didi Oviatt

Author of the Time Waster Series-Super Short Preludes, and suspense novels Aggravated Momentum, The Stix, and New Age Lamians... (blogger)

Christian Daily Verse

Daily Devotional of Earvin Kyle Tupas Amacan

Jagmal

Let The Jag be Millionaire

Anda Bertanya Ateis Menjawab

Memperkenalkan keberadaan ateis di indonesia secara bersahabat

unrecognised virtuose

Run by a naive utopianist, Theodora R. Zygarde.

Kupretist blog

Seek and You Shall find

Chinese Commercial Correspondence

Chinese, language, learn, speak, write, textbook, contract, beginner, advanced, intermediate, commercial, marketing, correspondence, characters, radicals, decomposition, business, numbers, numerals, contract

Me,my weird thoughts and I

A place where I can doodle my thoughts and other random stuff that interest me at the time.

The Picture Patch

photography, nature, life, people, thoughts, passions

Graffiti Lux and Murals

Luxuriating in Ephemeral Art

Toni Roberts' Photojournal of Self-Transformation

one woman's journey to wholeness...

Joy of Life

“Enjoy life. This is not a dress rehearsal.”

Ardiantoyugo

Night Riding Without Seeing

Mohamad Al Karbi

محمد القربي

Murmurs from the Earth...

Whispers from the Sky

inkyfire

ink of love in fire - design is my desire

Mistakes & Adventures

What I've always wanted

praythroughhistory

Heal the past. Free the present. Bless the future.

Así, como un 8 tumbado

Abriendo el alma

Luna de papel :: Talleres Literarios en Valencia

El blog de Aurora Luna. Talleres de escritura creativa en Valencia. Club de lectura. Cursos de novela, poesía, cuento y narrativa breve. Recursos para escritores y herramientas para aprender a escribir en el taller literario. Reflexiones sobre creatividad y literatura. Master class, profesores, clases presenciales y seminarios de creación literaria adscritos a "LIBRO, VUELA LIBRE". Comunidad de escritores y lectores en Valencia. Dinámicas en curso y ejercicios de escritura creativa. Palabras, concursos, vuelos y encuentros literarios.

How to blue

Un blog acerca mi vida personal sientete libre de juzgar.

{The Sea Calls Us Home}

Welcome. This is a gathering of thoughts. Real and honest thoughts, and I hope you enjoy them.

Damon Ashworth Psychology

Musings about psychology, therapy and research

Food Food

Food Processing, Food and health, Food Engineering, Food Chemistry, Food Facts

%d bloggers like this: