“We have no comment on the authenticity of the intelligence documents released by Wikileaks or on the status of any investigation into the source of the documents. However, there are several critical points we would like to make: […] we collect foreign intelligence to protect America from terrorists, by being innovative. […] The CIA is legally prohibited from conducting electronic surveillance targeting individuals at home, and the CIA does not do so.”
We have all read about Wikileaks at some point. An international non-profit aiming to leak classified information from all over the world. Destroying democracies, shaming governments, and now… even the CIA.
This is apparently the largest release of classified documents on the CIA, with more than 8000 documents. You are witnessing history.
Of course, what’s a nice book without a title? Wikileaks thought of that too:
You can choose to read it all on Wikileaks itself if you’d like, or let us do the hard part for you.
The initial series of Vault 7 is called “Year Zero”, that comprises a bit more than 8000 pages that speak about CIA’s “global covert hacking program”, “weaponized exploits”, and everything you need to know.
Out of all the information leaked on the CIA, there’s one particular topic that frightens us. Wikileaks has described malware and other tools used by the CIA that can be used to hack into “some of the world’s most popular technology platforms”.
Let’s rephrase that for you. Your precious TV where you watch hours of Netflix; your beloved iOS or Android operated phone in which you store passwords, credit card details, and even that occasional google search (“How to get away with murder”, will CIA know we’re talking about the show?), are all exposed.
Their hacking tools can turn your mobile phones into a potential “eavesdropping spy”. Without your knowledge, they can gain complete control over your gadget and use it to observe, as well as listen, to your surroundings.
“Hey, the CIA is just trying to catch the bad guys, right?”,
No, not at the expense of our privacy.
In the same way that the Amazon AI is constantly listening, waiting for her “Alexa” command, so can your device, potentially. We’re not saying this has happened to you since the chances are extremely slim, because unless necessary, they wouldn’t risk their time and secrecy on you. However, if it has, the CIA officially knows your tastes, locations, late night texts, and even web history (your “private browsing” isn’t fooling anyone).
If this hasn’t scared you enough, and the Doctor Who fans out there will love this, there is a tool called the “Weeping Angel”, which puts your Samsung TV on a “fake-off” mode, leading you to believe that the tv is off when in fact, it’s not. You can only imagine what happens after that.
If you’re interested in reading more detailed information from Vault 7, definitely read up on this article. But for your leisure, we’ll add our top points here.
- The CIA has apparently lost control over the majority of its hacking arsenal. This means that whoever controls their current malware systems, could possibly control you. “The archives appear to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”
- The CIA created it’s own NSA (National Security (or surveillance?) Agency).
- In 2014, the CIA was looking at ways to infect vehicle control systems in modern cars and trucks.
- The CIA has refused to appropriately comment on the matters, with Apple and Samsung claiming that they’re doing their best and that the their software is equipped to battle such malware.
Remember, there isn’t any “proper” way to protect yourself against being hacked or cyber-spied. Just make sure to revisit this article to brush up on your cyber terminology and equip your devices with the proper software to be safe. Encryption is key.
And finally, the most important safety tip of all…