{UAH} The CIA can turn your TV into a listening device – WikiLeaks
The CIA can turn your TV into a listening device, bypass popular encryption apps, and possibly control your car, according to a trove of alleged documents from the US spy agency released Tuesday by WikiLeaks.The group posted nearly 9,000 documents it said were leaked from the Central Intelligence Agency, in what it described as the largest-ever publication of secret intelligence materials.
WikiLeaks claimed that a vast trove of CIA documents, hacking tools and code representing "the majority of its hacking arsenal" were leaked within the cyber security community — and that it had received, and released, a part of them.
-- WikiLeaks claimed that a vast trove of CIA documents, hacking tools and code representing "the majority of its hacking arsenal" were leaked within the cyber security community — and that it had received, and released, a part of them.
"This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA," it said, warning of a risk of cyber weapons proliferation.
Neither the CIA nor the White House would comment on the release of the documents, or their content.
If corroborated, the leak could represent a huge new embarrassment to US intelligence, adding to Edward Snowden's 2013 expose of NSA spying on Americans' communications, and the arrest last year of an NSA official for removing massive amounts of top secret material to his home over 20 years.
Neither the CIA nor the White House would comment on the release of the documents, or their content.
If corroborated, the leak could represent a huge new embarrassment to US intelligence, adding to Edward Snowden's 2013 expose of NSA spying on Americans' communications, and the arrest last year of an NSA official for removing massive amounts of top secret material to his home over 20 years.
WikiLeaks said the data shows that the CIA is now rivalling the National Security Agency, the US government's main electronic spying body, in cyber warfare, but with less oversight.
– Bypassing encryption –
The archive shows the CIA exploiting weaknesses it discovers in hardware and software systems, including those made by US companies — without letting anyone know about the flaws in question.
-- – Bypassing encryption –
The archive shows the CIA exploiting weaknesses it discovers in hardware and software systems, including those made by US companies — without letting anyone know about the flaws in question.
Allaah gives the best to those who leave the choice to Him."And if Allah touches you with harm, none can remove it but He, and if He touches you with good, then He is Able to do all things." (6:17)
Disclaimer:Everyone posting to this Forum bears the sole responsibility for any legal consequences of his or her postings, and hence statements and facts must be presented responsibly. Your continued membership signifies that you agree to this disclaimer and pledge to abide by our Rules and Guidelines.To unsubscribe from this group, send email to: ugandans-at-heart+unsubscribe@googlegroups.com
0 comments:
Post a Comment