The estimated reading time for this post is 4 minutes
This week, WikiLeaks released a statement saying that it had possession of Vault 7, a collection of CIA software files that could use tech devices to spy on others. Targeted devices at risk include iPhones, Android phones, Samsung TVs and Internet-connected cars.
According to WikiLeaks, Vault 7 is “the largest intelligence publication in history.”
While the CIA has neither confirmed nor denied the WikiLeaks statement, the contents of it, if true, are concerning. The statement explains how the CIA uses hacking software to spy on others and that the Agency “lost control of its arsenal,” meaning that these tools could be in the possession of others.
The Vault 7 files mentioned in the statement range from 2013 to 2016 and WikiLeaks claims it has only released information about some of the spy tools in Vault 7. Future disclosures about the contents of Vault 7 were promised.
WikiLeaks did not publish the software code nor name the source of the information.
While the statement did not disclose Vault 7 software code, WikiLeaks claims to have it in its possession. The files contain 8,761 documents and hundreds of millions of lines of code that include “the entire hacking capacity of the CIA,” according to the statement.
From the WikiLeaks statement:
“Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”
The Tools
These software tools in Vault 7 allegedly allow for extensive hacking into personal technology devices, such as iPhone and Android phones. The owner a of device hacked with these tools has no way of knowing a hack has occurred.
These hacking tools allow the phone to be turned on and the microphone and camera activated, without the owner’s knowledge this is happening. The phone would still appear to be turned off with no indication that it was on and transmitting audio and video to the hacker.
Smartphone apps that allow for encrypted messages, such as WhatsApp and Signal, were not protected from the spy software because access was at the phone level. Once the phone is controlled, the hacker has access to the entire phone, including encrypted apps, even though the apps themselves were not hacked.
Apple released a statement late on Tuesday to Tech Crunch, saying:
“Apple is deeply committed to safeguarding our customers’ privacy and security. The technology built into today’s iPhone represents the best data security available to consumers, and we’re constantly working to keep it that way.
Our products and software are designed to quickly get security updates into the hands of our customers, with nearly 80% of users running the latest version of our operating system. While our initial analysis indicates that many of the issues leaked today were already patched in the latest iOS, we will continue work to rapidly address any identified vulnerabilities. We always urge customers to download the latest iOS to make sure they have the most recent security updates.”
Windows and Mac computers were also targeted, according to WikiLeaks. Once hacked, the computer could be turned on remotely, and the camera and microphone activated, all without the user’s knowledge.
A tool to hack Samsung smart TVs, named Weeping Angel, allowed access to the microphone even when the TVs were turned off, according to WikiLeaks. The TVs have a “fake-off” setting, which the tools allegedly use to listen.
The CIA also contemplated hacking Internet-connected cars, though it was unclear from the statement whether that tool was ever developed.
How to Protect Yourself
The WikiLeaks release referred to files that targeted older versions of software, including versions up to Android 4.0 (Ice Cream Sandwich) and iOS 8.2. Many of the vulnerabilities have been patched in more recent versions and in updates.
Be sure to update your devices to the latest operating systems. If your devices are not eligible for updates because they are too old, it may be time to upgrade to newer devices.
What You Need to Know
We cannot be certain whether the information contained in the WikiLeaks statement are true.
It may not come as a surprise that the CIA conducts cyber-espionage, but the allegation that its tools may have been leaked outside the agency is alarming.
Once the software code is out of the control of the Agency, it can be shared, copied and modified without limitation. Because it is code and not a physical object, it can be copied and distributed indefinitely.
Keeping devices updated with the latest software can help us try to stay ahead of hackers.
Your Thoughts
Do you believe the information released by WikiLeaks is true? Will this make you change how you use tech? Do you keep your tech updated with the latest software?
Share your thoughts in the Comments section below!
* Computer code with lock image (edited) Blogtrepreneur via Flickr and Creative Commons
** Computer code image courtesy of Ilya Pavlov via Unsplash and Creative Commons
Verizon Wireless
Congratulations to Verizon Wireless who, for the seventh consecutive year, was awarded the best overall network in Pennsylvania by Root Metrics, an independent third-party. “Based on our testing, Verizon is the undisputed leader in terms of coverage and network reliability. Indeed, Verizon’s network reliability results were the strongest among all carriers at the metro, state, and national levels in the second half of 2016.”
Voice of America Learning English
Interested in learning English while reading about technology? Check out my weekly personal technology column at Voice of America Learning English. This week’s article: Facebook Update Deals with Fake News Problem.
Harleena Singh says
Hi Carolyn,
Interesting indeed 🙂
I feel the information released by WikiLeaks is true, especially as they have gone into such depths of things. And yes, this will surely make us change the way we use tech- at least one can be more alert and aware, isn’t it?
Honestly speaking, no – I am not much of a tech person, as you know, but my kid’s do keep their and my tech updated with the latest software- so I am covered there 🙂
Thanks for sharing all of this with us. Have a nice, rest of the week 🙂
Carolyn Nicander Mohr says
Hi Harleena, You make an excellent point. Whether this information is true or not, keeping our tech updated to the latest versions is so important. Hackers are out there and we might not know when our devices are compromised. Updates may be patching security holes we don’t even know exist.
Updating takes time and effort but the benefits may far outweigh the inconvenience.
Bill Dorman says
I want to learn how to speak English…..
I think it’s safe to assume if it’s not what WikiLeaks is saying is true, somebody probably has access and capabilities to do this. We would probably be naive to think otherwise….in my humble opinion….but whadda are ya going to do as this is the new norm, right?
Carolyn Nicander Mohr says
Hi Bill, Exactly. Even if the WikiLeaks information isn’t true, we should keep our devices updated with the latest software. That is the best way to keep hackers at bay. This news should make us even more aware of the vulnerabilities of our devices, regardless of whether or not we believe WikiLeaks.
Salauddin Bepari says
Hey Carolyn,
I think the latest WikiLeaks revelations about the CIA is true. In that way, one day the privacy will die.
Yea! there is a one-way to keep our privacy safe. We have to keep up with the update.
Indeed, I love to use always the update version of any devices.
However, your article was really an interesting news of tech.
With Best Regards,
Salauddin Bepari.
A. Terungwa says
Hi Carolyn,
I trust you’re doing good 🙂
This information is really troubling – and the sad thing is that, Wikileaks has a point…one it is hard to ignore.
For the rest of us, the smartest thing to do is to make certain that we only run the latest versions of the various software we use…privacy and security are two things we all need to take VERY seriously.
Thanks for sharing this – I’ll personally double my own ‘security’.
Be sure to make the day great.
Always,
Terungwa
Praveen rajarao says
Wow that does sound scary and intrusive. I am sure wikileaks has a reliable source to publish this and they will not do it without any credible information to back it up.
Can you imagine if one can control your phone remotely? That itself is enough for me to stay away from gadgets 🙂 But how can one really survive without them? Cant deny the fact that they are ruling our lives.
Carolyn Nicander Mohr says
Hi Praveen, Yes, the idea of our phones, TVs, and cars being hacked without our knowledge is truly frightening. We can’t be certain that the WikiLeaks information is accurate, but either way we should be mindful of updating our tech!
Carol says
Hello Carolyn,
Great post on Wikileaks and CIA and tech spying. Really, the most disturbing piece of this, if true, is that Julian Assange has these tools! This guy is an anarchist, selling his knowledge to the highest bidder.
I just did the update on my iPhone, that I had been ignoring, as a result of this blog post:). Not that anyone could really care about what I am up to, at the government level. I believe I am mainly targeted by marketers, and this has been going on long before this latest technology used by secret service agencies.
This is indeed a very complex topic, on multiple levels.
Best regards,
Carol
Carolyn Nicander Mohr says
Hi Carol, You’re right, this is extraordinarily complex. While we want to be safe as a country, we also want to be safe from hackers. The idea that these hacking tools leaked is chilling. We don’t have many defenses, but we can keep our tech updated. I’m so glad you’ve updated your phone now. Keep it updated for the best security.
Robin Khokhar says
Hi Carolyn,
Thanks for sharing this kind of information. I did not even know about the Wikileaks, so it is a good source of information.
Keep up the good work.
And have a good day ahead.
Carolyn Nicander Mohr says
Hi Robin, Yes, this news is unsettling and definitely shines a light on the darker side of tech. We have to be mindful that the same tech that solves problems can also create them.
Sita R. Paramita says
Wow, i feel like espionage movies such as James Bond do come true. Yes we need to double or even triple our security the idea the software somewhere out there kind of worrying.
But it’s a great info though.
Thanks Carolyn!