• Home
  • News
  • Coins2Day 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechWikiLeaks

What Do I Need to Know About the CIA’s Hacking Program?

By
Reuters
Reuters
By
Reuters
Reuters
March 7, 2017, 7:10 PM ET

WikiLeaks, the website that specializes in exposing secrets, on Tuesday released what it said were thousands of documents that described internal U.S. Central Intelligence Agency discussions on hacking techniques it has used to circumvent security on electronic devices for spying.

Reuters could not immediately verify the contents of the published documents. The following are some questions and answers users of consumer electronics may have:

Are the documents authentic?

It appears at least some are real. While the CIA has declined to comment, independent cyber security experts and former intelligence agency employees who have looked through them say that they appear to be authentic, citing code words used to describe CIA hacking programs.

Get Data Sheet, Coins2Day’s technology newsletter.

What did we learn about the CIA’s hacking program?

WikiLeaks published documents that it says describe CIA tools for hacking into devices including mobile phones, computers and smart televisions.

How can you hack a TV?

WikiLeaks said it identified a project known as Weeping Angel where U.S. And British intelligence agencies developed ways to take over Samsung smart TVs equipped with microphones, forcing them to record conversations when the device appeared to be turned off. Experts have long said smart TVs and other Internet-connected devices can be exploited to monitor a target.

Are these revelations new?

While the specific details are new, it is well known in the cyber security community that intelligence agencies are constantly trying to leverage flaws in technology products to conduct espionage.

How To Use Two-Factor Authentication to Keep Hackers Away

The documents suggest that the CIA can access information in encrypted messaging apps like WhatsApp and Signal. I thought they were safe from even government spying?

No system is perfect. The documents describe ways to get information in those apps on Android devices, but only after gaining full control of those phones. Reuters has not found evidence in the documents released by WikiLeaks that the CIA had figured a way to break the encryption in those apps.

Are iPhones also vulnerable?

The documents discuss ways to get into iPhones as well. One appeared to show a list of Apple iOS security flaws purchased by U.S. Intelligence agencies so they could gain access to those devices.

What should I do if I’m worried?

Most people do not need to worry about being targeted by intelligence agencies. But everybody should stay on top of software patches so all their computers, mobile phones and other connected devices are running software with the latest security updates. Consumers should balance security concerns with their need to use smart devices.

WikiLeaks Dumps Thousands of Files on Alleged CIA Hacking Tools

Is this as big as the leaks from former National Security Agency contractor Edward Snowden?

The Snowden leaks revealed that the NSA was secretly collecting U.S. Call metadata on ordinary Americans. The materials released by WikiLeaks on Tuesday did not appear to reveal the existence of any unknown programs. Instead they supplied details on how U.S. Intelligence agencies work to discover and exploit security flaws to conduct espionage.

How did WikiLeaks get the information?

Unclear. Someone inside the agency may have leaked the information. Or, someone outside may have figured out a way to steal it.

About the Author
By Reuters
See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.