Wikileaks and the CIA's hacking program

Questions and answers about Wikileaks' alleged CIA hacking documents.

WikiLeaks has released what it says are thousands of documents describing internal CIA discussions on hacking techniques used to circumvent security on electronic devices for spying.

Here are some questions and answers:

Q: Are the documents authentic?

A: It appears at least some are real. While the CIA has declined to comment, independent cyber security experts and former intelligence agency employees who have looked through them say that they appear to be authentic, citing code words used to describe CIA hacking programs.

Q: What did we learn about the CIA's hacking program?

A. WikiLeaks published documents that it says describe CIA tools for hacking into devices including mobile phones, computers and smart televisions.

Q: How can you hack a TV?

A: WikiLeaks said it identified a project known as Weeping Angel where US and British intelligence agencies developed ways to take over Samsung smart TVs equipped with microphones, forcing them to record conversations when the device appeared to be turned off. Experts have long said smart TVs and other internet-connected devices can be exploited to monitor a target.

Q: Are these revelations new?

A: While the specific details are new, it is well known in the cyber security community that intelligence agencies are constantly trying to leverage flaws in technology products to conduct espionage.

Q: The documents suggest that the CIA can access information in encrypted messaging apps like WhatsApp and Signal. I thought they were safe from even government spying?

A: No system is perfect. The documents describe ways to get information in those apps on Android devices, but only after gaining full control of those phones.

Q: Are iPhones also vulnerable?

A: The documents discuss ways to get into iPhones as well. One appeared to show a list of Apple iOS security flaws purchased by US. intelligence agencies so they could gain access to those devices.

Q: Is this as big as the leaks from former National Security Agency contractor Edward Snowden?

A: The Snowden leaks revealed that the NSA was secretly collecting US call metadata on ordinary Americans. The materials released by WikiLeaks on Tuesday did not appear to reveal the existence of unknown any unknown programs. Instead they supplied details on how US intelligence agencies work to discover and exploit security flaws to conduct espionage.

Q: How did WikiLeaks get the information?

A: Unclear. Someone inside the agency may have leaked the information. Or, someone outside may have figured out a way to steal it.


Share
3 min read

Published

Source: AAP


Share this with family and friends


Get SBS News daily and direct to your Inbox

Sign up now for the latest news from Australia and around the world direct to your inbox.

By subscribing, you agree to SBS’s terms of service and privacy policy including receiving email updates from SBS.

Download our apps
SBS News
SBS Audio
SBS On Demand

Listen to our podcasts
An overview of the day's top stories from SBS News
Interviews and feature reports from SBS News
Your daily ten minute finance and business news wrap with SBS Finance Editor Ricardo Gonçalves.
A daily five minute news wrap for English learners and people with disability
Get the latest with our News podcasts on your favourite podcast apps.

Watch on SBS
SBS World News

SBS World News

Take a global view with Australia's most comprehensive world news service
Watch the latest news videos from Australia and across the world