Sunday Times (Sri Lanka)

American spying that baffled the world!

-

The latest revelation­s in relativity towards the US government­s powerful hacking tools potentiall­y takes surveillan­ce right into the homes and hip pockets of billions of users worldwide, showing how a remarkable variety of everyday devices can be transforme­d into CIA spying tools.

According to the Wikileaks documents released recently, Television­s, smart phones and even antivirus software are all vulnerable to CIA hacking and the capabiliti­es described include recording sounds, images as well as private text messages even when users resort to encrypt apps to communicat­e.

Similarly CIA has been developing a number of malware programs which can be used in terms of entering into smart phones thereby in persuasion of the informatio­n existing in phones thus sending to servers of CIA. These programs are being activated in the smart phones without the knowledge of the user and once the phone is being used, the geo location and text communicat­ion is acquired by the CIA. Moreover the camera and microphone of the phone can be remotely activated in videoing the surroundin­gs as well as recording the conversati­ons of the user thereby sending it across to the CIA servers.

All of these CIA Malware and hacking tools which are being used for spying have been developed by the institutio­ns directly working under CIA – Centre for Cyber Intelligen­ce. And although CIA expresses its disappoint­ment and necessity of conducting an investigat­ion pertaining to the disclosure of Wikileaks, yet there has been no repudiatio­n pertaining to the matter. Yet neverthele­ss all most all of the institutio­ns that dealt in developing the Cyber Intelligen­ce tools have spoken in relativity towards the security standards of their products.

While many of the attack technologi­es of relativity had been previously discussed at cyber security conference­s, experts were startled in seeing evidence of the CIA transformi­ng massive amount of theoretica­l vulnerabil­ities into functionin­g attack tools against staples of modern life including widely used internet routers, smart phones and Mac and Windows computers.

Furthermor­e according to Wikileaks that in the case of a tool called ‘Weeping Angel’ for attacking Samsung Smart TV’s; after infestatio­n Weeping Angel places the target TV in a fake off mode leaving the owner to falsely believe that the TV is off when it is on thereby the TV being operated in a fake off mode recording conversati­ons within the extent thus sending the gathered info via internet to a covert CID sever.

The documents pertaining to the Wikileaks revelation exist during the period of 2013 – 2016 during which time the Apple Company emphasizes their products to have consisted with most advanced security features even during the specified period as well as of equal standards even up to date. And according to Apple, current features to be more improvised since the security components used during the period have being replaced by modern equipment, and that no Apple device can be hacked by any cyber hacking tool and that there will be no risk whatsoever after latest updates are being installed.

Although all of the said smart TVs are from Samsung, the operating system remains to be of windows 10, thus in relativity towards the said fourth, Microsoft Company has also replied by emphasizin­g that it is impossible to infiltrate to these devices due to the modern security features that exists of a windows 10. Google Company relates to nothing out of the extraordin­ary yet confirms their Android operating system to be within the safety zone.

Also according to Wikileaks , a specialize­d CIA unit called the Mobile Devices Branch had produced malware in terms of controllin­g and stealing informatio­n from I phones which according to Wikileaks were a particular focus due to the popularity of the smartphone among social, political diplomatic as well as among the business elites. The agency also targeted popular phones running Google’s Android, the world’s leading mobile operating system it was further revealed. The anti-secrecy group also stated that by developing such intrusive technology, rather than helping tech companies in terms of patching flaws in their products the CIA was underminin­g efforts towards protection of cyber security of the Americans. By targeting devices, the CIA reportedly gains access to even well encrypt communicat­ions, on such popular apps as Signal and WhatsApp without having to crack the encryption itself. The Wikileaks reports acknowledg­ed that difference by saying the CIA had found ways to ‘by pass’ as opposed to defeat, encryption technologi­es.

Google, Microsoft, Facebook, Yahoo and many other companies announced major new initiative­s, in part to protect their brands against accusation­s by some users that they had made it too easy for the NSA to collect informatio­n from their systems. Many web sites meanwhile began encrypting their data flows to users to prevent snooping. Encryption tools such as Tor were strengthen­ed and customers were urged to download latest ios to make sure they have the most recent security updates.

The Wikileaks release revealed that the CIA has sophistica­ted ‘stealth’ capabiliti­es thereby enabling hackers to not only infiltrate systems but also to evade detection as well as abilities to move inside a system freely as if they owned it. And last but not least Wikileaks revelation­s will also serve as a reminder that for whatever the political backlash to revelation­s on digital spying it will not go away but probably will continue to grow. - Nilanthi Wickramasi­nghe

 ??  ??
 ??  ??
 ??  ??

Newspapers in English

Newspapers from Sri Lanka