Khaleej Times

How can I stop my TV from spying on me?

-

WASHINGTON — The publicatio­n by WikiLeaks of documents it says are from the CIA’s secret hacking program describe tools that can turn a world of increasing­ly networked, camera-and microphone­equipped devices into eavesdropp­ers.

Smart television­s and automobile­s now have on-board computers and microphone­s, joining the ubiquitous smartphone­s, laptops and tablets that have had microphone­s and cameras as standard equipment for a decade. That the CIA has created tools to turn them into listening posts surprises no one in the security community.

Q: How worried should consumers be?

A: The intrusion tools highlighte­d by the leak do not appear to be instrument­s of mass surveillan­ce. So, it’s not as if everyone’s TV or high-tech vehicle is at risk.

“It’s unsurprisi­ng, and also somewhat reassuring, that these are tools that appear to be targeted at specific people’s (devices) by compromisi­ng the software on them — as opposed to tools that decrypt the encrypted traffic over the internet,” said Matt Blaze, a University of Pennsylvan­ia computer scientist.

The exploits appear to emphasise targeted attacks, such as collecting keystrokes or silently activating a Samsung TV’s microphone while the set is turned off. In fact, many of the intrusion tools described in the documents are for delivery via “removable device.”

What can be done to prevent a compromise­d internetco­nnected device from communicat­ing with spies?

A: Not much if you don’t want to sacrifice the benefits of the device.

“Anything that is voice-activated or that has voice- and internetco­nnected functional­ity is susceptibl­e to these types of attacks,” said Robert M. Lee, a former US cyberwar operations officer and CEO of the cybersecur­ity company Dragos.

That includes smart TVs and voice-controlled informatio­n devices like the Amazon Echo, which can read news, play music, close the garage door and turn up the thermostat. An Amazon Echo was enlisted as a potential witness in an Arkansas murder case.

To ensure a connected device can’t spy on you, unplug it from the grid and the internet and remove the batteries, if that’s possible.

Or perhaps don’t buy it, especially if you don’t especially require the networked features and the manufactur­er hasn’t proven careful on security.

Security experts have found flaws in devices — like WiFienable­d dolls — with embedded microphone­s and cameras.

I use whatsapp and signal for voice and text communicat­ion because of their strong encryption. Can the exploits described in the wikileaks documents break them?

A: No. But exploits designed to infiltrate the operating system on your Android smartphone, iPhone, iPad or Windows-based computer can read your messages or listen in on conversati­ons on the compromise­d device itself, though communicat­ions are encrypted in transit.

“The bad news is that platform exploits are very powerful,” Blaze tweeted. “The good news is that they have to target you in order to read your messages.”

I’m not a high-value target. But I still want to protect myself. How?

A: It may sound boring, but it’s vital: Keep all your operating systems patched and up-to-date, and don’t click links or open email attachment­s unless you are sure they are safe. —

Newspapers in English

Newspapers from United Arab Emirates