The Daily Telegraph

British spies ‘hacked TVs to bug citizens’

Hidden menace of the zero-day attack

- By Robert Mendick, James Titcomb and Rob Crilly in New York

BRITISH spy agencies worked with the CIA to turn television­s, tablets and phones into bugging devices to record conversati­ons and take photograph­s, leaked documents indicate.

The data, obtained by WikiLeaks and published online yesterday, appears to show the CIA running a computerha­cking program to give agents access to household gadgets. It is also said to be targeting cars with computers, amid unsubstant­iated claims that once in control of a vehicle it could even stage murders to look like road accidents.

In total, WikiLeaks published 8,761 documents, claiming it to be the largest ever release of CIA files in the agency’s history. The CIA declined to comment while experts said the documents – generated by the agency’s Engineerin­g Developmen­t Group between 2013 and 2016 – seemed genuine.

In Britain, both MI5 and GCHQ were dragged into the row as files showed how they apparently held workshops with the CIA to find ways to “hack” household devices. In all, the docu- ments suggest that the CIA created more than 1,000 viruses and other types of malware to gain access to everyday items.

One program, exotically dubbed Weeping Angel, allegedly let spies gain control of the Samsung F8000 weblinked television. It was developed by MI5 and the CIA in June 2014, the documents claim. It is alleged MI5 created a “fake off-mode” which let owners think the device was off when it was actually bugging them through a microphone used in voice-activated

Q What is a zero-day attack?

A An attack that the maker of a gadget or computer program does not know about. This makes it impossible to fix the bug by installing a security update on a phone or computer. If it continues to be undiscover­ed, the hacker could exploit the flaw to spy on a person for months or years. Discoverin­g a zero-day attack is rare and companies pay thousands to hackers who hunt for them profession­ally.

Q What can the attacks do?

A The attacks can secretly activate the camera or microphone in a household device and send photos and recordings to the hacker. Some bugs can be used to steal personal data from a phone or computer system, or track typing on a computer keyboard to steal passwords. Other hacks can read what is being shown on a screen, bypassing encrypted messaging systems. Q Is there any defence against them?

A Downloadin­g the latest security updates and installing anti-virus software can protect against many attacks, but not if they are secret. Many hacks occur when a person clicks a link or email attachment that looks legitimate, but that installs a virus. Some people have taken to covering up their webcam or disconnect­ing their television from the internet.

Newspapers in English

Newspapers from United Kingdom