British spies ‘hacked TVs to bug citizens’
Hidden menace of the zero-day attack
BRITISH spy agencies worked with the CIA to turn televisions, tablets and phones into bugging devices to record conversations and take photographs, leaked documents indicate.
The data, obtained by WikiLeaks and published online yesterday, appears to show the CIA running a computerhacking program to give agents access to household gadgets. It is also said to be targeting cars with computers, amid unsubstantiated claims that once in control of a vehicle it could even stage murders to look like road accidents.
In total, WikiLeaks published 8,761 documents, claiming it to be the largest ever release of CIA files in the agency’s history. The CIA declined to comment while experts said the documents – generated by the agency’s Engineering Development Group between 2013 and 2016 – seemed genuine.
In Britain, both MI5 and GCHQ were dragged into the row as files showed how they apparently held workshops with the CIA to find ways to “hack” household devices. In all, the docu- ments suggest that the CIA created more than 1,000 viruses and other types of malware to gain access to everyday items.
One program, exotically dubbed Weeping Angel, allegedly let spies gain control of the Samsung F8000 weblinked television. It was developed by MI5 and the CIA in June 2014, the documents claim. It is alleged MI5 created a “fake off-mode” which let owners think the device was off when it was actually bugging them through a microphone used in voice-activated
Q What is a zero-day attack?
A An attack that the maker of a gadget or computer program does not know about. This makes it impossible to fix the bug by installing a security update on a phone or computer. If it continues to be undiscovered, the hacker could exploit the flaw to spy on a person for months or years. Discovering a zero-day attack is rare and companies pay thousands to hackers who hunt for them professionally.
Q What can the attacks do?
A The attacks can secretly activate the camera or microphone in a household device and send photos and recordings to the hacker. Some bugs can be used to steal personal data from a phone or computer system, or track typing on a computer keyboard to steal passwords. Other hacks can read what is being shown on a screen, bypassing encrypted messaging systems. Q Is there any defence against them?
A Downloading the latest security updates and installing anti-virus software can protect against many attacks, but not if they are secret. Many hacks occur when a person clicks a link or email attachment that looks legitimate, but that installs a virus. Some people have taken to covering up their webcam or disconnecting their television from the internet.