The Anti-secrecy organization, WikiLeaks just published more than thousands of documents which they are calling “Sophisticated software tools.” Here are the five major finding from the recent WikiLeaks Documents

WikiLeaks CIA Files: 5 Ways We Are Being Hacked!

As we all know, the Anti-secrecy organization, WikiLeaks just published more than thousands of documents which they are calling “Sophisticated software tools” that are used by Central Intelligence Agency.

In their document, they showcased that CIA can turn your TV into a mic, hack into computers, bypass the encryption system in some popular chat apps by accessing your operating system directly and lot more.

According to the reports, WikiLeaks had only published the first part of the document which includes 7,818 web pages and has 943 attachments. WikiLekas described it as the ‘largest-ever publication of secret intelligence materials.’

Here are the five major finding from the recent WikiLeaks Documents:

1. Turning Samsung Smart TV Into a Spying Device

WikiLeaks claimed that Central Intelligence Agency had created a tool that turns your Samsung Smart TV into a spying device. You need to know that Samsung Smart TVs have the potential to record your room chatter. However, it’s only possible if the TV is on and the feature can be disabled via the settings. However, WikiLeaks claimed that US and British personnel developed a way to take over Samsung Smart TVs even it’s switched off. The program called Weeping Angel can record the conversation in the room while the TV is turned off.

2. WhatsApp, Signal, Telegram’s Encryption can be Bypassed

WikiLeaks claims that the CIA and allied Intelligence services had already managed to bypass the encryption on the modern smartphone and messaging services like Signal, WhatsApp, and Telegram. Any government hacker can penetrate phones and collect “audio and message traffic before encryption is applied.”

3. Google’s Android And Apple’s iOS Vulnerabilities have been targeted

Central Intelligence Agency allegedly targeted the existing vulnerabilities in Android and iOS that lets them access to people’s data. Well, Apple recently claimed that most of the issued leaked were already patched. However, Google has so far remained silent on this matter.

4. More Than 1,000 Malware Systems

According to documents from WikiLeaks, over 1,000 malware systems including viruses, trojan, and other software has been produced by CIA. These systems have the potential to infiltrate and gain control over personal electronics. According to WikiLeaks, the tools have targeted iPhone, Smart TVs, Microsoft devices and Android phones.

5. Controlling cars and Trucks

According to WikiLeaks “As of October 2014, the CIA was also looking at infecting the vehicle control systems used in modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.”

So, these are the five major finding from the recent WikiLeaks Documents. If you want to access the full list of documents, then visit this link. So, what do you think about WikiLeaks Vault 7 records? Share your views in the comment box below.


Please enter your comment!
Please enter your name here