What Is the CIA Hack All About?
The danger lies in what might be coming next
By Philip Giraldi • Unz Review • March 14, 2017
The WikiLeaks exposure of thousands of documents relating to the Central Intelligence Agency’s (CIA) hacking program, which was expanded dramatically under President Barack Obama between 2013 and 2016, has created something of a panic in the users of cell phones, online computers and even for smart television viewers. The documents describe “more than a thousand hacking systems, trojans, viruses and other ‘weaponized’ malware” and one document even identifies attempts to enable CIA controllers to take control of automobiles that have “On Star” or similar satellite interactive features.
According to analysts who have gone through the documents, any electronic device that is connected to the internet is reported to be vulnerable to being taken over and “weaponized,” manipulated through its microphone or camera function even if it appears to be turned off. Apple, Google, Android and Microsoft products were among the technologies that were targeted, with the security systems being constantly probed for vulnerabilities. When a flaw was discovered it was described as “zero day” because the user would have zero time to react to the detection and exploitation of the vulnerability.
And they are indeed everywhere. Ron Paul has described a woman’s test on the Amazon marketed interactive voice controlled device called Alexa, asking it if it were reporting to the CIA. Alexa, which allegedly cannot tell a lie, refused to answer.
According to Wikipedia, “Alexa is an intelligent personal assistant developed by Amazon Lab126, made popular by the Amazon Echo. It is capable of voice interaction, music playback, making to-do lists, setting alarms, streaming podcasts, playing audiobooks, and providing weather, traffic, and other real time information.” One reviewer observed “In a good but scary feature, Amazon Echo can learn a person’s habits over time. It will get used to the way a person talks, his/her habits and routines and will save all the data in the cloud.”
Alexa demonstrates that CIA and NSA intrusion into the lives of ordinary people is not unique. In the cyber-sphere there are many predators. Amazon has apparently run special sales to get Alexa devices into as many homes as possible, presumably for commercial reasons, to have a machine in one’s home that will eventually replace the cookies on computers that collect information on what people are interested in buying. The company’s president Jeff Bezos also recently completed a deal worth $600 million for Amazon to provide cloud hosting services for the Agency. And there are, of course, two clear conflicts of interest in that deal as Bezos is selling a device that can be hacked by the government while he also owns The Washington Post newspaper, which, at least in theory, is supposed to be keeping an eye on the CIA.
But spying for profit and spying by the government are two different things and the WikiLeaks revelations suggest that the CIA has had a massive program of cyberespionage running for a number of years, even having created a major new division to support the effort called the Directorate for Digital Innovation, with an operation component called the Center for Cyber Intelligence. Media reports also suggest that a major hub for the operation was the American Consulate General in Frankfurt Germany, where the Agency established a base of operations.
First of all, it is necessary to make an attempt to understand why the CIA believes it needs to have the capability to get inside the operating systems of phones and other devices which rely on the internet. It should be pointed out that the United States government already has highly developed capabilities to get at phones and other electronics. It is indeed the principal raison d’etre of the National Security Agency (NSA) to do so and the FBI also does so when it initiates wiretaps during criminal and national security investigations.
Beyond that, since the NSA basically collects all electronic communications in the United States as well as more of the same fairly aggressively overseas, it would seem to be redundant for the CIA to be doing the same thing. The CIA rationale is that it has a different mission than the NSA. It exists to conduct espionage against foreign intelligence targets, which frequently requires being able to tap into their personal phones or other electronic devices by exploiting vulnerabilities in the operating systems. As the targets would be either sources or even prospective agents, the Agency would have to protect their identity in the highly compartmented world of intelligence, making outsourcing to NSA problematical.
This need to develop an independent capability led to the development of new technologies by the CIA working with its British counterparts. There were apparently successful efforts to target Samsung “smart” televisions, which would use their speakers to record conversations even when the set was turned off. The project was called “Weeping Angel,” and other hacking programs were called “Brutal Kangaroo,” “Assassin,” “Hammer Drill,” “Swindle,” “Fine Dining” and “Cutthroat,” demonstrating that government bureaucrats sometimes possess a dark sense of humor.
Being able to enter one’s home through a television would be considered a major success in the intelligence world. And the ability to access cell phones at source through obtaining full control of the operating system rather than through their transmissions means that any security system will be ineffective because the snoopers will be able to intrude and hear the conversation as it is spoken before any encryption is applied. CIA and its British allies were reportedly able to take control of either Android or i-Phones through vulnerabilities in their security systems by using their attack technologies.
WikiLeaks claims to have 8,761 documents detailing efforts to circumvent the security features on a broad range of electronic devices to enable them to be remotely tapped, the information having apparently been passed to WikiLeaks by a disgruntled government contractor, though the Russians are perhaps inevitably also being blamed. The U.S. government has apparently been aware of the theft of the information for the past year and one presumes it has both done damage control and is searching for the miscreant involved. Also, there have been security fixes on both Apple and Android phones in the past year that might well have rendered the attack technologies no longer effective.
So many will shrug and wonder what the big deal is. So the CIA is tapping into the electronics of suspected bad guys overseas. Isn’t that what it’s supposed to do? That question has to be answered with another question: How do we know if that is all the CIA is doing? Technology that can attack and take control of a telephone or television or computer overseas can also do the same inside the United States. And the Agency can always plausibly claim that a connection with a suspect overseas leads back to the U.S. to enable working on related targets on this side of the Atlantic.
Another issue is the possibility to engage in mischief, with potentially serious consequences. The WikiLeaks documents suggest that the CIA program called UMBRAGE had been able to acquire malware signatures and attack codes from Russia, China, Iran and other places. It does that so it can confuse detection systems and preserve “plausible denial” if its intrusion gets caught, disguising its own efforts as Russian or Chinese to cast the blame on the intelligence services of those countries. It has been alleged that the hack of the Democratic National Committee computers was carried out by Moscow employed surrogates and part of the evidence produced was signature malware that had left “fingerprints” linked to Russian military intelligence in Ukraine. What if that hack was actually done by the CIA for domestic political reasons?
Critics have also pointed out that President Obama in 2014 had come to an agreement with major communications industry executives to share with manufacturers information regarding the vulnerabilities in their systems so they could be addressed and made secure. This would have benefited both the industry and the general public. The agreement was obviously ignored in the CIA case and is just another sign that one cannot trust the government.
However, the real downside regarding the CIA hacking is something that might not even have occurred yet. It is an unfortunate reality that government spying operations largely lack regulation, oversight or any effective supervision by Congress or anyone else outside the agencies themselves. Even if knowledge about communications vulnerabilities has not been employed illegally against American targets or to mislead regarding domestic hacks, the potential to use those capabilities once they are in place will likely prove too hard to resist. As such, no home or work environment will any more be considered a safe place and it is potentially, if not actually, the greatest existing threat to Americans’ few remaining liberties.
Share this:
- Click to share on X (Opens in new window) X
- Click to email a link to a friend (Opens in new window) Email
- Click to print (Opens in new window) Print
- Click to share on Facebook (Opens in new window) Facebook
- Click to share on Pinterest (Opens in new window) Pinterest
- More
- Click to share on Pocket (Opens in new window) Pocket
- Click to share on Reddit (Opens in new window) Reddit
- Click to share on Telegram (Opens in new window) Telegram
- Click to share on Tumblr (Opens in new window) Tumblr
- Click to share on WhatsApp (Opens in new window) WhatsApp
- Click to share on LinkedIn (Opens in new window) LinkedIn
Related
March 14, 2017 - Posted by aletho | Civil Liberties, Corruption, Deception, Timeless or most popular | CIA, Human rights, NSA, Obama, UK, United States
No comments yet.
This site uses Akismet to reduce spam. Learn how your comment data is processed.
Featured Video
Natural Solutions for Bladder Health (UTI’s, Stones, Cystitis) – Dr Bryan Ardis
or go to
Aletho News Archives – Video-Images
From the Archives
Noam Chomsky, Kevin Barrett and Academic Freedom
The Kevin Barrett-Chomsky Dispute in Historical Perspective – Ninth part of the series titled “9/11 and the Zionist Question”
By Prof. Tony Hall | American Herald Tribune | August 7, 2016
Noam Chomsky has been much worse than hypocritical in the role he has chosen for himself in the study of 9/11. Chomsky treats the subject of 9/11 as if he’s some sort of master of analysis on the subject of what happened. He presents his conclusions without showing the due diligence of going through the relevant primary and secondary sources in a balanced and scholarly fashion. The primary sources Chomsky chooses to disregard include passenger lists, video and photographic evidence in the public domain, eyewitness accounts, original news coverage on the day of 9/11 and the like. … continue
Blog Roll
-
Join 2,407 other subscribers
Visits Since December 2009
- 7,256,013 hits
Looking for something?
Archives
Calendar
Categories
Aletho News Civil Liberties Corruption Deception Economics Environmentalism Ethnic Cleansing, Racism, Zionism Fake News False Flag Terrorism Full Spectrum Dominance Illegal Occupation Mainstream Media, Warmongering Malthusian Ideology, Phony Scarcity Militarism Progressive Hypocrite Russophobia Science and Pseudo-Science Solidarity and Activism Subjugation - Torture Supremacism, Social Darwinism Timeless or most popular Video War Crimes Wars for IsraelTags
9/11 Afghanistan Africa al-Qaeda Australia BBC Benjamin Netanyahu Brazil Canada CDC Central Intelligence Agency China CIA CNN Covid-19 COVID-19 Vaccine Donald Trump Egypt European Union Facebook FBI FDA France Gaza Germany Google Hamas Hebron Hezbollah Hillary Clinton Human rights Hungary India Iran Iraq ISIS Israel Israeli settlement Japan Jerusalem Joe Biden Korea Latin America Lebanon Libya Middle East National Security Agency NATO New York Times North Korea NSA Obama Pakistan Palestine Poland Qatar Russia Sanctions against Iran Saudi Arabia Syria The Guardian Turkey Twitter UAE UK Ukraine United Nations United States USA Venezuela Washington Post West Bank WHO Yemen ZionismRecent Comments
Bill Francis on Chris Minns Defends NSW “Hate… Sheree Sheree on I was canceled by three newspa… Richard Ong on Czech–Slovak alignment signals… John Edward Kendrick on Colonel Jacques Baud & Nat… eddieb on Villains of Judea: Ronald Laud… rezjiekc on Substack Imposes Digital ID Ch… loongtip on US strikes three vessels in Ea… eddieb on An Avoidable Disaster Steve Jones on For Israel, The Terrorist Atta… cleversensationally3… on Over Half of Germans Feel Unab… loongtip on Investigation Into U.S. Milita… loongtip on Zelensky’s Impossible De…
Aletho News- FDA Won’t ‘Rubber-Stamp’ Pfizer mRNA Flu Vaccine Without Better Safety Data
- Bill Gates’ CEPI revives Moderna mRNA bird flu vaccine development with $54M investment after HHS terminated funding
- Government Minister Steps in to Defend Met Office as Fake Temperature Scandal Escalates
- Russia, African Countries Agree to Strengthen Security Cooperation – Lavrov
- Lebanese Detainees in Israeli Prisons: When Silence Becomes Surrender
- US Weighs Port Restrictions on Spain Over Israel Arms Transit Ban
- How Israel hijacked US politics, media and tech – without Americans even realizing
- HHS to Prohibit Hospitals From Performing Sex-Change Surgery on Kids
- Natural Solutions to Bladder Health
- Medicinal plants hold key to Iran’s drought-resistant revenue
If Americans Knew- U.S. Pastors Become Willing Ambassadors for Israel’s War
- The 2028 Presidential Candidates – TrackAIPAC Scoresheet
- “Trump Riviera” is back on the table – Not a Ceasefire Day 71
- Commentary editor, a pioneer neoconservative, pushed Republicans, U.S. policy, and Christian evangelicals into a pro-Israel direction
- Despite ceasefire deal, Israel refuses to open the Rafah border crossing, cutting Gaza off from the world
- Palestinian ingenuity shines through adversity – Not a Ceasefire Day 70
- Amnesty: ‘Utterly preventable’ Gaza flood tragedy must mobilize global action to end Israel’s genocide
- Israel Propagandists Are Uniformly Spouting The Exact Same Line About The Bondi Beach Shooting
- Ha’aretz: Free the Palestinian Activist Who Dared to Document Israel’s Crimes in the West Bank
- Garbage Is Poisoning Gaza
No Tricks Zone- Der Spiegel Caught Making Up Reports About Conservative America (Again)
- New Study: 8000 Years Ago Relative Sea Level Was 30 Meters Higher Than Today Across East Antarctica
- The Wind Energy Paradox: “Why More Wind Turbines Don’t Always Mean More Power”
- New Study Reopens Questions About Our Ability To Meaningfully Assess Global Mean Temperature
- Dialing Back The Panic: German Physics Prof Sees No Evidence Of Climate Tipping Points!
- Astrophysicist Dr. Willie Soon Challenges The Climate Consensus … It’s The Sun, Not CO2
- Regional Cooling Since The 1980s Has Driven Glacier Advance In The Karakoram Mountains
- Greenland Petermann Glacier Has Grown 30 Kilometers Since 2012!
- New Study: Temperature-Driven CO2 Outgassing Explains 83 Percent Of CO2 Rise Since 1959
- Climate Extremists Ordered By Hamburg Court To Pay €400,000 In Damages
Contact:
atheonews (at) gmail.com
Disclaimer
This site is provided as a research and reference tool. Although we make every reasonable effort to ensure that the information and data provided at this site are useful, accurate, and current, we cannot guarantee that the information and data provided here will be error-free. By using this site, you assume all responsibility for and risk arising from your use of and reliance upon the contents of this site.
This site and the information available through it do not, and are not intended to constitute legal advice. Should you require legal advice, you should consult your own attorney.
Nothing within this site or linked to by this site constitutes investment advice or medical advice.
Materials accessible from or added to this site by third parties, such as comments posted, are strictly the responsibility of the third party who added such materials or made them accessible and we neither endorse nor undertake to control, monitor, edit or assume responsibility for any such third-party material.
The posting of stories, commentaries, reports, documents and links (embedded or otherwise) on this site does not in any way, shape or form, implied or otherwise, necessarily express or suggest endorsement or support of any of such posted material or parts therein.
The word “alleged” is deemed to occur before the word “fraud.” Since the rule of law still applies. To peasants, at least.
Fair Use
This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more info go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.
DMCA Contact
This is information for anyone that wishes to challenge our “fair use” of copyrighted material.
If you are a legal copyright holder or a designated agent for such and you believe that content residing on or accessible through our website infringes a copyright and falls outside the boundaries of “Fair Use”, please send a notice of infringement by contacting atheonews@gmail.com.
We will respond and take necessary action immediately.
If notice is given of an alleged copyright violation we will act expeditiously to remove or disable access to the material(s) in question.
All 3rd party material posted on this website is copyright the respective owners / authors. Aletho News makes no claim of copyright on such material.

Leave a comment