Posted by & filed under Cyber Security, Electronic Surveillance, Ethical issues, IT and Politics, IT Security.

Wiley Blog

Wikileaks recently released thousands of documents that it said described sophisticated software tools used by the CIA to break into smartphones, computers and even Internet-connected televisions.

Source: New York Times

Date: March 7th, 2017

Link: https://www.nytimes.com/2017/03/07/world/europe/wikileaks-cia-hacking.html?action=Click&contentCollection=BreakingNews&contentID=64996424&pgtype=Homepage&smid=fb-nytpolitics&smtyp=cur&_r=0

Discussion

1) “The WikiLeaks release said that the CIA has managed to bypass encryption on popular phone and messaging services.”  Does this matter, and if so why?

2) “According to Wikileaks, even when it is turned off the television operates as a bug, recording conversations in the room and sending them over the internet to a covert CIA server”.  What other devices are likely also compromised in this way?

Leave a Reply

Your email address will not be published. Required fields are marked *