{"id":67942,"date":"2017-03-07T17:48:17","date_gmt":"2017-03-07T21:48:17","guid":{"rendered":"https:\/\/stateofthenation2012.com\/?p=67942"},"modified":"2017-03-07T17:49:49","modified_gmt":"2017-03-07T21:49:49","slug":"wikileaks-dump-shows-cia-could-turn-smart-tvs-into-listening-devices","status":"publish","type":"post","link":"https:\/\/stateofthenation2012.com\/?p=67942","title":{"rendered":"VAULT 7: CIA TURNS SMART TVS INTO LISTENING DEVICES"},"content":{"rendered":"<h1 class=\"Post-title\" data-reactid=\".ti.1.0.0.2.0.1.0.1.0\">WIKILEAKS DUMP SHOWS CIA COULD TURN SMART TVS INTO LISTENING DEVICES<\/h1>\n<p><!--more--><\/p>\n<div id=\"attachment_67943\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2017\/03\/AP_206501133391-1488911180-article-header.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-67943\" class=\"wp-image-67943 size-large\" src=\"https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2017\/03\/AP_206501133391-1488911180-article-header-1024x512.jpg\" width=\"640\" height=\"320\" srcset=\"https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2017\/03\/AP_206501133391-1488911180-article-header-1024x512.jpg 1024w, https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2017\/03\/AP_206501133391-1488911180-article-header-300x150.jpg 300w, https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2017\/03\/AP_206501133391-1488911180-article-header-768x384.jpg 768w, https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2017\/03\/AP_206501133391-1488911180-article-header.jpg 1440w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><p id=\"caption-attachment-67943\" class=\"wp-caption-text\">Photo: Jae C. Hong\/AP<\/p><\/div>\n<p>Sam Biddle<br \/>\nThe Intercept<\/p>\n<p><u>IT\u2019S DIFFICULT<\/u>\u00a0to buy a new TV that doesn\u2019t come with a suite of (generally mediocre) \u201csmart\u201d software, giving your home theater some of the functions typically found in phones and tablets.\u00a0But bringing these extra features into your living room means bringing a microphone, too \u2014 a fact the CIA is exploiting, according to a new trove of documents released today by WikiLeaks.<\/p>\n<p><a href=\"http:\/\/wikileaks.org\/ciav7p1\/cms\/page_12353643.html\">According to documents inside the cache, a CIA program named \u201cWeeping Angel\u201d <\/a>provided the agency\u2019s hackers with access to Samsung Smart TVs, allowing a television\u2019s built-in voice control microphone to be remotely enabled while keeping the appearance that the TV itself was switched off, called \u201cFake-Off mode.\u201d Although the display would be switched off, and LED indicator lights would be suppressed, the hardware inside the television would continue to operate, unbeknownst to the owner. The method, co-developed with British intelligence, required implanting a given TV with malware\u2014it\u2019s unclear if this attack could be executed remotely, but the documentation includes reference to in-person infection via a tainted USB drive. Once the malware was inside the TV, it could relay recorded audio data to a third party (presumably a server controlled by the CIA) <a href=\"http:\/\/wikileaks.org\/ciav7p1\/cms\/page_13205617.html\">through the included network connection<\/a>.<\/p>\n<p>WikiLeaks <a href=\"http:\/\/wikileaks.org\/ciav7p1\/index.html\">said its cache<\/a> included more than 8,000 documents originating from within the CIA and came via a source, who the group did not identify, who was concerned that the agency\u2019s \u201chacking capabilities exceed its mandated powers,\u201d and who wanted to \u201cinitiate a public debate\u201d about the proliferation of cyberweapons. WikiLeaks said the documents also <a href=\"http:\/\/theintercept.com\/2017\/03\/07\/cia-has-an-impressive-list-of-ways-to-hack-into-your-smartphone-wikileaks-files-indicate\/\">showed extensive hacking of smartphones, including Apple\u2019s iPhones<\/a>; a large library of allegedly serious computer attacks that were not reported to tech companies like Apple, Google, and Microsoft; malware from hacker groups and other nation-states, including, WikiLeaks said, Russia, that could be used to hide the agency\u2019s involvement in cyberattacks; and the growth of a substantial hacking division within the CIA, known as the Center for Cyber Intelligence, bringing the agency further into the sort of cyberwarfare traditionally practiced by its rival the National Security Agency.<\/p>\n<p>The smart TV breach is just the latest example of a security problem emerging from the so-called \u201cInternet of Things,\u201d the increasingly large catalog of consumer products that include (or require)\u00a0an internet connection for contrived \u201csmart\u201d functionality. Last year, <a href=\"http:\/\/www.theguardian.com\/technology\/2016\/feb\/09\/internet-of-things-smart-home-devices-government-surveillance-james-clapper\">the Guardian reported<\/a> that Director of National Intelligence James Clapper told the Senate that breaching smart devices was a priority for American spies: \u201cIn the future, intelligence services might use the [internet of things] for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials.\u201d<\/p>\n<p>Security and cryptography researcher Kenneth White told The Intercept that smart TVs are \u201chistorically a pretty easy target\u201d and \u201ca pretty great attack platform,\u201d given that TVs are typically located in a living room or bedroom.\u201d White added that \u201cthere is zero chance the [CIA has]\u00a0only targeted Samsung. It\u2019s just too easy to mod other embedded OSes\u201d found in the smart TVs sold by every other manufacturer.<\/p>\n<p>This new WikiLeaks dump contains no apparent information about who exactly was targeted by Weeping Angel, or when. It\u2019s also unclear how many models of Samsung TVs were vulnerable to Weeping Angel \u2014 the CIA documents published by WikiLeaks only mention one model, the F8000 (albeit a very popular and well-reviewed model: Engadget <a href=\"http:\/\/www.engadget.com\/products\/samsung\/led\/f8000-series\/\">described<\/a> it as \u201cthe best smart TV system you\u2019ll find anywhere.\u201d) <a href=\"http:\/\/www.cnet.com\/news\/samsung-changes-smarttv-privacy-policy-in-wake-of-spying-fears\/\">After privacy concerns<\/a> about Samsung\u2019s TV voice recognition feature spread in 2015, the company released an FAQ meant to soothe worried consumers. Addressing the question of \u201cHow do I know it\u2019s listening or not?,\u201d Samsung assured users that \u201cIf the TV\u2019s voice recognition feature is turned on for a command, an icon of a microphone will appear on the screen,\u201d but \u201cif no icon appears on the screen, the voice recognition feature is off.\u201d<\/p>\n<p>This assurance about displayed icons is of course worth nothing if the CIA has hijacked the\u00a0TV. What Samsung seems to have taken for granted was that the company, and its customers, could fully control the operation of its televisions. As the CIA\u2019s Fake-Off exploit shows, the company\u2019s assurances to consumers that a TV\u2019s voice recognition controls\u00a0would operate in a transparent manner do not hold true once spies and (potentially other hackers) get involved.<\/p>\n<p>Samsung did not immediately return a request for comment. A CIA spokesperson replied\u00a0<span class=\"s1\">\u201cWe do not comment on the authenticity or content of purported intelligence documents.\u201d<\/span><\/p>\n<p>___<br \/>\n<a href=\"http:\/\/theintercept.com\/2017\/03\/07\/wikileaks-dump-shows-cia-could-turn-smart-tvs-into-listening-devices\/\">http:\/\/theintercept.com\/2017\/03\/07\/wikileaks-dump-shows-cia-could-turn-smart-tvs-into-listening-devices\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>WIKILEAKS DUMP SHOWS CIA COULD TURN SMART TVS INTO LISTENING DEVICES<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-67942","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/67942","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=67942"}],"version-history":[{"count":0,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/67942\/revisions"}],"wp:attachment":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=67942"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=67942"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=67942"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}