Since our suspicions of the US Government spying on our web activities were confirmed, safety seems overrated at this point. Can’t even play “World of Warcraft” without some covert agents trying to infiltrate our raids. Better yet, don’t even bother with your brand new online fridge because the Russians might be hacking those as you grab your next tuna casserole. Again, safety is overrated.
Here it is though, another look at new spy technology enabled by tax dollars and government funding have – Vault 7. The latest in secret “safety” measures for obtaining information. Let’s see what WikiLeaks unveiled before the CIA denies its existence.
Vault 7: Hacking Anything and Everything
Wikileaks revealed a fancy piece of tech called the CherryBlossom in its vault 7 dumps. This multipurpose framework was designed to get into public routers. Meaning that mini antenna box in your house controlling your internet service can be cracked wide open by this “deadly flower.”
Once installed on the router, the intruder can access and manage the network it runs. Much of the process is clear-cut, considering most people hardly ever update their routers. These vulnerabilities are what makes CherryBlossom so dangerous. Once it has the router’s network in its grasp, it can do numerous tasks, like checking out emails in the system or copying the user’s full online traffic information.
Another report reveals how your TV may watch you. Several Samsung smart TVs were bugged by the CIA to listen into conversations. Many security professionals suggested the CIA probably only did it to specific TVs, but that would be much tougher to do unless you were able to sell these TVs exclusively to drug kingpins.
Hacking information about our one true love was discovered as well: Mobile devices. Whether an Apple or Android user, many of the techniques and exploits have likely been patched out, but it’s not like it has stopped the spy agency from thinking of new ways to enter our small screens.
Among all the things one would not want to be hacked — a speeding, gasoline-fueled wagon we use for most of our transportation is on the top of the list.
The most startling disclosures are connected to the very idea of electronically controlling someone’s car. Although the words “murder” or “assassination” were not used to describe this type of espionage, it is possible. In fact, car hacking has been a common occurrence over the last few years, with criminals being able to control brakes and acceleration. Theorists that dabble in “conspiracy” have already linked the government’s car hacking skills to the death of a whistleblower journalist. However, that’s another rabbit hole that I would rather not talk about since my car has satellite and Bluetooth.
What Else Do I Have to Worry About Vault 7?
Scared yet? Well, there are a few more nuggets of naughty secrets in Vault 7. Let’s not forget that the agency does everything to protect its own information, as shown by their Marble Framework.
These anti-forensic tools keep pesky investigators and anti-virus companies from linking viruses, Trojans and other hacking attacks to the CIA. Sure there is already a lot of watching going on for the importance of safety, but why not on a global scale?
That’s because it has already been discussed under the dubbed file name of “Dark Matter”. It describes details of established methods to access Apple devices and upload data. The documentation doesn’t stop there. Even if someone were to re-install the operating system for the poor affected Mac, they might already have created a persistence system that keeps the infected unit intact.
If there’s one thing to be afraid of, is that your iPod or TV could be checking up on you for the safety of the United States.