WikiLeaks on Tuesday released what it said is a trove of US Central Intelligence Agency documents on hacking. The website that specializes in exposing secrets said the thousands of documents describe internal CIA discussions on hacking techniques the spy agency has used to circumvent security on electronic devices.
Reuters could not immediately verify the contents of the published documents. But here are some answers to questions users of consumer electronics may have:
US President Donald Trump speaks at CIA headquarters in Langley, Virginia, US, on January 21, 2017. /CFP Photo
Are the documents authentic?
It appears at least some are real. While the CIA has declined to comment, independent cyber security experts and former intelligence agency employees who have looked through them say that they appear to be authentic, citing code words used to describe CIA hacking programs.
What devices were targeted in the CIA's hacking program?
WikiLeaks says its published documents describe CIA tools for hacking into devices including mobile phones, computers and smart televisions.
WikiLeaks said it identified a project known as Weeping Angel where US and British intelligence agencies developed ways to take over Samsung smart TVs equipped with microphones, forcing them to record conversations when the device appeared to be turned off. Experts have long said smart TVs and other internet-connected devices can be exploited to monitor a target.
WikiLeaks founder Julian Assange makes a speech from the balcony of the Ecuadorian Embassy in central London on February 5, 2016. /CFP Photo
Are these revelations new?
While the specific details are new, it is well known in the cyber security community that intelligence agencies are constantly trying to leverage flaws in technology products.
Are messaging apps like WhatsApp and Signal safe from US government spying?
No system is perfect. The documents describe ways to get information in those apps on Android devices, but only after gaining full control of those phones. Reuters has not found evidence in the documents released by WikiLeaks that the CIA had figured a way to break the encryption in those apps.
WikiLeaks documents suggest the CIA can access information in encrypted messaging apps like WhatsApp and Signal by taking over full control of devices. /CFP Photo
Are iPhones also vulnerable?
The documents discuss ways to get into iPhones as well. One appeared to show a list of Apple iOS security flaws purchased by US intelligence agencies so they could gain access to those devices.
Most people do not need to worry about being targeted by intelligence agencies. But everybody should stay on top of software patches so all their computers, mobile phones and other connected devices are running software with the latest security updates. Consumers should balance security concerns with their need to use smart devices.
How did WikiLeaks get the information?
Unclear. Someone inside the agency may have leaked the information. Or, someone outside may have figured out a way to steal it.