"How do WikiLeaks' CIA hacking claims differ from Snowden NSA?"
will start after this message from our sponsors.
CNET News Video
CNET News Video
How do WikiLeaks' CIA hacking claims differ from Snowden NSA?
Some of the CIA's tech spying secrets may have been exposed.
WikiLeaks released what it claims are thousands of confidential CIA documents.
They allegedly show that the spy agency worked to develop tools to hack into devices like Apple and Android smartphones, Samsung TVs and vehicle control systems.
WikiLeaks dubbed the collection of files vault seven and claim the government hacker [UNKNOWN] contracted provided the material that covers a period from 2013 to 2016.
cnet and and cbs are currently unable to independently verify the authenticity of the documents.
According to weak leaks the hacking tools included malware and viruses trying to attack apple's IOS Google android and Microsoft windows the allegedly allow the CIA to access the smartphone users location and messages as well as control of phone's microphone and camera.
Once this phones are hacked into by other operating system then a hacker can.
Look and read your messages, just like if they had unlocked your phone with a thumbprint or a passcode.
The WikiLeaks documents include engineering notes and lines of code for the alleged CIA hacking tools.
That have code names derived from Pokemon and Dr. Who.
One called weeping angel included a circled fake off mode so a smart tv screen would appear to be off but microphones in the tv [UNKNOWN] mode would still capture audio in the room.
Major tech companies responded.
With statements emphasizing consumer privacy as a top priority.
Apple said it had already fixed many of the issues outlined in the document with the latest IOS update.Samsung and Microsoft both said they were looking into the report.
If proven to be true, the documents would be another blow to US intelligence after Edward Snowden exposed the NSA's mass surveillance program in 2013.
Those NSA's programs really targeted company servers and the backbone of the Internet to sweep up information in a drag net.
Whereas these alleged CIA hacking tools get into specific devices, phones and TVs They get information from a specific target.
It's unclear, at this point, which of the alleged hacking tools, if any, were deployed and where.
WikiLeaks is threatening to release even more CIA documents.
In San Francisco, Lexy Savvides, cnet.com for CBS News.
Amazon's devices chief on his vision for Alexa
Amazon remakes the Wall Clock with Alexa built-in
Ticketmaster allegedly has shady dealings with resellers, says...
Amazon launches Echo Auto for your car
Amazon announces Fire TV Recast DVR
Amazon unveils a slew of Alexa gadgets for the smart home
Amazon rolls out all-new Echo Show
Amazon wants to make your house more secure with Alexa Guard...