X

I spy with an iPhone: What tech's open to the CIA?

WikiLeaks says CIA malware targets iPhones, Android devices and smart TVs. Here's a look at some of the gadgets and programs that are allegedly vulnerable.

James Martin
James Martin is the Managing Editor of Photography at CNET. His photos capture technology's impact on society - from the widening wealth gap in San Francisco, to the European refugee crisis and Rwanda's efforts to improve health care. From the technology pioneers of Google and Facebook, photographing Apple's Steve Jobs and Tim Cook, Facebook's Mark Zuckerberg and Google's Sundar Pichai, to the most groundbreaking launches at Apple and NASA, his is a dream job for any documentary photography and journalist with a love for technology. Exhibited widely, syndicated and reprinted thousands of times over the years, James follows the people and places behind the technology changing our world, bringing their stories and ideas to life.
James Martin
samsung-galaxy-s7-edge-product-hero-2.jpg
1 of 8 Josh Miller/CNET

WikiLeaks said Tuesday that leaked documents published to its site reveal that the CIA has a global covert hacking program through which it can exploit dozens of weaknesses in various popular tech products. CNET is unable to verify whether the documents are real or have been altered. Meanwhile, the CIA said it doesn't comment "on the authenticity or content of purported intelligence documents."

This slideshow offers a look at some of the tech WikiLeaks says is vulnerable. Google's Android mobile operating system is reportedly among the affected systems. Google declined to comment.

WikiLeaks has a long track record of releasing top secret government documents, and experts who've started to sift through the material said it appears legitimate, according to CBS News. It's unclear, though, whether these programs are still running and whether they affect the latest versions of the hardware and software.

Gallery published March 7, 2017.
iphone-parental-restrictions-7532-005.jpg
2 of 8 Josh Miller/CNET

You think the iPhone is safe? Not according to WikiLeaks, which as part of its latest document dump alleges that the Apple gadget, too, is vulnerable to the CIA's spying eyes. Apple declined to comment.

besttest-final0013microsoft-surface-pro-4.jpg
3 of 8 Sarah Tew/CNET

Microsoft's Windows is allegedly accessible. The company said it's looking into the situation.

rest-finger-to-open.jpg
4 of 8 Matt Elliott/CNET

Apple's iPad is reportedly in the mix. (Again, Apple has declined to comment.)

iphone-whatsapp.jpg
5 of 8 Sarah Tew/CNET

The CIA's techniques allegedly permit the agency to bypass even the encryption of WhatsApp, a messaging app that's popular around the world. WhatsApp declined to comment.

SamsungSmartTV_IntrepidJuly18_NYC_22.jpg
6 of 8 Sarah Tew/CNET

The CIA's global covert hacking program also tested (but never deployed) a hack that could turn a Samsung smart TVs (the F8000 models) into tappable microphones. A "Fake-Off" mode would supposedly trick the owner into thinking the TV is off when it's on. The television then operates as a bug, recording conversations in the room and sending them over the internet to a covert CIA server. Samsung didn't respond to a request for comment.

gettyimages-597888136.jpg
7 of 8 Getty Images

The Signal app uses data encryption to send messages that can be read only by the designated receiver. But WikiLeaks says that by hacking the phones Signal runs on, the CIA can collect audio and message traffic before encryption is applied.

"The CIA/Wikileaks story today is about getting malware onto phones, none of the exploits are in Signal or break Signal Protocol encryption," said Moxie Marlinspike, the founder of Signal. "This story isn't about Signal or WhatsApp, but to the extent that it is, we see it as confirmation that what we're doing is working."


telegram-1000-seguidores.jpg
8 of 8 Screenshot by CNET

The Telegram app is encrypted, too, but WikiLeaks says the CIA can collect audio and message traffic before encryption takes place.

Telegram said on its website that the problem lies with operating systems and not encrypted messaging apps and that naming specific encrypted services is "misleading."

More Galleries

My Favorite Shots From the Galaxy S24 Ultra's Camera
A houseplant

My Favorite Shots From the Galaxy S24 Ultra's Camera

20 Photos
Honor's Magic V2 Foldable Is Lighter Than Samsung's Galaxy S24 Ultra
magic-v2-2024-foldable-1383

Honor's Magic V2 Foldable Is Lighter Than Samsung's Galaxy S24 Ultra

10 Photos
The Samsung Galaxy S24 and S24 Plus Looks Sweet in Aluminum
Samsung Galaxy S24

The Samsung Galaxy S24 and S24 Plus Looks Sweet in Aluminum

23 Photos
Samsung's Galaxy S24 Ultra Now Has a Titanium Design
The Galaxy S24 Ultra in multiple colors

Samsung's Galaxy S24 Ultra Now Has a Titanium Design

23 Photos
I Took 600+ Photos With the iPhone 15 Pro and Pro Max. Look at My Favorites
img-0368.jpg

I Took 600+ Photos With the iPhone 15 Pro and Pro Max. Look at My Favorites

34 Photos
17 Hidden iOS 17 Features You Should Definitely Know About
Invitation for the Apple September iPhone 15 event

17 Hidden iOS 17 Features You Should Definitely Know About

18 Photos
AI or Not AI: Can You Spot the Real Photos?
img-1599-2.jpg

AI or Not AI: Can You Spot the Real Photos?

17 Photos