Wait till Alexa gets arms and legs. There's gonna be hell to pay.
Wait till Alexa gets arms and legs. There's gonna be hell to pay.
Phones are the real bug now. Have no use for 'Alexa' unless she really digs me and runs her fingers through my hair on the way home. Seriously, everything is connected now with little effort and I still suspect my brand new cable box has a mini cam.
LWhat we know from Vault7, Year Zero so far:
The CIA has capabilities beyond the NSA, with over 5,000 hackers and agents working for them around the world with no checks and balances.
The CIA can turn most consumer electronics with a microphone into a listening device potentially without a warrant or court order.
The CIA is responsible for thousands of pieces of malware, and have backdoors and zero-day access to most major computer systems such as Mac, Linux, and Windows as well as mobile operating systems such as the iPhone and Android.
The CIA can fake the fingerprint origin of a hack to make it look like it came from a foreign agent hacker or country.
Under Obama, the CIA built the most powerful cyber attack arsenal of malware costing the American tax payers over $100 billion+, and lost most of it for free on the darknet.
The CIA has lost control of its hacking tools. They are not classified or copyrighted to prevent the public from knowing about them and they have been leaked. They are potentially available on the darknet and can be used by any hacker, against anyone.
The CIA can hack modern cars and trucks to kill or injure drivers without detection.
The CIA can also potentially bring down or remote control airplanes.
The CIA developed a tool to make Android phones spy on WiFi networks around them.
The CIA can bypass encrypted messaging applications including WhatsApp, Signal, Telegram, and Wiebo. Meaning if you use these apps the CIA can still read your messages by hacking your phone OS instead.
The CIA has real-time analysis of all conversations on Skype.
The CIA has developed tools to hack Apple’s iTunes.
The CIA can bypass most anti-virus software, including NSA grade anti-virus software.
The CIA can hack computers using vulnerabilities in the VLC video player.
The CIA operates in Europe out of the Frankfurt consulate to spy on Europe and other countries.
The CIA can evade existing forensic tools and capabilities.
The CIA dramatically increases proliferation risks. Their hacking capabilities will lead to escalation by hacking groups and foreign governments.
The CIA is massive, and consists of dozens of divisions and sub-agencies.
But wait there's more
Facebook's Secret "User-Reputation Score" Exposed
https://www.zerohedge.com/news/2018-...-credit-system
Can we also mention the reddit data breach.
They live, We sleep
In April of 2017, the Council on Foreign Relations released a report on the vulnerability of the U.S. power grid. Because of the importance of electricity to the smooth functioning of society and because of the critical nature of power to the 16 sectors of the U.S economy that make up what’s considered critical infrastructure, a significant attack on the grid could cause serious damage in the U.S., if it were to happen. “Any of the system’s principal elements – power generation, transmission or distribution – could be targeted for a cyberattack,” the agency said.
1- The U.S. power grid has long been considered a target for a major cyberattack; however “carrying out a cyberattack that successfully disrupts grid operations would be extremely difficult, but not impossible,” according to the Council on Foreign Relations’ report.
2- The U.S. power grid was built for “reliability and safety” and is fairly easy to defend. During winter weather or a hurricane for example, U.S. power crews are good at anticipating problems and can generally move away from computers to manual operations, cyber security expert Robert M. Lee said in an interview with Scientific American magazine.
>> Related: Hackers target European businesses, banks, services in new cyberattacks
3- Because of computer technology and the growing interconnectedness of the digital landscape, and because returning to manual operations is growing more difficult, Lee said that there is cause for concern. “Our adversaries are getting much more aggressive. They’re learning a lot about our industrial systems, not just from a computer technology standpoint but from an industrial engineering standpoint, thinking about how to disrupt or maybe even destroy equipment. That’s where you start reaching some particularly alarming scenarios,” Lee told Scientific American.
4- The director of the National Security Agency, Adm. Michael Rogers, in testimony before Congress in 2014, said that China and a few other countries likely had the capability to shut down the U.S. power grid. “Rapid digitization combined with low levels of investment in cybersecurity and a weak regulatory regime suggest that the U.S. power system is as vulnerable - if not more vulnerable - to a cyberattack as systems in other parts of the world,” officials with the Council on Foreign Relations said.
>> Related: Homeland Security investigating after massive cyber attacks take down sites across the internet
5- A cyberattack on the U.S. electric grid could cause power losses in large parts of the United States that could last days or up to several weeks in some places, and it would cause a substantial economic impact, the Council on Foreign Relations reported. The report found the U.S. needs to work to put in place measures to prevent a cyberattack on the power grid, and to find ways to lessen the potentially catastrophic impact should one occur.
There are currently 1 users browsing this thread. (0 members and 1 guests)
Bookmarks