Worried about the hacking secrets revealed in the latest Wikileaks data dump?
Here’s what you need to know. The WikiLeaks revelation is likely part of a Russian disinformation campaign meant to undermine the U.S. intelligence agencies in general, and to more immediately lend credence to President Donald Trump's allegations that former President Barack Obama spied on him.
Some of the CIA hacking tools mentioned in the WikiLeaks dump are real. Some of them probably are not. We may never truly know which is which. (But we are intrigued by the one about turning a Samsung Smart TV into a listening device.)
For the moment, all we can tell you to do is to keep your PCs, Macs, iPhones and Android updated to the latest versions of their operating systems, to run antivirus software on Windows, macOS and Android, and to be wary of smart-home devices that are always listening to what you say. (And if your Android device can't be updated beyond Android 5.1 Lollipop, get a new one.)
WikiLeaks says the cache of information, reportedly "8,761 documents and files," came from "a former U.S. government hacker [or] contractor." That's possible. It's also possible that it came straight from the Russian intelligence services, which is how WikiLeaks apparently obtained emails stolen from the Democratic National Committee .
As such, we can't completely trust what's in the files. But let's go over the important stuff:
Allegation: The CIA knows how to hack into iPhones and Android phones.
Reality: Yes, of course it does. So do the NSA and the foreign-intelligence agencies of Britain, France, Russia and China.
Impact and what you can do: Unless you're a high-value target, such as a terrorist, arms dealer, foreign politician or diplomat or, well, a spy, the CIA will probably not be interested in what's on your phone.
Allegation: The CIA can bypass the encryption used by WhatsApp, Telegram, Signal and other secure messaging services.
Reality: Yes, it can, but only if an "endpoint" -- a phone or computer sending or receiving a secure message -- has been hacked by other means. Because the message is decrypted at the endpoint, the CIA doesn't need to decrypt the message itself.
Impact and what you can do: Unless you're a high-value target, as outlined in the previous answer, keeping your phone's operating system and apps up-to-date will protect you from cybercriminals who may also want to read your secret messages.
Allegation: The CIA can turn a Samsung Smart TV into a listening device.
Reality: Unknown, but likely. WikiLeaks alleges that the CIA tool "Weeping Angel" (a Doctor Who reference ), developed with Britain's MI5, puts Samsung Smart TVs in a "fake-off" state in which the device only appears to be turned off. (Previously reported NSA/CIA eavesdropping tools for iPhones allegedly work in a similar manner.) Presumably, this only works on voice-command-enabled Samsung Smart TVs, which constantly listen to background noise.
Impact and what you can do: If your TV can't listen for voice commands, you're probably safe. If it does, you could unplug it when it's not being used.
Allegation: The U.S. Consulate in Frankfurt is used by the CIA as a base for agency hacking activities.
Reality: CIA spies routinely use State Department diplomatic cover to travel and reside abroad. Every U.S. Embassy contains a CIA station. The only news here is that the Frankfurt consulate is named as a center for information-security activities.
Impact and what you can do: Nothing for the average consumer, but the instructions for CIA operatives on how to adjust to life in Germany are a good read for any tourist.
Allegation: The CIA uses antivirus software, along with other kinds of software, as "decoys" to provide cover for its hacking activities.
Reality: Not surprising. The report says legitimate software is used as part of the CIA's "Fine Dining" program (possibly a SpongeBob SquarePants reference) to infiltrate computer systems not connected to the internet. Criminals use hacked versions of real software all the time. It's not clear whether the antivirus software itself is altered by the CIA, or whether the software runs unaltered in the foreground while more nefarious deeds happen in the background.
Impact and what you can do: Be wary of antivirus warnings that pop up when you’re browsing online. They’re probably not from the CIA, but instead from criminals and tech-support scammers who want you to pay for malware protection that doesn’t work.