• Home
  • About

A Runner's Story

A Runner's Story

Tag Archives: CIA

Weeping Angel

08 Wednesday Mar 2017

Posted by Ed Mahoney in cyber war

≈ Leave a comment

Tags

CIA, Cyber War I, F8000 Smart TV, WikiLeaks, zero day exploits

Bethesda_angel_cloudy_jeh

Any Doctor Who fans?  If so, you should appreciate the reference to the weeping angels from that show, and perhaps understand why this is such a clever name for an exploit kit to hack into Samsung TVs considering how the CIA uses it in collaboration with MI5 – or the Brits.

I’m referring of course to this week’s data dump of classified CIA material on their hacking program, actually their toolkits, by WikiLeaks.  Much of the news hovers around the ethical concerns of the CIA hacking into American citizens’ Internet-connected Samsung TV sets to listen in to their conversations or track what shows they watch.  Or the issue of them not sharing exploits with vendors.  I’m not interested in that.  It’s all inference anyway.  All we really know is the software programs they use, in conjunction with other European agencies, to electronically eavesdrop.  Personally, I’d be disappointed in them if they didn’t have some cool capabilities like this.

I might be more technical in this area than you, but to let you know, I’m not really all that savvy on how these exploits work.  Which is why I think you might find my take-away from this event interesting.  You should be able to identify with my high-level understanding.  Understand it is really quite possible for a hacker to eavesdrop on your conversations, to hack into your iPhone, to capture your sensitive WhatsApp texts before they are encrypted.  For Pete’s sake, last week’s news was about two million internet-connected teddy bears, from Spiral Toy’s CloudPets, making their customers’ conversations available online.  The point isn’t that the CIA uses these tools, it’s that anyone can use these tools.  It’s that these tools exist.  There is no assurance of data privacy.

In Cyber War I, I explain to readers about how ransomware works and to be aware.  I give some technical details on several aspects of hacking and cybercrime.  I intend to go deeper and explore other dangers in my sequel.  I hope you enjoy this information; I’ll try to blog more on these topics.

If you’re looking for assurances, there aren’t very many.  For online protection for when you don’t mind the inconvenience and are uber concerned on protection, consider employing two-factor authentication.  At least on financial sites.  This is typically a process of logging into a site with your password (something you know), and a passcode that gets sent to your phone (something you have) during the login process.  More and more sites are adopting this, but leave it to you to use it.  It probably won’t be available on your TV any time soon.

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • Reddit
  • More
  • Tumblr
  • Email
  • Print

Like this:

Like Loading...

Search this blog

Categories

Buy Full Spectrum Cyberwar at Amazon

Buy Cyber War I at Amazon

Buy on Amazon India for ₹99

Buy on Amazon U.K. for £2.27

English Edition on Amazon Germany

Buy on Amazon Brazil for R$11.29

Archives

Blog Stats

  • 103,944 hits

Recent Comments

Terry Collier on The Trail Conspiracy
Anonymous on The Trail Conspiracy
Ed Mahoney on Writing Naked
georgeschools on Writing Naked
Ed Mahoney on Argentine Trail

Recent Posts

  • The Trail Conspiracy December 7, 2019
  • Writing Naked November 23, 2019
  • In a Fall’s Winter November 2, 2019
  • Running Errands October 19, 2019
  • An October Run October 13, 2019
  • Argentine Trail October 6, 2019
  • Fall Weekends September 28, 2019
  • Mount of the Holy Cross September 22, 2019
  • The Wedding Performers September 8, 2019
  • The Wedding Hike September 1, 2019
  • Brittany Noel Got Married August 30, 2019
  • Cybersecurity is Complex August 19, 2019
  • Part III: Water, Rock, Man August 13, 2019
  • Aspen August 11, 2019
  • Thirty-Two Years August 3, 2019
  • Box Sets & Writing Conventions July 20, 2019
  • Flattop Mountain July 14, 2019
  • Mr. Sandman July 6, 2019
  • Two Girls Eating June 30, 2019
  • My Cozy Trail June 23, 2019
  • Foot Bridge June 15, 2019
  • 512 June 7, 2019
  • PING June 2, 2019
  • The Tribe May 27, 2019
  • Fence Painting May 25, 2019
  • 50° in May May 19, 2019
  • On Reading May 18, 2019
  • Aspen Heavy Half May 5, 2019
  • Lunch with Sara May 4, 2019
  • Introducing Sara May 3, 2019
  • Mutton on the Rotisserie April 21, 2019
  • Go-to-Market Plan April 20, 2019
  • Tara & Teddy April 19, 2019
  • Heavy Thoughts April 13, 2019
  • Book Marketing April 6, 2019
  • Cairn March 31, 2019
  • Winter Park March 29, 2019
  • Source Content March 27, 2019
  • What About the Author March 22, 2019
  • The Sequel March 21, 2019
  • Joder Ranch March 16, 2019
  • Cyan March 10, 2019
  • Winter in Wild Basin February 23, 2019
  • My Chair by the Window February 16, 2019
  • No ​Risk, No Reward February 9, 2019
  • Ten Thousand Words January 16, 2019
  • RTFM & the EULA January 5, 2019
  • Final Destination December 31, 2018
  • Texas Panhandle December 29, 2018
  • The End November 24, 2018

Colorado=Security

Blogroll

  • Alohawk's Blog
  • Barbie's Blog
  • Boggy Creek Lumpster
  • George Schools Blog
  • I, Cringely
  • Prostate Chronicles
  • Shut Up + Run
  • Sustainable Sunrise
  • The Rogue Botanist

Web Sites

  • Amazon Author Page
  • Austin Marathon
  • Bolder Boulder
  • Brit's YouTube Songs
  • Colorado Marathon
  • Colorado Runner Magazine
  • Colorado Trail
  • Girlfriend Cult
  • Lobo Media Ltd
  • My YouTube Site
  • Race Pace Calculator
  • Shoes & Brews
  • Trail Runner Magazine
  • Zaremba Graphic & Web Solutions

Goodreads

Top Posts & Pages

  • The Trail Conspiracy
  • Telephone Pole Intervals

Top Clicks

  • massageenvy.com/clinics/C…

RSS Feed

  • RSS - Posts
  • RSS - Comments

Blog at WordPress.com.

Cancel
loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.
%d bloggers like this: