WikiLeaks CIA hacking claims: Here’s what you need to know

Click to play video: 'WikiLeaks exposes smart tech software used as CIA spy tools'
WikiLeaks exposes smart tech software used as CIA spy tools
WATCH ABOVE: WikiLeaks has released a batch of classified documents highlighting the CIA's ability to intercept communications through everyday electronic devices, like smartphones and TVs. Jackson Proskow reports – Mar 8, 2017

NEW YORK — So, you use messaging apps like WhatsApp or Signal or have smart TVs and PCs. Should you worry that the CIA is listening to your conversations?

The short answer is no. The long answer is maybe, though it’s still unlikely you need to be too concerned.

WikiLeaks revelations describing secret CIA hacking tools allegedly used to break into computers, mobile phones and even smart TVs could certainly have real-life implications for anyone using internet-connected technology. In particular, the WikiLeaks documents suggest the CIA has attempted to turn TVs into listening devices and to circumvent – though not crack – message apps that employ protective data scrambling.

READ MORE: Smart TVs and cars could be used for spying: WikiLeaks report

But for people weary of a seemingly constant revelations of hacks, government spying and security worries, the news came as no surprise.

Story continues below advertisement

WATCH: ‘There are some bad people in the world who have Samsung TVs’: Ex-CIA director

Click to play video: '‘There are some bad people in the world who have Samsung TVs’: Ex-CIA director'
‘There are some bad people in the world who have Samsung TVs’: Ex-CIA director

“Today’s leaks definitely concern me, but at this point I have accepted that security risks are an inherent part of our modern technology,” Andrew Marshello, a soundboard operator from Queens, New York, said by email. “Since that tech is so integrated into our society, it’s hard to take the reasonable step – cutting out smart devices, messaging apps, etc. – without sacrificing a part of social life.”

READ MORE: Is a stalker spying on you through your phone? Here’s what to look for

While he’s “definitely worried” about deeper implications of governmental hacking and surveillance, Marshello says he won’t cut his iPhone or modern messaging apps out of his life. But he doesn’t have a smart TV and doesn’t plan to get one, he keeps his microphone unplugged and camera covered when he’s not using his PC and he has voice recognition turned off on his phone.

Story continues below advertisement

He’s not alone. Last year, Facebook CEO Mark Zuckerberg was photographed with his laptop camera and microphone covered with tape. Some online called him paranoid; others suggested he was just being smart.

Here’s why it matters

This 2013 file photo shows the US Consulate General in Frankfurt, Germany. WikiLeaks on Tuesday, March 7, 2017 published thousands of documents purportedly taken from the Central Intelligence Agency’s Center for Cyber Intelligence.
This 2013 file photo shows the US Consulate General in Frankfurt, Germany. WikiLeaks on Tuesday, March 7, 2017 published thousands of documents purportedly taken from the Central Intelligence Agency’s Center for Cyber Intelligence. (Boris Roessler/dpa via AP, file)

“What everybody should be asking is whether any of this was shared with local law enforcement,” said Scott Vernick, a partner at the law firm Fox Rothschild who focuses on data privacy and security. Meaning, whether the CIA shared any of the techniques with the FBI and with other domestic law enforcement agencies that could employ them domestically.

Ed Mierzwinski, consumer program director at consumer advocacy group U.S. PIRG, said the news should alert consumers to how vulnerable internet-connected devices are.

“You shouldn’t be too concerned about the CIA hacking you unless you’re doing something illegal,” he said. “But this should be a wakeup call for the average consumer.”

Story continues below advertisement

He recommended changing passwords on smart TVs, cameras and other connected devices as often as you change computer passwords. “Whether it’s your refrigerator, smart lights you program from your phone or your baby monitor, the security systems in most ‘internet of things’ products are actually dumb, not smart.”

Privacy fatigue

Click to play video: 'WikiLeaks vs. U.S. intelligence'
WikiLeaks vs. U.S. intelligence

WATCH ABOVE: WikiLeaks vs. U.S. intelligence

“At this point, I am so used to reading stories about accounts getting hacked that it is to be expected,” Matt Holden, an editor and social media coordinator in Dallas, Texas, said via email. Holden worries about the safety of personal information like his social security number and financial details, but says he’s less concerned about the security of his messaging apps.

“So long as I conduct myself in a way that would mean I have nothing to hide, then I’m not worried about the government taking a look,” he said.

Story continues below advertisement

READ MORE: Here’s why you’ll probably want to turn off browser autofill

In a recent Pew survey , conducted in the spring of 2016 and released this January, 46 percent of respondents thought the government should be able to access encrypted communications when investigating crimes. Only 44 percent thought tech companies should be able to use encryption tools that are “unbreakable” by law enforcement. Younger people were more likely to support strong encryption, as were Democrats.

If they’re authentic, the leaked CIA documents frame one stark reality: It may be that no digital conversation, photo or other slice of life can be shielded from spies and other intruders prying into smartphones, computers or other devices connected to the internet.

WATCH: Cyber security expert David Shipley on the CIA allegations from the latest Wikileaks document dump

Click to play video: 'Is your phone a listening device for the CIA?'
Is your phone a listening device for the CIA?

Another reality: Many may not care.

Story continues below advertisement

“People have fatigue in this area, especially when talking about data breaches, and to a degree, hacking,” said Eva Velasquez, president of the Identity Theft Resource Center, who says it’s difficult to imagine what kind of abuses would force them to abandon their smartphones. “People love their fun toys and devices,” she said.

The Internet of spying on things

“We don’t know about the CIA role, but we do know anything with a chip in it that is connected to the Internet is vulnerable to hacking,” said Gartner security analyst Avivah Litan.

A hacking attack last October that disrupted sites such as Amazon and Netflix, for instance, originated on internet-connected devices such as home videocams.

“Basically the ‘Internet of things’ is vulnerable and has been deployed without thinking of security first,” Litan said. Anyone with reason to think someone might be spying on them “should think twice about a connected car or a connected camera.”

Sponsored content