The Windows Club

Prevent or avoid being spied on by the Government

Wikileaks, an international non-profit organization that publishes secret information, fired a fresh salvo. The website that apparently got access to secret documents of U.S. Central Intelligence Agency (CIA) disclosed ingenious hacking techniques employed by the CIA for hacking everything from computers, smartphones, and TVs to compromising Internet routers and computers of the users.

The objective of this move was to bring into light the CIA’s global covert hacking program, its malware arsenal and dozens of weaponized exploits that the agency uses for a wide range of U.S. and European company products like Microsoft’s Windows platform (Including bypassing Windows Activation), Apple’s iPhone, and Google’s Android OS. These devices along with several others like Samsung TVs are turned into covert microphones or implements of espionage by secret cyber-tools of CIA.

The report from Wikileaks laid bare the designs and capabilities of the U.S. intelligence community’s closely guarded cyberweapons. This is likely to cause immediate damage to the CIA’s efforts in collecting intelligence overseas and put additional restrictions on the U.S to carry out its missions on espionage.

There are also reports that CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools. HIVE is described below.

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows that are configured to communicate via HTTPS with the web server of a cover domain. Every single operation utilizing these implants has a separate cover domain that resolves to an IP address, located at a commercial VPS (Virtual Private Server) provider.

The public-facing server forwards all incoming traffic via a VPN to a ‘Blot’ server that is capable of handling actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‘Honeycomb’ tool server that communicates with the implant. The Honeycomb tool server then receives exfiltrated information from the implant.

Good news for the users is all this does not mean an end of privacy. There are a few methods via which one can communicate over the web and the phone without revealing their identity to CIA.

Prevent being spied on by CIA or Government

These are just some of the basic precautions one could. Obviously, these may not help if someone is hell-bent on monitoring you.

Read: How do I know if my Computer has been Hacked and what to do next.

How do you know if you are being spied on

There are some tell-tale signs that can let you know if someone is spying your phone or computer. Here are some of them:

Read: How to avoid being watched through your own Computer.

This article on how to protect yourself from NSA spying & snooping will give you additional tips that may help you protect yourself from government surveillance systems.

Besides being extremely unpleasant for invading privacy, tracking poses a genuine risk. This post will show you how to Opt out of Data Tracking & Targetted ads on the Internet. Take care and stay safe!