FIRST AIRED: March 7, 2017

Nice work! Enjoy the show!

×

You’re busy. We get it.

Stay on top of the news with our Editor’s Picks newsletter.

US Edition
Intl. Edition
Unsubscribe at any time. One click, it’s gone.

Thanks for signing up!

×

Transcript

00:00:01
>> Amidst an ongoing battle between the White House and the US Intelligence community, WikiLeaks dropping a massive trove Tuesday it claims details in an array of hacking tools used by the Central Intelligence Agency to break into phones. Apps and smart TVs, cyber security correspondent Dustin Volts.>> The early indications are that this appears to be authentic.
00:00:22
Former officials and security experts are telling us that it does look real and part of that is because certain names are being. Used of different programs and operations that very much do appear to be what the CIA really did name things.>> In a lengthy press release not yet verified by Reuters, the organization headed by Julian Assange says ont type of CIA malware Apparently enables hackers to essentially take over a person's iPhone and monitor their text and audio communications, as well as use the phone's camera and microphone as a recorder, circumventing popular encryption apps, such as Signal.
00:00:56
Another malware attack against Samsung Smart TVs allowing hackers to put them into so-called Fake off mode, where the user believes the television is off but it is, in fact, on and recording everything happening in the room.>> We're seeing this confirm what people often knew, in the abstract, about the CIA.
00:01:14
Which is that, there are flaws in phones and the intelligent community tries to exploit them. They use any manner of tools at their disposal to get into devices and to, in some cases, use them and not disclose them publicly, even to a software manufacturer, or a technology company, because they feel like it is so important for their ongoing security Community and foreign intelligence gathering operations.
00:01:36
>> The CIA refusing to deny or confirm the authenticity of the documents. But, WikiLeaks claiming they came from at least one source saying the motive is to spark a public debate about whether the CIA is overstepping its mandated powers. An echo of NSA leaker Edward Snowden, whose own document dump led to major changes in how that agency operates.