03 Oct 2017

If we told you that there was a hacking tool called “Ricky Bobby” and that the people who made and used it were quoted saying, “you know we got the dankest Trojans and collection tools,” you would assume that they were hackers working out of their parents’ basement right? Unfortunately, you would be wrong, because those people who you would think are 17-year-olds are actually working for one of the most powerful government agencies in the world. Yep, you guessed it, thanks to the of thousands of CIA documents WikiLeaks dumped this week we learned that American tax dollars are going towards “dank” hacking tools called “Ricky Bobby.”

Even though that sounds too ridiculous to write into a movie script, the truth is much crazier and frightening than you can imagine. For starters, that Ricky Bobby tool was designed by CIA hackers to access and harvest files on computers running newer versions of Microsoft Window without alerting anti-virus software, so even though some of this stuff sounds funny it has real-world consequences. Imagine what hackers could do if they got their hands on tools described in the document that are designed work around encryption and antivirus programs. If you’ve heard anything about what the leaked documents say though, it’s probably been about the CIA’s attempts to turn common items into listening devices.

If you’re a conspiracy theorist, Christmas has come early.

We recently wrote a post about how a photo of Mark Zuckerberg showed his personal laptop with a piece of tape over the built-in webcam and microphone. The average person who reads that would assume that since he’s the CEO of Facebook, he has good reason to cover his webcam and mic, but the average Joe doesn’t. It turns out that might not be true because the CIA has deployed tools that don’t just target computer cameras and mics, but phones and smart TVs to turn them into listening posts. Documents that even discussed hacking into vehicle systems were released. Mac and Windows, Apple and Android, if it has an internet connection the CIA has probably thought about hacking it. If you don’t trust the government, it’s easy to see the problem here, but if you’re one of the people who would say, “If you have nothing to hide you shouldn’t be afraid,” then you’ve got a rude awakening coming for you.

It’s not unheard of for government technology to be accessed by hackers or to escape government control. The Stuxnet worm is one example, but the fact that we’re talking about leaked CIA documents is another that proves that the American government can’t be trusted to keep their projects safe. And when those projects include tools that can turn your TV into a camera or take control of your car, the consequences could be terrible. State-sponsored hacks have never been more prevalent, and the US government just showed its hand which could be bad for all Americans. Not all possible consequences of the CIA leak are as dramatic though. If a hacker was able to turn your phone, computer, or TV into a listening post then they could learn your behaviors and routine and have access to everything from your passwords to your work schedule.

It gets worse though because Wikileaks hasn’t even published all of the documents they’ve said to be in their possession. They could be bluffing, but knowing what we know now it’s scary to think what else is possible. Is it time to go off the grid? Chances are if that sounds reasonable to you, you wouldn’t be reading this, but the leaked documents do show how important it is to be aware of the power of technology and what we are capable of doing with it.

Schedule an Appointment

Schedule an Appointment

    Our clients are awesome!

    Based on 55 reviews.
    Jeremy Richards
    Jeremy Richards
    2020-03-13
    Petronella provides great advanced digital marketing and automation solutions for my business!
    Kate Swenson
    Kate Swenson
    2020-02-14
    Highly recommended for CMMC certification assistance! Excellent and affordable options for secure data hosting on local infrastructure. 5 stars!
    Tom Matzen
    Tom Matzen
    2020-01-25
    Petronella Technology Group helped us setup our sales and marketing automation, cybersecurity and compliance for our new Blockchain startup. Great to work with! Craig in particular really knows his stuff, can translate into non-tech speak, and has wisdom beyond his years. Highly recommend them.
    Justin Summers
    Justin Summers
    2020-01-14
    Craig is awesome! He is very professional and efficient with his work. I would definitely recommend Petronella Technology to anyone who needs state of the art service.
    Blake Rea
    Blake Rea
    2020-01-14
    Craig is an expert in his field. Impressed by his knowledge, A true pioneer in Cybersecurity. My business is safer thanks to Petronella Tech!
    Robert Friedman
    Robert Friedman
    2020-01-10
    For the last five years Craig has been the Contributing Editor for Cybersecurity for NC Triangle Attorney Law Magazine which I publish. His base of knowledge is always leading edge, pragmatic and early to understand for our readers who are not techies. He is patient and easy to work with.
    Tammy Everett
    Tammy Everett
    2020-01-10
    Craig Petronella, CEO of Petronella Technology Group provided the members of the Defense Alliance of North Carolina expert advice on cybersecurity and NIST compliance. Eye opening experience! Thanks so much!
    Julie Brown
    Julie Brown
    2020-01-09
    Craig and the Petronella Technology Group, Inc. team made HIPAA compliance for my small practice so simple and easy! They helped me with all of my HIPAA training, HIPAA Security Risk Assessment, Penetration Test, and HIPAA secure hosting so I can rest easy.
    Pivot Point
    Pivot Point
    2020-01-03
    Petronella Technology Group helped us with our marketing strategy for our new web startup. Awesome experience!!!!
    Richard Brunet
    Richard Brunet
    2019-12-30

    SCHEDULE AN APPOINTMENT

    Make It Happen Now

    CLIENT SUPPORT

    Don't Feel Stranded

    CONSULTATION

    Get Best Advice

    PAYMENTS

    Make A Payment

    Top