Technology

MI5, CIA used Samsung Smart TVs to secretly listen-in on conversations: WikiLeaks

WikiLeaks reveals that both British and American intelligence agencies used an implant on Samsung TVs to secretly listen-in on user conversations.

Using MI5’s EXTENDING Tool, American counterparts at the CIA developed the listening implant tool code-named “Weeping Angel” to record audio on Samsung F Series Smart Televisions, according to the latest Vault 7 dump by WikiLeaks.

“Based on the ‘Extending’ tool from MI5/BTSS, the [Weeping Angel] implant is designed to record audio from the built-in microphone and egress or store the data,” the intro reads.

According the EXTENDING Tool user’s guide, the implant is installed using a USB stick inserted into the TV, and it could be configured to setup a WiFi hotspot through which the intelligence agencies could spy directly on live conversations.

“The implant is configured on a Linux PC, and then deployed onto the TV using a USB stick. Audio files can then be extracted using a USB stick or setting up a Wi-Fi hotspot with-in range of the TV. It is also possible to listen to audio exfiltration live, using the Live Listen Tool, designed for use on a Windows OS.”

Regarding the WiFi hotspot, which is required for Remote Access Audio Retrieval and Live Audio Exfiltrating, the user’s guide explains, “To exfiltrate files over a Wi-Fi hotspot, the hotspot must be setup within range of the TV with a preconfigured SSID, set in the config file. Files are then exfiltrated over this Wi-Fi network to a server as configured in the configuration file.”

Even when the TV is off, the CIA and MI5 still can record audio using the aptly-named “Fake-off” recording feature.

“EXTENDING will continue to record audio, even whilst the TV appears to be off. This is achieved by intercepting the command for the TV to switch-off and turning off the TV screen, leaving the processor running.”

In what appears to be a perverted form of British charm, the guide is ever-so polite in saying, “Please ensure the unencrypted settings file, encryptSettings tool and rsakeygen tool are always stored securely.”

The walkthrough of the implant’s installation in the user’s guide even gives a friendly reminder to hackers to clear the TV’s history after installing the ultra-secretive, privacy-stealing, attack apparatus on individuals’ rights.

Tim Hinchliffe

The Sociable editor Tim Hinchliffe covers tech and society, with perspectives on public and private policies proposed by governments, unelected globalists, think tanks, big tech companies, defense departments, and intelligence agencies. Previously, Tim was a reporter for the Ghanaian Chronicle in West Africa and an editor at Colombia Reports in South America. These days, he is only responsible for articles he writes and publishes in his own name. tim@sociable.co

View Comments

Recent Posts

AIM 2026 opens with Chris Schembra, Barbara Corcoran and Get Covered unpacking the apartment industry’s AI moment and more

Interest in the apartment industry is reaching fever pitch as author Chris Schembra, mogul Barbara…

2 days ago

Is LinkedIn Tracking Your Browser Activity? Here’s What’s Behind It

Let’s take a closer look at ‘Browsergate’: is LinkedIn really running the biggest corporate espionage…

4 days ago

Techstars Startup Weekend bets on Valencia as a next European startup launchpad

Valencia’s tech ecosystem is getting a big win this June 12-14 as Techstars Startup Weekend announces…

4 days ago

Why enterprises keep getting AI wrong – and what it actually takes to get it right 

In the upper floors of corporate America, budgets are larger than ever, board presentations are…

5 days ago

The EU wants to put a ‘tax on disinformation’: Fractured Reality report

If your content is deemed to be disinformation by the ministry of truth, your speech…

5 days ago

You created the song. Now what? How Neural Frames is giving independent musicians a visual voice (Brains Byte Back Podcast)

In the latest episode of Brains Byte Back, host Erick Espinosa sits down with Dr.…

5 days ago