{"id":94978,"date":"2017-07-10T12:00:18","date_gmt":"2017-07-10T11:00:18","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=94978"},"modified":"2017-07-05T11:10:23","modified_gmt":"2017-07-05T10:10:23","slug":"cia-can-geo-locate-your-computer-by-listening-to-wifi-signals","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2017\/07\/cia-can-geo-locate-your-computer-by-listening-to-wifi-signals\/","title":{"rendered":"CIA Can Geo-locate Your Computer by Listening to WiFi Signals"},"content":{"rendered":"<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/07\/cia-terminal-surveillance-spy-big-brother-usa-wikileaks.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-94979\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/07\/cia-terminal-surveillance-spy-big-brother-usa-wikileaks-1024x640.jpg\" alt=\"\" width=\"500\" height=\"313\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/07\/cia-terminal-surveillance-spy-big-brother-usa-wikileaks.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/07\/cia-terminal-surveillance-spy-big-brother-usa-wikileaks-300x188.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/07\/cia-terminal-surveillance-spy-big-brother-usa-wikileaks-768x480.jpg 768w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p><em>30 Jun 2017 &#8211; <\/em>WikiLeaks Vault 7 has provided great insight into the CIA\u2019s hacking capabilities. So far we have learned they can hack into various electronic devices such as smartphones, TVs, and computers. Some of the CIA\u2019s tech revealed by <a target=\"_blank\" href=\"http:\/\/www.activistpost.com\/2017\/03\/truth-vault-7-empty-government-totally-incompetent.html\" >Vault 7 is outdated and over-hyped<\/a>, but the <a href=\"https:\/\/www.transcend.org\/tms\/2017\/07\/vault-7-elsa\/\" >latest revelation called project Elsa<\/a> seems frightening.<\/p>\n<p>Elsa is the code name for the CIA\u2019s geo-location malware for WiFi-enabled devices like laptops running the Microsoft Windows operating systems <a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/#Elsa\" >according to WikiLeaks<\/a>.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">RELEASE: CIA &#39;ELSA&#39; malware can geolocate your Windows laptop or desktop by listening to surrounding WiFi signals <a target=\"_blank\" href=\"https:\/\/t.co\/XjyyXIqXAz\" >https:\/\/t.co\/XjyyXIqXAz<\/a> <a target=\"_blank\" href=\"https:\/\/t.co\/WCw6dgF9ql\" >pic.twitter.com\/WCw6dgF9ql<\/a><\/p>\n<p>&mdash; WikiLeaks (@wikileaks) <a target=\"_blank\" href=\"https:\/\/twitter.com\/wikileaks\/status\/880078017955057665?ref_src=twsrc%5Etfw\" >June 28, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>One of the scariest things about Elsa WikiLeaks notes is that once CIA malware is installed on a target\u2019s system, it doesn\u2019t even need to be connected to the Internet to function.<\/p>\n<p>\u201cOnce persistently installed on a target machine using separate CIA exploits, the malware scans visible WiFi access points and records the ESS identifier, MAC address and signal strength at regular intervals. To perform the data collection the target machine does not have to be online or connected to an access point; it only needs to be running with an enabled WiFi device,\u201d WikiLeaks wrote.<\/p>\n<p>If the system is connected to the Internet, it then proceeds to log the geo-location of the target using databases from Google or Microsoft. The malware then stores the longitude and latitude data along with a timestamp for when the information was collected in an encrypted location on the user\u2019s hard drive.<\/p>\n<p>Further, WikiLeaks has showcased that Elsa doesn\u2019t phone home to the CIA; the data has to be extracted by a CIA agent using separate CIA exploits and backdoors or air gapping it out using a computer\u2019s hard drive LED light.<\/p>\n<p>The latter sounds like science fiction, but if the computer was infected with malware a drone could then exfiltrate the data if the drone were able to get close enough to see the computer\u2019s light <a target=\"_blank\" href=\"https:\/\/www.wired.com\/2017\/02\/malware-sends-stolen-data-drone-just-pcs-blinking-led\/\" >according to Wired<\/a>.<\/p>\n<p>With the revelation of this type of hacking technique, it begs the question, why would this method be used? The answer is almost certainly for targeting hackers and terrorists such as the CIA\u2019s mad experiment in the Middle East, ISIS. With the geological location data of a target, it would make droning a target easy peasy lemon squeezy.<\/p>\n<p>__________________________________________<\/p>\n<p style=\"padding-left: 30px;\"><em>Aaron Kesel writes for\u00a0<\/em>Activist Post<em>. <\/em><\/p>\n<p><em>This article is free and open source. You have permission to republish it under a <a target=\"_blank\" href=\"http:\/\/creativecommons.org\/licenses\/by\/4.0\/\" >Creative Commons<\/a> license with attribution to <a target=\"_blank\" href=\"http:\/\/theantimedia.org\/\" >theAntiMedia.org<\/a>. <\/em><\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.activistpost.com\/2017\/06\/cia-can-geo-locate-your-computer-by-listening-to-wifi-signals.html?utm_source=Activist+Post+Subscribers&amp;utm_medium=email&amp;utm_campaign=0562d480b9-RSS_EMAIL_CAMPAIGN&amp;utm_term=0_b0c7fb76bd-0562d480b9-380561097\" >Go to Original \u2013 activistpost.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>WikiLeaks Vault 7 has provided great insight into the CIA\u2019s hacking capabilities. So far we have learned they can hack into various electronic devices such as smartphones, TVs, and computers. The latest revelation called project Elsa seems frightening. Elsa is the code name for the CIA\u2019s geo-location malware for WiFi-enabled devices like laptops running the Microsoft Windows operating systems.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-94978","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/94978","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=94978"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/94978\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=94978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=94978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=94978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}