With enterprise/corporate red-teaming you have to work for it a lot, update your tooling, attacks, etc... do a lot of recon. But even then, even in companies that take security seriously and pay for it too, experienced pros spend a few days and get domain-admin (or equivalent) half the time. And I'm talking about in 2025 with everyone and their mom running EDR that have only gotten better over time (in my opinion).
The CIA's tools probably don't have flashy graphics, but even the ones that were leaked a while ago give a good insight into things.
https://github.com/secoba/CIA-Hacking-Tools
I can imagine an experienced operator automating things quite a bit, and when you give them a target, they'll just run a few commands, wait a some time and get a shell with lots of powerful capabilities.
Matter of fact, I think they don't show enough "easy hacking" in the movies, where you take over hospitals, government agents, courts ,etc.. in a matter of minutes and start snooping around, or just wipe them out. That would feel unbelievable to movie/tv audiences so they lave it out.
2. While I don't even dislike the guy, let alone hate him, Kiriakou tends to make grandiose and controversial claims that get discredited.
3. Kiriakou hasn't been privvy to CIA tech since roughly 2004. Yes, before the era of modern smartphones, all devices were pwned. He's been doing the rounds on any podcast that will take him where he elaborates on these claims further and it's pretty clear that he doesn't have decent subject matter knowledge.
Can a lot of phones and TVs and cars be exploited? Yes. Keep your devices patched. And, don't do things that attract the CIA's attention enough that they're putting in the significant effort it takes to pwn your TV or car.
tl;dr: If you're in a position where the CIA is targeting you, worry.
I got a used manual transmission easy to repair vehicle with no internet, no cell phone, I only use cash IRL, and the only device I travel with is a QubesOS laptop.
If the CIA wants to track me, they are going to have to work for it. I hope to waste as much of their time as possible.
In one interview he says that after being surveilled overseas for a while by an obvious amateur, he told the station chief who then gave him the OK to kill the guy.
Surely they would try evasion, counter-surveillance, or maybe even sending a team to grab the guy off the street to figure out who he is?
He claims the only reason he didn't kill the guy is because for some reason he randomly decided to mention it to a general in the local intelligence service, and then suddenly the tail vanished.
He shows up on Youtube a lot, and is always a great watch, but is he full of shit or what?
Trial for leaker https://news.ycombinator.com/item?id=22226066
He did not own a mobile phone or any internet connected device. Was staunchly against it. This attitude was based on what he knew were the surveillance capabilities in 2003. Ended up retiring to a mountain cabin that was off grid.
Maybe he was crazy, but he never seemed like the prepper type. Just very very sober and serious about avoiding electronic communications.
https://www.aljazeera.com/news/2025/9/6/us-navy-seals-killed...
No baseband modem, no arbitrary blobs, no OS that sends data. And should be obvious: no messenger apps that can't be verified.
The problem though is not your phone if you set it up right: it's your contacts. Your opsec is worth a shit if any (and I mean _any_) of your friends uses iOS or not Graphene or LineageOS. And this _any_ also means _any_ security bug that is unfixed which alone by itself is not guaranteeable.
Humans are bad at time awareness, and that's the strength of surveillance systems.
I'm currently working on porting Mobian (or Nix, haven't decided yet) with Plasma to the Hackberry Pi device. In my opinion that's the first untrackable device due to it relying solely on Wi-Fi. Combined with an Atheros Wi-Fi USB stick this has the potential to avoid surveillance altogether, well, given the right tools for enforced randomization, tunneling, scattering etc.
[1] (not ready yet) https://github.com/rogueberry
[2] (there's more alternative versions) https://github.com/ZitaoTech/HackberryPiCM5
To put it another way, I'm on a legal-to-harass-list probably for the rest of my life and likely can't do a damn thing about it...beyond the obvious, which I've chosen, which is to enjoy a low-key, crime free, introspective creative sabbatical as much as possible on the fringes of society. Last thing I'm interested in is...whatever they accused me of this time...
He does repeat the same saga of his time in Pakistan a lot (or maybe im watching too many of his talks expecting something new).
He seems to be on a PR tour now, I guess to try and get other work. Some people blast every connection on LinkedIn, he seems to take a different approach and guest on every testosterone fueled and non-fact checked podcast.
> In July 2022, former CIA software engineer Joshua Schulte was convicted of leaking the documents to WikiLeaks, and in February 2024 sentenced to 40 years' imprisonment.
>>If the CIA wants to track me, they are going to have to work for it. I hope to waste as much of their time as possible.
1. An effective tactic is to friend relatives and friends on social media. From there, you either get to the HVT's data because it's set to viewable for "friend of friend" or you be patient, friend more of their friends and family and eventually friend the HVT directly, using your "connections" as social proof.
A very famous celebrity family was very susceptible to this tactic. After this project, they... tidied up their social media permissions.
Like, 4% theft rate per year nationwide. 1 in every 25 jacked in a year: https://www.equiteassociation.com/top-10-archives/top-10-mos...
And pushed 7% in Ontario: https://www.equiteassociation.com/top-10-archives/top-10-mos...
(And not those stupid “Honda Civic is the most stolen car” publications that fail to control for popularity. When you do, Civics are middle of the pack).
Of course the industry only published the frequency rates for a few years because it probably didn’t instil the fear factor that journalists failed to point out in their slop.
https://www.equiteassociation.com/top-10-most-stolen-vehicle...
On some older Thinkpads you can install Coreboot/Libreboot. Or even buy them with that, if flashing the firmware seems to complicated/risky, or necessitating buying equipment one does not have at the ready. Same goes at least for some routers, with OpenWRT, or the likes, or depending on the used connection technology going 'full personal computer' with some Linux/BSD again, with even more options regarding Core-/Librebroot/Dasharo underneath. There are always some paths for at least some aspects of that stuff. Most funny thing, if you don't trust your switches is something like https://www.apalrd.net/posts/2025/network_smartsfp/ <-that's not the only one. Imagine a cluster of firewalls in your ports!1!!
The question is if it's worth it? Or maybe more like a hobby with the benefit of staying technologically fit, but at the end of the day more like LARPing 'prepping'?
> You can be tracked with flock cams, ring cams, or any other thousands of cams out there that are already recording you and logging your car and your details. That grocery store you went to yesterday? Yep, you are logged from the moment you are in the parking lot till you leave. Oh, you used paid parking a day later? Your car is logged too, same goes with bus/trains tickets. Neighbors cams or building CCTV? That too.
E-Bikes do not require license plates and allow most of this to be mitigated when I use one of those and are what I would recommend for targeted individuals and demographics, but at some level the movements of my vehicle are tracked unavoidably but they certainly cannot remotely control the car or access microphones when they do not exist so these tactics still have value.
> same goes with bus/trains tickets
I pay cash for these and use them short term so little tracking value here.
> our home internet can be logged one way or another too, at router level (think of the many exploits against that).
I significantly reduce the chance of this by using VPNs and Tor for most personal traffic depending on use case, and layers of simple open source linux/freebsd etworking hardware I setup myself.
> What about your laptop hardware? Definitely it isn't open source. Plus, have you checked your hardware if it's bugged? I personally know someone who ordered a laptop and an XYZ agency bugged his laptop (man in the middle) before it was delivered. A new laptop you order online and your bank info will trigger someone to intercept it and alter it in the middle.
I full source bootstrapped my own operating systems and compilers and very often firmware (https://stagex.tools). I mostly use desktops, among them a Talos II which is open hardware/ firmware.
As the lead author of AirgapOS I recommend sensitive use case laptops be purchased randomly from retail locations with cash and document tamper evidence tactics in detail. These tactics are regularly used to move billions of dollars of value around by large financial institutions we advise, but I also recommend these tactics for targeted individuals like journalists as well, along with QubesOS depending on use case.
> And many more details, like, are you sure someone won't stick an AirTag somewhere in/beneath your car to track you?
If I force them to target me in person where I am much more likely to notice, my tactics have done their job and are good to recommend to the general public since they cannot do this type of targeting at scale and thus the tactics can protect most people. I really hope they try something this, because if they do, I am going to waste a lot of their time and have a lot of fun at their expense. I have quite an arsenal of radio forensics hardware and if my vehicle if ever transmitting anything, it is for sure something I did not put there.
> What about personal connections like friends and family or work that could be a weak link?
I do not share sensitive information with people with opsec significantly worse than my own. Everyone at my job uses the same opsec tactics I do for anything work related. We self host everything including E2EE encrypted chat, everyone uses qubesos, etc etc.
> So while your measures might work against some random internet attack or random stalker, against a surveillance state it won't.
My tactics create massive holes in surveillance capitalism and government tracking databases they would need to deploy agents in person to fill. If thousands of people use my tactics, suddenly they run out of agents to stalk people.
My goal is not to make tracking impossible, it is to make myself mostly invisible to surveillance capitalism and blackhats who are my most likely threats, and as a nice bonus require a government to get a warrant and spend a lot of money to track me or anyone using my tactics.
How did they discover it and what was the actual bug? Are you aware of Purism Anti-Interdiction service?
Link if anyone is curious: https://puri.sm/posts/anti-interdiction-services/
>FBI and DEA already used modified AirTags that won't notify anyone with an iPhone around to track drug dealers precisely.
Don't Airtags now notify the nearby user if they are being tracked? I have heard of airtags getting modded to remove the speaker but Apple bypassed this with software updates that alert you out of band(as far as I know). Your assertion would require government to have special Airtags that iOS ignores no?
Things like Intel ME are a straight up backdoor in consumer CPUs though, which is a bigger problem that is hard to disable. Government workers buy special laptops from Dell etc that disable this for security reasons, but difficult to get consumer laptop CPUs as a civilian that do not have ME or a similar technology enabled.
Thankfully ME Cleaner is a thing for many consumer CPUs to defang it, though you want this done at the firmware level, and that is where coreboot becomes all but a hard requirement.
I am convinced it is critical for preservation of our basic freedoms that digital sovereignty becomes the norm.
IRL I only use cash which makes my movements around the real world mostly invisible digitally speaking. What I buy at the pharmacy etc is not tracked or sold to insurance companies, etc.
Never seen contactless payment be a hard requirement. Everyone takes cash eventually if there is a human to talk to, though I do sometimes end up using a frequently rotating prepaid credit card for things like parking.
I would not be surprised if Apple does this.
https://en.wikipedia.org/wiki/HarmonyOS / https://en.wikipedia.org/wiki/HarmonyOS_NEXT /https://en.wikipedia.org/wiki/OpenHarmony / https://en.wikipedia.org/wiki/EulerOS / https://en.wikipedia.org/wiki/HongMeng_Kernel
At least by reading all of the above, it seems they have something like Genode (running on https://sel4.systems/ , amongst others ), but instead of some academic research thing, widely deployed commercially, running on consumer ready devices of all sorts.
Lately all based on that HongMeng kernel thing, comparable in performance to SEL4, utilizing containerized Linux-drivers by way of compatibility-shim, still fast.
Reads all very impressive and sexy, TBH.
Maybe in US but in various parts of Europe this ain't true, you cross certain threshold for power or speed and license plate is required, with corresponding insurance - same for e-scooters.
Ie in Switzerland thats 20kmh so basically all of them since they often cut off at 25kmh. Almost nobody does that for weaker ones and thus police keeps taking them and then you see police guys riding around say Geneva on various e-scooters.
evidently not debunked, as i just (first time in months) went re-reading CDC etc...but the punchlines i remembered from months ago include the only reservoir being cats, who clear the infections themselves, and healthy immune system humans generally have no symptoms.
"Cats can only release the infectious oocytes for between one and three weeks after they become infected, after which they can no longer spread the parasites."
what's interesting, and to your point, is the lack of insight as to why some people have side effects like bipolar and schizophrenia.
QubesOS falls really short in supply chain integrity, and server solutions, but IMO the overall hypervisor/IOMMU isolation architecture is the most practical and compatible way forward though nowhere near as elegant as some of the ideas in Genode.
In EnclaveOS my team and I chose to focus on remote attestation and best available security isolation technologies available to most server CPUs while still using (hardened) linux kernels. We talk about this here: https://distrust.co/blog/enclaveos.html
You are concerned about nation state level threats from 3 letter agencies, if they cared enough to track you they would.
I personally know a trustworthy release engineer that described in detail they were the person that had to send all new source code for each release to an NSA owned FTP server.
Does that mean Apple is actually doing this too? Hard to say, but when there is no accountability it is best to operate under the assumption the worst is happening. Particularly given Tim Cook is very publicly sucking up to the president every chance he gets.
Any claims of privacy or consumer advocacy at Apple are completely just marketing to gullible consumers.
If Apple actually cared about accountability, which is a prerequisite for privacy, they would open source everything so security researchers could reproduce all binaries and easily inspect their sources.
But this is not just about me, it is about dogfooding tactics that make it much harder to usefully track everyone remotely at scale so the people that are being unfairly targeted have an easier time hiding.
Problem is everyone knows the people like me that would react this way, and those people go on vacation eventually or can be replaced. Pay attention when that happens.
If Trump asked Tim Cook for a favor, I bet it gets taken care of one way or the other.
I would not take your bet on any specific company at any specific time, but in the scale of the top ten tech companies over a decade, it is absolutely happening regularly with some of them and there is political will for it to be all of them.
Also on a side note: Did anything happen in 2025 regarding the saga from Defcon last year or did everyone just move on after 24? I apologize if this is still a sore issue.
![]()
A former CIA officer says the agency can break into your phone, your TV and even your car/ Screengrab Ladbible Youtube
It’s not every day a former CIA officer sits down, looks straight into a camera and calmly explains how the agency can turn your phone, car and TV into tools of surveillance. Most of the time, that kind of talk lives in films, conspiracy threads and half-whispered pub arguments. John Kiriakou is one of the few people who can speak about it from the inside, and no longer has much to lose by doing so. Between 1990 and 2004, he worked for the CIA around the world, eventually becoming Chief of Counterterrorist Operations in Pakistan after 9/11. Later, he became the first US official to confirm the agency’s use of torture, and served 30 months in prison for passing classified information to the media. Since then, he’s made a second career out of saying the quiet parts out loud. In LADbible’s Honesty Box segment, he’s handed pre-written questions from a black box and asked to answer on camera. One of those cards carried the question people usually ask in private. “Does the CIA listen through our phones and laptop cameras? Yes. I hate to say it,” he admits almost instantly.
From there, he launched into a description that linked modern fears about “smart” devices to something very specific: the CIA’s own leaked technical playbook. “There was a dramatic leak in 2017 that the CIA came to call the Vault 7 disclosures, gigabytes worth of documents leaked by a CIA technology engineer. What he told us was that the CIA can intercept anything from anyone, number one. Number two, they can remotely take control of your car through the car’s embedded computer, to do what? To make you drive off a bridge into a tree, to make you kill yourself and make it look like an accident. They can take over your smart television and turn the speaker into a microphone so that they can listen to what’s being said in the room. Even when the TV is turned off. God knows what else that they can do that that hasn’t been leaked.”For anyone uninitiated in the machinery of intelligence work, the idea of a government slipping into your private devices feels oddly familiar like something lifted from the Hollywood fantasies we’ve been fed for decades and pulled straight from the dystopian shelf of Orwell’s 1984, where the state listens in through the walls and watches through the television. Hearing a former CIA chief of counterterrorism describe similar capabilities in the real world lands with the cold weight of confirmation rather than imagination.Kiriakou’s account is plain and unnerving: the agency, he says, has the ability to “intercept anything from anyone,” to reach into the embedded computers of modern cars and manipulate them at will, and to convert an ordinary smart TV, even one that appears switched off, into a live microphone sitting quietly in your living room.Also read: Can the CIA make someone disappear? Former officer and whistleblower says ‘Yes’ and explains how He’s not saying they are doing this to everyone. He is saying the capability exists. Vault 7, the leak he’s referring to, was the name given to a large collection of CIA documents released by WikiLeaks in 2017. The files, dated from 2013 to 2016, outlined internal tools and methods for cyber operations. They described ways to compromise iPhones and Android phones, exploit security holes in operating systems such as Windows, macOS and Linux, and turn certain Samsung smart TVs into covert listening devices. Some programmes focused on breaking into browsers and messaging apps; others were designed to hide the agency’s own malware so that it would be harder to trace. For the public, Vault 7 was the moment when vague suspicions about “they can probably listen through that thing” suddenly had code names and technical detail attached. For someone like Kiriakou, who spent years inside the system, it read as confirmation on paper of what people in his world already assumed: that intelligence work had long moved beyond wiretaps and safe houses, into the software woven through everyday life.
All of this naturally leads ordinary citizens, the very people who fund these federal agencies, to ask what the CIA actually does, and what the secrecy, euphemisms and bureaucratic fog are really concealing. We have films, theories, Reddit threads and YouTube explainers that claim to decode the shadow world of intelligence, but the next Honesty Box question put it plainly: what does the CIA actually do? Kiriakou started with the official version. “What the CIA is supposed to do? What it is legally tasked with doing is very simply to recruit spies to steal secrets and then to analyse those secrets to give the president and other senior policy makers the best information with which they can make policy.” That is the mission statement: human sources and analysis, providing information rather than taking action. But he immediately contrasted that with how things play out in reality. “Now, in real life, it’s not that simple. The CIA does whatever the president tells it to do. That could be to overthrow foreign governments. It could be to implement covert action programmes to influence the foreign media to even kill people. It just depends on who the president is and what policy he wants to implement.”That gap between its legal mandate and its operational reality is where most public unease lives, the space where secret authorisations, shifting priorities and quiet expansions of power take shape, far from the view of citizens or even many lawmakers.
Does The CIA Make People Disappear? CIA Spy Reveals | LADbible Stories
Taken together, Kiriakou’s answers confirm what many ordinary people have long suspected but rarely hear said aloud: a federal agency with enormous reach, operating behind red tape, coded language and a level of secrecy that makes meaningful oversight feel almost impossible. In practice, what the CIA becomes depends largely on whoever occupies the Oval Office, and that shifting mandate creates a world where powerful tools, including the ones exposed in Vault 7, develop quietly in the background while the public stays in the dark. It’s a reminder of how far modern intelligence has drifted from the everyday lives it shadows, and how little visibility people have into the systems created to keep us safe, or so we’re told. That doesn’t mean the CIA is listening to every living room or hovering over every WhatsApp chat. These operations require resources, prioritisation and justification. But Kiriakou’s point is that the barrier is no longer “can they do it?”. It’s “have they decided you matter enough to do it to?”.
Kiriakou’s willingness to speak this plainly is tied to the path his life has already taken. His decision to go public about the CIA’s use of torture pushed him out of the agency, into a courtroom and, eventually, into a federal prison cell. The price was high: his job, his clearance, his freedom for a time, and, as he has said elsewhere, the stability of his family life. Since his release, he has built a career outside government as an author, broadcaster and advocate. He talks about civil liberties, whistleblower protections and intelligence oversight at events, on podcasts and in interviews. He writes and speaks not as an outsider theorising about the CIA, but as someone who spent 14 years inside it and then collided head-on with its secrecy.Those wanting to explore his work further can find his books, interviews and commentary on his website, where he continues to document the parts of the intelligence world he feels citizens deserve to understand. Go to Source