Former CIA Agent Warns Devices Can Act as Microphones Even When Seemingly Off

Former CIA Agent Warns Devices Can Act as Microphones Even When Seemingly Off

John Kiriakou, a former CIA operative, recently shared unsettling insights about digital surveillance during an appearance on a well-known podcast. Speaking with host Steven Bartlett on The Diary of a CEO, he described scenarios where everyday technology could be compromised by intelligence agencies. Kiriakou pointed out that smart devices might continue listening or transmitting data despite appearing powered down. His comments stem from years of insider experience and publicly available information on government capabilities.

Kiriakou first gained public attention for his role in exposing controversial CIA practices. He served as an analyst and case officer in the agency’s Counterterrorism Center. In 2012, he was convicted for leaking classified details to a journalist about the use of enhanced interrogation methods, including waterboarding. After serving time in prison from 2013 to 2015, followed by house arrest, he has continued speaking out on intelligence matters.

In the podcast discussion, Kiriakou stressed that surveillance risks extend far beyond American agencies. He highlighted a wide array of nations with advanced technical abilities in this area. “You don’t have to worry just about the NSA/CIA/FBI, but also about the British, French, Germans, Canadians, Australians, New Zealanders, Russians, Chinese, Israelis, Iranians… Everyone has these capabilities,” he stated. This perspective encourages people to remain vigilant about their digital footprint regardless of location.

One key example Kiriakou raised involves smart televisions. He referenced the 2017 Vault 7 documents released by WikiLeaks, which detailed alleged CIA tools for hacking consumer electronics. According to him, these materials show how agencies can remotely activate a TV’s microphone even when the device seems turned off. Conversations in the room could then be recorded and sent elsewhere without the owner’s knowledge.

The discussion took a more dramatic turn when addressing connected vehicles. Kiriakou claimed that modern cars’ computer systems are vulnerable to remote access. In theory, this could allow outsiders to interfere with controls and potentially cause crashes. He framed these possibilities as technical realities rather than routine occurrences, noting limitations in real-world application.

Kiriakou’s warnings build on his view that personal devices lack true security in today’s interconnected world. He urged extreme caution, implying that assuming privacy on gadgets is unrealistic given global intelligence developments. While his statements draw from documented leaks, they represent his interpretation as a former insider. Viewers are left to consider the balance between convenience and potential risks in using smart technology.

The podcast exchange underscores ongoing debates about privacy in the digital age. Kiriakou’s background as both an operative and a convicted leaker adds complexity to his credibility. Supporters see him as a whistleblower highlighting abuses, while critics question his motives post-conviction. Regardless, his remarks revive concerns first sparked by major disclosures years ago.

For context, the Vault 7 leak consisted of thousands of pages detailing CIA cyber espionage tools developed up to 2016. Among them was a program targeting Samsung smart TVs, enabling audio capture in a standby-like state often called “fake off.” WikiLeaks published these files starting in March 2017, prompting widespread discussion about embedded vulnerabilities in household items. Similar revelations have emerged over time regarding mobile phones and other IoT devices.

John Kiriakou remains active in media, often commenting on national security topics. His 2007 interview acknowledging waterboarding’s use marked him as the first CIA official to publicly confirm it, leading to both praise and legal consequences. These events illustrate the tensions between transparency and classified operations. Broader concerns about device surveillance also tie into features like always-on voice assistants in phones and speakers.

Privacy advocates frequently recommend basic steps such as covering cameras, using physical switches for microphones, or opting for less connected alternatives. Debates continue on whether regulations can effectively curb agency overreach while preserving security needs. Kiriakou’s latest comments serve as a reminder that technology’s benefits come with persistent trade-offs.

What steps do you take to safeguard your devices from potential eavesdropping, and share your views on these surveillance claims in the comments.

Vedran Krampelj Avatar