Former CIA: If This Light Turns On, You’re Being Watched

Published on January 30, 2026
Duration: 9:14

This entry synthesizes expert advice from former CIA officer Jason Hanson on identifying and mitigating digital security threats. It details five key signs of a compromised computer, including slow performance, unknown programs, webcam activity, pop-ups, and account issues. The guide also outlines immediate response actions and proactive measures like data removal services and robust password hygiene to protect personal information from cyber threats.

Quick Summary

Former CIA officer Jason Hanson identifies five signs of a hacked computer: unusual slowness, unknown programs/extensions, webcam light activation, frequent pop-ups/redirects, and account/password issues. He advises immediate internet disconnection and security scans if a hack is suspected, and recommends covering webcams physically.

Chapters

  1. 00:00Introduction: Digital Security Risks
  2. 00:34Sign 1: Slow Performance & Malware
  3. 01:46Sign 2: Unknown Programs & Extensions
  4. 02:32Sign 3: Webcam Activity & Surveillance
  5. 03:14Sign 4: Pop-ups & Website Redirects
  6. 03:57Sign 5: Account & Password Issues
  7. 04:35The Role of Data Brokers in Hacking
  8. 05:14Immediate Actions for Suspected Hacks
  9. 05:58Data Removal Services Explained
  10. 08:13Password Hygiene & Credit Freezing

Frequently Asked Questions

What are the top signs that my computer might be hacked?

According to former CIA officer Jason Hanson, key indicators include your computer running unusually slow, unexpected pop-ups or redirects, unknown programs or browser extensions appearing, your webcam light turning on remotely, and issues with logging into your accounts or saved passwords not working.

How can I protect my webcam from being remotely accessed?

Jason Hanson, a former CIA officer, strongly recommends physically covering your webcam lens with tape when it's not in use. He notes that software controls can be bypassed, making a physical barrier the most reliable method against unauthorized viewing.

What immediate steps should I take if I suspect my computer has been hacked?

If you suspect a hack, the first crucial step is to immediately disconnect your computer from the internet to prevent further data loss or spread. Then, run a comprehensive security scan. For severe infiltrations, disposing of the hardware might be necessary.

How can I prevent my personal information from being used by hackers?

Former CIA officer Jason Hanson advises removing your information from data broker websites. Services like DeleteMe can automate this process. Additionally, practicing strong password hygiene and enabling two-factor authentication are vital protective measures.

More Self Defense Videos You Might Like

More from Jason Hanson

View all →