How to tell if you are vulnerable to CIA hacking tools