Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
CIA Hacking Tools Revealed by Wikileaks - Rivals much NSA can do!
#12
Quote:
  • AUTHOR: ANDY GREENBERG.ANDY GREENBERG SECURITY
  • DATE OF PUBLICATION: 03.08.17.03.08.17
  • TIME OF PUBLICATION: 9:59 AM.9:59 AM

HOW THE CIA'S HACKING HOARD MAKES EVERYONE LESS SECURE


[Image: wikileaks-e1488924447538.jpg]WIREDWHEN WIKILEAKS YESTERDAY released a trove of documentspurporting to show how the CIA hacks everything from smartphones to PCs to smart televisions, the agency's already shadowy reputation gained a new dimension. But if you're an average American, rather than Edward Snowden or an ISIS jihadi, the real danger clarified by that leak wasn't that someone in Langley is watching you through your hotel room's TV. It's the rest of the hacker world that the CIA has inadvertently empowered.
As security researchers and policy analysts dig through the latest WikiLeaks documents, the sheer number of hacking tools the CIA has apparently hoarded for exploiting zero-day vulnerabilitiessecret inroads that tech firms haven't patchedstands out most. If the US intelligence community knows about them, that leaves open the possibility that criminal and foreign state hackers do as well.
Its broad zero-day stash, then, strongly suggests that the CIAalong with other intelligence agencieshas long allowed Americans to remain vulnerable to those same attacks. Now that those hacking secrets are public, potentially along with enough details to replicate them, the danger of the feds leaving major security flaws unfixed only escalates.
"If the CIA can use it, so can the Russians, or the Chinese or organized crime," says Kevin Bankston, the director of the New America Foundation's Open Technology Institute. "The lesson here, first off, is that stockpiling a bunch of vulnerabilities is bad for cybersecurity. And two, it means they're likely going to get leaked by someone."

A World of Hacks

It's no surprise, of course, that one of America's most well-resourced spy agencies can hack its foreign adversaries. The shock, says Johns Hopkins cryptographer Matt Green, comes instead from the sudden spill of those hacking tools onto the web. "In the same way the military would probably have one technique for killing every single tank in an enemy's arsenal, you would expect the CIA to collect the same thing," says Green. "What's different is that we're seeing them out in public."
In fact, WikiLeaks wrote in a note accompanying its Tuesday release that "the archive appears to have been circulated among former US government hackers and contractors in an unauthorized manner." That raises the possibility the full document set, along with actual exploit details or code, may have fallen into the hands of hackers long before it was published in part by WikiLeaks.

INSIDE VAULT 7

  • [URL="https://www.wired.com/2017/03/wikileaks-cia-hacks-dump/"][Image: CIA_RTX1TGQJ_TA-200x200.jpg][COLOR=rgba(0, 0, 0, 0.6)]LILY HAY NEWMAN[/COLOR]
    WikiLeaks Just Dumped a Mega-Trove of CIA Hacking Secrets

    [/URL]
  • [URL="https://www.wired.com/2017/03/cia-can-hack-phone-pc-tv-says-wikileaks/"][Image: wikileaks-200x200.jpg][COLOR=rgba(0, 0, 0, 0.6)]ANDY GREENBERG[/COLOR]
    How the CIA Can Hack Your Phone, PC, and TV (Says WikiLeaks)

    [/URL]
  • [URL="https://www.wired.com/2017/03/wikileaks-cia-dump-gives-russian-hacking-deniers-perfect-ammo/"][Image: wikileaks-200x200.jpg][COLOR=rgba(0, 0, 0, 0.6)]ISSIE LAPOWSKY AND LILY HAY NEWMAN[/COLOR]
    WikiLeaks CIA Dump Gives Russian Hacking Deniers the Perfect Ammo

    [/URL]
  • [URL="https://www.wired.com/2017/03/wikileaks-cia-hack-signal-encrypted-chat-apps/"][Image: wikileaks-200x200.jpg][COLOR=rgba(0, 0, 0, 0.6)]BRIAN BARRETT[/COLOR]
    Don't Let WikiLeaks Scare You Off of Signal and Other Encrypted Chat Apps

    [/URL]

The WikiLeaks CIA cache, which the group calls Vault 7, most explicitly details the agency's hacking capabilities for smartphones. It lists more than a dozen exploits that affect iOS, and two dozen that threaten Android phones with varying degrees of penetration. The CIA appears to have gleaned some of those exploits from public research, and most are likely no longer zero days, given that the documents date back to as early as 2013 and only as late as the beginning of 2016. "Our initial analysis indicates that many of the issues leaked today were already patched in the latest iOS," an Apple spokesperson writes. Google has yet to respond to WIRED's request for comment.
But during those years, at least, the CIA appears to have kept the security flaws those techniques exploited secret. And the sheer number of those exploits suggests violations of the Vulnerabilities Equities Process, which the Obama administration created in 2010 to compel law enforcement and intelligence agencies to help fix those flaws, rather than exploit them whenever possible.
"Did CIA submit these exploits to the Vulnerabilities Equities Process?" asks Jason Healey, a director at the Atlantic Council who's tracked the VEP closely. "If not, you can say that either the process is out of control or they're subverting the president's priorities."

Selective Disclosure

The man most closely responsible for that vulnerability disclosure policy argues that the second of those two possibilities, at least, isn't the case. Former White House cybersecurity coordinator Michael Daniel, who led cybersecurity policy for the Obama presidency and oversaw a revamp of the VEP in 2014, says that "all of the agencies that were participating in the VEP were doing so in good faith." Daniels declined to comment specifically on the WikiLeaks release or the CIA's exploit collection, but said that even now he doesn't believe anyone was hiding hacking capabilities from the White House. "I felt like everyone was engaged in the process in the right way," he says.
But that hardly means the CIA reported their exploits to Apple and Google to help secure their software, Daniel admits. While he argues that in some cases the CIA's exploits may have targeted users who simply didn't update their software with available patches, he says that other times the White House may have prioritized the CIA's hacking capability over securing software used by millions.





"The default position is that the government will disclose, but that doesn't mean that will happen on every occasion," says Daniel. "The point of having a process is that there are times when the benefit to intelligence and law enforcement to exploit that flaw outweighs the risk of retaining that flaw inside the government. We were clear there were times when we did choose not to disclose a vulnerability to a vendor."
Balancing the needs of a critical intelligence agency with the digital security of the rest of the world isn't easy. But the US intelligence community's hacking techniques leakingnot once, but at least twice now after hackers known as the Shadow Brokers breached an NSA server and published reams of NSA code last Augustmeans that the balance needs to be reconsidered, says New American Foundation's Bankston. "All of these vulnerabilities were in iPhones and Android phones that hundreds of millions of people used if not billions," he says. "That has serious cybersecurity implications."
It's still unclear whether the Trump administration will continue the previous White House's Vulnerabilities Equities Process, or how it will address the question of government hacking versus civilian security. But the Atlantic Council's Healey argues that the CIA leak shows that the question needs a harder look than ever.
"The deal we make in a democracy is that we understand we need military and intelligence services. But we want want oversight in the executive branch and across the three branches of government," he says. "If the CIA says we're suppose to do this, but we're just not going to,' or we're going to do it just enough that the White House thinks we are,' that starts to eat away at the fundamental oversight for which we have elected officials."
Source
The shadow is a moral problem that challenges the whole ego-personality, for no one can become conscious of the shadow without considerable moral effort. To become conscious of it involves recognizing the dark aspects of the personality as present and real. This act is the essential condition for any kind of self-knowledge.
Carl Jung - Aion (1951). CW 9, Part II: P.14
Reply


Messages In This Thread
CIA Hacking Tools Revealed by Wikileaks - Rivals much NSA can do! - by David Guyatt - 10-03-2017, 02:10 PM

Possibly Related Threads…
Thread Author Replies Views Last Post
  The Dubious Case of Russian Hacking David Guyatt 6 17,875 05-02-2017, 05:45 PM
Last Post: Peter Lemkin
  WikiLeaks offers award for #LabourLeaks Magda Hassan 2 6,703 24-09-2016, 07:42 AM
Last Post: David Guyatt
  NSA/GCHQ hacking anti-spyware/encryption programs to invade your computer! Peter Lemkin 3 10,441 13-04-2016, 11:29 AM
Last Post: David Guyatt
  KARMA POLICE - another NSA+GCHQ Program revealed Peter Lemkin 0 5,884 27-09-2015, 08:21 AM
Last Post: Peter Lemkin
  Google gave FBI Wikileaks staffers emails - and kept quiet about it David Guyatt 0 3,834 26-01-2015, 09:34 AM
Last Post: David Guyatt
  CIA admits to hacking Senate computers Tracy Riddle 2 4,760 03-08-2014, 02:34 PM
Last Post: Magda Hassan
  Secret EU surveillance drone project revealed David Guyatt 0 4,284 12-02-2014, 09:43 AM
Last Post: David Guyatt

Forum Jump:


Users browsing this thread: 1 Guest(s)