‘CIA uses your phone, computer, TV to spy on you'

WikiLeaks claims to have obtained some of the US intelligence community’s most closely guarded cyber weapons

Image Credit: AP
The US Consulate General in Frankfurt, Germany. WikiLeaks on Tuesday, March 7, 2017 published thousands of documents purportedly taken from the Central Intelligence Agency's Center for Cyber Intelligence, a dramatic release that appears to expose intimate details of America's cyberespionage toolkit.
01 Gulf News

Washington: The anti-secrecy organisation WikiLeaks said Tuesday that it has obtained a vast portion of the CIA’s computer hacking arsenal, and began posting the files online in a breach that may expose some of the US intelligence community’s most closely guarded cyber weapons.

WikiLeaks touted its trove as exceeding in scale and significance the massive collection of National Security Agency documents exposed by former US intelligence contractor Edward Snowden.

A statement from WikiLeaks indicated that it planned to post nearly 9,000 files containing code developed in secret by the CIA to steal data from targets overseas and turn ordinary devices including cell phones, computers and even television sets into surveillance tools.

The authenticity of the trove could not immediately be determined. A CIA spokesman would say only that “we do not comment on the authenticity or content of purported intelligence documents”.

WikiLeaks indicated that it obtained the files from a current or former CIA contractor, saying that “the archive appears to have been circulated among former US government hackers and contractors in an unauthorised manner, one of whom has provided WikiLeaks with portions of the archive”.

“At first glance,” the data release “is probably legitimate or contains a lot of legitimate stuff, which means somebody managed to extract a lot of data from a classified CIA system and is willing to let the world know that,” said Nicholas Weaver, a computer security researcher at the University of California.

Faking a large quantity of data is difficult, but not impossible, he noted. He said he knows of one case of WikiLeaks deliberately neglecting to include a document in a data release and one case of WikiLeaks deliberately mislabeling stolen data, “but no cases yet of deliberately fraudulent information”.

US officials also allege WikiLeaks has ties to Russian intelligence agencies. The website posted thousands of e-mails stolen from Democratic party computer networks during the 2016 presidential campaign, files that US intelligence agencies concluded were obtained and turned over to WikiLeaks as part of a cyber campaign orchestrated by the Kremlin.

US intelligence officials appeared to have been caught off-guard by Tuesday’s disclosure. One US official said that investigators were only beginning to look at the files being posted online, and declined to say whether the CIA had anticipated the leak or warned other agencies.

“We’ll see what it is whenever they release the codes,” the official said.

WikiLeaks said the trove was comprised of tools — including malware, viruses, trojans and weaponized “zero day” exploits — developed by a CIA entity known as the Engineering Development Group, part of a sprawling cyber directorate created in recent years as the agency shifted resources and attention to online espionage.

The digital files are designed to exploit vulnerabilities in consumer devices including Apple’s iPhone, Google’s Android software and Samsung television sets, according to WikiLeaks, which labeled the trove “Year Zero”.

WikiLeaks said the files were created between 2013 and 2016, and that it would only publish a portion of the archive — redacting some sensitive samples of code — “until a consensus emerges on the technical and political nature of the CIA’s program”.

Beyond hacking weapons, the files also puportedly reveal information about the organisation of the CIA’s cyber directorate, with an organisation chart and files that indicate that the agency uses the US consulate in Frankfurt, Germany as a hub of digital operations in Europe, the Middle East and Africa.

Though primarily thought of as an agency that recruits spies, the CIA has taken on a larger role in electronic espionage over the past decade. CIA efforts mainly focus on so-called “close in” operations in which the agency at times relies on individuals to implant code on computer systems not connected to the Internet.

The CIA’s focus is more narrow and targeted than that of the NSA, which is responsible for sweeping up electronic communications on a massive scale around the globe.

Expand

Share your views

 

Add Your Comment

Click Here

Latest Comment

This is not the first time that CIA is breaching into the privacy ofindividuals worldwide. But no condemnation, no resolutions, no protests from anywhere. Massive breach of security on one hand andmute spectators on the other. The irony is that these all violations arehappening from a country which always boasts personal liberty, humanrights and freedom of expression.

Girish R Edathitta

8 March 2017 18:22jump to comments
Loading...