The Central Intelligence Agency on Wednesday accused WikiLeaks of endangering Americans, helping US rivals and hampering Washington’s fight against terror threats by releasing what the anti-secrecy site claimed was a trove of CIA hacking tools.
A CIA spokeswoman would not confirm the authenticity of the materials published a day earlier by WikiLeaks, which said they were leaked from the spy agency’s hacking operations.
Nevertheless, said spokeswoman Heather Fritz Horniak, “The American public should be deeply troubled by any WikiLeaks disclosure designed to damage the intelligence community’s ability to protect America against terrorists and other adversaries.”
“Such disclosures not only jeopardize US personnel and operations, but also equip our adversaries with tools and information to do us harm,” she said.
Horniak defended the CIA’s cyber operations, which the WikiLeaks materials showed focused heavily on breaking into personal electronics using a wide range of malware systems
“It is CIA’s job to be innovative, cutting-edge, and the first line of defense in protecting this country from enemies abroad,” she said.
Massive leak
On Tuesday, WikiLeaks published nearly 9,000 documents it said were part of a huge trove leaked from the CIA, describing it as the largest-ever publication of secret intelligence materials.
“This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA,” it said.
The documents showed that CIA hackers can turn a TV into a listening device, bypass popular encryption apps, and possibly control one’s car.
Most experts believe the materials to be genuine, and US media said Wednesday that the Federal Bureau of Investigation is opening a criminal probe into the leak.
The source of the materials remained unclear. The investigation could focus on whether the CIA was sloppy in its controls, or, as the Washington Post reported, it could be “a major mole hunt” for a malicious leaker or turncoat inside the agency.
WikiLeaks itself said the documents, hacking tools and code came from an archive that had circulated among US government hackers and private contractors, “one of whom has provided WikiLeaks with a portion of the archive.”
An investigation would come as the CIA is already enmeshed in a politically-charged probe into Russia’s alleged interference in the US election last year in support of President Donald Trump’s campaign.
WikiLeaks, which has stunned the US government with a series of publications of top secret political, diplomatic and intelligence materials, said the publication Tuesday was only the first of a series of releases of CIA hacking materials.
That raised concerns that the site could release the actual hacking tools it obtained along with the documents. Experts worry those could fall into the hands of anyone, including US enemies and criminals.
Tech sector scrambles for fixes
The WikiLeaks documents detailed the CIA’s practice of exploiting vulnerabilities in hardware and software, without ever informing producers of them.
The CIA allegedly found ways to hack into personal electronics from leading companies like Apple and Samsung, Android phones, popular Microsoft software, and crucial routers from major manufacturers.
The documents suggest it can also infiltrate smartphones in a way that allows it to get around popular messaging encryption apps.
The tech sector was scrambling to understand how their products were at risk.
“While our initial analysis indicates that many of the issues leaked today were already patched in the latest iOS, we will continue work to rapidly address any identified vulnerabilities,” Apple said in an emailed statement.
Samsung and Microsoft both said they were “looking into” what WikiLeaks revealed.
Encryption apps safe
Joseph Hall, a technologist with the Center for Democracy and Technology, a digital rights organization, said the documents raise questions about the US government’s pledge last year to disclose vulnerabilities to technology firms.
That pledge means “security flaws should get back to the companies so they can get fixed, and not languish for years,” he said.
The American Civil Liberties Union commented in a tweet: “When the govt finds software security holes, it should help fix them, not hoard them and leave everyone vulnerable.”
Ironically, the companies that make encryption programs and apps targeted by the CIA said the revelations show the agency has not been able to break their software.
Open Whisper Systems, which developed the technology for the Signal encryption app, said the CIA documents showed that Signal works.
“None of the exploits are in Signal or break Signal Protocol encryption,” the group said in a tweet.
“The existence of these hacking tools is a testimonial to the strength of the encryption,” said Steve Bellovin, a Columbia University computer science researcher, in a blog post
source : gulfnews
GMT 13:29 2018 Monday ,01 January
Serbia launches probe after toxic waste dumped near BelgradeGMT 19:03 2017 Thursday ,28 December
Pregnant elephant 'poisoned' in Indonesian palm plantationGMT 16:26 2017 Sunday ,24 December
Nepal's two last known dancing bears rescued: officialsGMT 10:51 2017 Sunday ,24 December
Florida orange industry hit by hurricane, diseaseGMT 09:09 2017 Sunday ,24 December
Modern-day amber 'Klondikes' thrive in troubled UkraineGMT 19:23 2017 Saturday ,23 December
Indonesian pangolin faces extinction due to traffickingGMT 11:37 2017 Friday ,22 December
Global warming may boost asylum-seekers in Europe: studyGMT 07:32 2017 Friday ,22 December
Modern-day Mowgli: Indian toddler forges bond with monkeysMaintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2021 ©
Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2021 ©
Send your comments
Your comment as a visitor