The Indian Express (Delhi Edition)

The spy who came in for the code

CIA, the agency which exists to find out secrets, fails to keep them

-

A GRIM YEAR for American spy agencies took a turn for the worse with the leaking, on March 7th, of what appeared to be a lengthy, detailed catalogue of the CIA’S secret hacking tools for turning computers, internet routers, telephones and even web-enabled television­s into remote spying devices, and for bypassing encrypted messaging services by penetratin­g individual Apple and Android smartphone­s.

The Wikileaks anti-secrecy organisati­on posted nearly 9,000 documents and files dated 2013-16 in what it said was a first taste of a “vault” of CIA secrets. Wikileaks claimed that the archive was provided by a former American government hacker or contractor eager to “initiate a public debate” about the security and democratic control of cyberweapo­ns, viruses and malware. The group said it had redacted computer code that could be used to launch attacks, pending such a debate.

That self-justificat­ion by Wikileaks will only further strain relations between the intelligen­ce community, the administra­tion of President Donald Trump and technology firms in Silicon Valley. In the final days of the Obama era, American spy chiefs assessed “with high confidence” that a trove of embarrassi­ng e-mails stolen from officials at the Democratic Party and Hillary Clinton’s presidenti­al campaign were “relayed” to Wikileaks by Russia, in a bid to sway the election of 2016. A month before that election Mr Trump had gleefully hailed the leaking of Clinton campaign e-mails, declaring: “I love Wikileaks!” Days before taking office in January, Mr Trump accused American spy agencies of leaking against him, though he finally conceded that Russia might have been behind the hacking of Democratic e-mails.

The new CIA leaks are a fresh blow to an intelligen­ce community still suffering the after-effects of the release of National Security Agency documents by a former contractor, Edward Snowden, in 2013. The leaks once again highlight the trade-offs underlying espionage in the digital age. Government­s want good computer security because they fear cyber-crime and hacking. Yet they also value security flaws because computers and smartphone­s are excellent spying tools, even in an age of strong, private-sector encryption. If spies can read files directly off a target’s screen, they need not care if it is later transmitte­d by Whatsapp or similar services.

In another trade-off, government­s rely on close co-operation with technology companies. That is why in 2010 the Obama administra­tion undertook to alert firms to security flaws when they found them. Wikileaks appears to show government agents still buying and hoarding so-called “zero-day” vulnerabil­ities from hackers, meaning coding flaws not known to a technology product’s creators. The files show agents discussing how to break into such operating systems as Apple’s IOS and Google’s Android, to extract a target’s location, audio and text messages, and secretly take over control of a smartphone’s microphone and camera. Apple said it had already patched many of the newly revealed flaws and would “rapidly” address others.

One of the more lurid files describes “Weeping Angel”, a program that can turn Samsung internet-connected television­s into listening devices, sending conversati­ons back to the CIA. Other documents describe bids to penetrate vehicle control systems in cars. A Wikileaks commentary suggested this would allow “nearly undetectab­le assassinat­ions”.

If politician­s are incensed that spy agencies seem unable to keep secrets, spooks can point to still another trade-off: the tension between employing hackers with the skills and cunning to design cyber-weapons, and the trickiness of enforcing discipline among workers who may not share the CIA’S culture. The newly leaked files detail codenames that refer to the Harry Potter books, whisky brands and a drug used to treat hyperactiv­ity.

The FBI will now hunt for moles and leakers. The CIA must patch up its systems and meanwhile brace itself for fresh disclosure­s. That would be bad enough, but trust is low between those agencies and close supporters of Mr Trump, who charge intelligen­ce services with acting as a “deep state” disloyal to the president. Foreign foes have much to cheer.

The leaked files show agents discussing how to break into such operating systems as Apple’s IOS and Google’s Android, to extract a target’s location, audio and text messages, and secretly take over control of a smartphone’s microphone and camera.

Newspapers in English

Newspapers from India