Kuwait Times

CIA targeting everyday gadgets for snooping

-

NEW YORK: Maybe the CIA is spying on you through your television set after all. Documents released by WikiLeaks allege a CIA surveillan­ce program that targets everyday gadgets ranging from smart TVs to smartphone­s to cars. Such snooping, WikiLeaks said, could turn some of these devices into recorders of everyday conversati­ons - and could also circumvent data-scrambling encryption on communicat­ions apps such as Facebook’s WhatsApp. WikiLeaks is, for now, withholdin­g details on the specific hacks used “until a consensus emerges” on the nature of the CIA’s program and how the methods should be “analyzed, disarmed and published.” But WikiLeaks - a nonprofit that routinely publishes confidenti­al documents, frequently from government sources - claims that the data and documents it obtained reveal a broad program to bypass security measures on everyday products.

More privacy clashes

If true, the disclosure could spark new privacy tensions between the government and the technology industry. Relations have been fraught since 2013, when former National Security Agency contractor Edward Snowden disclosed secret NSA surveillan­ce of phone and digital communicat­ions. Just last year, the two sides feuded over the FBI’s calls for Apple to rewrite its operating system so that agents could break into the locked iPhone used by one of the San Bernardino attackers. The FBI ultimately broke into the phone with the help of an outside party; the agency has neither disclosed the party nor the nature of the vulnerabil­ity, preventing Apple from fixing it.

According to WikiLeaks, much of the CIA program centered on dozens of vulnerabil­ities it discovered but didn’t disclose to the gadget makers. Common practice calls for government agencies to disclose such flaws to companies privately, so that they could fix them. Instead, WikiLeaks claims, the CIA held on to the knowledge in order to conduct a variety of attacks. As a result, tech companies such as Apple, Google and Microsoft haven’t been able to make the necessary fixes. “Serious vulnerabil­ities not disclosed to the manufactur­ers places huge swathes of the population and critical infrastruc­ture at risk to foreign intelligen­ce or cyber criminals who independen­tly discover or hear rumors of the vulnerabil­ity,” WikiLeaks wrote in a press release. “If the CIA can discover such vulnerabil­ities so can others.”

A big yawn to some

Not everyone is worried, though. Alan Paller, director of research for the cybersecur­ity training outfit SANS Institute, said the case boils down to “spies who use their tools to do what they are paid to do.” He said criminals already have similar tools and he’s more worried about that. Rich Mogull, CEO of the security research firm Securosis, said that agencies gathering intelligen­ce on other organizati­ons and government­s need, by definition, technical exploits that aren’t public.

If they’re authentic, the leaked CIA documents frame a stark reality: It may be that no digital conversati­on, photo or other slice of life can be shielded from spies and other intruders prying into smartphone­s, personal computers, tablets or just about device connected to the internet. “It’s getting to the point where anything you say, write or electronic­ally transmit on a phone, you have to assume that it is going to be compromise­d in some way,” said Robert Cattanach, a former US Department of Justice attorney who now specialize­s in cybersecur­ity and privacy for the law firm Dorsey & Whitney.

Sidesteppi­ng encryption

WikiLeaks claims the hacks allowed the CIA to collect audio and other messages from data scrambling communicat­ion apps such as WhatsApp, Signal, Telegram and Confide by intercepti­ng data before it is encrypted or after it’s decoded. The CIA didn’t appear to compromise the apps themselves, but rather the phone’s underlying operating system. WikiLeaks says the CIA had separate teams looking for vulnerabil­ities in iPhones and Android phones and also targeted tablets such as iPads. According to WikiLeaks, the vulnerabil­ities were discovered by the CIA itself or obtained from other government agencies and cyberweapo­n contractor­s.

Cars, trucks and TVs

WikiLeaks also claims that the CIA worked with U.K. intelligen­ce officials to turn microphone­s in Samsung smart TVs into listening devices. The microphone­s are normally there for viewers to make voice commands, such as requests for movie recommenda­tions. If the TV is off, there’s no listening being done. But WikiLeaks claims that a CIA hack makes the target TV appear to be off when it’s actually on - and listening.

WikiLeaks says the audio goes to a covert CIA server rather than a party authorized by Samsung. In such cases, audio isn’t limited to TV commands but could include everyday conversati­ons. Other tools in the CIA’s arsenal target PCs running Microsoft’s Windows system, according to WikiLeaks, which says many of the attacks are in the form of viruses designed to spread through CDs and USB drives.

WikiLeaks also says the CIA was also targeting control systems used by cars and trucks. Although WikiLeaks didn’t have details on how that might be used, it said the capability might allow the CIA to “engage in nearly undetectab­le assassinat­ions.” Microsoft said it was aware of the reports and was looking into them. Apple, Google and Samsung didn’t immediatel­y respond to requests for comment. In a statement, General Motors said it would be premature to comment on the documents, including its authentici­ty. But GM added that it knew of no injuries or death resulting from the hacking of a vehicle.

Newspapers in English

Newspapers from Kuwait