Chattanooga Times Free Press

Wikileaks aid on CIA software holes could be mixed blessing

- BY ANICK JESDANUN THE ASSOCIATED PRESS

NEW YORK — WikiLeaks has offered to help the likes of Google and Apple identify the software holes used by purported CIA hacking tools — and that puts the tech industry in a bind.

While companies have a responsibi­lity — not to mention financial incentive — to fix problems in their software, accepting help from WikiLeaks raises legal and ethical questions. And it’s not even clear at this point exactly what kind of informatio­n WikiLeaks has to offer.

THE PROMISE

WikiLeaks founder Julian Assange said Thursday the anti-secrecy site will work with technology companies to help defend them against software vulnerabil­ities in everyday gadgets such as phones and TVs. In an online news conference, Assange said some companies had asked for more details about the purported CIA cyberespio­nage toolkit he revealed in a massive disclosure on Tuesday.

“We have decided to work with them, to give them some exclusive access to the additional technical details we have, so that fixes can be developed and pushed out,” Assange said. The digital blueprints for what he described as “cyberweapo­ns” would be published to the world “once this material is effectivel­y disarmed by us.”

Terms for disclosure, if any, weren’t immediatel­y known. Nor was it known how much detail WikiLeaks has on specific vulnerabil­ities, rather than just the tools capable of exploiting them.

LEGAL QUESTIONS

Tech companies could run into legal difficulti­es in accepting the offer, especially if they have government contracts or employees with security clearances.

“The unauthoriz­ed release of classified documents does not mean it’s unclassifi­ed,” said Stewart Baker, a former official at the Department of Homeland Security and former legal counsel for the National Security Agency. “Doing business with WikiLeaks and reviewing classified documents poses a real risk for at least their government contractin­g arms and their cleared employees,” Baker said.

But it’s tough to prosecute cases involving classified documents, said Robert Cattanach, a former U.S. Department of Justice attorney. At some point, he and other experts said, courts and the administra­tion may consider such material as having passed into the public domain.

TRUST MATTERS

But tech companies might face a bigger problem with public perception. “They don’t want to be seen as endorsing or supporting an organizati­on with a tainted reputation and an unclear agenda,” Cattanach said.

For instance, WikiLeaks published thousands of emails, some embarrassi­ng, from breached Democratic Party computers and the account of a top aide to Hillary Clinton during the 2016 election. Those emails were stolen by hackers connected to the Russian government, an act U.S. intelligen­ce agencies concluded was a Russian attempt to help Donald Trump win the presidency.

“You are getting in bed with someone who is … happy to harm the interests of the United States in whatever way they can,” Baker said. “That does raise concerns of an ethical sort for companies that take their nation seriously.”

Joseph Lorenzo Hall, chief technologi­st with the civil-liberties group Center for Democracy and Technology, said companies would have to navigate with care and assume that any discussion­s will ultimately become public, given WikiLeaks’ past and “Assange’s philosophy of radical transparen­cy.”

A BETTER PATH

Ideally, the CIA would have shared such vulnerabil­ities directly with companies, as other government agencies have long done. In such a case, companies not only would be dealing with a known entity in an above-board fashion, they also might obtain a more nuanced understand­ing of the problems than might be apparent in documents or lines of computer code.

And if companies could learn details about how the CIA found these vulnerabil­ities, they might also find additional vulnerabil­ities using the same technique, said Johannes Ullrich, director of the Internet Storm Center at the SANS Institute.

But there are risks as well. Should tech companies obtain the actual hacking tools, Ullrich said, they’d have to treat them with great caution. Some, for instance, might have unadvertis­ed features that could, for instance, start extracting data as soon as they launch.

Newspapers in English

Newspapers from United States