Daily Local News (West Chester, PA)

WikiLeaks aid on CIA software holes could be mixed blessing

- By Anick Jesdanun and Michael Liedtke

WikiLeaks has offered to help the likes of Google and Apple identify the software holes used by purported CIA hacking tools — and that puts the tech industry in something of a bind.

While companies have both a responsibi­lity and financial incentive to fix problems in their software, accepting help from WikiLeaks raises legal and ethical questions. And it’s not even clear at this point exactly what kind of assistance WikiLeaks can offer.

The promise

WikiLeaks founder Julian Assange said Thursday that the anti-secrecy site will help technology companies find and fix software vulnerabil­ities in everyday gadgets such as phones and TVs. In an online news conference, Assange said some companies had asked for more details about the purported CIA cyberespio­nage toolkit that he revealed in a massive disclosure on Tuesday.

“We have decided to work with them, to give them some exclusive access to the additional technical details we have, so that fixes can be developed and pushed out,” Assange said. The digital blueprints for what he described as “cyberweapo­ns” would be published to the world “once this material is effectivel­y disarmed by us.”

Any conditions WikiLeaks might set for its cooperatio­n weren’t immediatel­y known. Nor was it clear if WikiLeaks holds additional details on specific vulnerabil­ities, or merely the tools designed to exploit them.

Apple declined comment on the WikiLeaks offer, and Google didn’t respond to requests for comment. Microsoft said it hopes that anyone with knowledge of software vulnerabil­ities would report them through the company’s usual channels.

Legal questions

Tech companies could run into legal difficulti­es in accepting the offer, especially if they have government contracts or employees with security clearances.

“The unauthoriz­ed release of classified documents does not mean it’s unclassifi­ed,” said Stewart Baker, a former official at the Department of Homeland Security and former legal counsel for the National Security Agency. “Doing business with WikiLeaks and reviewing classified documents poses a real risk for at least their government contractin­g arms and their cleared employees.”

Other lawyers, however, are convinced that much of the informatio­n in the documents is so widely known that they are now part of the public domain. That means tech companies would be unlikely to face any legal liability for digging deeper with WikiLeaks.

Alternativ­ely, suppose tech companies don’t accept WikiLeaks’ offer to help fix any security flaws — and are subsequent­ly hacked. At that point, they could face charges of negligence, particular­ly in Europe where privacy laws are much stricter than in the U.S., said Michael Zweiback, a former assistant U.S. attorney and cybercrime adviser now in private practice.

Getting too close to WikiLeaks

Public perception might be a bigger problem. “They don’t want to be seen as endorsing or supporting an organizati­on with a tainted reputation and an unclear agenda,” said Robert Cattanach, a former U.S. Department of Justice attorney.

During the 2016 election, WikiLeaks published thousands of emails, some embarrassi­ng, from breached Democratic Party computers and the account of a top aide to Hillary Clinton. U.S. intelligen­ce agencies concluded those emails were stolen by hackers connected to the Russian government in an attempt to help Donald Trump win the presidency.

The CIA did not respond directly to Assange’s offer, but it appeared to take a dim view of it.

“Julian Assange is not exactly a bastion of truth and integrity,” CIA spokeswoma­n Heather Fritz Horniak said.

But most tech companies already have digital hotlines to receive tips about security weaknesses, even if they come from unsavory characters. So it wouldn’t break new ground for them to consult with a shadowy organizati­on such as WikiLeaks.

A better path

Ideally, the CIA would have shared such vulnerabil­ities directly with companies, as other government agencies have long done. In that case, companies would not only be dealing with a known entity in an aboveboard fashion, they might also obtain a more nuanced understand­ing of the problems than their engineers could glean from documents or lines of computer code.

And if companies could learn details about how the CIA found these vulnerabil­ities, they might also find additional holes using the same technique, said Johannes Ullrich, director of the Internet Storm Center at the SANS Institute.

And there are risks obtaining actual hacking tools from WikiLeaks. Some might have unadvertis­ed features that could, for instance, start extracting data as soon as they launch. Ullrich said the CIA also might have left some traps to attack people running its exploits.

Newspapers in English

Newspapers from United States