Imperial Valley Press

CIA unit that crafts hacking tools didn’t protect itself

-

WASHINGTON ( AP) — A specialize­d CIA unit that developed sophistica­ted hacking tools and cyber weapons didn’t do enough to protect its own operations and wasn’t prepared to adequately respond when the secrets were stolen, according to an internal report prepared after the worst data loss in the intelligen­ce agency’s history.

“These shortcomin­gs were emblematic of a culture that evolved over years that too often prioritize­d creativity and collaborat­ion at the expense of security,” according to the report, which raises questions about cybersecur­ity practices inside U.S. intelligen­ce agencies.

Sen. Ron Wyden, D-Ore., a senior member of the Senate Intelligen­ce Committee, obtained the redacted report from the Justice Department after it was introduced as evidence in a court case this year involving the stolen CIA hacking tools.

He released it on Tuesday along with a letter he wrote to new national intelligen­ce director John Ratcliffe, asking him to explain what steps he’s taking to protect the nation’s secrets held by federal intelligen­ce agencies.

The October 2017 report, whose findings were first reported by The Washington Post, examined the theft one year earlier of sensitive cyber tools the CIA had developed to hack into the networks of adversarie­s.

The document is dated months after WikiLeaks announced that it had acquired tools created by the CIA’s specialize­d Center for Cyber Intelligen­ce. The anti-secrecy website published comprehens­ive descriptio­ns of 35 tools, including internal CIA documents associated with them, according to the report.

The report describes the spring 2016 theft as the largest data loss in agency history — compromisi­ng at least 180 gigabytes to as much as 34 terabytes of informatio­n, or the equivalent of 11.6 million to 2.2 billion pages in Microsoft Word.

The agency did not realize the loss had occurred until the WikiLeaks announceme­nt a year later, the report said. As o cials scrambled to pinpoint who was responsibl­e, they ultimately identified as a prime suspect a CIA software engineer who they said had left the agency on stormy terms after falling out with colleagues and supervisor­s and had acted out of revenge.

The former employee, Joshua Schulte, was charged by the Justice Department with stealing the material and transmitti­ng it to WikiLeaks. But a jury deadlocked on those charges and convicted him in March of more minor charges after a trial in Manhattan.

The CIA report revealed lax cybersecur­ity measures by the specialize­d unit and the niche informatio­n technology systems that it relies upon, which is separate from the systems more broadly used by everyday agency employees. The report says that because the stolen data was on a system that lacked user activity monitoring, it was not detected until WikiLeaks announced it in March 2017.

“Had the data been stolen for the benefit of a state adversary and not published, we might still be unaware of the loss” the report says.

The report, prepared by the CIA’s WikiLeaks Task Force, suggests the CIA should have been better prepared in light of devastatin­g data breaches at other intelligen­ce agencies. The hacking tools compromise occurred about three years after Edward Snowden, a former contractor for the National Security Agency, confiscate­d classified informatio­n about the NSA’s surveillan­ce operations, and disclosed it.

“CIA has moved too slowly to put in place the safeguards that we knew were necessary given successive breaches to other U.S. Government agencies,” the report said.

Among the problems the report identified: sensitive cyber weapons were not compartmen­ted, passwords were shared and users had indefinite access to historical data.

CIA spokesman Timothy Barrett declined to comment on the report’s findings, but said the “CIA works to incorporat­e best-in-class technologi­es to keep ahead of and defend against ever-evolving threats.”

Sean Roche, a former associate deputy director for digital innovation at the CIA who testified at the Schulte trial, said that although the CIA did have a problem with one of its networks, “to say that the people at the CIA don’t take security seriously is not accurate. It’s completely inaccurate.”

Speaking Tuesday at a webinar hosted by the Cipher Brief, an online newsletter that focuses on intelligen­ce, Roche likened the task force report to an after-accident report by the National Transporta­tion Safety Board.

“This broke. This is what happened,” Roche said. “We need to make sure this doesn’t happen again. How is that not a healthy thing for an organizati­on that doesn’t have a public eye into what it’s doing?”

Newspapers in English

Newspapers from United States