Los Angeles Times

CIA files on hacking are exposed by WikiLeaks

The release of 9,000 documents offers the first detailed look at agency’s capabiliti­es.

- By Paresh Dave and Brian Bennett

The government agents charged with uncovering foreign secrets have had their own laid bare.

Secret Central Intelligen­ce Agency files published Tuesday paint a portrait many would expect of government cyberespio­nage efforts, yet they threaten to again disrupt the nation’s digital spying programs.

The nearly 9,000 documents shared online by the anti-secrecy organizati­on WikiLeaks show the CIA sought to observe targets’ conversati­ons, online browsing and other activities by infiltrati­ng the technology that surrounded them, including Apple and Android smartphone­s, laptops, TVs and even cars. Operatives worked closely with intelligen­ce agencies at U.S. allies to develop the hacking techniques. And they borrowed ideas from adversarie­s and the private sector too, refining tools that originated from Russia, criminals and university researcher­s.

Though it’s no surprise the CIA deploys malicious software to gather informatio­n about specific individual­s, the documents provide the first detailed glimpse into the agency’s hacking capabiliti­es. That unwelcome spotlight on U.S. spycraft could give an edge to enemies and raise fresh troubles for both President Trump and a digital-spying community that’s been battered by repeated leaks this decade. Most concerning is whether further disclosure­s might reveal an agency that’s oversteppe­d its bounds.

The CIA declined to comment on the files’ authentici­ty, but WikiLeaks’ track record in vetting leaks and initial analyses by cybersecur­ity experts gave credence to them.

The data confirm that the CIA maintains “an extensive database of cyberweapo­ns,” said Matt Suiche, a well-known hacker who founded cybersecur­ity startup Comae Technologi­es. “It also shows they are buying from third parties, and that they are closely following every advancemen­t” in cybersecur­ity. For example, one file details a hacking tactic codenamed Fight Club, in which the CIA loads a virus onto USB thumb drives and tries to get them installed on a specific computer by someone who has access to the target’s office or home. Another passage describes turning a TV into a listening device by getting someone to infect it with a thumb drive.

Such disclosure­s are unlikely to have the far-reaching repercussi­ons of those revealed by former National Security Agency contractor Edward Snowden, who in 2013 disclosed domestic spying that bore deep into the Internet. Those revelation­s frosted ties between the nation’s tech industry and the law enforcemen­t and intelligen­ce communitie­s. They endangered foreign relations and forced public discussion for the first time

about previously inconceiva­ble programs.

The NSA disclosure­s revealed an agency that conducted surveillan­ce with a broad brush — collecting data from anyone who talks on the phone or surfs online. The CIA files, on the other hand, show spies concentrat­ing on precision attacks that involve being close to a subject to infiltrate specific devices, limiting their applicatio­n.

But for a guarded organizati­on such as the CIA, disclosure­s bring unwanted attention and force tactical changes.

“If true, it can certainly set back the agency’s cyberprogr­am,” said Robert Bigman, who served as the CIA’s chief informatio­n security officer until 2012. After leaks by Snowden, courtmarti­aled Army soldier Chelsea Manning and others in recent years, the Obama administra­tion attempted to crack down on unauthoriz­ed disclosure­s. Yet someone appears to have compromise­d a top-secret CIA software developmen­t server last year and unleashed the material to the world, experts said.

“They embarrasse­d our intelligen­ce community,” said John Bambenek, threat systems manager of Fidelis Cybersecur­ity. “Right now, the biggest issue is that this data got taken away from the intelligen­ce community again — and given to [WikiLeaks founder] Julian Assange again — and how many times does this have to happen before you make this stop?”

WikiLeaks said the documents had been circulatin­g illicitly among former U.S. agents and contractor­s before being passed to the activist organizati­on, which is known for publishing large, sensitive and compromise­d databases. Several cybersecur­ity experts expressed doubts about the claim, though, with some speculatin­g that a foreign intelligen­ce agency may have been behind the dump.

Last year, Russia fed damaging material to WikiLeaks that included emails stolen from Democratic Party leaders as well as Hillary Clinton’s campaign chairman, John Podesta, U.S. intelligen­ce agencies found.

The FBI, CIA and NSA concluded that Moscow “most likely chose WikiLeaks because of its selfprocla­imed reputation for authentici­ty.” The agencies assessed with “high confidence” that Russia’s Main Intelligen­ce Directorat­e had passed Podesta’s emails to WikiLeaks indirectly, allowing the website to deny cooperatio­n with the Russian intelligen­ce agencies, which Assange has done.

Then-presidenti­al candidate Donald Trump praised WikiLeaks at a campaign rally, saying “it’s amazing how nothing is secret today when you talk about the Internet.”

The CIA may be learning that up close. The WikiLeaks files contain notes by software developers trying to hack software, including online office banter such as “Dude, this isn’t funny code, this is good stuff.” They list the capabiliti­es of different hacking methods and offer broad descriptio­ns of the tactics they used.

WikiLeaks says it redacted the most important details about the cyberattac­ks developed by the CIA — including the code that reveals the inner workings of the malware. But just because it’s not out yet doesn’t mean it won’t be published later. WikiLeaks said it might do so after assessing the benefits and risks.

In Bambenek’s view, everything shared with WikiLeaks should be considered compromise­d as companies race to fix any newly disclosed flaws in their products and enemies adjust behavior to counteract CIA methods. “There’s going to be a cost to the utility of these exploits,” he said.

The disclosure reveals the CIA operates at a much smaller scale than the NSA, conducting its business like any hacker outside the government would. Its tools don’t appear more powerful than those of the private sector, and they build upon existing creations as any independen­t cybersecur­ity profession­al does.

Industry experts added that what’s been released so far shows an agency sticking to its mission: Help the president make national security decisions by figuring out what other countries’ leaders are up to.

“The Secret Service suppresses cellphones near the presidenti­al motorcade” to prevent bombs from being triggered, said Robert Graham, chief executive of Errata Security. “The Air Force flies above in a special airplane that hacks Wi-Fi on the ground. The NSA does remote hacks from across the Internet or via radio. The CIA develops relationsh­ips with people across the world, and uses them as part of its operations.”

Some methods described in the documents — including taking over webcams and stealing saved passwords from Internet browsers — didn’t include any indication of how, or if they had been used. Evidence of widespread disseminat­ion of such malware could raise red flags. There also was no immediate evidence that the CIA was hacking into the devices of U.S. citizens.

“If they were using iPhone exploits on Black Lives Matter protesters, now we might be talking of an abuse of power,” Bambenek said.

Public advocacy groups raised questions about whether the CIA was doing enough to tell technology companies about vulnerabil­ities in their products. Under a practice establishe­d under the Obama administra­tion, the government is to carefully weigh whether it’s better to hold onto a secret hacking technique or share it with manufactur­ers. Not disclosing it could leave U.S. systems vulnerable if adversarie­s come up with the same method.

“It’s simply a fantasy to believe that only the ‘good guys’ will be able to use these tools,” said Nathan White, senior legislativ­e manager at Silicon Valley-funded Access Now. “It is critical for government­s, law enforcemen­t, technologi­sts and civil society to have an honest conversati­on about the impact of government hacking in the digital age.”

The documents appear to span a period from 2013 to early 2016, which could explain why devices popularize­d in the last year such as the Amazon Echo and Google Home virtual assistant speakers weren’t spotted in the trove.

Many tactics mentioned date back years earlier. Makers of protection software apparently defeated by CIA malware offered limited comment, saying the issues are outdated or fixed.

“We will continue to monitor the situation,” one such vendor, Kaspersky Lab, said.

Apple said in a statement that its “initial analysis indicates that many of the issues leaked today were already” fixed in its latest mobile operating system. “We will continue work to rapidly address any identified vulnerabil­ities,” the statement continued.

 ?? Jim Lo Scalzo European Pressphoto Agency ?? SEN. JOHN McCAIN speaks to the media about the WikiLeaks disclosure of CIA documents on his way to a Senate Intelligen­ce Committee briefing Tuesday.
Jim Lo Scalzo European Pressphoto Agency SEN. JOHN McCAIN speaks to the media about the WikiLeaks disclosure of CIA documents on his way to a Senate Intelligen­ce Committee briefing Tuesday.

Newspapers in English

Newspapers from United States