Pittsburgh Post-Gazette

Secrets gone wild

WikiLeaks spills CIA gadgetry, but to what end?

-

The release Tuesday by WikiLeaks of the first installmen­t of what will apparently be a large batch of CIA communicat­ions, including what appears to be very sensitive informatio­n, moves the issue of the protection by the United States government of critical data into the “very serious” column.

The CIA has refused to comment, consistent with its policy in such matters, but there is some reason to believe in the authentici­ty of the documents in question. It is also not the first instance of sensitive U.S. documents ending up in the hands of the public and the media through WikiLeaks and other parties. Recent incidents of such leaks, both of which occurred during the presidency of Barack Obama, included those brought about by U.S. Army Spc. Bradley E., subsequent­ly Chelsea, Manning in 2010 and Edward J. Snowden, a former CIA employee and National Security Agency contractor in 2013. Mr. Snowden remains in exile in Russia.

Speculatio­n at this point suggests that the documents were obtained by hacking, as opposed to from disaffecte­d CIA or other U.S. government security employees.

What is alarming about this pack of revelation­s is that the informatio­n apparently hacked included cyberweapo­ns codes. WikiLeaks says it has edited that informatio­n out of what it has released, but it is truly disturbing to think of weapons codes being in the hands of WikiLeaks and other personnel. Their political allegiance is unclear. Their cooperatio­n with foreign intelligen­ce services, including the Russian Federal Security Service, is unknown. Some of them might think that global warfare is the only way to clean out what they see as a world elite rat’s nest.

What is true of all or at least some of the hackers is that they see even the most protected and secret of computers as a challenge to break, not an important secret to protect. What that means is that the CIA, the NSA and the other 15 or so military or other agencies of the U.S. government that work with such secrets need to undertake a drastic re-examinatio­n of their security measures to try to guarantee their protection.

The public already knew or guessed that their smartphone­s, television­s and even their cars’ computer systems were vulnerable to government, industry or other hacking.

It may be that American government’s reliance on computers has reached the end of the line and that it may have to go back to word-ofmouth as the only possible means of keeping the hackers away from dangerous informatio­n. Politician­s’ campaign informatio­n is one thing; codes to cyberweapo­ns systems are something altogether different in terms of the need to protect.

Newspapers in English

Newspapers from United States