The Saratogian (Saratoga, NY)

WikiLeaks reveals alleged CIA hacking

- By Jack Gillum and Raphael Satter

WASHINGTON >> WikiLeaks published thousands of documents Tuesday described as secret files about CIA hacking tools the government employs to break into users’ computers, mobile phones and even smart TVs from companies like Apple, Google, Microsoft and Samsung.

The documents describe clandestin­e methods for bypassing or defeating encryption, antivirus tools and other protective security features intended to keep the private informatio­n of citizens and corporatio­ns safe from prying eyes. U.S. government employees, including President Donald Trump, use many of the same products and internet services purportedl­y compromise­d by the tools.

The documents describe CIA

efforts — cooperatin­g with friendly foreign government­s and the U.S. National Security Agency — to subvert the world’s most popular technology platforms, including Apple’s iPhones and iPads, Google’s Android phones and the Microsoft Windows operating system for desktop computers and laptops.

The documents also include discussion­s about compromisi­ng some internet-connected television­s to turn them into listening posts. One document discusses hacking vehicle systems, indicating the CIA’s interest in hacking modern cars with sophistica­ted onboard computers.

WikiLeaks has a long track record of releasing top secret government documents, and experts who sifted through the material said it appeared legitimate.

Jonathan Liu, a spokesman for the CIA, said: “We do not comment on the authentici­ty or content of purported intelligen­ce documents.” White House spokesman Sean Spicer also declined comment.

Missing from WikiLeaks’ trove are the actual hacking tools themselves, some of which were developed by government hackers while others were purchased from outsiders. WikiLeaks said it planned to avoid distributi­ng tools “until a consensus emerges” on the political nature of the CIA’s program and how such software could be analyzed, disarmed and published.

Tuesday’s disclosure left anxious consumers who use the products with little recourse, since repairing the software vulnerabil­ities in ways that might block the tools’ effectiven­ess is the responsibi­lity of leading technology companies.

The revelation­s threatened to upend confidence in an Obama-era government program, the Vulnerabil­ity Equities Process, under which federal agencies warn technology companies about weaknesses in their software so they can be quickly fixed.

It was not immediatel­y clear how WikiLeaks obtained the informatio­n, and details in the documents could not immediatel­y be verified. WikiLeaks said the material came from “an isolated, high-security network” inside the CIA’s Center for Cyber Intelligen­ce but didn’t say whether the files were removed by a rogue employee or perhaps involved hacking a federal contractor working for the CIA or breaking into a staging server where such informatio­n might have been temporaril­y stored.

“The archive appears to have been circulated among former U.S. government hackers and contractor­s in an unauthoriz­ed manner, one of whom has provided WikiLeaks with portions of the archive,” WikiLeaks said in a statement.

 ?? AP FILE ?? The new CIA Director Michael Pompeo, as he testifies on Capitol Hill in Washington.
AP FILE The new CIA Director Michael Pompeo, as he testifies on Capitol Hill in Washington.

Newspapers in English

Newspapers from United States