Toronto Star

WikiLeaks claims CIA can use TVs for spying

- SCOTT SHANE, MARK MAZZETTI AND MATTHEW ROSENBERG THE NEW YORK TIMES

Documents with computer code could prove disastrous for U.S. espionage agency, tech world

WASHINGTON— WikiLeaks released thousands of documents on Tuesday that it said described sophistica­ted software tools used by the CIA to break into smartphone­s, computers and even Internetco­nnected television­s.

If the documents are authentic, as appeared likely at first review, the release would be the latest coup for the antisecrec­y organizati­on and a serious blow to the CIA, which maintains its own hacking capabiliti­es to be used for espionage.

The initial release, which WikiLeaks said was only the first part of the document collection, included 7,818 web pages with 943 attachment­s. The entire archive of CIA material consists of several hundred million lines of computer code, it said.

Among other disclosure­s that, if confirmed, would rock the technology world, the WikiLeaks release said the CIA and allied intelligen­ce services had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram. According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect “audio and message traffic before encryption is applied.”

The source of the documents was not named. WikiLeaks said the documents, which it called Vault 7, had been “circulated among former U.S. government hackers and contractor­s in an unauthoriz­ed manner, one of whom has provided WikiLeaks with portions of the archive.”

WikiLeaks said the source, in a statement, set out policy questions that “urgently need to be debated in public, including whether the CIA’s hacking capabiliti­es exceed its mandated powers and the problem of public oversight of the agency.” The source, the group said, “wishes to initiate a public debate about the security, creation, use, proliferat­ion and democratic control of cyberweapo­ns.”

The documents, from the CIA’s Center for Cyber Intelligen­ce, are dated from 2013 to 2016 and WikiLeaks described them as “the largest ever publicatio­n of confidenti­al documents on the agency.” One former intelligen­ce officer who briefly reviewed the documents Tuesday said some of the code names for CIA programs, an organizati­on chart and the descriptio­n of a CIA hacking base appeared to be genuine.

A CIA spokespers­on, Dean Boyd, said, “We do not comment on the authentici­ty or content of purported intelligen­ce documents.”

WikiLeaks, which has sometimes been accused of recklessly leaking informatio­n that could do harm, said it had redacted names and other identifyin­g informatio­n from the collection. It said it was not releasing the computer code for actual, usable cyberweapo­ns “until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should be analyzed, disarmed and published.”

Some of the details of the CIA programs might have come from the plot of a spy novel for the cyberage, revealing numerous highly classified — and in some cases, exotic — hacking programs.

One, code-named Weeping Angel, uses Samsung “smart” television­s as covert listening devices. According to the WikiLeaks news release, even when it appears to be turned off, the television “operates as a bug, recording conversati­ons in the room and sending them over the Internet to a covert CIA server.”

The release said the program was developed in co-operation with British intelligen­ce.

If CIA agents did manage to hack smart TVs, they would not be the only ones.

Since their release, Internetco­nnected television­s have been a focus for hackers and cybersecur­ity experts, many of whom see the sets’ ability to record and transmit conversati­ons as a potentiall­y dangerous vulnerabil­ity.

In early 2015, Samsung appeared to acknowledg­e the television­s posed a risk to privacy. The fine print terms of service included with its smart TVs said the television sets could capture background conversati­ons, which could then be passed onto third parties.

The company also provided a remarkably blunt warning: “Please be aware that if your spoken words include personal or other sensitive informatio­n, that informatio­n will be among the data captured and transmitte­d to a third party through your use of Voice Recognitio­n.”

Stephanie Carvin of the Norman Paterson School of Internatio­nal Affairs at Carleton University said Canadian material risks being exposed, since Canada and the U.S. are members of the five-country group of intelligen­ce-sharing countries known as the "Five Eyes."

Vulnerable Canadian secrets could include details on the tools and methods Canadian intelligen­ce agencies use kin digital snooping.

"Because of the sharing between the Five Eyes, if Canada is using some of those tools, yes, our capabiliti­es would be hurt as well," Carvin said Tuesday. "Secondly, if for some reason, they’ve been able to get access to some of our documents through Five Eyes sharing, then even some of our methods could be released as well. But we don’t know what they have."

There was scant mention of Canada in the WikiLeaks files disclosed Tuesday, but one file suggests intelligen­ce agencies took part in a summer 2015 workshop in Ottawa dubbed "Triclops."

A memo associated with the event notes an apparent effort to control an iPhone without the user knowing.

Another program described in the documents, named Umbrage, is a voluminous library of cyberattac­k techniques that the CIA has collected from malware produced by other countries, including Russia. According to the WikiLeaks release, the large number of techniques allows the CIA to mask the origin of some of its cyberattac­ks and confuse forensic investigat­ors.

Assuming the release is authentic, it marks the latest in a series of huge leaks that have changed the landscape for government and corporate secrecy.

In scale, the Vault 7 archive appears to fall into the same category as the biggest leaks of classified informatio­n in recent years, including the quarter-million diplomatic cables taken by Chelsea Manning, the former U.S. army intelligen­ce analyst, and given to WikiLeaks in 2010, and the hundreds of thousands of documents taken from the National Security Agency by Edward Snowden and given to journalist­s in 2013.

According to the WikiLeaks release, the large number of techniques allows the CIA to mask the origin of its cyberattac­ks and confuse forensic investigat­ors

 ?? JAE C. HONG/THE ASSOCIATED PRESS FILE PHOTO ?? In 2015, Samsung warned smart TVs could capture conversati­ons, which could then be passed onto third parties.
JAE C. HONG/THE ASSOCIATED PRESS FILE PHOTO In 2015, Samsung warned smart TVs could capture conversati­ons, which could then be passed onto third parties.

Newspapers in English

Newspapers from Canada