Toronto Star

CIA exposé sparks surprise takeaway

Smartphone encryption apps such as WhatsApp and Signal won the WikiLeaks debacle in a big way

- JORDAN ROBERTSON BLOOMBERG

Thousands of leaked secret Central Intelligen­ce Agency documents showing how the group hacked into phones, computers and Internet-connected television­s erupted Tuesday with the look of another bombshell exposé of government spying run amok.

But for ordinary consumers, there was a surprising — and reassuring — takeaway: Encryption apps on smartphone­s, such as Signal and Facebook Inc.’s WhatsApp, were the big winners of the day because the documents show they still present big problems for government hackers and are the best bet for keeping intruders from accessing your phone calls and texts.

The “Vault 7” data dump by WikiLeaks was just the latest in a long line of embarrassi­ng disclosure­s for the intelligen­ce community from the anti-secrecy website, which the U.S. has cited as working with alleged Russian government hackers in tampering with the 2016 presidenti­al election.

The documents describe the CIA’s efforts to hack mobile phones and smart TVs, using computer exploits they bought or developed, and stealing techniques and code from other nation-state hackers such as Russia and China, to hide their tracks.

Some security profession­als quickly derided the materials as outdated and questioned the timing, as it could be seen as helping to distract from mounting problems for the Trump administra­tion in addressing ties to Russia.

“The only interestin­g story is ‘why’ not ‘what,’ ” a prominent security researcher who goes by the handle “the grugq” wrote on Twitter, calling the actual contents of the leak “lame.”

For normal computer and mobile phone users, however, there is a valuable lesson in what wasn’t in there.

Some security profession­als said the leak offered proof that activists and technologi­sts were actually making it harder for government agencies to conduct mass surveillan­ce, forcing intelligen­ce operators to rely instead on the expensive and time-consuming task of hacking people’s phones one by one.

“The CIA/WikiLeaks story today is about getting malware onto phones, none of the exploits are in Signal or break Signal Protocol encryption,” Open Whisper Systems, the organizati­on that makes Signal and whose technology underpins WhatsApp’s encryption, wrote on Twitter.

“The story isn’t about Signal or WhatsApp, but to the extent that it is, we see it as confirmati­on that what we’re doing is working. Ubiquitous (end-to-end) encryption is pushing intelligen­ce agencies from undetectab­le mass surveillan­ce to expensive, high-risk, targeted attacks.”

The episode offers some basic lessons for people who are concerned about government surveillan­ce of their devices:

1. The “endpoint” is everything. If an attacker can install spyware onto your mobile phone, or laptop, or even television set, it’s game over for privacy. No amount of encryption will help secure your conversati­ons. This approach requires personally tailored attacks, though, so most people won’t be affected. And in the CIA’s case, many of its tools appear to reflect the organizati­on’s focus on human intelligen­ce, which involves people physically installing malware versus implanting it remotely, which reduces the potential for attack.

2. Mobile devices are, unsurprisi­ngly, a huge area of interest for intelligen­ce agencies. But hackers choose the path of least resistance. As a result, most people will want to worry more about a phishing email or text leading to a malicious website rather than encounteri­ng a top-of-the-line government “zero day” exploit.

“The story isn’t about Signal or WhatsApp, but . . . we see it as confirmati­on that what we’re doing is working.” OPEN WHISPER SYSTEMS MAKER OF SIGNAL

3. Encryption matters. Apps such as Signal and WhatsApp are not a panacea against hacking, but they make an attacker’s job harder. Whereas ordinary phone calls and texts travel over mobile networks “in the clear,” encryption scrambles them.

4. If you’re a target of government hacking, you may want to rethink any Internet-of-things-type devices you have around the house.

From Amazon’s Echo to smart TVs, any device with an Internet connection can be programmed to secretly record conversati­ons and beam the data.

 ?? BRENT LEWIN/BLOOMBERG ?? The latest WikiLeaks documents describe the CIA’s efforts to hack mobile phones and smart TVs.
BRENT LEWIN/BLOOMBERG The latest WikiLeaks documents describe the CIA’s efforts to hack mobile phones and smart TVs.

Newspapers in English

Newspapers from Canada