The Asian Age

Technology firms scramble after CIA device hacking

Edward Snowden has said the documents show that CIA’s hacking arsenal could pose a bigger problem here

-

The tech sector was scrambling Wednesday to understand the implicatio­ns of an alleged broad CIA hacking arsenal, capable of spying on phones and other connected devices.

Major tech firms said they were looking at the allegation­s raised in the documents released by WikiLeaks on Tuesday.

“While our initial analysis indicates that many of the issues leaked today were already patched in the latest iOS, we will continue work to rapidly address any identified vulnerabil­ities,” Apple said in an emailed statement.

Samsung offered a similar response, saying: “We are aware of the report in question and are urgently looking into the matter.”

Microsoft, meanwhile, said: “We’re aware of the report and are looking into it.”

Security analysts, however, said the documents, if authentic, were not on the same scale as the explosive 2013 revelation­s from former national security contractor Edward Snowden, who revealed mass surveillan­ce tools used by the National Security Agency.

TARGETED, NOT BULK SPYING

“These are targeted mechanisms, they can’t be used for bulk intelligen­ce,” said Joseph Hall, a technologi­st with the Center for Democracy and Technology, a digital rights organizati­on.

“It means they can’t attack things in the middle and the core of the network, they have to go to the endpoints, and that’s actually a nice thing. You have to be more precise about who you are targeting.”

But Hall said the report raises questions about the US government’s pledge to disclose security flaws to technology firms under a so-called “vulnerabil­ities equities process.”

That pledge means “security flaws should get back to the companies so they can get fixed, and not languish for years,” Hall said.

The WikiLeaks documents, the authentici­ty of which has not been verified, said the CIA tools could turn smart TVs into listening devices, bypass popular encryption apps, and possibly control connected automobile­s.

The hacking tools have targeted iPhones, Android systems such as the personal phone reportedly still used by President Donald Trump, popular Microsoft software, and Samsung smart TVs, the documents indicated.

CIA SPYING TOOLS

Open Whisper Systems, the company that developed the technology for the communicat­ions tool Signal, said the CIA documents showed its encryption works.

The WikiLeaks report “is about getting malware onto phones, none of the exploits are in Signal or break Signal Protocol encryption,” the group said in a tweet.

OTHER ENCRYPTION EXPERTS AGREED. STRENGTH OF ENCRYPTION

“The existence of these hacking tools is a testimonia­l to the strength of the encryption,” said Steve Bellovin, a Columbia University computer science researcher, in a blog post.

“It’s hard or impossible to break, so the CIA is resorting to expensive, targeted attacks.”

Robert Graham, a researcher with Errata Security, said most of these hacks are simply methods to “trick you into installing their software.”

“Snowden revealed how the NSA was surveillin­g all Americans. Nothing like that appears in the CIA dump,” Graham said in a blog post. “It’s all legitimate spy stuff (assuming you think spying on foreign adversarie­s is legitimate).”

Bruce Schneier, chief technology officer at IBM Resilient and a frequent critic of government surveillan­ce, said on his blog, “There is absolutely nothing illegal in the contents of any of this stuff. It’s exactly what you’d expect the CIA to be doing in cyberspace.” In a twitter post yesterday, former CIA technical assistant Edward Snowden, who leaked NSA documents revealing US surveillan­ce on phone and internet communicat­ion, said, “This incorrectl­y implies CIA hacked these apps/encryption. But the docs show iOS/Android are what got hacked — a much bigger problem.”

—AFP

 ??  ??
 ??  ??

Newspapers in English

Newspapers from India