Khaleej Times

Files: Are they real and risky?

-

washington — WikiLeaks has published thousands of documents that the anti-secrecy organisati­on said were classified files revealing scores of secrets about CIA hacking tools used to break into targeted computers, cell phones and even smart TVs.

Some questions and answers about the latest WikiLeaks dump and its fallout: Where do these documents come from? WikiLeaks said the material came from “an isolated, high-security network” inside the CIA’s Center for Cyber Intelligen­ce, the spy agency’s internal arm that conducts cyber offense and defence.

It said the documents were “circulated among former United States government hackers and contractor­s in an unauthoris­ed manner, one of whom has provided WikiLeaks with portions of the archive.”

It did not make it clear who was behind the leak, leaving several possibilit­ies: espionage, a rogue employee, a theft involving a federal contractor or a break-in of a staging server where such informatio­n may have been temporaril­y stored. How many files were leaked? What period do they cover? WikiLeaks said 7,818 web pages and 943 attachment­s were published, but were just the first part of more material to come.

WikiLeaks said it has an entire archive of data consisting of several million lines of computer code. The documents appear to date between 2013 and 2016.

WikiLeaks described them as “the largest-ever publicatio­n of confidenti­al documents on the agency.” Are these legitimate CIA documents? A spokesman for the CIA said the agency would not comment “on the authentici­ty or content of purported intelligen­ce documents.” Trump administra­tion spokesman Sean Spicer declined comment as well.

But WikiLeaks has a long track record of assembling and releasing secret files from the United States and other government­s.

Security experts who reviewed the material said the documents appeared to be authentic.

Jake Williams, a security expert with Georgia-based Rendition Infosec, who has dealt previously with government hackers, said that frequent references in the files to operation security gave them the stamp of legitimacy. “It rings true to me,” Williams said. What do these documents contain? The files describe CIA plans and descriptio­ns of malware and other tools that could be used to hack into some of the world’s most popular technology platforms. The documents showed that the developers aimed to be able to inject these tools into targeted computers without the owners’ awareness.

The files do not describe who the prospectiv­e targets might be, but the documents show broad exchanges of informatio­n between the CIA and NSA and other federal intelligen­ce agencies, as well as intelligen­ce services of close allies Australia, Canada, New Zealand and the UK

The documents range from complicate­d computer coding to organisati­onal plans to sarcastic comments about the tools’ effectiven­ess. Some of the tools were named after alcohol references, including Bartender, Wild Turkey and Margarita.

Others referenced recent popular movies, including “Fight Club” and “Talladega Nights.”

One hacking tool, code-named “RickyBobby,” after the character who is a race car driver in “Talladega Nights,” was purportedl­y used to upload and download informatio­n “without detection as malicious software.” —

Newspapers in English

Newspapers from United Arab Emirates