. Military Space News .
CYBER WARS
CIA blasts WikiLeaks for publishing secret documents
By Paul HANDLEY, Rob Lever
Washington (AFP) March 9, 2017


The Central Intelligence Agency on Wednesday accused WikiLeaks of endangering Americans, helping US rivals and hampering the fight against terror threats by releasing what the anti-secrecy site claimed was a trove of CIA hacking tools.

A CIA spokeswoman would not confirm the authenticity of the materials published by WikiLeaks, which said they were leaked from the spy agency's hacking operations.

Nevertheless, said spokeswoman Heather Fritz Horniak, "The American public should be deeply troubled by any WikiLeaks disclosure designed to damage the intelligence community's ability to protect America against terrorists and other adversaries."

"Such disclosures not only jeopardize US personnel and operations, but also equip our adversaries with tools and information to do us harm," she said.

Horniak defended the CIA's cyber operations, which the WikiLeaks materials showed focused heavily on breaking into personal electronics using a wide range of malware systems.

"It is CIA's job to be innovative, cutting-edge, and the first line of defense in protecting this country from enemies abroad," she said.

- Massive leak -

On Tuesday, WikiLeaks published nearly 9,000 documents it said were part of a huge trove leaked from the CIA, describing it as the largest-ever publication of secret intelligence materials.

"This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA," it said.

The documents showed that CIA hackers can turn a TV into a listening device, bypass popular encryption apps, and possibly control one's car.

Most experts believe the materials to be genuine, and US media said Wednesday that the Federal Bureau of Investigation is opening a criminal probe into the leak.

The source of the materials remained unclear. The investigation could focus on whether the CIA was sloppy in its controls, or, as The Washington Post reported, it could be "a major mole hunt" for a malicious leaker or turncoat inside the agency.

WikiLeaks itself said the documents, hacking tools and code came from an archive that had circulated among US government hackers and private contractors.

An investigation would come as the CIA is already enmeshed in a politically-charged probe into Russia's alleged interference in the US election last year in support of President Donald Trump's campaign.

WikiLeaks, which has stunned the US government with a series of publications of top secret political, diplomatic and intelligence materials, said the publication Tuesday was only the first of a series of releases of CIA hacking materials.

That raised concerns that the site could release the actual hacking tools it obtained along with the documents. Experts worry those could fall into the hands of anyone, including US enemies and criminals.

- Tech sector scrambles for fixes -

The WikiLeaks documents detailed the CIA's practice of exploiting vulnerabilities in hardware and software, without ever informing producers of them.

The CIA allegedly found ways to hack into personal electronics from leading companies like Apple and Samsung, Android phones, popular Microsoft software, and crucial routers from major manufacturers.

The documents suggest it can also infiltrate smartphones in a way that allows it to get around popular messaging encryption apps.

The tech sector was scrambling to understand how their products were at risk.

"While our initial analysis indicates that many of the issues leaked today were already patched in the latest iOS, we will continue work to rapidly address any identified vulnerabilities," Apple said in an emailed statement.

"We're confident that security updates and protections in both Chrome and Android already shield users from many of these alleged vulnerabilities," Google director of information security and privacy Heather Adkins said in a released statement.

"Our analysis is ongoing and we will implement any further necessary protections."

Samsung and Microsoft both said they were "looking into" what WikiLeaks revealed.

- Encryption apps safe-

Joseph Hall, a technologist with the Center for Democracy and Technology, a digital rights organization, said the documents raise questions about the US government's pledge last year to disclose vulnerabilities to technology firms.

That pledge means "security flaws should get back to the companies so they can get fixed, and not languish for years," he said.

The American Civil Liberties Union commented in a tweet: "When the govt finds software security holes, it should help fix them, not hoard them and leave everyone vulnerable."

Companies that make encryption programs and apps targeted by the CIA said the revelations show the agency has not been able to break their software.

Open Whisper Systems, which developed the technology for the Signal encryption app, said the CIA documents showed that Signal works.

"None of the exploits are in Signal or break Signal Protocol encryption," the group said in a tweet.

"The existence of these hacking tools is a testimonial to the strength of the encryption," said Steve Bellovin, a Columbia University computer science researcher, in a blog post.

CYBER WARS
The Darknet protects itself by being more robust against attacks
Tarragona, Spain (SPX) Mar 07, 2017
The Darknet is a part of the internet that people can access and use anonymously. This privacy and the ability to work away from prying eyes means that the network is frequently used for anonymous exchanges of sensitive information and for illegal activities such as drug trafficking, sharing child pornography or exchanging protected intellectual property free of charge. Cyberattacks are fr ... read more

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


Comment on this article using your Disqus, Facebook, Google or Twitter login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
UN hopes for easing of tensions after Chinese anger over THAAD

China vows 'resolute' measures after THAAD deployment

Protesters sue to stop US missile system in S. Korea

Jenoptik contracted for Patriot missile components

CYBER WARS
U.S. Navy test fires surface to surface missile module

Brazilian army buys more SAAB missile defense systems

Lockheed Martin completes flight tests with updated JASSM

Russia deployed cruise missile in violation of treaty: US general

CYBER WARS
Leonardo subsidiary to buy laser technology company Daylight Solutions

Hughes to provide satellite communications for SkyGuardian drones

Drone Aviation Delivers Enhanced WASP Tactical Aerostat to DoD

Northrop Grumman begins flight tests with MS-177 sensor

CYBER WARS
Intelsat General becomes Airbus channel partner for military satellite communications

Rockwell Collins, Australian air force test WBHF communication system

Space aggressors jam AF, allies' systems

General Dynamics gets enterprise communications contract

CYBER WARS
European Defense Agency completes artillery accuracy project

Lockheed Martin introduces Paragon direct attack bomb

Orbital ATK production of artillery shell guidance kits tops 10,000

Unidentified country orders Saab target vehicle system

CYBER WARS
Trump to press Congress for defense spending boost

BAE Systems eyes defence spending by Trump

UAE signs over $5 bln in deals at arms fair

Pentagon chief says military running smoothly amid turbulent transition

CYBER WARS
'Disloyal' Polish rival to Tusk loses EU party job

Putin pardons woman jailed over 'treasonous' text message

China defense budget rises at slowest pace in decades

Canada extends Ukraine troop training mission to 2019

CYBER WARS
Small nanoparticles have surprisingly big effects on polymer nanocomposites

Most complex nanoparticle crystal ever made by design

Nano 'sandwich' offers unique properties

Scientists create a nano-trampoline to probe quantum behavior









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.