Wikileaks, the CIA and your devices: what the documents reveal

CIA has an arsenal of malware it can use to break into widely used electronic gadgets

 A worker at the CIA sweeping the foyer clean at its headquarters in  Langley, Virginia. Photograph: Dennis Brack/EPA

A worker at the CIA sweeping the foyer clean at its headquarters in Langley, Virginia. Photograph: Dennis Brack/EPA

 

Wikileaks’ publication of what it says are documents detailing the CIA’s cyber-espionage techniques has raised a host of questions about the security of smartphones, internet-connected devices and encrypted apps. Here are some answers to those questions.

What do the Wikileaks documents reveal about the CIA’s hacking abilities?

Assuming the documents are genuine, the CIA has an arsenal of malware it can use to break into widely used electronic gadgets. These include the iPhone, devices running Google’s Android software and smart TVs like those made by Samsung. The most powerful of these weapons are “zero day” exploits – code that takes advantage of flaws in the software that no one else has spotted, potentially creating secret backdoors that can be used over long periods.

Wikileaks claimed only to have got hold of a partial collection of the CIA’s secrets, including “dozens” of zero-day weapons, so it is impossible to tell how complete a picture this is.

What about other governments?

The leak only covers the CIA, but – like the Snowden revelations about surveillance by the National Security Agency – they hint at wider transatlantic co-operation. One piece of malware, which uses smart TVs to eavesdrop on their owners, was purportedly developed with UK intelligence services. It is codenamed “Weeping Angel” – a reference to a race of adversaries on British TV series Doctor Who, suggesting that this particular weapon was first developed in the UK.

Is it news that governments have cyberweapons like this?

Not really. After the Snowden leaks, the Obama administration promised to collect fewer zero-day exploits for government use. It said it would disclose most of the ones it came across so that tech companies could fix the vulnerabilities, keeping an undisclosed number for national security purposes. Privacy campaigners point out, though, that even a single exploit can be hugely valuable, if it can be used to break into a widely used gadget and escape detection for a long time.

Aren’t these tools like any other weapon that governments use? Or are there extra reasons I should be worried?

The unseen nature of cyber attacks raises particular civil rights issues, since it is harder to identify when they are used or whether their use is being properly controlled. Also, once zero day exploits are released they risk falling into the hands of malevolent hackers like criminals and terrorists. Some privacy campaigners argue that governments have a responsibility to tell companies when they find a flaw in their products, because it could be used by cyber criminals.

Does this mean encrypted messaging services like WhatsApp no longer offer protection?

No, encryption still works and messages that pass between mobile apps like these are still unreadable if intercepted. But by breaking into a smartphone, the CIA could bypass the encryption. It would be able to read a message before it was scrambled, giving it access to all the information the owner of the device has.

So does this mean the CIA could engage in the same sort of mass surveillance that the NSA was accused of?

It is unlikely. The tools that Wikileaks has uncovered are used to hack into an individual user’s gadgets, not to vacuum up large volumes of phone records or text messages.

What should I do to make myself safer from attacks like this – whether from the CIA or a criminal gang?

Upgrade your software – if you can. Newer versions of operating systems like iOS and Android contain fixes for earlier flaws, and often have new layers of defence against all attacks. But this may only be effective in cases where the flaws are known: some zero day exploits could be effective for an extended period.

Also, individual users often do not have much choice about the software they use. Mobile phone operators frequently limit which versions of Android their customers can use. And TVs and other internet-connected devices use “embedded” software that users cannot update.

Copyright The Financial Times Limited 2017

The Irish Times Logo
Commenting on The Irish Times has changed. To comment you must now be an Irish Times subscriber.
SUBSCRIBE
GO BACK
Error Image
The account details entered are not currently associated with an Irish Times subscription. Please subscribe to sign in to comment.
Comment Sign In

Forgot password?
The Irish Times Logo
Thank you
You should receive instructions for resetting your password. When you have reset your password, you can Sign In.
The Irish Times Logo
Please choose a screen name. This name will appear beside any comments you post. Your screen name should follow the standards set out in our community standards.
Screen Name Selection

Hello

Please choose a screen name. This name will appear beside any comments you post. Your screen name should follow the standards set out in our community standards.

The Irish Times Logo
Commenting on The Irish Times has changed. To comment you must now be an Irish Times subscriber.
SUBSCRIBE
Forgot Password
Please enter your email address so we can send you a link to reset your password.

Sign In

Your Comments
We reserve the right to remove any content at any time from this Community, including without limitation if it violates the Community Standards. We ask that you report content that you in good faith believe violates the above rules by clicking the Flag link next to the offending comment or by filling out this form. New comments are only accepted for 3 days from the date of publication.