image missing
HOME SN-BRIEFS SYSTEM
OVERVIEW
EFFECTIVE
MANAGEMENT
PROGRESS
PERFORMANCE
PROBLEMS
POSSIBILITIES
STATE
CAPITALS
FLOW
ACTIVITIES
FLOW
ACTORS
PETER
BURGESS
SiteNav SitNav (0) SitNav (1) SitNav (2) SitNav (3) SitNav (4) SitNav (5) SitNav (6) SitNav (7) SitNav (8)
Date: 2024-04-18 Page is: DBtxt001.php txt00012924

Hacking
Game Changer

The real shocker in the WikiLeaks scoop ... WikiLeaks to release details of CIA hacking tools to tech companies

Burgess COMMENTARY

Peter Burgess

The real shocker in the WikiLeaks scoop ... WikiLeaks to release details of CIA hacking tools to tech companies

WikiLeaks founder Julian Assange announced on March 9, that they will release details of the CIA hacking tools to tech companies, 'so that fixes can be developed and pushed out so people can be secured.' (WikiLeaks)

WikiLeaks leader Julian Assange’s revelation last week of the CIA’s arsenal of hacking tools had a misplaced tone of surprise, a bit like Claude Rains’s famous line in “Casablanca”: “I’m shocked, shocked to find that gambling is going on in here!”

The hacking community, of which WikiLeaks and the CIA’s cyberwarriors are both aggressive offshoots, has been invading and exploiting every device in sight since the dawn of the digital age. It would be nice if governments, criminals and self-appointed do-gooders didn’t invade privacy and steal things from the Internet, but we don’t live in that world.

Cyber-mischief is a crowded and well-established field. The hackers’ convention known as DEF CON is holding its 25th anniversary gathering this July in Las Vegas: “We’re celebrating 25 years of warranty-voiding, boundary-expanding adventures in technological subversion,” boasts its website. These folks have been around so long their black T-shirts have turned gray.

Last year, DEF CON hosted discussions on hacking driverless cars, hotel keys and point-of-sale systems, and on inserting “ransomware” via your home thermostat that would roast or freeze you until you paid up, among other topics. One session was called “How to overthrow a government.” Nice.

I attended DEF CON in 2012 when I was researching a novel about hacking and espionage called “The Director.” I have never forgotten the “Wall of Sheep” near the entrance, an electronic scroll that recorded all the attendees’ devices that were being hacked, in real time. Topics included hacking cloud servers, mobile phones, routers, GPS and even airplanes.

The National Security Agency had a booth that year, over near “Lockpick Village.” (I kid you not.) I was told that recruiters from the U.S. intelligence community were in attendance, along with many contractors that serve it. So, too, presumably, were observers from foreign intelligence services, because the convention is pretty much wide open. Everyone was scouting the best hacking tools and cleverest code writers.

The dark side of this world exploded into view with WikiLeaks’ publication of the CIA toolkit. Some scary initial stories argued that the CIA could crack Signal and WhatsApp phone encryption, not to mention your toaster and television. But security experts Nicholas Weaver and Zeynep Tufekci have pushed back against those early claims, in the Lawfare blog and in the New York Times, respectively.

The hardest question here is whether the CIA and other government agencies have a responsibility to disclose to software vendors the holes they discover in computer code, so they can be fixed quickly. This may sound like a no-brainer. The government even has a little-known program, called the Vulnerability Equities Process, that posits that U.S. agencies should share such exploits whenever the public benefit outweighs the cost to the government.

But this cost-benefit analysis turns out to be tricky, many computer-security experts argue. The problem is that there’s a global market for “zero-day” exploits (ones that are unknown on the day they’re used). U.S. intelligence agencies buy some of these exploits; so do other countries’ spy services, criminal gangs and the software vendors themselves. In a hostile world, the United States needs a stockpile of such tools, for both offense and defense, the argument goes. And sharing the details may not help the public as much as it hurts the government.

A recent report by the Rand Corp. titled “Zero Days, Thousands of Nights” opens a window on this spooky market. By Rand’s calculation, there are about two dozen companies selling or renting exploits to the United States and its allies, with many of these contractors making between $1 million and $2.5 million annually. (Another, darker network sells to adversaries and criminals.)

The surprise was that the exploits being marketed survived a long time undetected and were unlikely to be snatched by competitors. The more than 200 zero-day exploits studied by Rand went undetected for an average of 6.9 years, with only 5.8 percent discovered by competitors within a year. Given this evidence, Rand argued, “some may conclude that stockpiling zero-days may be a reasonable option” to combat potential adversaries.

But let’s be honest: The real shocker in the WikiLeaks scoop is the demonstration, once again, that the U.S. government can’t keep secrets. It makes little sense for the CIA to argue against disclosing its cyber-tricks to computer companies if this valuable information is going to get leaked to adversaries or the hacker underground anyway.

Trump was a big fan of Wikileaks – but he doesn't like leaks from his own administration Embed Share Play Video1:30

President Trump repeatedly referenced stolen and leaked information about his political opponents during the 2016 campaign. But now that he's in office, he's a lot less enthusiastic about leaks. (Video: Peter Stevenson/Photo: Jabin Botsford/The Washington Post)

Unilateral disarmament sounds like a bad idea. But so is the assumption that this information is safely protected.

Read more from David Ignatius’s archive, follow him on Twitter or subscribe to his updates on Facebook.
--------------------------------------------
Read more here:

The Post’s View: WikiLeaks does America’s enemies a big favor

Ben Buchanan: WikiLeaks doesn’t raise doubts about who hacked the DNC. We still know it was Russia.

Fareed Zakaria: America must defend itself against the real national security menace


By David Ignatius Opinion writer
March 14 2017
The text being discussed is available at
https://www.washingtonpost.com/opinions/the-real-shocker-in-the-wikileaks-scoop/2017/03/14/a464f9aa-08f2-11e7-a15f-a58d4a988474_story.html
and
SITE COUNT<
Amazing and shiny stats
Blog Counters Reset to zero January 20, 2015
TrueValueMetrics (TVM) is an Open Source / Open Knowledge initiative. It has been funded by family and friends. TVM is a 'big idea' that has the potential to be a game changer. The goal is for it to remain an open access initiative.
WE WANT TO MAINTAIN AN OPEN KNOWLEDGE MODEL
A MODEST DONATION WILL HELP MAKE THAT HAPPEN
The information on this website may only be used for socio-enviro-economic performance analysis, education and limited low profit purposes
Copyright © 2005-2021 Peter Burgess. All rights reserved.