Science info

  • science
  • tech
  • mobile
  • security
  • computers
  • trending
  • autos
  • weather

Next WikiLeaks worry: the release of the code

  1. Home
  2. tech

A worker sweeps the foyer clean at CIA headquarters in Langley, Virginia.(Photo: DENNIS BRACK / POOL, EPA)

SAN FRANCISCO — The computer security world is bracing for the next bombshell from the massive Wikileaks document leak: disclosure of the actual computer code for the CIA's alleged cyberweapons.

On Tuesday, the website WikiLeaks published more than 8,000 of what it said were official documents detailing CIA tools for hacking into the software and systems of popular consumer technology, from Windows to iPhones to Android devices. The cyberweapons, the documents suggested, could even turn Samsung smart TVs into eavesdropping spies.

But the crusading site didn't release the code, saying it was postponing release  “until a consensus emerges on the technical and political nature of the C.I.A.’s program" and how the cyberweapons could be disarmed.

Simply the existence of such tools, while not surprising to many in the security field, was enough to raise privacy hackles. Enticed by convenience, consumers are increasingly keeping Internet-connected super computers in their pockets, on their dressers and in their cars. These not only know their users' plans, tastes and locations, but also frequently are "listening" for a prompt.

The release of the codes, warn some security experts, would be the cyber equivalent of releasing a neutron bomb in the middle of Times Square.

Suddenly, sophisticated cyber weapons created by one of the world's most powerful intelligence agencies would be available to anyone, from small countries without their own state computer security apparatus to teen hackers in their bedrooms.

The possibilities are giving security experts the willies. Possible potential effects:

- difficult-to-detect eavesdropping software being planted on the phones of millions of users

- the ability to make smartphones running the Android operating system spy on the WiFi networks around them

- access to a program that sits quietly on a device until a specific event or action occurs, which launches it into send mode to a specific "listener."

“There are clear Pearl Harbor Day scenarios,” says Philip Lieberman, president of Los Angeles-based computer security company Lieberman Software. These could range from simple inconveniences — no email — to more troublesome things.

How troublesome? Take the oddball software update glitch in June that make Lexus radio and navigation systems inoperable. Now, consider — as the CIA did in a meeting in 2014, according to the WikiLeaks documents —if a hacker released a code that infiltrated and took over systems in such Internet-connected cars, one that couldn't be reset.

The prospect of what hackers could do with the code is "so mind-boggling that it’s difficult to categorize all the consequences,” says Robert Cattanach, a partner at international law firm Dorsey & Whitney and previously a trial attorney for the Justice Department. “As individuals, we would no longer have any reasonable expectation of privacy,” he said.

Even without the code, the WikiLeaks release is a treasure trove for hackers because simply knowing that something has been done gives them crucial clues about how to build the tools described.

With that in mind, big software companies such as Apple, Microsoft and Samsung are already looking into, and in some cases creating fixes for, these problems. Apple, in a late Tuesday statement, said it's already fixed many of the security issues detailed by WikiLeaks. Samsung said it was "urgently looking into the matter."

“If manufacturers aren’t scrambling now to build patches for these problems, they are being derelict,” says Herbert Lin, a senior research scholar for Cyber Policy and Security at Stanford University.

Code that doesn't get patched, or more likely devices whose owners neglect to update them, would remain vulnerable.

And if the code is released, it would turn the economics of hacking upside down. Where once those with the most resources, like the CIA, had the best code, now it would be available to everyone.

“Smaller countries and other hacking groups just became the benefactor of a massively-funded state level hacking team,” Eric Ahlm, a senior security researcher with Gartner.

Federal authorities on Wednesday launched a criminal investigation into the release of the CIA documents.

For consumers, there are two things they should focus on: "Patch their software when a patch is available and use two-factor authentication whenever available," said Paul Querna, chief technology officer at security company ScaleFT.

Living in a post-privacy world

If the documents are legitimate, as many cybersecurity experts believe they are, it paints an alarming picture of spy agencies more interested in stockpiling vulnerabilities for a future exploit than working with vendors to shore up vulnerabilities.

The escalating digital arms race comes at a time when President Trump has a contentious relationship with with the intelligence community and is in an antagonistic dance with the tech world over American jobs, tariffs and taxes. And it puts the president in a sensitive spot since he famously said, "I love WikiLeaks," for its role in publishing email from the account of Clinton campaign manager John Podesta.

"If the CIA knows of a specific exploit, chances are that the MI6, FSB, MSS and Mossad are aware of it as well," says Slawek Ligier, vice president of engineering at computer security firm Barracuda Networks.

CLOSE

Skip in Skip

x

Embed

x

Share

WIKILEAKS RELEASES CIA'S CYBER TOOLKITFeds launch probe of WikiLeaks documents on alleged CIA hacking | 0:44

The Feds are opening up a criminal investigation into the latest document leak from WikiLeaks, while the FBI works to find the source of the leak. Veuer's Nick Cardona has the story. Buzz60

1 of 8

CLOSE

Skip in Skip

x

Embed

x

Share

WIKILEAKS RELEASES CIA'S CYBER TOOLKITWikiLeaks data dump likely came from contractors | 1:25

In the wake of WikiLeaks’ massive document dump belonging to the CIA, Washington is scrambling to figure out the source. Nathan Rousseau Smith (@fantasticmrnate) has the latest. Buzz60

2 of 8

CLOSE

Skip in Skip

x

Embed

x

Share

WIKILEAKS RELEASES CIA'S CYBER TOOLKITComey: Cyber threats against U.S. are 'enormous' | 1:17

At a conference on cyber security at Boston College, FBI Director James Comey said he plans to serve out his entire 10-year-term. He avoided discussing WikiLeaks or Russia, but said the cyber threats the nation faces 'are enormous.' (March 8) AP

3 of 8

CLOSE

Skip in Skip

x

Embed

x

Share

WIKILEAKS RELEASES CIA'S CYBER TOOLKITWikiLeaks gives consumers pause about security | 1:58

Alexander Heid, a research executive with SecurityScorecard, examines the WikiLeaks disclosures, and gives consumers advice about internet security. His company monitors risk and gives security ratings. (March 9) AP

4 of 8

CLOSE

Skip in Skip

x

Embed

x

Share

WIKILEAKS RELEASES CIA'S CYBER TOOLKITBrexit leader and Wikileaks founder meet in London | 0:39

Nigel Farage and Julian Assange meet at the Ecuadorian embassy in London. Veuer's Nick Cardona has the story. Buzz60

5 of 8

CLOSE

Skip in Skip

x

Embed

x

Share

WIKILEAKS RELEASES CIA'S CYBER TOOLKITWikiLeaks dump claims to show CIA hacking tools | 1:55

WikiLeaks says documents it obtained reveal that the CIA targeted everyday gadgets such as smartphones and personal computers as part of a surveillance program. (March 7) AP

6 of 8

CLOSE

Skip in Skip

x

Embed

x

Share

WIKILEAKS RELEASES CIA'S CYBER TOOLKITWikiLeaks reports 'largest ever' leak of CIA | 1:09

The website claims they have several hundred million lines of code from the CIA's hacking arsenal that includes damaging information. USA TODAY NETWORK

7 of 8

CLOSE

Skip in Skip

x

Embed

x

Share

WIKILEAKS RELEASES CIA'S CYBER TOOLKITWikileaks releases thousands of documents targeting the CIA | 0:54

Newly released documents by Wikileaks shows the CIA used software to hack everyday devices. Veuer's Nick Cardona has the story. Buzz60

8 of 8

Last VideoNext Video

Feds launch probe of WikiLeaks documents on alleged CIA hacking

WikiLeaks data dump likely came from contractors

Comey: Cyber threats against U.S. are 'enormous'

WikiLeaks gives consumers pause about security

Brexit leader and Wikileaks founder meet in London

WikiLeaks dump claims to show CIA hacking tools

WikiLeaks reports 'largest ever' leak of CIA

Wikileaks releases thousands of documents targeting the CIA

photo Next WikiLeaks worry: the release of the code images

photo of Next WikiLeaks worry: the release of the code

Article Next WikiLeaks worry: the release of the code compiled by Original article here

Relax Next WikiLeaks worry: the release of the code stories

WikiLeaks claims the CIA's spying tools can access 97 percent of smartphones

Encryption used by WhatsApp, Telegram and Signal is useless if devices are infected by spy tools.

Who is policing Facebook's secret groups?

While Facebook says it "removes content that promotes sexual violence," it can't keep track of every bad thing that is happening, experts agree.

Spending more than 2 hours on social media per day could make you feel isolated, study finds

The more time young adults spend using social media, the higher their chances of feeling socially isolated become, a new study has found.

WikiLeaks aftermath: Can you protect your phone or TV from spying?

As WikiLeaks raises concerns, here's a guide to protecting yourself from intrusion via your smart devices

Snapchat's International Women's Day filters spark Twitter debate

Snapchat's special filters, which represent famous women in history, have some users scratching their heads

Computers can now challenge — and beat — professional poker players at Texas hold 'em

First they figured out how to play checkers. Then they mastered chess. Now computers can challenge humans at the poker table — and win.

CIA's apparent hacking techniques revealed in data breach

Compared to the NSA revelations of Edward Snowden, which revealed the unprecedented reach of the federal government’s mass-surveillance program, documents released by Wikileaks Thursday don't offer

WikiLeaks says it will work with tech firms to defeat CIA hacking

WikiLeaks will work with technology companies to help defend them against the CIA's hacking tools, WikiLeaks founder Julian Assange said Thursday.

'Fake News' Is Also Plaguing The World Of Science

By David Mills The political arena isn’t the only place where “fake news” is being debated. Scientists are now speaking out about false infor...

Virtual reality to gold-sniffing camera: innovation on display at PDAC conference

Programmable bacteria, a gold-sniffing camera and a virtual reality tool for taking investors underground were among the innovations on display at the world's biggest annual mining convention in Toronto this week.

More stories

What you need to know about the new health care bill: an expert's view

Hedge funds opt for open source and AI goes 'fintech'

WikiLeaks claims the CIA's spying tools can access 97 percent of smartphones

Who is policing Facebook's secret groups?

Is the CIA really hacking into my devices? What should I do?

Neanderthal used early version of penicillin and aspirin

Donald Trump, U.S. intel battle after Michael Flynn ouster leaving allies around world unnerved

Russia tests U.S. with provocations on land, sea and air

Donald Trump brings ‘art of the deal’ to Middle East peace negotiations

North Koreans celebrate missile launch during festivities honoring Kim Jong-il

State, feds address cleanup at oil pipeline protest camp

Teachers open world to classrooms with virtual reality

Iran growing network to train foreign terrorists, dissident group says

Israel Palestinian two-state solution not a requirement under Donald Trump

Trump White House wrestles with a crush of crises

Man pleads guilty to buying rifles in San Bernardino attack

Pro-government tribal leader among dead in U.S. raid in Yemen

Tareck El Aissami, Venezuela vice president, rejects U.S. ‘drug kingpin’ sanctions

Listen: Emotional reunion for family reunited with deceased daughter's dog after cliff rescue

Comedian spends his day answering people's questions about International Men's Day

This woman was 'turned away from a job interview at Boots because she wasn’t dressed conservatively enough’

Will 2017 finally be the year of wearables?

EPA chief claims carbon dioxide is not a primary contributor to climate change, despite scientific consensus

I tried the new Go Cubes gummy caffeine bites — here's the verdict

ACCUWEATHER: A major storm may bury the Northeast with heavy snow next week

Archeologists found a statue buried in a Cairo slum that likely depicts the Pharaoh Ramses II

Congress just passed a bill that tells NASA to send humans to Mars by 2033

Americans are having less sex than ever, a sweeping sociological study finds

New research reveals secrets of how the ancient trade routes of the Silk Road were formed

Ancient tooth plaque reveals what our extinct human relatives really ate

Recent Post

  • Cows want to be outside as much as they want food
  • Coal plants are in 'freefall' amid declining demand overseas
  • Don't want internet providers to sell your info? Read on.
  • The dark web: Inside the hacker's playground
  • Burger King's new ad tries to triggers your Google Home, backfires
  • Another one bites the dust at Uber
  • Google hits back with pages of data after claims of pay inequality
  • Hoverboard blaze kills 2-year-old, marking first such fatality in U.S.
  • Google is tapping thousands of 'quality raters' to flag offensive results
  • House votes in favor of letting ISPs sell your browsing history
  • This 13-year-old hacker is showing top tech companies how to stay safe
  • Amazon drones are here, but not dropping off burritos quite yet
  • How Twitter's new slimmed down browsing experience works.
  • Apple's iOS 10 includes some little-known features
  • Yahoo's new male CEO will get twice Marissa Mayer's salary
  • Hackers are using a simple method to rip off Amazon sellers.
  • The star feature on Samsung's Galaxy S8 isn't quite ready yet
  • This rock star wants to make your Instagram even better
  • Schumer calls on Trump to veto measure barring online privacy rules
  • Radical shakeup of dinosaur family tree points to unexpected Scottish origins

Recent tech

  • Cows want to be outside as much as they want food
  • Coal plants are in 'freefall' amid declining demand overseas
  • Don't want internet providers to sell your info? Read on.
  • The dark web: Inside the hacker's playground
  • Burger King's new ad tries to triggers your Google Home, backfires
  • Another one bites the dust at Uber
  • Google hits back with pages of data after claims of pay inequality
  • Hoverboard blaze kills 2-year-old, marking first such fatality in U.S.
  • Google is tapping thousands of 'quality raters' to flag offensive results
  • House votes in favor of letting ISPs sell your browsing history
  • This 13-year-old hacker is showing top tech companies how to stay safe
  • Amazon drones are here, but not dropping off burritos quite yet
  • How Twitter's new slimmed down browsing experience works.
  • Apple's iOS 10 includes some little-known features
  • Yahoo's new male CEO will get twice Marissa Mayer's salary
  • Hackers are using a simple method to rip off Amazon sellers.
  • The star feature on Samsung's Galaxy S8 isn't quite ready yet
  • This rock star wants to make your Instagram even better
  • Schumer calls on Trump to veto measure barring online privacy rules
  • Comcast launches new wireless service, Xfinity Mobile

Home | Site Map | Contact US | privacy policy

Developed BY PACMS-V6.68