WIKILEAKS’ latest data dump, the Vault 7, purporting to reveal the Central Intelligence Agency’s hacking tools, appears to be something of a dud. If you didn’t know before that spy agencies could apply these tools and techniques, you’re naive, and if you think it undermines the attribution of hacker attacks on the Democratic National Committee and other targets, you’ll be disappointed.

On the surface, the dump — touted by Wikileaks as the biggest ever publication of confidential CIA documents — offers some explosive revelations. They’re all over the news pages: the CIA is able to use your Samsung smart TV to eavesdrop on you! The CIA can get into your iPhone or Android device, as well as your Windows, Mac or Linux PC, and harvest your communications before they are encrypted! No encryption app — not even the Edward Snowden favourite, Signal, or WhatsApp, which uses the same encryption — is safe! The CIA hoards “zero day” vulnerabilities — weaknesses not known to the software’s vendors — instead of revealing them to the likes of Google, Apple and Microsoft! CIA hackers use obfuscation tools to pretend its malware was made by someone else, including Russian intelligence! There’s even a Buzzfeed story quoting current and former US intelligence officers that the dump is “worse than Snowden’s”.

There is little content in the dump to support these panicky reactions. Nothing in it indicates that the CIA has broken messenger encryption, as Open Whisper Systems, the software organisation responsible for Signal, has been quick to point out. The CIA can read messenger communications only if it plants malware on a specific phone or computer; then it can harvest keystrokes and take screenshots. This is not about mass surveillance — something that should bother the vast majority of internet users — but about monitoring specific targets. Open Whisper Systems tweeted on March 7: “Ubiquitous e2e encryption is pushing intelligence agencies from undetectable mass surveillance to expensive, high-risk, targeted attacks.”

It’s not much of a secret that using a hacked phone or computer renders end-to-end encryption useless. It was the essence of Apple’s dispute with the FBI last year, when the company wouldn’t help it get into a phone owned by San Bernardino shooter Syed Rizwan Farook.

The Big Brother-style implications of a hacked Samsung TV are undermined by the nature of the documents that describe the hack. The CIA needs physical access to the TV set to weaponise it. Robert Graham, founder of Errata Security, wrote on the firm’s blog: “The docs are clear that they can update the software running on the TV using a USB drive. There’s no evidence of them doing so remotely over the internet. If you aren’t afraid of the CIA breaking in an installing a listening device, then you shouldn’t be afraid of the CIA installing listening software.”

The obfuscation story is similarly unimpressive. The Wikileaks cache contains a manual for CIA hackers on making their malware harder to trace, for example, by adding foreign languages. Wikileaks also said that the CIA “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation”. The library, however, contains all sorts of publicly available malware, as well as samples tentatively attributed to foreign intelligence services; all that does is confirm that hackers, including CIA ones, aren’t picky about the origins of the products they use. The important thing is that the malware should work.

This shouldn’t affect serious attempts to attribute hacker attacks. I’m not sure this is fully understood within the US intelligence community itself — at any rate, the declassified report on Russian hacking it released late last year appeared to base attribution on the use of specific publicly available malware. But industry experts usually need much more evidence. A number of possible Russian attacks were attributed to Moscow’s intelligence services because the attackers used specific command and control centres — servers — to collect information from various Russia adversaries. To set up a false flag operation, the CIA would need to go much further than obfuscating the origins of its malicious code.

So all the jubilant tweets from Trump supporters declaring the CIA was behind the “Russian hacks” are at least premature and probably inaccurate. To suspect a false flag operation on this scale is to believe in a conspiracy theory not backed by any publicly available evidence. (That said, the attribution of the attacks to the Kremlin isn’t definitive, either.)

To Snowden, the biggest story about “Vault 7” is that US intelligence services have purchased software vulnerabilities so it could use them to spy on people, when, in the interests of public safety, it should have turned over the information to the makers of the software. Otherwise — and Wikileaks makes a big deal of it — anyone can use the vulnerabilities, from foreign intelligence to teenage hackers. Indeed, the cache clearly indicates that “zero days” are purchased by intelligence agencies and shared among the CIA, the National Security Agency and UK’s GCHQ. And it is a major risk not to tell the software vendors about them.

Yet it’s naive to expect spies to act in any other way. The agencies won’t buy vulnerabilities to turn them over to Google, Apple or Cisco — the companies themselves are supposed to do this if they’re interested in the security of their products. The spies need the vulnerabilities to do their own work.

None of this is to say that “Vault 7” isn’t damaging to the CIA. It reveals a somewhat lower level of technological sophistication than can be expected from a US intelligence agency — unlike Snowden’s NSA cache. It gives foreign intelligence services an insight into the specific methods used by the CIA and probably sets off a distracting, morale-destroying hunt for the leaker. It puts the CIA on the defensive, makes it look weak and thus helps President Donald Trump in his public battle with the intelligence community. Since the CIA documents appear genuine, it’ll only strengthen a sense that Russia — and perhaps other foreign powers — have penetrated the US intelligence community and disarmed its cyber operations.

Revealing more evidence of Russian interference in the 2016 election campaign would probably help the intelligence agencies to redeem themselves. It’s time for them to go beyond innuendo and anonymous leaks — they can’t beat Julian Assange at that game.

By arrangement with Bloomberg-The Washington Post

Published in Dawn, March 9th, 2017

Opinion

Editorial

Military convictions
Updated 22 Dec, 2024

Military convictions

Pakistan’s democracy, still finding its feet, cannot afford such compromises on core democratic values.
Need for talks
22 Dec, 2024

Need for talks

FOR a long time now, the country has been in the grip of relentless political uncertainty, featuring the...
Vulnerable vaccinators
22 Dec, 2024

Vulnerable vaccinators

THE campaign to eradicate polio from Pakistan cannot succeed unless the safety of vaccinators and security personnel...
Strange claim
Updated 21 Dec, 2024

Strange claim

In all likelihood, Pakistan and US will continue to be ‘frenemies'.
Media strangulation
Updated 21 Dec, 2024

Media strangulation

Administration must decide whether it wishes to be remembered as an enabler or an executioner of press freedom.
Israeli rampage
21 Dec, 2024

Israeli rampage

ALONG with the genocide in Gaza, Israel has embarked on a regional rampage, attacking Arab and Muslim states with...