Showing posts with label intelligence gathering. Show all posts
Showing posts with label intelligence gathering. Show all posts

Saturday, April 1, 2017

WikiLeaks’ latest release of CIA cyber-tools could blow the cover on agency hacking operations; Washington Post, March 31, 2017

Ellen Nakashima, Washington Posr; WikiLeaks’ latest release of CIA cyber-tools could blow the cover on agency hacking operations

"WikiLeaks’ latest disclosure of CIA cyber-tools reveals a technique used by the agency to hide its digital tracks, potentially blowing the cover on current and past hacking operations aimed at gathering intelligence on terrorists and other foreign targets.

The release Friday of the CIA’s “Marble Framework” comes less than a month after the WikiLeaks dumped onto the Internet a trove of files — dubbed “Vault 7” — that described the type of malware and methods the CIA uses to gain access to targets’ phones, computers and other electronic devices...

WikiLeaks, founded by Julian Assange, has sought to position itself as a champion of transparency and defender of privacy rights. It described the Marble Framework as “the digital equivalent of a specialized CIA tool to place covers over the English language text on U.S. produced weapons systems before giving them to insurgents secretly backed by the CIA.”"

Wednesday, March 8, 2017

With WikiLeaks Claims of C.I.A. Hacking, How Vulnerable Is Your Smartphone?; New York Times, March 7, 2017

Steve Lohr and Katie Benner, New York Times; 

With WikiLeaks Claims of C.I.A. Hacking, How Vulnerable Is Your Smartphone?


"If the documents are accurate, did the C.I.A. violate commitments made by President Barack Obama?

In 2010, the Obama administration promised to disclose newly discovered vulnerabilities to companies like Apple, Google and Microsoft. But the WikiLeaks documents indicate that the agency found security flaws, kept them secret and then used them for surveillance and intelligence gathering.

Why is it so hard to keep these cyberweapons under wraps?

Unlike nuclear weapons, which can be guarded and protected, cyberweapons are “just computer programs which can be pirated like any other,” WikiLeaks notes. “Since they are entirely comprised of information they can be copied quickly with no marginal cost.”

There is a growing black market dedicated to trading these weapons, and government agencies from around the world will pay well for their discovery."

Sunday, October 9, 2016

Surveillance in the Post-Obama Era; New York Times, 10/8/16

Editorial Board, New York Times; Surveillance in the Post-Obama Era:
"One big issue is what to do when a key provision of the law that gives the N.S.A. the authority to collect the electronic communications of foreigners — which inevitably sucks in their correspondence with Americans — expires at the end of 2017. Before reauthorizing that part of the law, Section 702 of the Foreign Intelligence Surveillance Act, the next president and Congress should craft a more narrow authority that ensures that the data of Americans cannot be searched without a warrant.
How best to respond to encryption technology, which is evolving rapidly, will be another major challenge...
The next president needs to take the initiative early on to outline a responsible philosophy and approach toward surveillance and privacy issues. Even if that happens, Congress still needs to be more assertive than in the past in setting clear parameters to ensure that intelligence gathering programs are legally sound and effective. It would be a shame if it took a new whistle-blower to force what should be a continuing, vigorous debate."