What Is the CIA Hack All About?
The danger lies in what might be coming next
By Philip Giraldi • Unz Review • March 14, 2017
The WikiLeaks exposure of thousands of documents relating to the Central Intelligence Agency’s (CIA) hacking program, which was expanded dramatically under President Barack Obama between 2013 and 2016, has created something of a panic in the users of cell phones, online computers and even for smart television viewers. The documents describe “more than a thousand hacking systems, trojans, viruses and other ‘weaponized’ malware” and one document even identifies attempts to enable CIA controllers to take control of automobiles that have “On Star” or similar satellite interactive features.
According to analysts who have gone through the documents, any electronic device that is connected to the internet is reported to be vulnerable to being taken over and “weaponized,” manipulated through its microphone or camera function even if it appears to be turned off. Apple, Google, Android and Microsoft products were among the technologies that were targeted, with the security systems being constantly probed for vulnerabilities. When a flaw was discovered it was described as “zero day” because the user would have zero time to react to the detection and exploitation of the vulnerability.
And they are indeed everywhere. Ron Paul has described a woman’s test on the Amazon marketed interactive voice controlled device called Alexa, asking it if it were reporting to the CIA. Alexa, which allegedly cannot tell a lie, refused to answer.
According to Wikipedia, “Alexa is an intelligent personal assistant developed by Amazon Lab126, made popular by the Amazon Echo. It is capable of voice interaction, music playback, making to-do lists, setting alarms, streaming podcasts, playing audiobooks, and providing weather, traffic, and other real time information.” One reviewer observed “In a good but scary feature, Amazon Echo can learn a person’s habits over time. It will get used to the way a person talks, his/her habits and routines and will save all the data in the cloud.”
Alexa demonstrates that CIA and NSA intrusion into the lives of ordinary people is not unique. In the cyber-sphere there are many predators. Amazon has apparently run special sales to get Alexa devices into as many homes as possible, presumably for commercial reasons, to have a machine in one’s home that will eventually replace the cookies on computers that collect information on what people are interested in buying. The company’s president Jeff Bezos also recently completed a deal worth $600 million for Amazon to provide cloud hosting services for the Agency. And there are, of course, two clear conflicts of interest in that deal as Bezos is selling a device that can be hacked by the government while he also owns The Washington Post newspaper, which, at least in theory, is supposed to be keeping an eye on the CIA.
But spying for profit and spying by the government are two different things and the WikiLeaks revelations suggest that the CIA has had a massive program of cyberespionage running for a number of years, even having created a major new division to support the effort called the Directorate for Digital Innovation, with an operation component called the Center for Cyber Intelligence. Media reports also suggest that a major hub for the operation was the American Consulate General in Frankfurt Germany, where the Agency established a base of operations.
First of all, it is necessary to make an attempt to understand why the CIA believes it needs to have the capability to get inside the operating systems of phones and other devices which rely on the internet. It should be pointed out that the United States government already has highly developed capabilities to get at phones and other electronics. It is indeed the principal raison d’etre of the National Security Agency (NSA) to do so and the FBI also does so when it initiates wiretaps during criminal and national security investigations.
Beyond that, since the NSA basically collects all electronic communications in the United States as well as more of the same fairly aggressively overseas, it would seem to be redundant for the CIA to be doing the same thing. The CIA rationale is that it has a different mission than the NSA. It exists to conduct espionage against foreign intelligence targets, which frequently requires being able to tap into their personal phones or other electronic devices by exploiting vulnerabilities in the operating systems. As the targets would be either sources or even prospective agents, the Agency would have to protect their identity in the highly compartmented world of intelligence, making outsourcing to NSA problematical.
This need to develop an independent capability led to the development of new technologies by the CIA working with its British counterparts. There were apparently successful efforts to target Samsung “smart” televisions, which would use their speakers to record conversations even when the set was turned off. The project was called “Weeping Angel,” and other hacking programs were called “Brutal Kangaroo,” “Assassin,” “Hammer Drill,” “Swindle,” “Fine Dining” and “Cutthroat,” demonstrating that government bureaucrats sometimes possess a dark sense of humor.
Being able to enter one’s home through a television would be considered a major success in the intelligence world. And the ability to access cell phones at source through obtaining full control of the operating system rather than through their transmissions means that any security system will be ineffective because the snoopers will be able to intrude and hear the conversation as it is spoken before any encryption is applied. CIA and its British allies were reportedly able to take control of either Android or i-Phones through vulnerabilities in their security systems by using their attack technologies.
WikiLeaks claims to have 8,761 documents detailing efforts to circumvent the security features on a broad range of electronic devices to enable them to be remotely tapped, the information having apparently been passed to WikiLeaks by a disgruntled government contractor, though the Russians are perhaps inevitably also being blamed. The U.S. government has apparently been aware of the theft of the information for the past year and one presumes it has both done damage control and is searching for the miscreant involved. Also, there have been security fixes on both Apple and Android phones in the past year that might well have rendered the attack technologies no longer effective.
So many will shrug and wonder what the big deal is. So the CIA is tapping into the electronics of suspected bad guys overseas. Isn’t that what it’s supposed to do? That question has to be answered with another question: How do we know if that is all the CIA is doing? Technology that can attack and take control of a telephone or television or computer overseas can also do the same inside the United States. And the Agency can always plausibly claim that a connection with a suspect overseas leads back to the U.S. to enable working on related targets on this side of the Atlantic.
Another issue is the possibility to engage in mischief, with potentially serious consequences. The WikiLeaks documents suggest that the CIA program called UMBRAGE had been able to acquire malware signatures and attack codes from Russia, China, Iran and other places. It does that so it can confuse detection systems and preserve “plausible denial” if its intrusion gets caught, disguising its own efforts as Russian or Chinese to cast the blame on the intelligence services of those countries. It has been alleged that the hack of the Democratic National Committee computers was carried out by Moscow employed surrogates and part of the evidence produced was signature malware that had left “fingerprints” linked to Russian military intelligence in Ukraine. What if that hack was actually done by the CIA for domestic political reasons?
Critics have also pointed out that President Obama in 2014 had come to an agreement with major communications industry executives to share with manufacturers information regarding the vulnerabilities in their systems so they could be addressed and made secure. This would have benefited both the industry and the general public. The agreement was obviously ignored in the CIA case and is just another sign that one cannot trust the government.
However, the real downside regarding the CIA hacking is something that might not even have occurred yet. It is an unfortunate reality that government spying operations largely lack regulation, oversight or any effective supervision by Congress or anyone else outside the agencies themselves. Even if knowledge about communications vulnerabilities has not been employed illegally against American targets or to mislead regarding domestic hacks, the potential to use those capabilities once they are in place will likely prove too hard to resist. As such, no home or work environment will any more be considered a safe place and it is potentially, if not actually, the greatest existing threat to Americans’ few remaining liberties.
Share this:
Related
March 14, 2017 - Posted by aletho | Civil Liberties, Corruption, Deception, Timeless or most popular | CIA, Human rights, NSA, Obama, UK, United States
No comments yet.
Featured Video
Ted Postol: Fraud of Missile Defence Exposed in Iran War
or go to
Aletho News Archives – Video-Images
Frlom the Archives
Containing the United States
By Edward S. Herman | Z Magazine | September 2016
“Containing the United States” is, of course, a ridiculous and self-contradictory idea in the U.S. and Western ideological and propaganda system. We all know that the United States had to “contain” the Soviet Union from 1945 to 1991, and since then has had the task of containing Russia and China. Only they threaten, bully, aggress and worry countries like Poland and Vietnam. Obama has had to reassure them both of our steadfast stand against Russian and Chinese military attacks. NATO has, of course, expanded greatly over the past several decades, despite the deaths of the Soviet Union and Warsaw Pact, but only to contain the renewed Russian — and Iranian, Libyan, Syrian and other — military threats; and we have “pivoted” to Asia, supported Japanese rearmament, bolstered our own forces in that area and jousted with the Chinese in their coastal waters solely to contain China. Earlier we had been obliged to contain North Vietnam, or was it the Soviet Union in Vietnam? Or China? Or “communism”? Or maybe all of them? Or none of them, but just needing an excuse to enlarge power?
The parallel propaganda has taken many forms. One is accepting as a premise that the United States only acts defensively and has no internal forces and interests that drive it to enlarge its sphere of control. I noted in an earlier article how Paul Krugman claims that internal Russian problems may well be the explanation of Russian “aggression,” but how at the same time it never occurs to him that the huge U.S. transnational corporate interests and “defense” establishment, and the pro-Israel lobby’s activities, might possibly make for an expansionist dynamic here.2 This reflects the standard establishment perspective that we are good and only react to evil. This was the view sustaining and justifying the invasion and occupation of Iraq from 2003. That attack was taken here as not evil but a response to evil, even if involving lies and mistakes, hence not describable as “aggression.” … continue
Blog Roll
-
Join 2,450 other subscribers
Visits Since December 2009
- 7,407,076 hits
Looking for something?
Archives
Calendar
Categories
Aletho News Civil Liberties Corruption Deception Economics Environmentalism Ethnic Cleansing, Racism, Zionism Fake News False Flag Terrorism Full Spectrum Dominance Illegal Occupation Mainstream Media, Warmongering Malthusian Ideology, Phony Scarcity Militarism Progressive Hypocrite Russophobia Science and Pseudo-Science Solidarity and Activism Subjugation - Torture Supremacism, Social Darwinism Timeless or most popular Video War Crimes Wars for IsraelTags
9/11 Afghanistan Africa al-Qaeda Australia BBC Benjamin Netanyahu Brazil Canada CDC Central Intelligence Agency China CIA CNN Covid-19 COVID-19 Vaccine Donald Trump Egypt European Union Facebook FBI FDA France Gaza Germany Google Hamas Hebron Hezbollah Hillary Clinton Human rights Hungary India Iran Iraq ISIS Israel Israeli settlement Japan Jerusalem Joe Biden Korea Latin America Lebanon Libya Middle East National Security Agency NATO New York Times North Korea NSA Obama Pakistan Palestine Poland Qatar Russia Sanctions against Iran Saudi Arabia Syria The Guardian Turkey Twitter UAE UK Ukraine United Nations United States USA Venezuela Washington Post West Bank WHO Yemen Zionism
Aletho News- When Tel Aviv decides, Washington fights
- Top official: Iran ready for a long war with US, no more diplomacy
- How Iran’s Toxic Rain Reveals US-Israel Discord
- Trump Admits He Is Destroying Iran For Israel
- Iran’s latest move in the GCC countries was a stroke of genius
- Blackmail and death threats, Zelensky embarrasses the EU, but there’s no condemnation
- Israel threatens to kill Iran’s new leadership
- Possible Scenarios for the Middle East
- The Horizon of the War. “Italy is being Dragged Into the War against Iran”
- A Second Vietnam War? Hanoi Waits and Prepares
If Americans Knew- Corporate Media Go All Out To Support The US-Israeli War On Iran
- US-Israel war on Iran is creating a steady growing number of amputees
- Israel planned this war on Iran for 40 years. Everything else is a smoke screen
- The wrong question about the war in Iran
- ‘Your Tax Dollars Being Used to Raise Your Gas Prices’: US-Israel Bomb Major Iranian Oil Depots
- ‘Bogus Evidence’: Former Nuclear Watchdog Head Debunks US Justification for Iran War
- EXPLAINER – Dimona: What to know about Israel’s nuclear site
- Fires and toxic air in Iran (thanks, Israel) – Not a ceasefire Day 150
- At Israel’s hands, Iran is burning, Lebanon and Gaza are crumbling – Not a ceasefire Day 149
- Israel is using the ‘Gaza doctrine’ in Lebanon and Iran
No Tricks Zone- Wake-up Call: Survey Shows Majority Of Germans Now Favor Postponing Climate Targets!
- Televised! Leading German Political Candidate Tells Schoolchildren CO2 Makes Sun Hotter!
- New Study: A Century Warming Of 1.1°C Is ‘Commonplace’ And ‘Not Unusual’ During This Interglacial
- New Study: ‘Internal Noise’ And Volcanic Forcing Can Trigger 10-15°C Warming Within Decades
- Glaciers Worldwide Are Suddendly Surging, Experts Blame Warming!
- Surprising Discovery: Sahara Is Greening…Billions Of Trees Where Once Thought To Be Barren
- New Research Reaffirms Clouds, Aerosols, And Surface Solar Radiation Are ‘Driving The Climate System’
- Germany: Electric Car Catches Fire At Charging Station, Sets Off Local “Inferno”, Widespread Damage
- New Study: Canada’s New Brunswick Was 1°C Warmer Than Today During The Medieval Warm Period
- Coal Power Back In Trend As Globe Tries To Keep Pace With Growing Demand For Power
Contact:
atheonews (at) gmail.com
Disclaimer
This site is provided as a research and reference tool. Although we make every reasonable effort to ensure that the information and data provided at this site are useful, accurate, and current, we cannot guarantee that the information and data provided here will be error-free. By using this site, you assume all responsibility for and risk arising from your use of and reliance upon the contents of this site.
This site and the information available through it do not, and are not intended to constitute legal advice. Should you require legal advice, you should consult your own attorney.
Nothing within this site or linked to by this site constitutes investment advice or medical advice.
Materials accessible from or added to this site by third parties, such as comments posted, are strictly the responsibility of the third party who added such materials or made them accessible and we neither endorse nor undertake to control, monitor, edit or assume responsibility for any such third-party material.
The posting of stories, commentaries, reports, documents and links (embedded or otherwise) on this site does not in any way, shape or form, implied or otherwise, necessarily express or suggest endorsement or support of any of such posted material or parts therein.
The word “alleged” is deemed to occur before the word “fraud.” Since the rule of law still applies. To peasants, at least.
Fair Use
This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more info go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.
DMCA Contact
This is information for anyone that wishes to challenge our “fair use” of copyrighted material.
If you are a legal copyright holder or a designated agent for such and you believe that content residing on or accessible through our website infringes a copyright and falls outside the boundaries of “Fair Use”, please send a notice of infringement by contacting atheonews@gmail.com.
We will respond and take necessary action immediately.
If notice is given of an alleged copyright violation we will act expeditiously to remove or disable access to the material(s) in question.
All 3rd party material posted on this website is copyright the respective owners / authors. Aletho News makes no claim of copyright on such material.

Leave a comment