March 09, 2017
from
MoonOfAlabama Website
The
WikiLeaks stash of CIA hacking documents
shows tools used by the CIA to hack individual cell-phones and
devices.
There are no documents
yet that suggest mass snooping efforts on a very large scale. Unlike
the
NSA which has a "collect it all" attitude towards
internet traffic and content the CIA seems to be more interested in
individual hacking.
This suggests that the CIA can not decipher the modern encrypted
communication it adversaries use. It therefore has to attack their
individual devices.
But it does not mean that the CIA can not engage in mass snooping.
The New York Times
description is wrong:
Some technical
experts pointed out that while the documents suggest that the
CIA might be able to compromise individual smartphones, there
was no evidence that the agency could break the encryption that
many phone and messaging apps use.
If the CIA or the National Security Agency (NSA) could routinely
break the encryption used on such apps as Signal, Confide,
Telegram and WhatsApp, then the government might be able to
intercept such communications on a large scale and search for
names or keywords of interest.
But nothing in the
leaked CIA documents suggests that is possible.
Instead, the documents indicate that because of encryption, the
agency must target an individual phone and then can intercept
only the calls and messages that pass through that phone.
Instead of casting a
net for a big catch, in other words, CIA spies essentially cast
a single fishing line at a specific target, and do not try to
troll an entire population.
"The difference
between wholesale surveillance and targeted surveillance is
huge," said Dan Guido, a director at Hack/Secure, a
cybersecurity investment firm.
"Instead of
sifting through a sea of information, they’re forced to look
at devices one at a time."
Snake-oil alert:
Right diagnosis,
wrong conclusion and therapy...
If the CIA breaks into an
individual Samsung Galaxy 7 it can record what is typed on the
screen, and whatever gets transferred via the microphone, camera and
loudspeaker. No encryption can protect against that.
But why should the CIA
break into only one Galaxy 7?
It is wrong to conclude that the CIA can therefore not,
"intercept such
communications on a large scale".
It can. Easily...
If you can break into one individual Samsung Galaxy 7 you can break
into all of them. This can be automated.
The CIA also breaks into internet routers and network infrastructure
systems. By watching the network traffic flowing by the CIA (and NSA)
systems can "see" who uses encrypted communication. They can then
launch programs to silently take over the communicating devices.
Then the communication
can be recorded from the devices and read in the clear.
There is nothing at all
that prohibits this to take place on a massive scale. The reaction
to
the Snowden leaks about
gigantic NSA snooping on internet lines led to an increased use of
encryption.
Suddenly everyone used
HTTPS for web traffic and the user numbers of,
-
Signal
-
Telegram
-
WhatsApp,
...and other encrypting
communication applications exploded.
But encrypted traffic still sticks out.
-
One can detect an
encrypted Skype call by watching the network traffic on this
or that telecom network.
-
One can detect
what kind of end-devices are taking part in a specific call.
With a library of attack tools for each of the usual
end-devices (Iphone, Android, Windows, Mac) the involved
end-devices can be silently captured and the call can be
recorded without encryption.
The Times writes:
"Instead of casting a
net for a big catch, in other words, CIA spies essentially cast
a single fishing line at a specific target, and do not try to
troll an entire population."
It is right in one sense.
There is not one central point in the river of traffic where one
casts the net.
But it is wrong in to
conclude that the CIA or other services would then use "a single
fishing line".
What hinders them from
using hundreds of fishing lines? Thousands? Hundred-thousands?
Wide use on encryption simply moves the snooping efforts from the
networks towards the end-devices. It might be a little more
expensive to snoop on hundred-thousands of end-devices than on a few
network backbones but budget or manpower restriction are not a
problem the NSA and CIA have had in recent decades.
To tell users that encryption really restricts the CIA and NSA is
nonsense. Indeed it is irresponsible.
The sellers of encryption are peddling snake-oil. The
dude from "a cybersecurity investment firm" the Times quotes is just
selling his rancid wares.
Your neighbor snoops on your open WLAN traffic? Yes, chat encryption
might prevent him from copying your session with that hot Brazilian
boy or girl. But it does not prevent professionals from reading it.
For that you would need
secure devices on both ends of the communication.
Good luck finding such...
|