Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

JHan

(10,173 posts)
Fri Mar 10, 2017, 09:28 AM Mar 2017

The truth about the wikileaks CIA cache..

by Zeynep Tufekci

Yet on closer inspection, this turned out to be misleading. Neither Signal nor WhatsApp, for example, appears by name in any of the alleged C.I.A. files in the cache. (Using automated tools to search the whole database, as security researchers subsequently did, turned up no hits.) More important, the hacking methods described in the documents do not, in fact, include the ability to bypass such encrypted apps — at least not in the sense of “bypass” that had seemed so alarming. Indeed, if anything, the C.I.A. documents in the cache confirm the strength of encryption technologies.

What had gone wrong? There were two culprits: an honest (if careless) misunderstanding about technology on the part of the press; and yet another shrewd misinformation campaign orchestrated by WikiLeaks.


Security experts I spoke with, however, stressed that these techniques appear to be mostly known methods — some of them learned from academic and other open conferences — and that there were no big surprises or unexpected wizardry.In other words, the cache reminds us that if your phone is hacked, the Signal or WhatsApp messages on it are not secure. This should not come as a surprise. If an intelligence agency, or a nosy sibling, can get you to install, say, a “key logger” on your phone, either one can bypass the encrypted communication app.

Which brings us to WikiLeaks’ misinformation campaign. An accurate tweet accompanying the cache would have said something like, “If the C.I.A. goes after your specific phone and hacks it, the agency can look at its content.” But that, of course, wouldn’t have caused alarm and defeatism about the prospects of secure conversations.

We’ve seen WikiLeaks do this before. Last July, right after the attempted coup in Turkey, WikiLeaks promised, with much fanfare, to release emails belonging to Turkey’s ruling Justice and Development Party. What WikiLeaks ultimately released, however, was nothing but mundane mailing lists of tens of thousands of ordinary people who discussed politics online. Back then, too, the ruse worked: Many Western journalists had hyped these non-leaks.


6 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies

JHan

(10,173 posts)
2. Yes and what's tragic is people fall for it time and time again...
Fri Mar 10, 2017, 09:40 AM
Mar 2017

They prime minds to accept their false narratives.

DetlefK

(16,423 posts)
4. I've seen enough of those people here on DU.
Fri Mar 10, 2017, 09:45 AM
Mar 2017

Shining heroes in search of an enemy that justifies their self-proclaimed status as heroes. They need the world to be black&white, good&evil, because otherwise they would be boring nobodies who spend too much time on the internet.

 

randome

(34,845 posts)
5. Exactly. Capability is not the same as illegality. Too many can't see the difference.
Fri Mar 10, 2017, 09:53 AM
Mar 2017

For instance, I have the capability of walking into a mall and shooting bystanders. Does that make me a threat needing to be dealt with?
[hr][font color="blue"][center]No squirrels were harmed in the making of this post. Yet.[/center][/font][hr]

Latest Discussions»General Discussion»The truth about the wikil...