Reason.com - Free Minds and Free Markets
Reason logo Reason logo
  • Latest
  • Magazine
    • Current Issue
    • Archives
    • Subscribe
    • Crossword
  • Video
  • Podcasts
    • All Shows
    • The Reason Roundtable
    • The Reason Interview With Nick Gillespie
    • The Soho Forum Debates
    • Just Asking Questions
    • The Best of Reason Magazine
    • Why We Can't Have Nice Things
  • Volokh
  • Newsletters
  • Donate
    • Donate Online
    • Donate Crypto
    • Ways To Give To Reason Foundation
    • Torchbearer Society
    • Planned Giving
  • Subscribe
    • Reason Plus Subscription
    • Print Subscription
    • Gift Subscriptions
    • Subscriber Support

Login Form

Create new account
Forgot password

Cybersecurity

CIA Leak Shows How We're Losing Both Privacy and Security with Tech Data

Agency hoards infiltration tools and puts our information at risk of exposure.

Scott Shackford | 3.8.2017 2:00 PM

Share on FacebookShare on XShare on RedditShare by emailPrint friendly versionCopy page URL
Media Contact & Reprint Requests
Large image on homepages | Richard B. Levine/Newscom
(Richard B. Levine/Newscom)
surveillance
Richard B. Levine/Newscom

Consider this: The actual details about certain CIA cybersurveillance tools and hacking programs making it out into the public sphere aren't as important as we think. That the fact these details leaked in the first place is what matters. That our intelligence agencies cannot expect to keep their practices secret from the public at large (and other nations) should influence policy decisions on how much information they collect and how they prioritize infiltrating devices over revealing security risks.

After WikiLeaks dumped thousands of documents about CIA surveillance and cyberespionage techniques Tuesday, Ed Krayewski looked through and summarized some of the more notable discoveries. There have been some responses that maybe overstate what the CIA is doing based on at least what's in these documents. The use of surveillance through smart televisions, for example, requires a person to physically interact with the television in order to install malware. There is no evidence that CIA snoops can simply access the camera in any Samsung smart television.

So maybe the information from this leak is itself not particularly shocking. The CIA is doing largely what people expect them to do. That doesn't mean there's nothing important we should be learning from this info dump. Julian Sanchez, a Cato senior fellow who writes and speaks on surveillance issues and is a founding editor of Just Security, spoke to Reason (via Twitter direct messages) about the greater implications of the dump.

The CIA documents demonstrated an emphasis on data and device infiltration over security and the desire to keep "zero day" exploits (security weaknesses the device or software creator doesn't initially know exists) to themselves to aid in surveillance. Except, as this latest leak demonstrates, the CIA may not actually be good at keeping these exploits secure. And that creates more cybersecurity vulnerabilities for everybody because the CIA isn't informing companies about holes in their devices and programs.

"Many of us have been saying for a while that the default really ought to be quite prompt disclosure, because on net the security gain from closing vulnerabilities—defense against attacks against Americans—is likely to be greater than the value of the intelligence gleaned from maintaining the access," Sanchez says. "And I think that holds even if we're just talking about the risk of a hacker or foreign intel service independently discovering the same leak."

It's not unlike the fight over encryption "backdoors," deliberately designed mechanisms to access the data of a device or program by bypassing its security systems. Government officials want to use backdoors to access data for investigations of crime or terrorism. But there's no such thing as an encryption bypass that only the "right" people can use. Just like zero day exploits, anybody with the right knowledge—regardless of whether they have good or ill intent—would be able to exploit an encryption backdoor.

If even the secretive CIA cannot keep the details of its exploits out of the hands of Wikileaks, then we've surrendered both privacy and security for the benefit of the intelligence community's desire to collect information. Sanchez notes that "when you add what appears to be a very real problem of the actual tools we develop—weaponized vulnerabilities—making it into the wild, the risk of opting for retention over disclosure is even greater."

The leak should also be a reminder that when the federal government snoops, collects, and stores data about everybody, there's also the risk of that information "making it into the wild." We already saw this under President Barack Obama's administration when the private personnel data on millions of federal employees was compromised. The more information the government has, the greater potential for harms from other compromises.

But it's unclear right now whether any of these concepts or concerns will play any role in this post-leak analysis. Right now the emphasis is on who is responsible for the leaks ("Was it Russia? Was it? It was Russia, wasn't it? Tell us if it was Russia.") and the embarrassment the CIA must feel over the leak.

Start your day with Reason. Get a daily brief of the most important stories and trends every weekday morning when you subscribe to Reason Roundup.

This field is for validation purposes and should be left unchanged.

NEXT: University of Lincoln's Conservative Student Group Censored for Complaining About Censorship

Scott Shackford is a policy research editor at Reason Foundation.

CybersecuritySurveillanceCentral Intelligence AgencyPrivacyEncryptionCellphones
Share on FacebookShare on XShare on RedditShare by emailPrint friendly versionCopy page URL
Media Contact & Reprint Requests

Hide Comments (33)

Editor's Note: As of February 29, 2024, commenting privileges on reason.com posts are limited to Reason Plus subscribers. Past commenters are grandfathered in for a temporary period. Subscribe here to preserve your ability to comment. Your Reason Plus subscription also gives you an ad-free version of reason.com, along with full access to the digital edition and archives of Reason magazine. We request that comments be civil and on-topic. We do not moderate or assume any responsibility for comments, which are owned by the readers who post them. Comments do not represent the views of reason.com or Reason Foundation. We reserve the right to delete any comment and ban commenters for any reason at any time. Comments may only be edited within 5 minutes of posting. Report abuses.

  1. $park? don't care bout yo mom   8 years ago

    ABOOT TYME SHACKLEFRAUD!

    1. $park? don't care bout yo mom   8 years ago

      Sorry, I wanted to beat everyone else.

      1. esteve7   8 years ago

        I "second" that

        ...

        I'll just let myself out

  2. $park? don't care bout yo mom   8 years ago

    That our intelligence agencies cannot expect to keep their practices secret from the public at large (and other nations) should influence policy decisions on how much information they collect and how they prioritize infiltrating devices over revealing security risks.

    Should, but won't. Ed Snowden is still being a heroic hero over in Russia and nothing he did mattered either.

    1. SomeGuy   8 years ago

      Again the solution to this is to write an amendment that states all government documents are public record when its government internal work and information on a citizen (foreign nation data can stay secret if needed).

      People would start to give a shit when their credit card purchases, drug prescriptions, medical records, photos, texts, phone calls, location data, income, skype videos, nudies, and everything was posted on a governments website for public record.

      Problem fucking solved.

  3. Fatty Bolger   8 years ago

    I dunno, still seems like kind of a big deal that they can do all this stuff right here with nothing but a secret warrant. At least we hope they're getting warrants. Because how would we ever actually know? They're SECRET.

    But point taken. If they can't secure their own secrets, how are they supposed to secure everybody else's? Not that they give a damn about that.

  4. zopibatuxo   8 years ago

    My Uncle Nolan recently got Infiniti G Sedan by working part-time from a macbook... go to
    the website............. https://tinyurl.com/5days-job

  5. Not a True MJG   8 years ago

    Oh, Shackford, you're my favori--

    spoke to Reason (via Twitter direct messages)

    You're dead to me.

  6. $park? don't care bout yo mom   8 years ago

    embarrassment the CIA must feel over the leak.

    Why would they be embarrassed? At most I could see them having some poor schmoe fall on his sword then they'll wipe their hands and walk away. Scott free, so to speak.

  7. Fuck You - Cut Spending   8 years ago

    the private personnel data on millions of federal employees was compromised.

    But did any of them lose their lives over it? If not, why not?

  8. Zeb   8 years ago

    Shut up, Scott. We all know that Reason hates Julian Assange and Wikileaks because he hurt Hillary. You aren't fooling anyone.

  9. DanO.   8 years ago

    I for one have stopped using my phone, TV and computer, because Assange.
    This is huge.

  10. grrizzly   8 years ago

    Right now the emphasis is on who is responsible for the leaks ("Was it Russia? Was it? It was Russia, wasn't it? Tell us if it was Russia.")

    It's good to be Russian.

  11. Ken Hagler   8 years ago

    "The use of surveillance through smart televisions, for example, requires a person to physically interact with the television in order to install malware. There is no evidence that CIA snoops can simply access the camera in any Samsung smart television."

    Of course if they wanted to there's nothing stopping them from installing the malware as soon as the TVs are unloaded on the dock, or even at the factory where they're made.

    1. Fuck you, Shikha (Nunya)   8 years ago

      Who says they don't have the private keys to all the certificate authorities that you rely on to keep transactions secure? I no longer trust any technology, and I work in technology.

      Fuck it, we're screwed.

  12. John   8 years ago

    The reality is you have no privacy or security online beyond dumb luck. These tools exist and they are not going away. And no matter how secure you make something, someone will always be able to crack it. Go ahead and shut down the CIA if you like. But doing that won't stop other nations or parties from using these tools.

    The only way to restore privacy and security is to go back to an analog system to some degree. If you are worried about privacy, you should be working to protect the existence of cash, the postal system and other analog ways of doing business and living that exist outside of the digital world and thus cannot be as easily compromised and controlled.

    Libertarians need to understand their pavlovian love of all technology is the road to ruin. Do you want your freedom and your privacy or do you want to live in a digital gilded cage? Those are the choices. And no amount of fantasizing about bitcoin and the next great encryption technology is going to change that.

    1. CE   8 years ago

      The postal system -- good one. You think they can't read your mail?

      1. Acosmist   8 years ago

        You can use unbreakable codes via snail mail. Just have a mental disorder and say random shit. works for me

  13. Aloysious   8 years ago

    The CIA is doing largely what people expect them to do.

    Waste munny and screw everything up?

    1. John   8 years ago

      It is what they have been doing for over 60 years now. Why wouldn' that be what people expect them to do?

  14. Free Society   8 years ago

    Right now the emphasis is on who is responsible for the leaks ("Was it Russia? Was it? It was Russia, wasn't it? Tell us if it was Russia.") and the embarrassment the CIA must feel over the leak.

    And here I thought the CIA learned to love leaks.

  15. Jerryskids   8 years ago

    You know Wikileaks is a CIA disinformation operation, right? They want you to think they can watch you anywhere, anytime, but the reality is these people are so dumb they need to read the instructions to operate a spoon.

    1. John   8 years ago

      You make a great point Jerry. There is no way to know if wiklleaks isn't a CIA run disinformation program. And even if it is not, there is no way to know if this leak isn't just disinformation.

      And I am inclined to agree with you that they are more incompetent than anything else.

    2. SomeGuy   8 years ago

      they can though...its been public knowledge for 1-4 decades to varying degrees. The tech exists and they control it. Your an idiot if you think otherwise.

  16. CE   8 years ago

    There is no evidence that CIA snoops can simply access the camera in any Samsung smart television.

    If there's a camera and an internet connection, consider it hacked.

    One more reason to just say no to the Internet of Things turning your house into surveillance zone.

    1. Fuck you, Shikha (Nunya)   8 years ago

      It's the Internet of Shit, in my opinion. And I agree. Consider everything tainted. Everything.

    2. SomeGuy   8 years ago

      This is very true. Hackers have shown they can infect and control and send anything they want off your phone without your knowledge.

      Hell Even fox has a short segment on this.

  17. masuturu   8 years ago

    ??????O .til I saw the receipt that said $6460 , I did not believe ...that...my mother in law wiz like they say actually earning money in their spare time from their computer. . there aunt started doing this for under thirteen months and recently clears the adepts on there mini mansion and blurt a great Aston Martin DBL . go to this website.... ..????????????____BIG.EARN .MONEY.___???????-

  18. kemi   8 years ago

    as Charlotte replied I am stunned that anyone able to make $8016 in four weeks on the internet . ??????O Big Job Big Currency

  19. milly8522852   8 years ago

    I am using it now & it's awesome! I've signed up for my account and have been bringing in fat paychecks. For real, my first week I made ?350 and the 2nd week I doubled it & then it kinda snowballed to ?150 a day! just folllow the course.. they will help you out

    ================> http://MaxNet80.com

  20. viwames   8 years ago

    like Elizabeth implied I'm amazed that a stay at home mom able to earn $7417 in 4 weeks on the internet . read here............. (((( http://www.net.jobs34.com ))))

  21. fiyehid   8 years ago

    Most of us want to have good income but dont know how to do that on Internet there are a lot of methods to earn huge sum, but whenever Buddies try that they get trapped in a scam/fraud so I thought to share with you a genuine and guaranteed method for free to earn huge sum of money at home anyone of you interested should visit the page. I am more than sure that you will get best result. Best Of Luck for new Initiative!

    ,,,,,,,,,,,,,,,,,,,,,,,,, http://www.moneytime10.com

  22. Longtobefree   8 years ago

    Wisdom from my grandmother:
    A secret is something known to only one person.

    Cold hard facts, from my security briefing:
    1. The possibility of a leak goes up as the square of the number of people who know a secret. (probably BS, but they say it)
    2. You cannot keep what we are doing from getting out. We can, however, make it take so much time and resources that by the time it is confirmed, it is too late to stop us.

    My grandmother had a better grasp of secrets.

Please log in to post comments

Mute this user?

  • Mute User
  • Cancel

Ban this user?

  • Ban User
  • Cancel

Un-ban this user?

  • Un-ban User
  • Cancel

Nuke this user?

  • Nuke User
  • Cancel

Un-nuke this user?

  • Un-nuke User
  • Cancel

Flag this comment?

  • Flag Comment
  • Cancel

Un-flag this comment?

  • Un-flag Comment
  • Cancel

Latest

James Comey's Deleted '86 47' Instagram Post Is Obviously Protected by the First Amendment

Billy Binion | 5.16.2025 4:48 PM

New Montana Law Blocks the State From Buying Private Data To Skirt the Fourth Amendment

Joe Lancaster | 5.16.2025 4:05 PM

Trump's Tariffs Are Sapping Small Business Optimism

Autumn Billings | 5.16.2025 12:00 PM

Andor Is a Star Wars Show About the Brutality of Bureaucracy

Peter Suderman | 5.16.2025 10:10 AM

Quality Seeds

Liz Wolfe | 5.16.2025 9:31 AM

Recommended

  • About
  • Browse Topics
  • Events
  • Staff
  • Jobs
  • Donate
  • Advertise
  • Subscribe
  • Contact
  • Media
  • Shop
  • Amazon
Reason Facebook@reason on XReason InstagramReason TikTokReason YoutubeApple PodcastsReason on FlipboardReason RSS

© 2024 Reason Foundation | Accessibility | Privacy Policy | Terms Of Use

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

r

Do you care about free minds and free markets? Sign up to get the biggest stories from Reason in your inbox every afternoon.

This field is for validation purposes and should be left unchanged.

This modal will close in 10

Reason Plus

Special Offer!

  • Full digital edition access
  • No ads
  • Commenting privileges

Just $25 per year

Join Today!