Click amount to donate direct to CounterPunch
  • $25
  • $50
  • $100
  • $500
  • $other
  • use PayPal
Please Support CounterPunch’s Annual Fund Drive
We don’t run corporate ads. We don’t shake our readers down for money every month or every quarter like some other sites out there. We only ask you once a year, but when we ask we mean it. So, please, help as much as you can. We provide our site for free to all, but the bandwidth we pay to do so doesn’t come cheap. All contributions are tax-deductible.
FacebookTwitterGoogle+RedditEmail

WikiLeaks, “Year Zero” and the CIA Hacking Files

“It is now up to the device and OS manufacturers, like Apple, Google, or Samsung, to fix their volcanoes back into mountains.” — Telegram Statement, Mar 8, 2017

The paradox with information releases that expose a supposedly grand internal stratagem is that they merely provide the food of confirmation otherwise lacking. Such food is potent. It blows the lid off the suggestion that a conspiracy theorist was merely a Cassandra in the wilderness chewing fingernails in fear that something hideous was afoot. It provides nutrients for those seeking greater scrutiny over the way state security, otherwise deemed the domain of closeted experts, is policed.

The entire profession (for it has now become one) of mass disclosures of secret or classified documentation has reached a point where its normality can hardly be questioned. Be it the juicy revelations of Edward Snowden in 2013, the work of WikiLeaks in this decade and the last, and the Panama Papers, whistleblowing, still punished and frowned upon, remains indispensable to the conversation about transparency and the inner operations of the Dark State and its accessories.

That Dark State was given a further lighting up on Tuesday with the release, by WikiLeaks, of its CIA Vault 7 and Year Zero series that has caused the usual flutter in the intelligence community and governments.

These comprise the machinery of hacking and cyber war tactics, an overview of methods that suggest, according to WikiLeaks, a loss of control by the agency over a good deal of its hacking arsenal (“malware, viruses, Trojans, weaponized ‘zero day’ exploits, malware remote control systems and associated documentation”).

The releases reveal aspects of the internal functions of the organisation, including the works of its Engineering Development Group (EDG), dedicated to the development of software within the Center for Cyber Intelligence.

As WikiLeaks revealed, the sophisticated nature of surveillance is now such as to draw comparisons with George Orwell’s 1984 “but ‘Weeping Angel’, developed by the Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.” Samsung has figured prominently in such attacks jointly conducted with Britain’s MI5/BTSS.

Even of more concern is that such methods, similar to the hoovering techniques of trawler surveillance, tend to hamper, rather than sharpen, discrimination regarding targets of value. Malware, in making its way into a range of devices (iPhones, Android, smart TVs), lingers like an innocuous, odourless smell.

This makes suggestions of ‘targeted’ surveillance, or surveillance against countries other than those of the Five Eyes, absurd. (Vide the opinions of Australia’s insipid Christopher Pyne, who assumes with school boy innocence that Washington would never have an interest in spying on Australian subjects.)

Controls over the nature of who receives or uses such devices or operating systems are less relevant than the nature of the devices, adjusted and cooked to the right level of surveillance. So called “smart” devices are hardly discerning in that regard.

The releases have also seen a rapid scramble on the part of app companies to claim that the Vault and Zero Year coverage by WikiLeaks reveals a crude reality: you simply cannot rely on the security of your messaging format.

“To put ‘Year Zero’ into familiar terms,” the statement from Telegram instructs with confidence piercing clarity, “imagine a castle on a mountainside. That castle is a secure messaging app. The device and its OS are the mountain. Your castle can be strong, but if the mountain below is an active volcano, there’s little your engineers can do.”

The statement by Telegram goes on to charmingly remind users that it would not matter “which messenger you use. No app can stop your keyboard from knowing what keys you press. The focus, then, is on “devices and operating systems like iOS and Android” not on the level of apps. “For this reason,” the app company insists, “naming any particular app in this context is misleading.”

What is not misleading is the effect of such surveillance, the insecurity it inflicts on customers, and the rampant breach of privacy. The intelligence agencies find themselves running out of breath, bloated and spread. Their outsourcing of services through less secure channels – namely contractors – has also unleashed a demon they can barely control.

Defenders of such methods spring back into a default mode that assumes WikiLeaks has done something terrible, emboldening enemies of the United States as defender of the now poorly described “free world”. Pundits and former members of the security coven fear that the disclosure of the CIA playbook on this is somehow tantamount to giving away the family silver to a suicide bomber in search of martyrdom. The pertinent question here, surely, is defending that world from within as a matter of course.

Even the most dyed-in-the-wool establishment type has to concede that the intelligence community, puffing and out of breath, is there for the trimming, a vigorous pruning that just might ensure its reinvigoration and relevance.

The CIA is a beast in maturation, adjusting, and flexing its muscles in accordance with circumstance. It is to be watched, accordingly cleaned and overseen by diligent groundsmen and women. Sadly, the members of Congress are not necessarily the most able, or willing, to do that watching. An external impetus, miraculously supplied, might well do the trick.

More articles by:

Binoy Kampmark was a Commonwealth Scholar at Selwyn College, Cambridge. He lectures at RMIT University, Melbourne. Email: bkampmark@gmail.com

October 16, 2018
Gregory Elich
Diplomatic Deadlock: Can U.S.-North Korea Diplomacy Survive Maximum Pressure?
Rob Seimetz
Talking About Death While In Decadence
Kent Paterson
Fifty Years of Mexican October
Robert Fantina
Trump, Iran and Sanctions
Greg Macdougall
Indigenous Suicide in Canada
Kenneth Surin
On Reading the Diaries of Tony Benn, Britain’s Greatest Labour Politician
Thomas Knapp
Facebook Meddles in the 2018 Midterm Elections
Muhammad Othman
Khashoggi and Demetracopoulos
Gerry Brown
Lies, Damn Lies & Statistics: How the US Weaponizes Them to Accuse  China of Debt Trap Diplomacy
Christian Ingo Lenz Dunker – Peter Lehman
The Brazilian Presidential Elections and “The Rules of The Game”
Robert Fisk
What a Forgotten Shipwreck in the Irish Sea Can Tell Us About Brexit
Martin Billheimer
Here Cochise Everywhere
David Swanson
Humanitarian Bombs
Dean Baker
The Federal Reserve is Not a Church
October 15, 2018
Rob Urie
Climate Crisis is Upon Us
Conn Hallinan
Syria’s Chessboard
Patrick Cockburn
The Saudi Atrocities in Yemen are a Worse Story Than the Disappearance of Jamal Khashoggi
Sheldon Richman
Trump’s Middle East Delusions Persist
Justin T. McPhee
Uberrima Fides? Witness K, East Timor and the Economy of Espionage
Tom Gill
Spain’s Left Turn?
Jeff Cohen
Few Democrats Offer Alternatives to War-Weary Voters
Dean Baker
Corporate Debt Scares
Gary Leupp
The Khashoggi Affair and and the Anti-Iran Axis
Russell Mokhiber
Sarah Chayes Calls on West Virginians to Write In No More Manchins
Clark T. Scott
Acclimated Behaviorisms
Kary Love
Evolution of Religion
Colin Todhunter
From GM Potatoes to Glyphosate: Regulatory Delinquency and Toxic Agriculture
Binoy Kampmark
Evacuating Nauru: Médecins Sans Frontières and Australia’s Refugee Dilemma
Marvin Kitman
The Kitman Plan for Peace in the Middle East: Two Proposals
Weekend Edition
October 12, 2018
Friday - Sunday
Becky Grant
My History with Alexander Cockburn and The Financial Future of CounterPunch
Paul Street
For Popular Sovereignty, Beyond Absurdity
Nick Pemberton
The Colonial Pantsuit: What We Didn’t Want to Know About Africa
Jeffrey St. Clair
The Summer of No Return
Jeff Halper
Choices Made: From Zionist Settler Colonialism to Decolonization
Gary Leupp
The Khashoggi Incident: Trump’s Special Relationship With the Saudi Monarchy
Andrew Levine
Democrats: Boost, Knock, Enthuse
Barbara Kantz
The Deportation Crisis: Report From Long Island
Doug Johnson
Nate Silver and 538’s Measurable 3.5% Democratic Bias and the 2018 House Race
Gwen Carr
This Stops Today: Seeking Justice for My Son Eric Garner
Robert Hunziker
Peak Carbon Emissions By 2020, or Else!
Arshad Khan
Is There Hope on a World Warming at 1.5 Degrees Celsius?
David Rosen
Packing the Supreme Court in the 21stCentury
Brian Cloughley
Trump’s Threats of Death and Destruction
Joel A. Harrison
The Case for a Non-Profit Single-Payer Healthcare System
Ramzy Baroud
That Single Line of Blood: Nassir al-Mosabeh and Mohammed al-Durrah
FacebookTwitterGoogle+RedditEmail