CSCSSCSCSS
CSCSS
Centre for Strategic Cyberspace + Security Science
+855.237.8767 Global[email protected]
CONTACT
 
  • Regions
  • Topics
  • Programs
  • Analysis
  • Experts
    • Experts
    • Experts Program
  • Events
    • CYBERIMMERSION WORKSHOP
    • Events
    • Featured Speakers
    • Event Partners
  • Podcasts
  • News + Press
  • Who We Are
    • About Us
    • CSCSS International
    • Board of Directors
    • Corporate Officers
    • Global Advisory Board
  • Contact
    • Contact
    • Connect
  • Support CSCSS
FacebookTwitterInstagramSoundCloudDelicious
  • Regions
  • Topics
  • Programs
  • Analysis
  • Experts
    • Experts
    • Experts Program
  • Events
    • CYBERIMMERSION WORKSHOP
    • Events
    • Featured Speakers
    • Event Partners
  • Podcasts
  • News + Press
  • Who We Are
    • About Us
    • CSCSS International
    • Board of Directors
    • Corporate Officers
    • Global Advisory Board
  • Contact
    • Contact
    • Connect
  • Support CSCSS
March 10, 2017In The NewsBy admin.cs
CONTACT INFROMATION
For more information + media queries contact CSCSS External Relations
  • London, UK
    +44 2035141784
  • Washington, D.C, USA
    + 571.451.0312
  • Middle East
    +855.237.8767
  • Extention
    920

IN THE NEWS

South Korea targeted by cyberspies (again). Kim, got something to say?

The South Korean public sector is once again in the firing line of a sophisticated – and likely government-backed – cyberattack.

March 8, 2017

We're still going through the 8,761 CIA documents published on Tuesday by WikiLeaks for political mischief, although here are some of the highlights. First, though, a few general points: one, there's very little here that should shock you. The CIA is a spying organization, after all, and, yes, it spies on people.

Two, unlike the NSA, the CIA isn’t mad keen on blanket surveillance: it targets particular people, and the hacking tools revealed by WikiLeaks are designed to monitor specific persons of interest. For example, you may have seen headlines about the CIA hacking Samsung TVs. As we previously mentioned, that involves breaking into someone’s house and physically reprogramming the telly with a USB stick. If the CIA wants to bug you, it will bug you one way or another, smart telly or no smart telly. You’ll probably be tricked into opening a dodgy attachment or download.

That’s actually a silver lining to all this: end-to-end encrypted apps, such as Signal and WhatsApp, are so strong, the CIA has to compromise your handset, TV or computer to read your messages and snoop on your webcam and microphones, if you’re unlucky enough to be a target. Hacking devices this way is fraught with risk and cost, so only highly valuable targets will be attacked. The vast, vast majority of us are not walking around with CIA malware lurking in our pockets, laptop bags, and living rooms.

Thirdly, if you’ve been following US politics and WikiLeaks’ mischievous role in the rise of Donald Trump, you may have clocked that Tuesday’s dump was engineered to help the President pin the hacking of his political opponents’ email server on the CIA. The leaked documents suggest the agency can disguise its operations as the work of a foreign government. Thus, it wasn’t the Russians who broke into the Democrats’ computers and, by leaking the emails, helped swing Donald the election – it was the CIA all along, Trump can now claim. That’ll shut the intelligence community up. The President’s pet news outlet Breitbart is already running that line.

Back to the leaked files. One amusing page gives details of discussions within the CIA on how to avoid having its secrets leak in the wake of the theft of the NSA Equation Group’s hacking tools. Along with a detailed report [PDF] on the Equation Group hack, there are suggestions on how to protect resources.

The CIA and the White House have yet to comment on the veracity of the leaked material and are unlikely to do so. But at least one former intelligence worker with knowledge of such matters seems convinced they are real.

MORE ON THIS ARTICAL

MOST RECENT

FEATURED PROJECTS + PROGRAMS

AmericaattacksciacyberexploitshackHackerNSAwiki leaks
About the author

admin.cs

ABOUT CSCSS
The Center for Strategic Cyberspace + Security Science is a bipartisan, multilateral, international nonprofit organization headquartered in London, United Kingdom. It seeks to advance global cyberspace security and prosperity by providing strategic insights for cyberspace and policy solutions to decision makers.
CONTACT US
+44 12342134123
  • London UK
    +44 2035141784
  • Washington, D.C, USA
    + 571.451.0312
  • Middle East + Asia Pacific
    +855.237.8767
  • STAY CONNECTED WITH CSCSS
    [email protected]

Find us on:

FacebookTwitterLinkedinInstagramSoundCloud
TRENDING
  • The Canada-China Cyber Agreement Remains Questionable
    December 13, 2017
  • Webinar : Introduction to Cyber Intelligence
    August 30, 2017
  • WOSU Radio Show -Global Security and Warfare
    July 14, 2017
FEATURED PROJECTS + PROGRAMS
© 2015 Center for Strategic Cyberspace + Security Science / CSCSS