Tuesday March 7, 2017
The huge leak of information from the CIA just published by Wikileaks gives a fascinating picture of how the CIA goes about its business, though I doubt there is much there which will come as a surprise to most people.
In light of all the swirl of activity around the DNC and Podesta leaks and the various allegations of Russian hacking, two questions however immediately stand out for me.
1. The technology used in the DNC/Podesta leaks is decades old and crude. Are the Russians really so far behind the CIA?
The first point is the obvious one that the CIA seems to engage in hacking on an immeasurably vaster and more sophisticated scale than whoever is behind Fancy Bear and Cosy Bear, the two groups of hackers who hacked Podesta and the DNC, assuming of course that they are the same people.
It seems that the CIA is able to read emails and hack into some of the world’s most heavily encrypted social media and communications platforms such as WhatsApp, Weibo, Confide, Signal and Telegram before any encryption can even be applied and without leaving any trace. Obviously there is no need for any ‘phishing’. Moreover it is clear that the CIA has been able to do this for a long time, in some cases for more than a decade.