This article is from the source 'guardian' and was first published or seen on . It last changed over 40 days ago and won't be checked again for changes.
You can find the current article at its original source at https://www.theguardian.com/world/2017/mar/09/with-the-latest-wikileaks-revelations-about-the-cia-is-privacy-really-dead
The article has changed 2 times. There is an RSS feed of changes available.
Previous version
1
Next version
Version 0 | Version 1 |
---|---|
With the latest WikiLeaks revelations about the CIA – is privacy really dead? | With the latest WikiLeaks revelations about the CIA – is privacy really dead? |
(about 7 hours later) | |
In the week that WikiLeaks revealed the CIA and MI5 have an armoury of surveillance tools that can spy on people through their smart TVs, cars and cellphones, the FBI director, James Comey, has said that Americans should not have expectations of “absolute privacy”. | |
“There is no such thing as absolute privacy in America: there is no place outside of judicial reach,” Comey said at a Boston College conference on cybersecurity. The remark came as he was discussing the rise of encryption since Edward Snowden’s 2013 revelations of the NSA’s mass surveillance tools, used on citizens around the world. | “There is no such thing as absolute privacy in America: there is no place outside of judicial reach,” Comey said at a Boston College conference on cybersecurity. The remark came as he was discussing the rise of encryption since Edward Snowden’s 2013 revelations of the NSA’s mass surveillance tools, used on citizens around the world. |
Both the Snowden revelations and the CIA leak highlight the variety of creative techniques intelligence agencies can use to spy on individuals, at a time when many of us are voluntarily giving up our personal data to private companies and installing so-called “smart” devices with microphones (smart TVs, Amazon Echo) in our homes. | Both the Snowden revelations and the CIA leak highlight the variety of creative techniques intelligence agencies can use to spy on individuals, at a time when many of us are voluntarily giving up our personal data to private companies and installing so-called “smart” devices with microphones (smart TVs, Amazon Echo) in our homes. |
So, where does this leave us? Is privacy really dead, as Silicon Valley luminaries such as Mark Zuckerberg have previously declared? | So, where does this leave us? Is privacy really dead, as Silicon Valley luminaries such as Mark Zuckerberg have previously declared? |
Not according to the Electronic Frontier Foundation’s executive director, Cindy Cohn. | Not according to the Electronic Frontier Foundation’s executive director, Cindy Cohn. |
“The freedom to have a private conversation – free from the worry that a hostile government, a rogue government agent or a competitor or a criminal are listening – is central to a free society,” she said. | “The freedom to have a private conversation – free from the worry that a hostile government, a rogue government agent or a competitor or a criminal are listening – is central to a free society,” she said. |
The freedom to have a private conversation … is central to a free society | |
While not as strict as privacy laws in Europe, the fourth amendment to the US constitution does guarantee the right to be free from unreasonable searches and seizures. | While not as strict as privacy laws in Europe, the fourth amendment to the US constitution does guarantee the right to be free from unreasonable searches and seizures. |
That doesn’t mean citizens have “absolute privacy”. | That doesn’t mean citizens have “absolute privacy”. |
“I don’t think there’s been absolute privacy in the history of mankind,” said Albert Gidari, director of privacy at the Stanford Center for Internet and Society. “You walk out in public and it’s no longer private. You shout from one window to another and someone will hear you in conversation.” | “I don’t think there’s been absolute privacy in the history of mankind,” said Albert Gidari, director of privacy at the Stanford Center for Internet and Society. “You walk out in public and it’s no longer private. You shout from one window to another and someone will hear you in conversation.” |
“At the same time things are more intrusive, persistent, searchable, they never die. So our conception of what is or isn’t risk from a privacy perspective does change and evolve over time.” | “At the same time things are more intrusive, persistent, searchable, they never die. So our conception of what is or isn’t risk from a privacy perspective does change and evolve over time.” |
The law hasn’t kept pace with digital technologies. For example, there is a legal theory called the “third-party doctrine” that holds that people who give up their information to third parties like banks, phone companies, social networks and ISPs have “no reasonable expectation of privacy”. This has allowed the US government to obtain information without legal warrants. | The law hasn’t kept pace with digital technologies. For example, there is a legal theory called the “third-party doctrine” that holds that people who give up their information to third parties like banks, phone companies, social networks and ISPs have “no reasonable expectation of privacy”. This has allowed the US government to obtain information without legal warrants. |
Unlike the NSA techniques revealed by Snowden, the CIA appears to favour a more targeted approach: less dragnet, more spearfishing. | Unlike the NSA techniques revealed by Snowden, the CIA appears to favour a more targeted approach: less dragnet, more spearfishing. |
The WikiLeaks files show that the CIA has assembled a formidable arsenal of cyberweapons designed to target individuals’ devices such as mobile phones, laptops and TVs by targeting the operating systems such as Android, iOS and Windows with malware. | The WikiLeaks files show that the CIA has assembled a formidable arsenal of cyberweapons designed to target individuals’ devices such as mobile phones, laptops and TVs by targeting the operating systems such as Android, iOS and Windows with malware. |
It’s encouraging to note that the government has yet to crack the encryption of secure messaging apps such as WhatsApp, Signal and Confide. However, it does not need to if it can instal malware on people’s devices that can collect audio and message traffic before encryption is applied. | It’s encouraging to note that the government has yet to crack the encryption of secure messaging apps such as WhatsApp, Signal and Confide. However, it does not need to if it can instal malware on people’s devices that can collect audio and message traffic before encryption is applied. |
Gidari isn’t that surprised. “It confirms what everyone saw in last week’s episode of 24. People expect these tools to exist,” he said, adding that people were more surprised that the FBI was initially incapable of breaking into the San Bernardino killer’s iPhone. | Gidari isn’t that surprised. “It confirms what everyone saw in last week’s episode of 24. People expect these tools to exist,” he said, adding that people were more surprised that the FBI was initially incapable of breaking into the San Bernardino killer’s iPhone. |
“People expect the government to have these magic tools,” he said. | “People expect the government to have these magic tools,” he said. |
American citizens should not be lulled into a false sense of security that the CIA only targets foreign nationals. The “Vault 7” documents show a broad exchange of tools and information between the CIA, the National Security Agency, and other US federal agencies, as well as intelligence services of close allies Australia, Canada, New Zealand and the United Kingdom. | American citizens should not be lulled into a false sense of security that the CIA only targets foreign nationals. The “Vault 7” documents show a broad exchange of tools and information between the CIA, the National Security Agency, and other US federal agencies, as well as intelligence services of close allies Australia, Canada, New Zealand and the United Kingdom. |
“We can’t spy on our own citizens but we can spy on anyone else’s,” explained Neil Richards, a law professor from Washington University. “If agencies are friends with each other, they have everybody else do their work for them and they just share the data.” | “We can’t spy on our own citizens but we can spy on anyone else’s,” explained Neil Richards, a law professor from Washington University. “If agencies are friends with each other, they have everybody else do their work for them and they just share the data.” |
“Dividing the world into American citizens and non-American citizens is a false dichotomy,” Gidari added. “We don’t have a monopoly on spy tools.” | “Dividing the world into American citizens and non-American citizens is a false dichotomy,” Gidari added. “We don’t have a monopoly on spy tools.” |
This leaves us with a terrifying new prospect: government spies essentially deploying viruses and trojans against their own citizens. | This leaves us with a terrifying new prospect: government spies essentially deploying viruses and trojans against their own citizens. |
WikiLeaks #Vault7 confirms CIA can effectively bypass Signal + Telegram + WhatsApp + Confide encryptionhttps://t.co/h5wzfrReyy | WikiLeaks #Vault7 confirms CIA can effectively bypass Signal + Telegram + WhatsApp + Confide encryptionhttps://t.co/h5wzfrReyy |
The onus is now on the companies that make the devices to plug any holes in their operating systems – something they do regularly through bug bounty programs, where security researchers disclose vulnerabilities in return for rewards. | The onus is now on the companies that make the devices to plug any holes in their operating systems – something they do regularly through bug bounty programs, where security researchers disclose vulnerabilities in return for rewards. |
It’s clear from the CIA files that the US government has flouted this custom in order to stockpile “zero days” – undisclosed exploits – for its own advantage. This is a practice the US government has previously publicly denied. | It’s clear from the CIA files that the US government has flouted this custom in order to stockpile “zero days” – undisclosed exploits – for its own advantage. This is a practice the US government has previously publicly denied. |
“If companies aren’t aware that a vulnerability exists they can’t patch it. If it exists it can be exploited by any malicious actor – whether that’s a hacker, foreign state or criminal enterprise,” said Neema Singh Guliani, legislative counsel with the American Civil Liberties Union. | “If companies aren’t aware that a vulnerability exists they can’t patch it. If it exists it can be exploited by any malicious actor – whether that’s a hacker, foreign state or criminal enterprise,” said Neema Singh Guliani, legislative counsel with the American Civil Liberties Union. |
“I have a big problem with the government leaving us vulnerable to the same tools in hand so other nation states and hackers could exploit them,” Gidari said. “That isn’t protecting American citizens.” | “I have a big problem with the government leaving us vulnerable to the same tools in hand so other nation states and hackers could exploit them,” Gidari said. “That isn’t protecting American citizens.” |
Gidari’s view echoes Apple’s stance when the FBI demanded the company build a backdoor to the iPhone so they could access data on the San Bernardino killer’s phone. | Gidari’s view echoes Apple’s stance when the FBI demanded the company build a backdoor to the iPhone so they could access data on the San Bernardino killer’s phone. |
“Apple believes deeply that people in the United States and around the world deserve data protection, security and privacy. Sacrificing one for the other only puts people and countries at greater risk,” the company said at the time. The iPhone maker was more muted in its response to the Vault 7 dump, vowing to “rapidly address” any security holes. | “Apple believes deeply that people in the United States and around the world deserve data protection, security and privacy. Sacrificing one for the other only puts people and countries at greater risk,” the company said at the time. The iPhone maker was more muted in its response to the Vault 7 dump, vowing to “rapidly address” any security holes. |
“There is nearly universal consensus from technologists that it’s impossible to build weaknesses or access mechanisms into technology that can only be used by the good guys and not the bad,” Cohn said. | “There is nearly universal consensus from technologists that it’s impossible to build weaknesses or access mechanisms into technology that can only be used by the good guys and not the bad,” Cohn said. |
This week’s revelations are sure to increase the strain on relations between Silicon Valley and the US government. While some of the older telephony companies such as AT&T and Verizon, which rely heavily on government contracts, have a history of compliance with government requests, tech giants Google, Facebook, Microsoft and Apple have proved to be less compliant. | |
It’s not possible to meaningfully participate in modern life without relationships with some or all of these technology companies processing our data, Richards added. So it’s important to know where their loyalties lie – to their customers or to government. | It’s not possible to meaningfully participate in modern life without relationships with some or all of these technology companies processing our data, Richards added. So it’s important to know where their loyalties lie – to their customers or to government. |
Since Snowden’s revelations of mass surveillance, companies such as Apple, Google and Microsoft have been working hard to rebuild trust with consumers through strengthening security, fighting government data requests and releasing transparency reports highlighting when and how many requests are made. | Since Snowden’s revelations of mass surveillance, companies such as Apple, Google and Microsoft have been working hard to rebuild trust with consumers through strengthening security, fighting government data requests and releasing transparency reports highlighting when and how many requests are made. |
“It’s a very encouraging development if we care about civil liberties and the right to privacy, but at the same time it’s unsatisfying if the discretion of a company is the only real protection for our data,” Richards said. | “It’s a very encouraging development if we care about civil liberties and the right to privacy, but at the same time it’s unsatisfying if the discretion of a company is the only real protection for our data,” Richards said. |
“We need to build the digital society we want rather than the one handed to us by default,” he added. | “We need to build the digital society we want rather than the one handed to us by default,” he added. |
This will require a complete overhaul of the laws relating to when the government can collect location and content information, something civil liberty campaigners have been pushing for. | This will require a complete overhaul of the laws relating to when the government can collect location and content information, something civil liberty campaigners have been pushing for. |
“These decisions need to be made by the public, not by law enforcement or tech executives sitting in private,” Richards said. |
Previous version
1
Next version