{"id":6927,"date":"2017-03-09T20:30:49","date_gmt":"2017-03-10T04:30:49","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/03\/09\/news-718\/"},"modified":"2017-03-09T20:30:49","modified_gmt":"2017-03-10T04:30:49","slug":"news-718","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/03\/09\/news-718\/","title":{"rendered":"WikiLeaks plans share CIA hacking details, but can companies use it?"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt2.staticworld.net\/images\/article\/2017\/03\/wikileaks-100712683-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Michael Kan| Date: Thu, 09 Mar 2017 19:06:00 -0800<\/strong><\/p>\n<p> WikiLeaks <a href=\"http:\/\/www.computerworld.com\/article\/3178750\/security\/assange-cia-had-lost-control-of-its-cyberweapon-documents.html\">plans to\u00a0share<\/a>\u00a0details about what it says are CIA hacking tools with the tech companies so that software fixes can be developed. <\/p>\n<p> But will software companies want it? <\/p>\n<p> The information WikiLeaks plans to share comes from\u00a08,700-plus documents it says were stolen from an internal CIA server. If the data is classified &#8212; and it almost certainly is &#8212; possessing it would be a crime. <\/p>\n<p> That was underlined on Thursday by\u00a0White House press secretary Sean Spicer, who\u00a0advised tech vendors to consider the legal consequences of receiving documents from WikiLeaks. <\/p>\n<p> \u201cIf a program or a piece of information is classified, it remains classified regardless of whether or not it is released into the public venue or not,\u201d he said.\u00a0\u201cThere\u2019s a reason that we have classification levels, and that\u2019s to protect our country and our people.\u201d <\/p>\n<p> However, his comments aren\u2019t sitting well with some legal experts. <\/p>\n<p> \u201cThe idea that the government might stand in the way of companies fixing vulnerabilities that have already been disclosed is remarkable &#8212; and reckless,\u201d Patrick Toomey, an attorney with the American Civil Liberties Union, said in an email. <\/p>\n<p> Cindy Cohn, an attorney and executive director at the Electronic Frontier Foundation said using\u00a0U.S. law to penalize vendors would be a &#8220;gross misuse.&#8221; <\/p>\n<p> U.S. laws about security clearances on classified documents were never designed with software patching in mind, she said. <\/p>\n<p> \u00a0\u201cIt would be really wrong-headed for the government to go after these companies for simply trying to make their technologies more secure,\u201d Cohn said. \u201cIt\u2019s exactly the opposite of what they (the U.S. government) should be doing.\u201d <\/p>\n<p> To-date, the CIA hasn\u2019t confirmed whether any of the documents published by Wikileaks are legitimate, but there is widespread belief they are. <\/p>\n<p> Tuesday&#8217;s dump by WikiLeaks contained information on numerous exploits aimed at\u00a0smartphones, PCs and software from major vendors including Apple, Google and Microsoft, but the source code for the attack tools wasn&#8217;t published. <\/p>\n<p> On Thursday, WikiLeaks founder\u00a0Julian Assange said tech vendors would be given \u201cexclusive access\u201d to the tools, so they could learn how to\u00a0<a href=\"http:\/\/www.computerworld.com\/article\/3178687\/security\/wikileaks-looks-at-helping-tech-vendors-disarm-cia-hacking-tools.html\">better secure<\/a>\u00a0their products. <\/p>\n<p> \u201cWikiLeaks has a lot more information on what has been going on with the (CIA) cyberweapons program,\u201d Assange said. <\/p>\n<p> And there&#8217;s another worry: If WikiLeaks managed to get its hands on the data, it could be elsewhere too, increasing the risk that companies and consumers are being watched online. <\/p>\n<p> So the U.S. government should be \u00a0helping tech vendors patch the vulnerabilities involved in the leak,\u00a0said John Bambenek, manager of threat systems at Fidelis Cybersecurity. <\/p>\n<p> \u201cRight now, there\u2019s only risk and no reward,\u201d Bambenek said. \u201cWe need to fix that risk.\u201d <\/p>\n<p> It&#8217;s unclear when WikiLeaks plans to begin sharing the information. <\/p>\n<p> On Thursday, vendors including Microsoft, along with the security firms Avira and Comodo, said that WikiLeaks hasn\u2019t contacted them yet. \u00a0 <\/p>\n<p> \u201cOur preferred method for anyone with knowledge of security issues, including the CIA or WikiLeaks, is to submit details to us at\u00a0<a target=\"_blank\" href=\"mailto:secure@microsoft.com\">secure@microsoft.com<\/a>,\u201d Microsoft said in an email. \u00a0 <\/p>\n<p> Others such as antivirus vendor Bitdefender said they expect WikiLeaks to reach out to them probably over the following days. <\/p>\n<p> \u201cIf WikiLeaks do want to reach out to us, we are always grateful for an opportunity to make our products even better,\u201d the company said in an email. <\/p>\n<p><a href=\"http:\/\/www.computerworld.com\/article\/3179447\/security\/wikileaks-plans-share-cia-hacking-details-but-can-companies-use-it.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt2.staticworld.net\/images\/article\/2017\/03\/wikileaks-100712683-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Michael Kan| Date: Thu, 09 Mar 2017 19:06:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p> WikiLeaks <a href=\"http:\/\/www.computerworld.com\/article\/3178750\/security\/assange-cia-had-lost-control-of-its-cyberweapon-documents.html\">plans to\u00a0share<\/a>\u00a0details about what it says are CIA hacking tools with the tech companies so that software fixes can be developed.<\/p>\n<p> But will software companies want it?<\/p>\n<p> The information WikiLeaks plans to share comes from\u00a08,700-plus documents it says were stolen from an internal CIA server. If the data is classified &#8212; and it almost certainly is &#8212; possessing it would be a crime.<\/p>\n<p> That was underlined on Thursday by\u00a0White House press secretary Sean Spicer, who\u00a0advised tech vendors to consider the legal consequences of receiving documents from WikiLeaks.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3179447\/security\/wikileaks-plans-share-cia-hacking-details-but-can-companies-use-it.html#jump\">To read this article in full or to leave a comment, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[714],"class_list":["post-6927","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6927","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6927"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6927\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6927"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6927"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6927"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}