NZ Herald
  • Home
  • Latest news
  • Video
  • New Zealand
  • Sport
  • World
  • Business
  • Entertainment
  • Podcasts
  • Quizzes
  • Opinion
  • Lifestyle
  • Travel
  • Viva
  • Weather forecasts

Subscriptions

  • Herald Premium
  • Viva Premium
  • The Listener
  • BusinessDesk

Sections

  • Latest news
  • New Zealand
    • All New Zealand
    • Crime
    • Politics
    • Education
    • Open Justice
    • Scam Update
    • The Great NZ Road Trip
  • On The Up
  • World
    • All World
    • Australia
    • Asia
    • UK
    • United States
    • Middle East
    • Europe
    • Pacific
  • Business
    • All Business
    • MarketsSharesCurrencyCommoditiesStock TakesCrypto
    • Markets with Madison
    • Media Insider
    • Business analysis
    • Personal financeKiwiSaverInterest ratesTaxInvestment
    • EconomyInflationGDPOfficial cash rateEmployment
    • Small business
    • Business reportsMood of the BoardroomProject AucklandSustainable business and financeCapital markets reportAgribusiness reportInfrastructure reportDynamic business
    • Deloitte Top 200 Awards
    • CompaniesAged CareAgribusinessAirlinesBanking and financeConstructionEnergyFreight and logisticsHealthcareManufacturingMedia and MarketingRetailTelecommunicationsTourism
  • Opinion
    • All Opinion
    • Analysis
    • Editorials
    • Business analysis
    • Premium opinion
    • Letters to the editor
  • Sport
    • All Sport
    • OlympicsParalympics
    • RugbySuper RugbyNPCAll BlacksBlack FernsRugby sevensSchool rugby
    • CricketBlack CapsWhite Ferns
    • Racing
    • NetballSilver Ferns
    • LeagueWarriorsNRL
    • FootballWellington PhoenixAuckland FCAll WhitesFootball FernsEnglish Premier League
    • GolfNZ Open
    • MotorsportFormula 1
    • Boxing
    • UFC
    • BasketballNBABreakersTall BlacksTall Ferns
    • Tennis
    • Cycling
    • Athletics
    • SailingAmerica's CupSailGP
    • Rowing
  • Lifestyle
    • All Lifestyle
    • Viva - Food, fashion & beauty
    • Society Insider
    • Royals
    • Sex & relationships
    • Food & drinkRecipesRecipe collectionsRestaurant reviewsRestaurant bookings
    • Health & wellbeing
    • Fashion & beauty
    • Pets & animals
    • The Selection - Shop the trendsShop fashionShop beautyShop entertainmentShop giftsShop home & living
    • Milford's Investing Place
  • Entertainment
    • All Entertainment
    • TV
    • MoviesMovie reviews
    • MusicMusic reviews
    • BooksBook reviews
    • Culture
    • ReviewsBook reviewsMovie reviewsMusic reviewsRestaurant reviews
  • Travel
    • All Travel
    • News
    • New ZealandNorthlandAucklandWellingtonCanterburyOtago / QueenstownNelson-TasmanBest NZ beaches
    • International travelAustraliaPacific IslandsEuropeUKUSAAfricaAsia
    • Rail holidays
    • Cruise holidays
    • Ski holidays
    • Luxury travel
    • Adventure travel
  • Kāhu Māori news
  • Environment
    • All Environment
    • Our Green Future
  • Talanoa Pacific news
  • Property
    • All Property
    • Property Insider
    • Interest rates tracker
    • Residential property listings
    • Commercial property listings
  • Health
  • Technology
    • All Technology
    • AI
    • Social media
  • Rural
    • All Rural
    • Dairy farming
    • Sheep & beef farming
    • Horticulture
    • Animal health
    • Rural business
    • Rural life
    • Rural technology
    • Opinion
    • Audio & podcasts
  • Weather forecasts
    • All Weather forecasts
    • Kaitaia
    • Whangārei
    • Dargaville
    • Auckland
    • Thames
    • Tauranga
    • Hamilton
    • Whakatāne
    • Rotorua
    • Tokoroa
    • Te Kuiti
    • Taumaranui
    • Taupō
    • Gisborne
    • New Plymouth
    • Napier
    • Hastings
    • Dannevirke
    • Whanganui
    • Palmerston North
    • Levin
    • Paraparaumu
    • Masterton
    • Wellington
    • Motueka
    • Nelson
    • Blenheim
    • Westport
    • Reefton
    • Kaikōura
    • Greymouth
    • Hokitika
    • Christchurch
    • Ashburton
    • Timaru
    • Wānaka
    • Oamaru
    • Queenstown
    • Dunedin
    • Gore
    • Invercargill
  • Meet the journalists
  • Promotions & competitions
  • OneRoof property listings
  • Driven car news

Puzzles & Quizzes

  • Puzzles
    • All Puzzles
    • Sudoku
    • Code Cracker
    • Crosswords
    • Cryptic crossword
    • Wordsearch
  • Quizzes
    • All Quizzes
    • Morning quiz
    • Afternoon quiz
    • Sports quiz

Regions

  • Northland
    • All Northland
    • Far North
    • Kaitaia
    • Kerikeri
    • Kaikohe
    • Bay of Islands
    • Whangarei
    • Dargaville
    • Kaipara
    • Mangawhai
  • Auckland
  • Waikato
    • All Waikato
    • Hamilton
    • Coromandel & Hauraki
    • Matamata & Piako
    • Cambridge
    • Te Awamutu
    • Tokoroa & South Waikato
    • Taupō & Tūrangi
  • Bay of Plenty
    • All Bay of Plenty
    • Katikati
    • Tauranga
    • Mount Maunganui
    • Pāpāmoa
    • Te Puke
    • Whakatāne
  • Rotorua
  • Hawke's Bay
    • All Hawke's Bay
    • Napier
    • Hastings
    • Havelock North
    • Central Hawke's Bay
    • Wairoa
  • Taranaki
    • All Taranaki
    • Stratford
    • New Plymouth
    • Hāwera
  • Manawatū - Whanganui
    • All Manawatū - Whanganui
    • Whanganui
    • Palmerston North
    • Manawatū
    • Tararua
    • Horowhenua
  • Wellington
    • All Wellington
    • Kapiti
    • Wairarapa
    • Upper Hutt
    • Lower Hutt
  • Nelson & Tasman
    • All Nelson & Tasman
    • Motueka
    • Nelson
    • Tasman
  • Marlborough
  • West Coast
  • Canterbury
    • All Canterbury
    • Kaikōura
    • Christchurch
    • Ashburton
    • Timaru
  • Otago
    • All Otago
    • Oamaru
    • Dunedin
    • Balclutha
    • Alexandra
    • Queenstown
    • Wanaka
  • Southland
    • All Southland
    • Invercargill
    • Gore
    • Stewart Island
  • Gisborne

Media

  • Video
    • All Video
    • NZ news video
    • Business news video
    • Politics news video
    • Sport video
    • World news video
    • Lifestyle video
    • Entertainment video
    • Travel video
    • Markets with Madison
    • Kea Kids news
  • Podcasts
    • All Podcasts
    • The Front Page
    • On the Tiles
    • Ask me Anything
    • The Little Things
    • Cooking the Books
  • Cartoons
  • Photo galleries
  • Today's Paper - E-editions
  • Photo sales
  • Classifieds

NZME Network

  • Advertise with NZME
  • OneRoof
  • Driven Car Guide
  • BusinessDesk
  • Newstalk ZB
  • What the Actual
  • Sunlive
  • ZM
  • The Hits
  • Coast
  • Radio Hauraki
  • The Alternative Commentary Collective
  • Gold
  • Flava
  • iHeart Radio
  • Hokonui
  • Radio Wanaka
  • iHeartCountry New Zealand
  • Restaurant Hub
  • NZME Events

SubscribeSign In
Advertisement
Advertise with NZME.
Home / World

Massive scale of CIA's digital efforts revealed

By Greg Miller, Ellen Nakashima, Julie Tate
Washington Post·
9 Mar, 2017 12:25 AM8 mins to read

Subscribe to listen

Access to Herald Premium articles require a Premium subscription. Subscribe now to listen.
Already a subscriber?  Sign in here

Listening to articles is free for open-access content—explore other articles or learn more about text-to-speech.
‌
Save

    Share this article

The files provide a map of the cyber divisions and branches that have multiplied across the spy service. Photo / AP

The files provide a map of the cyber divisions and branches that have multiplied across the spy service. Photo / AP

On his workplace bio, he describes himself as a "malt beverage enthusiast," a fitness buff fond of carrying a backpack full of bricks, and a "recovering World of Warcraft-aholic".

He is also a cyber warrior for the CIA, an experienced hacker whose résumé lists assignments at clandestine branches devoted to finding vulnerabilities in smartphones and penetrating the computer defenses of the Russian Government.

At the moment, according to his file, he is working for the Centre for Cyber Intelligence Europe, a major hacking hub engaged in electronic espionage across that continent and others.

The hacker - whose background appears in the thousands of CIA documents posted online yesterday by the anti-secrecy organisation WikiLeaks - is part of a digital operation that has grown so rapidly in size and influence in recent years that it ranks alongside spying and analysis divisions that were formed with the CIA itself nearly 70 years ago.

The trove of documents exposed by WikiLeaks provides an unprecedented view of the scale and structure of this operation, which encompasses at least 36 distinct branches devoted to cracking the espionage potential of cellphones, communication apps and computer networks supposedly sealed off from the Internet.

Advertisement
Advertise with NZME.
Advertisement
Advertise with NZME.

But in their descriptions of elaborate exploits and sketches of specific employees, the documents also point to the CIA's vulnerabilities. As much as it is organised to exploit the pervasive presence of digital technology abroad, the CIA's own secrets are increasingly created, acquired or stored on computer files that can be copied in an instant.

"This is the double-edged sword of the digitisation of everything," said Daniel Prieto, who served as director of cybersecurity policy for President Barack Obama.

"Think back to the James Bond movies with a guy in the backroom with a camera that looks like a cigarette lighter taking 20 pictures of a weapons design system. Nowadays, one thumb drive can contain hundreds of thousands of pages."

Advertisement
Advertise with NZME.

US officials said today that they were still in the early stages of investigating the breach that left WikiLeaks in possession of thousands of sensitive files.

The complexity and magnitude of the theft has prompted speculation that it was carried out by Russia or another foreign government with the skills, resources and determination to target the CIA.

But others said that the decision to put the files on public display, rather than exploit their value in secret, makes it more likely that a disgruntled employee or contractor was responsible.

McCain on WikiLeaks dump: 'I can't tell you how serious this is' https://t.co/qKgaWrIQrW pic.twitter.com/Rnh0HxwxfU

— POLITICO (@politico) March 9, 2017

WikiLeaks said the documents, which the Washington Post could not independently verify, came from a current or former CIA employee or contractor.

Discover more

Opinion

Keith Locke: Spy agencies tell MPs very little

09 Mar 04:00 PM
World

Wikileaks to help firms defend against CIA

09 Mar 10:59 PM

If so, that would be consistent with earlier breaches: the exposure of US diplomatic cables in 2010, the Edward Snowden revelations of 2013 and the discovery of a trove of classified National Security Agency files in a suburban Maryland home last year were the work of insiders.

Intelligence officials learned late last year that there was a suspected loss of sensitive CIA information, according to two US officials.

The CIA declined to comment on the authenticity of the documents or the direction of any internal probe underway. In a statement, a CIA spokesman said that the agency's mission "is to aggressively collect foreign intelligence overseas to protect America from terrorists, hostile nation states and other adversaries . . . It is also important to note that CIA is legally prohibited from conducting electronic surveillance targeting individuals here at home, including our fellow Americans, and CIA does not do so."

What WikiLeaks has released so far is not huge, amounting to about 1 gigabyte of data, experts said. And the cache does not appear to include source code for creating hacking tools.

Nonetheless, there are descriptions of tools and techniques that could be used to exploit computer systems as well as "implants" that can be deployed to collect data once inside a phone or a computer. These tools or "implants" are often used in the last stage of the "cyber kill chain" to spy on users, steal their data or monitor their activity.

Spicer won’t confirm documents posted by WikiLeaks — but he wants Democrats to be much more outraged about them https://t.co/gnW11dez1O

— The Washington Post (@washingtonpost) March 8, 2017

The exposure of these capabilities is "hugely damaging" and likely will require the CIA to figure out a way to replace them, said Jake Williams, founder of Rendition InfoSec, a cybersecurity firm. "We've never seen these tools in the wild."

Advertisement
Advertise with NZME.

The documents contain references to hundreds of hacking tools often with colourful names. One dubbed "Brutal Kangaroo" is used to take data from a machine without detection by anti-virus software. Another called "Hammerdrill" is designed to get data from devices that are not connected to the Internet.

Beyond describing specific weapons, the files provide a remarkably comprehensive bureaucratic map of the cyber divisions and branches that have multiplied across the CIA's organisational chart in recent years, as well as glimmers of the geek humour shared on internal networks.

As part of a sweeping reorganisation in 2015 under then-CIA Director John Brennan, the agency consolidated much of its computer expertise under a new division, the Directorate of Digital Innovation, that reports directly to the CIA chief.

The bulk of the CIA's offensive capability appears to reside in an entity called the Centre for Cyber Intelligence, an organisation that oversees dozens of subordinate branches and groups devoted to specific missions and targets, from cracking security on Apple iPhones to penetrating the communications nodes of Isis (Islamic State).

Though the centre is based at CIA headquarters in Northern Virginia, it appears to have major outposts overseas.

The CIA was aware of the security breach that lead to the Wikileaks dump in 2016, officials say https://t.co/GDZwSBuojy pic.twitter.com/RSfiYk0CDm

— Newsweek (@Newsweek) March 9, 2017

Among them is a large hacking station at the US Consulate in Frankfurt, Germany, a group whose operations reach across Europe and the Middle East and into Africa, according to the documents.

Advertisement
Advertise with NZME.

One of the files offers traveling tips for 20-something hackers making the excursion to Frankfurt. It urges employees to fly Lufthansa: "Booze is free so enjoy (within reason)!" Clearly written for neophyte CIA officers, it cautions against using terms that would betray that "people are not 'State Department' employees".

The document also suggests scripts for clearing airport screening: "Breeze through German Customs because you have your cover-for-action story down pat."

Among those apparently assigned to the Frankfurt base is the engineer who listed World of Warcraft and malt beverages as areas of keen interest on his CIA bio.

His name, and that of other employees, was redacted from the WikiLeaks-released pages.

Experts say WikiLeaks intentionally exaggerating contents of leaked CIA documents https://t.co/hgb7CUw39v pic.twitter.com/iqX7kbMxDj

— The Hill (@thehill) March 8, 2017

Some specialists believe the heist had to be from within. "I'd be almost positive this material was stolen by an insider," Williams said.

Some of the documents were marked top secret.

Advertisement
Advertise with NZME.

"To be in a position to steal this, you'd be in a position to steal so much more operational data that fits better with WikiLeaks's narrative" discrediting the agency, Williams said.

There would be data on who the CIA is targeting and the access they have - information that would be far more embarrassing to the United States and, therefore, material WikiLeaks would presumably be eager to expose.

The files also provide clues to how the CIA has assembled its digital arsenal.

The agency appears to rely heavily on open-source tools used by commercial security firms. The CIA kit also includes "public exploits" - tools posted online that are often traced to hacking groups.

CIA contractors likely source of latest WikiLeaks release: U.S. officials https://t.co/B7o051mg5b pic.twitter.com/qZHljARUgT

— Reuters (@Reuters) March 8, 2017

One document amounts to a catalogue of "exploits" that can be used against Apple's iOS phone operating system. The entries include descriptions of how they were obtained.

Some are listed as being "purchased by NSA" before being shared with the CIA. Others appear to have been provided by or developed in collaboration with the British intelligence service GCHQ.

Advertisement
Advertise with NZME.

Several are listed as having been purchased from independent groups or individuals, including one identified as "Baitshop," an entity described by WikiLeaks as a cyber arms contractor.

Some described the damage as extensive but far from permanent. Vulnerabilities in phones and other devices tend to be fleeting, lasting only until the next path or operating system upgrade.

The documents make clear that the CIA has adapted to this timetable and will likely accelerate its development and purchasing cycles to reopen any hacking windows that WikiLeaks closed.

"It's not some huge crisis," said Nicholas Weaver, a computer security researcher at the University of California at Berkeley.

The CIA can purchase new exploits or turn to the NSA to help shore up its exposed archive. Buying its way back could be pricey, experts said. Exploits for Apple iPhones can go for US$1 million or more.

Save

    Share this article

Latest from World

World

Australian police arrest dozens over LGBTQ dating app-linked assaults

09 May 04:02 AM
Premium
World

A most sensitive subject in the White House: Where is Melania?

09 May 01:44 AM
World

Trump renews pitch for unconditional 30-day Ukraine ceasefire

08 May 11:57 PM

One tiny baby’s fight to survive

sponsored
Advertisement
Advertise with NZME.

Latest from World

Australian police arrest dozens over LGBTQ dating app-linked assaults

Australian police arrest dozens over LGBTQ dating app-linked assaults

09 May 04:02 AM

Thirty people, mostly teens, were arrested in Australia for attacks via dating apps.

Premium
A most sensitive subject in the White House: Where is Melania?

A most sensitive subject in the White House: Where is Melania?

09 May 01:44 AM
Trump renews pitch for unconditional 30-day Ukraine ceasefire

Trump renews pitch for unconditional 30-day Ukraine ceasefire

08 May 11:57 PM
First American pope's views on Trump, Vance over immigration

First American pope's views on Trump, Vance over immigration

08 May 10:25 PM
Connected workers are safer workers 
sponsored

Connected workers are safer workers 

NZ Herald
  • About NZ Herald
  • Meet the journalists
  • Newsletters
  • Classifieds
  • Help & support
  • Contact us
  • House rules
  • Privacy Policy
  • Terms of use
  • Competition terms & conditions
  • Our use of AI
Subscriber Services
  • NZ Herald e-editions
  • Daily puzzles & quizzes
  • Manage your digital subscription
  • Manage your print subscription
  • Subscribe to the NZ Herald newspaper
  • Subscribe to Herald Premium
  • Gift a subscription
  • Subscriber FAQs
  • Subscription terms & conditions
  • Promotions and subscriber benefits
NZME Network
  • The New Zealand Herald
  • The Northland Age
  • The Northern Advocate
  • Waikato Herald
  • Bay of Plenty Times
  • Rotorua Daily Post
  • Hawke's Bay Today
  • Whanganui Chronicle
  • Viva
  • NZ Listener
  • What the Actual
  • Newstalk ZB
  • BusinessDesk
  • OneRoof
  • Driven CarGuide
  • iHeart Radio
  • Restaurant Hub
NZME
  • About NZME
  • NZME careers
  • Advertise with NZME
  • Digital self-service advertising
  • Book your classified ad
  • Photo sales
  • NZME Events
  • © Copyright 2025 NZME Publishing Limited
TOP