Wikileaks’ latest document dump revealed the extraordinary capacity of the CIA to hack into everyday devices. The continuing revelations about the extent of the cyber spy industry demand changes at the government and personal level.
Cyber-warfare is now the fifth dimension of war (after sea, land, air and space). We must therefore become accustomed to stories about information technology, both on its use and its misuse.
The latest controversy is Wikileaks’ release of alleged CIA documents. Over 8,000 documents can be found in this consignment, with more to follow.
The documents suggest that the CIA has overtaken the National Security Agency (NSA) in running some of the US cyberwar work. These documents allege that CIA scientists have discovered weaknesses in IT systems which they can use to hack the IT systems of almost any target—overseas or at home.
Traditionally the CIA dealt with overseas threats and the FBI with homegrown ones. Now apparently, the CIA is active at home and abroad.
Hacks of some domestic IT-based equipment include fake ‘off’ switches—homeowners think they are turning off the equipment, when in fact the television is being activated to record what is happening near it and transmitting the information back to the CIA. Another controversy relates to modern IT-enabled cars, which can be ‘car-jacked’ by gaining control of the car remotely and then driving it, say, into a tree.
Early indications are that the documents are authentic. Doubtless they will be subject to US congressional enquiries but no one is questioning their authenticity—for the moment anyway.
The controversy has seven major implications.
First, IT is a good servant but a bad master. What was welcomed years ago as a way to make life easier—such as typing documents and accessing information instantly through Google—has now created a monster that monitors our lives. All uses of internet-connected equipment can be monitored. The right to privacy has gone.
Second, there has never been a right to privacy in some states, such as the communist states in Eastern Europe, or in modern China and North Korea. Citizens know instinctively that they could be listened to at any time. There quickly develops a culture of caution when talking over the telephone or indeed in some buildings, such as hotels. With the loss of the right to privacy, it is likely that people in Western countries will also develop a culture of caution and be careful about what they say or write over the internet.
Third, the fact that such material can be leaked suggests that the CIA is not as good at security as one would hope. This concern is augmented by the claim that other similar CIA material is due for release.
Fourth, there is a need for new ways of conducting government security checks. For example, security problems may arise from idealistic staff becoming disenchanted when they learn how operations are carried out—cases like Daniel Ellsberg and the Pentagon Papers, Chelsea Manning and Edward Snowden. The real world of government may be more brutal than what is anticipated by some idealistic new recruits.
Fifth, still on the human factor, there is a risk that people with access to sensitive material may misuse that access for personal motives, like tracking down former lovers. As with other crimes and scandals, such people are quietly sacked rather than put on trial (for fear of the general public learning more about the situation). The challenge from the first century Roman poet Juvenal remains: “Who will guard the guards themselves?”
Sixth, if the CIA can identify these flaws within IT equipment, so can others, such as terrorists. One of the frightening aspects of the so-called Islamic State is just how well a group of terrorists operating from a desert hideout have been able to use IT. Other governments, such as those in Russia and China, will also be following this controversy to see what they can extract for their own cyber-war ambitions.
Finally, in political science there is the concept of “incrementalism”, whereby major long-term change happens in small steps or increments. These may result in unintended consequences. CIA’s expanded role in IT has come after the 9/11 terrorist attacks. It seemed like a good idea at the time to expand the role and budgets of the intelligence agencies. While the Islamist terrorist threat has not fully materialised in the US, a whole new spy industry has been created.
Dr Keith Suter is managing director of the Global Directions think tank. Among his many roles, he is foreign affairs editor for Channel 7’s Sunrise program.
Published March 22, 2017
Starting March 2017, the entry level for SOT training is now for one year. Graduates will qualify as certified Thinking Instructor SOT (TISOT). Since 1980, this has been a unique qualification, available only from SOT.
SOTUSER LICENCES: Every SOT user must have exactly one user license. The user licence is purchased as a subscription. The subscription is monthly for 12 months payable in advance. The fee is $74 per month or $888 annually (AUD). This license provides 24/7/365 access to the personally curated SOT experience which includes: the x10 Toolkit, Daily Lessons, TT Management, Weekly Lesson Management, DFQ Commentariat, Weekly Booster, Career Acceleration Program (CAP), Home, Profile, Reports, Books, Articles, Original Content, Unlimited Online Training, Webinars and Live Events, Automatic Data Capture, Intelligent Follow-up Reminders, Email notifications, Short Term Targets, Long Term Sustainability, Real-time Reporting, Aspirational Rewards, Interactive Communications, Peer-2-Peer support.
ENTERPRISE LICENCES: Every SOT user must have exactly one user license. An Enterprise may purchase subscriptions enterprise-wide for its subscribers, students, employees, consultants, contractors, agents and customers, and third parties with which it transacts business. Enterprise Licences by quotation.
GLOBAL LICENCE: The global licence for operating SOT is held by WOMBAT Labs Pty Ltd. Melbourne, Australia.
CONTENT STREAMS: SOT is science-based and is not for everyone. The three content streams for this program are: x10 Thinking, x10 Selling and x10 Leadership. There will be coursework (scroll to see Syllabus below), daily audio mentoring and career-related problem-solving required for this program. 100% ONLINE: Since 1995, the SOT campus is 100% online. The school is in the cloud. All SOT lessons are conducted by email. 24/7/365, email is simply the No1 global business communication platform. SOT EMAILS save time and money. Whether by smartphone while commuting or by PC at work, SOT email allows employees and managers to efficiently manage communications in ways that fit into their time and scheduling at the local level. SOT email lessons are easy to mailbox and can be stored safely, logically and reliably. It's a lot easier to organize emails than paper. Lessons can be accessed quickly and easily for study, thinking and review. SOT email allows students to work at their own speed, rather than under the pressure of a conference call or costly in-person meetings. It also means that a good record of the work is maintained for future reference. Used intelligently, email is the superior training, communication and productivity tool. Feedback from SOT shows students prefer email!
“A man may be a tough, concentrated, successful money-maker and never contribute to his country anything more than a horrible example.
A manager may be tough and practical, squeezing out, while the going is good, the last ounce of profit and dividend, and may leave behind him an exhausted industry and a legacy of industrial hatred.
A tough manager may never look outside his own factory walls or be conscious of his partnership in a wider world.
I often wonder what strange cud such men sit chewing when their working days are over, and the accumulating riches of the mind have eluded them.”
Sir Robert Gordon Menzies, KT AK CH FAA FRS QC, was an Australian politician and the 12th Prime Minister of Australia. Serving a collective total of over 18 years, he is Australia’s longest-serving Prime Minister.