CIA's Shrugtastic Response To Hacking Apple Security: 'It Is What It Is' And 'That's What We Do'

from the meh dept

We just had a story based on the Intercept breaking the fact that the CIA holds an annual hackathon (the CIA calls it a "Jamboree") to come up with new ways to hack secure systems, inviting in various contractors and government agencies. Much of the work is focused on hacking Apple's security, inserting backdoors and generally degrading security and encryption for everyone.

The CIA refused to comment on the Intercept's original story, but the reporters got former FTC official Steven Bellovin to sum it up as:
“Spies gonna spy,” says Steven Bellovin, a former chief technologist for the U.S. Federal Trade Commission and current professor at Columbia University. “I’m never surprised by what intelligence agencies do to get information. They’re going to go where the info is, and as it moves, they’ll adjust their tactics. Their attitude is basically amoral: whatever works is OK.”
Now, "unnamed" anonymous CIA officials seem to be picking up where that shrugging comment left off. Talking to CNBC reporters, the CIA folks give similarly "meh" kinds of responses:
"That's what we do," the official said. "CIA collects information overseas, and this is focused on our adversaries, whether they be terrorists or other adversaries."
Except, of course, they don't just spy overseas. The CIA has done domestic spying as well, and the descriptions of the projects don't just impact people overseas. And then there's this one:
"There's a whole world of devices out there, and that's what we're going to do," the official said. "It is what it is."
It is what it is. That's someone who clearly doesn't care one bit about the negative consequences of attacking security and inserting backdoors that can harm everyone, just so long as they can also spy on people they don't like. You know, like the US Senate.

Filed Under: backdoors, cia, encryption, hackathon, jamboree, privacy, spying, surveillance
Companies: apple


Reader Comments

Subscribe: RSS

View by: Time | Thread


  1. icon
    art guerrilla (profile), 11 Mar 2015 @ 2:22pm

    Re: Re: Re: Re:

    @ anon cow-
    1. i propose this to you: what if (and it isn't an 'if', it is a definite), 'our' computer-based voting systems are NOT secure (they are not) ?
    then the ONLY method we have for 'holding them accountable' is borked...

    2. but, let's be stupid and assume the voting systems are valid: when the two hydra heads of the SAME korporate money party have the system on lock down, HOW in dog's name do we EFFECTIVELY get any other 3rd party candidates any traction ? we don't...

    3. HOW do we actually DO our due diligence and oversight when it is kept super duper top secret EVEN FROM OUR DULY ELECTED officials *supposedly* providing oversight ? how can WE "OWNERS" of democracy provide any oversight of things kept (PURPOSEFULLY/ILLEGALLY) out of sight that we have NO knowledge of being done in our names with our monies ? ? ?

    4. lastly, the warm and fuzzy anecdote (BASED ON A MOVIE) is sweet and all; but when the media is bought and paid for to NOT do any such investigative reporting, HOW is a mere citizen supposed to put the fear of dog in our 'superiors' ? ? ? not going to happen to any significant degree, just not going to, i don't care how many pairs of rose-colored glasses you have on...

Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here



Subscribe to the Techdirt Daily newsletter




Comment Options:

  • Use markdown. Use plain text.
  • Remember name/email/url (set a cookie)

Follow Techdirt
Techdirt Gear
Shop Now: I Invented Email
Advertisement
Report this ad  |  Hide Techdirt ads
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Chat
Advertisement
Report this ad  |  Hide Techdirt ads
Recent Stories
Advertisement
Report this ad  |  Hide Techdirt ads

Close

Email This

This feature is only available to registered users. Register or sign in to use it.