{"id":31641,"date":"2017-03-09T21:45:00","date_gmt":"2017-03-10T02:45:00","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/wikileaks-reveal-of-cia-hacking-trove-has-feds-on-mole-hunt.php"},"modified":"2017-03-09T21:45:00","modified_gmt":"2017-03-10T02:45:00","slug":"wikileaks-reveal-of-cia-hacking-trove-has-feds-on-mole-hunt","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/wikileaks\/wikileaks-reveal-of-cia-hacking-trove-has-feds-on-mole-hunt.php","title":{"rendered":"WikiLeaks reveal of CIA hacking trove has feds on mole hunt &#8230;"},"content":{"rendered":"<p><p>    Manning. Snowden. Whose name is next to be added to the    notorious list of government leakers?  <\/p>\n<p>    The CIA is trying to answer that question right now.  <\/p>\n<p>    A day after WikiLeaks released what it alleged to be the    entire hacking capacity of the CIA, the focus Wednesday began    shifting to just who gave the stunning surveillance information    to the anti-secrecy website.  <\/p>\n<p>    There is heavy s--- coming down, said a veteran cyber    contractor for the intelligence community who previously worked    in the breached unit, the CIAs Center for Cyber Intelligence.  <\/p>\n<p>    WIKILEAKS RELEASES 'ENTIRE HACKING CAPACITY' OF    CIA  <\/p>\n<p>    The contractor told Fox News that CCI has long maintained an    internal database of information -- accessible to anyone with    proper credentials or security clearance -- that seemed to be    dumped in total to WikiLeaks. In its news release on the    disclosure, WikiLeaks said CCI had more than 5,000 registered    users, a number alternatively referred to as absurd and a    bit high by security experts who spoke to Fox News.The    CIA declined comment to Fox News.  <\/p>\n<p>    The FBI opened a federal criminal investigation into the    WikiLeaks disclosure on Wednesday, Fox News confirmed. As the    probe gets underway,experts said theres a typical    incident response playbook they would use to narrow down the    massive pool of suspects.  <\/p>\n<p>    Theyre going to try to do some forensic work because those    documents probably have been changed [over time], so that    enables them to narrow down the period to when they were    taken, said Alex Yampolskiy, the CEO of SecurityScorecard.    Once you say this seems like it was a snapshot from this    particular time, then they can look at audit logs of who had    access to the document during that time frame.  <\/p>\n<p>    Yampolskiy said analysts would likely target the most sensitive    documents that were revealed during their forensic work, as    only those with a higher security clearance would have had    access to them  again, shrinking the group of suspects.  <\/p>\n<p>    Once a core group is established, investigators would institute    behavioral profiling.  <\/p>\n<p>    Theyll run certain types of analytics  what websites did    they access? What are the emails? How many people are still    working there? Yampolskiy said.  <\/p>\n<p>    Regardless of the results of the inquiry, Brian Vecci, a    technological evangelist for cybersecurity company Varonis,    said the secret trove revealed by WikiLeaks illustrates the    pervasive issue of another major data breach of a major    government organization tasked with security.  <\/p>\n<p>    Whats clear to me -- and this is true of pretty much every    big data breach -- the preventive controls were broken, or the    detective controls were broken, Vecci said. Meaning, either    too many people had access to the information, or the people    that had access werent being recorded and analyzed. Or both.  <\/p>\n<p>    Last year SecurityScorecard ranked 18 industries by their    cybersecurity performance. Information services, construction    and food ranked 1, 2 and 3, respectively. Government was dead    last.  <\/p>\n<p>    But there was a twist, Yampolskiy said.  <\/p>\n<p>    The CIA was specifically one of the top performers in the    government, he said. An A letter grade.  <\/p>\n<p>    Fox News Catherine Herridge and James Rosen contributed to    this report.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.foxnews.com\/us\/2017\/03\/08\/wikileaks-reveal-cia-hacking-trove-has-feds-on-mole-hunt.html\" title=\"WikiLeaks reveal of CIA hacking trove has feds on mole hunt ...\">WikiLeaks reveal of CIA hacking trove has feds on mole hunt ...<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Manning. Snowden. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[],"class_list":["post-31641","post","type-post","status-publish","format-standard","hentry","category-wikileaks"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31641"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=31641"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31641\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=31641"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=31641"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=31641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}