Lax Cybersecurity Measures Enabled CIA Data Theft, Report Says

The Central Intelligence Agency says a former employee stole some of the agency’s most valuable hacking tools from its so-called Vault 7, according to a redacted investigation report obtained by Sen. Ron Wyden.

by Gopal Ratnam, CQ-Roll Call / June 16, 2020
The CIA seal is seen on the floor during a visit by President Donald Trump on Jan. 21, 2017, at the CIA headquarters in Langley, Va. (Olivier Douliery/Pool/Sipa USA/TNS) TNS

(TNS) — In early 2017 the Central Intelligence Agency suffered a massive data loss when an agency employee stole vast quantities of information including some of its most secretive hacking tools because of lax cybersecurity measures, according to a redacted investigation report obtained by Sen. Ron Wyden, a senior member of the Senate Intelligence Committee.

The employee took away about 180 gigabytes to as much as 34 terabytes — or the equivalent of about 11.6 million to 2.2 billion pages of Microsoft Word documents — which included some of the agency’s most valuable hacking tools from its so-called Vault 7, according to the report. The employee later gave the data to WikiLeaks, which published it in a series of posts.

Citing the CIA’s task force report that examined the breach, Wyden said in a letter addressed to the newly installed Director of National Intelligence John Ratcliffe that the agency had “prioritized building cyberweapons at the expense of securing their own systems.”

In a statement accompanying the letter, Wyden said his office obtained the redacted investigative report after the Justice Department introduced the material as evidence in a court case. Federal prosecutors have charged former software engineer Joshua Shulte, but his family and lawyers have said he is not responsible, The New York Times reported in 2018.

The probe into the CIA leak found that the agency’s “day-to-day security practices had become woefully lax … most of our sensitive cyberweapons were not compartmented” and users shared their passwords with one another. The CIA’s Center for Cyber Intelligence had no plan on mitigation if its weapons were stolen, the investigation found.

The CIA’s hacking tools developed between 2013 and 2016 had been used by the agency to penetrate web browsers including Google Chrome, Microsoft Edge and Mozilla Firefox, as well as smart cars and smart TVs.

Wyden said that U.S. intelligence agencies must begin complying with U.S. law which requires federal agencies to comply with cybersecurity standards and technologies developed by the Department of Homeland Security. Congress had previously exempted U.S. intelligence agencies from that provision.

“It’s now clear that exempting the intelligence community from baseline cybersecurity requirements was a mistake,” Wyden said in his June 16 letter.

Wyden also asked Ratcliffe to answer in an unclassified report questions on how the intelligence agencies are addressing cybersecurity risks, including steps they have taken to secure their websites using multi-factor authentication, employing anti-phishing technologies, and steps the agencies would take to comply with the 22 recommendations made by the Inspector General of the Intelligence Community on tightening cybersecurity standards.

Wyden said U.S. intelligence agencies have yet to require multi-factor authentication on their websites as required by the Cybersecurity and Infrastructure Security Agency, which issued the recommendation in early 2019. The spy agencies also have failed to adopt anti-phishing technologies, another recommendation made by CISA in October 2017, Wyden said.

©2020 CQ-Roll Call, Inc., Distributed by Tribune Content Agency, LLC.

Looking for the latest gov tech news as it happens? Subscribe to GT newsletters.

Platforms & Programs