Main Page > NEWS


TECHNOLOGY FOR NATIONAL SECURITY: WIKILEAKS RELEASED HOW TECHNOLOGY IS USED





İlknur Şebnem Öztemel-TDO- Yesterday, WikiLeaks revealed several document to show how technology is used to gain personal information by governments.

It is alleged that the Central Intelligence Agency(CIA)had acquired an array of cyber weapons that could be used to break into Apple and Android smartphones, Windows computers, automotive computer systems, and even smart televisions to conduct surveillance on unwitting users.

According to the document, CIA had obtained information on 14 security flaws in Apple’s iOS operating system for phones and tablets. Also, it has been asserted that at least two dozen flaws in Android, the most popular operating system for smartphones, which was developed by Alphabet’s Google division.

Besides, there were news about foreign firms –out of USA such as RussianKaspersky Lab . It has been argued that it was possible to "write a reliable exploit" for the company's anti-virus software "without any real effort" and that Kaspersky Lab had not fixed vulnerabilities revealed during the hacking conference in 2014.

Whether these are true or not, it is sure that the trust between the Silicon Valley and the government has been ruptured again and there is a need of organizing use of terms for some technological innovations.

David Gutelius, chief executive of the marketing technology company Motiva, said“After the Snowden disclosures, the Obama administration worked hard to re-establish relationships and government-industry partnerships”. He added “This leak will challenge those ties to some extent. But I don’t see companies simply walking away from the table as a result of this. Government and industry still need one another.”

Last year, government asked Apple to investigate iPhone of one of the attackers in the 2015 shooting in San Bernardino, Calif ‘’deeply’’. As the company’s chief executive, Timothy D. Cook, explained in a letter to customers at the time, “The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers’’. The firm rejected the request but the government eventually found a way into the phone without Apple’s assistance. It seems this subject will be debated for a long time.