Feeds

CIA snoops snooped on Senate to spy spy torture report – report

Spies spied on our spy docs, official claims

Providing a secure and efficient Helpdesk

CIA officers allegedly hacked into the US Senate Intelligence Committee's computers to find out what the oversight committee had found out about its controversial detention and treatment of terror suspects.‬

The oversight committee had managed to get its hands on unapproved material, or so the CIA feared, the New York Times reports. In response, the agency allegedly went as far as hacking into the Congressional network to find out what it knew and perhaps where the leaked material came from, an unnamed official told the paper.

It's unclear whether the alleged hacking was limited to part of a CIA document leak/whistleblower hunt or went even further and resulted in electronic snooping against senators and their support staff.

"CIA officers went as far as gaining access to computer networks used by the committee to carry out its investigation," an unnamed official told the NYT.

Whether the ‪CIA allegedly snooped on the Congressional network itself or machines and network used by committee staff to review top secret reports is unclear*.‬

But in either case, if monitoring did in fact occur, it may have violated an agreement between the committee and the CIA. The purported snooping is rumoured to have soured relations between the agency and its normally supportive legislative watchdog, McClatchydc.com reports.

The CIA Inspector General’s Office has launched an internal investigation into allegations the intelligence agency "improperly" spied on Congress.

The as-yet-unreleased Senate Intelligence Committee report into the CIA’s secret detention and interrogation programme is 6,300 pages long, and took four years and $40m dollars to put together. It is rumoured to be highly critical of the use of water-boarding and other harsh interrogation techniques against suspected terrorists in secret overseas prisons.

The report is said to further allege that the CIA officials misled Congress and the White House about the controversial programme, which operated during the early years of the War on Terror under the George W Bush administration. US President Barack Obama canned the programme as one of his first acts after assuming office in 2009.

The report has yet to be declassified but it's known to argue that the CIA's harsh interrogation methods yielded little valuable intelligence, an argument the agency disputes.

A year ago Senator Mark Udall (Democrat, Colorado) said that he was aware of an internal CIA report that supported the committee's criticism and contradicted the agency's official line that harsh interrogation worked. The NYT reckons it was this incident that prompted the agency to start a leak probe.

In a letter to President Obama on Tuesday, Udall made a reference to the dispute with the CIA, the NYT reports.

“As you are aware, the CIA has recently taken unprecedented action against the committee in relation to the internal CIA review, and I find these actions to be incredibly troubling for the committee’s oversight responsibilities and for our democracy,” he wrote.

Security experts argued that the Senators were only getting a dose of the medicine they had prescribed to others.

‪"If the Senate didn't want the CIA hacking their computer network, perhaps they shouldn't have funded the CIA's offensive cyber capabilities," said Christopher Soghoian, principal technologist of the speech, privacy & technology project at the American Civil Liberties Union, in an update to his personal Twitter account. ‬®

Bootnote

*The CIA allegedly insisted that Senate committee staff and members could only review classified cables at a secure facility in Northern Virginia. "The committee determined earlier this year that the CIA monitored computers – in possible violation of an agreement against doing so – that the agency had provided to intelligence committee staff in a secure room at CIA headquarters that the agency insisted they use to review millions of pages of top-secret reports, cables and other documents," the McClatchyDC news service reports.

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.