Skip to Main Content
PCMag editors select and review products independently. If you buy through affiliate links, we may earn commissions, which help support our testing.

Why Can't the CIA Eradicate Ransomware?

Based on new leaks you'd think we live in truly Orwellian times, but the authorities building the surveillance state still can't do anything to stop actual crimes.

March 8, 2017
Ransomware Feature

WikiLeaks is rolling out Vault 7, a cache of documents that outline CIA hacking operations. Oddly, people are shocked. Why? We've been told for years that phone microphones and webcams can be turned on and off at will or that you can be tracked by your phone. Why is this a major revelation in 2017?

Opinions Here is what I am surprised about. The CIA, FBI, NSA, and a host of intelligence agencies receive untold billions of dollars, so they should be at the top of the hacking foodchain. But they can't seem to do anything about ransomware scammers. It's time to put some of the resources spent hacking enemy nations into finding those behind botnets, spambots, and especially ransomware.

The idea behind ransomware is simple. Some sort of malware infects your machine, encrypting all or part of your files and disks, rendering them useless—unless you pay a ransom to get a key to unlock your own system. The "fee" hovers around $500, typically paid in bitcoin. Recent targets include hospitals, municipalities, and the entire Senate Democratic Caucus of Pennsylvania, all of which were hit with exorbitant fees for the unlock code.

Sure, law enforcement has caught a few ransomware criminals but not enough of them; it's a plague costing users millions of dollars.

The Vault 7 revelations, however, make me question how there can be any criminal activity at all in this country with Big Brother watching our every move. And why are our governments and municipalities spending billions to develop an outrageous surveillance state anyway? Blackmail? It doesn't seem to prevent crime. I'd be very interested in the answer.

Recommended by Our Editors

If legislators were honest they might say, "We have all this money and we have to spend it on something fun. This is fun." For hackers working for the agencies, it does look like a lot of them are having fun developing tools. That would not be a surprise either. Not to worry, those questions will never be asked.

Here's to the next cache of Vault 7 docs. Hopefully, they are more entertaining.

Like What You're Reading?

Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.


Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

Sign up for other newsletters

TRENDING

About John C. Dvorak

Columnist, PCMag.com

John C. Dvorak is a columnist for PCMag.com and the co-host of the twice weekly podcast, the No Agenda Show. His work is licensed around the world. Previously a columnist for Forbes, PC/Computing, Computer Shopper, MacUser, Barrons, the DEC Professional as well as other newspapers and magazines. Former editor and consulting editor for InfoWorld, he also appeared in the New York Times, LA Times, Philadelphia Enquirer, SF Examiner, and the Vancouver Sun. He was on the start-up team for C/Net as well as ZDTV. At ZDTV (and TechTV) he hosted Silicon Spin for four years doing 1000 live and live-to-tape TV shows. His Internet show Cranky Geeks was considered a classic. John was on public radio for 8 years and has written over 5000 articles and columns as well as authoring or co-authoring 14 books. He's the 2004 Award winner of the American Business Editors Association's national gold award for best online column of 2003. That was followed up by an unprecedented second national gold award from the ABEA in 2005, again for the best online column (for 2004). He also won the Silver National Award for best magazine column in 2006 as well as other awards. Follow him on Twitter @therealdvorak.

Read John C.'s full bio

Read the latest from John C. Dvorak