{"id":131377,"date":"2014-05-08T12:02:35","date_gmt":"2014-05-08T16:02:35","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/former-nsa-chief-defends-stockpiling-software-flaws-for-spying.php"},"modified":"2014-05-08T12:02:35","modified_gmt":"2014-05-08T16:02:35","slug":"former-nsa-chief-defends-stockpiling-software-flaws-for-spying","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/former-nsa-chief-defends-stockpiling-software-flaws-for-spying.php","title":{"rendered":"Former NSA Chief Defends Stockpiling Software Flaws for Spying"},"content":{"rendered":"<p><p>      Former National Security Agency      chief Gen. Keith Alexander. Photo: Evan      Vucci\/AP    <\/p>\n<p>    The NSA has never said much about    the open secret that it collects and sometimes even pays for    information about hackable flaws in commonly used software. But    in a rare statement following his retirement last month, former    NSA chief Keith Alexander acknowledged and defended that    practice. In doing so, he admitted the deeply contradictory    responsibilities of an agency tasked with defending Americans    security and simultaneously hoarding bugs in software they use    every day.  <\/p>\n<p>    I would love to have all the    terrorists just use that one little sandbox over there so that    we could focus on them. But they dont.  <\/p>\n<p>    When the government asks NSA to    collect intelligence on terrorist X, and he uses publicly    available tools to encode his messages, it is not acceptable    for a foreign intelligence agency like NSA to respond, Sorry    we cannot understand what he is saying, Alexander told the    Australian Financial Review, which he inexplicably    granted a     16,000-word interview. To ask NSA not to look for    weaknesses in the technology that we use, and to not seek to    break the codes our adversaries employ to encrypt their    messages is, I think, misguided. I would love to have all the    terrorists just use that one little sandbox over there so that    we could focus on them. But they dont.  <\/p>\n<p>    The NSA has been widely criticized    for using its knowledge of security flaws for spying, rather    than working to patch those flaws and make internet users more    secure.Alexanders defense of the practice boils down to    the notion that separating friend and foe when seeking to break    codes has become a nearly impossible task.  <\/p>\n<p>    The interesting change has been    the diffusion of encryption technologies into everyday life,    he told AFR. It used to be that only, say, German    forces used a crypto-device like Enigma to encipher their    messages. But in todays environment encryption technology is    embedded into all our communications.  <\/p>\n<p>    At other points in his statement,    Alexander argued that the NSA does disclose some of    the vulnerabilities it finds in software to those who can patch    the flaws, insisting that it focuses its bug-hunting primarily    on defense, rather than using vulnerabilities for offensive    purposes. He also went further, stating that the NSA    categorically [does] not erode the defenses of U.S.    communications, or water down security guidance in order to    sustain access for foreign intelligence.  <\/p>\n<p>    The latter claim contradicts    numerous reports that the NSA is     seeking to weaken encryption to give itself a backdoor into    encrypted communications.  <\/p>\n<p>    Last December, a group of advisers    to the White House     issued a report to President Obamacalling on him to    rein-in the intelligence communitys use of so-called zero-day    vulnerabilitiesnewly discovered hackable software bugs for    which there exist no patch. The group went on to propose that    zero-days only be used sparingly for high priority    intelligence collection, and that those uses must be approved    by a senior-level, interagency approval process.  <\/p>\n<p>    In almost all instances, for    widely used code, it is in the national interest to eliminate    software vulnerabilities rather than to use them for US    intelligence collection, the     report reads. Eliminating the vulnerabilitiespatching    themstrengthens the security of U.S. Government, critical    infrastructure, andother computer systems.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Continued here:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/feeds.wired.com\/c\/35185\/f\/661370\/s\/3a2bf8ba\/sc\/7\/l\/0L0Swired0N0C20A140C0A50Calexander0Edefends0Euse0Eof0Ezero0Edays0C\/story01.htm\/RK=0\/RS=U78e1iJ1bIg36zghTQeSj.kVh9A-\" title=\"Former NSA Chief Defends Stockpiling Software Flaws for Spying\">Former NSA Chief Defends Stockpiling Software Flaws for Spying<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Former National Security Agency chief Gen. Keith Alexander. Photo: Evan Vucci\/AP The NSA has never said much about the open secret that it collects and sometimes even pays for information about hackable flaws in commonly used software.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/former-nsa-chief-defends-stockpiling-software-flaws-for-spying.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-131377","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/131377"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=131377"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/131377\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=131377"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=131377"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=131377"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}