{"id":193217,"date":"2017-05-17T01:34:15","date_gmt":"2017-05-17T05:34:15","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/why-people-are-blaming-the-global-cyberattack-on-the-nsa-politico\/"},"modified":"2017-05-17T01:34:15","modified_gmt":"2017-05-17T05:34:15","slug":"why-people-are-blaming-the-global-cyberattack-on-the-nsa-politico","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/why-people-are-blaming-the-global-cyberattack-on-the-nsa-politico\/","title":{"rendered":"Why people are blaming the global cyberattack on the NSA &#8211; Politico"},"content":{"rendered":"<p><p>      How the hacking tools escaped the National Security Agency is      unknown. | AP Photo    <\/p>\n<p>    This week's worldwide cybersecurity crisis is just the latest    black eye for the National Security Agency and its practice of    stockpiling secret means of snooping into computer systems.  <\/p>\n<p>    Thats because whoever launched the global series of ransomware assaults is using a flaw in    Microsoft Windows that the U.S. spy agency had apparently    exploited for years  until someone leaked the NSAs hacking tools online and    allowed cyber criminals to copy them.  <\/p>\n<p>    Story Continued Below  <\/p>\n<p>    Now, critics ranging from Microsoft to Vladimir Putin to    fugitive NSA leaker Edward Snowden are denouncing the agencys    practice of stockpiling computer vulnerabilities for its own    use instead of informing the developers or manufacturers so    they can plug the holes. And some privacy advocates and    technology experts want Congress to make the agency rein in the    practice.  <\/p>\n<p>    Heres POLITICOs summary of where that debate stands:  <\/p>\n<p>    How did hackers get ahold of the NSAs tools?  <\/p>\n<p>    Thats a good question. But the ransomware racing around the    globe is based on a cache of apparent NSA hacking software and    documents that a group calling itself the Shadow Brokers    posted online on April 14. (Shadow Brokers    first began making these kinds of dumps last year.) The Trump    and former Obama administrations have refused to confirm that    the NSA had lost control of its tools, but former intelligence    officials say the leaked material is genuine.  <\/p>\n<p>    How the hacking tools escaped the NSA is unknown. But there are three main    possibilities: An NSA employee or contractor went rogue and    stole the files; a sophisticated adversary such as the Russian    government hacked into the spy agency and took them; or an NSA    hacker accidentally left the files exposed on a server being    used to stage a U.S. intelligence operation, and someone found    them.  <\/p>\n<p>    Contractors, who can lack the institutional loyalty of regular    employees, have long been a source of heartache to the intelligence    community, from the 2013 Snowden leaks to the arrest last year of Harold Martin, a    Maryland man charged with stealing reams of classified files    and hoarding them in his home.  <\/p>\n<p>    Which NSA tool are the hackers using?  <\/p>\n<p>    It appears to be a modified version of an NSA hacking tool, a    software package dubbed ETERNALBLUE, that was buried in the Shadow    Brokers leak.  <\/p>\n<p>    The tool took advantage of a flaw in a part of Windows called    the Server Message Block, or SMB, protocol, which connects    computers on a shared network. In essence, the flaw allows    malware to spread across networks of unpatched Windows    computers, a dangerous prospect in the increasingly connected    world.  <\/p>\n<p>    After the cache leaked, cybersecurity researchers, realizing    that the SMB vulnerability could expose organizations to    massive hacks, reverse engineered the tool, checking how    it worked and evaluating how to defeat it. These researchers    posted their work online to crowdsource and accelerate the    process.  <\/p>\n<p>    But their work also helped digital thieves. At some point, the    criminals behind the ransomware attack grabbed the    reverse-engineered exploit and incorporated it into their    malware.  <\/p>\n<p>    This separated their attack tool from previous popular    iterations of ransomware. Whereas normal ransomware locks down    an infected computers files and stops there, this variant    can jump from machine to machine, infecting    entire businesses like the internets earliest computer worms.  <\/p>\n<p>    What did the NSA do after learning of the theft?  <\/p>\n<p>    The spy agency probably warned Microsoft about the    vulnerability soon afterward. Microsoft released a patch for computer users to repair the flaw    in March, a month before the Shadow Brokers leak.  <\/p>\n<p>    But thats not good enough for civil liberties advocates, who    want stricter limits on how long the government can hold onto    vulnerabilities it discovers.  <\/p>\n<p>    These attacks underscore the fact that vulnerabilities will be    exploited not just by our security agencies, but by hackers and    criminals around the world, said Patrick Toomey, a national    security attorney at the American Civil Liberties Union, in a    statement. Patching security holes    immediately, not stockpiling them, is the best way to make    everyones digital life safer.  <\/p>\n<p>    The agencys defenders disagree. That nobody else discovered    these vulnerabilities as far as we know suggests that it is    right for the NSA to hold onto them if they have confidence    that nobody else has a copy of their tools, Nicholas Weaver, a    researcher at the University of California in Berkeley, told    POLITICO. It actually is a problem that the NSA cant or wont    claim credit for properly notifying Microsoft. The NSA did the    right thing, and they arent getting the credit for it they    deserve.  <\/p>\n<p>    Is this a new controversy for the NSA?  <\/p>\n<p>    No. But the crisis that began on Friday is giving it prominence    like never before.  <\/p>\n<p>    Privacy advocates and tech companies have long criticized the    U.S. spy agencies for keeping knowledge of security flaws a    secret and building hacking tools to exploit them. And they say    its especially bad when the government cant keep its secret    exploits out of the hands of cyber criminals.  <\/p>\n<p>    When [a] U.S. nuclear weapon is stolen, its called an empty    quiver, tweeted Snowden, whose 2013 leaks exposed the vast    underbelly of the government's spying capacity. This weekend,    [the NSAs] tools attacked hospitals.  <\/p>\n<p>    Microsoft President Brad Smith also denounced the NSAs    inability to secure its tools. An equivalent scenario with    conventional weapons would be the U.S. military having some of    its Tomahawk missiles stolen, he wrote in a weekend blog post.  <\/p>\n<p>    Putin later picked up that theme, telling reporters in Beijing that U.S.    intelligence agencies were clearly the initial source of the    virus.  <\/p>\n<p>    Once they're let out of the lamp, genies of this kind,    especially those created by intelligence services, can later do    damage to their authors and creators,\" the Russian leader said.  <\/p>\n<p>    But former national security officials say the government needs    to build hacking tools to keep the U.S. safe. And White House    homeland security adviser Tom Bossert downplayed the possible origin of the code    Monday.  <\/p>\n<p>    Regardless of the provenance of the exploit here used, he    told ABC, who is culpable are the criminals that distributed    it and the criminals that weaponized it, added additional    details to it, and turned this into something that is holding    ransom data but also putting at risk lives and hospitals.  <\/p>\n<p>          A daily briefing on politics and cybersecurity  weekday          mornings, in your inbox.        <\/p>\n<p>          By signing up you agree to receive email newsletters or          alerts from POLITICO. You can unsubscribe at any time.        <\/p>\n<p>    Whats Congress doing?  <\/p>\n<p>    The government uses a system called the Vulnerability Equities    Process to determine whether and when agencies must tell    companies about code flaws they discover. Following recent spy    agency leaks, former government officials, cyber experts and tech companies have proposed changes to the    VEP that would limit the intelligence communitys ability to    hoard vulnerabilities.  <\/p>\n<p>    Some are calling for Congress to act.  <\/p>\n<p>    Those include Rep. Ted Lieu, a California Democrat with a    computer science degree, who has led the charge to reform the    VEP.  <\/p>\n<p>    Lieu, a leading congressional voice on cybersecurity, called the process not transparent in a    statement Friday, saying few people understand how the    government makes these critical decisions. The ransomware    campaign, he added, shows what can happen when the NSA or CIA    write malware instead of disclosing the vulnerability to the    software manufacturer.  <\/p>\n<p>    But Lieus bill is unlikely to become law. Not only does the    intelligence community have numerous defenders in Congress, but    politicians simply arent paying much attention to the issue.    Lawmakers haven't rushed to join Lieu in calling for VEP    changes. There have only been a few hearings on ransomware in recent years, and    no pending legislation mentions either ransomware or the VEP.  <\/p>\n<p>    Martin Matishak contributed to this report.  <\/p>\n<p>            Missing out on the latest scoops? Sign up for POLITICO Playbook and get the            latest news, every morning  in your inbox.          <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See original here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.politico.com\/story\/2017\/05\/15\/global-cyberattack-nsa-238412\" title=\"Why people are blaming the global cyberattack on the NSA - Politico\">Why people are blaming the global cyberattack on the NSA - Politico<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> How the hacking tools escaped the National Security Agency is unknown.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/why-people-are-blaming-the-global-cyberattack-on-the-nsa-politico\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-193217","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/193217"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=193217"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/193217\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=193217"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=193217"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=193217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}