{"id":193564,"date":"2017-05-18T14:03:29","date_gmt":"2017-05-18T18:03:29","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/why-leaked-nsa-hacking-tools-are-not-like-stolen-tomahawk-missiles-yahoo-news\/"},"modified":"2017-05-18T14:03:29","modified_gmt":"2017-05-18T18:03:29","slug":"why-leaked-nsa-hacking-tools-are-not-like-stolen-tomahawk-missiles-yahoo-news","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/why-leaked-nsa-hacking-tools-are-not-like-stolen-tomahawk-missiles-yahoo-news\/","title":{"rendered":"Why leaked NSA hacking tools are not like stolen Tomahawk missiles &#8211; Yahoo News"},"content":{"rendered":"<p><p>    Last week a malicious computer worm dubbed WannaCry 2.0 began    attacking older, unpatched versions of Microsoft operating    systems,     infecting hundreds of thousands of systems with ransomware    that held user data hostage in exchange forBitcoin    payments.  <\/p>\n<p>    The cyberattack used code from a powerful National Security    Agencytool called EternalBlue, which a mysterious group    of hackers known as The Shadow Brokers leaked earlier this    year. Tech companies have been quick to blame the NSA for    finding and exploiting vulnerabilities in commercial products    like Windows, to say nothing of losing them.  <\/p>\n<p>    On Sunday, Brad Smith, Microsofts    (MSFT)    president and chief legal officer, argued that an    equivalent scenario with conventional weapons would be the    U.S. military having some of its Tomahawk missiles stolen.  <\/p>\n<p>    The next day, Former NSA contractor Edward Snowden, speaking    via video chat to the K(NO)W Identity Conference in Washington    D.C. from an undisclosed location in Russia, repeated Smiths    argument.  <\/p>\n<p>    An equivalent scenario to what were seeing happening today    would be conventional weapons, produced and held by the U.S.    military, being stolen, such as Tomahawk missiles, Snowden    said while describing Smiths letterto a crowd less than    a mile from the White House.  <\/p>\n<p>      Edward Snowden speaking via video chat from Russia at the      K(NO)W Identity Conference in Washington, D.C. on May 15.      (image: One World Identity)    <\/p>\n<p>    U.S. officials acknowledge that the NSA deserves scrutiny about    protecting tools it develops to collect foreign intelligence.    Theyve absolutely got to do a better job protecting [the    hacking tools], General Keith Alexander, head of the NSA from    2005 to 2014, told The Washington    Post. You cant argue against that.  <\/p>\n<p>    However, the Tomahawk analogy may be a stretch. Dave Aitel, a    former NSA research scientist and CEO of the cybersecurity    company Immunity, explained why    hacking tools are not like bombs.  <\/p>\n<p>    The very first thing is you can steal a Tomahawk missile from    me, but you cannot steal it from me without me knowing youve    stolen it, Aitel said. And of course, you can steal an    exploit or other intellectual property from me and I may never    find out. Another is that two people can have [the same    exploit] at the same time.  <\/p>\n<p>    Aitel, who specializes in the offensive side of cybersecurity,    added that deep down, the biggest difference is that you have    to learn a lot about exploits to protect yourself, and I dont    really have to learn a lot about Tomahawk missiles to protect    myself from Tomahawk missiles.  <\/p>\n<p>      This is the screen youll see if your computer is infected      with the WannaCry 2.0 ransomware.    <\/p>\n<p>    Nevertheless, the analogy has been relatively well received.    Travis Jarae, CEO and Founder of One World Identity, which    hosted the conference in Washington, and     paid a speakers bureau to digitally host Snowden,    saidthat the Tomahawk analogy is not wrong given the    contemporary threat environment.  <\/p>\n<p>    Warfare is digital, explained Jarae, who was previously    Global Head of Identity Verification at Google. We spy on    people digitally  I thought it was a little aggressive to    compare it to a missile, but [government hacking] is very    damaging.  <\/p>\n<p>    Aitel noted that it    makes sense why Smith and others in the tech business would    make that argument.  <\/p>\n<p>    [Brad Smiths] job is to create favorable economic conditions    for Microsoft at a strategic level, and if he pressure    governments to stop using exploits, then that helps him from a    PR perspective, Aitel said. It doesnt help the users because    people are still going to have exploits. Thats always going to    be true.  <\/p>\n<p>    Read    More  <\/p>\n<p>        Microsoft president and chief legal officer Brad Smith        speaks at a Microsoft tech gathering in Dublin, Ireland        October 3, 2016. REUTERS\/Clodagh Kilcoyne      <\/p>\n<p>      Snowden also echoed Smiths criticisms of the U.S.      governments decision to develop secret software exploits,      telling the audience at the K(NO)W Identity Conference that      secret government exploits are a problem, and the NSA should      have voluntarily revealed the EternalBlue exploit long ago.    <\/p>\n<p>      But other former NSA officialshave pushed back against      that idea, telling the      Washington Post that EternalBlue netted an unreal foreign      intelligence haul that was like fishing with dynamite.    <\/p>\n<p>      Edward Snowden knows full well the value of the signals      intelligence program  and that includes the NSAs hacking       to our national security, Aitel said. This is not for play.      Theyre not building exploits for fun. Its not a hobby. Its      for distinct and important national security needs.    <\/p>\n<p>      So when he says Give up your exploits, he essentially is      saying, We dont need signals intelligence, which we do.    <\/p>\n<p>      Ultimately, according to Aitel, companies like Microsoft      placing the blame on the NSA with crude analogies equating      NSA hacking tools to U.S. cruise missiles only serves to      muddy the larger debate.    <\/p>\n<p>      The bigger issue is Brad Smith and Microsoft, who continue      to insist that everything fall their way in terms of how      vulnerabilities are handled, which I dont think helps the      conversation around cybersecurity, Aitel said. There are a      lot of very interesting things in cybersecurity that dont      involveMicrosofts bottom line, and those are worth      talking about.    <\/p>\n<p>      READ MORE:    <\/p>\n<p>            The simple reason so many companies were hit by the WannaCry      2.0 ransomware    <\/p>\n<p>            As tensions rise with Russia, U.S. colleges still pay for      Snowden speeches    <\/p>\n<p>            No, your Apple computer isnt immune from ransomware    <\/p>\n<p>            Risk director discusses the tragedy of Julian Assange and      WikiLeaks    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>The rest is here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/finance.yahoo.com\/news\/leaked-nsa-hacking-tools-not-like-stolen-tomahawk-missiles-153401626.html\" title=\"Why leaked NSA hacking tools are not like stolen Tomahawk missiles - Yahoo News\">Why leaked NSA hacking tools are not like stolen Tomahawk missiles - Yahoo News<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Last week a malicious computer worm dubbed WannaCry 2.0 began attacking older, unpatched versions of Microsoft operating systems, infecting hundreds of thousands of systems with ransomware that held user data hostage in exchange forBitcoin payments. The cyberattack used code from a powerful National Security Agencytool called EternalBlue, which a mysterious group of hackers known as The Shadow Brokers leaked earlier this year. Tech companies have been quick to blame the NSA for finding and exploiting vulnerabilities in commercial products like Windows, to say nothing of losing them <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/why-leaked-nsa-hacking-tools-are-not-like-stolen-tomahawk-missiles-yahoo-news\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-193564","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/193564"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=193564"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/193564\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=193564"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=193564"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=193564"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}