{"id":193567,"date":"2017-05-18T14:03:32","date_gmt":"2017-05-18T18:03:32","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/after-wannacry-a-new-bill-would-force-the-nsa-to-justify-its-hacking-the-verge\/"},"modified":"2017-05-18T14:03:32","modified_gmt":"2017-05-18T18:03:32","slug":"after-wannacry-a-new-bill-would-force-the-nsa-to-justify-its-hacking-the-verge","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/after-wannacry-a-new-bill-would-force-the-nsa-to-justify-its-hacking-the-verge\/","title":{"rendered":"After WannaCry, a new bill would force the NSA to justify its hacking &#8230; &#8211; The Verge"},"content":{"rendered":"<p><p>    After last weeks massive ransomware attack shut down machines    around the world, the NSA, which knew of the exploit before it    was public, became a target for criticism. Microsoft patched    the problem before the attack, but its still raised questions    about how, and when, the NSA decides to hold on to software    vulnerabilities.  <\/p>\n<p>    The Protecting Our Ability to Counter Hacking Act of    2017  <\/p>\n<p>    A new bill would help bring accountability to how the NSA deals    with those vulnerabilities. Introduced by Sen. Brian Schatz,    the     Protecting Our Ability to Counter Hacking Act of 2017, or    PATCH Act, would establish a legal framework for the process,    requiring federal agencies to establish policies on when to    share vulnerabilities and, if unclassified, to make those    policies widely available.  <\/p>\n<p>    The law would also legally establish a review board with    high-ranking members of the federal government. The board would    be chaired by the secretary of homeland security and include    agency directors from the intelligence community as well as the    secretary of commerce. The law would also require annual    reports to Congress on the boards activities.  <\/p>\n<p>    A version of the governments process, known as    \"vulnerabilities equities process,\" has been in place for some    time, although its exact details are unclear. A version of the    board already exists, but some have criticized the process as    opaque, and a law would go some way toward binding the federal    government to the system.  <\/p>\n<p>    The NSA most famously faced criticism for its exploit process    in 2014,     when Bloomberg reported that the agency had    exploited the Heartbleed bug, which exposed vulnerabilities    in devices around the world. (The agency denied the report.)    Microsoft     obliquely criticized the US after the WannaCry ransomware    attack last week, calling the incident a wake-up call about    vulnerability hoarding.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the rest here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.theverge.com\/2017\/5\/17\/15647508\/wannacry-ransomeware-microsoft-nsa-patch-act-hacking\" title=\"After WannaCry, a new bill would force the NSA to justify its hacking ... - The Verge\">After WannaCry, a new bill would force the NSA to justify its hacking ... - The Verge<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> After last weeks massive ransomware attack shut down machines around the world, the NSA, which knew of the exploit before it was public, became a target for criticism.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/after-wannacry-a-new-bill-would-force-the-nsa-to-justify-its-hacking-the-verge\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-193567","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/193567"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=193567"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/193567\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=193567"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=193567"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=193567"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}