{"id":194429,"date":"2017-05-23T22:32:11","date_gmt":"2017-05-24T02:32:11","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/government-not-sitting-on-hundreds-of-zero-days-former-nsa-official-says-fedscoop\/"},"modified":"2017-05-23T22:32:11","modified_gmt":"2017-05-24T02:32:11","slug":"government-not-sitting-on-hundreds-of-zero-days-former-nsa-official-says-fedscoop","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/government-not-sitting-on-hundreds-of-zero-days-former-nsa-official-says-fedscoop\/","title":{"rendered":"Government not &#8216;sitting on hundreds of zero days,&#8217; former NSA official says &#8211; FedScoop"},"content":{"rendered":"<p><p>    This story first appeared     on CyberScoop.  <\/p>\n<p>    Storm clouds are rising over the U.S. governments policy on    software flawdisclosure after the massive WannaCry    infection spread using a cyberweapon developed by the NSA, and    even former agency leaders say it might be time to take a fresh    look at the Vulnerability Equities Process.  <\/p>\n<p>    Under the VEP, U.S. officials weigh the benefits of disclosing    a newly discoveredflaw to the manufacturer  which can    issue a patch to protect customers  or having the government    retain itfor spying on foreign adversaries who use the    vulnerable software. The process has always had a bias toward    disclosure, former federal officials said.  <\/p>\n<p>    We disclose something like 90 percent of the vulnerabilities    we find, said Richard Ledgett, who retired April 28 as the    NSAs deputy director. Theres a narrative out there    that were sitting on hundreds of zero days and thats just not    the case, he told Georgetown University Law Centers    annualcybersecurity law institute.  <\/p>\n<p>    On the contrary, he said, the process, led by the [White House    National Security Council], is very bureaucratic and slow and    doesnt have the throughput that it needs. He said itwas    an issue NSA leaders had raised with both the previous    administration and the Trump White House and that    currenthomeland security adviser Thomas Bossert had    promised to fix.  <\/p>\n<p>    A zero day vulnerability is a newly discovered software flaw     one the manufacturer has zero days to patch before it can be    exploited. An exploit is a piece of code that uses a    vulnerability to work mischief on a computer, for instance    allowing a remote hacker to download softwareand seize    control. Not all zero days are created equal, one of the    architects of the VEP, former White House Cybersecurity    Coordinator J. Michael Daniel, told CyberScoop recently.  <\/p>\n<p>    Some exploits might require physical access, or need other    exploits to be pre-positioned. Some might even rely on known    but widely unpatched vulnerabilities, he said. One of the    reasons WannaCry spread so fast  despite being relatively    unsophisticated in design  is that it utilizes a very powerful    NSA exploit called EternalBlue.  <\/p>\n<p>    EternalBlue was one of a large cache of NSA hacking tools    dumped on the web last month by an anonymous group calling    itself the Shadow Brokers  an event that led to     calls for the government to give up stockpiling    vulnerabilities altogether.  <\/p>\n<p>    That would be a mistake, Ledgett said, in part because even    disclosed vulnerabilities can be exploited. Hackers can take    apart the patch and reverse-engineer the vulnerability it is    fixing, and then weaponize it with an exploit. Even when    theres a patch available, Ledgett noted Many people dont    patch, for all sorts of reasons. Large companies, for example,    often have custom software that can breakwhen an    operating system is updated.  <\/p>\n<p>    The idea that ifyou disclose every vulnerability,    everything would be hunky dory is just not true, he said.  <\/p>\n<p>    Besides, the NSAs use of its cyber-exploit arsenal    wasvery tailored, very specific, very measured,    addedLedgett, agreeing that the VEP policy was in about    the right place.  <\/p>\n<p>    Indeed, he said, there was an argument to be made that    Microsoft, which last weekend rushed out an unprecedented patch    for discontinued but still widely used software like Windows    XP, should bear some of the blame for not patching the    discontinued products in March, when it patched its current    products  apparently in response to an advance warning from    the NSA.  <\/p>\n<p>    Daniel     revealed theVEP in 2014, in response to suspicions    that the NSA had known about the huge Heartbleed vulnerability    in a very widely used piece of open-source software  it    hadnt, hesaid. But the policy has been in place since    2010, according to documents    declassified in response to a Freedom of Information Act    request from the Electronic Frontier Foundation  an internet    freedom advocacy group.  <\/p>\n<p>    And Ledgett said the NSA had previously had a similar policy in    place for decades. At the heart of the process, he said, is a    balancing of how valuable the vulnerability in question is for    the NSAs foreign intelligence mission, versus how damaging it    might be U.S. companies or Americans generally, if it were    discovered by an adversaryor revealed before it could be    patched.  <\/p>\n<p>    Ledgett said the new process balanced more or less the same    factorsin more or less the same way  although there were    additional players like the State and Commerce Departments at    the table in the National Security Council-led VEP.  <\/p>\n<p>    The thing thats new since since 2014 is the risk of    disclosure of a vulnerability, he said.  <\/p>\n<p>    But former NSA director and retired four-star Air Force Gen.    Michael Haydenpoints out two other things that have also    changed  affecting where NSA places the fulcrum in its    balancing of offensive and defensive equities.  <\/p>\n<p>    Far more often now the vulnerability in question is residing    on a device that is in general use (including by    Constitutionally protected US persons) than on an isolated    adversary network, he wrote in a     blog post for the Chertoff Group, where he now works.  <\/p>\n<p>    He said that a comfort zone the NSA had previously enjoyed    had also narrowed considerably. The comfort zone was called    NOBUS, short for nobody but us. In other words,This    vulnerability is so hard to detect and so hard to exploit that    nobody but us (a massive, technological powerful, resource    rich, nation state security service) could take advantage of    it.  <\/p>\n<p>    That playing field is being leveled, not just by competing    nation states but also by powerful private sector enterprises,    he concluded, The NOBUS comfort zone is considerably smaller    than it once was.  <\/p>\n<p>    This week, bipartisan bills in both chambers     sought to give the VEP a basis in law.Sens. Brian    Schatz, D-Hawaii, Ron Johnson, R-Wis., and Cory Gardner,    R-Colo., and Reps. Ted Lieu, D-Calif., and Blake Farenthold,    R-Texas, put forwardtheProtecting Our Ability to    Counter Hacking Act,     or PATCH Act.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.fedscoop.com\/government-not-sitting-hundreds-zero-days-former-nsa-official-says\/\" title=\"Government not 'sitting on hundreds of zero days,' former NSA official says - FedScoop\">Government not 'sitting on hundreds of zero days,' former NSA official says - FedScoop<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> This story first appeared on CyberScoop.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/government-not-sitting-on-hundreds-of-zero-days-former-nsa-official-says-fedscoop\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-194429","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/194429"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=194429"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/194429\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=194429"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=194429"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=194429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}