{"id":195552,"date":"2017-05-30T14:09:06","date_gmt":"2017-05-30T18:09:06","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/why-the-nsa-makes-us-more-vulnerable-to-cyberattacks-the-lessons-of-wannacry-foreign-affairs\/"},"modified":"2017-05-30T14:09:06","modified_gmt":"2017-05-30T18:09:06","slug":"why-the-nsa-makes-us-more-vulnerable-to-cyberattacks-the-lessons-of-wannacry-foreign-affairs","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/why-the-nsa-makes-us-more-vulnerable-to-cyberattacks-the-lessons-of-wannacry-foreign-affairs\/","title":{"rendered":"Why the NSA Makes Us More Vulnerable to Cyberattacks The Lessons of WannaCry &#8211; Foreign Affairs"},"content":{"rendered":"<p><p>    There is     plenty of blame to go around for the WannaCry ransomware    that spread throughout the Internet earlier this month,    disrupting work at hospitals, factories, businesses, and    universities. First, there are the writers of the malicious    software, which blocks victims access to their computers until    they pay a fee. Then there are the users who     didnt install the Windows security patch that would have    prevented an attack. A small portion of the blame falls on    Microsoft, which wrote the insecure code in the first place.    One could certainly condemn the Shadow Brokers, a group of    hackers with links to Russia who     stole and published the National Security Agency attack    tools that included the exploit code used in the ransomware.    But before all of this, there was the NSA, which found the    vulnerability years ago and decided to exploit it rather than    disclose it.  <\/p>\n<p>    All software contains bugs or errors in the code. Some of these    bugs have security implications, granting an attacker    unauthorized access to or control of a computer. These    vulnerabilities are rampant in the software we all use. A piece    of software as large and complex as Microsoft Windows will    contain hundreds of them, maybe more. These vulnerabilities    have obvious criminal uses that can be neutralized if patched.    Modern software is patched all the timeeither on a fixed    schedule, such as once a month with Microsoft, or whenever    required, as with the Chrome browser.  <\/p>\n<p>    When the U.S. government discovers a vulnerability in a piece    of software, however, it decides between two competing    equities. It can keep it secret and use it offensively, to    gather foreign intelligence, help execute search warrants, or    deliver malware. Or it can alert the software vendor and see    that the vulnerability is patched, protecting the countryand,    for that matter, the worldfrom similar attacks by foreign    governments and cybercriminals. Its an either-or choice. As    former U.S. Assistant Attorney General Jack Goldsmith has        said, Every offensive weapon is a (potential)  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See original here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.foreignaffairs.com\/articles\/2017-05-30\/why-nsa-makes-us-more-vulnerable-cyberattacks\" title=\"Why the NSA Makes Us More Vulnerable to Cyberattacks The Lessons of WannaCry - Foreign Affairs\">Why the NSA Makes Us More Vulnerable to Cyberattacks The Lessons of WannaCry - Foreign Affairs<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> There is plenty of blame to go around for the WannaCry ransomware that spread throughout the Internet earlier this month, disrupting work at hospitals, factories, businesses, and universities. First, there are the writers of the malicious software, which blocks victims access to their computers until they pay a fee. Then there are the users who didnt install the Windows security patch that would have prevented an attack.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/why-the-nsa-makes-us-more-vulnerable-to-cyberattacks-the-lessons-of-wannacry-foreign-affairs\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-195552","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/195552"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=195552"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/195552\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=195552"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=195552"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=195552"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}