{"id":195554,"date":"2017-05-30T14:09:07","date_gmt":"2017-05-30T18:09:07","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/ransomware-and-the-nsa-bloomberg\/"},"modified":"2017-05-30T14:09:07","modified_gmt":"2017-05-30T18:09:07","slug":"ransomware-and-the-nsa-bloomberg","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/ransomware-and-the-nsa-bloomberg\/","title":{"rendered":"Ransomware and the NSA &#8211; Bloomberg"},"content":{"rendered":"<p><p>  Some questions,  admiral.<\/p>\n<p>    The effects of this months global ransomware    attackseem to be fading, fortunately.But a    crucial question the incidentraisedis only getting    more urgent. When it comes to online security, the U.S.    governments priorities -- preventing terrorism and protecting    cyberspace-- are in permanent tension.Is there a    way to resolve it?  <\/p>\n<p>    The National Security Agency routinely seeks out flaws in    common software and builds tools, known as exploits, to take    advantage of them. Doing so is an essential part of the    agencys mission of spying on terrorists and foreign    adversaries, yet it comes with grave risks.  <\/p>\n<p>    The latest attack --still    evolving-- is an example. Researchers say it takes    advantage ofa stolen NSA tool to exploit a flaw in some    versions of Windows. Microsoft    Corp.hassuggestedthat    the NSA knewof the flaw for some time, yet didnt    disclose it until the theft.  <\/p>\n<p>    That may sound unnerving. Windows is ubiquitous, and    governments are generally expected to respect online security,    not undermine it. Microsoft is understandably unhappy. Worse,    the initial attack crippled everything from banks to hospitals.    Its fair to say that lives were at risk.  <\/p>\n<p>    So why keep such a harmful vulnerability secret?    Simple:Exploiting it proved hugely effective in swooping    up intelligence -- like fishing with dynamite, as one former    NSA employeeput it.  <\/p>\n<p>    Deciding whether such intelligenceis worth the risk    isa fraught and secretive process. When a    significant new flaw is found by a federal agency, its shared    among experts from the intelligence, defense and cybersecurity    bureaucracies (among others), who debate whether to disclose or    exploit it, according tonine criteria. A    review board then makes a final decision. In almost all cases    involving a product made or used in the U.S. -- more than 90    percent, according to the NSA -- the flaws are disclosed.  <\/p>\n<p>    Although its an imperfect process, a better way isnt obvious.    Simply disclosing all vulnerabilities, as some    activistsdemand, would be    nuts. Intelligence would dry up, investigations would be    hobbled, and the Pentagon would lose crucial insight into    foreign militaries, for starters. Other countries would    continue exploiting such flaws to their advantage. To echo a    Cold Warlocution, it would    amount to unilateral disarmament.  <\/p>\n<p>    Likewise, Microsoft hasproposeda    digital Geneva Convention, or a global agreement to disclose    flaws. But the worst actors online -- thieves,    gangsters,North Korea-- would hardly feel    constrained by such a protocol, while the restraints put in    place could well eliminate crucial methods of tracking them.  <\/p>\n<p>        Clear thinking from leading voices in business, economics,        politics, foreign affairs, culture, and more.      <\/p>\n<p>        Share the View      <\/p>\n<p>    Abetter    approachis to improve the current system. One problem    is that the secrecy required makes it hard to know how well the    stated criteria for retaining vulnerabilities are being    followed. Reporting the total number found and disclosed each    year might offer some reassurance to tech companies and the    public, without divulging anything sensitive. Periodic audits    of those that have been retained could help ensure that    agencies arent hoarding dangerous stuff thats no longer    useful. Most important, though, is to better secure these flaws    -- and the tools meant to exploit them -- whilehaving a    strategy tomitigate the risks if theyre once again    leaked.  <\/p>\n<p>    Failing that, the public may quickly lose confidence in this    process. And that may be the biggest risk of all.  <\/p>\n<p>    --Editors: Timothy Lavin, Michael    Newman.  <\/p>\n<p>    To contact the senior editor responsible for Bloomberg Views    editorials: David Shipley at <a href=\"mailto:davidshipley@bloomberg.net\">davidshipley@bloomberg.net<\/a>.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Excerpt from:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.bloomberg.com\/view\/articles\/2017-05-30\/ransomware-and-the-nsa\" title=\"Ransomware and the NSA - Bloomberg\">Ransomware and the NSA - Bloomberg<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Some questions, admiral.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/ransomware-and-the-nsa-bloomberg\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-195554","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/195554"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=195554"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/195554\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=195554"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=195554"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=195554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}