NSA Pats Self On Back For Disclosing Vulnerabilities '90% Of The Time,' Doesn't Specify How Long It Uses Them Before Doing So
from the honest.-you'll-be-the-first-to-know-when-we're-finished-with-them. dept
The NSA likes its software vulnerabilities. There are those it discovers on its own and others it purchases from "weaponized software" dealers. There are also certain tech companies that hand over exploits to the NSA first before working on a patch for the rest of us.
Up until now, the NSA really hasn't discussed its policies regarding software vulnerabilities and exploits. A few months after the Snowden leaks began, the White House told the NSA to start informing software companies of any exploits/vulnerabilities it had discovered. The quasi-directive set no time limit for doing so and allowed the agency to withhold discovered exploits if there was a "clear national security or law enforcement" reason to do so.
While other parties have discussed the NSA's hoarding of software exploits, the agency itself hasn't. All information gathered to date has come from outside sources. Snowden provided some of the documents. The EFF knocked a couple more loose with an FOIA lawsuit against James Clapper's office.
The NSA has finally chosen to speak for itself. Its reassurances are far from reassuring.
The U.S. National Security Agency, seeking to rebut accusations that it hoards information about vulnerabilities in computer software, thereby leaving U.S. companies open to cyber attacks, said last week that it tells U.S. technology firms about the most serious flaws it finds more than 90 percent of the time.Disclosing nine out of ten exploits sounds good, but these disclosures are likely only occurring after the vulnerability or exploit is no longer useful.
The re-assurances may be misleading, because the NSA often uses the vulnerabilities to make its own cyber-attacks first, according to current and former U.S. government officials. Only then does NSA disclose them to technology vendors so that they can fix the problems and ship updated programs to customers, the officials said.Status remains quo. National security interests still override the security interest of millions of affected users. The NSA can't keep criminals from using the same security holes it's discovered. The only way to prevent a vulnerability from being exploited by malicious parties or unfriendly state actors is to disclose it. Eventual disclosure is better than no disclosure, but it's not nearly as altruistic as the NSA's 90% disclosure rate would make it appear.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: attacks, cybersecurity, delay, disclosure, nsa, vulnerabilities
Reader Comments
Subscribe: RSS
View by: Time | Thread
You misread the NSA statement. They disclose vulnerabilities 90% of the time that it goes through their vulnerability disclosure program. It's not clear what the criteria is for vulnerabilities to go through that program.
[ link to this | view in chronology ]
Re:
"about the most serious flaws it finds"
My guess is they wait till they have a 3rd way to pwn something then report the oldest 0day for that scenario.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Weasels.
Thanks to Snowden, nobody in their right mind who knows anything believes a word they say anymore. I can't imagine who they think they're fooling other than mainstream media types who'll swallow anything to get the next high placed administration source leak.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Yeah... sure... *wink* let's say the NSA found those and forget about the "on the market".
[ link to this | view in chronology ]
90% of the time?
It would put them in a much better light but I had not imagined our software that bad.
[ link to this | view in chronology ]
status quo
Off topic but I think "status quo remains as ante" would better match the meaning of the phrase. "Status remains quo" means something like "the state remains in which".
https://en.wikipedia.org/wiki/Status_quo
[ link to this | view in chronology ]
Re: status quo
[ link to this | view in chronology ]
Re: Re: status quo
[ link to this | view in chronology ]
Bafflegab at its finest.
Just a note.
This statement does not actually mean that 90% of exploits found are reported.
It merely states instead that 90% of "the most serious flaws" it finds are being reported.
Depending on their criteria for "seriousness", this could easily mean that only 1 of every 1000 exploits it finds are actually considered to be "serious", and that only 1% of those "serious flaws" are actually considered to be "most serious", turning that 90%, into actual reporting of found flaws to anywhere from .01% to .0001%, very quickly.
They are masters of speaking without saying anything.
---
[ link to this | view in chronology ]