{"id":136,"date":"2017-03-10T18:42:03","date_gmt":"2017-03-10T23:42:03","guid":{"rendered":"http:\/\/langstonsoftware.com\/?p=136"},"modified":"2024-01-30T19:09:16","modified_gmt":"2024-01-31T00:09:16","slug":"why-should-the-cia-disclose-security-vulnerabilities","status":"publish","type":"post","link":"https:\/\/langstonsoftware.com\/2017\/03\/10\/why-should-the-cia-disclose-security-vulnerabilities\/","title":{"rendered":"Why should the CIA disclose security vulnerabilities?"},"content":{"rendered":"

The CIA and other United States intelligence and law enforcement agencies have valid cause to research and exploit digital security vulnerabilities to further the national interest and the public welfare. But when it comes to the hoarding of undisclosed vulnerabilities, they’ve recently made choices that undermine both.<\/p>\n

https:\/\/www.nytimes.com\/2017\/03\/07\/world\/europe\/wikileaks-cia-hacking.html<\/a><\/p>\n

\nBut Ben Wizner, the director of the American Civil Liberties Union\u2019s Speech, Privacy, and Technology Project, said the documents suggest that the government has deliberately allowed vulnerabilities in phones and other devices to persist to make spying easier.<\/p>\n

\u201cThose vulnerabilities will be exploited not just by our security agencies, but by hackers and governments around the world,\u201d Mr. Wizner said. \u201cPatching security holes immediately, not stockpiling them, is the best way to make everyone\u2019s digital life safer.\u201d<\/p><\/blockquote>\n

Disclosure is both ethical and pragmatic. It protects citizens and companies from criminals and foreign powers. And the CIA is aware of these trade offs and has even a standard Vulnerabilities Equities Process. However, they appear to have failed to follow this procedure in the latest leak.<\/p>\n

https:\/\/www.eff.org\/deeplinks\/2017\/03\/hey-cia-you-held-security-flaw-information-now-its-out-thats-not-how-it-should<\/a><\/p>\n

The dark side of this story is that the documents confirm that the CIA holds on to security vulnerabilities in software and devices\u2014including Android phones, iPhones, and Samsung televisions\u2014that millions of people around the world rely on. The agency appears to have failed to accurately assess the risk of not disclosing vulnerabilities to responsible vendors and failed to follow even the limited Vulnerabilities Equities Process. As these leaks show, we’re all made less safe by the CIA’s decision to keep — rather than ensure the patching of — vulnerabilities. Even spy agencies like the CIA have a responsibility to protect the security and privacy of Americans. <\/p><\/blockquote>\n

Security experts have long rallied to the call for disclosure, seeing it as a necessary part of maintaining digital security and by extension U.S. dominance of the computer and web services market. Failure to protect, and furthermore active undermining of trust in U.S. technology companies could be disastrous for our economy, and therefore both our bread and our bullets.<\/p>\n

https:\/\/www.schneier.com\/essays\/archives\/2007\/01\/schneier_full_disclo.html<\/a><\/p>\n

The moral here doesn’t just apply to software; it’s very general. Public scrutiny is how security improves, whether we’re talking about software or airport security or government counterterrorism measures. Yes, there are trade-offs. Full disclosure means that the bad guys learn about the vulnerability at the same time as the rest of us — unless, of course, they knew about it beforehand — but most of the time the benefits far outweigh the disadvantages.<\/p>\n

Secrecy prevents people from accurately assessing their own risk. Secrecy precludes public debate about security, and inhibits security education that leads to improvements. Secrecy doesn’t improve security; it stifles it.<\/p><\/blockquote>\n

Beyond this there is a question of integrity. If the government paid researchers to find discoveries in health or environmental science, would we accept their failure to disclose issues that posed a severe cost to the nation’s health, even if their were military or law enforcement applications if those discoveries were kept secret? Of course not. Why would you consider digital security researchers exempt from the same academic ethics requirements?<\/p>\n

Have we forgotten so quickly that our nation’s democratic process was tampered with via a failure in digital security?<\/p>\n

Or the risk of ransomware has for business, the true cost only hinted at by the ransoms paid that are reported.<\/p>\n

https:\/\/www.fbi.gov\/contact-us\/field-offices\/cleveland\/news\/press-releases\/ransomware-latest-cyber-extortion-tool<\/a><\/p>\n

Ransomware has become a significant threat to U.S. businesses and individuals. In 2014, over 1,800 complaints were filed regarding ransomware, resulting in a loss of more than $23 million. In 2015, that number grew to more than 2,400 complaints with a reported loss of more than $24 million.<\/p><\/blockquote>\n

These aren’t just numbers, they affect real businesses, real people, real lives. Not those of just of employees and customers. Doctors and patients.<\/p>\n

http:\/\/www.beckershospitalreview.com\/healthcare-information-technology\/12-healthcare-ransomware-attacks-of-2016.html<\/a><\/p>\n

Henderson, Ky.-based Methodist Hospital was hit with a ransomware virus that limited its use of electronic web-based services and prompted it to declare an internal state of emergency.<\/p>\n

After five days, Methodist Hospital emerged from the state of emergency and regained control of its computer systems.<\/p><\/blockquote>\n

From the same article.<\/p>\n

After being hit with a ransomware attack, a failed backup system caused Marin General Healthcare District and Prima Medical Group to lose clinical information collected in a two-week window at the Greenbrae, Calif.-based district’s nine medical centers. The incident affected 2,292 patients of Marin Healthcare District and 2,934 patients of physicians with Prima Medical Group who work with Marin General Hospital.<\/p><\/blockquote>\n

I’ve heard arguments that disclosure is not required, because the abundance of vulnerabilities and lack of patching makes it ineffective. But that argument cuts both ways. There is no reason not to disclose because the government can used disclosed vulnerabilities just as easily in most situations. The difference that disclosure doesn’t come with a cost to our digital security or our integrity. In particular when the CIA is not following it’s own rules and the administration and public media are clashing over Twitter posts, we need to force disclosure as a part of strong democratic oversight.<\/p>\n

I’ve also heard arguments that boil down to a dismissal of web security at all, saying privacy is dead. Of course doctors losing weeks of their patients’ data or causing a hospital to declare a state of emergency should make you understand privacy is not the only thing at stake. But privacy matters too.<\/p>\n

https:\/\/www.ted.com\/talks\/glenn_greenwald_why_privacy_matters\/transcript?language=en<\/a><\/p>\n

“It’s only those who are dissidents, who challenge power, who have something to worry about. … You may be a person who, right now, doesn’t want to engage in that behavior, but at some point in the future you might. Even if you’re somebody who decides that you never want to, the fact that there are other people who are willing to and able to resist and be adversarial to those in power \u2014 dissidents and journalists and activists and a whole range of others \u2014 is something that brings us all collective good that we should want to preserve.”<\/p><\/blockquote>\n

And the U.S. national security and public welfare is very much strengthened on the whole by empowering dissidents, activists, and journalists. We depend on these actors to win the hearts and minds of those who would otherwise call us enemies. We rely on them to remove propaganda and lies that state ran media across the world tells about our country. They are an essential part of both our national security apparatus and our democratic system.<\/p>\n

The final argument I’ve heard is that it is fine as long as the good guys only have the exploits. But we’ve already read how that’s not how it works. If the good guys can find a hole, the bad guys have probably already dug there too, or will soon. We’re better served by filling it. And being public about it. Because the good guys aren’t always so good.<\/p>\n

https:\/\/www.nytimes.com\/2014\/11\/16\/magazine\/what-an-uncensored-letter-to-mlk-reveals.html<\/a><\/p>\n

The unnamed author suggests intimate knowledge of his correspondent\u2019s sex life, identifying one possible lover by name and claiming to have specific evidence about others. Another passage hints of an audiotape accompanying the letter, apparently a recording of \u201cimmoral conduct\u201d in action. \u201cLend your sexually psychotic ear to the enclosure,\u201d the letter demands. It concludes with a deadline of 34 days \u201cbefore your filthy, abnormal fraudulent self is bared to the nation.\u201d<\/p>\n

\u201cThere is only one thing left for you to do,\u201d the author warns vaguely in the final paragraph. \u201cYou know what it is.\u201d<\/p>\n

When the Rev. Dr. Martin Luther King Jr. received this letter, nearly 50 years ago, he quietly informed friends that someone wanted him to kill himself \u2014 and he thought he knew who that someone was. Despite its half-baked prose, self-conscious amateurism and other attempts at misdirection, King was certain the letter had come from the F.B.I. Its infamous director, J. Edgar Hoover, made no secret of his desire to see King discredited. A little more than a decade later, the Senate\u2019s Church Committee on intelligence overreach confirmed King\u2019s suspicion.<\/p><\/blockquote>\n

I understand the choice to disclose comes with costs, big costs. Lessening our offensive capabilities of intelligence and law enforcement communities. But it also isn’t a hard choice. The costs for failure to disclose, both to our defensive capabilities and our democratic system, are much, much greater.<\/p>\n","protected":false},"excerpt":{"rendered":"

The CIA and other United States intelligence and law enforcement agencies have valid cause to research and exploit digital security vulnerabilities to further the national interest and the public welfare. But when it comes to the hoarding of undisclosed vulnerabilities, they’ve recently made choices that undermine both. https:\/\/www.nytimes.com\/2017\/03\/07\/world\/europe\/wikileaks-cia-hacking.html But Ben Wizner, the director of the …<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[17,16],"tags":[],"class_list":["post-136","post","type-post","status-publish","format-standard","hentry","category-politics","category-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6Os38-2c","_links":{"self":[{"href":"https:\/\/langstonsoftware.com\/wp-json\/wp\/v2\/posts\/136"}],"collection":[{"href":"https:\/\/langstonsoftware.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/langstonsoftware.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/langstonsoftware.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/langstonsoftware.com\/wp-json\/wp\/v2\/comments?post=136"}],"version-history":[{"count":5,"href":"https:\/\/langstonsoftware.com\/wp-json\/wp\/v2\/posts\/136\/revisions"}],"predecessor-version":[{"id":621,"href":"https:\/\/langstonsoftware.com\/wp-json\/wp\/v2\/posts\/136\/revisions\/621"}],"wp:attachment":[{"href":"https:\/\/langstonsoftware.com\/wp-json\/wp\/v2\/media?parent=136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/langstonsoftware.com\/wp-json\/wp\/v2\/categories?post=136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/langstonsoftware.com\/wp-json\/wp\/v2\/tags?post=136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}