US Spy Policy May Put Public PCs At Risk
US government officials have flatly denied having any advance knowledge of the Heartbleed bug. The bug, which has already been exploited by hackers, has resulted in exposed social security numbers of the Canada Revenue Agency and other personal data. It's estimated that the bug affects approximately six percent of all websites world-wide.
Now, it's emerged that US spies who discover security bugs are sometimes allowed to exploit them, rather than warn the public of any imminent dangers.
A report by the Bloomberg news agency suggested the National Security Agency (NSA) knew about Heartbleed for up to two years. The NSA has already been in the headlines countless times in the last few years for its alleged breaches of Internet user privacy. (Source: bloomberg.com)
US Spies 'Did Not Know About Heartbleed'
Sources told Google that NSA staff had exploited Heartbleed as part of their investigations into suspects, gathering data from compromised sites. However, the agency categorically denied this, stating that "NSA was not aware of the recently identified ... Heartbleed vulnerability, until it was made public in a private-sector cybersecurity report," and that "reports that say otherwise are wrong."
Further investigation has revealed that even if the NSA did find out about Heartbleed, it wouldn't have to tell the public.
Following a review at the start of this year, President Obama made an official ruling on how government agencies should deal with zero-day flaws, including cases where a software or hardware manufacturer is not able to fix a bug before somebody else discovers it.
Government Agencies Can Keep Bugs Secret
The rules now say that government agencies which discover a security bug must follow a "Vulnerabilities Equities Process." It says that as a general principle, the agency should have the goal of making sure the bug is fixed as soon as possible, which means notifying the software or hardware firm involved immediately.
The logic here is that the quicker the bug is fixed, the more secure computer use will be for all government agencies. However, the rules also state that the government "may briefly authorize using a Zero Day for high priority intelligence collection, following senior, interagency review involving all appropriate departments." (Source: arstechnica.com)
In other words: if the government knows about a bug in software, it can use it to gather confidential data, even if it means taking longer to get it fixed - thus increasing public exposure to the risk of hacking attacks.
It seems the new rules are only making official what staff were already doing. Last year the Washington Post reported that the NSA had paid $25 million to hackers for details of unpublicized bugs in software to make it easier to spy on suspects online.
What's Your Opinion?
Do you think the US government has found the proper balance between the needs of security agencies as well as the public? Do you believe all governments have a responsibility to protect the public from hackers by helping to get security bugs fixed as soon as possible? Or, do you think there are cases where it's justifiable to keep quiet about a bug so it can be used to secretly collect data on suspects?
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.
Comments
US Gov. and Computer Access to the American Public thru software
I believe that no government agencies should have any internet access at all, the only networking done is within each agencies individual WAN. No government agency should have access to the digital ocean of the free internet available to all free citizens in all of the earths countries. We have overstepped our boundaries as planetary stewards evolved as we were by the universe. But our knowledge got us in trouble and too comfortable. It should be kept about as far apart as the church and state concept implied would be. Government cannot examine or try to interpret what it experiences while “online”. The experience would overwhelm anyone in opposition. Im kinda sketchy about all of this.