{"id":55823,"date":"2015-03-23T12:00:52","date_gmt":"2015-03-23T12:00:52","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=55823"},"modified":"2015-05-05T21:25:55","modified_gmt":"2015-05-05T20:25:55","slug":"the-nsas-plan-improve-cybersecurity-by-hacking-everyone-else","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2015\/03\/the-nsas-plan-improve-cybersecurity-by-hacking-everyone-else\/","title":{"rendered":"The NSA&#8217;s Plan: Improve Cybersecurity by Hacking Everyone Else"},"content":{"rendered":"<p><em>The NSA\u2019s plan to protect America by starting cyberwars is absurd. Their argument that they need more power to do it is more so.<\/em><\/p>\n<div id=\"attachment_55824\" style=\"width: 630px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/03\/nsa-logo.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-55824\" class=\"size-full wp-image-55824\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/03\/nsa-logo.jpg\" alt=\"The NSA wants more powers to hack whomever it wants. Photograph: Dado Ruvic\/REUTERS\" width=\"620\" height=\"372\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/03\/nsa-logo.jpg 620w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/03\/nsa-logo-300x180.jpg 300w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" \/><\/a><p id=\"caption-attachment-55824\" class=\"wp-caption-text\">The NSA wants more powers to hack whomever it wants. Photograph: Dado Ruvic\/REUTERS<\/p><\/div>\n<p><em>21 Mar 2015 &#8211; <\/em>The National Security Agency want to be able to hack more people, vacuum up even more of your internet records and have the keys to tech companies\u2019 encryption \u2013 and, after 18 months of <a target=\"_blank\" href=\"http:\/\/justsecurity.org\/21263\/section-215-reauthorization-debate\/\" >embarrassing inaction<\/a> from Congress on surveillance reform, the NSA <a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/head-of-cyber-command-us-may-need-to-boost-offensive-cyber-powers\/2015\/03\/19\/1ad79a34-ce4e-11e4-a2a7-9517a3a70506_story.html\" >is now lobbying it for more powers<\/a>, not less.<\/p>\n<p>NSA director Mike Rogers <a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/head-of-cyber-command-us-may-need-to-boost-offensive-cyber-powers\/2015\/03\/19\/1ad79a34-ce4e-11e4-a2a7-9517a3a70506_story.html\" >testified in front of a Senate committee this week<\/a>, lamenting that the poor ol\u2019 NSA just doesn\u2019t have the \u201ccyber-offensive\u201d capabilities (read: the ability to hack people) it needs to adequately defend the US. How cyber-attacking countries will help cyber-defense is anybody\u2019s guess, but the idea that the NSA is somehow hamstrung is absurd.<\/p>\n<p>The NSA runs sophisticated hacking operations all over the world. A Washington Post report showed that the NSA <a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/us-spy-agencies-mounted-231-offensive-cyber-operations-in-2011-documents-show\/2013\/08\/30\/d090a6ae-119e-11e3-b4cb-fd7ce041d814_story.html\" >carried out<\/a> 231 \u201coffensive\u201d operations in 2011 &#8211; and that number has surely grown since then. That report also revealed that the NSA runs a $652m project that has infected tens of thousands of computers with malware.<\/p>\n<p>And that was four years ago &#8211; it\u2019s likely increased significantly. A leaked presidential directive <a target=\"_blank\" href=\"http:\/\/www.theguardian.com\/world\/2013\/jun\/07\/obama-china-targets-cyber-overseas\" >issued in 2012<\/a> called for an expanded list of hacking targets all over the world. The NSA<a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/blogs\/the-switch\/wp\/2013\/08\/31\/the-nsa-hacks-other-countries-by-buying-millions-of-dollars-worth-of-computer-vulnerabilities\/\" > spends ten of millions<\/a> of dollars per year to procure \u201c\u2018software vulnerabilities\u2019 from private malware vendors\u201d \u2013 ie, holes in software that will make their hacking much easier. The NSA has even created a system, <a target=\"_blank\" href=\"http:\/\/www.wired.com\/2014\/08\/edward-snowden\/\" >according to Edward Snowden<\/a>, that can automatically hack computers overseas that attempt to hack systems in the US.<\/p>\n<p>Moving further in this direction, Rogers has <a target=\"_blank\" href=\"http:\/\/www.theguardian.com\/commentisfree\/2015\/mar\/04\/backdoors-encryption-china-apple-google-nsa\" >also called for another new law<\/a> that would force tech companies to install backdoors into all their encryption.The move has provoked condemnation and scorn from the entire security community &#8211; including<a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/blogs\/the-switch\/wp\/2015\/02\/23\/heres-how-the-clash-between-the-nsa-director-and-a-senior-yahoo-executive-went-down\/\" > a very public upbraiding by Yahoo\u2019s top security executive<\/a> &#8211; as it would be a disaster for the very cybersecurity that the director says is a top priority.<\/p>\n<p>And then there is the Cybersecurity Information Sharing Act (Cisa) the downright awful \u201ccybersecurity\u201d bill <a target=\"_blank\" href=\"https:\/\/www.eff.org\/deeplinks\/2015\/03\/senate-intelligence-committee-advances-terrible-cybersecurity-bill-surveillance\" >passed by the Senate<\/a> Intelligence Committee last week in complete secrecy that is little more than an excuse to conduct more surveillance.The bill will do little to stop cyberattacks, but it will do a lot to give the NSA even more power to collect Americans\u2019 communications from tech companies without any legal process whatsoever. The bill\u2019s text was finally released a couple days ago, and, <a target=\"_blank\" href=\"https:\/\/www.eff.org\/deeplinks\/2015\/03\/senate-intelligence-committee-advances-terrible-cybersecurity-bill-surveillance\" >as EFF points out<\/a>, tucked in the bill were the powers to do the exact type of \u201coffensive\u201d attacks for which Rogers is pining.<\/p>\n<p>While the NSA tries to throw every conceivable expansion of power against the wall hoping that something sticks, the clock continues to tick on Section 215 of the Patriot Act \u2013 the law which the spy agency secretly used to collect every American\u2019s phone records. Congress has to re-authorize by vote in June or it will expire, and as Steve Vladick<a target=\"_blank\" href=\"http:\/\/justsecurity.org\/21263\/section-215-reauthorization-debate\/\" > wrote on Just Security this week<\/a>, there seems to be no high-level negotiations going on between the administration and Congress over reforms to the NSA in the lead-up to the deadline. Perhaps, <a target=\"_blank\" href=\"http:\/\/www.pbs.org\/wgbh\/pages\/frontline\/government-elections-politics\/united-states-of-secrets\/the-frontline-interview-michael-hayden\/\" >as usual<\/a>, the NSA now thinks it can emerge from yet another controversy over its extraordinary powers and still end up receiving more?<\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.theguardian.com\/commentisfree\/2015\/mar\/21\/nsa-plan-improve-cybersecurity-hacking-everyone\" >Go to Original \u2013 theguardian.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The NSA\u2019s plan to protect America by starting cyberwars is absurd. Their argument that they need more power to do it is more so.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-55823","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/55823","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=55823"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/55823\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=55823"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=55823"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=55823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}