NSA Pats Self On Back For Disclosing Vulnerabilities '90% Of The Time,' Doesn't Specify How Long It Uses Them Before Doing So

from the honest.-you'll-be-the-first-to-know-when-we're-finished-with-them. dept

The NSA likes its software vulnerabilities. There are those it discovers on its own and others it purchases from “weaponized software” dealers. There are also certain tech companies that hand over exploits to the NSA first before working on a patch for the rest of us.

Up until now, the NSA really hasn’t discussed its policies regarding software vulnerabilities and exploits. A few months after the Snowden leaks began, the White House told the NSA to start informing software companies of any exploits/vulnerabilities it had discovered. The quasi-directive set no time limit for doing so and allowed the agency to withhold discovered exploits if there was a “clear national security or law enforcement” reason to do so.

While other parties have discussed the NSA’s hoarding of software exploits, the agency itself hasn’t. All information gathered to date has come from outside sources. Snowden provided some of the documents. The EFF knocked a couple more loose with an FOIA lawsuit against James Clapper’s office.

The NSA has finally chosen to speak for itself. Its reassurances are far from reassuring.

The U.S. National Security Agency, seeking to rebut accusations that it hoards information about vulnerabilities in computer software, thereby leaving U.S. companies open to cyber attacks, said last week that it tells U.S. technology firms about the most serious flaws it finds more than 90 percent of the time.

Disclosing nine out of ten exploits sounds good, but these disclosures are likely only occurring after the vulnerability or exploit is no longer useful.

The re-assurances may be misleading, because the NSA often uses the vulnerabilities to make its own cyber-attacks first, according to current and former U.S. government officials. Only then does NSA disclose them to technology vendors so that they can fix the problems and ship updated programs to customers, the officials said.

Status remains quo. National security interests still override the security interest of millions of affected users. The NSA can’t keep criminals from using the same security holes it’s discovered. The only way to prevent a vulnerability from being exploited by malicious parties or unfriendly state actors is to disclose it. Eventual disclosure is better than no disclosure, but it’s not nearly as altruistic as the NSA’s 90% disclosure rate would make it appear.

Filed Under: , , , , ,

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “NSA Pats Self On Back For Disclosing Vulnerabilities '90% Of The Time,' Doesn't Specify How Long It Uses Them Before Doing So”

Subscribe: RSS Leave a comment
13 Comments
tqk (profile) says:

Weasels.

As everyone knows, there’s exploits, and then there’s exploits. An exploit that causes a Windows box to BSOD is one thing. An exploit that quietly gives an attacker remote root (admin) access is another thing entirely. If that 90% they disclose is the former and the remaining 10% is the latter, yeah I can see they’re being perfectly truthful here.

Thanks to Snowden, nobody in their right mind who knows anything believes a word they say anymore. I can’t imagine who they think they’re fooling other than mainstream media types who’ll swallow anything to get the next high placed administration source leak.

GEMont (profile) says:

Bafflegab at its finest.

…that it tells U.S. technology firms about the most serious flaws it finds more than 90 percent of the time.

Just a note.

This statement does not actually mean that 90% of exploits found are reported.

It merely states instead that 90% of “the most serious flaws” it finds are being reported.

Depending on their criteria for “seriousness“, this could easily mean that only 1 of every 1000 exploits it finds are actually considered to be “serious“, and that only 1% of those “serious flaws” are actually considered to be “most serious“, turning that 90%, into actual reporting of found flaws to anywhere from .01% to .0001%, very quickly.

They are masters of speaking without saying anything.

Add Your Comment

Your email address will not be published.

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...