NSA could exploit flaws on 'Net

Security agency gets Obama OK under some circumstances

Share with others:


Print Email Read Later

WASHINGTON -- Stepping into a heated debate within the nation's intelligence agencies, President Barack Obama has decided that when the National Security Agency discovers major flaws in Internet security, it should -- in most circumstances -- reveal them to assure that they will be fixed, rather than keep mum so that the flaws can be used in espionage or cyberattacks, senior administration officials said Saturday.

But Mr. Obama carved a broad exception for "a clear national security or law enforcement need," the officials said, a loophole that is likely to allow the NSA to continue to exploit security flaws both to crack encryption on the Internet and to design cyberweapons.

The White House has never publicly detailed Mr. Obama's decision, which he made in January as he began a three-month review of recommendations by a presidential advisory committee on what to do in response to recent disclosures about the National Security Agency.

But elements of the decision became evident Friday, when the White House denied that it had any prior knowledge of the Heartbleed bug, a newly known hole in Internet security that sent Americans scrambling last week to change their online passwords. The White House statement said that when such flaws are discovered, there is now a "bias" in the government to share that knowledge with computer and software manufacturers so a remedy can be created and distributed to industry and consumers.

Caitlin Hayden, the spokeswoman for the National Security Council, said the review of the recommendations was now complete, and it had resulted in a "reinvigorated" process to weigh the value of disclosure when a security flaw is discovered, against the value of keeping the discovery secret for later use by the intelligence community.

"This process is biased toward responsibly disclosing such vulnerabilities," she said.

Until now, the White House has declined to say what action Mr. Obama had taken on this recommendation of the president's advisory committee, whose report is better known for its determination that the government cease collecting bulk telephone data about the calls made by every American. Mr. Obama announced last month that he would end the bulk collection, and leave the data in the hands of telecommunications companies, with a procedure for the government to obtain it with court orders when needed.

But while the surveillance recommendations were noteworthy, inside the intelligence agencies other recommendations -- concerning encryption and cyber operations -- set off a roaring debate with echoes of the Cold War battles that dominated Washington a half-century ago.

One recommendation urged the NSA to get out of the business of weakening commercial encryption systems or trying to build in "back doors" that would make it far easier for the agency to crack the communications of U.S. adversaries. Tempting as it was to create easy ways to break codes -- the reason the NSA was established by President Harry S. Truman 62 years ago -- the committee concluded that the practice would undercut trust in American software and hardware products. In recent months, Silicon Valley companies have urged the United States to abandon such practices, while Germany and Brazil, among other nations, have said they were considering shunning American-made equipment and software. Their motives were hardly pure: foreign companies see the NSA disclosures as a way to bar American competitors.

Another recommendation urged the government to make only the most limited, temporary use of what hackers call "zero days," the coding flaws in software like Microsoft Windows that can give an attacker access to a computer -- and to any business, government agency or network connected to it. The flaws get their name from the fact that, when identified, the computer user has "zero days" to fix them before hackers can exploit the accidental vulnerability.

The NSA made use of four "zero day" vulnerabilities in its attack on Iran's nuclear enrichment sites. That operation, code-named Olympic Games, managed to damage roughly 1,000 Iranian centrifuges, and by some accounts helped drive the country to the negotiating table.

Not surprisingly, officials at the NSA and at its military partner, the U.S. Cyber Command, warned that giving up the capability to exploit undisclosed vulnerabilities would amount to "unilateral disarmament" -- a phrase taken from the battles over whether and how far to cut the U.S. nuclear arsenal.

At the center of that cybertechnology are the kinds of hidden gaps in the Internet -- almost always created by mistake or oversight -- that "Heartbleed" created. There is no evidence that the NSA had any role in creating Heartbleed, or even that it made use of it.



Advertisement
Advertisement
Advertisement

You have 2 remaining free articles this month

Try unlimited digital access

If you are an existing subscriber,
link your account for free access. Start here

You’ve reached the limit of free articles this month.

To continue unlimited reading

If you are an existing subscriber,
link your account for free access. Start here