Poyner Spruill Welcomes Education Law Practice Group

Sign Up Created with Sketch. Want to receive our thought leadership?     Sign Up

It could have been a Bond trailer, complete with the dramatic intro “In a world where there are no secrets.” But this is real. On Monday, a mysterious group calling itself the Shadow Brokers released files apparently swiped from the “omnipotent” Equation Group – likely a technical arm of the National Security Agency. The files were technical marvels, offering means of breaching popular routers such as Cisco, Fortinet, Juniper and TopSec.

These marvels also pose a security nightmare. They contained a wealth of previously unknown means of breaching network defenses – so called “zero-day exploits.” The sheer number of zero-days underscored the vulnerability of most popular systems. Even as software developers and hardware manufacturers scrambled to remedy any unaddressed gaps, the revelations underscored the seeming inevitability of cyber-breaches. Ironically, the files themselves bear timestamps indicating that they were swiped from the NSA in the summer of 2013 following the Edward Snowden revelations. The filching of these files at the height of a security outcry demonstrates the difficulties even the most technologically advanced organizations have defending against determined cyber-foes.

The government is aware of the problems inherent in sitting on a large store of vulnerabilities. Since 2014, the White House has required agencies identifying zero-day vulnerabilities to report them to the applicable developers and manufacturers. But there is a caveat. Agencies first forward newly unearthed flaws to a special taskforce that determines whether the tactical advantage of keeping the discovery secret outweighs the public interest in a more secure cyber environment. In an intelligence culture, the institutional incentives to protect such tools can be strong. In the present case, the tool cache represents a treasure trove of vulnerabilities, though apparently ones developed rather than discovered by the government.

The takeaway is that every cyberweapon is a double-edged sword: as useful to the bad guys as the good. The same process that enables the NSA to develop these tools will eventually enable others – hackers, organized crime, other states – to develop them. For instance, Wired suggested that the use of Stuxnet to paralyze Iran’s nuclear program enabled the development of a variant that subsequently crippled Saudi Aramco computers. Snowden himself stated the Shadow Brokers leak was likely connected to Russian sources: after U.S. officials and media fingered Russia for the DNC hack, Russia apparently wanted to send a message “that an escalation in the attribution game could get messy fast.”

In the present case, the mere fact of Shadow Brokers’ revelations was interesting in the Rumsfeldian sense. Namely, it identified a heretofore unknown unknown – that particular servers used by the NSA could and indeed have been breached. As former Defense Secretary Donald Rumsfeld observed: “Reports that say that something hasn’t happened are always interesting to me, because as we know, there are known knowns; there are things we know we know. We also know there are known unknowns; that is to say we know there are some things we do not know. But there are also unknown unknowns – the ones we don’t know we don’t know. And if one looks throughout the history of our country and other free countries, it is the latter category that tend to be the difficult ones.”

If NSA affiliates can be breached, then so can virtually any business, school, church, or other institution that uses computers. Absent an Amish existence or a return to the Mad Men and typewriter era, the prudent enterprise should do the only thing it can: mandate a regular periodic process under which key stakeholders from business, IT, and legal undertake a review of its business practices, regulatory obligations, and cyber-security to minimize vulnerability. It is the optimal approach in a world of many unknown unknowns.

| © Poyner Spruill LLP. All rights reserved.

◀︎ Back to Thought Leadership
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognizing you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful. Please see our Privacy Policy for more details.

Necessary

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

Analytics

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Show details Hide details