{"id":5027,"date":"2017-05-27T10:41:35","date_gmt":"2017-05-27T17:41:35","guid":{"rendered":"http:\/\/occupysf.net\/?p=5027"},"modified":"2017-05-27T12:21:07","modified_gmt":"2017-05-27T19:21:07","slug":"ransomware-nsas-mess-democracy-earth","status":"publish","type":"post","link":"https:\/\/occupysf.net\/index.php\/2017\/05\/27\/ransomware-nsas-mess-democracy-earth\/","title":{"rendered":"Ransomware is NSA\u2019s\u00a0mess (democracy.earth)"},"content":{"rendered":"<h2 class=\"graf graf--h3 graf-after--figure graf--title\"><a href=\"http:\/\/occupysf.net\/wp-content\/uploads\/2017\/05\/DemocracyEarth.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-5037\" src=\"http:\/\/occupysf.net\/wp-content\/uploads\/2017\/05\/DemocracyEarth.png\" alt=\"\" width=\"341\" height=\"148\" srcset=\"https:\/\/occupysf.net\/wp-content\/uploads\/2017\/05\/DemocracyEarth.png 341w, https:\/\/occupysf.net\/wp-content\/uploads\/2017\/05\/DemocracyEarth-150x65.png 150w, https:\/\/occupysf.net\/wp-content\/uploads\/2017\/05\/DemocracyEarth-300x130.png 300w, https:\/\/occupysf.net\/wp-content\/uploads\/2017\/05\/DemocracyEarth-250x109.png 250w\" sizes=\"(max-width: 341px) 100vw, 341px\" \/><\/a><\/h2>\n<h2 id=\"9437\" class=\"graf graf--h3 graf-after--figure graf--title\">Largest ransomware attack in history, made possible by abuse of power.<\/h2>\n<blockquote id=\"82af\" class=\"graf graf--pullquote graf-after--p\"><p>Your machine is infected and infecting others, your files have been encrypted and you have a limited period of time to get them back: if you\u00a0pay.<\/p><\/blockquote>\n<p id=\"aa5d\" class=\"graf graf--p graf-after--pullquote\">By now everyone who\u2019s been online or watching TV in the last few days know about #WannaCry ransomware attack, the hijacking of files and the asking for Bitcoin to decrypt stuff in computers running on Windows, which affected up to 75 countries, companies and <a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/t.co\/u6J3bcHnXE\" target=\"_blank\" rel=\"noopener noreferrer\" data-href=\"https:\/\/t.co\/u6J3bcHnXE\">UK\u2019s National Healthcare Service<\/a>.<\/p>\n<p id=\"85c5\" class=\"graf graf--p graf-after--p\">Most cybersecurity experts that circulated in TV shows these days have explained very efficiently the technical aspects of the attack, somehow managing to belittle the political dimension of the event and making it an \u201cincompetent developers, evil hackers and heroic researchers\u201d drama.<\/p>\n<p id=\"e9e2\" class=\"graf graf--p graf-after--p\">We think it\u2019s fundamental to highlight there\u2019s more here than anonymous hustlers and that this wouldn\u2019t be a global disaster without Microsoft and the NSA.<\/p>\n<h4 id=\"cf8e\" class=\"graf graf--h4 graf-after--p\">What made such a mess possible?<\/h4>\n<p id=\"cc2a\" class=\"graf graf--p graf-after--h4\">The attack affects particularly Windows, the closed-source operating system which vulnerabilities the virus exploited. One specific flaw that made this attack possible was a bug in Windows\u2019 SMB file-sharing services, which had been detected by the <a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/en.wikipedia.org\/wiki\/National_Security_Agency\" target=\"_blank\" rel=\"noopener noreferrer\" data-href=\"https:\/\/en.wikipedia.org\/wiki\/National_Security_Agency\">National Security Agency<\/a> of the United States and used with the purpose of peering into people\u2019s computers. The NSA designed a tool to exploit it and extract information: <a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/en.wikipedia.org\/wiki\/EternalBlue\" target=\"_blank\" rel=\"noopener noreferrer\" data-href=\"https:\/\/en.wikipedia.org\/wiki\/EternalBlue\">Eternalblue<\/a>, which got stolen and leaked months ago, so the WannaCry authors took advantage of it. The second tool used to complete the job was <a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/en.wikipedia.org\/wiki\/DoublePulsar\" target=\"_blank\" rel=\"noopener noreferrer\" data-href=\"https:\/\/en.wikipedia.org\/wiki\/DoublePulsar\">Doublepulsar<\/a>, a backdoor also designed and installed by the NSA, also leaked by <a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/en.wikipedia.org\/wiki\/The_Shadow_Brokers\" target=\"_blank\" rel=\"noopener noreferrer\" data-href=\"https:\/\/en.wikipedia.org\/wiki\/The_Shadow_Brokers\">The Shadow Brokers<\/a>months ago. This means vulnerabilities were built in intentionally or allowed by petition (well, demand) of the the National Security Agency.<\/p>\n<p id=\"10e1\" class=\"graf graf--p graf-after--p\">The irony of a security agency making everyone more insecure; only an irony if we pretend the NSA is a security agency rather than an organism of domestic and international surveillance with the goal of accumulating power and control over citizens worldwide. Now state-funded tools for surveillance triggers a disaster in UK hospitals.<\/p>\n<figure id=\"ba91\" class=\"graf graf--figure graf--iframe graf-after--p\">\n<div class=\"aspectRatioPlaceholder is-locked\"><\/div>\n<\/figure>\n<p id=\"32e0\" class=\"graf graf--p graf-after--figure\">The ethical decision of using the knowledge programmers gain over systems is whether the know-how is used to expand and share public knowledge or to use it for control, to manipulate scarce information and trade secrets. So the meaning of the word \u201chacker\u201d is defined pragmatically by observing what effects their actions produce. In this case it\u2019s extremely important to point out that the authors of the malware are not the only hackers in this scene: Microsoft itself like several other tech companies -who, by the way, control most of the software we run on our computers- are also \u201chackers\u201d: authors of security, exceptions and vulnerabilities.<\/p>\n<p id=\"65cf\" class=\"graf graf--p graf-after--p\">When it comes to finding who\u2019s responsible, the largest ransomware attack in history is more about government agencies systematically violating privacy and companies refusing to pay proper attention to security than about extortion.<\/p>\n<figure id=\"4c1a\" class=\"graf graf--figure graf--iframe graf-after--p\">\n<div class=\"aspectRatioPlaceholder is-locked\"><\/div>\n<\/figure>\n<p id=\"ab9f\" class=\"graf graf--p graf-after--figure\">What can be done?<\/p>\n<p id=\"6399\" class=\"graf graf--p graf-after--p\">Cyberattacks are neither inevitable nor incontestable.<\/p>\n<p id=\"52ab\" class=\"graf graf--p graf-after--p\">Users can fight back this and future attacks taking a couple basic preventions:<\/p>\n<ul class=\"postList\">\n<li id=\"1e7d\" class=\"graf graf--li graf-after--p\"><strong class=\"markup--strong markup--li-strong\">Keep your software up to date<\/strong>. Updates often include patches to fix important security bugs.<\/li>\n<li id=\"51dd\" class=\"graf graf--li graf-after--li\"><strong class=\"markup--strong markup--li-strong\">Mind before clicking<\/strong> links and attachments sent by anybody. Just ask yourself how legit do the source and the link look like.<\/li>\n<li id=\"b771\" class=\"graf graf--li graf-after--li\"><strong class=\"markup--strong markup--li-strong\">Encrypt<\/strong> your files and messages whenever possible. Even if nobody steals them, it\u2019s clear some negligent people are after them.<\/li>\n<\/ul>\n<p id=\"56f7\" class=\"graf graf--p graf-after--li\">Still, we insist given NSA\u2019s big share of responsibility, more can, should and must be done to prevent future attacks. A good start:<\/p>\n<ul class=\"postList\">\n<li id=\"ed1e\" class=\"graf graf--li graf-after--p\">The US Congress has to <strong class=\"markup--strong markup--li-strong\">hold the NSA accountable<\/strong>, ask them about bugs they find in software and provide instruction for such cases\u200a\u2014\u200a(since they fund the research, perhaps they could fund the fixing or at least not the development of exploitative tools).<\/li>\n<li id=\"d2b4\" class=\"graf graf--li graf-after--li\">Microsoft and all other companies can <strong class=\"markup--strong markup--li-strong\">pay more attention to information security<\/strong> researchers and advisers.<\/li>\n<li id=\"67b4\" class=\"graf graf--li graf-after--li\">The NSA and security agencies in general can <strong class=\"markup--strong markup--li-strong\">stop demanding companies to give up user\u2019s privacy<\/strong> in the name of law enforcement.<\/li>\n<li id=\"4c99\" class=\"graf graf--li graf-after--li\">Tech companies can<strong class=\"markup--strong markup--li-strong\"> stop trading with personal data<\/strong> and collaborating in the installation of surveillance states around the world. One first step would be to refuse governments access to their software, like Apple has recently done.<\/li>\n<\/ul>\n<p id=\"0513\" class=\"graf graf--p graf-after--li\">We can work on the design of better, decentralized, more accountable systems to put an end to our dependency to these actor\u2019s intentions and grant every citizen in the world <a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/sovereign.software\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-href=\"https:\/\/sovereign.software\">personal sovereignty.<\/a><\/p>\n<div id=\"c391\" class=\"graf graf--mixtapeEmbed graf-after--p graf--trailing\"><a class=\"markup--anchor markup--mixtapeEmbed-anchor\" title=\"http:\/\/democracy.earth\/\" href=\"http:\/\/democracy.earth\/\" data-href=\"http:\/\/democracy.earth\/\"><strong class=\"markup--strong markup--mixtapeEmbed-strong\">Democracy Earth Foundation<\/strong><br \/>\n<em class=\"markup--em markup--mixtapeEmbed-em\">Governance for a Post Nation-State world. For everyone, anywhere.<\/em>democracy.earth<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Largest ransomware attack in history, made possible by abuse of power. Your machine is infected and infecting others, your files have been encrypted and you have a limited period of time to get them back: if you\u00a0pay. By now everyone who\u2019s been online or watching TV in the last few&#8230; <a class=\"continue-reading-link\" href=\"https:\/\/occupysf.net\/index.php\/2017\/05\/27\/ransomware-nsas-mess-democracy-earth\/\"> Continue reading <span class=\"meta-nav\">&rarr; <\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/occupysf.net\/index.php\/wp-json\/wp\/v2\/posts\/5027"}],"collection":[{"href":"https:\/\/occupysf.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/occupysf.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/occupysf.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/occupysf.net\/index.php\/wp-json\/wp\/v2\/comments?post=5027"}],"version-history":[{"count":5,"href":"https:\/\/occupysf.net\/index.php\/wp-json\/wp\/v2\/posts\/5027\/revisions"}],"predecessor-version":[{"id":5038,"href":"https:\/\/occupysf.net\/index.php\/wp-json\/wp\/v2\/posts\/5027\/revisions\/5038"}],"wp:attachment":[{"href":"https:\/\/occupysf.net\/index.php\/wp-json\/wp\/v2\/media?parent=5027"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/occupysf.net\/index.php\/wp-json\/wp\/v2\/categories?post=5027"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/occupysf.net\/index.php\/wp-json\/wp\/v2\/tags?post=5027"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}