World

Dream on if you think spies will reveal their exploits

Some people are angry at the U.S. government for secretly stockpiling exploits for security flaws so that they can use them to spy on people. The latest outcry came late last week after the revelation that spies — in this case, believed to work for the United Arab Emirates — tried to hack an activist’s iPhone using three separate flaws not revealed to Apple by the government.

SSorry, but the U.S. government — indeed, all governments — is going to do this, and we’d better get used to that fact.

Like it or not, you should assume instead that they will exploit them either until someone else finds the vulnerability — a vendor, researcher, or ethical hacker — or until it’s in the government’s interest to disclose it, such as when it knows a competing power has found it as well. Even the United States, where the official policy is to quickly release details of discovered exploits to affected vendors, has acknowledged it doesn’t release exploits it thinks it can use.

This reality imposes a high price on everyone because it means we have to spend the effort to find the vulnerabilities on our own knowing that they could be used against us until we do. Vendors and researchers need to redouble their efforts as a result.

You've reached your daily free article limit.

Subscribe and support our veteran writing staff to continue reading.

Get Full Ad-Free Access For Just $0.50/Week

Enjoy unlimited digital access to our Military Culture, Defense, and Foreign Policy coverage content and support a veteran owned business. Already a subscriber?

Some people are angry at the U.S. government for secretly stockpiling exploits for security flaws so that they can use them to spy on people. The latest outcry came late last week after the revelation that spies — in this case, believed to work for the United Arab Emirates — tried to hack an activist’s iPhone using three separate flaws not revealed to Apple by the government.

SSorry, but the U.S. government — indeed, all governments — is going to do this, and we’d better get used to that fact.

Like it or not, you should assume instead that they will exploit them either until someone else finds the vulnerability — a vendor, researcher, or ethical hacker — or until it’s in the government’s interest to disclose it, such as when it knows a competing power has found it as well. Even the United States, where the official policy is to quickly release details of discovered exploits to affected vendors, has acknowledged it doesn’t release exploits it thinks it can use.

This reality imposes a high price on everyone because it means we have to spend the effort to find the vulnerabilities on our own knowing that they could be used against us until we do. Vendors and researchers need to redouble their efforts as a result.

Read More: Info World

Featured Image – Wikimedia Commons

About SOFREP News Team View All Posts

The SOFREP News Team is a collective of professional military journalists. Brandon Tyler Webb is the SOFREP News Team's Editor-in-Chief. Guy D. McCardle is the SOFREP News Team's Managing Editor. Brandon and Guy both manage the SOFREP News Team.

COMMENTS

You must become a subscriber or login to view or post comments on this article.

More from SOFREP

REAL EXPERTS.
REAL NEWS.

Join SOFREP for insider access and analysis.

TRY 14 DAYS FREE

Already a subscriber? Log In