Twitter
Advertisement

NSA denys knowledge of HeartBleed before revelations

Latest News
article-main
FacebookTwitterWhatsappLinkedin

The National Security Agency denies that it knew about or exploited the Heartbleed bug, calling reports that claim it or any other part of the U.S. government knew are aware a lie.

Bloomberg reported friday that the NSA knew of the bug in the widely used encryption tool called OpenSSL for at least two years and exploited it to gather intelligence. Security researchers have called Heartbleed one of the biggest flaws in the Internet’s history. Later in the day, the NSA released a statement saying the agency wasn’t aware of Heartbleed until it was made public.

Here is the full NSA statement:

Reports that NSA or any other part of the government were aware of the so-called Heartbleed vulnerability before April 2014 are wrong. The Federal government was not aware of the recently identified vulnerability in OpenSSL until it was made public in a private sector cybersecurity report. The Federal government relies on OpenSSL to protect the privacy of users of government websites and other online services. This Administration takes seriously its responsibility to help maintain an open, interoperable, secure and reliable Internet. If the Federal government, including the intelligence community, had discovered this vulnerability prior to last week, it would have been disclosed to the community responsible for OpenSSL.

When Federal agencies discover a new vulnerability in commercial and open source software – a so-called “Zero day” vulnerability because the developers of the vulnerable software have had zero days to fix it –  it is in the national interest to responsibly disclose the vulnerability rather than to hold it for an investigative or intelligence purpose.

In response to the recommendations of the President’s Review Group on Intelligence and Communications Technologies, the White House has reviewed its policies in this area and reinvigorated an interagency process for deciding when to share vulnerabilities.  This process is called the Vulnerabilities Equities Process.  Unless there is a clear national security or law enforcement need, this process is biased toward responsibly disclosing such vulnerabilities.

Find your daily dose of news & explainers in your WhatsApp. Stay updated, Stay informed-  Follow DNA on WhatsApp.
Advertisement

Live tv

Advertisement
Advertisement