Gen. Paul M. Nakasone, Director of United States National Security Agency, speaks during a hearing on the “United States Special Operations Command and United States Cyber Command” with the Senate Armed Services Committee on Capitol Hill in Washington DC on March 25th, 2021.Gen. Paul M. Nakasone, Director of United States National Security Agency, speaks during a hearing on the “United States Special Operations Command and United States Cyber Command” with the Senate Armed Services Committee on Capitol Hill in Washington DC on March 25th, 2021.
Army Gen. Paul Nakasone, director of the National Security Agency, says the U.S. has a “blind spot” when it comes to foreign intelligence services that effectively carry out cyberspying from inside the U.S. – Anna Moneymaker/The New York Times via AP

Army Gen. Paul Nakasone, director of the National Security Agency, says the U.S. has a “blind spot” when it comes to foreign intelligence services that effectively carry out cyberspying from inside the U.S.Anna Moneymaker/The New York Times via AP

The National Security Agency considers itself the world’s most formidable cyber power, with an army of computer warriors who constantly scan the wired world. Yet by law, the NSA only collects intelligence abroad, and not inside the U.S.

U.S. rivals like Russia are aware of this blind spot and know how to exploit it, as the NSA director, Army Gen. Paul Nakasone, explained recently to the Senate Armed Services Committee.

“We may see what’s occurring outside of the United States, but when it comes into the United States, our adversaries are moving very quickly,” Nakasone testified on March 25. “They understand the laws and the policies that we have within our nation, and so they’re utilizing our own infrastructure, our own Internet service providers, to create these intrusions.”

NATIONAL SECURITY

U.S. Cyber Weapons Were Leaked — And Are Now Being Used Against Us, Reporter Says

In a major breach last year, hackers widely believed to be from Russia’s foreign intelligence service, the SVR, placed malware on a software update produced by the Texas company Solar Winds.

No one had reason to be suspicious, or the legal authority to monitor, as that software update was sent out electronically from SolarWinds to 18,000 organizations, including nine U.S. government agencies.

“It’s not the fact that we can’t connect the dots. We can’t see all of the dots,” Nakasone said.

Privacy protections

The U.S. Constitution’s Fourth Amendment bars the government from domestic surveillance unless a crime is suspected.

But in the digital age, these U.S. privacy protections have an unintended consequence. They help hide foreign intelligence agencies that can disguise their tracks and make it appear as if they are operating from inside the U.S.

This is fueling a debate on how the U.S. government and private tech companies can protect both computer networks and civil liberties.

None of the leading figures in this debate are suggesting that privacy laws protecting Americans should be rolled back. But they are saying the U.S. must find a better way to guard against foreign spy agencies.

SolarWinds was just one of several U.S. companies that the hackers tapped into to cover their tracks, said Glenn Gerstell, who was the NSA’s general counsel until he stepped down last year.

TECHNOLOGY

What We Know About Russia’s Alleged Hack Of The U.S. Government And Tech Companies

“The Russians rented a computer server capability on a network hosting company, GoDaddy,” said Gerstell. “Just like I can go buy a website on GoDaddy, so too can the Russians.”

Of course, the hackers used multiple layers of deception to hide their identity and make it look as if they were Americans, Gerstell said. This meant that even if U.S. cybersecurity teams suspected something was amiss, the bread crumbs weren’t leading back to Russia.

“Someone looking at their computer in the United States, to see whether it was doing anything funny, would see communications from their computer to another computer in the United States on GoDaddy, which doesn’t look particularly suspicious,” he said.

Extensive hacking

The hackers rummaged through computer networks belonging to the U.S. government agencies and dozens of private companies starting in March 2020. They weren’t detected until December 2020 — by yet another U.S. company hit in the attack — the California cybersecurity firm FireEye.

FireEye is one of the country’s leading cybersecurity firm. It’s the company the U.S. government and large corporations call when they fear they’ve been hacked.

Kevin Mandia is the CEO of FireEye, which uncovered the hack of SolarWinds last December. The attack hit 18,000 organizations, including nine U.S. government agencies.Nathan Ellgren/AP

FireEye said it uncovered the breach only because a new employee on its security team was particularly vigilant. She noticed someone using the credentials of a FireEye salesman was logging in with a new mobile phone. She checked with the salesman, who said the phone didn’t belong to him. It turned out the phone belonged to a cyberintruder.

“We recognized right away that FireEye was one of many victims, ” the company’s CEO, Kevin Mandia, said at a recent conference held by The Cipher Brief.

Mandia, a former Air Force computer security officer, says the U.S. government needs a central location where the government and the private sector can deal with suspected hacks in real time.

NATIONAL SECURITY

How A Cybersecurity Firm Uncovered The Massive Computer Hack

“Regardless of the agency chartered with doing it, you will have to have a clearinghouse for intel that’s a single point. You just do. I don’t care what you call it, but it’s got to be private and public-sector thing,” he said.

The present system is far too slow and cumbersome, according to Mandia and others.

If the NSA detects unusual computer traffic coming from abroad, it is not allowed to track it inside the U.S. The agency can notify the FBI, which can then seek court permission and consult with the U.S. company that may be the target. While all this plays out, likely over the course of days, a skilled hacker may have already come and gone.

If a private U.S. company detects an intrusion, as happened with FireEye in December, it’s not legally required to share that information with the government or anyone else. Many companies are reluctant to report a hack, fearing the disclosure will harm their reputation and stock price.

FireEye’s willingness to publicly acknowledge that it was breached, and to work with the government and other private companies, has been praised for helping limit the damage.

Neither the government nor the companies targeted have disclosed the full extent of the damage.

New proposals

Meanwhile, Gerstell, the former NSA general counsel, is working on his own proposal.

“What we can do is create some kind of fusion center,” he said. “The FBI, together with the NSA and CISA from Homeland Security, can all pool together their resources, their computers, and work together in real time with the private sector.”

TECHNOLOGY

Group Behind Alleged Russia Hack Broke Into Microsoft’s Internal Systems

CISA, the Cybersecurity and Infrastructure Security Agency, was just established in 2018 to deal with domestic cybersecurity issues. The agency played a leading role in safeguarding U.S. elections last year. But as a relatively new and small agency with limited authority, cybersecurity experts say CISA is not yet equipped to play the role that’s needed.

However, Sen. Ron Wyden, an Oregon Democrat, is a skeptical when he hears about plans to expand the government’s cybersecurity reach.

“The impression the American people might get is that the hackers are such formidable adversaries that there was nothing that the American government or our biggest tech companies could have done to protect themselves,” Wyden said at a recent hearing of the Senate Intelligence Committee on the SolarWinds hack.

“My view is that message leads to privacy-violating laws and billions of more taxpayer funds for cybersecurity,” he added. “There are concrete ways for the government to improve its ability to identify hackers without resorting to warrantless monitoring of the domestic Internet.”

The White House says President Biden will respond soon to the SolarWinds hack, but has not provided details.

The Biden administration also says it’s working on ways for the government and the tech industry to better share critical information. But the administration stresses that it’s not currently seeking increased legal authority for domestic digital surveillance.

By NPR

Please enter CoinGecko Free Api Key to get this plugin works.