Cyber Mercenaries Don’t Deserve Immunity By Tom Burt, Microsoft Vice President, Customer Security & Trust December 28, 2020
The NSO Group
sold governments a program called Pegasus, which could be
installed on a device simply by calling the device via
WhatsApp; the device’s owner did not even have to answer.
According to WhatsApp, the NSO Group used Pegasus to access
more than 1,400 mobile devices, including those belonging to
journalists and human rights defenders. We believe companies
like NSO Group selling tools like Pegasus are concerning for
three reasons. First, their
presence increases the risk that the weapons they create
fall into the wrong hands. Previously, sophisticated
nation-state hacking capabilities resided in a small number
of governments with well-funded agencies focused on
developing these weapons. Even then, government-created
espionage tools got into the hands of other governments who
used them in attacks like WannaCry and NotPetya that spread
like wildfire beyond the targeted victims and ultimately
devastated lives
and disrupted businesses
around the world. Lowering the barrier for access to these
weapons would guarantee that such catastrophes would be
repeated. Even if the
tools are sold to governments who use them for narrowly
targeted attacks, there are a variety of ways they can still
fall into the wrong hands. For example, private actors like
the NSO Group and their less sophisticated customers may
lack the defenses some governments use to protect the
weapons, making them more susceptible to cyber-theft. For
example, an Italian company called Hacking Team – one of
NSO’s competitors – was itself hacked in 2015. Additionally,
targets of these weapons can observe, reverse-engineer and
then use these tools for their own purposes. Second,
private-sector companies creating these weapons are not
subject to the same constraints as governments. Many
governments with offensive cyber capabilities are subject to
international laws, diplomatic consequences and the need to
protect their own citizens and economic interests from the
indiscriminate use of these weapons. Additionally, some
governments – like the United States – may share
high-consequence vulnerabilities they discover with impacted
technology providers so the providers can patch the
vulnerability and protect their customers. Private actors
like the NSO Group are only incented to keep these
vulnerabilities to themselves so they can profit from them,
and the exploits they create are constantly recycled by
governments and cybercriminals once they get into the wild. The expansion
of sovereign immunity that NSO seeks would further encourage
the burgeoning cyber-surveillance industry to develop, sell
and use tools to exploit vulnerabilities in violation of
U.S. law. Private companies should remain subject to
liability when they use their cyber-surveillance tools to
break the law, or knowingly permit their use for such
purposes, regardless of who their customers are or what
they’re trying to achieve. We hope that standing together
with our competitors today through this amicus brief will
help protect our collective customers and global digital
ecosystem from more indiscriminate attacks. |
Terms of Use | Copyright © 2002 - 2021 CONSTITUENTWORKS SM CORPORATION. All rights reserved. | Privacy Statement