Why leaked NSA hacking tools are not like stolen Tomahawk missiles

A Tomahawk cruise missile being fired from the USS Barry
The guided-missile destroyer USS Barry launches a Tomahawk cruise missile on March 29, 2011. (image: U.S. Navy)

Last week a malicious computer worm dubbed WannaCry 2.0 began attacking older, unpatched versions of Microsoft operating systems, infecting hundreds of thousands of systems with ransomware that held user data hostage in exchange for Bitcoin payments.

The cyberattack used code from a powerful National Security Agency tool called EternalBlue, which a mysterious group of hackers known as The Shadow Brokers leaked earlier this year. Tech companies have been quick to blame the NSA for finding and exploiting vulnerabilities in commercial products like Windows, to say nothing of losing them.

On Sunday, Brad Smith, Microsoft’s (MSFT) president and chief legal officer, argued that an “equivalent scenario with conventional weapons would be the U.S. military having some of its Tomahawk missiles stolen.”

The next day, Former NSA contractor Edward Snowden, speaking via video chat to the K(NO)W Identity Conference in Washington D.C. from an undisclosed location in Russia, repeated Smith’s argument.

“An equivalent scenario to what we’re seeing happening today would be conventional weapons, produced and held by the U.S. military, being stolen, such as Tomahawk missiles,” Snowden said while describing Smith’s letter to a crowd less than a mile from the White House.

Edward Snowden speaking at conference.
Edward Snowden speaking via video chat from Russia at the K(NO)W Identity Conference in Washington, D.C. on May 15. (image: One World Identity)

U.S. officials acknowledge that the NSA deserves scrutiny about protecting tools it develops to collect foreign intelligence. “They’ve absolutely got to do a better job protecting [the hacking tools],” General Keith Alexander, head of the NSA from 2005 to 2014, told The Washington Post. “You can’t argue against that.”

However, the Tomahawk analogy may be a stretch. Dave Aitel, a former NSA research scientist and CEO of the cybersecurity company Immunity, explained why hacking tools are not like bombs.

“The very first thing is you can steal a Tomahawk missile from me, but you cannot steal it from me without me knowing you’ve stolen it,” Aitel said. “And of course, you can steal an exploit or other intellectual property from me and I may never find out. Another is that two people can have [the same exploit] at the same time.”

Aitel, who specializes in the offensive side of cybersecurity, added that “deep down, the biggest difference is that you have to learn a lot about exploits to protect yourself, and I don’t really have to learn a lot about Tomahawk missiles to protect myself from Tomahawk missiles.”

The WannaCry 2.0 malware.
This is the screen you’ll see if your computer is infected with the WannaCry 2.0 ransomware.

Nevertheless, the analogy has been relatively well received. Travis Jarae, CEO and Founder of One World Identity, which hosted the conference in Washington, and paid a speakers bureau to digitally host Snowden, said that the Tomahawk analogy is “not wrong” given the contemporary threat environment.