Vulnerabilities / Threats
12/8/2013
01:03 PM
Tom Parker
Tom Parker
Commentary
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Microsoft Goes Toe-To-Two With Largest Customer

Microsoft follows Google in attempting to thwart NSA surveillance efforts

Historically speaking, it has generally been understood within the security research community that Microsoft and its largest customer, the U.S. government, maintain a symbiotic relationship as it relates to the "leveraging" of Microsoft products for information operations. The government quietly leverages flaws in Microsoft's many product in support of national and domestic security initiatives, Microsoft turns a blind eye, its customers are generally none the wiser, and life goes on.

However, the revelations recently brought about by Edward Snowden have forced the hand of numerous technology companies that may have previously turned a blind eye to clandestine operations.

Earlier in November, Google employees angrily responded to reports of state surveillance of internal Google data by stating it had taken measures to encrypt internal, database replication traffic, thwarting the method reportedly used by NSA and Britain's Government Communications Headquarters (GCHQ) in the slide deck leaked by Snowden.

Now it's Microsoft's turn. Microsoft General Council Brad Smith went on record a few days ago at a shareholder meeting, stating: "We're focused on engineering improvements that will further strengthen security, including strengthening security against snooping by governments."

This is a significant move given Microsoft's relationship with the funder of at least one of the programs that it now seeks to thwart and its prior silence on the matter. Although Microsoft has not yet shared any details regarding the move, it will likely include similar precautions to those taken by Google -- i.e., enhanced protection of its wide area network traffic (particularly as it transits national borders) to make it more difficult for organizations such as the NSA to intercept traffic.

In the ongoing arms race that is the cybercapabilities market, more difficult almost always means more expensive. In other words, Microsoft's move will ultimately cost some of its largest customers millions of dollars in research and development, and they're proud to tell the world all about it.

The funds (taxpayer money) will be needed by organizations such as the NSA and GCHQ to identify and develop capabilities, which are akin to those that have been lost as a result of countermeasures implemented by Google, Microsoft, and others. This will surely change the dynamic of a historically symbiotic relationship and create new challenges when it comes to cooperation between the public and private sector, and when it comes to information sharing on cyberthreats and associated intelligence.

-- Update: Dec 8th --

Microsoft has release a statement on its public company blog specifying several areas in which it intends to focus its efforts in coming years as a direct response to government snooping allegations, as follows:

· Expanding encryption across our services.

· Reinforcing legal protections for our customers' data.

· Enhancing the transparency of our software code, making it easier for customers to reassure themselves that our products do not contain back doors.

Tom Parker is CTO at FusionX

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
macker490
50%
50%
macker490,
User Rank: Ninja
12/15/2013 | 12:36:15 PM
re: Microsoft Goes Toe-To-Two With Largest Customer
nsa is a minor concern
hacking and commercial data mining and market research are the real concerns and they ain't gonna do nothin' about that. it's their business model.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-1421
Published: 2014-04-22
Cross-site scripting (XSS) vulnerability in Craig Knudsen WebCalendar before 1.2.5, 1.2.6, and other versions before 1.2.7 allows remote attackers to inject arbitrary web script or HTML via the Category Name field to category.php.

CVE-2013-2105
Published: 2014-04-22
The Show In Browser (show_in_browser) gem 0.0.3 for Ruby allows local users to inject arbitrary web script or HTML via a symlink attack on /tmp/browser.html.

CVE-2013-2187
Published: 2014-04-22
Cross-site scripting (XSS) vulnerability in Apache Archiva 1.2 through 1.2.2 and 1.3 before 1.3.8 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, related to the home page.

CVE-2013-4116
Published: 2014-04-22
lib/npm.js in Node Packaged Modules (npm) before 1.3.3 allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names that are created when unpacking archives.

CVE-2013-4472
Published: 2014-04-22
The openTempFile function in goo/gfile.cc in Xpdf and Poppler 0.24.3 and earlier, when running on a system other than Unix, allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names.

Best of the Web