Vulnerabilities / Threats
12/8/2013
01:03 PM
Tom Parker
Tom Parker
Commentary
50%
50%

Microsoft Goes Toe-To-Two With Largest Customer

Microsoft follows Google in attempting to thwart NSA surveillance efforts

Historically speaking, it has generally been understood within the security research community that Microsoft and its largest customer, the U.S. government, maintain a symbiotic relationship as it relates to the "leveraging" of Microsoft products for information operations. The government quietly leverages flaws in Microsoft's many product in support of national and domestic security initiatives, Microsoft turns a blind eye, its customers are generally none the wiser, and life goes on.

However, the revelations recently brought about by Edward Snowden have forced the hand of numerous technology companies that may have previously turned a blind eye to clandestine operations.

Earlier in November, Google employees angrily responded to reports of state surveillance of internal Google data by stating it had taken measures to encrypt internal, database replication traffic, thwarting the method reportedly used by NSA and Britain's Government Communications Headquarters (GCHQ) in the slide deck leaked by Snowden.

Now it's Microsoft's turn. Microsoft General Council Brad Smith went on record a few days ago at a shareholder meeting, stating: "We're focused on engineering improvements that will further strengthen security, including strengthening security against snooping by governments."

This is a significant move given Microsoft's relationship with the funder of at least one of the programs that it now seeks to thwart and its prior silence on the matter. Although Microsoft has not yet shared any details regarding the move, it will likely include similar precautions to those taken by Google -- i.e., enhanced protection of its wide area network traffic (particularly as it transits national borders) to make it more difficult for organizations such as the NSA to intercept traffic.

In the ongoing arms race that is the cybercapabilities market, more difficult almost always means more expensive. In other words, Microsoft's move will ultimately cost some of its largest customers millions of dollars in research and development, and they're proud to tell the world all about it.

The funds (taxpayer money) will be needed by organizations such as the NSA and GCHQ to identify and develop capabilities, which are akin to those that have been lost as a result of countermeasures implemented by Google, Microsoft, and others. This will surely change the dynamic of a historically symbiotic relationship and create new challenges when it comes to cooperation between the public and private sector, and when it comes to information sharing on cyberthreats and associated intelligence.

-- Update: Dec 8th --

Microsoft has release a statement on its public company blog specifying several areas in which it intends to focus its efforts in coming years as a direct response to government snooping allegations, as follows:

· Expanding encryption across our services.

· Reinforcing legal protections for our customers' data.

· Enhancing the transparency of our software code, making it easier for customers to reassure themselves that our products do not contain back doors.

Tom Parker is CTO at FusionX

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
macker490
50%
50%
macker490,
User Rank: Ninja
12/15/2013 | 12:36:15 PM
re: Microsoft Goes Toe-To-Two With Largest Customer
nsa is a minor concern
hacking and commercial data mining and market research are the real concerns and they ain't gonna do nothin' about that. it's their business model.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0547
Published: 2015-07-04
The D2CenterstageService.getComments service method in EMC Documentum D2 4.1 and 4.2 before 4.2 P16 and 4.5 before P03 allows remote authenticated users to conduct Documentum Query Language (DQL) injection attacks and bypass intended read-access restrictions via unspecified vectors.

CVE-2015-0548
Published: 2015-07-04
The D2DownloadService.getDownloadUrls service method in EMC Documentum D2 4.1 and 4.2 before 4.2 P16 and 4.5 before P03 allows remote authenticated users to conduct Documentum Query Language (DQL) injection attacks and bypass intended read-access restrictions via unspecified vectors.

CVE-2015-0551
Published: 2015-07-04
Multiple cross-site scripting (XSS) vulnerabilities in EMC Documentum WebTop 6.7SP1 before P31, 6.7SP2 before P23, and 6.8 before P01; Documentum Administrator 6.7SP1 before P31, 6.7SP2 before P23, 7.0 before P18, 7.1 before P15, and 7.2 before P01; Documentum Digital Assets Manager 6.5SP6 before P2...

CVE-2015-1966
Published: 2015-07-04
Multiple cross-site scripting (XSS) vulnerabilities in IBM Tivoli Federated Identity Manager (TFIM) 6.2.0 before FP17, 6.2.1 before FP9, and 6.2.2 before FP15, as used in Security Access Manager for Mobile and other products, allow remote attackers to inject arbitrary web script or HTML via a crafte...

CVE-2015-4196
Published: 2015-07-04
Platform Software before 4.4.5 in Cisco Unified Communications Domain Manager (CDM) 8.x has a hardcoded password for a privileged account, which allows remote attackers to obtain root access by leveraging knowledge of this password and entering it in an SSH session, aka Bug ID CSCuq45546.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report