Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

12/8/2013
01:03 PM
Tom Parker
Tom Parker
Commentary
50%
50%

Microsoft Goes Toe-To-Two With Largest Customer

Microsoft follows Google in attempting to thwart NSA surveillance efforts

Historically speaking, it has generally been understood within the security research community that Microsoft and its largest customer, the U.S. government, maintain a symbiotic relationship as it relates to the "leveraging" of Microsoft products for information operations. The government quietly leverages flaws in Microsoft's many product in support of national and domestic security initiatives, Microsoft turns a blind eye, its customers are generally none the wiser, and life goes on.

However, the revelations recently brought about by Edward Snowden have forced the hand of numerous technology companies that may have previously turned a blind eye to clandestine operations.

Earlier in November, Google employees angrily responded to reports of state surveillance of internal Google data by stating it had taken measures to encrypt internal, database replication traffic, thwarting the method reportedly used by NSA and Britain's Government Communications Headquarters (GCHQ) in the slide deck leaked by Snowden.

Now it's Microsoft's turn. Microsoft General Council Brad Smith went on record a few days ago at a shareholder meeting, stating: "We're focused on engineering improvements that will further strengthen security, including strengthening security against snooping by governments."

This is a significant move given Microsoft's relationship with the funder of at least one of the programs that it now seeks to thwart and its prior silence on the matter. Although Microsoft has not yet shared any details regarding the move, it will likely include similar precautions to those taken by Google -- i.e., enhanced protection of its wide area network traffic (particularly as it transits national borders) to make it more difficult for organizations such as the NSA to intercept traffic.

In the ongoing arms race that is the cybercapabilities market, more difficult almost always means more expensive. In other words, Microsoft's move will ultimately cost some of its largest customers millions of dollars in research and development, and they're proud to tell the world all about it.

The funds (taxpayer money) will be needed by organizations such as the NSA and GCHQ to identify and develop capabilities, which are akin to those that have been lost as a result of countermeasures implemented by Google, Microsoft, and others. This will surely change the dynamic of a historically symbiotic relationship and create new challenges when it comes to cooperation between the public and private sector, and when it comes to information sharing on cyberthreats and associated intelligence.

-- Update: Dec 8th --

Microsoft has release a statement on its public company blog specifying several areas in which it intends to focus its efforts in coming years as a direct response to government snooping allegations, as follows:

· Expanding encryption across our services.

· Reinforcing legal protections for our customers' data.

· Enhancing the transparency of our software code, making it easier for customers to reassure themselves that our products do not contain back doors.

Tom Parker is CTO at FusionX

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
macker490
50%
50%
macker490,
User Rank: Ninja
12/15/2013 | 12:36:15 PM
re: Microsoft Goes Toe-To-Two With Largest Customer
nsa is a minor concern
hacking and commercial data mining and market research are the real concerns and they ain't gonna do nothin' about that. it's their business model.
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
Robert Lemos, Contributing Writer,  2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9342
PUBLISHED: 2020-02-22
The F-Secure AV parsing engine before 2020-02-05 allows virus-detection bypass via crafted Compression Method data in a GZIP archive. This affects versions before 17.0.605.474 (on Linux) of Cloud Protection For Salesforce, Email and Server Security, and Internet GateKeeper.
CVE-2020-9338
PUBLISHED: 2020-02-22
SOPlanning 1.45 allows XSS via the "Your SoPlanning url" field.
CVE-2020-9339
PUBLISHED: 2020-02-22
SOPlanning 1.45 allows XSS via the Name or Comment to status.php.
CVE-2020-9340
PUBLISHED: 2020-02-22
fauzantrif eLection 2.0 has SQL Injection via the admin/ajax/op_kandidat.php id parameter.
CVE-2020-9341
PUBLISHED: 2020-02-22
CandidATS 2.1.0 is vulnerable to CSRF that allows for an administrator account to be added via the index.php?m=settings&a=addUser URI.