PDA

View Full Version : Microsoft: US government is an 'advanced persistent threat'



Ares
8th December 2013, 05:39 AM
Microsoft's EVP of Legal and Corporate Affairs outlined the company's new data protection strategy on the basis that the US government is an "advanced persistent threat" — a label used for cyber criminals.

While Microsoft's recent move to encrypt user data made the most headlines, the reasoning underlying its new data protection strategies classify the US government in the same category as a cyber-criminal group.
Microsoft advanced persistent threat

Brad Smith, Microsoft's EVP of Legal and Corporate Affairs, labeled the American government as an "advanced persistent threat" in a December 4 post on The Official Microsoft Blog.

The term advanced persistent threat (APT) refers to an attacker, usually an organized group of malicious attackers, that should be considered harmful and dangerous — and an overall method of attack that plays a "long game."

Microsoft's explosive post begins by stating, "Many of our customers have serious concerns about government surveillance of the Internet."

Smith wrote in Protecting customer data from government snooping:

(...) Like many others, we are especially alarmed by recent allegations in the press of a broader and concerted effort by some governments to circumvent online security measures – and in our view, legal processes and protections – in order to surreptitiously collect private customer data.

In particular, recent press stories have reported allegations of governmental interception and collection – without search warrants or legal subpoenas – of customer data as it travels between customers and servers or between company data centers in our industry.

If true, these efforts threaten to seriously undermine confidence in the security and privacy of online communications. Indeed, government snooping potentially now constitutes an “advanced persistent threat,” alongside sophisticated malware and cyber attacks.

While the writing is cautiously couched in terms of "some governments" it's crystal clear that Microsoft's "advanced persistent threat" is referring to the ongoing revelations of US government surveillance activities (in leaks by Edward Snowden), and the concerns of Microsoft's American customers.

Cybersecurity firm Mandiant has tracked security breaches by advanced persistent threats since 2004; in February 2013 Mandiant reported that the most prolific APT in the world was "One of China's Cyber Espionage Units."

To see one of America's biggest companies say it must protect itself from its own government as it would from a group of malfeasant Chinese cyber-spies is a moment for the history books.

But security professionals worldwide may not be quite so surprised.

Not because hackers issued tinfoil bonnets at birth — most security pros and researchers understand that the same APT techniques used by cybercriminals to steal data from businesses and individuals for financial gain are the same used by nation-states.

http://cdn-static.zdnet.com/i/r/story/70/00/024019/advanced-persistent-threat-560x655.jpg?hash=ZQqxZmR1Aw&upscale=1

Microsoft and its Skype product have been named, alleged (and ridiculed) as having some kind of role in this year's unending, terrifying NSA scandal; namely, that products have been massaged with backdoors to which US government entities have access.

Only Americans need to worry about search warrants and subpoenas — in that exact terminology, as written in Mr. Smith's text.

The Microsoft legal exec explained,



In light of these allegations, we’ve decided to take immediate and coordinated action in three areas:

- We are expanding encryption across our services.

- We are reinforcing legal protections for our customers’ data.

- We are enhancing the transparency of our software code, making it easier for customers to reassure themselves that our products do not contain back doors.

Springboarding from its "persistent threat" categorization, Microsoft then explains its new encryption efforts — putting America's government and malicious hackers in the same category.

For many years, we’ve used encryption in our products and services to protect our customers from online criminals and hackers. While we have no direct evidence that customer data has been breached by unauthorized government access, we don't want to take any chances and are addressing this issue head on.

In Microsoft legal's official post, it continues to describe legal concerns relevant only for its American users and customers, and what it will now do to reinforce legal protections for its customers' data.

Microsoft said that as part of fighting this advanced threat, it will now fight gag orders "head on."

In its new Reinforcing Legal Protections initiatives,

(...) we are committed to notifying business and government customers if we receive legal orders related to their data.

Where a gag order attempts to prohibit us from doing this, we will challenge it in court.

We’ve done this successfully in the past, and we will continue to do so in the future to preserve our ability to alert customers when governments seek to obtain their data.

And we’ll assert available jurisdictional objections to legal demands when governments seek this type of customer content that is stored in another country.

And if anyone was still skeptical about whether Microsoft meant the US government when it said the words "advanced persistent threat," the post concludes:

Ultimately, we’re sensitive to the balances that must be struck when it comes to technology, security and the law. We all want to live in a world that is safe and secure, but we also want to live in a country that is protected by the Constitution.

We want to ensure that important questions about government access are decided by courts rather than dictated by technological might.

Leaving us all to wonder just what kind of mess we're in when one of the largest, richest and most visible American companies in the world openly categorizes the US government as an "advanced persistent threat" to both itself, and its customers.

http://www.zdnet.com/microsoft-us-government-is-an-advanced-persistent-threat-7000024019/

mick silver
8th December 2013, 05:42 AM
mining

iOWNme
8th December 2013, 06:46 AM
First off, 'Microsoft' is a CREATION of 'Government' like all Corporations are. Which means the 'Government' controls, regulates and PROFITS from its existence. It has been commonly known for a decade or more that Microsoft has built in 'backdoors' for their Master the 'Government'. Posts like this coming from Microsoft, are little more than propaganda and deception.


This article is from 1999.....Even reporting on it back then it was called a 'careless mistake' by Microsoft. STOP believing known liars! WAKE UP!!!!!!

http://www.heise.de/tp/artikel/5/5263/1.html



A careless mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows 95 (and its predecessors). The discovery comes close on the heels of the revelations earlier this year that another US software giant, Lotus, had built an NSA “help information” trapdoor (http://www.heise.de/tp/artikel/2/2898/1.html) into its Notes system, and that security functions on other software systems had been deliberately crippled.

The first discovery of the new NSA access system was made two years ago by British researcher Dr Nicko van Someren [an expert in computer security (https://2013.macworldiworld.com/connect/speakerDetail.ww?PERSON_ID=B71CE9F5FC22190FA2EF297 8E4C25EC9)]. But it was only a few weeks ago when a second researcher rediscovered the access system. With it, he found the evidence linking it to NSA.


Just searching Google for 'Microsoft Backdoor' yields many results....

https://www.google.com/search?q=microsoft+backdoor&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-US:official&client=firefox-a


http://www.washingtonsblog.com/2013/06/microsoft-programmed-in-nsa-backdoor-in-windows-by-1999.html

Twisted Titan
8th December 2013, 07:17 AM
Thanx SJ you stated much better then what i was trying to.


When has MS ever been on the side of the common person.

Ares
8th December 2013, 07:43 AM
Thanx SJ you stated much better then what i was trying to.


When has MS ever been on the side of the common person.

When it starts threatening their profitability, then you'll see a change in attitude. Earlier this year they had to write off close to 1 Billion FRN's due to Windows 8 surface tablets not selling. Then add into the equation that they can't even be trusted with your data, sales will slide further for FREE more SECURE alternatives like Linux.

So maybe it is posturing, Yahoo, Google, and a few others have taken the measure to also encrypting user data and email accounts. Other alternatives are springing up as well. Startmail is started and run by the same people who maintain startpage.com I'm a beta tester for startmail, and it looks to be like a good service. I may end up paying for it due to the peace of mind that they take user security and privacy seriously.

Jewboo
8th December 2013, 08:32 AM
Startmail is started and run by the same people who maintain startpage.com I'm a beta tester for startmail, and it looks to be like a good service. I may end up paying for it due to the peace of mind that they take user security and privacy seriously.



https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcT4GEERyXnqpgE39l4QizR47Rgr-JwF5ofo8biMFYReCpGDdU-X8A


You must give them your current email address and when you "pay" for their service the NSA will know who you are (https://beta.startmail.com/).

No way they will be allowed to start business without handing over their encryption keys to the NSA.

:rolleyes:

Ares
8th December 2013, 08:38 AM
https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcT4GEERyXnqpgE39l4QizR47Rgr-JwF5ofo8biMFYReCpGDdU-X8A


You must give them your current email address and when you "pay" for their service the NSA will know who you are (https://beta.startmail.com/).

No way they will be allowed to start business without handing over their encryption keys to the NSA.

:rolleyes:

They aren't based in the U.S., not subject to U.S. law.

:rolleyes:

gunDriller
8th December 2013, 08:39 AM
When has MS ever been on the side of the common person.

when they were selling DOS 6.2 ?

Blink
8th December 2013, 09:08 AM
Microsoft is our friend. Billy has joined up with Monsanto to save the world's food supplies by harboring their own seed banks (so nice of them). While, at the same time Belindy and Billy vaccinate all the third world countries because they care. Yeah, Microsoft is our internet warrior........

Jewboo
8th December 2013, 09:20 AM
They aren't based in the U.S., not subject to U.S. law.



Exactly. The very purpose of the NSA is to monitor all foreign data flowing in and out of the USA.

:rolleyes: by definition all "Startmail" digital traffic is their assigned target.

Ares
8th December 2013, 10:26 AM
Exactly. The very purpose of the NSA is to monitor all foreign data flowing in and out of the USA.

:rolleyes: by definition all "Startmail" digital traffic is their assigned target.

So book, with your infinite knowledge of computing and omnipotent view of the state. How do you decrypt AES-256 for which you do not have the keys too?

Let me know when you have the answer. :rolleyes:

Jewboo
8th December 2013, 11:00 AM
So book, with your infinite knowledge of computing and omnipotent view of the state...






Lavabit (http://www.theverge.com/2013/8/8/4602966/email-service-used-by-edward-snowden-abruptly-shuts-down-to-avoid) and Silent Mail (http://www.theverge.com/2013/8/8/4604202/phil-zimmerman-silent-circle-shuts-down-secure-email-following-lavabit-snowden) abruptly shut down this August rather than provide the NSA with their decrypt keys.

NO email service will be allowed to operate unless they hand over their decrypt keys to the NSA.


:rolleyes: Ares can't show us one safe email service either...lol.

7th trump
8th December 2013, 11:28 AM
Exactly. The very purpose of the NSA is to monitor all foreign data flowing in and out of the USA.

:rolleyes: by definition all "Startmail" digital traffic is their assigned target.

Yep!!
Good point.

Ponce
8th December 2013, 11:58 AM
Someone who I know will start working for Micro in about a week, he will be working in R & D so that he should have a open window to see what is going on.

V

Ares
8th December 2013, 12:55 PM
Lavabit (http://www.theverge.com/2013/8/8/4602966/email-service-used-by-edward-snowden-abruptly-shuts-down-to-avoid) and Silent Mail (http://www.theverge.com/2013/8/8/4604202/phil-zimmerman-silent-circle-shuts-down-secure-email-following-lavabit-snowden) abruptly shut down this August rather than provide the NSA with their decrypt keys.

NO email service will be allowed to operate unless they hand over their decrypt keys to the NSA.


:rolleyes: Ares can't show us one safe email service either...lol.

Both based in the U.S. Book.

Silent Mail:
Based in
National Harbor, Maryland

LavaBit:
Dallas, Texas

Startmail
Surfboard Holding B.V.
Postbus 1079
3700 BB Zeist
The Netherlands

From Ledar Levison, the owner of Lavabit:
, I would _strongly_ recommend against anyone trusting their private data to a company with physical ties to the United States.


So Book, with your Infinite knowledge of computing and omnipotent view the state.. How do you decrypt AES-256 when you aren't in control of the keys?

Instead of posting stupid comments with no basis in reality trying to play the devils advocate and looking stupid doing it. Why don't you bother researching a topic before commenting?

I'll await my stupid book picture with ":rolleyes:" as per expectation. Book you're always predictable.

Ares
8th December 2013, 12:58 PM
Yep!!
Good point.

Like I was trying to tell Book. What good is collected encrypted data that you don't have the possibility of decrypting?

Jewboo
8th December 2013, 02:12 PM
Startmail
Surfboard Holding B.V.
Postbus 1079
3700 BB Zeist
The Netherlands



http://static-bc.blogcritics.org/wp-content/uploads/bcimages/2013/09/NSA-300x300.jpg


NSA's assigned mission is to monitor all foreign email internet traffic in and out of our USA. Ares just attracts extra special attention from the NSA when using his foreign "encrypted Netherlands" email service. NSA is probably now tapping Ares' phone and going through his garbage cans...lol.

http://technewsnow.com/thumb/t201305njg4mjuwotyzmsawmdk0mti4nc4w.jpg <-- Ares

Ares
8th December 2013, 03:29 PM
http://static-bc.blogcritics.org/wp-content/uploads/bcimages/2013/09/NSA-300x300.jpg


NSA's assigned mission is to monitor all foreign email internet traffic in and out of our USA. Ares just attracts extra special attention from the NSA when using his foreign "encrypted Netherlands" email service. NSA is probably now tapping Ares' phone and going through his garbage cans...lol.

http://technewsnow.com/thumb/t201305njg4mjuwotyzmsawmdk0mti4nc4w.jpg <-- Ares



:rolleyes:

http://bewytchme.com/wp-content/uploads/2013/07/internet-troll1.jpg <--Book