EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

09.05.10

U.S. Military Hit by Windows, Learns Nothing From Microsoft Negligence

Posted in Apple, Free/Libre Software, Microsoft, Security, Windows at 8:34 pm by Dr. Roy Schestowitz

Flag and tank

Summary: Failures to name the culprit after a serious military intrusion; new examples where Microsoft knowingly ignores and leaves open holes inside Windows

“LOOKS Like Microsoft is Doing Damage Control on Virus Attacks” was the title of this post from last week. There has been a hot debate about it recently, but owing to Slashdot spin not much was done to call out Windows. The DOD/Pentagon ought to say more about the role of Microsoft software, but even the original article from Wired only speaks about “worm” and “USB”/”flash drive”, neglecting to say that only Windows can be affected. Here’s the opening:

In the fall of 2008, a variant of a three year-old, relatively-benign worm began winding its way through the U.S. military’s networks, spread by troops using thumb drives and other removable storage media. Now, the Pentagon says the infiltration — first reported by Danger Room — was a deliberate attack, launched by foreign spies. It’s a claim that some of the troops who worked to contain the worm are finding hard to back up.

In the upcoming issue of Foreign Affairs, Deputy Defense Secretary William Lynn writes that the worm entered the military’s classified systems “when an infected flash drive was inserted into a U.S. military laptop at a base in the Middle East. The flash drive’s malicious computer code, placed there by a foreign intelligence agency, uploaded itself onto a network run by the U.S. Central Command.”

Why could Slashdot not state that this is a Windows issue? Should one just assume (magically, by default) that when no operating system is mentioned it must be Microsoft Windows? They do name and shame the operating system when it’s not Windows.

Slashdot should know better because only yesterday it wrote about a data-stealing bug which is specific to Internet Explorer 8 (Windows only): [via]

There’s an unpatched vulnerability in Internet Explorer 8 that enables simple data-stealing attacks by Web-based attackers and could lead to an attacker hijacking a user’s authenticated session on a third-party site. The flaw, which a researcher said may have been known since 2008, lies in the way that IE 8 handles CSS style sheets.

We have written a great deal this year about Microsoft negligence [1, 2, 3] that led to security disasters, e.g. after Microsoft had ignored known Internet Explorer flaws for 6 months [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12] (Microsoft is the worst in the regard, so Google banned Windows earlier this year).

“Researcher told Microsoft of Windows apps zero-day bugs 6 months ago,” says this new headline from Gregg Keizer [1, 2], who adds yet another example of Microsoft ignoring problems for half a year (not even automatic patchers/trackers would help in such cases). Some things just never change.

Microsoft has said this year that for improved security users should consider moving to 64-bit Windows, but “Rootkit with Blue Screen history now targets 64-bit Windows,” says this news headline.

A new version of the malware that crippled Windows PCs last February sidesteps safeguards designed to block rootkits from hijacking machines running 64-bit editions of Windows, researchers said Thursday.

Proprietary software for Windows is another problem (Adobe and Apple being prime examples), but Free software too, e.g. Mozilla Firefox, may sometimes suffer only from flaws that are inherited from Windows, not Linux/UNIX. Microsoft in the stack is a real troublemaker and Apple is not helping:

A security researcher has uncovered a new vulnerability in Apple QuickTime that can be used to bypass some security protections in Microsoft Windows.

Code needs to be openly audited/auditable to be trustworthy. Why did the U.S. military make the mistake of relying on Windows?

“Thanks to Mr. Gates, we now know that an open Internet with protocols anyone can implement is communism; it was set up by that famous communist agent, the US Department of Defense.”

Richard Stallman

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

A Single Comment

  1. twitter said,

    September 5, 2010 at 10:59 pm

    Gravatar

    Windows use by the US military is the result of corruption. Competent people, such as Richard Clarke, and institutions like West Point, know that Microsoft is insecure. Instructors from the US Military Academy at West Point say they use “as little Windows as possible”. Clarke blames US military use on “a small army of lobbyists” and knows how insecure the OS is but would use the problem to bring government control to the internet and computing. It would be better to continue with the original design of the Internet, robustness trough redundancy, diversity and freedom.

What Else is New


  1. Links 22/11/2019: Mesa 19.2.6, webOS OSE 2.1.0

    Links for the day



  2. Understanding Thierry Breton: More Influential Friends in High Places

    "So it comes as no surprise to find Valerie and Thierry rubbing shoulders with members of the Rothschild family at social events."



  3. Links 22/11/2019: Slimbook’s GNU/Linux Laptops, Kubernetes Hype

    Links for the day



  4. Techrights is Still a Team Effort

    Getting involved in what we do is not difficult and it is even encouraged



  5. Guest Post/Off-Topic: Koalas Caught in Australian Bushfire

    Australian volunteers and rescuers need help to rescue helpless animals facing danger



  6. Global Patent Warming

    The old term "Global Patent Warming" comes to mind when one assesses the neoliberal approach of today's EPO, where the sole goal is making piles of money by granting loads and loads of illegal European Patents



  7. IRC Proceedings: Thursday, November 21, 2019

    IRC logs for Thursday, November 21, 2019



  8. Teaser: “Enriching Exchanges”

    Ahead of the fourteenth part in the Breton series this old tweet seems increasingly relevant



  9. Web Site Which Exposed Microsoft Crimes is Gone From the Web, But Copies Still Exist

    Reputation laundering operations of Microsoft tell us that Microsoft is a 'new' and 'reformed' company; but Comes v Microsoft documents serve to show that little has changed



  10. Understanding Thierry Breton: Socialising With the Elite

    "Bernadette Chirac is not the only Presidential widow with whom Valerie has close connections."



  11. Justice Peter Huber Speaking to a Front Group of Team UPC May Compromise the Integrity of the FCC and Its Outcomes

    The public reaction, even from some legal professionals, isn't too positive, seeing how judges from BVerfG (FCC) speak to the mouthpieces of Team UPC (biased and in the pockets of the litigation 'industry')



  12. Injustice at Every Level Would Simply Doom the Entire Patent System

    Repeated failure to restore the Rule of Law and enforce accountability/oversight in Europe's patent system renders the entire system moot; it is a case of adherence to basic constitutional pillars



  13. Understanding Thierry Breton: Thierry and the $100 Billion Man

    Thierry Breton's connections to the tax avoidance ploy of his friend Bernard Arnault



  14. Links 21/11/2019: Mesa 19.3.0 RC4, Canonical SPS

    Links for the day



  15. Links 21/11/2019: Charmed OSM, Mesa 19.2.5, DXVK 1.4.5, Zorin OS 15 Lite

    Links for the day



  16. Understanding Thierry Breton: Atos Healthcare - “The Ugly Face of Business”

    "...2,380 people died after their claim for employment and support allowance (ESA) ended because a work capability assessment (WCA) found that they were found fit for work."



  17. IRC Proceedings: Wednesday, November 20, 2019

    IRC logs for Wednesday, November 20, 2019



  18. Microsoft Tim: Microsoft is Now Defending Linux

    The difference between fiction and reality



  19. Justice Peter Huber of the German Federal Constitutional Court (FCC) Calls 'Bullshit' a Rumour Nobody Really Spreads

    A sort of 'trial by media' (by Team UPC) compromises the integrity of the case (constitutional complaint) and can be interpreted as judges succumbing to lobbying/pressure from those who conspire to violate many constitutions across Europe for personal/financial gain



  20. Understanding Thierry Breton: What Thierry Did Next...

    "Whether by coincidence or not, when Atos announced in 2010 that it would acquire Siemens’ IT unit, it was the 32-year-old Macron at Rothschild who advised Breton on the deal."



  21. Links 20/11/2019: HONOR MagicBook With GNU/Linux, Coreboot 4.11, GNU Health Patchset 3.6.1

    Links for the day



  22. IRC Proceedings: Tuesday, November 19, 2019

    IRC logs for Tuesday, November 19, 2019



  23. EPO Geared Towards Financial Exploitation of Europe Instead of Serving Europe

    For the financial benefit of law firms and patent offices (they profit from processing loads of patents and lawsuits) Europe is being reverted back to Medieval Times when exercising invention and free thought (or free coding) was a luxury of the rich alone



  24. Microsoft and IBM Are the Patent Trolls, They Won't Protect Us From Trolls

    "Microsoft has no taste" and IBM has no taste, either; they're lying to our collective face together with OIN and the 'Linux' Foundation



  25. How Ralph Nader Put It

    Ralph Nader on money in politics



  26. ZDNet (CBS) Associates GNU/Linux Users With ISIS

    Response to "US student was allegedly building a custom Gentoo Linux distro for ISIS," just published by ZDNet and composed by their biggest troll, Catalin Cimpanu



  27. Understanding Thierry Breton: Noël Forgeard and His “Golden Parachute”

    The end of the first half of the Breton series; in this particular part we continue to cover the EADS scandal and the second half of this series will include the EPO connections (the vote in a plenary for Breton's nomination is due 27/11)



  28. Links 19/11/2019: Zswap's B-Tree Search Implementation, WordPress 5.2.4

    Links for the day



  29. We've Already Entered the Era When Patents Should be Presumed Invalid

    The abundance of low-quality patents may mean short-term profits for patent offices and law firms; but we know at whose expense they are profiting and the legitimacy of patent systems suffers as a result



  30. Jean-Luc Breton

    Breton a champion of obstruction and obfuscation


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts