EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

12.06.10

Wikileaks/Cablegate Reveals That Microsoft Gave Windows Source Code to TOPSEC, Which Trains and Employs Chinese Cyberspies

Posted in Microsoft, Security, Windows at 11:56 am by Dr. Roy Schestowitz

Kevin Mitnick
Putting Windows source code in the hands
of the Kevin Mitnicks of China

Summary: Microsoft equips private companies — not just governments — with just what they need to intrude all Windows-running computers, namely a key to potential remote access without liability

NOT just incompetence and negligence [1, 2, 3] are the cause of Microsoft’s security problems. Based on Cablegate leaks, it is possible that Microsoft’s secret (and poorly audited) code is exploited so often in China because Microsoft gives them access to this source code (which security researchers in the West cannot see and scrutinise prior to release in binary form).

Several days ago we showed some Egypt cables (prior to Wikileaks being targeted by censors) and it helped show just how closely Microsoft works with governments on ‘security’. The Guardian noticed this independently from us and highlighted the following block (filed under “US embassy cables: China uses access to Microsoft source code to help plot cyber warfare, US fears”):

56. (S//NF) CTAD comment: Additionally, CNITSEC enterprises has recruited Chinese hackers in support of nationally-funded “network attack scientific research projects.” From June 2002 to March 2003, TOPSEC employed a known Chinese hacker, Lin Yong (a.k.a. Lion and owner of the Honker Union of China), as senior security service engineer to manage security service and training. Venus Tech, another CNITSEC enterprise privy to the GSP, is also known to affiliate with XFocus, one of the few Chinese hacker groups known to develop exploits to new vulnerabilities in a short period of time, as evidenced in the 2003 release of Blaster Worm (See CTAD Daily Read File (DRF) April 4, 2008). 57. (S//NF) CTAD comment: While links between top Chinese companies and the PRC are not uncommon, it illustrates the PRC’s use of its “private sector” in support of governmental information warfare objectives, especially in its ability to gather, process, and exploit information. As evidenced with TOPSEC, there is a strong possibility the PRC is harvesting the talents of its private sector in order to bolster offensive and defensive computer network operations capabilities. (Appendix sources 51-52)

So, not just governments are getting access to source code. The “agreement with Microsoft… allowed select companies such as TOPSEC access to MICROSOFT source code in order to secure the Windows platform.” Here it is in raw form. “TOPSEC that trains most of china cyberspys,” Oiaohm quotes from it. “It’s in that cable,” he says. He then gives another direct quote from the cable: “TOPSEC provides services and training for the PLA and has recruited hackers in the past.” On this one he remarks: “Then latter on in the cable to says they have been granted access to MS source code.” The remainder can be read in our latest IRC logs, which make operation of this Web site entirely transparent, unlike governments. “Security by obscurity is that you don’t give the source code to the people attacking your system,” Oiaohm adds and “[i]If you are not using Security by obscurity you might as well publish the source code for everyone to see… At least then you have a better chance that truful ones will tell you where the flaws are.” (typos corrected)

“Proper obscurity can be done with open source”
      –Oiaohm
He continues: “that cable is a security research document in what the hell has gone wrong… That the USA was being breached so much… Also if you dig deeper the USA side is doing the same thing… Both are trying to use closed source to give them a cyberadvantage while both have access to the source code… Proper obscurity can be done with open source… Each system must be able to have many different combinations in its security system to attacker is not quite sure what he will be walking into… So attacks take longer to develop… MS Windows where most installs have basically the same security config… Basically have a obscurity level of nothing.”

Another cable speaks of an “invitation for a private meeting with a named DoS employee. The attached Microsoft Word document was a malicious”. Microsoft is mostly mentioned negatively (for security reasons) in Cablegate, at least thus far. What will be revealed in the remaining 99% of Cablegate (the part which has not been published yet)?

In actual security news (not leaks of old confidential reports), Vista 7 is being bricked by software which claims to improve Windows security:

THOSE WHO ARE RUNNING 64-bit Windows 7 systems should not download the update for AVG Technologies’ AV software.

AVG has withdrawn the update after complaints that the update completely bricked systems by forcing computers to go into an infinite crash loop.

Users of GNU/Linux and BSD never have such problems. Why won’t the US government encourage adoption of Free software, whose transparency makes it secure? It’s the same fallacy about secrecy which toppled both Windows security and now the US government. It arguably censors Wikileaks more zealously than other governments.

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

A Single Comment

  1. twitter said,

    December 6, 2010 at 4:09 pm

    Gravatar

    Source code disclosure is not a source of insecurity, it is the exclusive disclosure of insecure code to malicious parties that’s the problem. When software is free it can gain a high degree of both transparency and security like OpenBSD and gnu/linux have. When software is not free, the owners lack resources to fix things. Known problems persist for decades and new problems are constantly found when old, non free code bases are forced together in monstrosities like Microsoft Windows. The absolute worst case is when malicious organizations are given exclusive access to source code that other people use. Sadly, this is always the case when people are using non free software but few have betrayed their users the way Microsoft has.

    It has long been known that sharing code with China and other US enemies was a US national security risk. Microsoft representatives testified to this in the Netscape anti-trust trials. Just a few later they started sharing code with the PRC, the former KGB and many other US hostile organizations. It is nice to see that US diplomats were aware of this betrayal but we have to wonder why the US government has not acted on the knowledge. Windows should be dumped and those responsible at Microsoft should be put on trail for espionage.

What Else is New


  1. Links 23/3/2017: Qt 5.9 Beta, Gluster Storage 3.2

    Links for the day



  2. The Administrative Council of the European Patent Organisation Has Just Buried an Innocent Judge That Battistelli Does Not Like

    An innocent judge (never proven guilty of anything, only publicly defamed with help from Team Battistelli and dubious 'intelligence' gathering) is one of the forgotten casualties of the latest meeting of the Administrative Council (AC), which has become growingly complicit rather than a mere bystander at a 'crime' scene



  3. Nepotism at the European Patent Office and Suspicious Absence of Tenders for Big Projects

    Carte blanche is a French term which now perfectly describes the symptoms encountered in the European Patent Office, more so once led by a lot of French people (Battistelli and his friends)



  4. “Terror” Patent Office Bemoans Terror, Spreads Lies

    Response to some of the latest utterances from the European Patent Office, where patently untruthful claims have rapidly become the norm



  5. China Seems to be Using Patents to Push Foreign Companies Out of China, in the Same Way It Infamously Uses Censorship

    Chinese patent policies are harming competition from abroad, e.g. Japan and the US, and US patent policy is being shaped by its higher courts, albeit not yet effectively combating the element that's destroying productive companies (besieged by patent trolls)



  6. 22,000 Blog Posts

    A special number is reached again, marking another milestone for the site



  7. The EPO is Lying to Its Own Staff About ILO and Endless (Over 2 Years) EPO Mistrials

    The creative writing skills of some spinners who work for Battistelli would have staff believe that all is fine and dandy at the EPO and ILO is dealing effectively with staff complaints about the EPO (even if several years too late)



  8. EPO’s Georg Weber Continues Horrifying Trend of EPO Promoting Software Patents in Defiance of Directive, EPC, and Common Sense

    The EPO's promotion of software patents, even out in the open, is an insult to the notion that the EPO is adhering to or is bound by the rules upon which it maintains its conditional monopoly



  9. Protectionism v Sharing: How the US Supreme Court Decides Patent Cases

    As the US Supreme Court (SCOTUS) starts delivering some decisions we take stock of what's to come regarding patents



  10. Links 22/3/2017: GNOME 3.24, Wine-Staging 2.4 Released

    Links for the day



  11. The Battistelli Regime, With Its Endless Scandals, Threatens to Crash the Unitary Patent (UPC), Stakeholders Concerned

    The disdain and the growing impatience have become a huge liability not just to Battistelli but to the European Patent Office (EPO) as a whole



  12. The Photos the EPO Absolutely Doesn't Want the Public to See: Battistelli is Building a Palace Using Stakeholders' Money

    The Office is scrambling to hide evidence of its out-of-control spendings, which will leave the EPO out of money when the backlog is eliminated by many erroneous grants (or rejections)



  13. In the US Patent System, Evolved Tricks for Bypassing Invalidations of Software Patents and Getting Them Granted by the USPTO

    A roundup of news about patents in the US and how the patent microcosm attempts to patent software in spite of Alice (high-impact SCOTUS decision from 2014)



  14. “Then They Came For Me—And There Was No One Left To Speak For Me.”

    The decreasing number of people who cover EPO scandals (partly due to fear, or Battistelli's notorious "reign of terror") and a cause for hope, as well as a call for help



  15. As Expected, the Patent Microcosm is Already Interfering, Lobbying and Influencing Supreme Court Justices

    The US Supreme Court (SCOTUS) is preparing to deliver some important decisions on cases with broad ramifications, e.g. for patent scope, and those who make money from patent feuds are attempting to alter the outcome (which would likely restrict patent scope even further, based on these Justices' track record)



  16. Intellectual Ventures -- Like Microsoft (Which It Came From) -- Spreads Patents to Manifest a Lot of Lawsuits

    That worrisome strategy which is passage of patents to active (legally-aggressive) trolls seems to be a commonality, seen across both Microsoft and its biggest ally among trolls, which Microsoft and Bill Gates helped create and still fund



  17. What the Patent Microcosm is Saying About the EPO and the UPC

    Response to 3 law firms and today's output from them, which serves to inform or misinform the European public at times of Big Lies and fog of (patent) war, revealing the true nature of 21st century asymmetric patent warfare and lobbying



  18. Tough Day for the EPO's Media/Press/PR Team, Trying 'Damage Control' After Important Techrights Publications

    In an effort to save face and regain a sense of legitimacy the EPO publishes various things belatedly, and only after Techrights made these things publicly known and widely discussed



  19. Links 21/3/2017: PyPy Releases, Radeon RX Vega, Eileen Evans at Linux Foundation

    Links for the day



  20. In IAM, Asian Courts That Deliver Justice Are “Unfriendly” and Asian Patent Trolls Are Desirable

    Rebuttal or response to the latest pieces from IAM, which keeps promoting a culture of litigation rather than sharing, collaboration, negotiation, and open innovation



  21. At EPO “I Have the Feeling That Lowering Quality is Part of a Concerted Plan.”

    Growing concern about patent quality at the EPO -- a subject which causes managers to get rather nervous -- is now an issue at the forefront



  22. EPO Reduces the World to Just Seven Nations to Bolster an Illusion of Growing 'Demand' for European Patents

    The unscientific -- if not antiscientific -- attitude of the European Patent Office (EPO) continues to show with the arrival of yet more misleading 'infographics' (disinfographics would be a more suitable term)



  23. Letter to Angela Merkel Expresses Concerns About Impact of EPO Scandals on Germany and Its Image

    Dr. Angela Merkel, arguably the most powerful woman in the world, is being warned about the consequences of Germany ignoring (and hence facilitating) the abuses of Benoît Battistelli



  24. EPO Caricature: Low Patent Quality Not an Achievement

    A new cartoon about the legacy of Battistelli, which ruins both inventors and staff (examination) while handing money to abusers



  25. Are Lithuania and Latvia the Latest Additions to the List of Benoît Battistelli's Vassal States?

    Benoît Battistelli's 'back room' deals came at an interesting, strategic time and the Office uncharacteristically kept quiet about these



  26. Links 20/3/2017: Linux 4.11 RC3, OpenSSH 7.5 Released

    Links for the day



  27. Supposedly 'Pampered' Prisoners Are Still Prisoners of the EPO

    Response to those gross and familiar attempts to portray patent examiners, not politicians who trample all over them, as the cause of all the problems at the EPO



  28. Insulting Reversal of Narratives at the EPO: Team Battistelli as the Victim

    At times of great oppression against staff, in clear defiance of the law in fact, journalists are being asked (or expected) to view the oppressor as the victim, even when this oppressor drives people to suicide



  29. Battistelli's EPO Copies China -- Not the US -- When it Comes to Patenting Software and Expanding Patent Scope

    A detailed explanation of some of the latest reports from China and the US, serving to show that one opens up to software patents whereas the other shuts the door on them (and guess whose lead the EPO is taking)



  30. What IAM Says About AST, RPX, Ericsson, and IBM

    IAM, the trolls' mouthpiece (also the EPO's mouthpiece, but that's another story), provides updates on trolls and troll-like entities, but further commentary is needed to clarify and counterbalance the promotional language


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts