EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

12.13.10

Cablegate Reveals Government Requesting Access to Microsoft Data, Kill Switches

Posted in Microsoft, Security at 5:32 am by Dr. Roy Schestowitz

White House

Summary: Despite the fact that only a fraction of Cablegate has yet been released, new evidence already surfaces about the US government’s concern (and role) in the seemingly-private computer industry

“Cablegate” is one of the reasons we have not posted so much this month. Personally I have posted over a thousand links/dents about it in the past week alone. The threat to Wikileaks is a threat to all of us who leak documents that serve as evidence of misconduct. Techrights did this many times before, so it’s important to defend the practice.

One of the most major (and first) revelations coming out of Cablegate is to do with fear of Iran’s nuclear programme. Given what can be found in Cablegate (not to mention brutal retaliation against Wikileaks), it is clear that the US government goes very far to get its way. Earlier this year we covered Stuxnet on many occasions as people raised suspicions that Stuxnet had something to do with governments and secret services. Experts who suggested this were not obscure people; some were well regarded in their field. As a roundup of Stuxnet posts consider:

  1. Ralph Langner Says Windows Malware Possibly Designed to Derail Iran’s Nuclear Programme
  2. Windows Viruses Can be Politically Motivated Sometimes
  3. Who Needs Windows Back Doors When It’s So Insecure?
  4. Windows Insecurity Becomes a Political Issue
  5. Windows, Stuxnet, and Public Stoning
  6. Stuxnet Grows Beyond Siemens-Windows Infections
  7. Has BP Already Abandoned Windows?
  8. Reports: Apple to Charge for (Security) Updates
  9. Windows Viruses Can be Politically Motivated Sometimes
  10. New Flaw in Windows Facilitates More DDOS Attacks
  11. Siemens is Bad for Industry, Partly Due to Microsoft
  12. Microsoft Security Issues in The British Press, Vista and Vista 7 No Panacea
  13. Microsoft’s Negligence in Patching (Worst Amongst All Companies) to Blame for Stuxnet
  14. Microsoft Software: a Darwin Test for Incompetence
  15. Bad September for Microsoft Security, Symantec Buyout Rumours
  16. Microsoft Claims Credit for Failing in Security
  17. Many Windows Servers Being Abandoned; Minnesota Goes the Opposite Direction by Giving Microsoft Its Data
  18. Windows Users Still Under Attack From Stuxnet, Halo, and Zeus
  19. Security Propaganda From Microsoft: Villains Become Heroes
  20. Security Problems in iOS and Windows
  21. Eye on Security: BBC Propaganda, Rootkits, and Stuxnet in Iran’s Nuclear Facilities
  22. Eye on Security: ClamAV Says Windows is a Virus, Microsoft Compromises Mac OS X, and Stuxnet Runs Wild
  23. Windows Kernel Vulnerability for Thanksgiving, Insecurity Used for Surveillance Again

“Stuxnet Still Out of Control At Iran Nuclear Sites” summarises Slashdot which says:

“Iran’s nuclear program is still in chaos despite its leaders’ adamant claim that they have contained the computer worm that attacked their facilities, cybersecurity experts in the US and Europe say. Last week President Mahmoud Ahmadinejad, after months of denials, admitted that the worm had penetrated Iran’s nuclear sites, but he said it was detected and controlled. The second part of that claim, experts say, doesn’t ring true. Owners of several security sites have discovered huge bumps in traffic from Iran, as the country tries to deal with Stuxnet. ‘Our traffic from Iran has really spiked,’ said a corporate officer who asked that neither he nor his company be named. ‘Iran now represents 14.9 percent of total traffic, surpassing the United States with a total of 12.1 percent.’”

The original article comes from The Atlantic and says that “Stuxnet Disrupted Iranian Centrifuges”:

Malicious software apparently designed to disrupt the Iranian nuclear program was able to do just that, Iran’s president acknowledged today. Security researchers found that the Stuxnet worm could insinuate itself into industrial control systems — and if it found a particular brand and arrangement of motor controllers would begin a long-term sabotage program. Now, in the wake of the apparent assassination of an Iranian nuclear scientist, Mahmoud Ahmadinejad acknowledged that Stuxnet did hit his country’s centrifuge facility, though he downplayed its impact.

Techrights does not deal directly with politics, so staying more focused on technical aspects of this, what are the chances of targeted attacks? This needn’t imply that Stuxnet was created by governments as some people allege. Either way, in the wake of Cablegate, it is unreasonable to rule out anything for which there is evidence.

In a new cable which goes back to 2004 it emerges that Microsoft produced code which would put a “black screen” on any computer running Windows upon some trigger invocation (e.g. war, not just counterfeiting). Some would call it a “kill switch”. What’s interesting here is that it took years for people to actually discover what black screens of death truly are. That’s how secretive it was. This enabled control from the outside. To quote a relevant part of this newly-released cable:

WHAT’S DRIVING CHINA
——————–
¶8. (C) According to another well-respected tech sector
analyst here, a number of historical, cultural, and
technological factors have coalesced to put China in a
technologically-aggressive state-of-mind. One contributing
factor was Microsoft’s flubbed 2004 strategy
to deter intellectual property theft by darkening computer
monitors running unlicensed Windows operating software. This
consultant believes that example of U.S. technology
effectively wielding power over China’s personal computers
helped spur China’s aggressive campaign for source codes and
its own technology. This, combined with growing Chinese
pride, economic clout and influence, and the “weakened”
position of the U.S. and its allies after the global economic
downturn, are emboldening the Chinese to take ever more
aggressive positions in advancing its innovative industries
at the expense of foreign ones.

¶9. (C) A local Microsoft executive applauds the Secretary’s
speech and the Administration’s commitment “to organize
sustained, targeted, persistent engagement on the full range
of Internet-related issues” with China. This executive said
the Secretary’s remarks were “right on point,” particularly
for companies who “desperately need the help of the USG” in
the face of “harassment, threats and actual shutdowns of
service, threats of licenses being revoked, resistance to
provide legal authority, mandates to place servers in China,
etc.” Our local APCO contact described the Google issue as a
“stirring of the beehive,” but says the kind of harassment
Microsoft describes is a fact of worsening life here which

But wait. It gets worse. Not only remote control of people’s machines (in another country) is a feature to the US government and other governments. They also gather people’s data as this other new cable reveals:

¶12. (U) Assisting Brazil in creating legislation to counter
cybercrimes, including online child pornography and tracking
of sex offenders, represents another potential area of
cooperation on law enforcement matters. Brazil lacks
cybercrime laws and the Congress has opened a Parliamentary
Committee of Inquiry (CPI) to look at the issue and come up
with draft legislation. As part of the CPI’s work, the CPI
was able to obtain over 3,000 Google records of identified
child pornography that had been distributed on the Internet
from Brazil. The chairman of the CPI has voiced his concern
about, in his view, inadequate cooperation from Google and
its subsidiary Orkut, a relationship site. Google, Orkut,
Microsoft, and all other Internet service providers are
required to report the discovery of child pornography on the
Internet and DHS/ICE has established a mechanism to have
access to this information which has been reported. DHS/ICE
has already initiated the practice of sharing this
information with Brazilian Federal Police. Related to the
CPI, its Chairman has made inquiries to the Mission on the
case of DHS/ICE Deportation officer accused of child
exploitation at a hotel in Brazil. The U.S. is seeking the
toughest penalty possible, whether in Brazil or the U.S., and
is fully cooperating with Brazilian authorities.

Only about 0.5% of the cables have been released so far, so there is a lot more coming, also about companies like Microsoft. Microsoft's eGovernment lobbyist Anke Domscheit-Berg has praised Wikileaks, but that was before Cablegate, i.e. when mostly information about crimes and wars was released.

The cables above ought to teach why Free software is essential to people’s independence and countries’ autonomy. By controlling information and software one controls almost everything and the latest developments around ACTA, TSA, and COICA law show that the government wants more control over people. It will change the law if necessary, in order to ensure continued domination over an increasingly upset population.

Access to personal data and ‘jailing’ of people inside devices is a threat to the hacker culture (which Wikileaks thrives in) and even just to control over one’s life. In separate news, “Apple quietly drops iOS jailbreak detection API” and Google’s Chrome OS seems like somewhat of a jail rather than a GNU/Linux distribution. About Apple we learn that:

Apple has disabled, without explanation, a jailbreak detection API in iOS less than six months after introducing it. Device management vendors say the reasons for the decision are a mystery, but insist they can use alternatives to discover if an iPhone, iPod touch or iPad has been modified so they can load and modify applications outside of Apple’s iTunes-based App Store.

Nobody should need to ‘jailbreak’ a device in the first place.

Software freedom is not just about power (to the user). It’s about control of one’s own destiny and if society is indeed closing down and repressing the population, then now more than ever people and their governments should migrate away from proprietary software.

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email
  • Slashdot

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. You Just Know Somebody is in a State of Retreat When the Strategy Becomes to Discredit One's Critics (or Collectively Paint Them All as Wrong/Crazy)

    A goulash of bullcrap from Bill Gates doesn't add up; it seems like his media strategy has warped (or fallen back) onto discrediting his critics as though they don't exist, don't know anything, or are simply jealous



  2. United States v IBM Archives/Resources

    As the massive case against IBM monopoly (United States v IBM; 104,400 pages of trial transcripts and 17,000 exhibits) predates the World Wide Web it's difficult to find comprehensive literature about it any longer (Wikipedia and more modern sites are instruments of revisionism and reputation laundering)



  3. History Goes in Cycles

    Just like antiwar activism was 'quelled' or 'pacified' half a century ago nowadays we're led to think that software freedom is just fine and there's nothing left to argue about (except words and other petty nonsense)



  4. Looking Back at the Real Story of Microsoft

    Let's take a moment to examine what Microsoft was all along (since its formation in 1975)



  5. Europe Deserves Better Than Today's EPO

    Overly restrictive society with countless monopolies (even on seeds!) will neither serve people nor will it breed general acceptance



  6. European Patent Office Management Swims With Sharks and Liars

    It has become increasingly if not abundantly evident that European Patent Office President Campinos is no better than Battistelli as he’s still a ‘darling’ of patent litigation trolls and their front groups/lawyers



  7. Linked In to Pedophilia

    As the above articles show (one published a couple of days ago), the 'Web of Lies' and the incredible deceit/cover-up run deep and we still lack answers from those who enabled what Salon has just said involved "trafficking five or six girls a day."



  8. Whistleblower Aid Already Showed Cover-up of Bill Gates 'Contributions' to MIT

    The Goodwin Procter report which failed to actually investigate whether Gates and Epstein jointly directed payments to MIT (the latter was already dead) can be understood differently in light of the above leak, which was published earlier this year



  9. IRC Proceedings: Monday, August 10, 2020

    IRC logs for Monday, August 10, 2020



  10. Proof (Archived Original Letter): Bill Gates Lied to the New Yorker, BBC and Others About Connection of MIT Money to Mr. Jeffrey Epstein and Their Close Relationship

    As the article (“The anatomy of Bill Gates’ Jeffrey Epstein-facilitated MIT donations”) put it at the time (just 2 days before Dr. Stallman received all the heat at MIT), “Secrecy in the funding of academic programs is highly problematic, as University of Virginia professor Siva Vaidhyanathan explains in a long Twitter thread. “Companies and the billionaires who run them are always bending research agendas (and sometimes even results) to their interests,” he writes. “Anonymity would prevent any examination or accountability.”” But there are more high-level Microsoft links to Mr. Epstein; “Hoffman invited both former MIT Media Lab director Joi Ito and Epstein to an August 2015 dinner in Palo Alto with Elon Musk, Mark Zuckerberg and Peter Thiel. He tells Axios that he invited Epstein at Ito’s behest, and only because Ito vouched for the convicted criminal, saying that he had successfully cleared MIT’s vetting process.” In 2016 the article “Bill Gates talked to Reid Hoffman about being on Microsoft’s board of directors” was published. “Furthermore,” it notes, “Gates and Hoffman have a lot in common: They both hold board seats and advisory roles, and no other formal status or day-to-day obligations, at the tech companies they founded.”



  11. All This Happened While Bill Gates' Engineer Was on Trial for Amassing Child Pornography

    While MIT relies on the word of someone who repeatedly lied about his relationship with Mr. Epstein (refuted even by MIT itself), the record shows what happened just when Bill Gates’ own engineer faced conviction for pedophilia (the media diverted attention to Dr. Stallman just days after the above E-mails came to light)



  12. Links 10/8/2020: Popcorn Computers Pocket PC, Finnix 121, GhostBSD 20.08.04, EasyOS 2.3.8

    Links for the day



  13. IRC Proceedings: Sunday, August 09, 2020

    IRC logs for Sunday, August 09, 2020



  14. Release: Bill Gates' Engineer Busted for More Child Pornography Than Reported in the Media

    Based on our analysis, which was repeated carefully twice, the sum of recognised hashes turns out to be about 7,500 (7,430 objects), which is more than was reported in the media after the arrest of Rick Allen Jones at Bill Gates' mansion



  15. Links 10/8/2020: KPhotoAlbum 5.7.0 and MX Linux RC

    Links for the day



  16. UserLibre: What I Want You to Get From This Book

    "Corporate-backed lies run the world, and the FSF used to get in the way."



  17. Even the Mainstream/Corporate Media is Trying to Study Why (or If) Bill Gates and Epstein's Sex Abuse Ring Were Closely Connected

    People in the media are eager to understand why Mr. Gates was so close to Mr. Epstein and even flew his plane (despite having several of his own)



  18. The Incredible Demise of News Sites About Patents

    Sites for (and by) patent lawyers/attorneys seem to be perishing, which means it's hard to know what's going on



  19. Understanding Users and the Three Kinds of Computers: New, Slow and Broken

    "Understanding the user is the first step towards a practical response to misconceptions."



  20. The Good and Bad of a (GNU?) BSD (not GNU/LINUX) Future

    "The software industry now occupies Free software's own territory. No longer is it Free software vs. Windows and MacOS, it's Free software vs. GIAFAM-co-opted Free software."



  21. Links 9/8/2020: Popcorn Computers Pocket PC and New Interview With Richard Stallman

    Links for the day



  22. Education and Free Software

    "If students learn how to code, they'll be able to figure out the applications."



  23. Features Considered Harmful (Revised)

    "But the benefits of Free software, free candy and new features are all meaningless, if the user isn't in control."



  24. If We Weren't Silencing Founders, Critics and People We Just Don't Like

    In the long run, history is rarely very kind to tyrants, especially the ones who did little more than lie to people and demand things that served no real purpose."



  25. I Would Have Supported the Coup (Under Very Different Circumstances)

    Richard Stallman's (rms) ordeals are showing us how not to deal with a founder; this is how power transition could be done instead, according to figosdev



  26. It Looks Like Red Hat's (IBM) Fedora Project May be 'Outsourced' to Amazon's Datacentres

    In "seeking a more modern and cost effective location" for Fedora Infrastructure it seems to have been decided, privately, that Amazon (AWS) would be the new home of this project; but there's sufficient obfuscation surrounding the matter and many people seem to be totally unaware



  27. IRC Proceedings: Saturday, August 08, 2020

    IRC logs for Saturday, August 08, 2020



  28. Fearmongering Was Originally an IBM Thing, Not a Microsoft Thing

    Microsoft made FUD famous, but it was actually IBM’s practice that made it commonplace in the first place (the term or acronym was coined before Microsoft even mattered and on the same year Microsoft was founded)



  29. [Meme] People Get Fired for Being Bought by IBM (With a Crummy Severance Package)

    IBM used to proudly provide job security and one could have a job there for decades (career ladders and worker benefits of all sorts are what some people assess this when looking for an employer, e.g. whether they can progress, get promoted, stay onboard); by today’s standards only a month’s salary is exceptionally bad, especially when one gets fired without warning, but this is what IBM did to some Red Hat employees



  30. New FSF Video Makes the Case Against Microsoft GitHub (and Similar), So Why is the FSF's Board Being Filled Up With Active GitHub Users?

    The FSF makes a good point about “important values like autonomy, sharing, social responsibility, and collaboration” — the very things that are under attack by Microsoft’s GitHub, which is all about coercion and monopolistic control over developers


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts