EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

11.18.13

NSA-Created Malware Used Politically and Relied on Microsoft-Provided Back Doors/Weak Encryption

Posted in Action, Microsoft at 5:11 am by Dr. Roy Schestowitz

Hardware

Summary: A roundup of privacy-related news, with special focus on the role played by proprietary software in political espionage

SINCE Microsoft and the NSA are so close and we already know about NSA attempts to put back doors in operating systems, it should not be surprising that Microsoft Windows has a back door (more likely sevral) and Stuxnet was made possible to devise/deploy on Windows. Based on some news from Ars Technica [1], now that a lot of this shocking information is out there, Microsoft is trying to shift away from weak encryption (or breakable encryption), but it’s likely to be too late because Microsoft made such weakness a standard. “Microsoft is retiring two widely used cryptographic technologies that are growing increasingly vulnerable to attacks,” the article says. Further down the article notes: “The state-sponsored Flame malware that targeted Iran pulled off the only known in-the-wild collision attack earlier this decade. Using a never-before seen technique to subvert the MD5 algorithm, Flame-infected computers were able to pose as official servers belonging to Microsoft. By forging Microsoft’s digital signatures, the infected machines were able to trick uninfected computers into installing highly malicious software they otherwise would have refused. Microsoft has since decommissioned MD5 in its update system. Tuesday’s advisory indicates that the company is aiming to learn from that past incident by retiring SHA1 before it falls to the same type of attack.”

But why not assume that this weakness was the result of complicity (with the NSA) rather than an “incident” or some kind of accident? There are other bits of Microsoft software which gleefully invite the NSA in, e.g. Skype (incidentally, the researcher who showed it could be maliciously exploited has just died in an accident [2]).

We need to accept the fact that a lot of software is insecure by design. It’s designed to give power to particular parties, not the users. It’s an important distinction which helps show why proprietary software oughtn’t be trusted.

In other news, the United States’ “Internet Kill Switch” is back in the headlines [3] and countries like Germany are expected to have something to say [4]. Snowden’s E-mail provider is taking privacy up a notch [5] and Snowden’s leaks are said to be having an impact on privacy perceptions [6] because companies like Facebook [7], Google [8], and of course Microsoft do not protect users’ privacy at all. Facebook is notably worse because it helps the government train face recognition classifiers for people whose friends tag them [9]. In case of protests, for example, activists can be identified and named (which helps those who crush protests or intimidate protesters [10]).

There seems to be a shift motivating encryption of the Web [11] and rejection of proprietary software [12] because privacy rights are being misused [13-16], only making privacy advocates stronger and more popular [17]. In the UK, privacy abuses against foreign leaders [18] have been damaging, but not as damaging as the Streisand Effect caused by the attack on the press and on privacy advocates [19].

Related/contextual items from the news:

  1. Hoping to avert “collision” with disaster, Microsoft retires SHA1
  2. Security researcher Cédric ‘Sid’ Blancher dead at 37

    In 2006, while working for the EADS Corporate Research centre, he also put together a paper on how to exploit Skype to act as a botnet.

  3. EPIC Prevails in FOIA Case About “Internet Kill Switch”

    In a Freedom of Information Act case brought by EPIC against the Department of Homeland Security, a federal court has ruled that the DHS may not withhold the agency’s plan to deactivate wireless communications networks in a crisis. EPIC had sought “Standard Operating Procedure 303,” also known as the “internet Kill Switch,” to determine whether the agency’s plan could adversely impact free speech or public safety.

  4. Germany struggling to respond to NSA revelations
  5. DarkMail Alliance Wants To Upgrade Gmail’s Security
  6. Snowden effect: young people now care about privacy
  7. Friday Shame: Facebook reminds you that your posts are also its ads

    “Ads work the same way and just as with all of the content on Facebook, we show you which of your friends have interacted with something to make it more relevant to you,” Facebook chief privacy officer Erin Egan write in a post posted at 12:05PM ET on Friday

    While Facebook made a point to clarify the new privacy policy, it’s actually changing very little about it — despite all the backlash the changes caused when they were initially introduced.

  8. Google will soon display your Google+ photo when you call an Android phone
  9. US intelligence wants to radically advance facial recognition software

    Identifying people from video streams or boatloads of images can be a daunting task for humans and computers.

  10. EFF Appeals Chevron’s Speech-Chilling Subpoena

    On Halloween of this year, EFF and EarthRights International (ERI) filed an appeal in the Second Circuit (PDF) to protect the rights of dozens of environmental activists, journalists, and attorneys from a sweeping subpoena issued by the Chevron Corporation. And just last week, both the Republic of Ecuador (PDF) and a group consisting of Human Rights Watch, Automattic, a pair of anonymous bloggers, and academics Ethan Zuckerman and Rebecca McKinnon (PDF) filed amicus briefs in support of our appeal.

  11. Internet architects propose encrypting all the world’s web traffic

    A vastly larger percentage of the world’s web traffic will be encrypted under a near-final recommendation to revise the Hypertext Transfer Protocol (HTTP) that serves as the foundation for all communications between websites and end users.

  12. Revenge of the Dragon

    This could spawn migration to GNU/Linux on client and server in governments globally not just a few early adopters like Europe, China, India, Brazil and Russia. By next year there could be dozens of governments making the move. I advised Canada to do that years ago. They might have another idea now that USA is the biggest threat in the world to cybersecurity with documented attacks.

  13. Government Refusing To Say Whether Phone Tracking Evidence Came From Mass Surveillance

    In criminal cases, defendants have a right to know what evidence the government plans to use against them and how the government gathered that evidence. This basic due process principle is essential: it allows defendants to test in court whether law enforcement officers obtained evidence in violation of the Fourth Amendment. But in a new legal brief, the government has refused to confirm or deny whether it relied on constitutionally questionable mass surveillance programs to gather evidence for a criminal prosecution.

  14. Watch live: “They’re watching us: So what?” featuring Greenwald, Schneier, Bamford, Dorfman

    From Pen America, cosponsored by the ACLU and the Fordham Law School Center on National Security, a talk on surveillance with James Bamford, Ariel Dorfman, Glenn Greenwald, and Bruce Schneier.

  15. The Biggest Little CIA Shop You’ve Never Heard Of

    The CIA’s main business is sending operatives abroad to recruit spies and, especially since 9/11, chasing down terrorists for its target-hungry drone pilots. But NR, as it’s known, is the agency’s stay-at-home division. It’s nothing like Homeland, however, with operatives running about with guns in the D.C. suburbs (though its 1960s-era predecessors once spied on antiwar and civil rights activists and recruited Cuban exiles to harass Fidel Castro). It also works with the FBI and NSA in bugging foreign diplomatic missions there.

  16. The Importance of Free Websites

    For me, this has been a perfect illustration of the positive aspects of the web. With the rampart commercialization of the Internet and issues such as advertisers tracking users surfing habits, the NSA’s gathering data on nearly everything that happens online and crackers trying to break into computers at every turn, it’s easy to come to the conclusion that the public network is nothing but a virtual space fraught with danger. But it’s also a place of great promise, as Charlie’s story so aptly demonstrates.

    Twenty years ago, my roommate and her family would not be able to follow the progress being made by Charlie nearly so closely. They would’ve had to rely on bits and pieces of often unreliable, certainly incomplete, information picked up by word of mouth through phone calls. They would not have felt as involved with the situation as they now do either, which is also important.

  17. Silent Mail, FreedomMail or Lavamail. Whatever it’s called, it will offer the same benefits

    Dark Mail alliance is the non-profit group formed by the leaders of Silent Circle and Lavabit.

    Silent Circle offers a suite of secure, communication services, while Lavabit is the secure email provider used by Edward Snowden, the ex-CIA contractor now living in Russia.

  18. GCHQ Monitors Hotel Reservations to Track Diplomats

    Britain’s GCHQ intelligence service monitors diplomats’ travels using a sophisticated automated system that tracks hotel bookings. Once a room has been identified, it opens the door to a variety of spying options.

  19. UK’s reputation is damaged by reaction to Edward Snowden, says UN official
Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. The Crook Goes to Brussels to Lie About the Unitary Patent (UPC)

    The person who spent years lying about the UPC and severely attacking critics (usually by blatantly lying about them) goes to Brussels for another nose extension



  2. The EPO's HR Roadmap Retrospective

    A look back at the terrible ‘accomplishments’ of the Jesper Kongstad-led Administrative Council, which still issues hogwash and face-saving lies, as one might expect from a protector of Battistelli that lies to national representatives and buries inconvenient topics



  3. Links 26/3/2017: Debian Project Leader Elections, SecureDrop and Alexandre Oliva FSF Winners

    Links for the day



  4. His Master's Voice, Jesper Kongstad, Blocks Discussion of Investigative and Disciplinary Procedures at the EPO

    The Chairman of the Administrative Council of the European Patent Organisation is actively preventing not just the dismissal of Battistelli but also discussion of Battistelli's abuses



  5. Heiko Maas and the State of Germany Viewed as Increasingly Complicit in EPO Scandals and Toxic UPC Agenda

    It is becoming hard if not impossible to interpret silence and inaction from Maas as a form of endorsement for everything the EPO has been doing, with the German delegates displaying more of that apathy which in itself constitutes a form of complicity



  6. With IP Kat Coverage of EPO Scandals Coming to an End (Officially), Techrights and The Register Remain to Cover New Developments

    One final post about the end of Merpel’s EPO coverage, which is unfortunate but understandable given the EPO’s track record attacking the media, including blogs like IP Kat, sites of patent stakeholders, and even so-called media partners



  7. Everyone, Including Patent Law Firms, Will Suffer From the Demise of the EPO

    Concerns about quality of patents granted by the EPO (EPs) are publicly raised by industry/EPO insiders, albeit in an anonymous fashion



  8. Yes, Battistelli's Ban on EPO Strikes (or Severe Limitation Thereof) is a Violation of Human Rights

    Battistelli has curtailed even the right to strike, yet anonymous cowards attempt to blame the staff (as in patent examiners) for not going out of their way to engage in 'unauthorised' strikes (entailing dismissal)



  9. Even the EPO's Administrative Council No Longer Trusts Its Chairman, Battistelli's 'Chinchilla' Jesper Kongstad

    Kongstad's protection of Battistelli, whom he is supposed to oversee, stretches to the point where national representatives (delegates) are being misinformed



  10. Thanks to Merpel, the World Knows EPO Scandals a Lot Better, But It's a Shame That IP Kat Helped UPC

    A look back at Merpel's final post about EPO scandals and the looming threat of the UPC, which UPC opportunists such as Bristows LLP still try hard to make a reality, exploiting bogus (hastily-granted) patents for endless litigation all around Europe



  11. EPO Critics Threatened by Self-Censorship, Comment Censorship, and a Growing Threat to Anonymity

    Putting in perspective the campaign for justice at the EPO, which to a large degree relies on whistleblowers and thus depends a great deal on freedom of the press, freedom of speech, and anonymity



  12. Links 25/3/2017: Maru OS 0.4, C++17 Complete

    Links for the day



  13. Judge and Justice Bashing in the United States, EPC Bashing at the EPO

    Enforcement of the law based on constitutional grounds and based on the European Patent Convention (EPC) in an age of retribution and insults -- sometimes even libel -- against judges



  14. Looking for EPO Nepotism? Forget About Jouve and Look Closely at Europatis Instead.

    Debates about the contract of Jouve with the EPO overlook the elephants in the room, which include companies that are established and run by former EPO chiefs and enjoy a relationship with the EPO



  15. Depressing EPO News: Attacks on Staff, Attacks on Life, Brain Drain, Patents on Life, Patent Trolls Come to Germany, and Spain Being Misled

    A roundup of the latest developments at the EPO combined with feedback from insiders, who are not tolerating their misguided and increasingly abusive management



  16. It Certainly Looks Like Microsoft is Already Siccing Its Patent Trolls, Including Intellectual Ventures, on Companies That Use Linux (Until They Pay 'Protection' Money)

    News about Intellectual Ventures and Finjan Holdings (Microsoft-funded patent trolls) reinforces our allegations -- not mere suspicions anymore -- that Microsoft would 'punish' companies that are not paying subscription fees (hosting) or royalties (patent tax) to Microsoft and are thus in some sense 'indebted' to Microsoft



  17. Links 24/3/2017: Microsoft Aggression, Eudyptula Challenge Status Report

    Links for the day



  18. Bernhard Rapkay, Former MEP and Rapporteur on Unitary Patent, Shoots Down UPC Hopes While UPC Hopefuls Recognise That Spain Isn't Interested Either

    Germany, the UK and Spain remain massive barriers to the UPC -- all this in spite of misleading reports and fake news which attempted to make politicians believe otherwise (for political leverage, by means of dirty lobbying contingent upon misinformation)



  19. Links 23/3/2017: Qt 5.9 Beta, Gluster Storage 3.2

    Links for the day



  20. The Administrative Council of the European Patent Organisation Has Just Buried an Innocent Judge That Battistelli Does Not Like

    An innocent judge (never proven guilty of anything, only publicly defamed with help from Team Battistelli and dubious 'intelligence' gathering) is one of the forgotten casualties of the latest meeting of the Administrative Council (AC), which has become growingly complicit rather than a mere bystander at a 'crime' scene



  21. Nepotism at the European Patent Office and Suspicious Absence of Tenders for Big Projects

    Carte blanche is a French term which now perfectly describes the symptoms encountered in the European Patent Office, more so once led by a lot of French people (Battistelli and his friends)



  22. “Terror” Patent Office Bemoans Terror, Spreads Lies

    Response to some of the latest utterances from the European Patent Office, where patently untruthful claims have rapidly become the norm



  23. China Seems to be Using Patents to Push Foreign Companies Out of China, in the Same Way It Infamously Uses Censorship

    Chinese patent policies are harming competition from abroad, e.g. Japan and the US, and US patent policy is being shaped by its higher courts, albeit not yet effectively combating the element that's destroying productive companies (besieged by patent trolls)



  24. 22,000 Blog Posts

    A special number is reached again, marking another milestone for the site



  25. The EPO is Lying to Its Own Staff About ILO and Endless (Over 2 Years) EPO Mistrials

    The creative writing skills of some spinners who work for Battistelli would have staff believe that all is fine and dandy at the EPO and ILO is dealing effectively with staff complaints about the EPO (even if several years too late)



  26. EPO’s Georg Weber Continues Horrifying Trend of EPO Promoting Software Patents in Defiance of Directive, EPC, and Common Sense

    The EPO's promotion of software patents, even out in the open, is an insult to the notion that the EPO is adhering to or is bound by the rules upon which it maintains its conditional monopoly



  27. Protectionism v Sharing: How the US Supreme Court Decides Patent Cases

    As the US Supreme Court (SCOTUS) starts delivering some decisions we take stock of what's to come regarding patents



  28. Links 22/3/2017: GNOME 3.24, Wine-Staging 2.4 Released

    Links for the day



  29. The Battistelli Regime, With Its Endless Scandals, Threatens to Crash the Unitary Patent (UPC), Stakeholders Concerned

    The disdain and the growing impatience have become a huge liability not just to Battistelli but to the European Patent Office (EPO) as a whole



  30. The Photos the EPO Absolutely Doesn't Want the Public to See: Battistelli is Building a Palace Using Stakeholders' Money

    The Office is scrambling to hide evidence of its out-of-control spendings, which will leave the EPO out of money when the backlog is eliminated by many erroneous grants (or rejections)


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts