12.06.10

Gemini version available ♊︎

Wikileaks/Cablegate Reveals That Microsoft Gave Windows Source Code to TOPSEC, Which Trains and Employs Chinese Cyberspies

Posted in Microsoft, Security, Windows at 11:56 am by Dr. Roy Schestowitz

Kevin Mitnick
Putting Windows source code in the hands
of the Kevin Mitnicks of China

Summary: Microsoft equips private companies — not just governments — with just what they need to intrude all Windows-running computers, namely a key to potential remote access without liability

NOT just incompetence and negligence [1, 2, 3] are the cause of Microsoft’s security problems. Based on Cablegate leaks, it is possible that Microsoft’s secret (and poorly audited) code is exploited so often in China because Microsoft gives them access to this source code (which security researchers in the West cannot see and scrutinise prior to release in binary form).

Several days ago we showed some Egypt cables (prior to Wikileaks being targeted by censors) and it helped show just how closely Microsoft works with governments on ‘security’. The Guardian noticed this independently from us and highlighted the following block (filed under “US embassy cables: China uses access to Microsoft source code to help plot cyber warfare, US fears”):

56. (S//NF) CTAD comment: Additionally, CNITSEC enterprises has recruited Chinese hackers in support of nationally-funded “network attack scientific research projects.” From June 2002 to March 2003, TOPSEC employed a known Chinese hacker, Lin Yong (a.k.a. Lion and owner of the Honker Union of China), as senior security service engineer to manage security service and training. Venus Tech, another CNITSEC enterprise privy to the GSP, is also known to affiliate with XFocus, one of the few Chinese hacker groups known to develop exploits to new vulnerabilities in a short period of time, as evidenced in the 2003 release of Blaster Worm (See CTAD Daily Read File (DRF) April 4, 2008). 57. (S//NF) CTAD comment: While links between top Chinese companies and the PRC are not uncommon, it illustrates the PRC’s use of its “private sector” in support of governmental information warfare objectives, especially in its ability to gather, process, and exploit information. As evidenced with TOPSEC, there is a strong possibility the PRC is harvesting the talents of its private sector in order to bolster offensive and defensive computer network operations capabilities. (Appendix sources 51-52)

So, not just governments are getting access to source code. The “agreement with Microsoft… allowed select companies such as TOPSEC access to MICROSOFT source code in order to secure the Windows platform.” Here it is in raw form. “TOPSEC that trains most of china cyberspys,” Oiaohm quotes from it. “It’s in that cable,” he says. He then gives another direct quote from the cable: “TOPSEC provides services and training for the PLA and has recruited hackers in the past.” On this one he remarks: “Then latter on in the cable to says they have been granted access to MS source code.” The remainder can be read in our latest IRC logs, which make operation of this Web site entirely transparent, unlike governments. “Security by obscurity is that you don’t give the source code to the people attacking your system,” Oiaohm adds and “[i]If you are not using Security by obscurity you might as well publish the source code for everyone to see… At least then you have a better chance that truful ones will tell you where the flaws are.” (typos corrected)

“Proper obscurity can be done with open source”
      –Oiaohm
He continues: “that cable is a security research document in what the hell has gone wrong… That the USA was being breached so much… Also if you dig deeper the USA side is doing the same thing… Both are trying to use closed source to give them a cyberadvantage while both have access to the source code… Proper obscurity can be done with open source… Each system must be able to have many different combinations in its security system to attacker is not quite sure what he will be walking into… So attacks take longer to develop… MS Windows where most installs have basically the same security config… Basically have a obscurity level of nothing.”

Another cable speaks of an “invitation for a private meeting with a named DoS employee. The attached Microsoft Word document was a malicious”. Microsoft is mostly mentioned negatively (for security reasons) in Cablegate, at least thus far. What will be revealed in the remaining 99% of Cablegate (the part which has not been published yet)?

In actual security news (not leaks of old confidential reports), Vista 7 is being bricked by software which claims to improve Windows security:

THOSE WHO ARE RUNNING 64-bit Windows 7 systems should not download the update for AVG Technologies’ AV software.

AVG has withdrawn the update after complaints that the update completely bricked systems by forcing computers to go into an infinite crash loop.

Users of GNU/Linux and BSD never have such problems. Why won’t the US government encourage adoption of Free software, whose transparency makes it secure? It’s the same fallacy about secrecy which toppled both Windows security and now the US government. It arguably censors Wikileaks more zealously than other governments.

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email

Decor ᶃ Gemini Space

Below is a Web proxy. We recommend getting a Gemini client/browser.

Black/white/grey bullet button This post is also available in Gemini over at this address (requires a Gemini client/browser to open).

Decor ✐ Cross-references

Black/white/grey bullet button Pages that cross-reference this one, if any exist, are listed below or will be listed below over time.

Decor ▢ Respond and Discuss

Black/white/grey bullet button If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

A Single Comment

  1. twitter said,

    December 6, 2010 at 4:09 pm

    Gravatar

    Source code disclosure is not a source of insecurity, it is the exclusive disclosure of insecure code to malicious parties that’s the problem. When software is free it can gain a high degree of both transparency and security like OpenBSD and gnu/linux have. When software is not free, the owners lack resources to fix things. Known problems persist for decades and new problems are constantly found when old, non free code bases are forced together in monstrosities like Microsoft Windows. The absolute worst case is when malicious organizations are given exclusive access to source code that other people use. Sadly, this is always the case when people are using non free software but few have betrayed their users the way Microsoft has.

    It has long been known that sharing code with China and other US enemies was a US national security risk. Microsoft representatives testified to this in the Netscape anti-trust trials. Just a few later they started sharing code with the PRC, the former KGB and many other US hostile organizations. It is nice to see that US diplomats were aware of this betrayal but we have to wonder why the US government has not acted on the knowledge. Windows should be dumped and those responsible at Microsoft should be put on trail for espionage.

DecorWhat Else is New


  1. Microsoft Vidal, as USPTO Director, Already Plays 'Political Cards' to Disguise and Deflect Away From the Corporate Agenda

    Microsoft Vidal, another corporate pawn in charge of the world’s most dangerous patent system, is using soft-spoken defle



  2. Links 24/05/2022: WAL-G 2.0

    Links for the day



  3. IRC Proceedings: Monday, May 23, 2022

    IRC logs for Monday, May 23, 2022



  4. Unethical Advertising, Published as So-called 'Articles', in CNX Software

    As we noted earlier this year, the CNX team is looking for money in the wrong places



  5. Links 23/05/2022: Broadcom to Buy VMware?

    Links for the day



  6. LibreOffice Conference 2022, As Before, Puts the Keynotes on Sale (the Rich Buy Influence, the Price Doubles)

    Discrimination against the community; talks and mentions are based on money, not merit ($2000 has become $4000 in just one year)



  7. Links 23/05/2022: Kdenlive 22.04.1 and New Alpine Linux Released

    Links for the day



  8. António Campinos Promotes Software Patents Using Buzzwords and Sketchy Loopholes With Dubious Legal Basis

    ‘Monopoly Tony’ (António Campinos) is shamelessly manipulating EPO processes at both ends (sender and receiver) to facilitate the illegal granting of invalid European software patents; we’re meant to think this former EU official and imposter (banker) is some guru in the sciences because he reads a lousy speech crafted for him with lots of meaningless buzzwords peppered all over it (he’s not good at reading it, either)



  9. [Meme] Jorgotta Be Kidding Us, Campinos!

    Monopoly Tony (António Campinos) runs the EPO by attacking the very legal basis of the EPO’s existence



  10. Unified Patent Court (UPC) Relies Too Much on Lies and Mischief Without Any Basis in Law

    Today’s video runs through the typical (weekly) lies from Team UPC — lies that are very easy to debunk; Team UPC not only drafted the thing but also looks to profit from it while misleading politicians and bribing publishers to spread intentionally misleading statements (lies)



  11. IRC Proceedings: Sunday, May 22, 2022

    IRC logs for Sunday, May 22, 2022



  12. Links 23/05/2022: Fedora 36 Reviewed

    Links for the day



  13. [Meme] It's My Working Party... And I'll Cry If I Want to!

    EPO President António Campinos is still not being held accountable for his Code of Conduct violations



  14. Links 22/05/2022: The 5.18 Kernel is Out

    Links for the day



  15. Gemini is Bigger Than Most People Care to Realise

    Geminispace has gotten to the point where it's too computationally expensive (or outright pricey) to study, let alone keep abreast of, Gemini capsules or the domain space as a whole



  16. Links 22/05/2022: Rock64 and Peppermint OS Release

    Links for the day



  17. [Meme] UPC is Always Next Year (and Next Year It'll Surely be the Year After That)

    The UPC will come “next year”, just like every year (since almost a decade ago) just because the lunatic promises so and crushes the law, quite frankly as usual, cusioned and protected by the UPC lobby



  18. UPC: Turning Patent Lawyers Into Liars and the Media Into Their Money-Grabbing Megaphone (Platform for Fake News)

    The above 26 screenshots (with necessary annotation added) hopefully illuminate the degree of deceit, manipulation, bribery and distortion of public discourse (fake news and advocacy of patently unlawful activities)



  19. Number of Working/Online Gemini Capsules, Known to Totally Legit Gemini Search (TLGS) and to Lupa, Exceeds 2,500

    Assuming that Lupa reduced its crawling capacity (this graph seems to confirm this), we’ve decided to aggregate data from 3 sources and assess the size of Geminispace; Lupa says it can see 1,947 active capsules, but there are many more it has not kept track of



  20. [Meme] Monopoly Tony

    The gentlest, kindest president the EPO ever had



  21. It Took Campinos Three or More Years to Undo Illegal Battistelli Actions on Boards of Appeal and Strike Regulations (Only After Losing at ILO-AT!), But He Does Not Mention That

    Let’s all remember that as the EPO‘s so-called ‘President’ António Campinos (Monopoly Tony) vigorously defended completely unlawful actions of Benoît Battistelli until courts compelled him to stop doing that (Strike Regulations); notice how, in the video above — a portion of this full clip from several months ago — he did not bother mentioning that for 3.5 years that he had “led” the Office the Boards of Appeal were in exile, in direct violation of the EPC, yet nobody is being held accountable for it



  22. IRC Proceedings: Saturday, May 21, 2022

    IRC logs for Saturday, May 21, 2022



  23. Links 22/05/2022: Free Software Developments in Bratislava

    Links for the day



  24. Gemini is the Direction the Paginated Internet Should Have Taken (Not Bloated Web With JavaScript and DRM)

    An update on Gemini and why you might wish to explore it (if you aren't using it already)



  25. EPO.org Now Openly Brags About Making Illegal Patents a Welcomed Part of the Examination Guidelines

    The EPO persists in illegal, unlawful agenda; it's even finding the audacity to advertise this in the official Web site



  26. Links 21/05/2022: Security Blunders and Microsoft Posturing

    Links for the day



  27. Links 21/05/2022: GitLab at Fedora and Pipewire in Next Ubuntu

    Links for the day



  28. Links 21/05/2022: HP Teams up with System76

    Links for the day



  29. IRC Proceedings: Friday, May 20, 2022

    IRC logs for Friday, May 20, 2022



  30. Links 20/05/2022: Thunderbird Revenue Rising

    Links for the day


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts