{"id":44329,"date":"2014-07-07T12:00:07","date_gmt":"2014-07-07T11:00:07","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=44329"},"modified":"2015-05-05T21:33:43","modified_gmt":"2015-05-05T20:33:43","slug":"microsofts-gestures-of-transparency","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2014\/07\/microsofts-gestures-of-transparency\/","title":{"rendered":"Microsoft\u2019s Gestures of Transparency"},"content":{"rendered":"<p style=\"text-align: left;\">A Vice President from Microsoft has announced that the company\u2019s webmail services are now protected by an advanced encryption suite known as TLS, or Transport Layer Security, and also that Microsoft has launched a \u201cTransparency Center\u201d on its Redmond campus so that governments can inspect the company\u2019s <em>source code<\/em> (i.e. the blueprints to its software) [1]. Earlier this year, in January, Microsoft\u2019s Chief Privacy Officer publicized a similar Transparency initiative in Brussels [2].<\/p>\n<p style=\"text-align: left;\">As I\u2019ve discussed in a prior CounterPunch essay [3] (\u201cGoogle\u2019s Shareholder Theater\u201d), encryption schemes like TLS falter as an alleged panacea to society\u2019s cyber-security problems. Hi-tech subversion, the practice of leveraging flaws to covertly gain access, is a trump card as anyone who has investigated the Heartbleed bug understands [4]. So let\u2019s examine the reality behind Microsoft\u2019s Transparency Centers because they\u2019re obviously an attempt to downplay the threat of subversion. \u00a0\u00a0<strong>\u00a0<\/strong><\/p>\n<p style=\"text-align: left;\"><strong>[Not So] Accidental Bugs<\/strong><\/p>\n<p style=\"text-align: left;\">History has shown that in a large system like Windows there will be a plethora of subtle bugs that observers will fail to catch. Defects of this nature will even evade professional quality assurance experts despite the fact that they\u2019re staring straight at them for hours on end.<\/p>\n<p style=\"text-align: left;\">Some bugs will be accidental, the result of sloppy software engineering. Thanks to Ed Snowden we know that there will also be other bugs that are not accidents; that were embedded in the source code to provide back doors to spies. This is a convenient ploy because \u201caccidental\u201d bugs offer the additional benefit of plausible deniability. Intentional back doors disguised in this manner can be explained away as absent-minded mistakes.<\/p>\n<p style=\"text-align: left;\">Microsoft\u2019s Windows code base currently spans millions of lines (Windows XP alone contained 45 million lines of code [5]). There is an endless supply of inconspicuous little hidey-holes where spies can be granted camouflaged access. Recall that Stuxnet, a malicious computer worm created by the American and Israeli spies, leveraged not just one but multiple unpatched Windows bugs [6].<\/p>\n<p style=\"text-align: left;\">Once spies gain a foothold on a machine they install \u201cimplants\u201d (also known as rootkits) to maintain access and steal data [7]. U.S. intelligence has a veritable catalogue of such implants that they can draw on [8]. System administrators, the people who manage servers and routers, will likely view this catalogue and experience growing pangs of dread. This is the ugly truth: almost nothing is safe. Our collective security and liberty have been undermined on an industry-wide basis at the behest of the American Deep State. Hi-tech companies dutifully cooperated. Behind this cooperation is the shadow cast by the neoliberal mindset, such that there are discreet undercurrents of shared class interest.<\/p>\n<p style=\"text-align: left;\"><strong>We\u2019ve Seen This Before \u00a0\u00a0\u00a0<\/strong><\/p>\n<p style=\"text-align: left;\">Building hi-tech trap doors for spies is hardly a recent phenomenon. Well over 15 years ago there was a guy from the NSA named Lew Giles who went around getting companies in Silicon Valley to play ball. Bruce Schneier describes how Giles operated [9]:<\/p>\n<p style=\"text-align: left;\">\u201cThe deal went something like this: Giles offered you preferential treatment for export if you would add a back door. The back door could be subtle enough that it wouldn\u2019t show up in the design, and only be obvious if someone analyzed the binary code. It could be something that would easily be viewed as a mistake if someone learned about it. Maybe you could weaken your random number generator, or leak a few key bits in a header. Anything that would let the NSA decrypt the ciphertext without it looking like the crypto was broken.\u201d<\/p>\n<p style=\"text-align: left;\">\u201cIn return you would be able to export your products. But you and he would have to come up with some kind of cover story as to why you could export what was normally unexportable encryption, something that would allay any suspicion.\u201d<\/p>\n<p style=\"text-align: left;\">Then there\u2019s also the strange affair involving a software company named Inslaw which sold a legal case-tracking solution called PROMIS (Prosecutor\u2019s Management Information System) to the federal government. Uncle Sam refused to pay Inslaw and pushed the company into bankruptcy. This did little to stop American and Israeli intelligence agencies from selling roughly $500 million in pirated copies of PROMIS to other intelligence agencies. As you might have guessed the pirated copy of PROMIS had a back door installed that enabled remote monitoring [10]. Greeks bearing gifts and all that.<\/p>\n<p style=\"text-align: left;\">On a side note, there was an investigative journalist looking into the Inslaw case, Danny Casolaro, who died mysteriously just as he was about to make a big break. The death was ruled a suicide though Casolaro had received a number of death threats and he warned his brother shortly before he died that if anything happened to him it wasn\u2019t an accident [11]. Readers familiar with the CIA\u2019s links to the drug underworld will note general similarities to the death of another journalist named Gary Webb [12]. He allegedly committed suicide by shooting himself in the head. Twice [13]. Ed Snowden was justified in fearing for his safety before meeting reporters in Hong Kong.<\/p>\n<p style=\"text-align: left;\"><strong>Listen To Ken Thompson \u00a0\u00a0<\/strong><\/p>\n<p style=\"text-align: left;\">Ultimately Trust Centers are elaborate security theater. Microsoft sells compiled executable programs not source code and there\u2019s no telling if some special sauce hasn\u2019t been added surreptitiously. Never mind that, as mentioned earlier, an outwardly accidental bug which is completely visible in the code base (but extremely difficult to detect as a flaw in practice) might be intentional.<\/p>\n<p style=\"text-align: left;\">Consider Ken Thompson\u2019s canonical essay on Trusting Trust [14].<\/p>\n<p style=\"text-align: left;\">\u201cThe moral is obvious. You can\u2019t trust code that you did not totally create yourself. (Especially code from companies that employ people like me.) No amount of source-level verification or scrutiny will protect you from using untrusted code. In demonstrating the possibility of this kind of attack, I picked on the C compiler. I could have picked on any program-handling program such as an assembler, a loader, or even hardware microcode. As the level of program gets lower, these bugs will be harder and harder to detect. A well installed microcode bug will be almost impossible to detect.\u201d<\/p>\n<p style=\"text-align: left;\">Thompson, the founding father of the UNIX operating system who is now in his 70s, is the epitome of a credible source. He has no reason to lie in his essay, no conflicts of interest, no financial incentive to pull the wool over your eyes.<\/p>\n<p style=\"text-align: left;\"><strong>Ulterior Motives<\/strong><\/p>\n<p style=\"text-align: left;\">The same cannot be said for the executives at hi-tech behemoths like Microsoft. Ed Snowden\u2019s revelations have put them in an awkward position. They were caught red-handed, having silently clambered into bed with the Deep State and the powerful private-sector interests that drive it [15]. It\u2019s part of the public record that Microsoft was the original entrant into the NSA\u2019s PRISM program back in 2007 [16], that the company gives U.S. intelligence early<br \/>\n<a href=\"http:\/\/www.amazon.com\/exec\/obidos\/ASIN\/1937584801\/counterpunchmaga\"><br \/>\n<\/a>access to information on zero-day bugs [17], and that the company is almost certainly a participant in the NSA\u2019s ongoing subversion ops (e.g. BULLRUN and the SIGNINT Enabling Programs [18]).<\/p>\n<p style=\"text-align: left;\">When confronted with this duplicity company spokesmen initially denied involvement [19]. With their lies exposed the execs in Redmond are scrambling desperately to manage public outcry, to provide the perception of opposition so that onlookers are led to believe that Microsoft is fighting for user\u2019s rights rather than the bottom line.<\/p>\n<p style=\"text-align: left;\">Companies that take a genuine stance against the Deep State, like Lavabit, are the exception to the rule and they are quickly dispatched. For multinational companies like Microsoft, which recently signed a $617 million deal with the Pentagon, there\u2019s too much money at stake to not collaborate with intelligence services [20]. And Microsoft continues to do so, both here in the United States and in countries like Russia [21].<\/p>\n<p style=\"text-align: left;\"><strong>Endnotes:<\/strong><\/p>\n<p style=\"text-align: left;\">[1] Matt Thomlinson, \u201cAdvancing our encryption and transparency efforts,\u201d <em>Technet<\/em>, July 1, 2014, http:\/\/blogs.technet.com\/b\/microsoft_on_the_issues\/archive\/2014\/06\/30\/advancing-our-encryption-and-transparency-efforts.aspx<\/p>\n<p style=\"text-align: left;\">[2] Brendon Lynch, \u201cMicrosoft announces Brussels Transparency Center at Munich Security Conference,\u201d <em>Technet<\/em>, January 31, 2014, http:\/\/blogs.technet.com\/b\/trustworthycomputing\/archive\/2014\/01\/31\/placeholder-brussels-transparency-center.aspx<\/p>\n<p style=\"text-align: left;\">[3] Bill Blunden, \u201cGoogle\u2019s Shareholder Theater,\u201d <em>Counterpunch<\/em>, June 10, 2014, http:\/\/www.counterpunch.org\/2014\/06\/10\/googles-shareholder-theater\/<\/p>\n<p style=\"text-align: left;\">[4] Alex Hern, \u201cHeartbleed: Hundreds of thousands of servers at risk from catastrophic bug,\u201d <em>Guardian<\/em>, April 9, 2014, http:\/\/www.theguardian.com\/technology\/2014\/apr\/08\/heartbleed-bug-puts-encryption-at-risk-for-hundreds-of-thousands-of-servers\/print<\/p>\n<p style=\"text-align: left;\">[5] http:\/\/windows.microsoft.com\/en-US\/windows\/history#T1=era6<\/p>\n<p style=\"text-align: left;\">[6] Liam O Murchu, \u201cStuxnet Using Three Additional Zero-Day Vulnerabilities,\u201d <em>Symantec<\/em>, September 14, 2010, http:\/\/www.symantec.com\/connect\/blogs\/stuxnet-using-three-additional-zero-day-vulnerabilities<\/p>\n<p style=\"text-align: left;\">[7] Bill Blunden, <em>The Rootkit Arsenal: Escape and Evasion In the Dark Corners of The System<\/em>, Jones &amp; Bartlett Learning; 2 edition, March 16, 2012, ISBN-13: 978-1449626365<\/p>\n<p style=\"text-align: left;\">[8] Jacob Applebaum, \u201cShopping for Spy Gear: Catalog Advertises NSA Toolbox,\u201d <em>Der Spiegel<\/em>, December 29, 2013, http:\/\/www.spiegel.de\/international\/world\/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html<\/p>\n<p style=\"text-align: left;\">[9] Bruce Schneier, \u201cBack Doors, Export, and the NSA,\u201d <em>Crypto-Gram<\/em>, February 15, 1999, https:\/\/www.schneier.com\/crypto-gram-9902.html<\/p>\n<p style=\"text-align: left;\">[10] Thomas, Gordon, <em>Gideon\u2019s Spies: The Secret History of the Mossad<\/em>, St. Martin\u2019s Press, 1999, ISBN 0-312-25284-6.<\/p>\n<p style=\"text-align: left;\">[11] Cheri Seymour, <em>The Last Circle: Danny Casolaro\u2019s Investigation into the Octopus and the PROMIS Software Scandal<\/em>, Trine Days, 2010, ISBN: 9781936296002<\/p>\n<p style=\"text-align: left;\">[12] \u201cGary Webb, 49, Journalist Who Wrote Disputed Articles, Is Dead,\u201d <em>Reuters<\/em>, December 13, 2004, http:\/\/www.nytimes.com\/2004\/12\/13\/obituaries\/13webb.html<\/p>\n<p style=\"text-align: left;\">[13] Sam Stanton, \u201cReporter\u2019s suicide confirmed by coroner,\u201d <em>Sacramento Bee<\/em>, December 15, 2004, http:\/\/web.archive.org\/web\/20080507054818\/http:\/\/dwb.sacbee.com\/content\/news\/story\/11772749p-12657577c.html<\/p>\n<p style=\"text-align: left;\">[14] Ken Thompson, \u201cReflections on Trusting Trust,\u201d <em>Communication of the ACM<\/em>, Vol. 27, No. 8, August 1984, pp. 761-763, http:\/\/cm.bell-labs.com\/who\/ken\/trust.html<\/p>\n<p style=\"text-align: left;\">[15] Beatrice Edwards, \u201cThe Powerful Forces Shredding Our Constitution: Preface to \u2018The Rise of the American Corporate Security State\u2019,\u201d <em>TruthOut<\/em>, May 20, 2014, http:\/\/www.truth-out.org\/progressivepicks\/item\/23805-the-powerful-forces-shredding-our-constitution-preface-to-the-rise-of-the-american-corporate-security-state<\/p>\n<p style=\"text-align: left;\">[16] Glenn Greenwald and Ewen MacAskill, \u201cNSA Prism program taps in to user data of Apple, Google and others,\u201d <em>Guardian<\/em>, June 6, 2013, http:\/\/www.theguardian.com\/world\/2013\/jun\/06\/us-tech-giants-nsa-data<\/p>\n<p style=\"text-align: left;\">[17] Michael Riley, \u201cU.S. Agencies Said to Swap Data With Thousands of Firms,\u201d <em>Bloomberg<\/em>, June 15, 2013, http:\/\/www.bloomberg.com\/news\/print\/2013-06-14\/u-s-agencies-said-to-swap-data-with-thousands-of-firms.html<\/p>\n<p style=\"text-align: left;\">[18] James Ball, Julian Borger, and Glenn Greenwald, \u201cRevealed: how US and UK spy agencies defeat internet privacy and security,\u201d <em>Guardian<\/em>, September 5, 2013, http:\/\/www.theguardian.com\/world\/2013\/sep\/05\/nsa-gchq-encryption-codes-security<\/p>\n<p style=\"text-align: left;\">[19] Joanna Stern, \u201cDissecting Big Tech\u2019s Denial of Involvement in NSA\u2019s PRISM Spying Program,\u201d <em>ABC News<\/em>, June 7, 2013, http:\/\/abcnews.go.com\/Technology\/nsa-prism-dissecting-technology-companies-adamant-denial-involvement\/story?id=19350095<\/p>\n<p style=\"text-align: left;\">[20] Nick Taborek, \u201cMicrosoft\u2019s Windows 8 Lifted by $617 Million Defense Deal,\u201d <em>Bloomberg<\/em>, January 5, 2014, http:\/\/www.bloomberg.com\/news\/print\/2013-01-04\/microsoft-s-windows-8-lifted-by-617-million-defense-deal.html<\/p>\n<p style=\"text-align: left;\">[21] Tim Cushing, \u201cMicrosoft Agrees To Hand Over Skype User Data To Russian Police,\u201d <em>TechDirt<\/em>, January 16, 2014, <a target=\"_blank\" href=\"https:\/\/www.techdirt.com\/articles\/20140116\/12454325906\/microsoft-agrees-to-hand-over-skype-user-data-to-russian-police.shtml\" >https:\/\/www.techdirt.com\/articles\/20140116\/12454325906\/microsoft-agrees-to-hand-over-skype-user-data-to-russian-police.shtml<\/a><\/p>\n<p style=\"text-align: left;\">___________________________<\/p>\n<p style=\"text-align: left;\"><em>Bill Blunden<\/em><em>is an independent investigator whose current areas of inquiry include information security,anti-forensics, and institutional analysis. He is the author of several books, including<\/em>The Rootkit Arsenal<em>and<\/em>Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex.<em> Bill is the leadinvestigator at Below Gotham Labs.<\/em><\/p>\n<p style=\"text-align: left;\"><a target=\"_blank\" href=\"http:\/\/www.counterpunch.org\/2014\/07\/03\/microsofts-gestures-of-transparency\/\" >Go to Original \u2013 counterpunch.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For multinational companies like Microsoft, which recently signed a $617 million deal with the Pentagon, there\u2019s too much money at stake to not collaborate with intelligence services. And Microsoft continues to do so, both here in the United States and in countries like Russia.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-44329","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/44329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=44329"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/44329\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=44329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=44329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=44329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}