Feeds

Microsoft: NSA snooping? Code backdoors? Our hands are clean!

Mass spying would be 'nuts', 'economic suicide'

Protecting against web application threats using SSL

RSA 2014 Microsoft's isn't involved in mass spying or putting backdoors in its software, Redmond's VP of Trustworthy Computing Group Scott Charney told the RSA conference. Why? Because it's unethical and bad for business, he said.

"We've not been concerned about the Snowden disclosures because we've been principled," he said. "We do defense, not offence. We never do bulk data collection."

Charney said that Microsoft was happy to help law enforcement – up to a point. It has the Computer Online Forensic Evidence Extractor (COFEE) tool which can be installed on a USB key and used to investigate Microsoft systems. But Redmond would not participate in illegal searches, Charney said, and would fight in the courts against such orders.

He also denied that Microsoft was putting backdoors into code. He mentioned the NSA Key saga, when in 1999 a researcher found an encryption key in Windows NT called _NSAKEY. Microsoft has always maintained that the key was so named because the NSA oversaw encryption export controls, and Charney reaffirmed that today – commenting that if Microsoft had put a backdoor in its code, it wouldn't have called it NSA Key.

"If I put a backdoor in our product, our market capitalization goes from $260bn to zero overnight. I can't even sell it. It's nuts! Economic suicide! So no backdoors," he said.

In order to reassure foreign governments that Microsoft's code is secure from such shenanigans, Redmond makes its source code available to other country's governments for checking. If they find flaws, they are fixed at Microsoft, but it's another way of reassuring customers, Charney said.

Charney echoed Art Coviello's call for a ban on software weaponry, saying that it was counterproductive to all concerned and had a huge potential for blowback damage on the sender, since it always leaks out.

He cited Stuxnet as a case in point. The code may have slowed down Iran's efforts to process uranium, but the software itself was picked up by researchers and malware authors and examined. The Stuxnet code used multiple zero-day attacks to get its job done, and as a result millions of computer users were put at risk and had to update their systems.

While Charney is obviously sincere in his beliefs that Microsoft is on the side of the angels, others are less sure.

"The best Microsoft can say is that we are secure except for the vulnerabilities that we don't know about and the ones we are prohibited by law from telling you about," security expert and CTO of CO3 Bruce Schneier told The Register.

"This is the problem. Microsoft might be 100 per cent truthful about this, but they have no way of proving it. Because the NSA has poisoned the environment, we have no reason to believe them." ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.