Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Microsoft Government United States

Microsoft Petitions US Attorney General For Permission To Disclose Data Requests 95

MojoKid writes "Microsoft is smarting in the wake of the Guardian's discussion of how chummy it's gotten with the NSA over the past few years, and the company wants permission to clarify its relationship with the federal government. To that end, the company has sent a follow-up letter (PDF) to the Attorney General's office, asking it to please address the petition it filed in court back on June 19. Redmond is undoubtedly cringing at the accolades being heaped on Yahoo and its repeated court battles on behalf of its users, and wants an opportunity to clear the air. But Microsoft has gone farther than simply asking the government to hurry up and rule on its petition — it has also issued a series of clarifying remarks regarding its relationship with the NSA. Microsoft refutes some of the Guardian's claims strongly. It insists it does not provide encryption keys or access to Outlook's encryption mechanisms, and that the government must petition MS to provide information via the legal process."
This discussion has been archived. No new comments can be posted.

Microsoft Petitions US Attorney General For Permission To Disclose Data Requests

Comments Filter:
  • Comment removed based on user account deletion
    • Re:Tough Cookies (Score:4, Insightful)

      by Anonymous Coward on Wednesday July 17, 2013 @07:40AM (#44307213)

      Yep, same here. And them there's weasel words from the clever lawyer at Microsoft anyway.

      Notice how they keep using the phrase 'We do not provide any government...'? That's 'cause the NSA uses private contractors - like Snowden - to do the dirty work. There's lots more evasive lawyer-speak there too.

      I'd trust them about as far as I could throw Ballmer. And I'm a 95 pound weakling...

      • Re:Tough Cookies (Score:5, Insightful)

        by FriendlyLurker ( 50431 ) on Wednesday July 17, 2013 @08:16AM (#44307457)

        Notice how they keep using the phrase 'We do not provide any government...'? That's 'cause the NSA uses private contractors - like Snowden - to do the dirty work. There's lots more evasive lawyer-speak there too.

        Your right there, if you actually read the "series of clarifying remarks" - it is all lawyer weasel words aimed to try and persuade those that are left to listen, "there is nothing to see here, we comply with the law". Seriously - trust, once lost, is going to seriously hard to earn back for all these tech companies in bed with the Military Industrial Complex. We may not be able to do much immediately to rein in an out of control surveillance state run by the private and unaccountable MIC, but we sure as hell can vote with our feet by abandoning these big tech companies services, and encouraging those less informed about this whole debacle that they should too.

        Now, just have to encourage in every way possible the development of easy to use default on encryption solutions for email (like OTR provides for chat). Also why the hell isnt slashdot offering https yet - apathy helps the sorry state of affairs continue...

        • I wonder what would have happened to Woodward and Bernstein investigating Watergate in 2013?

          And Redford's character in "3 Days of the Condor"; could he still tell his story to the New York Times?
          • Not to mention John Grishams "The Pelican Brief". Pure fantasy in this day and age to think you can run to "the [traditional] press"
      • Keep in mind that that's probably paranoid hysteria. We know that Snowden has made claims that are wild exaggerations at best, and that Greenwald is an "activist" rather than a journalist. I think when the info comes out, all but the worse alex jones-style nuts will understand that this was all smoke, no fire.
        • by mrex ( 25183 )

          I like how you wildly exaggerate insults against others... for wild exaggerations. Very meta.

          Show us some of these wild exaggerations Snowden has made by dumping pertinent documents sourced directly from the NSA. Tell us all how Edward R. Murrow was not a real journalist because he openly formed conclusions, rather than hiding his personal biases behind selectively-uncritical regurgitation of official talking points.

          • I like how you wildly exaggerate insults against others... for wild exaggerations. Very meta.

            Show us some of these wild exaggerations Snowden has made by dumping pertinent documents sourced directly from the NSA. Tell us all how Edward R. Murrow was not a real journalist because he openly formed conclusions, rather than hiding his personal biases behind selectively-uncritical regurgitation of official talking points.

            Snowden has yet to reveal anything we didn't already know. Everything is available via google.

      • by NotBorg ( 829820 )
        What Obama means when he says "nobody" is listening to your phone calls is that computers doing speech-to-text are technically nobody.
    • Re: (Score:2, Insightful)

      Be honest. You pirated their software just as much as everyone else ;)
  • by kurt555gs ( 309278 ) <kurt555gs.ovi@com> on Wednesday July 17, 2013 @07:21AM (#44307099) Homepage

    So Google can turn my data over to the NSA, I don't like Microsoft!

  • Zero Day Exploits (Score:5, Insightful)

    by Ozoner ( 1406169 ) on Wednesday July 17, 2013 @07:23AM (#44307113)

    Who needs encryption keys or back doors if Redmont is handing over (and not patching) Zero Day Exploits?

    • Why do you think it sometimes takes them forever to patch them?

      Government oversight.

    • by dc29A ( 636871 ) *

      If you got a solid non Windows firewall AND user common sense (don't open anything you get in emails) AND encrypt your stuff, you should be safe.

    • Who needs encryption keys or back doors if Redmont is handing over (and not patching) Zero Day Exploits?

      Exactly!

  • Damage control (Score:5, Insightful)

    by silviuc ( 676999 ) on Wednesday July 17, 2013 @07:27AM (#44307151) Homepage
    "It insists it does not provide encryption keys or access to Outlook's encryption mechanisms, and that the government must petition MS to provide information via the legal process."

    What about when the govt. agencies get those "legal papers" that compel MS to provide access to data on Outlook, Skydrive, etc? Do they provide encryption keys then? What about SSL certs? Do they send them over to the NSA after they expire?

    And this should not be only about MS. Any company should answer these questions. I really hope this shitstorm will kill stupid usage of "the cloud" but I doubt it. People are dumb, education budgets diminish every year so there is no changing that fact.

    I guess my point is that if you need to have sensitive data in "the cloud" roll your own already. The software to do that is already available and free (gratis and libre).
    • Re:Damage control (Score:5, Insightful)

      by bleh-of-the-huns ( 17740 ) on Wednesday July 17, 2013 @07:48AM (#44307257)

      My guess is that they provide the data itself, not the keys to decrypt the data.

    • And this should not be only about MS. Any company should answer these questions. I really hope this shitstorm will kill stupid usage of "the cloud" but I doubt it. People are dumb, education budgets diminish every year so there is no changing that fact.

      Education budgets in the US may diminish every year, but that probably isn't true in other industrialized countries. The real issue is that foreign governments and other customers may now decide that using Microsoft or any US-based vendor is a bad idea, tha

    • by __aaltlg1547 ( 2541114 ) on Wednesday July 17, 2013 @08:15AM (#44307439)

      What about when the govt. agencies get those "legal papers" that compel MS to provide access to data on Outlook, Skydrive, etc? Do they provide encryption keys then? What about SSL certs? Do they send them over to the NSA after they expire?

      When the government, any government, comes with court orders, of course they comply. Every company does, because they are then legally required to do so. Don't pretend that situation has changed between 1789 and today. NSLs, as far as I know, have no real legal standing. I don't know what a company could do if they didn't want to comply with a NSL.

    • Re:Damage control (Score:5, Interesting)

      by SilentStaid ( 1474575 ) on Wednesday July 17, 2013 @08:18AM (#44307473)
      I'm currently working for a fairly large 2500+ employee multi-national that regularly handles confidential information belonging to other businesses. I can safely tell you that we have scaled back all of our efforts to move things to the cloud and have actually reversed the trend by bringing more and more things in house over the past year. This orignally started with several data privacy laws enacted in the EU that made farming things out prohibitively expensive but perhaps the most interesting part of this is that since the various leaks this year, we've been getting more scrutiny from foreign companies about what we could have any hope of keeping from the government if asked.
      • That is perhaps the biggest shame, because often moving things to the cloud instead of reinventing the server farm is a good business decision, good for the economy, and the way of the future, if it wasn't for the government's usual meddling retardation of progress.
        • by Twinbee ( 767046 )
          Perhaps you can enlighten me. If you want fast database access, then you'd want the data on local servers anyway. If however, it's just for storage, then servers are a bit overkill, and surely lots of removable plug-n-play HDs for relatively few PCs would suffice?
    • LOL. As if Microsoft has never provided encryption keys before. Like since WinNT.

      https://en.wikipedia.org/wiki/NSAKEY [wikipedia.org]

      • It's simple. They don't have to turn over encryption keys to the NSA because that's where they got them in the first place.
      • The key that the wiki page mentions isn't for spying, it's for verifying digital signatures on third party cryptography service provider packages. It was named as such because CSP packages that are exported outside of USA have to receive export approval, something the NSA performed. So the NSAkey was named because it was a digital signature proving that a package had either received proper review or didn't need it (If it was for US only).

        Not saying that NSA isn't spying, just that the key mentioned is not u

        • How could you possibly know that the key was not used for spying?

          And why would they need their OWN key to verify the digital signatures?

          And why would that key have the email of postmaster@nsa.gov?

    • "It insists it does not provide encryption keys or access to Outlook's encryption mechanisms, and that the government must petition MS to provide information via the legal process."

      Why the encryption process employed is susceptible to third party decryption in the first place. To avoid this from happening, the design needs to be end-to-end with the users holding the keys.

      • The email service that Microsoft hosts for free is hosted on Exchange if I am not mistaken. This is this likely target of the NSA or other government agencies when they're talking about Exchange encryption keys and not Exchange in general.

    • by Anonymous Coward

      People who use the cloud are dumb.

      Wow... what a high level of reasoning. I can totally see why this is at +5 insightful. Fuck slashdot.

  • Got to read their weasel words carefully. If they don't provide the keys, then they must provide the plain text. Six of one, half dozen of the other...
  • Given that, at present, 'via the legal process' seems to consist of a variety of procedures that make getting a search warrant rubber-stamped by a handpicked sycophant look positively robust, I'm not sure how reassured I'd be even by 100% ironclad evidence that all data were divulged in accordance with 'legal process'.

    Even aside from the high-volume shenanigans on the NSA side, whose legal justifications themselves are rather secretive, the good old 'National Security Letter' is a 'legal' process that essen

  • by Anonymous Coward

    Time to reexamine this:
    http://www.h-online.com/security/news/item/Skype-with-care-Microsoft-is-reading-everything-you-write-1862870.html

    "associates in Germany at heise Security have now discovered that the Microsoft...Shortly after sending HTTPS URLs over the [skype] instant messaging service, those URLs receive an unannounced visit from Microsoft HQ in Redmond."

    Microsoft claimed it was for malware checking, but it was noticeable it targeted Germany, I did a test on my skype (to UK) and received no visit. T

  • Microsoft is a business, they are in the game to make money. They also know that doing stupid shit like providing wholesale access to data/keys/exploits/whatever is bad for business.

    So, Microsoft, as a business, probably would not have given anything without a court order.

    That being said, a better guess would be that someone within MS, possibly high up in the chain of command would be the one providing the data. Again, a total guess, and I could be completely wrong.

    • by Anonymous Coward

      Given the fees the telcos get for interception data, and given NSAs astronomical multi billion dollar budget I think its safe to assume Microsoft gets paid handsomely for PRISM interface usage and you are the product of Outlook.com and NSA is the customer.

      Which makes sense if you think about it. You want to pump hidden subsidies into US online businesses because it's pretty much the only industry you have left. How would you do it? If you did it publicly then foreign countries would subsidize their online s

    • So, Microsoft, as a business, probably would not have given anything without a court order.

      How does that actually improve the situation, since we now know (from the leaked secret order to Verizon) that these court orders can and will make demands such as "give us the entirety of your traffic for the next three months"?

      And I'm not picking on Microsoft - this question stands to ALL of these US-based companies.

    • by sjames ( 1099 )

      Unless, of course, they never anticipated a Snowden and figured nobody would ever know. Or perhaps they figured that whatever illegal benefit they were offered in return would bring enough profit to make up for any loss and then some.

  • smoke and mirrors (Score:5, Interesting)

    by Charliemopps ( 1157495 ) on Wednesday July 17, 2013 @08:10AM (#44307405)

    All these companies are feigning outrage over these "requests" they get, when in reality I doubt the requests are ever used except in cases where the government needs evidence in court. The REAL data collection is done without Microsoft/Googles direct knowledge. The NSA surely has agents working on staff at every major tech company in the world with the sole goal of installing as many NSA backdoors as possible. The idea that the NSA has no respect what-so-ever of the American peoples privacy but at the same time wouldn't just take the same sort of data from a corporation is idiotic.

    • by NotBorg ( 829820 )
      This. When they approach Google, MS, FB, asking for data, it's data that they already know is there. They're tapped into every major Internet peering node in the US and an untold number of them over seas. They likely have agents and eavesdropping devices at interesting companies like MS. They know that the data they collect is illegal so they need to manufacture chain of evidence that they can actually use. That's the only reason they send requests/warrants.
  • Broken trust (Score:5, Insightful)

    by Taantric ( 2587965 ) on Wednesday July 17, 2013 @08:33AM (#44307643)

    The problem with secret courts, secret executive orders and undisclosed legal reasoning is that even if Microsoft released some information as "transparency", can you really trust that they aren't holding something back or outright lying due to some other even more secret court order?

    They were completely denying and fudging the question about Skype eavesdropping right up until the Snowden leaks. Then they did a complete 180 turn.So clearly they have no problem with obfuscating the discussion, why should we trust that any new information they provide is the whole truth and not some weasel legal loophole way of interpreting the facts? Kind of like how James Clapper weaseled and outright lied through his testimony to Congress. If these people are willing to lie to Congressmen and Senators, who the fuck are you?

    I reckon Pandora's Box has been open and American technology companies will face an uphill, if not impossible, task to get anyone from the rest of the world to trust them again.

    • by AHuxley ( 892839 )
      Its never impossible for the USA to spin this one more time. Australia, Canada, New Zealand, United Kingdom, NATO leaders are totally addicted to limited NSA help.
      Their press will be tame or move on. Give it a few years and let the sock puppets (as seen on slashdot) go to work with doubt, legal questions, amount of data shared, patriotism, been at war, it was all international and thus very legal, the French, the UK, recall the Data Encryption Standard style trolling?
      Over time fall back on the classic
      • Give it 5-10 years.

        You're remarkably optimistic. I give it two years, at the outside. It will persist through the next Congressional election cycle, just barely. After that, it will vanish.

        And the usual 90+% of incumbents will be reelected, despite a last gasp effort of PAC attack ads bringing up the spying. (I won't call them SuperPACs. They won't be that well funded.)

  • If they want to disclose the data requests, why not just engineer a leak from a disgruntled former employee already located in Ecuador/Venezuela/Iran/Wherever?
  • All the nice sentences just to talk around full compliance with CALEA?
    Its not like it was just some fax with a time, ip and port number from some city police department.. with an amazing letterhead.
    http://en.wikipedia.org/wiki/Communications_Assistance_for_Law_Enforcement_Act [wikipedia.org]
    http://www.independent.co.uk/news/edward-snowden-claims-microsoft-collaborated-with-nsa-and-fbi-to-allow-access-to-user-data-8705755.html [independent.co.uk]
    http://www.salon.com/2013/07/11/snowden_docs_detail_collaboration_between_nsa_and_microsoft/ [salon.com]
  • Moot point. IMHO the NSA just hacks in and everyone has deniability including you know who. Even with Microsoft's superior knowledge of hacking, they are still probably "putting up with it from NSA".

    Eliminate Speeding Tickets [wikispeedia.org]

    Snowden In, Holder Out
  • Re-engineer Outlook and the back end services supporting it. Employ end-to-end encryption with private keys held only by the client. Microsoft's systems serve only to distribute public keys and store and forward encrypted content.

    So when the NSA comes asking, Microsoft (or any other service provider) can honestly say "We can't decrypt that for you, signed warrant or not." The NSA can already scrape encrypted content off the backbone choke points, so bugging Microsoft for something they don't have would be

  • ... when they join a legal battle in defence of our 4th amendment rights.
  • Something about dogs and fleas.

  • Fuck what the NSA tells you. 'No Such Agency' means they don't exist and their rules be damned. Gain the biggest share on the planet and grow a pair, and release the data, NSA be damned. Release it all. That sort of brutal honesty gets more respect from me than beating around the (George) bush, even if you were helping them spy on me.

  • I'm sure the PHBs and overpriced lawyers on retainer believe Microsoft haven't done all the things Snowden has exposed.

    Because _they_ didn't get the NSLs to STFU and just do the dirty work; their sharpest senior techies did, and they still can't say squat, lest they suffer pain of arrest or worse.

    Of course, NSLs to the underlings would also give the perfect cover to allow the execs and shysters to protest too much.

Think of it! With VLSI we can pack 100 ENIACs in 1 sq. cm.!

Working...