Microsoft Gives Government 0-Day Information Before Patch

0-day ExploitIn mid June Bloomberg posted quite a bombshell when they admitted that Microsoft will now be handing over information on 0-day as well as regular exploits to the Government and the NSA before patches are released to the public.  They plan on working with the government to pass information on exploits that have either not yet been found or have not yet been patched allowing the government the upper hand when it comes to true cyber terrorism.

Microsoft Corp. (MSFT), the world’s largest software company, provides intelligence agencies with information about bugs in its popular software before it publicly releases a fix, according to two people familiar with the process. That information can be used to protect government computers and to access the computers of terrorists or military foes.

Redmond, Washington-based Microsoft (MSFT) and other software or Internet security companies have been aware that this type of early alert allowed the U.S. to exploit vulnerabilities in software sold to foreign governments, according to two U.S. officials. Microsoft doesn’t ask and can’t be told how the government uses such tip-offs, said the officials, who asked not to be identified because the matter is confidential.

The same report where this information was found also explained how telcom companies were handing over communications information; calls, texts and chatting over to the government without a Judges orders without even flinching about how they dismantled the privacy of their users.

Some U.S. telecommunications companies willingly provide intelligence agencies with access to facilities and data offshore that would require a judge’s order if it were done in the U.S., one of the four people said.

In these cases, no oversight is necessary under the Foreign Intelligence Surveillance Act, and companies are providing the information voluntarily.

For more information please visit the article that I got this information from: Techdirt.com

Tags: , , ,

No comments yet.

Leave a Reply