Congress questions Microsoft boss after a ‘cascade’ of security errors

  • Comments
  • Print
Listen to this story

Subscriber Benefit

As a subscriber you can listen to articles at work, in the car, or while you work out. Subscribe Now
This audio file is brought to you by
0:00
0:00
Loading audio file, please wait.
  • 0.25
  • 0.50
  • 0.75
  • 1.00
  • 1.25
  • 1.50
  • 1.75
  • 2.00

The House Homeland Security Committee grilled Microsoft President Brad Smith on Thursday about the software giant’s plans to improve its security after devastating hacks reached into federal officials’ email accounts, challenging the company’s fitness as a dominant government contractor.

The questioning followed a withering report on one of those breaches, in which the federal Cyber Safety Review Board found the event was made possible by a “cascade of avoidable errors” and a security culture “that requires an overhaul.”

In that hack, suspected agents of China’s Ministry of State Security last year created digital keys using a tool that allowed them to pose as any existing Microsoft customer. Using that tool, they impersonated 22 organizations, including the U.S. Departments of State and Commerce, and rifled through Commerce Secretary Gina Raimondo’s emails and those of others.

The event triggered the sharpest criticism in decades of the stalwart federal vendor, and it has prompted rival companies and some authorities to push for less government reliance on its technology. Two senators wrote to the Pentagon last month, asking why the agency plans to improve unclassified Defense Department tech security with more expensive Microsoft licenses instead of with alternative vendors.

“Cybersecurity should be a core attribute of software, not a premium feature that companies upsell to deep-pocketed government and corporate customers,” wrote Sens. Eric Schmitt (R-Mo.) and Ron Wyden (D-Ore.). “Through its buying power, DOD’s strategies and standards have the power to shape corporate strategies that result in more resilient cybersecurity services.”

Any serious shift in executive branch spending would take years, but Department of Homeland Security leaders say plans are in motion to add security guarantees and requirements to more government purchases – an idea touted in the Cyber Safety Review Board’s Microsoft report. The report found that current requirements “do not consistently require sound practices” for authenticating users.

Homeland Security Committee members of both parties followed that theme Thursday, asking Smith to explain the risks of having the military depend on a single vendor. Smith argued that a multi-vendor environment is equally risky, because hackers can more easily break in at the “seams” where two systems connect.

Smith ran out the clock on some members’ questions and smoothly deflected multiple inquiries, including several about a Thursday ProPublica report that said a Microsoft security expert had repeatedly complained about a company authentication flaw that was exploited years later, in the hacks of software company SolarWinds and its government customers.

The same flaw was called out in the intervening years by security companies CyberArk and Mandiant without being fixed.

Smith said that he hadn’t read the article and that the flaw in question involved an industry standard instead of a Microsoft product.

Other representatives pressed Smith about the company’s dealings in China, prompting him to say the nation generates less than 1.5 percent of Microsoft’s revenue. Smith also said that the company was there mainly to serve other American companies and that Microsoft does not obey the Chinese law requiring all organizations to cooperate with national intelligence agencies and the military.

“Every time there is something remotely close to a request, I make sure we say no,” Smith said to one openly skeptical member of the committee.

In written testimony submitted earlier, Smith echoed previous statements welcoming the findings of the review board, which was established by a White House executive order. Smith touted a companywide security initiative that has brought in 1,600 security engineers in the current fiscal year and will add another 800 positions next year.

Smith said Microsoft had made security its top priority throughout the company and would fulfill the review board’s recommendations for both the company and the industry as a whole.

“Microsoft accepts responsibility for each and every one of the issues cited in the CSRB’s report,” Smith testified.

Smith’s testimony raised eyebrows among some security professionals who pointed to Microsoft’s rollout this month of a Windows feature called Recall, which takes screenshots of most activity on a personal computer every few seconds and stores them to make searching for past actions easier.

Though Microsoft said that users would only be able to see their own histories and that they would otherwise remain encrypted and stored locally, experts called it a treasure trove for electronic intruders. They alleged that anyone with administrative rights to a machine could spy on other users, and that a hacker could export and read files, including records of financial passwords and encrypted messages, if they broke in.

After declining to comment on those reports for more than a week, Microsoft said that it would not ship software with Recall automatically active, as planned, and that it would require more authentication by a user to turn on the feature.

In his written testimony, Smith cited that reversal as an example of the company’s revitalized efforts in security.

Please enable JavaScript to view this content.

Editor's note: You can comment on IBJ stories by signing in to your IBJ account. If you have not registered, please sign up for a free account now. Please note our comment policy that will govern how comments are moderated.

One thought on “Congress questions Microsoft boss after a ‘cascade’ of security errors

  1. Microsoft should be under the microscope. They’re lying. MS has no incentives to actually value security, so they don’t – but they need to look like they care, just enough, to get people to keep buying their software.

    Startup tech is expected to “go fast and break things” – often at great expense to those who adopt those unproven new systems. But the MS tools relied on so heavily by corporations and governments – these fundamentally can not be exposed to that kind of security negligence.

    The entire existence of the “Recall” feature proves that MS has given up all pretense of keeping our PCs safe – they’re fine with placing our valuable information right out on the front porch for anyone to steal. The system was very much not locked down, encrypted, private, or built with any safety in mind. They’re just lying.

Get the best of Indiana business news. ONLY $1/week Subscribe Now

Get the best of Indiana business news. ONLY $1/week Subscribe Now

Get the best of Indiana business news. ONLY $1/week Subscribe Now

Get the best of Indiana business news. ONLY $1/week Subscribe Now

Get the best of Indiana business news.

Limited-time introductory offer for new subscribers

ONLY $1/week

Cancel anytime

Subscribe Now

Already a paid subscriber? Log In

Get the best of Indiana business news.

Limited-time introductory offer for new subscribers

ONLY $1/week

Cancel anytime

Subscribe Now

Already a paid subscriber? Log In

Get the best of Indiana business news.

Limited-time introductory offer for new subscribers

ONLY $1/week

Cancel anytime

Subscribe Now

Already a paid subscriber? Log In

Get the best of Indiana business news.

Limited-time introductory offer for new subscribers

ONLY $1/week

Cancel anytime

Subscribe Now

Already a paid subscriber? Log In