The distribution Thursday of portions of the secret programmer's instructions for two versions of the Windows operating system poses vexing legal and security challenges for Microsoft.
Computer security experts said on Friday that having even relatively small parts of the blueprints for Microsoft's Windows 2000 and Windows NT operating system as easily available reference material for potential vandals and troublemakers could complicate the company's already difficult task in securing its software.
Microsoft has been intensively criticized on security issues in recent years and the company has devoted increasing resources in an effort to restore its credibility with its customers.
The posting of the information on the Internet does not present any direct threat to the hundreds of millions of users of Microsoft's software, but it may fuel the fire among those who say that Microsoft, based in Redmond, Washington, has done a poor job of protecting computer users from hackers and invasions of viruses and worms. The company may also face a debate over its contention that the secrecy of its proprietary software offers a computer security advantage over the publicly available text of open-source programs like Linux.
Microsoft's executives said on Friday that they were working with federal law enforcement officials to attempt to understand how the software instructions, known as source code, had appeared on a variety of Internet peer-to-peer file sharing systems.
"We take this seriously," said Tom Pilla, a Microsoft spokesman. "It's illegal for third parties to post or make our source code available. From that standpoint we've taken appropriate legal action to protect our intellectual property."
Word of the theft of Microsoft's source code spread rapidly on Thursday afternoon after it was first reported on a Web site, Neowin.net, and then widely discussed on the Slashdot Web site, which is widely read by the nation's programming community.
By late Thursday evening dozens of copies of different text files ranging in size from 200 megabytes to one gigabyte were being downloaded by thousands of Internet users.
Computer programmers who examined the software instructions -- the basic texts from which the Windows operating systems programs are assembled -- reported that at least some versions of the program had come from a Microsoft partner, Mainsoft Corp, a software company whose headquarters are in San Jose, California.
Several computer security experts speculated that the Microsoft operating system source code had been stolen from a Mainsoft computer via the Internet and then posted on peer-to-peer file sharing networks.
Neither Microsoft nor Mainsoft would confirm this report. Mainsoft, however, released a statement acknowledging the firm had a source code licensing agreement with Microsoft.
"Mainsoft takes Microsoft's and all our customers' security matters seriously, and we recognize the gravity of the situation," Mike Gullard, chairman of Mainsoft, said in the statement. "We will cooperate fully with Microsoft and all authorities in their investigation."
Even though Windows 2000 and Windows NT are older versions of the company's operating systems, they are still widely used by corporations around the world.
"This raises real national security concerns," said William Cook, a partner at Wildman Harrold in Chicago and a former federal computer crime prosecutor. "The fact that Microsoft's software is so widely available will have an impact across the computer security industry."
A number of computer security and legal experts said that Microsoft's biggest challenge as a result of the incident may unfold in the future as skilled programmers begin to examine the texts in search of material that may be embarrassing or damaging to Microsoft.
"There have been lots of stories about the existence of undocumented features" in Microsoft's operating system that were intended to harm competitors, said Bruce Schneier, founder and chief technical officer of Counterpace Internet Security, a computer security firm in Mountain View, California.
In 1999, Microsoft suffered a black eye when a Canadian programmer, examining a portion of its software, discovered an element inside the company's Windows operating system labeled NSAKey. At the time, Microsoft said the reference was not an indication that the company was engaged in a conspiracy with the National Security Agency, a federal intelligence operation. The label, however, undercut the company's credibility within the computer security community, where it was widely criticized at the time. In addition to the NSAKey incident, the Diebold Corp, a manufacturer of automated teller and voting machines faced criticism after the programmers' instructions for its voting machines were circulated on the Internet. Technical experts said the code revealed flaws that might make the machines vulnerable to manipulation, a charge that Diebold denied.
A number of computer experts said that Microsoft had no choice but to rush to court to try to limit the spread of the software instructions through temporary restraining orders.
"The horse is out of the barn," said Jim Brelsford, a partner at the law firm Jones Day in Menlo Park, California. "But you have to do this to protect your trade secrets."
‘ABUSE OF POWER’: Lee Chun-yi allegedly used a Control Yuan vehicle to transport his dog to a pet grooming salon and take his wife to restaurants, media reports said Control Yuan Secretary-General Lee Chun-yi (李俊俋) resigned on Sunday night, admitting that he had misused a government vehicle, as reported by the media. Control Yuan Vice President Lee Hung-chun (李鴻鈞) yesterday apologized to the public over the issue. The watchdog body would follow up on similar accusations made by the Chinese Nationalist Party (KMT) and would investigate the alleged misuse of government vehicles by three other Control Yuan members: Su Li-chiung (蘇麗瓊), Lin Yu-jung (林郁容) and Wang Jung-chang (王榮璋), Lee Hung-chun said. Lee Chun-yi in a statement apologized for using a Control Yuan vehicle to transport his dog to a
Taiwan yesterday denied Chinese allegations that its military was behind a cyberattack on a technology company in Guangzhou, after city authorities issued warrants for 20 suspects. The Guangzhou Municipal Public Security Bureau earlier yesterday issued warrants for 20 people it identified as members of the Information, Communications and Electronic Force Command (ICEFCOM). The bureau alleged they were behind a May 20 cyberattack targeting the backend system of a self-service facility at the company. “ICEFCOM, under Taiwan’s ruling Democratic Progressive Party, directed the illegal attack,” the warrant says. The bureau placed a bounty of 10,000 yuan (US$1,392) on each of the 20 people named in
The High Court yesterday found a New Taipei City woman guilty of charges related to helping Beijing secure surrender agreements from military service members. Lee Huei-hsin (李慧馨) was sentenced to six years and eight months in prison for breaching the National Security Act (國家安全法), making illegal compacts with government employees and bribery, the court said. The verdict is final. Lee, the manager of a temple in the city’s Lujhou District (蘆洲), was accused of arranging for eight service members to make surrender pledges to the Chinese People’s Liberation Army in exchange for money, the court said. The pledges, which required them to provide identification
INDO-PACIFIC REGION: Royal Navy ships exercise the right of freedom of navigation, including in the Taiwan Strait and South China Sea, the UK’s Tony Radakin told a summit Freedom of navigation in the Indo-Pacific region is as important as it is in the English Channel, British Chief of the Defence Staff Admiral Tony Radakin said at a summit in Singapore on Saturday. The remark came as the British Royal Navy’s flagship aircraft carrier, the HMS Prince of Wales, is on an eight-month deployment to the Indo-Pacific region as head of an international carrier strike group. “Upholding the UN Convention on the Law of the Sea, and with it, the principles of the freedom of navigation, in this part of the world matters to us just as it matters in the