Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Legal

Microsoft’s Violation to catch Windows 8 Source Leaker

Paul Anderson by Paul Anderson
March 27, 2014
in Legal, Technology News
0
microsoft privacy Changes
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Outlook.com email should be private, Microsoft said in a recent blog post that then went on to explain why it violated that belief in privacy for at least one user.

You might also like

BreachForums Owner Arrested and Charged

ChipMixer platform tied to crypto laundering scheme – seized by authorities

Downthem DDoS service owner gets a 2-year prison sentence

Recently, a former Microsoft employee was arrested in Seattle, charged with theft of trade secrets. The ex-employee, Alex Kibkalo, is accused of leaking parts of Windows 8 to a French-language blogger.

The blogger in question, who remains unidentified, happened to use Hotmail–the investigation began in 2012 before Hotmail’s Outlook.com transition–as his primary email account. So as part of its investigation, Microsoft peeked into the blogger’s email account to read that person’s correspondence with Kibkalo.

Microsoft says it was justified in searching the blogger’s email account, because it had probable cause to believe Kibkalo was funneling trade secrets to the blogger.The company also pointed out that even with its justification for searching the account, it would have been impossible to gain a court order.

“Courts do not, however, issue orders authorizing someone to search themselves, since obviously no such order is needed,” Microsoft Deputy General Counsel John Frank explained in the blog post. “So even when we believe we have probable cause, there’s not an applicable court process for an investigation such as this one.”A

Before it did look inside the blogger’s account, however, the company claims it went through a “rigorous process” to justify the snooping.

“There was a thorough review by a legal team separate from the investigating team and strong evidence of a criminal act that met a standard comparable to that required to obtain a legal order to search other sites,” Frank said.

The company’s terms of service apparently make this kind of snooping just fine; however, the company plans to make its pre-snooping process even more rigorous for potential future cases.

Here are the highlights:

  • Microsoft says it will not search a user’s email or other Microsoft service “unless the circumstances would justify a court order, if one were available.”
  • A legal team separate from the internal investigating team will assess the evidence, as it did in the Kibkalo case. The investigation will only continue if the separate legal team believes there is evidence of a crime that would justify a court order.
  • If the separate legal team believes the investigation should continue, Microsoft will consult “an outside attorney who is a former federal judge.” If the “former judge” also believes there is sufficient evidenceA for a court order, then the search will happen.A
  • Any searches that take place will be confined to material relating to the investigation and nothing else.
  • The number of user searches of this type will be included in Microsoft’s bi-annual transparency report.

Instead, a comprehensive overhaul of laws protecting online privacy are in order. That way, the next time Microsoft does need to sift through a user’s Outlook.com account to search for wrongdoing, obtaining a court order would not seem ridiculous–but instead be standard procedure.

Article originally appeared on Pcworld.com

Tags: leakmicrosoftsourcewindows 8
Share30Tweet19
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

BreachForums Owner Arrested and Charged

by Paul Anderson
March 17, 2023
0
BreachForums Owner Arrested and Charged

On Wednesday afternoon, federal agents arrested a man in Peekskill, New York, for allegedly running a dark web data breach site known as "BreachForums." The suspect, Conor Brian...

Read more

ChipMixer platform tied to crypto laundering scheme – seized by authorities

by Paul Anderson
March 17, 2023
0
ChipMixer platform tied to crypto laundering scheme – seized by authorities

A coalition of law enforcement agencies from Europe and the United States have announced the successful takedown of ChipMixer, an unlicensed cryptocurrency mixer that has been operating since...

Read more

Downthem DDoS service owner gets a 2-year prison sentence

by Christi Rogalski
June 30, 2022 - Updated on July 7, 2022
0
Downthem DDoS Service owner sentenced

Matthew Gatrel, a resident of St. Charles, Illinois, has been sentenced to two years in prison for violating the Computer Fraud and Abuse Act (CFAA). The 33-year-old was...

Read more

Megaupload Plans to Return After 5 Years

by Paul Anderson
July 15, 2016 - Updated on May 26, 2022
0
Megaupload Plans to Return After 5 Years

The huge file-sharing website, Megaupload is scheduled to relaunch, five years after being raided and shut down by the FBI. After its owner, Kim Dotcom, was detained and...

Read more

Clinton pledges to grow the technology sector

by Paul Anderson
July 2, 2016
0
Clinton pledges to grow the technology sector

Speaking in Denver on Tuesday at a startup incubator called Galvanize, Democratic presidential hopeful Hillary Clinton made quite a few proposals concerning intellectual property and called for administrative...

Read more
Next Post
The heartbleed bug and its affects

The heartbleed bug and its affects

Related News

NSA intercepting U.S. Routers

NSA intercepting U.S. Routers

June 6, 2014 - Updated on March 17, 2023
Netwire RAT seized by FBI and other worldwide police agencies

Netwire RAT seized by FBI and other worldwide police agencies

March 16, 2023
The Emotet botnet returns and is sending a slew of malicious emails

The Emotet botnet returns and is sending a slew of malicious emails

March 14, 2023
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.