The Washington PostDemocracy Dies in Darkness

The NSA seems to really enjoy exploiting high profile tech companies

It's not particularly surprising that the National Security Agency maintains a significant catalog of exploits and backdoors ready to be deployed against the products of major technology companies. But the glee which the NSA appears to show in hijacking the practices and products of technology giants might give those companies another reason to be mad.

Among the new revelations from German magazine Der Spiegel is that the NSA uses Windows crash reports to gain "passive access" to information a computer sends over the Internet. The reports are designed for Microsoft to get information about the type of malfunction, and in theory notice errors through patterns and fix them. The agency's hacking unit, Tactical Access Operations or TAO, uses an unique identifier like an IP address to target a computer that then gets "automatically notified any time the operating system of that computer crashes and its user receives the prompt to report the problem to Microsoft."

But beyond just exploiting a service meant to help provide system stability, the NSA's hackers seem to be "having fun at Microsoft's expense." In an internal presentation revealed by Der Spiegel, they replace the familiar "We have created an error report that you can send to help us improve Microsoft Windows. We will treat this report as confidential and anonymous" language from the Windows error report with a mocking, "This information may be intercepted by a foreign SIGNIT system to gather detailed information and better exploit your machine" to explain how they are piggybacking onto this service.

And this isn't the first time internal NSA documents have shown members of the agency taking a sort of mischievous pleasure in outwitting tech giants. A slide revealed by The Washington Post earlier this year showing how the NSA is able to snoop on the Google cloud as it traversed data links included a little smiley face pointing toward the vulnerable section.

According to Post reporter Barton Gellman and independent security researcher and consultant Ashkan Soltani, "two engineers with close ties to Google exploded in profanity when they saw the drawing."

Tech companies, many of whom are legally compelled to participate in intelligence gathering programs like PRISM, have already made a show of voicing concerns following the cascade of NSA revelations that have the potential to disrupt lucrative revenue streams like cloud hosting. But the tone of some of the documents coming to light might just add insult to injury.