{"id":17320,"date":"2017-05-13T01:10:47","date_gmt":"2017-05-13T06:10:47","guid":{"rendered":"https:\/\/themindunleashed.com\/?p=17320"},"modified":"2017-05-13T01:23:27","modified_gmt":"2017-05-13T06:23:27","slug":"microsoft-warns-orwellian-future-wikileaks-exposes-participation-surveillance","status":"publish","type":"post","link":"https:\/\/themindunleashed.com\/2017\/05\/microsoft-warns-orwellian-future-wikileaks-exposes-participation-surveillance.html","title":{"rendered":"Microsoft Warns of &#8216;Orwellian Future&#8217; As WikiLeaks Exposes Participation With Surveillance"},"content":{"rendered":"<p>At the beginning of Microsoft&#8217;s annual <em>&#8220;Build&#8221;<\/em> conference last week, CEO Satya Nadella\u00a0<a href=\"https:\/\/au.news.yahoo.com\/technology\/a\/35394497\/microsoft-aims-to-make-artificial-intelligence-mainstream\/#page1\" target=\"_blank\" rel=\"noopener\">said the<\/a> tech giants have a responsibility to circumvent a dystopian, 1984-like future scenario.<\/p>\n<p>He said this as he introduced Microsoft&#8217;s plans to further develop artificial intelligence, as kind of a public relations move to assure people the technology wouldn&#8217;t get out of hand.<\/p>\n<p>However, if you look at Microsoft&#8217;s history and how extensively they have collaborated with government and the very forces that would use their technology to create a technocratic, Orwellian future, you&#8217;d see that this reassurance means nothing.<\/p>\n<p>Just yesterday, an installment of WikiLeaks&#8217; Vault7 documents revealed that 2 CIA malware programs specifically infect Microsoft computers, to perform tasks on infected computers, check for scheduled events, and collect data.<\/p>\n<p>The Microsoft CEO&#8217;s statement was summarized by<a href=\"https:\/\/au.news.yahoo.com\/technology\/a\/35394497\/microsoft-aims-to-make-artificial-intelligence-mainstream\/#page1\" target=\"_blank\" rel=\"noopener\"> Yahoo<\/a>:<\/p><div class=\"themi-content_11\" id=\"themi-3147502128\"><div id=\"ld-8755-6417\"><\/div><script>(function(w,d,s,i){w.ldAdInit=w.ldAdInit||[];w.ldAdInit.push({slot:9217690065945446,size:[0, 0],id:\"ld-8755-6417\"});if(!d.getElementById(i)){var j=d.createElement(s),p=d.getElementsByTagName(s)[0];j.async=true;j.src=\"https:\/\/cdn2.decide.dev\/_js\/ajs.js\";j.id=i;p.parentNode.insertBefore(j,p);}})(window,document,\"script\",\"ld-ajs\");<\/script><\/div>\n<p><em>&#8220;Nadella spent time on stage at the Seattle conference stressing a need to build trust in technology, saying new applications must avoid dystopian futures feared by some.<\/em><\/p><div class=\"themi-content_15\" id=\"themi-245105670\"><a href=\"https:\/\/mailchi.mp\/themindunleashed\/subscribe\" aria-label=\"\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/themindunleashed.com\/wp-content\/uploads\/2025\/02\/Brown-and-White-Modern-Digital-Marketing-Course-Promo-Instagram-Post-1920-x-1080-px.png\" alt=\"\"  srcset=\"https:\/\/themindunleashed.com\/wp-content\/uploads\/2025\/02\/Brown-and-White-Modern-Digital-Marketing-Course-Promo-Instagram-Post-1920-x-1080-px.png 1920w, https:\/\/themindunleashed.com\/wp-content\/uploads\/2025\/02\/Brown-and-White-Modern-Digital-Marketing-Course-Promo-Instagram-Post-1920-x-1080-px-300x169.png 300w, https:\/\/themindunleashed.com\/wp-content\/uploads\/2025\/02\/Brown-and-White-Modern-Digital-Marketing-Course-Promo-Instagram-Post-1920-x-1080-px-1024x576.png 1024w, https:\/\/themindunleashed.com\/wp-content\/uploads\/2025\/02\/Brown-and-White-Modern-Digital-Marketing-Course-Promo-Instagram-Post-1920-x-1080-px-768x432.png 768w, https:\/\/themindunleashed.com\/wp-content\/uploads\/2025\/02\/Brown-and-White-Modern-Digital-Marketing-Course-Promo-Instagram-Post-1920-x-1080-px-1536x864.png 1536w, https:\/\/themindunleashed.com\/wp-content\/uploads\/2025\/02\/Brown-and-White-Modern-Digital-Marketing-Course-Promo-Instagram-Post-1920-x-1080-px-150x84.png 150w, https:\/\/themindunleashed.com\/wp-content\/uploads\/2025\/02\/Brown-and-White-Modern-Digital-Marketing-Course-Promo-Instagram-Post-1920-x-1080-px-696x392.png 696w, https:\/\/themindunleashed.com\/wp-content\/uploads\/2025\/02\/Brown-and-White-Modern-Digital-Marketing-Course-Promo-Instagram-Post-1920-x-1080-px-1068x601.png 1068w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" width=\"1920\" height=\"1080\"   \/><\/a><\/div>\n<p><em>Nadella&#8217;s presentation included images from George Orwell?s &#8220;1984&#8221; and Aldous Huxley&#8217;s &#8220;Brave New World&#8221; to underscore the issue of responsibility of those creating new technologies.<\/em><\/p>\n<p><em>Microsoft is infusing all of its products and services with AI, and enabling those who develop on its platform to imbue creations with customized capabilities, according to executive vice president of artificial intelligence and research Harry Shum.&#8221;<\/em><\/p>\n<p>He said this because people are rightfully, seriously concerned with the dangers of artificial intelligence and the trajectory technology is going. This means they have a serious enough PR problem with people finding technology unnecessary or dangerous, for the CEO of Microsoft to address it to begin an important conference.<\/p>\n<p>This is proof that public opinion matters and we can reject technology if it doesn&#8217;t serve us well.<\/p>\n<p>Satya Nadella <a href=\"https:\/\/au.news.yahoo.com\/technology\/a\/35394497\/microsoft-aims-to-make-artificial-intelligence-mainstream\/#page1\" target=\"_blank\" rel=\"noopener\">said<\/a>:<\/p>\n<p><em>&#8220;What Orwell prophesied in &#8216;1984,&#8217; where technology was being used to monitor, control, dictate, or what Huxley imagined we may do just by distracting ourselves without any meaning or purpose &#8212; neither of these futures is something that we want.&#8221;<\/em><\/p>\n<p><em>&#8220;The future of computing is going to be defined by the choices that you as developers make and the impact of those choices on the world.&#8221;<\/em><\/p>\n<p>What he said is inconsistent with Microsoft&#8217;s history of collaboration with government, and silence when they are accused of it.<\/p>\n<p>From Edward Snowden&#8217;s 2013 leaks to the WikiLeaks releases on CIA surveillance in 2017, Microsoft is shown to be complicit every step of the way. It&#8217;s not easy to sum up the entire history of Microsoft&#8217;s collaboration with government surveillance, but we&#8217;ll name a few things here.<\/p>\n<p>What is an<em> &#8220;Orwellian future?&#8221;<\/em><\/p>\n<p>It could be considered a technocracy, a surveillance state where data collected through people&#8217;s communications, microphones and cameras in the home and in public, is fed to the state at people&#8217;s detriment.<\/p>\n<p>One day, this data being collected surely will be used in court to prosecute people if we continue on this trajectory.<\/p>\n<p>So this is how Microsoft is helping create exactly what they claim they want to prevent.<\/p>\n<p>First, in 2013 Edward Snowden&#8217;s leaks revealed, according<a href=\"https:\/\/www.theguardian.com\/world\/2013\/jul\/11\/microsoft-nsa-collaboration-user-data\" target=\"_blank\" rel=\"noopener\"> to the Guardian<\/a>:<\/p>\n<p><em>&#8220;<a class=\"u-underline\" href=\"https:\/\/www.theguardian.com\/technology\/microsoft\" target=\"_blank\" rel=\"noopener\">Microsoft<\/a> has collaborated closely with US intelligence services to allow users&#8217; communications to be intercepted, including helping the National Security Agency to circumvent the company&#8217;s own encryption, according to top-secret documents obtained by the Guardian.<\/em><\/p>\n<p><em>The files provided by Edward Snowden illustrate the scale of co-operation between Silicon Valley and the intelligence agencies over the last three years. They also shed new light on the workings of the <a class=\"u-underline\" href=\"https:\/\/www.theguardian.com\/world\/2013\/jun\/06\/us-tech-giants-nsa-data\" target=\"_blank\" rel=\"noopener\">top-secret Prism program<\/a>, which was disclosed by the Guardian and the Washington Post last month.<\/em><\/p>\n<p><em>The documents show that:<\/em><\/p>\n<p><em><span class=\"bullet\">\u2022<\/span> Microsoft helped the <a class=\"u-underline\" href=\"https:\/\/www.theguardian.com\/us-news\/nsa\" target=\"_blank\" rel=\"noopener\">NSA<\/a> to circumvent its encryption to address concerns that the agency would be unable to intercept web chats on the new Outlook.com portal;<\/em><\/p>\n<p><em><span class=\"bullet\">\u2022<\/span> The agency already had pre-encryption stage access to email on Outlook.com, including Hotmail;<\/em><\/p>\n<p><em><span class=\"bullet\">\u2022<\/span> The company worked with the <a class=\"u-underline\" href=\"https:\/\/www.theguardian.com\/us-news\/fbi\" target=\"_blank\" rel=\"noopener\">FBI<\/a> this year to allow the NSA easier access via Prism to its cloud storage service SkyDrive, which now has more than 250 million users worldwide;<\/em><\/p>\n<p><em><span class=\"bullet\">\u2022<\/span> Microsoft also worked with the FBI&#8217;s Data Intercept Unit to &#8220;understand&#8221; potential issues with a feature in Outlook.com that allows users to create email aliases;<\/em><\/p>\n<p><em><span class=\"bullet\">\u2022<\/span> In July last year, nine months after Microsoft bought Skype, the NSA boasted that a new capability had tripled the amount of <a class=\"u-underline\" href=\"https:\/\/www.theguardian.com\/technology\/skype\" target=\"_blank\" rel=\"noopener\">Skype<\/a> video calls being collected through Prism;<\/em><\/p>\n<p><em><span class=\"bullet\">\u2022<\/span> Material collected through Prism is routinely shared with the FBI and <a class=\"u-underline\" href=\"https:\/\/www.theguardian.com\/us-news\/cia\" target=\"_blank\" rel=\"noopener\">CIA<\/a>, with one NSA document describing the program as a &#8220;team sport&#8221;.&#8221;<\/em><\/p>\n<p>Microsoft claimed they were legally obligated to provide the info, but they went far beyond that. It seems they gave as much as they could, including entire Skype video calls. It would be naive to think this isn&#8217;t still happening.<\/p>\n<p>This was of course suspected long before it was revealed in 2013, and with every release of info reality is shown to be much worse than previously thought when it comes to surveillance.<\/p>\n<p>In 2017, WikiLeaks&#8217; Vault7 CIA leaks took our understanding of mass surveillance to a new level.<\/p>\n<p>First, they released documents showing that the CIA can turn almost anything into a surveillance device, that they can penetrate allegedly encrypted messaging apps such as Signal, ect.<\/p>\n<p>According<a href=\"https:\/\/www.usatoday.com\/story\/tech\/news\/2017\/03\/07\/apple-google-microsoft-crosshairs-wikileaks-allegations\/98854320\/\" target=\"_blank\" rel=\"noopener\"> to USA Today<\/a>:<\/p>\n<p><em>&#8220;Thousands of documents published by WikiLeaks Tuesday\u00a0describe an arsenal of CIA hacking tools that can turn iPhone and Android smartphones,\u00a0TVs, computers and other coveted consumer products\u00a0into &#8220;covert microphones.&#8221;&#8221;<\/em><\/p>\n<p>Then yesterday, WikiLeaks released a few more documents showing how the CIA works with features specifically built into Microsoft computers to collect data and perform tasks.<\/p>\n<p>It is unclear whether Microsoft can easily deny their knowledge of this, or deny being complicit. But given their history, it would be wise to assume the worst.<\/p>\n<p>According <a href=\"https:\/\/www.rt.com\/viral\/388075-wikileaks-cia-microsoft-malware\/\" target=\"_blank\" rel=\"noopener\">to RT<\/a>:<\/p>\n<p><em>&#8220;WikiLeaks has released the latest instalment in the #Vault7 series, detailing two apparent CIA malware frameworks dubbed \u2018AfterMidnight\u2019 and \u2018Assassin\u2019 which it says target the Microsoft Windows platform.<\/em><\/p>\n<p><em>The latest release consists of five documents detailing the two frameworks. \u2018AfterMidnight\u2019 allows operators to load and execute malware on a target machine, according to a statement from WikiLeaks.<\/em><\/p>\n<p><em>The malware, disguised as a self-persisting dynamic-link library (DLL), unique to Microsoft, executes \u2018Gremlins\u2019 \u2013 small payloads which run hidden on the machine subverting the functionality of software as well as surveying the target and exfiltration of data. A payload named \u2018AlphaGremlin\u2019 allows operators to schedule customs tasks to be executed on the machine.<\/em><\/p>\n<p><em>Once installed \u2018AfterMidnight\u2019 uses a HTTPS listening port to check for any scheduled events. Local storage related to \u2018AfterMidnight\u2019 is encrypted with a key not stored on the target machine, according to a\u00a0<a href=\"https:\/\/wikileaks.org\/vault7\/document\/AfterMidnight_v1_0_Users_Guide\/page-1\/#pagination\" target=\"_blank\" rel=\"noopener noreferrer\">user guide<\/a> provided in the leak.<\/em><\/p>\n<p><em>According to the leak, \u2018Assassin\u2019 is a similar type of malware to \u2018AfterMidnight\u2019. The tool\u2019s\u00a0<a href=\"https:\/\/wikileaks.org\/vault7\/document\/Assassin_v1_4_Users_Guide\/page-8\/#pagination\" target=\"_blank\" rel=\"noopener noreferrer\">user guide<\/a> describes it as &#8220;an automated implant that provides a simple collection platform on remote computers running the Microsoft Windows operating system.\u201d<\/em><\/p>\n<p><em>The tool purportedly allows operators to perform specific tasks on an infected computer, periodically sending intercepted information to listening posts. It is made up of four subsystems: &#8216;Implant&#8217;, &#8216;Builder&#8217;, &#8216;Command and Control&#8217;, and &#8216;Listening Post&#8217;.<\/em><\/p>\n<p><em>The \u2018Implant\u2019 provides the core logic and functionality of the tool on a target computer. The way it\u2019s set up determines much of how the tool will behave on the target computer.<\/em><\/p>\n<p><em>The \u2018Builder\u2019 arranges the Implant and \u2018Deployment Executables\u2019 before deployment, while the \u2018Command and Control\u2019 subsystem acts as an interface between the operator and the \u2018Listening Post.\u2019<\/em><\/p>\n<p><em>The \u2018Listening Post\u2019 allows the \u2018Implant\u2019 to communicate with the subsystem through a web server.&#8221;<\/em><\/p>\n<p>So is this a factor in why Microsoft is so eager to ensure people they don&#8217;t want to create an Orwellian future?<\/p>\n<p>Can Microsoft really deny being complicit with this?<\/p>\n<p><em>This article (<a href=\"https:\/\/themindunleashed.com\/?p=17320&amp;preview=true\">Microsoft Warns of Orwellian Future, As WikiLeaks Exposes Participation With Surveillance<\/a>) was originally created and published by The Mind Unleashed\u00a0and is published here under a <a href=\"http:\/\/creativecommons.org\/licenses\/by\/4.0\/\" target=\"_blank\" rel=\"noopener noreferrer\">Creative Commons<\/a> license with attribution to\u00a0<a href=\"https:\/\/themindunleashed.com\/author\/cassiustmu\">Cassius Methyl<\/a>\u00a0and\u00a0<a href=\"https:\/\/themindunleashed.com\">The Mind Unleashed<\/a>. It may be re-posted freely with proper attribution and author bio.<\/em><\/p>\n<p><em>(Image credit: <a href=\"http:\/\/3.bp.blogspot.com\/-awxw35c6bYI\/UWmD50sITcI\/AAAAAAAAdtg\/7pUlOwaDywc\/s1600\/1984_015Pyxurz.jpg\" target=\"_blank\" rel=\"noopener\">1984<\/a>, <a href=\"http:\/\/static1.businessinsider.com\/image\/52f198e26bb3f7276e36a7d1\/microsofts-new-ceo-satya-nadella-is-known-internally-as-the-guy-who-cuts-middle-management.jpg\" target=\"_blank\" rel=\"noopener\">Business Insider<\/a>, <a href=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/thumb\/e\/e7\/Wikileaks_logo.svg\/2000px-Wikileaks_logo.svg.png\" target=\"_blank\" rel=\"noopener\">Wiki<\/a>)<\/em><\/p>\n<div class=\"themi-after-content_2\" id=\"themi-4047498863\"><div data-type=\"_mgwidget\" data-widget-id=\"1747048\"> \r\n <\/div> \r\n <script>(function(w,q){w[q]=w[q]||[];w[q].push([\"_mgc.load\"])})(window,\"_mgq\"); \r\n <\/script> \r\n <\/div>","protected":false},"excerpt":{"rendered":"<p>At the beginning of Microsoft&#8217;s annual &#8220;Build&#8221; conference last week, CEO Satya Nadella\u00a0said the tech giants have a responsibility to circumvent a dystopian, 1984-like future scenario. He said this as he introduced Microsoft&#8217;s plans to further develop artificial intelligence, as kind of a public relations move to assure people the technology wouldn&#8217;t get out of [&hellip;]<\/p>\n","protected":false},"author":307,"featured_media":17355,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[27,29],"tags":[],"class_list":{"0":"post-17320","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-world-truth","8":"category-news"},"_links":{"self":[{"href":"https:\/\/themindunleashed.com\/wp-json\/wp\/v2\/posts\/17320","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/themindunleashed.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/themindunleashed.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/themindunleashed.com\/wp-json\/wp\/v2\/users\/307"}],"replies":[{"embeddable":true,"href":"https:\/\/themindunleashed.com\/wp-json\/wp\/v2\/comments?post=17320"}],"version-history":[{"count":10,"href":"https:\/\/themindunleashed.com\/wp-json\/wp\/v2\/posts\/17320\/revisions"}],"predecessor-version":[{"id":17361,"href":"https:\/\/themindunleashed.com\/wp-json\/wp\/v2\/posts\/17320\/revisions\/17361"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/themindunleashed.com\/wp-json\/wp\/v2\/media\/17355"}],"wp:attachment":[{"href":"https:\/\/themindunleashed.com\/wp-json\/wp\/v2\/media?parent=17320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/themindunleashed.com\/wp-json\/wp\/v2\/categories?post=17320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/themindunleashed.com\/wp-json\/wp\/v2\/tags?post=17320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}