Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 12 submissions in the queue.
posted by janrinok on Sunday March 22 2015, @01:48PM   Printer-friendly
from the I-spy-with-my-little-computer dept.

Recently, we have reported several claims (here, here, and here) made by the Russian security software manufacturer Kaspersky Lab that they have discovered 'evidence' of NSA involvement in malware. Now, Bloomberg claims that the Moscow-based computer security company has effectively been taken over by the FSB. Company founder Eugene Kaspersky was educated at a KBG-run school, which was never a secret, but the new report describes a much more current and intimate connection.

Kaspersky Lab is denying the allegations, as one might expect, and counter with the statement:

It's not as though the US has clean hands in all of this. The CIA has funded the development of security software firms like FireEye, Veracode, and Hytrust though its In-Q-Tel investment fund, and American firms have been noticeably silent when it comes to investigating suspected US state-sponsored malware.

We are unlikely to hear the truth from either side, nor should we realistically expect a confession from the NSA or the FSB. Nevertheless, it is possible that the security industries on both sides are 'guilty' of looking after their respective government's interests and what we are seeing is just another day in the world of intelligence collection and cyber-security, the world of claim and counter-claim.

[Editor's Comment: Typo fixed at 15:39 UTC]

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: -1, Flamebait) by Anonymous Coward on Sunday March 22 2015, @02:08PM

    by Anonymous Coward on Sunday March 22 2015, @02:08PM (#161109)

    The Free Software Foundation ("GNU") is controlled by the Communist Party of China through the Loongson spy processor in Richard Stallman's Lemote Yeeloong laptop.

    • (Score: 5, Informative) by Jeremiah Cornelius on Sunday March 22 2015, @03:15PM

      by Jeremiah Cornelius (2785) on Sunday March 22 2015, @03:15PM (#161135) Journal

      Total propaganda bullshit.

      Can't you people see the forest for the trees? The US is being herded like like sheep, back onto a "good 'ol days" cold war. Please, for your own sake, don't believe the hype.

      It seems a shame that here at Soylent, there isn't more effort to at least recognize the hallmarks of a journalist's hit-piece. Here's Mr Kaspersky's own detailed and rational response to the Bloomberg aspersions:
      http://eugene.kaspersky.com/2015/03/20/a-practical-guide-to-making-up-a-sensation/ [kaspersky.com]

      This has been "ginned up" for a while - Wired ran with the same innuendo a couple years back:
      http://eugene.kaspersky.com/2012/07/25/what-wired-is-not-telling-you-a-response-to-noah-shachtmans-article-in-wired-magazine/ [kaspersky.com]

      --
      You're betting on the pantomime horse...
      • (Score: 4, Insightful) by physicsmajor on Sunday March 22 2015, @03:40PM

        by physicsmajor (1471) on Sunday March 22 2015, @03:40PM (#161142)

        I honestly don't care if they are. Actions speak louder than words. Let's rehash, shall we?

        Kaspersky has been coming forth publicly with all sorts of technical malware disclosures which they found. They're shining light on the darker corners of the internet. As nobody else seems to want to do this, I'm OK with any light whatsoever. So if they preferentially target the NSA, well, we all know there's plenty of shit left to surface from that pool.

        And, honestly, this would be stupid if they were. They could use this info better by co-opting or subverting the NSA's plans instead of public disclosure. Instead, they're increasing the security and knowledge of the world public.

        • (Score: 5, Insightful) by Jeremiah Cornelius on Sunday March 22 2015, @03:47PM

          by Jeremiah Cornelius (2785) on Sunday March 22 2015, @03:47PM (#161147) Journal

          Kaspersky has results: Real forensic analysis of the biggest worldwide threat to privacy and security, in the context that will most directly affect the greatest number of people around the world.

          Bloomberg has dubious allegations: Insinuations and poorly sourced or verified substitutes for "evidence".

          --
          You're betting on the pantomime horse...
          • (Score: 1, Insightful) by Anonymous Coward on Sunday March 22 2015, @05:00PM

            by Anonymous Coward on Sunday March 22 2015, @05:00PM (#161167)

            Those two narratives are in no way mutually exclusive.

            There is a lot of shit out there from Russia and the US (and China, and pretty much any country with a large enough budget). Kaspersky can be 100% correct in their revelations and disclosures and still be an organ of Putin's propaganda machine. When seeking truth it isn't the answers that matter so much as the questions. By choosing questions with answers that embarrass the USA they get to be 100% accurate and still achieve the goal of propaganda.

            Politics is a battle of half-truths. Don't let one side's truths overshadow all the others.

      • (Score: 2, Informative) by Jeremiah Cornelius on Sunday March 22 2015, @03:41PM

        by Jeremiah Cornelius (2785) on Sunday March 22 2015, @03:41PM (#161143) Journal

        The "Wired" piece, which really began this whisper campaign, was written by Noah Shachtman [sourcewatch.org] - Now a Brookings Institution [sourcewatch.org] fellow and noted Zionist hasbara promoter from his propaganda organs as editor at "Foreign Policy" and the "Daily Beast".

        If there were a better profile describing the emergence and trajectory for the career of a neo-con propaganda agent than Mr. Shachtman, I have yet to see such.

        --
        You're betting on the pantomime horse...
      • (Score: 2) by Adamsjas on Sunday March 22 2015, @05:53PM

        by Adamsjas (4507) on Sunday March 22 2015, @05:53PM (#161191)

        These carefully worded "rational" responses would look better if the company also revealed (or at least detected) some Russian government malware, backdoors, or viruses.

        To date, their product only the typical rogue malware from non-government sources, typically what any other product detects. They aren't any better than the others.

        Yes, there is a bunch of NSA/CIA exploits. Fully agreed. Lets not argue about that.

        But why do they only publish those that have already been disclosed or hinted at by long published sources (Snowden releases), and none from their own government?

        • (Score: 4, Insightful) by Jeremiah Cornelius on Sunday March 22 2015, @06:15PM

          by Jeremiah Cornelius (2785) on Sunday March 22 2015, @06:15PM (#161201) Journal

          Look at context - how many OTHER security research groups in the software industry have produced evidence of large-scale, highly sophisticated and subversive malware, clearly produced by Russian military or other state organizations?

          None.

          Not saying they DON'T exist - but the US has been especially pernicious and reprehensible in the extreme. This is not a position they occupy, only relative to the merits of any other state.

          Snowden gave a roadmap of where to look. Naturally, one would expect a great deal of interest and effort spent on following the leads provided in these leaks. Like it or not? Kaspersky can publish their findings in a way that Qualys, Symantec or Intel Security (McAfee) would find potentially difficult - especially in the current era of the corporate military surveillance state as defacto US power establishment.

          For instance, the SNOWGLOBE analysis came from GData - a German based, European outfit: https://blog.gdatasoftware.com/blog/article/babar-espionage-software-finally-found-and-put-under-the-microscope.html [gdatasoftware.com]. Earlier, REGIN was discovered by Symantec [cnn.com], concurrently with Kaspersky. [wikipedia.org] I know from experience, that researches at different companies share information. I

          t appears at Kaspersky, they were less troubled to see "how far the rabbit-hole goes". That is something to celebrate, rather than denigrate.

          --
          You're betting on the pantomime horse...
        • (Score: 2) by c0lo on Sunday March 22 2015, @06:17PM

          by c0lo (156) Subscriber Badge on Sunday March 22 2015, @06:17PM (#161202) Journal

          But why do they only publish those that have already been disclosed or hinted at by long published sources (Snowden releases), and none from their own government?

          I guess from the goodness of their hearth. They let the US companies (Symantec, McAffee, etc) to make a name for themselves.</sarcasm>
          (why do you take it for granted that such malware exists?)

          --
          https://www.youtube.com/watch?v=aoFiw2jMy-0 https://soylentnews.org/~MichaelDavidCrawford
          • (Score: 0) by Anonymous Coward on Monday March 23 2015, @12:37PM

            by Anonymous Coward on Monday March 23 2015, @12:37PM (#161425)

            Because the majority of professional malware has been confirmed for years now to be coming from the eastern bloc and the Russian mafia, that's why. Duh.

  • (Score: 4, Insightful) by Nerdfest on Sunday March 22 2015, @02:09PM

    by Nerdfest (80) on Sunday March 22 2015, @02:09PM (#161111)

    At least they seem to help out citizens. The NSA keeps exploits to themselves and uses them against their citizens.

    • (Score: 1, Interesting) by Anonymous Coward on Sunday March 22 2015, @02:54PM

      by Anonymous Coward on Sunday March 22 2015, @02:54PM (#161129)

      How do they help? Do you think they are revealing the Russian exploits that are in the wild, or do you just take it on faith that the only government-sponsored exploits are done by the US?

      • (Score: 4, Interesting) by q.kontinuum on Sunday March 22 2015, @04:06PM

        by q.kontinuum (532) on Sunday March 22 2015, @04:06PM (#161154) Journal

        How about NSA (or other US cyber-security related entities, be it government or commercial) start publishing information on Russian or Chinese exploits? They could also improve their reputation with their civilians (and with us).

        --
        Registered IRC nick on chat.soylentnews.org: qkontinuum
        • (Score: 0) by Anonymous Coward on Sunday March 22 2015, @05:10PM

          by Anonymous Coward on Sunday March 22 2015, @05:10PM (#161168)

          Yeah, I think that's the best possible outcome. Let the different governments battle out the PR war by disclosing each other's exploits and in the meantime all the normal people benefit from the fallout of improved security. That would be a lot better than the fallout from an actual war.

          Time for the NSA to step it up!

        • (Score: 2) by Adamsjas on Sunday March 22 2015, @05:28PM

          by Adamsjas (4507) on Sunday March 22 2015, @05:28PM (#161177)

          I don't think the NSA wants those fixed. They probably use them for plausible deniability.

          So maybe the solution is to run BOTH a US antivirus program and a Russian one?
          Dueling Backdoors!
          Twice the Pwnage.

      • (Score: 0) by Anonymous Coward on Sunday March 22 2015, @06:05PM

        by Anonymous Coward on Sunday March 22 2015, @06:05PM (#161196)

        Doh. They're revealing the US ones.

        Maybe it doesn't help you and whoever pays you. But it sure helps the rest of us.

      • (Score: 0) by Anonymous Coward on Monday March 23 2015, @02:43PM

        by Anonymous Coward on Monday March 23 2015, @02:43PM (#161485)

        They are revealing exploits PERIOD. That helps.
        Yes they happen to be 'ours' or 'yours' but that's not the point. The point is that they are shedding light. It's not because 'we' do crappy shit that it's ok.
        Go back to your cave and annoy people over there.

    • (Score: 1) by Mr Big in the Pants on Sunday March 22 2015, @07:28PM

      by Mr Big in the Pants (4956) on Sunday March 22 2015, @07:28PM (#161234)

      Well that is how disinformation works most successfully and why the NSA are fools sitting on about zero credibility now.

      You build credibility with the truth and then lie when its very important or in subtle ways that cannot be verified. The rest of the time you ensure you are a source of information.

      This is what they are doing.

      And did no one else immediately realize there was a 99% chance they were doing exactly this the first time they came out with their "discoveries" just as the US and Russia start bashing heads?

      Security company in russia or china with no government collusion or interference? Comrade, please!?

      I for one would NEVER have their software anywhere near my computer...

    • (Score: 3, Insightful) by cafebabe on Monday March 23 2015, @12:40PM

      by cafebabe (894) on Monday March 23 2015, @12:40PM (#161426) Journal

      We live in interesting times when alleged agents of the Russian security services do more to secure US software than the US security services.

      --
      1702845791×2
  • (Score: 2, Insightful) by Anonymous Coward on Sunday March 22 2015, @02:14PM

    by Anonymous Coward on Sunday March 22 2015, @02:14PM (#161113)

    That statement seems to be an admission rather than a denial.

    • (Score: 3, Insightful) by M. Baranczak on Sunday March 22 2015, @03:34PM

      by M. Baranczak (1673) on Sunday March 22 2015, @03:34PM (#161140)

      That statement seems to be an admission rather than a denial.

      That statement is also part of a long and proud Russian tradition. [wikipedia.org]

      And if you put your trust in any "security software" company, you're a sucker.

      • (Score: 2) by Adamsjas on Sunday March 22 2015, @05:37PM

        by Adamsjas (4507) on Sunday March 22 2015, @05:37PM (#161181)

        Agreed, it does look like a case excuse via blame deflection.

        Quote: It's not as though the US has clean hands in all of this.

        You might expect that response from a Russian Government point of view.
        But from Kaspersky is looks very suspicious. (Especially when they claim to be a British company.) If you sell a commercial anti-malware product you don't start out blaming the government, any government, especially when your software doesn't successfully detect any of those alleged government sponsored malware.

  • (Score: 5, Interesting) by SuperCharlie on Sunday March 22 2015, @03:20PM

    by SuperCharlie (2939) on Sunday March 22 2015, @03:20PM (#161136)

    Lately I've been getting a lot of news from Russia since I figure if it's stinky they will be the ones to publish it. This bloomberg thing is a direct retaliation for kaspersky calling out the nsa on creating some of the more virulent malware and industrial intrusion kits lately. Sure it's slanted. But at least it's another view and not the pre-washed force fed crap in our media.

    • (Score: 2) by Adamsjas on Sunday March 22 2015, @05:41PM

      by Adamsjas (4507) on Sunday March 22 2015, @05:41PM (#161184)

      Yes It does seem a bit convenient to be coming out just now, doesn't it.

      Like iPhone articles swamping the mainstream press trying to drowned out Android Lollypop release stories. Our Free Press seems to be pretty tightly controlled.

    • (Score: 0) by Anonymous Coward on Sunday March 22 2015, @06:35PM

      by Anonymous Coward on Sunday March 22 2015, @06:35PM (#161212)

      I think it more likely that they are drawing attention to themselves, which draws the attention of journalists. One doesn't need to always invoke juvenile "teh lame stream media is p0wnd!" analysis. Aren't we always so quick to announce "Streisand Effect", so why doesn't it apply here?

      • (Score: 2) by HiThere on Sunday March 22 2015, @07:26PM

        by HiThere (866) Subscriber Badge on Sunday March 22 2015, @07:26PM (#161233) Journal

        How about *both*. We don't live in a world where everything is either/or.

        For that matter, even if Kaspersky Labs has ties to the FSB (probable) that doesn't make everything they say wrong, it just means that they aren't likely to say bad things about Russia, or good things about the US. Selective reporting is not (quite) the same as lying.

        --
        Javascript is what you use to allow unknown third parties to run software you have no idea about on your computer.
    • (Score: 2) by Hairyfeet on Sunday March 22 2015, @10:10PM

      by Hairyfeet (75) <bassbeast1968NO@SPAMgmail.com> on Sunday March 22 2015, @10:10PM (#161273) Journal

      Telling lies for power is pretty much all our MSM is anymore. If you wanna know which ones are giving the most handjobs to the NSA? Just look up their coverage when all that nasty PMC dirty dealings was dumped on wikileaks and see how many instantly ignored that for "But Assange may not have used a condom, the filthy rapist!". you'll see that the Post and the Times were the worst, they even buried anything to do with that video of the chopper pilot killing that family while laughing and acting like he was playing Call of Dooky but practically screamed from the rooftops every tweet from the 24 hours Assange was with that girl and every "detail" of the later shown to be false charges against the head of the IMF...who wanted to get rid of the petrodollar...wow, what a coincidence, huh?

      its sad to say but at this moment I'd trust Pravda more than I trust our own media, at least they don't pretend to be objective..

      --
      ACs are never seen so don't bother. Always ready to show SJWs for the racists they are.
      • (Score: 0) by Anonymous Coward on Monday March 23 2015, @12:32PM

        by Anonymous Coward on Monday March 23 2015, @12:32PM (#161424)

        What do those acronyms that you used mean? MSM? PMC?

  • (Score: 2) by wantkitteh on Sunday March 22 2015, @04:31PM

    by wantkitteh (3362) on Sunday March 22 2015, @04:31PM (#161161) Homepage Journal

    It bears repeating, the Russians excel at two things - developing exploitable vulnerabilities where they shouldn't be able to, and playing the human spy game. If they wanted to smear the NSA, they wouldn't stoop to using a domestic sock puppet to do it. They'd get someone from within the NSA to blow the lid off...

    ...wait a second....

    Forget I said that and implement an edit post feature already!!

  • (Score: 2, Funny) by Balderdash on Sunday March 22 2015, @05:24PM

    by Balderdash (693) on Sunday March 22 2015, @05:24PM (#161175)

    Kaspersky is sort of Russain-sounding!

    Quick, get Bill O'Reilly on the line!

    --
    I browse at -1. Free and open discourse requires consideration and review of all attempts at participation.
  • (Score: 2) by Kilo110 on Sunday March 22 2015, @06:34PM

    by Kilo110 (2853) Subscriber Badge on Sunday March 22 2015, @06:34PM (#161211)

    We hear a great deal from Kaspersky about NSA/Israel's evil software. Which is appreciated of course.

    But we never hear about Chinese/Russian spyware. They're definitely making it and I'm sure a lot of it rivals what the NSA is making. So why doesn't Kaspersky draw attention to those?

    • (Score: 1) by EETech1 on Sunday March 22 2015, @11:10PM

      by EETech1 (957) on Sunday March 22 2015, @11:10PM (#161290)

      1. write malware
      2. profit!!!
      3. write detection program for #1
      4. profit!!!!!
      5. BTW... #3 is now su(su) wherever installed
      6. ??????

    • (Score: 4, Insightful) by jcross on Monday March 23 2015, @01:23PM

      by jcross (4009) on Monday March 23 2015, @01:23PM (#161446)

      You know I hadn't really considered before how easy it would be for antivirus software to be crooked without anyone noticing. It's expected to contain a bunch of exploit code for detecting viruses. It's expected to repeatedly scan your file system and all downloads. It's expected to phone home regularly for updates. It's expected to run with a high privilege level. It's expected to use a ton of system resources, or at least it was the last time I ran Windows back in 2005 or so. Much like government "security" organizations, we allow all this because it's "keeping us safe" but who knows what these programs are really up to?

  • (Score: 2) by GungnirSniper on Sunday March 22 2015, @07:20PM

    by GungnirSniper (1671) on Sunday March 22 2015, @07:20PM (#161228) Journal
  • (Score: 0) by Anonymous Coward on Monday March 23 2015, @03:54AM

    by Anonymous Coward on Monday March 23 2015, @03:54AM (#161349)
    'KBG-run'? Shouldn't that be 'KGB-run'?
    • (Score: 0) by Anonymous Coward on Monday March 23 2015, @02:46PM

      by Anonymous Coward on Monday March 23 2015, @02:46PM (#161487)

      Shhh... it's code

  • (Score: 0) by Anonymous Coward on Monday March 23 2015, @08:10AM

    by Anonymous Coward on Monday March 23 2015, @08:10AM (#161381)

    I did not straight on believe the news, because Kaspersky can be easily made into a puppet, if they aren't already. I don't believe it about the spyware until some other than Russian company confirms it. But it's not like US hasn't done it before, so it could easily be true. I bet Kaspersky will not report Russian state spyware though, so if the NSA spyware is true, then it is as much probaganda as it is security.