Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
United States Government Security

US Agency Revokes All State Discounts For Kaspersky Products (thebaltimorepost.com) 93

The U.S. General Services Administration has removed Kapersky Lab from its list of approved vendors for federal systems, which also eliminates the discounts it previously offered to state governments. Long-time Slashdot reader Rick Zeman writes: "The agency's statement suggested a vulnerability exists in Kaspersky that could give the Russian government backdoor access to the systems it protects, though they offered no explanation or evidence of it," reports the Washington Post. Kaspersky, of course, denies this, offering their source code up for U.S. Government review... "Three current and former defense contractors told The Post that they knew of no specific warnings circulated about Kaspersky in recent years, but it has become an unwritten rule at the Pentagon not to include Kaspersky as a potential vendor on new projects."
"The lack of information from the GSA underscores a disconnect between local officials and the federal government about cybersecurity," the Post reports, adding that "the GSA's move on July 11 has left state and local governments to speculate about the risks of sticking with the company or abandoning taxpayer-funded contracts, sometimes at great cost."

The Post also quotes a cybersecurity expert at a prominent think tank -- the Center for Strategic and International Studies -- who believes that "it's difficult, if not impossible" for a company like Kaspersky to be headquartered in Moscow "if you don't cooperate with the government and the intelligence services."
This discussion has been archived. No new comments can be posted.

US Agency Revokes All State Discounts For Kaspersky Products

Comments Filter:
  • by Anonymous Coward

    was russian security software on the gsa in the first place? that's like outsourcing handling of the 'football' and cloud storage of launch codes to the fsb.

  • How quaint (Score:5, Interesting)

    by gweihir ( 88907 ) on Sunday July 23, 2017 @11:43PM (#54864823)

    They all cooperate to some degree with all larger governments. They do not have a choice, governments have far too much power simply because they are large customers. Assuming otherwise is exceptionally naive. Of course, there are limits. No AV vendor will allow known government malware (US, Chinese, Russian, etc.) through. They cannot afford that. Making it easier for unknown malware is a different thing. In the end, as long as the exposure-risk for them is small, AV vendors will cooperate with the criminally-minded government agencies that modern governments seem to treasure so much. Governments, unfortunately, are yet again in the process of becoming the enemy of not only their own citizens, just like history never happened.

    The one thing we can now be reasonably sure of is that Kaspersky will now stop cooperating with the US government, which, in my book, makes their products better than what the competition has.

    • No AV vendor will allow known government malware (US, Chinese, Russian, etc.) through.

      http://www.reuters.com/article... [reuters.com]

      • Re:How quaint (Score:4, Insightful)

        by gweihir ( 88907 ) on Monday July 24, 2017 @02:31AM (#54865125)

        Getting subverted by criminal means does not count as "allowing". It counts as having gotten compromised. Anyways, nobody in their right mind will use RSA products for security at this time. They have screwed up far too often in the last few years. (Yes, I am aware their stuff still gets used. Do not expect a working security mind-set anywhere where that is the case....)

    • Re:How quaint (Score:4, Informative)

      by AHuxley ( 892839 ) on Monday July 24, 2017 @01:11AM (#54864971) Journal
      Re "No AV vendor will allow known government malware .. through."
      The US did consider that for Magic Lantern.
      https://en.wikipedia.org/wiki/... [wikipedia.org]
      • by gweihir ( 88907 )

        I am aware of that discussion. What I meant by "known" is "the binaries and signatures are in the public" and that means everybody can find out whether an AV product detects it or not. The negative fallout of not detecting it in that situation would be disastrous for any AV company. Sure, initially, they could claim ignorance, but if they insist on non-detection, that would be another story. Also, somebody has to try the malware against the AV products. Not really difficult, one upload to VirusTotal is enou

    • by Anonymous Coward

      the criminally-minded government agencies that modern governments seem to treasure so much.

      We call that normal police co-operation here, in the other side of the world. That said, many US AV vendors generally do co-operate with the US government, while the vendors from independent, small countries tend to avoid that particular hook. $-) (That's my patriotic marketing wink)

  • by Frosty Piss ( 770223 ) * on Sunday July 23, 2017 @11:50PM (#54864833)

    The possibility that Kapersky Lab is beholden to the Russian government is real.

    Yes, yes, I know the same can be said for American based "security" companies, but it's more likly they are beholden to American spy agencies.

    • by Anonymous Coward

      As history has abundantly demonstrated, being beholden to US TLAs is not necessarily better, certainly not in terms of risk of compromise and mass monitoring of US citizens. -PCP

  • Hmmmmm... (Score:4, Interesting)

    by Frosty Piss ( 770223 ) * on Sunday July 23, 2017 @11:57PM (#54864841)

    "The agency's statement suggested a vulnerability exists in Kaspersky that could give the Russian government backdoor access to the systems it protects, though they offered no explanation or evidence of it," reports the Washington Post. Kaspersky, of course, denies this, offering their source code up for U.S. Government review... "Three current and former defense contractors told The Post that they knew of no specific warnings circulated about Kaspersky in recent years, but it has become an unwritten rule at the Pentagon not to include Kaspersky as a potential vendor on new projects."

    I'm not a security expert, but I don't know that this would necessarily sooth me. For example, perhaps the "backdoor" is devilishly obscured. Or, perhaps future exploits of a particularly tricky and secret nature will mysteriously not be added to whatever library Kaspersky's stuff uses. And then there is the issue of regular software updates, does the US government have to check the code with a fine tooth comb every time - this alone would be problematic.

    I mean, come on! To imagine that the Russians would not at least TRY to leverage the Kaspersky install base is ignorant.

    • For example, perhaps the "backdoor" is devilishly obscured

      Heck, if you don't compile it yourself with a fully reproducible build process, the source could be a lie.

      • Re: (Score:2, Interesting)

        by Anonymous Coward

        Depending on the development environment in question, for added fun, you could still have problems [cmu.edu] even if you compile it yourself. On the bright side, things like diverse double compiling [dwheeler.com] might be helpful in this area. -PCP

         

    • There's a limit to how obscure backdoors can be. At the end of the day, the backdoor has to either initiate or receive a connection, and that gives the game away. The problem is that monitoring connection logs is tedious, boring, and -- if you're paying someone competent -- expensive.

      Moreover, the risk/reward for creating and using a backdoor in security software doesn't make sense when the ability to exploit 0-days in the OS itself is so easy. Why blow your own hard-earned reputation when you can blow s

  • by PPH ( 736903 ) on Monday July 24, 2017 @12:03AM (#54864857)

    Well then, we'll just switch to the cheaper Chinese stuff.

  • Well duh... (Score:5, Insightful)

    by Reverend Green ( 4973045 ) on Monday July 24, 2017 @12:37AM (#54864915)

    Software built by Russian companies is backdoored by Russian spooks.
    Software built by American companies is backdoored by American spooks.
    Software built by Chinese companies is backdoored by Chinese spooks.

    Does this surprise anyone at all?

    • by aliquis ( 678370 )

      "As you know yourself you know others"

      Guess the software which really shouldn't be trusted is the American made one ...

      • How to trust? (Score:3, Interesting)

        by pntkl ( 2187764 )
        National origin doesn't matter, people simply can't have full faith in closed source. All this propagandizing does is make modern man more equivalent to the cave man. If Kaspersky is offering source review with compilation on trusted systems, with sample submissions and the like running through trusted networks, then it's probably more trustworthy than others. People will remain clubbing it out like cave men, until they fundamentally change their markets and valuations, along with their software. Software b
        • National origin doesn't matter, people simply can't have full faith in closed source.

          People can't have full faith in open source either unless they are either capable of reviewing all the code themselves or can somehow establish a trusted chain of custody for all the code and tools to compile it. Most people cannot do the former and only large organizations realistically have the resources to do the later. There are undeniably huge advantages to open source but code security doesn't stand up to strict scrutiny in real world use for non-trivial use cases. I don't compile my software like

  • On telling the world about the Equation Group, Stuxnet and a lot of other malware.
    https://en.wikipedia.org/wiki/... [wikipedia.org]
  • i wonder what the US govt thinks of DR.Web - less known Russian based AV vendor
  • https://www.privateinternetacc... [privateint...access.com]

    Only one party voted against outsourcing it outside Sweden, the Sweden democrats. Another party decided to not vote at all, the Left party, possibly they were against it but refused to vote like the Sweden democrats with that result. The rest voted for it. .. and well.. that was good?

    • Re: (Score:2, Informative)

      by Anonymous Coward

      For those of you not familiar with Swedish politics, the Sweden "Democrats" are anything but. They're right-wing/racist/ultra-nationalist, with their origins in the White Power movement and the Swedish Nazis. (Fun fact: Sweden never outlawed the Nazi Party.) They're a minority in the Riksdag, and every other party with seats refuses to co-operate with them on any matter.

      The irony here is that SD are anti-EU and pro-Russian and they're attempting to score political points pretending to be against something t

      • by aliquis ( 678370 )

        the Sweden "Democrats" are anything but

        DemocracyÂs flaw is that it allow the dictatorship of the majority. If you value the collective more than the individual that's fine. But I have a hard time accepting it. But that's a fact. And the Sweden democrats are just as much democrats as anything else. Any claim for them being anti-democrats beyond valuing the opinion by the Swedes higher than that of the non-Swedes (all national democratic parties should do exactly that) is complete bullshit simply by association.

        Regardless Sweden isn't a funct

    • Even a stopped clock is right twice a day.

    • by aliquis ( 678370 )

      .. kinda telling none of the idiots who commented my comment focused on what had actually happened: That information supposed to be controller by the authorities were leaked abroad but instead focused on the one party which was against allowing that to happen in the first place. .. All focus on the party, none on the actual subject .. .. which also explain how the Swedish parliament & media work, but it's so retarded.

  • Better: "US Govt. Removes Kaspersky from Approved Vendors List".

  • The US Government MUST of, at-least internally, had discussions about this very subject before all the Russian hacking came around. I mean Kaspersky has been around for at-least a decade, plenty of time to root everyone PC. I am not saying Kaspershy is Putin's lap dog, but I want to know what the discussions were before this whole fiasco happened and what evidence shown that Kaspersky is dangerous now.

    I mean it feels like Putin is having us run around in circles while all he is doing is sitting having a

Keep up the good work! But please don't ask me to help.

Working...