Kaspersky Chief Says Willing To Allow U.S. Officials To Examine Products' Source Code
https://www.rferl.org/a/kaspersky-la.../28591824.html …
Kaspersky Chief Says Willing To Allow U.S. Officials To Examine Products' Source Code
https://www.rferl.org/a/kaspersky-la.../28591824.html …
what many do not understand about IT security and hacking and or malware attacks...they are designed usually to exploit weaknesses in the coding of a software product.....
In millions of lines of coding there is always a deficient line or two that allow exploitations against those specific code weaknesses....
This also goes for anti viral software.....REMEMBER when the latest Russian cyber attack on Ukraine hit...ONLY 16 anti viral products actually detected it out of a tested leading 25 AV products......
THIS goes also for Kaspersky.....ALL software has back doors...and I literally mean ALL....that is what hackers are always looking for to include nation state security services....
THIS response by Russia concerning Kaspersky is extremely interesting as they have never responded in this way if for say Rosneft or Gazprom loses a deal...........
REMEMBER in the Kaspersky cyber lab there are FSB liaison officers..one was recently arrested for allegedly spying for the US.....AND Kaspersky has all the end user individual computer data as it provides support for those legally purchased copes of their software.
Russia Threatens Retaliation If Pentagon Bans Kaspersky Software
https://www.bloomberg.com/news/artic...tware-j4k2inwq
REMEMBER Russia has forced all US IT companies to provide them all backdoors and source coding in order to do business in Russia...WHICH they all complied with including say Cisco and IBM....Any “unilateral political sanctions” by the U.S. may prompt a response from Russia, whose government systems use “a huge proportion of American software and hardware solutions in the IT sphere, even in very sensitive areas,” Nikiforov said in an interview on Friday. He declined to identify U.S. software products that may be affected by any reciprocal sanctions.
So when the US does he same the Russians flip out.....WHY......
Article on this was previously posted here...
Core element of Russian non linear warfare.....Russian doctrine from 2014...
Taken from George Kennan 1948....The first and second phases consist of non-military asymmetric warfare. They include information warfare, psychological, ideological, diplomatic, and economic measures, but also special operations conducted to mislead political and military leaders. Coordinated measures are carried out by diplomatic channels, media, top government and military agencies; they include leaking false data, orders, directives, and instructions. The third phase’s objective is to consolidate the first two, by intimidating, deceiving, or bribing government and military officers, with the objective of making them abandon their duties.
Political warfare is the logical application of Clausewitz's doctrine in time of peace. In broadest definition,
political warfare is the employment of all the means at a nation's command, short of war, to achieve its national
objectives. Such operations are both overt and covert. They range from such overt actions as political alliances, economic measures (as ERP--the Marshall Plan), and "white" propaganda to such covert operations as clandestine support of "friendly" foreign elements, "black" psychological warfare and even encouragement of underground resistance in hostile states.
Last edited by OUTLAW 09; 07-04-2017 at 07:03 AM.
Putin propagandists pick up ex-Pentagon PSYOPpers
by Dr Waller
February 14, 2016
http://acmeofskill.com/2016/02/putin...gon-psyoppers/
NOTE...Sputnik and Russia today have yearly budgets in excess of 1.5B USDs and are hard core Russian government 400% owned propaganda media outlets in over 128 countries....Zlatko Kovach is one of them. Just blocks from the White House, the 48-year-old editor runs the Washington office of Sputnik, which styles itself as a straight news service that aspires to compete with the Associated Press and Reuters. Three of Kovach’s fellow ex-Pentagon contract workers joined him. Two have moved on, but Sputnik is actively recruiting others.
Kovach, a naturalized American citizen, doesn’t see his move as unpatriotic but rather as economically justified. “Despite the big superpower relations, the media has developed in such a way as that’s the nature of the market,” he said. “It isn’t harming the U.S.”
Sputnik is part of a news and information outlet known in the United States as RT, the initials of its parent entity, Russia Today, which operates under the Ministry of Communications and Mass Media in Moscow. With State Department approval, RT opened the Washington office of Sputnik last year just as civilian contractors who shaped U.S. military messaging overseas were put out of work when Congress shut down most of a $22 million program.
They practiced what used to be called psychological operations, or PSYOP, a name that was changed to something more benign-sounding in the Pentagon’s alphabet soup of acronyms: MISO, for “military information support operations.”
Sputnik just purchased a former Blue Grass radio station in DC....
This is an interesting article in that it has been stated that the cyber attack in Ukraine came via this particular software update.....
Which actually flies in the face of confirmed actual hacking events that occurred shortly after a car bomb killed a UAF SOF COL of the military Intelligence...which for some strange reason has been largely glossed over by IT media and MSM media....
Family firm in Ukraine says it was not responsible for cyber attack
http://www.reuters.com/article/us-cy...technologyNews
NOTE"What has been established in these days, when no one slept and only worked? We studied and analysed our product for signs of hacking - it is not infected with a virus and everything is fine, it is safe," said Olesya, managing partner at Intellect Service.
"The update package, which was sent out long before the virus was spread, we checked it 100 times and everything is fine."
Little known outside Ukrainian accounting circles, M.E.Doc is an everyday part of life at around 80 percent of companies in Ukraine. The software allows its 400,000 clients to send and discuss financial documents between internal departments, as well as file them with the Ukrainian state tax service.
1. the update in question was sent out long before the attack
2. normally updates are tested on a variety of in-house computer systems in order to ensure there are not compatibility problems and if the malware was in the update it would have then triggered on at least one of those test systems....
3. does not explain just how then it spend to such companies as Maresk shipping that did not use the Ukrainian software....
4. AND more importantly the entire 400,000 customer base was not inflected if it had been the single update that was responsible....
MS really needs to explain just how this NSA exploit was able to spread so quickly even on MS machines that had the MAR 2017 security updates to hinder just such an attack...
There is far more to this attack than is being publicly written about....
Reference the Russian cyber attack on Ukraine....I am actually waiting for the Ukrainian hacker group Ukraine Cyber Army which has deep ties inside the Ukrainian cyber company world to post something but it is silent as well on their front....
When they post something then we might actually know what is ongoing and real.....
SPIEGEL ONLINE
✔
@SPIEGELONLINE
Der Verfassungsschutz warnt vor einer Manipulation der Bundestagswahl:
http://spon.de/ae0Qh
The German Federal Office for the Defense of the Constitution (like UK MI5) is warning about possible election interference....
Bookmarks