Tag Archives: Russia

KRI Nanggala Submarine : Was Its Wreck Recovered?

KRI Nanggala Submarine : Was Its Wreck Recovered?

Was the wreck of the Indonesian submarine, KRI Nanggala, just recovered from the sea?

Find out what has gone viral on social media, and what the FACTS really are!

 

KRI Nanggala Submarine : Was Its Wreck Recovered?

People have been sharing a picture purportedly showing the wreck of he Indonesian submarine, KRI Nanggala, being lifted from the sea.

The picture shows a crane apparently lifting the wreckage of a submarine with the hull number 402 circled in red, with pictures of women crying and hugging each other.

402 is the hull number of KRI Nanggala – the Indonesian submarine that sank 95 kilometres north of Bali on 21 April 2021.

Some also shared part of the Indonesian article – Tangisan Keluarga Korban Pecah, Tim Evakuasi Berhasil Angkat Puing Puing KIR Nanggala 402 Kepermukaan.

In English, the long title translates as “The Victims’ Families Cried, The Evacuation Team Succeeded In Lifting The Wreckage of KRI Nanggala 402 To The Surface“.

 

KRI Nanggala : Submarine Wreck Has Not Been Recovered!

The truth is – this is yet another piece of FAKE NEWS circulating through social media. Here are the facts..

Fact #1 : The Photo Was Edited

Obviously, the photo was edited – it is a collage.

But more to the point – the photo of the submarine was edited to add the hull number 402.

The person who created the photo lifted the 402 hull number from this picture of the actual KRI Nanggala submarine, and added it to the submarine in the photo above.

Fact #2 : That Submarine Was K-141 Kursk

The submarine used in the fake photo is actually K-141 Kursk of the Russian Navy, flipped horizontally.

This is the photo of the Kursk they used to make the fake photo, which we flipped horizontally to make the comparison easier.

As you can see, they edited out the Kursk coat of arms from the sail, and paste the 402 hull number next to it.

Fact #3 : KRI Nanggala Has Not Been Recovered… Yet

Efforts to recover the wreck of KRI Nanggala started on 4 May 2021, with the assistance of the Chinese Navy.

However, as of 11 May 2021, no part of its hull has been recovered from the depth of 838 metres where the wreck has rested.

Fact #4 : Original Article Was Deleted

The original article was posted on 1 May 2021 but recently removed after being exposed as fake news.

However, the video with that fake photo is still available on YouTube, and it was copied and posted by other websites eager to capitalise on the disaster.

Note : We added the FALSE overlay to prevent the article from being further shared as fact.

 

Help Support My Work!

If you would like to support my work, you can do so via bank transfer /  PayPal / credit card.

Name : Adrian Wong

Credit Card / Paypal : https://paypal.me/techarp
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)

Thank you in advanced! 

 

Recommended Reading

Go Back To > Fact CheckHealthHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Russian Autopsy Confirmed That COVID-19 Is Not A Virus?

Did a Russian autopsy confirm that COVID-19 is not a virus, but a poison that can be cured by existing medicines?

Take a look at this new viral message, and find out what the FACTS really are!

 

Russian Autopsy Confirmed That COVID-19 Is Not A Virus?

This new WhatsApp message claims that a Russian autopsy has finally proven that COVID-19 is not a virus, but a poison that can be cured by existing medicines.

Latest news:
* Good news to the world … *

* Russia has done a post-mortem autopsy of the Covid-19 patient, a big revelation has occurred. *
Russia became the first country in the world to perform an autopsy (= post mortem) on a corpse of Covid-19 and, after a thorough investigation, discovered that * Covid-19 does not exist as a virus *.

It’s a worldwide scam: * people are dying from “amplified 5G electromagnetic radiation (= poison)”. *

Doctors in Russia have violated the World Health Organization (WHO) law, which does not allow post-mortem autopsies on the bodies of people who have died from Covid-19 to be discovered after a certain time. These doctors made scientific discovery: * we can not assume that it is a virus, but a bacterium that causes death, which causes blood clots to form in the veins and nerves, Cause the death of the patient because of this bacteria. *

Russia has defeated the virus, claiming that “there is nothing but phelia-intravascular coagulation (thrombosis) * and the way to treat it is to cure it”:
1) * Antibiotic pills *
2) * Anti-inflammatory * and
3) * take anticoagulants (= aspirin). *

 

Russian COVID-19 Autopsy : Complete Bullshit

Like 95% of viral messages on COVID-19 – this is yet another piece of FAKE NEWS based on some facts.

Let’s examine each claim and find out what the facts really are!

Fact #1 : First COVID-19 Autopsy Was Conducted In China

Wuhan was the origin of the COVID-19 epidemic in China, and it was there that the first patients died, and where the first autopsies were conducted.

The forensics team from the Tongji Medical College of the Huazhong University of Science and Technology conducted the first autopsy of a COVID-19 patient on 16 February 2020.

By 24 February 2020, they conducted a total of nine autopsies – the results of which was published in the Journal of Forensic Medicine.

Fact #2 : There Is No WHO Law Forbidding Autopsies

There is no such thing as a WHO law that forbids autopsies of any person who died from COVID-19, or any other disease.

The World Health Organisation is an international advisory body. It has no power over individual countries, and therefore, cannot ban post-mortem autopsies in any country.

In fact, the WHO actually published guidelines on how to perform autopsies and manage the bodies of dead COVID-19 patients.

Fact #3 : COVID-19 Is Caused By SARS-CoV-2

COVID-19 is technically not a virus.

COVID-19 is the disease caused by a novel coronavirus, which was initially called 2019-nCoV, before being officially named as SARS-CoV-2.

Fact #4 : SARS-CoV-2 Is A Real Virus

We know that the SARS-CoV-2 is a real virus, because Chinese scientists isolated it and with the help of the University of Sydney in Australia, released a draft sequence of its genome on 10 January 2020.

The complete genome of approximately 30 kilobytes in length was published on 3 February 2020.

You can look at the entire SARS-CoV-2 viral genome that was released by Chinese scientists here.

SARS-CoV-2 genome diagram. Credit : Rohan Bir Singh, MD

Fact #5 : A Virus Is Not A Bacterium

Any half-decent student of biology can tell you that a virus is not a bacterium. They are completely different.

A virus, for example, is not even a living organism. It is just RNA or DNA encapsulated within a protein or lipid shell, and can only replicate within a host cell.

A bacterium, on the other hand, is a single-celled microorganism that can multiply by itself. It is also much more complex, with intracellular organelles and even extracellular appendages.

SARS-CoV-2 – the COVID-19 coronavirus – is a virus, not a bacterium.

Fact #6 : There Is No Cure For COVID-19 (Right Now)

As of 23 April 2021, there is no cure for COVID-19, only vaccines that can help prevent it.

Antibiotics, anti-inflammatory, or anti-coagulant medication cannot cure COVID-19.

Fact #7 : 5G Does Not Cause COVID-19

There is simply no plausible way for 5G technology to create a new coronavirus out of thin air. Simply put – 5G does not cause COVID-19.

Consider the fact that there are COVID-19 cases in every country around the world, but 5G coverage is extremely sparse.

Take a look at this comparison of worldwide 5G coverage (provided by Ookla) and COVID-19 cases globally.

Can you see the complete lack of correlation?

Fact #8 : COVID-19 Can Cause Blood Clotting

COVID-19 can cause a hypercoagulable state, in which a severe inflammatory response triggers localised blood clotting which can become generalised.

It is especially common in severe COVID-19 disease, and has nothing to do with a bacterium, or 5G radiation.

When a COVID-19 patient presents with blood clots, they are treated with blood thinners like aspirin and heparin.

Fact #9 : Empromax Is An Antibiotic

Empromax is one of the brand names of the antibiotic, Cefpodoxime proxetil. It cannot work against a virus like SARS-CoV-2.

There is no evidence that the Russian Ministry of Health (Minzdrav) is using Empromax to treat COVID-19 patients.

They have temporarily approved certain drugs as COVID-19 treatments, but not Empromax :

  • Favipiravir – antiviral drug that can shorten recovery time
  • Levilimab – to treat cytokine storm

Fact #10 : Russian Ministry Of Health Relying On Vaccines

The Russian Ministry of Health is relying not on medications, because none actually exist to cure COVID-19.

Instead, they are relying on the two COVID-19 vaccines they developed :

  • Sputnik V (Gam-Covid-Vac)
  • EpiVacCorona

 

Recommended Reading

Go Back To > Health | Fact ChecksHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

USS Al Gore Global Warming Research Vessel Frozen In Ice?

Did the USS Al Gore Global Warming Research Vessel get frozen in ice?

Take a look at the pictures, and find out what the facts really are!

 

USS Al Gore Global Warming Research Vessel Frozen In Ice?

People keep sharing pictures of the USS Al Gore Global Warming Research Vessel frozen in ice, some as a joke, some as evidence that global warming does not actually exist.

You will find these being shared on Facebook, Twitter, WhatsApp, Reddit, and even some websites.

Note : We intentionally placed the FALSE overlay to prevent them from being further abused.

Because these have been debunked previously on our sister website, someone started sharing a new picture instead. This time, of a much larger ship.

 

USS Al Gore : The Facts

As you can surmise by now, those pictures are NOT of the USS Al Gore Global Warming Research Vessel.

Climate change is real, and sharing pictures of frozen boats is not going to change the fact that the world is getting warmer.

Here are the reasons why these are all FAKE PICTURES being shared by climate change deniers.

Fact #1 : There Is No USS Al Gore

The USS Al Gore does not exist. The USS (United States Ship) designation is reserved for active commissioned ships of the US Navy. There has never been a ship named for former US Vice-President Al Gore.

Well, a FICTIONAL submersible aircraft carrier – the CVJ-01 USS Al Gore – was named after him, but I don’t suppose that counts… because it’s a SUBMARINE! 😀

Fact #2 : Al Gore Has A Houseboat Called Bio-Solar One

Al Gore has a 100-foot houseboat that is powered by bio-diesel and solar panels, called Bio-Solar One. It was launched sometime in September 2008.

Here, you can see it at the Hurricane Marina in Silver Point, Tennessee. Completely different design and size, and NEVER FROZEN in ice.

Photo Credit : The Tennessean

Fact #3 : The Frozen Boat Was In Switzerland

The original fake picture of USS Al Gore was of a boat moored off Versoix, on the shores of Lake Geneva, Switzerland.

It was hit by an ice storm in 2005 – the freezing rain froze into a thick glaze of ice that covered not only this boat, but also vehicles, buildings and the streets.

This photo of the same boat was taken by a different photographer, Santiago Puig Viladomiu.

The date stamp is clear – this was taken on 28 January 2005 – more than 3.5 years before Al Gore’s Bio-Solar One houseboat was even launched.

Fact #4 : The Frozen Ship Was In Russia

The newer fake photo of USS Al Gore was really taken on 19 January 2006, of the ship GEORG OTS at the port of Saint Petersburg in Russia.

GEORG OTS (IMO 7625835) is a passenger Roll-On, Roll-Off (Ro-Ro) cargo ship built in 1980, and has ceased service since 2013, last seen heading to Zhoushan, China.

Here you can see the original picture used in the fake USS Al Gore photo, and the GEORG OTS during warmer times.

 

Recommended Reading

Go Back To > Fact Checks | ScienceHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

How To Use World Cup 2018 WiFi Hotspots Safely!

Kaspersky Lab discovered than more than 22% of the World Cup 2018 WiFi hotspots lack encryption, making them quite unsafe for use by football fans. They share some useful tips on how to stay safe while using these World Cup 2018 WiFi hotspots!

 

Many World Cup 2018 WiFi Hotspots Are Unsafe!

According to Kaspersky Lab research, 7,176 of approximately 32,000 public Wi-Fi networks in FIFA World Cup 2018 host cities do not use traffic encryption. This makes them potentially unsafe for use by football fans visiting the cities. The results suggest that fans should take care of their personal data, especially while using open Wi-Fi connections around the FIFA World Cup games.

Global events always result in a concentration of people connecting to networks to upload posts, stay in touch with loved ones, and share the fun with others. However, at the same time, these networks can be used to transfer financial and other valuable information across the Internet. And it’s this information that third parties – not necessarily criminals – can intercept and use for their own purposes.

Kaspersky Lab’s findings are based on an analysis of public Wi-Fi spots in 11 FIFA World Cup 2018 host cities, including Saransk, Samara, Nizhny Novgorod, Kazan, Volgograd, Moscow, Ekaterinburg, Sochi, Rostov, Kaliningrad, and Saint Petersburg. The results show that so far not all wireless access points have encryption and authentication algorithms – aspects that are essential for Wi-Fi networks to remain secure. This means that hackers only need to be located near an access point to intercept network traffic and get confidential information from unwitting or unprepared users.

[adrotate group=”2″]

The three cities with the highest percentage of unreliable Wi-Fi networks are :

  • Saint Petersburg (37%),
  • Kaliningrad (35%), and
  • Rostov (32%).

In contrast, the safest places were relatively small towns – including :

  • Saransk (only 10% of Wi-Fi spots are open), and
  • Samara (17% of Wi-Fi spots are open).

Almost two-thirds of all public Wi-Fi networks in these locations use the Wi-Fi Protected Access (WPA/WPA2) protocol family for traffic Still, it should be noted that even reliable WPA/WPA2 networks can allow brute-force and dictionary attacks, as well as key reinstallation attacks, meaning they are not absolutely secure.

 

How To Use World Cup 2018 WiFi Hotspots Safely!

If you are going to visit FIFA World Cup 2018 host cities, remember to follow several simple rules to help protect your personal data if you plan to use these World Cup 2018 WiFi hotspots :

  • Whenever possible, connect via a Virtual Private Network (VPN). With a VPN, encrypted traffic is transmitted over a protected tunnel, meaning criminals won’t be able to read your data, even if they gain access to it.
  • Do not trust networks that are not password-protected, or have easy-to-guess or easy-to-find passwords.
  • Even if a network requests a strong password, you should remain vigilant. Fraudsters can find out the network password at a coffee shop, for example, and then create a fake connection with the same password. This allows them to easily steal personal user data. You should only trust network names and passwords given to you by employees of the establishment.
  • To maximize your protection, turn off your Wi-Fi connection whenever you are not using it. This will also save your battery life. We also recommend disabling automatic connections to existing Wi-Fi networks.
  • If you are not 100% sure the wireless network you are using is secure, but you still need to connect to the Internet, try to limit yourself to basic user actions such as searching for information. You should refrain from entering your login details for social networks or mail services, and definitely do not perform any online banking operations or enter your bank card details anywhere. This will avoid situations where your sensitive data or passwords are intercepted and then used for malicious purposes later on.
  • To avoid being a target for cybercriminals, you should enable the “always use a secure connection” (HTTPS) option in your device settings. Enabling this option is recommended when visiting any website you think may lack the necessary protection.

Go Back To > Cybersecurity | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Kaspersky Moves Core Russian Operations To Switzerland!

In a move to allay fears of collusion with Russian authorities, Kaspersky Lab announced on 15 May 2018 that they will be moving a number of their core Russian operations to Switzerland. This would include their customer data storage and processing for most regions, as well as software assembly and threat detection updates.

To ensure full transparency and integrity, they are also arranging for this activity to be supervised by an independent third party, also based in Switzerland. Here are the full details!

 

 

Customer Data Storage & Processing

Kaspersky Lab will establish a data center in Zurich by the end of 2019. This facility will store and process all information for users in Europe, North America, Singapore, Australia, Japan and South Korea, with more countries to follow.

This information is stored and processed at this facility will be voluntarily shared by users of the Kaspersky Security Network (KSN) – a cloud-based system that automatically processes cyberthreat-related data. 

Relocation of software assembly

Kaspersky Lab will relocate to Zurich its ‘software build conveyer’ — a set of programming tools used to assemble ready to use software out of source code.

Before the end of 2018, Kaspersky Lab products and threat detection rule databases (AV databases) will start to be assembled and signed with a digital signature in Switzerland, before being distributed to the endpoints of customers worldwide.

The relocation will ensure that all newly assembled software can be verified by an independent organization and show that software builds and updates received by customers match the source code provided for audit.

[adrotate group=”1″]

First Kaspersky Lab Transparency Center

Kaspersky Lab first announced their Global Transparency Initiative in October 2017. One of their initiatives include the creation of three Kaspersky Transparency Centers – one each in Asia, Europe and the US.

The first Transparency Center will be in Switzerland, and is expected to open this year. It will allow organisations and governments to inspect and review the source code of Kaspersky Lab products and software updates in a secure facility.

Independent supervision and review

Kaspersky Lab is arranging for the data storage and processing, software assembly, and source code to be independently supervised by a third party qualified to conduct technical software reviews. They are also calling for the creation of a new, non-profit organization to take on this responsibility.

Don’t forget to read our interview with Eugene Kaspersky on his alleged ties with Russian President Vladimir Putin and the Kremlin.

Go Back To > Cybersecurity | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Kaspersky Lab Reveals Mokes Backdoor In NSA Leak

Kaspersky Lab just issued an update on their internal investigation into the alleged downloading of NSA hacking tools by Russian hackers, and their own team. Their update provides new insights into the hack, including their new findings on the Mokes backdoor used to gain access to the infected computer.

 

What’s Going On With Kaspersky Lab?

Kaspersky Lab can’t seem to get ahead of the bad publicity over the alleged downloading of NSA hacking tools from an NSA employee’s home computer. After the incident was first reported in the Wall Street Journal,  Kaspersky Lab launched an internal investigation.

They have also recently announced their Global Transparency Initiative to combat the perception that they are helping the Russian government attack Western interests.

Read : Eugene Kaspersky On The Cyberspace Survival Guide

 

Kaspersky Lab’s Initial Findings

Kaspersky Labs published these initial findings on 25 October :

  • On September 11, 2014, a Kaspersky Lab product installed on the computer of a U.S.-based user reported an infection of what appeared to be variants of malware used by the Equation APT group– a sophisticated cyber threat actor whose activity had already been under active investigation since March 2014.
  • Sometime after this, the user seems to have downloaded and installed pirated software on their machine, specifically a Microsoft Office ISO file and an illegal Microsoft Office 2013 activation tool (aka “keygen”).
  • To install the pirate copy of Office 2013, the user appears to have disabled the Kaspersky Lab product on their computer, because executing the illegal activator tool would not have been possible with the antivirus enabled.
  • The illegal activation tool contained within the Office ISO was infected with malware. The user was infected with this malware for an unspecified period while the Kaspersky Lab product was inactive. The malware consisted of a full-blown backdoor which could have allowed other third-parties to access the user’s machine.
  • When re-enabled, the Kaspersky Lab product detected the malware with the verdict Backdoor.Win32.Mokes.hvl and blocked this malware from calling out to a known command and control server. The first detection of the malicious setup program was on October 4, 2014.
  • In addition, the antivirus product also detected new and previously known variants of Equation APT malware.
  • One of the files detected by the product as new variants of Equation APT malware was a 7zip archive which was sent back, in accordance to the end-user and KSN license agreements, to the Kaspersky Virus Lab for further analysis.
  • Upon analysis, it was discovered that the archive contained a multitude of files, including known and unknown tools of Equation group, source code, as well as classified documents. The analyst reported the incident to the CEO. Following a request from the CEO, the archive itself, source code, and any apparently classified data were deleted within days from the company’s systems. However, files that are legitimate malware binaries currently remain in Kaspersky Lab storage. The archive was not shared with any third-parties.
  • The reason Kaspersky Lab deleted those files and will delete similar ones in the future is two-fold: first, it needs only malware binaries to improve protection and, secondly, it has concerns regarding the handling of potentially classified material.
  • Because of this incident, a new policy was created for all malware analysts: they are now required to delete any potentially classified material that has been accidentally collected during anti-malware research.
  • The investigation did not reveal any other similar incidents in 2015, 2016 or 2017.
  • To date, no other third-party intrusion aside from Duqu 2.0 has been detected in Kaspersky Lab’s networks.

 

The Mokes Backdoor & Other New Findings

Kaspersky Lab continued their investigation, issuing a new report that confirmed their initial findings above. It also provided additional insight into the analysis of the telemetry of suspicious activities registered on that NSA employee’s computer that was sent to their servers.

One of the major discoveries was the detection of the Mokes backdoor in that NSA employee’s computer. The Mokes backdoor is a malware that allows the hacker to remotely access the computer.

Curious Mokes backdoor background

It is publicly known that the Mokes backdoor (also known as “Smoke Bot” or “Smoke Loader”) appeared on Russian underground forums as it was made available for purchase in 2014. Kaspersky Lab research shows that, during the period of September to November 2014, the command and control servers of this malware were registered to presumably a Chinese entity going by the name “Zhou Lou”.

[adrotate group=”2″]

Moreover, deeper analysis of Kaspersky Lab telemetry showed that the Mokes backdoor may not have been the only malware infecting the PC in question at the time of the incident as other illegal activation tools and keygens were detected on the same machine.

More non-Equation malware

Over a period of two months, the product reported alarms on 121 items of non-Equation malware: backdoors, exploits, Trojans and AdWare. All of these alerts, combined with the limited amount of available telemetry, means that while Kaspersky Lab can confirm that their product spotted the threats, it is impossible to determine if they were executing during the period the product was disabled.

 

Kaspersky Lab’s Conclusions

Their current investigations conclude thus far that :

  • The Kaspersky Lab software performed as expected and notified our analysts of alerts on signatures written to detect Equation APT group malware that was already under investigation for six months. All of this in accordance with the description of the declared product functionality, scenarios, and legal documents which the user agreed to prior to the installation of the software.
  • What is believed to be potentially classified information was pulled back because it was contained within an archive that fired on an Equation-specific APT malware signature.
  • Beside malware, the archive also contained what appeared to be source code for Equation APT malware and four Word documents bearing classification markings. Kaspersky Lab doesn’t possess information on the content of the documents as they were deleted within days.
  • Kaspersky Lab cannot assess whether the data was “handled appropriately” (according to U.S. Government norms) since our analysts have not been trained on handling U.S. classified information, nor are they under any legal obligation to do so. The information was not shared with any third party.
  • Contrary to multiple media publications, no evidence has been found that Kaspersky Lab researchers have ever tried to issue “silent” signatures aimed at searching for documents with words like “top secret” and “classified” and other similar words.
  • The Mokes backdoor infection and potential infections of other non-Equation malware point to the possibility that user data could have been leaked to an unknown number of third-parties as a result of remote access to the computer.

Go Back To > Articles | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

How Kaspersky Lab Plans To Counter Alleged Ties To Russian Intelligence

Alleged Ties To Russian Intelligence

Kaspersky Lab can’t seem to get rid of the stigma of being a Russian company. Even after Eugene Kaspersky publicly declared that Russian President Vladimir Putin is not his friend, and offered to show his source codes to the US government, he can’t shake off the perception that he’s helping the Russian government attack Western interests.

It did not help that Israeli government hackers provided the US National Security Agency (NSA) with evidence that Russian hackers used Kaspersky Lab software to scan for American classified programs. They also found NSA hacking tools in the Kaspersky Lab network, the same tools that the NSA later confirmed were in Russian intelligence hands.

That was what led to the US General Services Administration directive to remove Kaspersky Lab from its list of approved vendors, and the US Senate to call for a government-wide ban.

There is no evidence that Kaspersky Lab itself was complicit in helping Russian intelligence scan for American classified programs, or obtain the NSA hacking tools. It is entirely possible that the Russian intelligence hackers merely exploited the same flaws in Kaspersky Lab software that the Israelis used to gain access to their network and software.

However, all these controversies have greatly undermined Kaspersky Lab’s credibility and sales worldwide.

 

The Kaspersky Lab Global Transparency Initiative

The Kaspersky Lab Global Transparency Initiative attempts to prove and assure their customers (and potential customers) that there are no backdoors in their software. Under this initiative, Kaspersky Lab will make their source codes, including software updates and threat detection rules, available for independent review and evaluation.

Their Global Transparency Initiative will kick off with these actions :

  1. Kaspersky Lab will offer their source codes for an independent review by Q1 2018, with similar independent reviews of their software updates and threat detection rules to follow.
  2. An independent assessment of the Kaspersky Lab development lifecycle processes, and its software and supply chain risk mitigation strategies, will begin by Q1 2018.
  3. Additional controls to govern Kaspersky Lab data processing practices, with verification by an independent party, will be developed by Q1 2018.
  4. Three Transparency Centers will be established in Asia, Europe and the US to address security issues with Kaspersky Lab partners, customers and government stakeholders. They will also serve as a facility for “trusted partners to access reviews on the company’s code, software updates and threat detection rules“. The first Transparency Center will open by 2018, with the rest by 2020.
  5. Kaspersky Lab will increase their bug bounty awards up to $100,000 for the most severe vulnerabilities found under their Coordinated Vulnerability Disclosure program by the end of 2017.

Kaspersky Lab will later announce the next phase of the Global Transparency Initiative, after engaging with their stakeholders and the cybersecurity community.

 

What This Does Not Address

[adrotate group=”2″]

The initial phase of the Kaspersky Lab Global Transparency Initiative will help verify, and assure their customers, that there are no backdoors in their software. However, it does not address a major concern for the US government – the fact that their data is routed through Russian Internet service providers that are subject to the Russian intelligence surveillance system called SORM (System of Operative-Investigative Measures).

Kaspersky Lab has said that customer data sent to their Russian servers are encrypted, and they do not decrypt it for the Russian government. But it would be impossible for them to prove it. Perhaps they will address this concern in the next phase of their Global Transparency Initiative.

Don’t forget to read our interview with Eugene Kaspersky on his alleged ties with Russian President Vladimir Putin and the Kremlin.

Go Back To > Articles | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!