Homeland Security drops the hammer on Kaspersky Lab with preemptive ban

Government departments have 90 days to rip and replace


Despite pending legislation to ban US federal government offices from using Kaspersky Lab security software, Homeland Security has issued a Binding Operational Directive demanding that the products be removed within 90 days.

The directive gives government IT managers 30 days to identify which – if any – of their systems have Kaspersky software installed, 60 days to develop a plan to get rid of it, and by the 90-day mark it must be uninstalled, unless the DHS advises them otherwise in the meantime.

"The Department is concerned about the ties between certain Kaspersky officials and Russian intelligence and other government agencies, and requirements under Russian law that allow Russian intelligence agencies to request or compel assistance from Kaspersky and to intercept communications transiting Russian networks," the agency said in a statement.

"The risk that the Russian government, whether acting on its own or in collaboration with Kaspersky, could capitalize on access provided by Kaspersky products to compromise federal information and information systems directly implicates US national security."

Red Panic grips US

Only last week, US Senator Jeanne Shaheen (D-NH) introduced legislation to do exactly the same job, but the DHS isn't waiting for Congress to act and went ahead with the directive. On Friday, US big-box retailer Best Buy pulled Kaspersky software from its shelves, although it declined to say why.

Not that Eugene Kaspersky is all that bothered. On Tuesday he said that the firm doesn't really have much in the way of sales to the US government, but that it was opening three new offices in the Land of the FreeTM to cope with customer demand.

The DHS did say that it would like Kaspersky to get in contact with its officers to provide evidence that their software is all kosher and correct. That's rather odd, since Kaspersky has repeatedly offered to let government inspectors look through its source code to check for any backdoors.

"Given that Kaspersky Lab doesn't have inappropriate ties with any government, the company is disappointed with the decision by the DHS, but also is grateful for the opportunity to provide additional information to the agency in order to confirm that these allegations are completely unfounded," a spokesperson from Kaspersky told The Register.

"No credible evidence has been presented publicly by anyone or any organization, as the accusations are based on false allegations and inaccurate assumptions, including claims about the impact of Russian regulations and policies on the company. Kaspersky Lab has never helped, nor will help, any government in the world with its cyberespionage or offensive cyber efforts, and it's disconcerting that a private company can be considered guilty until proven innocent, due to geopolitical issues."

US intelligence agencies have been briefing politicians and trusted businesspeople in private about the supposed dangers of the Russian firm's code for months now, but haven't offered up a jot of evidence to back up their claims in public. Much like Iraqi weapons of mass destruction, we're being asked to trust them on this one.

There are two possibilities here:

  1. Kaspersky is a tool of the FSB and the intelligence community has hard evidence of this. If that's so, then they should make it public so that ordinary consumers can make their choices from a position of knowledge.
  2. The other option, mooted by some in the security community, is that the US government is pissed off because Kaspersky has found and reported on multiple instances of malware that appear to have been created by the men and women of the NSA. In the current climate, Russia-bashing is popular and the theory goes that the US intelligence community wants a bit of payback.

The move against Kaspersky might be popular in the US, but President Putin is reportedly pissed off at a Russian firm being targeted in the US. Last week he told technology executives in Russia that they should avoid foreign software and use only Russian code.

It's worth noting that China banned Kaspersky software from government contracts in 2014. But it also banned Symantec's code from its systems as well. Only Chinese security software is on the approved purchasing list. ®


Other stories you might like

  • VMware claims ‘bare-metal’ performance from virtualized Nvidia GPUs
    Is... is that why Broadcom wants to buy it?

    The future of high-performance computing will be virtualized, VMware's Uday Kurkure has told The Register.

    Kurkure, the lead engineer for VMware's performance engineering team, has spent the past five years working on ways to virtualize machine-learning workloads running on accelerators. Earlier this month his team reported "near or better than bare-metal performance" for Bidirectional Encoder Representations from Transformers (BERT) and Mask R-CNN — two popular machine-learning workloads — running on virtualized GPUs (vGPU) connected using Nvidia's NVLink interconnect.

    NVLink enables compute and memory resources to be shared across up to four GPUs over a high-bandwidth mesh fabric operating at 6.25GB/s per lane compared to PCIe 4.0's 2.5GB/s. The interconnect enabled Kurkure's team to pool 160GB of GPU memory from the Dell PowerEdge system's four 40GB Nvidia A100 SXM GPUs.

    Continue reading
  • Nvidia promises annual datacenter product updates across CPU, GPU, and DPU
    Arm one year, x86 the next, and always faster than a certain chip shop that still can't ship even one standalone GPU

    Computex Nvidia's push deeper into enterprise computing will see its practice of introducing a new GPU architecture every two years brought to its CPUs and data processing units (DPUs, aka SmartNICs).

    Speaking on the company's pre-recorded keynote released to coincide with the Computex exhibition in Taiwan this week, senior vice president for hardware engineering Brian Kelleher spoke of the company's "reputation for unmatched execution on silicon." That's language that needs to be considered in the context of Intel, an Nvidia rival, again delaying a planned entry to the discrete GPU market.

    "We will extend our execution excellence and give each of our chip architectures a two-year rhythm," Kelleher added.

    Continue reading
  • Now Amazon puts 'creepy' AI cameras in UK delivery vans
    Big Bezos is watching you

    Amazon is reportedly installing AI-powered cameras in delivery vans to keep tabs on its drivers in the UK.

    The technology was first deployed, with numerous errors that reportedly denied drivers' bonuses after malfunctions, in the US. Last year, the internet giant produced a corporate video detailing how the cameras monitor drivers' driving behavior for safety reasons. The same system is now apparently being rolled out to vehicles in the UK. 

    Multiple camera lenses are placed under the front mirror. One is directed at the person behind the wheel, one is facing the road, and two are located on either side to provide a wider view. The cameras are monitored by software built by Netradyne, a computer-vision startup focused on driver safety. This code uses machine-learning algorithms to figure out what's going on in and around the vehicle.

    Continue reading

Biting the hand that feeds IT © 1998–2022