Russian Hi-Tech Spy Devices

Emblem of the The GRU (Glavnoye Razvedyvatel'noye Upravleniye), Russia's largest foreign intelligence agency.

New Russian technologies, including phone call interception and a facial recognition app, have stirred a fierce debate about privacy and data monitoring.

Infowatch, a Moscow-based IT security company managed by businesswoman Natalya Kasperskaya, found itself in hot water last month after it revealed it had invented a system that companies can use to intercept employees’ mobile phone conversations.

Companies outside Russia have also devised call interception software, and Infowatch already markets products that monitor employees’ e-mails, USB keys and printers.

But Kasperskaya says she was taken aback by the storm that surrounded the mobile phone innovation. “We weren’t expecting this. For us it was only another channel of communication,” Kasperskaya told AFP in an interview.

The Russian authorities and members of the public lashed the invention as a breach of law or infringement of privacy.

Infowatch traces its origins back to 1997, when Kasperskaya and her then-husband, now divorced, Eugene Kaspersky co-founded the Kaspersky Lab security software company, which has gone on to global success.

The goal behind phonecall interception, Kasperskaya said, is to provide large businesses with a tool to prevent information leaks, including companies whose success depends on protecting corporate secrets.

Communications minister Nikolai Nikiforov said a court ruling was needed to get permission to tap phones. The speaker of Russia’s lower house of parliament, Sergei Naryshkin, said he feared such technologies could be used to malicious ends.

Facing objections from the authorities, the company has refrained from designing a voice recognition system, even though there is demand from sensitive sectors including banking, the oil industry and large public companies.

Monitoring of communications by private corporations touches a nerve in a country where the shadowy KGB security service once monitored dissidents and where the state is keen to retain its grip on citizens’ personal data.

The KGB’s post-Soviet successor, the FSB, has long used a sophisticated system called SORM to carry out surveillance communications by telephone or on the Internet.

The revelations of whistleblower Edward Snowden showed that the US National Security Agency also carries out surveillance on a mass scale.

Human rights advocacy group Agora has said that nine million Russians, including opposition figures and political activists, have come under state surveillance since 2007.

Their mobiles have been taped, their e-mails read and their movements tracked by what Agora calls a “political policing instrument.”

Infowatch has tried to assuage concerns, insisting its new system is still at a preliminary stage. The company said that only a restricted number of telephone lines will be targeted and monitored with the employee’s consent.

The monitoring is done by software that picks out key words from the phone conversations, it said. “We have to prove that our system does not constitute phone tapping. We would by no means release on the market a system that does not respect the law,” Kasperskaya said. In any case, Kasperskaya observed, new technologies are nudging us toward a world where there are “no secrets.”

Another debate has been stirred by a new Russian smartphone app known as FindFace. It allows users to photograph strangers on the street and identify their pages on social network site VK, Russia’s equivalent of Facebook, which hosts 350 million accounts. The app has had staggering success, with a million downloads since it was made available in February.

In half a second, the app can peruse a database of 300 million pictures and match one to a stranger’s photograph, said one of the creators, 26-year-old Artyom Kukharenko, who co-founded Moscow’s NTechLaB.

But in its first few weeks, the app has already brewed controversy. Some users used it to identify the VK page of a porn actress and bombarded her with threatening messages.

On the other hand, police caught arsonists who set fire to a Saint Petersburg construction site after identifying their images on security camera footage using FindFace.  “This is a demonstration of our technology,” Kukharenko told AFP, adding that his app had garnered interest from companies throughout the globe. “The real use of the algorithm will be for security services, banks, distributors and for leisure activities,” as well as for dating services and those who wish to meet strangers they saw on the street or even someone who just looks similar, he said.

IT security specialist Mikhail Yemelyannikov says that FindFace does not violate any existing legislation because the social media pages it trawls contain pictures with unrestricted access. “The problems start later: what will the result be used for?” he said. “Legislation will never evolve as fast as technology.”

Interaksyon:

 

« Managing The Rise Of The Killer Robots
Raytheon Says $1Billion Cyber Contract Confirmed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Security Affairs

Security Affairs

Security Affairs is a blog covering all aspects of cyber security.

Logz.io

Logz.io

Logz.io is an AI-powered log analysis platform that offers the open source ELK Stack as a enterprise-grade cloud service with machine learning technology.

Total Defense

Total Defense

Total Defense solutions include anti-malware, anti-virus, intrusion prevention & mobile security.

CyberSAFE Malaysia

CyberSAFE Malaysia

CyberSAFE Malaysia is an initiative to educate and enhance the awareness of the general public on the technological and social issues and risks facing internet users.

BluBracket

BluBracket

BluBracket is the first comprehensive security solution that makes code safe—so developers can innovate and collaborate, and security teams can sleep at night.

Resistant AI

Resistant AI

Resistant AI protects against evolving online fraud. We connect the dots to provide a new layer of trust and performance for our clients’ systems.

Software Diversified Services (SDS)

Software Diversified Services (SDS)

SDS provides the highest quality mainframe software and award-winning, expert service with an emphasis on security, encryption, monitoring, and data compression.

Hyperwise Ventures

Hyperwise Ventures

Hyperwise Ventures lead seed investments in startups in the cyber security and enterprise software spaces.

Fastcomcorp

Fastcomcorp

Fastcomcorp offers a world-class proactive cyber security defense and risk management consulting. Including Darkweb monitoring and posture assessments.

Gula Tech Adventures

Gula Tech Adventures

Gula Tech Adventures invests in companies and nonprofits that help close the gap in needed technology and workforce to defend the country in cyberspace.

Protek International

Protek International

Protek International delivers world-class Digital Forensics, eDiscovery, Cyber Security, and related Advisory services.

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection (HIP) is the premier educational forum for identity-centric cybersecurity practitioners charged with defending hybrid cloud environments.

Fletch

Fletch

Fletch’s AI tracks the evolving cybersecurity threat landscape by reading and interpreting every threat article every day and matching those threats to a company’s exposure.

Fivecast

Fivecast

Fivecast is enabling a safer world. We help organizations around the world explore masses of data to uncover actionable insights.

rThreat

rThreat

rThreat is a cloud-based SaaS solution that challenges your cyber defenses using real-world and custom threats in a secure environment, ensuring your readiness for attacks.

Infosec Ventures

Infosec Ventures

Infosec Ventures incubates and scales cyber security innovators that solve inefficiencies in cyber security.