Russian Hi-Tech Spy Devices

Emblem of the The GRU (Glavnoye Razvedyvatel'noye Upravleniye), Russia's largest foreign intelligence agency.

New Russian technologies, including phone call interception and a facial recognition app, have stirred a fierce debate about privacy and data monitoring.

Infowatch, a Moscow-based IT security company managed by businesswoman Natalya Kasperskaya, found itself in hot water last month after it revealed it had invented a system that companies can use to intercept employees’ mobile phone conversations.

Companies outside Russia have also devised call interception software, and Infowatch already markets products that monitor employees’ e-mails, USB keys and printers.

But Kasperskaya says she was taken aback by the storm that surrounded the mobile phone innovation. “We weren’t expecting this. For us it was only another channel of communication,” Kasperskaya told AFP in an interview.

The Russian authorities and members of the public lashed the invention as a breach of law or infringement of privacy.

Infowatch traces its origins back to 1997, when Kasperskaya and her then-husband, now divorced, Eugene Kaspersky co-founded the Kaspersky Lab security software company, which has gone on to global success.

The goal behind phonecall interception, Kasperskaya said, is to provide large businesses with a tool to prevent information leaks, including companies whose success depends on protecting corporate secrets.

Communications minister Nikolai Nikiforov said a court ruling was needed to get permission to tap phones. The speaker of Russia’s lower house of parliament, Sergei Naryshkin, said he feared such technologies could be used to malicious ends.

Facing objections from the authorities, the company has refrained from designing a voice recognition system, even though there is demand from sensitive sectors including banking, the oil industry and large public companies.

Monitoring of communications by private corporations touches a nerve in a country where the shadowy KGB security service once monitored dissidents and where the state is keen to retain its grip on citizens’ personal data.

The KGB’s post-Soviet successor, the FSB, has long used a sophisticated system called SORM to carry out surveillance communications by telephone or on the Internet.

The revelations of whistleblower Edward Snowden showed that the US National Security Agency also carries out surveillance on a mass scale.

Human rights advocacy group Agora has said that nine million Russians, including opposition figures and political activists, have come under state surveillance since 2007.

Their mobiles have been taped, their e-mails read and their movements tracked by what Agora calls a “political policing instrument.”

Infowatch has tried to assuage concerns, insisting its new system is still at a preliminary stage. The company said that only a restricted number of telephone lines will be targeted and monitored with the employee’s consent.

The monitoring is done by software that picks out key words from the phone conversations, it said. “We have to prove that our system does not constitute phone tapping. We would by no means release on the market a system that does not respect the law,” Kasperskaya said. In any case, Kasperskaya observed, new technologies are nudging us toward a world where there are “no secrets.”

Another debate has been stirred by a new Russian smartphone app known as FindFace. It allows users to photograph strangers on the street and identify their pages on social network site VK, Russia’s equivalent of Facebook, which hosts 350 million accounts. The app has had staggering success, with a million downloads since it was made available in February.

In half a second, the app can peruse a database of 300 million pictures and match one to a stranger’s photograph, said one of the creators, 26-year-old Artyom Kukharenko, who co-founded Moscow’s NTechLaB.

But in its first few weeks, the app has already brewed controversy. Some users used it to identify the VK page of a porn actress and bombarded her with threatening messages.

On the other hand, police caught arsonists who set fire to a Saint Petersburg construction site after identifying their images on security camera footage using FindFace.  “This is a demonstration of our technology,” Kukharenko told AFP, adding that his app had garnered interest from companies throughout the globe. “The real use of the algorithm will be for security services, banks, distributors and for leisure activities,” as well as for dating services and those who wish to meet strangers they saw on the street or even someone who just looks similar, he said.

IT security specialist Mikhail Yemelyannikov says that FindFace does not violate any existing legislation because the social media pages it trawls contain pictures with unrestricted access. “The problems start later: what will the result be used for?” he said. “Legislation will never evolve as fast as technology.”

Interaksyon:

 

« Managing The Rise Of The Killer Robots
Raytheon Says $1Billion Cyber Contract Confirmed »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

RedSeal

RedSeal

RedSeal’s network modeling and risk scoring platform is the foundation for enabling enterprise networks to be resilient to cyber events.

Codified Security

Codified Security

Codified is a testing platform for mobile application software. We make it easier than ever for companies to detect and fix security vulnerabilities and ensure their applications are compliant.

Oneconsult

Oneconsult

Oneconsult provides cyber security services focusing on penetration tests / ethical hacking, ISO 27001 security audits and incident response & IT forensics.

TCN

TCN

TCN is an advanced System Integrator and Infrastructure Company in Albania.

Agility Networks

Agility Networks

Agility Networks is a technology company providing integrated services and solutions for Digital Transformation and Cyber Security.

AFNOR Group

AFNOR Group

AFNOR Group designs and deploys solutions based on voluntary standards around the world and provides services including training, professional and technical information, assessment and certification.

oneM2M

oneM2M

oneM2M is a global organization creating a scalable and interoperable standard for communications of devices and services used in M2M applications and the Internet of Things.

CryptoCurrency Certification Consortium (C4)

CryptoCurrency Certification Consortium (C4)

The CryptoCurrency Certification Consortium is a non-profit organization that provides certifications to professionals who perform cryptocurrency-related services.

Digital Pathways

Digital Pathways

Digital Pathways is an award-winning data security provider that helps businesses protect their digital assets.

Involta

Involta

Involta orchestrates IT transformation journeys using well-defined and rigorous processes to deliver hybrid cloud solutions, consulting and data center services tailored to our clients’ needs.

National Cybersecurity Alliance

National Cybersecurity Alliance

The National Cybersecurity Alliance is a non-profit organization on a mission to create a more secure, interconnected world.

Rhymetec

Rhymetec

Rhymetec are an industry leader in cloud security, providing innovative cybersecurity and data privacy services to the modern-day SaaS business.

Block Harbor Cybersecurity

Block Harbor Cybersecurity

Block Harbor has worked closely with automakers, suppliers, and regulators since 2014 on vehicle cybersecurity.

Xeol

Xeol

Software free of vulnerabilities, built and distributed by trusted entities. Our mission is to help customers secure their software from code to deploy.

Frontier Technology Inc. (FTI)

Frontier Technology Inc. (FTI)

Frontier Technology Inc provides the technology and deep data expertise to drive the best defense and intelligence solutions.

Blackmere Consulting

Blackmere Consulting

Blackmere Consulting is a Nationwide Technical and Executive Recruiting firm dedicated to Cyber Security and Information Technology.