[ Yesterday Evening ]: Fox News
[ Yesterday Evening ]: WHTM
[ Yesterday Evening ]: reuters.com
[ Yesterday Afternoon ]: Newsweek
[ Yesterday Afternoon ]: Reuters
[ Yesterday Afternoon ]: Dwell
[ Yesterday Afternoon ]: Patch
[ Yesterday Afternoon ]: Seattle Times
[ Yesterday Afternoon ]: The Conversation
[ Yesterday Afternoon ]: HELLO! Magazine
[ Yesterday Afternoon ]: Arizona Daily Star
[ Yesterday Morning ]: Gadget Review
[ Yesterday Morning ]: Los Angeles Times
[ Yesterday Morning ]: WSB-TV
[ Yesterday Morning ]: Vox
[ Yesterday Morning ]: KIRO-TV
[ Yesterday Morning ]: BBC
[ Yesterday Morning ]: Time
[ Last Sunday ]: Cowboy State Daily
[ Last Sunday ]: The Denver Post
[ Last Sunday ]: MSN
[ Last Sunday ]: Fortune
[ Last Sunday ]: GOOD
[ Last Sunday ]: The Messenger
[ Last Sunday ]: Columbus Dispatch
[ Last Sunday ]: Seattle Times
[ Last Sunday ]: Politico
[ Last Sunday ]: kcra.com
[ Last Sunday ]: Her Campus
[ Last Sunday ]: Chicago Tribune
[ Last Sunday ]: Reason.com
[ Last Sunday ]: BBC
[ Last Sunday ]: Patch
[ Last Sunday ]: clickondetroit.com
[ Last Sunday ]: dpa international
[ Last Sunday ]: The Daily Beast
[ Last Sunday ]: thedispatch.com
[ Last Saturday ]: Las Vegas Review-Journal
[ Last Saturday ]: Investopedia
[ Last Saturday ]: BBC
[ Last Saturday ]: Variety
[ Last Saturday ]: Politico
[ Last Saturday ]: The Independent
[ Last Saturday ]: CBS News
[ Last Saturday ]: Impacts
The Kaspersky Dilemma: Balancing Security Risks and Tactical Necessity
Gadget ReviewLocale: UNITED STATES

The Regulatory Conflict
The U.S. government has long viewed Kaspersky Lab, a company founded in Russia, as a significant security risk. The primary concern is not necessarily the software's inherent code, but the legal and political environment in which the company operates. Under Russian law, the state can compel domestic companies to cooperate with intelligence services, such as the FSB. This creates a potential vector for the Russian government to gain access to sensitive data, create backdoors, or monitor the activities of U.S. government agencies.
Consequently, the Pentagon and other federal entities have moved to purge Kaspersky products from their systems, categorizing the vendor as a "high-risk" entity. These blacklists are designed to ensure a clean break from adversary-linked technology to prevent espionage and data exfiltration.
Operational Necessity vs. Policy
The continued use of Kaspersky software by the NSA suggests a tension between theoretical security policy and practical intelligence requirements. In the world of signals intelligence (SIGINT) and cyber warfare, the NSA often requires tools that can analyze the very threats they are fighting.
Kaspersky is globally recognized for its deep expertise in detecting and analyzing sophisticated malware, particularly those originating from Eastern Europe and Russia. For an agency tasked with defending the U.S. against state-sponsored cyber attacks, having access to the same diagnostic tools used by the adversary--or tools that are uniquely capable of identifying adversary patterns--is often viewed as a tactical necessity. This creates a scenario where the tool deemed too dangerous for general government use is considered indispensable for the specialists at the NSA.
Risks and Mitigations
The presence of blacklisted software within a high-security environment like the NSA is not without risk. The fundamental danger remains: if the software communicates with external servers or contains hidden triggers, it could potentially compromise the integrity of the network it resides on.
Typically, intelligence agencies mitigate these risks by deploying such software in "sandboxed" environments--isolated networks that are physically or logically separated from the rest of the agency's critical infrastructure. By isolating the software, the NSA can leverage the tool's analytical power without allowing it access to sensitive intelligence or the broader government network.
Key Details of the Situation
- The Blacklist: The Pentagon has officially banned Kaspersky software due to the risk of Russian state influence and potential espionage.
- NSA Integration: Despite the ban, the NSA maintains the use of Kaspersky products for specific technical functions.
- The Russian Connection: The core of the security concern is the Russian government's ability to compel Kaspersky to provide access to data.
- Strategic Value: The software is highly valued for its ability to detect and reverse-engineer complex malware.
- Policy Gap: There is a documented disconnect between the broader Department of Defense security directives and the internal operational choices of the NSA.
Implications for Federal Cybersecurity
This situation highlights a recurring theme in national security: the "exception for intelligence." While the rest of the federal government is urged to move toward a "Zero Trust" architecture and eliminate high-risk vendors, the agencies tasked with active espionage and counter-espionage often operate under a different set of rules.
If the most sophisticated cyber agency in the world determines that the utility of a banned tool outweighs its inherent risk, it raises questions about the feasibility of a total ban on adversary-linked software across the rest of the government. However, it also underscores the precarious balance the NSA must maintain--utilizing the enemy's tools to fight the enemy, while ensuring those tools do not become the very bridge the adversary uses to enter the fortress.
Read the Full Gadget Review Article at:
https://www.yahoo.com/news/articles/despite-pentagon-blacklist-nsa-using-143632351.html
[ Last Sunday ]: kcra.com
[ Last Sunday ]: thedispatch.com
[ Last Saturday ]: Politico
[ Last Saturday ]: CNN
[ Last Saturday ]: Politico
[ Last Saturday ]: The Independent
[ Last Saturday ]: Fox News
[ Last Friday ]: CNN
[ Last Friday ]: Newsweek
[ Last Thursday ]: Forbes
[ Last Thursday ]: The Telegraph
[ Last Thursday ]: Yahoo