Want to do business in Russia? Be ready to hand over your source code – Technology & Science

Western technology companies, including Cisco, IBM and SAP, are acceding to demands by Moscow for access to closely guarded product security secrets, at a time when Russia has been accused of a growing number of cyberattacks on the West, a Reuters investigation has found.

Russian authorities are asking Western tech companies to allow them to review source code for security products such as firewalls, anti-virus applications and software containing encryption before permitting the products to be imported and sold in the country.

The requests, which have increased since 2014, are ostensibly done to ensure that foreign spy agencies haven’t hidden any “backdoors” that would allow them to burrow into Russian systems.

But those inspections also provide the Russians an opportunity to find vulnerabilities in the products’ source code — instructions that control the basic operations of computer equipment, current and former U.S. officials and security experts said.

While a number of U.S. companies say they are playing ball to preserve their entree to Russia’s huge tech market, at least one, Symantec, told Reuters it has stopped co-operating with the source code reviews over security concerns. That halt has not been previously reported.

Symantec said one of the labs inspecting its products wasn’t independent enough from the Russian government.

Demands to examine source code are being made by Russia’s Federal Security Service (FSB), whose headquarters are pictured here. The U.S. government says the FSB took part in the cyberattacks on Hillary Clinton’s 2016 presidential campaign and the 2014 hack of 500 million Yahoo email accounts. (Maxim Shemetov/Reuters)

U.S. officials say they have warned firms about the risks of allowing the Russians to review their products’ source code, because of fears it could be used in cyberattacks. But they say they have no legal authority to stop the practice unless the technology has restricted military applications or…

Read the full article from the Source…

Leave a Reply

Your email address will not be published. Required fields are marked *