Feeds

India issues red alert against US security software

US crypto export rules mean their software isn't safe, warns Defence organisation

  • alert
  • submit to reddit

Bridging the IT gap between rising business demands and ageing tools

The Indian government looks set to forbid Indian banks and financial institutions from using US-developed network security software if the US government does not ease the restrictions it applies to the export of encryption technologies. The announcement was made by India's Central Vigilance Commissioner (CVC), N Vittal, after the country's Defence Research and Development Organisation's (DRDO) centre for artificial intelligence issued a 'red alert' against all network security software developed in the US. The alert warned that, because of the limits the US government places on the size of data encryption keys in exported applications, US software was too easy to hack and could thus prove a security hazard. "To put it bluntly, only insecure software can be exported. When various multinational companies go around peddling 'secure communication software' products to gullible Indian customers, the conveniently neglect to mention this aspect of US export law," said the DRDO in a letter to the CVC, quoted in Indian newspaper The Economic Times. The DRDO's centre for artificial intelligence also warned of the possibility that imported software products could contain technological time bombs designed to "cause havoc to the network when an external command is issued by a hostile nation". Of course, quite how seriously the DRDO takes such a threat is hard to determine, since its red alert letter appears to be as much about promoting its own, indigenously developed encryption software, which is due to me made available for testing in three months' time. "The encryption part of the software is complete and only the communication protocols remain to be written," reported the DRDO. "Since the software has been written by ourselves, there is no upper limit on the security level provided by encryption in the software exported from the USA." Which is, of course, the fundamental flaw with US encryption policy, despite the Department of Commerce's recent relaxation of some of the rules contained in that policy. If user can't get the level of security they want from US software, they'll go elsewhere for it. And India is less likely to limit the export of its own encryption products to other, unsavoury regimes -- though there's no guarantee they wouldn't include their own 'time bombs'... In the meantime, the CVC is expected to wait until the DRDO's own software is ready before issuing an official warning against US security software to India's banks. ®

Build a business case: developing custom apps

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple ran off to IBM
But never fear fanbois, you're still lapping up iPhones, Macs
Nadella: Apps must run on ALL WINDOWS – PCs, slabs and mobes
Phone egg, meet desktop chicken - your mother
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.