Spotlight on: State Trojans

In Greek mythology, the horse outside the city of Troy was a wooden gift in whose hull some of the hostile Achaeans had hidden. Unsuspecting inhabitants, certain of victory over the invaders, pulled it in, the Achaeans climbed out at night and opened the gates for trailing troops, who then captured and destroyed Troy.

Today’s so called state trojan does not disguise itself as a gift and is active even when the enemy is awake. Nevertheless, the reference to the myth fits, because the wooden horses used by criminal investigation agencies may be installed „by means of criminalistic cunning“. First, the investigators find out how the software can best be installed: As a clandestine installation via websites that appear unsuspecting, in downloaded files or an attachment sent by e-mail. It is also possible to introduce the tool by breaking into the device, for example during a secret search of a flat or a police check. „Spotlight on: State Trojans“ weiterlesen

Germany: Trojans for all

The German Bundestag passed new wiretapping laws for secret services and the Federal Police

In future, German secret services will be able to remotely access private computers or telephones with spy software. They will be allowed to intercept not only ongoing but also „inactive“ communications, i.e. to read out data stored on the devices. This was decided in the Bundestag today with the votes of the ruling coalition of Conservatives (CDU/ CSU) and Socialdemocrats (SPD). The vote was on a „Law on the Adaptation of Legislation on the Protection of the Constitution“, which is intended to facilitate the „reconnaissance of serious threats to our democratic constitutional state“. „Germany: Trojans for all“ weiterlesen

Security research: EU Commission to fund technology to decrypt 5G connections

European police authorities are invited to submit proposals for the development of an interception platform. Authorities from third countries can also participate in the research project. Several German initiatives, including those of the domestic secret service, served as door openers.

The EU Commission announces new efforts to break end-to-end encrypted communications. This is according to the work programme of the Horizon 2020 research framework programme, which proposes numerous new projects in the area of „Civil Security for Society“ for the next two years. According to this, the Commission wants to spend five million euros on a platform for penetrating encrypted telephony.

The focus is on intercepting connections of the fifth mobile phone generation, which makes encrypted and anonymised connections technically possible. The project in the research line „Fighting crime and terrorism“ is therefore entitled „Lawful interception using new and emerging technologies (5G & beyond, quantum computing and encryption)“. „Security research: EU Commission to fund technology to decrypt 5G connections“ weiterlesen

How it all began: Five years of fight against end-to-end encryption

The German EU Presidency wants to enable police forces and secret services to circumvent end-to-end encrypted communication or to use technical tools to defeat it.

A look at the activities carried out over the past five years allows some conclusions about who is particularly committed to the new crypto war. In its wake, Europol is also developing new capabilities for using Trojans and cracking encrypted storage media. „How it all began: Five years of fight against end-to-end encryption“ weiterlesen