Security Architectures in the EU

Tag: ETSI

  • “Wicked problem”: Europol considers vulnerability exploitation to break encryption

    “Wicked problem”: Europol considers vulnerability exploitation to break encryption

    At a conference hosted by the EU police agency, three ways to decrypt communications and storage media were discussed. One of the approaches was apparently pushed by the Bavarian State Office of Criminal Investigation. For at least seven years, EU member states have been looking for ways to give their law enforcement agencies access to […]

  • Encrypted communication: UK remains member of EU interception group

    Encrypted communication: UK remains member of EU interception group

    Despite Brexit, British police can influence surveillance laws in the EU. The country is also represented in European secret service circles. Notwithstanding its exit from the European Union, the British police will remain a member of a Standing Heads of Lawful Interception Units based at Europol. The UK is represented there by the National Crime […]

  • Germany: Further step towards the introduction of “Cell Broadcast“

    Germany: Further step towards the introduction of “Cell Broadcast“

    So far, German authorities can only notify mobile phones of an impending disaster if their owners have registered beforehand. Soon it will be possible to warn all phones within a certain radius. It is questionable who will decide whether to send such a message. The German government is another step closer to introducing the “Cell […]

  • Security research: EU Commission to fund technology to decrypt 5G connections

    Security research: EU Commission to fund technology to decrypt 5G connections

    European police authorities are invited to submit proposals for the development of an interception platform. Authorities from third countries can also participate in the research project. Several German initiatives, including those of the domestic secret service, served as door openers. The EU Commission announces new efforts to break end-to-end encrypted communications. This is according to […]