Spotlight on: State Trojans

In Greek mythology, the horse outside the city of Troy was a wooden gift in whose hull some of the hostile Achaeans had hidden. Unsuspecting inhabitants, certain of victory over the invaders, pulled it in, the Achaeans climbed out at night and opened the gates for trailing troops, who then captured and destroyed Troy.

Today’s so called state trojan does not disguise itself as a gift and is active even when the enemy is awake. Nevertheless, the reference to the myth fits, because the wooden horses used by criminal investigation agencies may be installed „by means of criminalistic cunning“. First, the investigators find out how the software can best be installed: As a clandestine installation via websites that appear unsuspecting, in downloaded files or an attachment sent by e-mail. It is also possible to introduce the tool by breaking into the device, for example during a secret search of a flat or a police check. „Spotlight on: State Trojans“ weiterlesen

Germany: Trojans for all

The German Bundestag passed new wiretapping laws for secret services and the Federal Police

In future, German secret services will be able to remotely access private computers or telephones with spy software. They will be allowed to intercept not only ongoing but also „inactive“ communications, i.e. to read out data stored on the devices. This was decided in the Bundestag today with the votes of the ruling coalition of Conservatives (CDU/ CSU) and Socialdemocrats (SPD). The vote was on a „Law on the Adaptation of Legislation on the Protection of the Constitution“, which is intended to facilitate the „reconnaissance of serious threats to our democratic constitutional state“. „Germany: Trojans for all“ weiterlesen