In Greek mythology, the horse outside the city of Troy was a wooden gift in whose hull some of the hostile Achaeans had hidden. Unsuspecting inhabitants, certain of victory over the invaders, pulled it in, the Achaeans climbed out at night and opened the gates for trailing troops, who then captured and destroyed Troy.
Today’s so called state trojan does not disguise itself as a gift and is active even when the enemy is awake. Nevertheless, the reference to the myth fits, because the wooden horses used by criminal investigation agencies may be installed „by means of criminalistic cunning“. First, the investigators find out how the software can best be installed: As a clandestine installation via websites that appear unsuspecting, in downloaded files or an attachment sent by e-mail. It is also possible to introduce the tool by breaking into the device, for example during a secret search of a flat or a police check. „Spotlight on: State Trojans“ weiterlesen
The German Bundestag passed new wiretapping laws for secret services and the Federal Police
In future, German secret services will be able to remotely access private computers or telephones with spy software. They will be allowed to intercept not only ongoing but also „inactive“ communications, i.e. to read out data stored on the devices. This was decided in the Bundestag today with the votes of the ruling coalition of Conservatives (CDU/ CSU) and Socialdemocrats (SPD). The vote was on a „Law on the Adaptation of Legislation on the Protection of the Constitution“, which is intended to facilitate the „reconnaissance of serious threats to our democratic constitutional state“. „Germany: Trojans for all“ weiterlesen
The German EU Presidency wants to enable police forces and secret services to circumvent end-to-end encrypted communication or to use technical tools to defeat it.
A look at the activities carried out over the past five years allows some conclusions about who is particularly committed to the new crypto war. In its wake, Europol is also developing new capabilities for using Trojans and cracking encrypted storage media. „How it all began: Five years of fight against end-to-end encryption“ weiterlesen
The German police also uses a „decryption platform“ at Europol. The system belongs to an „innovation laboratory“ and is currently being equipped with new technology. The EU Commission will soon decide whether Europol should also handle the decryption of secure connections.
Since 2014, Europol has been offering Member States support in decrypting data carriers or mobile phones. The unit is based at the „Centre for Combating Cybercrime“ (EC3), which was set up a year earlier at the headquarters of the EU Police Agency in The Hague. What forensic tools Europol uses for this purpose is not answered by the European Commission, which is responsible for the functioning of the EU agencies.
According to Europol’s annual report for 2018, the „decryption platform“ has been requested 32 times since its creation, in 12 cases successfully. Operations are carried out in various fields, including cybercrime, drug trafficking and migrant smuggling. According to the German government, the services are also available to third states. „Backdoors vs. Trojans: Europol is examining „solutions“ against end-to-end encryption“ weiterlesen
European police should access computers and telephones with Trojan programs. Europol is now building up a „decryption platform“ in The Hague.
The European Union wants to support the Member States in intercepting telecommunications. Investigators should be able to penetrate private computers or mobile phones to install software to read encrypted messages. This was confirmed by the German Federal Ministry of the Interior (MOI) in response to a question by a Left Party Member of Parliament. The focus is on the police agency Europol, which has been commissioned to set up a „decryption platform“. „Europol to coordinate hacking authorities in Member States“ weiterlesen
The German Federal Office of Criminal Investigation (BKA) instructed the authorities of multiple North African and Middle Eastern countries in internet surveillance in the years running up to the Arab Spring, according to information released by the German government following questioning by Die Linke (Left Party) in April 2013.  Training in Tunisia and Egypt occurred shortly before the revolts in those countries, where control of the internet played a key role in allowing the government to undermine the uprisings.
Participants in the BKA-run courses were secret service-like police forces, such as the Egyptian State Security Service („Staatssicherheitsdienst“). Agencies from Jordan, Saudi Arabia and Algeria also benefited from the seminars. Furthermore, Moroccan agencies received material aid including, among other things, police analytic software developed by IBM. „German police instructed Tunisia and Egypt on internet surveillance prior to revolutions“ weiterlesen