Restrictive in cyberspace

New German cybersecurity guidelines harbour even more surveillance and centralised powers

The Federal Cabinet today approved the new „Cybersecurity Strategy for Germany“. The draft, prepared by the Federal Ministry of the Interior, is to be in place for five years and replaces the previous version from 2016. The document describes four different guidelines. Cybersecurity is to be understood as a joint task of the state, business, science and society. Associations as well as citizens themselves should also find „common answers“ to cyber threats. Under the heading „Digital Sovereignty“, the Federal Government wants to invest more in research and develop cyber security into a quality feature „Made in Germany“. „Restrictive in cyberspace“ weiterlesen

Spotlight on: State Trojans

In Greek mythology, the horse outside the city of Troy was a wooden gift in whose hull some of the hostile Achaeans had hidden. Unsuspecting inhabitants, certain of victory over the invaders, pulled it in, the Achaeans climbed out at night and opened the gates for trailing troops, who then captured and destroyed Troy.

Today’s so called state trojan does not disguise itself as a gift and is active even when the enemy is awake. Nevertheless, the reference to the myth fits, because the wooden horses used by criminal investigation agencies may be installed „by means of criminalistic cunning“. First, the investigators find out how the software can best be installed: As a clandestine installation via websites that appear unsuspecting, in downloaded files or an attachment sent by e-mail. It is also possible to introduce the tool by breaking into the device, for example during a secret search of a flat or a police check. „Spotlight on: State Trojans“ weiterlesen

Germany: Trojans for all

The German Bundestag passed new wiretapping laws for secret services and the Federal Police

In future, German secret services will be able to remotely access private computers or telephones with spy software. They will be allowed to intercept not only ongoing but also „inactive“ communications, i.e. to read out data stored on the devices. This was decided in the Bundestag today with the votes of the ruling coalition of Conservatives (CDU/ CSU) and Socialdemocrats (SPD). The vote was on a „Law on the Adaptation of Legislation on the Protection of the Constitution“, which is intended to facilitate the „reconnaissance of serious threats to our democratic constitutional state“. „Germany: Trojans for all“ weiterlesen

How it all began: Five years of fight against end-to-end encryption

The German EU Presidency wants to enable police forces and secret services to circumvent end-to-end encrypted communication or to use technical tools to defeat it.

A look at the activities carried out over the past five years allows some conclusions about who is particularly committed to the new crypto war. In its wake, Europol is also developing new capabilities for using Trojans and cracking encrypted storage media. „How it all began: Five years of fight against end-to-end encryption“ weiterlesen

Backdoors vs. Trojans: Europol is examining „solutions“ against end-to-end encryption

The German police also uses a „decryption platform“ at Europol. The system belongs to an „innovation laboratory“ and is currently being equipped with new technology. The EU Commission will soon decide whether Europol should also handle the decryption of secure connections.

Since 2014, Europol has been offering Member States support in decrypting data carriers or mobile phones. The unit is based at the „Centre for Combating Cybercrime“ (EC3), which was set up a year earlier at the headquarters of the EU Police Agency in The Hague. What forensic tools Europol uses for this purpose is not answered by the European Commission, which is responsible for the functioning of the EU agencies.

According to Europol’s annual report for 2018, the „decryption platform“ has been requested 32 times since its creation, in 12 cases successfully. Operations are carried out in various fields, including cybercrime, drug trafficking and migrant smuggling. According to the German government, the services are also available to third states. „Backdoors vs. Trojans: Europol is examining „solutions“ against end-to-end encryption“ weiterlesen

Europol to coordinate hacking authorities in Member States

European police should access computers and telephones with Trojan programs. Europol is now building up a „decryption platform“ in The Hague.

The European Union wants to support the Member States in intercepting telecommunications. Investigators should be able to penetrate private computers or mobile phones to install software to read encrypted messages. This was confirmed by the German Federal Ministry of the Interior (MOI) in response to a question by a Left Party Member of Parliament. The focus is on the police agency Europol, which has been commissioned to set up a „decryption platform“. „Europol to coordinate hacking authorities in Member States“ weiterlesen

German police instructed Tunisia and Egypt on internet surveillance prior to revolutions

The German Federal Office of Criminal Investigation (BKA) instructed the authorities of multiple North African and Middle Eastern countries in internet surveillance in the years running up to the Arab Spring, according to information released by the German government following questioning by Die Linke (Left Party) in April 2013. [1] Training in Tunisia and Egypt occurred shortly before the revolts in those countries, where control of the internet played a key role in allowing the government to undermine the uprisings.

Participants in the BKA-run courses were secret service-like police forces, such as the Egyptian State Security Service („Staatssicherheitsdienst“). Agencies from Jordan, Saudi Arabia and Algeria also benefited from the seminars. Furthermore, Moroccan agencies received material aid including, among other things, police analytic software developed by IBM. „German police instructed Tunisia and Egypt on internet surveillance prior to revolutions“ weiterlesen