German states say "federal trojan" used within legal boundaries
Posted on 11 October 2011.
Bookmark and Share
The reaction following CCC's claims that a government-made "lawful interception" Trojan has abilities that exceed those allowed by the nation's legislature was rather swift - Joachim Herrmann, the Interior Minister of the Bavaria has confirmed (via Google Translate) that the Trojan in question has been used occasionally by their agencies, but only to effect telecommunication surveillance of suspects.

He also said that it could not be confirmed yet whether the sample that the CCC hackers have analyzed is a test version from the development phase or one that was actually used, but that an investigation into the matter will be mounted to make sure that there was no overstepping of legal boundaries. The Trojan has allegedly been used in 2009.

The confirmation came after a German Lawyer by the name of Patrick Schladt said a client of his had the Trojan installed on his computer during a customs check and that it definitively had screenshot-grabbing capabilities. He said that he was the one who provided this particular sample to the CCC for analysis.

According to Deutsche Welle, a number of other German states - Baden-Württemberg, Brandenburg, Schleswig-Holstein and Lower Saxony - have also confirmed that they have used the Trojan in criminal investigations.

Following requests from security experts, privacy advocates and politicians, federal government spokesman Steffen Seiber confirmed that there will be an investigation into the matter on a federal level. Hopefully it will not only address the use of the Trojan by the authorities, but also the allegations that its features can easily be misused by third parties.






Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Apr 17th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //