AllInfo

The Federal Trojan – Hacking-Tool of the state

Security

The Federal Trojan – Hacking-Tool of the state

The Ermittlungssoftware has a Permitting. The Federal constitutional court had to use the Ausspähungssoftware narrow limits. What should the program and what could it be?

The “Federal Trojan”, a new Spyware for the Federal criminal police office (BKA), is fully developed and has according to the Federal Ministry of the interior approval. Here are seven questions and answers to the secret Software.

What is a government malware?

This is a type of malware, the investigating authorities such as the Federal criminal police to use in the Computer of suspicious citizens to penetrate. In principle, the program works like a Trojan horse of criminal hackers. The Software that the BKA will use, one speaks also of the “Federal Trojan”.

The editorial recommends

Almost three weeks could the IT network of the Bundestag in the summer after a hacker attack, cannot be used. German security authorities suspect appears to be a Russian intelligence service. (30.01.2016)

In contrast to many other policy fields in the EU at least, the Minister of justice in concert. You want to network-crime together stronger fight. From Amsterdam Bernd Riegert. (26.01.2016)

Device manufacturers, Internet providers and users can be safe, only make together, says Thomas Tschersich, IT-security, head of the Deutsche Telekom before the 3. Cyber Security Summit in the DW-Interview. (02.11.2014)

Often storage companies, your data is no longer on the disk, but somewhere in the big world of the Internet – the virtual Cloud. As it is there with data security and data protection looks like, is often unclear. (26.02.2014)

Security experts point to the IT-Defense conference in Cologne, such as hackers with E-Mails in third-party computer systems can penetrate. This could be the most successful attacks with some caution avoid. (15.02.2014)

Espionage, attacks on communication systems, military hackers – over threats from the network experts will discuss the Cyber Security Summit in Bonn. What strategies help? (12.09.2012)

How does the Trojan on the Computer?

Trojans hide themselves, often in an useful appearing computer program, or in an application – such as a Smartphone App. You can also in a PDF document, a Video or in a picture travel.

The user receives the Trojan and the program on which he depends, either via E-Mail or download from a website. He starts the program or opens the document, it installs the Trojan silently in the Background. Then he changed the system settings so that the Hacker can access over the Internet to the computer or the Smartphone gets. He opens a kind of “back door.” Authorities give sometimes also to directly access to the Computer of the target person, ewa by the Laptop at the airport just out of the Luggage take and install malware.

What can a Hacker in order to do everything?

A Trojan is penetrated, has installed and the Computer or Smartphone for hackers to open, you can practically see everything what the user does: the key commands to read and this passwords recognize the hard drive search or to secretly copy E-mail correspondence or in conference calls such as Skype mitlauschen. Because most computers and mobile phones today have built-in cameras and microphones, a surveillance system with image and sound is also possible.

What can the investigating authorities do?

In Germany, the country and Bundeskriminalämter not do everything, what a Trojan could do. In 2008, the Federal constitutional court for such an Online search sharp boundaries. First, you must have a judges order. This may only happen, if supremely important legal interests are at risk, such as life and limb, or when it comes to staatsgefährdende offences.

Even if these conditions are met, the investigator does not all the technical possibilities of the Trojan to exploit it. You may only use it to “Quellentelekommunikationsüberwachung”. That is to say: E-Mails and messages to read and phone calls interception is allowed, the entire hard drive to search, steal your passwords and the room monitor is not.

Also in Smartphones and Tablets, can Trojans settle in.

Why now comes a new Federal Trojan?

The new program, that today an receive approval, should be programmed so that only the legal forms of Online searching are possible. How the program looks like exactly, no one can say, because the program is obviously top secret. Whether it is at all possible for an efficient Hacking Software with a practical self-restraint equip, is also highly questionable.

It becomes problematic, for example, in the telephone monitoring: allows a surveillance system, however, is not. Technically easy to separate the two functions in telephony over the Internet but do not. Falk Garbsch, a computer scientist and expert of the Chaos Computer club (CCC), highlighted in an interview with Deutsche Welle on it, that it after the initial Installation of the Trojan is always also possible to have more Software components to install, the investigators greater leeway to give. The can then uninstall it again – to tracks to blur.

Know what the Public on state Ausspähungssoftware?

It seep always only sparse information to the Public: in 2011, it is hackers of the Chaos Computer club is successful, a Trojan is in the hands of the Bavarian police at an airport on the Computer of a Suspect has installed. This Trojan should be according to the then decision of the court serve only to telephone conversations, to eavesdrop. The Software was able to but much more: she was suitable, the hard disk to search and the space to be monitored.

Probably uses the BKA, the development of a Software called FinFisher German-British company Elamann/Gamma. This was after the Arab spring, human rights organizations, criticized for monitoring Software even to dictatorial Regimes, such as Egypt and Bahrain has sold.

How can I protect myself?

From the usual criminal-inspired by viruses and Trojans can be seen as a layman and a normal computer user reasonably to protect: in particular, the operating system, Browser and Anti-virus Software is always up to date to keep. You should be on his computer as well as never with full administrator rights log on, but as a user only with the few Rights you really have day to day needs. And you should secure passwords use, the only one in his head keeps. Also includes a good Dose of caution if one surfs the Internet or E-Mails from unknown senders opens. This makes it difficult for hackers the craft.

In front of a targeted attack by the investigating authorities will hardly help, said about CCC-computer Garbsch. These operated a lot more effort to get to your target, get as ordinary Criminals. And this includes, in case of doubt, also, easy physical access to the Computer to get with the screwdriver or the USB Stick.

Exit mobile version