Feeds

Swiss gov 'mulls' spyware to tap VoIP calls

Paging Superintendent Trojan

Boost IT visibility and business value

The Swiss government is "considering" the use of a spyware application called Superintendent Trojan to eavesdrop on IP telephony conversation, Heise Security reports.

Swiss firm ERA IT Solutions said it hopes to supply the Superintendent Trojan only to government agencies, a policy it hopes will leave it off malware blacklists compiled by anti-virus and anti-spyware developers.

Even if we accept ERA's assertion that the use of the technology would be restricted to government agencies, anti-virus firms would be honour bound to blacklist the app if any of their customers complained about it.

As well as allowing VoIP calls to be monitored, the software is surreptitiously turning on the built-in microphones or webcams on target PCs. All this assumes, of course, that the software can be successfully planted in the first place - a tricky proposition without physical access to a PC, as HP leak gum-shoes might attest.

Altogether the plan seems fraught with difficulties, without even considering whether evidence obtained via such covert methods would be legally submittable.

Charles Gudet, the head of the Special Services Department at UVEK (the Swiss government department in charge of telecoms, among other things), told Sonntags Zeitung there's no basis for using such Trojan techniques under federal wiretap laws (such as the Federal Post and Telecommunications Surveillance Act). However, local laws and federal police procedures permit the use of software wiretaps providing surveillance has being authorised by a court. ®

The essential guide to IT transformation

More from The Register

next story
Déjà vu: Virgin Media jacks up broadband prices
Screw copper phone lines, we're UNIQUE, bleats telco
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
Netflix swallows yet another bitter pill, inks peering deal with TWC
Net neutrality crusader once again pays up for priority access
Fifteen zero days found in hacker router comp romp
Four routers rooted in SOHOpelessly Broken challenge
New Sprint CEO says he will lower axe on staff – but prices come first
'Very disruptive' new rates to be revealed next week
US TV stations bowl sueball directly at FCC's spectrum mega-sale
Broadcasters upset about coverage and cost as they shift up and down the dials
UK mobile coverage is BETTER than EVER, networks tell Ofcom
Regulator swallows this line and parrots it back out at us. What are they playing at?
What's the nature of your emergency, Vodafone?
Oh, you've dialled the wrong number for ad fibs, rules ASA
EE network whacked by 'PDP authentication failure' blunder
Carrier is 'aware' of cockup, working on a fix NOW
ROAD TRIP! An FCC road trip – Leahy demands net neutrality debate across US
You crashed watchdog's site, now time to crash its ears
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
BYOD's dark side: Data protection
An endpoint data protection solution that adds value to the user and the organization so it can protect itself from data loss as well as leverage corporate data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?