Feeds

Germany floats Trojan for terror suspects

Baldrick-style cunning plan

Beginner's guide to SSL certificates

German politicians have defended plans to email Trojan horse software to terror suspects in the hopes of monitoring their conversations. The measures have sparked a fierce civil liberties debate. The dubious efficacy of the wheeze is yet to come under serious consideration.

Interior Minister Wolfgang Schaeuble is seeking police powers to harness malware in upcoming federal security laws. AP reports that snoopware would be developed by the German government rather than existing commercial software. Using malware to spy on terror suspects would "cover a serious and scandalous hole in our information that has arisen through technical changes in recent years," according to Stefan Kaller, a spokesman for Schaeuble.

It would, of course, be far more straightforward to bug the PCs of suspects by physically planting keystroke monitors or the like to their machines, rather than chancing matters to email. Proposals to give explicit permission for law enforcement officials to plant such malware stems from a Federal Court ruling earlier this year declaring clandestine searches of suspects' computers to be inadmissible as evidence pending a law regulating the practice. Germany's Federal Court of Justice said that the practice was not covered by existing lawful surveillance legislation.

The Bill is yet to be finalised, but proposals leaked to the German media involve the idea of booby trapping messages ostensible from the German Finance Ministry or the Youth Services Office.

Would-be terrorists need only use Ubuntu Linux to avoid the ploy. And even if they stuck with Windows their anti-virus software might detect the malware. Anti-virus firms that accede to law enforcement demands to turn a blind eye to state-sanctioned malware risk undermining trust in their software, as similar experience in the US has shown.

Once the malware gets into circulation there's no guarantee it won't be turned against innocent users.

The whole concept is loaded with irony. For one thing, German government computers, like those in the UK before them, are currently under targeted Trojan assault. Meanwhile, recently introduced German legislation criminalises possession of hacking tools through vaguely worded measures that also appear to make network security tools illegal, though this is yet to be tested in court.

Altogether the German Trojan proposals are a thoroughly bad idea. ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
China hacked US Army transport orgs TWENTY TIMES in ONE YEAR
FBI et al knew of nine hacks - but didn't tell TRANSCOM
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.