Feeds

Bavaria sanctions police spyware

Trojan horse rides roughshod over opposition

Secure remote control for conventional and virtual desktops

Bavaria has become the first German state to approve laws that allow police to plant spyware on the PCs of terror suspects.

The controversial measures allow local law enforcement officials to plant Trojans on the PCs of terror suspects (and potentially other serious criminals) from the start of August, Heise reports (Google translation here). Although there are safeguards, the measures go further than those enable by federal legislation, passed in June. Federal laws prohibit physically tampering with suspects' computers, restricting the tactic to spyware delivered by email.

Bavarian laws, by contrast, allow police to sneak into suspects' homes in cases where attempts to remotely install so-called remote forensic software fail. In these cases, physical search of a suspect's residence would also be allowed. The powers are restricted to cases where "urgent threats" to life are suspected. Importantly judicial warrants would not need to be obtained in these circumstances, Heise notes.

Opposition Green and social democrat politicians voted against the measures, contained in the Bavarian Constitutional Protection Act, arguing that the legislation is "unconstitutional". Bavarian interior minister Joachim Herrmann disputes this interpretation of the law, arguing the procedures are in line with both federal laws and the constitution. Opposition politicians and civil liberties campaigners fear that the powers could be applied to a far wider range of criminal suspects while paving the way for fishing expeditions.

As well as the dragnet concerns security experts have long pointed out the practical shortcomings of the use by law enforcement of Trojan tactics. Police-sanctioned malware may get into the hands of cybercrooks, for one thing. There's also concern about the admissibility of evidence obtained using the tactic.

Herr Herrmann gave short shrift to such objections, stating that Bavaria is leading the field in "internal security" in becoming the first German state to approve the plan.

Bavarian police have reportedly been laying the groundwork for the scheme for some months. Leaked documents, published by Wikileaks back in January, outline proposals by German firm Digitask to develop technology capable of intercepting intercept Skype VoIP communications and SSL transmissions. Costing and licensing proposals drawn up by the Bavarian Ministry of Justice for the software also surfaced on Wikileaks at the same time. ®

Remote control for virtualized desktops

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
What a Mesa: Apple vows to re-use titsup GT sapphire glass plant
Commits to American manufacturing ... of secret tech
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?