diff options
Diffstat (limited to 'updates/2015')
-rw-r--r-- | updates/2015/bkag.en.md | 53 |
1 files changed, 53 insertions, 0 deletions
diff --git a/updates/2015/bkag.en.md b/updates/2015/bkag.en.md new file mode 100644 index 00000000..4122c712 --- /dev/null +++ b/updates/2015/bkag.en.md | |||
@@ -0,0 +1,53 @@ | |||
1 | title: State Trojan again on trial in Constitutional Court | ||
2 | date: 2015-07-06 20:00:00 | ||
3 | updated: 2015-07-07 16:08:36 | ||
4 | author: webmaster | ||
5 | tags: update, pressemitteilung | ||
6 | |||
7 | Today, the German Federal Constitutional Court tried constitutional complaints against the revision of the Federal Criminal Police Office law (BKAG) from 2008. Central to this trial was the constitutional assessment of governmental trojan spying software. Within this hearing the Chaos Computer Club was asked for an advisory opinion. We publish our arguments delivered in the hearing. [1] | ||
8 | |||
9 | <!-- TEASER_END --> | ||
10 | |||
11 | By means of the revision of the BKAG the Federal Criminal Police Office | ||
12 | was granted additional powers to infiltrate and manipulate IT systems. | ||
13 | These covert intrusions in IT systems enable an „online search“ of a | ||
14 | target's computers and also a „communication source surveillance“. These | ||
15 | spying tools are supposed to be allowed just by suspicion of a future | ||
16 | crime. | ||
17 | |||
18 | The trojan surveillance is not bound to a specific device technology. | ||
19 | The BKAG rather legitimates to aquire data from any kind of device like | ||
20 | computers, smartphones, tablets, smartwatches or other kinds of | ||
21 | information and communication technology device. | ||
22 | |||
23 | In 2011, the Chaos Computer Club has analysed a state trojan developed | ||
24 | by DigiTask, which has been used by several police authorities. \[2\] | ||
25 | This analysis has clearly shown the enormous risk of exposing infected | ||
26 | computers to malicious attacks by third parties using the included | ||
27 | backdoors. Design and implementation flaws make all of the functionality | ||
28 | available to anyone on the internet. It turned out that the trojan | ||
29 | allowed remote control by attackers and download of additional software | ||
30 | besides the officially provided functions available to the authorities. | ||
31 | Besides, the software could be used to capture audio data from the | ||
32 | environment independent from any communication. | ||
33 | |||
34 | The fundamental problem of covert infiltration for both kinds of | ||
35 | malware, an „online search“ trojan as well as a „communication source | ||
36 | surveillance“ tool, is: In order to successfully implant governmental | ||
37 | espionage tools security systems have to be exploited permanently. | ||
38 | |||
39 | The Chaos Computer Club speaks out against the plans of infiltration of | ||
40 | information systems by authorities not only for technical reasons, but | ||
41 | more importantly so because of the imminent danger of interfering with | ||
42 | the core area of the private conduct of life, a human's most personal | ||
43 | information. | ||
44 | |||
45 | **Links**: | ||
46 | |||
47 | \[1\] Advisory Opinion to the Federal Constitutional Court on the | ||
48 | Federal Criminal Police Office law (BKAG) and state trojan software | ||
49 | (German) | ||
50 | <http://www.ccc.de/system/uploads/189/original/BKAG_Stellungnahme.pdf> | ||
51 | |||
52 | \[2\] Chaos Computer Club analyzes government malware, | ||
53 | [https://www.ccc.de/en/updates/2011/staatstrojaner](/en/updates/2011/staatstrojaner) | ||