Federal Trojans

“A Story About Government Malware – The Federal Trojan

The term “Federal Trojan” has been dominating media reports for several months and is currently a hot topic in almost every forum. In the following article we summarize what this is all about and explain our position as a manufacturer of security software.

Let us journey back in time to Germany in the year 2005. At this time the German Secretary of the Interior, Otto Schily, was asked by Heinz Fromm (ex President for Protection of the Constitution) to create a method of spying on the computers of suspicious criminals. This resulted in a number of court decisions that, briefly put, clearly forbade the secret searching of suspects. What remains is the possibility of confiscating a PC and then examining the contents of the hard drive in detail.

You may ask why such an uproar exists when online searches are forbidden. Simple: It is still undecided whether online searches are permissible for secret service purposes. In the opinion of the Department of the Interior, secret searching of PCs should be permitted for the authorities responsible for the protection of the constitution, the military counter-espionage service (MAD), and the Federal Intelligence Agency (BND). Some federal states, with Nordrhein-Westfalen leading the way, have also allowed “Investigation over the Internet” via a constitutional decision. If you live in one of these federal states and wish to take legal action against this, the Federal Constitutional Court is already occupied with a related case, which is to be decided on October 10, 2007.

Amidst all the various reports, rumors and court decisions, one thing remains clear: the uncertainty as to whether the state is allowed access to our computers connected to the Internet and especially whether this is even possible. Uncertainty has also been created by the statements of some security software manufacturers saying that, in case of doubt, they are prepared to cooperate with government departments. Of course, one cannot easily gain full access to a computer. To do this, either a suitable security hole allowing smuggling of a spy program must exist on the target system, or the spy software must be manually installed online or offline. This spy program then records the relevant data and sends it to the person spying.

This type of software that provides hidden access to a computer is generally referred to as a Backdoor Trojan. Basically, the term Federal Trojan is a synonym for Government Malware.”

Click the article title to read the whole thing.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s