[url="http://www.globalpost.com/dispatch/news/regions/europe/germany/111027/spyware-scandal-germany"]German authorities plant spyware on citizensââ¬â¢ computers[/url] : Globalpost, October 27, 2011
[indent]
[/indent]
[indent]
Quote:[floatleft]
[size="2"]Dirk Engling, of Chaos Computer Club, shows the control software for the Trojan spyware
allegedly made by the German authorities î monitoring the traffic on a remote computer (L).
The club cracked the spying software that could allow German authorities to peer through
webcams. The news has sparked outrage among politicians and media commentators.[/size][/floatleft]BERLIN, Germany ââ¬â Itââ¬â¢s the stuff of modern nightmares. A seemingly innocuous email plants malicious spyware on your computer, allowing strangers to not only access your private communications but also to spy on you in your own home.
The fact that such invasive technology was deployed by officials in Germany has caused uproar here.
While the monitoring of internet telephone communications is allowed by German law in serious cases, it has emerged that software deployed by some law enforcement agencies was capable of much more intrusive snooping, raising serious concerns about the potential for a ââ¬ÅBig Brotherââ¬Â level of surveillance.
The use of so-called ââ¬ÅTrojan horseââ¬Â software by authorities in a number of German states came to light after the Computer Chaos Club, a hacker group, published details of their examination of spyware planted on a laptop in Bavaria.
It found that the software ââ¬â developed by a private company called DigiTask for the Bavarian police ââ¬â was capable of much more than just monitoring internet phone calls. It could take screenshots, remotely add files and control a computerââ¬â¢s microphone or webcam to monitor the personââ¬â¢s home. However, the authorities insist that they did not deploy these functions.Investigations are ongoing.
Graham Cluley, a senior technology consultant with British computer security firm Sophos, which also analyzed the software, said that the spyware could ââ¬Åautomatically update itself over the internet, so new functionality can be added. It can be used to install new software onto the computer, so people could actually alter the contents of a suspectââ¬â¢s hard drive.ââ¬Â
The scandal has led politicians and security experts to look at whether the countryââ¬â¢s already stringent privacy laws need firming up.
Privacy advocates had already raised concerns about the potential for state intrusion back in 2007, when the Interior Ministry said that it was developing software to monitor suspectsââ¬â¢ internet communications.
The following year the Federal Constitutional Court, the highest in the country, made a ruling that placed narrow limits on the use of such software, including stipulations that it could only be used to monitor Internet telephone communications. The 2008 ruling stated that the integrity of peopleââ¬â¢s computers was a ââ¬Åfundamental rightââ¬Â and could only be infringed upon with a court order.
Yet evidence now suggests that some state law enforcement agencies went beyond those constitutional limits when they deployed Trojans that had wider functionality.
ââ¬ÅThere are very strict guidelines regarding the use of this kind of software in those situations,ââ¬Â Cluely told GlobalPost. ââ¬ÅIt appears to us that if this piece of software was being used for that purpose then it goes beyond those guidelines.ââ¬Â
ââ¬ÅThe Trojanââ¬â¢s developers never even tried to put in technical safeguards to make sure the malware can exclusively be used for wiretapping internet telephony, as set forth by the Constitutional Court,ââ¬Â the Computer Chaos Club wrote on its website.
The Interior Ministry in Bavaria confirmed that law enforcement officials there have been using the spyware since 2009 and insists the application is legal. Other states, including Baden-Wurttemberg, Brandenburg and Lower Saxony, also admitted using Trojans.
Once the scandal broke, Federal Interior Minister Hans-Peter Friedrich demanded that the states halt the use of the spyware. He has since declared that the BKA, the federal criminal police, have only used Trojans in accordance with the constitution. However, he has said that in future the software will be developed by the authorities themselves rather than outsourced to private companies.
Meanwhile, Justice Minister Sabine Leutheusser-Schnarrenberger, a member of the Free Democrat Party, which has traditionally seen citizensââ¬â¢ privacy as a core issue, has indicated that she is considering new laws to ensure that privacy is safeguarded. She has already called for an inquiry into the use of the software by the authorities.
Peter Schaar, the Federal Commissioner for Data Protection and Freedom of Information, has voiced his concerns about the legal ââ¬Ågray areaââ¬Â that surrounds the use of this kind of spyware. His spokesperson Juliane Heinrich told GlobalPost that the current legal situation was obviously not adequate. ââ¬ÅIt has to be improved, and this can be done by the justice minister, who is responsible for the criminal code,ââ¬Â she said.
The police also want more clarity about what it is legally permissible. The Federation of German Criminal Police (BDK) has said that Germany needs cabinet-level oversight of internet issues. ââ¬ÅIt is high time for a federal internet minister who solves the pressing problems of the digital age,ââ¬Â BDK head Andre Schulz told the Neue Osnabrücker Zeitung newspaper.
Marco Buschmann, a Free Democrat member of parliament, sees it as a fundamental problem that the authorities were using software capable of this functionality, even if, as they claim, it was never activated.
ââ¬ÅThe authorities have to operate within the framework of the law and our constitution,ââ¬Â Buschmann told GlobalPost. ââ¬ÅAnd the problem is that software was found that theoretically could do more than the constitution allowed.ââ¬Â
Aside from questions about the legality and ethics of using this type of spyware, the application could also prove self-defeating for law enforcement, critics say. The fact that the software allows files and programs to be remotely downloaded means that any evidence found on a suspectââ¬â¢s laptop could be disputed.
ââ¬ÅIt is naturally counter-productive for the prosecutors, as this evidence would be without any value,ââ¬Â Meinhard Starostik, a lawyer who specializes in data issues, told GlobalPost. ââ¬ÅA criminal could say: ââ¬ËThe police planted that on my computer with the Trojan.ââ¬â¢Ã¢â¬Â
It is not only the software itself that has raised concerns, but also the suspects upon which it was used. Some investigations were probing relatively minor targets. In one case, for example, investigators placed a Trojan on the computer of a suspect they thought was illegally importing anabolic steroids.
Cluley was surprised to learn that it was being used to monitor low-level criminal activity. ââ¬ÅI would expect this kind of thing to be used on serious organized crime or in terrorist investigations,ââ¬Â he said.
Buschmann says that while suspected criminals and terrorists need to be investigated, peopleââ¬â¢s freedoms also need to be protected. ââ¬ÅThat includes the freedom to use my computer without worrying that it could potentially be spied on, whether by the state or by criminals.ââ¬Â
Germans have a reputation for being sensitive about privacy issues, due in large part to totalitarian systems of the past. The 12 years of Nazi rule were followed, in East Germany, by a communist system whose notorious secret police, the Stasi, routinely spied on citizens.
ââ¬ÅThese two dictatorships were sustained by the surveillance of their own citizens,ââ¬Â Buschmann said. ââ¬ÅNo one is claiming that today we have a surveillance state, but we are very sensitive to these issues because of our experiences.ââ¬Â
Privacy attorney Starostik agrees that their history has made Germans particularly cautious when it comes to the issues of state surveillance and of date privacy in general. He argues that the fact that Trojans have the potential for such levels of spying means they should not be used by the authorities, even for monitoring internet communications.
ââ¬ÅThis example shows how dangerous it is when one allows the state the possibility of such wide-ranging invasions of privacy,ââ¬Â he said. ââ¬ÅWhen one has such a tool then the temptation is too great to overstep the limits.ââ¬Â
[/indent]