Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Austrian Police to use crime-busting Trojans

We have ways of making your PC talk.

Article comments

The Austrian Police has become the latest European agency to express its intention to use specially-crafted Trojans to remotely monitor criminal suspects.

According to reports in Austrian media, the minister of justice Maria Berger, and Interior Minister Gunther Plater, have drafted a proposal that will be amended by legal experts and the cabinet with the intention of allowing police to carry out such surveillance legally with a judge’s warrant.

There doesn’t appear to be a defined timescale for such a law, and it is not clear whether the move would face the legal challenges encountered by the German authorities in the last year as they attempted to get a similar law off the ground. According to Berger, Trojans would only be used in cases of serious crime, such as terrorism and organised racketeering.

The Swiss authorities have declared the intention of using the same controversial technique, but only in cases of the most extreme nature, such as terrorism.

One formidable hurdle is that opinion in the security software industry is almost universally hostile to the idea. You don’t have to dig far to find negative reaction.

"I'm sure the Austrian Secret Service will develop some pretty ingenious software to infect users' PCs, but there is a real danger that the package could leak into the hacker community," said Geoff Sweeney of security outfit Tier-3, which went to the bother of putting out a release on the topic.

"That scenario would create a serious free-for-all on the industrial espionage and identity theft fronts as legitimate Trojans are redirected to create an even more hostile environment for organisations to defend against," he said.

The authorities have been keen to portray the use of Trojans as similar to phone-tapping, a long established police practise the world over. However, Trojans are different on one important respect from phones, and this is where the anti-malware companies sense trouble.

"How should anti-virus companies react to the existence of such malware? Detect it? Avoid detecting it on purpose? Avoid detecting hacking software used by governments of which country? Germany? USA? Israel? Egypt? Iran?," commented F-Secure’s Mikko Hypponen in a blog earlier this year.

The Austrian, German and Swiss governments have yet to explain how they would circumvent security programs that might be used by criminals to protect themselves, whether this would involve collusion with security software companies, and what would happen if such software-busting Trojans were subsequently reverse engineered and deployed by criminals themselves.

"The anti-virus companies aren't going to turn a blind eye to state-endorsed Trojan horses," said Graham Cluley of Sophos, himself a good barometer of likely industry opinion.

"We're going to add detection for them just like any other spyware. So, if the cybercops think they can give us a funny handshake, a wink and buy us a pint for not adding detection for the Trojan they're using to spy on their suspect they're mistaken.

"The reason why we take that policy is that we can't know if the Trojan has been placed there by the cops or a criminal. It's unlikely that the Trojan will say ‘Copyright (c) FBI 2007’," he said.



Share:

More from Techworld

More relevant IT news

Comments



Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *