Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

German police GPS hacked after Trojan backfires

Spy software leads hackers to surveillance system

Article comments

Last July’s shutdown of a GPS vehicle tracking system used by German police to monitor suspects has apparently been traced back to an officer’s incompetent attempt to monitor his daughter’s Internet use with a spy Trojan.

As reported by German magazine Der Spiegel, the policeman from Frankfurt am Main planted the Trojan which was then detected by one of his daughter’s friends who had the hacking skills to return the compliment.

Hacking the father’s PC back, the man discovered emails redirected from a work computer that gave him access to the ‘Patras’ GPS surveillance system. This system was - very probably not coincidentally - subsequently broken into by a hacking group called 'n0n4m3 cr3w' (No Name Crew), two members of which were later arrested.

Discovering the break-in, police shut down the system. Although only temporary this was still hugely embarrassing.

As usual, the revelations offer only partial details of the breach. Why was such a critical system not secured more comprehensively? And why would a policeman use Trojan software to carry out a domestic task that could be accomplished with much simpler (and probably more legal) software?

The German authorities were discovered using surveillance Trojans or ‘Bundertrojaner’ some months ago, notably the so-called R2D2 program designed to intercept Skype calls first analysed by the German Chaos Computer Club (CCC).

The origins of this type of state-sponsored program go back a lot further to their use by Austrian, German and Swiss police forces up to a decade ago.



Share:

More from Techworld

More relevant IT news

Comments



Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *