DE | EN
Sitemap | Impressum
web2.0 Diaspora Vimeo taz We at Mastodon A-FsA Song RSS Twitter Youtube Tumblr Flickr Wikipedia Donation Facebook Bitmessage Betterplace Tor-Netzwerk https-everywhere
15.05.2020 Staatstrojaner für den Verfassungsschutz?

Front door or back door?

The state Trojan has been with us for a few years now, for 2 years it has been legal on a smartphone. This involves software being placed on the device to be monitored and the communication can be read at the "source", i.e. before encryption. The "source telecommunication surveillance" ("Quellen-TKÜ") has so far been allowed to be used by customs and police when criminal offences are involved.

The Office for the Protection of the Constitution (Verfassungsschutz) would also like to have this "right", soon also at the federal level with a law on the "Harmonisation of the Office for the Protection of the Constitution". Some federal states have already pushed ahead and defined such powers in their own states. Already the access by the police is highly dangerous, because via the state Trojan - but beyond what is permitted - writing access is also possible and thus "evidence" can be falsified or generated. This is even more to be feared by a secret service!

In the present state laws or their drafts, the state Trojan is now supposed to be allowed even in the case of "dangers" - who defines these?

On the EU level there is also a fierce dispute about how to get hold of encrypted communication. While the German position advocates the back door by means of source TCTÜ, the Brussels anti-terrorism coordinator Gilles de Kerchove wants even more powers than surveillance through the Trojan back door.  As  Telepolis reports, with reference to the Investigatory Powers Act of 2016, the Australian Telecommunications Assistance and Access Bill of 2018 and Access Bill of 2018 and the non-partisan American plans for an EARN IT Act  he is calling for an EU regulation that would give interested parties on the state side a right to access encrypted chat information through the front door.

This means nothing other than that the providers would have to have a duplicate key for all user keys, which would be given to government agencies upon request. We have often warned of this dangerous nonsense in connection with cybercrime. It would only be a matter of time before these master keys would fall into the hands of criminals.

Read more https://www.heise.de/tp/features/Dringende-Anpassung-an-neue-digitale-Moeglichkeiten-4722312.html


Category[21]: Unsere Themen in der Presse Short-Link to this page: a-fsa.de/e/39w
Link to this page: https://www.aktion-freiheitstattangst.org/de/articles/7265-20200515-staatstrojaner-fuer-den-verfassungsschutz.html
Link with Tor: http://a6pdp5vmmw4zm5tifrc3qo2pyz7mvnk4zzimpesnckvzinubzmioddad.onion/de/articles/7265-20200515-staatstrojaner-fuer-den-verfassungsschutz.html
Tags: #Verbraucherdatenschutz #Datenschutz #Datensicherheit #Staatstrojaner #Hacking #Datenpannen #Datenskandale #Cyberwar #Hacking #Trojaner #Cookies #Verschlüsselung #Masterkey #Provider #Anti-TerrorGesetze #BKAGesetz #BND #Verfassungsschutz #Bundestrojaner
Created: 2020-05-15 08:52:23
Hits: 1405

Leave a Comment

If you like a crypted answer you may copy your
public key into this field. (Optional)
To prevent the use of this form by spam robots, please enter the portrayed character set in the left picture below into the right field.

CC license   European Civil Liberties Network   Bundesfreiwilligendienst   We don't store your data   World Beyond War   Use Tor router   Use HTTPS   No Java   For Transparency

logos Mitglied im European Civil Liberties Network Creative Commons Bundesfreiwilligendienst We don't store user data World Beyond War Tor - The onion router HTTPS - use encrypted connections We don't use JavaScript For transparency in the civil society