In association with heise online

09 October 2006, 16:30

Superintendent Trojan

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

Whilst listening in on normal telephone calls over landlines or mobile phone networks has become a routine procedure, Voice over IP connections frequently present a problem for investigators, especially when the persons being monitored use Skype via foreign servers or call direct from PC to PC and encrypt their data. The Swiss Department of the Environment, Transport, Energy and Communications (UVEK) is therefore examining the use of spy software to allow it to listen in on conversations on PCs.

The software comes from Swiss security company ERA IT Solutions, which intends to supply it solely to investigation agencies. This should also prevent antivirus manufacturers from incorporating it into their databases and having their tools recognise it. According to the manufacturer, firewalls do not present a problem.

Installation of the software wiretap is to be carried out on the instructions of a judge only. The ISPs of the persons under investigation will then slip the program onto their computers. The program will save overheard conversations and send them to a server in small, inconspicuous packets. If the computer is turned off before all the data has been transmitted, the program will continue transmission when it is restarted.

The wiretap has some additional functions. For example, the built in microphone on a laptop can be turned on to monitor a room or webcams can be activated. As the latter is usually indicated by an LED, this is unlikely to be useful in practice. Once wiretap activities have been completed, the software can be programmed to uninstall itself at a given time.

Until now the project had been carried out in secret, but it has now been reported in the SonntagsZeitung. It quotes Charles Gudet, the head of the Special Services Department of the UVEK, who admits that there is no clear legal basis for the use of Trojans in the Federal Post and Telecommunications Surveillance Act. In contrast, canton and federal criminal proceedings regulations permit the use of software wiretaps in accordance with the regulations governing surveillance using technical surveillance equipment.


Print Version | Send by email | Permalink:

  • July's Community Calendar

The H Open

The H Security

The H Developer

The H Internet Toolkit