Skip to main content

Formular Kontakt-Layer EN

Formular Kontakt-Layer EN

Places in your neighbourhood

We are here for you

All locations and counterparts

Your access to the digital KÖTTER world

KÖTTER SmartControl

The electronic security log by KÖTTER Security

 

ATM service oprtal

Full service for your automatic machines by KÖTTER Cash and Valuables Services

 

Bargeld-Service-Portal

Digital cash logistics by KÖTTER Cash and Valuables Services

 

Web-Portal

The customer portal of KÖTTER Personal Service

 

MyKoetter.de

The KÖTTER Services employee portal

17. August 2017

News release

Security Threats Germany (August 2017)

 The German redefinition of IT monitoring

The Federal Criminal Police Office (BKA) is equipping its IT. Already this year, the BKA wants to use a so-called "state trojan" in order to hack smartphones and read encrypted messages. This development is due to a decision of the Bundestag, which allows the security authorities henceforth with appropriate judicial permission to inject monitoring software on PCs or smartphones of potential criminal suspects. Until now, the BKA was only allowed to hack devices when it came to the prevention of international terrorism.

The BKA itself programmed the Trojan: the so-called "Remote Communication Interception Software" (RCIS), which was used for the first time in 2016. In addition to self-developed Trojans, the BKA also uses commercial monitoring software. This software was developed by an external company and is to serve as a replacement Trojan, in case RCIS is detected. However, fact is that this "external" tool can do a lot more than RCIS and the manufacturer advertises it as a complete portfolio of hacking tools.

The decision of the Bundestag to massively expand the use of Trojans in order to strengthen the fight against organized crime and terrorism is to be welcomed. However, one must bear in mind that not only German authorities use such tools to get sensitive data.

Although the external partner of the BKA officially excludes the sale of its surveillance software to totalitarian regimes, the Wall Street Journal has already published a secret memo of the Egyptian Ministry of the Interior in 2011, which shows that the software was also offered to the authorities in Cairo. It is therefore to be assumed that both foreign services and criminal groups have been given access to this technology and that they are thus able to pursue economic espionage.

For companies this has a very clear consequence - no electronic exchange is absolutely secure. One must expect that everything can be intercepted. Only one can no longer know what was caught and by whom - was it the BKA or a third party? Highly sensitive information and business secrets should therefore be transported in a classical manner: Through the errand to the business partner. Otherwise it could be the revival of the old mechanical typewriter…

 

 

Disclaimer: Assessments of security situations are based on the information available at the time specified and assessed as trustworthy by German Business Protection (GBP). Although the compilation of the information was handled with extreme care, GBP cannot be made responsible for the timeliness, accuracy or completeness of the article. In no event GBP can be held responsible for any damage of any kind arising from the use of the information provided here, whether direct or indirect or consequential damages, including lost profits. Hazardous situations are often confusing and can change rapidly.

Further News Releases

You want more information about the KÖTTER group?

Contact us.

Press

+49 (201) 27 88 - 126

E-Mail: pressekoetter "«@&.de
 

Contact form


Stay up to date with our KÖTTER newsletter:

Subscribe to our Newsletter