{"id":32750,"date":"2017-07-28T10:41:59","date_gmt":"2017-07-28T14:41:59","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/german-police-to-bypass-encryption-by-hacking-devices-infosecurity-magazine.php"},"modified":"2017-07-28T10:41:59","modified_gmt":"2017-07-28T14:41:59","slug":"german-police-to-bypass-encryption-by-hacking-devices-infosecurity-magazine","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/german-police-to-bypass-encryption-by-hacking-devices-infosecurity-magazine.php","title":{"rendered":"German Police to Bypass Encryption by Hacking Devices &#8211; Infosecurity Magazine"},"content":{"rendered":"<p><p>    German police are set to make use of new laws to hack the    devices of criminal suspects in order to monitor    communications, bypassing the need to force tech companies to    provide encryption backdoors.  <\/p>\n<p>    Local media reports referencing Interior Ministry    documents claimed that law enforcers will be able to make use    of new Remote Communication Interception Software (RCIS) to    target Android, iOS and BlackBerry mobiles.  <\/p>\n<p>    The idea is to hack into suspects devices in order to read    communications at source. This would seem to be a neat way of    monitoring targets without the need to engage with providers of    services like WhatsApp, iMessage and Telegram.  <\/p>\n<p>    Tech companies including Facebook and Apple have been steadfast    in refusing to engineer backdoors for law enforcers  arguing    that it would undermine security for millions of innocent users    and businesses. As most are based in the US, its unlikely that    the German government alone could do anything about it.  <\/p>\n<p>    The German parliament recently passed a new law expanding the    power of the police to hack devices belonging to all criminal    suspects and not just terror suspects.  <\/p>\n<p>    This is in stark contrast to the situation in the UK, where the    new Investigatory Powers Act grants police the power to hack    devices irrespective of suspicion of criminal activity.  <\/p>\n<p>    However, activists in Germany are still worried about the move,    especially as the authorities have been revealed to have bought    surveillance software from infamous provider FinFisher, as a back-up in case their own RICS 2.0    tools are leaked or get compromised.  <\/p>\n<p>    By using third party provider tools, governments could skirt    legal restrictions on what they can and cant do, according to    Deutsche Welle.  <\/p>\n<p>    The European Commission claimed back in March that it was planning    to give tech communications providers three or four options    forcing them to make the communications of suspects available    to police, ranging from voluntary measures to legislation.  <\/p>\n<p>    In related news, rights groups have this month signed a joint open letter to EU member states    urging more to be done to reform EU rules governing the export    of surveillance equipment.  <\/p>\n<p>    It claimed over 330 export license applications for such    technology have been made to 17 EU authorities since 2014; with    317 granted and only 14 rejected.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See more here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.infosecurity-magazine.com\/news\/german-police-to-bypass-encryption\/\" title=\"German Police to Bypass Encryption by Hacking Devices - Infosecurity Magazine\">German Police to Bypass Encryption by Hacking Devices - Infosecurity Magazine<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> German police are set to make use of new laws to hack the devices of criminal suspects in order to monitor communications, bypassing the need to force tech companies to provide encryption backdoors. Local media reports referencing Interior Ministry documents claimed that law enforcers will be able to make use of new Remote Communication Interception Software (RCIS) to target Android, iOS and BlackBerry mobiles<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-32750","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32750"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32750"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32750\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32750"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32750"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32750"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}