Swiss to Use Spyware to Listen to VoIP 188
An anonymous reader writes "Heise Security is reporting that the Swiss Department of the Environment, Transport, Energy and Communications is entertaining the idea of utilizing the 'Superintendant Trojan', a spyware program designed to allow eavesdropping on VoIP conversations. According to ERA IT Solutions, the creator of the software, it will only be distributed to investigation agencies in the hopes of keeping it out of the hands of malicious hackers since firewalls apparently 'do not present a problem' for the software."
4 words: (Score:3, Insightful)
Re:4 words: (Score:5, Funny)
Re: (Score:2)
Re: (Score:2)
/ -1 Not Funny
Re: (Score:2)
Saying that this sort of trojan is bad means nothing to the clueless. Proving that it is bad is the only way to wield a cluebat with sufficient force for effect. Nothing proves a point like public failure.
Re: (Score:2)
yea right (Score:5, Insightful)
Re:yea right (Score:5, Insightful)
Re:yea right (Score:5, Insightful)
Actually it will turn out to be the exact opposite. Once the program is in the wild and the black hats get their hands on it, both the AV and AS vendors will have no other choice than to add it to their detections.
Regardless of whether the detection is for the original Trojan or not, any subsequent black hat variations found would be added and the original would in all likelihood be flagged due to the particular (add your own term here) scanning technology.
Re: (Score:2)
Just because it's allegedly for "Law Enforcement" doesn't change the fundamental principle.
No third party is going to run anything on my PCs without me giving my express permission - which will consist of me deliberately choosing to install and run that software.
Any anti virus/spyware vendor that doesn't detect and remove this scumware are incompetent.
Still, as usual, if you don't use Windows there's probably nothing to worry about.
Re: (Score:2)
Re: (Score:2)
Just because it's legal, doesn't make it right.
Re: (Score:2)
Re: (Score:2)
You won't die and the government isn't going to put the contents of your boring hard drive on the 11 o'clock news
It has happened in the past, and will continue to happen in the future. A little fear goes a long way, it keeps the sheep in line.
Re: (Score:3, Insightful)
But that doesn't mean that it is illegal to make locks. So, yes, antivirus and antispyware companies are in their rights to add this to their lists.
Re: (Score:2)
The police don't get to walk into my house for almost any reason and if they do, I have recourse against them.
Sorry if you live in the USA though.
Re: (Score:3, Interesting)
Now, if you were a corporation, there may be additional considerations, but only if you have a branch of your business operating there.
Re: (Score:3, Insightful)
Come to think of it, wouldn't it also be a DMCA violation if the government agency's version circumvented any VOIP encryption to eavesdrop?? Not that it really matters, because Bush will pencil-in a clause that makes it OK for his buddies to rape the DMCA all they like...
Hmmm..
Re: (Score:2)
No, but sound support is rather bad under VMWare. On every machine I've tried it's very choppy.
Re: (Score:2)
Jonah HEX
Re: (Score:2)
Not really, because the DMCA is about criminalizing circunvention of measures taken to protect copyright, not just circunvention of any kind of encryption.
Re: (Score:2)
Not a new issue (Score:2)
probably already doing it (Score:2)
Also, it doesn't really have to be "malware", in that it tries to install itself after the fact, these people can simply do on-the-wire replacement of software updates with software updates that have been modified specifically for their purposes (getting around signing is work, but feasible). Unfortunately, Linux is as susceptible to that as Windows and MacOS.
Re: (Score:2)
You could've said that for Sony's DRM too (DMCA law), but still antivirus companies reacted appropriately.
I guess we need 20-30 more years until politicians who have a clue what the net is, come to power.
Re: (Score:2)
Didn't put much of a dent on Radio Shark radar detector sales.
Re: (Score:2)
Trojans rarely care what computers they're installed on. They don't discriminate between good and bad people.
Re:yea right (Score:5, Informative)
It'd probably be more work to reverse engineer this trojan as opposed to writing something to do it yourself. It definitely would be for me. And from some experience with other 'law enforcement'-type programs, it's probably shit anyway.
The worrisome bit is utilizing trojans for law enforcement, even with some kind of judicial review (scoff).
It will also only be really useful when Joe User starts using VoIP, because it'd be much harder to get your average power user to install something infected with the trojan.
And end-to-end encryption renders it completely useless anyway, unless it actually reads pre-encrypted stuff from memory. Hopefully VoIP providers will get off their collective asses and get SRTP et al. working.
Just my $0.02.
Re:yea right (Score:5, Funny)
sd card: US$124 / 2 grams ($61/g)
hacker's weight in ram chips: $610,000
Re: (Score:2)
Would be awesome if everybody had it. (Score:2)
Check out ZRTP [wikipedia.org] if you want a real head-scratcher.
Re: (Score:2, Informative)
I read the original newspaper article and it contains some more information. Apparently the software is accessing the microphone directly, so encryption will not help. On top of that, the software will be able to record audio by turning on the Mic even if there is no VoIP-Software running, etc.
The newspaper article also said that it was theoretically possible to do the same with Webca
OMG... (Score:4, Funny)
Re: (Score:2)
And the whole country is firewalled from the rest of the world? Swiss are "special", not like other nasty Europeans and Americans who always break the law? That isn't a strong arguement. Hell, it doesn't even make sense.
Anything you install on a bunch of people's computers will get in the wild. It doesn't require a rocket scientist to figure out h
Wow. (Score:2)
Re: (Score:2)
Probably the respective governments will tell all the scanning software companies to make a point of not identifying it. That is, if the virus doesn't already modify the scanning software directly.
I really don't believe this (Score:4, Insightful)
Do they really think so?
I mean, that completely ignores human nature. Come on.
All these things have one thing in common: they are not supposed to be accessible to the general public (or at least initially were not supposed to be) and yet they are. Legality does not stop criminals.
Re: (Score:3, Informative)
Re: (Score:3, Informative)
Re: (Score:2, Insightful)
Re: (Score:2)
I'm not sure if this is a federal or state reg, but if state it's in a lot of states.
Re: (Score:3, Insightful)
No kidding. If it did, they wouldn't be criminals.
(As an aside, I wrote to my MP pointing this one out a couple of years ago when they proposed making forging an ID card illegal (it already is anyway). The letter I received back said, in a nutshell, "We know criminals don't obey the law. We're trying to find a solution to that one and anyone who has any ideas is welcome to write to us".)
Re: (Score:2)
What if it did ?
Would they still be criminals ?
Re: (Score:2)
This is why... (Score:2)
2 Words (Score:2)
If there's a backdoor, crackers will find it and they will exploit it.
Stop the idiotic Police/Spyware.
Scary thoughts (Score:2)
I write all my secrets onto yellow stickies... Then make the person that reads it shred and eat...
by cybercobra (856248) on Monday October 09, @09:47PM (#16373285)
Bad Idea.
If there's a backdoor, crackers will find it and they will exploit it.
Ok, let's analyze this a bit, shall we? (Score:5, Interesting)
Two things stand out right away. Point one:
the 'Superintendant Trojan', a spyware program designed to allow eavesdropping on VoIP conversations
Ok, so it's spyware. It sneaks onto a system and installs itself. Gotcha. That moves us to point two:
it will only be distributed to investigation agencies in the hopes of keeping it out of the hands of malicious hackers
Ok. Got it. So to sum up, what they're saying is that they don't want anyone to get it, but they need to install it on a target's system in order for it to work. And a target would be someone the law was interested in who was computer literate. Like, say....hackers, for instance.
I love things that are broken by design.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Uh huh.
That's exactly the way things are going these days, isn't it.
Ok, I could clarify a bit, sure. (Score:3, Interesting)
And the better question is why not? Provided that there is sufficient judicial oversight, why shouldn't VOIP coversations of suspected criminals be monitored?
Well, I haven't argued anywhere that they shouldn't be monitored. It's not the judicial oversight that worries me. It's the technical oversight.
Let me clarify my objections a bit. In order for this hack to work, some authorized person has to sneak something onto your system. And as soon as it's on your system....it's on your system. You have
Re: (Score:2)
On the contrary, they are pure genius... marketers, that is. "This program is so efficient we can't let it fall into wrong hands. It's strictly for government." It's the same trick makers of Z-class horror movies used to use - demand that everyone going to the cinema takes a life insurance in case they'll be scared
Installation?!? (Score:3, Funny)
The Victim (Score:4, Insightful)
This article is complete and utter bullshit.
"VoIP" is not a single computing platform or implementation.
Re: (Score:2)
Re: (Score:2)
I saw an article yesterday that said ISPs are supposed to distribute the trojan to their customers under surveillance; no details on how this should work. Are they supposed to spoof windowsupdate.com and disguise it as a patch or what?!
And yes, no I didn't RTFA.
hunh? (Score:2)
It's on;y important to softphone (Score:2)
maybe but you still have plenty to worry about (Score:2, Interesting)
Me with my terminal adapter which happens to be integrated with my router,
I think I have plenty to worry about. Who says its firmware is not rigged?
Who says they can't upload a patch to it or otherwise tamper with it??
On the other hand, why do these shitheads need to tamper with someones
machine if they can just pick off the conversation directly from the wires
at the provider (unless they're using encryption)??!
Move along, nothing to see here. (Score:2, Interesting)
Thankfully... (Score:2, Interesting)
Thankfully my main GUI is a Mac. I wonder how LittleSnitch would handle a
Thankfully my networks are Linux and BSD based. They don't like
Thankfully my VoIP is handled by a Sipure non-PC based box. It doesn't allow / nor has needed updates.
Thankfully the one place I do use Windows for now (work) will be replaced with a Mac in short time.
I do have to wonder if and how heuristic type scans and/or zonealarm tweaked all the way up would react to this t
Re: (Score:3, Funny)
Oh, wait a minute...
Let me take this opportunity to say (Score:2)
HAHAHAHAHA!!!!!
ROTFLMAO
Thank you, that is all. Great plan, thumbs up to the Swiss!
Black hats rejoice! (Score:3, Insightful)
I suspect that the software vendors / designers of these tools will be contacted, asked to participate and sign a ND agreement.
All people running software by these vendors will then be susceptible to attacks from this trojan - a trojan which will undoubtedly be in the hands of black hat hackers by then.
Additionally, if this sort of thing becomes common practice, it will result in anti-virus software becoming practically useless, as the virus writers will take advantage of these 'back doors' to create new malware that can mimick the behaviour of the trojans.
Re: (Score:2)
As regards firewalls - it's a bit curious to announce that it isn't stopped by any type of firewall unless it does something really obscure like take advantage of bugs in IE or Outlook to install
Re: (Score:2)
As far as the 'black box' solution, it is indeed far more likely. I'd be surprised if this kind of network monitoring/logging technology isn't al
PGP Fone (Score:2)
Re: (Score:2)
Re: (Score:2)
Encrypting the link is good against taps outside the machine.
It doesn't help if the signals are tapped INSIDE the machine, on the unencrypted side of the process (like at the sound card).
So whether it would help against the trojan would depend on where the trojan tapped the signal.
And if the trojan taps the signal on the encrypted side, you can bet v2.0 of the trojan will get it on the unencrypted side.
Am I missing something ? (Score:2, Insightful)
This seemed to be saying that it will be installed on the ISP's end which seemed like not such a big deal as ISPs monitor the network data to some extent anyway
Dear Swiss People (Score:4, Insightful)
Re:Dear Swiss People (Score:4, Informative)
Do you know the first thing about Switzerland anyway?
FTA: "[...]is therefore examining the use of spy software to allow it to listen in on conversations on PCs[...]" I say: Yay for the Swiss government. They are examining this? Good, examining doesn't hurt. The press (ok, one newspaper... they might be misinformed) has heard about it and published it. People are being informed.
The contrast to the USA?
Well, firstly i'm sure somebody is examining the possible use of this or similar software in the US, too. But contrary to the US, Switzerland does not have a Patriot Act or similar stupid laws to allow wiretaps without a warrant.
Secondly, Switzerland is a direct democracy. The Swiss people can actually oppose anything the government decides and put it up to a vote. Yes, you heard right: no president can decide 'let's take away some rights from the people' without the people having the last word (for that matter, our executive is made up of 7 'ministers' (Bundesrat), with all of them together not having as much power as the US president on his own!).
So, to sum up my rant: I have no big fear of my government spying on me, while I am certain the NSA is spying on all of us. "Welcome to the USA!!!", indeed, for the world is your playground for all you care (and no, I don't hate Americans, just can's stand the current administration).
Re: (Score:2)
One of the downsides of the way the US government functions is that it tends to produce a choice between bad and worse - and one WILL be chosen.
VOIP over Torrent (Score:2)
Re: (Score:2)
Re: (Score:2)
wrong (Score:2, Interesting)
2.administration of law outside legal jurisdiction
3.stealing computing time
4.stealing bandwidth from us who need it.
5.intellectual property compromise
wrong.fuckers.misguided.immoral.
lets reverse engineer this and use it on them! see how they fucking like it.
another bunch of politicians that decide our everyday freedoms.
Re: (Score:2)
And this gets installed on... (Score:2)
A Swiss perspective (Score:3, Funny)
Re: (Score:2)
Software != THING (Score:2)
Every time I read about how anyone, government or otherwise, wants to deploy some sort of software 'tool' to accomplish something, either to ensure security/privacy or to deny it, I invariable consider any means to defeat the measure or to use it for uni
why wants to be first (Score:2)
it will only be distributed to investigation agencies in the hopes of keeping it out of the hands of malicious hackers since firewalls apparently 'do not present a problem' for the software."
Last I checked, a hacker's main activity is finding things that you are trying to hide from them?
quantum leap (Score:2)
... Profit! (Score:2)
"supply it solely to investigation agencies. This should also prevent antivirus manufacturers from incorporating it into their databases and having their tools recognise it. According to the manufacturer, firewalls do not present a problem.
Installation of the software wiretap is to be carried out on the instructions of a judge only. The ISPs of the persons under investigation will then slip the program onto their computers."
It says that the software will be supplied solely to investigation agencies
Re: (Score:2)
The oft undocumented INCONSPICUOUS field .... (Score:2)
Re: (Score:2)
Because people can easily encrypt voice communications. This software, being on the client side, can get around encryption. Of course, all this assumes that they know what they're looking for -- I doubt they would know what to do with Asterix, even if it existed for Windows.
As for switching to a new OS, you're right, I do feel a lot safer on Linux.
Re: (Score:2)
Preventing malware from being remotely placed on your system boils down to the usual Internet security measures (firewall, running only needed services, Firefox with NoScript, etc).
Re: (Score:2)
I'd much rather have my own computer running Windows then have to share the root account on a Linux computer.
Depends. (Score:2)
First off, most places allow some sort of outbound port 80, even if it is heavily restricted. The last place I worked at allowed outbound connections to the Debian update servers, and only through a proxy, but the principle is the same. And if you allow web browsing of any normal sort, it can be very difficult to differentiate between legit web browsing and something like this.
Now, it could be more complex, but to suggest that firewalls don't present a problem is to display an absurd amount of arrogance.
Re: (Score:2)
Re: (Score:3, Insightful)
How do they plan on doing that, exactly?
Re: (Score:3, Insightful)
Re: (Score:2)
Have fun with Debian users, then
Modern Apt uses GPG signatures to verify package lists, and contains MD5 and SHA1 *and* SHA256 hashes in the lists for the individual packages.
Re: (Score:2)
Re: (Score:3, Informative)
You done with that strawman yet? I'd like a whack at it...
If you use VoIP, you must have firewall rules allowing VoIP traffic out (and probably back in, but not neccessary for spying on the user).
Thus, this trojan would only need to connect the same way as your legitimate VoIP client. It could even act more-or-less like real VoIP traffic, since it basically needs to duplicat
Re: (Score:2)
Re: (Score:2)