{"id":6495,"date":"2020-12-29T22:35:00","date_gmt":"2020-12-29T21:35:00","guid":{"rendered":"https:\/\/webhosting.de\/?p=6495"},"modified":"2020-12-28T22:36:36","modified_gmt":"2020-12-28T21:36:36","slug":"state-trojan-authorities-hack-hundreds-of-computers-annually","status":"publish","type":"post","link":"https:\/\/webhosting.de\/en\/staatstrojaner-behoerden-hacken-hunderte-computer-jaehrlich\/","title":{"rendered":"State Trojans - Authorities hack hundreds of computers a year"},"content":{"rendered":"<p class=\"wp-block-paragraph\">A <a href=\"https:\/\/www.bundesjustizamt.de\/DE\/SharedDocs\/Publikationen\/Justizstatistik\/Uebersicht_TKUE_2019.pdf?__blob=publicationFile&amp;v=2\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Statistics<\/a> (PDF) of the <a href=\"https:\/\/www.bundesjustizamt.de\/DE\/Presse\/Archiv\/2020\/20201218.html?nn=3452270\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Federal Office of Justice<\/a> (BjV) reveals that federal and state investigators will use computers and smartphones belonging to suspects in several hundred cases in 2019 <a href=\"https:\/\/webhosting.de\/en\/wordpress-gehackt-bekommen-sie-es-wieder-sicher\/\">hacked<\/a> have. Overall, according to the first-ever publication of the <a href=\"https:\/\/webhosting.de\/en\/personenbezogene-daten-sozialen-netzwerken\/\">Data<\/a> 600 procedures for so-called source telecommunication surveillance (source TK\u00dc) and online searches. Of these, 380 were actually implemented. The statistics do not show how many devices were successfully hacked.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Mecklenburg-Western Pomerania (95), Lower Saxony (89) and Saxony (76) had the most proceedings. The Federal Public Prosecutor's Office and six federal states did not use the still relatively new investigative methods at all in 2019. The most frequent use of source tK\u00dc is in investigations into drug offences.<\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p>\"An order may have authorized the monitoring of more than one telephone number or identifier, so that the number of orders shown is not identical to the number of telephone numbers or other identifiers monitored.\"<\/p><cite>BfV<\/cite><\/blockquote><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-quellen-tk-gegen-verschl-sselte-kommunikation\">Source TK\u00dc against encrypted communication<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">According to <a href=\"https:\/\/www.gesetze-im-internet.de\/stpo\/__100a.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">\u00a7 100a Code of Criminal Procedure<\/a> (StPO), the <a href=\"https:\/\/www.bka.de\/DE\/UnsereAufgaben\/Ermittlungsunterstuetzung\/Technologien\/QuellentkueOnlinedurchsuchung\/quellentkueOnlinedurchsuchung_node.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Source-TK\u00dc<\/a> is mainly used to intercept encrypted communications. Unencrypted communications, on the other hand, can be evaluated by the investigating authorities via conventional surveillance orders. In 2019, this was authorised in 5,252 criminal proceedings in 18,225 cases.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-onlinedurchsuchung-kommt-selten-zum-einsatz\">Online searches are rarely used<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The so-called online search, on the other hand, is used much less frequently, which is due to the fact that the threshold for intervention according to <a href=\"https:\/\/www.gesetze-im-internet.de\/stpo\/__100b.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">\u00a7 100b<\/a> of the StPO is significantly higher. In contrast to source CCTV, this investigative method not only monitors the communications of suspects, but also reads out stored data.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">According to the <a href=\"https:\/\/www.bundesjustizamt.de\/DE\/SharedDocs\/Publikationen\/Justizstatistik\/Uebersicht_Online_Durchsuchung_2019.pdf?__blob=publicationFile&amp;v=2\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Statistics<\/a> (PDF) of the BfJ, online searches were applied for only 20 times in 2019 and implemented 12 times. Half of the applications came from Bavaria. The Federal Public Prosecutor as well as the federal states of Baden-W\u00fcrttemberg, Berlin, Rhineland-Palatinate, Saxony-Anhalt, Schleswig-Holstein and Thuringia did not use online searches or source tapping.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-keine-details-zur-technischen-umsetzung\">No details on the technical implementation<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The statistics do not reveal how source tapping and online searches were technically implemented. However, the federal government recently answered a written question by MP Dieter Dehm (Left Party) that technical problems often make hacking terminal devices more difficult.<\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p>\"Source CCTV and online searches are usually limited to a few cases due to a very high operational effort and technical difficulties and can therefore rarely be actually used in practice.\"<\/p><cite>Federal Government<\/cite><\/blockquote><\/figure>","protected":false},"excerpt":{"rendered":"<p>Investigative agencies have used source tK\u00dc and online searches in several hundred cases in 2019.<\/p>","protected":false},"author":2,"featured_media":6491,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","inline_featured_image":false,"footnotes":""},"categories":[709],"tags":[959,960],"class_list":["post-6495","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-recht","tag-staatstrojaner","tag-ueberwachung"],"acf":[],"_wp_attached_file":null,"_wp_attachment_metadata":null,"litespeed-optimize-size":null,"litespeed-optimize-set":null,"_elementor_source_image_hash":null,"_wp_attachment_image_alt":null,"stockpack_author_name":null,"stockpack_author_url":null,"stockpack_provider":null,"stockpack_image_url":null,"stockpack_license":null,"stockpack_license_url":null,"stockpack_modification":null,"color":null,"original_id":null,"original_url":null,"original_link":null,"unsplash_location":null,"unsplash_sponsor":null,"unsplash_exif":null,"unsplash_attachment_metadata":null,"_elementor_is_screenshot":null,"surfer_file_name":null,"surfer_file_original_url":null,"envato_tk_source_kit":null,"envato_tk_source_index":null,"envato_tk_manifest":null,"envato_tk_folder_name":null,"envato_tk_builder":null,"envato_elements_download_event":null,"_menu_item_type":null,"_menu_item_menu_item_parent":null,"_menu_item_object_id":null,"_menu_item_object":null,"_menu_item_target":null,"_menu_item_classes":null,"_menu_item_xfn":null,"_menu_item_url":null,"_trp_menu_languages":null,"rank_math_primary_category":"709","rank_math_title":null,"inline_featured_image":null,"_yoast_wpseo_primary_category":"709","rank_math_schema_blogposting":null,"rank_math_schema_videoobject":null,"_oembed_049c719bc4a9f89deaead66a7da9fddc":null,"_oembed_time_049c719bc4a9f89deaead66a7da9fddc":null,"_yoast_wpseo_focuskw":null,"_yoast_wpseo_linkdex":null,"_oembed_27e3473bf8bec795fbeb3a9d38489348":null,"_oembed_c3b0f6959478faf92a1f343d8f96b19e":null,"_trp_translated_slug_en_us":null,"_wp_desired_post_slug":null,"_yoast_wpseo_title":null,"tldname":null,"tldpreis":null,"tldrubrik":null,"tldpolicylink":null,"tldsize":null,"tldregistrierungsdauer":null,"tldtransfer":null,"tldwhoisprivacy":null,"tldregistrarchange":null,"tldregistrantchange":null,"tldwhoisupdate":null,"tldnameserverupdate":null,"tlddeletesofort":null,"tlddeleteexpire":null,"tldumlaute":null,"tldrestore":null,"tldsubcategory":null,"tldbildname":null,"tldbildurl":null,"tldclean":null,"tldcategory":null,"tldpolicy":null,"tldbesonderheiten":null,"tld_bedeutung":null,"_oembed_d167040d816d8f94c072940c8009f5f8":null,"_oembed_b0a0fa59ef14f8870da2c63f2027d064":null,"_oembed_4792fa4dfb2a8f09ab950a73b7f313ba":null,"_oembed_33ceb1fe54a8ab775d9410abf699878d":null,"_oembed_fd7014d14d919b45ec004937c0db9335":null,"_oembed_21a029d076783ec3e8042698c351bd7e":null,"_oembed_be5ea8a0c7b18e658f08cc571a909452":null,"_oembed_a9ca7a298b19f9b48ec5914e010294d2":null,"_oembed_f8db6b27d08a2bb1f920e7647808899a":null,"_oembed_168ebde5096e77d8a89326519af9e022":null,"_oembed_cdb76f1b345b42743edfe25481b6f98f":null,"_oembed_87b0613611ae54e86e8864265404b0a1":null,"_oembed_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_oembed_time_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_tldname":null,"_tldclean":null,"_tldpreis":null,"_tldcategory":null,"_tldsubcategory":null,"_tldpolicy":null,"_tldpolicylink":null,"_tldsize":null,"_tldregistrierungsdauer":null,"_tldtransfer":null,"_tldwhoisprivacy":null,"_tldregistrarchange":null,"_tldregistrantchange":null,"_tldwhoisupdate":null,"_tldnameserverupdate":null,"_tlddeletesofort":null,"_tlddeleteexpire":null,"_tldumlaute":null,"_tldrestore":null,"_tldbildname":null,"_tldbildurl":null,"_tld_bedeutung":null,"_tldbesonderheiten":null,"_oembed_ad96e4112edb9f8ffa35731d4098bc6b":null,"_oembed_8357e2b8a2575c74ed5978f262a10126":null,"_oembed_3d5fea5103dd0d22ec5d6a33eff7f863":null,"_eael_widget_elements":null,"_oembed_0d8a206f09633e3d62b95a15a4dd0487":null,"_oembed_time_0d8a206f09633e3d62b95a15a4dd0487":null,"_aioseo_description":null,"_eb_attr":null,"_eb_data_table":null,"_oembed_819a879e7da16dd629cfd15a97334c8a":null,"_oembed_time_819a879e7da16dd629cfd15a97334c8a":null,"_acf_changed":null,"_wpcode_auto_insert":null,"_edit_last":"1","_edit_lock":"1609191398:1","_oembed_e7b913c6c84084ed9702cb4feb012ddd":null,"_oembed_bfde9e10f59a17b85fc8917fa7edf782":null,"_oembed_time_bfde9e10f59a17b85fc8917fa7edf782":null,"_oembed_03514b67990db061d7c4672de26dc514":null,"_oembed_time_03514b67990db061d7c4672de26dc514":null,"rank_math_news_sitemap_robots":"index","rank_math_robots":["index"],"_eael_post_view_count":"4071","_trp_automatically_translated_slug_ru_ru":null,"_trp_automatically_translated_slug_et":"state-trojan-authorities-hack-hundreds-of-computers-annually","_trp_automatically_translated_slug_lv":"valsts-trojan-authorities-hack-hundreds-of-computers-annually","_trp_automatically_translated_slug_fr_fr":null,"_trp_automatically_translated_slug_en_us":null,"_wp_old_slug":null,"_trp_automatically_translated_slug_da_dk":null,"_trp_automatically_translated_slug_pl_pl":null,"_trp_automatically_translated_slug_es_es":null,"_trp_automatically_translated_slug_hu_hu":null,"_trp_automatically_translated_slug_fi":"state-trojan-authorities-hack-hundreds-of-computers-annually","_trp_automatically_translated_slug_ja":"%e3%83%88%e3%83%ad%e3%82%a4%e3%81%ae%e6%9c%a8%e9%a6%ac%e3%81%ae%e6%9c%a8%e9%a6%ac%e5%9b%bd%e5%ae%b6%e3%81%af%e6%af%8e%e5%b9%b4%e4%bd%95%e7%99%be%e5%8f%b0%e3%82%82%e3%81%ae%e3%82%b3%e3%83%b3%e3%83%94","_trp_automatically_translated_slug_lt_lt":null,"_elementor_edit_mode":null,"_elementor_template_type":null,"_elementor_version":null,"_elementor_pro_version":null,"_wp_page_template":null,"_elementor_page_settings":null,"_elementor_data":null,"_elementor_css":null,"_elementor_conditions":null,"_happyaddons_elements_cache":null,"_oembed_75446120c39305f0da0ccd147f6de9cb":null,"_oembed_time_75446120c39305f0da0ccd147f6de9cb":null,"_oembed_3efb2c3e76a18143e7207993a2a6939a":null,"_oembed_time_3efb2c3e76a18143e7207993a2a6939a":null,"_oembed_59808117857ddf57e478a31d79f76e4d":null,"_oembed_time_59808117857ddf57e478a31d79f76e4d":null,"_oembed_965c5b49aa8d22ce37dfb3bde0268600":null,"_oembed_time_965c5b49aa8d22ce37dfb3bde0268600":null,"_oembed_81002f7ee3604f645db4ebcfd1912acf":null,"_oembed_time_81002f7ee3604f645db4ebcfd1912acf":null,"_elementor_screenshot":null,"_oembed_7ea3429961cf98fa85da9747683af827":null,"_oembed_time_7ea3429961cf98fa85da9747683af827":null,"_elementor_controls_usage":null,"_elementor_page_assets":[],"_elementor_screenshot_failed":null,"theplus_transient_widgets":["tp-video-player"],"_eael_custom_js":null,"_wp_old_date":null,"_trp_automatically_translated_slug_it_it":null,"_trp_automatically_translated_slug_pt_pt":null,"_trp_automatically_translated_slug_zh_cn":null,"_trp_automatically_translated_slug_nl_nl":null,"_trp_automatically_translated_slug_pt_br":null,"_trp_automatically_translated_slug_sv_se":null,"rank_math_analytic_object_id":"492","rank_math_internal_links_processed":null,"_trp_automatically_translated_slug_ro_ro":null,"_trp_automatically_translated_slug_sk_sk":null,"_trp_automatically_translated_slug_bg_bg":null,"_trp_automatically_translated_slug_sl_si":null,"litespeed_vpi_list":["webhostinglogo.png"],"litespeed_vpi_list_mobile":["webhostinglogo.png"],"rank_math_seo_score":null,"rank_math_contentai_score":null,"ilj_limitincominglinks":null,"ilj_maxincominglinks":null,"ilj_limitoutgoinglinks":null,"ilj_maxoutgoinglinks":null,"ilj_limitlinksperparagraph":null,"ilj_linksperparagraph":null,"ilj_blacklistdefinition":null,"ilj_linkdefinition":[],"_eb_reusable_block_ids":null,"rank_math_focus_keyword":null,"rank_math_og_content_image":null,"_yoast_wpseo_metadesc":"Ermittlungsbeh\u00f6rden haben 2019 die Quellen-TK\u00dc und Onlinedurchsuchung in mehreren Hunder F\u00e4llen eingesetzt.","_yoast_wpseo_content_score":"60","_yoast_wpseo_focuskeywords":"[]","_yoast_wpseo_keywordsynonyms":"[\"\"]","_yoast_wpseo_estimated-reading-time-minutes":null,"rank_math_description":"Ermittlungsbeh\u00f6rden haben 2019 die Quellen-TK\u00dc und Onlinedurchsuchung in mehreren Hunder F\u00e4llen eingesetzt.","surfer_last_post_update":null,"surfer_last_post_update_direction":null,"surfer_keywords":null,"surfer_location":null,"surfer_draft_id":null,"surfer_permalink_hash":null,"surfer_scrape_ready":null,"_thumbnail_id":"6491","footnotes":null,"_links":{"self":[{"href":"https:\/\/webhosting.de\/en\/wp-json\/wp\/v2\/posts\/6495","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webhosting.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webhosting.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webhosting.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/webhosting.de\/en\/wp-json\/wp\/v2\/comments?post=6495"}],"version-history":[{"count":0,"href":"https:\/\/webhosting.de\/en\/wp-json\/wp\/v2\/posts\/6495\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webhosting.de\/en\/wp-json\/wp\/v2\/media\/6491"}],"wp:attachment":[{"href":"https:\/\/webhosting.de\/en\/wp-json\/wp\/v2\/media?parent=6495"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webhosting.de\/en\/wp-json\/wp\/v2\/categories?post=6495"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webhosting.de\/en\/wp-json\/wp\/v2\/tags?post=6495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}