UK to adopt Euro police hacking scheme

Posted by   Virus Bulletin on   Jan 6, 2009

Remote search and cyber patrol plans approved.

The UK Home Office has signed up to a European initiative, proposed in November, to grant police forces greater powers to hack into computers and monitor internet traffic in search of incriminating evidence.

The UK police already admits to engaging in cyber-espionage on occasion, in some cases with no requirement for a warrant under existing legislation, but the new powers will give them significantly more opportunities to hone their hacking skills, worrying some human rights watchdogs.

The scheme is designed to combat serious and organised criminals using computers and the web as a data-storage and communication medium, but should also improve police powers to bring cybercriminals, whose crimes take place entirely in the online world, to justice. However, the likelihood that law enforcement organisations will create and implement their own keyloggers, screengrabbers and other spyware utilities presents difficulties for security firms, many of whom have openly stated that they will not be whitelisting or otherwise ignoring any suspect samples originating from police forces.

The European proposals also encourage data sharing between police forces, which some privacy advocates suspect may grant foreign police rights to hack into system based in the UK and vice versa, while far greater monitoring of the internet as a whole will also become possible.

Reports of the announcement can be found at ZDNet here, VNUnet here or the BBC here, with typically strident comment from Sophos' Graham Cluley here.

Posted on 06 January 2009 by Virus Bulletin

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

Throwback Thursday: Giving the EICAR test file some teeth

The 68-byte EICAR test file plays as important a role today as it did 19 years ago. In this week's Throwback Thursday we look back at a VB99 conference paper in which Randy Abrams described how this 'miracle tool' worked and how it could be used.

XMRig used in new macOS cryptominer

A new piece of cryptocurrency-mining malware on macOS has been found to use the popular XMRig miner.

Tendency for DDoS attacks to become less volumetric fits in a wider trend

CDN provider Cloudflare reports an increase in DDoS attacks targeting layer 7 and focusing on exhausting server resources rather than sending large volumes of data. This fits in a wider trend.

Turkish Twitter users targeted with mobile FinFisher spyware

Through fake social media accounts, users were tricked into installing an Android application that was actually a mobile version of the FinFisher spyware.

Hide'n'Seek IoT botnet adds persistence

The Hide'n'Seek IoT botnet has received an update to make its infection persist on infected devices beyond a restart.