diff options
Diffstat (limited to 'updates/2015')
-rw-r--r-- | updates/2015/weltweit-computer-und-mobiltelefone-hacken.en.md | 132 |
1 files changed, 132 insertions, 0 deletions
diff --git a/updates/2015/weltweit-computer-und-mobiltelefone-hacken.en.md b/updates/2015/weltweit-computer-und-mobiltelefone-hacken.en.md new file mode 100644 index 00000000..c076215f --- /dev/null +++ b/updates/2015/weltweit-computer-und-mobiltelefone-hacken.en.md | |||
@@ -0,0 +1,132 @@ | |||
1 | title: UK government claims power for broad, suspicionless hacking of computers and phones | ||
2 | date: 2015-03-17 21:18:00 | ||
3 | updated: 2015-03-17 23:57:18 | ||
4 | author: vollkorn | ||
5 | tags: update, pressemitteilung | ||
6 | |||
7 | The British Government has admitted its intelligence services have the broad power to hack into personal phones, computers, and communications networks, and claims they are legally justified to hack anyone, anywhere in the world, even if the target is not a threat to national security nor suspected of any crime. | ||
8 | |||
9 | <!-- TEASER_END --> | ||
10 | |||
11 | These startling admissions come from a government court document | ||
12 | published today by [Privacy | ||
13 | International](https://www.privacyinternational.org/). \[1\] The | ||
14 | document was filed by the government in response to two court cases | ||
15 | initiated last year against GCHQ that challenge the invasive | ||
16 | state-sponsored hacking revealed by Edward Snowden. \[2\] In the | ||
17 | document, the Government outlines its broad authority to infiltrate | ||
18 | personal devices and the networks we use everyday. | ||
19 | |||
20 | Buried deep within the document, Government lawyers claim that while the | ||
21 | intelligence services require authorisation to hack into the computer | ||
22 | and mobile phones of "intelligence targets", GCHQ is equally permitted | ||
23 | to break into computers anywhere in the world even if they are not | ||
24 | connected to a crime or a threat to national security. | ||
25 | |||
26 | Such powers are a massive invasion of privacy. Hacking is the modern | ||
27 | equivalent of entering someone's house, searching through her filing | ||
28 | cabinets, diaries and correspondence, and planting devices to permit | ||
29 | constant surveillance in future. If mobile devices are involved, the | ||
30 | government can obtain historical information including every location | ||
31 | visited in the past year and the ongoing surveillance will capture the | ||
32 | affected individual wherever they go. | ||
33 | |||
34 | Additionally, the intelligence services assert the right to exploit | ||
35 | communications networks in covert manoeuvres that severely undermine the | ||
36 | security of the entire internet. The deployment of such powers is | ||
37 | confirmed by recent news stories detailing how GCHQ hacked into Belgacom | ||
38 | using the malware Regin, and targeted Gemalto, the world's largest maker | ||
39 | of SIM cards used in countries around the world. | ||
40 | |||
41 | The court document relies heavily on a draft code on "equipment | ||
42 | interference", which was quietly released to the public on the same day | ||
43 | that the Investigatory Powers Tribunal (IPT) found that GCHQ had | ||
44 | previously engaged in unlawful information sharing with the United | ||
45 | States' National Security Agency. | ||
46 | |||
47 | For the past decade, GCHQ have been involved in state-sponsored hacking, | ||
48 | or "Computer Network Exploitation", without this code being available to | ||
49 | the public. This lack of transparency is a violation of the requirement | ||
50 | that the intelligence services act in accordance with law. The draft | ||
51 | code has not yet been approved by Parliament, and is open for public | ||
52 | comment until 20 March 2015. | ||
53 | |||
54 | Last week's ISC report admits for the first time that GCHQ relies on | ||
55 | security vulnerabilities, including, zero-day vulnerabilities, for its | ||
56 | CNE operations, but redacts the exact number of vulnerabilities | ||
57 | disclosed. | ||
58 | |||
59 | Privacy International assisted in filing two separate complaints to the | ||
60 | IPT challenging GCHQ's widespread hacking. The first, in which Privacy | ||
61 | International is the claimant, centres around GCHQ and the NSA's | ||
62 | reported power to infect potentially millions of computer and mobile | ||
63 | devices around the world with malicious software that gives them the | ||
64 | ability to sweep up reams of content, switch on users' microphones or | ||
65 | cameras, listen to their phone calls and track their locations. It is | ||
66 | the first UK legal challenge to the use of hacking tools by intelligence | ||
67 | services. | ||
68 | |||
69 | The second complaint was filed by seven internet service and | ||
70 | communications providers from around the world, who are calling for an | ||
71 | end to GCHQ's exploitation of network infrastructure in order to | ||
72 | unlawfully gain access to potentially millions of people's private | ||
73 | communications. The complaint, filed by Riseup (US), GreenNet (UK), | ||
74 | Greenhost (Netherlands), Mango (Zimbabwe), Jinbonet (Korea), May | ||
75 | First/People Link (US), and the Chaos Computer Club (Germany), is the | ||
76 | first time that internet and communication providers have taken | ||
77 | collective action against GCHQ's targeting, attacking and exploitation | ||
78 | of network communications infrastructure. | ||
79 | |||
80 | Cedric Knight of GreenNet said: | ||
81 | |||
82 | "Our joint action has already resulted in the intelligence services | ||
83 | publishing their interpretation of UK law. Unfortunately what has been | ||
84 | revealed is not pretty. There is nothing in GCHQ's response to reassure | ||
85 | us that they are not targeting our staff or equipment. We remain | ||
86 | extremely concerned that Ed Snowden was right about GCHQ having the most | ||
87 | intrusive capabilities of any security agency, and about exactly how | ||
88 | widespread their computer network exploitation may be, and the risks to | ||
89 | network security and the privacy, freedom and safety of internet users | ||
90 | around the world." | ||
91 | |||
92 | Jan Girlich, spokesperson for the Chaos Computer Club, Germany, said: | ||
93 | |||
94 | "It is apparent that GCHQ feels it has unlimited powers and does not | ||
95 | care to work within its legal framework. Hacking of network | ||
96 | infrastructure and people’s phones and devices for claimed national | ||
97 | security reasons is actually undermining the IT security on a structural | ||
98 | level. It leaves our infrastructure vulnerable and the people’s personal | ||
99 | information in the hands of a secret service not bound to the law, | ||
100 | wielding massive power over everybody they wish. Declaring infiltration | ||
101 | and hacking of arbitrary computers worldwide legal by publishing the | ||
102 | rules under which these activities happen, does not make it right. Mass | ||
103 | surveillance and hacking is still wrong and must be stopped." | ||
104 | |||
105 | May First/People Link said: | ||
106 | |||
107 | "The Internet is a technology that breaks through the destructive | ||
108 | barriers of national borders by providing each of us access to the | ||
109 | thinking and experiences of the rest of humanity but some governments | ||
110 | use this borderless state to abuse rights and effectively pervert the | ||
111 | concept of access to experience. May First joins with our colleagues in | ||
112 | combating that perversion." | ||
113 | |||
114 | Korean Progressive Network Jinbonet said: | ||
115 | |||
116 | "It's really surprising that the British Government claims that they can | ||
117 | lawfully hack anyone in the world even without any suspicion. | ||
118 | Intelligence agencies of each country including GCHQ and National | ||
119 | Intelligence service of Korea seem to forget for whom and for what they | ||
120 | have to serve. National security which is not based on rule of law and | ||
121 | human rights would serve only the interest of the powerful." | ||
122 | |||
123 | Links: | ||
124 | |||
125 | - \[1\] [Open response in GCHQ | ||
126 | complaint](/system/uploads/174/original/Privacy_Greennet_Open_Response_6_Feb_2015.pdf) | ||
127 | (pdf) | ||
128 | - \[2\] [Chaos Computer Club files complaint against | ||
129 | GCHQ](http://ccc.de/en/updates/2014/chaos-computer-club-klagt-gegen-gchq) | ||
130 | - \[3\] [Global surveillance and hacking | ||
131 | disclosures](http://en.wikipedia.org/wiki/Global_surveillance_disclosures_%282013%E2%80%93present%29) | ||
132 | (2013–present) | ||