{"id":79,"date":"2008-01-26T23:54:04","date_gmt":"2008-01-27T07:54:04","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/2008\/01\/26\/alledged-skype-surveillance-by-german-police\/"},"modified":"2008-01-26T23:56:51","modified_gmt":"2008-01-27T07:56:51","slug":"alledged-skype-surveillance-by-german-police","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2008\/01\/26\/alledged-skype-surveillance-by-german-police\/","title":{"rendered":"Alledged Skype Surveillance by German Police"},"content":{"rendered":"<p>Documents posted today on WikiLeaks suggest that German police in Bavaria may have used a trojan for intercepting Skype calls as part of their surveillance of suspects. One document is an offer from DigiTask, a German company, to rent Skype surveillance technology at EUR 3,500 per month per instance. The other document is a letter between the Ministry of Justice and the Prosecutors office about distributing this cost.<\/p>\n<p><!--more-->As explained in the DigiTask offer, Skype uses 256-bit AES encryption for its communications, and the data captured with traditional dial-up or DSL surveillance methods cannot be decrypted. Instead, DigiTask offers a &#8220;Skype-Capture-Unit&#8221; to be installed directly on the suspects computer. The trojan, they claim, would then forward the pre-encrypted Skype data to an anonymous proxy server which in turn can forward the data live to police.<\/p>\n<p>DigiTask also offers software for decoding SSL data with a Man-in-the-Middle attack, allowing SSL-encrypted data in an intercepted broadband connection to be decrypted and visualized by the police. According to the offer, dated September 4th 2007, they support SSL interception in both Firefox and Internet Explorer. Naturally, DigiTasks warns that it does not take responsiblity for the usage of the software or any damages caused by it.<\/p>\n<p>Although these documents do not give evidence that the Bavarian police actually employed trojans and MITM attacks for surveillance, if valid, the leaks do shed insight on the scale of surveillance operations. The Bavarian police, for their part, did not seem to have qualms about such an intrusion and the very existence of DigiTask, a seemingly well-established company profiting from the secret sales of surveillance software, introduces (for me at least) a new adversary in the privacy arena. For those interested in the privacy of computerized data, the scales have just been jarred.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Documents posted today on WikiLeaks suggest that German police in Bavaria may have used a trojan for intercepting Skype calls as part of their surveillance of suspects. One document is an offer from DigiTask, a German company, to rent Skype &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2008\/01\/26\/alledged-skype-surveillance-by-german-police\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,9],"tags":[],"class_list":["post-79","post","type-post","status-publish","format-standard","hentry","category-current-events","category-privacy"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/79","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=79"}],"version-history":[{"count":0,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/79\/revisions"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=79"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=79"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=79"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}