News

German Police Barred from Secret Internet Computer Searches

Police cannot secretly search suspects' computer hard drives over the Internet, a German court ruled Monday.

The decision of the Federal Court of Justice in Karlsruhe bars police from using software to search through remote hard drives unless parliament passes a law explicitly allowing the technique. Police, however, still will be allowed to seize evidence from PCs when conducting searches in person.

Arguing that stealth searches were indispensable to investigating criminals and terrorists, Interior Minister Wolfgang Schaeuble, the country's top security official responsible for police, called on the government to seek swift changes in the law.

"It is indispensable for criminal investigators to be able to carry out online searches secretly and with a corresponding order from a judge," he said in a statement.

The decision came in response to a request by the Federal Prosecutor's Office, which had sought to use Trojan horse programs to investigate a possible terrorist group. Prosecutors argued the legal reasoning used to allow telephone surveillance and other electronic eavesdropping techniques should be applicable to gathering evidence over the Internet.

Although the decision produces difficulties in evidence collection, the prosecutor's office welcomed the decision, saying it clarified the issue. Officials there also called for legislation enabling the remote searches.

Members of the opposition Left Party and Free Democrats said the court's decision was a victory for civil liberties.

Featured

  • Microsoft Publishes Windows Deadlines on Upgrading to SHA-2

    Microsoft on Friday described its 2019 timeline for when it will start distrusting Shell Hashing Algorithm-1 (SHA-1) in supported Windows systems, as well as in the Windows Server Update Services 3.0 Service Pack 2 management product.

  • Performing a Storage Refresh on Windows Server 2016, Part 1

    To spruce up some aging lab hardware, Brien decided to make the jump to all-flash storage. Here's a walk-through of the first half of the process.

  • Datacenters Are Cooling Down as Buildouts Heat Up

    Tech giants Google, Apple and others are expanding their datacenter footprints at a rapid rate, and it's pushing the industry to find better ways to power all that infrastructure.

  • Vendors Issue Patches for Linux Container Runtime Flaw Enabling Host Attacks

    This week, the National Institute of Standards and Technology (NIST) described a high-risk security vulnerability (CVE-2019-5736) for organizations using containers that could lead to compromised host systems.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.