Will Security Firms Detect Police Spyware? 269
cnet-declan writes "A recent appeals court case dealt with Drug Enforcement Administration agents using a key logger to investigate a suspect using PGP and Hushmail. That invites the obvious question: Will security companies ever intentionally overlook police spyware? There were somewhat-muddled reports in 2001 that Symantec and McAfee would do just that, so over at News.com we figured we'd do a survey of the top 13 security firms. We asked them if it is their policy to detect policeware. Notably, Check Point said it would 'afford law enforcement' the courtesy of whitelisting if requested. We've also posted the full results, with the companies' complete answers. Another question we asked is if they have ever received a court order requiring them to overlook police key loggers or spyware. Symantec, IBM, Kaspersky, and others said no. Only Microsoft and McAfee refused to answer."
Security (Score:2, Insightful)
Jvgu Ohfu va bssvpr lbh pna bayl rkcrpg zber
Re:Security (Score:5, Informative)
"Government agencies and backdoors in technology products have a long and frequently clandestine relationship. One 1995 expose by the Baltimore Sun described how the National Security Agency persuaded a Swiss firm, Crypto, to build backdoors into its encryption devices. In his 1982 book, The Puzzle Palace, author James Bamford described how the NSA's predecessor in 1945 coerced Western Union, RCA and ITT Communications to turn over telegraph traffic to the feds."
With Bush in office you can only expect more of the same.
Re: (Score:2)
it's not just the illegal NSA spying, which is just
a distraction from other avenues.
Re: (Score:3, Informative)
Anyone that trusts AV vendors - especially foreign ones - not to imbed backdoors and spyware, or to whitelist their government's "tools" is a bit too trusting IMHO.
AS LUCK WOULD HAVE IT... (Score:3, Informative)
http://www.wired.com/politics/law/news/2007/07/fb
What are the chances of... (Score:3, Interesting)
Re: (Score:3, Funny)
Re: (Score:3, Funny)
Would you TRUST their answers if they said "no"? (Score:5, Insightful)
Open Source all the way.
Re:Would you TRUST their answers if they said "no" (Score:3, Insightful)
Uhm no (Score:2, Interesting)
And publishing data or distributing which compromises investigations is probably a felony.
So how would your open source system work? Would you openly publish how to recognize all of the government's spy software?
The opposite. (Score:2)
Nope. Just the opposite. Instead of searching for software that could be spying on you, the transparency means that you already know what is running and what it is doing.
Re: (Score:2, Interesting)
Re: (Score:2, Insightful)
Sure, why not? Fight the power.
-matthew
Re: (Score:2, Insightful)
Damn straight! Would I put my name on it? Hell, no!
TFA didn't ask about National Security Letters (Score:5, Informative)
But if what they had received instead was a NSL, they would be under a gag provision (with *jail* as the penalty) to not mention anything about it.
That's only in Amerika of course.
Re: (Score:2, Interesting)
"Have you been given a court order to let police spyware in?" --> Must say no because of a gag order.
"Have you ever been in a position where the law required you to lie about questions related to your spyware activities?" --> ???
Re: (Score:2, Interesting)
Most likely, they'd just say they are unable to answer. "Null" answers are always an option for lawyers.
Re:TFA didn't ask about National Security Letters (Score:4, Funny)
Once you have signed the act, you are not allowed to reveal certain official secrets. He read the act and discovered that the fact that he had signed the act would be one of the official secrets that he was not allowed to reveal.
So, whenever he was asked whether he had signed the act, he would say "under section x.y of the act, I am not allowed to tell you that". Everyone took this to mean "yes", and duly proceeded to reveal their various secrets to him. Of course, he had never signed the act.
Re: (Score:3, Informative)
Re: (Score:3, Informative)
Re: (Score:2)
Get real. This can happen anywhere, so I will make the rare move in defense of America. There are lots of reasons to hate America but this is absurd. Enough said.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
"Is it your policy to alert the user to the presence of any spyware or
keystroke logger, even if it is installed by a police or intelligence
agency in the absence of a lawful court order signed by a judge?"
means that their software would still alert you.
Re: (Score:3, Interesting)
But if what they had received instead was a NSL, they would be under a gag provision (with *jail* as the penalty) to not mention anything about it.
So tell them to answer "no" until such time as their answer changes to "no comment"
Re:TFA didn't ask about National Security Letters (Score:5, Informative)
Re: (Score:2)
Re:Would you TRUST their answers if they said "no" (Score:2)
This is an interesting point. I think I'm willing to trust a company depending upon its previous behavior in regard to court orders, etc, and their overall behavior as a corporate actor. For example, I don't have any reason not to trust AVG, so I'm going to trust them unless I see a reason not to.
Microsoft on the other hand, I wouldn't trust as far as I can throw the entire set of Justice Dept. filings against them.
Re: (Score:3, Informative)
Of course, setting the permissions correctly is a PITA...and so is using a system so configured. But it's probably as secure as you can get, bar a disconnect from the internet.
New solution (Score:4, Funny)
Re: (Score:2)
So if the owl gets intercepted, you'll know it by the look of its feathers.
Are owls therefore quantum?
Re: (Score:3, Funny)
Re: (Score:2, Funny)
http://www.faqs.org/rfcs/rfc2549.html [faqs.org]
Quite reliable, actually..
note to self (Score:5, Informative)
never buy anything from check point.
Re: (Score:2, Flamebait)
What if they have a court order? Do you not have a phone either?
This whole article smells like FUD against the government. If they have a court order (with proper oversight), I don't see a problem with this
Re:note to self (Score:5, Insightful)
Re: (Score:2)
-matthew
Re:note to self (Score:5, Interesting)
--jeffk++
Re:note to self (Score:4, Insightful)
Technically law enforcement is giving the code away free, to the very criminals we should be endeavouring to keep the code away from, all they have to do is find it and get a cracker to reverse engineer it.
A back door is a back door is a back door, when you pay for security software you pay for a complete solution, not some thing that leaks like a sieve. Security companies either declare the holes in the package or they knowingly commit fraud about the security of the software that they are providing.
Basically if the law enforcement want to poke their sticky beaks in, they need to whack in a bit of hardware and have the warrant to go along with it, software is just a bull shit lazy trap waiting to blow up in their and our faces.
Re: (Score:3, Insightful)
never buy anything from check point.
So I presume you are against the police using spyware as a tool in all circumstances?
Would your opinion change if the Police had a warrant? What if asked your permission to "snoop" your notebook that was stolen from you a week before in an effort to recover it?
Is this just limited to adware? If you daughter were kidnapped, would you protest them using her cel phone to track her
Re: (Score:2, Insightful)
Re: (Score:2)
Not at all so long as the proper warrants are issued.
See above.
That sentence isn't grammatically correct, so I can't tell what you mean.
Re:note to self (Score:5, Insightful)
Warrants should be required for the police to install the keylogger, and a court order or similar should be required for the AV program vendor to assist. If the necessary warrants and orders are in place, by all means, they ought to comply. But CheckPoint has said they don't feel a need to wait for such -- just the say-so of the police. That way lies abuse of power.
Re: (Score:2)
Re: (Score:2)
Warrants should be required for the police to install the keylogger, and a court order or similar should be required for the AV program vendor to assist. If the necessary warrants and orders are in place, by all means, they ought to comply. But CheckPoint has said they don't feel a need to wait for such -- just the say-so of the police. That way lies abuse of power.
I doubt that checkpoint can turn off features of its product on a particular set of machines after the product has been sold and
Re: (Score:2)
Yah, no kidding. That's why he said it was okay if they had a warrant, i.e. with court oversight. Those first two sentences compri
Re: (Score:2)
Here, I don't think you understood the post. I'll repost it here to save you the trouble of looking it back up. I'll even bold the important part for ya:
I doubt that checkpoint can turn off features of its product on a particular set of machines after the product has been sold and installed. They either include the ability to check for law enforcement snooping or they don't unless checkpoint installs a back door that only they have access to, but then THEY become a spyware company!
In other words, if checkpoint has their software check for whatever law enforcement agencies use, then is going to check for whatever law enforcement agencies use. The checkpoint's software has no wa
Re: (Score:2)
I have no problem with law enforcement usin
Re: (Score:2, Insightful)
If you take away 100% of the ability to abuse, you end up with policemen walking a beat with little more than a whistle to do their jobs!
That's a real good indicator that we don't need so many policemen.
Now if we could just do something about the part about having 1100 new, lobbyist driven laws every year maybe we could balance things out.
The trick is to recognize the potential, demand oversight and employ extremely strict punishment to prevent abuse so the tools are allowed to be used in a legal manner.
That's not a trick. It's utter and complete fantasy to think that the system won't be exploited at the oversight level, or that "extremely strict punishment" won't be selectively enforced.
Re:note to self (Score:5, Interesting)
Oversight essentially means they run back to the office and time-stamp a preprinted form. There's a little more involved than that, but not much. They get to choose the most pliable judge available...and there are some who are pretty pliable.
The bizarre thing is that even THAT much oversight is seen as too much by those in charge of the snooping agencies. And it's not usually because of urgency. (As I recall they can get special exemptions for planting a bug on a target of opportunity...retroactive permission.)
The current moral corruption of the police appears to extend all the way from the local level to the federal. (I hope your local police are still honest. If so, count yourself lucky...or uninformed.)
This current level of corruption probably reaches back to Nixon's Imperial Presidency, and before him to FDR's centralization of the government. And before him, also. (Notice that it's not specific to any one party. What one party does, the other party rarely repeals.) With the removal of habeas corpus it's barely disguised any more. This *IS* a police state. So far it's a more humane one than most of it's predecessors, but it has the diagnostic features. Britain is, or appears to be headed, the same way.
Probably this is because of two basic features:
1) Population density makes it more difficult to control people, and
2) The removal of a frontier means that if the powers that be get mad at you, there's no place to escape to.
Ostensibly these two factors pull in opposite directions, but actually the freedom of the frontier had a back-transference that lead to greater liberty in the sessile population.
What can be done? Solutions seem either difficult or undesirable. Either drastically decrease the population (H5N1 may attempt this solution), or create a new frontier (which must be reachable at least by the middle class, if not by the impoverished). Space travel appears too expensive for the foreseeable future. Ditto for under-sea colonies. And it has to be a meat-space frontier. Virtual realities don't have the same "getting out from under the thumb of an oppressive government" effect (except in fantasy...which isn't sufficient).
Re: (Score:2)
So I presume you are against the police using spyware as a tool in all circumstances? Would your opinion change if the Police had a warrant? What if asked your permission to "snoop" your notebook that was stolen from you a week before in an effort to recover it?
No, not in all circumstances. That's just being ridiculous. I have no problem with police using spyware anymore than I have a problem with police doing wiretaps, once they have gotten the appropriate permission to do so. But that's really not what this is about.
That said, commercial enterprises that are selling me security software to perform a certain task should not be making exceptions. Would you buy encryption software that had a "back door" so that the police could decrypt whatever you encrypted?
Don't play stupid.. (Score:4, Insightful)
We keep gleefully throwing away our rights in the name of what? Fear? That's bad rationale. Our founding fathers must be turning in their graves.
Re: (Score:3, Insightful)
When a company whose product I've paid for decides that they want to decrease my access to due process (by whitelisting software for law enforcement WITHOUT a warrant, just on the LEO's say-so) my fourth amendment rights have been violated.
With a warrant/court order? Sure, I'd expect any reputable company t
Ah... (Score:2)
Re: (Score:2)
Re:note to self (Score:5, Insightful)
It's a simple rule of security: If there's a low security path, the bad guys will take it. That's how they win. Assuming otherwise is silly.
Re: (Score:3, Insightful)
I am opposed to the police using my property to collect evidence against me. It is much akin to my support for the right to not self-incriminate. You want to use your stuff to conduct surveillance? Cool (as long as you have proper authority, etc). But my stuff is my stuff.
Why is this important? Because in order for technology to take an increasing role in our personal lives, we must be able to trust our technology as much a
Re:note to self (Score:4, Insightful)
This isn't about how and when police should use wiretaps. It is about companies ignoring their ethical obligation to detect any and all "spyware." Hence the note to self: "Never by anything from Checkpoint" They either can't be trusted to do the job you pay them to do.
For an example of why this whitelisting is a problem regardless of whether or not individual wiretapping cases are legit: What if a criminal decides to utilize the police spyware? How hard can it be to take a machine has been "bugged" by the police, find the binary, and copy it for your own use... and do your dirty work undetected? All it takes is one clever hacker to dissect the police keylogger and distribute it amongst his friends....
-matthew
Re:note to self (Score:4, Insightful)
Re: (Score:2)
Re: (Score:2)
I don't know about the OP, but to me this has nothing to do with the police. I'm against using any antivirus or antispyware that has a built-in backdoor. It defeats the entire purpose of using such software -- all hackers/crackers would have to do is figure out what the "police code" is and they can distribute undetectable viruses all they like.
Re: (Score:2)
What happens if the 'good' malware technology gets into the wrong hands? I'm sure that couldn't happpen.
Re:note to self (Score:4, Insightful)
Yes, unless they have a proper warrant, legally issued by an actual judge. Refer to the 4th amendment.
Would your opinion change if the Police had a warrant?
A warrant means oversight. I'm fine with that. Again, refer to the 4th.
If you daughter were kidnapped, would you protest them using her cel phone to track her?
My only protest is that you are resorting to emotions instead of continuing intelligent debate. In any case, it's a clear non-sequitur (and poorly laid trap) and has no place in the discussion.
Re: (Score:2)
Fastens buckle on tinfoil hat (Score:5, Insightful)
These companies will cave to whatever law enforcement agency has jurisdiction for the investigation quicker than the last Harry Potter book hit the torrents. The only possible exception would be those AV companies that are immediately outside of the grasp of the agency involved. I don't even think that those companies are safe because their own governments would likely bear pressure to comply.
Re: (Score:3, Interesting)
true, but they could atleast try, like Google refused to turn-in the search queries. I know, not every company is
Well, this isn't exactly new... (Score:5, Informative)
Re: (Score:3, Interesting)
The libertarian definition of government is an organization that claims a legal monopoly on violence in a region. No company or organization is going to long survive direct and focused government duress - its assets will be seized and its staff find themselves contemplating uncomfortable surroundings. That said, everyone should expect that organizations will comply with court orders / security directives (at lease once they
Paradox (Score:2)
I think modern government wouldn't do its own spying, but would find a subcontractor.
Whitelisting entities? (Score:5, Insightful)
White-listing processes/applications/files/data is not global, and is the only level for security. White-listing a company or organization is never an option. It is politics.
The respondents weaseled (Score:5, Interesting)
You can take this as a hint that none of the companies is distributing signatures of the programs that the government uses.
Undetectable Policeware = Undetectable Malware (Score:3, Insightful)
Re: (Score:3, Insightful)
Sure, at some point someone may create a malicious program that pretends to be an established policeware program, but that would be big enough to create headlines... and it's reign would thus be short.
Re: (Score:2)
Would media outlets be told not to report it in the name of "national security?"
Have you actually *spied* on users for the gov't? (Score:2)
And it's even better than whitelisting, because you can do a blanket search of *everyone* using the virus checker for interesting keywords or known-enemy email addresses. Hey Poindexter, get on it!
The importance of open source... (Score:3, Informative)
-matthew
Police spyware used by the dark side? (Score:5, Interesting)
2. Crim gets hold of police spyware
3. Crim gets pwns your machine, steals your identity and makes your life a living hell for the next 3 years or more.
If you paid for a piece of anti-spyware and they leave a backdoor open like this, isn't that a case of negligence?
Re: (Score:3, Informative)
So, yes, such white-listed malware is bound to get into the hands of crooks--especially if it's in the hands of cops.
Immaterial (Score:2)
Re: (Score:2)
So, if you are doing unlawful things, don't rely on the Majors to scan for law-ware, use a lesser known company who hasn't had Discussions with The Man yet.
Sony Rootkit.... (Score:3, Informative)
Time for everyone to switch to Linux. The more eyeballs we can get on code the more likely someone isnt able to sneak shit like this in.
List of Whitelists PLEASE... (Score:2, Interesting)
Where is the search warrant? (Score:2)
-1, Moot (Score:5, Insightful)
And how often do you look at the back of your computer [google.com]? How often do you think the average user does, or would even notice anything out of the ordinary if they were staring right at one? Sure, this is more difficult on a laptop since it would have to be opened, but it would also be even more discreet. I'm not aware of any products on the market for laptops, but I'm sure LE could commission one to be made, if necessary.
The point is, it would be an incompetent department indeed which needed cooperation from AV suppliers to keep their surveillance methods discreet.
Re: (Score:2)
The obvious reason they shouldn't (Score:2)
McAfee and Symantec dropped the ball (Score:5, Informative)
If Symantec and McAfee will let SONY hack your PC, they'll let the government hack your PC.
Can anyone recommend a virus scanner that looks after the customer rather than the virus companies one-day maybe potential business partners if they get lucky?
Brilliant! (Score:4, Insightful)
2) government agents install said trojan on all the bad-guys computers.
So now all the known bad guys have copies of a trojan that is whitelisted by the AV software...
What could possibly go wrong?
That's exactly the level of intelligence I've come to expect from this government.
Oh wait, maybe they'll copyright the the trojan so the bad guys can't copy it and use it on other computers...
Any AV company that co-operates with such a plan is incompetent.
This isn't about being against Law Enforcement. (Score:2)
This reminds me of the same arguments that were made for the "clipper chip". That is: "Encryption is OK as long as law enforcement has a back door". The non-technical amongst us would proclaim that "You're against Law Enforcement if you don't support some kind of key escrow service." Security tools t
Why use foreign Anti-Spyware, of course (Score:3, Interesting)
Of course it also implies that gov-spyware is used in such mass quantities that at least one or more somewhat knowledgeable people find that something is wrong and involve anti-virus/spyware vendors.
So... those who believe in world-wide conspiracy -- there is nothing to protect you (otherwise it wouldn't be ww-c
Those who are paranoid -- use anti-virus/spyware kits from different countries. Kill everything suspicious (perhaps including one or two of those anti-virus programs that point at each other as a threat)
Everyone else... panic for a week, then move on to the new threat/panic/book/movie
Are whitelists readable? (Score:3, Interesting)
If they do whitelist government malware, is it possible to read the whitelist and extract the signatures of the whitelisted malware - and then search your system using a modified scanner and the signature they so thoughtfully provided?
What about GPS on cars (Score:2)
is it legal to remove them if found? I would destroy them all, uninstall it etc. But is it legal to do so?
Generic test? (Score:4, Interesting)
Alternately, the keylogger is most likely storing the logged keys either in clear or in isomorphic form to the input. So if you inserted your own keylogger into the system, what would it take to scan memory (and drives?) for matches on samples of what your own keylogger captures? Keyloggers aren't going to want to be burdened with heavy encryption to avoid this scanning, since that would add enough system load to make them more spottable by other means. Obviously you'd have to mask out the legitimate memory locations of, say, your word processor the input's going to - which would miss a keylogger patched into your word processor.
Is anyone working on a way to harden systems against this whole category? (Yeah, key-logging dongles are yet another thing. Software insertion is the question I'm addressing.)
Re: (Score:3, Informative)
You can't determine jack by time consumption. First of all, the time a keylogger uses can be ignored. You can also not predict how the scheduling works, you might lose the focus just inside your checking routine and a heap of milliseconds is gone before your program gets its timeslice again. Not possible.
You could generate keystrokes, but unless the keylogger somehow manipulates them (which would kinda defeat the purpose of being undetectable), you
Let's be sensible here (Score:3, Insightful)
It's not so much an issue of security and anti-malware vendors. A "government trojan" has the potential to become a diplomatic desaster. I mean, ponder the consequences.
Aside from the political problem that could rise when such a trojan is detected (and I deliberately don't write "if". "When" is the word of choice, because it will be detected, no matter whether AV vendors ignore it, because they must or because they want to 'help their country'), which can quickly destroy the rest of support a government has from its subjects, the foreign politics are much more endangered.
Imagine the US writing a keylogging and content sniffing trojan. Said trojan is then issued to a potential suspect. Said suspect finds it and forwards it via spam mail to Chinese companies and government. There it's detected, dissected and analyzed, to find that it's a keylogger reporting to the NSA.
Can you imagine the international implications?
For European governments, the headaches get even worse. Kaspersky said they won't care (and I believe them. I mean, if I was in Russia and had the backing of the government there, I wouldn't care about "do not find" letters from some minor country in Europe either). European AV researchers will be in Den Hague immediately when a "you must not find" letter hits their desk, and sue for unfair competition situations. And then, the cat IS out of the box. Dead or alive.
What governments around the world didn't get yet is that the success of trojans lies on their spreading. A trojan gets sent to a few thousand targets, a tenth of a percent of which actually click on it and infect themselves. The current very popular and successful form of infecting where you manipulate webpages to spread your malware is definitly out for targeted infections either, you'd have no control over who gets infected.
So if you send your "targeted" trojan to a thousand suspects, only ONE of them on average will actually be infected. Compare that to the dangers of having that trojan in the "wrong hands" (see above), using such a trojan would be political suicide for any remotely democratic government.
Re: (Score:3, Insightful)
I can think of a few ways in which malware planted by a reasonably determined government could work with much lower risk of detection:
Whitelisting malware is dangerous! (Score:3, Insightful)
Police comes forwards with a trojan that must not be detected. AV vendors heed the order and whitelist it.
Now, I dunno if you know how malware is developed. Malware is routinely tested against the current AV tools. Simply because you want to create malware that is at least not immediately detected. So what's the best malware? Exactly: One that MUST NOT be detected. So what's the best base for the ultimate trojan? The police trojan. You only have to create a trojan that matches the whitelist signature of the fed trojan to be safe from detection.
It's way easier than trying to match your malware against other software that's on a whitelist. That police trojan has to do essentially what you want to do: Infect a computer, install a keylogger, steal the user's passwords, sniff through his files. No "ordinary" software that could be whitelisted does that. Your chances to match your trojan against this piece of whitelisted shit are incredibly higher.
So if I was a malware writer, I'd be waiting with anticipation for the feds to release it.
Irrelevant... (Score:3, Informative)
Since no one else has mentioned it...
CALEA [wikipedia.org].
When an isp gets a subpoena, they're required to be able to tap your internet traffic basically at a moment's notice. The law enforcement agency will then receive a full packet trace of literally every bit of your network traffic.
Granted, this is meaningless on a stand-alone pc that's not connected to the internet, but the instances where they'll want to install gov't spyware on this type of system has got to be far, far less often.
Re: (Score:2)
My final conspiracy question is whether supermarket loyalty-card programs allow real employees to see names and shopping lists, in the small-scale aggregate. My guess is "No".
Well, yes and no. I've seen a clerk pull up identifying information at the cash-register screen. FWIW, I've heard, don't know how reliably, that the basic info is stored on those cards in clear. This isn't, however, shopping lists. Don't know how that's kept. (Do know that clerks often put things that customers buy on their own ca