Skip to content

German Report on Surveillance Technologies

By
Friday, November 2, 2012 at 7:25 AM

Slate has an interesting article on this report concerning the acquisition by German law enforcement agencies of software for surveillance:

Earlier this year, German politician Jan Korte submitted a series of written questions to the country’s federal ministry of home affairs regarding surveillance tools. The request was prompted by a scandal about how police had paid a private company to develop a controversial spy trojan to infiltrate and monitor suspects’ computers—a tactic that in most circumstances violates the German constitution. The answers Korte received were published in German in July, but have only this month been translated into English.

What the answers revealed is the technology used by some of the country’s federal agencies and the companies contracted to provide it. Between 2005 and 2011, for instance, the Federal Office of Administration, which carries out work for all of Germany’s federal ministries, spent more than €1.9 million ($2.5 million) on telecom and internet surveillance gear provided by the companies TU München and Syborg, plus €158,000 ($204,000) on facial recognition software from the firm Cognitec.

Some police and intelligence agencies declined to provide Korte with the requested information, claiming it was restricted or classified. But others did not show the same concern. Customs authorities, for one, released details about the sophisticated surveillance tools they purchased, including spending more than €100,000 ($130,000) on software to monitor Skype, Gmail, Hotmail, AIM, Yahoo Mail, and Bit Torrent. The customs authorities, tasked with tackling drug crime in Germany, also paid a company called Schönhofer €1.8 million ($2.3 million) for equipment such as “ICT vehicles” designed to help gather data from target areas using “signal interrogator” technology. They additionally splashed out €170,000 ($220,000) on a cellphone-tracking tactic described as “stealthping,” which involves sending a covert signal to a phone in order find out its nearest location tower to discover the whereabouts of a person.

Share on Facebook0Share on Google+0Email this to someoneTweet about this on Twitter5Print this pageShare on Reddit0

Filed under: Cybersecurity

Tags: