{"id":34,"date":"2007-07-19T11:12:19","date_gmt":"2007-07-19T09:12:19","guid":{"rendered":"http:\/\/www.internetsoziologie.at\/de\/?p=34"},"modified":"2007-07-19T11:16:40","modified_gmt":"2007-07-19T09:16:40","slug":"das-fbi-hat-bereits-seinen-bundestrojaner","status":"publish","type":"post","link":"https:\/\/www.internetsoziologie.at\/de\/2007\/07\/19\/das-fbi-hat-bereits-seinen-bundestrojaner\/","title":{"rendered":"Das FBI hat bereits seinen Bundestrojaner&#8230;"},"content":{"rendered":"<p>&#8230;das schreibt zumindest CNET:<\/p>\n<p><em>The FBI used a novel type of remotely installed spyware last month to investigate who was e-mailing bomb threats to a high school near Olympia, Wash.<\/em><\/p>\n<p>(Quelle: <a href=\"http:\/\/news.com.com\/8301-10784_3-9746451-7.html\">CNET News.com<\/a>)<\/p>\n<p>Wenn wir mal davon ausgehen, dass sie tats\u00e4chlich so ein Programm haben und dieses auch funktioniert, so stellt sich &#8211; wie immer in diesen F\u00e4llen &#8211; die Frage, wie sie es in Betrieb nehmen konnten. Dazu CNET:<\/p>\n<p><em>One possibility is that the FBI has persuaded security software makers to overlook CIPAV and not alert their users to its presence.<\/p>\n<p>Another is that the FBI has found (or paid someone to uncover) unknown vulnerabilities in Windows or Windows-based security software that would permit CIPAV to be installed. From the FBI&#8217;s perspective, this would be the most desirable: for one thing, it would also obviate the need to strong-arm dozens of different security vendors, some with headquarters in other countries, into whitelisting CIPAV.<\/em><\/p>\n<p>Der erste Fall w\u00e4re sehr gef\u00e4hrlich: eine Indiskretion und schon k\u00e4me die Sache ans Licht, Verschwiegenheitspflicht hin oder her. Die zweite L\u00f6sung w\u00e4re machbar und auch deutlich begehrenswerter &#8211; ein echtes Ass im \u00c4rmel der Beh\u00f6rden.<\/p>\n<p>Und es bliebe noch die M\u00f6glichkeit, dass der User &#8211; so wie jeder Spam- und Trojaner-&#8220;Empf\u00e4nger&#8221; &#8211; das Ding durch simples Anklicken bzw. \u00d6ffnen eines Mailanhanges selber aktiviert hat. Die Verl\u00e4sslichkeit dieser Methode l\u00e4sst aber sehr zu w\u00fcnschen \u00fcbrig.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8230;das schreibt zumindest CNET: The FBI used a novel type of remotely installed spyware last month to investigate who was e-mailing bomb threats to a high school near Olympia, Wash. &hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-34","post","type-post","status-publish","format-standard","hentry","category-allgemein"],"_links":{"self":[{"href":"https:\/\/www.internetsoziologie.at\/de\/wp-json\/wp\/v2\/posts\/34","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsoziologie.at\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsoziologie.at\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsoziologie.at\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsoziologie.at\/de\/wp-json\/wp\/v2\/comments?post=34"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsoziologie.at\/de\/wp-json\/wp\/v2\/posts\/34\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.internetsoziologie.at\/de\/wp-json\/wp\/v2\/media?parent=34"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsoziologie.at\/de\/wp-json\/wp\/v2\/categories?post=34"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsoziologie.at\/de\/wp-json\/wp\/v2\/tags?post=34"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}