Lawful Trojan Horse

Lawful Trojan Horse

Copyright: © 2022 |Pages: 28
ISBN13: 9781668436981|ISBN10: 1668436981|EISBN13: 9781668436998
DOI: 10.4018/978-1-6684-3698-1.ch029
Cite Chapter Cite Chapter

MLA

Mann, Bruce L. "Lawful Trojan Horse." Research Anthology on Business Aspects of Cybersecurity, edited by Information Resources Management Association, IGI Global, 2022, pp. 621-648. https://doi.org/10.4018/978-1-6684-3698-1.ch029

APA

Mann, B. L. (2022). Lawful Trojan Horse. In I. Management Association (Ed.), Research Anthology on Business Aspects of Cybersecurity (pp. 621-648). IGI Global. https://doi.org/10.4018/978-1-6684-3698-1.ch029

Chicago

Mann, Bruce L. "Lawful Trojan Horse." In Research Anthology on Business Aspects of Cybersecurity, edited by Information Resources Management Association, 621-648. Hershey, PA: IGI Global, 2022. https://doi.org/10.4018/978-1-6684-3698-1.ch029

Export Reference

Mendeley
Favorite

Abstract

News outlets don't usually report on training methods in counter-cyberterrorism, particularly lawful trojan attacks. Instead they describe recent cyberterrorist attacks, or threats, or laws and regulations concerning internet privacy or identity theft. Yet Europe is looking to do just that to head-off the next major cyberattack by creating rules for how member states should react and respond. Several news outlets, for example, reported that Germany's Federal Criminal Police Office (BKA) were using a Trojan Horse to access the smartphone data of suspected individuals before the information was encrypted. Although the urge to strike back may be palpable, hacking-back can put power back into the hands of the suspect. The consensus now is that government action is preferable to hacking-back at attackers.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.