Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Lawful Trojan Horse

Lawful Trojan Horse
View Sample PDF
Author(s): Bruce L. Mann (Memorial University, Canada)
Copyright: 2022
Pages: 28
Source title: Research Anthology on Business Aspects of Cybersecurity
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-6684-3698-1.ch029


View Lawful Trojan Horse on the publisher's website for pricing and purchasing information.


News outlets don't usually report on training methods in counter-cyberterrorism, particularly lawful trojan attacks. Instead they describe recent cyberterrorist attacks, or threats, or laws and regulations concerning internet privacy or identity theft. Yet Europe is looking to do just that to head-off the next major cyberattack by creating rules for how member states should react and respond. Several news outlets, for example, reported that Germany's Federal Criminal Police Office (BKA) were using a Trojan Horse to access the smartphone data of suspected individuals before the information was encrypted. Although the urge to strike back may be palpable, hacking-back can put power back into the hands of the suspect. The consensus now is that government action is preferable to hacking-back at attackers.

Related Content

Mohd Azeem Faizi Noor, Saba Khanum, Taushif Anwar, Manzoor Ansari. © 2023. 20 pages.
Padmavathi U., Narendran Rajagopalan. © 2023. 16 pages.
Chandrasekar Ravi, Praveensankar Manimaran. © 2023. 12 pages.
Jay Kumar Jain, Varsha Jain. © 2023. 18 pages.
Dominik Hromada, Rogério Luís de C. Costa, Leonel Santos, Carlos Rabadão. © 2023. 21 pages.
Santosh Kumar Smmarwar, Govind P. Gupta, Sanjay Kumar. © 2023. 20 pages.
Andreia Robert Lopes, Ana Sofia Dias, Bebiana Sá-Moura. © 2023. 24 pages.
Body Bottom