This site collects anonymous statistical data on navigation through cookies installed by authorized third parties, respecting privacy of your personal data and in accordance with standards established by law. By continuing to browse this site, clicking on links in it or simply shaking the page down, you agree to the service and the same cookie.

A+ A A-
02-08-2015

Hacking Team and collateral damage

Rate this item
(37 votes)
Image source: veb.it Image source: veb.it

In Italy, the citizens, have no real perception of what happened with the violation of the computer systems of a private company that provides "services" in many countries. If he had spoken for example, a company that dealt with unwinding of data from cameras, on behalf of a municipal police, maybe it would be all hell broke loose, "there is a penalty for data processed by persons who have not the qualification of PG ", etc.

This is about (according to what we can read on-line) control devices that are not only computers but also smartphone or tablet. Check is not just observe or acquire it also means blocking, use, write, erase and then act on behalf of the user! Imagine if someone could deposit files whose detention is prohibited and prosecuted by law such as child abuse images ... or if you think the device of the subject X involved in proceedings, infected with this malware until a month ago to the unknown Most software, was polluted with material overwhelming.

The Italian government will have to clarify why were to make use of a private individual for the use of certain software, plus what kind of guarantees were offered by the manufacturer, and if both sides knew the possibility of access to data processed by the same third party . The answers will be different ... surely there will be economic reasons behind the choice, similar to those which justify the use of rental equipment for the interception of some prosecutors. The Privacy that has taken measures as a result of this affair? Who will pay for the burning of the current investigations?

Collateral damage therefore important, not only for Italians but also for all citizens of countries that have "used" the software of this company called "Hacking Team" and that as a result of the attack on Twitter was renamed "Hacked Team". BEYOND game of a hacker, the company had relations with 36 countries including Russia and Sudan. Through the website Wikileaks is possible sifting through emails published. Network looking good you can find many. Finally we list the contents of a written message from the CEO to employees published in an article by Republicca: "Imagine this: leaked to Wikileaks showing and explaining our technology to the world. You will be demonized by our closest friends, activists around the world and ordinary people will point the finger at you".

© All right reserved

 

Claudio Sciarma

Degree in Investigation and Security Sciences cum laude. He developed a thesis in collaboration with Ra.C.I.S. of Rome and the company Leica Geosystems on the reconstruction of the crime scene using the laser scanner. 

Master degree in Social Research for Internal and External Security developing a thesis called "investigate with search engine - Google as mean of business intelligence"

Postgraduate master degree in Security Languages.

Certificate of arab language and culture at the Foreign Languages School of the Italian Army.

Intelligence analyst.

Webmaster, webdesigner and expert SEO. Specialized in telecommunication fraud detection, he worked with the GAO of the Italian Finance Police. Expert in P.P.A. (advanced personal protection), terrorist attacks analysis, international security, transport security, events planning, personal protection devices analysis. Volunteer in the Italian Army (2010-2012), assigned to the Foreign Languages School of the Italian Army. 

Founding member of the Italian Association of Investigation and Security Sciences.

Codirector of the monthly magazine on line "ConVincere".

 

Website: claudio.sciarma.it

Geoeconomia

Eversione e Terrorismo

Geopolitica

Risorse Energetiche

Cyber Warfare

Copyright CEOS 2012 - 2015. All rights reserved.