|
Hacking Team is a Milan-based information technology company that sells offensive intrusion and surveillance capabilities to governments, law enforcement agencies and corporations. Its "''Remote Control Systems''" enable governments and corporations to monitor the communications of internet users, decipher their encrypted files and emails, record Skype and other Voice over IP communications, and remotely activate microphones and camera on target computers.〔(【引用サイトリンク】url=http://surveillance.rsf.org/en/hacking-team/ )〕 The company has been criticized for providing these capabilities to governments with poor human rights records. Hacking Team states that they have the ability to disable their software if it is used unethically. Hacking Team employs around 40 people in its Italian office, and has subsidiary branches in Annapolis, Washington, D.C. and Singapore.〔''Human Rights Watch'' (25 March 2014). ''"(They Know Everything We Do )"''. Retrieved 1 August 2015.〕 Its products are in use in dozens of countries across six continents. ==History== Hacking Team was started by two Italian programmers: Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri created a set of tools that could be used to monitor and remotely manipulate target computers. The program, called Ettercap, was embraced both by hackers looking to spy on people, and by companies that hoped to test the security of their own networks. The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their Skype calls, the police contacted Ornaghi and Valleri and asked them to help modify the program. Hacking Team was born, and became "the first sellers of commercial hacking software to the police."〔 According to former employee Alberto Pelliccione, the company began as security services provider, offering penetration testing, auditing and other defensive capabilities to clients.〔Farivar, Cyrus (20 July 2015) "''(''Hacking Team goes to war against former employees, suspects some helped hackers )''". ''Ars Technica''. Retrieved 26 July 2015.〕 Pelliccione states that as malware and other offensive capabilities were developed and accounted for a larger percentage of revenues, the organization pivoted in a more offensive direction and became increasingly compartmentalized. Pelliccione claims fellow employees working on aspects of the same platform - for example, Android exploits and payloads - would not communicate with one another, possibly leading to tensions and strife within the organization.〔 In February 2014, a report from Citizen Lab identified the organisation to be using hosting services from Linode, Telecom Italia, Rackspace, NOC4Hosts and notorious bullet proof hosting company Santrex. On July 5, 2015 the company suffered a major data breach of customer data, software code, internal documents and emails. - ''See: § 2015 data breach'' 抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)』 ■ウィキペディアで「Hacking Team」の詳細全文を読む スポンサード リンク
|