TruthMovement an internet research-guide for students and scholars. Best viewed in Chrome Browser

Blog Search

Thursday, November 12, 2015

TransUnion (TU) teams up with law enforcement under the guise of child protection. They sell law enforcement software so they can search for child porn using TU algorithms and along with a financial statement they can in their own words, "A Robust, Streamlined System to learn everything about your target" for civil forfeiture.

TransUnion (TU) teams up with law enforcement under the guise of child protection. They sell law enforcement software so they can search for child porn using TU algorithms and along with a financial statement they can in their own words, "A Robust, Streamlined System to learn everything about your target" for civil forfeiture.

Galileo, the leaked hacking software from Hacker Team (defense contractor), contains code to insert child porn on a target’s computer. by WorkerAnt#11

Galileo, the leaked hacking software from Hacker Team (defense contractor), contains code to insert child porn on a target’s computer. by WorkerAnt#11

Blackmail & Compromise is the new normal.


Enormous leak exposes Hacking Team as blackhat organization

The security community is buzzing about the release of more than 400GB of corporate data from the Italian security firm Hacking Team, a revelation that’s being called the security industry’s version of the Edward Snowden leaks. Hacking Team has been previously accused of being willing to sell its services and software to anybody, even authoritarian regimes with active human rights investigations ongoing.

This leak, which included private emails, invoices, and client lists, removes all doubt about whether these allegations were true. It also reveals a cynical internal culture at Hacking Team — and it’s the care-free attitude toward their morally questionable work that seems to be evoking the most powerful public backlash. Nobody has yet come forward to claim responsibility for the attack.

The infiltration and data acquisition phase of this anti-hacker hack were likely ongoing for some time, but the final release came just days ago, when unknown attackers took over Hacking Team’s official Twitter account around the time of the Women’s World Cup final. The account was renamed to “Hacked Team,” and it was then used to post a link to a torrent file containing much of Hacking Team’s most sensitive information. Among the mass of information contained in the release is an invoice for $1 million to Ethiopia’s Information Network Security Agency. A separate list of active and inactive clients shows that the Milan-based firm also sold to everyone from Saudi Arabia to South Korea to the US DEA and FBI. Two particularly controversial buyers (for differing reasons) are Russia and Sudan, both of which are tagged with the cryptic “Not officially supported” category, rather than Active, Expired, or Inactive as with all others.


Share