Friday, July 10, 2015

Hacking Team, the RCS software that can fix your computer with … – The Daily

->

An almost absolute power. Not only to control and intrusion , but manipulation and creation of reality, through the alteration of the remote computer memories. A perfect crime, made possible by the potential offensive software of the Milan-based company Hacking Team , used by police and Governments around the world, the Remote control system (RCS) .

“An invisible system of spyware to attack, infect and monitor computer and smartphone “, as defined by the same company HT in its manuals. Able, however, as is clear technical documents published by the attack suffered by the Milan-based company computer – also enter file crafted that would be perfectly integrated in the memory of the ‘ hard disk of a computer, so they seem authentic.

The scenario worthy of a film 90 on nightmares of the Network , emerges from the pages of technical manuals of the software RCS , which describes in detail the “Transfer files from / to the target.” Sign of effective potential of manipulation silent and invisible memory of computer and devices furniture, according to a procedure simplicity apparently disarming “Double-click on a operation , double-click a Target , double-click a agent , double-click on File Transfer “. And then, on the computer of unsuspecting “target” infected government (but HT has sold the program also several private companies), can appear out of nowhere file that are apparently always been in ‘ hard disk , because they follow the paths and faithfully reproduce the metadata .

The suspicion that the Trojan HT , sold to the authorities all over the world, could take control of the devices and hit enter file in the memory of the computer was already highlighted in 2013 , with the publication of Wikileaks a presentation of the program RCS by HT . In the slide, relative to version 5.1, it was the same company founder to advertise potential offensive of software , including “the ability to perform actions on your computer broken”, as for example the “possibility to modify the content of the ‘ hard disk “. Now, with the cyber attack and the subsequent admission of vulnerability on the part of ‘ company in Milan , a confirmation that this function exists and is part of the solution to offer’ intelligence and police around the world.

But if the edit function of the computer hit can be of great interest in the activities “extra-legal “of intelligence , instead puts into serious question the legal validity to use RCS from the bodies of police . Besides the services of intelligence , among the customers of HT in the archive are in fact many of the bills including the police ‘ FBI US. In Italy , police forces like the Ros of Police , the Scic Financial Police and Police Post for years have adopted the software HT for their investigations. How they used and in which surveys ? What function of the powerful you have been activated?

“In Italy they use all , but everyone”, says the CEO of Hacking Team, David Vincenzetti , one of thousands of corporate email published by Wikileaks . And it is Vincenzetti to trace the history of the spy software in Italy and Europe . “It was the first system security offensive commercially available in the world – writes Vincenzetti – first sale in 2004 to the Postal Police and immediately after that year to the Services Spaniards after the Madrid Jihadist bombing the train station. “

And using the software RCS , according to the HT , would have been solved many court cases that filled the front pages of Italian newspapers. “Things to first page (…) Heads Mafia identified and arrested – tells Vincenzetti – killer that were not immediately located for years (you remember the story of the girl Bergamo a few years ago?), the P4 disintegrated. Our tool is also used by the GDF which investigates corruption cases, corruption policy “.

But the ability to RCS to change the contents of the monitored computers may now reopen the cases. And throw a heavy shadow on years of investigations and judicial inquiries. In addition to raising questions about the necessity of Police , Police and Financial Police to own – independently of the Proxies – the powerful software shut .

->

LikeTweet

No comments:

Post a Comment