Beruflich Dokumente
Kultur Dokumente
FEAR
VIN
A
IS
MOG
OR
THIS MAN
DAVID
CENZETTI
BUILT
SPYWARE
EMPIRE.
THE ITALIAN
UL A CODE
BREAKER
AN ARMS
DEALER?
AS THE SUN ROSE OVER THE BANKS OF THE SEINE AND THE MEDIEVAL, HALFTIMBERED HOUSES OF ROUEN, FRANCE, ON JULY 13, 2012,
30
BOIRES COMPUTER SCREEN WAS PROOF THAT THE HACKING TEAM WAS EQUIPPING A REPRESSIVE REGIME.
with highly sophisticated spyware, which
FOREIGNPOLICY.COM
31
jail, absolutely.
A good hacker.
USINESSES AND GOVERNMENTS AGAINST HACKERS. BUT, HE WONDERED, WHAT WOULD HAPPEN IF HACKERS
how crazy and dangerous he is, Guido
Internet worked.
32
to have a future.
becoming.)
WERE INSTEAD UNLEASHED AS A MODE OF SECURITY? I WAS TRYING TO FORESEE THE FUTURE, HE SAYS.
public Wi-Fi network, or even a QR code
quartered in London.
FOREIGNPOLICY.COM
33
AND THE FUEL CAP MISSING. IT WAS A WARNING, HE INSISTS. VINCENZETTIS RISE HAD NOT COME WITHOUT
with his trusted team. The Hacking Team
said OK.
about that.
34
has occurred.
A GROWING OPPOSITION, WISHING AND WORKING FOR HIS FALL. IN JUNE 2014, THE HACKING TEAM RECEIVE
Arabia. We would like the newco to be in
particular comment.)
to despots.
for a living.
is great.
FOREIGNPOLICY.COM
35
WEBS OF SURVEILLANCE LAID BARE. THE HACKING TEAMS TECHNOLOGY HAD BEEN RENDERED USELESS: THE
36
LEAK HAD MADE SOME 80 PERCENT OF THE COMPANYS SOURCE CODE VISIBLE ONLINE, MEANING ANTIVIRU
well as Pyongyangs spooks in South Korea.
is unknown,
He may have lost business in last summers breach, but as much as the incident hit
his company, it may also have hyped it; hes
Q
Princeton University.
FOREIGNPOLICY.COM
37
Copyright of Foreign Policy is the property of Foreign Policy and its content may not be
copied or emailed to multiple sites or posted to a listserv without the copyright holder's
express written permission. However, users may print, download, or email articles for
individual use.