Skip to main content

The Hacking Team wants U.S. law enforcement to use its technology

the hacking team is now pitching its services to u s law enforcement green code
Image used with permission by copyright holder
What’s the best way to recover from a very public security meltdown? Offer your own security services to the government, of course! At least, that seems to be the approach of the Hacking Team, a spyware vendor that was itself successfully attacked earlier this year, resulting in the loss of some 400 GBs of confidential information. But keeping to what is clearly a “go big or go home” attitude, the Hacking Team is bounding back into the national spotlight by offering hacking tools to American law enforcement agencies.

Using a fair amount of fear-mongering (after all, the Hacking Team knows firsthand how prevalent cyberattacks are), the private company sent an email to current and existing customers of October 19, writing, “Most [law enforcement agencies] in the US and abroad will become ‘blind,’ they will ‘go dark:’ they will be simply be [sic] unable to fight vicious phenomena such as terrorism. Only the private companies can help here, we are one of them.”

So now, they’re offering a brand new suite of tools to the police that will supposedly help them get around various encryption technologies. Fighting hacking with, what else, hacking.

Heralded as “brand new and totally unprecedented cyber investigation solutions,” Hacking Team’s CEO David Vincenzetti noted, “It is crystal clear that the present American administration does not have the stomach to oppose the American IT conglomerates and to approve unpopular, yet totally necessary, regulations.”

Although the Hacking Team has managed to land some pretty impressive clients and customers in the past, including the FBI the Drug Enforcement Agency, neither of these big government names are in play anymore. As Motherboard notes, “The DEA cancelled its contract after using it only 17 times in three years, while the FBI let its license expire because it didn’t see RCS as a “must have,” as Hacking Team spokesperson Eric Rabe put it in an internal email.”

Of course, this latest Hacking Team release could turn the firm’s luck around, but as of yet, there’s no word yet on when we can actually expect a release. So for now, just sit back, relax, and pray that you don’t fall victim to a cyberattack.

Lulu Chang
Former Digital Trends Contributor
Fascinated by the effects of technology on human interaction, Lulu believes that if her parents can use your new app…
A dangerous new jailbreak for AI chatbots was just discovered
the side of a Microsoft building

Microsoft has released more details about a troubling new generative AI jailbreak technique it has discovered, called "Skeleton Key." Using this prompt injection method, malicious users can effectively bypass a chatbot's safety guardrails, the security features that keeps ChatGPT from going full Taye.

Skeleton Key is an example of a prompt injection or prompt engineering attack. It's a multi-turn strategy designed to essentially convince an AI model to ignore its ingrained safety guardrails, "[causing] the system to violate its operators’ policies, make decisions unduly influenced by a user, or execute malicious instructions," Mark Russinovich, CTO of Microsoft Azure, wrote in the announcement.

Read more