https://de.wikipedia.org/w/api.php?action=feedcontributions&feedformat=atom&user=Dsprc Wikipedia - Benutzerbeiträge [de] 2025-05-04T21:24:10Z Benutzerbeiträge MediaWiki 1.44.0-wmf.27 https://de.wikipedia.org/w/index.php?title=Silk_Road&diff=157923596 Silk Road 2016-09-14T14:21:19Z <p>Dsprc: /* Geschäftsabwicklung */</p> <hr /> <div>{{Dieser Artikel|behandelt den ehemaligen Schwarzmarkt. Zum Computerspiel siehe [[Silkroad Online]].}}<br /> <br /> '''Silk Road''' ({{enS}} für ''[[Seidenstraße]]'', als Anspielung auf die historische Handelsroute) war ein als [[Hidden Service]] im [[Tor (Netzwerk)|Tor-Netzwerk]] betriebener virtueller [[Schwarzmarkt]]. Insbesondere wurden dort illegale [[Droge]]n und verschiedene digitale Güter gehandelt,&lt;ref&gt;[http://www.theguardian.com/technology/2013/nov/10/silk-road-internet-market-illegal-drugs-ross-ulbricht ''The man behind Silk Road – the internet's biggest market for illegal drugs''.] In: ''[[The Guardian]]'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://nation.time.com/2013/10/04/a-simple-guide-to-silk-road-the-online-black-market-raided-by-the-fbi/ ''Everything You Need to Know About Silk Road, the Online Black Market Raided by the FBI''.] In: ''[[Time]]'' (englisch).&lt;/ref&gt; wobei als einziges Zahlungsmittel die [[Kryptowährung]] [[Bitcoin]] zum Einsatz kam. Nachdem die ursprüngliche Plattform nach zweieinhalb Jahren Aktivität beschlagnahmt und der mutmaßliche Betreiber festgenommen worden war, wurde sie nur einen Monat später wiedereröffnet.&lt;ref&gt;[http://www.wired.com/2015/04/silk-road-1/ wired.com: silk road]&lt;/ref&gt;&lt;ref&gt;[http://www.huffingtonpost.com/2014/04/30/silk-road_n_5241316.html ''New Silk Road Selling Even More Illegal Drugs Than Old Silk Road''.] In: ''[[Huffington Post]]'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.digitaltrends.com/web/silk-road-2-launches-fbi-drugs-marketplace-bitcoin/ ''Sorry, FBI! Silk Road is back online, and still selling illegal drugs''.] In: ''Digital Trends'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.theverge.com/2013/12/6/5178418/inside-the-new-silk-road ''One month after launch, new Silk Road is up to 3,000 drug listings''.] In: ''[[The Verge]]'' (englisch).&lt;/ref&gt; Durch einen noch vor jenem Zeitpunkt eingeschleusten Agenten gelang ein Jahr später im November 2014 eine erneute Beschlagnahmung.&lt;ref&gt;[http://www.wired.com/2014/11/feds-seize-silk-road-2/ ''Feds Seize Silk Road 2 in Major Dark Web Drug Bust''.] In: ''Wired'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.businessinsider.com/fbi-silk-road-seized-arrests-2014-11 ''FBI Arrests SpaceX Employee, Alleging He Ran The 'Deep Web' Drug Marketplace Silk Road 2.0''] In: ''Business Insider'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.deepdotweb.com/2014/11/06/silk-road-2-seized/ ''Silk Road 2 Seized!''] In: ''[[Deep Dot Web]]'' (englisch).&lt;/ref&gt;<br /> <br /> Letztlich zog der Niedergang des originalen Silk Road einen regelrechten Boom an [[Darknet-Markt|Darknet-Märkten]] nach sich,&lt;ref&gt;[http://www.theatlantic.com/technology/archive/2014/10/a-year-after-death-of-silk-road-darknet-markets-are-booming/380996/ ''A Year After Death of Silk Road, Darknet Markets Are Booming''] In: ''[[The Atlantic]]'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.wired.com/2014/09/internet-black-market/ ''How Online Black Markets Have Evolved Since Silk Road’s Downfall''.] In: ''[[Wired]]'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.coindesk.com/silk-road-one-year/ ''Silk Road: One Year On''.] In: ''CoinDesk'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.theguardian.com/technology/2014/may/30/life-after-silk-road-how-the-darknet-drugs-market-is-booming ''Life after Silk Road: how the darknet drugs market is booming''] In: ''[[The Guardian]]'' (englisch).&lt;/ref&gt; wodurch schon bald die Alternativen [[Agora (Darknet-Markt)|Agora]]&lt;ref&gt;[http://www.wired.com/2014/09/agora-bigger-than-silk-road/ ''Drug Market ‘Agora’ Replaces the Silk Road as King of the Dark Net''.] In: ''Wired'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.ibtimes.com/silk-roads-demise-spawns-agora-popular-new-online-drug-marketplace-1684550 ''Silk Road's Demise Spawns Agora, A Popular New Online Drug Marketplace''.] In: ''[[International Business Times]]'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://reason.com/blog/2014/09/02/agora-is-the-webs-top-black-marketplace ''Agora Is the Web's Top Black Marketplace''.] In: ''[[Reason (Zeitschrift)|Reason.com]]'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.thefix.com/content/new-online-drug-portal-agora-replacing-silk-road-atop-dark-web ''Online Drug Site Agora Replaces Silk Road Atop Dark Web''.] In: ''The Fix'' (englisch).&lt;/ref&gt; und [[Evolution (Darknet-Markt)|Evolution]]&lt;ref&gt;[http://gizmodo.com/heroin-guns-stolen-credit-cards-meet-evolution-the-1637621515 ''Heroin, Guns, Stolen Credit Cards: Meet Evolution, the New Silk Road''.] In: ''[[Gizmodo]]'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.thefix.com/content/evolution-replaces-silk-road-new-online-drug-market ''Evolution Replaces Silk Road as New Online Drug Market''] In: ''The Fix'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.wired.com/2014/09/dark-web-evolution/ ''The Dark Web Gets Darker With Rise of the ‘Evolution’ Drug Market''.] In: ''Wired'' (englisch).&lt;/ref&gt; (seit März 2015 abgeschaltet) Silk Road als größten und bekanntesten Markt überholen konnten.<br /> <br /> == Geschichte ==<br /> Die erste Inkarnation von Silk Road ging im Januar 2011 in Betrieb.&lt;ref&gt;[http://www.forbes.com/special-report/2013/silk-road/ ''Take A Walk Down Silk Road''.] In: ''[[Forbes Magazine]]'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.dailydot.com/crime/silk-road-drug-ross-ulbright-dread-pirate-roberts-history/ ''The definitive history of Silk Road''.] In: ''The Daily Dot'' (englisch).&lt;/ref&gt; Zweieinhalb Jahre später konnte durch ein Datenleck im Login-Bildschirm der Server in einem [[Rechenzentrum]] in Island lokalisiert werden&lt;ref&gt;[http://www.wired.com/2014/09/the-fbi-finally-says-how-it-legally-pinpointed-silk-roads-server/ ''The FBI Finally Says How It ‘Legally’ Pinpointed Silk Road’s Server''] In: ''Wired'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.forbes.com/sites/katevinton/2014/09/08/the-feds-explain-how-they-seized-the-silk-road-servers/ ''The Feds Explain How They Seized The Silk Road Servers''.] In; ''Forbes Magazine'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.theverge.com/2013/10/14/4836994/dont-host-your-virtual-illegal-drug-bazaar-in-iceland-silk-road ''Lessons from Silk Road: don't host your virtual illegal drug bazaar in Iceland''.] In: ''The Verge'' (englisch).&lt;/ref&gt;; dies führte direkt zur Verhaftung von [[Ross Ulbricht]] im Oktober 2013. Unter dem Pseudonym ''Dread Pirate Roberts'' (nach einer Figur aus dem Fantasyfilm ''[[Die Braut des Prinzen]]'') soll dieser die Plattform betrieben oder mitbetrieben haben. Auch Silk Road selbst und Bitcoins im Gegenwert von mehr als 3 Millionen US-Dollar wurden beschlagnahmt.&lt;ref&gt;[http://www.theguardian.com/technology/2013/oct/02/alleged-silk-road-website-founder-arrested-bitcoin ''FBI claims largest Bitcoin seizure after arrest of alleged Silk Road founder''.] In: ''The Guardian'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.businessinsider.com/silk-road-seized-ross-ulbricht-arrested-2013-10 ''Alleged Founder Of Silk Road – The Site Where You Can Buy Illegal Drugs – Arrested And Millions In Bitcoins Seized''.] In: ''Business Insider'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://nation.time.com/2013/10/02/alleged-silk-road-proprietor-ross-william-ulbricht-arrested-3-6m-in-bitcoin-seized/ ''Feds Raid Online Drug Market Silk Road''.] In: ''Time'' (englisch).&lt;/ref&gt;<br /> <br /> Bis dahin waren über Silk Road umgerechnet ca. 1,2 Milliarden US-Dollar umgesetzt worden, wovon 80 Millionen als Provision an den oder die Betreiber gegangen waren.&lt;ref&gt;[http://blogs.marketwatch.com/thetell/2013/10/02/silk-road-drug-market-handled-1-2-billion-of-transactions-in-2-5-years-before-fbi-seizure/ ''Silk Road drug market handled $1.2 billion of transactions in 2.5 years before FBI seizure''.] In: ''MarketWatch'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.forbes.com/sites/andygreenberg/2013/10/02/end-of-the-silk-road-fbi-busts-the-webs-biggest-anonymous-drug-black-market/ ''End Of The Silk Road: FBI Says It's Busted The Web's Biggest Anonymous Drug Black Market''.] In: ''Forbes Magazine'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://mashable.com/2013/10/04/silk-road-by-the-numbers/ ''The Silk Road Online Drug Marketplace by the Numbers''.] In: ''[[Mashable]]'' (englisch).&lt;/ref&gt;<br /> <br /> Bereits knapp einen Monat später ging der Nachfolger, schlicht ''Silk Road 2.0'' genannt, unter deutlich verschärften Sicherheitsvorkehrungen ans Netz;&lt;ref&gt;[http://www.forbes.com/sites/andygreenberg/2013/12/06/new-silk-road-drug-market-backed-up-to-500-locations-in-17-countries-to-resist-another-takedown/ ''New Silk Road Drug Market Backed Up To '500 Locations In 17 Countries' To Resist Another Takedown''.] In: ''[[Forbes Magazine]] (englisch).''&lt;/ref&gt;&lt;ref&gt;[http://dailylounge.com/the-daily/entry/silk-road-the-online-black-market-is-already-back ''Silk Road, the Online Black Market, Is Already Back''.] In: ''Daily Lounge'' (englisch).&lt;/ref&gt; auch ein neuer ''Dread Pirate Roberts'' trat im offiziellen Forum in Erscheinung. Als mutmaßliche Mitbetreiber der Plattform wurden im Dezember drei der Forenmoderatoren im Rahmen einer internationalen Fahndung ausfindig gemacht und ergriffen.&lt;ref&gt;[http://techcrunch.com/2013/12/20/alleged-top-moderator-of-silk-road-2-forums-arrested-in-ireland/ ''Alleged Top Moderators Of Silk Road 2 Forums Arrested In Ireland, E.E. In International Sweep''.] In: ''TechCrunch'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://mashable.com/2013/12/20/fbi-silk-road-arrests/ ''3 Alleged Silk Road Moderators Arrested in Global Sting''.] In: ''Mashable'' (englisch).&lt;/ref&gt;<br /> <br /> Im Februar 2014 wurde schließlich Anklage gegen Ulbricht erhoben; diese lautete unter anderem auf Bildung einer [[Kriminelle Vereinigung|kriminellen Vereinigung]], [[Drogenhandel]], das [[Hacker|Hacken]] von Computern und [[Geldwäsche]].&lt;ref&gt;[http://mashable.com/2014/02/07/ross-ulbricht-plea/ ''Alleged Silk Road Kingpin Ross Ulbricht Pleads Not Guilty''.] In: ''Mashable'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.techtimes.com/articles/3280/20140209/silk-road-mastermind-ross-william-ulbricht-pleads-not-guilty-trial-fixed-for-november.htm ''Silk Road mastermind Ross William Ulbricht pleads not guilty, trial fixed for November''.] In: ''Tech Times'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.forbes.com/sites/andygreenberg/2014/02/07/alleged-silk-road-creator-ross-ulbricht-pleads-not-guilty-on-all-charges/ ''Alleged Silk Road Creator Ross Ulbricht Pleads Not Guilty On All Charges''.] In: ''Forbes Magazine'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.ibtimes.com/silk-road-trial-update-ross-ulbricht-dread-pirate-roberts-pleads-not-guilty-trial-set-november ''Silk Road Trial Update: Ross Ulbricht, ‘Dread Pirate Roberts,’ Pleads Not Guilty, Trial Set For November''.] In: ''[[International Business Times]]'' (englisch).&lt;/ref&gt;<br /> <br /> Einen herben Rückschlag hatte Silk Road 2.0 im Februar 2014 einzustecken: Die Plattform wurde unter Ausnutzung einer Schwachstelle im Bitcoin-Protokoll kompromittiert,&lt;ref&gt;[http://silkroad5v7dywlc.onion/index.php?topic=26366.0 ''IMPORTANT: Humbled and Furious''.] – Ankündigung im Silk Road-Forum – nur über das Tor-Netzwerk erreichbar (englisch).&lt;/ref&gt;&lt;ref&gt;[http://gizmodo.com/somebody-hacked-into-silk-road-2-and-stole-all-the-bitc-1522447611 ''Somebody Hacked Into Silk Road 2 and Stole All the Bitcoins''.] In: ''[[Gizmodo]]'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://money.cnn.com/2014/02/14/technology/security/silk-road-bitcoin/ ''Drug site Silk Road wiped out by Bitcoin glitch''.] In: ''[[CNN]] Money'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.deepdotweb.com/2014/02/13/silk-road-2-hacked-bitcoins-stolen-unknown-amount/ ''Silk Road 2 Hacked, All Bitcoins Stolen – $2.7 Million''.] In: ''Deep Dot Web'' (englisch).&lt;/ref&gt; wodurch es dem Angreifer möglich war, sich durch wiederholte Abhebungen aller auf der Plattform zirkulierenden Bitcoins zu bemächtigen. In der Folge wurde die vorübergehende Sperrung der Seite zwecks Implementierung weiterer Sicherheits-Features angekündigt.<br /> <br /> Bis Juni desselben Jahres hatten die meisten vom Hack betroffenen Nutzer ihre Bitcoins zurückerhalten.&lt;ref&gt;[http://silkroad5v7dywlc.onion/index.php?topic=41683.0 ''You Are Writing History: 82% Repaid''.] – Stellungnahme im Silk Road-Forum – nur über das Tor-Netzwerk erreichbar (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.deepdotweb.com/2014/05/28/silk-road-admin-repaid-82-09-stolen-funds/ Silk Road Admin: We Have Repaid 82.09% Of the Stolen Funds.] In: ''Deep Dot Web'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.techinvestornews.com/Tech-News/Tech-Bloggers/silk-road-2.0-makes-good-has-repaid-82-of-stolen-bitcoin-deposits-as-sales- ''Silk Road 2.0 makes good: Has repaid 82% of stolen bitcoin deposits as sales approach pre-hack level''.] In: ''Tech Investor News'' (englisch).&lt;/ref&gt;<br /> <br /> Zusätzlich zur bestehenden Anklage wurden im August weitere Anschuldigungen gegenüber Ulbricht erhoben. Diese lauteten auf Handel mit [[Betäubungsmittel]]n, Internetdrogenhandel und Inverkehrbringung gefälschter Ausweispapiere. In allen bis dato vorgebrachten Punkten bekannte sich Ulbricht als „nicht schuldig“.&lt;ref&gt;[http://www.coindesk.com/ross-ulbricht-pleads-guilty-new-drug-charges/ ''Ross Ulbricht Pleads Not Guilty to New Drug Charges''.] In: ''CoinDesk'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.theverge.com/2013/10/5/4806630/alleged-silk-road-mastermind-ross-ulbricht-denies-all-charges ''Alleged Silk Road mastermind Ross Ulbricht denies charges, says lawyer''.] In: ''The Verge'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://arstechnica.com/tech-policy/2014/08/prosecutors-hit-silk-road-suspect-ross-ulbricht-with-new-drug-charges/ ''Prosecutors hit Silk Road suspect Ross Ulbricht with new drug charges''.] In: ''[[Ars Technica]]'' (englisch).&lt;/ref&gt;<br /> <br /> Wiederholt war Silk Road 2.0 massiven und gut organisierten [[Distributed-Denial-of-Service]]-Angriffen ausgesetzt. Bei einem besonders schweren Vorfall im September 2014 sahen sich die Betreiber genötigt, die Plattform für einige Tage vom Netz zu nehmen und die Software entsprechend anzupassen; auch das offizielle Forum war zeitweise offline.&lt;ref&gt;[http://www.dailydot.com/crime/silk-road-2-cyberattack-deja-vu/ ''Silk Road 2.0 is battling a major cyberattack''.] In: ''The Daily Dot'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.coindesk.com/silk-road-2-0-shrugs-sophisticated-ddos-attack/ ''Silk Road 2.0 Hit by ‘Sophisticated’ DDoS Attack''.] In: ''CoinDesk'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://o.canada.com/technology/internet/silk-road-ddos-attacks-take-down-tor-drug-market ''Silk Road DDoS attacks take down Tor drug market''.] In: ''canada.com'' (englisch).&lt;/ref&gt;<br /> <br /> Am 6. November 2014, fast genau ein Jahr nach der Gründung des Portals, wurde Silk Road 2.0 durch eine international koordinierte Aktion unter anderem des US-Inlandsgeheimdienstes [[FBI]] und [[Europol]] beschlagnahmt und abgeschaltet. Im Zuge dessen wurde auch der vermutliche Betreiber der Plattform, [[Blake Benthall]] ([[Nickname]] ''Defcon''), von den Behörden festgenommen.&lt;ref&gt;{{Cite web|url = http://www.heise.de/newsticker/meldung/Onymous-Razzia-gegen-Silk-Road-2-0-und-das-Darknet-2443945.html|title = Onymous: Razzia gegen Silk Road 2.0 und das Darknet|accessdate = 2014-11-07|date = 2014-11-06|work = heise.de|language = deutsch|publisher = Heise Zeitschriften Verlag GmbH &amp; Co. KG}}&lt;/ref&gt; Bereits wenige Stunden später traten Seiten wie ''Silk Road Reloaded'' und ''Silk Road 3.0'' in Erscheinung; es handelt sich dabei jedoch lediglich um spontane Umbenennungen bestehender Märkte und sehr wahrscheinlich um Betrugsversuche.&lt;ref&gt;[http://www.businessinsider.com/theres-already-a-silk-road-30-2014-11 ''There's Already A Silk Road 3.0''.] In: ''Business Insider'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.dailydot.com/politics/silk-road-3-blake-benthall/ ''We spoke to the shady opportunist behind Silk Road 3.0''.] In: ''The Daily Dot'' (englisch)&lt;/ref&gt;&lt;ref&gt;[https://www.deepdotweb.com/marketplace-directory/listing/silk-road-3/ Silk Road 3] In: ''Deep Dot Web''&lt;/ref&gt;. Obwohl im Verlauf der Operation mehrere hundert Darknet-URLs übernommen und stillgelegt worden waren, waren die beiden großen Märkte ''Agora'' und ''Evolution'' zu keinem Zeitpunkt betroffen und blieben in Betrieb.&lt;ref&gt;[http://www.economist.com/news/business-and-finance/21631360-fbi-try-close-down-silk-road-again-winning-battle-losing-war ''Illicit e-commerce: Winning the battle, losing the war''.] In: ''[[The Economist]]'' (englisch).&lt;/ref&gt;&lt;ref&gt;[https://medium.com/clouds-taste-metallic/europol-arrests-17-in-darknet-crackdown-a1d7c6a1879d ''Europol Arrests 17 in Darknet Crackdown''.] In: ''medium.com'' (englisch).&lt;/ref&gt;<br /> <br /> Nach dreiwöchigem Prozess vor dem Manhattan Federal Court wurde Ross Ulbricht am 4. Februar 2015 durch die Jury in allen Anklagepunkten als schuldig befunden, womit ihm eine Haftstrafe von 30 Jahren bis lebenslänglich droht.&lt;ref&gt;[http://www.ibtimes.com/ross-ulbricht-guilty-silk-road-founder-convicted-jury-faces-life-prison-conspiracy-1805714 Ross Ulbricht Guilty: Silk Road Founder Convicted By Jury; Faces Life In Prison For Conspiracy, Drug Trafficking.] In: ''International Business Times''&lt;/ref&gt;&lt;ref&gt;[http://blogs.wsj.com/law/2015/02/04/jury-finds-ross-ulbricht-guilty-of-running-online-drug-bazaar-silk-road/ Jury Finds Ross Ulbricht Guilty Of Running Online Drug Bazaar Silk Road.] In: ''[[The Wall Street Journal]]''&lt;/ref&gt;&lt;ref&gt;[http://www.forbes.com/sites/sarahjeong/2015/02/04/jury-finds-ross-ulbricht-guilty-of-running-silk-road-marketplace/ Jury Finds Ross Ulbricht Guilty of Running Silk Road Marketplace.] In: ''Forbes''&lt;/ref&gt; Jedoch könnte die überraschende Festnahme zweier in die Untersuchung involvierter Bundesagenten unter dem Tatverdacht der Korruption –&amp;nbsp;unter Ausnutzung ihrer Ermittlerrolle hatten sie umgerechnet ca. 1 Million US-Dollar in die eigene Tasche gewirtschaftet –&amp;nbsp;möglicherweise eine Wendung im Fall Ulbricht bringen.&lt;ref&gt;[http://www.forbes.com/sites/sarahjeong/2015/03/31/force-and-bridges/ Criminal Charges Against Agents Reveal Staggering Corruption in the Silk Road Investigation.] In: ''Forbes Magazine''&lt;/ref&gt;&lt;ref&gt;[http://fusion.net/story/112680/silk-road-agent-carl-mark-force-iv 5 other insane things a corrupt DEA agent did while allegedly stealing Bitcoin from Silk Road.] In: ''Fusion''&lt;/ref&gt;&lt;ref&gt;[http://www.bloomberg.com/news/articles/2015-03-31/silk-road-revisited-arrest-of-ex-feds-might-force-new-trial-for-dread-pirate Two agents investigating Silk Road, a notorious online black market, stand accused of lying and stealing.] In: ''[[Bloomberg News]]''&lt;/ref&gt; Am 29. Mai 2015 wurde Ulbricht zu lebenslanger Haft verurteilt.&lt;ref&gt;http://www.zeit.de/digital/internet/2015-05/ross-ulbricht-silk-road-strafmass-urteil&lt;/ref&gt;<br /> <br /> Nach dem Schuldspruch wurden ein Beamter der [[Drug Enforcement Administration]] namens Carl Force und ein Agent des [[United States Secret Service|Secret Service]] namens Shaun Bridges wegen des Verdachts festgenommen, die Ermittlungen gegen Ulbricht genutzt zu haben, um sich zu bereichern. Unter anderem soll Force Ulbricht mit Informationen aus den Ermittlungsakten erpresst und die Identität eines festgenommenen Silk Road-Administrators angenommen haben, mit dem Ziel {{FormatNum|250000}}&amp;nbsp;US-Dollar einzustreichen und zusätzlich die Wallets von Händlern, die er zuvor aus ihren Benutzerkonten ausgesperrt hatte, zu plündern. Zwecks Verschleierung der damit verbundenen Geldwäsche über die Bitcoin-Handelsbörse [[Mt.Gox]] hatte er einen Einziehungsbeschluss gegen den Betreiber [[Mark Karpelès]] erwirkt, was zu einer Verfälschung mehrerer Ermittlungsfälle führte.&lt;ref&gt;http://www.golem.de/news/silk-road-prozess-lebenslange-haft-fuer-ross-ulbricht-1505-114354.html&lt;/ref&gt;&lt;ref&gt;[https://www.deepdotweb.com/2015/12/12/second-former-government-agent-and-bitcoin-pirate-sentenced/ Second Former Government Agent Sentenced to 71 Months] In: ''Deep Dot Web'' (englisch)&lt;/ref&gt; Nachdem er sich bereits im Juli der Erpressung, Geldwäsche und [[Strafvereitelung|Behinderung der Justiz]] für schuldig bekannt hatte, wurde Force im Oktober 2015 zu 78 Monaten (mehr als 6 Jahren) Haft verurteilt.&lt;ref&gt;[http://www.theverge.com/2015/10/20/9572923/federal-agent-six-years-prison-extorting-bitcoin ''Federal agent gets six years in prison for extorting bitcoins from Silk Road creator''.] In: ''The Verge'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.dailydot.com/politics/shaun-bridges-identity-theft-target/ ''Cop charged with stealing $820K from Silk Road is trying to run, prosecutors claim''.] In: ''The Daily Dot'' (englisch).&lt;/ref&gt; Bridges bekannte sich der Geldwäsche und Behinderung der Justiz für schuldig und erklärte sich darüber hinaus zu einer Entschädigungszahlung von {{FormatNum|500000}}&amp;nbsp;US-Dollar bereit. Er erhielt im darauffolgenden Dezember eine Haftstrafe von 71 Monaten (fast 6 Jahren).&lt;ref&gt;[http://www.coindesk.com/secret-service-agent-gets-six-year-prison-sentence-for-bitcoin-theft/ Secret Service Agent Gets Six-Year Sentence for Bitcoin Theft] In: ''CoinDesk'' (englisch)&lt;/ref&gt;&lt;ref name=&quot;ars-bridges6y&quot;&gt;[http://arstechnica.com/tech-policy/2015/12/rogue-secret-service-agent-who-stole-from-silk-road-sentenced-to-nearly-6-years/ Judge sets 71-month sentence for former Secret Service agent who plundered Silk Road] In: ''[[Ars Technica]]'' (englisch)&lt;/ref&gt;<br /> <br /> Der mit dem Fall betraute Bundesrichter Richard Seeborg äußerte sich gegenüber dem Gericht dahingehend:<br /> <br /> {{Zitat-en<br /> |This, to me, is an extremely serious crime consisting of the betrayal of public trust from a public official. From what I can see, it was motivated by greed. No departure or variance is warranted in this case. I seldom find myself in the position of imposing a high-end sentence, but I find this is warranted in this case.<br /> |Übersetzung=Für mich stellt dies ein äußerst ernsthaftes Verbrechen dar, welches in einem Bruch des öffentlichen Vertrauens durch einen öffentlichen Amtsträger besteht. So wie ich es sehe, war es durch Gier motiviert. In diesem Fall wird keine Abkehr oder Abweichung gewährt. Selten sehe ich mich in der Position, ein hohes Strafmaß zu verhängen, doch in diesem Fall halte ich es für gerechtfertigt.<br /> |ref=&lt;ref name=&quot;ars-bridges6y&quot;&gt;&lt;/ref&gt;<br /> }}<br /> <br /> == Geschäftsabwicklung ==<br /> [[Datei:Silk_road_payment.jpg|mini|hochkant=1.2|Geldfluss bei einem Darknet-Markt-Geschäft; das Beispiel zeigt den Geldfluss des nicht mehr existierenden Darknet-Markts Silk Road. Urheber des Flowcharts ist die US-Regierung.]]<br /> <br /> Aufmachung und Benutzerschnittstelle waren professionell ausgeführt und ähnelten der anderer virtueller Marktplätze wie eBay oder Amazon.&lt;ref&gt;[http://www.theguardian.com/society/2013/oct/06/dark-net-drugs How I bought drugs from 'dark net' – it's just like Amazon run by cartels.] In: ''The Guardian''&lt;/ref&gt;&lt;ref&gt;[http://www.theatlantic.com/technology/archive/2011/06/libertarian-dream-a-site-where-you-buy-drugs-with-digital-dollars/239776/ Libertarian Dream? A Site Where You Buy Drugs With Digital Dollars.] In: ''The Atlantic''&lt;/ref&gt;&lt;ref&gt;[http://theweek.com/article/index/215850/silk-road-the-amazoncom-of-illegal-drugs Silk Road: The Amazon.com of illegal drugs.] In: ''The Week''&lt;/ref&gt; Silk Road stellte jedem Account ein [[Cyberwallet|Wallet]] mit mehreren Bitcoin-Adressen zur Verfügung. Mit Abschluss eines Kaufs wurde die entsprechende Summe direkt an den Händler überwiesen; eine manuelle Finalisierung durch den Käufer war nicht mehr notwendig und auch das [[Treuhand]]system war aufgrund von Sicherheitsbedenken deaktiviert worden.<br /> <br /> Zu gekauften Produkten konnte [[Feedback (Kommunikation)|Feedback]] in Form einer Rezension und Bewertung hinterlassen werden. Im Fall von Problemen mit der Abwicklung existierte ein [[Issue-Tracking-System|ticketbasierter]] Support, welcher sich vornehmlich mit der Untersuchung von [[Eingehungsbetrug|Betrugsfällen]] befasste. Auch ein offizielles Community-Forum war vorhanden.&lt;ref&gt;[http://www.deepdotweb.com/marketplace-directory/listing/silk-road-2-0 Marketplace Directory – Silk Road 2.0.] In: ''Deep Dot Web''&lt;/ref&gt;<br /> <br /> == Sicherheitsmechanismen ==<br /> <br /> Da Silk Road ein permanentes Ziel von Strafverfolgungsbehörden war, wurde von allen Teilnehmern erwartet, dass sie sich an gewisse Regeln bezüglich der Anonymität halten. So hatte sämtliche Kommunikation, insbesondere die Übermittlung von Lieferadressen, verpflichtend unter Verwendung starker [[Pretty Good Privacy|PGP]]-Verschlüsselung zu erfolgen. Außerdem wurde angesichts des im [[Darknet]] weit verbreiteten [[Identitätsdiebstahl]]s dringend zur Aktivierung der [[Zwei-Faktor-Authentifizierung]] geraten, wobei nach der Eingabe des Login-Namens und Passworts mittels des eigenen [[Schlüssel (Kryptologie)#Schlüssel bei asymmetrischen Verfahren|privaten PGP-Schlüssels]] ein kurzes Rätsel entschlüsselt werden muss.<br /> <br /> Für den sicheren und anonymen Zugriff auf die Plattform wurde im offiziellen Forum als Mindestmaßnahme das [[Tor Browser Bundle]] nebst einer aktuellen PGP-Implementierung (wie etwa [[gpg4usb]]) empfohlen. Idealerweise werden die Programme, welche beide keine Installation benötigen, mitsamt den privaten Schlüsseln und anderen sensiblen Daten auf einen (z.&amp;nbsp;B. mit [[VeraCrypt]] oder [[dm-crypt]]) verschlüsselten Wechseldatenträger kopiert. Windows-Nutzern wird darüber hinaus die Verwendung eines spezialisierten Linux-Live-Systems wie [[Tails (Linux-Distribution)|Tails]] nahegelegt, da insbesondere die Kombination von Windows 8 und [[Trusted Platform Module|TPM]] 2.0-Hardware keinerlei Sicherheit vor beliebigen Fremdeingriffen mehr biete.&lt;ref&gt;{{Webarchiv | url=https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2013/Windows_TPM_Pl_21082013.html | wayback=20160304004000 | text=Stellungnahme des BSI zur aktuellen Berichterstattung zu MS Windows 8 und TPM.}} In: ''[[Bundesamt für Sicherheit in der Informationstechnik]]''&lt;/ref&gt;&lt;ref&gt;[http://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa Bundesbehörden sehen Risiken beim Einsatz von Windows 8.] In: ''[[Die Zeit|Zeit Online]]''&lt;/ref&gt;&lt;ref&gt;[http://www.spiegel.de/netzwelt/web/trusted-platform-module-so-will-die-pc-industrie-kunden-entmuendigen-a-917950.html Kontroll-Chips: So will die PC-Industrie Kunden entmündigen.] In: ''Spiegel Online''&lt;/ref&gt;<br /> <br /> Derzeit sind Bitcoins nicht völlig anonym sondern lediglich „pseudonym“; anhand der [[Metadaten]] sind Transaktionen unter Umständen zu einer bestimmten Bitcoin-Adresse zurückverfolgbar. Um dieses Risiko auszuschalten, existieren sogenannte ''Mixing Services'' bzw. ''Tumbler'', bei denen mittels zufälliger Auszahlung aus einem geteilten Pool die Herkunft verschleiert wird.&lt;ref&gt;[http://www.coindesk.com/taxonomy-bitcoin-mixing-services-policymakers/ A Taxonomy of Bitcoin Mixing Services for Policymakers.] In: ''CoinDesk''&lt;/ref&gt;&lt;ref&gt;[http://www.forbes.com/sites/jonmatonis/2013/06/05/the-politics-of-bitcoin-mixing-services/ The Politics Of Bitcoin Mixing Services.] In: ''Forbes Magazine''&lt;/ref&gt;&lt;ref&gt;[http://www.deepdotweb.com/2014/05/25/current-state-coin-mixing-services/ The current state of coin-mixing services.] In: ''Deep Dot Web''&lt;/ref&gt;<br /> <br /> == Strafverfolgung von Beteiligten ==<br /> <br /> Im Zusammenhang mit Silk Road kam es wiederholt zu Festnahmen zumeist von bedeutenden Großhändlern, seltener von Endabnehmern und [[Händler|Kleindealern]].<br /> <br /> Erstmals wurde ein Nutzer der Plattform im Februar 2013 in Australien aufgespürt und verhaftet.&lt;ref&gt;[http://www.wired.co.uk/news/archive/2013-02/01/silk-road-crackdown ''Police crack down on Silk Road following first drug dealer conviction''.] In: ''Wired'' (englisch).&lt;/ref&gt; Zu einer Welle weiterer Festnahmen kam es im Oktober, als im Gefolge der Beschlagnahmung des originalen Silk Road acht Beteiligte in den Vereinigten Staaten, Großbritannien und Schweden aufgegriffen und im Zuge dessen Bitcoins im Gegenwert von 3,5 Millionen US-Dollar beschlagnahmt wurden.&lt;ref&gt;[http://gawker.com/silk-road-arrests-in-seattle-britain-sweden-as-crackd-1442440730 ''Silk Road Arrests In Seattle, Britain, Sweden As Crackdown Continues''.] In: ''Gawker'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.huffingtonpost.com/2013/10/08/silk-road-arrest-bitcoin_n_4063300.html ''Silk Road Users Arrested In US, UK And Sweden With Millions Of Dollars In Bitcoins Seized''.] In: ''Huffington Post'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://gizmodo.com/uh-oh-silk-road-users-are-starting-to-get-arrested-1442444359 ''Uh Oh, Silk Road Users Are Starting to Get Arrested''.] In: ''Gizmodo'' (englisch).&lt;/ref&gt; Im April 2014 wurde der erste bekannte Silk Road-Millionär, ein Niederländer, in Florida verhaftet;&lt;ref&gt;[http://www.suntimes.com/news/27031238-418/alleged-prolific-illegal-drug-dealer-on-silk-road-website-to-plead-guilty.html ''Alleged ‘prolific’ illegal drug dealer on Silk Road website to plead guilty''.] In: ''[[Chicago Sun-Times]]'' (englisch).&lt;/ref&gt; im Mai desselben Jahres wurde in Texas ein weiterer Großhändler gestellt.&lt;ref&gt;[http://www.deepdotweb.com/2014/05/31/vendor-caligirl-busted-charged-illegally-selling-controlled-substances-silk-road-bitmessage/ ''Vendor “Caligirl” Busted: Charged With Selling Drugs On Silk Road &amp; Bitmessage''.] In: ''Deep Dot Web'' (englisch).&lt;/ref&gt;<br /> <br /> == Trivia ==<br /> <br /> Einer unveröffentlichten Studie&lt;ref&gt;{{Internetquelle |autor=Judith Aldridge, David Décary-Hétu |titel=Not an ‘Ebay for Drugs’: The Cryptomarket ‘Silk Road’ as a Paradigm Shifting Criminal Innovation |url=http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2436643 |datum=2014-05-13 |kommentar= {{DOI|10.2139/ssrn.2436643}}|zugriff=2015-02-05 }}&lt;/ref&gt; der Universitäten von Lausanne und Manchester nach könnte die Funktion als virtueller [[Großhandel]]splatz möglicherweise zu einer Abnahme von Einschüchterung und Gewaltkriminalität im Zusammenhang mit Drogenhandel geführt haben.&lt;ref&gt;[http://www.theverge.com/2014/6/2/5772572/silk-road-may-have-prevented-drug-violence-study-says Silk Road may have prevented drug violence, study says.] In: ''The Verge''&lt;/ref&gt;&lt;ref&gt;[http://www.wired.com/2014/06/silk-road-study/ ''Silk Road Reduced Violence in the Drug Trade'', Study Argues.] In: ''Wired''&lt;/ref&gt;<br /> <br /> == Siehe auch ==<br /> <br /> * [[Darknet-Markt]]<br /> * [[War on Drugs]]<br /> * [[Krypto-Anarchismus]]<br /> * [[Anarchokapitalismus]]<br /> <br /> == Literatur ==<br /> * Eileen Ormsby: ''Silk Road''. Macmillan Publishers Aus., 2014. ISBN 978-1-743-51811-3<br /> * Mike Power: ''Drugs Unlimited: The Web Revolution That's Changing How the World Gets High''. Macmillan, 2014. ISBN 978-1-466-85774-2<br /> <br /> == Weblinks ==<br /> * {{Deep Dot Web|Silk Road 3|silk-road-3}}<br /> * [http://www.deepdotweb.com/tag/transcriptSR Silk Road Trial: Protokolle der Verhandlungstage 4,5 &amp; 6]<br /> * [http://www.wired.com/2015/05/silk-road-untold-story Chronologie von Silk Road auf Wired.com] (englisch)<br /> <br /> == Einzelnachweise ==<br /> &lt;references /&gt;<br /> <br /> {{Navigationsleiste Tor Hidden Services}}<br /> <br /> [[Kategorie:Darknet-Markt]]<br /> [[Kategorie:Tor hidden service]]<br /> [[Kategorie:Bitcoin]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=Silk_Road&diff=157923580 Silk Road 2016-09-14T14:20:30Z <p>Dsprc: /* Geschäftsabwicklung */</p> <hr /> <div>{{Dieser Artikel|behandelt den ehemaligen Schwarzmarkt. Zum Computerspiel siehe [[Silkroad Online]].}}<br /> <br /> '''Silk Road''' ({{enS}} für ''[[Seidenstraße]]'', als Anspielung auf die historische Handelsroute) war ein als [[Hidden Service]] im [[Tor (Netzwerk)|Tor-Netzwerk]] betriebener virtueller [[Schwarzmarkt]]. Insbesondere wurden dort illegale [[Droge]]n und verschiedene digitale Güter gehandelt,&lt;ref&gt;[http://www.theguardian.com/technology/2013/nov/10/silk-road-internet-market-illegal-drugs-ross-ulbricht ''The man behind Silk Road – the internet's biggest market for illegal drugs''.] In: ''[[The Guardian]]'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://nation.time.com/2013/10/04/a-simple-guide-to-silk-road-the-online-black-market-raided-by-the-fbi/ ''Everything You Need to Know About Silk Road, the Online Black Market Raided by the FBI''.] In: ''[[Time]]'' (englisch).&lt;/ref&gt; wobei als einziges Zahlungsmittel die [[Kryptowährung]] [[Bitcoin]] zum Einsatz kam. Nachdem die ursprüngliche Plattform nach zweieinhalb Jahren Aktivität beschlagnahmt und der mutmaßliche Betreiber festgenommen worden war, wurde sie nur einen Monat später wiedereröffnet.&lt;ref&gt;[http://www.wired.com/2015/04/silk-road-1/ wired.com: silk road]&lt;/ref&gt;&lt;ref&gt;[http://www.huffingtonpost.com/2014/04/30/silk-road_n_5241316.html ''New Silk Road Selling Even More Illegal Drugs Than Old Silk Road''.] In: ''[[Huffington Post]]'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.digitaltrends.com/web/silk-road-2-launches-fbi-drugs-marketplace-bitcoin/ ''Sorry, FBI! Silk Road is back online, and still selling illegal drugs''.] In: ''Digital Trends'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.theverge.com/2013/12/6/5178418/inside-the-new-silk-road ''One month after launch, new Silk Road is up to 3,000 drug listings''.] In: ''[[The Verge]]'' (englisch).&lt;/ref&gt; Durch einen noch vor jenem Zeitpunkt eingeschleusten Agenten gelang ein Jahr später im November 2014 eine erneute Beschlagnahmung.&lt;ref&gt;[http://www.wired.com/2014/11/feds-seize-silk-road-2/ ''Feds Seize Silk Road 2 in Major Dark Web Drug Bust''.] In: ''Wired'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.businessinsider.com/fbi-silk-road-seized-arrests-2014-11 ''FBI Arrests SpaceX Employee, Alleging He Ran The 'Deep Web' Drug Marketplace Silk Road 2.0''] In: ''Business Insider'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.deepdotweb.com/2014/11/06/silk-road-2-seized/ ''Silk Road 2 Seized!''] In: ''[[Deep Dot Web]]'' (englisch).&lt;/ref&gt;<br /> <br /> Letztlich zog der Niedergang des originalen Silk Road einen regelrechten Boom an [[Darknet-Markt|Darknet-Märkten]] nach sich,&lt;ref&gt;[http://www.theatlantic.com/technology/archive/2014/10/a-year-after-death-of-silk-road-darknet-markets-are-booming/380996/ ''A Year After Death of Silk Road, Darknet Markets Are Booming''] In: ''[[The Atlantic]]'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.wired.com/2014/09/internet-black-market/ ''How Online Black Markets Have Evolved Since Silk Road’s Downfall''.] In: ''[[Wired]]'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.coindesk.com/silk-road-one-year/ ''Silk Road: One Year On''.] In: ''CoinDesk'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.theguardian.com/technology/2014/may/30/life-after-silk-road-how-the-darknet-drugs-market-is-booming ''Life after Silk Road: how the darknet drugs market is booming''] In: ''[[The Guardian]]'' (englisch).&lt;/ref&gt; wodurch schon bald die Alternativen [[Agora (Darknet-Markt)|Agora]]&lt;ref&gt;[http://www.wired.com/2014/09/agora-bigger-than-silk-road/ ''Drug Market ‘Agora’ Replaces the Silk Road as King of the Dark Net''.] In: ''Wired'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.ibtimes.com/silk-roads-demise-spawns-agora-popular-new-online-drug-marketplace-1684550 ''Silk Road's Demise Spawns Agora, A Popular New Online Drug Marketplace''.] In: ''[[International Business Times]]'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://reason.com/blog/2014/09/02/agora-is-the-webs-top-black-marketplace ''Agora Is the Web's Top Black Marketplace''.] In: ''[[Reason (Zeitschrift)|Reason.com]]'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.thefix.com/content/new-online-drug-portal-agora-replacing-silk-road-atop-dark-web ''Online Drug Site Agora Replaces Silk Road Atop Dark Web''.] In: ''The Fix'' (englisch).&lt;/ref&gt; und [[Evolution (Darknet-Markt)|Evolution]]&lt;ref&gt;[http://gizmodo.com/heroin-guns-stolen-credit-cards-meet-evolution-the-1637621515 ''Heroin, Guns, Stolen Credit Cards: Meet Evolution, the New Silk Road''.] In: ''[[Gizmodo]]'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.thefix.com/content/evolution-replaces-silk-road-new-online-drug-market ''Evolution Replaces Silk Road as New Online Drug Market''] In: ''The Fix'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.wired.com/2014/09/dark-web-evolution/ ''The Dark Web Gets Darker With Rise of the ‘Evolution’ Drug Market''.] In: ''Wired'' (englisch).&lt;/ref&gt; (seit März 2015 abgeschaltet) Silk Road als größten und bekanntesten Markt überholen konnten.<br /> <br /> == Geschichte ==<br /> Die erste Inkarnation von Silk Road ging im Januar 2011 in Betrieb.&lt;ref&gt;[http://www.forbes.com/special-report/2013/silk-road/ ''Take A Walk Down Silk Road''.] In: ''[[Forbes Magazine]]'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.dailydot.com/crime/silk-road-drug-ross-ulbright-dread-pirate-roberts-history/ ''The definitive history of Silk Road''.] In: ''The Daily Dot'' (englisch).&lt;/ref&gt; Zweieinhalb Jahre später konnte durch ein Datenleck im Login-Bildschirm der Server in einem [[Rechenzentrum]] in Island lokalisiert werden&lt;ref&gt;[http://www.wired.com/2014/09/the-fbi-finally-says-how-it-legally-pinpointed-silk-roads-server/ ''The FBI Finally Says How It ‘Legally’ Pinpointed Silk Road’s Server''] In: ''Wired'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.forbes.com/sites/katevinton/2014/09/08/the-feds-explain-how-they-seized-the-silk-road-servers/ ''The Feds Explain How They Seized The Silk Road Servers''.] In; ''Forbes Magazine'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.theverge.com/2013/10/14/4836994/dont-host-your-virtual-illegal-drug-bazaar-in-iceland-silk-road ''Lessons from Silk Road: don't host your virtual illegal drug bazaar in Iceland''.] In: ''The Verge'' (englisch).&lt;/ref&gt;; dies führte direkt zur Verhaftung von [[Ross Ulbricht]] im Oktober 2013. Unter dem Pseudonym ''Dread Pirate Roberts'' (nach einer Figur aus dem Fantasyfilm ''[[Die Braut des Prinzen]]'') soll dieser die Plattform betrieben oder mitbetrieben haben. Auch Silk Road selbst und Bitcoins im Gegenwert von mehr als 3 Millionen US-Dollar wurden beschlagnahmt.&lt;ref&gt;[http://www.theguardian.com/technology/2013/oct/02/alleged-silk-road-website-founder-arrested-bitcoin ''FBI claims largest Bitcoin seizure after arrest of alleged Silk Road founder''.] In: ''The Guardian'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.businessinsider.com/silk-road-seized-ross-ulbricht-arrested-2013-10 ''Alleged Founder Of Silk Road – The Site Where You Can Buy Illegal Drugs – Arrested And Millions In Bitcoins Seized''.] In: ''Business Insider'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://nation.time.com/2013/10/02/alleged-silk-road-proprietor-ross-william-ulbricht-arrested-3-6m-in-bitcoin-seized/ ''Feds Raid Online Drug Market Silk Road''.] In: ''Time'' (englisch).&lt;/ref&gt;<br /> <br /> Bis dahin waren über Silk Road umgerechnet ca. 1,2 Milliarden US-Dollar umgesetzt worden, wovon 80 Millionen als Provision an den oder die Betreiber gegangen waren.&lt;ref&gt;[http://blogs.marketwatch.com/thetell/2013/10/02/silk-road-drug-market-handled-1-2-billion-of-transactions-in-2-5-years-before-fbi-seizure/ ''Silk Road drug market handled $1.2 billion of transactions in 2.5 years before FBI seizure''.] In: ''MarketWatch'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.forbes.com/sites/andygreenberg/2013/10/02/end-of-the-silk-road-fbi-busts-the-webs-biggest-anonymous-drug-black-market/ ''End Of The Silk Road: FBI Says It's Busted The Web's Biggest Anonymous Drug Black Market''.] In: ''Forbes Magazine'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://mashable.com/2013/10/04/silk-road-by-the-numbers/ ''The Silk Road Online Drug Marketplace by the Numbers''.] In: ''[[Mashable]]'' (englisch).&lt;/ref&gt;<br /> <br /> Bereits knapp einen Monat später ging der Nachfolger, schlicht ''Silk Road 2.0'' genannt, unter deutlich verschärften Sicherheitsvorkehrungen ans Netz;&lt;ref&gt;[http://www.forbes.com/sites/andygreenberg/2013/12/06/new-silk-road-drug-market-backed-up-to-500-locations-in-17-countries-to-resist-another-takedown/ ''New Silk Road Drug Market Backed Up To '500 Locations In 17 Countries' To Resist Another Takedown''.] In: ''[[Forbes Magazine]] (englisch).''&lt;/ref&gt;&lt;ref&gt;[http://dailylounge.com/the-daily/entry/silk-road-the-online-black-market-is-already-back ''Silk Road, the Online Black Market, Is Already Back''.] In: ''Daily Lounge'' (englisch).&lt;/ref&gt; auch ein neuer ''Dread Pirate Roberts'' trat im offiziellen Forum in Erscheinung. Als mutmaßliche Mitbetreiber der Plattform wurden im Dezember drei der Forenmoderatoren im Rahmen einer internationalen Fahndung ausfindig gemacht und ergriffen.&lt;ref&gt;[http://techcrunch.com/2013/12/20/alleged-top-moderator-of-silk-road-2-forums-arrested-in-ireland/ ''Alleged Top Moderators Of Silk Road 2 Forums Arrested In Ireland, E.E. In International Sweep''.] In: ''TechCrunch'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://mashable.com/2013/12/20/fbi-silk-road-arrests/ ''3 Alleged Silk Road Moderators Arrested in Global Sting''.] In: ''Mashable'' (englisch).&lt;/ref&gt;<br /> <br /> Im Februar 2014 wurde schließlich Anklage gegen Ulbricht erhoben; diese lautete unter anderem auf Bildung einer [[Kriminelle Vereinigung|kriminellen Vereinigung]], [[Drogenhandel]], das [[Hacker|Hacken]] von Computern und [[Geldwäsche]].&lt;ref&gt;[http://mashable.com/2014/02/07/ross-ulbricht-plea/ ''Alleged Silk Road Kingpin Ross Ulbricht Pleads Not Guilty''.] In: ''Mashable'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.techtimes.com/articles/3280/20140209/silk-road-mastermind-ross-william-ulbricht-pleads-not-guilty-trial-fixed-for-november.htm ''Silk Road mastermind Ross William Ulbricht pleads not guilty, trial fixed for November''.] In: ''Tech Times'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.forbes.com/sites/andygreenberg/2014/02/07/alleged-silk-road-creator-ross-ulbricht-pleads-not-guilty-on-all-charges/ ''Alleged Silk Road Creator Ross Ulbricht Pleads Not Guilty On All Charges''.] In: ''Forbes Magazine'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.ibtimes.com/silk-road-trial-update-ross-ulbricht-dread-pirate-roberts-pleads-not-guilty-trial-set-november ''Silk Road Trial Update: Ross Ulbricht, ‘Dread Pirate Roberts,’ Pleads Not Guilty, Trial Set For November''.] In: ''[[International Business Times]]'' (englisch).&lt;/ref&gt;<br /> <br /> Einen herben Rückschlag hatte Silk Road 2.0 im Februar 2014 einzustecken: Die Plattform wurde unter Ausnutzung einer Schwachstelle im Bitcoin-Protokoll kompromittiert,&lt;ref&gt;[http://silkroad5v7dywlc.onion/index.php?topic=26366.0 ''IMPORTANT: Humbled and Furious''.] – Ankündigung im Silk Road-Forum – nur über das Tor-Netzwerk erreichbar (englisch).&lt;/ref&gt;&lt;ref&gt;[http://gizmodo.com/somebody-hacked-into-silk-road-2-and-stole-all-the-bitc-1522447611 ''Somebody Hacked Into Silk Road 2 and Stole All the Bitcoins''.] In: ''[[Gizmodo]]'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://money.cnn.com/2014/02/14/technology/security/silk-road-bitcoin/ ''Drug site Silk Road wiped out by Bitcoin glitch''.] In: ''[[CNN]] Money'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.deepdotweb.com/2014/02/13/silk-road-2-hacked-bitcoins-stolen-unknown-amount/ ''Silk Road 2 Hacked, All Bitcoins Stolen – $2.7 Million''.] In: ''Deep Dot Web'' (englisch).&lt;/ref&gt; wodurch es dem Angreifer möglich war, sich durch wiederholte Abhebungen aller auf der Plattform zirkulierenden Bitcoins zu bemächtigen. In der Folge wurde die vorübergehende Sperrung der Seite zwecks Implementierung weiterer Sicherheits-Features angekündigt.<br /> <br /> Bis Juni desselben Jahres hatten die meisten vom Hack betroffenen Nutzer ihre Bitcoins zurückerhalten.&lt;ref&gt;[http://silkroad5v7dywlc.onion/index.php?topic=41683.0 ''You Are Writing History: 82% Repaid''.] – Stellungnahme im Silk Road-Forum – nur über das Tor-Netzwerk erreichbar (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.deepdotweb.com/2014/05/28/silk-road-admin-repaid-82-09-stolen-funds/ Silk Road Admin: We Have Repaid 82.09% Of the Stolen Funds.] In: ''Deep Dot Web'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.techinvestornews.com/Tech-News/Tech-Bloggers/silk-road-2.0-makes-good-has-repaid-82-of-stolen-bitcoin-deposits-as-sales- ''Silk Road 2.0 makes good: Has repaid 82% of stolen bitcoin deposits as sales approach pre-hack level''.] In: ''Tech Investor News'' (englisch).&lt;/ref&gt;<br /> <br /> Zusätzlich zur bestehenden Anklage wurden im August weitere Anschuldigungen gegenüber Ulbricht erhoben. Diese lauteten auf Handel mit [[Betäubungsmittel]]n, Internetdrogenhandel und Inverkehrbringung gefälschter Ausweispapiere. In allen bis dato vorgebrachten Punkten bekannte sich Ulbricht als „nicht schuldig“.&lt;ref&gt;[http://www.coindesk.com/ross-ulbricht-pleads-guilty-new-drug-charges/ ''Ross Ulbricht Pleads Not Guilty to New Drug Charges''.] In: ''CoinDesk'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.theverge.com/2013/10/5/4806630/alleged-silk-road-mastermind-ross-ulbricht-denies-all-charges ''Alleged Silk Road mastermind Ross Ulbricht denies charges, says lawyer''.] In: ''The Verge'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://arstechnica.com/tech-policy/2014/08/prosecutors-hit-silk-road-suspect-ross-ulbricht-with-new-drug-charges/ ''Prosecutors hit Silk Road suspect Ross Ulbricht with new drug charges''.] In: ''[[Ars Technica]]'' (englisch).&lt;/ref&gt;<br /> <br /> Wiederholt war Silk Road 2.0 massiven und gut organisierten [[Distributed-Denial-of-Service]]-Angriffen ausgesetzt. Bei einem besonders schweren Vorfall im September 2014 sahen sich die Betreiber genötigt, die Plattform für einige Tage vom Netz zu nehmen und die Software entsprechend anzupassen; auch das offizielle Forum war zeitweise offline.&lt;ref&gt;[http://www.dailydot.com/crime/silk-road-2-cyberattack-deja-vu/ ''Silk Road 2.0 is battling a major cyberattack''.] In: ''The Daily Dot'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.coindesk.com/silk-road-2-0-shrugs-sophisticated-ddos-attack/ ''Silk Road 2.0 Hit by ‘Sophisticated’ DDoS Attack''.] In: ''CoinDesk'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://o.canada.com/technology/internet/silk-road-ddos-attacks-take-down-tor-drug-market ''Silk Road DDoS attacks take down Tor drug market''.] In: ''canada.com'' (englisch).&lt;/ref&gt;<br /> <br /> Am 6. November 2014, fast genau ein Jahr nach der Gründung des Portals, wurde Silk Road 2.0 durch eine international koordinierte Aktion unter anderem des US-Inlandsgeheimdienstes [[FBI]] und [[Europol]] beschlagnahmt und abgeschaltet. Im Zuge dessen wurde auch der vermutliche Betreiber der Plattform, [[Blake Benthall]] ([[Nickname]] ''Defcon''), von den Behörden festgenommen.&lt;ref&gt;{{Cite web|url = http://www.heise.de/newsticker/meldung/Onymous-Razzia-gegen-Silk-Road-2-0-und-das-Darknet-2443945.html|title = Onymous: Razzia gegen Silk Road 2.0 und das Darknet|accessdate = 2014-11-07|date = 2014-11-06|work = heise.de|language = deutsch|publisher = Heise Zeitschriften Verlag GmbH &amp; Co. KG}}&lt;/ref&gt; Bereits wenige Stunden später traten Seiten wie ''Silk Road Reloaded'' und ''Silk Road 3.0'' in Erscheinung; es handelt sich dabei jedoch lediglich um spontane Umbenennungen bestehender Märkte und sehr wahrscheinlich um Betrugsversuche.&lt;ref&gt;[http://www.businessinsider.com/theres-already-a-silk-road-30-2014-11 ''There's Already A Silk Road 3.0''.] In: ''Business Insider'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.dailydot.com/politics/silk-road-3-blake-benthall/ ''We spoke to the shady opportunist behind Silk Road 3.0''.] In: ''The Daily Dot'' (englisch)&lt;/ref&gt;&lt;ref&gt;[https://www.deepdotweb.com/marketplace-directory/listing/silk-road-3/ Silk Road 3] In: ''Deep Dot Web''&lt;/ref&gt;. Obwohl im Verlauf der Operation mehrere hundert Darknet-URLs übernommen und stillgelegt worden waren, waren die beiden großen Märkte ''Agora'' und ''Evolution'' zu keinem Zeitpunkt betroffen und blieben in Betrieb.&lt;ref&gt;[http://www.economist.com/news/business-and-finance/21631360-fbi-try-close-down-silk-road-again-winning-battle-losing-war ''Illicit e-commerce: Winning the battle, losing the war''.] In: ''[[The Economist]]'' (englisch).&lt;/ref&gt;&lt;ref&gt;[https://medium.com/clouds-taste-metallic/europol-arrests-17-in-darknet-crackdown-a1d7c6a1879d ''Europol Arrests 17 in Darknet Crackdown''.] In: ''medium.com'' (englisch).&lt;/ref&gt;<br /> <br /> Nach dreiwöchigem Prozess vor dem Manhattan Federal Court wurde Ross Ulbricht am 4. Februar 2015 durch die Jury in allen Anklagepunkten als schuldig befunden, womit ihm eine Haftstrafe von 30 Jahren bis lebenslänglich droht.&lt;ref&gt;[http://www.ibtimes.com/ross-ulbricht-guilty-silk-road-founder-convicted-jury-faces-life-prison-conspiracy-1805714 Ross Ulbricht Guilty: Silk Road Founder Convicted By Jury; Faces Life In Prison For Conspiracy, Drug Trafficking.] In: ''International Business Times''&lt;/ref&gt;&lt;ref&gt;[http://blogs.wsj.com/law/2015/02/04/jury-finds-ross-ulbricht-guilty-of-running-online-drug-bazaar-silk-road/ Jury Finds Ross Ulbricht Guilty Of Running Online Drug Bazaar Silk Road.] In: ''[[The Wall Street Journal]]''&lt;/ref&gt;&lt;ref&gt;[http://www.forbes.com/sites/sarahjeong/2015/02/04/jury-finds-ross-ulbricht-guilty-of-running-silk-road-marketplace/ Jury Finds Ross Ulbricht Guilty of Running Silk Road Marketplace.] In: ''Forbes''&lt;/ref&gt; Jedoch könnte die überraschende Festnahme zweier in die Untersuchung involvierter Bundesagenten unter dem Tatverdacht der Korruption –&amp;nbsp;unter Ausnutzung ihrer Ermittlerrolle hatten sie umgerechnet ca. 1 Million US-Dollar in die eigene Tasche gewirtschaftet –&amp;nbsp;möglicherweise eine Wendung im Fall Ulbricht bringen.&lt;ref&gt;[http://www.forbes.com/sites/sarahjeong/2015/03/31/force-and-bridges/ Criminal Charges Against Agents Reveal Staggering Corruption in the Silk Road Investigation.] In: ''Forbes Magazine''&lt;/ref&gt;&lt;ref&gt;[http://fusion.net/story/112680/silk-road-agent-carl-mark-force-iv 5 other insane things a corrupt DEA agent did while allegedly stealing Bitcoin from Silk Road.] In: ''Fusion''&lt;/ref&gt;&lt;ref&gt;[http://www.bloomberg.com/news/articles/2015-03-31/silk-road-revisited-arrest-of-ex-feds-might-force-new-trial-for-dread-pirate Two agents investigating Silk Road, a notorious online black market, stand accused of lying and stealing.] In: ''[[Bloomberg News]]''&lt;/ref&gt; Am 29. Mai 2015 wurde Ulbricht zu lebenslanger Haft verurteilt.&lt;ref&gt;http://www.zeit.de/digital/internet/2015-05/ross-ulbricht-silk-road-strafmass-urteil&lt;/ref&gt;<br /> <br /> Nach dem Schuldspruch wurden ein Beamter der [[Drug Enforcement Administration]] namens Carl Force und ein Agent des [[United States Secret Service|Secret Service]] namens Shaun Bridges wegen des Verdachts festgenommen, die Ermittlungen gegen Ulbricht genutzt zu haben, um sich zu bereichern. Unter anderem soll Force Ulbricht mit Informationen aus den Ermittlungsakten erpresst und die Identität eines festgenommenen Silk Road-Administrators angenommen haben, mit dem Ziel {{FormatNum|250000}}&amp;nbsp;US-Dollar einzustreichen und zusätzlich die Wallets von Händlern, die er zuvor aus ihren Benutzerkonten ausgesperrt hatte, zu plündern. Zwecks Verschleierung der damit verbundenen Geldwäsche über die Bitcoin-Handelsbörse [[Mt.Gox]] hatte er einen Einziehungsbeschluss gegen den Betreiber [[Mark Karpelès]] erwirkt, was zu einer Verfälschung mehrerer Ermittlungsfälle führte.&lt;ref&gt;http://www.golem.de/news/silk-road-prozess-lebenslange-haft-fuer-ross-ulbricht-1505-114354.html&lt;/ref&gt;&lt;ref&gt;[https://www.deepdotweb.com/2015/12/12/second-former-government-agent-and-bitcoin-pirate-sentenced/ Second Former Government Agent Sentenced to 71 Months] In: ''Deep Dot Web'' (englisch)&lt;/ref&gt; Nachdem er sich bereits im Juli der Erpressung, Geldwäsche und [[Strafvereitelung|Behinderung der Justiz]] für schuldig bekannt hatte, wurde Force im Oktober 2015 zu 78 Monaten (mehr als 6 Jahren) Haft verurteilt.&lt;ref&gt;[http://www.theverge.com/2015/10/20/9572923/federal-agent-six-years-prison-extorting-bitcoin ''Federal agent gets six years in prison for extorting bitcoins from Silk Road creator''.] In: ''The Verge'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.dailydot.com/politics/shaun-bridges-identity-theft-target/ ''Cop charged with stealing $820K from Silk Road is trying to run, prosecutors claim''.] In: ''The Daily Dot'' (englisch).&lt;/ref&gt; Bridges bekannte sich der Geldwäsche und Behinderung der Justiz für schuldig und erklärte sich darüber hinaus zu einer Entschädigungszahlung von {{FormatNum|500000}}&amp;nbsp;US-Dollar bereit. Er erhielt im darauffolgenden Dezember eine Haftstrafe von 71 Monaten (fast 6 Jahren).&lt;ref&gt;[http://www.coindesk.com/secret-service-agent-gets-six-year-prison-sentence-for-bitcoin-theft/ Secret Service Agent Gets Six-Year Sentence for Bitcoin Theft] In: ''CoinDesk'' (englisch)&lt;/ref&gt;&lt;ref name=&quot;ars-bridges6y&quot;&gt;[http://arstechnica.com/tech-policy/2015/12/rogue-secret-service-agent-who-stole-from-silk-road-sentenced-to-nearly-6-years/ Judge sets 71-month sentence for former Secret Service agent who plundered Silk Road] In: ''[[Ars Technica]]'' (englisch)&lt;/ref&gt;<br /> <br /> Der mit dem Fall betraute Bundesrichter Richard Seeborg äußerte sich gegenüber dem Gericht dahingehend:<br /> <br /> {{Zitat-en<br /> |This, to me, is an extremely serious crime consisting of the betrayal of public trust from a public official. From what I can see, it was motivated by greed. No departure or variance is warranted in this case. I seldom find myself in the position of imposing a high-end sentence, but I find this is warranted in this case.<br /> |Übersetzung=Für mich stellt dies ein äußerst ernsthaftes Verbrechen dar, welches in einem Bruch des öffentlichen Vertrauens durch einen öffentlichen Amtsträger besteht. So wie ich es sehe, war es durch Gier motiviert. In diesem Fall wird keine Abkehr oder Abweichung gewährt. Selten sehe ich mich in der Position, ein hohes Strafmaß zu verhängen, doch in diesem Fall halte ich es für gerechtfertigt.<br /> |ref=&lt;ref name=&quot;ars-bridges6y&quot;&gt;&lt;/ref&gt;<br /> }}<br /> <br /> == Geschäftsabwicklung ==<br /> [[Datei:Silk_road_payment.jpg|mini|hochkant=1.3|Geldfluss bei einem Darknet-Markt-Geschäft; das Beispiel zeigt den Geldfluss des nicht mehr existierenden Darknet-Markts Silk Road. Urheber des Flowcharts ist die US-Regierung.]]<br /> <br /> Aufmachung und Benutzerschnittstelle waren professionell ausgeführt und ähnelten der anderer virtueller Marktplätze wie eBay oder Amazon.&lt;ref&gt;[http://www.theguardian.com/society/2013/oct/06/dark-net-drugs How I bought drugs from 'dark net' – it's just like Amazon run by cartels.] In: ''The Guardian''&lt;/ref&gt;&lt;ref&gt;[http://www.theatlantic.com/technology/archive/2011/06/libertarian-dream-a-site-where-you-buy-drugs-with-digital-dollars/239776/ Libertarian Dream? A Site Where You Buy Drugs With Digital Dollars.] In: ''The Atlantic''&lt;/ref&gt;&lt;ref&gt;[http://theweek.com/article/index/215850/silk-road-the-amazoncom-of-illegal-drugs Silk Road: The Amazon.com of illegal drugs.] In: ''The Week''&lt;/ref&gt; Silk Road stellte jedem Account ein [[Cyberwallet|Wallet]] mit mehreren Bitcoin-Adressen zur Verfügung. Mit Abschluss eines Kaufs wurde die entsprechende Summe direkt an den Händler überwiesen; eine manuelle Finalisierung durch den Käufer war nicht mehr notwendig und auch das [[Treuhand]]system war aufgrund von Sicherheitsbedenken deaktiviert worden.<br /> <br /> Zu gekauften Produkten konnte [[Feedback (Kommunikation)|Feedback]] in Form einer Rezension und Bewertung hinterlassen werden. Im Fall von Problemen mit der Abwicklung existierte ein [[Issue-Tracking-System|ticketbasierter]] Support, welcher sich vornehmlich mit der Untersuchung von [[Eingehungsbetrug|Betrugsfällen]] befasste. Auch ein offizielles Community-Forum war vorhanden.&lt;ref&gt;[http://www.deepdotweb.com/marketplace-directory/listing/silk-road-2-0 Marketplace Directory – Silk Road 2.0.] In: ''Deep Dot Web''&lt;/ref&gt;<br /> <br /> == Sicherheitsmechanismen ==<br /> <br /> Da Silk Road ein permanentes Ziel von Strafverfolgungsbehörden war, wurde von allen Teilnehmern erwartet, dass sie sich an gewisse Regeln bezüglich der Anonymität halten. So hatte sämtliche Kommunikation, insbesondere die Übermittlung von Lieferadressen, verpflichtend unter Verwendung starker [[Pretty Good Privacy|PGP]]-Verschlüsselung zu erfolgen. Außerdem wurde angesichts des im [[Darknet]] weit verbreiteten [[Identitätsdiebstahl]]s dringend zur Aktivierung der [[Zwei-Faktor-Authentifizierung]] geraten, wobei nach der Eingabe des Login-Namens und Passworts mittels des eigenen [[Schlüssel (Kryptologie)#Schlüssel bei asymmetrischen Verfahren|privaten PGP-Schlüssels]] ein kurzes Rätsel entschlüsselt werden muss.<br /> <br /> Für den sicheren und anonymen Zugriff auf die Plattform wurde im offiziellen Forum als Mindestmaßnahme das [[Tor Browser Bundle]] nebst einer aktuellen PGP-Implementierung (wie etwa [[gpg4usb]]) empfohlen. Idealerweise werden die Programme, welche beide keine Installation benötigen, mitsamt den privaten Schlüsseln und anderen sensiblen Daten auf einen (z.&amp;nbsp;B. mit [[VeraCrypt]] oder [[dm-crypt]]) verschlüsselten Wechseldatenträger kopiert. Windows-Nutzern wird darüber hinaus die Verwendung eines spezialisierten Linux-Live-Systems wie [[Tails (Linux-Distribution)|Tails]] nahegelegt, da insbesondere die Kombination von Windows 8 und [[Trusted Platform Module|TPM]] 2.0-Hardware keinerlei Sicherheit vor beliebigen Fremdeingriffen mehr biete.&lt;ref&gt;{{Webarchiv | url=https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2013/Windows_TPM_Pl_21082013.html | wayback=20160304004000 | text=Stellungnahme des BSI zur aktuellen Berichterstattung zu MS Windows 8 und TPM.}} In: ''[[Bundesamt für Sicherheit in der Informationstechnik]]''&lt;/ref&gt;&lt;ref&gt;[http://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa Bundesbehörden sehen Risiken beim Einsatz von Windows 8.] In: ''[[Die Zeit|Zeit Online]]''&lt;/ref&gt;&lt;ref&gt;[http://www.spiegel.de/netzwelt/web/trusted-platform-module-so-will-die-pc-industrie-kunden-entmuendigen-a-917950.html Kontroll-Chips: So will die PC-Industrie Kunden entmündigen.] In: ''Spiegel Online''&lt;/ref&gt;<br /> <br /> Derzeit sind Bitcoins nicht völlig anonym sondern lediglich „pseudonym“; anhand der [[Metadaten]] sind Transaktionen unter Umständen zu einer bestimmten Bitcoin-Adresse zurückverfolgbar. Um dieses Risiko auszuschalten, existieren sogenannte ''Mixing Services'' bzw. ''Tumbler'', bei denen mittels zufälliger Auszahlung aus einem geteilten Pool die Herkunft verschleiert wird.&lt;ref&gt;[http://www.coindesk.com/taxonomy-bitcoin-mixing-services-policymakers/ A Taxonomy of Bitcoin Mixing Services for Policymakers.] In: ''CoinDesk''&lt;/ref&gt;&lt;ref&gt;[http://www.forbes.com/sites/jonmatonis/2013/06/05/the-politics-of-bitcoin-mixing-services/ The Politics Of Bitcoin Mixing Services.] In: ''Forbes Magazine''&lt;/ref&gt;&lt;ref&gt;[http://www.deepdotweb.com/2014/05/25/current-state-coin-mixing-services/ The current state of coin-mixing services.] In: ''Deep Dot Web''&lt;/ref&gt;<br /> <br /> == Strafverfolgung von Beteiligten ==<br /> <br /> Im Zusammenhang mit Silk Road kam es wiederholt zu Festnahmen zumeist von bedeutenden Großhändlern, seltener von Endabnehmern und [[Händler|Kleindealern]].<br /> <br /> Erstmals wurde ein Nutzer der Plattform im Februar 2013 in Australien aufgespürt und verhaftet.&lt;ref&gt;[http://www.wired.co.uk/news/archive/2013-02/01/silk-road-crackdown ''Police crack down on Silk Road following first drug dealer conviction''.] In: ''Wired'' (englisch).&lt;/ref&gt; Zu einer Welle weiterer Festnahmen kam es im Oktober, als im Gefolge der Beschlagnahmung des originalen Silk Road acht Beteiligte in den Vereinigten Staaten, Großbritannien und Schweden aufgegriffen und im Zuge dessen Bitcoins im Gegenwert von 3,5 Millionen US-Dollar beschlagnahmt wurden.&lt;ref&gt;[http://gawker.com/silk-road-arrests-in-seattle-britain-sweden-as-crackd-1442440730 ''Silk Road Arrests In Seattle, Britain, Sweden As Crackdown Continues''.] In: ''Gawker'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://www.huffingtonpost.com/2013/10/08/silk-road-arrest-bitcoin_n_4063300.html ''Silk Road Users Arrested In US, UK And Sweden With Millions Of Dollars In Bitcoins Seized''.] In: ''Huffington Post'' (englisch).&lt;/ref&gt;&lt;ref&gt;[http://gizmodo.com/uh-oh-silk-road-users-are-starting-to-get-arrested-1442444359 ''Uh Oh, Silk Road Users Are Starting to Get Arrested''.] In: ''Gizmodo'' (englisch).&lt;/ref&gt; Im April 2014 wurde der erste bekannte Silk Road-Millionär, ein Niederländer, in Florida verhaftet;&lt;ref&gt;[http://www.suntimes.com/news/27031238-418/alleged-prolific-illegal-drug-dealer-on-silk-road-website-to-plead-guilty.html ''Alleged ‘prolific’ illegal drug dealer on Silk Road website to plead guilty''.] In: ''[[Chicago Sun-Times]]'' (englisch).&lt;/ref&gt; im Mai desselben Jahres wurde in Texas ein weiterer Großhändler gestellt.&lt;ref&gt;[http://www.deepdotweb.com/2014/05/31/vendor-caligirl-busted-charged-illegally-selling-controlled-substances-silk-road-bitmessage/ ''Vendor “Caligirl” Busted: Charged With Selling Drugs On Silk Road &amp; Bitmessage''.] In: ''Deep Dot Web'' (englisch).&lt;/ref&gt;<br /> <br /> == Trivia ==<br /> <br /> Einer unveröffentlichten Studie&lt;ref&gt;{{Internetquelle |autor=Judith Aldridge, David Décary-Hétu |titel=Not an ‘Ebay for Drugs’: The Cryptomarket ‘Silk Road’ as a Paradigm Shifting Criminal Innovation |url=http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2436643 |datum=2014-05-13 |kommentar= {{DOI|10.2139/ssrn.2436643}}|zugriff=2015-02-05 }}&lt;/ref&gt; der Universitäten von Lausanne und Manchester nach könnte die Funktion als virtueller [[Großhandel]]splatz möglicherweise zu einer Abnahme von Einschüchterung und Gewaltkriminalität im Zusammenhang mit Drogenhandel geführt haben.&lt;ref&gt;[http://www.theverge.com/2014/6/2/5772572/silk-road-may-have-prevented-drug-violence-study-says Silk Road may have prevented drug violence, study says.] In: ''The Verge''&lt;/ref&gt;&lt;ref&gt;[http://www.wired.com/2014/06/silk-road-study/ ''Silk Road Reduced Violence in the Drug Trade'', Study Argues.] In: ''Wired''&lt;/ref&gt;<br /> <br /> == Siehe auch ==<br /> <br /> * [[Darknet-Markt]]<br /> * [[War on Drugs]]<br /> * [[Krypto-Anarchismus]]<br /> * [[Anarchokapitalismus]]<br /> <br /> == Literatur ==<br /> * Eileen Ormsby: ''Silk Road''. Macmillan Publishers Aus., 2014. ISBN 978-1-743-51811-3<br /> * Mike Power: ''Drugs Unlimited: The Web Revolution That's Changing How the World Gets High''. Macmillan, 2014. ISBN 978-1-466-85774-2<br /> <br /> == Weblinks ==<br /> * {{Deep Dot Web|Silk Road 3|silk-road-3}}<br /> * [http://www.deepdotweb.com/tag/transcriptSR Silk Road Trial: Protokolle der Verhandlungstage 4,5 &amp; 6]<br /> * [http://www.wired.com/2015/05/silk-road-untold-story Chronologie von Silk Road auf Wired.com] (englisch)<br /> <br /> == Einzelnachweise ==<br /> &lt;references /&gt;<br /> <br /> {{Navigationsleiste Tor Hidden Services}}<br /> <br /> [[Kategorie:Darknet-Markt]]<br /> [[Kategorie:Tor hidden service]]<br /> [[Kategorie:Bitcoin]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=Parted_Magic&diff=155552968 Parted Magic 2016-06-22T23:01:09Z <p>Dsprc: neu release</p> <hr /> <div>{{Infobox Betriebssystem<br /> | Logo = [[Datei:Logo Parted Magic.png|Logo von Parted Magic]]<br /> | Screenshot = [[Datei:Parted Magic 2014 04 28.png|300px|Screenshot]]<br /> | Beschreibung = Parted Magic, Version 2014_04_28<br /> | Entwickler = Patrick Verner<br /> | Sprache = Englisch<br /> | Version = 2016_04_26<br /> | Freigabedatum = 26. April 2016<br /> | Stammbaum = [[GNU]]/[[Linux]] {{Kind|1}}[[Softlanding Linux System|SLS]] {{Kind|2}}[[Slackware]] {{Kind|3}}Parted Magic&lt;ref name=&quot;Netzwelt.de_2011-04-15&quot;&gt;[http://www.netzwelt.de/news/86300-parted-magic-6-0-rettungs-linux-festplatten-test.html Parted Magic 6.0: Das Rettungs-Linux für Festplatten im Test] – Artikel bei ''[[Netzwelt.de]]'', vom 15.&amp;nbsp;April 2011&lt;/ref&gt;<br /> | Kernel = 4.4.2<br /> | Chronik = <br /> | Architekturen = <br /> | Lizenz = [[GNU General Public License|GNU GPL]] ([[Freie Software]])<br /> | Installationsmedium = [[Compact Disc|CD]], [[USB-Stick]]<br /> | Sonstiges = Unterstützte [[Dateisystem]]e: [[ext2]], [[ext3]], [[ext4]], [[File Allocation Table#FAT16|FAT16]], [[File Allocation Table#FAT32|FAT32]], [[HFS (Dateisystem)|HFS]], [[HFS Plus|HFS+]], [[Journaled File System|JFS]], [[Linux-Swap]], [[NTFS]], [[Reiser File System|ReiserFS]], Reiser4 und [[XFS (Dateisystem)|xfs]]<br /> | Website = [http://www.partedmagic.com/ partedmagic.com]<br /> }}<br /> <br /> '''Parted Magic''' ist eine rund 480&amp;nbsp;[[Megabyte]]&lt;ref&gt;&lt;!-- 479.199.232 Byte --&gt;Stand: Version 2014_04_28 (ISO-Abbild „[https://partedmagic.com/downloads/ pmagic_2014_04_28.iso]“)&lt;/ref&gt; große [[Live-System|Live]]-[[Linux-Distribution]] aus den [[Vereinigte Staaten|Vereinigten Staaten]] mit dem Ziel, eine komplette [[Festplattenlaufwerk|Festplatten]]-Management-Lösung zu bieten. Dazu bietet das System unter anderem das Partitionierungsprogramm ''[[GNU Parted]]'' und das darauf aufbauende [[Grafische Benutzeroberfläche|GUI]]-Programm ''GParted'' an.<br /> <br /> == Details ==<br /> Parted Magic ist als [[Direktstartsystem]] für die Speichermedien [[Compact Disc|CD]] und [[USB-Stick]], sowie im [[Preboot Execution Environment|PXE]]-Format erhältlich und lädt sich beim Startvorgang komplett in den [[Arbeitsspeicher]]. Für den Betrieb werden mindestens 1 Gigabyte Arbeitsspeicher benötigt (als Direktsystem 512&amp;nbsp;MB).<br /> <br /> == Funktionsumfang ==<br /> Neben GNU Parted und dem darauf aufbauenden [[GNU Parted#GParted|GParted]] bietet Parted Magic unter anderem folgende Programme an, um Festplatten auf Fehler zu untersuchen und diese wenn möglich zu beheben:<br /> * [[Partimage]], dessen Nachfolger [[FSArchiver]] inklusive [[Grafische Benutzeroberfläche|GUI]] ([[qt4-fsarchiver]]) und [[Clonezilla]] – Dient der Sicherung und Wiederherstellung von [[Festplattenlaufwerk|Festplatten]] und [[Partition (Datenträger)|Partitionen]]<br /> * [[smartmontools]] inklusive GUI ([[GSmartControl]]) – Überprüft und erkennt mögliche Defekte von Festplatten via [[Self-Monitoring, Analysis and Reporting Technology|SMART]]<br /> * [[TestDisk]] – Überprüft und stellt gelöschte Partitionen und Daten wieder her<br /> * Eine eigene simple GUI zum sicheren Löschen von Partitionen, ganzen Festplatten oder des [[Master Boot Record|MBR]] – verwendet unter anderem [[dd (Unix)|dd]], [[Shred (Unix)|shred]] und [[Darik’s Boot and Nuke|nwipe]]<br /> * [[NTFS-3G]] – [[Gerätetreiber|Treiber]] für Schreib- und Lesezugriff auf das [[NTFS]]-Dateisystem von [[Microsoft Windows]].<br /> * Zahlreiche [[fdisk]]-Programme (Partitionierungsprogramme)<br /> <br /> '''Warnung bei Windows 8:''' Zur Zeit sollte man Schreibzugriffe auf das Dateisystem von Windows 8 meiden.&lt;ref&gt;http://www.heise.de/open/artikel/Linux-und-Windows-8-Schnellstart-gefaehrdet-Daten-1780057.html&lt;/ref&gt; Es besteht die Gefahr von Datenverlust, da bei dem mit Standardeinstellungen benutzten Schnellstart oder auch im normalen [[Ruhezustand]] Informationen zum Zustand aller eingebundenen Dateisysteme (z.&amp;nbsp;B. NTFS und FAT32) in ein Speicherabbild geschrieben werden. Abhilfe schafft unter anderem die Deaktivierung des Schnellstarts.<br /> <br /> Die Distribution verwendet die [[Desktop-Umgebung]] [[LXDE]] und bietet die in vielen heutigen [[Betriebssystem]]en üblichen Programme wie [[Portable Document Format|PDF]]-Betrachter ([[Evince]]), [[Bildbetrachter]] ([[Mirage (Software)|Mirage]]), [[Packprogramm]]e ([[File Roller]]), Musik-Player ([[Audacious]]), [[Brennprogramm]]e ([[Xfburn]]), [[CD-Ripper]] ([[Asunder]]) und das [[Drucksystem]] [[Common Unix Printing System|CUPS]] an.<br /> Zudem sind einige Internet-Programme wie ein [[IRC-Client]] ([[XChat]]) und der [[Webbrowser]] [[Mozilla Firefox|Firefox]] mit nachladbarem [[Adobe Flash#Flash Player|Flash]] und [[Java-Laufzeitumgebung|Java]] als auch der [[Freie Software|freie]] [[Virenscanner]] [[ClamAV]] mit der [[Grafische Benutzeroberfläche|grafischen Benutzeroberfläche]] ClamTk vorhanden.<br /> Eine simple [[Grafische Benutzeroberfläche|GUI]] ermöglicht das Speichern von getätigten Einstellungen für zukünftige Sitzungen. Auch die Installation auf einer [[Festplatte]] ist möglich.<br /> <br /> == Lizenz &amp; Preis ==<br /> Parted Magic wird unter der [[GNU General Public License]] veröffentlicht und ist damit [[Freie Software]].<br /> <br /> Früher konnte Parted Magic kostenfrei von der Webseite des Projektes heruntergeladen werden. Seit Anfang August 2013 jedoch (ab Version 2013_08_01) wird für den Bezug von Parted Magic über eine [[Paywall]] der Projekt-Webseite eine Gebühr erhoben. Das Preismodell sieht verschiedene Tarife vor und reicht von 9,99 [[US-Dollar|USD]] für einen Einmal-Download des CD-Images, über 12,99 USD für den Erhalt von Parted Magic auf CD bzw. ab 17,99 USD auf USB-Stick, bis zu 49,99 USD für ein Jahresabonnement, welches zu unbeschränkten Downloads aller erscheinenden Versionen incl. der wöchentlichen Builds legitimiert.&lt;ref&gt;https://partedmagic.com/downloads/ Paywall&lt;/ref&gt;<br /> <br /> Der Sourcecode von Parted Magic ist weiterhin gratis herunterladbar.&lt;ref&gt;https://partedmagic.com/source/ Source Code&lt;/ref&gt;<br /> <br /> == Sonstiges ==<br /> Der Autor spendet monatlich einen gewissen Betrag an andere Freie Software- und Open Source-Projekte, welche in Parted Magic verwendet werden. Regelmäßige Spenden begannen, schon bevor sich der Autor zum Einrichten einer Paywall entschlossen hat. Die Spenden betrugen 2013 3.000 USD und 2014 (Stand 2. Juli) bislang 2.500 USD. Sie werden in einer eigenen Forums-Sektion bekanntgegeben.&lt;ref&gt;http://forums.partedmagic.com/viewforum.php?f=11 Open Source Donations from Parted Magic&lt;/ref&gt;<br /> <br /> == Entwicklungsgeschichte ==<br /> <br /> {| class=&quot;wikitable&quot;<br /> |- class=&quot;hintergrundfarbe5&quot;<br /> ! Version<br /> ! Datum<br /> ! Anmerkungen<br /> |-<br /> | {{Version|o|1.0–1.9}}<br /> | style=&quot;white-space: nowrap;&quot; | 25. Dezember 2006 (1.0)<br /> | Erste Version 1.0 wurde veröffentlicht.<br /> |-<br /> | {{Version|o|2.0–2.2}}<br /> | style=&quot;white-space: nowrap;&quot; | 11. Februar 2008 (2.0)<br /> | Entfernung von [[Gnome Partition Editor|GParted]] zugunsten des neu hinzugefügten, eigenentwickelten Partitionierungs-Programmes ''VisParted''; weitere Programme können manuell als Module hinzugefügt werden. In Version 2.1 wurde zusätzlich die Unterstützung von [[ext4]]-Dateisystemen in VisParted hinzugefügt; VisParted wurde in Version 2.2 jedoch entfernt und GParted wieder hinzugefügt, da letzteres Projekt trotzdem weitergeführt wird.<br /> |-<br /> | {{Version|o|3.0–3.7}}<br /> | style=&quot;white-space: nowrap;&quot; | 25. Juli 2008 (3.0)<br /> | Die Desktop-Umgebung ''[[Xfce]]'' wurde in Version 3.1 durch ''[[LXDE]]'' ersetzt, in Version 3.2 wurde [[Slackware]]s ''installpkg'' hinzugefügt. Die Unterstützung für das ext4-Dateisystem wurde in Version 3.5 wieder hinzugefügt, da GParted dieses Dateisystem nun unterstützt.<br /> |-<br /> | {{Version|o|4.0–4.11}}<br /> | style=&quot;white-space: nowrap;&quot; | 4. April 2009 (4.0)<br /> | Unter anderem Unterstützung für [[Device Mapper|Device-Mapper]]-[[RAID]]-Partitionen, neues [[Artwork]], [[initramfs]] anstelle von [[initrd]]; in Version 4.6 wurde das Virenschutzprogramm ''[[ClamAV]]'' aufgenommen; mit Version 4.11 kam der Internet-Browser ''[[Google Chrome#Chromium|Chromium]]'' dazu.<br /> |-<br /> | {{Version|o|5.0-5.10}}<br /> | style=&quot;white-space: nowrap;&quot; | 12. Juli 2010 (5.0)<br /> | Implementierung der Programmiersprache [[awk]] und Anzeige von System- und Festplatteninformationen. Mit Version 5.2 wird die Eingabemethode ''{{lang|en|Smart Common Input Method}}'' (SCIM) unterstützt, mit Version 5.3 wird keine ''LiveUSB''-Version mehr zum Download angeboten, aber [[UNetbootin]] unterstützt. In Version 5.10 wird Chromium durch [[Mozilla Firefox]] ersetzt.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Parted Magic 5.0-5.10|url=http://partedmagic.com/doku.php?id=changelog |zugriff=11. November 2011|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|6.0-6.7}}<br /> | style=&quot;white-space: nowrap;&quot; | 12. April 2011 (6.0)<br /> | Das grafische Startmenü (zum Hochfahren) wurde durch eine minimalistisch gehaltene Version ersetzt. Mit Version 6.2 wird die Anzeige des Desktops unter Rox und feh aufgeteilt; [[ntfsprogs]] wird durch [[NTFS-3G]] ersetzt. In Version 6.3 werden mehr CPU-Kerneloptionen hinzugefügt (i486, i686, x86_64); in Version 6.7 wurden PCManFM und SimpleBurn durch PCMan-Mod und Xfburn ersetzt.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 6.0 bis 6.7|url=http://partedmagic.com/doku.php?id=changelog |zugriff=11. November 2011|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|11.11.11 bis 2011_12_30}}<br /> | style=&quot;white-space: nowrap;&quot; | 11. November 2011 (11.11.11)<br /> | Einführung einer neuen Versionsbenennung (nach Datum), die mit der nächsten Version wieder leicht modifiziert wurde. In Version 2011_12_30 wurden cifs-utils-5.2 und keyutils_1.5.2 hinzugefügt.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2011er Reihe|url=http://partedmagic.com/doku.php?id=changelog |zugriff=28. Februar 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_2_19}}<br /> | style=&quot;white-space: nowrap;&quot; | 19. Februar 2012<br /> | ''Aktualisierungen:'' TrueCrypt 7.1, wxGTK-2.8.12, linux-3.2.6, clonezilla-1.2.12-10, partclone_0.2.45, ddrescue-1.15, e2fsprogs-1.42, hdparm-9.38, pciutils-3.1.9, nilfs-utils-2.1.1, ntfs-3g_ntfsprogs-2012.1.15, pcmanfm-mod-1.2.4, unetbootin-linux-568, firefox-10.0.1&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_2_19|url=http://partedmagic.com/doku.php?id=changelog |zugriff=20. Februar 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_2_27}}<br /> | style=&quot;white-space: nowrap;&quot; | 27. Februar 2012<br /> | ''Aktualisierung:'' GParted 0.12.0&lt;br /&gt;Außerdem wurde ein Bug in Clonezilla behoben.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_2_27|url=http://partedmagic.com/doku.php?id=changelog |zugriff=28. Februar 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_3_24}}<br /> | style=&quot;white-space: nowrap;&quot; | 24. März 2012<br /> | ''Aktualisierungen:'' Xorg drivers Nouveau-git, linux-3.2.13, firefox-11.0, nwipe-0.08, und e2fsprogs-1.42.1&lt;br /&gt;''Neue Programme:'' bar_1.11.1 und md5deep-4.1&lt;br /&gt;Die Kompatibilität von [[Clonezilla]] mit [[Busybox]] wurde verbessert.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_3_24|url=http://partedmagic.com/doku.php?id=changelog |zugriff=30. März 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_4_21}}<br /> | style=&quot;white-space: nowrap;&quot; | 21. April 2012<br /> | ''Aktualisierungen:'' e2fsprogs-1.42.2, dosfstools_3.0.12, mtools_4.0.17, util-linux-2.21.1, coreutils-8.16, bootinfoscript-061, gptfdisk-0.8.4, ms-sys-2.3.0, pigz-2.2.4, safecopy-1.7, gparted-0.12.1, lzip-1.13, parted-3.1, plzip-0.8, ddrescue-1.16-rc3, dhcp-4.2.1_P1, dhcpcd-5.2.12, ethtool-2.6.36, net-tools-1.60, hdparm-9.39, wicd-1.7.2, linux-3.2.15, clonezilla-1.2.12-37, ntfs-3g_ntfsprogs-2012.1.15AR.1, testdisk-6.14-WIP, smartmontools-5.42, flashrom-0.9.5.2.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_4_21|url=http://partedmagic.com/doku.php?id=changelog |zugriff=23. April 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_05_14}}<br /> | style=&quot;white-space: nowrap;&quot; | 14. Mai 2012<br /> | ''Aktualisierungen:'' openssl-0.9.8v, mount-gtk-1.2.0, MesaLib-8.0.2, fontconfig-2.8.0, freeglut-2.8.0, glew-1.5.7, libdrm-2.4.33, mtdev-1.1.2, xf86-input-*(9x), xf86-video-*(34x), xorg-server-1.12.1, glibc-2.15, linux-3.3.6, lxpanel-0.5.9, plpbt-5.0.14. ''Hinzugefügt:'' iptables-1.4.10, ConsoleKit-0.4.3, polkit-0.101, polkit-gnome-0.101, spacefm-0.7.6, sudo-1.7.4p6, udisks-1.0.4.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_5_14|url=http://partedmagic.com/doku.php?id=changelog |zugriff=17. Mai 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_05_30}}<br /> | style=&quot;white-space: nowrap;&quot; | 30. Mai 2012<br /> | ''Aktualisierungen:'' coreutils-8.17, file-5.11, lftp-4.3.6, mbr-1.1.11, openssh-6.0p1, openssl-0.9.8x, rdesktop-1.7.1, sshfs-fuse-2.4, unetbootin-575, zerofree-1.0.2, clamav-0.97.4, e2fsprogs-1.42.3, fuse-2.9.0, rsync-3.0.9, cifs-utils-5.4, keyutils-1.5.5, krb5-1.7.1, curl-7.25.0, libidn-1.25, openldap-client-2.4.31, spacefm-0.7.7. ''Hinzugefügt:'' pyneighborhood-0.5.4, shorewall-4.4.27, shorewall6-4.4.27.3, gptsync-0.14, udevil-0.2.4.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_5_30|url=http://partedmagic.com/doku.php?id=changelog |zugriff=1. Juni 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_06_07}}<br /> | style=&quot;white-space: nowrap;&quot; | 7. Juni 2012<br /> | ''Aktualisierungen:'' clonezilla-1.2.12-60, ntfs-3g_ntfsprogs-2012.1.15AR.5, partclone-0.2.48, testdisk-6.14-WIP, bash-4.2.024, lxinput-0.3.2, menu-cache-0.3.3, xmms2-0.8DrO_o, libogg-1.2.2, libvorbis-1.3.2, lxmusic-0.4.5, mpg123-1.13.3, alsa-lib-1.0.25, alsa-utils-1.0.25. ''Hinzugefügt:'' dislocker, libdiscid-0.2.2, libsndfile-1.0.24, kmod-8, nmap-5.51&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_6_07|url=http://partedmagic.com/doku.php?id=changelog |zugriff=9. Juni 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_06_26}}<br /> | style=&quot;white-space: nowrap;&quot; | 26. Juni 2012<br /> | ''Aktualisierungen:'' xrandr-1.3.5, bluez-4.91, fsarchiver-0.6.15, linux-3.4.3, e2fsprogs-1.42.4, sed-4.2.1, libdrm-2.4.35, xf86-video-nouveau-git_20120614_36d3f8c, freetype-2.4.10, ddrescue-1.16, pixman-0.26.0, xorg-server-1.12.2, firefox-13.0.1, gzip-1.5, psmisc-22.18, clamav-0.97.5, ethtool-3.4.1, xz-5.0.4, conky-1.9.0., xdg-user-dirs-0.13, xdg-utils-1.1.0_rc1, boost_1_49_0, cifs-utils-5.5. ''Hinzugefügt:'' arpwatch-2.1a15, sallu-xclamscan-1.1.1, arandr-0.1.6, samba-3.5.14, pm-utils-1.4.1, libmcs-0.7.2, libmowgli-0.7.1.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_6_26|url=http://partedmagic.com/doku.php?id=changelog |zugriff=29. Juni 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_07_05}}<br /> | style=&quot;white-space: nowrap;&quot; | 5. Juli 2012<br /> | ''Aktualisierungen:'' grep-2.13, mount-gtk-1.2.1, linux-3.4.4, udevil-0.2.9, lshw-B.02.16, partclone-0.2.49, clonezilla-1.2.12-67, nbd-3.0.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_07_05|url=http://partedmagic.com/doku.php?id=changelog |zugriff=5. Juli 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_07_13}}<br /> | style=&quot;white-space: nowrap;&quot; | 13. Juli 2012<br /> | ''Aktualisierungen:'' gparted-0.13.0, exfat-utils-0.9.7, fuse-exfat-0.9.7, gparted-0.12.1-git, udev-182, xorg-server-1.12.3, btrfs-progs-20120708, pciutils-3.1.10, smartmontools-5.43.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_07_13|url=http://partedmagic.com/doku.php?id=changelog |zugriff=14. Juli 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_07_28}}<br /> | style=&quot;white-space: nowrap;&quot; | 28. Juli 2012<br /> | ''Aktualisierungen:'' gopenssl-1.0.1c, cryptsetup-1.4.3, dbus-1.4.20, LVM2.2.02.96, mdadm-3.2.5, util-linux-2.21.2, atk-2.4.0, dbus-glib-0.98, gdk-pixbuf-2.26.1, glib-2.32.3, gtk+-2.24.10, libnotify-0.7.5, pango-1.30.1, bind-9.9.1-P1, curl-7.26.0, elinks-0.11.7, lftp-4.3.8, nmap-6.01, ntp-4.2.6p5, openldap-2.4.31, openssh-6.0p1, gftp-2.0.19, newt-0.52.14, slang2-2.2.4, vte-0.28.2, spacefm-0.7.10, udevil-0.3.1, linux-3.4.6, iptables-1.4.14, xfce4-screenshooter-1.8.1, xfburn-git from 07/26/2012, libpng-1.2.50, libpng-1.4.12.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_07_28|url=http://partedmagic.com/doku.php?id=changelog |zugriff=3. August 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_08_09}}<br /> | style=&quot;white-space: nowrap;&quot; | 9. August 2012<br /> | ''Aktualisierungen:'' gparted-0.13.1, gptfdisk-0.8.5, lm_sensors-3.3.2, firefox-14.0.1, xf86-video-nv-2.1.20.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_08_09|url=http://partedmagic.com/doku.php?id=changelog |zugriff=15. August 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_09_12}}<br /> | style=&quot;white-space: nowrap;&quot; | 12. September 2012<br /> |<br /> |-<br /> | {{Version|o|2012_10_10}}<br /> | style=&quot;white-space: nowrap;&quot; | 10. Oktober 2012<br /> | ''Aktualisierungen:'' python-2.7.3, bzip2-1.0.6, dbus-python-1.1.0, libgpg-error-1.10, mesa-9.0, nmap-6.01, notify-python-0.1.1, pixman-0.27.2, py2cairo-1.8.10, pygobject-2.28.6, pygtk-2.24.0, pyneighborhood-0.5.4, smartmontools-6.0, wicd-1.7.2.4, gparted-0.14.0, firefox-16.0, ethtool-3.6, linux-3.5.6, gnome-ppp-0.3.23, libtorrent-0.13.0, rtorrent-0.9.0, wvdial-1.61, wvstreams-4.6.1, zfs-fuse-20120201_6abfdcf, xf86-input-*(11x), xf86-video-*(36x), xorg-server-1.13.0, reiser4progs-1.0.7, libaal-1.0.5, hdparm-9.42, cryptsetup-1.4.3, libcap-2.22, libgcrypt-1.5.0, pcre-8.12, ncurses-5.9, ncdu-1.9, nwipe-0.11, e2fsprogs-1.42.6, lilo-23.2, clamav-0.97.6, dhcp-4.2.4-P2, hdt-0.5.2, spacefm-0.8.0, udevil-0.3.3<br /> |-<br /> | {{Version|o|2012_11_30}}<br /> | style=&quot;white-space: nowrap;&quot; | 30. November 2012<br /> | ''Änderungen:'' Kernel 3.6.8 (PAE), Firefox 17.0, gparted-11.23.2012, Sonstiges ''(engl. 72x Upgrade, 32x Rebuilt, 106x Added, 10x Removed)''<br /> |-<br /> | {{Version|o|2012_12_25}}<br /> | style=&quot;white-space: nowrap;&quot; | 25. Dezember 2012<br /> |<br /> |-<br /> | {{Version|o|2013_01_29}}<br /> | style=&quot;white-space: nowrap;&quot; | 29. Januar 2013<br /> | ''Aktualisierungen:'' Kernel 3.7.5, Firefox 18.0.1<br /> |-<br /> | {{Version|o|2013_02_28}}<br /> | style=&quot;white-space: nowrap;&quot; | 28. Februar 2013<br /> | ''Aktualisierungen:'' Kernel 3.7.9, Firefox 19.0.1, u.v.m.<br /> |-<br /> | {{Version|o|2013_05_01}}<br /> | style=&quot;white-space: nowrap;&quot; | 1. Mai 2013<br /> | ''Aktualisierungen:'' Kernel 3.8.10, Firefox 20.0.1, GParted 0.16.1, EFI boot von CD wurde deutlich verbessert<br /> |-<br /> | {{Version|o|2013_06_15}}<br /> | style=&quot;white-space: nowrap;&quot; | 15. Juni 2013<br /> | ''Aktualisierungen:'' Kernel 3.8.13, Clonezilla 3.3.40<br /> |-<br /> | {{Version|o|2013_08_01}}<br /> | style=&quot;white-space: nowrap;&quot; | 1. August 2013<br /> | ''Aktualisierungen:'' Kernel 3.10.4, Clonezilla 3.5.1, Firefox 22.0<br /> |-<br /> | {{Version|o|2013_09_26}}<br /> | style=&quot;white-space: nowrap;&quot; | 26. September 2013<br /> | ''Aktualisierungen:'' Kernel 3.10.12, Firefox 24.0<br /> |-<br /> | {{Version|o|2013_11_11}}<br /> | style=&quot;white-space: nowrap;&quot; | 11. November 2013<br /> | ''Aktualisierungen:'' Kernel 3.10.18, Firefox 24.1ESR<br /> |-<br /> | {{Version|o|2014_01_04}}<br /> | style=&quot;white-space: nowrap;&quot; | 4. Januar 2014<br /> | ''Aktualisierungen:'' Kernel 3.12.6, Firefox 26.0<br /> |-<br /> | {{Version|o|2014_02_26}}<br /> | style=&quot;white-space: nowrap;&quot; | 26. Februar 2014<br /> | ''Aktualisierungen:'' Kernel 3.13.4, Firefox 27.0.1<br /> |-<br /> | {{Version|o|2014_04_28}}<br /> | style=&quot;white-space: nowrap;&quot; | 28. April 2014<br /> | ''Aktualisierungen:'' Kernel 3.14.2<br /> |-<br /> | {{Version|o|2014_06_10}}<br /> | style=&quot;white-space: nowrap;&quot; | 10. Juni 2014<br /> | ''Aktualisierungen:'' Kernel 3.14.4, Firefox 29.0.1, clamav-0.98.3, e2fsprogs-1.42.10, eudev-20140510, gparted-0.19.0, gparted-badsectors-0.19.0, libdrm-2.4.54, libevdev-1.2.1, libxml2-2.9.1, libxslt-1.1.28, openssl-1.0.1h, xf86-input-evdev-2.9.0, xf86-input-synaptics-1.7.6<br /> |-<br /> | {{Version|o|2014_08_14}}<br /> | style=&quot;white-space: nowrap;&quot; | 14. August 2014<br /> |''Aktualisierungen:'' Kernel 3.15.9, Firefox 31.0, parted-3.2<br /> |-<br /> | {{Version|o|2014_09_22}}<br /> | style=&quot;white-space: nowrap;&quot; | 22. September 2014<br /> |''Aktualisierungen:'' Firefox 32.0, ddrescue-1.18.1, clonezilla-3.10.33<br /> |-<br /> | {{Version|o|2014_09_29}}<br /> | style=&quot;white-space: nowrap;&quot; | 29. September 2014<br /> | ''Aktualisierungen:'' Firefox 32.0.3, bash-4.3.026<br /> |-<br /> | {{Version|o|2014_11_19}}<br /> | style=&quot;white-space: nowrap;&quot; | 19. November 2014<br /> |<br /> |-<br /> | {{Version|o|2015_01_13}}<br /> | style=&quot;white-space: nowrap;&quot; | 13. Januar 2015<br /> |<br /> |-<br /> | {{Version|o|2015_03_06}}<br /> | style=&quot;white-space: nowrap;&quot; | 6. März 2015<br /> | ''Aktualisierungen:'' Truecrypt ersetzt durch Veracrypt 1.0f<br /> |-<br /> | {{Version|o|2015_05_04}}<br /> | style=&quot;white-space: nowrap;&quot; | 4. Mai 2015<br /> | <br /> |-<br /> | {{Version|o|2015_07_07}}<br /> | style=&quot;white-space: nowrap;&quot; | 7. Juli 2015<br /> | <br /> |-<br /> | {{Version|o|2015_08_12}}<br /> | style=&quot;white-space: nowrap;&quot; | 12. August 2015<br /> |<br /> |-<br /> | {{Version|o|2015_09_29}}<br /> | style=&quot;white-space: nowrap;&quot; | 29. September 2015<br /> | ''Aktualisierungen:'' Firefox 41<br /> |-<br /> | {{Version|o|2015_11_13}}<br /> | style=&quot;white-space: nowrap;&quot; | 13. November 2015<br /> | ''Aktualisierungen:'' Firefox 42, Kernel 4.2.6<br /> |-<br /> | {{Version|o|2016_01_06}}<br /> | style=&quot;white-space: nowrap;&quot; | 6. Januar 2016<br /> | <br /> |-<br /> | {{Version|o|2016_03_02}}<br /> | style=&quot;white-space: nowrap;&quot; | 2. März 2016<br /> | <br /> |-<br /> | {{Version|c|2016_04_26}}<br /> | style=&quot;white-space: nowrap;&quot; | 26. April 2016<br /> | <br /> |-<br /> | colspan=&quot;3&quot;| {{Version |l |zeige=110100}}<br /> |}<br /> <br /> == Siehe auch ==<br /> <br /> * [[SystemRescueCd]] – Ein startfähiges Notfallsystem für die Reparatur eines nicht mehr startbaren Betriebssystems und die Wiederherstellung von Daten<br /> * [[G4L]] – Ein startfähiges Notfallsystem zum Sichern (backup) oder Kopieren (clone) von Festplatten oder deren Partitionen (GPL)<br /> * [[GNU Parted#GParted|GParted]] – GNU Parted mit grafischer Oberfläche. Gibt es auch als Live-CD (GPL)<br /> * [[Liste von Linux-Distributionen]]<br /> <br /> == Weblinks ==<br /> <br /> {{Commonscat}}<br /> * [http://partedmagic.com/ Parted Magic] (englisch) – Offizielle Webseite<br /> <br /> == Einzelnachweise ==<br /> <br /> &lt;references /&gt;<br /> <br /> [[Kategorie:Linux-Distribution]]<br /> [[Kategorie:Live-CD]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=PC/GEOS&diff=155552651 PC/GEOS 2016-06-22T22:39:05Z <p>Dsprc: i guess remove this cell</p> <hr /> <div>{|class=&quot;wikitable float-right&quot; style=&quot;width:22em; font-size:90%;&quot;<br /> !class=&quot;hintergrundfarbe6&quot; colspan=&quot;2&quot; style=&quot;font-size:105%;&quot;|PC/GEOS<br /> |-<br /> |'''Entwickler:'''||BreadboxComputer Company u.&amp;nbsp;a.<br /> |-<br /> |'''Version:'''||4.13 &amp;nbsp;&lt;small&gt;25. August 2009&lt;/small&gt;<br /> |-<br /> |'''Größe:'''||20,0 [[Megabyte|MB]]<br /> |-<br /> |'''Startmedium:'''||Alle Datenträger (bei gebootetem DOS)<br /> |-<br /> |'''Stammbaum:'''||OS/90, GeoDOS, PC/GEOS 1.x bis 4.x<br /> |-<br /> |'''Lizenz:'''||[[Proprietär]]<br /> |-<br /> |'''Sonstiges:'''||Sprache: Englisch, Deutsch, Französisch, Spanisch; als NewDeal Office 2000 auch in Arabisch, Zulu, Igbo, Yoruba und Hausa<br /> |}<br /> <br /> '''PC/GEOS''' (''PC/'''G'''raphical [[Desktop-Environment|'''E'''nvironment]] '''O'''bject '''S'''ystem'') ist eine [[grafische Benutzeroberfläche]] für Computer mit installiertem [[PC-kompatibles DOS|DOS]]-kompatiblem Betriebssystem. Es ist auch unter den Bezeichnungen ''GeoWorks Ensemble'', ''GeoWorks DTP'', ''IBM ShoolView'', ''NewDeal Office'' und ''Breadbox Ensemble'' bekannt und wurde 1990 von der US-Firma ''[[GeoWorks|GeoWorks Corporation]]'' vorgestellt, zwischenzeitlich von der US-Firma ''NewDeal Inc.'' und seit 2000 von ''Breadbox Computer Company, LLC'' mit Firmensitz in Florida weiterentwickelt und vertrieben.<br /> <br /> == Einsatz ==<br /> Die grafische Benutzeroberfläche PC/GEOS lässt sich auf Computersystemen, auf welchen ein zu [[MS-DOS]] kompatibles Betriebssystem installiert ist, einsetzen. Ein erforderliches DOS-kompatibles Betriebssystem ist nicht Bestandteil von PC/GEOS. PC/GEOS nutzt und erweitert Fähigkeiten von DOS. Im Einsatz als DOS-Erweiterung fungiert es als DOS-Programmstarter sowie Dateimanager. Beim Start eines DOS-Programms wird PC/GEOS selbst dabei bis auf eine kleine Ladefunktion heruntergefahren und nach Beenden des DOS-Programms wieder gestartet. Unter [[DR DOS]] registriert sich PC/GEOS jedoch statt TASKMGR als grafisches Menüsystem für den präemptiven Protected Mode-Multitasker (KRNL386.EXE bzw. EMM386 /MULTI) von DR-DOS und erlaubt so den nahtlosen Betrieb mehrerer parallel ablaufender DOS- und GEOS-Anwendungen gleichzeitig. PC/GEOS ersetzt die DOS-[[Kommandozeile|CLI]] durch dialogbasierte Bedienung unter Einsatz einer Maus und anderen Eingabegeräten. Es bietet verschiedene wählbare Bedienoberflächen. Im PC/GEOS-Lieferumfang und zusätzlich erhältlich sind systemeigene und stark integrierte Layout- und [[Desktop-Publishing|DTP]]-Anwendungen, Büro-, Schul- und [[Internet]]software.<br /> <br /> === Vorteile ===<br /> Der Vorteil gegenüber anderen Betriebssystemen und Bedienoberflächen liegt im geringen Ressourcenverbrauch von PC/GEOS. Es funktioniert aufgrund seiner geringen Hardwareanforderungen nicht nur auf aktuellen Personal Computern, sondern auch auf fast allen seit 1986 gebauten IBM-kompatiblen Computern. PC/GEOS eignet sich daher auch zum Einsatz auf Computern, zu denen aktuelle Produkte wie Windows XP, [[Linux]]-[[Distribution (Software)|Distribution]]en oder [[Mac OS X]] auf Grund ihrer hohen Anforderungen an die Hardware nicht lauffähig sind. Dazu kommt eine höhere Datensicherheit durch Beibehaltung der Datenformate und – nach Meinung der Mehrheit der PC/GEOS-Benutzer – eine hohe [[Benutzerfreundlichkeit|Bedienfreundlichkeit]].<br /> <br /> === Nachteile ===<br /> Der größte Nachteil von PC/GEOS ist, dass es bislang ausschließlich als 16-Bit-Version für den [[Real Mode]] vorliegt. Durch die geringe Verbreitung bietet sich für professionelle Softwarehersteller kein lukrativer Absatzmarkt. Neben Software des PC/GEOS-Herstellers existiert daher kaum weitere käuflich erwerbbare Software. Spezielle Tastaturen oder Eingabegeräte für körperbehinderte Menschen werden vom Hersteller bislang nicht unterstützt.<br /> <br /> == System ==<br /> === Benötigte Hardware ===<br /> PC/GEOS stellt als 16-Bit-System geringe Anforderungen an die Hardware.<br /> <br /> Ab einem [[Intel 8086]]-[[Mikroprozessor]] mit mindestens 512 KB RAM, mindestens [[Hercules Graphics Card|Hercules]]- oder [[Color Graphics Adapter|CGA]]-[[Grafikkarte]] sowie zuvor installiertem DOS-Betriebssystem kann das PC/GEOS Grundsystem ausgeführt werden. Optional erhältliche Software setzt jedoch zumindest eine [[Enhanced Graphics Adapter|EGA]]- oder MCGA-Grafikkarte voraus.<br /> <br /> Der Hersteller empfiehlt für einen angenehmen Betrieb von PC/GEOS 4.x als Minimum einen [[80386|386er]] oder besser, 640 Kilobyte RAM, eine 15 MB große Festplatte und eine EGA-Karte. Das System soll von bis zu 32 Megabyte zusätzlichem RAM stark profitieren.&lt;!-- Unterstützt GEOS EMS oder XMS? Warum braucht es einen 386er, wo es doch nur im Real Mode läuft? Enthält es 386er Assemblerbefehle? oder wird ein 386er nur für EMM386 benötigt? --&gt;<br /> <br /> Über 250, zumeist aus den Jahren 1990 bis ca. 2000 stammende Drucker mit parallelem und seriellem Anschluss, darunter [[PostScript]]-Drucker, werden unterstützt. USB-Drucker werden mangels USB-Treiber von einem auf DOS installiertem PC/GEOS nicht unterstützt.<br /> <br /> PC/GEOS kann auf optischen Medien [[CD-ROM|CD]] und [[DVD]] gebrannt sowie auf diversen [[Random-Access Memory|RAM]]-Karten oder [[USB-Stick]] installiert werden. Es ist auf CD- und USB-Treiber im zugrundeliegenden Betriebssystem angewiesen, oder eine Festplattenemulation im BIOS, welche das Booten von CD oder USB-Stick beherrscht.<br /> <br /> Die verschiedenen PC/GEOS Versionen unterstützen folgende weitere Hardwarestandards:<br /> * PCs ab dem [[IBM PC XT|IBM-XT]]-Standard bis zu heutigen Modellen. PC/GEOS profitiert von mathematischen Co-Prozessoren.<br /> * Die minimal benötigte CPU-Taktfrequenz liegt bei PC/GEOS 1.x bei 6 Megahertz, für PC/GEOS 2.x und 3.x bei 16 Megahertz, ab PC/GEOS 4.x bei 33 Megahertz.<br /> * Ab PC/GEOS 3.0 wird [[Video Electronics Standards Association|VESA]] 1.02 bis 2.0 [[SVGA]] und vereinzelt [[Extended Graphics Array|XGA]] bei Echtfarben unterstützt. Spätere, nicht standardisierte und auf eigene Treiber angewiesene Grafikkarten werden nur sehr vereinzelt bei gewisser Kompatibilität zum VESA-Standard unterstützt.<br /> * Es besitzt Treiber für Geräte zu Dateneingabe wie [[Tastatur]]en oder Mäusen.<br /> * Zur [[Datenfernübertragung]] beispielsweise in Verbindung mit [[Bulletin Board System|BBS]] oder dem Internet unterstützt PC/GEOS 4 [[AT-Befehlssatz|AT]]-[[Modem]]s aller Geschwindigkeiten, inklusive externe [[Integrated Services Digital Network|ISDN]]-Modems, die den AT-Befehlssatz unterstützen. Der Internet-Zugang über [[Digital Subscriber Line|DSL]] und [[Integrated Services Digital Network|ISDN]] ist zudem über entsprechende externe Router möglich.<br /> * Ab der Version 1.2 besitzt das System die Fähigkeiten zum Einsatz in einem [[Netzwerk]] und unterstützt, auch zur Umleitung der Druckerausgabe, zuvor installierte [[Novell Netware]], Artisoft [[LANtastic|LAN-Tastic]], IBM [[LAN Manager]] und ab PC/GEOS 3.x zusätzlich Bay Networks [[PowerLAN]], Microsoft Windows-Netzwerk sowie zu DOS kompatible [[Internet Protocol|IP]]-Netzwerktreiber. Von einigen PC/GEOS-Versionen wie die Version 4 gab es auf Anfrage komplette Netzwerk-Versionen.<br /> <br /> === Benötigtes Betriebssystem ===<br /> PC/GEOS funktioniert auf zu DOS kompatiblen Betriebssystemen, wozu auch aktuelle wie [[FreeDOS]] gehören.<br /> <br /> Vorteil einer Installation auf MS-DOS-basierende Windows-Versionen ist der Umstand, dass sich PC/GEOS vieler Windows-Gerätetreiber, wie zum Beispiel für RAM, USB, Netzwerk und Drucker bedienen kann, was die Möglichkeiten gegenüber der Installation auf einem DOS-Betriebssystem erweitert.<br /> <br /> PC/GEOS funktioniert auf [[OS/2]] seit der Version 2 sowie auf dem OS/2 Nachfolgern [[Warp 4|Warp/4]] und [[EComStation]] im Direktbetrieb.<br /> <br /> Durch das Designkonzept von Windows NT (und seinen Nachfolgern), DOS-Programmen den direkten Zugriff auf die Hardware zu verweigern, funktioniert PC/GEOS unter Windows NT-basierenden Betriebssystemen mit den normalen Geos-Treibern nur im Vollbild-Modus im DOS-Fenster. Je nach verwendeter Hardware und Windows-Treibern ist zudem unter Geos z.T. kein „Truecolor“-Modus, sondern nur ein 16-Farben-Modus möglich. Daher gibt es ab Geos 3.x noch ein paar spezielle Grafiktreiber, die es Geos ermöglichen, unter Windows in einem Fenster zu laufen. Leider sind diese Treiber nicht sehr stabil und laufen z.T. nur, wenn Windows in einem Grafikmodus mit 16-bit Farbtiefe läuft. Auch ein Zugriff auf die Soundkarte ist nur mittels Emulatoren (VDMSound, DosBox,...) möglich. Geos-Programme, die zum Abspielen von Audio-CDs dienen, brauchen ebenfalls Emulatoren, da MSCDEXNT deutlich weniger kann als sein Dos-Kollege MSCDEX.<br /> <br /> PC/GEOS kann u.a. auf [[File Allocation Table|FAT12]]-, FAT16- oder FAT32-formatierte Datenträger installiert werden.<br /> <br /> === Emulatoren ===<br /> Neben einer Direktinstallation auf DOS oder auf MS-DOS-basierende Windows-Versionen kann PC/GEOS auf nicht zu DOS kompatiblen Systemen wie Windows-XP, Linux-Distributionen, Mac OS X ab einer Taktfrequenz der CPU von ungefähr 1 Gigahertz auch mit Hilfe eines zuvor installierten Emulators wie [[DOSEMU]] oder [[DOSBox]] in brauchbarer Geschwindigkeit ausgeführt werden.<br /> <br /> Andreas Bollhalder hat eine [[QEMU]]-Installation mit FreeDOS und PC/GEOS 4 mit Breadbox Ensemble-Lite erstellt und bietet diese zum Download an. QEMU liegt hierfür mit angepasstem [[Video Graphics Array|VGA]]-fähigem [[BIOS]] vor.<br /> <br /> Mit Hilfe des kommerziellen Produkts [[Microsoft Virtual PC]] für Mac OS X läuft PC/GEOS 4 am besten mit der ISUI-Oberfläche. Die Geschwindigkeit auf einem G4-Macintosh bewegt sich mit MS-DOS 7 auf 80486er-Niveau.<br /> <br /> === Systemaufbau und Kernel ===<br /> Das in der objektorientierten [[Intel 8086|8086]]-[[Assemblersprache]] [[Espire]] und einem ebenfalls objektorientierten Derivat der [[C (Programmiersprache)|Programmiersprache C]] namens [[GOC (Programmiersprache)|GOC]] entwickelte PC/GEOS bietet echtes [[Präemptives Multitasking|präemptive]]s [[Multitasking]], [[Multithreading]], dynamisch gelinkte Bibliotheken, [[Vektorschriften]] und seit 1990 ein erweitertes Dateisystem, welches lange Dateinamen sowie Dateikommentare unterstützt.<br /> <br /> PC/GEOS benötigt mitsamt allen mitgelieferten Applikationen, darunter umfangreiche Bürosoftware, je nach Version, 5 bis 20 Megabyte Speicherplatz und gehört damit zur Gruppe der höchstmöglich optimiert programmierten Systeme.<br /> <br /> Die Basis von PC/GEOS bildet ein je nach Version ca. 70 bis 100 Kilobyte kleiner 16 [[Bit]]-[[Kernel (Betriebssystem)|Kernel]] mit aufrufbaren Betriebssystemroutinen für präemptives Multitasking, dynamische Speicherverwaltung, Taskkommunikation, Objektunterstützung sowie Grafik- und Fensterverwaltung. Der Kernel bedient sich der von GEOS und DOS bereitgestellten Gerätetreiber.<br /> <br /> === GUI-Technologie ===<br /> Die komplett über [[Tastatur]], sowie per [[Eingabestift]] oder [[Maus (Computer)|Maus]] bedienbare Benutzeroberfläche bietet echtes [[WYSIWYG]] mit frei skalierbaren Vektorschriften und Vektorgrafik. Sie beruht auf einem geräteunabhängigen Koordinatensystem mit 72 Punkten pro [[Zoll (Einheit)|Zoll]] und adaptiert Elemente der [[Unix]]-Oberflächen [[OpenLook]] und [[Open Software Foundation|OSF]]/[[Motif]].<br /> <br /> Mit ISUI (Industry Standard User Interface), Motif, OpenLook und anderen sind bereits mehrere, frei erstellbare und weitgehend aus denselben Elementen zusammengestellte PC/GEOS Benutzeroberflächen entstanden. Seit dem Jahr [[1999]] ist ab der Version 3.0 neben Motif auch eine an Microsoft Windows 9x angelehnte [[Desktop-Umgebung]], die NewUI, aktuell auch ISUI genannt, verfügbar. [[GeoManager]], der Hauptbestandteil von Motif, ist auch aus der NewUI startbar und dient dort als [[Dateimanager]].<br /> <br /> Da das Objektsystem in GEOS in der Lage ist, seinen Momentanzustand zu speichern, finden sich nach der Rückkehr von einem DOS-Programm alle Anwendungen im selben Zustand wie zuvor.<br /> <br /> === Treiber === <br /> PC/GEOS greift als DOS-Erweiterung auf dessen Treiber zurück. Damit ist es auf die Geräteunterstützung des Wirtssystems angewiesen. Es kann dabei auch Erweiterungsspeicher wie EMS oder XMS nutzen. Einige wenige Treiber ermöglichen präemptives Multitasking unter DOS.<br /> <br /> === Anwendungssoftware ===<br /> Für PC/GEOS existieren ineinander greifende Büroanwendungen für [[Textverarbeitung]], [[Datenbank]]verwaltung, [[Vektor]]- und [[Rastergrafik|Raster]]-[[Grafiksoftware|Grafikprogrammen]] oder [[Tabellenkalkulation]]. PDF-Dateien können nur eingeschränkt betrachtet werden, da die Größe an Hauptspeicher sehr knapp bemessen ist. Der Hersteller Breadbox Computer Company vertrieb zum Stand [[2005]] 58 optionale PC/GEOS-Applikationen, vorwiegend für den Büro- und Bildungsbereich. Daneben existieren 10 weitere kommerzielle und etwa 100 Sharewareprogramme. Aufgrund der Abhängigkeit zu DOS können unter PC/GEOS auch noch viele alte Spiele verwendet werden.<br /> <br /> === Internetsoftware ===<br /> Neben der Anwendersoftware gibt es auch Software für die Internetbenutzung, darunter einen HTML 3.2 fähigen-[[Webbrowser]], einen [[Post Office Protocol|POP3]]-[[E-Mail]]-Client und [[Newsreader (Usenet)|Newsreader]] sowie [[Internet Relay Chat|IRC]]-, [[File Transfer Protocol|FTP]]-, [[Instant Messaging|Instant-Messenger]]- und [[HTML-Editor]]-Software.<br /> <br /> Die aktuelle Version 3.0 des Browsers ''WebMagick'' (früher ''Skipper'') unterstützt weder [[JavaScript]] noch [[Stylesheet]]s und ist nicht für Multimediainhalte wie Audio oder Video konzipiert.<br /> <br /> === Sicherheit vor Computerviren ===<br /> Bei Benutzung von PC/GEOS sind Schutzmaßnahmen hauptsächlich gegen alte und nur noch selten im Umlauf befindliche DOS-Viren angebracht. PC/GEOS selbst kennt bislang keine Viren oder Schadprogramme.<br /> <br /> === Softwareentwicklung auf PC/GEOS ===<br /> Für Programmierer bietet PC/GEOS zwei SDK-Versionen für die Borland C++ 3.1 IDE (DOS, für GEOS 2.0, bedingt auch für höhere Versionen geeignet) oder den Borland-C/C++ 4.5-Compiler (letzter 16-Bit-Compiler von Borland). Die frühere und GeoWorks-interne Sun-Workstation SDK-Version ist nicht mehr verfügbar. Ein eigener Precompiler und Linker setzen das proprietäre GOC-Objektmodell auf C++ um. Beide Versionen des SDK enthalten einen Makroassembler für die objektorientierte Assemblersprache Espire, deren Verwendung für die Treiberprogrammierung obligatorisch ist. Espire implementiert ein Objektmodell und Messaging-System. Der Kernel selbst wurde vollständig in Espire entwickelt. Mit Geo-Basic liegt ein bequemer [[User Interface|UI]]-Designer für GOC-Programmierer vor. Daneben existieren noch weitere Programmiersprachen.<br /> <br /> == Marktsituation ==<br /> PC/GEOS war von 1990 bis 2000 ein Konkurrenzprodukt zu ähnlichen grafischen Benutzeroberflächen für DOS. Windows 3.x und Windows 9x, [[Digital Research]]s [[Graphical Environment Manager|GEM]] für den PC oder [[Quarterdeck Office Systems|Quarterdeck]]s [[Desqview]]/X waren bekannte Konkurrenten. PC/GEOS war für zwei Jahre nach Markteinführung 1990 Marktführer in diesem Bereich. [[AOL]] wählte es als Plattform der ersten beiden Softwareversionen zur telefonischen Einwahl in das kommerzielle AOL-Angebot. Laut Aussage des früheren Herstellers „NewDeal“ aus dem Jahr 2000 konnte es in Version des NewDeal Office auch in Südafrika, Brasilien und Indien nennenswerte Marktanteile erringen.<br /> <br /> Heute gehört PC/GEOS wie [[ZETA]], [[AmigaOS]] oder [[RISC OS]] zur Gruppe örtlich bzw. kontinental schwach und vor allem für spezielle Einsatzzwecke verbreiteter Systeme.<br /> <br /> Seit 2002 ist PC/GEOS in seiner neuesten Version 4, zusammen mit den Bürosoftwareversionen Breadbox Ensemble, in Mehrplatzlizenzen beispielsweise für Schulen und NewDeal Office 2000 für Einzelpersonen einzig beim derzeitigen Hersteller und Inhaber der Rechte, der „Breadbox Computer Company“, sowie beim weltweit einzigen [[Distributor]] Clicks-Ltd. erhältlich. Breadbox, welche hauptsächlich als Auftragsfirma für Nokia-Smartphones im SymbianOS-Segment entwickelt, plant mit PC/GEOS vorerst Lernsoftware-Marktanteile bei Bildungseinrichtungen und OEM-Lerncomputerherstellern zurückzugewinnen. Da Breadbox keine Aktiengesellschaft ist, sind Mitteilungen zum Entwicklungsstand und geplanten Zielen selten und spärlich.<br /> <br /> === Ähnliche Konkurrenzprodukte ===<br /> Aktuelle, jedoch nicht kommerzielle DOS-kompatible Konkurrenzprodukte zu PC/GEOS mit ähnlicher Zielsetzung und technischen Anforderungen sind [[Graphical Environment Manager|OpenGEM]] sowie die Entwicklungen um Matrix-OS, Qube-3P und [[SEAL-OS]]. Als kommerzielles Konkurrenzprodukt mit technologisch und marktpolitisch ähnlicher Philosophie und Einsatzgebieten kann [[RISC OS]] bezeichnet werden. Dieses wird auf [[Risc PC]]s und anderen [[Reduced Instruction Set Computer|RISC]]-Systemen mit einer [[StrongARM]]-CPU eingesetzt. Mit anderen, der gleichen Philosophie entstammenden [[GEOS (Software)|GEOS-Systemen]] wie [[GEOS-SC]] und [[GEOS (8-Bit-Betriebssystem)|GEOS für z.&amp;nbsp;B. den C64]] sowie [[Apple II]] besitzt PC/GEOS keine Datenkompatibilität und nur geringe optische Ähnlichkeiten.<br /> <br /> == Entwicklungsgeschichte ==<br /> === PC/GEOS 1 mit GeoWorks-Ensemble ===<br /> 1990 wurde GEOS, welches bereits für die Homecomputermodelle [[Commodore International|Commodore]]-[[C64]], -[[C128]] sowie [[Apple II]] angeboten wurde, in reinem [[MOS Technology 6502|6502]]-[[Assembler (Informatik)|Assembler]] geschrieben, auf [[X86-Prozessor|x86]]-kompatible Personalcomputer mit installiertem DOS-Betriebssystem adaptiert und erstmals auf der IT-Technologiemesse „Comdex Fall“ im Herbst 1990 in Las Vegas mit der Bezeichnung PC/GEOS 1.0 veröffentlicht.<br /> <br /> Es wurde vom ursprünglichen Erfinder, der Aktiengesellschaft GeoWorks-Corporation, welche sich vor 1990 [[Berkeley Softworks]] nannte und davor unter dem Namen '''The Softworks''' firmierte, mit Bürosoftware gebündelt und in der Folgezeit unter der Bezeichnung [[Geoworks Ensemble|GeoWorks-Ensemble]] in den Versionen 1.x bis 2.01 angeboten.<br /> <br /> [[OS/90]] und nachfolgend [[GeoDOS]] waren die ursprünglichen Bezeichnungen für das spätere PC/GEOS. Journalisten, welchen zum Testen OS/90- und später GeoDOS-Betaversionen zugingen, berichteten begeistert von mehreren mitgelieferten GUIs, welche jedoch aus Lizenzgründen der späteren Veröffentlichung fehlten. Entwickelt wurde OS/90 (GeoDOS) und das spätere PC/GEOS 1.x auf Sun-SparcStation Workstation Computern in Assembler.<br /> <br /> In den ersten Jahren konnte nur auf der 4.500 US$ teuren Sun-SparcStation Computerplattform entwickelt werden. Erst ca. [[1994]] konnte eine erste DOS-Version des Software-Entwicklungssystem (SDK) für weit verbreitete x86-Computer käuflich erworben werden.<br /> <br /> Die Version 1.2 besaß eine Rechtschreibprüfung der jeweiligen Landessprache in GeoWrite sowie Treiber für [[Post Script|Post-Script]]-Drucker. Außerdem bot Version 1.2 die Verwaltung der Druckerwarteschlange, Musterdokumente, neue Symbole für DOS-Programme, zusätzliche Belegungen der Tastatur mit Kurzbefehlen, Hilfestellung für die Installation und zusätzliche Anwendungen wie einen [[NIMBUS]]-Schriften Konverter. Die Ausstattungsvariante GeoWorks 1.2-Pro wurde zusätzlich mit einer in den Funktionen reduzierten Version der [[Borland]] [[Quattro Pro|Quattro-Pro]]-[[Tabellenkalkulation]] für DOS angeboten. Dazu kam ein Betrachter für Quattro Pro-Dateien.<br /> <br /> === PC/GEOS 2 mit GeoWorks-Ensemble ===<br /> 1993 wurde PC/GEOS 1.x in [[objektorientiert]]em Assembler für den Kern (Kernel) und fast aller Applikationen, sowie teilweise in C größtenteils neu programmiert und zusammen mit dem überarbeiteten, integrierten Bürosoftwarepaket GeoWorks-Ensemble als PC/GEOS 2.0 veröffentlicht. Der OEM-PC-Hersteller [[Vobis]] brachte Computer mit installiertem PC/GEOS 2.0 OEM auf den Markt. Die Firma Heureka sowie nachfolgend die Digit-Ostermann GmbH vermarkteten das System für einige Jahre exklusiv im deutschsprachigen Raum.<br /> <br /> 1994 wurde mit GeoWorks-Ensemble 2.01 eine weitere Version des Systems veröffentlicht, mit der erstmals zwei PC/GEOS benutzende Computer zum Datenaustausch verbunden werden konnten. Auch enthielt es die AOL-Software 2.0. Aufgrund der Vormachtstellung von Microsoft entwickelte „GeoWorks“ in den Jahren 1992 bis 1995 auf Basis von PC/GEOS ein neues System unter der Bezeichnung PEN/GEOS zum Einsatz vorwiegend auf Smartphones und PDAs.<br /> <br /> {{Hauptartikel|PEN/GEOS}}<br /> <br /> === PC/GEOS 2 mit NewDeal Office ===<br /> GeoWorks veräußerte 1994 die Lizenzrechte für PC/GEOS an die Firma NewDeal, einer zu diesem Zweck neu gegründeten Firma des früheren AOL-, Quantum-Link- und Commodore-Manager [[Clive G. Smith]]. NewDeal wurde verpflichtet, PC/GEOS sowie GeoWorks-Ensemble neu zu benennen. NewDeal Office 2.5 kam 1996 auf den Markt. Um Vermarktungsprobleme zu überwinden, stellte NewDeal mit NewDeal-Publish 2.5e eine eingeschränkte, englische [[Shareware]]-Version zur Verfügung. Seit dem Jahr 2003 liegt von diesem ersten NewDeal-Sharewareprodukt eine inoffizielle ins Deutsche übersetzte Version vor.<br /> <br /> NewDeal Office 97 war die erste PC/GEOS-Version, welche bei mehr als 32 Megabyte RAM nicht abstürzte, sondern diesen nutzen konnte. Außerdem hatte sie einen SVGA-Treiber für eine maximale Auflösung von 800 × 600 Bildpunkten und 256 Farben, der allerdings instabil war.<br /> <br /> NewDeal Office 98 enthielt acht weitere Applikationen in Lizenz der Breadbox Computer Company, darunter erstmals einen Webbrowser, [[Video Electronics Standards Association|VESA]]-kompatible SVGA-Grafikkarten-Treiber für True Color und konnte Dateien auch in den Formaten [[Rich-Text-Format|RTF]] sowie HTML importieren und exportieren.<br /> <br /> NewDeal fokussierte ihre Marketingaktivitäten auf Familien, Schulen, gemeinnützige und [[nichtstaatliche Organisation]]en, Bildung, Gebrauchtcomputer, Entwicklungshilfe, kleine Unternehmen mit weniger als 25 Mitarbeitern und OEM-Lizenznehmer. PC/GEOS wurde in Form von „NewDeal Office 98“ von der US-Regierung für Entwicklungshilfe- und Schulprojekte im eigenen Land und der Vereinten Nationen unterstützt und eingesetzt. Einige kanadische Bundesstaaten lizenzierten „NewDeal Office“ über den Vermarkter [[Universal Software International]] (U.S.I.) als Schulsoftware und nahmen das Lernen mit PC/GEOS mehrere Jahre in staatliche Lehrpläne auf.<br /> <br /> === PC/GEOS 3 mit NewDeal Office ===<br /> 1999 erhielt das System unter der Bezeichnung NewDeal Office 98 Release 3 (3.1b) optional zu Motif, mit NewUI eine an Windows 95 angelehnte [[Desktop-Umgebung]] inklusive [[Taskleiste]] und einem, der Windows-Technik sehr ähnlichem, Menü, zum Starten von Applikationen und Auswahl von Dateien. Version 3 (3.1b) war das erste PC/GEOS, welches auf Windows NT 4 ausführbar war und einen eigenen Treiber für [[Soundblaster]]-kompatible [[Soundkarte]]n besaß. Im Jahr 2000 folgten die verbesserten Versionen 3.2 und 3.2a, welche sich dadurch auszeichneten, dass sich die für Release 3 (3.1b) nur optional erhältliche Internetsoftware nun im Lieferumfang befand und bei Version 3.2a in einer verbesserten, wenn auch noch nicht ganz stabilen Version vorlag.<br /> <br /> === PC/GEOS 4 mit NewDeal Office 2000 ===<br /> Anfang 2000 brachte NewDeal mit Hilfe weiterer Firmen PC/GEOS 4 unter der Bezeichnung NewDeal Office 2000 auf den Markt. Für PC/GEOS 4 wurde der Kernel stark modernisiert und der Funktionsumfang mehrerer Hauptapplikationen des Büropaketes erneut erweitert.<br /> <br /> Mit großen Plänen wurde im Jahr 2000 der Einsteiger-, Internet- und Büro-Weltcomputer [[GlobalPC]] zusammen mit vorinstalliertem NewDeal Office 2000 per OEM-Lizenz in [[Volksrepublik China|China]] gefertigt. Der GlobalPC war ein Produkt der von Robert E. Turner, Sohn des [[Ted Turner]], gegründeten Aktiengesellschaft MyTurn.com Inc. Der GlobalPC sollte mit hohem Umsatz den „digitalen Graben“ zwischen Arm und Reich in den USA und Entwicklungsländern überbrücken und hauptsächlich aufbereitete [[Cable News Network|CNN]]-Inhalte transportieren. Hierzu wurde PC/GEOS standardmäßig im Easy-Desktop gestartet, einer Benutzeroberfläche, die PC/GEOS so simpel wie einen „Geldautomaten“ bedienbar machen sollte.<br /> <br /> {{Hauptartikel|GlobalPC}}<br /> <br /> Mit der .COM-Krise und dem Börsenkrach entzogen finanzkräftige Investoren im Jahr 2001 MyTurn.com dringend benötigte Gelder. Die darauffolgende Pleite der Firma riss auch die an MyTurn.com finanziell beteiligten NewDeal in die Pleite. NewDeal und deren Tochterfirma GreenPC, welche gebrauchte Computer mit New Deal Office 3.2 an US-Schulen vermarktete, entließen daraufhin alle 125 Angestellten und verkauften die Rechte an PC/GEOS zu einem Zehntel des an GeoWorks bezahlten Preises an die Firma Breadbox Computer Company.<br /> <br /> Das letzte von NewDeal im Jahr 2001 veröffentlichte Produkt war das nicht an den GlobalPC gebundene, einzeln erhältliche NewDeal Office 2000, welches auch im Jahr 2005 noch als umfangreichste PC/GEOS-Version galt.<br /> <br /> === PC/GEOS 4 mit Breadbox Ensemble ===<br /> Die inzwischen hauptsächlich an Symbian-OS-Software im Auftrag von [[Nokia]] arbeitende Firma ''Breadbox Computer Company'' aus Florida erwarb nach der Pleite des früheren PC/GEOS Lizenznehmers NewDeal 2003 das Entwicklungs- und Vermarktungsrecht an PC/GEOS für alle Hardwareplattformen.<br /> <br /> Ab 2002 war von dieser Firma PC/GEOS 4.0.2.0 und die ''Breadbox Ensemble'' genannte Bürosoftware in englischer Sprache erhältlich. 2005 folgte die Version 4.1.0.0. Beide Versionen wurden direkt von Breadbox nicht an Einzelpersonen abgegeben. Sie konnte ausschließlich in mehrfacher Stückzahl von Bildungseinrichtungen und ähnlichen Organisationen erworben werden. Die Version 4.1.0.0 war jedoch ab 2005 über den Vertriebspartner sun2000 als E-Mail-Anhang auch für Einzelkunden erhältlich. Zur zusätzlichen Produktbewerbung standen bis Ende 2005 drei verschiedene kostenlose, zur Demonstration eingeschränkte Versionen zum Download von der Herstellerseite zur Verfügung.<br /> <br /> Im Jahr 2001 bildete Breadbox mehrere Gruppen von Übersetzern und versandte hierzu 4.0.1.x Betaversionen. Die freiwilligen Übersetzer legten bereits 2002 eine komplett ins Deutsche übersetzte Breadbox Ensemble Version beim Hersteller vor. Der Direktvertrieb von Breadbox Ensemble an Einzelpersonen in Versionen für die Sprachen Deutsch, Französisch, Spanisch oder Portugiesisch ließ bis zum 4. Januar 2006 auf sich warten.<br /> <br /> Aus Lizenzgründen fehlt dem Breadbox Ensemble der von NewDeal entwickelte Easy-Desktop. Einige andere Applikationen wurden durch weniger ausgereifte Eigenentwicklungen ersetzt. Die Internet-Software wurde insgesamt stark verbessert, so dass sie seit dieser Version als stabil bezeichnet werden kann. Ein [[Pentium 2]], 400 Megahertz-System kann bereits als hoch leistungsfähiges Gerät zum Betrieb von PC/GEOS 4.x angesehen werden.<br /> <br /> == Begriffsverwechslung mit pcGEOS ==<br /> pcGEOS ist eine erstmals 1995 von Jochen Metzinger (Deutschland/Universität Hamburg) vorgestellte x86-DOS-kompatible Software zur Konvertierung von C64/128-GEOS (geoWrite- und geoDraw-) Dateien in x86-kompatible Datenformate.<br /> <br /> == Literatur ==<br /> * Oerttel, Burkhard: ''Das große Buch zu GeoWorks Pro, Ensemble &amp; DTP'', incl. 3.5&quot; Diskette, Data Becker GmbH, 1992, ISBN 3-89011-586-1<br /> * Oerttel, Burkhard: ''Das große Buch zu GeoWorks 2.0'', incl. 3.5&quot; Diskette, Data Becker GmbH, 1994, ISBN 3-89011-713-9<br /> * Wegen, Andreas: ''GeoWorks DTP, Pro, Ensemble'', incl. 5.25&quot; Diskette, te-wi Verlag bzw. TLC The Learning Companie, Reihe: Grundlagen und Praxis - Betriebssysteme, 1992, ISBN 3-89362-238-1, (beschreibt GeoWorks 1.2 bis Pro incl. Kernelaufbau.)<br /> * Wegen, Andreas: ''GeoWorks 2.0 - Bedienung, Applikationen, Beispiele, Tips, Interna, Referenz'', te-wi Verlag, 1993, ISBN 3-89362-333-7<br /> * Seibert, Axel: ''GeoWorks - Ensemble Erfolgreich starten - sicher nutzen'', Markt &amp; Technik Verlag München, Reihe: Workshop - PC, 1991, ISBN 3-87791-154-4 (beschreibt GeoWorks 1.1 anhand der Beta-Version.)<br /> * Roßkamp, Alfred, Dipl.-Ing.: ''GeoWorks Ensemble - Einführung in die Benutzerschnittstelle'', Deutscher Taschenbuch Verlag (dtv), Reihe: Beck EDV-Berater im dtv (Basiswissen - GeoWorks), 1993, ISBN 3-423-50152-9 (beschreibt GeoWorks Ensemble 2.0.)<br /> * Bartel, Rainer: ''GeoWorks 1.2 &amp; Pro - Der Einstieg in 20 Schritten'', Sybex Verlag Düsseldorf, Reihe: Quick Start, 1992, ISBN 3-88745-230-5<br /> * Schölles, Reiner: ''GeoWorks 2.0 - Schnellanleitung'', Data Becker GmbH, 1994, ISBN 3-89011-787-2<br /> <br /> == Weblinks ==<br /> * [http://www.geos-infobase.de/INDEX.HTM GEOS-Infobase, deutschsprachige Info- &amp; Download-Seite zu GEOS]<br /> * [http://waybackmachine.org/*/http://home.arcor.de/sigurdpistor/ Informationen im Stil der PC/GEOS Benutzeroberfläche]<br /> <br /> {{SORTIERUNG:Pc Geos}}<br /> [[Kategorie:GEOS]]<br /> [[Kategorie:Grafische Benutzeroberfläche]]<br /> [[Kategorie:Proprietäre Software]]<br /> [[Kategorie:Büroanwendung]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=PC/GEOS&diff=155552640 PC/GEOS 2016-06-22T22:38:23Z <p>Dsprc: no longer function and is just spam ads now</p> <hr /> <div>{|class=&quot;wikitable float-right&quot; style=&quot;width:22em; font-size:90%;&quot;<br /> !class=&quot;hintergrundfarbe6&quot; colspan=&quot;2&quot; style=&quot;font-size:105%;&quot;|PC/GEOS<br /> |-<br /> |'''Entwickler:'''||BreadboxComputer Company u.&amp;nbsp;a.<br /> |-<br /> |'''Version:'''||4.13 &amp;nbsp;&lt;small&gt;25. August 2009&lt;/small&gt;<br /> |-<br /> |'''Größe:'''||20,0 [[Megabyte|MB]]<br /> |-<br /> |'''Startmedium:'''||Alle Datenträger (bei gebootetem DOS)<br /> |-<br /> |'''Stammbaum:'''||OS/90, GeoDOS, PC/GEOS 1.x bis 4.x<br /> |-<br /> |'''Lizenz:'''||[[Proprietär]]<br /> |-<br /> |'''Sonstiges:'''||Sprache: Englisch, Deutsch, Französisch, Spanisch; als NewDeal Office 2000 auch in Arabisch, Zulu, Igbo, Yoruba und Hausa<br /> |-<br /> |'''Website:'''||<br /> |}<br /> <br /> '''PC/GEOS''' (''PC/'''G'''raphical [[Desktop-Environment|'''E'''nvironment]] '''O'''bject '''S'''ystem'') ist eine [[grafische Benutzeroberfläche]] für Computer mit installiertem [[PC-kompatibles DOS|DOS]]-kompatiblem Betriebssystem. Es ist auch unter den Bezeichnungen ''GeoWorks Ensemble'', ''GeoWorks DTP'', ''IBM ShoolView'', ''NewDeal Office'' und ''Breadbox Ensemble'' bekannt und wurde 1990 von der US-Firma ''[[GeoWorks|GeoWorks Corporation]]'' vorgestellt, zwischenzeitlich von der US-Firma ''NewDeal Inc.'' und seit 2000 von ''Breadbox Computer Company, LLC'' mit Firmensitz in Florida weiterentwickelt und vertrieben.<br /> <br /> == Einsatz ==<br /> Die grafische Benutzeroberfläche PC/GEOS lässt sich auf Computersystemen, auf welchen ein zu [[MS-DOS]] kompatibles Betriebssystem installiert ist, einsetzen. Ein erforderliches DOS-kompatibles Betriebssystem ist nicht Bestandteil von PC/GEOS. PC/GEOS nutzt und erweitert Fähigkeiten von DOS. Im Einsatz als DOS-Erweiterung fungiert es als DOS-Programmstarter sowie Dateimanager. Beim Start eines DOS-Programms wird PC/GEOS selbst dabei bis auf eine kleine Ladefunktion heruntergefahren und nach Beenden des DOS-Programms wieder gestartet. Unter [[DR DOS]] registriert sich PC/GEOS jedoch statt TASKMGR als grafisches Menüsystem für den präemptiven Protected Mode-Multitasker (KRNL386.EXE bzw. EMM386 /MULTI) von DR-DOS und erlaubt so den nahtlosen Betrieb mehrerer parallel ablaufender DOS- und GEOS-Anwendungen gleichzeitig. PC/GEOS ersetzt die DOS-[[Kommandozeile|CLI]] durch dialogbasierte Bedienung unter Einsatz einer Maus und anderen Eingabegeräten. Es bietet verschiedene wählbare Bedienoberflächen. Im PC/GEOS-Lieferumfang und zusätzlich erhältlich sind systemeigene und stark integrierte Layout- und [[Desktop-Publishing|DTP]]-Anwendungen, Büro-, Schul- und [[Internet]]software.<br /> <br /> === Vorteile ===<br /> Der Vorteil gegenüber anderen Betriebssystemen und Bedienoberflächen liegt im geringen Ressourcenverbrauch von PC/GEOS. Es funktioniert aufgrund seiner geringen Hardwareanforderungen nicht nur auf aktuellen Personal Computern, sondern auch auf fast allen seit 1986 gebauten IBM-kompatiblen Computern. PC/GEOS eignet sich daher auch zum Einsatz auf Computern, zu denen aktuelle Produkte wie Windows XP, [[Linux]]-[[Distribution (Software)|Distribution]]en oder [[Mac OS X]] auf Grund ihrer hohen Anforderungen an die Hardware nicht lauffähig sind. Dazu kommt eine höhere Datensicherheit durch Beibehaltung der Datenformate und – nach Meinung der Mehrheit der PC/GEOS-Benutzer – eine hohe [[Benutzerfreundlichkeit|Bedienfreundlichkeit]].<br /> <br /> === Nachteile ===<br /> Der größte Nachteil von PC/GEOS ist, dass es bislang ausschließlich als 16-Bit-Version für den [[Real Mode]] vorliegt. Durch die geringe Verbreitung bietet sich für professionelle Softwarehersteller kein lukrativer Absatzmarkt. Neben Software des PC/GEOS-Herstellers existiert daher kaum weitere käuflich erwerbbare Software. Spezielle Tastaturen oder Eingabegeräte für körperbehinderte Menschen werden vom Hersteller bislang nicht unterstützt.<br /> <br /> == System ==<br /> === Benötigte Hardware ===<br /> PC/GEOS stellt als 16-Bit-System geringe Anforderungen an die Hardware.<br /> <br /> Ab einem [[Intel 8086]]-[[Mikroprozessor]] mit mindestens 512 KB RAM, mindestens [[Hercules Graphics Card|Hercules]]- oder [[Color Graphics Adapter|CGA]]-[[Grafikkarte]] sowie zuvor installiertem DOS-Betriebssystem kann das PC/GEOS Grundsystem ausgeführt werden. Optional erhältliche Software setzt jedoch zumindest eine [[Enhanced Graphics Adapter|EGA]]- oder MCGA-Grafikkarte voraus.<br /> <br /> Der Hersteller empfiehlt für einen angenehmen Betrieb von PC/GEOS 4.x als Minimum einen [[80386|386er]] oder besser, 640 Kilobyte RAM, eine 15 MB große Festplatte und eine EGA-Karte. Das System soll von bis zu 32 Megabyte zusätzlichem RAM stark profitieren.&lt;!-- Unterstützt GEOS EMS oder XMS? Warum braucht es einen 386er, wo es doch nur im Real Mode läuft? Enthält es 386er Assemblerbefehle? oder wird ein 386er nur für EMM386 benötigt? --&gt;<br /> <br /> Über 250, zumeist aus den Jahren 1990 bis ca. 2000 stammende Drucker mit parallelem und seriellem Anschluss, darunter [[PostScript]]-Drucker, werden unterstützt. USB-Drucker werden mangels USB-Treiber von einem auf DOS installiertem PC/GEOS nicht unterstützt.<br /> <br /> PC/GEOS kann auf optischen Medien [[CD-ROM|CD]] und [[DVD]] gebrannt sowie auf diversen [[Random-Access Memory|RAM]]-Karten oder [[USB-Stick]] installiert werden. Es ist auf CD- und USB-Treiber im zugrundeliegenden Betriebssystem angewiesen, oder eine Festplattenemulation im BIOS, welche das Booten von CD oder USB-Stick beherrscht.<br /> <br /> Die verschiedenen PC/GEOS Versionen unterstützen folgende weitere Hardwarestandards:<br /> * PCs ab dem [[IBM PC XT|IBM-XT]]-Standard bis zu heutigen Modellen. PC/GEOS profitiert von mathematischen Co-Prozessoren.<br /> * Die minimal benötigte CPU-Taktfrequenz liegt bei PC/GEOS 1.x bei 6 Megahertz, für PC/GEOS 2.x und 3.x bei 16 Megahertz, ab PC/GEOS 4.x bei 33 Megahertz.<br /> * Ab PC/GEOS 3.0 wird [[Video Electronics Standards Association|VESA]] 1.02 bis 2.0 [[SVGA]] und vereinzelt [[Extended Graphics Array|XGA]] bei Echtfarben unterstützt. Spätere, nicht standardisierte und auf eigene Treiber angewiesene Grafikkarten werden nur sehr vereinzelt bei gewisser Kompatibilität zum VESA-Standard unterstützt.<br /> * Es besitzt Treiber für Geräte zu Dateneingabe wie [[Tastatur]]en oder Mäusen.<br /> * Zur [[Datenfernübertragung]] beispielsweise in Verbindung mit [[Bulletin Board System|BBS]] oder dem Internet unterstützt PC/GEOS 4 [[AT-Befehlssatz|AT]]-[[Modem]]s aller Geschwindigkeiten, inklusive externe [[Integrated Services Digital Network|ISDN]]-Modems, die den AT-Befehlssatz unterstützen. Der Internet-Zugang über [[Digital Subscriber Line|DSL]] und [[Integrated Services Digital Network|ISDN]] ist zudem über entsprechende externe Router möglich.<br /> * Ab der Version 1.2 besitzt das System die Fähigkeiten zum Einsatz in einem [[Netzwerk]] und unterstützt, auch zur Umleitung der Druckerausgabe, zuvor installierte [[Novell Netware]], Artisoft [[LANtastic|LAN-Tastic]], IBM [[LAN Manager]] und ab PC/GEOS 3.x zusätzlich Bay Networks [[PowerLAN]], Microsoft Windows-Netzwerk sowie zu DOS kompatible [[Internet Protocol|IP]]-Netzwerktreiber. Von einigen PC/GEOS-Versionen wie die Version 4 gab es auf Anfrage komplette Netzwerk-Versionen.<br /> <br /> === Benötigtes Betriebssystem ===<br /> PC/GEOS funktioniert auf zu DOS kompatiblen Betriebssystemen, wozu auch aktuelle wie [[FreeDOS]] gehören.<br /> <br /> Vorteil einer Installation auf MS-DOS-basierende Windows-Versionen ist der Umstand, dass sich PC/GEOS vieler Windows-Gerätetreiber, wie zum Beispiel für RAM, USB, Netzwerk und Drucker bedienen kann, was die Möglichkeiten gegenüber der Installation auf einem DOS-Betriebssystem erweitert.<br /> <br /> PC/GEOS funktioniert auf [[OS/2]] seit der Version 2 sowie auf dem OS/2 Nachfolgern [[Warp 4|Warp/4]] und [[EComStation]] im Direktbetrieb.<br /> <br /> Durch das Designkonzept von Windows NT (und seinen Nachfolgern), DOS-Programmen den direkten Zugriff auf die Hardware zu verweigern, funktioniert PC/GEOS unter Windows NT-basierenden Betriebssystemen mit den normalen Geos-Treibern nur im Vollbild-Modus im DOS-Fenster. Je nach verwendeter Hardware und Windows-Treibern ist zudem unter Geos z.T. kein „Truecolor“-Modus, sondern nur ein 16-Farben-Modus möglich. Daher gibt es ab Geos 3.x noch ein paar spezielle Grafiktreiber, die es Geos ermöglichen, unter Windows in einem Fenster zu laufen. Leider sind diese Treiber nicht sehr stabil und laufen z.T. nur, wenn Windows in einem Grafikmodus mit 16-bit Farbtiefe läuft. Auch ein Zugriff auf die Soundkarte ist nur mittels Emulatoren (VDMSound, DosBox,...) möglich. Geos-Programme, die zum Abspielen von Audio-CDs dienen, brauchen ebenfalls Emulatoren, da MSCDEXNT deutlich weniger kann als sein Dos-Kollege MSCDEX.<br /> <br /> PC/GEOS kann u.a. auf [[File Allocation Table|FAT12]]-, FAT16- oder FAT32-formatierte Datenträger installiert werden.<br /> <br /> === Emulatoren ===<br /> Neben einer Direktinstallation auf DOS oder auf MS-DOS-basierende Windows-Versionen kann PC/GEOS auf nicht zu DOS kompatiblen Systemen wie Windows-XP, Linux-Distributionen, Mac OS X ab einer Taktfrequenz der CPU von ungefähr 1 Gigahertz auch mit Hilfe eines zuvor installierten Emulators wie [[DOSEMU]] oder [[DOSBox]] in brauchbarer Geschwindigkeit ausgeführt werden.<br /> <br /> Andreas Bollhalder hat eine [[QEMU]]-Installation mit FreeDOS und PC/GEOS 4 mit Breadbox Ensemble-Lite erstellt und bietet diese zum Download an. QEMU liegt hierfür mit angepasstem [[Video Graphics Array|VGA]]-fähigem [[BIOS]] vor.<br /> <br /> Mit Hilfe des kommerziellen Produkts [[Microsoft Virtual PC]] für Mac OS X läuft PC/GEOS 4 am besten mit der ISUI-Oberfläche. Die Geschwindigkeit auf einem G4-Macintosh bewegt sich mit MS-DOS 7 auf 80486er-Niveau.<br /> <br /> === Systemaufbau und Kernel ===<br /> Das in der objektorientierten [[Intel 8086|8086]]-[[Assemblersprache]] [[Espire]] und einem ebenfalls objektorientierten Derivat der [[C (Programmiersprache)|Programmiersprache C]] namens [[GOC (Programmiersprache)|GOC]] entwickelte PC/GEOS bietet echtes [[Präemptives Multitasking|präemptive]]s [[Multitasking]], [[Multithreading]], dynamisch gelinkte Bibliotheken, [[Vektorschriften]] und seit 1990 ein erweitertes Dateisystem, welches lange Dateinamen sowie Dateikommentare unterstützt.<br /> <br /> PC/GEOS benötigt mitsamt allen mitgelieferten Applikationen, darunter umfangreiche Bürosoftware, je nach Version, 5 bis 20 Megabyte Speicherplatz und gehört damit zur Gruppe der höchstmöglich optimiert programmierten Systeme.<br /> <br /> Die Basis von PC/GEOS bildet ein je nach Version ca. 70 bis 100 Kilobyte kleiner 16 [[Bit]]-[[Kernel (Betriebssystem)|Kernel]] mit aufrufbaren Betriebssystemroutinen für präemptives Multitasking, dynamische Speicherverwaltung, Taskkommunikation, Objektunterstützung sowie Grafik- und Fensterverwaltung. Der Kernel bedient sich der von GEOS und DOS bereitgestellten Gerätetreiber.<br /> <br /> === GUI-Technologie ===<br /> Die komplett über [[Tastatur]], sowie per [[Eingabestift]] oder [[Maus (Computer)|Maus]] bedienbare Benutzeroberfläche bietet echtes [[WYSIWYG]] mit frei skalierbaren Vektorschriften und Vektorgrafik. Sie beruht auf einem geräteunabhängigen Koordinatensystem mit 72 Punkten pro [[Zoll (Einheit)|Zoll]] und adaptiert Elemente der [[Unix]]-Oberflächen [[OpenLook]] und [[Open Software Foundation|OSF]]/[[Motif]].<br /> <br /> Mit ISUI (Industry Standard User Interface), Motif, OpenLook und anderen sind bereits mehrere, frei erstellbare und weitgehend aus denselben Elementen zusammengestellte PC/GEOS Benutzeroberflächen entstanden. Seit dem Jahr [[1999]] ist ab der Version 3.0 neben Motif auch eine an Microsoft Windows 9x angelehnte [[Desktop-Umgebung]], die NewUI, aktuell auch ISUI genannt, verfügbar. [[GeoManager]], der Hauptbestandteil von Motif, ist auch aus der NewUI startbar und dient dort als [[Dateimanager]].<br /> <br /> Da das Objektsystem in GEOS in der Lage ist, seinen Momentanzustand zu speichern, finden sich nach der Rückkehr von einem DOS-Programm alle Anwendungen im selben Zustand wie zuvor.<br /> <br /> === Treiber === <br /> PC/GEOS greift als DOS-Erweiterung auf dessen Treiber zurück. Damit ist es auf die Geräteunterstützung des Wirtssystems angewiesen. Es kann dabei auch Erweiterungsspeicher wie EMS oder XMS nutzen. Einige wenige Treiber ermöglichen präemptives Multitasking unter DOS.<br /> <br /> === Anwendungssoftware ===<br /> Für PC/GEOS existieren ineinander greifende Büroanwendungen für [[Textverarbeitung]], [[Datenbank]]verwaltung, [[Vektor]]- und [[Rastergrafik|Raster]]-[[Grafiksoftware|Grafikprogrammen]] oder [[Tabellenkalkulation]]. PDF-Dateien können nur eingeschränkt betrachtet werden, da die Größe an Hauptspeicher sehr knapp bemessen ist. Der Hersteller Breadbox Computer Company vertrieb zum Stand [[2005]] 58 optionale PC/GEOS-Applikationen, vorwiegend für den Büro- und Bildungsbereich. Daneben existieren 10 weitere kommerzielle und etwa 100 Sharewareprogramme. Aufgrund der Abhängigkeit zu DOS können unter PC/GEOS auch noch viele alte Spiele verwendet werden.<br /> <br /> === Internetsoftware ===<br /> Neben der Anwendersoftware gibt es auch Software für die Internetbenutzung, darunter einen HTML 3.2 fähigen-[[Webbrowser]], einen [[Post Office Protocol|POP3]]-[[E-Mail]]-Client und [[Newsreader (Usenet)|Newsreader]] sowie [[Internet Relay Chat|IRC]]-, [[File Transfer Protocol|FTP]]-, [[Instant Messaging|Instant-Messenger]]- und [[HTML-Editor]]-Software.<br /> <br /> Die aktuelle Version 3.0 des Browsers ''WebMagick'' (früher ''Skipper'') unterstützt weder [[JavaScript]] noch [[Stylesheet]]s und ist nicht für Multimediainhalte wie Audio oder Video konzipiert.<br /> <br /> === Sicherheit vor Computerviren ===<br /> Bei Benutzung von PC/GEOS sind Schutzmaßnahmen hauptsächlich gegen alte und nur noch selten im Umlauf befindliche DOS-Viren angebracht. PC/GEOS selbst kennt bislang keine Viren oder Schadprogramme.<br /> <br /> === Softwareentwicklung auf PC/GEOS ===<br /> Für Programmierer bietet PC/GEOS zwei SDK-Versionen für die Borland C++ 3.1 IDE (DOS, für GEOS 2.0, bedingt auch für höhere Versionen geeignet) oder den Borland-C/C++ 4.5-Compiler (letzter 16-Bit-Compiler von Borland). Die frühere und GeoWorks-interne Sun-Workstation SDK-Version ist nicht mehr verfügbar. Ein eigener Precompiler und Linker setzen das proprietäre GOC-Objektmodell auf C++ um. Beide Versionen des SDK enthalten einen Makroassembler für die objektorientierte Assemblersprache Espire, deren Verwendung für die Treiberprogrammierung obligatorisch ist. Espire implementiert ein Objektmodell und Messaging-System. Der Kernel selbst wurde vollständig in Espire entwickelt. Mit Geo-Basic liegt ein bequemer [[User Interface|UI]]-Designer für GOC-Programmierer vor. Daneben existieren noch weitere Programmiersprachen.<br /> <br /> == Marktsituation ==<br /> PC/GEOS war von 1990 bis 2000 ein Konkurrenzprodukt zu ähnlichen grafischen Benutzeroberflächen für DOS. Windows 3.x und Windows 9x, [[Digital Research]]s [[Graphical Environment Manager|GEM]] für den PC oder [[Quarterdeck Office Systems|Quarterdeck]]s [[Desqview]]/X waren bekannte Konkurrenten. PC/GEOS war für zwei Jahre nach Markteinführung 1990 Marktführer in diesem Bereich. [[AOL]] wählte es als Plattform der ersten beiden Softwareversionen zur telefonischen Einwahl in das kommerzielle AOL-Angebot. Laut Aussage des früheren Herstellers „NewDeal“ aus dem Jahr 2000 konnte es in Version des NewDeal Office auch in Südafrika, Brasilien und Indien nennenswerte Marktanteile erringen.<br /> <br /> Heute gehört PC/GEOS wie [[ZETA]], [[AmigaOS]] oder [[RISC OS]] zur Gruppe örtlich bzw. kontinental schwach und vor allem für spezielle Einsatzzwecke verbreiteter Systeme.<br /> <br /> Seit 2002 ist PC/GEOS in seiner neuesten Version 4, zusammen mit den Bürosoftwareversionen Breadbox Ensemble, in Mehrplatzlizenzen beispielsweise für Schulen und NewDeal Office 2000 für Einzelpersonen einzig beim derzeitigen Hersteller und Inhaber der Rechte, der „Breadbox Computer Company“, sowie beim weltweit einzigen [[Distributor]] Clicks-Ltd. erhältlich. Breadbox, welche hauptsächlich als Auftragsfirma für Nokia-Smartphones im SymbianOS-Segment entwickelt, plant mit PC/GEOS vorerst Lernsoftware-Marktanteile bei Bildungseinrichtungen und OEM-Lerncomputerherstellern zurückzugewinnen. Da Breadbox keine Aktiengesellschaft ist, sind Mitteilungen zum Entwicklungsstand und geplanten Zielen selten und spärlich.<br /> <br /> === Ähnliche Konkurrenzprodukte ===<br /> Aktuelle, jedoch nicht kommerzielle DOS-kompatible Konkurrenzprodukte zu PC/GEOS mit ähnlicher Zielsetzung und technischen Anforderungen sind [[Graphical Environment Manager|OpenGEM]] sowie die Entwicklungen um Matrix-OS, Qube-3P und [[SEAL-OS]]. Als kommerzielles Konkurrenzprodukt mit technologisch und marktpolitisch ähnlicher Philosophie und Einsatzgebieten kann [[RISC OS]] bezeichnet werden. Dieses wird auf [[Risc PC]]s und anderen [[Reduced Instruction Set Computer|RISC]]-Systemen mit einer [[StrongARM]]-CPU eingesetzt. Mit anderen, der gleichen Philosophie entstammenden [[GEOS (Software)|GEOS-Systemen]] wie [[GEOS-SC]] und [[GEOS (8-Bit-Betriebssystem)|GEOS für z.&amp;nbsp;B. den C64]] sowie [[Apple II]] besitzt PC/GEOS keine Datenkompatibilität und nur geringe optische Ähnlichkeiten.<br /> <br /> == Entwicklungsgeschichte ==<br /> === PC/GEOS 1 mit GeoWorks-Ensemble ===<br /> 1990 wurde GEOS, welches bereits für die Homecomputermodelle [[Commodore International|Commodore]]-[[C64]], -[[C128]] sowie [[Apple II]] angeboten wurde, in reinem [[MOS Technology 6502|6502]]-[[Assembler (Informatik)|Assembler]] geschrieben, auf [[X86-Prozessor|x86]]-kompatible Personalcomputer mit installiertem DOS-Betriebssystem adaptiert und erstmals auf der IT-Technologiemesse „Comdex Fall“ im Herbst 1990 in Las Vegas mit der Bezeichnung PC/GEOS 1.0 veröffentlicht.<br /> <br /> Es wurde vom ursprünglichen Erfinder, der Aktiengesellschaft GeoWorks-Corporation, welche sich vor 1990 [[Berkeley Softworks]] nannte und davor unter dem Namen '''The Softworks''' firmierte, mit Bürosoftware gebündelt und in der Folgezeit unter der Bezeichnung [[Geoworks Ensemble|GeoWorks-Ensemble]] in den Versionen 1.x bis 2.01 angeboten.<br /> <br /> [[OS/90]] und nachfolgend [[GeoDOS]] waren die ursprünglichen Bezeichnungen für das spätere PC/GEOS. Journalisten, welchen zum Testen OS/90- und später GeoDOS-Betaversionen zugingen, berichteten begeistert von mehreren mitgelieferten GUIs, welche jedoch aus Lizenzgründen der späteren Veröffentlichung fehlten. Entwickelt wurde OS/90 (GeoDOS) und das spätere PC/GEOS 1.x auf Sun-SparcStation Workstation Computern in Assembler.<br /> <br /> In den ersten Jahren konnte nur auf der 4.500 US$ teuren Sun-SparcStation Computerplattform entwickelt werden. Erst ca. [[1994]] konnte eine erste DOS-Version des Software-Entwicklungssystem (SDK) für weit verbreitete x86-Computer käuflich erworben werden.<br /> <br /> Die Version 1.2 besaß eine Rechtschreibprüfung der jeweiligen Landessprache in GeoWrite sowie Treiber für [[Post Script|Post-Script]]-Drucker. Außerdem bot Version 1.2 die Verwaltung der Druckerwarteschlange, Musterdokumente, neue Symbole für DOS-Programme, zusätzliche Belegungen der Tastatur mit Kurzbefehlen, Hilfestellung für die Installation und zusätzliche Anwendungen wie einen [[NIMBUS]]-Schriften Konverter. Die Ausstattungsvariante GeoWorks 1.2-Pro wurde zusätzlich mit einer in den Funktionen reduzierten Version der [[Borland]] [[Quattro Pro|Quattro-Pro]]-[[Tabellenkalkulation]] für DOS angeboten. Dazu kam ein Betrachter für Quattro Pro-Dateien.<br /> <br /> === PC/GEOS 2 mit GeoWorks-Ensemble ===<br /> 1993 wurde PC/GEOS 1.x in [[objektorientiert]]em Assembler für den Kern (Kernel) und fast aller Applikationen, sowie teilweise in C größtenteils neu programmiert und zusammen mit dem überarbeiteten, integrierten Bürosoftwarepaket GeoWorks-Ensemble als PC/GEOS 2.0 veröffentlicht. Der OEM-PC-Hersteller [[Vobis]] brachte Computer mit installiertem PC/GEOS 2.0 OEM auf den Markt. Die Firma Heureka sowie nachfolgend die Digit-Ostermann GmbH vermarkteten das System für einige Jahre exklusiv im deutschsprachigen Raum.<br /> <br /> 1994 wurde mit GeoWorks-Ensemble 2.01 eine weitere Version des Systems veröffentlicht, mit der erstmals zwei PC/GEOS benutzende Computer zum Datenaustausch verbunden werden konnten. Auch enthielt es die AOL-Software 2.0. Aufgrund der Vormachtstellung von Microsoft entwickelte „GeoWorks“ in den Jahren 1992 bis 1995 auf Basis von PC/GEOS ein neues System unter der Bezeichnung PEN/GEOS zum Einsatz vorwiegend auf Smartphones und PDAs.<br /> <br /> {{Hauptartikel|PEN/GEOS}}<br /> <br /> === PC/GEOS 2 mit NewDeal Office ===<br /> GeoWorks veräußerte 1994 die Lizenzrechte für PC/GEOS an die Firma NewDeal, einer zu diesem Zweck neu gegründeten Firma des früheren AOL-, Quantum-Link- und Commodore-Manager [[Clive G. Smith]]. NewDeal wurde verpflichtet, PC/GEOS sowie GeoWorks-Ensemble neu zu benennen. NewDeal Office 2.5 kam 1996 auf den Markt. Um Vermarktungsprobleme zu überwinden, stellte NewDeal mit NewDeal-Publish 2.5e eine eingeschränkte, englische [[Shareware]]-Version zur Verfügung. Seit dem Jahr 2003 liegt von diesem ersten NewDeal-Sharewareprodukt eine inoffizielle ins Deutsche übersetzte Version vor.<br /> <br /> NewDeal Office 97 war die erste PC/GEOS-Version, welche bei mehr als 32 Megabyte RAM nicht abstürzte, sondern diesen nutzen konnte. Außerdem hatte sie einen SVGA-Treiber für eine maximale Auflösung von 800 × 600 Bildpunkten und 256 Farben, der allerdings instabil war.<br /> <br /> NewDeal Office 98 enthielt acht weitere Applikationen in Lizenz der Breadbox Computer Company, darunter erstmals einen Webbrowser, [[Video Electronics Standards Association|VESA]]-kompatible SVGA-Grafikkarten-Treiber für True Color und konnte Dateien auch in den Formaten [[Rich-Text-Format|RTF]] sowie HTML importieren und exportieren.<br /> <br /> NewDeal fokussierte ihre Marketingaktivitäten auf Familien, Schulen, gemeinnützige und [[nichtstaatliche Organisation]]en, Bildung, Gebrauchtcomputer, Entwicklungshilfe, kleine Unternehmen mit weniger als 25 Mitarbeitern und OEM-Lizenznehmer. PC/GEOS wurde in Form von „NewDeal Office 98“ von der US-Regierung für Entwicklungshilfe- und Schulprojekte im eigenen Land und der Vereinten Nationen unterstützt und eingesetzt. Einige kanadische Bundesstaaten lizenzierten „NewDeal Office“ über den Vermarkter [[Universal Software International]] (U.S.I.) als Schulsoftware und nahmen das Lernen mit PC/GEOS mehrere Jahre in staatliche Lehrpläne auf.<br /> <br /> === PC/GEOS 3 mit NewDeal Office ===<br /> 1999 erhielt das System unter der Bezeichnung NewDeal Office 98 Release 3 (3.1b) optional zu Motif, mit NewUI eine an Windows 95 angelehnte [[Desktop-Umgebung]] inklusive [[Taskleiste]] und einem, der Windows-Technik sehr ähnlichem, Menü, zum Starten von Applikationen und Auswahl von Dateien. Version 3 (3.1b) war das erste PC/GEOS, welches auf Windows NT 4 ausführbar war und einen eigenen Treiber für [[Soundblaster]]-kompatible [[Soundkarte]]n besaß. Im Jahr 2000 folgten die verbesserten Versionen 3.2 und 3.2a, welche sich dadurch auszeichneten, dass sich die für Release 3 (3.1b) nur optional erhältliche Internetsoftware nun im Lieferumfang befand und bei Version 3.2a in einer verbesserten, wenn auch noch nicht ganz stabilen Version vorlag.<br /> <br /> === PC/GEOS 4 mit NewDeal Office 2000 ===<br /> Anfang 2000 brachte NewDeal mit Hilfe weiterer Firmen PC/GEOS 4 unter der Bezeichnung NewDeal Office 2000 auf den Markt. Für PC/GEOS 4 wurde der Kernel stark modernisiert und der Funktionsumfang mehrerer Hauptapplikationen des Büropaketes erneut erweitert.<br /> <br /> Mit großen Plänen wurde im Jahr 2000 der Einsteiger-, Internet- und Büro-Weltcomputer [[GlobalPC]] zusammen mit vorinstalliertem NewDeal Office 2000 per OEM-Lizenz in [[Volksrepublik China|China]] gefertigt. Der GlobalPC war ein Produkt der von Robert E. Turner, Sohn des [[Ted Turner]], gegründeten Aktiengesellschaft MyTurn.com Inc. Der GlobalPC sollte mit hohem Umsatz den „digitalen Graben“ zwischen Arm und Reich in den USA und Entwicklungsländern überbrücken und hauptsächlich aufbereitete [[Cable News Network|CNN]]-Inhalte transportieren. Hierzu wurde PC/GEOS standardmäßig im Easy-Desktop gestartet, einer Benutzeroberfläche, die PC/GEOS so simpel wie einen „Geldautomaten“ bedienbar machen sollte.<br /> <br /> {{Hauptartikel|GlobalPC}}<br /> <br /> Mit der .COM-Krise und dem Börsenkrach entzogen finanzkräftige Investoren im Jahr 2001 MyTurn.com dringend benötigte Gelder. Die darauffolgende Pleite der Firma riss auch die an MyTurn.com finanziell beteiligten NewDeal in die Pleite. NewDeal und deren Tochterfirma GreenPC, welche gebrauchte Computer mit New Deal Office 3.2 an US-Schulen vermarktete, entließen daraufhin alle 125 Angestellten und verkauften die Rechte an PC/GEOS zu einem Zehntel des an GeoWorks bezahlten Preises an die Firma Breadbox Computer Company.<br /> <br /> Das letzte von NewDeal im Jahr 2001 veröffentlichte Produkt war das nicht an den GlobalPC gebundene, einzeln erhältliche NewDeal Office 2000, welches auch im Jahr 2005 noch als umfangreichste PC/GEOS-Version galt.<br /> <br /> === PC/GEOS 4 mit Breadbox Ensemble ===<br /> Die inzwischen hauptsächlich an Symbian-OS-Software im Auftrag von [[Nokia]] arbeitende Firma ''Breadbox Computer Company'' aus Florida erwarb nach der Pleite des früheren PC/GEOS Lizenznehmers NewDeal 2003 das Entwicklungs- und Vermarktungsrecht an PC/GEOS für alle Hardwareplattformen.<br /> <br /> Ab 2002 war von dieser Firma PC/GEOS 4.0.2.0 und die ''Breadbox Ensemble'' genannte Bürosoftware in englischer Sprache erhältlich. 2005 folgte die Version 4.1.0.0. Beide Versionen wurden direkt von Breadbox nicht an Einzelpersonen abgegeben. Sie konnte ausschließlich in mehrfacher Stückzahl von Bildungseinrichtungen und ähnlichen Organisationen erworben werden. Die Version 4.1.0.0 war jedoch ab 2005 über den Vertriebspartner sun2000 als E-Mail-Anhang auch für Einzelkunden erhältlich. Zur zusätzlichen Produktbewerbung standen bis Ende 2005 drei verschiedene kostenlose, zur Demonstration eingeschränkte Versionen zum Download von der Herstellerseite zur Verfügung.<br /> <br /> Im Jahr 2001 bildete Breadbox mehrere Gruppen von Übersetzern und versandte hierzu 4.0.1.x Betaversionen. Die freiwilligen Übersetzer legten bereits 2002 eine komplett ins Deutsche übersetzte Breadbox Ensemble Version beim Hersteller vor. Der Direktvertrieb von Breadbox Ensemble an Einzelpersonen in Versionen für die Sprachen Deutsch, Französisch, Spanisch oder Portugiesisch ließ bis zum 4. Januar 2006 auf sich warten.<br /> <br /> Aus Lizenzgründen fehlt dem Breadbox Ensemble der von NewDeal entwickelte Easy-Desktop. Einige andere Applikationen wurden durch weniger ausgereifte Eigenentwicklungen ersetzt. Die Internet-Software wurde insgesamt stark verbessert, so dass sie seit dieser Version als stabil bezeichnet werden kann. Ein [[Pentium 2]], 400 Megahertz-System kann bereits als hoch leistungsfähiges Gerät zum Betrieb von PC/GEOS 4.x angesehen werden.<br /> <br /> == Begriffsverwechslung mit pcGEOS ==<br /> pcGEOS ist eine erstmals 1995 von Jochen Metzinger (Deutschland/Universität Hamburg) vorgestellte x86-DOS-kompatible Software zur Konvertierung von C64/128-GEOS (geoWrite- und geoDraw-) Dateien in x86-kompatible Datenformate.<br /> <br /> == Literatur ==<br /> * Oerttel, Burkhard: ''Das große Buch zu GeoWorks Pro, Ensemble &amp; DTP'', incl. 3.5&quot; Diskette, Data Becker GmbH, 1992, ISBN 3-89011-586-1<br /> * Oerttel, Burkhard: ''Das große Buch zu GeoWorks 2.0'', incl. 3.5&quot; Diskette, Data Becker GmbH, 1994, ISBN 3-89011-713-9<br /> * Wegen, Andreas: ''GeoWorks DTP, Pro, Ensemble'', incl. 5.25&quot; Diskette, te-wi Verlag bzw. TLC The Learning Companie, Reihe: Grundlagen und Praxis - Betriebssysteme, 1992, ISBN 3-89362-238-1, (beschreibt GeoWorks 1.2 bis Pro incl. Kernelaufbau.)<br /> * Wegen, Andreas: ''GeoWorks 2.0 - Bedienung, Applikationen, Beispiele, Tips, Interna, Referenz'', te-wi Verlag, 1993, ISBN 3-89362-333-7<br /> * Seibert, Axel: ''GeoWorks - Ensemble Erfolgreich starten - sicher nutzen'', Markt &amp; Technik Verlag München, Reihe: Workshop - PC, 1991, ISBN 3-87791-154-4 (beschreibt GeoWorks 1.1 anhand der Beta-Version.)<br /> * Roßkamp, Alfred, Dipl.-Ing.: ''GeoWorks Ensemble - Einführung in die Benutzerschnittstelle'', Deutscher Taschenbuch Verlag (dtv), Reihe: Beck EDV-Berater im dtv (Basiswissen - GeoWorks), 1993, ISBN 3-423-50152-9 (beschreibt GeoWorks Ensemble 2.0.)<br /> * Bartel, Rainer: ''GeoWorks 1.2 &amp; Pro - Der Einstieg in 20 Schritten'', Sybex Verlag Düsseldorf, Reihe: Quick Start, 1992, ISBN 3-88745-230-5<br /> * Schölles, Reiner: ''GeoWorks 2.0 - Schnellanleitung'', Data Becker GmbH, 1994, ISBN 3-89011-787-2<br /> <br /> == Weblinks ==<br /> * [http://www.geos-infobase.de/INDEX.HTM GEOS-Infobase, deutschsprachige Info- &amp; Download-Seite zu GEOS]<br /> * [http://waybackmachine.org/*/http://home.arcor.de/sigurdpistor/ Informationen im Stil der PC/GEOS Benutzeroberfläche]<br /> <br /> {{SORTIERUNG:Pc Geos}}<br /> [[Kategorie:GEOS]]<br /> [[Kategorie:Grafische Benutzeroberfläche]]<br /> [[Kategorie:Proprietäre Software]]<br /> [[Kategorie:Büroanwendung]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=LibrePlanet&diff=161791861 LibrePlanet 2016-06-21T23:29:16Z <p>Dsprc: /* top */</p> <hr /> <div>{{multiple issues|<br /> {{refimprove|date=June 2016}}<br /> {{third-party|date=June 2016}}<br /> }}<br /> {{Infobox recurring event<br /> | name = &lt;!--Uses page name if omitted--&gt;<br /> | native_name = <br /> | native_name_lang = <br /> | logo = LibrePlanetWiki.png<br /> | logo_alt =<br /> | logo_caption = <br /> | logo_size = 100px<br /> | image = <br /> | image_size =<br /> | alt =<br /> | caption = <br /> | status = &lt;!-- e.g. defunct, active, inactive ... --&gt;<br /> | genre = &lt;!-- e.g. natural phenomena, fairs, festivals, conferences, exhibitions ... --&gt;<br /> | date = &lt;!-- {{start date|YYYY|mm|dd}} &quot;dates=&quot; also works, but do not use both --&gt;<br /> | begins = &lt;!-- {{start date|YYYY|mm|dd}} --&gt;<br /> | ends = &lt;!-- {{end date|YYYY|mm|dd}} --&gt;<br /> | frequency = &lt;!-- Weekly, Monthly, Quarterly, Semi-annually, Annually, Bi-annually, 2nd Tuesday of November, etc. --&gt;<br /> | venue = <br /> | location = <br /> | coordinates = &lt;!-- {{coord|LAT|LON|type:event|display=inline,title}} --&gt; <br /> | country = <br /> | years_active = &lt;!-- {{age|YYYY|mm|dd}} Date of the first occurrence --&gt;<br /> | first = &lt;!-- {{start date|YYYY|mm|dd}} &quot;founded=&quot; and &quot;established=&quot; also work --&gt;<br /> | founder_name = &lt;!-- or | founders = --&gt;<br /> | last = &lt;!-- Date of most recent event; if the event will not be held again, use {{End date|YYYY|MM|DD|df=y}} --&gt;<br /> | prev = <br /> | next = <br /> | participants = <br /> | attendance = <br /> | capacity =<br /> | area = <br /> | budget = <br /> | activity = <br /> | leader_name =<br /> | patron = <br /> | organised = &lt;!-- &quot;organized=&quot; also works --&gt;<br /> | filing = <br /> | people = <br /> | member = <br /> | sponsor = &lt;!-- | or sponsors = --&gt;<br /> | website = &lt;!-- {{URL|example.com}} --&gt;<br /> | footnotes = <br /> }}<br /> <br /> <br /> <br /> <br /> '''LibrePlanet''' (literally, &quot;Free Planet&quot;) is a community project created and supported by the [[Free Software Foundation]]. Its objective is the promotion of [[free software]] around the world by bringing every year an international conference to local communities&lt;ref&gt;[http://libreplanet.org/wiki/ Wiki].&lt;/ref&gt; and organizations.&lt;ref&gt;[http://libreplanet.org/wiki/LibrePlanet2011 Planète Libre 2011].&lt;/ref&gt;<br /> <br /> ==History==<br /> The project was born in 2006, at a gathering of members associated with the Foundation and the will to organize into geographical groups.<br /> <br /> ==LibrePlanet conference==<br /> <br /> The conference is organized annually by the [[Free Software Foundation]] in or around [[Boston, Massachusetts]] and staffed by a mixture of foundation staff and community volunteers. The conference replaces the FSF Annual Members Meeting (AMM) which ran around the same time each year.<br /> <br /> Each conference has its own theme and a website. The event typically includes a speech from FSF president, [[Richard Stallman]] and FSF executive director [[William John Sullivan|John Sullivan]], as well as members of the wider free software community.<br /> {{Prose|section|date=June 2016}}<br /> {| class=&quot;wikitable&quot;<br /> !Year<br /> !Dates<br /> !Location<br /> !Themes<br /> !Prominent events<br /> |-<br /> |2009<br /> |March 21/22<br /> |[[Harvard Science Center]]<br /> |<br /> * End Software Patents<br /> * Free Network Services<br /> |<br /> * [[Libre.fm]] project was conceived <br /> * A [[book sprint]] was run by [[FLOSS Manuals]] to create &quot;Introduction to the Command Line&quot;<br /> * [[Creative Commons]] and [[Wietse Venema]] win the [[FSF Free Software Awards|annual FSF awards]]<br /> |-<br /> |2010<br /> |March 20/21<br /> |Harvard Science Center<br /> |<br /> * Working Together For Free Software<br /> |<br /> * March 19 was a [[GNU Project|GNU developers]] conference<br /> * [[Internet Archive]] and [[John Gilmore (activist)|John Gilmore]] win the FSF awards<br /> |-<br /> |2011<br /> |March 19<br /> |[[Bunker Hill Community College]]<br /> |<br /> * Acting locally for global free software adoption.<br /> |<br /> * Single Day conference with a number of local students invited<br /> * [[Tor (anonymity network)|Tor]] and [[Rob Savoye]] win the annual FSF awards<br /> * Additionally, a special mention was made to honor the memory and contribution of Adrian Hands, who used a morse input device to code and successfully submit a GNOME patch, three days before he died from ALS.<br /> |-<br /> |2012<br /> |March 24/25<br /> |[[University of Massachusetts Boston|University of Massachusetts, Boston]]<br /> |<br /> |<br /> * [[GNU Health]] and [[Yukihiro Matsumoto]] win the FSF awards<br /> |-<br /> |2013<br /> |March 23/24<br /> |Cambridge, MA<br /> |<br /> |<br /> * [[OpenMRS]] and [[Fernando Pérez (software developer)|Fernando Pérez]]<br /> |-<br /> |2014<br /> |March 22/23<br /> |Cambridge, MA<br /> |<br /> |<br /> * [[Outreachy]] (then known as Free and Open Source Software Outreach Program for Women) and [[Matthew Garrett]]<br /> |-<br /> |2015<br /> |March 21/22<br /> |[[Ray and Maria Stata Center|MIT Stata Center]]<br /> |<br /> |<br /> * Reglue and Sébastien Jodogne<br /> |-<br /> |2016<br /> |March 19/20<br /> |Cambridge, MA; [[Massachusetts Institute of Technology|MIT]]<br /> | ''&quot;[[Fork (software development)|Fork]] the System&quot;''<br /> |<br /> *[[Edward Snowden]]: ''&quot;The Last Lighthouse&quot;''&lt;ref&gt;{{cite web|author1=Snowden, Edward|author2=Daniel Kahn Gillmor|title=Libreplanet 2016: The Last Lighthouse: Free Software In Dark Times|url=https://media.libreplanet.org/u/libreplanet/m/libreplanet-2016-the-last-lighthouse-3d51/|website=media.libreplanet.org|publisher=Free Software Foundation|accessdate=2 June 2016|format=video, [[WebM]]}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Nicholson, Deb|title=LibrePlanet begins with Snowden, ends with DRM protest|url=https://opensource.com/life/16/3/libreplanet-2016|website=opensource.com|accessdate=2 June 2016|date=29 March 2016}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Gold, Jon|title=Edward Snowden: Privacy can't depend on corporations standing up to the government|url=http://www.networkworld.com/article/3046135/security/edward-snowden-privacy-cant-depend-on-corporations-standing-up-to-the-government.html|website=networkworld.com|accessdate=2 June 2016|date=19 March 2016}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Popa, Bogdan|title=Snowden Used Free Software Because He Was Afraid of Backdoors in Microsoft Apps|url=http://news.softpedia.com/news/snowden-used-free-software-because-he-was-afraid-of-backdoors-in-microsoft-apps-502039.shtml|publisher=''SoftPedia'' News|accessdate=2 June 2016|date=22 March 2016|quote=NSA whistleblower Edward Snowden attended the Free Software Foundation LibrePlanet 2016 conference remotely from Russia to discuss the advantages of free applications, explaining that he couldn’t trust Microsoft software when revealing government’s surveillance programs in 2013.}}&lt;/ref&gt;<br /> |}<br /> <br /> == See also ==<br /> * [[GNU Hurd]]<br /> * [[Libre Software Meeting]]<br /> * [[Linux-libre]]<br /> <br /> == References ==<br /> {{reflist}}<br /> <br /> ==External links==<br /> * [https://libreplanet.org/wiki/Main_Page LibrePlanet official website and wiki]<br /> <br /> [[Category:International conferences]]<br /> [[Category:Free software culture and documents]]<br /> [[Category:Computer-related events]]<br /> [[Category:Free Software Foundation]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=LibrePlanet&diff=161791860 LibrePlanet 2016-06-21T23:26:13Z <p>Dsprc: scrub some of the noise</p> <hr /> <div>{{multiple issues|<br /> {{refimprove|date=June 2016}}<br /> {{third-party|date=June 2016}}<br /> }}<br /> <br /> {{Infobox recurring event|logo = File:LibrePlanetWiki.png}}'''LibrePlanet''' (literally, &quot;Free Planet&quot;) is a community project created and supported by the [[Free Software Foundation]]. Its objective is the promotion of [[free software]] around the world by bringing every year an international conference to local communities&lt;ref&gt;[http://libreplanet.org/wiki/ Wiki].&lt;/ref&gt; and organizations.&lt;ref&gt;[http://libreplanet.org/wiki/LibrePlanet2011 Planète Libre 2011].&lt;/ref&gt;<br /> <br /> ==History==<br /> The project was born in 2006, at a gathering of members associated with the Foundation and the will to organize into geographical groups.<br /> <br /> ==LibrePlanet conference==<br /> <br /> The conference is organized annually by the [[Free Software Foundation]] in or around [[Boston, Massachusetts]] and staffed by a mixture of foundation staff and community volunteers. The conference replaces the FSF Annual Members Meeting (AMM) which ran around the same time each year.<br /> <br /> Each conference has its own theme and a website. The event typically includes a speech from FSF president, [[Richard Stallman]] and FSF executive director [[William John Sullivan|John Sullivan]], as well as members of the wider free software community.<br /> {{Prose|section|date=June 2016}}<br /> {| class=&quot;wikitable&quot;<br /> !Year<br /> !Dates<br /> !Location<br /> !Themes<br /> !Prominent events<br /> |-<br /> |2009<br /> |March 21/22<br /> |[[Harvard Science Center]]<br /> |<br /> * End Software Patents<br /> * Free Network Services<br /> |<br /> * [[Libre.fm]] project was conceived <br /> * A [[book sprint]] was run by [[FLOSS Manuals]] to create &quot;Introduction to the Command Line&quot;<br /> * [[Creative Commons]] and [[Wietse Venema]] win the [[FSF Free Software Awards|annual FSF awards]]<br /> |-<br /> |2010<br /> |March 20/21<br /> |Harvard Science Center<br /> |<br /> * Working Together For Free Software<br /> |<br /> * March 19 was a [[GNU Project|GNU developers]] conference<br /> * [[Internet Archive]] and [[John Gilmore (activist)|John Gilmore]] win the FSF awards<br /> |-<br /> |2011<br /> |March 19<br /> |[[Bunker Hill Community College]]<br /> |<br /> * Acting locally for global free software adoption.<br /> |<br /> * Single Day conference with a number of local students invited<br /> * [[Tor (anonymity network)|Tor]] and [[Rob Savoye]] win the annual FSF awards<br /> * Additionally, a special mention was made to honor the memory and contribution of Adrian Hands, who used a morse input device to code and successfully submit a GNOME patch, three days before he died from ALS.<br /> |-<br /> |2012<br /> |March 24/25<br /> |[[University of Massachusetts Boston|University of Massachusetts, Boston]]<br /> |<br /> |<br /> * [[GNU Health]] and [[Yukihiro Matsumoto]] win the FSF awards<br /> |-<br /> |2013<br /> |March 23/24<br /> |Cambridge, MA<br /> |<br /> |<br /> * [[OpenMRS]] and [[Fernando Pérez (software developer)|Fernando Pérez]]<br /> |-<br /> |2014<br /> |March 22/23<br /> |Cambridge, MA<br /> |<br /> |<br /> * [[Outreachy]] (then known as Free and Open Source Software Outreach Program for Women) and [[Matthew Garrett]]<br /> |-<br /> |2015<br /> |March 21/22<br /> |[[Ray and Maria Stata Center|MIT Stata Center]]<br /> |<br /> |<br /> * Reglue and Sébastien Jodogne<br /> |-<br /> |2016<br /> |March 19/20<br /> |Cambridge, MA; [[Massachusetts Institute of Technology|MIT]]<br /> | ''&quot;[[Fork (software development)|Fork]] the System&quot;''<br /> |<br /> *[[Edward Snowden]]: ''&quot;The Last Lighthouse&quot;''&lt;ref&gt;{{cite web|author1=Snowden, Edward|author2=Daniel Kahn Gillmor|title=Libreplanet 2016: The Last Lighthouse: Free Software In Dark Times|url=https://media.libreplanet.org/u/libreplanet/m/libreplanet-2016-the-last-lighthouse-3d51/|website=media.libreplanet.org|publisher=Free Software Foundation|accessdate=2 June 2016|format=video, [[WebM]]}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Nicholson, Deb|title=LibrePlanet begins with Snowden, ends with DRM protest|url=https://opensource.com/life/16/3/libreplanet-2016|website=opensource.com|accessdate=2 June 2016|date=29 March 2016}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Gold, Jon|title=Edward Snowden: Privacy can't depend on corporations standing up to the government|url=http://www.networkworld.com/article/3046135/security/edward-snowden-privacy-cant-depend-on-corporations-standing-up-to-the-government.html|website=networkworld.com|accessdate=2 June 2016|date=19 March 2016}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Popa, Bogdan|title=Snowden Used Free Software Because He Was Afraid of Backdoors in Microsoft Apps|url=http://news.softpedia.com/news/snowden-used-free-software-because-he-was-afraid-of-backdoors-in-microsoft-apps-502039.shtml|publisher=''SoftPedia'' News|accessdate=2 June 2016|date=22 March 2016|quote=NSA whistleblower Edward Snowden attended the Free Software Foundation LibrePlanet 2016 conference remotely from Russia to discuss the advantages of free applications, explaining that he couldn’t trust Microsoft software when revealing government’s surveillance programs in 2013.}}&lt;/ref&gt;<br /> |}<br /> <br /> == See also ==<br /> * [[GNU Hurd]]<br /> * [[Libre Software Meeting]]<br /> * [[Linux-libre]]<br /> <br /> == References ==<br /> {{reflist}}<br /> <br /> ==External links==<br /> * [https://libreplanet.org/wiki/Main_Page LibrePlanet official website and wiki]<br /> <br /> [[Category:International conferences]]<br /> [[Category:Free software culture and documents]]<br /> [[Category:Computer-related events]]<br /> [[Category:Free Software Foundation]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=Amerikanische_Gesellschaft_f%C3%BCr_Transplantation&diff=166168915 Amerikanische Gesellschaft für Transplantation 2016-06-21T17:20:02Z <p>Dsprc: Added {{primary sources}} tag to article (TW)</p> <hr /> <div>{{primary sources|date=June 2016}}<br /> The '''American Society of Transplantation''' (AST) is an international organization of over 3,500 transplant professionals dedicated to advancing the field of transplantation through the promotion of [[research]], [[education]], [[advocacy]], and [[organ donation]]. It is the largest professional transplantation society in North America.&lt;ref&gt;{{cite web|url=http://www.myast.org |title=The American Society of Transplantation |publisher=myast.org|accessdate=2014-08-01| &lt;!--DASHBot--&gt;| deadurl= no}}&lt;/ref&gt;<br /> <br /> == History ==<br /> <br /> The history of the AST begins in 1981, when the charter members of the society met at the annual meeting of the [[American Society of Nephrology]] (ASN). It was at this meeting where a new society, known as the American Society of Transplant Physicians (ASTP), was created to meet the professional needs of a burgeoning group of transplant [[physicians]]. The ASTP was founded on May 10, 1982, with membership open to physicians and certain other health professionals who shared an interest in transplantation medicine and [[biology]]. In 1998, the ASTP changed its name to the American Society of Transplantation (AST) and opened its membership to additional health professionals working in the area of transplantation.&lt;ref&gt;{{cite web|url=https://www.myast.org/timeline |title=AST History|publisher=myast.org|accessdate=2016-04-05}}&lt;/ref&gt;<br /> <br /> == Meetings and Education ==<br /> <br /> The society’s first annual meeting (as the ASTP) took place on June 3, 1982 in Chicago. In 2000, the AST returned to Chicago in conjunction with the American Society of Transplant Surgeons (ASTS) and held the first American Transplant Congress (ATC). Since that time, the ATC has met annually in a variety of North American cities, and is currently the largest annual meeting of transplant professionals.&lt;ref&gt;{{cite web|url=http://www.atcmeeting.org |title=American Transplant Congress|publisher=atcmeeting.org|accessdate=2014-08-01}}&lt;/ref&gt;<br /> <br /> The first Fellows Symposium on Transplant Medicine was held July 27-28, 1996 in St. Louis, Missouri. Renamed the Fellows Symposium on Transplantation in 2015, this meeting gives clinical fellows and residents, surgical fellows, research fellows, pharmacists, and other trainees the opportunity to participate in specialized scientific sessions and meet one-on-one with senior transplant specialists. &lt;ref&gt;{{cite web|url=https://www.myast.org/timeline |title=AST History|publisher=myast.org|accessdate=2016-04-05}}&lt;/ref&gt;<br /> <br /> The first AST Winter Symposium was held February 13-17, 1997, in Phoenix, Arizona. As of 2013, the AST’s winter meeting has been designated as the Cutting Edge of Transplantation (CEOT) meeting. &lt;ref&gt;{{cite web|url=https://www.myast.org/timeline |title=AST History|publisher=myast.org|accessdate=2016-04-05}}&lt;/ref&gt;<br /> <br /> In 2007, the Transplant Nephrology Core Curriculum (TNCC) was launched as an online program provided jointly by the ASN and the AST. The TNCC focuses on key information needed to prepare for the American Board of Internal Medicine Nephrology Board Certification and Maintenance of Certification examinations. &lt;ref&gt;{{cite web|url=https://tncc.myast.org/|title=Transplant Nephrology Core Curriculum|publisher=tncc.myast.org/|accessdate=2016-04-05}}&lt;/ref&gt;<br /> <br /> In 2011, the AST launched the Timely Topics in Transplantation (T3) webinar series. The T3 webinars can be viewed live or on-demand, and span all transplant topics. &lt;ref&gt;{{cite web|url=https://www.transplantpro.org/news/education/ast-business-of-transplantation-webinar-series/|title=Transplant Pro|publisher=www.transplantpro.org/}}&lt;/ref&gt;<br /> <br /> == Communities of Practice (COPs) ==<br /> <br /> The AST Communities of Practice (COPs) are specialty-area focused groups within the larger society. The AST currently has 14 COPs:<br /> {{div col|3}}<br /> * Community of Basic Scientists<br /> * Infectious Disease<br /> * Kidney Pancreas<br /> * Live Donor<br /> * Liver and Intestinal<br /> * Pediatric<br /> * Psychosocial<br /> * Thoracic and Critical Care<br /> * Trainee and Young Faculty<br /> * Transplant Administrators<br /> * Transplant Diagnostics<br /> * Transplant Pharmacists<br /> * Transplant Regenerative Medicine<br /> * Women’s Health<br /> {{div col end}}<br /> <br /> == Publications ==<br /> <br /> The [[American Journal of Transplantation]] is the joint monthly peer-reviewed medical journal of the AST and ASTS, published by Wiley-Blackwell. &lt;ref&gt;{{cite web|url=http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1600-6143|title=American Journal of Transplanation|publisher=onlinelibrary.wiley.com/}}&lt;/ref&gt;<br /> <br /> Additional publications:<br /> * AST Primer on Transplantation, 3rd Edition &lt;ref&gt;{{cite web|url=http://www.wiley.com/WileyCDA/WileyTitle/productCd-1405142677.html|title=AST Primer on Transplanation, 3rd Edition|publisher=wiley.com}}&lt;/ref&gt;<br /> * AST Handbook of Transplant Infections &lt;ref&gt;{{cite web|url=http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470658274.html|title=AST Handbook of Transplant Infections|publisher=wiley.com}}&lt;/ref&gt;<br /> * Transplant Immunology &lt;ref&gt;{{cite web|url=http://www.wiley.com/WileyCDA/Section/id-610141.html|title=Transplant Immunology|publisher=wiley.com}}&lt;/ref&gt;<br /> * Special Issue: The American Society of Transplantation Infectious Diseases Guidelines, 3rd Edition &lt;ref&gt;{{cite web|url=http://onlinelibrary.wiley.com/doi/10.1111/ajt.2013.13.issue-s4/issuetoc|title=Special Issue: The American Society of Transplantation Infectious Diseases Guidelines, 3rd Edition|publisher=onlinelibrary.wiley.com}}&lt;/ref&gt;<br /> <br /> == Presidents ==<br /> {{div col}}<br /> *2015-2016: James S. Allan, MD, MBA, FAST<br /> *2014-2015: Kenneth A. Newell, MD, PhD, FAST<br /> *2013-2014: Daniel R. Salomon, MD<br /> *2012-2013: Roslyn B. Mannon, MD, FAST<br /> *2011-2012: Robert S. Gaston, MD, FAST<br /> *2010-2011: Maryl Johnson, MD, FAST<br /> *2009-2010: Joren C. Madsen, MD, DPhil<br /> *2008-2009: Barbara Murphy, MD<br /> *2007-2008: Flavio Vincenti, MD<br /> *2006-2007: Jeffrey S. Crippin, MD<br /> *2005-2006: Richard N. Fine, MD<br /> *2004-2005: Jay Alan Fishman, MD, FAST<br /> *2003-2004: Michael R. Lucey, MD<br /> *2002-2003: William E. Harmon, MD<br /> *2001-2002: Laurence A. Turka, MD, FAST<br /> *2000-2001: Mohamed H. Sayegh, MD, FAST<br /> *1999-2000: John R. Lake, MD<br /> *1998-1999: John F. Neylan, MD<br /> *1997-1998: J. Harold Helderman, MD, FAST<br /> *1996-1997: Leslie W. Miller, MD<br /> *1995-1996: Douglas J. Norman, MD, FAST<br /> *1994-1995: Thomas A. Gonwa, MD, FAST<br /> *1993-1994: Manikkam Suthanthiran, MD, FAST<br /> *1992-1993: Alan R. Hull, MD<br /> *1991-1992: Ronald H. Kerman, PhD, FAST<br /> *1990-1991: M. Roy First, MD<br /> *1989-1990: William E. Braun, MD, FAST<br /> *1988-1989: Barry S. Levin, MD<br /> *1987-1988: Lawrence G. Hunsicker, MD<br /> *1986-1987: Nancy E. Goeken, PhD<br /> *1985-1986: Fred P. Sanfilippo, MD, PhD<br /> *1984-1985: Robert B. Ettenger, MD<br /> *1983-1984: Charles B. Carpenter, MD<br /> *1982-1983: Ronald D. Guttmann, MD, FRCPC<br /> *1982-1983: Terry B. Strom, MD<br /> {{div col end}}<br /> <br /> == Transplantation and Immunology Research Network (TIRN) ==<br /> <br /> The AST established the Transplantation and Immunology Research Network (TIRN) to expand the scope, reach, and effectiveness of the AST's existing research program. TIRN is AST's mechanism for identifying, funding, and providing ongoing support to the most innovative research in transplantation and immunology. &lt;ref&gt;{{cite web|url=http://www.tirn.org/about|title=TIRN - About|publisher=tirn.org}}&lt;/ref&gt;<br /> <br /> The TIRN Researcher Registry, launched in 2015, is an online directory of physicians, scientists, and other medical professionals performing research in transplantation and immunology. Researchers can use the registry to connect with others and ask questions, share ideas, or collaborate on projects. Pharmaceutical and biotechnology companies can use the registry to identify potential research partnerships. &lt;ref&gt;{{cite web|url=http://www.tirn.org/researcherregistry|title=TIRN - Researcher Registry|publisher=tirn.org}}&lt;/ref&gt;<br /> <br /> == Power2Save (P2S) ==<br /> <br /> Power2Save (P2S) is an initiative developed by the AST dedicated to increasing public awareness around the importance of donating organs, advocating for patient health, and funding transplant research. &lt;ref&gt;{{cite web|url=http://www.power2save.org |title=Power2Save|publisher=power2save.org|accessdate=2016-04-05}}&lt;/ref&gt;<br /> <br /> ==References==<br /> {{reflist}}<br /> <br /> ==External links==<br /> * [http://www.myast.org American Society of Transplantation]<br /> * [http://www.atcmeeting.org American Transplant Congress]<br /> * [http://www.amjtransplant.com American Journal of Transplantation]<br /> <br /> {{DEFAULTSORT:American Society Of Transplantation}}<br /> [[Category:1981 establishments in the United States]]<br /> [[Category:Kidney organizations]]<br /> [[Category:Professional associations based in the United States]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=Amerikanische_Gesellschaft_f%C3%BCr_Transplantation&diff=166168914 Amerikanische Gesellschaft für Transplantation 2016-06-21T17:19:34Z <p>Dsprc: /* Presidents */</p> <hr /> <div>The '''American Society of Transplantation''' (AST) is an international organization of over 3,500 transplant professionals dedicated to advancing the field of transplantation through the promotion of [[research]], [[education]], [[advocacy]], and [[organ donation]]. It is the largest professional transplantation society in North America.&lt;ref&gt;{{cite web|url=http://www.myast.org |title=The American Society of Transplantation |publisher=myast.org|accessdate=2014-08-01| &lt;!--DASHBot--&gt;| deadurl= no}}&lt;/ref&gt;<br /> <br /> == History ==<br /> <br /> The history of the AST begins in 1981, when the charter members of the society met at the annual meeting of the [[American Society of Nephrology]] (ASN). It was at this meeting where a new society, known as the American Society of Transplant Physicians (ASTP), was created to meet the professional needs of a burgeoning group of transplant [[physicians]]. The ASTP was founded on May 10, 1982, with membership open to physicians and certain other health professionals who shared an interest in transplantation medicine and [[biology]]. In 1998, the ASTP changed its name to the American Society of Transplantation (AST) and opened its membership to additional health professionals working in the area of transplantation.&lt;ref&gt;{{cite web|url=https://www.myast.org/timeline |title=AST History|publisher=myast.org|accessdate=2016-04-05}}&lt;/ref&gt;<br /> <br /> == Meetings and Education ==<br /> <br /> The society’s first annual meeting (as the ASTP) took place on June 3, 1982 in Chicago. In 2000, the AST returned to Chicago in conjunction with the American Society of Transplant Surgeons (ASTS) and held the first American Transplant Congress (ATC). Since that time, the ATC has met annually in a variety of North American cities, and is currently the largest annual meeting of transplant professionals.&lt;ref&gt;{{cite web|url=http://www.atcmeeting.org |title=American Transplant Congress|publisher=atcmeeting.org|accessdate=2014-08-01}}&lt;/ref&gt;<br /> <br /> The first Fellows Symposium on Transplant Medicine was held July 27-28, 1996 in St. Louis, Missouri. Renamed the Fellows Symposium on Transplantation in 2015, this meeting gives clinical fellows and residents, surgical fellows, research fellows, pharmacists, and other trainees the opportunity to participate in specialized scientific sessions and meet one-on-one with senior transplant specialists. &lt;ref&gt;{{cite web|url=https://www.myast.org/timeline |title=AST History|publisher=myast.org|accessdate=2016-04-05}}&lt;/ref&gt;<br /> <br /> The first AST Winter Symposium was held February 13-17, 1997, in Phoenix, Arizona. As of 2013, the AST’s winter meeting has been designated as the Cutting Edge of Transplantation (CEOT) meeting. &lt;ref&gt;{{cite web|url=https://www.myast.org/timeline |title=AST History|publisher=myast.org|accessdate=2016-04-05}}&lt;/ref&gt;<br /> <br /> In 2007, the Transplant Nephrology Core Curriculum (TNCC) was launched as an online program provided jointly by the ASN and the AST. The TNCC focuses on key information needed to prepare for the American Board of Internal Medicine Nephrology Board Certification and Maintenance of Certification examinations. &lt;ref&gt;{{cite web|url=https://tncc.myast.org/|title=Transplant Nephrology Core Curriculum|publisher=tncc.myast.org/|accessdate=2016-04-05}}&lt;/ref&gt;<br /> <br /> In 2011, the AST launched the Timely Topics in Transplantation (T3) webinar series. The T3 webinars can be viewed live or on-demand, and span all transplant topics. &lt;ref&gt;{{cite web|url=https://www.transplantpro.org/news/education/ast-business-of-transplantation-webinar-series/|title=Transplant Pro|publisher=www.transplantpro.org/}}&lt;/ref&gt;<br /> <br /> == Communities of Practice (COPs) ==<br /> <br /> The AST Communities of Practice (COPs) are specialty-area focused groups within the larger society. The AST currently has 14 COPs:<br /> {{div col|3}}<br /> * Community of Basic Scientists<br /> * Infectious Disease<br /> * Kidney Pancreas<br /> * Live Donor<br /> * Liver and Intestinal<br /> * Pediatric<br /> * Psychosocial<br /> * Thoracic and Critical Care<br /> * Trainee and Young Faculty<br /> * Transplant Administrators<br /> * Transplant Diagnostics<br /> * Transplant Pharmacists<br /> * Transplant Regenerative Medicine<br /> * Women’s Health<br /> {{div col end}}<br /> <br /> == Publications ==<br /> <br /> The [[American Journal of Transplantation]] is the joint monthly peer-reviewed medical journal of the AST and ASTS, published by Wiley-Blackwell. &lt;ref&gt;{{cite web|url=http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1600-6143|title=American Journal of Transplanation|publisher=onlinelibrary.wiley.com/}}&lt;/ref&gt;<br /> <br /> Additional publications:<br /> * AST Primer on Transplantation, 3rd Edition &lt;ref&gt;{{cite web|url=http://www.wiley.com/WileyCDA/WileyTitle/productCd-1405142677.html|title=AST Primer on Transplanation, 3rd Edition|publisher=wiley.com}}&lt;/ref&gt;<br /> * AST Handbook of Transplant Infections &lt;ref&gt;{{cite web|url=http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470658274.html|title=AST Handbook of Transplant Infections|publisher=wiley.com}}&lt;/ref&gt;<br /> * Transplant Immunology &lt;ref&gt;{{cite web|url=http://www.wiley.com/WileyCDA/Section/id-610141.html|title=Transplant Immunology|publisher=wiley.com}}&lt;/ref&gt;<br /> * Special Issue: The American Society of Transplantation Infectious Diseases Guidelines, 3rd Edition &lt;ref&gt;{{cite web|url=http://onlinelibrary.wiley.com/doi/10.1111/ajt.2013.13.issue-s4/issuetoc|title=Special Issue: The American Society of Transplantation Infectious Diseases Guidelines, 3rd Edition|publisher=onlinelibrary.wiley.com}}&lt;/ref&gt;<br /> <br /> == Presidents ==<br /> {{div col}}<br /> *2015-2016: James S. Allan, MD, MBA, FAST<br /> *2014-2015: Kenneth A. Newell, MD, PhD, FAST<br /> *2013-2014: Daniel R. Salomon, MD<br /> *2012-2013: Roslyn B. Mannon, MD, FAST<br /> *2011-2012: Robert S. Gaston, MD, FAST<br /> *2010-2011: Maryl Johnson, MD, FAST<br /> *2009-2010: Joren C. Madsen, MD, DPhil<br /> *2008-2009: Barbara Murphy, MD<br /> *2007-2008: Flavio Vincenti, MD<br /> *2006-2007: Jeffrey S. Crippin, MD<br /> *2005-2006: Richard N. Fine, MD<br /> *2004-2005: Jay Alan Fishman, MD, FAST<br /> *2003-2004: Michael R. Lucey, MD<br /> *2002-2003: William E. Harmon, MD<br /> *2001-2002: Laurence A. Turka, MD, FAST<br /> *2000-2001: Mohamed H. Sayegh, MD, FAST<br /> *1999-2000: John R. Lake, MD<br /> *1998-1999: John F. Neylan, MD<br /> *1997-1998: J. Harold Helderman, MD, FAST<br /> *1996-1997: Leslie W. Miller, MD<br /> *1995-1996: Douglas J. Norman, MD, FAST<br /> *1994-1995: Thomas A. Gonwa, MD, FAST<br /> *1993-1994: Manikkam Suthanthiran, MD, FAST<br /> *1992-1993: Alan R. Hull, MD<br /> *1991-1992: Ronald H. Kerman, PhD, FAST<br /> *1990-1991: M. Roy First, MD<br /> *1989-1990: William E. Braun, MD, FAST<br /> *1988-1989: Barry S. Levin, MD<br /> *1987-1988: Lawrence G. Hunsicker, MD<br /> *1986-1987: Nancy E. Goeken, PhD<br /> *1985-1986: Fred P. Sanfilippo, MD, PhD<br /> *1984-1985: Robert B. Ettenger, MD<br /> *1983-1984: Charles B. Carpenter, MD<br /> *1982-1983: Ronald D. Guttmann, MD, FRCPC<br /> *1982-1983: Terry B. Strom, MD<br /> {{div col end}}<br /> <br /> == Transplantation and Immunology Research Network (TIRN) ==<br /> <br /> The AST established the Transplantation and Immunology Research Network (TIRN) to expand the scope, reach, and effectiveness of the AST's existing research program. TIRN is AST's mechanism for identifying, funding, and providing ongoing support to the most innovative research in transplantation and immunology. &lt;ref&gt;{{cite web|url=http://www.tirn.org/about|title=TIRN - About|publisher=tirn.org}}&lt;/ref&gt;<br /> <br /> The TIRN Researcher Registry, launched in 2015, is an online directory of physicians, scientists, and other medical professionals performing research in transplantation and immunology. Researchers can use the registry to connect with others and ask questions, share ideas, or collaborate on projects. Pharmaceutical and biotechnology companies can use the registry to identify potential research partnerships. &lt;ref&gt;{{cite web|url=http://www.tirn.org/researcherregistry|title=TIRN - Researcher Registry|publisher=tirn.org}}&lt;/ref&gt;<br /> <br /> == Power2Save (P2S) ==<br /> <br /> Power2Save (P2S) is an initiative developed by the AST dedicated to increasing public awareness around the importance of donating organs, advocating for patient health, and funding transplant research. &lt;ref&gt;{{cite web|url=http://www.power2save.org |title=Power2Save|publisher=power2save.org|accessdate=2016-04-05}}&lt;/ref&gt;<br /> <br /> ==References==<br /> {{reflist}}<br /> <br /> ==External links==<br /> * [http://www.myast.org American Society of Transplantation]<br /> * [http://www.atcmeeting.org American Transplant Congress]<br /> * [http://www.amjtransplant.com American Journal of Transplantation]<br /> <br /> {{DEFAULTSORT:American Society Of Transplantation}}<br /> [[Category:1981 establishments in the United States]]<br /> [[Category:Kidney organizations]]<br /> [[Category:Professional associations based in the United States]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=Amerikanische_Gesellschaft_f%C3%BCr_Transplantation&diff=166168913 Amerikanische Gesellschaft für Transplantation 2016-06-21T17:18:47Z <p>Dsprc: /* Communities of Practice (COPs) */</p> <hr /> <div>The '''American Society of Transplantation''' (AST) is an international organization of over 3,500 transplant professionals dedicated to advancing the field of transplantation through the promotion of [[research]], [[education]], [[advocacy]], and [[organ donation]]. It is the largest professional transplantation society in North America.&lt;ref&gt;{{cite web|url=http://www.myast.org |title=The American Society of Transplantation |publisher=myast.org|accessdate=2014-08-01| &lt;!--DASHBot--&gt;| deadurl= no}}&lt;/ref&gt;<br /> <br /> == History ==<br /> <br /> The history of the AST begins in 1981, when the charter members of the society met at the annual meeting of the [[American Society of Nephrology]] (ASN). It was at this meeting where a new society, known as the American Society of Transplant Physicians (ASTP), was created to meet the professional needs of a burgeoning group of transplant [[physicians]]. The ASTP was founded on May 10, 1982, with membership open to physicians and certain other health professionals who shared an interest in transplantation medicine and [[biology]]. In 1998, the ASTP changed its name to the American Society of Transplantation (AST) and opened its membership to additional health professionals working in the area of transplantation.&lt;ref&gt;{{cite web|url=https://www.myast.org/timeline |title=AST History|publisher=myast.org|accessdate=2016-04-05}}&lt;/ref&gt;<br /> <br /> == Meetings and Education ==<br /> <br /> The society’s first annual meeting (as the ASTP) took place on June 3, 1982 in Chicago. In 2000, the AST returned to Chicago in conjunction with the American Society of Transplant Surgeons (ASTS) and held the first American Transplant Congress (ATC). Since that time, the ATC has met annually in a variety of North American cities, and is currently the largest annual meeting of transplant professionals.&lt;ref&gt;{{cite web|url=http://www.atcmeeting.org |title=American Transplant Congress|publisher=atcmeeting.org|accessdate=2014-08-01}}&lt;/ref&gt;<br /> <br /> The first Fellows Symposium on Transplant Medicine was held July 27-28, 1996 in St. Louis, Missouri. Renamed the Fellows Symposium on Transplantation in 2015, this meeting gives clinical fellows and residents, surgical fellows, research fellows, pharmacists, and other trainees the opportunity to participate in specialized scientific sessions and meet one-on-one with senior transplant specialists. &lt;ref&gt;{{cite web|url=https://www.myast.org/timeline |title=AST History|publisher=myast.org|accessdate=2016-04-05}}&lt;/ref&gt;<br /> <br /> The first AST Winter Symposium was held February 13-17, 1997, in Phoenix, Arizona. As of 2013, the AST’s winter meeting has been designated as the Cutting Edge of Transplantation (CEOT) meeting. &lt;ref&gt;{{cite web|url=https://www.myast.org/timeline |title=AST History|publisher=myast.org|accessdate=2016-04-05}}&lt;/ref&gt;<br /> <br /> In 2007, the Transplant Nephrology Core Curriculum (TNCC) was launched as an online program provided jointly by the ASN and the AST. The TNCC focuses on key information needed to prepare for the American Board of Internal Medicine Nephrology Board Certification and Maintenance of Certification examinations. &lt;ref&gt;{{cite web|url=https://tncc.myast.org/|title=Transplant Nephrology Core Curriculum|publisher=tncc.myast.org/|accessdate=2016-04-05}}&lt;/ref&gt;<br /> <br /> In 2011, the AST launched the Timely Topics in Transplantation (T3) webinar series. The T3 webinars can be viewed live or on-demand, and span all transplant topics. &lt;ref&gt;{{cite web|url=https://www.transplantpro.org/news/education/ast-business-of-transplantation-webinar-series/|title=Transplant Pro|publisher=www.transplantpro.org/}}&lt;/ref&gt;<br /> <br /> == Communities of Practice (COPs) ==<br /> <br /> The AST Communities of Practice (COPs) are specialty-area focused groups within the larger society. The AST currently has 14 COPs:<br /> {{div col|3}}<br /> * Community of Basic Scientists<br /> * Infectious Disease<br /> * Kidney Pancreas<br /> * Live Donor<br /> * Liver and Intestinal<br /> * Pediatric<br /> * Psychosocial<br /> * Thoracic and Critical Care<br /> * Trainee and Young Faculty<br /> * Transplant Administrators<br /> * Transplant Diagnostics<br /> * Transplant Pharmacists<br /> * Transplant Regenerative Medicine<br /> * Women’s Health<br /> {{div col end}}<br /> <br /> == Publications ==<br /> <br /> The [[American Journal of Transplantation]] is the joint monthly peer-reviewed medical journal of the AST and ASTS, published by Wiley-Blackwell. &lt;ref&gt;{{cite web|url=http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1600-6143|title=American Journal of Transplanation|publisher=onlinelibrary.wiley.com/}}&lt;/ref&gt;<br /> <br /> Additional publications:<br /> * AST Primer on Transplantation, 3rd Edition &lt;ref&gt;{{cite web|url=http://www.wiley.com/WileyCDA/WileyTitle/productCd-1405142677.html|title=AST Primer on Transplanation, 3rd Edition|publisher=wiley.com}}&lt;/ref&gt;<br /> * AST Handbook of Transplant Infections &lt;ref&gt;{{cite web|url=http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470658274.html|title=AST Handbook of Transplant Infections|publisher=wiley.com}}&lt;/ref&gt;<br /> * Transplant Immunology &lt;ref&gt;{{cite web|url=http://www.wiley.com/WileyCDA/Section/id-610141.html|title=Transplant Immunology|publisher=wiley.com}}&lt;/ref&gt;<br /> * Special Issue: The American Society of Transplantation Infectious Diseases Guidelines, 3rd Edition &lt;ref&gt;{{cite web|url=http://onlinelibrary.wiley.com/doi/10.1111/ajt.2013.13.issue-s4/issuetoc|title=Special Issue: The American Society of Transplantation Infectious Diseases Guidelines, 3rd Edition|publisher=onlinelibrary.wiley.com}}&lt;/ref&gt;<br /> <br /> == Presidents ==<br /> *2015-2016: James S. Allan, MD, MBA, FAST<br /> *2014-2015: Kenneth A. Newell, MD, PhD, FAST<br /> *2013-2014: Daniel R. Salomon, MD<br /> *2012-2013: Roslyn B. Mannon, MD, FAST<br /> *2011-2012: Robert S. Gaston, MD, FAST<br /> *2010-2011: Maryl Johnson, MD, FAST<br /> *2009-2010: Joren C. Madsen, MD, DPhil<br /> *2008-2009: Barbara Murphy, MD<br /> *2007-2008: Flavio Vincenti, MD<br /> *2006-2007: Jeffrey S. Crippin, MD<br /> *2005-2006: Richard N. Fine, MD<br /> *2004-2005: Jay Alan Fishman, MD, FAST<br /> *2003-2004: Michael R. Lucey, MD<br /> *2002-2003: William E. Harmon, MD<br /> *2001-2002: Laurence A. Turka, MD, FAST<br /> *2000-2001: Mohamed H. Sayegh, MD, FAST<br /> *1999-2000: John R. Lake, MD<br /> *1998-1999: John F. Neylan, MD<br /> *1997-1998: J. Harold Helderman, MD, FAST<br /> *1996-1997: Leslie W. Miller, MD<br /> *1995-1996: Douglas J. Norman, MD, FAST<br /> *1994-1995: Thomas A. Gonwa, MD, FAST<br /> *1993-1994: Manikkam Suthanthiran, MD, FAST<br /> *1992-1993: Alan R. Hull, MD<br /> *1991-1992: Ronald H. Kerman, PhD, FAST<br /> *1990-1991: M. Roy First, MD<br /> *1989-1990: William E. Braun, MD, FAST<br /> *1988-1989: Barry S. Levin, MD<br /> *1987-1988: Lawrence G. Hunsicker, MD<br /> *1986-1987: Nancy E. Goeken, PhD<br /> *1985-1986: Fred P. Sanfilippo, MD, PhD<br /> *1984-1985: Robert B. Ettenger, MD<br /> *1983-1984: Charles B. Carpenter, MD<br /> *1982-1983: Ronald D. Guttmann, MD, FRCPC<br /> *1982-1983: Terry B. Strom, MD<br /> <br /> == Transplantation and Immunology Research Network (TIRN) ==<br /> <br /> The AST established the Transplantation and Immunology Research Network (TIRN) to expand the scope, reach, and effectiveness of the AST's existing research program. TIRN is AST's mechanism for identifying, funding, and providing ongoing support to the most innovative research in transplantation and immunology. &lt;ref&gt;{{cite web|url=http://www.tirn.org/about|title=TIRN - About|publisher=tirn.org}}&lt;/ref&gt;<br /> <br /> The TIRN Researcher Registry, launched in 2015, is an online directory of physicians, scientists, and other medical professionals performing research in transplantation and immunology. Researchers can use the registry to connect with others and ask questions, share ideas, or collaborate on projects. Pharmaceutical and biotechnology companies can use the registry to identify potential research partnerships. &lt;ref&gt;{{cite web|url=http://www.tirn.org/researcherregistry|title=TIRN - Researcher Registry|publisher=tirn.org}}&lt;/ref&gt;<br /> <br /> == Power2Save (P2S) ==<br /> <br /> Power2Save (P2S) is an initiative developed by the AST dedicated to increasing public awareness around the importance of donating organs, advocating for patient health, and funding transplant research. &lt;ref&gt;{{cite web|url=http://www.power2save.org |title=Power2Save|publisher=power2save.org|accessdate=2016-04-05}}&lt;/ref&gt;<br /> <br /> ==References==<br /> {{reflist}}<br /> <br /> ==External links==<br /> * [http://www.myast.org American Society of Transplantation]<br /> * [http://www.atcmeeting.org American Transplant Congress]<br /> * [http://www.amjtransplant.com American Journal of Transplantation]<br /> <br /> {{DEFAULTSORT:American Society Of Transplantation}}<br /> [[Category:1981 establishments in the United States]]<br /> [[Category:Kidney organizations]]<br /> [[Category:Professional associations based in the United States]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=Amerikanische_Gesellschaft_f%C3%BCr_Transplantation&diff=166168912 Amerikanische Gesellschaft für Transplantation 2016-06-21T17:17:57Z <p>Dsprc: Undid revision 726354547 by 50.205.215.226 (talk) we do not need their schedule</p> <hr /> <div>The '''American Society of Transplantation''' (AST) is an international organization of over 3,500 transplant professionals dedicated to advancing the field of transplantation through the promotion of [[research]], [[education]], [[advocacy]], and [[organ donation]]. It is the largest professional transplantation society in North America.&lt;ref&gt;{{cite web|url=http://www.myast.org |title=The American Society of Transplantation |publisher=myast.org|accessdate=2014-08-01| &lt;!--DASHBot--&gt;| deadurl= no}}&lt;/ref&gt;<br /> <br /> == History ==<br /> <br /> The history of the AST begins in 1981, when the charter members of the society met at the annual meeting of the [[American Society of Nephrology]] (ASN). It was at this meeting where a new society, known as the American Society of Transplant Physicians (ASTP), was created to meet the professional needs of a burgeoning group of transplant [[physicians]]. The ASTP was founded on May 10, 1982, with membership open to physicians and certain other health professionals who shared an interest in transplantation medicine and [[biology]]. In 1998, the ASTP changed its name to the American Society of Transplantation (AST) and opened its membership to additional health professionals working in the area of transplantation.&lt;ref&gt;{{cite web|url=https://www.myast.org/timeline |title=AST History|publisher=myast.org|accessdate=2016-04-05}}&lt;/ref&gt;<br /> <br /> == Meetings and Education ==<br /> <br /> The society’s first annual meeting (as the ASTP) took place on June 3, 1982 in Chicago. In 2000, the AST returned to Chicago in conjunction with the American Society of Transplant Surgeons (ASTS) and held the first American Transplant Congress (ATC). Since that time, the ATC has met annually in a variety of North American cities, and is currently the largest annual meeting of transplant professionals.&lt;ref&gt;{{cite web|url=http://www.atcmeeting.org |title=American Transplant Congress|publisher=atcmeeting.org|accessdate=2014-08-01}}&lt;/ref&gt;<br /> <br /> The first Fellows Symposium on Transplant Medicine was held July 27-28, 1996 in St. Louis, Missouri. Renamed the Fellows Symposium on Transplantation in 2015, this meeting gives clinical fellows and residents, surgical fellows, research fellows, pharmacists, and other trainees the opportunity to participate in specialized scientific sessions and meet one-on-one with senior transplant specialists. &lt;ref&gt;{{cite web|url=https://www.myast.org/timeline |title=AST History|publisher=myast.org|accessdate=2016-04-05}}&lt;/ref&gt;<br /> <br /> The first AST Winter Symposium was held February 13-17, 1997, in Phoenix, Arizona. As of 2013, the AST’s winter meeting has been designated as the Cutting Edge of Transplantation (CEOT) meeting. &lt;ref&gt;{{cite web|url=https://www.myast.org/timeline |title=AST History|publisher=myast.org|accessdate=2016-04-05}}&lt;/ref&gt;<br /> <br /> In 2007, the Transplant Nephrology Core Curriculum (TNCC) was launched as an online program provided jointly by the ASN and the AST. The TNCC focuses on key information needed to prepare for the American Board of Internal Medicine Nephrology Board Certification and Maintenance of Certification examinations. &lt;ref&gt;{{cite web|url=https://tncc.myast.org/|title=Transplant Nephrology Core Curriculum|publisher=tncc.myast.org/|accessdate=2016-04-05}}&lt;/ref&gt;<br /> <br /> In 2011, the AST launched the Timely Topics in Transplantation (T3) webinar series. The T3 webinars can be viewed live or on-demand, and span all transplant topics. &lt;ref&gt;{{cite web|url=https://www.transplantpro.org/news/education/ast-business-of-transplantation-webinar-series/|title=Transplant Pro|publisher=www.transplantpro.org/}}&lt;/ref&gt;<br /> <br /> == Communities of Practice (COPs) ==<br /> <br /> The AST Communities of Practice (COPs) are specialty-area focused groups within the larger society. The AST currently has 14 COPs:<br /> * Community of Basic Scientists<br /> * Infectious Disease<br /> * Kidney Pancreas<br /> * Live Donor<br /> * Liver and Intestinal<br /> * Pediatric<br /> * Psychosocial<br /> * Thoracic and Critical Care<br /> * Trainee and Young Faculty<br /> * Transplant Administrators<br /> * Transplant Diagnostics<br /> * Transplant Pharmacists<br /> * Transplant Regenerative Medicine<br /> * Women’s Health<br /> <br /> == Publications ==<br /> <br /> The [[American Journal of Transplantation]] is the joint monthly peer-reviewed medical journal of the AST and ASTS, published by Wiley-Blackwell. &lt;ref&gt;{{cite web|url=http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1600-6143|title=American Journal of Transplanation|publisher=onlinelibrary.wiley.com/}}&lt;/ref&gt;<br /> <br /> Additional publications:<br /> * AST Primer on Transplantation, 3rd Edition &lt;ref&gt;{{cite web|url=http://www.wiley.com/WileyCDA/WileyTitle/productCd-1405142677.html|title=AST Primer on Transplanation, 3rd Edition|publisher=wiley.com}}&lt;/ref&gt;<br /> * AST Handbook of Transplant Infections &lt;ref&gt;{{cite web|url=http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470658274.html|title=AST Handbook of Transplant Infections|publisher=wiley.com}}&lt;/ref&gt;<br /> * Transplant Immunology &lt;ref&gt;{{cite web|url=http://www.wiley.com/WileyCDA/Section/id-610141.html|title=Transplant Immunology|publisher=wiley.com}}&lt;/ref&gt;<br /> * Special Issue: The American Society of Transplantation Infectious Diseases Guidelines, 3rd Edition &lt;ref&gt;{{cite web|url=http://onlinelibrary.wiley.com/doi/10.1111/ajt.2013.13.issue-s4/issuetoc|title=Special Issue: The American Society of Transplantation Infectious Diseases Guidelines, 3rd Edition|publisher=onlinelibrary.wiley.com}}&lt;/ref&gt;<br /> <br /> == Presidents ==<br /> *2015-2016: James S. Allan, MD, MBA, FAST<br /> *2014-2015: Kenneth A. Newell, MD, PhD, FAST<br /> *2013-2014: Daniel R. Salomon, MD<br /> *2012-2013: Roslyn B. Mannon, MD, FAST<br /> *2011-2012: Robert S. Gaston, MD, FAST<br /> *2010-2011: Maryl Johnson, MD, FAST<br /> *2009-2010: Joren C. Madsen, MD, DPhil<br /> *2008-2009: Barbara Murphy, MD<br /> *2007-2008: Flavio Vincenti, MD<br /> *2006-2007: Jeffrey S. Crippin, MD<br /> *2005-2006: Richard N. Fine, MD<br /> *2004-2005: Jay Alan Fishman, MD, FAST<br /> *2003-2004: Michael R. Lucey, MD<br /> *2002-2003: William E. Harmon, MD<br /> *2001-2002: Laurence A. Turka, MD, FAST<br /> *2000-2001: Mohamed H. Sayegh, MD, FAST<br /> *1999-2000: John R. Lake, MD<br /> *1998-1999: John F. Neylan, MD<br /> *1997-1998: J. Harold Helderman, MD, FAST<br /> *1996-1997: Leslie W. Miller, MD<br /> *1995-1996: Douglas J. Norman, MD, FAST<br /> *1994-1995: Thomas A. Gonwa, MD, FAST<br /> *1993-1994: Manikkam Suthanthiran, MD, FAST<br /> *1992-1993: Alan R. Hull, MD<br /> *1991-1992: Ronald H. Kerman, PhD, FAST<br /> *1990-1991: M. Roy First, MD<br /> *1989-1990: William E. Braun, MD, FAST<br /> *1988-1989: Barry S. Levin, MD<br /> *1987-1988: Lawrence G. Hunsicker, MD<br /> *1986-1987: Nancy E. Goeken, PhD<br /> *1985-1986: Fred P. Sanfilippo, MD, PhD<br /> *1984-1985: Robert B. Ettenger, MD<br /> *1983-1984: Charles B. Carpenter, MD<br /> *1982-1983: Ronald D. Guttmann, MD, FRCPC<br /> *1982-1983: Terry B. Strom, MD<br /> <br /> == Transplantation and Immunology Research Network (TIRN) ==<br /> <br /> The AST established the Transplantation and Immunology Research Network (TIRN) to expand the scope, reach, and effectiveness of the AST's existing research program. TIRN is AST's mechanism for identifying, funding, and providing ongoing support to the most innovative research in transplantation and immunology. &lt;ref&gt;{{cite web|url=http://www.tirn.org/about|title=TIRN - About|publisher=tirn.org}}&lt;/ref&gt;<br /> <br /> The TIRN Researcher Registry, launched in 2015, is an online directory of physicians, scientists, and other medical professionals performing research in transplantation and immunology. Researchers can use the registry to connect with others and ask questions, share ideas, or collaborate on projects. Pharmaceutical and biotechnology companies can use the registry to identify potential research partnerships. &lt;ref&gt;{{cite web|url=http://www.tirn.org/researcherregistry|title=TIRN - Researcher Registry|publisher=tirn.org}}&lt;/ref&gt;<br /> <br /> == Power2Save (P2S) ==<br /> <br /> Power2Save (P2S) is an initiative developed by the AST dedicated to increasing public awareness around the importance of donating organs, advocating for patient health, and funding transplant research. &lt;ref&gt;{{cite web|url=http://www.power2save.org |title=Power2Save|publisher=power2save.org|accessdate=2016-04-05}}&lt;/ref&gt;<br /> <br /> ==References==<br /> {{reflist}}<br /> <br /> ==External links==<br /> * [http://www.myast.org American Society of Transplantation]<br /> * [http://www.atcmeeting.org American Transplant Congress]<br /> * [http://www.amjtransplant.com American Journal of Transplantation]<br /> <br /> {{DEFAULTSORT:American Society Of Transplantation}}<br /> [[Category:1981 establishments in the United States]]<br /> [[Category:Kidney organizations]]<br /> [[Category:Professional associations based in the United States]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=HackingTeam&diff=177175007 HackingTeam 2016-06-18T17:57:58Z <p>Dsprc: /* 2015 data breach */</p> <hr /> <div>{{Infobox company<br /> | name = HackingTeam<br /> | logo = Hacking Team logo.png<br /> | logo_size = <br /> | logo_alt = The words Hacking Team enclosed with in reversed square brackets &lt;nowiki&gt;][&lt;/nowiki&gt;<br /> | logo_caption = Company logo<br /> | logo_padding = <br /> | image = <br /> | image_size = <br /> | image_alt = <br /> | image_caption = <br /> | type = <br /> | industry = [[Information technology]]<br /> | founded = 2003<br /> | founders = David Vincenzetti, Valeriano Bedeschi<br /> | hq_location = <br /> | hq_location_city = [[Milan]]<br /> | hq_location_country = [[Italy]]<br /> | area_served = &lt;!-- or: | areas_served = --&gt;<br /> | key_people = Alberto Ornaghi (ALoR), Marco Valleri (NaGA)<br /> | products = {{unbulleted list|Software}}<br /> | brands = <br /> | services = <br /> | owner = &lt;!-- or: | owners = --&gt;<br /> | website = {{URL|http://www.hackingteam.it/}}<br /> }}<br /> '''HackingTeam''' is a [[Milan]]-based [[information technology]] company that sells offensive intrusion and [[surveillance]] capabilities to governments, law enforcement agencies and corporations.&lt;ref name=spies&gt;{{cite web |title=The spies behind your screen |url=http://www.telegraph.co.uk/technology/8899353/The-spies-behind-your-screen.html |author=Batey, Angus |date=24 November 2011 |publisher=''The Telegraph'' |accessdate=26 July 2015}}&lt;/ref&gt; Its &quot;''Remote Control Systems''&quot; enable governments and corporations to monitor the communications of internet users, decipher their [[cryptography|encrypted]] files and emails, record [[Skype]] and other [[Voice over IP]] communications, and remotely activate microphones and camera on target computers.&lt;ref&gt;{{cite web|title=Enemies of the Internet: HackingTeam|url=http://surveillance.rsf.org/en/hacking-team/|work=[[Reporters Without Borders]]|accessdate=24 April 2014}}&lt;/ref&gt; The company has been criticized for providing these capabilities to governments with poor [[human rights]] records.&lt;ref&gt;{{cite web | last3 = Marquis-Boire | first3 = Morgan | last1 = Marczak | first1 = Bill | last2 = Gaurnieri | first2 = Claudio | last4 = Scott-Railton | first4 = John | title = Mapping HackingTeam's &quot;Untraceable&quot; Spyware | url = https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ | date = February 17, 2014}}&lt;/ref&gt; HackingTeam states that they have the ability to disable their software if it is used unethically.&lt;ref&gt;{{cite news|url=http://www.newyorker.com/online/blogs/elements/2014/03/hacked-by-ones-own-government.html|title=Hackers Without Borders|last=Kopstein|first=Joshua|work=[[The New Yorker]]|date=10 March 2014|accessdate=24 April 2014}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url = https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/|title = Police Story: HackingTeam’s Government Surveillance Malware|date = June 24, 2014|accessdate = August 3, 2014|website = Citizen Lab|publisher = University of Toronto|last1 = Marquis-Boire|first1 = Morgan | last2 = Gaurnieri | first2 = Claudio | first3 = John | last3 = Scott-Railton | first4 = Katie | last4 = Kleemola }}&lt;/ref&gt; The Italian government has restricted their license to do business with countries outside Europe.&lt;ref name=&quot;:0&quot; /&gt;<br /> <br /> HackingTeam employs around 40 people in its Italian office, and has subsidiary branches in [[Annapolis]], [[Washington, D.C.]] and [[Singapore]].&lt;ref name=know&gt;''[[Human Rights Watch]]'' (25 March 2014). ''&quot;[https://www.hrw.org/report/2014/03/25/they-know-everything-we-do/telecom-and-internet-surveillance-ethiopia They Know Everything We Do]&quot;''. Retrieved 1 August 2015.&lt;/ref&gt; Its products are in use in dozens of countries across six continents.&lt;ref name=Jeffries&gt;{{cite web|last=Jeffries|first=Adrianne|title=Meet HackingTeam, the company that helps the police hack you|url=http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers|accessdate=21 April 2014|work=[[The Verge]]|date=13 September 2013}}&lt;/ref&gt;<br /> <br /> ==History==<br /> HackingTeam was started by two Italian programmers: Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri (under the aliases of ALoR, and NaGA respectively), created a set of tools that could be used to monitor and remotely manipulate target computers. The program, called [[Ettercap (software)|Ettercap]], was embraced both by [[Hacker (term)|hackers]] looking to spy on people, and by companies that hoped to test the security of their own networks.<br /> <br /> The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their [[Skype]] calls, the police contacted Ornaghi and Valleri and asked them to help modify the program. HackingTeam was born, and became &quot;the first sellers of commercial hacking software to the police.&quot;&lt;ref name=Jeffries/&gt;<br /> <br /> According to former employee Alberto Pelliccione, the company began as security services provider, offering [[penetration testing]], auditing and other defensive capabilities to clients.&lt;ref name=war&gt;Farivar, Cyrus (20 July 2015) [http://arstechnica.com/security/2015/07/italian-prosecutors-investigate-former-hacking-team-employees-for-role-in-hack/ HackingTeam goes to war against former employees, suspects some helped hackers]. ''Ars Technica''. Retrieved 26 July 2015.&lt;/ref&gt; Pelliccione states that as malware and other offensive capabilities were developed and accounted for a larger percentage of revenues, the organization pivoted in a more offensive direction and became increasingly compartmentalized. Pelliccione claims fellow employees working on aspects of the same platform - for example, Android exploits and payloads - would not communicate with one another, possibly leading to tensions and strife within the organization.&lt;ref name=war/&gt;<br /> <br /> In February 2014, a report from [[Citizen Lab]] identified the organisation to be using hosting services from [[Linode]], [[Telecom Italia]], [[Rackspace]], [[NOC4Hosts]] and notorious [[bullet proof hosting]] company [[Santrex]].&lt;ref&gt;{{cite news|title=HackingTeam’s US Nexus|url=https://citizenlab.org/2014/02/hacking-teams-us-nexus/|accessdate=2 August 2015|date=28 February 2014}}&lt;/ref&gt;<br /> <br /> On July 5, 2015 the company suffered a major data breach of customer data, software code, internal documents and emails. - ''See: [[#2015 data breach|§ 2015 data breach]]''<br /> <br /> ==Products and capabilities==<br /> HackingTeam enables clients to perform remote monitoring functions against citizens via their [[Remote administration tool|RCS (Remote Control Systems)]], including their '''Da Vinci''' and '''Galileo''' platforms:&lt;ref name=spies/&gt;<br /> <br /> *Covert collection of emails, text message, phone call history and address books<br /> *[[Keystroke logging]]<br /> *Uncover search history data and take screenshots<br /> *Record audio from phone calls<br /> :*Capture audio and video stream from device memory to bypass [[cryptography]] of [[Skype]] sessions&lt;ref&gt;{{cite web | title=Mideast Uses Western Tools to Battle the Skype Rebellion |url=http://www.wsj.com/articles/SB10001424052702304520804576345970862420038 |author1=Stecklow, Steve |author2=Sonne, Paul |author3=Bradley, Matt |date=1 June 2011 |publisher=''Wall Street Journal'' |accessdate=26 July 2015}}&lt;/ref&gt;<br /> :*Use microphones on device to collect ambient background noise and conversations<br /> *Activate phone or computer cameras<br /> *Hijack telephone GPS systems to monitor target's location<br /> *Infect target computer's [[UEFI]] [[BIOS]] [[firmware]] with a [[rootkit]]&lt;ref&gt;{{Cite web|first=Philippe |last=Lin |url=http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-uses-uefi-bios-rootkit-to-keep-rcs-9-agent-in-target-systems/ |title=HackingTeam Uses UEFI BIOS Rootkit to Keep RCS 9 Agent in Target Systems |work=TrendLabs Security Intelligence Blog |publisher=[[Trend Micro]] |date=July 13, 2015 |accessdate=July 26, 2015}}&lt;/ref&gt;<br /> *Extract WiFi passwords&lt;ref name=skiddies&gt;[http://arstechnica.com/security/2015/07/advanced-spyware-for-android-now-available-to-script-kiddies-everywhere/ &quot;Advanced spyware for Android now available to script kiddies everywhere&quot;]. ''Ars Technica''. Retrieved on 2 August 2015.&lt;/ref&gt;<br /> *Exfiltrate [[Bitcoin]] and other cryptocurrency wallet files to collect data on local accounts, contacts and transaction histories.&lt;ref name=coin&gt;Farivar, Cyrus (14 July 2015). &quot;''[http://arstechnica.com/security/2015/07/hacking-team-broke-bitcoin-secrecy-by-targeting-crucial-wallet-file/ HackingTeam broke Bitcoin secrecy by targeting crucial wallet file]''&quot;. ''Ars Technica''. Retrieved 26 July 2015.&lt;/ref&gt;<br /> <br /> HackingTeam uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.&lt;ref&gt;{{cite news|last1=Schneier|first1=Bruce|title=More on HackingTeam's Government Spying Software|url=https://www.schneier.com/blog/archives/2014/06/more_on_hacking.html}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=http://www.ibtimes.co.uk/hacking-team-tools-allow-governments-take-full-control-your-smartphone-1453987|title=HackingTeam Tools Allow Governments To Take Full Control of Your Smartphone|date=2014-06-24|website=International Business Times UK|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> The malware has payloads for [[Android (operating system)|Android]],&lt;ref name=skiddies/&gt; [[BlackBerry]], Apple [[iOS]], [[Linux]], [[Mac OS X]], [[Symbian]], as well as [[Microsoft Windows]], [[Windows Mobile]] and [[Windows Phone]] class of [[operating system]]s.&lt;ref name=C3&gt;Guarnieri, Claudio; Marquis-Boire, Morgan (13 January 2014). ''[https://media.ccc.de/browse/congress/2013/30C3_-_5439_-_en_-_saal_1_-_201312292105_-_to_protect_and_infect_-_claudio_guarnieri_-_morgan_marquis-boire.html &quot;To Protect And Infect: The militarization of the Internet&quot;]''. At the 30th [[Chaos Communications Congress]] – &quot;30C3&quot;. (Video or Audio). [[Chaos Computer Club]]. Retrieved on 15 August 2015.&lt;/ref&gt;<br /> <br /> RCS is a management platform that allows operators to remotely deploy exploits and payloads against targeted systems, remotely manage devices once compromised, and exfiltrate data for remote analysis.<br /> <br /> == Controversies ==<br /> <br /> === Use by repressive governments ===<br /> HackingTeam has been criticized for selling its products and services to governments with poor human rights records, including [[Sudan]], [[Bahrain]], and [[Saudi Arabia]].&lt;ref name=repress/&gt;<br /> <br /> In June 2014, a United Nations panel monitoring the implementation of sanctions on Sudan requested information from HackingTeam about their alleged sales of software to the country in contravention of United Nations weapons export bans to Sudan. Documents leaked in the 2015 data breach of HackingTeam revealed the organization sold Sudanese National Intelligence and Security Service access to their &quot;Remote Control System&quot; software in 2012 for 960,000 Euros.&lt;ref name=repress/&gt;&lt;ref&gt;{{Cite web|url=https://theintercept.com/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/|title=A Detailed Look at HackingTeam’s Emails About Its Repressive Clients|last=Hay Newman|first=Lily|website=The Intercept|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> In response to the United Nations panel, the company responded in January 2015 that they were not currently selling to Sudan. In a follow-up exchange, HackingTeam asserted that their product was not controlled as a weapon, and so the request was beyond the scope of the panel. There was no need for them to disclose previous sales, which they considered confidential business information.&lt;ref name=repress&gt;{{Cite web |title=A Detailed Look at HackingTeam’s Emails About Its Repressive Clients |url=https://firstlook.org/theintercept/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/ |accessdate=7 July 2015 |first1=Cora |last1=Currier |first2=Morgan |last2=Marquis-Boire}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://www.eff.org/deeplinks/2015/07/hacking-team-leaks-reveal-spyware-industrys-growth|title=HackingTeam Leaks Reveal Spyware Industry's Growth, Negligence of Human Rights|last=Myers West|first=Sarah|date=2015-07-08|website=Electronic Frontier Foundation|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> The U.N. disagreed. &quot;The view of the panel is that as such software is ideally suited to support military electronic intelligence (ELINT) operations it may potentially fall under the category of ‘military … equipment’ or ‘assistance’ related to prohibited items,&quot; the secretary wrote in March. &quot;Thus its potential use in targeting any of the belligerents in the Darfur conflict is of interest to the Panel.&quot;&lt;ref name=repress/&gt;&lt;ref&gt;{{Cite web|url=http://gizmodo.com/hacking-teams-lame-excuse-for-selling-digital-weapons-t-1716375503|title=HackingTeam's Lame Excuse for Selling Digital Weapons to Sudan|last=Knibbs|first=Kate|date=2015-07-08|website=Gizmodo|language=en-US|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> In the fall of 2014, the Italian government abruptly froze all of HackingTeam's exports, citing human rights concerns. After lobbying Italian officials, the company temporarily won back the right to sell its products abroad.&lt;ref name=repress/&gt;<br /> <br /> === 2015 data breach ===<br /> {{Update|section|date=January 2016}}<br /> On July 5, 2015, the [[Twitter]] account of the company was compromised by an unknown individual who published an announcement of a [[data breach]] against HackingTeam's computer systems. The initial message read, &quot;''Since we have nothing to hide, we're publishing all our e-mails, files, and source code …''&quot; and provided links to over 400 [[gigabyte]]s of data, including alleged internal e-mails, invoices, and [[source code]]; which were leaked via [[BitTorrent]] and [[Mega (service)|Mega]].&lt;ref&gt;{{Wayback|url=https://twitter.com/hackingteam|title=Hacked Team (@hackingteam)|date=20150706010312}}&lt;/ref&gt; An announcement of the data breach, including a link to the bittorrent seed, was retweeted by [[WikiLeaks]] and by many others through social media.&lt;ref&gt;{{Twitter status|wikileaks|617865712611233792|Inside malware makers &quot;HackingTeam&quot;: hundreds of gigabytes of e-mails, files, and source code|[[WikiLeaks]]|July 6, 2015|July 6, 2015}}&lt;/ref&gt;&lt;ref name=&quot;ibtimes.co.uk&quot;&gt;{{Cite web|url=http://www.ibtimes.co.uk/hacking-team-hacked-spy-tools-sold-oppressive-regimes-sudan-bahrain-kazakhstan-1509460|title=HackingTeam hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan|date=2015-06-06|publisher=International Business Times|accessdate=2015-07-06}}&lt;/ref&gt;<br /> <br /> The material was voluminous and early analysis appeared to reveal that HackingTeam had invoiced the [[Lebanese Army]]&lt;ref&gt;{{Twitter|url=https://twitter.com/SynAckPwn/status/617955067006578689}} {{dead link|date=July 2015}}&lt;/ref&gt; and [[Sudan]] and that spy tools were also sold to [[Bahrain]] and [[Kazakhstan]].&lt;ref name=&quot;ibtimes.co.uk&quot;/&gt; HackingTeam had previously claimed they had never done business with Sudan.&lt;ref&gt;{{Cite web|title = HackingTeam hacked, attackers claim 400GB in dumped data|url = http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html|accessdate = 2015-07-06|first = Steve|last = Ragan}}&lt;/ref&gt;<br /> <br /> The leaked data revealed a [[zero-day (computing)|zero-day]] cross-platform Flash exploit ([[Common Vulnerabilities and Exposures|CVE]] number: CVE-2015-5119).&lt;ref&gt;{{Cite web|title = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html|url = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html}}&lt;/ref&gt; The dump included a demo of this exploit by opening [[Calculator (computer program)|Calculator]] from a test webpage.&lt;ref&gt;{{Cite web|title = Zero-Day Flash Player Exploit Disclosed In 'HackingTeam' Data Dump|url = http://thehackernews.com/2015/07/flash-zero-day-vulnerability.html|accessdate = 2015-07-06|first = Swati|last = Khandelwal}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Unpatched Flash Player Flaw, More POCs Found in HackingTeam Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/|accessdate = 2015-07-08|first = Peter|last = Pi}}&lt;/ref&gt; Adobe [[software patch|patched]] the hole on July 8, 2015.&lt;ref&gt;{{Cite web|title = Adobe Security Bulletin|url = https://helpx.adobe.com/security/products/flash-player/apsb15-16.html|accessdate = 2015-07-11|last = Adobe Systems (corporate author)}}&lt;/ref&gt; Another vulnerability involving Adobe was revealed in the dumps, which took advantage of a [[buffer overflow]] attack on an Adobe Open Type Manager [[Dynamic-link library|DLL]] included with [[Microsoft Windows]]. The DLL is run in [[protection ring|kernel mode]], so the attack could perform [[privilege escalation]] to bypass the [[sandbox (computer security)|sandbox]].&lt;ref&gt;{{Cite web|title = A Look at the Open Type Font Manager Vulnerability from the HackingTeam Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-the-open-type-font-manager-vulnerability-from-the-hacking-team-leak/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29|accessdate = 2015-07-08|first = Jack|last = Tang}}&lt;/ref&gt;<br /> <br /> Also revealed in leaked data was HackingTeam employees' use of weak passwords, including 'P4ssword', 'wolverine', and 'universo'.&lt;ref&gt;{{Cite web|title = HackingTeam used shockingly bad passwords|url = http://www.zdnet.com/article/no-wonder-hacking-team-got-hacked/|accessdate = 2015-07-06|first = Zack|last = Whittaker}}&lt;/ref&gt;<br /> <br /> After a few hours without response from HackingTeam, member Christian Pozzi tweeted the company was working closely with police and &quot;''what the attackers are claiming regarding our company is not true.''&quot;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964180042190848|accessdate = 2015-07-06}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964660705234944|accessdate = 2015-07-06}}&lt;/ref&gt; He also claimed the leaked archive &quot;contains a virus&quot; and that it constituted &quot;false info&quot;.&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617962663188926465|accessdate = 2015-07-06}}&lt;/ref&gt; Shortly after these tweets, Pozzi's Twitter account itself was apparently compromised.&lt;ref&gt;{{Cite web|title=Christian Pozzi on Twitter: &quot;Uh Oh - my twitter account was also hacked.&quot; |url=https://twitter.com/christian_pozzi/status/617977753250496512 |date=2015-07-06 |accessdate=2015-07-06 |deadurl=yes |archiveurl=https://web.archive.org/web/20150706084837/https://twitter.com/christian_pozzi/status/617977753250496512 |archivedate=July 6, 2015 }}&lt;/ref&gt;<br /> <br /> Responsibility for this attack was claimed by the hacker known as &quot;Phineas Fisher&quot; (or Phisher) on Twitter.&lt;ref&gt;{{cite tweet | user=gammagrouppr | author=Phineas Fisher | number=617937092497178624 | title=gamma and HT down, a few more to go :) | date=6 July 2015}}&lt;/ref&gt; Phineas has previously attacked spyware firm [[Gamma International]], who produce malware, such as [[FinFisher]], for governments and corporations.&lt;ref&gt;{{Cite web|title = HackingTeam: We won't 'shrivel up and go away' after cyberattack|url = http://www.zdnet.com/article/hacking-team-cyberattack-aftermath-interview/|accessdate = 2015-07-06|first = Charlie|last = Osbourne}}&lt;/ref&gt; In 2016, Phineas published details of the attack, in Spanish and English, as a &quot;how-to&quot; for others, and explained the motivations behind the attack.&lt;ref&gt;{{Cite web|url=http://arstechnica.com/security/2016/04/how-hacking-team-got-hacked-phineas-phisher/|title=How HackingTeam got hacked|website=Ars Technica|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> The internal documents revealed details of HackingTeam's contracts with repressive governments.&lt;ref&gt;{{Cite web|url=https://theintercept.com/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/|title=A Detailed Look at HackingTeam’s Emails About Its Repressive Clients|website=The Intercept|access-date=2016-05-15}}&lt;/ref&gt; In 2016, the Italian government again revoked the company’s license to sell spyware outside of Europe without special permission.&lt;ref name=&quot;:0&quot;&gt;{{Cite web|url=https://nakedsecurity.sophos.com/2016/04/08/hacking-team-loses-global-license-to-sell-spyware/|title=HackingTeam loses global license to sell spyware|last=Zorabedian|first=John|date=2016-04-08|website=Naked Security|access-date=2016-05-15}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://www.privacyinternational.org/node/826|title=HackingTeam’s Global License Revoked by Italian Export Authorities {{!}} Privacy International|website=www.privacyinternational.org|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> == Customer List ==<br /> HackingTeam's clientele include not just governments, but also corporate clients such as [[Barclay's]] Bank and [[British Telecom]] (BT) of the [[United Kingdom]], as well as [[Deutsche Bank]] of [[Germany]].&lt;ref name=spies/&gt;<br /> <br /> A full list of HackingTeam's customers were leaked in the 2015 breach. Disclosed documents show HackingTeam had 70 current customers, mostly military, police, federal and provincial governments. The total company revenues disclosed exceeded 40 million [[Euro]]s.&lt;ref&gt;{{cite web |author=Kopstein, Justin |title= Here Are All the Sketchy Government Agencies Buying HackingTeam's Spy Tech |url=http://motherboard.vice.com/read/here-are-all-the-sketchy-government-agencies-buying-hacking-teams-spy-tech |publisher=Vice Magazine |date=6 July 2015<br /> }}&lt;/ref&gt;&lt;ref&gt;{{cite web |author=Weissman, Cale Guthrie |title=Hacked security company's documents show a laundry list of questionable clients |url=http://www.businessinsider.com/hacked-security-companys-document-2015-7 |date=6 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |author=Ragan, Steve |title=In Pictures: HackingTeam's hack curated |url=http://www.cso.com.au/slideshow/579158/pictures-hacking-team-hack-curated/?image=9 |publisher=CSO Online (Australia)}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=HackingTeam hacked: firm sold spying tools to repressive regimes, documents claim |url=http://www.theguardian.com/technology/2015/jul/06/hacking-team-hacked-firm-sold-spying-tools-to-repressive-regimes-documents-claim |author=Hern, Alex |publisher=''The Guardian'' |date=6 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=HackingTeam responds to data breach, issues public threats and denials |url=http://www.csoonline.com/article/2944333/data-breach/hacking-team-responds-to-data-breach-issues-public-threats-and-denials.html |author=Ragan, Steve |publisher=''CSO Online'' |date=6 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=A whole bunch of downed government surveillance programs are about to go back online |url=http://www.businessinsider.com/hacking-team-promises-customers-they-can-resume-surveillance-operations-soon-2015-7 |author=Stevenson, Alastair |publisher=''Business Insider'' |date=14 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;<br /> <br /> {| class=&quot;wikitable sortable&quot;<br /> |-<br /> ! Customer<br /> ! Country<br /> ! Area<br /> ! Agency<br /> ! Year First Sale<br /> ! Annual Maintenance Fees<br /> ! Total Client Revenues<br /> |-<br /> | [[Polizia Postale e delle Comunicazioni]]&lt;ref&gt;Jone Pierantonio. [http://it.ibtimes.com/cyber-space/ecco-chi-ha-bucato-hacking-team-1408915 &quot;Ecco chi ha bucato HackingTeam&quot;]. ''International Business Times''. Retrieved on 2 August 2015.&lt;/ref&gt;||Italy||Europe||LEA||2004||€100,000||€808,833<br /> |-<br /> | [[Centro Nacional de Inteligencia]]&lt;ref&gt;Ediciones El País (8 July 2015). [http://internacional.elpais.com/internacional/2015/07/08/actualidad/1436343710_282978.html &quot;HackingTeam: “Ofrecemos tecnología ofensiva para la Policía”&quot;]. ''EL PAÍS''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Spain]]||Europe||Intelligence||2006||€52,000||€538,000<br /> |-<br /> | [[Infocomm Development Authority of Singapore]]||[[Singapore]]||APAC||Intelligence||2008||€89,000||€1,209,967<br /> |-<br /> | Information Office||[[Hungary]]||Europe||Intelligence||2008||€41,000||€885,000<br /> |-<br /> | CSDN||[[Morocco]]||MEA||Intelligence||2009||€140,000||€1,936,050<br /> |-<br /> | UPDF (Uganda Peoples Defense Force), ISO (Internal Security Organization), Office of the President||[[Uganda]]||Africa||Intelligence||2015||€831,000||€52,197,100<br /> |-<br /> | Italy - DA - Rental||Italy||Europe||Other||2009||€50,000||€628,250<br /> |-<br /> | [[Malaysian Anti-Corruption Commission]]||[[Malaysia]]||APAC||Intelligence||2009||€77,000||€789,123<br /> |-<br /> | PCM||Italy||Europe||Intelligence||2009||€90,000||€764,297<br /> |-<br /> | SSNS - Ungheria||Hungary||Europe||Intelligence||2009||€64,000||€1,011,000<br /> |-<br /> | CC - Italy||Italy||Europe||LEA||2010||€50,000||€497,349<br /> |-<br /> | [[Al Mukhabarat Al A'amah]]||[[Saudi Arabia]]||MEA||Intelligence||2010||€45,000||€600,000<br /> |-<br /> | IR Authorities (Condor)||[[Luxembourg]]||Europe||Other||2010||€45,000||€446,000<br /> |-<br /> | La Dependencia y/o CISEN&lt;ref&gt;[http://fusion.net/story/163872/the-hacking-team-leak-shows-mexico-was-the-top-client-but-why/ &quot;The HackingTeam leak shows Mexico was its top client, but why?&quot;]. ''Fusion''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Mexico]]||LATAM||Intelligence||2010||€130,000||€1,390,000<br /> |-<br /> | UZC&lt;ref name=fortune/&gt; ||[[Czech Republic]] ||Europe||LEA||2010||€55,000||€689,779<br /> |-<br /> | Egypt - MOD&lt;ref name=fortune/&gt;||[[Egypt]]||MEA||Other||2011||€70,000||€598,000<br /> |-<br /> | [[Federal Bureau of Investigation]]&lt;ref name=fbidea/&gt;||USA||North America||LEA||2011||€100,000||€697,710<br /> |-<br /> | Oman - Intelligence||[[Oman]]||MEA||Intelligence||2011||€30,000||€500,000<br /> |-<br /> | President Security&lt;ref&gt;[http://motherboard.vice.com/read/hacking-teams-equipment-got-stolen-in-panama &quot;HackingTeam's Equipment Got Stolen in Panama&quot;]. ''Motherboard''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref&gt;Molina, Thabata (13 August 2015). ''[http://panampost.com/thabata-molina/2015/08/13/panama-to-investigate-martinelli-in-hacking-team-spying-scandal/ &quot;Panama to Investigate Martinelli in HackingTeam Spying Scandal&quot;]''. ''Panama Post''. Retrieved 15 August 2015.&lt;/ref&gt;<br /> ||[[Panama]]||LATAM||Intelligence||2011||€110,000||€750,000<br /> |-<br /> | [[Turkish National Police]]||[[Turkey]]||Europe||LEA||2011||€45,000||€440,000<br /> |-<br /> | UAE - MOI||[[United Arab Emirates|UAE]]||MEA||LEA||2011||€90,000||€634,500<br /> |-<br /> | [[National Security Service (Uzbekistan)|National Security Service]]&lt;ref name=fortune&gt;[http://fortune.com/2015/07/16/governments-used-spy-software/ &quot;Leaked emails from security firm HackingTeam show government use - Fortune&quot;]. ''Fortune''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Uzbekistan]]||Europe||Intelligence||2011||€50,000||€917,038<br /> |-<br /> | [[United States Department of Defense|Department of Defense]]&lt;ref name=fbidea/&gt;||USA||North America||LEA||2011||||€190,000<br /> |-<br /> | Bayelsa State Government||[[Nigeria]]||MEA||Intelligence||2012||€75,000||€450,000<br /> |-<br /> | Estado del Mexico||Mexico||LATAM||LEA||2012||€120,000||€783,000<br /> |-<br /> | Information Network Security Agency||[[Ethiopia]]||MEA||Intelligence||2012||€80,000||€750,000<br /> |-<br /> | State security (Falcon)||Luxemburg||Europe||Other||2012||€38,000||€316,000<br /> |-<br /> | Italy - DA - Rental||Italy||Europe||Other||2012||€60,000||€496,000<br /> |-<br /> | MAL - MI||Malaysia||APAC||Intelligence||2012||€77,000||€552,000<br /> |-<br /> | [[Direction générale de la surveillance du territoire]]||Morocco||MEA||Intelligence||2012||€160,000||€1,237,500<br /> |-<br /> | [[National Intelligence and Security Service]]&lt;ref name=fortune/&gt;||[[Sudan]]||MEA||Intelligence||2012||€76,000||€960,000<br /> |-<br /> | Russia - KVANT&lt;ref name=kvant&gt;[http://arstechnica.com/tech-policy/2015/07/hacking-teams-surveillance-software-sold-to-kgb-successor/ &quot;HackingTeam apparently violated EU rules in sale of spyware to Russian agency&quot;]. ''Ars Technica''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Russia]]||Europe||Intelligence||2012||€72,000||€451,017<br /> |-<br /> | Saudi - GID||Saudi||MEA||LEA||2012||€114,000||€1,201,000<br /> |-<br /> | SIS of [[National Security Committee of the Republic of Kazakhstan|National Security Committee of Kazakhstan]]&lt;ref name=fortune/&gt;||[[Kazakhstan]]||Europe||Intelligence||2012||€140,000||€1,012,500<br /> |-<br /> | The 5163 Army Division (Alias of South Korean National Intelligence Service)&lt;ref name=fortune/&gt;&lt;ref name=torbrowser&gt;[https://firstlook.org/theintercept/2015/07/16/hackingteam-attacked-tor-browser/ &quot;How HackingTeam Created Spyware that Allowed the FBI To Monitor Tor Browser&quot;]. ''The Intercept''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref name=wswskorea&gt;McGrath, Ben (25 July 2015). &quot;''[https://www.wsws.org/en/articles/2015/07/25/kore-j25.html Further revelations in South Korean hacking scandal]''&quot;. ''World Socialist Web Site''. Retrieved 26 July 2015.&lt;/ref&gt;||[[South Korea|S. Korea]]||APAC||Other||2012||€67,000||€686,400<br /> |-<br /> | UAE - Intelligence||[[United Arab Emirates|UAE]]||MEA||Other||2012||€150,000||€1,200,000<br /> |-<br /> | [[Drug Enforcement Administration]]&lt;ref name=fbidea&gt;[https://firstlook.org/theintercept/2015/07/06/hacking-team-spyware-fbi/ &quot;Leaked Documents Show FBI, DEA and U.S. Army Buying Italian Spyware&quot;]. ''The Intercept''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref name=dea&gt;[http://motherboard.vice.com/read/the-dea-just-cancelled-its-contract-with-hacking-team &quot;The DEA Just Cancelled Its Contract With HackingTeam&quot;]. ''Motherboard''. Retrieved on 2 August 2015.&lt;/ref&gt;||USA||North America||Other||2012||€70,000||€567,984<br /> |-<br /> | [[Central Anticorruption Bureau]]||[[Poland]]||Europe||LEA||2012||€35,000||€249,200<br /> |-<br /> | MOD Saudi||Saudi||MEA||Other||2013||€220,000||€1,108,687<br /> |-<br /> | PMO||Malaysia||APAC||Intelligence||2013||€64,500||€520,000<br /> |-<br /> | Estado de Qeretaro||Mexico||LATAM||LEA||2013||€48,000||€234,500<br /> |-<br /> | National Security Agency&lt;ref name=fortune/&gt;||[[Azerbaijan]]||Europe||Intelligence||2013||€32,000||€349,000<br /> |-<br /> | Gobierno de Puebla||Mexico||LATAM||Other||2013||€64,000||€428,835<br /> |-<br /> | Gobierno de Campeche||Mexico||LATAM||Other||2013||€78,000||€386,296<br /> |-<br /> | AC Mongolia||[[Mongolia]]||APAC||Intelligence||2013||€100,000||€799,000<br /> |-<br /> | Dept. of Correction Thai Police ||[[Thailand]]||APAC||LEA||2013||€52,000||€286,482<br /> |-<br /> | [[National Intelligence Secretariat (Ecuador)|National Intelligence Secretariat]]&lt;ref&gt;<br /> *{{cite|url=http://panampost.com/rebeca-morla/2015/07/13/ecuadorian-websites-report-on-hacking-team-get-taken-down/}}&lt;br /&gt;<br /> *{{cite|url=http://panampost.com/panam-staff/2015/08/10/hacking-team-helped-ecuador-spy-on-opposition-activist/}}&lt;br /&gt;<br /> *{{cite|url=http://bigstory.ap.org/article/6f41d49888174b45857d34511fda1caf/apnewsbreak-email-leak-suggests-ecuador-spied-opposition}}<br /> &lt;/ref&gt;<br /> ||[[Ecuador]]||LATAM||LEA||2013||€75,000||€535,000<br /> |-<br /> | Police Intelligence Directorate&lt;ref name=dipol_telesur&gt;Podour, Justin (23 July 2015). [http://www.telesurtv.net/opinion/HackedTeam-y-Colombia-Como-la-vigilancia-ayuda-a-un-Estado-violento-20150723-0062.html #HackedTeam y Colombia: Cómo la vigilancia ayuda a un Estado violento]. ''Telesur''. Retrieved 26 July 2015.&lt;/ref&gt;||[[Colombia]]||LATAM||LEA||2013||€35,000||€335,000<br /> |-<br /> | [[Guardia di Finanza]]||Italy||Europe||LEA||2013||€80,000||€400,000<br /> |-<br /> | Intelligence&lt;ref name=cyprus&gt;In Cyprus (11 July 2015).[http://in-cyprus.com/intelligence-service-chief-steps-down/ Intelligence Service chief steps down]. Retrieved 26 July 2015.&lt;/ref&gt;||[[Cyprus]]||Europe||LEA||2013||€40,000||€375,625<br /> |-<br /> | MidWorld&lt;ref name=ifex&gt;Bahrain Center for Human Rights (15 July 2015). &quot;''[https://www.ifex.org/bahrain/2015/07/15/bahrain_hacking_team HackingTeam's troubling connections to Bahrain]''&quot; IFEX. Retrieved 26 July 2015.&lt;/ref&gt;||[[Bahrain]]||MEA||Intelligence||2013||||€210,000<br /> |-<br /> | Mexico - PEMEX||Mexico ||LATAM||LEA ||2013||||€321,120<br /> |-<br /> | Malysia K||Malaysia||APAC||LEA||2013||||€0<br /> |-<br /> | Honduras||[[Honduras]]||LATAM||LEA||2014||||€355,000<br /> |-<br /> | Mex Taumalipas||Mexico||LATAM||||2014||||€322,900<br /> |-<br /> | Secretaría de Planeación y Finanzas||Mexico||LATAM||LEA||2014||€91,000||€371,035<br /> |-<br /> | AREA||Italia||Europe||||2014||||€430,000<br /> |-<br /> | Mexico Yucatán||Mexico||LATAM||LEA||2014||||€401,788<br /> |-<br /> | Mexico Durango||Mexico||LATAM||LEA||2014||||€421,397<br /> |-<br /> | [[Investigations Police of Chile]]||[[Chile]]||LATAM||LEA||2014||||€2,289,155<br /> |-<br /> | Jalisco Mexico||Mexico||LATAM||LEA||2014||||€748,003<br /> |-<br /> | [[Royal Thai Army]]||Thailand||APAC||LEA||2014||||€360,000<br /> |-<br /> | Vietnam GD5||[[Vietnam]]||APAC||||2014||||€281,170<br /> |-<br /> | [[Kantonspolizei Zürich]]||Switzerland||Europe||LEA||2014||||€486,500<br /> |-<br /> | Vietnam GD1||Vietnam||APAC||LEA||2015||||€543,810<br /> |-<br /> | Egypt TRD GNSE||Egypt||MEA||LEA||2015||||€137,500<br /> |-<br /> | [[Lebanese Armed Forces|Lebanese Army]]||[[Lebanon]]||MEA||LEA||2015||||<br /> |-<br /> | [[Federal Police Department]]||Brazil||LATAM||LEA||2015||||<br /> |-<br /> | [[SHISH|State Informative Service]]&lt;ref&gt;Lexime (14 July 2015). &quot;''[http://www.balkanweb.com/site/burime-te-sigurta-shish-perdor-programet-pergjuese-qe-prej-2015-hacking-teams-nuk-e-kemi-nen-kontroll-sistemin/ Burime të sigurta, SHISH përdor programet përgjuese që prej 2015. HackingTeams: Nuk e kemi nën kontroll sistemin!]''&quot; (video). BalkanWeb. Retrieved 27 July 2015.&lt;/ref&gt;||[[Albania]]||Europe||SHIK||2015||||<br /> |}<br /> <br /> == See also ==<br /> * [[FinFisher]]<br /> * [[MiniPanzer and MegaPanzer]]<br /> * [[Vupen]] – 0-day exploit provider linked to HackingTeam&lt;ref&gt;[https://tsyrklevich.net/2015/07/22/hacking-team-0day-market/ HackingTeam: a zero-day market case study], Vlad Tsyrklevich's blog&lt;/ref&gt;<br /> * ''[[Mamfakinch]]'' – a citizen media organization targeted with malware allegedly developed by HackingTeam&lt;ref&gt;Perlroth, Nicole (10 October 2012). [http://bits.blogs.nytimes.com/2012/10/10/ahead-of-spyware-conference-more-evidence-of-abuse/?_r=0 Ahead of Spyware Conference, More Evidence of Abuse]. ''New York Times'' (Bits).&lt;/ref&gt;<br /> <br /> ==References==<br /> {{reflist|3}}<br /> <br /> == External links ==<br /> * {{Official website| http://www.hackingteam.it/}}<br /> * [https://citizenlab.org/tag/hacking-team/ HackingTeam Archives] - investigative reports published by The [[Citizen Lab]]<br /> * [https://wikileaks.org/hackingteam/emails WikiLeaks: ''The Hackingteam Archives''] - searchable database of 1 million internal emails<br /> * [https://wikileaks.org/spyfiles/list/company-name/hackingteam.html HackingTeam presentations] in the [[WikiLeaks]] &quot;''Spy Files''&quot;<br /> {{Hacking in the 2010s}}<br /> <br /> [[Category:Computer security software]]<br /> [[Category:Spyware]]<br /> [[Category:Surveillance]]<br /> [[Category:Trojan horses]]<br /> [[Category:Espionage techniques]]<br /> [[Category:Espionage devices]]<br /> [[Category:Malware toolkits]]<br /> [[Category:Computer access control]]<br /> [[Category:Cyberwarfare]]<br /> [[Category:Espionage scandals and incidents]]<br /> [[Category:Companies based in Milan]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=HackingTeam&diff=177175006 HackingTeam 2016-06-18T17:54:44Z <p>Dsprc: /* Customer List */</p> <hr /> <div>{{Infobox company<br /> | name = HackingTeam<br /> | logo = Hacking Team logo.png<br /> | logo_size = <br /> | logo_alt = The words Hacking Team enclosed with in reversed square brackets &lt;nowiki&gt;][&lt;/nowiki&gt;<br /> | logo_caption = Company logo<br /> | logo_padding = <br /> | image = <br /> | image_size = <br /> | image_alt = <br /> | image_caption = <br /> | type = <br /> | industry = [[Information technology]]<br /> | founded = 2003<br /> | founders = David Vincenzetti, Valeriano Bedeschi<br /> | hq_location = <br /> | hq_location_city = [[Milan]]<br /> | hq_location_country = [[Italy]]<br /> | area_served = &lt;!-- or: | areas_served = --&gt;<br /> | key_people = Alberto Ornaghi (ALoR), Marco Valleri (NaGA)<br /> | products = {{unbulleted list|Software}}<br /> | brands = <br /> | services = <br /> | owner = &lt;!-- or: | owners = --&gt;<br /> | website = {{URL|http://www.hackingteam.it/}}<br /> }}<br /> '''HackingTeam''' is a [[Milan]]-based [[information technology]] company that sells offensive intrusion and [[surveillance]] capabilities to governments, law enforcement agencies and corporations.&lt;ref name=spies&gt;{{cite web |title=The spies behind your screen |url=http://www.telegraph.co.uk/technology/8899353/The-spies-behind-your-screen.html |author=Batey, Angus |date=24 November 2011 |publisher=''The Telegraph'' |accessdate=26 July 2015}}&lt;/ref&gt; Its &quot;''Remote Control Systems''&quot; enable governments and corporations to monitor the communications of internet users, decipher their [[cryptography|encrypted]] files and emails, record [[Skype]] and other [[Voice over IP]] communications, and remotely activate microphones and camera on target computers.&lt;ref&gt;{{cite web|title=Enemies of the Internet: HackingTeam|url=http://surveillance.rsf.org/en/hacking-team/|work=[[Reporters Without Borders]]|accessdate=24 April 2014}}&lt;/ref&gt; The company has been criticized for providing these capabilities to governments with poor [[human rights]] records.&lt;ref&gt;{{cite web | last3 = Marquis-Boire | first3 = Morgan | last1 = Marczak | first1 = Bill | last2 = Gaurnieri | first2 = Claudio | last4 = Scott-Railton | first4 = John | title = Mapping HackingTeam's &quot;Untraceable&quot; Spyware | url = https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ | date = February 17, 2014}}&lt;/ref&gt; HackingTeam states that they have the ability to disable their software if it is used unethically.&lt;ref&gt;{{cite news|url=http://www.newyorker.com/online/blogs/elements/2014/03/hacked-by-ones-own-government.html|title=Hackers Without Borders|last=Kopstein|first=Joshua|work=[[The New Yorker]]|date=10 March 2014|accessdate=24 April 2014}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url = https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/|title = Police Story: HackingTeam’s Government Surveillance Malware|date = June 24, 2014|accessdate = August 3, 2014|website = Citizen Lab|publisher = University of Toronto|last1 = Marquis-Boire|first1 = Morgan | last2 = Gaurnieri | first2 = Claudio | first3 = John | last3 = Scott-Railton | first4 = Katie | last4 = Kleemola }}&lt;/ref&gt; The Italian government has restricted their license to do business with countries outside Europe.&lt;ref name=&quot;:0&quot; /&gt;<br /> <br /> HackingTeam employs around 40 people in its Italian office, and has subsidiary branches in [[Annapolis]], [[Washington, D.C.]] and [[Singapore]].&lt;ref name=know&gt;''[[Human Rights Watch]]'' (25 March 2014). ''&quot;[https://www.hrw.org/report/2014/03/25/they-know-everything-we-do/telecom-and-internet-surveillance-ethiopia They Know Everything We Do]&quot;''. Retrieved 1 August 2015.&lt;/ref&gt; Its products are in use in dozens of countries across six continents.&lt;ref name=Jeffries&gt;{{cite web|last=Jeffries|first=Adrianne|title=Meet HackingTeam, the company that helps the police hack you|url=http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers|accessdate=21 April 2014|work=[[The Verge]]|date=13 September 2013}}&lt;/ref&gt;<br /> <br /> ==History==<br /> HackingTeam was started by two Italian programmers: Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri (under the aliases of ALoR, and NaGA respectively), created a set of tools that could be used to monitor and remotely manipulate target computers. The program, called [[Ettercap (software)|Ettercap]], was embraced both by [[Hacker (term)|hackers]] looking to spy on people, and by companies that hoped to test the security of their own networks.<br /> <br /> The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their [[Skype]] calls, the police contacted Ornaghi and Valleri and asked them to help modify the program. HackingTeam was born, and became &quot;the first sellers of commercial hacking software to the police.&quot;&lt;ref name=Jeffries/&gt;<br /> <br /> According to former employee Alberto Pelliccione, the company began as security services provider, offering [[penetration testing]], auditing and other defensive capabilities to clients.&lt;ref name=war&gt;Farivar, Cyrus (20 July 2015) [http://arstechnica.com/security/2015/07/italian-prosecutors-investigate-former-hacking-team-employees-for-role-in-hack/ HackingTeam goes to war against former employees, suspects some helped hackers]. ''Ars Technica''. Retrieved 26 July 2015.&lt;/ref&gt; Pelliccione states that as malware and other offensive capabilities were developed and accounted for a larger percentage of revenues, the organization pivoted in a more offensive direction and became increasingly compartmentalized. Pelliccione claims fellow employees working on aspects of the same platform - for example, Android exploits and payloads - would not communicate with one another, possibly leading to tensions and strife within the organization.&lt;ref name=war/&gt;<br /> <br /> In February 2014, a report from [[Citizen Lab]] identified the organisation to be using hosting services from [[Linode]], [[Telecom Italia]], [[Rackspace]], [[NOC4Hosts]] and notorious [[bullet proof hosting]] company [[Santrex]].&lt;ref&gt;{{cite news|title=HackingTeam’s US Nexus|url=https://citizenlab.org/2014/02/hacking-teams-us-nexus/|accessdate=2 August 2015|date=28 February 2014}}&lt;/ref&gt;<br /> <br /> On July 5, 2015 the company suffered a major data breach of customer data, software code, internal documents and emails. - ''See: [[#2015 data breach|§ 2015 data breach]]''<br /> <br /> ==Products and capabilities==<br /> HackingTeam enables clients to perform remote monitoring functions against citizens via their [[Remote administration tool|RCS (Remote Control Systems)]], including their '''Da Vinci''' and '''Galileo''' platforms:&lt;ref name=spies/&gt;<br /> <br /> *Covert collection of emails, text message, phone call history and address books<br /> *[[Keystroke logging]]<br /> *Uncover search history data and take screenshots<br /> *Record audio from phone calls<br /> :*Capture audio and video stream from device memory to bypass [[cryptography]] of [[Skype]] sessions&lt;ref&gt;{{cite web | title=Mideast Uses Western Tools to Battle the Skype Rebellion |url=http://www.wsj.com/articles/SB10001424052702304520804576345970862420038 |author1=Stecklow, Steve |author2=Sonne, Paul |author3=Bradley, Matt |date=1 June 2011 |publisher=''Wall Street Journal'' |accessdate=26 July 2015}}&lt;/ref&gt;<br /> :*Use microphones on device to collect ambient background noise and conversations<br /> *Activate phone or computer cameras<br /> *Hijack telephone GPS systems to monitor target's location<br /> *Infect target computer's [[UEFI]] [[BIOS]] [[firmware]] with a [[rootkit]]&lt;ref&gt;{{Cite web|first=Philippe |last=Lin |url=http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-uses-uefi-bios-rootkit-to-keep-rcs-9-agent-in-target-systems/ |title=HackingTeam Uses UEFI BIOS Rootkit to Keep RCS 9 Agent in Target Systems |work=TrendLabs Security Intelligence Blog |publisher=[[Trend Micro]] |date=July 13, 2015 |accessdate=July 26, 2015}}&lt;/ref&gt;<br /> *Extract WiFi passwords&lt;ref name=skiddies&gt;[http://arstechnica.com/security/2015/07/advanced-spyware-for-android-now-available-to-script-kiddies-everywhere/ &quot;Advanced spyware for Android now available to script kiddies everywhere&quot;]. ''Ars Technica''. Retrieved on 2 August 2015.&lt;/ref&gt;<br /> *Exfiltrate [[Bitcoin]] and other cryptocurrency wallet files to collect data on local accounts, contacts and transaction histories.&lt;ref name=coin&gt;Farivar, Cyrus (14 July 2015). &quot;''[http://arstechnica.com/security/2015/07/hacking-team-broke-bitcoin-secrecy-by-targeting-crucial-wallet-file/ HackingTeam broke Bitcoin secrecy by targeting crucial wallet file]''&quot;. ''Ars Technica''. Retrieved 26 July 2015.&lt;/ref&gt;<br /> <br /> HackingTeam uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.&lt;ref&gt;{{cite news|last1=Schneier|first1=Bruce|title=More on HackingTeam's Government Spying Software|url=https://www.schneier.com/blog/archives/2014/06/more_on_hacking.html}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=http://www.ibtimes.co.uk/hacking-team-tools-allow-governments-take-full-control-your-smartphone-1453987|title=HackingTeam Tools Allow Governments To Take Full Control of Your Smartphone|date=2014-06-24|website=International Business Times UK|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> The malware has payloads for [[Android (operating system)|Android]],&lt;ref name=skiddies/&gt; [[BlackBerry]], Apple [[iOS]], [[Linux]], [[Mac OS X]], [[Symbian]], as well as [[Microsoft Windows]], [[Windows Mobile]] and [[Windows Phone]] class of [[operating system]]s.&lt;ref name=C3&gt;Guarnieri, Claudio; Marquis-Boire, Morgan (13 January 2014). ''[https://media.ccc.de/browse/congress/2013/30C3_-_5439_-_en_-_saal_1_-_201312292105_-_to_protect_and_infect_-_claudio_guarnieri_-_morgan_marquis-boire.html &quot;To Protect And Infect: The militarization of the Internet&quot;]''. At the 30th [[Chaos Communications Congress]] – &quot;30C3&quot;. (Video or Audio). [[Chaos Computer Club]]. Retrieved on 15 August 2015.&lt;/ref&gt;<br /> <br /> RCS is a management platform that allows operators to remotely deploy exploits and payloads against targeted systems, remotely manage devices once compromised, and exfiltrate data for remote analysis.<br /> <br /> == Controversies ==<br /> <br /> === Use by repressive governments ===<br /> HackingTeam has been criticized for selling its products and services to governments with poor human rights records, including [[Sudan]], [[Bahrain]], and [[Saudi Arabia]].&lt;ref name=repress/&gt;<br /> <br /> In June 2014, a United Nations panel monitoring the implementation of sanctions on Sudan requested information from HackingTeam about their alleged sales of software to the country in contravention of United Nations weapons export bans to Sudan. Documents leaked in the 2015 data breach of HackingTeam revealed the organization sold Sudanese National Intelligence and Security Service access to their &quot;Remote Control System&quot; software in 2012 for 960,000 Euros.&lt;ref name=repress/&gt;&lt;ref&gt;{{Cite web|url=https://theintercept.com/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/|title=A Detailed Look at HackingTeam’s Emails About Its Repressive Clients|last=Hay Newman|first=Lily|website=The Intercept|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> In response to the United Nations panel, the company responded in January 2015 that they were not currently selling to Sudan. In a follow-up exchange, HackingTeam asserted that their product was not controlled as a weapon, and so the request was beyond the scope of the panel. There was no need for them to disclose previous sales, which they considered confidential business information.&lt;ref name=repress&gt;{{Cite web |title=A Detailed Look at HackingTeam’s Emails About Its Repressive Clients |url=https://firstlook.org/theintercept/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/ |accessdate=7 July 2015 |first1=Cora |last1=Currier |first2=Morgan |last2=Marquis-Boire}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://www.eff.org/deeplinks/2015/07/hacking-team-leaks-reveal-spyware-industrys-growth|title=HackingTeam Leaks Reveal Spyware Industry's Growth, Negligence of Human Rights|last=Myers West|first=Sarah|date=2015-07-08|website=Electronic Frontier Foundation|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> The U.N. disagreed. &quot;The view of the panel is that as such software is ideally suited to support military electronic intelligence (ELINT) operations it may potentially fall under the category of ‘military … equipment’ or ‘assistance’ related to prohibited items,&quot; the secretary wrote in March. &quot;Thus its potential use in targeting any of the belligerents in the Darfur conflict is of interest to the Panel.&quot;&lt;ref name=repress/&gt;&lt;ref&gt;{{Cite web|url=http://gizmodo.com/hacking-teams-lame-excuse-for-selling-digital-weapons-t-1716375503|title=HackingTeam's Lame Excuse for Selling Digital Weapons to Sudan|last=Knibbs|first=Kate|date=2015-07-08|website=Gizmodo|language=en-US|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> In the fall of 2014, the Italian government abruptly froze all of HackingTeam's exports, citing human rights concerns. After lobbying Italian officials, the company temporarily won back the right to sell its products abroad.&lt;ref name=repress/&gt;<br /> <br /> === 2015 data breach ===<br /> On July 5, 2015, the [[Twitter]] account of the company was compromised by an unknown individual who published an announcement of a [[data breach]] against HackingTeam's computer systems. The initial message read, &quot;''Since we have nothing to hide, we're publishing all our e-mails, files, and source code …''&quot; and provided links to over 400 [[gigabyte]]s of data, including alleged internal e-mails, invoices, and [[source code]]; which were leaked via [[BitTorrent]] and [[Mega (service)|Mega]].&lt;ref&gt;{{Wayback|url=https://twitter.com/hackingteam|title=Hacked Team (@hackingteam)|date=20150706010312}}&lt;/ref&gt; An announcement of the data breach, including a link to the bittorrent seed, was retweeted by [[WikiLeaks]] and by many others through social media.&lt;ref&gt;{{Twitter status|wikileaks|617865712611233792|Inside malware makers &quot;HackingTeam&quot;: hundreds of gigabytes of e-mails, files, and source code|[[WikiLeaks]]|July 6, 2015|July 6, 2015}}&lt;/ref&gt;&lt;ref name=&quot;ibtimes.co.uk&quot;&gt;{{Cite web|url=http://www.ibtimes.co.uk/hacking-team-hacked-spy-tools-sold-oppressive-regimes-sudan-bahrain-kazakhstan-1509460|title=HackingTeam hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan|date=2015-06-06|publisher=International Business Times|accessdate=2015-07-06}}&lt;/ref&gt;<br /> <br /> The material was voluminous and early analysis appeared to reveal that HackingTeam had invoiced the [[Lebanese Army]]&lt;ref&gt;{{Twitter|url=https://twitter.com/SynAckPwn/status/617955067006578689}} {{dead link|date=July 2015}}&lt;/ref&gt; and [[Sudan]] and that spy tools were also sold to [[Bahrain]] and [[Kazakhstan]].&lt;ref name=&quot;ibtimes.co.uk&quot;/&gt; HackingTeam had previously claimed they had never done business with Sudan.&lt;ref&gt;{{Cite web|title = HackingTeam hacked, attackers claim 400GB in dumped data|url = http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html|accessdate = 2015-07-06|first = Steve|last = Ragan}}&lt;/ref&gt;<br /> <br /> The leaked data revealed a [[zero-day (computing)|zero-day]] cross-platform Flash exploit ([[Common Vulnerabilities and Exposures|CVE]] number: CVE-2015-5119).&lt;ref&gt;{{Cite web|title = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html|url = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html}}&lt;/ref&gt; The dump included a demo of this exploit by opening [[Calculator (computer program)|Calculator]] from a test webpage.&lt;ref&gt;{{Cite web|title = Zero-Day Flash Player Exploit Disclosed In 'HackingTeam' Data Dump|url = http://thehackernews.com/2015/07/flash-zero-day-vulnerability.html|accessdate = 2015-07-06|first = Swati|last = Khandelwal}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Unpatched Flash Player Flaw, More POCs Found in HackingTeam Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/|accessdate = 2015-07-08|first = Peter|last = Pi}}&lt;/ref&gt; Adobe [[software patch|patched]] the hole on July 8, 2015.&lt;ref&gt;{{Cite web|title = Adobe Security Bulletin|url = https://helpx.adobe.com/security/products/flash-player/apsb15-16.html|accessdate = 2015-07-11|last = Adobe Systems (corporate author)}}&lt;/ref&gt; Another vulnerability involving Adobe was revealed in the dumps, which took advantage of a [[buffer overflow]] attack on an Adobe Open Type Manager [[Dynamic-link library|DLL]] included with [[Microsoft Windows]]. The DLL is run in [[protection ring|kernel mode]], so the attack could perform [[privilege escalation]] to bypass the [[sandbox (computer security)|sandbox]].&lt;ref&gt;{{Cite web|title = A Look at the Open Type Font Manager Vulnerability from the HackingTeam Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-the-open-type-font-manager-vulnerability-from-the-hacking-team-leak/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29|accessdate = 2015-07-08|first = Jack|last = Tang}}&lt;/ref&gt;<br /> <br /> Also revealed in leaked data was HackingTeam employees' use of weak passwords, including 'P4ssword', 'wolverine', and 'universo'.&lt;ref&gt;{{Cite web|title = HackingTeam used shockingly bad passwords|url = http://www.zdnet.com/article/no-wonder-hacking-team-got-hacked/|accessdate = 2015-07-06|first = Zack|last = Whittaker}}&lt;/ref&gt;<br /> <br /> After a few hours without response from HackingTeam, member Christian Pozzi tweeted the company was working closely with police and &quot;''what the attackers are claiming regarding our company is not true.''&quot;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964180042190848|accessdate = 2015-07-06}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964660705234944|accessdate = 2015-07-06}}&lt;/ref&gt; He also claimed the leaked archive &quot;contains a virus&quot; and that it constituted &quot;false info&quot;.&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617962663188926465|accessdate = 2015-07-06}}&lt;/ref&gt; Shortly after these tweets, Pozzi's Twitter account itself was apparently compromised.&lt;ref&gt;{{Cite web|title=Christian Pozzi on Twitter: &quot;Uh Oh - my twitter account was also hacked.&quot; |url=https://twitter.com/christian_pozzi/status/617977753250496512 |date=2015-07-06 |accessdate=2015-07-06 |deadurl=yes |archiveurl=https://web.archive.org/web/20150706084837/https://twitter.com/christian_pozzi/status/617977753250496512 |archivedate=July 6, 2015 }}&lt;/ref&gt;<br /> <br /> Responsibility for this attack was claimed by the hacker known as &quot;Phineas Fisher&quot; (or Phisher) on Twitter.&lt;ref&gt;{{cite tweet | user=gammagrouppr | author=Phineas Fisher | number=617937092497178624 | title=gamma and HT down, a few more to go :) | date=6 July 2015}}&lt;/ref&gt; Phineas has previously attacked spyware firm [[Gamma International]], who produce malware, such as [[FinFisher]], for governments and corporations.&lt;ref&gt;{{Cite web|title = HackingTeam: We won't 'shrivel up and go away' after cyberattack|url = http://www.zdnet.com/article/hacking-team-cyberattack-aftermath-interview/|accessdate = 2015-07-06|first = Charlie|last = Osbourne}}&lt;/ref&gt; In 2016, Phineas published details of the attack, in Spanish and English, as a &quot;how-to&quot; for others, and explained the motivations behind the attack.&lt;ref&gt;{{Cite web|url=http://arstechnica.com/security/2016/04/how-hacking-team-got-hacked-phineas-phisher/|title=How HackingTeam got hacked|website=Ars Technica|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> The internal documents revealed details of HackingTeam's contracts with repressive governments.&lt;ref&gt;{{Cite web|url=https://theintercept.com/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/|title=A Detailed Look at HackingTeam’s Emails About Its Repressive Clients|website=The Intercept|access-date=2016-05-15}}&lt;/ref&gt; In 2016, the Italian government again revoked the company’s license to sell spyware outside of Europe without special permission.&lt;ref name=&quot;:0&quot;&gt;{{Cite web|url=https://nakedsecurity.sophos.com/2016/04/08/hacking-team-loses-global-license-to-sell-spyware/|title=HackingTeam loses global license to sell spyware|last=Zorabedian|first=John|date=2016-04-08|website=Naked Security|access-date=2016-05-15}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://www.privacyinternational.org/node/826|title=HackingTeam’s Global License Revoked by Italian Export Authorities {{!}} Privacy International|website=www.privacyinternational.org|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> == Customer List ==<br /> HackingTeam's clientele include not just governments, but also corporate clients such as [[Barclay's]] Bank and [[British Telecom]] (BT) of the [[United Kingdom]], as well as [[Deutsche Bank]] of [[Germany]].&lt;ref name=spies/&gt;<br /> <br /> A full list of HackingTeam's customers were leaked in the 2015 breach. Disclosed documents show HackingTeam had 70 current customers, mostly military, police, federal and provincial governments. The total company revenues disclosed exceeded 40 million [[Euro]]s.&lt;ref&gt;{{cite web |author=Kopstein, Justin |title= Here Are All the Sketchy Government Agencies Buying HackingTeam's Spy Tech |url=http://motherboard.vice.com/read/here-are-all-the-sketchy-government-agencies-buying-hacking-teams-spy-tech |publisher=Vice Magazine |date=6 July 2015<br /> }}&lt;/ref&gt;&lt;ref&gt;{{cite web |author=Weissman, Cale Guthrie |title=Hacked security company's documents show a laundry list of questionable clients |url=http://www.businessinsider.com/hacked-security-companys-document-2015-7 |date=6 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |author=Ragan, Steve |title=In Pictures: HackingTeam's hack curated |url=http://www.cso.com.au/slideshow/579158/pictures-hacking-team-hack-curated/?image=9 |publisher=CSO Online (Australia)}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=HackingTeam hacked: firm sold spying tools to repressive regimes, documents claim |url=http://www.theguardian.com/technology/2015/jul/06/hacking-team-hacked-firm-sold-spying-tools-to-repressive-regimes-documents-claim |author=Hern, Alex |publisher=''The Guardian'' |date=6 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=HackingTeam responds to data breach, issues public threats and denials |url=http://www.csoonline.com/article/2944333/data-breach/hacking-team-responds-to-data-breach-issues-public-threats-and-denials.html |author=Ragan, Steve |publisher=''CSO Online'' |date=6 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=A whole bunch of downed government surveillance programs are about to go back online |url=http://www.businessinsider.com/hacking-team-promises-customers-they-can-resume-surveillance-operations-soon-2015-7 |author=Stevenson, Alastair |publisher=''Business Insider'' |date=14 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;<br /> <br /> {| class=&quot;wikitable sortable&quot;<br /> |-<br /> ! Customer<br /> ! Country<br /> ! Area<br /> ! Agency<br /> ! Year First Sale<br /> ! Annual Maintenance Fees<br /> ! Total Client Revenues<br /> |-<br /> | [[Polizia Postale e delle Comunicazioni]]&lt;ref&gt;Jone Pierantonio. [http://it.ibtimes.com/cyber-space/ecco-chi-ha-bucato-hacking-team-1408915 &quot;Ecco chi ha bucato HackingTeam&quot;]. ''International Business Times''. Retrieved on 2 August 2015.&lt;/ref&gt;||Italy||Europe||LEA||2004||€100,000||€808,833<br /> |-<br /> | [[Centro Nacional de Inteligencia]]&lt;ref&gt;Ediciones El País (8 July 2015). [http://internacional.elpais.com/internacional/2015/07/08/actualidad/1436343710_282978.html &quot;HackingTeam: “Ofrecemos tecnología ofensiva para la Policía”&quot;]. ''EL PAÍS''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Spain]]||Europe||Intelligence||2006||€52,000||€538,000<br /> |-<br /> | [[Infocomm Development Authority of Singapore]]||[[Singapore]]||APAC||Intelligence||2008||€89,000||€1,209,967<br /> |-<br /> | Information Office||[[Hungary]]||Europe||Intelligence||2008||€41,000||€885,000<br /> |-<br /> | CSDN||[[Morocco]]||MEA||Intelligence||2009||€140,000||€1,936,050<br /> |-<br /> | UPDF (Uganda Peoples Defense Force), ISO (Internal Security Organization), Office of the President||[[Uganda]]||Africa||Intelligence||2015||€831,000||€52,197,100<br /> |-<br /> | Italy - DA - Rental||Italy||Europe||Other||2009||€50,000||€628,250<br /> |-<br /> | [[Malaysian Anti-Corruption Commission]]||[[Malaysia]]||APAC||Intelligence||2009||€77,000||€789,123<br /> |-<br /> | PCM||Italy||Europe||Intelligence||2009||€90,000||€764,297<br /> |-<br /> | SSNS - Ungheria||Hungary||Europe||Intelligence||2009||€64,000||€1,011,000<br /> |-<br /> | CC - Italy||Italy||Europe||LEA||2010||€50,000||€497,349<br /> |-<br /> | [[Al Mukhabarat Al A'amah]]||[[Saudi Arabia]]||MEA||Intelligence||2010||€45,000||€600,000<br /> |-<br /> | IR Authorities (Condor)||[[Luxembourg]]||Europe||Other||2010||€45,000||€446,000<br /> |-<br /> | La Dependencia y/o CISEN&lt;ref&gt;[http://fusion.net/story/163872/the-hacking-team-leak-shows-mexico-was-the-top-client-but-why/ &quot;The HackingTeam leak shows Mexico was its top client, but why?&quot;]. ''Fusion''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Mexico]]||LATAM||Intelligence||2010||€130,000||€1,390,000<br /> |-<br /> | UZC&lt;ref name=fortune/&gt; ||[[Czech Republic]] ||Europe||LEA||2010||€55,000||€689,779<br /> |-<br /> | Egypt - MOD&lt;ref name=fortune/&gt;||[[Egypt]]||MEA||Other||2011||€70,000||€598,000<br /> |-<br /> | [[Federal Bureau of Investigation]]&lt;ref name=fbidea/&gt;||USA||North America||LEA||2011||€100,000||€697,710<br /> |-<br /> | Oman - Intelligence||[[Oman]]||MEA||Intelligence||2011||€30,000||€500,000<br /> |-<br /> | President Security&lt;ref&gt;[http://motherboard.vice.com/read/hacking-teams-equipment-got-stolen-in-panama &quot;HackingTeam's Equipment Got Stolen in Panama&quot;]. ''Motherboard''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref&gt;Molina, Thabata (13 August 2015). ''[http://panampost.com/thabata-molina/2015/08/13/panama-to-investigate-martinelli-in-hacking-team-spying-scandal/ &quot;Panama to Investigate Martinelli in HackingTeam Spying Scandal&quot;]''. ''Panama Post''. Retrieved 15 August 2015.&lt;/ref&gt;<br /> ||[[Panama]]||LATAM||Intelligence||2011||€110,000||€750,000<br /> |-<br /> | [[Turkish National Police]]||[[Turkey]]||Europe||LEA||2011||€45,000||€440,000<br /> |-<br /> | UAE - MOI||[[United Arab Emirates|UAE]]||MEA||LEA||2011||€90,000||€634,500<br /> |-<br /> | [[National Security Service (Uzbekistan)|National Security Service]]&lt;ref name=fortune&gt;[http://fortune.com/2015/07/16/governments-used-spy-software/ &quot;Leaked emails from security firm HackingTeam show government use - Fortune&quot;]. ''Fortune''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Uzbekistan]]||Europe||Intelligence||2011||€50,000||€917,038<br /> |-<br /> | [[United States Department of Defense|Department of Defense]]&lt;ref name=fbidea/&gt;||USA||North America||LEA||2011||||€190,000<br /> |-<br /> | Bayelsa State Government||[[Nigeria]]||MEA||Intelligence||2012||€75,000||€450,000<br /> |-<br /> | Estado del Mexico||Mexico||LATAM||LEA||2012||€120,000||€783,000<br /> |-<br /> | Information Network Security Agency||[[Ethiopia]]||MEA||Intelligence||2012||€80,000||€750,000<br /> |-<br /> | State security (Falcon)||Luxemburg||Europe||Other||2012||€38,000||€316,000<br /> |-<br /> | Italy - DA - Rental||Italy||Europe||Other||2012||€60,000||€496,000<br /> |-<br /> | MAL - MI||Malaysia||APAC||Intelligence||2012||€77,000||€552,000<br /> |-<br /> | [[Direction générale de la surveillance du territoire]]||Morocco||MEA||Intelligence||2012||€160,000||€1,237,500<br /> |-<br /> | [[National Intelligence and Security Service]]&lt;ref name=fortune/&gt;||[[Sudan]]||MEA||Intelligence||2012||€76,000||€960,000<br /> |-<br /> | Russia - KVANT&lt;ref name=kvant&gt;[http://arstechnica.com/tech-policy/2015/07/hacking-teams-surveillance-software-sold-to-kgb-successor/ &quot;HackingTeam apparently violated EU rules in sale of spyware to Russian agency&quot;]. ''Ars Technica''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Russia]]||Europe||Intelligence||2012||€72,000||€451,017<br /> |-<br /> | Saudi - GID||Saudi||MEA||LEA||2012||€114,000||€1,201,000<br /> |-<br /> | SIS of [[National Security Committee of the Republic of Kazakhstan|National Security Committee of Kazakhstan]]&lt;ref name=fortune/&gt;||[[Kazakhstan]]||Europe||Intelligence||2012||€140,000||€1,012,500<br /> |-<br /> | The 5163 Army Division (Alias of South Korean National Intelligence Service)&lt;ref name=fortune/&gt;&lt;ref name=torbrowser&gt;[https://firstlook.org/theintercept/2015/07/16/hackingteam-attacked-tor-browser/ &quot;How HackingTeam Created Spyware that Allowed the FBI To Monitor Tor Browser&quot;]. ''The Intercept''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref name=wswskorea&gt;McGrath, Ben (25 July 2015). &quot;''[https://www.wsws.org/en/articles/2015/07/25/kore-j25.html Further revelations in South Korean hacking scandal]''&quot;. ''World Socialist Web Site''. Retrieved 26 July 2015.&lt;/ref&gt;||[[South Korea|S. Korea]]||APAC||Other||2012||€67,000||€686,400<br /> |-<br /> | UAE - Intelligence||[[United Arab Emirates|UAE]]||MEA||Other||2012||€150,000||€1,200,000<br /> |-<br /> | [[Drug Enforcement Administration]]&lt;ref name=fbidea&gt;[https://firstlook.org/theintercept/2015/07/06/hacking-team-spyware-fbi/ &quot;Leaked Documents Show FBI, DEA and U.S. Army Buying Italian Spyware&quot;]. ''The Intercept''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref name=dea&gt;[http://motherboard.vice.com/read/the-dea-just-cancelled-its-contract-with-hacking-team &quot;The DEA Just Cancelled Its Contract With HackingTeam&quot;]. ''Motherboard''. Retrieved on 2 August 2015.&lt;/ref&gt;||USA||North America||Other||2012||€70,000||€567,984<br /> |-<br /> | [[Central Anticorruption Bureau]]||[[Poland]]||Europe||LEA||2012||€35,000||€249,200<br /> |-<br /> | MOD Saudi||Saudi||MEA||Other||2013||€220,000||€1,108,687<br /> |-<br /> | PMO||Malaysia||APAC||Intelligence||2013||€64,500||€520,000<br /> |-<br /> | Estado de Qeretaro||Mexico||LATAM||LEA||2013||€48,000||€234,500<br /> |-<br /> | National Security Agency&lt;ref name=fortune/&gt;||[[Azerbaijan]]||Europe||Intelligence||2013||€32,000||€349,000<br /> |-<br /> | Gobierno de Puebla||Mexico||LATAM||Other||2013||€64,000||€428,835<br /> |-<br /> | Gobierno de Campeche||Mexico||LATAM||Other||2013||€78,000||€386,296<br /> |-<br /> | AC Mongolia||[[Mongolia]]||APAC||Intelligence||2013||€100,000||€799,000<br /> |-<br /> | Dept. of Correction Thai Police ||[[Thailand]]||APAC||LEA||2013||€52,000||€286,482<br /> |-<br /> | [[National Intelligence Secretariat (Ecuador)|National Intelligence Secretariat]]&lt;ref&gt;<br /> *{{cite|url=http://panampost.com/rebeca-morla/2015/07/13/ecuadorian-websites-report-on-hacking-team-get-taken-down/}}&lt;br /&gt;<br /> *{{cite|url=http://panampost.com/panam-staff/2015/08/10/hacking-team-helped-ecuador-spy-on-opposition-activist/}}&lt;br /&gt;<br /> *{{cite|url=http://bigstory.ap.org/article/6f41d49888174b45857d34511fda1caf/apnewsbreak-email-leak-suggests-ecuador-spied-opposition}}<br /> &lt;/ref&gt;<br /> ||[[Ecuador]]||LATAM||LEA||2013||€75,000||€535,000<br /> |-<br /> | Police Intelligence Directorate&lt;ref name=dipol_telesur&gt;Podour, Justin (23 July 2015). [http://www.telesurtv.net/opinion/HackedTeam-y-Colombia-Como-la-vigilancia-ayuda-a-un-Estado-violento-20150723-0062.html #HackedTeam y Colombia: Cómo la vigilancia ayuda a un Estado violento]. ''Telesur''. Retrieved 26 July 2015.&lt;/ref&gt;||[[Colombia]]||LATAM||LEA||2013||€35,000||€335,000<br /> |-<br /> | [[Guardia di Finanza]]||Italy||Europe||LEA||2013||€80,000||€400,000<br /> |-<br /> | Intelligence&lt;ref name=cyprus&gt;In Cyprus (11 July 2015).[http://in-cyprus.com/intelligence-service-chief-steps-down/ Intelligence Service chief steps down]. Retrieved 26 July 2015.&lt;/ref&gt;||[[Cyprus]]||Europe||LEA||2013||€40,000||€375,625<br /> |-<br /> | MidWorld&lt;ref name=ifex&gt;Bahrain Center for Human Rights (15 July 2015). &quot;''[https://www.ifex.org/bahrain/2015/07/15/bahrain_hacking_team HackingTeam's troubling connections to Bahrain]''&quot; IFEX. Retrieved 26 July 2015.&lt;/ref&gt;||[[Bahrain]]||MEA||Intelligence||2013||||€210,000<br /> |-<br /> | Mexico - PEMEX||Mexico ||LATAM||LEA ||2013||||€321,120<br /> |-<br /> | Malysia K||Malaysia||APAC||LEA||2013||||€0<br /> |-<br /> | Honduras||[[Honduras]]||LATAM||LEA||2014||||€355,000<br /> |-<br /> | Mex Taumalipas||Mexico||LATAM||||2014||||€322,900<br /> |-<br /> | Secretaría de Planeación y Finanzas||Mexico||LATAM||LEA||2014||€91,000||€371,035<br /> |-<br /> | AREA||Italia||Europe||||2014||||€430,000<br /> |-<br /> | Mexico Yucatán||Mexico||LATAM||LEA||2014||||€401,788<br /> |-<br /> | Mexico Durango||Mexico||LATAM||LEA||2014||||€421,397<br /> |-<br /> | [[Investigations Police of Chile]]||[[Chile]]||LATAM||LEA||2014||||€2,289,155<br /> |-<br /> | Jalisco Mexico||Mexico||LATAM||LEA||2014||||€748,003<br /> |-<br /> | [[Royal Thai Army]]||Thailand||APAC||LEA||2014||||€360,000<br /> |-<br /> | Vietnam GD5||[[Vietnam]]||APAC||||2014||||€281,170<br /> |-<br /> | [[Kantonspolizei Zürich]]||Switzerland||Europe||LEA||2014||||€486,500<br /> |-<br /> | Vietnam GD1||Vietnam||APAC||LEA||2015||||€543,810<br /> |-<br /> | Egypt TRD GNSE||Egypt||MEA||LEA||2015||||€137,500<br /> |-<br /> | [[Lebanese Armed Forces|Lebanese Army]]||[[Lebanon]]||MEA||LEA||2015||||<br /> |-<br /> | [[Federal Police Department]]||Brazil||LATAM||LEA||2015||||<br /> |-<br /> | [[SHISH|State Informative Service]]&lt;ref&gt;Lexime (14 July 2015). &quot;''[http://www.balkanweb.com/site/burime-te-sigurta-shish-perdor-programet-pergjuese-qe-prej-2015-hacking-teams-nuk-e-kemi-nen-kontroll-sistemin/ Burime të sigurta, SHISH përdor programet përgjuese që prej 2015. HackingTeams: Nuk e kemi nën kontroll sistemin!]''&quot; (video). BalkanWeb. Retrieved 27 July 2015.&lt;/ref&gt;||[[Albania]]||Europe||SHIK||2015||||<br /> |}<br /> <br /> == See also ==<br /> * [[FinFisher]]<br /> * [[MiniPanzer and MegaPanzer]]<br /> * [[Vupen]] – 0-day exploit provider linked to HackingTeam&lt;ref&gt;[https://tsyrklevich.net/2015/07/22/hacking-team-0day-market/ HackingTeam: a zero-day market case study], Vlad Tsyrklevich's blog&lt;/ref&gt;<br /> * ''[[Mamfakinch]]'' – a citizen media organization targeted with malware allegedly developed by HackingTeam&lt;ref&gt;Perlroth, Nicole (10 October 2012). [http://bits.blogs.nytimes.com/2012/10/10/ahead-of-spyware-conference-more-evidence-of-abuse/?_r=0 Ahead of Spyware Conference, More Evidence of Abuse]. ''New York Times'' (Bits).&lt;/ref&gt;<br /> <br /> ==References==<br /> {{reflist|3}}<br /> <br /> == External links ==<br /> * {{Official website| http://www.hackingteam.it/}}<br /> * [https://citizenlab.org/tag/hacking-team/ HackingTeam Archives] - investigative reports published by The [[Citizen Lab]]<br /> * [https://wikileaks.org/hackingteam/emails WikiLeaks: ''The Hackingteam Archives''] - searchable database of 1 million internal emails<br /> * [https://wikileaks.org/spyfiles/list/company-name/hackingteam.html HackingTeam presentations] in the [[WikiLeaks]] &quot;''Spy Files''&quot;<br /> {{Hacking in the 2010s}}<br /> <br /> [[Category:Computer security software]]<br /> [[Category:Spyware]]<br /> [[Category:Surveillance]]<br /> [[Category:Trojan horses]]<br /> [[Category:Espionage techniques]]<br /> [[Category:Espionage devices]]<br /> [[Category:Malware toolkits]]<br /> [[Category:Computer access control]]<br /> [[Category:Cyberwarfare]]<br /> [[Category:Espionage scandals and incidents]]<br /> [[Category:Companies based in Milan]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=HackingTeam&diff=177175005 HackingTeam 2016-06-18T17:47:48Z <p>Dsprc: </p> <hr /> <div>{{Infobox company<br /> | name = HackingTeam<br /> | logo = Hacking Team logo.png<br /> | logo_size = <br /> | logo_alt = The words Hacking Team enclosed with in reversed square brackets &lt;nowiki&gt;][&lt;/nowiki&gt;<br /> | logo_caption = Company logo<br /> | logo_padding = <br /> | image = <br /> | image_size = <br /> | image_alt = <br /> | image_caption = <br /> | type = <br /> | industry = [[Information technology]]<br /> | founded = 2003<br /> | founders = David Vincenzetti, Valeriano Bedeschi<br /> | hq_location = <br /> | hq_location_city = [[Milan]]<br /> | hq_location_country = [[Italy]]<br /> | area_served = &lt;!-- or: | areas_served = --&gt;<br /> | key_people = Alberto Ornaghi (ALoR), Marco Valleri (NaGA)<br /> | products = {{unbulleted list|Software}}<br /> | brands = <br /> | services = <br /> | owner = &lt;!-- or: | owners = --&gt;<br /> | website = {{URL|http://www.hackingteam.it/}}<br /> }}<br /> '''HackingTeam''' is a [[Milan]]-based [[information technology]] company that sells offensive intrusion and [[surveillance]] capabilities to governments, law enforcement agencies and corporations.&lt;ref name=spies&gt;{{cite web |title=The spies behind your screen |url=http://www.telegraph.co.uk/technology/8899353/The-spies-behind-your-screen.html |author=Batey, Angus |date=24 November 2011 |publisher=''The Telegraph'' |accessdate=26 July 2015}}&lt;/ref&gt; Its &quot;''Remote Control Systems''&quot; enable governments and corporations to monitor the communications of internet users, decipher their [[cryptography|encrypted]] files and emails, record [[Skype]] and other [[Voice over IP]] communications, and remotely activate microphones and camera on target computers.&lt;ref&gt;{{cite web|title=Enemies of the Internet: HackingTeam|url=http://surveillance.rsf.org/en/hacking-team/|work=[[Reporters Without Borders]]|accessdate=24 April 2014}}&lt;/ref&gt; The company has been criticized for providing these capabilities to governments with poor [[human rights]] records.&lt;ref&gt;{{cite web | last3 = Marquis-Boire | first3 = Morgan | last1 = Marczak | first1 = Bill | last2 = Gaurnieri | first2 = Claudio | last4 = Scott-Railton | first4 = John | title = Mapping HackingTeam's &quot;Untraceable&quot; Spyware | url = https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ | date = February 17, 2014}}&lt;/ref&gt; HackingTeam states that they have the ability to disable their software if it is used unethically.&lt;ref&gt;{{cite news|url=http://www.newyorker.com/online/blogs/elements/2014/03/hacked-by-ones-own-government.html|title=Hackers Without Borders|last=Kopstein|first=Joshua|work=[[The New Yorker]]|date=10 March 2014|accessdate=24 April 2014}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url = https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/|title = Police Story: HackingTeam’s Government Surveillance Malware|date = June 24, 2014|accessdate = August 3, 2014|website = Citizen Lab|publisher = University of Toronto|last1 = Marquis-Boire|first1 = Morgan | last2 = Gaurnieri | first2 = Claudio | first3 = John | last3 = Scott-Railton | first4 = Katie | last4 = Kleemola }}&lt;/ref&gt; The Italian government has restricted their license to do business with countries outside Europe.&lt;ref name=&quot;:0&quot; /&gt;<br /> <br /> HackingTeam employs around 40 people in its Italian office, and has subsidiary branches in [[Annapolis]], [[Washington, D.C.]] and [[Singapore]].&lt;ref name=know&gt;''[[Human Rights Watch]]'' (25 March 2014). ''&quot;[https://www.hrw.org/report/2014/03/25/they-know-everything-we-do/telecom-and-internet-surveillance-ethiopia They Know Everything We Do]&quot;''. Retrieved 1 August 2015.&lt;/ref&gt; Its products are in use in dozens of countries across six continents.&lt;ref name=Jeffries&gt;{{cite web|last=Jeffries|first=Adrianne|title=Meet HackingTeam, the company that helps the police hack you|url=http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers|accessdate=21 April 2014|work=[[The Verge]]|date=13 September 2013}}&lt;/ref&gt;<br /> <br /> ==History==<br /> HackingTeam was started by two Italian programmers: Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri (under the aliases of ALoR, and NaGA respectively), created a set of tools that could be used to monitor and remotely manipulate target computers. The program, called [[Ettercap (software)|Ettercap]], was embraced both by [[Hacker (term)|hackers]] looking to spy on people, and by companies that hoped to test the security of their own networks.<br /> <br /> The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their [[Skype]] calls, the police contacted Ornaghi and Valleri and asked them to help modify the program. HackingTeam was born, and became &quot;the first sellers of commercial hacking software to the police.&quot;&lt;ref name=Jeffries/&gt;<br /> <br /> According to former employee Alberto Pelliccione, the company began as security services provider, offering [[penetration testing]], auditing and other defensive capabilities to clients.&lt;ref name=war&gt;Farivar, Cyrus (20 July 2015) [http://arstechnica.com/security/2015/07/italian-prosecutors-investigate-former-hacking-team-employees-for-role-in-hack/ HackingTeam goes to war against former employees, suspects some helped hackers]. ''Ars Technica''. Retrieved 26 July 2015.&lt;/ref&gt; Pelliccione states that as malware and other offensive capabilities were developed and accounted for a larger percentage of revenues, the organization pivoted in a more offensive direction and became increasingly compartmentalized. Pelliccione claims fellow employees working on aspects of the same platform - for example, Android exploits and payloads - would not communicate with one another, possibly leading to tensions and strife within the organization.&lt;ref name=war/&gt;<br /> <br /> In February 2014, a report from [[Citizen Lab]] identified the organisation to be using hosting services from [[Linode]], [[Telecom Italia]], [[Rackspace]], [[NOC4Hosts]] and notorious [[bullet proof hosting]] company [[Santrex]].&lt;ref&gt;{{cite news|title=HackingTeam’s US Nexus|url=https://citizenlab.org/2014/02/hacking-teams-us-nexus/|accessdate=2 August 2015|date=28 February 2014}}&lt;/ref&gt;<br /> <br /> On July 5, 2015 the company suffered a major data breach of customer data, software code, internal documents and emails. - ''See: [[#2015 data breach|§ 2015 data breach]]''<br /> <br /> ==Products and capabilities==<br /> HackingTeam enables clients to perform remote monitoring functions against citizens via their [[Remote administration tool|RCS (Remote Control Systems)]], including their '''Da Vinci''' and '''Galileo''' platforms:&lt;ref name=spies/&gt;<br /> <br /> *Covert collection of emails, text message, phone call history and address books<br /> *[[Keystroke logging]]<br /> *Uncover search history data and take screenshots<br /> *Record audio from phone calls<br /> :*Capture audio and video stream from device memory to bypass [[cryptography]] of [[Skype]] sessions&lt;ref&gt;{{cite web | title=Mideast Uses Western Tools to Battle the Skype Rebellion |url=http://www.wsj.com/articles/SB10001424052702304520804576345970862420038 |author1=Stecklow, Steve |author2=Sonne, Paul |author3=Bradley, Matt |date=1 June 2011 |publisher=''Wall Street Journal'' |accessdate=26 July 2015}}&lt;/ref&gt;<br /> :*Use microphones on device to collect ambient background noise and conversations<br /> *Activate phone or computer cameras<br /> *Hijack telephone GPS systems to monitor target's location<br /> *Infect target computer's [[UEFI]] [[BIOS]] [[firmware]] with a [[rootkit]]&lt;ref&gt;{{Cite web|first=Philippe |last=Lin |url=http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-uses-uefi-bios-rootkit-to-keep-rcs-9-agent-in-target-systems/ |title=HackingTeam Uses UEFI BIOS Rootkit to Keep RCS 9 Agent in Target Systems |work=TrendLabs Security Intelligence Blog |publisher=[[Trend Micro]] |date=July 13, 2015 |accessdate=July 26, 2015}}&lt;/ref&gt;<br /> *Extract WiFi passwords&lt;ref name=skiddies&gt;[http://arstechnica.com/security/2015/07/advanced-spyware-for-android-now-available-to-script-kiddies-everywhere/ &quot;Advanced spyware for Android now available to script kiddies everywhere&quot;]. ''Ars Technica''. Retrieved on 2 August 2015.&lt;/ref&gt;<br /> *Exfiltrate [[Bitcoin]] and other cryptocurrency wallet files to collect data on local accounts, contacts and transaction histories.&lt;ref name=coin&gt;Farivar, Cyrus (14 July 2015). &quot;''[http://arstechnica.com/security/2015/07/hacking-team-broke-bitcoin-secrecy-by-targeting-crucial-wallet-file/ HackingTeam broke Bitcoin secrecy by targeting crucial wallet file]''&quot;. ''Ars Technica''. Retrieved 26 July 2015.&lt;/ref&gt;<br /> <br /> HackingTeam uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.&lt;ref&gt;{{cite news|last1=Schneier|first1=Bruce|title=More on HackingTeam's Government Spying Software|url=https://www.schneier.com/blog/archives/2014/06/more_on_hacking.html}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=http://www.ibtimes.co.uk/hacking-team-tools-allow-governments-take-full-control-your-smartphone-1453987|title=HackingTeam Tools Allow Governments To Take Full Control of Your Smartphone|date=2014-06-24|website=International Business Times UK|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> The malware has payloads for [[Android (operating system)|Android]],&lt;ref name=skiddies/&gt; [[BlackBerry]], Apple [[iOS]], [[Linux]], [[Mac OS X]], [[Symbian]], as well as [[Microsoft Windows]], [[Windows Mobile]] and [[Windows Phone]] class of [[operating system]]s.&lt;ref name=C3&gt;Guarnieri, Claudio; Marquis-Boire, Morgan (13 January 2014). ''[https://media.ccc.de/browse/congress/2013/30C3_-_5439_-_en_-_saal_1_-_201312292105_-_to_protect_and_infect_-_claudio_guarnieri_-_morgan_marquis-boire.html &quot;To Protect And Infect: The militarization of the Internet&quot;]''. At the 30th [[Chaos Communications Congress]] – &quot;30C3&quot;. (Video or Audio). [[Chaos Computer Club]]. Retrieved on 15 August 2015.&lt;/ref&gt;<br /> <br /> RCS is a management platform that allows operators to remotely deploy exploits and payloads against targeted systems, remotely manage devices once compromised, and exfiltrate data for remote analysis.<br /> <br /> == Controversies ==<br /> <br /> === Use by repressive governments ===<br /> HackingTeam has been criticized for selling its products and services to governments with poor human rights records, including [[Sudan]], [[Bahrain]], and [[Saudi Arabia]].&lt;ref name=repress/&gt;<br /> <br /> In June 2014, a United Nations panel monitoring the implementation of sanctions on Sudan requested information from HackingTeam about their alleged sales of software to the country in contravention of United Nations weapons export bans to Sudan. Documents leaked in the 2015 data breach of HackingTeam revealed the organization sold Sudanese National Intelligence and Security Service access to their &quot;Remote Control System&quot; software in 2012 for 960,000 Euros.&lt;ref name=repress/&gt;&lt;ref&gt;{{Cite web|url=https://theintercept.com/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/|title=A Detailed Look at HackingTeam’s Emails About Its Repressive Clients|last=Hay Newman|first=Lily|website=The Intercept|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> In response to the United Nations panel, the company responded in January 2015 that they were not currently selling to Sudan. In a follow-up exchange, HackingTeam asserted that their product was not controlled as a weapon, and so the request was beyond the scope of the panel. There was no need for them to disclose previous sales, which they considered confidential business information.&lt;ref name=repress&gt;{{Cite web |title=A Detailed Look at HackingTeam’s Emails About Its Repressive Clients |url=https://firstlook.org/theintercept/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/ |accessdate=7 July 2015 |first1=Cora |last1=Currier |first2=Morgan |last2=Marquis-Boire}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://www.eff.org/deeplinks/2015/07/hacking-team-leaks-reveal-spyware-industrys-growth|title=HackingTeam Leaks Reveal Spyware Industry's Growth, Negligence of Human Rights|last=Myers West|first=Sarah|date=2015-07-08|website=Electronic Frontier Foundation|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> The U.N. disagreed. &quot;The view of the panel is that as such software is ideally suited to support military electronic intelligence (ELINT) operations it may potentially fall under the category of ‘military … equipment’ or ‘assistance’ related to prohibited items,&quot; the secretary wrote in March. &quot;Thus its potential use in targeting any of the belligerents in the Darfur conflict is of interest to the Panel.&quot;&lt;ref name=repress/&gt;&lt;ref&gt;{{Cite web|url=http://gizmodo.com/hacking-teams-lame-excuse-for-selling-digital-weapons-t-1716375503|title=HackingTeam's Lame Excuse for Selling Digital Weapons to Sudan|last=Knibbs|first=Kate|date=2015-07-08|website=Gizmodo|language=en-US|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> In the fall of 2014, the Italian government abruptly froze all of HackingTeam's exports, citing human rights concerns. After lobbying Italian officials, the company temporarily won back the right to sell its products abroad.&lt;ref name=repress/&gt;<br /> <br /> === 2015 data breach ===<br /> On July 5, 2015, the [[Twitter]] account of the company was compromised by an unknown individual who published an announcement of a [[data breach]] against HackingTeam's computer systems. The initial message read, &quot;''Since we have nothing to hide, we're publishing all our e-mails, files, and source code …''&quot; and provided links to over 400 [[gigabyte]]s of data, including alleged internal e-mails, invoices, and [[source code]]; which were leaked via [[BitTorrent]] and [[Mega (service)|Mega]].&lt;ref&gt;{{Wayback|url=https://twitter.com/hackingteam|title=Hacked Team (@hackingteam)|date=20150706010312}}&lt;/ref&gt; An announcement of the data breach, including a link to the bittorrent seed, was retweeted by [[WikiLeaks]] and by many others through social media.&lt;ref&gt;{{Twitter status|wikileaks|617865712611233792|Inside malware makers &quot;HackingTeam&quot;: hundreds of gigabytes of e-mails, files, and source code|[[WikiLeaks]]|July 6, 2015|July 6, 2015}}&lt;/ref&gt;&lt;ref name=&quot;ibtimes.co.uk&quot;&gt;{{Cite web|url=http://www.ibtimes.co.uk/hacking-team-hacked-spy-tools-sold-oppressive-regimes-sudan-bahrain-kazakhstan-1509460|title=HackingTeam hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan|date=2015-06-06|publisher=International Business Times|accessdate=2015-07-06}}&lt;/ref&gt;<br /> <br /> The material was voluminous and early analysis appeared to reveal that HackingTeam had invoiced the [[Lebanese Army]]&lt;ref&gt;{{Twitter|url=https://twitter.com/SynAckPwn/status/617955067006578689}} {{dead link|date=July 2015}}&lt;/ref&gt; and [[Sudan]] and that spy tools were also sold to [[Bahrain]] and [[Kazakhstan]].&lt;ref name=&quot;ibtimes.co.uk&quot;/&gt; HackingTeam had previously claimed they had never done business with Sudan.&lt;ref&gt;{{Cite web|title = HackingTeam hacked, attackers claim 400GB in dumped data|url = http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html|accessdate = 2015-07-06|first = Steve|last = Ragan}}&lt;/ref&gt;<br /> <br /> The leaked data revealed a [[zero-day (computing)|zero-day]] cross-platform Flash exploit ([[Common Vulnerabilities and Exposures|CVE]] number: CVE-2015-5119).&lt;ref&gt;{{Cite web|title = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html|url = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html}}&lt;/ref&gt; The dump included a demo of this exploit by opening [[Calculator (computer program)|Calculator]] from a test webpage.&lt;ref&gt;{{Cite web|title = Zero-Day Flash Player Exploit Disclosed In 'HackingTeam' Data Dump|url = http://thehackernews.com/2015/07/flash-zero-day-vulnerability.html|accessdate = 2015-07-06|first = Swati|last = Khandelwal}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Unpatched Flash Player Flaw, More POCs Found in HackingTeam Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/|accessdate = 2015-07-08|first = Peter|last = Pi}}&lt;/ref&gt; Adobe [[software patch|patched]] the hole on July 8, 2015.&lt;ref&gt;{{Cite web|title = Adobe Security Bulletin|url = https://helpx.adobe.com/security/products/flash-player/apsb15-16.html|accessdate = 2015-07-11|last = Adobe Systems (corporate author)}}&lt;/ref&gt; Another vulnerability involving Adobe was revealed in the dumps, which took advantage of a [[buffer overflow]] attack on an Adobe Open Type Manager [[Dynamic-link library|DLL]] included with [[Microsoft Windows]]. The DLL is run in [[protection ring|kernel mode]], so the attack could perform [[privilege escalation]] to bypass the [[sandbox (computer security)|sandbox]].&lt;ref&gt;{{Cite web|title = A Look at the Open Type Font Manager Vulnerability from the HackingTeam Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-the-open-type-font-manager-vulnerability-from-the-hacking-team-leak/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29|accessdate = 2015-07-08|first = Jack|last = Tang}}&lt;/ref&gt;<br /> <br /> Also revealed in leaked data was HackingTeam employees' use of weak passwords, including 'P4ssword', 'wolverine', and 'universo'.&lt;ref&gt;{{Cite web|title = HackingTeam used shockingly bad passwords|url = http://www.zdnet.com/article/no-wonder-hacking-team-got-hacked/|accessdate = 2015-07-06|first = Zack|last = Whittaker}}&lt;/ref&gt;<br /> <br /> After a few hours without response from HackingTeam, member Christian Pozzi tweeted the company was working closely with police and &quot;''what the attackers are claiming regarding our company is not true.''&quot;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964180042190848|accessdate = 2015-07-06}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964660705234944|accessdate = 2015-07-06}}&lt;/ref&gt; He also claimed the leaked archive &quot;contains a virus&quot; and that it constituted &quot;false info&quot;.&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617962663188926465|accessdate = 2015-07-06}}&lt;/ref&gt; Shortly after these tweets, Pozzi's Twitter account itself was apparently compromised.&lt;ref&gt;{{Cite web|title=Christian Pozzi on Twitter: &quot;Uh Oh - my twitter account was also hacked.&quot; |url=https://twitter.com/christian_pozzi/status/617977753250496512 |date=2015-07-06 |accessdate=2015-07-06 |deadurl=yes |archiveurl=https://web.archive.org/web/20150706084837/https://twitter.com/christian_pozzi/status/617977753250496512 |archivedate=July 6, 2015 }}&lt;/ref&gt;<br /> <br /> Responsibility for this attack was claimed by the hacker known as &quot;Phineas Fisher&quot; (or Phisher) on Twitter.&lt;ref&gt;{{cite tweet | user=gammagrouppr | author=Phineas Fisher | number=617937092497178624 | title=gamma and HT down, a few more to go :) | date=6 July 2015}}&lt;/ref&gt; Phineas has previously attacked spyware firm [[Gamma International]], who produce malware, such as [[FinFisher]], for governments and corporations.&lt;ref&gt;{{Cite web|title = HackingTeam: We won't 'shrivel up and go away' after cyberattack|url = http://www.zdnet.com/article/hacking-team-cyberattack-aftermath-interview/|accessdate = 2015-07-06|first = Charlie|last = Osbourne}}&lt;/ref&gt; In 2016, Phineas published details of the attack, in Spanish and English, as a &quot;how-to&quot; for others, and explained the motivations behind the attack.&lt;ref&gt;{{Cite web|url=http://arstechnica.com/security/2016/04/how-hacking-team-got-hacked-phineas-phisher/|title=How HackingTeam got hacked|website=Ars Technica|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> The internal documents revealed details of HackingTeam's contracts with repressive governments.&lt;ref&gt;{{Cite web|url=https://theintercept.com/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/|title=A Detailed Look at HackingTeam’s Emails About Its Repressive Clients|website=The Intercept|access-date=2016-05-15}}&lt;/ref&gt; In 2016, the Italian government again revoked the company’s license to sell spyware outside of Europe without special permission.&lt;ref name=&quot;:0&quot;&gt;{{Cite web|url=https://nakedsecurity.sophos.com/2016/04/08/hacking-team-loses-global-license-to-sell-spyware/|title=HackingTeam loses global license to sell spyware|last=Zorabedian|first=John|date=2016-04-08|website=Naked Security|access-date=2016-05-15}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://www.privacyinternational.org/node/826|title=HackingTeam’s Global License Revoked by Italian Export Authorities {{!}} Privacy International|website=www.privacyinternational.org|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> == Customer List ==<br /> HackingTeam's clientele include not just governments, but also corporate clients such as [[Barclay's]] Bank and [[British Telecom]] (BT) of the [[United Kingdom]], as well as [[Deutsche Bank]] of [[Germany]].&lt;ref name=spies/&gt;<br /> <br /> A full list of HackingTeam's customers were leaked in the 2015 breach. Disclosed documents show HackingTeam had 70 current customers, mostly military, police, federal and provincial governments. The total company revenues disclosed exceeded 40 million [[Euro]]s.&lt;ref&gt;{{cite web |author=Kopstein, Justin |title= Here Are All the Sketchy Government Agencies Buying HackingTeam's Spy Tech |url=http://motherboard.vice.com/read/here-are-all-the-sketchy-government-agencies-buying-hacking-teams-spy-tech |publisher=Vice Magazine |date=6 July 2015<br /> }}&lt;/ref&gt;&lt;ref&gt;{{cite web |author=Weissman, Cale Guthrie |title=Hacked security company's documents show a laundry list of questionable clients |url=http://www.businessinsider.com/hacked-security-companys-document-2015-7 |date=6 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |author=Ragan, Steve |title=In Pictures: HackingTeam's hack curated |url=http://www.cso.com.au/slideshow/579158/pictures-hacking-team-hack-curated/?image=9 |publisher=CSO Online (Australia)}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=HackingTeam hacked: firm sold spying tools to repressive regimes, documents claim |url=http://www.theguardian.com/technology/2015/jul/06/hacking-team-hacked-firm-sold-spying-tools-to-repressive-regimes-documents-claim |author=Hern, Alex |publisher=''The Guardian'' |date=6 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=HackingTeam responds to data breach, issues public threats and denials |url=http://www.csoonline.com/article/2944333/data-breach/hacking-team-responds-to-data-breach-issues-public-threats-and-denials.html |author=Ragan, Steve |publisher=''CSO Online'' |date=6 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=A whole bunch of downed government surveillance programs are about to go back online |url=http://www.businessinsider.com/hacking-team-promises-customers-they-can-resume-surveillance-operations-soon-2015-7 |author=Stevenson, Alastair |publisher=''Business Insider'' |date=14 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;<br /> <br /> {| class=&quot;wikitable sortable&quot;<br /> |-<br /> ! Customer<br /> ! Country<br /> ! Area<br /> ! Agency<br /> ! Year First Sale<br /> ! Annual Maintenance Fees<br /> ! Total Client Revenues<br /> |-<br /> | [[Polizia Postale e delle Comunicazioni]]&lt;ref&gt;Jone Pierantonio. [http://it.ibtimes.com/cyber-space/ecco-chi-ha-bucato-hacking-team-1408915 &quot;Ecco chi ha bucato HackingTeam&quot;]. ''International Business Times''. Retrieved on 2 August 2015.&lt;/ref&gt;||Italy||Europe||LEA||2004||€100,000||€808,833<br /> |-<br /> | [[Centro Nacional de Inteligencia]]&lt;ref&gt;Ediciones El País (8 July 2015). [http://internacional.elpais.com/internacional/2015/07/08/actualidad/1436343710_282978.html &quot;HackingTeam: “Ofrecemos tecnología ofensiva para la Policía”&quot;]. ''EL PAÍS''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Spain]]||Europe||Intelligence||2006||€52,000||€538,000<br /> |-<br /> | [[Infocomm Development Authority of Singapore]]||[[Singapore]]||APAC||Intelligence||2008||€89,000||€1,209,967<br /> |-<br /> | Information Office||[[Hungary]]||Europe||Intelligence||2008||€41,000||€885,000<br /> |-<br /> | CSDN||[[Morocco]]||MEA||Intelligence||2009||€140,000||€1,936,050<br /> |-<br /> | UPDF (Uganda Peoples Defense Force), ISO (Internal Security Organization), Office of the President||[[Uganda]]||Africa||Intelligence||2015||€831,000||€52,197,100<br /> |-<br /> | Italy - DA - Rental||Italy||Europe||Other||2009||€50,000||€628,250<br /> |-<br /> | [[Malaysian Anti-Corruption Commission]]||[[Malaysia]]||APAC||Intelligence||2009||€77,000||€789,123<br /> |-<br /> | PCM||Italy||Europe||Intelligence||2009||€90,000||€764,297<br /> |-<br /> | SSNS - Ungheria||Hungary||Europe||Intelligence||2009||€64,000||€1,011,000<br /> |-<br /> | CC - Italy||Italy||Europe||LEA||2010||€50,000||€497,349<br /> |-<br /> | [[Al Mukhabarat Al A'amah]]||[[Saudi Arabia]]||MEA||Intelligence||2010||€45,000||€600,000<br /> |-<br /> | IR Authorities (Condor)||[[Luxembourg]]||Europe||Other||2010||€45,000||€446,000<br /> |-<br /> | La Dependencia y/o CISEN&lt;ref&gt;[http://fusion.net/story/163872/the-hacking-team-leak-shows-mexico-was-the-top-client-but-why/ &quot;The HackingTeam leak shows Mexico was its top client, but why?&quot;]. ''Fusion''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Mexico]]||LATAM||Intelligence||2010||€130,000||€1,390,000<br /> |-<br /> | UZC&lt;ref name=fortune/&gt; ||[[Czech Republic]] ||Europe||LEA||2010||€55,000||€689,779<br /> |-<br /> | Egypt - MOD&lt;ref name=fortune/&gt;||[[Egypt]]||MEA||Other||2011||€70,000||€598,000<br /> |-<br /> | [[Federal Bureau of Investigation]]&lt;ref name=fbidea/&gt;||USA||North America||LEA||2011||€100,000||€697,710<br /> |-<br /> | Oman - Intelligence||[[Oman]]||MEA||Intelligence||2011||€30,000||€500,000<br /> |-<br /> | President Security&lt;ref&gt;[http://motherboard.vice.com/read/hacking-teams-equipment-got-stolen-in-panama &quot;HackingTeam's Equipment Got Stolen in Panama&quot;]. ''Motherboard''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref&gt;Molina, Thabata (13 August 2015). ''[http://panampost.com/thabata-molina/2015/08/13/panama-to-investigate-martinelli-in-hacking-team-spying-scandal/ &quot;Panama to Investigate Martinelli in HackingTeam Spying Scandal&quot;]''. ''Panama Post''. Retrieved 15 August 2015.&lt;/ref&gt;<br /> ||[[Panama]]||LATAM||Intelligence||2011||€110,000||€750,000<br /> |-<br /> | [[Turkish National Police]]||[[Turkey]]||Europe||LEA||2011||€45,000||€440,000<br /> |-<br /> | UAE - MOI||[[United Arab Emirates|UAE]]||MEA||LEA||2011||€90,000||€634,500<br /> |-<br /> | [[National Security Service (Uzbekistan)|National Security Service]]&lt;ref name=fortune&gt;[http://fortune.com/2015/07/16/governments-used-spy-software/ &quot;Leaked emails from security firm HackingTeam show government use - Fortune&quot;]. ''Fortune''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Uzbekistan]]||Europe||Intelligence||2011||€50,000||€917,038<br /> |-<br /> | [[United States Department of Defense|Department of Defense]]&lt;ref name=fbidea/&gt;||USA||North America||LEA||2011||||€190,000<br /> |-<br /> | Bayelsa State Government||[[Nigeria]]||MEA||Intelligence||2012||€75,000||€450,000<br /> |-<br /> | Estado del Mexico||Mexico||LATAM||LEA||2012||€120,000||€783,000<br /> |-<br /> | Information Network Security Agency||[[Ethiopia]]||MEA||Intelligence||2012||€80,000||€750,000<br /> |-<br /> | State security (Falcon)||Luxemburg||Europe||Other||2012||€38,000||€316,000<br /> |-<br /> | Italy - DA - Rental||Italy||Europe||Other||2012||€60,000||€496,000<br /> |-<br /> | MAL - MI||Malaysia||APAC||Intelligence||2012||€77,000||€552,000<br /> |-<br /> | [[Direction générale de la surveillance du territoire]]||Morocco||MEA||Intelligence||2012||€160,000||€1,237,500<br /> |-<br /> | [[National Intelligence and Security Service]]&lt;ref name=fortune/&gt;||[[Sudan]]||MEA||Intelligence||2012||€76,000||€960,000<br /> |-<br /> | Russia - KVANT&lt;ref name=kvant&gt;[http://arstechnica.com/tech-policy/2015/07/hacking-teams-surveillance-software-sold-to-kgb-successor/ &quot;HackingTeam apparently violated EU rules in sale of spyware to Russian agency&quot;]. ''Ars Technica''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Russia]]||Europe||Intelligence||2012||€72,000||€451,017<br /> |-<br /> | Saudi - GID||Saudi||MEA||LEA||2012||€114,000||€1,201,000<br /> |-<br /> | SIS of [[National Security Committee of the Republic of Kazakhstan|National Security Committee of Kazakhstan]]&lt;ref name=fortune/&gt;||[[Kazakhstan]]||Europe||Intelligence||2012||€140,000||€1,012,500<br /> |-<br /> | The 5163 Army Division (Alias of South Korean National Intelligence Service)&lt;ref name=fortune/&gt;&lt;ref name=torbrowser&gt;[https://firstlook.org/theintercept/2015/07/16/hackingteam-attacked-tor-browser/ &quot;How HackingTeam Created Spyware that Allowed the FBI To Monitor Tor Browser&quot;]. ''The Intercept''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref name=wswskorea&gt;McGrath, Ben (25 July 2015). &quot;''[https://www.wsws.org/en/articles/2015/07/25/kore-j25.html Further revelations in South Korean hacking scandal]''&quot;. ''World Socialist Web Site''. Retrieved 26 July 2015.&lt;/ref&gt;||[[South Korea|S. Korea]]||APAC||Other||2012||€67,000||€686,400<br /> |-<br /> | UAE - Intelligence||[[United Arab Emirates|UAE]]||MEA||Other||2012||€150,000||€1,200,000<br /> |-<br /> | [[Drug Enforcement Administration]]&lt;ref name=fbidea&gt;[https://firstlook.org/theintercept/2015/07/06/hacking-team-spyware-fbi/ &quot;Leaked Documents Show FBI, DEA and U.S. Army Buying Italian Spyware&quot;]. ''The Intercept''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref name=dea&gt;[http://motherboard.vice.com/read/the-dea-just-cancelled-its-contract-with-hacking-team &quot;The DEA Just Cancelled Its Contract With HackingTeam&quot;]. ''Motherboard''. Retrieved on 2 August 2015.&lt;/ref&gt;||USA||North America||Other||2012||€70,000||€567,984<br /> |-<br /> | [[Central Anticorruption Bureau]]||[[Poland]]||Europe||LEA||2012||€35,000||€249,200<br /> |-<br /> | MOD Saudi||Saudi||MEA||Other||2013||€220,000||€1,108,687<br /> |-<br /> | PMO||Malaysia||APAC||Intelligence||2013||€64,500||€520,000<br /> |-<br /> | Estado de Qeretaro||Mexico||LATAM||LEA||2013||€48,000||€234,500<br /> |-<br /> | National Security Agency&lt;ref name=fortune/&gt;||[[Azerbaijan]]||Europe||Intelligence||2013||€32,000||€349,000<br /> |-<br /> | Gobierno de Puebla||Mexico||LATAM||Other||2013||€64,000||€428,835<br /> |-<br /> | Gobierno de Campeche||Mexico||LATAM||Other||2013||€78,000||€386,296<br /> |-<br /> | AC Mongolia||[[Mongolia]]||APAC||Intelligence||2013||€100,000||€799,000<br /> |-<br /> | Dept. of Correction Thai Police ||[[Thailand]]||APAC||LEA||2013||€52,000||€286,482<br /> |-<br /> | [[National Intelligence Secretariat (Ecuador)|National Intelligence Secretariat]]&lt;ref&gt;http://panampost.com/rebeca-morla/2015/07/13/ecuadorian-websites-report-on-hacking-team-get-taken-down/&lt;br /&gt;http://panampost.com/panam-staff/2015/08/10/hacking-team-helped-ecuador-spy-on-opposition-activist/&lt;br /&gt;http://bigstory.ap.org/article/6f41d49888174b45857d34511fda1caf/apnewsbreak-email-leak-suggests-ecuador-spied-opposition&lt;/ref&gt;<br /> ||[[Ecuador]]||LATAM||LEA||2013||€75,000||€535,000<br /> |-<br /> | Police Intelligence Directorate&lt;ref name=dipol_telesur&gt;Podour, Justin (23 July 2015). [http://www.telesurtv.net/opinion/HackedTeam-y-Colombia-Como-la-vigilancia-ayuda-a-un-Estado-violento-20150723-0062.html #HackedTeam y Colombia: Cómo la vigilancia ayuda a un Estado violento]. ''Telesur''. Retrieved 26 July 2015.&lt;/ref&gt;||[[Colombia]]||LATAM||LEA||2013||€35,000||€335,000<br /> |-<br /> | [[Guardia di Finanza]]||Italy||Europe||LEA||2013||€80,000||€400,000<br /> |-<br /> | Intelligence&lt;ref name=cyprus&gt;In Cyprus (11 July 2015).[http://in-cyprus.com/intelligence-service-chief-steps-down/ Intelligence Service chief steps down]. Retrieved 26 July 2015.&lt;/ref&gt;||[[Cyprus]]||Europe||LEA||2013||€40,000||€375,625<br /> |-<br /> | MidWorld&lt;ref name=ifex&gt;Bahrain Center for Human Rights (15 July 2015). &quot;''[https://www.ifex.org/bahrain/2015/07/15/bahrain_hacking_team HackingTeam's troubling connections to Bahrain]''&quot; IFEX. Retrieved 26 July 2015.&lt;/ref&gt;||[[Bahrain]]||MEA||Intelligence||2013||||€210,000<br /> |-<br /> | Mexico - PEMEX||Mexico ||LATAM||LEA ||2013||||€321,120<br /> |-<br /> | Malysia K||Malaysia||APAC||LEA||2013||||€0<br /> |-<br /> | Honduras||[[Honduras]]||LATAM||LEA||2014||||€355,000<br /> |-<br /> | Mex Taumalipas||Mexico||LATAM||||2014||||€322,900<br /> |-<br /> | Secretaría de Planeación y Finanzas||Mexico||LATAM||LEA||2014||€91,000||€371,035<br /> |-<br /> | AREA||Italia||Europe||||2014||||€430,000<br /> |-<br /> | Mexico Yucatán||Mexico||LATAM||LEA||2014||||€401,788<br /> |-<br /> | Mexico Durango||Mexico||LATAM||LEA||2014||||€421,397<br /> |-<br /> | [[Investigations Police of Chile]]||[[Chile]]||LATAM||LEA||2014||||€2,289,155<br /> |-<br /> | Jalisco Mexico||Mexico||LATAM||LEA||2014||||€748,003<br /> |-<br /> | [[Royal Thai Army]]||Thailand||APAC||LEA||2014||||€360,000<br /> |-<br /> | Vietnam GD5||[[Vietnam]]||APAC||||2014||||€281,170<br /> |-<br /> | [[Kantonspolizei Zürich]]||Switzerland||Europe||LEA||2014||||€486,500<br /> |-<br /> | Vietnam GD1||Vietnam||APAC||LEA||2015||||€543,810<br /> |-<br /> | Egypt TRD GNSE||Egypt||MEA||LEA||2015||||€137,500<br /> |-<br /> | [[Lebanese Armed Forces|Lebanese Army]]||[[Lebanon]]||MEA||LEA||2015||||<br /> |-<br /> | [[Federal Police Department]]||Brazil||LATAM||LEA||2015||||<br /> |-<br /> | [[SHISH|State Informative Service]]&lt;ref&gt;Lexime (14 July 2015). &quot;''[http://www.balkanweb.com/site/burime-te-sigurta-shish-perdor-programet-pergjuese-qe-prej-2015-hacking-teams-nuk-e-kemi-nen-kontroll-sistemin/ Burime të sigurta, SHISH përdor programet përgjuese që prej 2015. HackingTeams: Nuk e kemi nën kontroll sistemin!]''&quot; (video). BalkanWeb. Retrieved 27 July 2015.&lt;/ref&gt;||[[Albania]]||Europe||SHIK||2015||||<br /> |}<br /> <br /> == See also ==<br /> * [[FinFisher]]<br /> * [[MiniPanzer and MegaPanzer]]<br /> * [[Vupen]] – 0-day exploit provider linked to HackingTeam&lt;ref&gt;[https://tsyrklevich.net/2015/07/22/hacking-team-0day-market/ HackingTeam: a zero-day market case study], Vlad Tsyrklevich's blog&lt;/ref&gt;<br /> * ''[[Mamfakinch]]'' – a citizen media organization targeted with malware allegedly developed by HackingTeam&lt;ref&gt;Perlroth, Nicole (10 October 2012). [http://bits.blogs.nytimes.com/2012/10/10/ahead-of-spyware-conference-more-evidence-of-abuse/?_r=0 Ahead of Spyware Conference, More Evidence of Abuse]. ''New York Times'' (Bits).&lt;/ref&gt;<br /> <br /> ==References==<br /> {{reflist|3}}<br /> <br /> == External links ==<br /> * {{Official website| http://www.hackingteam.it/}}<br /> * [https://citizenlab.org/tag/hacking-team/ HackingTeam Archives] - investigative reports published by The [[Citizen Lab]]<br /> * [https://wikileaks.org/hackingteam/emails WikiLeaks: ''The Hackingteam Archives''] - searchable database of 1 million internal emails<br /> * [https://wikileaks.org/spyfiles/list/company-name/hackingteam.html HackingTeam presentations] in the [[WikiLeaks]] &quot;''Spy Files''&quot;<br /> {{Hacking in the 2010s}}<br /> <br /> [[Category:Computer security software]]<br /> [[Category:Spyware]]<br /> [[Category:Surveillance]]<br /> [[Category:Trojan horses]]<br /> [[Category:Espionage techniques]]<br /> [[Category:Espionage devices]]<br /> [[Category:Malware toolkits]]<br /> [[Category:Computer access control]]<br /> [[Category:Cyberwarfare]]<br /> [[Category:Espionage scandals and incidents]]<br /> [[Category:Companies based in Milan]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=HackingTeam&diff=177175004 HackingTeam 2016-06-18T17:45:29Z <p>Dsprc: /* See also */</p> <hr /> <div>{{Infobox company<br /> | name = HackingTeam<br /> | logo = Hacking Team logo.png<br /> | logo_size = <br /> | logo_alt = The words Hacking Team enclosed with in reversed square brackets &lt;nowiki&gt;][&lt;/nowiki&gt;<br /> | logo_caption = Company logo<br /> | logo_padding = <br /> | image = <br /> | image_size = <br /> | image_alt = <br /> | image_caption = <br /> | type = <br /> | industry = [[Information technology]]<br /> | founded = 2003<br /> | founders = David Vincenzetti, Valeriano Bedeschi<br /> | hq_location = <br /> | hq_location_city = [[Milan]]<br /> | hq_location_country = [[Italy]]<br /> | area_served = &lt;!-- or: | areas_served = --&gt;<br /> | key_people = Alberto Ornaghi (ALoR), Marco Valleri (NaGA)<br /> | products = {{unbulleted list|Software}}<br /> | brands = <br /> | services = <br /> | owner = &lt;!-- or: | owners = --&gt;<br /> | website = {{URL|http://www.hackingteam.it/}}<br /> }}<br /> '''HackingTeam''' is a [[Milan]]-based [[information technology]] company that sells offensive intrusion and [[surveillance]] capabilities to governments, law enforcement agencies and corporations.&lt;ref name=spies&gt;{{cite web |title=The spies behind your screen |url=http://www.telegraph.co.uk/technology/8899353/The-spies-behind-your-screen.html |author=Batey, Angus |date=24 November 2011 |publisher=''The Telegraph'' |accessdate=26 July 2015}}&lt;/ref&gt; Its &quot;''Remote Control Systems''&quot; enable governments and corporations to monitor the communications of internet users, decipher their [[cryptography|encrypted]] files and emails, record [[Skype]] and other [[Voice over IP]] communications, and remotely activate microphones and camera on target computers.&lt;ref&gt;{{cite web|title=Enemies of the Internet: HackingTeam|url=http://surveillance.rsf.org/en/hacking-team/|work=[[Reporters Without Borders]]|accessdate=24 April 2014}}&lt;/ref&gt; The company has been criticized for providing these capabilities to governments with poor [[human rights]] records.&lt;ref&gt;{{cite web | last3 = Marquis-Boire | first3 = Morgan | last1 = Marczak | first1 = Bill | last2 = Gaurnieri | first2 = Claudio | last4 = Scott-Railton | first4 = John | title = Mapping HackingTeam's &quot;Untraceable&quot; Spyware | url = https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ | date = February 17, 2014}}&lt;/ref&gt; HackingTeam states that they have the ability to disable their software if it is used unethically.&lt;ref&gt;{{cite news|url=http://www.newyorker.com/online/blogs/elements/2014/03/hacked-by-ones-own-government.html|title=Hackers Without Borders|last=Kopstein|first=Joshua|work=[[The New Yorker]]|date=10 March 2014|accessdate=24 April 2014}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url = https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/|title = Police Story: HackingTeam’s Government Surveillance Malware|date = June 24, 2014|accessdate = August 3, 2014|website = Citizen Lab|publisher = University of Toronto|last1 = Marquis-Boire|first1 = Morgan | last2 = Gaurnieri | first2 = Claudio | first3 = John | last3 = Scott-Railton | first4 = Katie | last4 = Kleemola }}&lt;/ref&gt; The Italian government has restricted their license to do business with countries outside Europe.&lt;ref name=&quot;:0&quot; /&gt;<br /> <br /> HackingTeam employs around 40 people in its Italian office, and has subsidiary branches in [[Annapolis]], [[Washington, D.C.]] and [[Singapore]].&lt;ref name=know&gt;''[[Human Rights Watch]]'' (25 March 2014). ''&quot;[https://www.hrw.org/report/2014/03/25/they-know-everything-we-do/telecom-and-internet-surveillance-ethiopia They Know Everything We Do]&quot;''. Retrieved 1 August 2015.&lt;/ref&gt; Its products are in use in dozens of countries across six continents.&lt;ref name=Jeffries&gt;{{cite web|last=Jeffries|first=Adrianne|title=Meet HackingTeam, the company that helps the police hack you|url=http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers|accessdate=21 April 2014|work=[[The Verge]]|date=13 September 2013}}&lt;/ref&gt;<br /> <br /> ==History==<br /> HackingTeam was started by two Italian programmers: Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri (under the aliases of ALoR, and NaGA respectively), created a set of tools that could be used to monitor and remotely manipulate target computers. The program, called [[Ettercap (software)|Ettercap]], was embraced both by [[Hacker (term)|hackers]] looking to spy on people, and by companies that hoped to test the security of their own networks.<br /> <br /> The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their [[Skype]] calls, the police contacted Ornaghi and Valleri and asked them to help modify the program. HackingTeam was born, and became &quot;the first sellers of commercial hacking software to the police.&quot;&lt;ref name=Jeffries/&gt;<br /> <br /> According to former employee Alberto Pelliccione, the company began as security services provider, offering [[penetration testing]], auditing and other defensive capabilities to clients.&lt;ref name=war&gt;Farivar, Cyrus (20 July 2015) [http://arstechnica.com/security/2015/07/italian-prosecutors-investigate-former-hacking-team-employees-for-role-in-hack/ HackingTeam goes to war against former employees, suspects some helped hackers]. ''Ars Technica''. Retrieved 26 July 2015.&lt;/ref&gt; Pelliccione states that as malware and other offensive capabilities were developed and accounted for a larger percentage of revenues, the organization pivoted in a more offensive direction and became increasingly compartmentalized. Pelliccione claims fellow employees working on aspects of the same platform - for example, Android exploits and payloads - would not communicate with one another, possibly leading to tensions and strife within the organization.&lt;ref name=war/&gt;<br /> <br /> In February 2014, a report from [[Citizen Lab]] identified the organisation to be using hosting services from [[Linode]], [[Telecom Italia]], [[Rackspace]], [[NOC4Hosts]] and notorious [[bullet proof hosting]] company [[Santrex]].&lt;ref&gt;{{cite news|title=HackingTeam’s US Nexus|url=https://citizenlab.org/2014/02/hacking-teams-us-nexus/|accessdate=2 August 2015|date=28 February 2014}}&lt;/ref&gt;<br /> <br /> On July 5, 2015 the company suffered a major data breach of customer data, software code, internal documents and emails. - ''See: [[#2015 data breach|§ 2015 data breach]]''<br /> <br /> ==Products and capabilities==<br /> HackingTeam enables clients to perform remote monitoring functions against citizens via their [[Remote administration tool|RCS (Remote Control Systems)]], including their '''Da Vinci''' and '''Galileo''' platforms:&lt;ref name=spies/&gt;<br /> <br /> *Covert collection of emails, text message, phone call history and address books<br /> *[[Keystroke logging]]<br /> *Uncover search history data and take screenshots<br /> *Record audio from phone calls<br /> :*Capture audio and video stream from device memory to bypass [[cryptography]] of [[Skype]] sessions&lt;ref&gt;{{cite web | title=Mideast Uses Western Tools to Battle the Skype Rebellion |url=http://www.wsj.com/articles/SB10001424052702304520804576345970862420038 |author1=Stecklow, Steve |author2=Sonne, Paul |author3=Bradley, Matt |date=1 June 2011 |publisher=''Wall Street Journal'' |accessdate=26 July 2015}}&lt;/ref&gt;<br /> :*Use microphones on device to collect ambient background noise and conversations<br /> *Activate phone or computer cameras<br /> *Hijack telephone GPS systems to monitor target's location<br /> *Infect target computer's [[UEFI]] [[BIOS]] [[firmware]] with a [[rootkit]]&lt;ref&gt;{{Cite web|first=Philippe |last=Lin |url=http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-uses-uefi-bios-rootkit-to-keep-rcs-9-agent-in-target-systems/ |title=HackingTeam Uses UEFI BIOS Rootkit to Keep RCS 9 Agent in Target Systems |work=TrendLabs Security Intelligence Blog |publisher=[[Trend Micro]] |date=July 13, 2015 |accessdate=July 26, 2015}}&lt;/ref&gt;<br /> *Extract WiFi passwords&lt;ref name=skiddies&gt;[http://arstechnica.com/security/2015/07/advanced-spyware-for-android-now-available-to-script-kiddies-everywhere/ &quot;Advanced spyware for Android now available to script kiddies everywhere&quot;]. ''Ars Technica''. Retrieved on 2 August 2015.&lt;/ref&gt;<br /> *Exfiltrate [[Bitcoin]] and other cryptocurrency wallet files to collect data on local accounts, contacts and transaction histories.&lt;ref name=coin&gt;Farivar, Cyrus (14 July 2015). &quot;''[http://arstechnica.com/security/2015/07/hacking-team-broke-bitcoin-secrecy-by-targeting-crucial-wallet-file/ HackingTeam broke Bitcoin secrecy by targeting crucial wallet file]''&quot;. ''Ars Technica''. Retrieved 26 July 2015.&lt;/ref&gt;<br /> <br /> HackingTeam uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.&lt;ref&gt;{{cite news|last1=Schneier|first1=Bruce|title=More on HackingTeam's Government Spying Software|url=https://www.schneier.com/blog/archives/2014/06/more_on_hacking.html}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=http://www.ibtimes.co.uk/hacking-team-tools-allow-governments-take-full-control-your-smartphone-1453987|title=HackingTeam Tools Allow Governments To Take Full Control of Your Smartphone|date=2014-06-24|website=International Business Times UK|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> The malware has payloads for [[Android (operating system)|Android]],&lt;ref name=skiddies/&gt; [[BlackBerry]], Apple [[iOS]], [[Linux]], [[Mac OS X]], [[Symbian]], as well as [[Microsoft Windows]], [[Windows Mobile]] and [[Windows Phone]] class of [[operating system]]s.&lt;ref name=C3&gt;Guarnieri, Claudio; Marquis-Boire, Morgan (13 January 2014). ''[https://media.ccc.de/browse/congress/2013/30C3_-_5439_-_en_-_saal_1_-_201312292105_-_to_protect_and_infect_-_claudio_guarnieri_-_morgan_marquis-boire.html &quot;To Protect And Infect: The militarization of the Internet&quot;]''. At the 30th [[Chaos Communications Congress]] – &quot;30C3&quot;. (Video or Audio). [[Chaos Computer Club]]. Retrieved on 15 August 2015.&lt;/ref&gt;<br /> <br /> RCS is a management platform that allows operators to remotely deploy exploits and payloads against targeted systems, remotely manage devices once compromised, and exfiltrate data for remote analysis.<br /> <br /> == Controversies ==<br /> <br /> === Use by repressive governments ===<br /> HackingTeam has been criticized for selling its products and services to governments with poor human rights records, including [[Sudan]], [[Bahrain]], and [[Saudi Arabia]].&lt;ref name=repress/&gt;<br /> <br /> In June 2014, a United Nations panel monitoring the implementation of sanctions on Sudan requested information from HackingTeam about their alleged sales of software to the country in contravention of United Nations weapons export bans to Sudan. Documents leaked in the 2015 data breach of HackingTeam revealed the organization sold Sudanese National Intelligence and Security Service access to their &quot;Remote Control System&quot; software in 2012 for 960,000 Euros.&lt;ref name=repress/&gt;&lt;ref&gt;{{Cite web|url=https://theintercept.com/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/|title=A Detailed Look at HackingTeam’s Emails About Its Repressive Clients|last=Hay Newman|first=Lily|website=The Intercept|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> In response to the United Nations panel, the company responded in January 2015 that they were not currently selling to Sudan. In a follow-up exchange, HackingTeam asserted that their product was not controlled as a weapon, and so the request was beyond the scope of the panel. There was no need for them to disclose previous sales, which they considered confidential business information.&lt;ref name=repress&gt;{{Cite web |title=A Detailed Look at HackingTeam’s Emails About Its Repressive Clients |url=https://firstlook.org/theintercept/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/ |accessdate=7 July 2015 |first1=Cora |last1=Currier |first2=Morgan |last2=Marquis-Boire}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://www.eff.org/deeplinks/2015/07/hacking-team-leaks-reveal-spyware-industrys-growth|title=HackingTeam Leaks Reveal Spyware Industry's Growth, Negligence of Human Rights|last=Myers West|first=Sarah|date=2015-07-08|website=Electronic Frontier Foundation|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> The U.N. disagreed. &quot;The view of the panel is that as such software is ideally suited to support military electronic intelligence (ELINT) operations it may potentially fall under the category of ‘military … equipment’ or ‘assistance’ related to prohibited items,&quot; the secretary wrote in March. &quot;Thus its potential use in targeting any of the belligerents in the Darfur conflict is of interest to the Panel.&quot;&lt;ref name=repress/&gt;&lt;ref&gt;{{Cite web|url=http://gizmodo.com/hacking-teams-lame-excuse-for-selling-digital-weapons-t-1716375503|title=HackingTeam's Lame Excuse for Selling Digital Weapons to Sudan|last=Knibbs|first=Kate|date=2015-07-08|website=Gizmodo|language=en-US|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> In the fall of 2014, the Italian government abruptly froze all of HackingTeam's exports, citing human rights concerns. After lobbying Italian officials, the company temporarily won back the right to sell its products abroad.&lt;ref name=repress/&gt;<br /> <br /> === 2015 data breach ===<br /> On July 5, 2015, the [[Twitter]] account of the company was compromised by an unknown individual who published an announcement of a [[data breach]] against HackingTeam's computer systems. The initial message read, &quot;''Since we have nothing to hide, we're publishing all our e-mails, files, and source code …''&quot; and provided links to over 400 [[gigabyte]]s of data, including alleged internal e-mails, invoices, and [[source code]]; which were leaked via [[BitTorrent]] and [[Mega (service)|Mega]].&lt;ref&gt;{{Wayback|url=https://twitter.com/hackingteam|title=Hacked Team (@hackingteam)|date=20150706010312}}&lt;/ref&gt; An announcement of the data breach, including a link to the bittorrent seed, was retweeted by [[WikiLeaks]] and by many others through social media.&lt;ref&gt;{{Twitter status|wikileaks|617865712611233792|Inside malware makers &quot;HackingTeam&quot;: hundreds of gigabytes of e-mails, files, and source code|[[WikiLeaks]]|July 6, 2015|July 6, 2015}}&lt;/ref&gt;&lt;ref name=&quot;ibtimes.co.uk&quot;&gt;{{Cite web|url=http://www.ibtimes.co.uk/hacking-team-hacked-spy-tools-sold-oppressive-regimes-sudan-bahrain-kazakhstan-1509460|title=HackingTeam hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan|date=2015-06-06|publisher=International Business Times|accessdate=2015-07-06}}&lt;/ref&gt;<br /> <br /> The material was voluminous and early analysis appeared to reveal that HackingTeam had invoiced the [[Lebanese Army]]&lt;ref&gt;{{Twitter|url=https://twitter.com/SynAckPwn/status/617955067006578689}} {{dead link|date=July 2015}}&lt;/ref&gt; and [[Sudan]] and that spy tools were also sold to [[Bahrain]] and [[Kazakhstan]].&lt;ref name=&quot;ibtimes.co.uk&quot;/&gt; HackingTeam had previously claimed they had never done business with Sudan.&lt;ref&gt;{{Cite web|title = HackingTeam hacked, attackers claim 400GB in dumped data|url = http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html|accessdate = 2015-07-06|first = Steve|last = Ragan}}&lt;/ref&gt;<br /> <br /> The leaked data revealed a [[zero-day (computing)|zero-day]] cross-platform Flash exploit ([[Common Vulnerabilities and Exposures|CVE]] number: CVE-2015-5119).&lt;ref&gt;{{Cite web|title = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html|url = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html}}&lt;/ref&gt; The dump included a demo of this exploit by opening [[Calculator (computer program)|Calculator]] from a test webpage.&lt;ref&gt;{{Cite web|title = Zero-Day Flash Player Exploit Disclosed In 'HackingTeam' Data Dump|url = http://thehackernews.com/2015/07/flash-zero-day-vulnerability.html|accessdate = 2015-07-06|first = Swati|last = Khandelwal}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Unpatched Flash Player Flaw, More POCs Found in HackingTeam Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/|accessdate = 2015-07-08|first = Peter|last = Pi}}&lt;/ref&gt; Adobe [[software patch|patched]] the hole on July 8, 2015.&lt;ref&gt;{{Cite web|title = Adobe Security Bulletin|url = https://helpx.adobe.com/security/products/flash-player/apsb15-16.html|accessdate = 2015-07-11|last = Adobe Systems (corporate author)}}&lt;/ref&gt; Another vulnerability involving Adobe was revealed in the dumps, which took advantage of a [[buffer overflow]] attack on an Adobe Open Type Manager [[Dynamic-link library|DLL]] included with [[Microsoft Windows]]. The DLL is run in [[protection ring|kernel mode]], so the attack could perform [[privilege escalation]] to bypass the [[sandbox (computer security)|sandbox]].&lt;ref&gt;{{Cite web|title = A Look at the Open Type Font Manager Vulnerability from the HackingTeam Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-the-open-type-font-manager-vulnerability-from-the-hacking-team-leak/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29|accessdate = 2015-07-08|first = Jack|last = Tang}}&lt;/ref&gt;<br /> <br /> Also revealed in leaked data was HackingTeam employees' use of weak passwords, including 'P4ssword', 'wolverine', and 'universo'.&lt;ref&gt;{{Cite web|title = HackingTeam used shockingly bad passwords|url = http://www.zdnet.com/article/no-wonder-hacking-team-got-hacked/|accessdate = 2015-07-06|first = Zack|last = Whittaker}}&lt;/ref&gt;<br /> <br /> After a few hours without response from HackingTeam, member Christian Pozzi tweeted the company was working closely with police and &quot;''what the attackers are claiming regarding our company is not true.''&quot;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964180042190848|accessdate = 2015-07-06}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964660705234944|accessdate = 2015-07-06}}&lt;/ref&gt; He also claimed the leaked archive &quot;contains a virus&quot; and that it constituted &quot;false info&quot;.&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617962663188926465|accessdate = 2015-07-06}}&lt;/ref&gt; Shortly after these tweets, Pozzi's Twitter account itself was apparently compromised.&lt;ref&gt;{{Cite web|title=Christian Pozzi on Twitter: &quot;Uh Oh - my twitter account was also hacked.&quot; |url=https://twitter.com/christian_pozzi/status/617977753250496512 |date=2015-07-06 |accessdate=2015-07-06 |deadurl=yes |archiveurl=https://web.archive.org/web/20150706084837/https://twitter.com/christian_pozzi/status/617977753250496512 |archivedate=July 6, 2015 }}&lt;/ref&gt;<br /> <br /> Responsibility for this attack was claimed by the hacker known as &quot;Phineas Fisher&quot; (or Phisher) on Twitter.&lt;ref&gt;{{cite tweet | user=gammagrouppr | author=Phineas Fisher | number=617937092497178624 | title=gamma and HT down, a few more to go :) | date=6 July 2015}}&lt;/ref&gt; Phineas has previously attacked spyware firm [[Gamma International]], who produce malware, such as [[FinFisher]], for governments and corporations.&lt;ref&gt;{{Cite web|title = HackingTeam: We won't 'shrivel up and go away' after cyberattack|url = http://www.zdnet.com/article/hacking-team-cyberattack-aftermath-interview/|accessdate = 2015-07-06|first = Charlie|last = Osbourne}}&lt;/ref&gt; In 2016, Phineas published details of the attack, in Spanish and English, as a &quot;how-to&quot; for others, and explained the motivations behind the attack.&lt;ref&gt;{{Cite web|url=http://arstechnica.com/security/2016/04/how-hacking-team-got-hacked-phineas-phisher/|title=How HackingTeam got hacked|website=Ars Technica|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> The internal documents revealed details of HackingTeam's contracts with repressive governments.&lt;ref&gt;{{Cite web|url=https://theintercept.com/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/|title=A Detailed Look at HackingTeam’s Emails About Its Repressive Clients|website=The Intercept|access-date=2016-05-15}}&lt;/ref&gt; In 2016, the Italian government again revoked the company’s license to sell spyware outside of Europe without special permission.&lt;ref name=&quot;:0&quot;&gt;{{Cite web|url=https://nakedsecurity.sophos.com/2016/04/08/hacking-team-loses-global-license-to-sell-spyware/|title=HackingTeam loses global license to sell spyware|last=Zorabedian|first=John|date=2016-04-08|website=Naked Security|access-date=2016-05-15}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://www.privacyinternational.org/node/826|title=HackingTeam’s Global License Revoked by Italian Export Authorities {{!}} Privacy International|website=www.privacyinternational.org|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> == Customer List ==<br /> HackingTeam's clientele include not just governments, but also corporate clients such as [[Barclay's]] Bank and [[British Telecom]] (BT) of the [[United Kingdom]], as well as [[Deutsche Bank]] of [[Germany]].&lt;ref name=spies/&gt;<br /> <br /> A full list of HackingTeam's customers were leaked in the 2015 breach. Disclosed documents show HackingTeam had 70 current customers, mostly military, police, federal and provincial governments. The total company revenues disclosed exceeded 40 million [[Euro]]s.&lt;ref&gt;{{cite web |author=Kopstein, Justin |title= Here Are All the Sketchy Government Agencies Buying HackingTeam's Spy Tech |url=http://motherboard.vice.com/read/here-are-all-the-sketchy-government-agencies-buying-hacking-teams-spy-tech |publisher=Vice Magazine |date=6 July 2015<br /> }}&lt;/ref&gt;&lt;ref&gt;{{cite web |author=Weissman, Cale Guthrie |title=Hacked security company's documents show a laundry list of questionable clients |url=http://www.businessinsider.com/hacked-security-companys-document-2015-7 |date=6 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |author=Ragan, Steve |title=In Pictures: HackingTeam's hack curated |url=http://www.cso.com.au/slideshow/579158/pictures-hacking-team-hack-curated/?image=9 |publisher=CSO Online (Australia)}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=HackingTeam hacked: firm sold spying tools to repressive regimes, documents claim |url=http://www.theguardian.com/technology/2015/jul/06/hacking-team-hacked-firm-sold-spying-tools-to-repressive-regimes-documents-claim |author=Hern, Alex |publisher=''The Guardian'' |date=6 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=HackingTeam responds to data breach, issues public threats and denials |url=http://www.csoonline.com/article/2944333/data-breach/hacking-team-responds-to-data-breach-issues-public-threats-and-denials.html |author=Ragan, Steve |publisher=''CSO Online'' |date=6 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=A whole bunch of downed government surveillance programs are about to go back online |url=http://www.businessinsider.com/hacking-team-promises-customers-they-can-resume-surveillance-operations-soon-2015-7 |author=Stevenson, Alastair |publisher=''Business Insider'' |date=14 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;<br /> <br /> {| class=&quot;wikitable sortable&quot;<br /> |-<br /> ! Customer<br /> ! Country<br /> ! Area<br /> ! Agency<br /> ! Year First Sale<br /> ! Annual Maintenance Fees<br /> ! Total Client Revenues<br /> |-<br /> | [[Polizia Postale e delle Comunicazioni]]&lt;ref&gt;Jone Pierantonio. [http://it.ibtimes.com/cyber-space/ecco-chi-ha-bucato-hacking-team-1408915 &quot;Ecco chi ha bucato HackingTeam&quot;]. ''International Business Times''. Retrieved on 2 August 2015.&lt;/ref&gt;||Italy||Europe||LEA||2004||€100,000||€808,833<br /> |-<br /> | [[Centro Nacional de Inteligencia]]&lt;ref&gt;Ediciones El País (8 July 2015). [http://internacional.elpais.com/internacional/2015/07/08/actualidad/1436343710_282978.html &quot;HackingTeam: “Ofrecemos tecnología ofensiva para la Policía”&quot;]. ''EL PAÍS''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Spain]]||Europe||Intelligence||2006||€52,000||€538,000<br /> |-<br /> | [[Infocomm Development Authority of Singapore]]||[[Singapore]]||APAC||Intelligence||2008||€89,000||€1,209,967<br /> |-<br /> | Information Office||[[Hungary]]||Europe||Intelligence||2008||€41,000||€885,000<br /> |-<br /> | CSDN||[[Morocco]]||MEA||Intelligence||2009||€140,000||€1,936,050<br /> |-<br /> | UPDF (Uganda Peoples Defense Force), ISO (Internal Security Organization), Office of the President||[[Uganda]]||Africa||Intelligence||2015||€831,000||€52,197,100<br /> |-<br /> | Italy - DA - Rental||Italy||Europe||Other||2009||€50,000||€628,250<br /> |-<br /> | [[Malaysian Anti-Corruption Commission]]||[[Malaysia]]||APAC||Intelligence||2009||€77,000||€789,123<br /> |-<br /> | PCM||Italy||Europe||Intelligence||2009||€90,000||€764,297<br /> |-<br /> | SSNS - Ungheria||Hungary||Europe||Intelligence||2009||€64,000||€1,011,000<br /> |-<br /> | CC - Italy||Italy||Europe||LEA||2010||€50,000||€497,349<br /> |-<br /> | [[Al Mukhabarat Al A'amah]]||[[Saudi Arabia]]||MEA||Intelligence||2010||€45,000||€600,000<br /> |-<br /> | IR Authorities (Condor)||[[Luxembourg]]||Europe||Other||2010||€45,000||€446,000<br /> |-<br /> | La Dependencia y/o CISEN&lt;ref&gt;[http://fusion.net/story/163872/the-hacking-team-leak-shows-mexico-was-the-top-client-but-why/ &quot;The HackingTeam leak shows Mexico was its top client, but why?&quot;]. ''Fusion''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Mexico]]||LATAM||Intelligence||2010||€130,000||€1,390,000<br /> |-<br /> | UZC&lt;ref name=fortune/&gt; ||[[Czech Republic]] ||Europe||LEA||2010||€55,000||€689,779<br /> |-<br /> | Egypt - MOD&lt;ref name=fortune/&gt;||[[Egypt]]||MEA||Other||2011||€70,000||€598,000<br /> |-<br /> | [[Federal Bureau of Investigation]]&lt;ref name=fbidea/&gt;||USA||North America||LEA||2011||€100,000||€697,710<br /> |-<br /> | Oman - Intelligence||[[Oman]]||MEA||Intelligence||2011||€30,000||€500,000<br /> |-<br /> | President Security&lt;ref&gt;[http://motherboard.vice.com/read/hacking-teams-equipment-got-stolen-in-panama &quot;HackingTeam's Equipment Got Stolen in Panama&quot;]. ''Motherboard''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref&gt;Molina, Thabata (13 August 2015). ''[http://panampost.com/thabata-molina/2015/08/13/panama-to-investigate-martinelli-in-hacking-team-spying-scandal/ &quot;Panama to Investigate Martinelli in HackingTeam Spying Scandal&quot;]''. ''Panama Post''. Retrieved 15 August 2015.&lt;/ref&gt;<br /> ||[[Panama]]||LATAM||Intelligence||2011||€110,000||€750,000<br /> |-<br /> | [[Turkish National Police]]||[[Turkey]]||Europe||LEA||2011||€45,000||€440,000<br /> |-<br /> | UAE - MOI||[[United Arab Emirates|UAE]]||MEA||LEA||2011||€90,000||€634,500<br /> |-<br /> | [[National Security Service (Uzbekistan)|National Security Service]]&lt;ref name=fortune&gt;[http://fortune.com/2015/07/16/governments-used-spy-software/ &quot;Leaked emails from security firm HackingTeam show government use - Fortune&quot;]. ''Fortune''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Uzbekistan]]||Europe||Intelligence||2011||€50,000||€917,038<br /> |-<br /> | [[United States Department of Defense|Department of Defense]]&lt;ref name=fbidea/&gt;||USA||North America||LEA||2011||||€190,000<br /> |-<br /> | Bayelsa State Government||[[Nigeria]]||MEA||Intelligence||2012||€75,000||€450,000<br /> |-<br /> | Estado del Mexico||Mexico||LATAM||LEA||2012||€120,000||€783,000<br /> |-<br /> | Information Network Security Agency||[[Ethiopia]]||MEA||Intelligence||2012||€80,000||€750,000<br /> |-<br /> | State security (Falcon)||Luxemburg||Europe||Other||2012||€38,000||€316,000<br /> |-<br /> | Italy - DA - Rental||Italy||Europe||Other||2012||€60,000||€496,000<br /> |-<br /> | MAL - MI||Malaysia||APAC||Intelligence||2012||€77,000||€552,000<br /> |-<br /> | [[Direction générale de la surveillance du territoire]]||Morocco||MEA||Intelligence||2012||€160,000||€1,237,500<br /> |-<br /> | [[National Intelligence and Security Service]]&lt;ref name=fortune/&gt;||[[Sudan]]||MEA||Intelligence||2012||€76,000||€960,000<br /> |-<br /> | Russia - KVANT&lt;ref name=kvant&gt;[http://arstechnica.com/tech-policy/2015/07/hacking-teams-surveillance-software-sold-to-kgb-successor/ &quot;HackingTeam apparently violated EU rules in sale of spyware to Russian agency&quot;]. ''Ars Technica''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Russia]]||Europe||Intelligence||2012||€72,000||€451,017<br /> |-<br /> | Saudi - GID||Saudi||MEA||LEA||2012||€114,000||€1,201,000<br /> |-<br /> | SIS of [[National Security Committee of the Republic of Kazakhstan|National Security Committee of Kazakhstan]]&lt;ref name=fortune/&gt;||[[Kazakhstan]]||Europe||Intelligence||2012||€140,000||€1,012,500<br /> |-<br /> | The 5163 Army Division (Alias of South Korean National Intelligence Service)&lt;ref name=fortune/&gt;&lt;ref name=torbrowser&gt;[https://firstlook.org/theintercept/2015/07/16/hackingteam-attacked-tor-browser/ &quot;How HackingTeam Created Spyware that Allowed the FBI To Monitor Tor Browser&quot;]. ''The Intercept''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref name=wswskorea&gt;McGrath, Ben (25 July 2015). &quot;''[https://www.wsws.org/en/articles/2015/07/25/kore-j25.html Further revelations in South Korean hacking scandal]''&quot;. ''World Socialist Web Site''. Retrieved 26 July 2015.&lt;/ref&gt;||[[South Korea|S. Korea]]||APAC||Other||2012||€67,000||€686,400<br /> |-<br /> | UAE - Intelligence||[[United Arab Emirates|UAE]]||MEA||Other||2012||€150,000||€1,200,000<br /> |-<br /> | [[Drug Enforcement Administration]]&lt;ref name=fbidea&gt;[https://firstlook.org/theintercept/2015/07/06/hacking-team-spyware-fbi/ &quot;Leaked Documents Show FBI, DEA and U.S. Army Buying Italian Spyware&quot;]. ''The Intercept''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref name=dea&gt;[http://motherboard.vice.com/read/the-dea-just-cancelled-its-contract-with-hacking-team &quot;The DEA Just Cancelled Its Contract With HackingTeam&quot;]. ''Motherboard''. Retrieved on 2 August 2015.&lt;/ref&gt;||USA||North America||Other||2012||€70,000||€567,984<br /> |-<br /> | [[Central Anticorruption Bureau]]||[[Poland]]||Europe||LEA||2012||€35,000||€249,200<br /> |-<br /> | MOD Saudi||Saudi||MEA||Other||2013||€220,000||€1,108,687<br /> |-<br /> | PMO||Malaysia||APAC||Intelligence||2013||€64,500||€520,000<br /> |-<br /> | Estado de Qeretaro||Mexico||LATAM||LEA||2013||€48,000||€234,500<br /> |-<br /> | National Security Agency&lt;ref name=fortune/&gt;||[[Azerbaijan]]||Europe||Intelligence||2013||€32,000||€349,000<br /> |-<br /> | Gobierno de Puebla||Mexico||LATAM||Other||2013||€64,000||€428,835<br /> |-<br /> | Gobierno de Campeche||Mexico||LATAM||Other||2013||€78,000||€386,296<br /> |-<br /> | AC Mongolia||[[Mongolia]]||APAC||Intelligence||2013||€100,000||€799,000<br /> |-<br /> | Dept. of Correction Thai Police ||[[Thailand]]||APAC||LEA||2013||€52,000||€286,482<br /> |-<br /> | [[National Intelligence Secretariat (Ecuador)|National Intelligence Secretariat]]&lt;ref&gt;http://panampost.com/rebeca-morla/2015/07/13/ecuadorian-websites-report-on-hacking-team-get-taken-down/&lt;br /&gt;http://panampost.com/panam-staff/2015/08/10/hacking-team-helped-ecuador-spy-on-opposition-activist/&lt;br /&gt;http://bigstory.ap.org/article/6f41d49888174b45857d34511fda1caf/apnewsbreak-email-leak-suggests-ecuador-spied-opposition&lt;/ref&gt;<br /> ||[[Ecuador]]||LATAM||LEA||2013||€75,000||€535,000<br /> |-<br /> | Police Intelligence Directorate&lt;ref name=dipol_telesur&gt;Podour, Justin (23 July 2015). [http://www.telesurtv.net/opinion/HackedTeam-y-Colombia-Como-la-vigilancia-ayuda-a-un-Estado-violento-20150723-0062.html #HackedTeam y Colombia: Cómo la vigilancia ayuda a un Estado violento]. ''Telesur''. Retrieved 26 July 2015.&lt;/ref&gt;||[[Colombia]]||LATAM||LEA||2013||€35,000||€335,000<br /> |-<br /> | [[Guardia di Finanza]]||Italy||Europe||LEA||2013||€80,000||€400,000<br /> |-<br /> | Intelligence&lt;ref name=cyprus&gt;In Cyprus (11 July 2015).[http://in-cyprus.com/intelligence-service-chief-steps-down/ Intelligence Service chief steps down]. Retrieved 26 July 2015.&lt;/ref&gt;||[[Cyprus]]||Europe||LEA||2013||€40,000||€375,625<br /> |-<br /> | MidWorld&lt;ref name=ifex&gt;Bahrain Center for Human Rights (15 July 2015). &quot;''[https://www.ifex.org/bahrain/2015/07/15/bahrain_hacking_team HackingTeam's troubling connections to Bahrain]''&quot; IFEX. Retrieved 26 July 2015.&lt;/ref&gt;||[[Bahrain]]||MEA||Intelligence||2013||||€210,000<br /> |-<br /> | Mexico - PEMEX||Mexico ||LATAM||LEA ||2013||||€321,120<br /> |-<br /> | Malysia K||Malaysia||APAC||LEA||2013||||€0<br /> |-<br /> | Honduras||[[Honduras]]||LATAM||LEA||2014||||€355,000<br /> |-<br /> | Mex Taumalipas||Mexico||LATAM||||2014||||€322,900<br /> |-<br /> | Secretaría de Planeación y Finanzas||Mexico||LATAM||LEA||2014||€91,000||€371,035<br /> |-<br /> | AREA||Italia||Europe||||2014||||€430,000<br /> |-<br /> | Mexico Yucatán||Mexico||LATAM||LEA||2014||||€401,788<br /> |-<br /> | Mexico Durango||Mexico||LATAM||LEA||2014||||€421,397<br /> |-<br /> | [[Investigations Police of Chile]]||[[Chile]]||LATAM||LEA||2014||||€2,289,155<br /> |-<br /> | Jalisco Mexico||Mexico||LATAM||LEA||2014||||€748,003<br /> |-<br /> | [[Royal Thai Army]]||Thailand||APAC||LEA||2014||||€360,000<br /> |-<br /> | Vietnam GD5||[[Vietnam]]||APAC||||2014||||€281,170<br /> |-<br /> | [[Kantonspolizei Zürich]]||Switzerland||Europe||LEA||2014||||€486,500<br /> |-<br /> | Vietnam GD1||Vietnam||APAC||LEA||2015||||€543,810<br /> |-<br /> | Egypt TRD GNSE||Egypt||MEA||LEA||2015||||€137,500<br /> |-<br /> | [[Lebanese Armed Forces|Lebanese Army]]||[[Lebanon]]||MEA||LEA||2015||||<br /> |-<br /> | [[Federal Police Department]]||Brazil||LATAM||LEA||2015||||<br /> |-<br /> | [[SHISH|State Informative Service]]&lt;ref&gt;Lexime (14 July 2015). &quot;''[http://www.balkanweb.com/site/burime-te-sigurta-shish-perdor-programet-pergjuese-qe-prej-2015-hacking-teams-nuk-e-kemi-nen-kontroll-sistemin/ Burime të sigurta, SHISH përdor programet përgjuese që prej 2015. HackingTeams: Nuk e kemi nën kontroll sistemin!]''&quot; (video). BalkanWeb. Retrieved 27 July 2015.&lt;/ref&gt;||[[Albania]]||Europe||SHIK||2015||||<br /> |}<br /> <br /> == See also ==<br /> * [[FinFisher]]<br /> * [[MiniPanzer and MegaPanzer]]<br /> * [[Vupen]] – 0-day exploit provider linked to HackingTeam&lt;ref&gt;[https://tsyrklevich.net/2015/07/22/hacking-team-0day-market/ HackingTeam: a zero-day market case study], Vlad Tsyrklevich's blog&lt;/ref&gt;<br /> * ''[[Mamfakinch]]'' – a citizen media organization targeted with malware allegedly developed by HackingTeam&lt;ref&gt;Perlroth, Nicole (10 October 2012). [http://bits.blogs.nytimes.com/2012/10/10/ahead-of-spyware-conference-more-evidence-of-abuse/?_r=0 Ahead of Spyware Conference, More Evidence of Abuse]. ''New York Times'' (Bits).&lt;/ref&gt;<br /> <br /> ==References==<br /> {{reflist|30em}}<br /> <br /> == External links ==<br /> * {{Official website| http://www.hackingteam.it/}}<br /> * [https://citizenlab.org/tag/hacking-team/ HackingTeam Archives] - investigative reports published by The [[Citizen Lab]]<br /> * [https://wikileaks.org/hackingteam/emails WikiLeaks: ''The Hackingteam Archives''] - searchable database of 1 million internal emails<br /> * [https://wikileaks.org/spyfiles/list/company-name/hackingteam.html HackingTeam presentations] in the [[WikiLeaks]] &quot;''Spy Files''&quot;<br /> {{Hacking in the 2010s}}<br /> <br /> [[Category:Computer security software]]<br /> [[Category:Spyware]]<br /> [[Category:Surveillance]]<br /> [[Category:Trojan horses]]<br /> [[Category:Espionage techniques]]<br /> [[Category:Espionage devices]]<br /> [[Category:Malware toolkits]]<br /> [[Category:Computer access control]]<br /> [[Category:Cyberwarfare]]<br /> [[Category:Espionage scandals and incidents]]<br /> [[Category:Companies based in Milan]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=HackingTeam&diff=177175003 HackingTeam 2016-06-18T17:38:03Z <p>Dsprc: /* See also */</p> <hr /> <div>{{Infobox company<br /> | name = HackingTeam<br /> | logo = Hacking Team logo.png<br /> | logo_size = <br /> | logo_alt = The words Hacking Team enclosed with in reversed square brackets &lt;nowiki&gt;][&lt;/nowiki&gt;<br /> | logo_caption = Company logo<br /> | logo_padding = <br /> | image = <br /> | image_size = <br /> | image_alt = <br /> | image_caption = <br /> | type = <br /> | industry = [[Information technology]]<br /> | founded = 2003<br /> | founders = David Vincenzetti, Valeriano Bedeschi<br /> | hq_location = <br /> | hq_location_city = [[Milan]]<br /> | hq_location_country = [[Italy]]<br /> | area_served = &lt;!-- or: | areas_served = --&gt;<br /> | key_people = Alberto Ornaghi (ALoR), Marco Valleri (NaGA)<br /> | products = {{unbulleted list|Software}}<br /> | brands = <br /> | services = <br /> | owner = &lt;!-- or: | owners = --&gt;<br /> | website = {{URL|http://www.hackingteam.it/}}<br /> }}<br /> '''HackingTeam''' is a [[Milan]]-based [[information technology]] company that sells offensive intrusion and [[surveillance]] capabilities to governments, law enforcement agencies and corporations.&lt;ref name=spies&gt;{{cite web |title=The spies behind your screen |url=http://www.telegraph.co.uk/technology/8899353/The-spies-behind-your-screen.html |author=Batey, Angus |date=24 November 2011 |publisher=''The Telegraph'' |accessdate=26 July 2015}}&lt;/ref&gt; Its &quot;''Remote Control Systems''&quot; enable governments and corporations to monitor the communications of internet users, decipher their [[cryptography|encrypted]] files and emails, record [[Skype]] and other [[Voice over IP]] communications, and remotely activate microphones and camera on target computers.&lt;ref&gt;{{cite web|title=Enemies of the Internet: HackingTeam|url=http://surveillance.rsf.org/en/hacking-team/|work=[[Reporters Without Borders]]|accessdate=24 April 2014}}&lt;/ref&gt; The company has been criticized for providing these capabilities to governments with poor [[human rights]] records.&lt;ref&gt;{{cite web | last3 = Marquis-Boire | first3 = Morgan | last1 = Marczak | first1 = Bill | last2 = Gaurnieri | first2 = Claudio | last4 = Scott-Railton | first4 = John | title = Mapping HackingTeam's &quot;Untraceable&quot; Spyware | url = https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ | date = February 17, 2014}}&lt;/ref&gt; HackingTeam states that they have the ability to disable their software if it is used unethically.&lt;ref&gt;{{cite news|url=http://www.newyorker.com/online/blogs/elements/2014/03/hacked-by-ones-own-government.html|title=Hackers Without Borders|last=Kopstein|first=Joshua|work=[[The New Yorker]]|date=10 March 2014|accessdate=24 April 2014}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url = https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/|title = Police Story: HackingTeam’s Government Surveillance Malware|date = June 24, 2014|accessdate = August 3, 2014|website = Citizen Lab|publisher = University of Toronto|last1 = Marquis-Boire|first1 = Morgan | last2 = Gaurnieri | first2 = Claudio | first3 = John | last3 = Scott-Railton | first4 = Katie | last4 = Kleemola }}&lt;/ref&gt; The Italian government has restricted their license to do business with countries outside Europe.&lt;ref name=&quot;:0&quot; /&gt;<br /> <br /> HackingTeam employs around 40 people in its Italian office, and has subsidiary branches in [[Annapolis]], [[Washington, D.C.]] and [[Singapore]].&lt;ref name=know&gt;''[[Human Rights Watch]]'' (25 March 2014). ''&quot;[https://www.hrw.org/report/2014/03/25/they-know-everything-we-do/telecom-and-internet-surveillance-ethiopia They Know Everything We Do]&quot;''. Retrieved 1 August 2015.&lt;/ref&gt; Its products are in use in dozens of countries across six continents.&lt;ref name=Jeffries&gt;{{cite web|last=Jeffries|first=Adrianne|title=Meet HackingTeam, the company that helps the police hack you|url=http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers|accessdate=21 April 2014|work=[[The Verge]]|date=13 September 2013}}&lt;/ref&gt;<br /> <br /> ==History==<br /> HackingTeam was started by two Italian programmers: Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri (under the aliases of ALoR, and NaGA respectively), created a set of tools that could be used to monitor and remotely manipulate target computers. The program, called [[Ettercap (software)|Ettercap]], was embraced both by [[Hacker (term)|hackers]] looking to spy on people, and by companies that hoped to test the security of their own networks.<br /> <br /> The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their [[Skype]] calls, the police contacted Ornaghi and Valleri and asked them to help modify the program. HackingTeam was born, and became &quot;the first sellers of commercial hacking software to the police.&quot;&lt;ref name=Jeffries/&gt;<br /> <br /> According to former employee Alberto Pelliccione, the company began as security services provider, offering [[penetration testing]], auditing and other defensive capabilities to clients.&lt;ref name=war&gt;Farivar, Cyrus (20 July 2015) [http://arstechnica.com/security/2015/07/italian-prosecutors-investigate-former-hacking-team-employees-for-role-in-hack/ HackingTeam goes to war against former employees, suspects some helped hackers]. ''Ars Technica''. Retrieved 26 July 2015.&lt;/ref&gt; Pelliccione states that as malware and other offensive capabilities were developed and accounted for a larger percentage of revenues, the organization pivoted in a more offensive direction and became increasingly compartmentalized. Pelliccione claims fellow employees working on aspects of the same platform - for example, Android exploits and payloads - would not communicate with one another, possibly leading to tensions and strife within the organization.&lt;ref name=war/&gt;<br /> <br /> In February 2014, a report from [[Citizen Lab]] identified the organisation to be using hosting services from [[Linode]], [[Telecom Italia]], [[Rackspace]], [[NOC4Hosts]] and notorious [[bullet proof hosting]] company [[Santrex]].&lt;ref&gt;{{cite news|title=HackingTeam’s US Nexus|url=https://citizenlab.org/2014/02/hacking-teams-us-nexus/|accessdate=2 August 2015|date=28 February 2014}}&lt;/ref&gt;<br /> <br /> On July 5, 2015 the company suffered a major data breach of customer data, software code, internal documents and emails. - ''See: [[#2015 data breach|§ 2015 data breach]]''<br /> <br /> ==Products and capabilities==<br /> HackingTeam enables clients to perform remote monitoring functions against citizens via their [[Remote administration tool|RCS (Remote Control Systems)]], including their '''Da Vinci''' and '''Galileo''' platforms:&lt;ref name=spies/&gt;<br /> <br /> *Covert collection of emails, text message, phone call history and address books<br /> *[[Keystroke logging]]<br /> *Uncover search history data and take screenshots<br /> *Record audio from phone calls<br /> :*Capture audio and video stream from device memory to bypass [[cryptography]] of [[Skype]] sessions&lt;ref&gt;{{cite web | title=Mideast Uses Western Tools to Battle the Skype Rebellion |url=http://www.wsj.com/articles/SB10001424052702304520804576345970862420038 |author1=Stecklow, Steve |author2=Sonne, Paul |author3=Bradley, Matt |date=1 June 2011 |publisher=''Wall Street Journal'' |accessdate=26 July 2015}}&lt;/ref&gt;<br /> :*Use microphones on device to collect ambient background noise and conversations<br /> *Activate phone or computer cameras<br /> *Hijack telephone GPS systems to monitor target's location<br /> *Infect target computer's [[UEFI]] [[BIOS]] [[firmware]] with a [[rootkit]]&lt;ref&gt;{{Cite web|first=Philippe |last=Lin |url=http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-uses-uefi-bios-rootkit-to-keep-rcs-9-agent-in-target-systems/ |title=HackingTeam Uses UEFI BIOS Rootkit to Keep RCS 9 Agent in Target Systems |work=TrendLabs Security Intelligence Blog |publisher=[[Trend Micro]] |date=July 13, 2015 |accessdate=July 26, 2015}}&lt;/ref&gt;<br /> *Extract WiFi passwords&lt;ref name=skiddies&gt;[http://arstechnica.com/security/2015/07/advanced-spyware-for-android-now-available-to-script-kiddies-everywhere/ &quot;Advanced spyware for Android now available to script kiddies everywhere&quot;]. ''Ars Technica''. Retrieved on 2 August 2015.&lt;/ref&gt;<br /> *Exfiltrate [[Bitcoin]] and other cryptocurrency wallet files to collect data on local accounts, contacts and transaction histories.&lt;ref name=coin&gt;Farivar, Cyrus (14 July 2015). &quot;''[http://arstechnica.com/security/2015/07/hacking-team-broke-bitcoin-secrecy-by-targeting-crucial-wallet-file/ HackingTeam broke Bitcoin secrecy by targeting crucial wallet file]''&quot;. ''Ars Technica''. Retrieved 26 July 2015.&lt;/ref&gt;<br /> <br /> HackingTeam uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.&lt;ref&gt;{{cite news|last1=Schneier|first1=Bruce|title=More on HackingTeam's Government Spying Software|url=https://www.schneier.com/blog/archives/2014/06/more_on_hacking.html}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=http://www.ibtimes.co.uk/hacking-team-tools-allow-governments-take-full-control-your-smartphone-1453987|title=HackingTeam Tools Allow Governments To Take Full Control of Your Smartphone|date=2014-06-24|website=International Business Times UK|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> The malware has payloads for [[Android (operating system)|Android]],&lt;ref name=skiddies/&gt; [[BlackBerry]], Apple [[iOS]], [[Linux]], [[Mac OS X]], [[Symbian]], as well as [[Microsoft Windows]], [[Windows Mobile]] and [[Windows Phone]] class of [[operating system]]s.&lt;ref name=C3&gt;Guarnieri, Claudio; Marquis-Boire, Morgan (13 January 2014). ''[https://media.ccc.de/browse/congress/2013/30C3_-_5439_-_en_-_saal_1_-_201312292105_-_to_protect_and_infect_-_claudio_guarnieri_-_morgan_marquis-boire.html &quot;To Protect And Infect: The militarization of the Internet&quot;]''. At the 30th [[Chaos Communications Congress]] – &quot;30C3&quot;. (Video or Audio). [[Chaos Computer Club]]. Retrieved on 15 August 2015.&lt;/ref&gt;<br /> <br /> RCS is a management platform that allows operators to remotely deploy exploits and payloads against targeted systems, remotely manage devices once compromised, and exfiltrate data for remote analysis.<br /> <br /> == Controversies ==<br /> <br /> === Use by repressive governments ===<br /> HackingTeam has been criticized for selling its products and services to governments with poor human rights records, including [[Sudan]], [[Bahrain]], and [[Saudi Arabia]].&lt;ref name=repress/&gt;<br /> <br /> In June 2014, a United Nations panel monitoring the implementation of sanctions on Sudan requested information from HackingTeam about their alleged sales of software to the country in contravention of United Nations weapons export bans to Sudan. Documents leaked in the 2015 data breach of HackingTeam revealed the organization sold Sudanese National Intelligence and Security Service access to their &quot;Remote Control System&quot; software in 2012 for 960,000 Euros.&lt;ref name=repress/&gt;&lt;ref&gt;{{Cite web|url=https://theintercept.com/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/|title=A Detailed Look at HackingTeam’s Emails About Its Repressive Clients|last=Hay Newman|first=Lily|website=The Intercept|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> In response to the United Nations panel, the company responded in January 2015 that they were not currently selling to Sudan. In a follow-up exchange, HackingTeam asserted that their product was not controlled as a weapon, and so the request was beyond the scope of the panel. There was no need for them to disclose previous sales, which they considered confidential business information.&lt;ref name=repress&gt;{{Cite web |title=A Detailed Look at HackingTeam’s Emails About Its Repressive Clients |url=https://firstlook.org/theintercept/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/ |accessdate=7 July 2015 |first1=Cora |last1=Currier |first2=Morgan |last2=Marquis-Boire}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://www.eff.org/deeplinks/2015/07/hacking-team-leaks-reveal-spyware-industrys-growth|title=HackingTeam Leaks Reveal Spyware Industry's Growth, Negligence of Human Rights|last=Myers West|first=Sarah|date=2015-07-08|website=Electronic Frontier Foundation|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> The U.N. disagreed. &quot;The view of the panel is that as such software is ideally suited to support military electronic intelligence (ELINT) operations it may potentially fall under the category of ‘military … equipment’ or ‘assistance’ related to prohibited items,&quot; the secretary wrote in March. &quot;Thus its potential use in targeting any of the belligerents in the Darfur conflict is of interest to the Panel.&quot;&lt;ref name=repress/&gt;&lt;ref&gt;{{Cite web|url=http://gizmodo.com/hacking-teams-lame-excuse-for-selling-digital-weapons-t-1716375503|title=HackingTeam's Lame Excuse for Selling Digital Weapons to Sudan|last=Knibbs|first=Kate|date=2015-07-08|website=Gizmodo|language=en-US|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> In the fall of 2014, the Italian government abruptly froze all of HackingTeam's exports, citing human rights concerns. After lobbying Italian officials, the company temporarily won back the right to sell its products abroad.&lt;ref name=repress/&gt;<br /> <br /> === 2015 data breach ===<br /> On July 5, 2015, the [[Twitter]] account of the company was compromised by an unknown individual who published an announcement of a [[data breach]] against HackingTeam's computer systems. The initial message read, &quot;''Since we have nothing to hide, we're publishing all our e-mails, files, and source code …''&quot; and provided links to over 400 [[gigabyte]]s of data, including alleged internal e-mails, invoices, and [[source code]]; which were leaked via [[BitTorrent]] and [[Mega (service)|Mega]].&lt;ref&gt;{{Wayback|url=https://twitter.com/hackingteam|title=Hacked Team (@hackingteam)|date=20150706010312}}&lt;/ref&gt; An announcement of the data breach, including a link to the bittorrent seed, was retweeted by [[WikiLeaks]] and by many others through social media.&lt;ref&gt;{{Twitter status|wikileaks|617865712611233792|Inside malware makers &quot;HackingTeam&quot;: hundreds of gigabytes of e-mails, files, and source code|[[WikiLeaks]]|July 6, 2015|July 6, 2015}}&lt;/ref&gt;&lt;ref name=&quot;ibtimes.co.uk&quot;&gt;{{Cite web|url=http://www.ibtimes.co.uk/hacking-team-hacked-spy-tools-sold-oppressive-regimes-sudan-bahrain-kazakhstan-1509460|title=HackingTeam hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan|date=2015-06-06|publisher=International Business Times|accessdate=2015-07-06}}&lt;/ref&gt;<br /> <br /> The material was voluminous and early analysis appeared to reveal that HackingTeam had invoiced the [[Lebanese Army]]&lt;ref&gt;{{Twitter|url=https://twitter.com/SynAckPwn/status/617955067006578689}} {{dead link|date=July 2015}}&lt;/ref&gt; and [[Sudan]] and that spy tools were also sold to [[Bahrain]] and [[Kazakhstan]].&lt;ref name=&quot;ibtimes.co.uk&quot;/&gt; HackingTeam had previously claimed they had never done business with Sudan.&lt;ref&gt;{{Cite web|title = HackingTeam hacked, attackers claim 400GB in dumped data|url = http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html|accessdate = 2015-07-06|first = Steve|last = Ragan}}&lt;/ref&gt;<br /> <br /> The leaked data revealed a [[zero-day (computing)|zero-day]] cross-platform Flash exploit ([[Common Vulnerabilities and Exposures|CVE]] number: CVE-2015-5119).&lt;ref&gt;{{Cite web|title = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html|url = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html}}&lt;/ref&gt; The dump included a demo of this exploit by opening [[Calculator (computer program)|Calculator]] from a test webpage.&lt;ref&gt;{{Cite web|title = Zero-Day Flash Player Exploit Disclosed In 'HackingTeam' Data Dump|url = http://thehackernews.com/2015/07/flash-zero-day-vulnerability.html|accessdate = 2015-07-06|first = Swati|last = Khandelwal}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Unpatched Flash Player Flaw, More POCs Found in HackingTeam Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/|accessdate = 2015-07-08|first = Peter|last = Pi}}&lt;/ref&gt; Adobe [[software patch|patched]] the hole on July 8, 2015.&lt;ref&gt;{{Cite web|title = Adobe Security Bulletin|url = https://helpx.adobe.com/security/products/flash-player/apsb15-16.html|accessdate = 2015-07-11|last = Adobe Systems (corporate author)}}&lt;/ref&gt; Another vulnerability involving Adobe was revealed in the dumps, which took advantage of a [[buffer overflow]] attack on an Adobe Open Type Manager [[Dynamic-link library|DLL]] included with [[Microsoft Windows]]. The DLL is run in [[protection ring|kernel mode]], so the attack could perform [[privilege escalation]] to bypass the [[sandbox (computer security)|sandbox]].&lt;ref&gt;{{Cite web|title = A Look at the Open Type Font Manager Vulnerability from the HackingTeam Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-the-open-type-font-manager-vulnerability-from-the-hacking-team-leak/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29|accessdate = 2015-07-08|first = Jack|last = Tang}}&lt;/ref&gt;<br /> <br /> Also revealed in leaked data was HackingTeam employees' use of weak passwords, including 'P4ssword', 'wolverine', and 'universo'.&lt;ref&gt;{{Cite web|title = HackingTeam used shockingly bad passwords|url = http://www.zdnet.com/article/no-wonder-hacking-team-got-hacked/|accessdate = 2015-07-06|first = Zack|last = Whittaker}}&lt;/ref&gt;<br /> <br /> After a few hours without response from HackingTeam, member Christian Pozzi tweeted the company was working closely with police and &quot;''what the attackers are claiming regarding our company is not true.''&quot;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964180042190848|accessdate = 2015-07-06}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964660705234944|accessdate = 2015-07-06}}&lt;/ref&gt; He also claimed the leaked archive &quot;contains a virus&quot; and that it constituted &quot;false info&quot;.&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617962663188926465|accessdate = 2015-07-06}}&lt;/ref&gt; Shortly after these tweets, Pozzi's Twitter account itself was apparently compromised.&lt;ref&gt;{{Cite web|title=Christian Pozzi on Twitter: &quot;Uh Oh - my twitter account was also hacked.&quot; |url=https://twitter.com/christian_pozzi/status/617977753250496512 |date=2015-07-06 |accessdate=2015-07-06 |deadurl=yes |archiveurl=https://web.archive.org/web/20150706084837/https://twitter.com/christian_pozzi/status/617977753250496512 |archivedate=July 6, 2015 }}&lt;/ref&gt;<br /> <br /> Responsibility for this attack was claimed by the hacker known as &quot;Phineas Fisher&quot; (or Phisher) on Twitter.&lt;ref&gt;{{cite tweet | user=gammagrouppr | author=Phineas Fisher | number=617937092497178624 | title=gamma and HT down, a few more to go :) | date=6 July 2015}}&lt;/ref&gt; Phineas has previously attacked spyware firm [[Gamma International]], who produce malware, such as [[FinFisher]], for governments and corporations.&lt;ref&gt;{{Cite web|title = HackingTeam: We won't 'shrivel up and go away' after cyberattack|url = http://www.zdnet.com/article/hacking-team-cyberattack-aftermath-interview/|accessdate = 2015-07-06|first = Charlie|last = Osbourne}}&lt;/ref&gt; In 2016, Phineas published details of the attack, in Spanish and English, as a &quot;how-to&quot; for others, and explained the motivations behind the attack.&lt;ref&gt;{{Cite web|url=http://arstechnica.com/security/2016/04/how-hacking-team-got-hacked-phineas-phisher/|title=How HackingTeam got hacked|website=Ars Technica|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> The internal documents revealed details of HackingTeam's contracts with repressive governments.&lt;ref&gt;{{Cite web|url=https://theintercept.com/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/|title=A Detailed Look at HackingTeam’s Emails About Its Repressive Clients|website=The Intercept|access-date=2016-05-15}}&lt;/ref&gt; In 2016, the Italian government again revoked the company’s license to sell spyware outside of Europe without special permission.&lt;ref name=&quot;:0&quot;&gt;{{Cite web|url=https://nakedsecurity.sophos.com/2016/04/08/hacking-team-loses-global-license-to-sell-spyware/|title=HackingTeam loses global license to sell spyware|last=Zorabedian|first=John|date=2016-04-08|website=Naked Security|access-date=2016-05-15}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://www.privacyinternational.org/node/826|title=HackingTeam’s Global License Revoked by Italian Export Authorities {{!}} Privacy International|website=www.privacyinternational.org|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> == Customer List ==<br /> HackingTeam's clientele include not just governments, but also corporate clients such as [[Barclay's]] Bank and [[British Telecom]] (BT) of the [[United Kingdom]], as well as [[Deutsche Bank]] of [[Germany]].&lt;ref name=spies/&gt;<br /> <br /> A full list of HackingTeam's customers were leaked in the 2015 breach. Disclosed documents show HackingTeam had 70 current customers, mostly military, police, federal and provincial governments. The total company revenues disclosed exceeded 40 million [[Euro]]s.&lt;ref&gt;{{cite web |author=Kopstein, Justin |title= Here Are All the Sketchy Government Agencies Buying HackingTeam's Spy Tech |url=http://motherboard.vice.com/read/here-are-all-the-sketchy-government-agencies-buying-hacking-teams-spy-tech |publisher=Vice Magazine |date=6 July 2015<br /> }}&lt;/ref&gt;&lt;ref&gt;{{cite web |author=Weissman, Cale Guthrie |title=Hacked security company's documents show a laundry list of questionable clients |url=http://www.businessinsider.com/hacked-security-companys-document-2015-7 |date=6 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |author=Ragan, Steve |title=In Pictures: HackingTeam's hack curated |url=http://www.cso.com.au/slideshow/579158/pictures-hacking-team-hack-curated/?image=9 |publisher=CSO Online (Australia)}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=HackingTeam hacked: firm sold spying tools to repressive regimes, documents claim |url=http://www.theguardian.com/technology/2015/jul/06/hacking-team-hacked-firm-sold-spying-tools-to-repressive-regimes-documents-claim |author=Hern, Alex |publisher=''The Guardian'' |date=6 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=HackingTeam responds to data breach, issues public threats and denials |url=http://www.csoonline.com/article/2944333/data-breach/hacking-team-responds-to-data-breach-issues-public-threats-and-denials.html |author=Ragan, Steve |publisher=''CSO Online'' |date=6 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=A whole bunch of downed government surveillance programs are about to go back online |url=http://www.businessinsider.com/hacking-team-promises-customers-they-can-resume-surveillance-operations-soon-2015-7 |author=Stevenson, Alastair |publisher=''Business Insider'' |date=14 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;<br /> <br /> {| class=&quot;wikitable sortable&quot;<br /> |-<br /> ! Customer<br /> ! Country<br /> ! Area<br /> ! Agency<br /> ! Year First Sale<br /> ! Annual Maintenance Fees<br /> ! Total Client Revenues<br /> |-<br /> | [[Polizia Postale e delle Comunicazioni]]&lt;ref&gt;Jone Pierantonio. [http://it.ibtimes.com/cyber-space/ecco-chi-ha-bucato-hacking-team-1408915 &quot;Ecco chi ha bucato HackingTeam&quot;]. ''International Business Times''. Retrieved on 2 August 2015.&lt;/ref&gt;||Italy||Europe||LEA||2004||€100,000||€808,833<br /> |-<br /> | [[Centro Nacional de Inteligencia]]&lt;ref&gt;Ediciones El País (8 July 2015). [http://internacional.elpais.com/internacional/2015/07/08/actualidad/1436343710_282978.html &quot;HackingTeam: “Ofrecemos tecnología ofensiva para la Policía”&quot;]. ''EL PAÍS''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Spain]]||Europe||Intelligence||2006||€52,000||€538,000<br /> |-<br /> | [[Infocomm Development Authority of Singapore]]||[[Singapore]]||APAC||Intelligence||2008||€89,000||€1,209,967<br /> |-<br /> | Information Office||[[Hungary]]||Europe||Intelligence||2008||€41,000||€885,000<br /> |-<br /> | CSDN||[[Morocco]]||MEA||Intelligence||2009||€140,000||€1,936,050<br /> |-<br /> | UPDF (Uganda Peoples Defense Force), ISO (Internal Security Organization), Office of the President||[[Uganda]]||Africa||Intelligence||2015||€831,000||€52,197,100<br /> |-<br /> | Italy - DA - Rental||Italy||Europe||Other||2009||€50,000||€628,250<br /> |-<br /> | [[Malaysian Anti-Corruption Commission]]||[[Malaysia]]||APAC||Intelligence||2009||€77,000||€789,123<br /> |-<br /> | PCM||Italy||Europe||Intelligence||2009||€90,000||€764,297<br /> |-<br /> | SSNS - Ungheria||Hungary||Europe||Intelligence||2009||€64,000||€1,011,000<br /> |-<br /> | CC - Italy||Italy||Europe||LEA||2010||€50,000||€497,349<br /> |-<br /> | [[Al Mukhabarat Al A'amah]]||[[Saudi Arabia]]||MEA||Intelligence||2010||€45,000||€600,000<br /> |-<br /> | IR Authorities (Condor)||[[Luxembourg]]||Europe||Other||2010||€45,000||€446,000<br /> |-<br /> | La Dependencia y/o CISEN&lt;ref&gt;[http://fusion.net/story/163872/the-hacking-team-leak-shows-mexico-was-the-top-client-but-why/ &quot;The HackingTeam leak shows Mexico was its top client, but why?&quot;]. ''Fusion''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Mexico]]||LATAM||Intelligence||2010||€130,000||€1,390,000<br /> |-<br /> | UZC&lt;ref name=fortune/&gt; ||[[Czech Republic]] ||Europe||LEA||2010||€55,000||€689,779<br /> |-<br /> | Egypt - MOD&lt;ref name=fortune/&gt;||[[Egypt]]||MEA||Other||2011||€70,000||€598,000<br /> |-<br /> | [[Federal Bureau of Investigation]]&lt;ref name=fbidea/&gt;||USA||North America||LEA||2011||€100,000||€697,710<br /> |-<br /> | Oman - Intelligence||[[Oman]]||MEA||Intelligence||2011||€30,000||€500,000<br /> |-<br /> | President Security&lt;ref&gt;[http://motherboard.vice.com/read/hacking-teams-equipment-got-stolen-in-panama &quot;HackingTeam's Equipment Got Stolen in Panama&quot;]. ''Motherboard''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref&gt;Molina, Thabata (13 August 2015). ''[http://panampost.com/thabata-molina/2015/08/13/panama-to-investigate-martinelli-in-hacking-team-spying-scandal/ &quot;Panama to Investigate Martinelli in HackingTeam Spying Scandal&quot;]''. ''Panama Post''. Retrieved 15 August 2015.&lt;/ref&gt;<br /> ||[[Panama]]||LATAM||Intelligence||2011||€110,000||€750,000<br /> |-<br /> | [[Turkish National Police]]||[[Turkey]]||Europe||LEA||2011||€45,000||€440,000<br /> |-<br /> | UAE - MOI||[[United Arab Emirates|UAE]]||MEA||LEA||2011||€90,000||€634,500<br /> |-<br /> | [[National Security Service (Uzbekistan)|National Security Service]]&lt;ref name=fortune&gt;[http://fortune.com/2015/07/16/governments-used-spy-software/ &quot;Leaked emails from security firm HackingTeam show government use - Fortune&quot;]. ''Fortune''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Uzbekistan]]||Europe||Intelligence||2011||€50,000||€917,038<br /> |-<br /> | [[United States Department of Defense|Department of Defense]]&lt;ref name=fbidea/&gt;||USA||North America||LEA||2011||||€190,000<br /> |-<br /> | Bayelsa State Government||[[Nigeria]]||MEA||Intelligence||2012||€75,000||€450,000<br /> |-<br /> | Estado del Mexico||Mexico||LATAM||LEA||2012||€120,000||€783,000<br /> |-<br /> | Information Network Security Agency||[[Ethiopia]]||MEA||Intelligence||2012||€80,000||€750,000<br /> |-<br /> | State security (Falcon)||Luxemburg||Europe||Other||2012||€38,000||€316,000<br /> |-<br /> | Italy - DA - Rental||Italy||Europe||Other||2012||€60,000||€496,000<br /> |-<br /> | MAL - MI||Malaysia||APAC||Intelligence||2012||€77,000||€552,000<br /> |-<br /> | [[Direction générale de la surveillance du territoire]]||Morocco||MEA||Intelligence||2012||€160,000||€1,237,500<br /> |-<br /> | [[National Intelligence and Security Service]]&lt;ref name=fortune/&gt;||[[Sudan]]||MEA||Intelligence||2012||€76,000||€960,000<br /> |-<br /> | Russia - KVANT&lt;ref name=kvant&gt;[http://arstechnica.com/tech-policy/2015/07/hacking-teams-surveillance-software-sold-to-kgb-successor/ &quot;HackingTeam apparently violated EU rules in sale of spyware to Russian agency&quot;]. ''Ars Technica''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Russia]]||Europe||Intelligence||2012||€72,000||€451,017<br /> |-<br /> | Saudi - GID||Saudi||MEA||LEA||2012||€114,000||€1,201,000<br /> |-<br /> | SIS of [[National Security Committee of the Republic of Kazakhstan|National Security Committee of Kazakhstan]]&lt;ref name=fortune/&gt;||[[Kazakhstan]]||Europe||Intelligence||2012||€140,000||€1,012,500<br /> |-<br /> | The 5163 Army Division (Alias of South Korean National Intelligence Service)&lt;ref name=fortune/&gt;&lt;ref name=torbrowser&gt;[https://firstlook.org/theintercept/2015/07/16/hackingteam-attacked-tor-browser/ &quot;How HackingTeam Created Spyware that Allowed the FBI To Monitor Tor Browser&quot;]. ''The Intercept''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref name=wswskorea&gt;McGrath, Ben (25 July 2015). &quot;''[https://www.wsws.org/en/articles/2015/07/25/kore-j25.html Further revelations in South Korean hacking scandal]''&quot;. ''World Socialist Web Site''. Retrieved 26 July 2015.&lt;/ref&gt;||[[South Korea|S. Korea]]||APAC||Other||2012||€67,000||€686,400<br /> |-<br /> | UAE - Intelligence||[[United Arab Emirates|UAE]]||MEA||Other||2012||€150,000||€1,200,000<br /> |-<br /> | [[Drug Enforcement Administration]]&lt;ref name=fbidea&gt;[https://firstlook.org/theintercept/2015/07/06/hacking-team-spyware-fbi/ &quot;Leaked Documents Show FBI, DEA and U.S. Army Buying Italian Spyware&quot;]. ''The Intercept''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref name=dea&gt;[http://motherboard.vice.com/read/the-dea-just-cancelled-its-contract-with-hacking-team &quot;The DEA Just Cancelled Its Contract With HackingTeam&quot;]. ''Motherboard''. Retrieved on 2 August 2015.&lt;/ref&gt;||USA||North America||Other||2012||€70,000||€567,984<br /> |-<br /> | [[Central Anticorruption Bureau]]||[[Poland]]||Europe||LEA||2012||€35,000||€249,200<br /> |-<br /> | MOD Saudi||Saudi||MEA||Other||2013||€220,000||€1,108,687<br /> |-<br /> | PMO||Malaysia||APAC||Intelligence||2013||€64,500||€520,000<br /> |-<br /> | Estado de Qeretaro||Mexico||LATAM||LEA||2013||€48,000||€234,500<br /> |-<br /> | National Security Agency&lt;ref name=fortune/&gt;||[[Azerbaijan]]||Europe||Intelligence||2013||€32,000||€349,000<br /> |-<br /> | Gobierno de Puebla||Mexico||LATAM||Other||2013||€64,000||€428,835<br /> |-<br /> | Gobierno de Campeche||Mexico||LATAM||Other||2013||€78,000||€386,296<br /> |-<br /> | AC Mongolia||[[Mongolia]]||APAC||Intelligence||2013||€100,000||€799,000<br /> |-<br /> | Dept. of Correction Thai Police ||[[Thailand]]||APAC||LEA||2013||€52,000||€286,482<br /> |-<br /> | [[National Intelligence Secretariat (Ecuador)|National Intelligence Secretariat]]&lt;ref&gt;http://panampost.com/rebeca-morla/2015/07/13/ecuadorian-websites-report-on-hacking-team-get-taken-down/&lt;br /&gt;http://panampost.com/panam-staff/2015/08/10/hacking-team-helped-ecuador-spy-on-opposition-activist/&lt;br /&gt;http://bigstory.ap.org/article/6f41d49888174b45857d34511fda1caf/apnewsbreak-email-leak-suggests-ecuador-spied-opposition&lt;/ref&gt;<br /> ||[[Ecuador]]||LATAM||LEA||2013||€75,000||€535,000<br /> |-<br /> | Police Intelligence Directorate&lt;ref name=dipol_telesur&gt;Podour, Justin (23 July 2015). [http://www.telesurtv.net/opinion/HackedTeam-y-Colombia-Como-la-vigilancia-ayuda-a-un-Estado-violento-20150723-0062.html #HackedTeam y Colombia: Cómo la vigilancia ayuda a un Estado violento]. ''Telesur''. Retrieved 26 July 2015.&lt;/ref&gt;||[[Colombia]]||LATAM||LEA||2013||€35,000||€335,000<br /> |-<br /> | [[Guardia di Finanza]]||Italy||Europe||LEA||2013||€80,000||€400,000<br /> |-<br /> | Intelligence&lt;ref name=cyprus&gt;In Cyprus (11 July 2015).[http://in-cyprus.com/intelligence-service-chief-steps-down/ Intelligence Service chief steps down]. Retrieved 26 July 2015.&lt;/ref&gt;||[[Cyprus]]||Europe||LEA||2013||€40,000||€375,625<br /> |-<br /> | MidWorld&lt;ref name=ifex&gt;Bahrain Center for Human Rights (15 July 2015). &quot;''[https://www.ifex.org/bahrain/2015/07/15/bahrain_hacking_team HackingTeam's troubling connections to Bahrain]''&quot; IFEX. Retrieved 26 July 2015.&lt;/ref&gt;||[[Bahrain]]||MEA||Intelligence||2013||||€210,000<br /> |-<br /> | Mexico - PEMEX||Mexico ||LATAM||LEA ||2013||||€321,120<br /> |-<br /> | Malysia K||Malaysia||APAC||LEA||2013||||€0<br /> |-<br /> | Honduras||[[Honduras]]||LATAM||LEA||2014||||€355,000<br /> |-<br /> | Mex Taumalipas||Mexico||LATAM||||2014||||€322,900<br /> |-<br /> | Secretaría de Planeación y Finanzas||Mexico||LATAM||LEA||2014||€91,000||€371,035<br /> |-<br /> | AREA||Italia||Europe||||2014||||€430,000<br /> |-<br /> | Mexico Yucatán||Mexico||LATAM||LEA||2014||||€401,788<br /> |-<br /> | Mexico Durango||Mexico||LATAM||LEA||2014||||€421,397<br /> |-<br /> | [[Investigations Police of Chile]]||[[Chile]]||LATAM||LEA||2014||||€2,289,155<br /> |-<br /> | Jalisco Mexico||Mexico||LATAM||LEA||2014||||€748,003<br /> |-<br /> | [[Royal Thai Army]]||Thailand||APAC||LEA||2014||||€360,000<br /> |-<br /> | Vietnam GD5||[[Vietnam]]||APAC||||2014||||€281,170<br /> |-<br /> | [[Kantonspolizei Zürich]]||Switzerland||Europe||LEA||2014||||€486,500<br /> |-<br /> | Vietnam GD1||Vietnam||APAC||LEA||2015||||€543,810<br /> |-<br /> | Egypt TRD GNSE||Egypt||MEA||LEA||2015||||€137,500<br /> |-<br /> | [[Lebanese Armed Forces|Lebanese Army]]||[[Lebanon]]||MEA||LEA||2015||||<br /> |-<br /> | [[Federal Police Department]]||Brazil||LATAM||LEA||2015||||<br /> |-<br /> | [[SHISH|State Informative Service]]&lt;ref&gt;Lexime (14 July 2015). &quot;''[http://www.balkanweb.com/site/burime-te-sigurta-shish-perdor-programet-pergjuese-qe-prej-2015-hacking-teams-nuk-e-kemi-nen-kontroll-sistemin/ Burime të sigurta, SHISH përdor programet përgjuese që prej 2015. HackingTeams: Nuk e kemi nën kontroll sistemin!]''&quot; (video). BalkanWeb. Retrieved 27 July 2015.&lt;/ref&gt;||[[Albania]]||Europe||SHIK||2015||||<br /> |}<br /> <br /> == See also ==<br /> * [[Vupen]] – 0-day exploit provider linked to HackingTeam&lt;ref&gt;[https://tsyrklevich.net/2015/07/22/hacking-team-0day-market/ HackingTeam: a zero-day market case study], Vlad Tsyrklevich's blog&lt;/ref&gt;<br /> * ''[[Mamfakinch]]'' – a citizen media organization targeted with malware allegedly developed by HackingTeam&lt;ref&gt;Perlroth, Nicole (10 October 2012). [http://bits.blogs.nytimes.com/2012/10/10/ahead-of-spyware-conference-more-evidence-of-abuse/?_r=0 Ahead of Spyware Conference, More Evidence of Abuse]. ''New York Times'' (Bits).&lt;/ref&gt;<br /> * [[FinFisher]]<br /> * [[MiniPanzer and MegaPanzer]]<br /> <br /> ==References==<br /> {{reflist|30em}}<br /> <br /> == External links ==<br /> * {{Official website| http://www.hackingteam.it/}}<br /> * [https://citizenlab.org/tag/hacking-team/ HackingTeam Archives] - investigative reports published by The [[Citizen Lab]]<br /> * [https://wikileaks.org/hackingteam/emails WikiLeaks: ''The Hackingteam Archives''] - searchable database of 1 million internal emails<br /> * [https://wikileaks.org/spyfiles/list/company-name/hackingteam.html HackingTeam presentations] in the [[WikiLeaks]] &quot;''Spy Files''&quot;<br /> {{Hacking in the 2010s}}<br /> <br /> [[Category:Computer security software]]<br /> [[Category:Spyware]]<br /> [[Category:Surveillance]]<br /> [[Category:Trojan horses]]<br /> [[Category:Espionage techniques]]<br /> [[Category:Espionage devices]]<br /> [[Category:Malware toolkits]]<br /> [[Category:Computer access control]]<br /> [[Category:Cyberwarfare]]<br /> [[Category:Espionage scandals and incidents]]<br /> [[Category:Companies based in Milan]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=HackingTeam&diff=177175002 HackingTeam 2016-06-18T17:37:42Z <p>Dsprc: /* Others */</p> <hr /> <div>{{Infobox company<br /> | name = HackingTeam<br /> | logo = Hacking Team logo.png<br /> | logo_size = <br /> | logo_alt = The words Hacking Team enclosed with in reversed square brackets &lt;nowiki&gt;][&lt;/nowiki&gt;<br /> | logo_caption = Company logo<br /> | logo_padding = <br /> | image = <br /> | image_size = <br /> | image_alt = <br /> | image_caption = <br /> | type = <br /> | industry = [[Information technology]]<br /> | founded = 2003<br /> | founders = David Vincenzetti, Valeriano Bedeschi<br /> | hq_location = <br /> | hq_location_city = [[Milan]]<br /> | hq_location_country = [[Italy]]<br /> | area_served = &lt;!-- or: | areas_served = --&gt;<br /> | key_people = Alberto Ornaghi (ALoR), Marco Valleri (NaGA)<br /> | products = {{unbulleted list|Software}}<br /> | brands = <br /> | services = <br /> | owner = &lt;!-- or: | owners = --&gt;<br /> | website = {{URL|http://www.hackingteam.it/}}<br /> }}<br /> '''HackingTeam''' is a [[Milan]]-based [[information technology]] company that sells offensive intrusion and [[surveillance]] capabilities to governments, law enforcement agencies and corporations.&lt;ref name=spies&gt;{{cite web |title=The spies behind your screen |url=http://www.telegraph.co.uk/technology/8899353/The-spies-behind-your-screen.html |author=Batey, Angus |date=24 November 2011 |publisher=''The Telegraph'' |accessdate=26 July 2015}}&lt;/ref&gt; Its &quot;''Remote Control Systems''&quot; enable governments and corporations to monitor the communications of internet users, decipher their [[cryptography|encrypted]] files and emails, record [[Skype]] and other [[Voice over IP]] communications, and remotely activate microphones and camera on target computers.&lt;ref&gt;{{cite web|title=Enemies of the Internet: HackingTeam|url=http://surveillance.rsf.org/en/hacking-team/|work=[[Reporters Without Borders]]|accessdate=24 April 2014}}&lt;/ref&gt; The company has been criticized for providing these capabilities to governments with poor [[human rights]] records.&lt;ref&gt;{{cite web | last3 = Marquis-Boire | first3 = Morgan | last1 = Marczak | first1 = Bill | last2 = Gaurnieri | first2 = Claudio | last4 = Scott-Railton | first4 = John | title = Mapping HackingTeam's &quot;Untraceable&quot; Spyware | url = https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ | date = February 17, 2014}}&lt;/ref&gt; HackingTeam states that they have the ability to disable their software if it is used unethically.&lt;ref&gt;{{cite news|url=http://www.newyorker.com/online/blogs/elements/2014/03/hacked-by-ones-own-government.html|title=Hackers Without Borders|last=Kopstein|first=Joshua|work=[[The New Yorker]]|date=10 March 2014|accessdate=24 April 2014}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url = https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/|title = Police Story: HackingTeam’s Government Surveillance Malware|date = June 24, 2014|accessdate = August 3, 2014|website = Citizen Lab|publisher = University of Toronto|last1 = Marquis-Boire|first1 = Morgan | last2 = Gaurnieri | first2 = Claudio | first3 = John | last3 = Scott-Railton | first4 = Katie | last4 = Kleemola }}&lt;/ref&gt; The Italian government has restricted their license to do business with countries outside Europe.&lt;ref name=&quot;:0&quot; /&gt;<br /> <br /> HackingTeam employs around 40 people in its Italian office, and has subsidiary branches in [[Annapolis]], [[Washington, D.C.]] and [[Singapore]].&lt;ref name=know&gt;''[[Human Rights Watch]]'' (25 March 2014). ''&quot;[https://www.hrw.org/report/2014/03/25/they-know-everything-we-do/telecom-and-internet-surveillance-ethiopia They Know Everything We Do]&quot;''. Retrieved 1 August 2015.&lt;/ref&gt; Its products are in use in dozens of countries across six continents.&lt;ref name=Jeffries&gt;{{cite web|last=Jeffries|first=Adrianne|title=Meet HackingTeam, the company that helps the police hack you|url=http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers|accessdate=21 April 2014|work=[[The Verge]]|date=13 September 2013}}&lt;/ref&gt;<br /> <br /> ==History==<br /> HackingTeam was started by two Italian programmers: Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri (under the aliases of ALoR, and NaGA respectively), created a set of tools that could be used to monitor and remotely manipulate target computers. The program, called [[Ettercap (software)|Ettercap]], was embraced both by [[Hacker (term)|hackers]] looking to spy on people, and by companies that hoped to test the security of their own networks.<br /> <br /> The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their [[Skype]] calls, the police contacted Ornaghi and Valleri and asked them to help modify the program. HackingTeam was born, and became &quot;the first sellers of commercial hacking software to the police.&quot;&lt;ref name=Jeffries/&gt;<br /> <br /> According to former employee Alberto Pelliccione, the company began as security services provider, offering [[penetration testing]], auditing and other defensive capabilities to clients.&lt;ref name=war&gt;Farivar, Cyrus (20 July 2015) [http://arstechnica.com/security/2015/07/italian-prosecutors-investigate-former-hacking-team-employees-for-role-in-hack/ HackingTeam goes to war against former employees, suspects some helped hackers]. ''Ars Technica''. Retrieved 26 July 2015.&lt;/ref&gt; Pelliccione states that as malware and other offensive capabilities were developed and accounted for a larger percentage of revenues, the organization pivoted in a more offensive direction and became increasingly compartmentalized. Pelliccione claims fellow employees working on aspects of the same platform - for example, Android exploits and payloads - would not communicate with one another, possibly leading to tensions and strife within the organization.&lt;ref name=war/&gt;<br /> <br /> In February 2014, a report from [[Citizen Lab]] identified the organisation to be using hosting services from [[Linode]], [[Telecom Italia]], [[Rackspace]], [[NOC4Hosts]] and notorious [[bullet proof hosting]] company [[Santrex]].&lt;ref&gt;{{cite news|title=HackingTeam’s US Nexus|url=https://citizenlab.org/2014/02/hacking-teams-us-nexus/|accessdate=2 August 2015|date=28 February 2014}}&lt;/ref&gt;<br /> <br /> On July 5, 2015 the company suffered a major data breach of customer data, software code, internal documents and emails. - ''See: [[#2015 data breach|§ 2015 data breach]]''<br /> <br /> ==Products and capabilities==<br /> HackingTeam enables clients to perform remote monitoring functions against citizens via their [[Remote administration tool|RCS (Remote Control Systems)]], including their '''Da Vinci''' and '''Galileo''' platforms:&lt;ref name=spies/&gt;<br /> <br /> *Covert collection of emails, text message, phone call history and address books<br /> *[[Keystroke logging]]<br /> *Uncover search history data and take screenshots<br /> *Record audio from phone calls<br /> :*Capture audio and video stream from device memory to bypass [[cryptography]] of [[Skype]] sessions&lt;ref&gt;{{cite web | title=Mideast Uses Western Tools to Battle the Skype Rebellion |url=http://www.wsj.com/articles/SB10001424052702304520804576345970862420038 |author1=Stecklow, Steve |author2=Sonne, Paul |author3=Bradley, Matt |date=1 June 2011 |publisher=''Wall Street Journal'' |accessdate=26 July 2015}}&lt;/ref&gt;<br /> :*Use microphones on device to collect ambient background noise and conversations<br /> *Activate phone or computer cameras<br /> *Hijack telephone GPS systems to monitor target's location<br /> *Infect target computer's [[UEFI]] [[BIOS]] [[firmware]] with a [[rootkit]]&lt;ref&gt;{{Cite web|first=Philippe |last=Lin |url=http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-uses-uefi-bios-rootkit-to-keep-rcs-9-agent-in-target-systems/ |title=HackingTeam Uses UEFI BIOS Rootkit to Keep RCS 9 Agent in Target Systems |work=TrendLabs Security Intelligence Blog |publisher=[[Trend Micro]] |date=July 13, 2015 |accessdate=July 26, 2015}}&lt;/ref&gt;<br /> *Extract WiFi passwords&lt;ref name=skiddies&gt;[http://arstechnica.com/security/2015/07/advanced-spyware-for-android-now-available-to-script-kiddies-everywhere/ &quot;Advanced spyware for Android now available to script kiddies everywhere&quot;]. ''Ars Technica''. Retrieved on 2 August 2015.&lt;/ref&gt;<br /> *Exfiltrate [[Bitcoin]] and other cryptocurrency wallet files to collect data on local accounts, contacts and transaction histories.&lt;ref name=coin&gt;Farivar, Cyrus (14 July 2015). &quot;''[http://arstechnica.com/security/2015/07/hacking-team-broke-bitcoin-secrecy-by-targeting-crucial-wallet-file/ HackingTeam broke Bitcoin secrecy by targeting crucial wallet file]''&quot;. ''Ars Technica''. Retrieved 26 July 2015.&lt;/ref&gt;<br /> <br /> HackingTeam uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.&lt;ref&gt;{{cite news|last1=Schneier|first1=Bruce|title=More on HackingTeam's Government Spying Software|url=https://www.schneier.com/blog/archives/2014/06/more_on_hacking.html}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=http://www.ibtimes.co.uk/hacking-team-tools-allow-governments-take-full-control-your-smartphone-1453987|title=HackingTeam Tools Allow Governments To Take Full Control of Your Smartphone|date=2014-06-24|website=International Business Times UK|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> The malware has payloads for [[Android (operating system)|Android]],&lt;ref name=skiddies/&gt; [[BlackBerry]], Apple [[iOS]], [[Linux]], [[Mac OS X]], [[Symbian]], as well as [[Microsoft Windows]], [[Windows Mobile]] and [[Windows Phone]] class of [[operating system]]s.&lt;ref name=C3&gt;Guarnieri, Claudio; Marquis-Boire, Morgan (13 January 2014). ''[https://media.ccc.de/browse/congress/2013/30C3_-_5439_-_en_-_saal_1_-_201312292105_-_to_protect_and_infect_-_claudio_guarnieri_-_morgan_marquis-boire.html &quot;To Protect And Infect: The militarization of the Internet&quot;]''. At the 30th [[Chaos Communications Congress]] – &quot;30C3&quot;. (Video or Audio). [[Chaos Computer Club]]. Retrieved on 15 August 2015.&lt;/ref&gt;<br /> <br /> RCS is a management platform that allows operators to remotely deploy exploits and payloads against targeted systems, remotely manage devices once compromised, and exfiltrate data for remote analysis.<br /> <br /> == Controversies ==<br /> <br /> === Use by repressive governments ===<br /> HackingTeam has been criticized for selling its products and services to governments with poor human rights records, including [[Sudan]], [[Bahrain]], and [[Saudi Arabia]].&lt;ref name=repress/&gt;<br /> <br /> In June 2014, a United Nations panel monitoring the implementation of sanctions on Sudan requested information from HackingTeam about their alleged sales of software to the country in contravention of United Nations weapons export bans to Sudan. Documents leaked in the 2015 data breach of HackingTeam revealed the organization sold Sudanese National Intelligence and Security Service access to their &quot;Remote Control System&quot; software in 2012 for 960,000 Euros.&lt;ref name=repress/&gt;&lt;ref&gt;{{Cite web|url=https://theintercept.com/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/|title=A Detailed Look at HackingTeam’s Emails About Its Repressive Clients|last=Hay Newman|first=Lily|website=The Intercept|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> In response to the United Nations panel, the company responded in January 2015 that they were not currently selling to Sudan. In a follow-up exchange, HackingTeam asserted that their product was not controlled as a weapon, and so the request was beyond the scope of the panel. There was no need for them to disclose previous sales, which they considered confidential business information.&lt;ref name=repress&gt;{{Cite web |title=A Detailed Look at HackingTeam’s Emails About Its Repressive Clients |url=https://firstlook.org/theintercept/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/ |accessdate=7 July 2015 |first1=Cora |last1=Currier |first2=Morgan |last2=Marquis-Boire}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://www.eff.org/deeplinks/2015/07/hacking-team-leaks-reveal-spyware-industrys-growth|title=HackingTeam Leaks Reveal Spyware Industry's Growth, Negligence of Human Rights|last=Myers West|first=Sarah|date=2015-07-08|website=Electronic Frontier Foundation|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> The U.N. disagreed. &quot;The view of the panel is that as such software is ideally suited to support military electronic intelligence (ELINT) operations it may potentially fall under the category of ‘military … equipment’ or ‘assistance’ related to prohibited items,&quot; the secretary wrote in March. &quot;Thus its potential use in targeting any of the belligerents in the Darfur conflict is of interest to the Panel.&quot;&lt;ref name=repress/&gt;&lt;ref&gt;{{Cite web|url=http://gizmodo.com/hacking-teams-lame-excuse-for-selling-digital-weapons-t-1716375503|title=HackingTeam's Lame Excuse for Selling Digital Weapons to Sudan|last=Knibbs|first=Kate|date=2015-07-08|website=Gizmodo|language=en-US|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> In the fall of 2014, the Italian government abruptly froze all of HackingTeam's exports, citing human rights concerns. After lobbying Italian officials, the company temporarily won back the right to sell its products abroad.&lt;ref name=repress/&gt;<br /> <br /> === 2015 data breach ===<br /> On July 5, 2015, the [[Twitter]] account of the company was compromised by an unknown individual who published an announcement of a [[data breach]] against HackingTeam's computer systems. The initial message read, &quot;''Since we have nothing to hide, we're publishing all our e-mails, files, and source code …''&quot; and provided links to over 400 [[gigabyte]]s of data, including alleged internal e-mails, invoices, and [[source code]]; which were leaked via [[BitTorrent]] and [[Mega (service)|Mega]].&lt;ref&gt;{{Wayback|url=https://twitter.com/hackingteam|title=Hacked Team (@hackingteam)|date=20150706010312}}&lt;/ref&gt; An announcement of the data breach, including a link to the bittorrent seed, was retweeted by [[WikiLeaks]] and by many others through social media.&lt;ref&gt;{{Twitter status|wikileaks|617865712611233792|Inside malware makers &quot;HackingTeam&quot;: hundreds of gigabytes of e-mails, files, and source code|[[WikiLeaks]]|July 6, 2015|July 6, 2015}}&lt;/ref&gt;&lt;ref name=&quot;ibtimes.co.uk&quot;&gt;{{Cite web|url=http://www.ibtimes.co.uk/hacking-team-hacked-spy-tools-sold-oppressive-regimes-sudan-bahrain-kazakhstan-1509460|title=HackingTeam hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan|date=2015-06-06|publisher=International Business Times|accessdate=2015-07-06}}&lt;/ref&gt;<br /> <br /> The material was voluminous and early analysis appeared to reveal that HackingTeam had invoiced the [[Lebanese Army]]&lt;ref&gt;{{Twitter|url=https://twitter.com/SynAckPwn/status/617955067006578689}} {{dead link|date=July 2015}}&lt;/ref&gt; and [[Sudan]] and that spy tools were also sold to [[Bahrain]] and [[Kazakhstan]].&lt;ref name=&quot;ibtimes.co.uk&quot;/&gt; HackingTeam had previously claimed they had never done business with Sudan.&lt;ref&gt;{{Cite web|title = HackingTeam hacked, attackers claim 400GB in dumped data|url = http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html|accessdate = 2015-07-06|first = Steve|last = Ragan}}&lt;/ref&gt;<br /> <br /> The leaked data revealed a [[zero-day (computing)|zero-day]] cross-platform Flash exploit ([[Common Vulnerabilities and Exposures|CVE]] number: CVE-2015-5119).&lt;ref&gt;{{Cite web|title = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html|url = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html}}&lt;/ref&gt; The dump included a demo of this exploit by opening [[Calculator (computer program)|Calculator]] from a test webpage.&lt;ref&gt;{{Cite web|title = Zero-Day Flash Player Exploit Disclosed In 'HackingTeam' Data Dump|url = http://thehackernews.com/2015/07/flash-zero-day-vulnerability.html|accessdate = 2015-07-06|first = Swati|last = Khandelwal}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Unpatched Flash Player Flaw, More POCs Found in HackingTeam Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/|accessdate = 2015-07-08|first = Peter|last = Pi}}&lt;/ref&gt; Adobe [[software patch|patched]] the hole on July 8, 2015.&lt;ref&gt;{{Cite web|title = Adobe Security Bulletin|url = https://helpx.adobe.com/security/products/flash-player/apsb15-16.html|accessdate = 2015-07-11|last = Adobe Systems (corporate author)}}&lt;/ref&gt; Another vulnerability involving Adobe was revealed in the dumps, which took advantage of a [[buffer overflow]] attack on an Adobe Open Type Manager [[Dynamic-link library|DLL]] included with [[Microsoft Windows]]. The DLL is run in [[protection ring|kernel mode]], so the attack could perform [[privilege escalation]] to bypass the [[sandbox (computer security)|sandbox]].&lt;ref&gt;{{Cite web|title = A Look at the Open Type Font Manager Vulnerability from the HackingTeam Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-the-open-type-font-manager-vulnerability-from-the-hacking-team-leak/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29|accessdate = 2015-07-08|first = Jack|last = Tang}}&lt;/ref&gt;<br /> <br /> Also revealed in leaked data was HackingTeam employees' use of weak passwords, including 'P4ssword', 'wolverine', and 'universo'.&lt;ref&gt;{{Cite web|title = HackingTeam used shockingly bad passwords|url = http://www.zdnet.com/article/no-wonder-hacking-team-got-hacked/|accessdate = 2015-07-06|first = Zack|last = Whittaker}}&lt;/ref&gt;<br /> <br /> After a few hours without response from HackingTeam, member Christian Pozzi tweeted the company was working closely with police and &quot;''what the attackers are claiming regarding our company is not true.''&quot;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964180042190848|accessdate = 2015-07-06}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964660705234944|accessdate = 2015-07-06}}&lt;/ref&gt; He also claimed the leaked archive &quot;contains a virus&quot; and that it constituted &quot;false info&quot;.&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617962663188926465|accessdate = 2015-07-06}}&lt;/ref&gt; Shortly after these tweets, Pozzi's Twitter account itself was apparently compromised.&lt;ref&gt;{{Cite web|title=Christian Pozzi on Twitter: &quot;Uh Oh - my twitter account was also hacked.&quot; |url=https://twitter.com/christian_pozzi/status/617977753250496512 |date=2015-07-06 |accessdate=2015-07-06 |deadurl=yes |archiveurl=https://web.archive.org/web/20150706084837/https://twitter.com/christian_pozzi/status/617977753250496512 |archivedate=July 6, 2015 }}&lt;/ref&gt;<br /> <br /> Responsibility for this attack was claimed by the hacker known as &quot;Phineas Fisher&quot; (or Phisher) on Twitter.&lt;ref&gt;{{cite tweet | user=gammagrouppr | author=Phineas Fisher | number=617937092497178624 | title=gamma and HT down, a few more to go :) | date=6 July 2015}}&lt;/ref&gt; Phineas has previously attacked spyware firm [[Gamma International]], who produce malware, such as [[FinFisher]], for governments and corporations.&lt;ref&gt;{{Cite web|title = HackingTeam: We won't 'shrivel up and go away' after cyberattack|url = http://www.zdnet.com/article/hacking-team-cyberattack-aftermath-interview/|accessdate = 2015-07-06|first = Charlie|last = Osbourne}}&lt;/ref&gt; In 2016, Phineas published details of the attack, in Spanish and English, as a &quot;how-to&quot; for others, and explained the motivations behind the attack.&lt;ref&gt;{{Cite web|url=http://arstechnica.com/security/2016/04/how-hacking-team-got-hacked-phineas-phisher/|title=How HackingTeam got hacked|website=Ars Technica|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> The internal documents revealed details of HackingTeam's contracts with repressive governments.&lt;ref&gt;{{Cite web|url=https://theintercept.com/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/|title=A Detailed Look at HackingTeam’s Emails About Its Repressive Clients|website=The Intercept|access-date=2016-05-15}}&lt;/ref&gt; In 2016, the Italian government again revoked the company’s license to sell spyware outside of Europe without special permission.&lt;ref name=&quot;:0&quot;&gt;{{Cite web|url=https://nakedsecurity.sophos.com/2016/04/08/hacking-team-loses-global-license-to-sell-spyware/|title=HackingTeam loses global license to sell spyware|last=Zorabedian|first=John|date=2016-04-08|website=Naked Security|access-date=2016-05-15}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://www.privacyinternational.org/node/826|title=HackingTeam’s Global License Revoked by Italian Export Authorities {{!}} Privacy International|website=www.privacyinternational.org|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> == Customer List ==<br /> HackingTeam's clientele include not just governments, but also corporate clients such as [[Barclay's]] Bank and [[British Telecom]] (BT) of the [[United Kingdom]], as well as [[Deutsche Bank]] of [[Germany]].&lt;ref name=spies/&gt;<br /> <br /> A full list of HackingTeam's customers were leaked in the 2015 breach. Disclosed documents show HackingTeam had 70 current customers, mostly military, police, federal and provincial governments. The total company revenues disclosed exceeded 40 million [[Euro]]s.&lt;ref&gt;{{cite web |author=Kopstein, Justin |title= Here Are All the Sketchy Government Agencies Buying HackingTeam's Spy Tech |url=http://motherboard.vice.com/read/here-are-all-the-sketchy-government-agencies-buying-hacking-teams-spy-tech |publisher=Vice Magazine |date=6 July 2015<br /> }}&lt;/ref&gt;&lt;ref&gt;{{cite web |author=Weissman, Cale Guthrie |title=Hacked security company's documents show a laundry list of questionable clients |url=http://www.businessinsider.com/hacked-security-companys-document-2015-7 |date=6 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |author=Ragan, Steve |title=In Pictures: HackingTeam's hack curated |url=http://www.cso.com.au/slideshow/579158/pictures-hacking-team-hack-curated/?image=9 |publisher=CSO Online (Australia)}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=HackingTeam hacked: firm sold spying tools to repressive regimes, documents claim |url=http://www.theguardian.com/technology/2015/jul/06/hacking-team-hacked-firm-sold-spying-tools-to-repressive-regimes-documents-claim |author=Hern, Alex |publisher=''The Guardian'' |date=6 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=HackingTeam responds to data breach, issues public threats and denials |url=http://www.csoonline.com/article/2944333/data-breach/hacking-team-responds-to-data-breach-issues-public-threats-and-denials.html |author=Ragan, Steve |publisher=''CSO Online'' |date=6 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=A whole bunch of downed government surveillance programs are about to go back online |url=http://www.businessinsider.com/hacking-team-promises-customers-they-can-resume-surveillance-operations-soon-2015-7 |author=Stevenson, Alastair |publisher=''Business Insider'' |date=14 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;<br /> <br /> {| class=&quot;wikitable sortable&quot;<br /> |-<br /> ! Customer<br /> ! Country<br /> ! Area<br /> ! Agency<br /> ! Year First Sale<br /> ! Annual Maintenance Fees<br /> ! Total Client Revenues<br /> |-<br /> | [[Polizia Postale e delle Comunicazioni]]&lt;ref&gt;Jone Pierantonio. [http://it.ibtimes.com/cyber-space/ecco-chi-ha-bucato-hacking-team-1408915 &quot;Ecco chi ha bucato HackingTeam&quot;]. ''International Business Times''. Retrieved on 2 August 2015.&lt;/ref&gt;||Italy||Europe||LEA||2004||€100,000||€808,833<br /> |-<br /> | [[Centro Nacional de Inteligencia]]&lt;ref&gt;Ediciones El País (8 July 2015). [http://internacional.elpais.com/internacional/2015/07/08/actualidad/1436343710_282978.html &quot;HackingTeam: “Ofrecemos tecnología ofensiva para la Policía”&quot;]. ''EL PAÍS''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Spain]]||Europe||Intelligence||2006||€52,000||€538,000<br /> |-<br /> | [[Infocomm Development Authority of Singapore]]||[[Singapore]]||APAC||Intelligence||2008||€89,000||€1,209,967<br /> |-<br /> | Information Office||[[Hungary]]||Europe||Intelligence||2008||€41,000||€885,000<br /> |-<br /> | CSDN||[[Morocco]]||MEA||Intelligence||2009||€140,000||€1,936,050<br /> |-<br /> | UPDF (Uganda Peoples Defense Force), ISO (Internal Security Organization), Office of the President||[[Uganda]]||Africa||Intelligence||2015||€831,000||€52,197,100<br /> |-<br /> | Italy - DA - Rental||Italy||Europe||Other||2009||€50,000||€628,250<br /> |-<br /> | [[Malaysian Anti-Corruption Commission]]||[[Malaysia]]||APAC||Intelligence||2009||€77,000||€789,123<br /> |-<br /> | PCM||Italy||Europe||Intelligence||2009||€90,000||€764,297<br /> |-<br /> | SSNS - Ungheria||Hungary||Europe||Intelligence||2009||€64,000||€1,011,000<br /> |-<br /> | CC - Italy||Italy||Europe||LEA||2010||€50,000||€497,349<br /> |-<br /> | [[Al Mukhabarat Al A'amah]]||[[Saudi Arabia]]||MEA||Intelligence||2010||€45,000||€600,000<br /> |-<br /> | IR Authorities (Condor)||[[Luxembourg]]||Europe||Other||2010||€45,000||€446,000<br /> |-<br /> | La Dependencia y/o CISEN&lt;ref&gt;[http://fusion.net/story/163872/the-hacking-team-leak-shows-mexico-was-the-top-client-but-why/ &quot;The HackingTeam leak shows Mexico was its top client, but why?&quot;]. ''Fusion''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Mexico]]||LATAM||Intelligence||2010||€130,000||€1,390,000<br /> |-<br /> | UZC&lt;ref name=fortune/&gt; ||[[Czech Republic]] ||Europe||LEA||2010||€55,000||€689,779<br /> |-<br /> | Egypt - MOD&lt;ref name=fortune/&gt;||[[Egypt]]||MEA||Other||2011||€70,000||€598,000<br /> |-<br /> | [[Federal Bureau of Investigation]]&lt;ref name=fbidea/&gt;||USA||North America||LEA||2011||€100,000||€697,710<br /> |-<br /> | Oman - Intelligence||[[Oman]]||MEA||Intelligence||2011||€30,000||€500,000<br /> |-<br /> | President Security&lt;ref&gt;[http://motherboard.vice.com/read/hacking-teams-equipment-got-stolen-in-panama &quot;HackingTeam's Equipment Got Stolen in Panama&quot;]. ''Motherboard''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref&gt;Molina, Thabata (13 August 2015). ''[http://panampost.com/thabata-molina/2015/08/13/panama-to-investigate-martinelli-in-hacking-team-spying-scandal/ &quot;Panama to Investigate Martinelli in HackingTeam Spying Scandal&quot;]''. ''Panama Post''. Retrieved 15 August 2015.&lt;/ref&gt;<br /> ||[[Panama]]||LATAM||Intelligence||2011||€110,000||€750,000<br /> |-<br /> | [[Turkish National Police]]||[[Turkey]]||Europe||LEA||2011||€45,000||€440,000<br /> |-<br /> | UAE - MOI||[[United Arab Emirates|UAE]]||MEA||LEA||2011||€90,000||€634,500<br /> |-<br /> | [[National Security Service (Uzbekistan)|National Security Service]]&lt;ref name=fortune&gt;[http://fortune.com/2015/07/16/governments-used-spy-software/ &quot;Leaked emails from security firm HackingTeam show government use - Fortune&quot;]. ''Fortune''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Uzbekistan]]||Europe||Intelligence||2011||€50,000||€917,038<br /> |-<br /> | [[United States Department of Defense|Department of Defense]]&lt;ref name=fbidea/&gt;||USA||North America||LEA||2011||||€190,000<br /> |-<br /> | Bayelsa State Government||[[Nigeria]]||MEA||Intelligence||2012||€75,000||€450,000<br /> |-<br /> | Estado del Mexico||Mexico||LATAM||LEA||2012||€120,000||€783,000<br /> |-<br /> | Information Network Security Agency||[[Ethiopia]]||MEA||Intelligence||2012||€80,000||€750,000<br /> |-<br /> | State security (Falcon)||Luxemburg||Europe||Other||2012||€38,000||€316,000<br /> |-<br /> | Italy - DA - Rental||Italy||Europe||Other||2012||€60,000||€496,000<br /> |-<br /> | MAL - MI||Malaysia||APAC||Intelligence||2012||€77,000||€552,000<br /> |-<br /> | [[Direction générale de la surveillance du territoire]]||Morocco||MEA||Intelligence||2012||€160,000||€1,237,500<br /> |-<br /> | [[National Intelligence and Security Service]]&lt;ref name=fortune/&gt;||[[Sudan]]||MEA||Intelligence||2012||€76,000||€960,000<br /> |-<br /> | Russia - KVANT&lt;ref name=kvant&gt;[http://arstechnica.com/tech-policy/2015/07/hacking-teams-surveillance-software-sold-to-kgb-successor/ &quot;HackingTeam apparently violated EU rules in sale of spyware to Russian agency&quot;]. ''Ars Technica''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Russia]]||Europe||Intelligence||2012||€72,000||€451,017<br /> |-<br /> | Saudi - GID||Saudi||MEA||LEA||2012||€114,000||€1,201,000<br /> |-<br /> | SIS of [[National Security Committee of the Republic of Kazakhstan|National Security Committee of Kazakhstan]]&lt;ref name=fortune/&gt;||[[Kazakhstan]]||Europe||Intelligence||2012||€140,000||€1,012,500<br /> |-<br /> | The 5163 Army Division (Alias of South Korean National Intelligence Service)&lt;ref name=fortune/&gt;&lt;ref name=torbrowser&gt;[https://firstlook.org/theintercept/2015/07/16/hackingteam-attacked-tor-browser/ &quot;How HackingTeam Created Spyware that Allowed the FBI To Monitor Tor Browser&quot;]. ''The Intercept''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref name=wswskorea&gt;McGrath, Ben (25 July 2015). &quot;''[https://www.wsws.org/en/articles/2015/07/25/kore-j25.html Further revelations in South Korean hacking scandal]''&quot;. ''World Socialist Web Site''. Retrieved 26 July 2015.&lt;/ref&gt;||[[South Korea|S. Korea]]||APAC||Other||2012||€67,000||€686,400<br /> |-<br /> | UAE - Intelligence||[[United Arab Emirates|UAE]]||MEA||Other||2012||€150,000||€1,200,000<br /> |-<br /> | [[Drug Enforcement Administration]]&lt;ref name=fbidea&gt;[https://firstlook.org/theintercept/2015/07/06/hacking-team-spyware-fbi/ &quot;Leaked Documents Show FBI, DEA and U.S. Army Buying Italian Spyware&quot;]. ''The Intercept''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref name=dea&gt;[http://motherboard.vice.com/read/the-dea-just-cancelled-its-contract-with-hacking-team &quot;The DEA Just Cancelled Its Contract With HackingTeam&quot;]. ''Motherboard''. Retrieved on 2 August 2015.&lt;/ref&gt;||USA||North America||Other||2012||€70,000||€567,984<br /> |-<br /> | [[Central Anticorruption Bureau]]||[[Poland]]||Europe||LEA||2012||€35,000||€249,200<br /> |-<br /> | MOD Saudi||Saudi||MEA||Other||2013||€220,000||€1,108,687<br /> |-<br /> | PMO||Malaysia||APAC||Intelligence||2013||€64,500||€520,000<br /> |-<br /> | Estado de Qeretaro||Mexico||LATAM||LEA||2013||€48,000||€234,500<br /> |-<br /> | National Security Agency&lt;ref name=fortune/&gt;||[[Azerbaijan]]||Europe||Intelligence||2013||€32,000||€349,000<br /> |-<br /> | Gobierno de Puebla||Mexico||LATAM||Other||2013||€64,000||€428,835<br /> |-<br /> | Gobierno de Campeche||Mexico||LATAM||Other||2013||€78,000||€386,296<br /> |-<br /> | AC Mongolia||[[Mongolia]]||APAC||Intelligence||2013||€100,000||€799,000<br /> |-<br /> | Dept. of Correction Thai Police ||[[Thailand]]||APAC||LEA||2013||€52,000||€286,482<br /> |-<br /> | [[National Intelligence Secretariat (Ecuador)|National Intelligence Secretariat]]&lt;ref&gt;http://panampost.com/rebeca-morla/2015/07/13/ecuadorian-websites-report-on-hacking-team-get-taken-down/&lt;br /&gt;http://panampost.com/panam-staff/2015/08/10/hacking-team-helped-ecuador-spy-on-opposition-activist/&lt;br /&gt;http://bigstory.ap.org/article/6f41d49888174b45857d34511fda1caf/apnewsbreak-email-leak-suggests-ecuador-spied-opposition&lt;/ref&gt;<br /> ||[[Ecuador]]||LATAM||LEA||2013||€75,000||€535,000<br /> |-<br /> | Police Intelligence Directorate&lt;ref name=dipol_telesur&gt;Podour, Justin (23 July 2015). [http://www.telesurtv.net/opinion/HackedTeam-y-Colombia-Como-la-vigilancia-ayuda-a-un-Estado-violento-20150723-0062.html #HackedTeam y Colombia: Cómo la vigilancia ayuda a un Estado violento]. ''Telesur''. Retrieved 26 July 2015.&lt;/ref&gt;||[[Colombia]]||LATAM||LEA||2013||€35,000||€335,000<br /> |-<br /> | [[Guardia di Finanza]]||Italy||Europe||LEA||2013||€80,000||€400,000<br /> |-<br /> | Intelligence&lt;ref name=cyprus&gt;In Cyprus (11 July 2015).[http://in-cyprus.com/intelligence-service-chief-steps-down/ Intelligence Service chief steps down]. Retrieved 26 July 2015.&lt;/ref&gt;||[[Cyprus]]||Europe||LEA||2013||€40,000||€375,625<br /> |-<br /> | MidWorld&lt;ref name=ifex&gt;Bahrain Center for Human Rights (15 July 2015). &quot;''[https://www.ifex.org/bahrain/2015/07/15/bahrain_hacking_team HackingTeam's troubling connections to Bahrain]''&quot; IFEX. Retrieved 26 July 2015.&lt;/ref&gt;||[[Bahrain]]||MEA||Intelligence||2013||||€210,000<br /> |-<br /> | Mexico - PEMEX||Mexico ||LATAM||LEA ||2013||||€321,120<br /> |-<br /> | Malysia K||Malaysia||APAC||LEA||2013||||€0<br /> |-<br /> | Honduras||[[Honduras]]||LATAM||LEA||2014||||€355,000<br /> |-<br /> | Mex Taumalipas||Mexico||LATAM||||2014||||€322,900<br /> |-<br /> | Secretaría de Planeación y Finanzas||Mexico||LATAM||LEA||2014||€91,000||€371,035<br /> |-<br /> | AREA||Italia||Europe||||2014||||€430,000<br /> |-<br /> | Mexico Yucatán||Mexico||LATAM||LEA||2014||||€401,788<br /> |-<br /> | Mexico Durango||Mexico||LATAM||LEA||2014||||€421,397<br /> |-<br /> | [[Investigations Police of Chile]]||[[Chile]]||LATAM||LEA||2014||||€2,289,155<br /> |-<br /> | Jalisco Mexico||Mexico||LATAM||LEA||2014||||€748,003<br /> |-<br /> | [[Royal Thai Army]]||Thailand||APAC||LEA||2014||||€360,000<br /> |-<br /> | Vietnam GD5||[[Vietnam]]||APAC||||2014||||€281,170<br /> |-<br /> | [[Kantonspolizei Zürich]]||Switzerland||Europe||LEA||2014||||€486,500<br /> |-<br /> | Vietnam GD1||Vietnam||APAC||LEA||2015||||€543,810<br /> |-<br /> | Egypt TRD GNSE||Egypt||MEA||LEA||2015||||€137,500<br /> |-<br /> | [[Lebanese Armed Forces|Lebanese Army]]||[[Lebanon]]||MEA||LEA||2015||||<br /> |-<br /> | [[Federal Police Department]]||Brazil||LATAM||LEA||2015||||<br /> |-<br /> | [[SHISH|State Informative Service]]&lt;ref&gt;Lexime (14 July 2015). &quot;''[http://www.balkanweb.com/site/burime-te-sigurta-shish-perdor-programet-pergjuese-qe-prej-2015-hacking-teams-nuk-e-kemi-nen-kontroll-sistemin/ Burime të sigurta, SHISH përdor programet përgjuese që prej 2015. HackingTeams: Nuk e kemi nën kontroll sistemin!]''&quot; (video). BalkanWeb. Retrieved 27 July 2015.&lt;/ref&gt;||[[Albania]]||Europe||SHIK||2015||||<br /> |}<br /> <br /> == See also ==<br /> * [[FinFisher]]<br /> * [[MiniPanzer and MegaPanzer]]<br /> <br /> ==References==<br /> {{reflist|30em}}<br /> <br /> == External links ==<br /> * {{Official website| http://www.hackingteam.it/}}<br /> * [https://citizenlab.org/tag/hacking-team/ HackingTeam Archives] - investigative reports published by The [[Citizen Lab]]<br /> * [https://wikileaks.org/hackingteam/emails WikiLeaks: ''The Hackingteam Archives''] - searchable database of 1 million internal emails<br /> * [https://wikileaks.org/spyfiles/list/company-name/hackingteam.html HackingTeam presentations] in the [[WikiLeaks]] &quot;''Spy Files''&quot;<br /> {{Hacking in the 2010s}}<br /> <br /> [[Category:Computer security software]]<br /> [[Category:Spyware]]<br /> [[Category:Surveillance]]<br /> [[Category:Trojan horses]]<br /> [[Category:Espionage techniques]]<br /> [[Category:Espionage devices]]<br /> [[Category:Malware toolkits]]<br /> [[Category:Computer access control]]<br /> [[Category:Cyberwarfare]]<br /> [[Category:Espionage scandals and incidents]]<br /> [[Category:Companies based in Milan]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=HackingTeam&diff=177175001 HackingTeam 2016-06-18T17:33:54Z <p>Dsprc: /* Customer List */</p> <hr /> <div>{{Infobox company<br /> | name = HackingTeam<br /> | logo = Hacking Team logo.png<br /> | logo_size = <br /> | logo_alt = The words Hacking Team enclosed with in reversed square brackets &lt;nowiki&gt;][&lt;/nowiki&gt;<br /> | logo_caption = Company logo<br /> | logo_padding = <br /> | image = <br /> | image_size = <br /> | image_alt = <br /> | image_caption = <br /> | type = <br /> | industry = [[Information technology]]<br /> | founded = 2003<br /> | founders = David Vincenzetti, Valeriano Bedeschi<br /> | hq_location = <br /> | hq_location_city = [[Milan]]<br /> | hq_location_country = [[Italy]]<br /> | area_served = &lt;!-- or: | areas_served = --&gt;<br /> | key_people = Alberto Ornaghi (ALoR), Marco Valleri (NaGA)<br /> | products = {{unbulleted list|Software}}<br /> | brands = <br /> | services = <br /> | owner = &lt;!-- or: | owners = --&gt;<br /> | website = {{URL|http://www.hackingteam.it/}}<br /> }}<br /> '''HackingTeam''' is a [[Milan]]-based [[information technology]] company that sells offensive intrusion and [[surveillance]] capabilities to governments, law enforcement agencies and corporations.&lt;ref name=spies&gt;{{cite web |title=The spies behind your screen |url=http://www.telegraph.co.uk/technology/8899353/The-spies-behind-your-screen.html |author=Batey, Angus |date=24 November 2011 |publisher=''The Telegraph'' |accessdate=26 July 2015}}&lt;/ref&gt; Its &quot;''Remote Control Systems''&quot; enable governments and corporations to monitor the communications of internet users, decipher their [[cryptography|encrypted]] files and emails, record [[Skype]] and other [[Voice over IP]] communications, and remotely activate microphones and camera on target computers.&lt;ref&gt;{{cite web|title=Enemies of the Internet: HackingTeam|url=http://surveillance.rsf.org/en/hacking-team/|work=[[Reporters Without Borders]]|accessdate=24 April 2014}}&lt;/ref&gt; The company has been criticized for providing these capabilities to governments with poor [[human rights]] records.&lt;ref&gt;{{cite web | last3 = Marquis-Boire | first3 = Morgan | last1 = Marczak | first1 = Bill | last2 = Gaurnieri | first2 = Claudio | last4 = Scott-Railton | first4 = John | title = Mapping HackingTeam's &quot;Untraceable&quot; Spyware | url = https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ | date = February 17, 2014}}&lt;/ref&gt; HackingTeam states that they have the ability to disable their software if it is used unethically.&lt;ref&gt;{{cite news|url=http://www.newyorker.com/online/blogs/elements/2014/03/hacked-by-ones-own-government.html|title=Hackers Without Borders|last=Kopstein|first=Joshua|work=[[The New Yorker]]|date=10 March 2014|accessdate=24 April 2014}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url = https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/|title = Police Story: HackingTeam’s Government Surveillance Malware|date = June 24, 2014|accessdate = August 3, 2014|website = Citizen Lab|publisher = University of Toronto|last1 = Marquis-Boire|first1 = Morgan | last2 = Gaurnieri | first2 = Claudio | first3 = John | last3 = Scott-Railton | first4 = Katie | last4 = Kleemola }}&lt;/ref&gt; The Italian government has restricted their license to do business with countries outside Europe.&lt;ref name=&quot;:0&quot; /&gt;<br /> <br /> HackingTeam employs around 40 people in its Italian office, and has subsidiary branches in [[Annapolis]], [[Washington, D.C.]] and [[Singapore]].&lt;ref name=know&gt;''[[Human Rights Watch]]'' (25 March 2014). ''&quot;[https://www.hrw.org/report/2014/03/25/they-know-everything-we-do/telecom-and-internet-surveillance-ethiopia They Know Everything We Do]&quot;''. Retrieved 1 August 2015.&lt;/ref&gt; Its products are in use in dozens of countries across six continents.&lt;ref name=Jeffries&gt;{{cite web|last=Jeffries|first=Adrianne|title=Meet HackingTeam, the company that helps the police hack you|url=http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers|accessdate=21 April 2014|work=[[The Verge]]|date=13 September 2013}}&lt;/ref&gt;<br /> <br /> ==History==<br /> HackingTeam was started by two Italian programmers: Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri (under the aliases of ALoR, and NaGA respectively), created a set of tools that could be used to monitor and remotely manipulate target computers. The program, called [[Ettercap (software)|Ettercap]], was embraced both by [[Hacker (term)|hackers]] looking to spy on people, and by companies that hoped to test the security of their own networks.<br /> <br /> The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their [[Skype]] calls, the police contacted Ornaghi and Valleri and asked them to help modify the program. HackingTeam was born, and became &quot;the first sellers of commercial hacking software to the police.&quot;&lt;ref name=Jeffries/&gt;<br /> <br /> According to former employee Alberto Pelliccione, the company began as security services provider, offering [[penetration testing]], auditing and other defensive capabilities to clients.&lt;ref name=war&gt;Farivar, Cyrus (20 July 2015) [http://arstechnica.com/security/2015/07/italian-prosecutors-investigate-former-hacking-team-employees-for-role-in-hack/ HackingTeam goes to war against former employees, suspects some helped hackers]. ''Ars Technica''. Retrieved 26 July 2015.&lt;/ref&gt; Pelliccione states that as malware and other offensive capabilities were developed and accounted for a larger percentage of revenues, the organization pivoted in a more offensive direction and became increasingly compartmentalized. Pelliccione claims fellow employees working on aspects of the same platform - for example, Android exploits and payloads - would not communicate with one another, possibly leading to tensions and strife within the organization.&lt;ref name=war/&gt;<br /> <br /> In February 2014, a report from [[Citizen Lab]] identified the organisation to be using hosting services from [[Linode]], [[Telecom Italia]], [[Rackspace]], [[NOC4Hosts]] and notorious [[bullet proof hosting]] company [[Santrex]].&lt;ref&gt;{{cite news|title=HackingTeam’s US Nexus|url=https://citizenlab.org/2014/02/hacking-teams-us-nexus/|accessdate=2 August 2015|date=28 February 2014}}&lt;/ref&gt;<br /> <br /> On July 5, 2015 the company suffered a major data breach of customer data, software code, internal documents and emails. - ''See: [[#2015 data breach|§ 2015 data breach]]''<br /> <br /> ==Products and capabilities==<br /> HackingTeam enables clients to perform remote monitoring functions against citizens via their [[Remote administration tool|RCS (Remote Control Systems)]], including their '''Da Vinci''' and '''Galileo''' platforms:&lt;ref name=spies/&gt;<br /> <br /> *Covert collection of emails, text message, phone call history and address books<br /> *[[Keystroke logging]]<br /> *Uncover search history data and take screenshots<br /> *Record audio from phone calls<br /> :*Capture audio and video stream from device memory to bypass [[cryptography]] of [[Skype]] sessions&lt;ref&gt;{{cite web | title=Mideast Uses Western Tools to Battle the Skype Rebellion |url=http://www.wsj.com/articles/SB10001424052702304520804576345970862420038 |author1=Stecklow, Steve |author2=Sonne, Paul |author3=Bradley, Matt |date=1 June 2011 |publisher=''Wall Street Journal'' |accessdate=26 July 2015}}&lt;/ref&gt;<br /> :*Use microphones on device to collect ambient background noise and conversations<br /> *Activate phone or computer cameras<br /> *Hijack telephone GPS systems to monitor target's location<br /> *Infect target computer's [[UEFI]] [[BIOS]] [[firmware]] with a [[rootkit]]&lt;ref&gt;{{Cite web|first=Philippe |last=Lin |url=http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-uses-uefi-bios-rootkit-to-keep-rcs-9-agent-in-target-systems/ |title=HackingTeam Uses UEFI BIOS Rootkit to Keep RCS 9 Agent in Target Systems |work=TrendLabs Security Intelligence Blog |publisher=[[Trend Micro]] |date=July 13, 2015 |accessdate=July 26, 2015}}&lt;/ref&gt;<br /> *Extract WiFi passwords&lt;ref name=skiddies&gt;[http://arstechnica.com/security/2015/07/advanced-spyware-for-android-now-available-to-script-kiddies-everywhere/ &quot;Advanced spyware for Android now available to script kiddies everywhere&quot;]. ''Ars Technica''. Retrieved on 2 August 2015.&lt;/ref&gt;<br /> *Exfiltrate [[Bitcoin]] and other cryptocurrency wallet files to collect data on local accounts, contacts and transaction histories.&lt;ref name=coin&gt;Farivar, Cyrus (14 July 2015). &quot;''[http://arstechnica.com/security/2015/07/hacking-team-broke-bitcoin-secrecy-by-targeting-crucial-wallet-file/ HackingTeam broke Bitcoin secrecy by targeting crucial wallet file]''&quot;. ''Ars Technica''. Retrieved 26 July 2015.&lt;/ref&gt;<br /> <br /> HackingTeam uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.&lt;ref&gt;{{cite news|last1=Schneier|first1=Bruce|title=More on HackingTeam's Government Spying Software|url=https://www.schneier.com/blog/archives/2014/06/more_on_hacking.html}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=http://www.ibtimes.co.uk/hacking-team-tools-allow-governments-take-full-control-your-smartphone-1453987|title=HackingTeam Tools Allow Governments To Take Full Control of Your Smartphone|date=2014-06-24|website=International Business Times UK|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> The malware has payloads for [[Android (operating system)|Android]],&lt;ref name=skiddies/&gt; [[BlackBerry]], Apple [[iOS]], [[Linux]], [[Mac OS X]], [[Symbian]], as well as [[Microsoft Windows]], [[Windows Mobile]] and [[Windows Phone]] class of [[operating system]]s.&lt;ref name=C3&gt;Guarnieri, Claudio; Marquis-Boire, Morgan (13 January 2014). ''[https://media.ccc.de/browse/congress/2013/30C3_-_5439_-_en_-_saal_1_-_201312292105_-_to_protect_and_infect_-_claudio_guarnieri_-_morgan_marquis-boire.html &quot;To Protect And Infect: The militarization of the Internet&quot;]''. At the 30th [[Chaos Communications Congress]] – &quot;30C3&quot;. (Video or Audio). [[Chaos Computer Club]]. Retrieved on 15 August 2015.&lt;/ref&gt;<br /> <br /> RCS is a management platform that allows operators to remotely deploy exploits and payloads against targeted systems, remotely manage devices once compromised, and exfiltrate data for remote analysis.<br /> <br /> == Controversies ==<br /> <br /> === Use by repressive governments ===<br /> HackingTeam has been criticized for selling its products and services to governments with poor human rights records, including [[Sudan]], [[Bahrain]], and [[Saudi Arabia]].&lt;ref name=repress/&gt;<br /> <br /> In June 2014, a United Nations panel monitoring the implementation of sanctions on Sudan requested information from HackingTeam about their alleged sales of software to the country in contravention of United Nations weapons export bans to Sudan. Documents leaked in the 2015 data breach of HackingTeam revealed the organization sold Sudanese National Intelligence and Security Service access to their &quot;Remote Control System&quot; software in 2012 for 960,000 Euros.&lt;ref name=repress/&gt;&lt;ref&gt;{{Cite web|url=https://theintercept.com/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/|title=A Detailed Look at HackingTeam’s Emails About Its Repressive Clients|last=Hay Newman|first=Lily|website=The Intercept|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> In response to the United Nations panel, the company responded in January 2015 that they were not currently selling to Sudan. In a follow-up exchange, HackingTeam asserted that their product was not controlled as a weapon, and so the request was beyond the scope of the panel. There was no need for them to disclose previous sales, which they considered confidential business information.&lt;ref name=repress&gt;{{Cite web |title=A Detailed Look at HackingTeam’s Emails About Its Repressive Clients |url=https://firstlook.org/theintercept/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/ |accessdate=7 July 2015 |first1=Cora |last1=Currier |first2=Morgan |last2=Marquis-Boire}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://www.eff.org/deeplinks/2015/07/hacking-team-leaks-reveal-spyware-industrys-growth|title=HackingTeam Leaks Reveal Spyware Industry's Growth, Negligence of Human Rights|last=Myers West|first=Sarah|date=2015-07-08|website=Electronic Frontier Foundation|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> The U.N. disagreed. &quot;The view of the panel is that as such software is ideally suited to support military electronic intelligence (ELINT) operations it may potentially fall under the category of ‘military … equipment’ or ‘assistance’ related to prohibited items,&quot; the secretary wrote in March. &quot;Thus its potential use in targeting any of the belligerents in the Darfur conflict is of interest to the Panel.&quot;&lt;ref name=repress/&gt;&lt;ref&gt;{{Cite web|url=http://gizmodo.com/hacking-teams-lame-excuse-for-selling-digital-weapons-t-1716375503|title=HackingTeam's Lame Excuse for Selling Digital Weapons to Sudan|last=Knibbs|first=Kate|date=2015-07-08|website=Gizmodo|language=en-US|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> In the fall of 2014, the Italian government abruptly froze all of HackingTeam's exports, citing human rights concerns. After lobbying Italian officials, the company temporarily won back the right to sell its products abroad.&lt;ref name=repress/&gt;<br /> <br /> === 2015 data breach ===<br /> On July 5, 2015, the [[Twitter]] account of the company was compromised by an unknown individual who published an announcement of a [[data breach]] against HackingTeam's computer systems. The initial message read, &quot;''Since we have nothing to hide, we're publishing all our e-mails, files, and source code …''&quot; and provided links to over 400 [[gigabyte]]s of data, including alleged internal e-mails, invoices, and [[source code]]; which were leaked via [[BitTorrent]] and [[Mega (service)|Mega]].&lt;ref&gt;{{Wayback|url=https://twitter.com/hackingteam|title=Hacked Team (@hackingteam)|date=20150706010312}}&lt;/ref&gt; An announcement of the data breach, including a link to the bittorrent seed, was retweeted by [[WikiLeaks]] and by many others through social media.&lt;ref&gt;{{Twitter status|wikileaks|617865712611233792|Inside malware makers &quot;HackingTeam&quot;: hundreds of gigabytes of e-mails, files, and source code|[[WikiLeaks]]|July 6, 2015|July 6, 2015}}&lt;/ref&gt;&lt;ref name=&quot;ibtimes.co.uk&quot;&gt;{{Cite web|url=http://www.ibtimes.co.uk/hacking-team-hacked-spy-tools-sold-oppressive-regimes-sudan-bahrain-kazakhstan-1509460|title=HackingTeam hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan|date=2015-06-06|publisher=International Business Times|accessdate=2015-07-06}}&lt;/ref&gt;<br /> <br /> The material was voluminous and early analysis appeared to reveal that HackingTeam had invoiced the [[Lebanese Army]]&lt;ref&gt;{{Twitter|url=https://twitter.com/SynAckPwn/status/617955067006578689}} {{dead link|date=July 2015}}&lt;/ref&gt; and [[Sudan]] and that spy tools were also sold to [[Bahrain]] and [[Kazakhstan]].&lt;ref name=&quot;ibtimes.co.uk&quot;/&gt; HackingTeam had previously claimed they had never done business with Sudan.&lt;ref&gt;{{Cite web|title = HackingTeam hacked, attackers claim 400GB in dumped data|url = http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html|accessdate = 2015-07-06|first = Steve|last = Ragan}}&lt;/ref&gt;<br /> <br /> The leaked data revealed a [[zero-day (computing)|zero-day]] cross-platform Flash exploit ([[Common Vulnerabilities and Exposures|CVE]] number: CVE-2015-5119).&lt;ref&gt;{{Cite web|title = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html|url = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html}}&lt;/ref&gt; The dump included a demo of this exploit by opening [[Calculator (computer program)|Calculator]] from a test webpage.&lt;ref&gt;{{Cite web|title = Zero-Day Flash Player Exploit Disclosed In 'HackingTeam' Data Dump|url = http://thehackernews.com/2015/07/flash-zero-day-vulnerability.html|accessdate = 2015-07-06|first = Swati|last = Khandelwal}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Unpatched Flash Player Flaw, More POCs Found in HackingTeam Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/|accessdate = 2015-07-08|first = Peter|last = Pi}}&lt;/ref&gt; Adobe [[software patch|patched]] the hole on July 8, 2015.&lt;ref&gt;{{Cite web|title = Adobe Security Bulletin|url = https://helpx.adobe.com/security/products/flash-player/apsb15-16.html|accessdate = 2015-07-11|last = Adobe Systems (corporate author)}}&lt;/ref&gt; Another vulnerability involving Adobe was revealed in the dumps, which took advantage of a [[buffer overflow]] attack on an Adobe Open Type Manager [[Dynamic-link library|DLL]] included with [[Microsoft Windows]]. The DLL is run in [[protection ring|kernel mode]], so the attack could perform [[privilege escalation]] to bypass the [[sandbox (computer security)|sandbox]].&lt;ref&gt;{{Cite web|title = A Look at the Open Type Font Manager Vulnerability from the HackingTeam Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-the-open-type-font-manager-vulnerability-from-the-hacking-team-leak/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29|accessdate = 2015-07-08|first = Jack|last = Tang}}&lt;/ref&gt;<br /> <br /> Also revealed in leaked data was HackingTeam employees' use of weak passwords, including 'P4ssword', 'wolverine', and 'universo'.&lt;ref&gt;{{Cite web|title = HackingTeam used shockingly bad passwords|url = http://www.zdnet.com/article/no-wonder-hacking-team-got-hacked/|accessdate = 2015-07-06|first = Zack|last = Whittaker}}&lt;/ref&gt;<br /> <br /> After a few hours without response from HackingTeam, member Christian Pozzi tweeted the company was working closely with police and &quot;''what the attackers are claiming regarding our company is not true.''&quot;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964180042190848|accessdate = 2015-07-06}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964660705234944|accessdate = 2015-07-06}}&lt;/ref&gt; He also claimed the leaked archive &quot;contains a virus&quot; and that it constituted &quot;false info&quot;.&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617962663188926465|accessdate = 2015-07-06}}&lt;/ref&gt; Shortly after these tweets, Pozzi's Twitter account itself was apparently compromised.&lt;ref&gt;{{Cite web|title=Christian Pozzi on Twitter: &quot;Uh Oh - my twitter account was also hacked.&quot; |url=https://twitter.com/christian_pozzi/status/617977753250496512 |date=2015-07-06 |accessdate=2015-07-06 |deadurl=yes |archiveurl=https://web.archive.org/web/20150706084837/https://twitter.com/christian_pozzi/status/617977753250496512 |archivedate=July 6, 2015 }}&lt;/ref&gt;<br /> <br /> Responsibility for this attack was claimed by the hacker known as &quot;Phineas Fisher&quot; (or Phisher) on Twitter.&lt;ref&gt;{{cite tweet | user=gammagrouppr | author=Phineas Fisher | number=617937092497178624 | title=gamma and HT down, a few more to go :) | date=6 July 2015}}&lt;/ref&gt; Phineas has previously attacked spyware firm [[Gamma International]], who produce malware, such as [[FinFisher]], for governments and corporations.&lt;ref&gt;{{Cite web|title = HackingTeam: We won't 'shrivel up and go away' after cyberattack|url = http://www.zdnet.com/article/hacking-team-cyberattack-aftermath-interview/|accessdate = 2015-07-06|first = Charlie|last = Osbourne}}&lt;/ref&gt; In 2016, Phineas published details of the attack, in Spanish and English, as a &quot;how-to&quot; for others, and explained the motivations behind the attack.&lt;ref&gt;{{Cite web|url=http://arstechnica.com/security/2016/04/how-hacking-team-got-hacked-phineas-phisher/|title=How HackingTeam got hacked|website=Ars Technica|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> The internal documents revealed details of HackingTeam's contracts with repressive governments.&lt;ref&gt;{{Cite web|url=https://theintercept.com/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/|title=A Detailed Look at HackingTeam’s Emails About Its Repressive Clients|website=The Intercept|access-date=2016-05-15}}&lt;/ref&gt; In 2016, the Italian government again revoked the company’s license to sell spyware outside of Europe without special permission.&lt;ref name=&quot;:0&quot;&gt;{{Cite web|url=https://nakedsecurity.sophos.com/2016/04/08/hacking-team-loses-global-license-to-sell-spyware/|title=HackingTeam loses global license to sell spyware|last=Zorabedian|first=John|date=2016-04-08|website=Naked Security|access-date=2016-05-15}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://www.privacyinternational.org/node/826|title=HackingTeam’s Global License Revoked by Italian Export Authorities {{!}} Privacy International|website=www.privacyinternational.org|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> ===Others===<br /> {{refimprove section|date=April 2016}}<br /> * [[Vupen]] – 0-day exploit provider linked to HackingTeam&lt;ref&gt;[https://tsyrklevich.net/2015/07/22/hacking-team-0day-market/ HackingTeam: a zero-day market case study], Vlad Tsyrklevich's blog&lt;/ref&gt;<br /> * ''[[Mamfakinch]]'' – a citizen media organization targeted with malware allegedly developed by HackingTeam&lt;ref&gt;Perlroth, Nicole (10 October 2012). [http://bits.blogs.nytimes.com/2012/10/10/ahead-of-spyware-conference-more-evidence-of-abuse/?_r=0 Ahead of Spyware Conference, More Evidence of Abuse]. ''New York Times'' (Bits).&lt;/ref&gt;<br /> <br /> == Customer List ==<br /> HackingTeam's clientele include not just governments, but also corporate clients such as [[Barclay's]] Bank and [[British Telecom]] (BT) of the [[United Kingdom]], as well as [[Deutsche Bank]] of [[Germany]].&lt;ref name=spies/&gt;<br /> <br /> A full list of HackingTeam's customers were leaked in the 2015 breach. Disclosed documents show HackingTeam had 70 current customers, mostly military, police, federal and provincial governments. The total company revenues disclosed exceeded 40 million [[Euro]]s.&lt;ref&gt;{{cite web |author=Kopstein, Justin |title= Here Are All the Sketchy Government Agencies Buying HackingTeam's Spy Tech |url=http://motherboard.vice.com/read/here-are-all-the-sketchy-government-agencies-buying-hacking-teams-spy-tech |publisher=Vice Magazine |date=6 July 2015<br /> }}&lt;/ref&gt;&lt;ref&gt;{{cite web |author=Weissman, Cale Guthrie |title=Hacked security company's documents show a laundry list of questionable clients |url=http://www.businessinsider.com/hacked-security-companys-document-2015-7 |date=6 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |author=Ragan, Steve |title=In Pictures: HackingTeam's hack curated |url=http://www.cso.com.au/slideshow/579158/pictures-hacking-team-hack-curated/?image=9 |publisher=CSO Online (Australia)}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=HackingTeam hacked: firm sold spying tools to repressive regimes, documents claim |url=http://www.theguardian.com/technology/2015/jul/06/hacking-team-hacked-firm-sold-spying-tools-to-repressive-regimes-documents-claim |author=Hern, Alex |publisher=''The Guardian'' |date=6 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=HackingTeam responds to data breach, issues public threats and denials |url=http://www.csoonline.com/article/2944333/data-breach/hacking-team-responds-to-data-breach-issues-public-threats-and-denials.html |author=Ragan, Steve |publisher=''CSO Online'' |date=6 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=A whole bunch of downed government surveillance programs are about to go back online |url=http://www.businessinsider.com/hacking-team-promises-customers-they-can-resume-surveillance-operations-soon-2015-7 |author=Stevenson, Alastair |publisher=''Business Insider'' |date=14 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;<br /> <br /> {| class=&quot;wikitable sortable&quot;<br /> |-<br /> ! Customer<br /> ! Country<br /> ! Area<br /> ! Agency<br /> ! Year First Sale<br /> ! Annual Maintenance Fees<br /> ! Total Client Revenues<br /> |-<br /> | [[Polizia Postale e delle Comunicazioni]]&lt;ref&gt;Jone Pierantonio. [http://it.ibtimes.com/cyber-space/ecco-chi-ha-bucato-hacking-team-1408915 &quot;Ecco chi ha bucato HackingTeam&quot;]. ''International Business Times''. Retrieved on 2 August 2015.&lt;/ref&gt;||Italy||Europe||LEA||2004||€100,000||€808,833<br /> |-<br /> | [[Centro Nacional de Inteligencia]]&lt;ref&gt;Ediciones El País (8 July 2015). [http://internacional.elpais.com/internacional/2015/07/08/actualidad/1436343710_282978.html &quot;HackingTeam: “Ofrecemos tecnología ofensiva para la Policía”&quot;]. ''EL PAÍS''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Spain]]||Europe||Intelligence||2006||€52,000||€538,000<br /> |-<br /> | [[Infocomm Development Authority of Singapore]]||[[Singapore]]||APAC||Intelligence||2008||€89,000||€1,209,967<br /> |-<br /> | Information Office||[[Hungary]]||Europe||Intelligence||2008||€41,000||€885,000<br /> |-<br /> | CSDN||[[Morocco]]||MEA||Intelligence||2009||€140,000||€1,936,050<br /> |-<br /> | UPDF (Uganda Peoples Defense Force), ISO (Internal Security Organization), Office of the President||[[Uganda]]||Africa||Intelligence||2015||€831,000||€52,197,100<br /> |-<br /> | Italy - DA - Rental||Italy||Europe||Other||2009||€50,000||€628,250<br /> |-<br /> | [[Malaysian Anti-Corruption Commission]]||[[Malaysia]]||APAC||Intelligence||2009||€77,000||€789,123<br /> |-<br /> | PCM||Italy||Europe||Intelligence||2009||€90,000||€764,297<br /> |-<br /> | SSNS - Ungheria||Hungary||Europe||Intelligence||2009||€64,000||€1,011,000<br /> |-<br /> | CC - Italy||Italy||Europe||LEA||2010||€50,000||€497,349<br /> |-<br /> | [[Al Mukhabarat Al A'amah]]||[[Saudi Arabia]]||MEA||Intelligence||2010||€45,000||€600,000<br /> |-<br /> | IR Authorities (Condor)||[[Luxembourg]]||Europe||Other||2010||€45,000||€446,000<br /> |-<br /> | La Dependencia y/o CISEN&lt;ref&gt;[http://fusion.net/story/163872/the-hacking-team-leak-shows-mexico-was-the-top-client-but-why/ &quot;The HackingTeam leak shows Mexico was its top client, but why?&quot;]. ''Fusion''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Mexico]]||LATAM||Intelligence||2010||€130,000||€1,390,000<br /> |-<br /> | UZC&lt;ref name=fortune/&gt; ||[[Czech Republic]] ||Europe||LEA||2010||€55,000||€689,779<br /> |-<br /> | Egypt - MOD&lt;ref name=fortune/&gt;||[[Egypt]]||MEA||Other||2011||€70,000||€598,000<br /> |-<br /> | [[Federal Bureau of Investigation]]&lt;ref name=fbidea/&gt;||USA||North America||LEA||2011||€100,000||€697,710<br /> |-<br /> | Oman - Intelligence||[[Oman]]||MEA||Intelligence||2011||€30,000||€500,000<br /> |-<br /> | President Security&lt;ref&gt;[http://motherboard.vice.com/read/hacking-teams-equipment-got-stolen-in-panama &quot;HackingTeam's Equipment Got Stolen in Panama&quot;]. ''Motherboard''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref&gt;Molina, Thabata (13 August 2015). ''[http://panampost.com/thabata-molina/2015/08/13/panama-to-investigate-martinelli-in-hacking-team-spying-scandal/ &quot;Panama to Investigate Martinelli in HackingTeam Spying Scandal&quot;]''. ''Panama Post''. Retrieved 15 August 2015.&lt;/ref&gt;<br /> ||[[Panama]]||LATAM||Intelligence||2011||€110,000||€750,000<br /> |-<br /> | [[Turkish National Police]]||[[Turkey]]||Europe||LEA||2011||€45,000||€440,000<br /> |-<br /> | UAE - MOI||[[United Arab Emirates|UAE]]||MEA||LEA||2011||€90,000||€634,500<br /> |-<br /> | [[National Security Service (Uzbekistan)|National Security Service]]&lt;ref name=fortune&gt;[http://fortune.com/2015/07/16/governments-used-spy-software/ &quot;Leaked emails from security firm HackingTeam show government use - Fortune&quot;]. ''Fortune''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Uzbekistan]]||Europe||Intelligence||2011||€50,000||€917,038<br /> |-<br /> | [[United States Department of Defense|Department of Defense]]&lt;ref name=fbidea/&gt;||USA||North America||LEA||2011||||€190,000<br /> |-<br /> | Bayelsa State Government||[[Nigeria]]||MEA||Intelligence||2012||€75,000||€450,000<br /> |-<br /> | Estado del Mexico||Mexico||LATAM||LEA||2012||€120,000||€783,000<br /> |-<br /> | Information Network Security Agency||[[Ethiopia]]||MEA||Intelligence||2012||€80,000||€750,000<br /> |-<br /> | State security (Falcon)||Luxemburg||Europe||Other||2012||€38,000||€316,000<br /> |-<br /> | Italy - DA - Rental||Italy||Europe||Other||2012||€60,000||€496,000<br /> |-<br /> | MAL - MI||Malaysia||APAC||Intelligence||2012||€77,000||€552,000<br /> |-<br /> | [[Direction générale de la surveillance du territoire]]||Morocco||MEA||Intelligence||2012||€160,000||€1,237,500<br /> |-<br /> | [[National Intelligence and Security Service]]&lt;ref name=fortune/&gt;||[[Sudan]]||MEA||Intelligence||2012||€76,000||€960,000<br /> |-<br /> | Russia - KVANT&lt;ref name=kvant&gt;[http://arstechnica.com/tech-policy/2015/07/hacking-teams-surveillance-software-sold-to-kgb-successor/ &quot;HackingTeam apparently violated EU rules in sale of spyware to Russian agency&quot;]. ''Ars Technica''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Russia]]||Europe||Intelligence||2012||€72,000||€451,017<br /> |-<br /> | Saudi - GID||Saudi||MEA||LEA||2012||€114,000||€1,201,000<br /> |-<br /> | SIS of [[National Security Committee of the Republic of Kazakhstan|National Security Committee of Kazakhstan]]&lt;ref name=fortune/&gt;||[[Kazakhstan]]||Europe||Intelligence||2012||€140,000||€1,012,500<br /> |-<br /> | The 5163 Army Division (Alias of South Korean National Intelligence Service)&lt;ref name=fortune/&gt;&lt;ref name=torbrowser&gt;[https://firstlook.org/theintercept/2015/07/16/hackingteam-attacked-tor-browser/ &quot;How HackingTeam Created Spyware that Allowed the FBI To Monitor Tor Browser&quot;]. ''The Intercept''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref name=wswskorea&gt;McGrath, Ben (25 July 2015). &quot;''[https://www.wsws.org/en/articles/2015/07/25/kore-j25.html Further revelations in South Korean hacking scandal]''&quot;. ''World Socialist Web Site''. Retrieved 26 July 2015.&lt;/ref&gt;||[[South Korea|S. Korea]]||APAC||Other||2012||€67,000||€686,400<br /> |-<br /> | UAE - Intelligence||[[United Arab Emirates|UAE]]||MEA||Other||2012||€150,000||€1,200,000<br /> |-<br /> | [[Drug Enforcement Administration]]&lt;ref name=fbidea&gt;[https://firstlook.org/theintercept/2015/07/06/hacking-team-spyware-fbi/ &quot;Leaked Documents Show FBI, DEA and U.S. Army Buying Italian Spyware&quot;]. ''The Intercept''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref name=dea&gt;[http://motherboard.vice.com/read/the-dea-just-cancelled-its-contract-with-hacking-team &quot;The DEA Just Cancelled Its Contract With HackingTeam&quot;]. ''Motherboard''. Retrieved on 2 August 2015.&lt;/ref&gt;||USA||North America||Other||2012||€70,000||€567,984<br /> |-<br /> | [[Central Anticorruption Bureau]]||[[Poland]]||Europe||LEA||2012||€35,000||€249,200<br /> |-<br /> | MOD Saudi||Saudi||MEA||Other||2013||€220,000||€1,108,687<br /> |-<br /> | PMO||Malaysia||APAC||Intelligence||2013||€64,500||€520,000<br /> |-<br /> | Estado de Qeretaro||Mexico||LATAM||LEA||2013||€48,000||€234,500<br /> |-<br /> | National Security Agency&lt;ref name=fortune/&gt;||[[Azerbaijan]]||Europe||Intelligence||2013||€32,000||€349,000<br /> |-<br /> | Gobierno de Puebla||Mexico||LATAM||Other||2013||€64,000||€428,835<br /> |-<br /> | Gobierno de Campeche||Mexico||LATAM||Other||2013||€78,000||€386,296<br /> |-<br /> | AC Mongolia||[[Mongolia]]||APAC||Intelligence||2013||€100,000||€799,000<br /> |-<br /> | Dept. of Correction Thai Police ||[[Thailand]]||APAC||LEA||2013||€52,000||€286,482<br /> |-<br /> | [[National Intelligence Secretariat (Ecuador)|National Intelligence Secretariat]]&lt;ref&gt;http://panampost.com/rebeca-morla/2015/07/13/ecuadorian-websites-report-on-hacking-team-get-taken-down/&lt;br /&gt;http://panampost.com/panam-staff/2015/08/10/hacking-team-helped-ecuador-spy-on-opposition-activist/&lt;br /&gt;http://bigstory.ap.org/article/6f41d49888174b45857d34511fda1caf/apnewsbreak-email-leak-suggests-ecuador-spied-opposition&lt;/ref&gt;<br /> ||[[Ecuador]]||LATAM||LEA||2013||€75,000||€535,000<br /> |-<br /> | Police Intelligence Directorate&lt;ref name=dipol_telesur&gt;Podour, Justin (23 July 2015). [http://www.telesurtv.net/opinion/HackedTeam-y-Colombia-Como-la-vigilancia-ayuda-a-un-Estado-violento-20150723-0062.html #HackedTeam y Colombia: Cómo la vigilancia ayuda a un Estado violento]. ''Telesur''. Retrieved 26 July 2015.&lt;/ref&gt;||[[Colombia]]||LATAM||LEA||2013||€35,000||€335,000<br /> |-<br /> | [[Guardia di Finanza]]||Italy||Europe||LEA||2013||€80,000||€400,000<br /> |-<br /> | Intelligence&lt;ref name=cyprus&gt;In Cyprus (11 July 2015).[http://in-cyprus.com/intelligence-service-chief-steps-down/ Intelligence Service chief steps down]. Retrieved 26 July 2015.&lt;/ref&gt;||[[Cyprus]]||Europe||LEA||2013||€40,000||€375,625<br /> |-<br /> | MidWorld&lt;ref name=ifex&gt;Bahrain Center for Human Rights (15 July 2015). &quot;''[https://www.ifex.org/bahrain/2015/07/15/bahrain_hacking_team HackingTeam's troubling connections to Bahrain]''&quot; IFEX. Retrieved 26 July 2015.&lt;/ref&gt;||[[Bahrain]]||MEA||Intelligence||2013||||€210,000<br /> |-<br /> | Mexico - PEMEX||Mexico ||LATAM||LEA ||2013||||€321,120<br /> |-<br /> | Malysia K||Malaysia||APAC||LEA||2013||||€0<br /> |-<br /> | Honduras||[[Honduras]]||LATAM||LEA||2014||||€355,000<br /> |-<br /> | Mex Taumalipas||Mexico||LATAM||||2014||||€322,900<br /> |-<br /> | Secretaría de Planeación y Finanzas||Mexico||LATAM||LEA||2014||€91,000||€371,035<br /> |-<br /> | AREA||Italia||Europe||||2014||||€430,000<br /> |-<br /> | Mexico Yucatán||Mexico||LATAM||LEA||2014||||€401,788<br /> |-<br /> | Mexico Durango||Mexico||LATAM||LEA||2014||||€421,397<br /> |-<br /> | [[Investigations Police of Chile]]||[[Chile]]||LATAM||LEA||2014||||€2,289,155<br /> |-<br /> | Jalisco Mexico||Mexico||LATAM||LEA||2014||||€748,003<br /> |-<br /> | [[Royal Thai Army]]||Thailand||APAC||LEA||2014||||€360,000<br /> |-<br /> | Vietnam GD5||[[Vietnam]]||APAC||||2014||||€281,170<br /> |-<br /> | [[Kantonspolizei Zürich]]||Switzerland||Europe||LEA||2014||||€486,500<br /> |-<br /> | Vietnam GD1||Vietnam||APAC||LEA||2015||||€543,810<br /> |-<br /> | Egypt TRD GNSE||Egypt||MEA||LEA||2015||||€137,500<br /> |-<br /> | [[Lebanese Armed Forces|Lebanese Army]]||[[Lebanon]]||MEA||LEA||2015||||<br /> |-<br /> | [[Federal Police Department]]||Brazil||LATAM||LEA||2015||||<br /> |-<br /> | [[SHISH|State Informative Service]]&lt;ref&gt;Lexime (14 July 2015). &quot;''[http://www.balkanweb.com/site/burime-te-sigurta-shish-perdor-programet-pergjuese-qe-prej-2015-hacking-teams-nuk-e-kemi-nen-kontroll-sistemin/ Burime të sigurta, SHISH përdor programet përgjuese që prej 2015. HackingTeams: Nuk e kemi nën kontroll sistemin!]''&quot; (video). BalkanWeb. Retrieved 27 July 2015.&lt;/ref&gt;||[[Albania]]||Europe||SHIK||2015||||<br /> |}<br /> <br /> == See also ==<br /> * [[FinFisher]]<br /> * [[MiniPanzer and MegaPanzer]]<br /> <br /> ==References==<br /> {{reflist|30em}}<br /> <br /> == External links ==<br /> * {{Official website| http://www.hackingteam.it/}}<br /> * [https://citizenlab.org/tag/hacking-team/ HackingTeam Archives] - investigative reports published by The [[Citizen Lab]]<br /> * [https://wikileaks.org/hackingteam/emails WikiLeaks: ''The Hackingteam Archives''] - searchable database of 1 million internal emails<br /> * [https://wikileaks.org/spyfiles/list/company-name/hackingteam.html HackingTeam presentations] in the [[WikiLeaks]] &quot;''Spy Files''&quot;<br /> {{Hacking in the 2010s}}<br /> <br /> [[Category:Computer security software]]<br /> [[Category:Spyware]]<br /> [[Category:Surveillance]]<br /> [[Category:Trojan horses]]<br /> [[Category:Espionage techniques]]<br /> [[Category:Espionage devices]]<br /> [[Category:Malware toolkits]]<br /> [[Category:Computer access control]]<br /> [[Category:Cyberwarfare]]<br /> [[Category:Espionage scandals and incidents]]<br /> [[Category:Companies based in Milan]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=HackingTeam&diff=177175000 HackingTeam 2016-06-18T17:31:29Z <p>Dsprc: /* Customer List */</p> <hr /> <div>{{Infobox company<br /> | name = HackingTeam<br /> | logo = Hacking Team logo.png<br /> | logo_size = <br /> | logo_alt = The words Hacking Team enclosed with in reversed square brackets &lt;nowiki&gt;][&lt;/nowiki&gt;<br /> | logo_caption = Company logo<br /> | logo_padding = <br /> | image = <br /> | image_size = <br /> | image_alt = <br /> | image_caption = <br /> | type = <br /> | industry = [[Information technology]]<br /> | founded = 2003<br /> | founders = David Vincenzetti, Valeriano Bedeschi<br /> | hq_location = <br /> | hq_location_city = [[Milan]]<br /> | hq_location_country = [[Italy]]<br /> | area_served = &lt;!-- or: | areas_served = --&gt;<br /> | key_people = Alberto Ornaghi (ALoR), Marco Valleri (NaGA)<br /> | products = {{unbulleted list|Software}}<br /> | brands = <br /> | services = <br /> | owner = &lt;!-- or: | owners = --&gt;<br /> | website = {{URL|http://www.hackingteam.it/}}<br /> }}<br /> '''HackingTeam''' is a [[Milan]]-based [[information technology]] company that sells offensive intrusion and [[surveillance]] capabilities to governments, law enforcement agencies and corporations.&lt;ref name=spies&gt;{{cite web |title=The spies behind your screen |url=http://www.telegraph.co.uk/technology/8899353/The-spies-behind-your-screen.html |author=Batey, Angus |date=24 November 2011 |publisher=''The Telegraph'' |accessdate=26 July 2015}}&lt;/ref&gt; Its &quot;''Remote Control Systems''&quot; enable governments and corporations to monitor the communications of internet users, decipher their [[cryptography|encrypted]] files and emails, record [[Skype]] and other [[Voice over IP]] communications, and remotely activate microphones and camera on target computers.&lt;ref&gt;{{cite web|title=Enemies of the Internet: HackingTeam|url=http://surveillance.rsf.org/en/hacking-team/|work=[[Reporters Without Borders]]|accessdate=24 April 2014}}&lt;/ref&gt; The company has been criticized for providing these capabilities to governments with poor [[human rights]] records.&lt;ref&gt;{{cite web | last3 = Marquis-Boire | first3 = Morgan | last1 = Marczak | first1 = Bill | last2 = Gaurnieri | first2 = Claudio | last4 = Scott-Railton | first4 = John | title = Mapping HackingTeam's &quot;Untraceable&quot; Spyware | url = https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ | date = February 17, 2014}}&lt;/ref&gt; HackingTeam states that they have the ability to disable their software if it is used unethically.&lt;ref&gt;{{cite news|url=http://www.newyorker.com/online/blogs/elements/2014/03/hacked-by-ones-own-government.html|title=Hackers Without Borders|last=Kopstein|first=Joshua|work=[[The New Yorker]]|date=10 March 2014|accessdate=24 April 2014}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url = https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/|title = Police Story: HackingTeam’s Government Surveillance Malware|date = June 24, 2014|accessdate = August 3, 2014|website = Citizen Lab|publisher = University of Toronto|last1 = Marquis-Boire|first1 = Morgan | last2 = Gaurnieri | first2 = Claudio | first3 = John | last3 = Scott-Railton | first4 = Katie | last4 = Kleemola }}&lt;/ref&gt; The Italian government has restricted their license to do business with countries outside Europe.&lt;ref name=&quot;:0&quot; /&gt;<br /> <br /> HackingTeam employs around 40 people in its Italian office, and has subsidiary branches in [[Annapolis]], [[Washington, D.C.]] and [[Singapore]].&lt;ref name=know&gt;''[[Human Rights Watch]]'' (25 March 2014). ''&quot;[https://www.hrw.org/report/2014/03/25/they-know-everything-we-do/telecom-and-internet-surveillance-ethiopia They Know Everything We Do]&quot;''. Retrieved 1 August 2015.&lt;/ref&gt; Its products are in use in dozens of countries across six continents.&lt;ref name=Jeffries&gt;{{cite web|last=Jeffries|first=Adrianne|title=Meet HackingTeam, the company that helps the police hack you|url=http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers|accessdate=21 April 2014|work=[[The Verge]]|date=13 September 2013}}&lt;/ref&gt;<br /> <br /> ==History==<br /> HackingTeam was started by two Italian programmers: Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri (under the aliases of ALoR, and NaGA respectively), created a set of tools that could be used to monitor and remotely manipulate target computers. The program, called [[Ettercap (software)|Ettercap]], was embraced both by [[Hacker (term)|hackers]] looking to spy on people, and by companies that hoped to test the security of their own networks.<br /> <br /> The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their [[Skype]] calls, the police contacted Ornaghi and Valleri and asked them to help modify the program. HackingTeam was born, and became &quot;the first sellers of commercial hacking software to the police.&quot;&lt;ref name=Jeffries/&gt;<br /> <br /> According to former employee Alberto Pelliccione, the company began as security services provider, offering [[penetration testing]], auditing and other defensive capabilities to clients.&lt;ref name=war&gt;Farivar, Cyrus (20 July 2015) [http://arstechnica.com/security/2015/07/italian-prosecutors-investigate-former-hacking-team-employees-for-role-in-hack/ HackingTeam goes to war against former employees, suspects some helped hackers]. ''Ars Technica''. Retrieved 26 July 2015.&lt;/ref&gt; Pelliccione states that as malware and other offensive capabilities were developed and accounted for a larger percentage of revenues, the organization pivoted in a more offensive direction and became increasingly compartmentalized. Pelliccione claims fellow employees working on aspects of the same platform - for example, Android exploits and payloads - would not communicate with one another, possibly leading to tensions and strife within the organization.&lt;ref name=war/&gt;<br /> <br /> In February 2014, a report from [[Citizen Lab]] identified the organisation to be using hosting services from [[Linode]], [[Telecom Italia]], [[Rackspace]], [[NOC4Hosts]] and notorious [[bullet proof hosting]] company [[Santrex]].&lt;ref&gt;{{cite news|title=HackingTeam’s US Nexus|url=https://citizenlab.org/2014/02/hacking-teams-us-nexus/|accessdate=2 August 2015|date=28 February 2014}}&lt;/ref&gt;<br /> <br /> On July 5, 2015 the company suffered a major data breach of customer data, software code, internal documents and emails. - ''See: [[#2015 data breach|§ 2015 data breach]]''<br /> <br /> ==Products and capabilities==<br /> HackingTeam enables clients to perform remote monitoring functions against citizens via their [[Remote administration tool|RCS (Remote Control Systems)]], including their '''Da Vinci''' and '''Galileo''' platforms:&lt;ref name=spies/&gt;<br /> <br /> *Covert collection of emails, text message, phone call history and address books<br /> *[[Keystroke logging]]<br /> *Uncover search history data and take screenshots<br /> *Record audio from phone calls<br /> :*Capture audio and video stream from device memory to bypass [[cryptography]] of [[Skype]] sessions&lt;ref&gt;{{cite web | title=Mideast Uses Western Tools to Battle the Skype Rebellion |url=http://www.wsj.com/articles/SB10001424052702304520804576345970862420038 |author1=Stecklow, Steve |author2=Sonne, Paul |author3=Bradley, Matt |date=1 June 2011 |publisher=''Wall Street Journal'' |accessdate=26 July 2015}}&lt;/ref&gt;<br /> :*Use microphones on device to collect ambient background noise and conversations<br /> *Activate phone or computer cameras<br /> *Hijack telephone GPS systems to monitor target's location<br /> *Infect target computer's [[UEFI]] [[BIOS]] [[firmware]] with a [[rootkit]]&lt;ref&gt;{{Cite web|first=Philippe |last=Lin |url=http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-uses-uefi-bios-rootkit-to-keep-rcs-9-agent-in-target-systems/ |title=HackingTeam Uses UEFI BIOS Rootkit to Keep RCS 9 Agent in Target Systems |work=TrendLabs Security Intelligence Blog |publisher=[[Trend Micro]] |date=July 13, 2015 |accessdate=July 26, 2015}}&lt;/ref&gt;<br /> *Extract WiFi passwords&lt;ref name=skiddies&gt;[http://arstechnica.com/security/2015/07/advanced-spyware-for-android-now-available-to-script-kiddies-everywhere/ &quot;Advanced spyware for Android now available to script kiddies everywhere&quot;]. ''Ars Technica''. Retrieved on 2 August 2015.&lt;/ref&gt;<br /> *Exfiltrate [[Bitcoin]] and other cryptocurrency wallet files to collect data on local accounts, contacts and transaction histories.&lt;ref name=coin&gt;Farivar, Cyrus (14 July 2015). &quot;''[http://arstechnica.com/security/2015/07/hacking-team-broke-bitcoin-secrecy-by-targeting-crucial-wallet-file/ HackingTeam broke Bitcoin secrecy by targeting crucial wallet file]''&quot;. ''Ars Technica''. Retrieved 26 July 2015.&lt;/ref&gt;<br /> <br /> HackingTeam uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.&lt;ref&gt;{{cite news|last1=Schneier|first1=Bruce|title=More on HackingTeam's Government Spying Software|url=https://www.schneier.com/blog/archives/2014/06/more_on_hacking.html}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=http://www.ibtimes.co.uk/hacking-team-tools-allow-governments-take-full-control-your-smartphone-1453987|title=HackingTeam Tools Allow Governments To Take Full Control of Your Smartphone|date=2014-06-24|website=International Business Times UK|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> The malware has payloads for [[Android (operating system)|Android]],&lt;ref name=skiddies/&gt; [[BlackBerry]], Apple [[iOS]], [[Linux]], [[Mac OS X]], [[Symbian]], as well as [[Microsoft Windows]], [[Windows Mobile]] and [[Windows Phone]] class of [[operating system]]s.&lt;ref name=C3&gt;Guarnieri, Claudio; Marquis-Boire, Morgan (13 January 2014). ''[https://media.ccc.de/browse/congress/2013/30C3_-_5439_-_en_-_saal_1_-_201312292105_-_to_protect_and_infect_-_claudio_guarnieri_-_morgan_marquis-boire.html &quot;To Protect And Infect: The militarization of the Internet&quot;]''. At the 30th [[Chaos Communications Congress]] – &quot;30C3&quot;. (Video or Audio). [[Chaos Computer Club]]. Retrieved on 15 August 2015.&lt;/ref&gt;<br /> <br /> RCS is a management platform that allows operators to remotely deploy exploits and payloads against targeted systems, remotely manage devices once compromised, and exfiltrate data for remote analysis.<br /> <br /> == Controversies ==<br /> <br /> === Use by repressive governments ===<br /> HackingTeam has been criticized for selling its products and services to governments with poor human rights records, including [[Sudan]], [[Bahrain]], and [[Saudi Arabia]].&lt;ref name=repress/&gt;<br /> <br /> In June 2014, a United Nations panel monitoring the implementation of sanctions on Sudan requested information from HackingTeam about their alleged sales of software to the country in contravention of United Nations weapons export bans to Sudan. Documents leaked in the 2015 data breach of HackingTeam revealed the organization sold Sudanese National Intelligence and Security Service access to their &quot;Remote Control System&quot; software in 2012 for 960,000 Euros.&lt;ref name=repress/&gt;&lt;ref&gt;{{Cite web|url=https://theintercept.com/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/|title=A Detailed Look at HackingTeam’s Emails About Its Repressive Clients|last=Hay Newman|first=Lily|website=The Intercept|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> In response to the United Nations panel, the company responded in January 2015 that they were not currently selling to Sudan. In a follow-up exchange, HackingTeam asserted that their product was not controlled as a weapon, and so the request was beyond the scope of the panel. There was no need for them to disclose previous sales, which they considered confidential business information.&lt;ref name=repress&gt;{{Cite web |title=A Detailed Look at HackingTeam’s Emails About Its Repressive Clients |url=https://firstlook.org/theintercept/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/ |accessdate=7 July 2015 |first1=Cora |last1=Currier |first2=Morgan |last2=Marquis-Boire}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://www.eff.org/deeplinks/2015/07/hacking-team-leaks-reveal-spyware-industrys-growth|title=HackingTeam Leaks Reveal Spyware Industry's Growth, Negligence of Human Rights|last=Myers West|first=Sarah|date=2015-07-08|website=Electronic Frontier Foundation|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> The U.N. disagreed. &quot;The view of the panel is that as such software is ideally suited to support military electronic intelligence (ELINT) operations it may potentially fall under the category of ‘military … equipment’ or ‘assistance’ related to prohibited items,&quot; the secretary wrote in March. &quot;Thus its potential use in targeting any of the belligerents in the Darfur conflict is of interest to the Panel.&quot;&lt;ref name=repress/&gt;&lt;ref&gt;{{Cite web|url=http://gizmodo.com/hacking-teams-lame-excuse-for-selling-digital-weapons-t-1716375503|title=HackingTeam's Lame Excuse for Selling Digital Weapons to Sudan|last=Knibbs|first=Kate|date=2015-07-08|website=Gizmodo|language=en-US|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> In the fall of 2014, the Italian government abruptly froze all of HackingTeam's exports, citing human rights concerns. After lobbying Italian officials, the company temporarily won back the right to sell its products abroad.&lt;ref name=repress/&gt;<br /> <br /> === 2015 data breach ===<br /> On July 5, 2015, the [[Twitter]] account of the company was compromised by an unknown individual who published an announcement of a [[data breach]] against HackingTeam's computer systems. The initial message read, &quot;''Since we have nothing to hide, we're publishing all our e-mails, files, and source code …''&quot; and provided links to over 400 [[gigabyte]]s of data, including alleged internal e-mails, invoices, and [[source code]]; which were leaked via [[BitTorrent]] and [[Mega (service)|Mega]].&lt;ref&gt;{{Wayback|url=https://twitter.com/hackingteam|title=Hacked Team (@hackingteam)|date=20150706010312}}&lt;/ref&gt; An announcement of the data breach, including a link to the bittorrent seed, was retweeted by [[WikiLeaks]] and by many others through social media.&lt;ref&gt;{{Twitter status|wikileaks|617865712611233792|Inside malware makers &quot;HackingTeam&quot;: hundreds of gigabytes of e-mails, files, and source code|[[WikiLeaks]]|July 6, 2015|July 6, 2015}}&lt;/ref&gt;&lt;ref name=&quot;ibtimes.co.uk&quot;&gt;{{Cite web|url=http://www.ibtimes.co.uk/hacking-team-hacked-spy-tools-sold-oppressive-regimes-sudan-bahrain-kazakhstan-1509460|title=HackingTeam hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan|date=2015-06-06|publisher=International Business Times|accessdate=2015-07-06}}&lt;/ref&gt;<br /> <br /> The material was voluminous and early analysis appeared to reveal that HackingTeam had invoiced the [[Lebanese Army]]&lt;ref&gt;{{Twitter|url=https://twitter.com/SynAckPwn/status/617955067006578689}} {{dead link|date=July 2015}}&lt;/ref&gt; and [[Sudan]] and that spy tools were also sold to [[Bahrain]] and [[Kazakhstan]].&lt;ref name=&quot;ibtimes.co.uk&quot;/&gt; HackingTeam had previously claimed they had never done business with Sudan.&lt;ref&gt;{{Cite web|title = HackingTeam hacked, attackers claim 400GB in dumped data|url = http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html|accessdate = 2015-07-06|first = Steve|last = Ragan}}&lt;/ref&gt;<br /> <br /> The leaked data revealed a [[zero-day (computing)|zero-day]] cross-platform Flash exploit ([[Common Vulnerabilities and Exposures|CVE]] number: CVE-2015-5119).&lt;ref&gt;{{Cite web|title = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html|url = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html}}&lt;/ref&gt; The dump included a demo of this exploit by opening [[Calculator (computer program)|Calculator]] from a test webpage.&lt;ref&gt;{{Cite web|title = Zero-Day Flash Player Exploit Disclosed In 'HackingTeam' Data Dump|url = http://thehackernews.com/2015/07/flash-zero-day-vulnerability.html|accessdate = 2015-07-06|first = Swati|last = Khandelwal}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Unpatched Flash Player Flaw, More POCs Found in HackingTeam Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/|accessdate = 2015-07-08|first = Peter|last = Pi}}&lt;/ref&gt; Adobe [[software patch|patched]] the hole on July 8, 2015.&lt;ref&gt;{{Cite web|title = Adobe Security Bulletin|url = https://helpx.adobe.com/security/products/flash-player/apsb15-16.html|accessdate = 2015-07-11|last = Adobe Systems (corporate author)}}&lt;/ref&gt; Another vulnerability involving Adobe was revealed in the dumps, which took advantage of a [[buffer overflow]] attack on an Adobe Open Type Manager [[Dynamic-link library|DLL]] included with [[Microsoft Windows]]. The DLL is run in [[protection ring|kernel mode]], so the attack could perform [[privilege escalation]] to bypass the [[sandbox (computer security)|sandbox]].&lt;ref&gt;{{Cite web|title = A Look at the Open Type Font Manager Vulnerability from the HackingTeam Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-the-open-type-font-manager-vulnerability-from-the-hacking-team-leak/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29|accessdate = 2015-07-08|first = Jack|last = Tang}}&lt;/ref&gt;<br /> <br /> Also revealed in leaked data was HackingTeam employees' use of weak passwords, including 'P4ssword', 'wolverine', and 'universo'.&lt;ref&gt;{{Cite web|title = HackingTeam used shockingly bad passwords|url = http://www.zdnet.com/article/no-wonder-hacking-team-got-hacked/|accessdate = 2015-07-06|first = Zack|last = Whittaker}}&lt;/ref&gt;<br /> <br /> After a few hours without response from HackingTeam, member Christian Pozzi tweeted the company was working closely with police and &quot;''what the attackers are claiming regarding our company is not true.''&quot;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964180042190848|accessdate = 2015-07-06}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964660705234944|accessdate = 2015-07-06}}&lt;/ref&gt; He also claimed the leaked archive &quot;contains a virus&quot; and that it constituted &quot;false info&quot;.&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617962663188926465|accessdate = 2015-07-06}}&lt;/ref&gt; Shortly after these tweets, Pozzi's Twitter account itself was apparently compromised.&lt;ref&gt;{{Cite web|title=Christian Pozzi on Twitter: &quot;Uh Oh - my twitter account was also hacked.&quot; |url=https://twitter.com/christian_pozzi/status/617977753250496512 |date=2015-07-06 |accessdate=2015-07-06 |deadurl=yes |archiveurl=https://web.archive.org/web/20150706084837/https://twitter.com/christian_pozzi/status/617977753250496512 |archivedate=July 6, 2015 }}&lt;/ref&gt;<br /> <br /> Responsibility for this attack was claimed by the hacker known as &quot;Phineas Fisher&quot; (or Phisher) on Twitter.&lt;ref&gt;{{cite tweet | user=gammagrouppr | author=Phineas Fisher | number=617937092497178624 | title=gamma and HT down, a few more to go :) | date=6 July 2015}}&lt;/ref&gt; Phineas has previously attacked spyware firm [[Gamma International]], who produce malware, such as [[FinFisher]], for governments and corporations.&lt;ref&gt;{{Cite web|title = HackingTeam: We won't 'shrivel up and go away' after cyberattack|url = http://www.zdnet.com/article/hacking-team-cyberattack-aftermath-interview/|accessdate = 2015-07-06|first = Charlie|last = Osbourne}}&lt;/ref&gt; In 2016, Phineas published details of the attack, in Spanish and English, as a &quot;how-to&quot; for others, and explained the motivations behind the attack.&lt;ref&gt;{{Cite web|url=http://arstechnica.com/security/2016/04/how-hacking-team-got-hacked-phineas-phisher/|title=How HackingTeam got hacked|website=Ars Technica|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> The internal documents revealed details of HackingTeam's contracts with repressive governments.&lt;ref&gt;{{Cite web|url=https://theintercept.com/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/|title=A Detailed Look at HackingTeam’s Emails About Its Repressive Clients|website=The Intercept|access-date=2016-05-15}}&lt;/ref&gt; In 2016, the Italian government again revoked the company’s license to sell spyware outside of Europe without special permission.&lt;ref name=&quot;:0&quot;&gt;{{Cite web|url=https://nakedsecurity.sophos.com/2016/04/08/hacking-team-loses-global-license-to-sell-spyware/|title=HackingTeam loses global license to sell spyware|last=Zorabedian|first=John|date=2016-04-08|website=Naked Security|access-date=2016-05-15}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://www.privacyinternational.org/node/826|title=HackingTeam’s Global License Revoked by Italian Export Authorities {{!}} Privacy International|website=www.privacyinternational.org|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> ===Others===<br /> {{refimprove section|date=April 2016}}<br /> * [[Vupen]] – 0-day exploit provider linked to HackingTeam&lt;ref&gt;[https://tsyrklevich.net/2015/07/22/hacking-team-0day-market/ HackingTeam: a zero-day market case study], Vlad Tsyrklevich's blog&lt;/ref&gt;<br /> * ''[[Mamfakinch]]'' – a citizen media organization targeted with malware allegedly developed by HackingTeam&lt;ref&gt;Perlroth, Nicole (10 October 2012). [http://bits.blogs.nytimes.com/2012/10/10/ahead-of-spyware-conference-more-evidence-of-abuse/?_r=0 Ahead of Spyware Conference, More Evidence of Abuse]. ''New York Times'' (Bits).&lt;/ref&gt;<br /> <br /> == Customer List ==<br /> HackingTeam's clientele include not just governments, but also corporate clients such as [[Barclay's]] Bank and [[British Telecom]] (BT) of the [[United Kingdom]], as well as [[Deutsche Bank]] of [[Germany]].&lt;ref name=spies/&gt;<br /> <br /> A full list of HackingTeam's customers were leaked in the 2015 breach. Disclosed documents show HackingTeam had 70 current customers, mostly military, police, federal and provincial governments. The total company revenues disclosed exceeded 40 million [[Euro]]s.&lt;ref&gt;{{cite web |author=Kopstein, Justin |title= Here Are All the Sketchy Government Agencies Buying HackingTeam's Spy Tech |url=http://motherboard.vice.com/read/here-are-all-the-sketchy-government-agencies-buying-hacking-teams-spy-tech |publisher=Vice Magazine |date=6 July 2015<br /> }}&lt;/ref&gt;&lt;ref&gt;{{cite web |author=Weissman, Cale Guthrie |title=Hacked security company's documents show a laundry list of questionable clients |url=http://www.businessinsider.com/hacked-security-companys-document-2015-7 |date=6 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |author=Ragan, Steve |title=In Pictures: HackingTeam's hack curated |url=http://www.cso.com.au/slideshow/579158/pictures-hacking-team-hack-curated/?image=9 |publisher=CSO Online (Australia)}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=HackingTeam hacked: firm sold spying tools to repressive regimes, documents claim |url=http://www.theguardian.com/technology/2015/jul/06/hacking-team-hacked-firm-sold-spying-tools-to-repressive-regimes-documents-claim |author=Hern, Alex |publisher=''The Guardian'' |date=6 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=HackingTeam responds to data breach, issues public threats and denials |url=http://www.csoonline.com/article/2944333/data-breach/hacking-team-responds-to-data-breach-issues-public-threats-and-denials.html |author=Ragan, Steve |publisher=''CSO Online'' |date=6 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=A whole bunch of downed government surveillance programs are about to go back online |url=http://www.businessinsider.com/hacking-team-promises-customers-they-can-resume-surveillance-operations-soon-2015-7 |author=Stevenson, Alastair |publisher=''Business Insider'' |date=14 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;<br /> <br /> {| class=&quot;wikitable sortable&quot;<br /> |-<br /> ! Customer<br /> ! Country<br /> ! Area<br /> ! Agency<br /> ! Year First Sale<br /> ! Annual Maintenance Fees<br /> ! Total Client Revenues<br /> |-<br /> | [[Polizia Postale e delle Comunicazioni]]&lt;ref&gt;Jone Pierantonio. [http://it.ibtimes.com/cyber-space/ecco-chi-ha-bucato-hacking-team-1408915 &quot;Ecco chi ha bucato HackingTeam&quot;]. ''International Business Times''. Retrieved on 2 August 2015.&lt;/ref&gt;||Italy||Europe||LEA||2004||€100,000||€808,833<br /> |-<br /> | [[Centro Nacional de Inteligencia]]&lt;ref&gt;Ediciones El País (8 July 2015). [http://internacional.elpais.com/internacional/2015/07/08/actualidad/1436343710_282978.html &quot;HackingTeam: “Ofrecemos tecnología ofensiva para la Policía”&quot;]. ''EL PAÍS''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Spain]]||Europe||Intelligence||2006||€52,000||€538,000<br /> |-<br /> | [[Infocomm Development Authority of Singapore]]||[[Singapore]]||APAC||Intelligence||2008||€89,000||€1,209,967<br /> |-<br /> | Information Office||[[Hungary]]||Europe||Intelligence||2008||€41,000||€885,000<br /> |-<br /> | CSDN||[[Morocco]]||MEA||Intelligence||2009||€140,000||€1,936,050<br /> |-<br /> | UPDF (Uganda Peoples Defense Force), ISO (Internal Security Organization), Office of the President||[[Uganda]]||Africa||Intelligence||2015||€831,000||€52,197,100<br /> |-<br /> | Italy - DA - Rental||Italy||Europe||Other||2009||€50,000||€628,250<br /> |-<br /> | [[Malaysian Anti-Corruption Commission]]||[[Malaysia]]||APAC||Intelligence||2009||€77,000||€789,123<br /> |-<br /> | PCM||Italy||Europe||Intelligence||2009||€90,000||€764,297<br /> |-<br /> | SSNS - Ungheria||Hungary||Europe||Intelligence||2009||€64,000||€1,011,000<br /> |-<br /> | CC - Italy||Italy||Europe||LEA||2010||€50,000||€497,349<br /> |-<br /> | [[Al Mukhabarat Al A'amah]]||[[Saudi Arabia]]||MEA||Intelligence||2010||€45,000||€600,000<br /> |-<br /> | IR Authorities (Condor)||[[Luxembourg]]||Europe||Other||2010||€45,000||€446,000<br /> |-<br /> | La Dependencia y/o CISEN&lt;ref&gt;[http://fusion.net/story/163872/the-hacking-team-leak-shows-mexico-was-the-top-client-but-why/ &quot;The HackingTeam leak shows Mexico was its top client, but why?&quot;]. ''Fusion''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Mexico]]||LATAM||Intelligence||2010||€130,000||€1,390,000<br /> |-<br /> | UZC&lt;ref name=fortune/&gt; ||[[Czech Republic]] ||Europe||LEA||2010||€55,000||€689,779<br /> |-<br /> | Egypt - MOD&lt;ref name=fortune/&gt;||[[Egypt]]||MEA||Other||2011||€70,000||€598,000<br /> |-<br /> | [[Federal Bureau of Investigation]]&lt;ref name=fbidea/&gt;||USA||North America||LEA||2011||€100,000||€697,710<br /> |-<br /> | Oman - Intelligence||[[Oman]]||MEA||Intelligence||2011||€30,000||€500,000<br /> |-<br /> | President Security&lt;ref&gt;[http://motherboard.vice.com/read/hacking-teams-equipment-got-stolen-in-panama &quot;HackingTeam's Equipment Got Stolen in Panama&quot;]. ''Motherboard''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref&gt;Molina, Thabata (13 August 2015). ''[http://panampost.com/thabata-molina/2015/08/13/panama-to-investigate-martinelli-in-hacking-team-spying-scandal/ &quot;Panama to Investigate Martinelli in HackingTeam Spying Scandal&quot;]''. ''Panama Post''. Retrieved 15 August 2015.&lt;/ref&gt;<br /> ||[[Panama]]||LATAM||Intelligence||2011||€110,000||€750,000<br /> |-<br /> | [[Turkish National Police]]||[[Turkey]]||Europe||LEA||2011||€45,000||€440,000<br /> |-<br /> | UAE - MOI||[[United Arab Emirates|UAE]]||MEA||LEA||2011||€90,000||€634,500<br /> |-<br /> | [[National Security Service (Uzbekistan)|National Security Service]]&lt;ref name=fortune&gt;[http://fortune.com/2015/07/16/governments-used-spy-software/ &quot;Leaked emails from security firm HackingTeam show government use - Fortune&quot;]. ''Fortune''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Uzbekistan]]||Europe||Intelligence||2011||€50,000||€917,038<br /> |-<br /> | [[United States Department of Defense|Department of Defense]]&lt;ref name=fbidea/&gt;||USA||North America||LEA||2011||||€190,000<br /> |-<br /> | Bayelsa State Government||[[Nigeria]]||MEA||Intelligence||2012||€75,000||€450,000<br /> |-<br /> | Estado del Mexico||Mexico||LATAM||LEA||2012||€120,000||€783,000<br /> |-<br /> | Information Network Security Agency||[[Ethiopia]]||MEA||Intelligence||2012||€80,000||€750,000<br /> |-<br /> | State security (Falcon)||Luxemburg||Europe||Other||2012||€38,000||€316,000<br /> |-<br /> | Italy - DA - Rental||Italy||Europe||Other||2012||€60,000||€496,000<br /> |-<br /> | MAL - MI||Malaysia||APAC||Intelligence||2012||€77,000||€552,000<br /> |-<br /> | [[Direction générale de la surveillance du territoire]]||Morocco||MEA||Intelligence||2012||€160,000||€1,237,500<br /> |-<br /> | [[National Intelligence and Security Service]]&lt;ref name=fortune/&gt;||[[Sudan]]||MEA||Intelligence||2012||€76,000||€960,000<br /> |-<br /> | Russia - KVANT&lt;ref name=kvant&gt;[http://arstechnica.com/tech-policy/2015/07/hacking-teams-surveillance-software-sold-to-kgb-successor/ &quot;HackingTeam apparently violated EU rules in sale of spyware to Russian agency&quot;]. ''Ars Technica''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Russia]]||Europe||Intelligence||2012||€72,000||€451,017<br /> |-<br /> | Saudi - GID||Saudi||MEA||LEA||2012||€114,000||€1,201,000<br /> |-<br /> | SIS of [[National Security Committee of the Republic of Kazakhstan]]&lt;ref name=fortune/&gt;||[[Kazakhstan]]||Europe||Intelligence||2012||€140,000||€1,012,500<br /> |-<br /> | The 5163 Army Division (Alias of South Korean National Intelligence Service)&lt;ref name=fortune/&gt;&lt;ref name=torbrowser&gt;[https://firstlook.org/theintercept/2015/07/16/hackingteam-attacked-tor-browser/ &quot;How HackingTeam Created Spyware that Allowed the FBI To Monitor Tor Browser&quot;]. ''The Intercept''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref name=wswskorea&gt;McGrath, Ben (25 July 2015). &quot;''[https://www.wsws.org/en/articles/2015/07/25/kore-j25.html Further revelations in South Korean hacking scandal]''&quot;. ''World Socialist Web Site''. Retrieved 26 July 2015.&lt;/ref&gt;||[[South Korea|S. Korea]]||APAC||Other||2012||€67,000||€686,400<br /> |-<br /> | UAE - Intelligence||[[United Arab Emirates|UAE]]||MEA||Other||2012||€150,000||€1,200,000<br /> |-<br /> | [[Drug Enforcement Administration]]&lt;ref name=fbidea&gt;[https://firstlook.org/theintercept/2015/07/06/hacking-team-spyware-fbi/ &quot;Leaked Documents Show FBI, DEA and U.S. Army Buying Italian Spyware&quot;]. ''The Intercept''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref name=dea&gt;[http://motherboard.vice.com/read/the-dea-just-cancelled-its-contract-with-hacking-team &quot;The DEA Just Cancelled Its Contract With HackingTeam&quot;]. ''Motherboard''. Retrieved on 2 August 2015.&lt;/ref&gt;||USA||North America||Other||2012||€70,000||€567,984<br /> |-<br /> | [[Central Anticorruption Bureau]]||[[Poland]]||Europe||LEA||2012||€35,000||€249,200<br /> |-<br /> | MOD Saudi||Saudi||MEA||Other||2013||€220,000||€1,108,687<br /> |-<br /> | PMO||Malaysia||APAC||Intelligence||2013||€64,500||€520,000<br /> |-<br /> | Estado de Qeretaro||Mexico||LATAM||LEA||2013||€48,000||€234,500<br /> |-<br /> | National Security Agency&lt;ref name=fortune/&gt;||[[Azerbaijan]]||Europe||Intelligence||2013||€32,000||€349,000<br /> |-<br /> | Gobierno de Puebla||Mexico||LATAM||Other||2013||€64,000||€428,835<br /> |-<br /> | Gobierno de Campeche||Mexico||LATAM||Other||2013||€78,000||€386,296<br /> |-<br /> | AC Mongolia||[[Mongolia]]||APAC||Intelligence||2013||€100,000||€799,000<br /> |-<br /> | Dept. of Correction Thai Police ||[[Thailand]]||APAC||LEA||2013||€52,000||€286,482<br /> |-<br /> | [[National Intelligence Secretariat (Ecuador)|National Intelligence Secretariat]]&lt;ref&gt;http://panampost.com/rebeca-morla/2015/07/13/ecuadorian-websites-report-on-hacking-team-get-taken-down/&lt;br /&gt;http://panampost.com/panam-staff/2015/08/10/hacking-team-helped-ecuador-spy-on-opposition-activist/&lt;br /&gt;http://bigstory.ap.org/article/6f41d49888174b45857d34511fda1caf/apnewsbreak-email-leak-suggests-ecuador-spied-opposition&lt;/ref&gt;<br /> ||[[Ecuador]]||LATAM||LEA||2013||€75,000||€535,000<br /> |-<br /> | Police Intelligence Directorate&lt;ref name=dipol_telesur&gt;Podour, Justin (23 July 2015). [http://www.telesurtv.net/opinion/HackedTeam-y-Colombia-Como-la-vigilancia-ayuda-a-un-Estado-violento-20150723-0062.html #HackedTeam y Colombia: Cómo la vigilancia ayuda a un Estado violento]. ''Telesur''. Retrieved 26 July 2015.&lt;/ref&gt;||[[Colombia]]||LATAM||LEA||2013||€35,000||€335,000<br /> |-<br /> | [[Guardia di Finanza]]||Italy||Europe||LEA||2013||€80,000||€400,000<br /> |-<br /> | Intelligence&lt;ref name=cyprus&gt;In Cyprus (11 July 2015).[http://in-cyprus.com/intelligence-service-chief-steps-down/ Intelligence Service chief steps down]. Retrieved 26 July 2015.&lt;/ref&gt;||[[Cyprus]]||Europe||LEA||2013||€40,000||€375,625<br /> |-<br /> | MidWorld&lt;ref name=ifex&gt;Bahrain Center for Human Rights (15 July 2015). &quot;''[https://www.ifex.org/bahrain/2015/07/15/bahrain_hacking_team HackingTeam's troubling connections to Bahrain]''&quot; IFEX. Retrieved 26 July 2015.&lt;/ref&gt;||[[Bahrain]]||MEA||Intelligence||2013||||€210,000<br /> |-<br /> | Mexico - PEMEX||Mexico ||LATAM||LEA ||2013||||€321,120<br /> |-<br /> | Malysia K||Malaysia||APAC||LEA||2013||||€0<br /> |-<br /> | Honduras||[[Honduras]]||LATAM||LEA||2014||||€355,000<br /> |-<br /> | Mex Taumalipas||Mexico||LATAM||||2014||||€322,900<br /> |-<br /> | Secretaría de Planeación y Finanzas||Mexico||LATAM||LEA||2014||€91,000||€371,035<br /> |-<br /> | AREA||Italia||Europe||||2014||||€430,000<br /> |-<br /> | Mexico Yucatán||Mexico||LATAM||LEA||2014||||€401,788<br /> |-<br /> | Mexico Durango||Mexico||LATAM||LEA||2014||||€421,397<br /> |-<br /> | [[Investigations Police of Chile]]||[[Chile]]||LATAM||LEA||2014||||€2,289,155<br /> |-<br /> | Jalisco Mexico||Mexico||LATAM||LEA||2014||||€748,003<br /> |-<br /> | [[Royal Thai Army]]||Thailand||APAC||LEA||2014||||€360,000<br /> |-<br /> | Vietnam GD5||[[Vietnam]]||APAC||||2014||||€281,170<br /> |-<br /> | [[Kantonspolizei Zürich]]||Switzerland||Europe||LEA||2014||||€486,500<br /> |-<br /> | Vietnam GD1||Vietnam||APAC||LEA||2015||||€543,810<br /> |-<br /> | Egypt TRD GNSE||Egypt||MEA||LEA||2015||||€137,500<br /> |-<br /> | [[Lebanese Armed Forces|Lebanese Army]]||[[Lebanon]]||MEA||LEA||2015||||<br /> |-<br /> | [[Federal Police Department]]||Brazil||LATAM||LEA||2015||||<br /> |-<br /> | [[SHISH|State Informative Service]]&lt;ref&gt;Lexime (14 July 2015). &quot;''[http://www.balkanweb.com/site/burime-te-sigurta-shish-perdor-programet-pergjuese-qe-prej-2015-hacking-teams-nuk-e-kemi-nen-kontroll-sistemin/ Burime të sigurta, SHISH përdor programet përgjuese që prej 2015. HackingTeams: Nuk e kemi nën kontroll sistemin!]''&quot; (video). BalkanWeb. Retrieved 27 July 2015.&lt;/ref&gt;||[[Albania]]||Europe||SHIK||2015||||<br /> |}<br /> <br /> == See also ==<br /> * [[FinFisher]]<br /> * [[MiniPanzer and MegaPanzer]]<br /> <br /> ==References==<br /> {{reflist|30em}}<br /> <br /> == External links ==<br /> * {{Official website| http://www.hackingteam.it/}}<br /> * [https://citizenlab.org/tag/hacking-team/ HackingTeam Archives] - investigative reports published by The [[Citizen Lab]]<br /> * [https://wikileaks.org/hackingteam/emails WikiLeaks: ''The Hackingteam Archives''] - searchable database of 1 million internal emails<br /> * [https://wikileaks.org/spyfiles/list/company-name/hackingteam.html HackingTeam presentations] in the [[WikiLeaks]] &quot;''Spy Files''&quot;<br /> {{Hacking in the 2010s}}<br /> <br /> [[Category:Computer security software]]<br /> [[Category:Spyware]]<br /> [[Category:Surveillance]]<br /> [[Category:Trojan horses]]<br /> [[Category:Espionage techniques]]<br /> [[Category:Espionage devices]]<br /> [[Category:Malware toolkits]]<br /> [[Category:Computer access control]]<br /> [[Category:Cyberwarfare]]<br /> [[Category:Espionage scandals and incidents]]<br /> [[Category:Companies based in Milan]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=HackingTeam&diff=177174999 HackingTeam 2016-06-18T17:29:08Z <p>Dsprc: /* top */ do not munge the alt text</p> <hr /> <div>{{Infobox company<br /> | name = HackingTeam<br /> | logo = Hacking Team logo.png<br /> | logo_size = <br /> | logo_alt = The words Hacking Team enclosed with in reversed square brackets &lt;nowiki&gt;][&lt;/nowiki&gt;<br /> | logo_caption = Company logo<br /> | logo_padding = <br /> | image = <br /> | image_size = <br /> | image_alt = <br /> | image_caption = <br /> | type = <br /> | industry = [[Information technology]]<br /> | founded = 2003<br /> | founders = David Vincenzetti, Valeriano Bedeschi<br /> | hq_location = <br /> | hq_location_city = [[Milan]]<br /> | hq_location_country = [[Italy]]<br /> | area_served = &lt;!-- or: | areas_served = --&gt;<br /> | key_people = Alberto Ornaghi (ALoR), Marco Valleri (NaGA)<br /> | products = {{unbulleted list|Software}}<br /> | brands = <br /> | services = <br /> | owner = &lt;!-- or: | owners = --&gt;<br /> | website = {{URL|http://www.hackingteam.it/}}<br /> }}<br /> '''HackingTeam''' is a [[Milan]]-based [[information technology]] company that sells offensive intrusion and [[surveillance]] capabilities to governments, law enforcement agencies and corporations.&lt;ref name=spies&gt;{{cite web |title=The spies behind your screen |url=http://www.telegraph.co.uk/technology/8899353/The-spies-behind-your-screen.html |author=Batey, Angus |date=24 November 2011 |publisher=''The Telegraph'' |accessdate=26 July 2015}}&lt;/ref&gt; Its &quot;''Remote Control Systems''&quot; enable governments and corporations to monitor the communications of internet users, decipher their [[cryptography|encrypted]] files and emails, record [[Skype]] and other [[Voice over IP]] communications, and remotely activate microphones and camera on target computers.&lt;ref&gt;{{cite web|title=Enemies of the Internet: HackingTeam|url=http://surveillance.rsf.org/en/hacking-team/|work=[[Reporters Without Borders]]|accessdate=24 April 2014}}&lt;/ref&gt; The company has been criticized for providing these capabilities to governments with poor [[human rights]] records.&lt;ref&gt;{{cite web | last3 = Marquis-Boire | first3 = Morgan | last1 = Marczak | first1 = Bill | last2 = Gaurnieri | first2 = Claudio | last4 = Scott-Railton | first4 = John | title = Mapping HackingTeam's &quot;Untraceable&quot; Spyware | url = https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ | date = February 17, 2014}}&lt;/ref&gt; HackingTeam states that they have the ability to disable their software if it is used unethically.&lt;ref&gt;{{cite news|url=http://www.newyorker.com/online/blogs/elements/2014/03/hacked-by-ones-own-government.html|title=Hackers Without Borders|last=Kopstein|first=Joshua|work=[[The New Yorker]]|date=10 March 2014|accessdate=24 April 2014}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url = https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/|title = Police Story: HackingTeam’s Government Surveillance Malware|date = June 24, 2014|accessdate = August 3, 2014|website = Citizen Lab|publisher = University of Toronto|last1 = Marquis-Boire|first1 = Morgan | last2 = Gaurnieri | first2 = Claudio | first3 = John | last3 = Scott-Railton | first4 = Katie | last4 = Kleemola }}&lt;/ref&gt; The Italian government has restricted their license to do business with countries outside Europe.&lt;ref name=&quot;:0&quot; /&gt;<br /> <br /> HackingTeam employs around 40 people in its Italian office, and has subsidiary branches in [[Annapolis]], [[Washington, D.C.]] and [[Singapore]].&lt;ref name=know&gt;''[[Human Rights Watch]]'' (25 March 2014). ''&quot;[https://www.hrw.org/report/2014/03/25/they-know-everything-we-do/telecom-and-internet-surveillance-ethiopia They Know Everything We Do]&quot;''. Retrieved 1 August 2015.&lt;/ref&gt; Its products are in use in dozens of countries across six continents.&lt;ref name=Jeffries&gt;{{cite web|last=Jeffries|first=Adrianne|title=Meet HackingTeam, the company that helps the police hack you|url=http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers|accessdate=21 April 2014|work=[[The Verge]]|date=13 September 2013}}&lt;/ref&gt;<br /> <br /> ==History==<br /> HackingTeam was started by two Italian programmers: Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri (under the aliases of ALoR, and NaGA respectively), created a set of tools that could be used to monitor and remotely manipulate target computers. The program, called [[Ettercap (software)|Ettercap]], was embraced both by [[Hacker (term)|hackers]] looking to spy on people, and by companies that hoped to test the security of their own networks.<br /> <br /> The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their [[Skype]] calls, the police contacted Ornaghi and Valleri and asked them to help modify the program. HackingTeam was born, and became &quot;the first sellers of commercial hacking software to the police.&quot;&lt;ref name=Jeffries/&gt;<br /> <br /> According to former employee Alberto Pelliccione, the company began as security services provider, offering [[penetration testing]], auditing and other defensive capabilities to clients.&lt;ref name=war&gt;Farivar, Cyrus (20 July 2015) [http://arstechnica.com/security/2015/07/italian-prosecutors-investigate-former-hacking-team-employees-for-role-in-hack/ HackingTeam goes to war against former employees, suspects some helped hackers]. ''Ars Technica''. Retrieved 26 July 2015.&lt;/ref&gt; Pelliccione states that as malware and other offensive capabilities were developed and accounted for a larger percentage of revenues, the organization pivoted in a more offensive direction and became increasingly compartmentalized. Pelliccione claims fellow employees working on aspects of the same platform - for example, Android exploits and payloads - would not communicate with one another, possibly leading to tensions and strife within the organization.&lt;ref name=war/&gt;<br /> <br /> In February 2014, a report from [[Citizen Lab]] identified the organisation to be using hosting services from [[Linode]], [[Telecom Italia]], [[Rackspace]], [[NOC4Hosts]] and notorious [[bullet proof hosting]] company [[Santrex]].&lt;ref&gt;{{cite news|title=HackingTeam’s US Nexus|url=https://citizenlab.org/2014/02/hacking-teams-us-nexus/|accessdate=2 August 2015|date=28 February 2014}}&lt;/ref&gt;<br /> <br /> On July 5, 2015 the company suffered a major data breach of customer data, software code, internal documents and emails. - ''See: [[#2015 data breach|§ 2015 data breach]]''<br /> <br /> ==Products and capabilities==<br /> HackingTeam enables clients to perform remote monitoring functions against citizens via their [[Remote administration tool|RCS (Remote Control Systems)]], including their '''Da Vinci''' and '''Galileo''' platforms:&lt;ref name=spies/&gt;<br /> <br /> *Covert collection of emails, text message, phone call history and address books<br /> *[[Keystroke logging]]<br /> *Uncover search history data and take screenshots<br /> *Record audio from phone calls<br /> :*Capture audio and video stream from device memory to bypass [[cryptography]] of [[Skype]] sessions&lt;ref&gt;{{cite web | title=Mideast Uses Western Tools to Battle the Skype Rebellion |url=http://www.wsj.com/articles/SB10001424052702304520804576345970862420038 |author1=Stecklow, Steve |author2=Sonne, Paul |author3=Bradley, Matt |date=1 June 2011 |publisher=''Wall Street Journal'' |accessdate=26 July 2015}}&lt;/ref&gt;<br /> :*Use microphones on device to collect ambient background noise and conversations<br /> *Activate phone or computer cameras<br /> *Hijack telephone GPS systems to monitor target's location<br /> *Infect target computer's [[UEFI]] [[BIOS]] [[firmware]] with a [[rootkit]]&lt;ref&gt;{{Cite web|first=Philippe |last=Lin |url=http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-uses-uefi-bios-rootkit-to-keep-rcs-9-agent-in-target-systems/ |title=HackingTeam Uses UEFI BIOS Rootkit to Keep RCS 9 Agent in Target Systems |work=TrendLabs Security Intelligence Blog |publisher=[[Trend Micro]] |date=July 13, 2015 |accessdate=July 26, 2015}}&lt;/ref&gt;<br /> *Extract WiFi passwords&lt;ref name=skiddies&gt;[http://arstechnica.com/security/2015/07/advanced-spyware-for-android-now-available-to-script-kiddies-everywhere/ &quot;Advanced spyware for Android now available to script kiddies everywhere&quot;]. ''Ars Technica''. Retrieved on 2 August 2015.&lt;/ref&gt;<br /> *Exfiltrate [[Bitcoin]] and other cryptocurrency wallet files to collect data on local accounts, contacts and transaction histories.&lt;ref name=coin&gt;Farivar, Cyrus (14 July 2015). &quot;''[http://arstechnica.com/security/2015/07/hacking-team-broke-bitcoin-secrecy-by-targeting-crucial-wallet-file/ HackingTeam broke Bitcoin secrecy by targeting crucial wallet file]''&quot;. ''Ars Technica''. Retrieved 26 July 2015.&lt;/ref&gt;<br /> <br /> HackingTeam uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.&lt;ref&gt;{{cite news|last1=Schneier|first1=Bruce|title=More on HackingTeam's Government Spying Software|url=https://www.schneier.com/blog/archives/2014/06/more_on_hacking.html}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=http://www.ibtimes.co.uk/hacking-team-tools-allow-governments-take-full-control-your-smartphone-1453987|title=HackingTeam Tools Allow Governments To Take Full Control of Your Smartphone|date=2014-06-24|website=International Business Times UK|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> The malware has payloads for [[Android (operating system)|Android]],&lt;ref name=skiddies/&gt; [[BlackBerry]], Apple [[iOS]], [[Linux]], [[Mac OS X]], [[Symbian]], as well as [[Microsoft Windows]], [[Windows Mobile]] and [[Windows Phone]] class of [[operating system]]s.&lt;ref name=C3&gt;Guarnieri, Claudio; Marquis-Boire, Morgan (13 January 2014). ''[https://media.ccc.de/browse/congress/2013/30C3_-_5439_-_en_-_saal_1_-_201312292105_-_to_protect_and_infect_-_claudio_guarnieri_-_morgan_marquis-boire.html &quot;To Protect And Infect: The militarization of the Internet&quot;]''. At the 30th [[Chaos Communications Congress]] – &quot;30C3&quot;. (Video or Audio). [[Chaos Computer Club]]. Retrieved on 15 August 2015.&lt;/ref&gt;<br /> <br /> RCS is a management platform that allows operators to remotely deploy exploits and payloads against targeted systems, remotely manage devices once compromised, and exfiltrate data for remote analysis.<br /> <br /> == Controversies ==<br /> <br /> === Use by repressive governments ===<br /> HackingTeam has been criticized for selling its products and services to governments with poor human rights records, including [[Sudan]], [[Bahrain]], and [[Saudi Arabia]].&lt;ref name=repress/&gt;<br /> <br /> In June 2014, a United Nations panel monitoring the implementation of sanctions on Sudan requested information from HackingTeam about their alleged sales of software to the country in contravention of United Nations weapons export bans to Sudan. Documents leaked in the 2015 data breach of HackingTeam revealed the organization sold Sudanese National Intelligence and Security Service access to their &quot;Remote Control System&quot; software in 2012 for 960,000 Euros.&lt;ref name=repress/&gt;&lt;ref&gt;{{Cite web|url=https://theintercept.com/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/|title=A Detailed Look at HackingTeam’s Emails About Its Repressive Clients|last=Hay Newman|first=Lily|website=The Intercept|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> In response to the United Nations panel, the company responded in January 2015 that they were not currently selling to Sudan. In a follow-up exchange, HackingTeam asserted that their product was not controlled as a weapon, and so the request was beyond the scope of the panel. There was no need for them to disclose previous sales, which they considered confidential business information.&lt;ref name=repress&gt;{{Cite web |title=A Detailed Look at HackingTeam’s Emails About Its Repressive Clients |url=https://firstlook.org/theintercept/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/ |accessdate=7 July 2015 |first1=Cora |last1=Currier |first2=Morgan |last2=Marquis-Boire}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://www.eff.org/deeplinks/2015/07/hacking-team-leaks-reveal-spyware-industrys-growth|title=HackingTeam Leaks Reveal Spyware Industry's Growth, Negligence of Human Rights|last=Myers West|first=Sarah|date=2015-07-08|website=Electronic Frontier Foundation|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> The U.N. disagreed. &quot;The view of the panel is that as such software is ideally suited to support military electronic intelligence (ELINT) operations it may potentially fall under the category of ‘military … equipment’ or ‘assistance’ related to prohibited items,&quot; the secretary wrote in March. &quot;Thus its potential use in targeting any of the belligerents in the Darfur conflict is of interest to the Panel.&quot;&lt;ref name=repress/&gt;&lt;ref&gt;{{Cite web|url=http://gizmodo.com/hacking-teams-lame-excuse-for-selling-digital-weapons-t-1716375503|title=HackingTeam's Lame Excuse for Selling Digital Weapons to Sudan|last=Knibbs|first=Kate|date=2015-07-08|website=Gizmodo|language=en-US|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> In the fall of 2014, the Italian government abruptly froze all of HackingTeam's exports, citing human rights concerns. After lobbying Italian officials, the company temporarily won back the right to sell its products abroad.&lt;ref name=repress/&gt;<br /> <br /> === 2015 data breach ===<br /> On July 5, 2015, the [[Twitter]] account of the company was compromised by an unknown individual who published an announcement of a [[data breach]] against HackingTeam's computer systems. The initial message read, &quot;''Since we have nothing to hide, we're publishing all our e-mails, files, and source code …''&quot; and provided links to over 400 [[gigabyte]]s of data, including alleged internal e-mails, invoices, and [[source code]]; which were leaked via [[BitTorrent]] and [[Mega (service)|Mega]].&lt;ref&gt;{{Wayback|url=https://twitter.com/hackingteam|title=Hacked Team (@hackingteam)|date=20150706010312}}&lt;/ref&gt; An announcement of the data breach, including a link to the bittorrent seed, was retweeted by [[WikiLeaks]] and by many others through social media.&lt;ref&gt;{{Twitter status|wikileaks|617865712611233792|Inside malware makers &quot;HackingTeam&quot;: hundreds of gigabytes of e-mails, files, and source code|[[WikiLeaks]]|July 6, 2015|July 6, 2015}}&lt;/ref&gt;&lt;ref name=&quot;ibtimes.co.uk&quot;&gt;{{Cite web|url=http://www.ibtimes.co.uk/hacking-team-hacked-spy-tools-sold-oppressive-regimes-sudan-bahrain-kazakhstan-1509460|title=HackingTeam hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan|date=2015-06-06|publisher=International Business Times|accessdate=2015-07-06}}&lt;/ref&gt;<br /> <br /> The material was voluminous and early analysis appeared to reveal that HackingTeam had invoiced the [[Lebanese Army]]&lt;ref&gt;{{Twitter|url=https://twitter.com/SynAckPwn/status/617955067006578689}} {{dead link|date=July 2015}}&lt;/ref&gt; and [[Sudan]] and that spy tools were also sold to [[Bahrain]] and [[Kazakhstan]].&lt;ref name=&quot;ibtimes.co.uk&quot;/&gt; HackingTeam had previously claimed they had never done business with Sudan.&lt;ref&gt;{{Cite web|title = HackingTeam hacked, attackers claim 400GB in dumped data|url = http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html|accessdate = 2015-07-06|first = Steve|last = Ragan}}&lt;/ref&gt;<br /> <br /> The leaked data revealed a [[zero-day (computing)|zero-day]] cross-platform Flash exploit ([[Common Vulnerabilities and Exposures|CVE]] number: CVE-2015-5119).&lt;ref&gt;{{Cite web|title = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html|url = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html}}&lt;/ref&gt; The dump included a demo of this exploit by opening [[Calculator (computer program)|Calculator]] from a test webpage.&lt;ref&gt;{{Cite web|title = Zero-Day Flash Player Exploit Disclosed In 'HackingTeam' Data Dump|url = http://thehackernews.com/2015/07/flash-zero-day-vulnerability.html|accessdate = 2015-07-06|first = Swati|last = Khandelwal}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Unpatched Flash Player Flaw, More POCs Found in HackingTeam Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/|accessdate = 2015-07-08|first = Peter|last = Pi}}&lt;/ref&gt; Adobe [[software patch|patched]] the hole on July 8, 2015.&lt;ref&gt;{{Cite web|title = Adobe Security Bulletin|url = https://helpx.adobe.com/security/products/flash-player/apsb15-16.html|accessdate = 2015-07-11|last = Adobe Systems (corporate author)}}&lt;/ref&gt; Another vulnerability involving Adobe was revealed in the dumps, which took advantage of a [[buffer overflow]] attack on an Adobe Open Type Manager [[Dynamic-link library|DLL]] included with [[Microsoft Windows]]. The DLL is run in [[protection ring|kernel mode]], so the attack could perform [[privilege escalation]] to bypass the [[sandbox (computer security)|sandbox]].&lt;ref&gt;{{Cite web|title = A Look at the Open Type Font Manager Vulnerability from the HackingTeam Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-the-open-type-font-manager-vulnerability-from-the-hacking-team-leak/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29|accessdate = 2015-07-08|first = Jack|last = Tang}}&lt;/ref&gt;<br /> <br /> Also revealed in leaked data was HackingTeam employees' use of weak passwords, including 'P4ssword', 'wolverine', and 'universo'.&lt;ref&gt;{{Cite web|title = HackingTeam used shockingly bad passwords|url = http://www.zdnet.com/article/no-wonder-hacking-team-got-hacked/|accessdate = 2015-07-06|first = Zack|last = Whittaker}}&lt;/ref&gt;<br /> <br /> After a few hours without response from HackingTeam, member Christian Pozzi tweeted the company was working closely with police and &quot;''what the attackers are claiming regarding our company is not true.''&quot;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964180042190848|accessdate = 2015-07-06}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964660705234944|accessdate = 2015-07-06}}&lt;/ref&gt; He also claimed the leaked archive &quot;contains a virus&quot; and that it constituted &quot;false info&quot;.&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617962663188926465|accessdate = 2015-07-06}}&lt;/ref&gt; Shortly after these tweets, Pozzi's Twitter account itself was apparently compromised.&lt;ref&gt;{{Cite web|title=Christian Pozzi on Twitter: &quot;Uh Oh - my twitter account was also hacked.&quot; |url=https://twitter.com/christian_pozzi/status/617977753250496512 |date=2015-07-06 |accessdate=2015-07-06 |deadurl=yes |archiveurl=https://web.archive.org/web/20150706084837/https://twitter.com/christian_pozzi/status/617977753250496512 |archivedate=July 6, 2015 }}&lt;/ref&gt;<br /> <br /> Responsibility for this attack was claimed by the hacker known as &quot;Phineas Fisher&quot; (or Phisher) on Twitter.&lt;ref&gt;{{cite tweet | user=gammagrouppr | author=Phineas Fisher | number=617937092497178624 | title=gamma and HT down, a few more to go :) | date=6 July 2015}}&lt;/ref&gt; Phineas has previously attacked spyware firm [[Gamma International]], who produce malware, such as [[FinFisher]], for governments and corporations.&lt;ref&gt;{{Cite web|title = HackingTeam: We won't 'shrivel up and go away' after cyberattack|url = http://www.zdnet.com/article/hacking-team-cyberattack-aftermath-interview/|accessdate = 2015-07-06|first = Charlie|last = Osbourne}}&lt;/ref&gt; In 2016, Phineas published details of the attack, in Spanish and English, as a &quot;how-to&quot; for others, and explained the motivations behind the attack.&lt;ref&gt;{{Cite web|url=http://arstechnica.com/security/2016/04/how-hacking-team-got-hacked-phineas-phisher/|title=How HackingTeam got hacked|website=Ars Technica|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> The internal documents revealed details of HackingTeam's contracts with repressive governments.&lt;ref&gt;{{Cite web|url=https://theintercept.com/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/|title=A Detailed Look at HackingTeam’s Emails About Its Repressive Clients|website=The Intercept|access-date=2016-05-15}}&lt;/ref&gt; In 2016, the Italian government again revoked the company’s license to sell spyware outside of Europe without special permission.&lt;ref name=&quot;:0&quot;&gt;{{Cite web|url=https://nakedsecurity.sophos.com/2016/04/08/hacking-team-loses-global-license-to-sell-spyware/|title=HackingTeam loses global license to sell spyware|last=Zorabedian|first=John|date=2016-04-08|website=Naked Security|access-date=2016-05-15}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url=https://www.privacyinternational.org/node/826|title=HackingTeam’s Global License Revoked by Italian Export Authorities {{!}} Privacy International|website=www.privacyinternational.org|access-date=2016-05-15}}&lt;/ref&gt;<br /> <br /> ===Others===<br /> {{refimprove section|date=April 2016}}<br /> * [[Vupen]] – 0-day exploit provider linked to HackingTeam&lt;ref&gt;[https://tsyrklevich.net/2015/07/22/hacking-team-0day-market/ HackingTeam: a zero-day market case study], Vlad Tsyrklevich's blog&lt;/ref&gt;<br /> * ''[[Mamfakinch]]'' – a citizen media organization targeted with malware allegedly developed by HackingTeam&lt;ref&gt;Perlroth, Nicole (10 October 2012). [http://bits.blogs.nytimes.com/2012/10/10/ahead-of-spyware-conference-more-evidence-of-abuse/?_r=0 Ahead of Spyware Conference, More Evidence of Abuse]. ''New York Times'' (Bits).&lt;/ref&gt;<br /> <br /> == Customer List ==<br /> HackingTeam's clientele include not just governments, but also corporate clients such as [[Barclay's]] Bank and [[British Telecom]] (BT) of the [[United Kingdom]], as well as [[Deutsche Bank]] of [[Germany]].&lt;ref name=spies/&gt;<br /> <br /> A full list of HackingTeam's customers were leaked in the 2015 breach. Disclosed documents show HackingTeam had 70 current customers, mostly military, police, federal and provincial governments. The total company revenues disclosed exceeded 40 million [[Euro]]s.&lt;ref&gt;{{cite web |author=Kopstein, Justin |title= Here Are All the Sketchy Government Agencies Buying HackingTeam's Spy Tech |url=http://motherboard.vice.com/read/here-are-all-the-sketchy-government-agencies-buying-hacking-teams-spy-tech |publisher=Vice Magazine |date=6 July 2015<br /> }}&lt;/ref&gt;&lt;ref&gt;{{cite web |author=Weissman, Cale Guthrie |title=Hacked security company's documents show a laundry list of questionable clients |url=http://www.businessinsider.com/hacked-security-companys-document-2015-7 |date=6 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |author=Ragan, Steve |title=In Pictures: HackingTeam's hack curated |url=http://www.cso.com.au/slideshow/579158/pictures-hacking-team-hack-curated/?image=9 |publisher=CSO Online (Australia)}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=HackingTeam hacked: firm sold spying tools to repressive regimes, documents claim |url=http://www.theguardian.com/technology/2015/jul/06/hacking-team-hacked-firm-sold-spying-tools-to-repressive-regimes-documents-claim |author=Hern, Alex |publisher=''The Guardian'' |date=6 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=HackingTeam responds to data breach, issues public threats and denials |url=http://www.csoonline.com/article/2944333/data-breach/hacking-team-responds-to-data-breach-issues-public-threats-and-denials.html |author=Ragan, Steve |publisher=''CSO Online'' |date=6 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=A whole bunch of downed government surveillance programs are about to go back online |url=http://www.businessinsider.com/hacking-team-promises-customers-they-can-resume-surveillance-operations-soon-2015-7 |author=Stevenson, Alastair |publisher=''Business Insider'' |date=14 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;<br /> <br /> {| class=&quot;wikitable sortable&quot;<br /> |-<br /> ! Customer<br /> ! Country<br /> ! Area<br /> ! Agency<br /> ! Year First Sale<br /> ! Annual Maintenance Fees<br /> ! Total Client Revenues<br /> |-<br /> | [[Polizia Postale e delle Comunicazioni]]&lt;ref&gt;Jone Pierantonio. [http://it.ibtimes.com/cyber-space/ecco-chi-ha-bucato-hacking-team-1408915 &quot;Ecco chi ha bucato HackingTeam&quot;]. ''International Business Times''. Retrieved on 2 August 2015.&lt;/ref&gt;||Italy||Europe||LEA||2004||€100,000||€808,833<br /> |-<br /> | [[Centro Nacional de Inteligencia]]&lt;ref&gt;Ediciones El País (8 July 2015). [http://internacional.elpais.com/internacional/2015/07/08/actualidad/1436343710_282978.html &quot;HackingTeam: “Ofrecemos tecnología ofensiva para la Policía”&quot;]. ''EL PAÍS''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Spain]]||Europe||Intelligence||2006||€52,000||€538,000<br /> |-<br /> | [[Infocomm Development Authority of Singapore]]||[[Singapore]]||APAC||Intelligence||2008||€89,000||€1,209,967<br /> |-<br /> | Information Office||[[Hungary]]||Europe||Intelligence||2008||€41,000||€885,000<br /> |-<br /> | CSDN||[[Morocco]]||MEA||Intelligence||2009||€140,000||€1,936,050<br /> |-<br /> | UPDF (Uganda Peoples Defense Force), ISO (Internal Security Organization), Office of the President||[[Uganda]]||Africa||Intelligence||2015||€831,000||€52,197,100<br /> |-<br /> | Italy - DA - Rental||Italy||Europe||Other||2009||€50,000||€628,250<br /> |-<br /> | [[Malaysian Anti-Corruption Commission]]||[[Malaysia]]||APAC||Intelligence||2009||€77,000||€789,123<br /> |-<br /> | PCM||Italy||Europe||Intelligence||2009||€90,000||€764,297<br /> |-<br /> | SSNS - Ungheria||Hungary||Europe||Intelligence||2009||€64,000||€1,011,000<br /> |-<br /> | CC - Italy||Italy||Europe||LEA||2010||€50,000||€497,349<br /> |-<br /> | [[Al Mukhabarat Al A'amah]]||[[Saudi Arabia]]||MEA||Intelligence||2010||€45,000||€600,000<br /> |-<br /> | IR Authorities (Condor)||[[Luxembourg]]||Europe||Other||2010||€45,000||€446,000<br /> |-<br /> | La Dependencia y/o CISEN&lt;ref&gt;[http://fusion.net/story/163872/the-hacking-team-leak-shows-mexico-was-the-top-client-but-why/ &quot;The HackingTeam leak shows Mexico was its top client, but why?&quot;]. ''Fusion''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Mexico]]||LATAM||Intelligence||2010||€130,000||€1,390,000<br /> |-<br /> | UZC&lt;ref name=fortune/&gt; ||[[Czech Republic]] ||Europe||LEA||2010||€55,000||€689,779<br /> |-<br /> | Egypt - MOD&lt;ref name=fortune/&gt;||[[Egypt]]||MEA||Other||2011||€70,000||€598,000<br /> |-<br /> | [[Federal Bureau of Investigation]]&lt;ref name=fbidea/&gt;||USA||North America||LEA||2011||€100,000||€697,710<br /> |-<br /> | Oman - Intelligence||[[Oman]]||MEA||Intelligence||2011||€30,000||€500,000<br /> |-<br /> | President Security&lt;ref&gt;[http://motherboard.vice.com/read/hacking-teams-equipment-got-stolen-in-panama &quot;HackingTeam's Equipment Got Stolen in Panama&quot;]. ''Motherboard''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref&gt;Molina, Thabata (13 August 2015). ''[http://panampost.com/thabata-molina/2015/08/13/panama-to-investigate-martinelli-in-hacking-team-spying-scandal/ &quot;Panama to Investigate Martinelli in HackingTeam Spying Scandal&quot;]''. ''Panama Post''. Retrieved 15 August 2015.&lt;/ref&gt;<br /> ||[[Panama]]||LATAM||Intelligence||2011||€110,000||€750,000<br /> |-<br /> | [[Turkish National Police]]||[[Turkey]]||Europe||LEA||2011||€45,000||€440,000<br /> |-<br /> | UAE - MOI||[[United Arab Emirates|UAE]]||MEA||LEA||2011||€90,000||€634,500<br /> |-<br /> | [[National Security Service (Uzbekistan)|National Security Service]]&lt;ref name=fortune&gt;[http://fortune.com/2015/07/16/governments-used-spy-software/ &quot;Leaked emails from security firm HackingTeam show government use - Fortune&quot;]. ''Fortune''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Uzbekistan]]||Europe||Intelligence||2011||€50,000||€917,038<br /> |-<br /> | [[United States Department of Defense|Department of Defense]]&lt;ref name=fbidea/&gt;||USA||North America||LEA||2011||||€190,000<br /> |-<br /> | Bayelsa State Government||[[Nigeria]]||MEA||Intelligence||2012||€75,000||€450,000<br /> |-<br /> | Estado del Mexico||Mexico||LATAM||LEA||2012||€120,000||€783,000<br /> |-<br /> | Information Network Security Agency||[[Ethiopia]]||MEA||Intelligence||2012||€80,000||€750,000<br /> |-<br /> | State security (Falcon)||Luxemburg||Europe||Other||2012||€38,000||€316,000<br /> |-<br /> | Italy - DA - Rental||Italy||Europe||Other||2012||€60,000||€496,000<br /> |-<br /> | MAL - MI||Malaysia||APAC||Intelligence||2012||€77,000||€552,000<br /> |-<br /> | [[Direction générale de la surveillance du territoire]]||Morocco||MEA||Intelligence||2012||€160,000||€1,237,500<br /> |-<br /> | [[National Intelligence and Security Service]]&lt;ref name=fortune/&gt;||[[Sudan]]||MEA||Intelligence||2012||€76,000||€960,000<br /> |-<br /> | Russia - KVANT&lt;ref name=kvant&gt;[http://arstechnica.com/tech-policy/2015/07/hacking-teams-surveillance-software-sold-to-kgb-successor/ &quot;HackingTeam apparently violated EU rules in sale of spyware to Russian agency&quot;]. ''Ars Technica''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Russia]]||Europe||Intelligence||2012||€72,000||€451,017<br /> |-<br /> | Saudi - GID||Saudi||MEA||LEA||2012||€114,000||€1,201,000<br /> |-<br /> | SIS of [[National Security Committee of the Republic of Kazakhstan]]&lt;ref name=fortune/&gt;||[[Kazakhstan]]||Europe||Intelligence||2012||€140,000||€1,012,500<br /> |-<br /> | The 5163 Army Division (Alias of South Korean National Intelligence Service)&lt;ref name=fortune/&gt;&lt;ref name=torbrowser&gt;[https://firstlook.org/theintercept/2015/07/16/hackingteam-attacked-tor-browser/ &quot;How HackingTeam Created Spyware that Allowed the FBI To Monitor Tor Browser&quot;]. ''The Intercept''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref name=wswskorea&gt;McGrath, Ben (25 July 2015). &quot;''[https://www.wsws.org/en/articles/2015/07/25/kore-j25.html Further revelations in South Korean hacking scandal]''&quot;. ''World Socialist Web Site''. Retrieved 26 July 2015.&lt;/ref&gt;||[[South Korea|S. Korea]]||APAC||Other||2012||€67,000||€686,400<br /> |-<br /> | UAE - Intelligence||[[United Arab Emirates|UAE]]||MEA||Other||2012||€150,000||€1,200,000<br /> |-<br /> | [[Drug Enforcement Administration]]&lt;ref name=fbidea&gt;[https://firstlook.org/theintercept/2015/07/06/hacking-team-spyware-fbi/ &quot;Leaked Documents Show FBI, DEA and U.S. Army Buying Italian Spyware&quot;]. ''The Intercept''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref name=dea&gt;[http://motherboard.vice.com/read/the-dea-just-cancelled-its-contract-with-hacking-team &quot;The DEA Just Cancelled Its Contract With HackingTeam&quot;]. ''Motherboard''. Retrieved on 2 August 2015.&lt;/ref&gt;||USA||North America||Other||2012||€70,000||€567,984<br /> |-<br /> | [[Central Anticorruption Bureau]]||[[Poland]]||Europe||LEA||2012||€35,000||€249,200<br /> |-<br /> | MOD Saudi||Saudi||MEA||Other||2013||€220,000||€1,108,687<br /> |-<br /> | PMO||Malaysia||APAC||Intelligence||2013||€64,500||€520,000<br /> |-<br /> | Estado de Qeretaro||Mexico||LATAM||LEA||2013||€48,000||€234,500<br /> |-<br /> | National Security Agency&lt;ref name=fortune/&gt;||[[Azerbaijan]]||Europe||Intelligence||2013||€32,000||€349,000<br /> |-<br /> | Gobierno de Puebla||Mexico||LATAM||Other||2013||€64,000||€428,835<br /> |-<br /> | Gobierno de Campeche||Mexico||LATAM||Other||2013||€78,000||€386,296<br /> |-<br /> | AC Mongolia||[[Mongolia]]||APAC||Intelligence||2013||€100,000||€799,000<br /> |-<br /> | Dept. of Correction Thai Police ||[[Thailand]]||APAC||LEA||2013||€52,000||€286,482<br /> |-<br /> | [[National Intelligence Secretariat (Ecuador)|National Intelligence Secretariat]]&lt;ref&gt;http://panampost.com/rebeca-morla/2015/07/13/ecuadorian-websites-report-on-hacking-team-get-taken-down/&lt;br /&gt;http://panampost.com/panam-staff/2015/08/10/hacking-team-helped-ecuador-spy-on-opposition-activist/&lt;br /&gt;http://bigstory.ap.org/article/6f41d49888174b45857d34511fda1caf/apnewsbreak-email-leak-suggests-ecuador-spied-opposition&lt;/ref&gt;<br /> ||[[Ecuador]]||LATAM||LEA||2013||€75,000||€535,000<br /> |-<br /> | Police Intelligence Directorate&lt;ref name=dipol_telesur&gt;Podour, Justin (23 July 2015). [http://www.telesurtv.net/opinion/HackedTeam-y-Colombia-Como-la-vigilancia-ayuda-a-un-Estado-violento-20150723-0062.html #HackedTeam y Colombia: Cómo la vigilancia ayuda a un Estado violento]. ''Telesur''. Retrieved 26 July 2015.&lt;/ref&gt;||[[Colombia]]||LATAM||LEA||2013||€35,000||€335,000<br /> |-<br /> | [[Guardia di Finanza]]||Italy||Europe||LEA||2013||€80,000||€400,000<br /> |-<br /> | Intelligence&lt;ref name=cyprus&gt;In Cyprus (11 July 2015).[http://in-cyprus.com/intelligence-service-chief-steps-down/ Intelligence Service chief steps down]. Retrieved 26 July 2015.&lt;/ref&gt;||[[Cyprus]]||Europe||LEA||2013||€40,000||€375,625<br /> |-<br /> | MidWorld&lt;ref name=ifex&gt;Bahrain Center for Human Rights (15 July 2015). &quot;''[https://www.ifex.org/bahrain/2015/07/15/bahrain_hacking_team HackingTeam's troubling connections to Bahrain]''&quot; IFEX. Retrieved 26 July 2015.&lt;/ref&gt;||[[Bahrain]]||MEA||Intelligence||2013||||€210,000<br /> |-<br /> | Mexico - PEMEX||Mexico ||LATAM||LEA ||2013||||€321,120<br /> |-<br /> | Malysia K||Malaysia||APAC||LEA||2013||||€0<br /> |-<br /> | Honduras||[[Honduras]]||LATAM||LEA||2014||||€355,000<br /> |-<br /> | Mex Taumalipas||Mexico||LATAM||||2014||||€322,900<br /> |-<br /> | Secretaría de Planeación y Finanzas||Mexico||LATAM||LEA||2014||€91,000||€371,035<br /> |-<br /> | AREA||Italia||Europe||||2014||||€430,000<br /> |-<br /> | Mexico Yucatán||Mexico||LATAM||LEA||2014||||€401,788<br /> |-<br /> | Mexico Durango||Mexico||LATAM||LEA||2014||||€421,397<br /> |-<br /> | [[Investigations Police of Chile]]||[[Chile]]||LATAM||LEA||2014||||€2,289,155<br /> |-<br /> | Jalisco Mexico||Mexico||LATAM||LEA||2014||||€748,003<br /> |-<br /> | [[Royal Thai Army]]||Thailand||APAC||LEA||2014||||€360,000<br /> |-<br /> | Vietnam GD5||[[Vietnam]]||APAC||||2014||||€281,170<br /> |-<br /> | [[Kantonspolizei Zürich]]||Switzerland||Europe||LEA||2014||||€486,500<br /> |-<br /> | Vietnam GD1||Vietnam||APAC||LEA||2015||||€543,810<br /> |-<br /> | Egypt TRD GNSE||Egypt||MEA||LEA||2015||||€137,500<br /> |-<br /> | [[Lebanon Army Forces]]||[[Lebanon]]||MEA||LEA||2015||||<br /> |-<br /> | [[Federal Police Department]]||Brazil||LATAM||LEA||2015||||<br /> |-<br /> | [[SHISH|State Informative Service]]&lt;ref&gt;Lexime (14 July 2015). &quot;''[http://www.balkanweb.com/site/burime-te-sigurta-shish-perdor-programet-pergjuese-qe-prej-2015-hacking-teams-nuk-e-kemi-nen-kontroll-sistemin/ Burime të sigurta, SHISH përdor programet përgjuese që prej 2015. HackingTeams: Nuk e kemi nën kontroll sistemin!]''&quot; (video). BalkanWeb. Retrieved 27 July 2015.&lt;/ref&gt;||[[Albania]]||Europe||SHIK||2015||||<br /> |}<br /> <br /> == See also ==<br /> * [[FinFisher]]<br /> * [[MiniPanzer and MegaPanzer]]<br /> <br /> ==References==<br /> {{reflist|30em}}<br /> <br /> == External links ==<br /> * {{Official website| http://www.hackingteam.it/}}<br /> * [https://citizenlab.org/tag/hacking-team/ HackingTeam Archives] - investigative reports published by The [[Citizen Lab]]<br /> * [https://wikileaks.org/hackingteam/emails WikiLeaks: ''The Hackingteam Archives''] - searchable database of 1 million internal emails<br /> * [https://wikileaks.org/spyfiles/list/company-name/hackingteam.html HackingTeam presentations] in the [[WikiLeaks]] &quot;''Spy Files''&quot;<br /> {{Hacking in the 2010s}}<br /> <br /> [[Category:Computer security software]]<br /> [[Category:Spyware]]<br /> [[Category:Surveillance]]<br /> [[Category:Trojan horses]]<br /> [[Category:Espionage techniques]]<br /> [[Category:Espionage devices]]<br /> [[Category:Malware toolkits]]<br /> [[Category:Computer access control]]<br /> [[Category:Cyberwarfare]]<br /> [[Category:Espionage scandals and incidents]]<br /> [[Category:Companies based in Milan]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=LibrePlanet&diff=161791859 LibrePlanet 2016-06-18T16:32:03Z <p>Dsprc: </p> <hr /> <div>{{multiple issues|<br /> {{refimprove|date=June 2016}}<br /> {{third-party|date=June 2016}}<br /> }}<br /> <br /> {{Infobox recurring event|logo = File:LibrePlanetWiki.png}}'''LibrePlanet''' (literally, &quot;Free Planet&quot;) is a community project created and supported by the [[Free Software Foundation]]. Its objective is the promotion of [[free software]] around the world by bringing every year an international conference to local communities&lt;ref&gt;[http://libreplanet.org/wiki/ Wiki].&lt;/ref&gt; and organizations.&lt;ref&gt;[http://libreplanet.org/wiki/LibrePlanet2011 Planète Libre 2011].&lt;/ref&gt;<br /> <br /> ==History==<br /> The project was born in 2006, at a gathering of members associated with the Foundation and the will to organize into geographical groups.<br /> <br /> ==LibrePlanet conference==<br /> [[File:Libreplanet.png|380x380px|thumb|&lt;center&gt;Logo used for the LibrePlanet conference from 2010-2012<br /> Based on the graphical style of [[The Haçienda]] in keeping with<br /> <br /> the theme of &quot;[[Ivan Chtcheglov|The Hacienda Must Be Built]]&quot;<br /> &lt;/center&gt;]]The conference is organized annually by the [[Free Software Foundation]] in or around [[Boston, Massachusetts]] and staffed by a mixture of foundation staff and community volunteers. The conference replaces the FSF Annual Members Meeting (AMM) which ran around the same time each year.<br /> <br /> Each conference has its own theme and a website, T-shirt and posters are produced on this theme. From 2010-2012 the posters closely mimicked the style of flyers from [[The Haçienda]] and [[Factory Records]] in general, followed by a large party at a nearby bar paid for by members of the Libre.fm and GNU social communities.<br /> <br /> The event typically includes a speech from FSF president, [[Richard Stallman]] and FSF executive director [[William John Sullivan|John Sullivan]], as well as members of the wider free software community.<br /> {{Prose|section|date=June 2016}}<br /> {| class=&quot;wikitable&quot;<br /> !Year<br /> !Dates<br /> !Location<br /> !Themes<br /> !Prominent events<br /> |-<br /> |2009<br /> |March 21/22<br /> |[[Harvard Science Center]]<br /> |<br /> * End Software Patents<br /> * Free Network Services<br /> |<br /> * [[Libre.fm]] project was conceived <br /> * A [[book sprint]] was run by [[FLOSS Manuals]] to create &quot;Introduction to the Command Line&quot;<br /> * [[Creative Commons]] and [[Wietse Venema]] win the [[FSF Free Software Awards|annual FSF awards]]<br /> |-<br /> |2010<br /> |March 20/21<br /> |Harvard Science Center<br /> |<br /> * Working Together For Free Software<br /> |<br /> * March 19 was a [[GNU Project|GNU developers]] conference<br /> * [[Internet Archive]] and [[John Gilmore (activist)|John Gilmore]] win the FSF awards<br /> |-<br /> |2011<br /> |March 19<br /> |[[Bunker Hill Community College]]<br /> |<br /> * Acting locally for global free software adoption.<br /> |<br /> * Single Day conference with a number of local students invited<br /> * [[Tor (anonymity network)|Tor]] and [[Rob Savoye]] win the annual FSF awards<br /> * Additionally, a special mention was made to honor the memory and contribution of Adrian Hands, who used a morse input device to code and successfully submit a GNOME patch, three days before he died from ALS.<br /> |-<br /> |2012<br /> |March 24/25<br /> |[[University of Massachusetts Boston|University of Massachusetts, Boston]]<br /> |<br /> |<br /> * [[GNU Health]] and [[Yukihiro Matsumoto]] win the FSF awards<br /> |-<br /> |2013<br /> |March 23/24<br /> |Cambridge, MA<br /> |<br /> |<br /> * [[OpenMRS]] and [[Fernando Pérez (software developer)|Fernando Pérez]]<br /> |-<br /> |2014<br /> |March 22/23<br /> |Cambridge, MA<br /> |<br /> |<br /> * [[Outreachy]] (then known as Free and Open Source Software Outreach Program for Women) and [[Matthew Garrett]]<br /> |-<br /> |2015<br /> |March 21/22<br /> |[[Ray and Maria Stata Center|MIT Stata Center]]<br /> |<br /> |<br /> * Reglue and Sébastien Jodogne<br /> |-<br /> |2016<br /> |March 19/20<br /> |Cambridge, MA; [[Massachusetts Institute of Technology|MIT]]<br /> | ''&quot;[[Fork (software development)|Fork]] the System&quot;''<br /> |<br /> *[[Edward Snowden]]: ''&quot;The Last Lighthouse&quot;''&lt;ref&gt;{{cite web|author1=Snowden, Edward|author2=Daniel Kahn Gillmor|title=Libreplanet 2016: The Last Lighthouse: Free Software In Dark Times|url=https://media.libreplanet.org/u/libreplanet/m/libreplanet-2016-the-last-lighthouse-3d51/|website=media.libreplanet.org|publisher=Free Software Foundation|accessdate=2 June 2016|format=video, [[WebM]]}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Nicholson, Deb|title=LibrePlanet begins with Snowden, ends with DRM protest|url=https://opensource.com/life/16/3/libreplanet-2016|website=opensource.com|accessdate=2 June 2016|date=29 March 2016}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Gold, Jon|title=Edward Snowden: Privacy can't depend on corporations standing up to the government|url=http://www.networkworld.com/article/3046135/security/edward-snowden-privacy-cant-depend-on-corporations-standing-up-to-the-government.html|website=networkworld.com|accessdate=2 June 2016|date=19 March 2016}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Popa, Bogdan|title=Snowden Used Free Software Because He Was Afraid of Backdoors in Microsoft Apps|url=http://news.softpedia.com/news/snowden-used-free-software-because-he-was-afraid-of-backdoors-in-microsoft-apps-502039.shtml|publisher=''SoftPedia'' News|accessdate=2 June 2016|date=22 March 2016|quote=NSA whistleblower Edward Snowden attended the Free Software Foundation LibrePlanet 2016 conference remotely from Russia to discuss the advantages of free applications, explaining that he couldn’t trust Microsoft software when revealing government’s surveillance programs in 2013.}}&lt;/ref&gt;<br /> |}<br /> <br /> == See also ==<br /> * [[GNU Hurd]]<br /> * [[Libre Software Meeting]]<br /> * [[Linux-libre]]<br /> <br /> == References ==<br /> {{reflist}}<br /> <br /> ==External links==<br /> * [https://libreplanet.org/wiki/Main_Page LibrePlanet official website and wiki]<br /> <br /> [[Category:International conferences]]<br /> [[Category:Free software culture and documents]]<br /> [[Category:Computer-related events]]<br /> [[Category:Free Software Foundation]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=LibrePlanet&diff=161791858 LibrePlanet 2016-06-18T16:31:40Z <p>Dsprc: </p> <hr /> <div>{{multiple issues|<br /> {{refimprove|date=June 2016}}<br /> {{third-party|date=June 2016}}<br /> }}<br /> <br /> {{Infobox recurring event|logo = File:LibrePlanetWiki.png}}'''LibrePlanet''' (literally, &quot;Free Planet&quot;) is a community project created and supported by the [[Free Software Foundation]]. Its objective is the promotion of [[free software]] around the world by bringing every year an international conference to local communities&lt;ref&gt;[http://libreplanet.org/wiki/ Wiki].&lt;/ref&gt; and organizations.&lt;ref&gt;[http://libreplanet.org/wiki/LibrePlanet2011 Planète Libre 2011].&lt;/ref&gt;<br /> <br /> ==History==<br /> The project was born in 2006, at a gathering of members associated with the Foundation and the will to organize into geographical groups.<br /> <br /> ==LibrePlanet conference==<br /> [[File:Libreplanet.png|380x380px|thumb|&lt;center&gt;Logo used for the LibrePlanet conference from 2010-2012<br /> Based on the graphical style of [[The Haçienda]] in keeping with<br /> <br /> the theme of &quot;[[Ivan Chtcheglov|The Hacienda Must Be Built]]&quot;<br /> &lt;/center&gt;]]The conference is organized annually by the [[Free Software Foundation]] in or around [[Boston, Massachusetts]] and staffed by a mixture of foundation staff and community volunteers. The conference replaces the FSF Annual Members Meeting (AMM) which ran around the same time each year.<br /> <br /> Each conference has its own theme and a website, T-shirt and posters are produced on this theme. From 2010-2012 the posters closely mimicked the style of flyers from [[The Haçienda]] and [[Factory Records]] in general, followed by a large party at a nearby bar paid for by members of the Libre.fm and GNU social communities.<br /> <br /> The event typically includes a speech from FSF president, [[Richard Stallman]] and FSF executive director [[William John Sullivan|John Sullivan]], as well as members of the wider free software community. <br /> {| class=&quot;wikitable&quot;<br /> !Year<br /> !Dates<br /> !Location<br /> !Themes<br /> !Prominent events<br /> |-<br /> |2009<br /> |March 21/22<br /> |[[Harvard Science Center]]<br /> |<br /> * End Software Patents<br /> * Free Network Services<br /> |<br /> * [[Libre.fm]] project was conceived <br /> * A [[book sprint]] was run by [[FLOSS Manuals]] to create &quot;Introduction to the Command Line&quot;<br /> * [[Creative Commons]] and [[Wietse Venema]] win the [[FSF Free Software Awards|annual FSF awards]]<br /> |-<br /> |2010<br /> |March 20/21<br /> |Harvard Science Center<br /> |<br /> * Working Together For Free Software<br /> |<br /> * March 19 was a [[GNU Project|GNU developers]] conference<br /> * [[Internet Archive]] and [[John Gilmore (activist)|John Gilmore]] win the FSF awards<br /> |-<br /> |2011<br /> |March 19<br /> |[[Bunker Hill Community College]]<br /> |<br /> * Acting locally for global free software adoption.<br /> |<br /> * Single Day conference with a number of local students invited<br /> * [[Tor (anonymity network)|Tor]] and [[Rob Savoye]] win the annual FSF awards<br /> * Additionally, a special mention was made to honor the memory and contribution of Adrian Hands, who used a morse input device to code and successfully submit a GNOME patch, three days before he died from ALS.<br /> |-<br /> |2012<br /> |March 24/25<br /> |[[University of Massachusetts Boston|University of Massachusetts, Boston]]<br /> |<br /> |<br /> * [[GNU Health]] and [[Yukihiro Matsumoto]] win the FSF awards<br /> |-<br /> |2013<br /> |March 23/24<br /> |Cambridge, MA<br /> |<br /> |<br /> * [[OpenMRS]] and [[Fernando Pérez (software developer)|Fernando Pérez]]<br /> |-<br /> |2014<br /> |March 22/23<br /> |Cambridge, MA<br /> |<br /> |<br /> * [[Outreachy]] (then known as Free and Open Source Software Outreach Program for Women) and [[Matthew Garrett]]<br /> |-<br /> |2015<br /> |March 21/22<br /> |[[Ray and Maria Stata Center|MIT Stata Center]]<br /> |<br /> |<br /> * Reglue and Sébastien Jodogne<br /> |-<br /> |2016<br /> |March 19/20<br /> |Cambridge, MA; [[Massachusetts Institute of Technology|MIT]]<br /> | ''&quot;[[Fork (software development)|Fork]] the System&quot;''<br /> |<br /> *[[Edward Snowden]]: ''&quot;The Last Lighthouse&quot;''&lt;ref&gt;{{cite web|author1=Snowden, Edward|author2=Daniel Kahn Gillmor|title=Libreplanet 2016: The Last Lighthouse: Free Software In Dark Times|url=https://media.libreplanet.org/u/libreplanet/m/libreplanet-2016-the-last-lighthouse-3d51/|website=media.libreplanet.org|publisher=Free Software Foundation|accessdate=2 June 2016|format=video, [[WebM]]}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Nicholson, Deb|title=LibrePlanet begins with Snowden, ends with DRM protest|url=https://opensource.com/life/16/3/libreplanet-2016|website=opensource.com|accessdate=2 June 2016|date=29 March 2016}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Gold, Jon|title=Edward Snowden: Privacy can't depend on corporations standing up to the government|url=http://www.networkworld.com/article/3046135/security/edward-snowden-privacy-cant-depend-on-corporations-standing-up-to-the-government.html|website=networkworld.com|accessdate=2 June 2016|date=19 March 2016}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Popa, Bogdan|title=Snowden Used Free Software Because He Was Afraid of Backdoors in Microsoft Apps|url=http://news.softpedia.com/news/snowden-used-free-software-because-he-was-afraid-of-backdoors-in-microsoft-apps-502039.shtml|publisher=''SoftPedia'' News|accessdate=2 June 2016|date=22 March 2016|quote=NSA whistleblower Edward Snowden attended the Free Software Foundation LibrePlanet 2016 conference remotely from Russia to discuss the advantages of free applications, explaining that he couldn’t trust Microsoft software when revealing government’s surveillance programs in 2013.}}&lt;/ref&gt;<br /> |}<br /> <br /> == See also ==<br /> * [[GNU Hurd]]<br /> * [[Libre Software Meeting]]<br /> * [[Linux-libre]]<br /> <br /> == References ==<br /> {{reflist}}<br /> <br /> ==External links==<br /> * [https://libreplanet.org/wiki/Main_Page LibrePlanet official website and wiki]<br /> <br /> [[Category:International conferences]]<br /> [[Category:Free software culture and documents]]<br /> [[Category:Computer-related events]]<br /> [[Category:Free Software Foundation]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=8kun&diff=187755832 8kun 2016-06-14T10:08:59Z <p>Dsprc: /* top */ possessive</p> <hr /> <div>{{other uses|8chan (disambiguation)}}<br /> {{Use mdy dates|date=September 2015}}<br /> {{Infobox website<br /> | name = 8chan<br /> | logo = InfiniteChan∞chanLogo.svg<br /> | logo alt = A green infinity symbol left of the word chan.<br /> | logo caption = <br /> | logo size = 200px<br /> | screenshot = <br /> | alt = <br /> | caption = <br /> | url = {{URL|https://8ch.net}}<br /> | slogan = <br /> | commercial = Yes<br /> | type = [[Imageboard]]<br /> | language = English, Japanese (users can create language specific boards)<br /> | registration = Optional<br /> | author = [[Fredrick Brennan]]<br /> | owner = [[:ja:ジム・ワトキンス|Jim Watkins]],&lt;br /&gt; N.T. Technology ([[2channel]])&lt;ref&gt;[https://8ch.net/who.html 8chan] - Who owns 8chan?&lt;/ref&gt;<br /> | launch date = {{start date and age|2013|10|22|df=no}}<br /> | alexa = {{IncreaseNegative}} 10,084 ({{as of|2015|8|22|alt=August 2015}})&lt;ref name=&quot;alexa&quot;&gt;{{cite web|url= http://www.alexa.com/siteinfo/8ch.net |title= 8ch.net Site Info | publisher= [[Alexa Internet]] |accessdate= August 22, 2015 }}&lt;/ref&gt;<br /> | current status = Online<br /> }}<br /> <br /> '''8chan,''' also called '''Infinitechan,''' is an [[English language|English-language]] [[imageboard]] website composed of user-created [[Internet forum|boards]]. Each board is moderated by its respective creator, with minimal interaction from other site administration.&lt;ref name=&quot;faq&quot;&gt;{{cite web|last=Brennan|first=Fredrick|url=https://8ch.net/faq.html|title=FAQ|publisher=Infinitechan|website=8chan.co|accessdate=November 23, 2014}}&lt;/ref&gt;<br /> <br /> The site has received both praise and criticism for its stance on [[Freedom of speech|free speech]], which involves allowing any content to be posted, so long as it adheres to United States law.<br /> <br /> Several of the site's boards have played an active role in the [[Gamergate controversy]], encouraging Gamergate affiliates to frequent 8chan after the topic was banned on the unaffiliated imageboard [[4chan]]. As of August 2015, the site was the 10,204th most visited site in the world,&lt;ref name=&quot;alexa&quot; /&gt; and in November 2014, it was receiving an average of 35,000 unique visitors per day and 400,000 posts per week when it was at a higher rank.&lt;ref name=Howell2014 /&gt;<br /> <br /> ==History==<br /> 8chan was created in October 2013 by computer programmer [[Fredrick Brennan]],&lt;ref name=Howell2014 /&gt;&lt;ref&gt;{{cite web|last1=Machkovech|first1=Sam|title=Full transcript: Ars interviews 8chan founder Fredrick Brennan|url=http://arstechnica.com/business/2015/03/full-transcript-ars-interviews-8chan-founder-fredrick-brennan/|publisher=Ars Technica|accessdate=June 15, 2015|date=March 17, 2015}}&lt;/ref&gt; also known by the nickname &quot;Hotwheels.&quot;&lt;ref name=&quot;KYM&quot;/&gt; Brennan created the website after he observed what he perceived to be rapidly escalating [[surveillance]] and a loss of [[free speech]] on the Internet.&lt;ref name=Howell2014 /&gt; Brennan, who considers the imageboard [[4chan]] to have grown into authoritarianism, describes 8chan as a &quot;free-speech-friendly&quot; alternative,&lt;ref name=&quot;Howell2014&quot;&gt;{{cite web|last=Howell O'Neill|first=Patrick|date=November 17, 2014|url=http://www.dailydot.com/politics/8chan-pedophiles-child-porn-gamergate/|title=8chan, the central hive of Gamergate, is also an active pedophile network|work=The Daily Dot}}&lt;/ref&gt; and had originally conceptualized the site while experiencing a [[psychedelic experience|psychedelic mushrooms trip]].&lt;ref name=&quot;KYM&quot;/&gt;&lt;ref name=WashPost /&gt;<br /> <br /> No experience or programming knowledge is necessary for users to create their own boards.&lt;ref name=&quot;faq&quot; /&gt; Since as early as March 2014, its [[FAQ]] has stated only one rule that is to be globally enforced: &quot;Do not post, request, or link to any content illegal in the United States of America. Do not create boards with the sole purpose of posting or spreading such content.&quot;&lt;ref name=&quot;faq&quot; /&gt; Brennan has claimed that, while he finds some of the content posted by users to be &quot;reprehensible,&quot; he feels personally obligated to uphold the site's integrity by tolerating discussion he does not necessarily support regardless of his moral stance.&lt;ref name=Howell2014 /&gt;<br /> <br /> Brennan agreed to partner 8chan with the Japanese message board [[2channel]],&lt;ref name=&quot;KYM&quot;&gt;{{cite web|url=http://knowyourmeme.com/blog/interviews/qa-with-fredrick-brennan-of-8chan|title=Q&amp;A with Fredrick Brennan of 8chan|last=Caldwell|first=Don|date=October 9, 2014|work=[[Know Your Meme]]|accessdate=December 18, 2014}}&lt;/ref&gt; and subsequently relocated to the [[Philippines]] in October 2014.&lt;ref name=Chen /&gt;<br /> <br /> In January 2015, the site changed its [[Domain name|domain]] 8chan.co to 8ch.net after multiple people filed reports complaining to 8chan’s [[Domain name registrar|registrar]] that the message board hosted [[child pornography]]. Despite subsequently regaining the domain, the site remained at 8ch.net, with the old domain redirecting to it.&lt;ref name=WashPost /&gt;<br /> <br /> Numerous bugs in the Infinity software led to the funding and development of a successor platform dubbed &quot;Infinity Next&quot;. After a several-month-long testing period, a migration to the new software was attempted in December 2015, but failed.&lt;ref&gt;{{cite web |url=https://ghostbin.com/paste/qt2ww |format=Plaintext |title=qt2ww |last=Moon |first=Joshua |date=2015-12-19 |accessdate=2015-12-20 }}&lt;/ref&gt;{{clarify|date=December 2015}} Eventually, development was halted, and the main developer, Joshua Moon, fired by Brennan.&lt;ref&gt;{{cite web|last1=Brennan|first1=Fredrick|title=Infinity Never|url=https://medium.com/@infinitechan/infinity-never-3d5f733af739#.dfm7b7te5|website=Medium|accessdate=2 February 2016|language=English|date=26 January 2016}}&lt;/ref&gt;<br /> <br /> ==Controversies==<br /> <br /> ===Child pornography===<br /> ''[[The Washington Post]]'' described it as &quot;the more-lawless, more-libertarian, more 'free' follow-up to 4chan.&quot;&lt;ref name=&quot;WashPost&quot;&gt;{{cite web|url=http://www.washingtonpost.com/news/the-intersect/wp/2015/01/13/this-is-what-happens-when-you-create-an-online-community-without-any-rules/|title=This is what happens when you create an online community without any rules|work=[[The Washington Post]]|last=Caitlin|first=Dewey|date=January 13, 2015}}&lt;/ref&gt; Boards have been created to discuss controversial topics, including [[pedophilia]]. While the sharing of illegal content is against site rules, ''[[The Daily Dot]]'' wrote that boards do exist to share sexualized images of minors in provocative poses, and that some users of those boards do post links to explicit child pornography hosted elsewhere.&lt;ref name=&quot;Howell2014&quot;/&gt; When asked whether such boards were an inevitable result of free speech, Brennan responded, &quot;Unfortunately, yes. I don’t support the content on the boards you mentioned, but it is simply the cost of free speech and being the only active site to not impose more 'laws' than those that were passed in [[Washington, D.C.]]&quot;&lt;ref name=&quot;Howell2014&quot;/&gt;<br /> <br /> In August 2015, for a brief period, 8chan was blacklisted from [[Google Search]] for containing content constituting &quot;suspected child abuse content.&quot;&lt;ref name=ars-8chancensor&gt;{{cite web|title=8chan-hosted content disappears from Google searches|url=http://arstechnica.com/tech-policy/2015/08/8chan-hosted-content-disappears-from-google-searches/|last=Machkovech|first=Sam|website=[[Ars Technica]]|publisher=[[Condé Nast]]|date=August 14, 2015|accessdate=August 17, 2015}}&lt;/ref&gt; It was later restored to the search engine's listings without explanation.&lt;ref&gt;{{Cite web|url = https://medium.com/@infinitechan/google-is-not-your-friend-5a6636af0651|title = Google is not your friend?|date = August 13, 2015|accessdate = September 9, 2015|website = Medium|publisher = |last = Brennan|first = Frederick}}&lt;/ref&gt;<br /> <br /> ===Gamergate===<br /> {{main|Gamergate controversy}}<br /> On September 18, 2014, the website gained prominence in the [[Gamergate controversy]] after 4chan banned discussion of Gamergate,&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;/&gt;&lt;ref&gt;{{cite news|last=Audureau|first=William|title=4chan, wizardchan, 8chan... s'y retrouver dans la jungle des forums anonymes les plus populaires du Web|url=http://www.lemonde.fr/pixels/article/2014/10/15/4chan-wizardchan-8chan-le-guide-des-forums-anonymes-les-plus-populaires-du-web_4505380_4408996.html|work=[[Le Monde]]|location=France|language=French|date=October 15, 2014}}&lt;/ref&gt; whereupon 8chan became one of several hubs of Gamergate activity.&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;&gt;{{cite web|last=Chen|first=Adrian|date=October 27, 2014|url=http://nymag.com/daily/intelligencer/2014/10/gamergate-supporters-party-at-strip-club.html|title=Gamergate Supporters Partied at a Strip Club This Weekend|work=[[New York (magazine)]]}}&lt;/ref&gt;&lt;ref name=&quot;Buzz&quot;/&gt;&lt;ref name=&quot;Guardian 2015-01-13&quot; /&gt; &quot;/gg/,&quot; 8chan's initial Gamergate-oriented board, also gained attention after being compromised by members of the internet troll group [[Gay Nigger Association of America]], forcing Gamergate activists to migrate to &quot;/gamergate/.&quot; This replacement quickly became the site's second most populous board.&lt;ref name=&quot;Buzz&quot;&gt;{{cite web|last1=Bernstein|first1=Joseph|title=GamerGate’s Headquarters Has Been Destroyed By Trolls|url=http://www.buzzfeed.com/josephbernstein/gamergates-headquarters-has-been-destroyed-by-trolls|publisher=''[[Buzzfeed]]''|date=December 4, 2014}}&lt;/ref&gt;<br /> <br /> ===Swatting incidents===<br /> In January 2015 the site was used as a base for [[swatting]] exploits in [[Portland, Oregon|Portland]], [[Seattle]], and [[Burnaby|Burnaby, British Columbia]], most of them tied to the victims' criticism of Gamergate and 8chan's association with it;&lt;ref name=&quot;Mattise&quot;&gt;{{cite web|last=Mattise|first=Nathan|date=January 4, 2015|url=http://arstechnica.com/tech-policy/2015/01/8chan-tries-swatting-gamergate-critic-sends-cops-to-an-old-address/|title=8chan tries &quot;swatting&quot; GamerGate critic, sends cops to an old address|work=[[Ars Technica]]}}&lt;/ref&gt; the attacks were coordinated on a [[Internet forum|board]] on the website called &quot;/baphomet/.&quot;&lt;ref name=&quot;Guardian 2015-01-13&quot;&gt;{{cite news |last=Hern |first=Alex |url=http://www.theguardian.com/technology/2015/jan/13/gamergate-hits-new-low-with-attempts-to-send-swat-teams-to-critics |title=Gamergate hits new low with attempts to send Swat teams to critics |work=[[The Guardian]] |date=January 13, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt; One of the victims of a swatting attack said that she was singled out because she had followed someone on [[Twitter]].&lt;ref name=&quot;GlobalNews 2015-01-15&quot;&gt;{{cite news |last=McElroy |first=Justin |url=http://globalnews.ca/news/1773840/police-called-to-burnaby-womens-home-by-online-harassers/ |title=Police falsely called to Burnaby women’s home by online harassers |work=[[Global News]] |date=January 15, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt;&lt;ref&gt;{{cite web|url=http://www.gameranx.com/updates/id/26081/article/canadian-victim-of-gamergate-swatting-attempt-comes-forward/|title=Canadian Victim of Gamergate SWATing Attempt Comes Forward|work=Gameranx|last=Cheong|first=Ian Miles|date=January 13, 2015|accessdate=January 16, 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://bc.ctvnews.ca/reckless-swatting-prank-sends-police-to-b-c-woman-s-home-1.2189547|title=Reckless ‘swatting’ prank sends police to B.C. woman’s home|work=[[CTV News]]|date=January 14, 2015|accessdate=September 30, 2015|author=&lt;!-- Staff writers --&gt;}}&lt;/ref&gt; On February 9, 2015, contents on the &quot;/baphomet/&quot; subboard were wiped after [[doxxing|personal information]] of [[Katherine B. Forrest|Katherine Forrest]], the presiding judge in the [[Silk Road (marketplace)|Silk Road]] case, had been posted there.&lt;ref name=&quot;silkroad&quot;&gt;{{Cite web| title = Notorious 8chan &quot;subboard&quot; has history wiped after federal judge’s doxing| first = Sam |last = Machkovech|work = Ars Technica| date = February 12, 2015| accessdate = February 13, 2015| url = http://arstechnica.com/security/2015/02/notorious-8chan-subboard-has-history-wiped-after-federal-judges-doxing/}}&lt;/ref&gt;<br /> <br /> ===Los Angeles school-closure incident===<br /> [[File:CWh686mUwAEQLoj.png|thumb|upright=0.35|alt=Photograph of Vincent Canfield|Owner and operator of cock.li, Vincent Canfield]]<br /> On Tuesday, December 15, 2015, the New York City and Los Angeles County Boards of Education were both sent a superficially threatening, but actually fraudulent, e-mail message that had originated from an 8chan-linked service called &quot;cock.li&quot;. The New York City school board did not take the message seriously, but the Los Angeles County school board refused to take the chance and ordered all public schools closed for the entire day, citing what it called a &quot;credible terror threat.&quot; Sam Biddle, a contributor to [[Gawker.com]], called the message &quot;extremely dumb&quot; in an article on the site he filed under &quot;Pranks,&quot; writing:<br /> {{cquote|Even if this message hadn’t been sent from a “cock.li” email account, it would’ve been hard to imagine it was a credible threat of violence, particularly since it conflates 4chan-style “death to the normies” rhetoric with convoluted Islamism. It looks very much like the work of a kid who really didn’t want to go to school.}}<br /> In the article, which he titled “Here’s the Full, Extremely Dumb Email That Shut Down the Entire L.A. Public School System,” Biddle quoted the e-mail message itself, word for word.&lt;ref&gt;{{Cite web| title = Here’s the Full, Extremely Dumb Email That Shut Down the Entire L.A. Public School System| first = Sam |last = Biddle|work = Gawker| date = December 16, 2015| accessdate = December 16, 2015| url = http://gawker.com/heres-the-full-extremely-dumb-email-that-shut-down-the-1748402588/}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Bluestone, Gabrielle|title=Bicoastal School Bomb Threats Were Sent From an 8Chan-Linked &quot;Cockmail&quot; Service|url=http://gawker.com/bicoastal-school-bomb-threats-sent-from-8chan-linked-c-1748175650|publisher=Gawker|accessdate=4 January 2016|date=15 December 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Farivar, Cyrus|title=All LA schools shut down over message sent from 8chan’s e-mail host, cock.li|url=http://arstechnica.com/tech-policy/2015/12/all-la-schools-shut-down-over-message-sent-from-8chans-e-mail-host-cock-li/|website=Ars Technica|publisher=Condé Nast|accessdate=4 January 2016|date=16 December 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Neff, Blake|title=LA School Threat Came From Online ‘Meme Sewer’|url=http://dailycaller.com/2015/12/15/la-school-threat-came-from-online-meme-sewer/|publisher=The Daily Caller|accessdate=4 January 2016|date=12 December 2015}}&lt;/ref&gt;<br /> <br /> === Minor incidents ===<br /> 8chan users proposed to actualize a [[White nationalism|white-only nation]] in Africa named &quot;Namibia&quot;.&lt;ref&gt;{{cite news |url=http://www.vice.com/read/white-colony-in-namibia-773 |title=Internet Neo-Nazis Are Trying to Build a White Supremacist Utopia in Namibia |author=Tom Sanders |date=February 12, 2015}}&lt;/ref&gt; Users [[Internet troll|trolled]] the French Girls iPhone app by drawing derogatory images of other people using the app (mainly racially offensive images of [[Person of color|people of color]]).&lt;ref&gt;{{cite news |title=Trolls Are Already Ruining The Internet's Nice New Thing |url=https://www.buzzfeed.com/josephbernstein/hateful-losers-are-already-ruining-the-internets-nice-new-th |date=June 9, 2015 |author=Joseph Bernstein}}&lt;/ref&gt;<br /> <br /> ==References==<br /> {{Reflist|30em}}<br /> <br /> ==External links==<br /> * {{Official website}}<br /> <br /> {{Gamergate controversy}}<br /> {{Tor hidden services}}<br /> <br /> {{DEFAULTSORT:8chan}}<br /> [[Category:2channel]]<br /> [[Category:American websites]]<br /> [[Category:Community websites]]<br /> [[Category:Free web software]]<br /> [[Category:Internet forums]]<br /> [[Category:Imageboards]]<br /> [[Category:Internet properties established in 2013]]<br /> [[Category:Obscenity controversies]]<br /> [[Category:Tor hidden services]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=8kun&diff=187755831 8kun 2016-06-14T10:08:12Z <p>Dsprc: /* top */</p> <hr /> <div>{{other uses|8chan (disambiguation)}}<br /> {{Use mdy dates|date=September 2015}}<br /> {{Infobox website<br /> | name = 8chan<br /> | logo = InfiniteChan∞chanLogo.svg<br /> | logo alt = A green infinity symbol left of the word chan.<br /> | logo caption = <br /> | logo size = 200px<br /> | screenshot = <br /> | alt = <br /> | caption = <br /> | url = {{URL|https://8ch.net}}<br /> | slogan = <br /> | commercial = Yes<br /> | type = [[Imageboard]]<br /> | language = English, Japanese (users can create language specific boards)<br /> | registration = Optional<br /> | author = [[Fredrick Brennan]]<br /> | owner = [[:ja:ジム・ワトキンス|Jim Watkins]],&lt;br /&gt; N.T. Technology ([[2channel]])&lt;ref&gt;[https://8ch.net/who.html 8chan] - Who owns 8chan?&lt;/ref&gt;<br /> | launch date = {{start date and age|2013|10|22|df=no}}<br /> | alexa = {{IncreaseNegative}} 10,084 ({{as of|2015|8|22|alt=August 2015}})&lt;ref name=&quot;alexa&quot;&gt;{{cite web|url= http://www.alexa.com/siteinfo/8ch.net |title= 8ch.net Site Info | publisher= [[Alexa Internet]] |accessdate= August 22, 2015 }}&lt;/ref&gt;<br /> | current status = Online<br /> }}<br /> <br /> '''8chan,''' also called '''Infinitechan,''' is an [[English language|English-language]] [[imageboard]] website composed of user-created [[Internet forum|boards]]. Each board is moderated by its respective creator, with minimal interaction from other site administration.&lt;ref name=&quot;faq&quot;&gt;{{cite web|last=Brennan|first=Fredrick|url=https://8ch.net/faq.html|title=FAQ|publisher=Infinitechan|website=8chan.co|accessdate=November 23, 2014}}&lt;/ref&gt;<br /> <br /> The site has received both praise and criticism for its stance on [[Freedom of speech|free speech]], which involves allowing any content to be posted, so long as it adheres to United States law.<br /> <br /> Several of the sites' boards have played an active role in the [[Gamergate controversy]], encouraging Gamergate affiliates to frequent 8chan after the topic was banned on the unaffiliated imageboard [[4chan]]. As of August 2015, the site was the 10,204th most visited site in the world,&lt;ref name=&quot;alexa&quot; /&gt; and in November 2014, it was receiving an average of 35,000 unique visitors per day and 400,000 posts per week when it was at a higher rank.&lt;ref name=Howell2014 /&gt;<br /> <br /> ==History==<br /> 8chan was created in October 2013 by computer programmer [[Fredrick Brennan]],&lt;ref name=Howell2014 /&gt;&lt;ref&gt;{{cite web|last1=Machkovech|first1=Sam|title=Full transcript: Ars interviews 8chan founder Fredrick Brennan|url=http://arstechnica.com/business/2015/03/full-transcript-ars-interviews-8chan-founder-fredrick-brennan/|publisher=Ars Technica|accessdate=June 15, 2015|date=March 17, 2015}}&lt;/ref&gt; also known by the nickname &quot;Hotwheels.&quot;&lt;ref name=&quot;KYM&quot;/&gt; Brennan created the website after he observed what he perceived to be rapidly escalating [[surveillance]] and a loss of [[free speech]] on the Internet.&lt;ref name=Howell2014 /&gt; Brennan, who considers the imageboard [[4chan]] to have grown into authoritarianism, describes 8chan as a &quot;free-speech-friendly&quot; alternative,&lt;ref name=&quot;Howell2014&quot;&gt;{{cite web|last=Howell O'Neill|first=Patrick|date=November 17, 2014|url=http://www.dailydot.com/politics/8chan-pedophiles-child-porn-gamergate/|title=8chan, the central hive of Gamergate, is also an active pedophile network|work=The Daily Dot}}&lt;/ref&gt; and had originally conceptualized the site while experiencing a [[psychedelic experience|psychedelic mushrooms trip]].&lt;ref name=&quot;KYM&quot;/&gt;&lt;ref name=WashPost /&gt;<br /> <br /> No experience or programming knowledge is necessary for users to create their own boards.&lt;ref name=&quot;faq&quot; /&gt; Since as early as March 2014, its [[FAQ]] has stated only one rule that is to be globally enforced: &quot;Do not post, request, or link to any content illegal in the United States of America. Do not create boards with the sole purpose of posting or spreading such content.&quot;&lt;ref name=&quot;faq&quot; /&gt; Brennan has claimed that, while he finds some of the content posted by users to be &quot;reprehensible,&quot; he feels personally obligated to uphold the site's integrity by tolerating discussion he does not necessarily support regardless of his moral stance.&lt;ref name=Howell2014 /&gt;<br /> <br /> Brennan agreed to partner 8chan with the Japanese message board [[2channel]],&lt;ref name=&quot;KYM&quot;&gt;{{cite web|url=http://knowyourmeme.com/blog/interviews/qa-with-fredrick-brennan-of-8chan|title=Q&amp;A with Fredrick Brennan of 8chan|last=Caldwell|first=Don|date=October 9, 2014|work=[[Know Your Meme]]|accessdate=December 18, 2014}}&lt;/ref&gt; and subsequently relocated to the [[Philippines]] in October 2014.&lt;ref name=Chen /&gt;<br /> <br /> In January 2015, the site changed its [[Domain name|domain]] 8chan.co to 8ch.net after multiple people filed reports complaining to 8chan’s [[Domain name registrar|registrar]] that the message board hosted [[child pornography]]. Despite subsequently regaining the domain, the site remained at 8ch.net, with the old domain redirecting to it.&lt;ref name=WashPost /&gt;<br /> <br /> Numerous bugs in the Infinity software led to the funding and development of a successor platform dubbed &quot;Infinity Next&quot;. After a several-month-long testing period, a migration to the new software was attempted in December 2015, but failed.&lt;ref&gt;{{cite web |url=https://ghostbin.com/paste/qt2ww |format=Plaintext |title=qt2ww |last=Moon |first=Joshua |date=2015-12-19 |accessdate=2015-12-20 }}&lt;/ref&gt;{{clarify|date=December 2015}} Eventually, development was halted, and the main developer, Joshua Moon, fired by Brennan.&lt;ref&gt;{{cite web|last1=Brennan|first1=Fredrick|title=Infinity Never|url=https://medium.com/@infinitechan/infinity-never-3d5f733af739#.dfm7b7te5|website=Medium|accessdate=2 February 2016|language=English|date=26 January 2016}}&lt;/ref&gt;<br /> <br /> ==Controversies==<br /> <br /> ===Child pornography===<br /> ''[[The Washington Post]]'' described it as &quot;the more-lawless, more-libertarian, more 'free' follow-up to 4chan.&quot;&lt;ref name=&quot;WashPost&quot;&gt;{{cite web|url=http://www.washingtonpost.com/news/the-intersect/wp/2015/01/13/this-is-what-happens-when-you-create-an-online-community-without-any-rules/|title=This is what happens when you create an online community without any rules|work=[[The Washington Post]]|last=Caitlin|first=Dewey|date=January 13, 2015}}&lt;/ref&gt; Boards have been created to discuss controversial topics, including [[pedophilia]]. While the sharing of illegal content is against site rules, ''[[The Daily Dot]]'' wrote that boards do exist to share sexualized images of minors in provocative poses, and that some users of those boards do post links to explicit child pornography hosted elsewhere.&lt;ref name=&quot;Howell2014&quot;/&gt; When asked whether such boards were an inevitable result of free speech, Brennan responded, &quot;Unfortunately, yes. I don’t support the content on the boards you mentioned, but it is simply the cost of free speech and being the only active site to not impose more 'laws' than those that were passed in [[Washington, D.C.]]&quot;&lt;ref name=&quot;Howell2014&quot;/&gt;<br /> <br /> In August 2015, for a brief period, 8chan was blacklisted from [[Google Search]] for containing content constituting &quot;suspected child abuse content.&quot;&lt;ref name=ars-8chancensor&gt;{{cite web|title=8chan-hosted content disappears from Google searches|url=http://arstechnica.com/tech-policy/2015/08/8chan-hosted-content-disappears-from-google-searches/|last=Machkovech|first=Sam|website=[[Ars Technica]]|publisher=[[Condé Nast]]|date=August 14, 2015|accessdate=August 17, 2015}}&lt;/ref&gt; It was later restored to the search engine's listings without explanation.&lt;ref&gt;{{Cite web|url = https://medium.com/@infinitechan/google-is-not-your-friend-5a6636af0651|title = Google is not your friend?|date = August 13, 2015|accessdate = September 9, 2015|website = Medium|publisher = |last = Brennan|first = Frederick}}&lt;/ref&gt;<br /> <br /> ===Gamergate===<br /> {{main|Gamergate controversy}}<br /> On September 18, 2014, the website gained prominence in the [[Gamergate controversy]] after 4chan banned discussion of Gamergate,&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;/&gt;&lt;ref&gt;{{cite news|last=Audureau|first=William|title=4chan, wizardchan, 8chan... s'y retrouver dans la jungle des forums anonymes les plus populaires du Web|url=http://www.lemonde.fr/pixels/article/2014/10/15/4chan-wizardchan-8chan-le-guide-des-forums-anonymes-les-plus-populaires-du-web_4505380_4408996.html|work=[[Le Monde]]|location=France|language=French|date=October 15, 2014}}&lt;/ref&gt; whereupon 8chan became one of several hubs of Gamergate activity.&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;&gt;{{cite web|last=Chen|first=Adrian|date=October 27, 2014|url=http://nymag.com/daily/intelligencer/2014/10/gamergate-supporters-party-at-strip-club.html|title=Gamergate Supporters Partied at a Strip Club This Weekend|work=[[New York (magazine)]]}}&lt;/ref&gt;&lt;ref name=&quot;Buzz&quot;/&gt;&lt;ref name=&quot;Guardian 2015-01-13&quot; /&gt; &quot;/gg/,&quot; 8chan's initial Gamergate-oriented board, also gained attention after being compromised by members of the internet troll group [[Gay Nigger Association of America]], forcing Gamergate activists to migrate to &quot;/gamergate/.&quot; This replacement quickly became the site's second most populous board.&lt;ref name=&quot;Buzz&quot;&gt;{{cite web|last1=Bernstein|first1=Joseph|title=GamerGate’s Headquarters Has Been Destroyed By Trolls|url=http://www.buzzfeed.com/josephbernstein/gamergates-headquarters-has-been-destroyed-by-trolls|publisher=''[[Buzzfeed]]''|date=December 4, 2014}}&lt;/ref&gt;<br /> <br /> ===Swatting incidents===<br /> In January 2015 the site was used as a base for [[swatting]] exploits in [[Portland, Oregon|Portland]], [[Seattle]], and [[Burnaby|Burnaby, British Columbia]], most of them tied to the victims' criticism of Gamergate and 8chan's association with it;&lt;ref name=&quot;Mattise&quot;&gt;{{cite web|last=Mattise|first=Nathan|date=January 4, 2015|url=http://arstechnica.com/tech-policy/2015/01/8chan-tries-swatting-gamergate-critic-sends-cops-to-an-old-address/|title=8chan tries &quot;swatting&quot; GamerGate critic, sends cops to an old address|work=[[Ars Technica]]}}&lt;/ref&gt; the attacks were coordinated on a [[Internet forum|board]] on the website called &quot;/baphomet/.&quot;&lt;ref name=&quot;Guardian 2015-01-13&quot;&gt;{{cite news |last=Hern |first=Alex |url=http://www.theguardian.com/technology/2015/jan/13/gamergate-hits-new-low-with-attempts-to-send-swat-teams-to-critics |title=Gamergate hits new low with attempts to send Swat teams to critics |work=[[The Guardian]] |date=January 13, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt; One of the victims of a swatting attack said that she was singled out because she had followed someone on [[Twitter]].&lt;ref name=&quot;GlobalNews 2015-01-15&quot;&gt;{{cite news |last=McElroy |first=Justin |url=http://globalnews.ca/news/1773840/police-called-to-burnaby-womens-home-by-online-harassers/ |title=Police falsely called to Burnaby women’s home by online harassers |work=[[Global News]] |date=January 15, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt;&lt;ref&gt;{{cite web|url=http://www.gameranx.com/updates/id/26081/article/canadian-victim-of-gamergate-swatting-attempt-comes-forward/|title=Canadian Victim of Gamergate SWATing Attempt Comes Forward|work=Gameranx|last=Cheong|first=Ian Miles|date=January 13, 2015|accessdate=January 16, 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://bc.ctvnews.ca/reckless-swatting-prank-sends-police-to-b-c-woman-s-home-1.2189547|title=Reckless ‘swatting’ prank sends police to B.C. woman’s home|work=[[CTV News]]|date=January 14, 2015|accessdate=September 30, 2015|author=&lt;!-- Staff writers --&gt;}}&lt;/ref&gt; On February 9, 2015, contents on the &quot;/baphomet/&quot; subboard were wiped after [[doxxing|personal information]] of [[Katherine B. Forrest|Katherine Forrest]], the presiding judge in the [[Silk Road (marketplace)|Silk Road]] case, had been posted there.&lt;ref name=&quot;silkroad&quot;&gt;{{Cite web| title = Notorious 8chan &quot;subboard&quot; has history wiped after federal judge’s doxing| first = Sam |last = Machkovech|work = Ars Technica| date = February 12, 2015| accessdate = February 13, 2015| url = http://arstechnica.com/security/2015/02/notorious-8chan-subboard-has-history-wiped-after-federal-judges-doxing/}}&lt;/ref&gt;<br /> <br /> ===Los Angeles school-closure incident===<br /> [[File:CWh686mUwAEQLoj.png|thumb|upright=0.35|alt=Photograph of Vincent Canfield|Owner and operator of cock.li, Vincent Canfield]]<br /> On Tuesday, December 15, 2015, the New York City and Los Angeles County Boards of Education were both sent a superficially threatening, but actually fraudulent, e-mail message that had originated from an 8chan-linked service called &quot;cock.li&quot;. The New York City school board did not take the message seriously, but the Los Angeles County school board refused to take the chance and ordered all public schools closed for the entire day, citing what it called a &quot;credible terror threat.&quot; Sam Biddle, a contributor to [[Gawker.com]], called the message &quot;extremely dumb&quot; in an article on the site he filed under &quot;Pranks,&quot; writing:<br /> {{cquote|Even if this message hadn’t been sent from a “cock.li” email account, it would’ve been hard to imagine it was a credible threat of violence, particularly since it conflates 4chan-style “death to the normies” rhetoric with convoluted Islamism. It looks very much like the work of a kid who really didn’t want to go to school.}}<br /> In the article, which he titled “Here’s the Full, Extremely Dumb Email That Shut Down the Entire L.A. Public School System,” Biddle quoted the e-mail message itself, word for word.&lt;ref&gt;{{Cite web| title = Here’s the Full, Extremely Dumb Email That Shut Down the Entire L.A. Public School System| first = Sam |last = Biddle|work = Gawker| date = December 16, 2015| accessdate = December 16, 2015| url = http://gawker.com/heres-the-full-extremely-dumb-email-that-shut-down-the-1748402588/}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Bluestone, Gabrielle|title=Bicoastal School Bomb Threats Were Sent From an 8Chan-Linked &quot;Cockmail&quot; Service|url=http://gawker.com/bicoastal-school-bomb-threats-sent-from-8chan-linked-c-1748175650|publisher=Gawker|accessdate=4 January 2016|date=15 December 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Farivar, Cyrus|title=All LA schools shut down over message sent from 8chan’s e-mail host, cock.li|url=http://arstechnica.com/tech-policy/2015/12/all-la-schools-shut-down-over-message-sent-from-8chans-e-mail-host-cock-li/|website=Ars Technica|publisher=Condé Nast|accessdate=4 January 2016|date=16 December 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Neff, Blake|title=LA School Threat Came From Online ‘Meme Sewer’|url=http://dailycaller.com/2015/12/15/la-school-threat-came-from-online-meme-sewer/|publisher=The Daily Caller|accessdate=4 January 2016|date=12 December 2015}}&lt;/ref&gt;<br /> <br /> === Minor incidents ===<br /> 8chan users proposed to actualize a [[White nationalism|white-only nation]] in Africa named &quot;Namibia&quot;.&lt;ref&gt;{{cite news |url=http://www.vice.com/read/white-colony-in-namibia-773 |title=Internet Neo-Nazis Are Trying to Build a White Supremacist Utopia in Namibia |author=Tom Sanders |date=February 12, 2015}}&lt;/ref&gt; Users [[Internet troll|trolled]] the French Girls iPhone app by drawing derogatory images of other people using the app (mainly racially offensive images of [[Person of color|people of color]]).&lt;ref&gt;{{cite news |title=Trolls Are Already Ruining The Internet's Nice New Thing |url=https://www.buzzfeed.com/josephbernstein/hateful-losers-are-already-ruining-the-internets-nice-new-th |date=June 9, 2015 |author=Joseph Bernstein}}&lt;/ref&gt;<br /> <br /> ==References==<br /> {{Reflist|30em}}<br /> <br /> ==External links==<br /> * {{Official website}}<br /> <br /> {{Gamergate controversy}}<br /> {{Tor hidden services}}<br /> <br /> {{DEFAULTSORT:8chan}}<br /> [[Category:2channel]]<br /> [[Category:American websites]]<br /> [[Category:Community websites]]<br /> [[Category:Free web software]]<br /> [[Category:Internet forums]]<br /> [[Category:Imageboards]]<br /> [[Category:Internet properties established in 2013]]<br /> [[Category:Obscenity controversies]]<br /> [[Category:Tor hidden services]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=8kun&diff=187755824 8kun 2016-06-07T22:10:43Z <p>Dsprc: </p> <hr /> <div>{{other uses|8chan (disambiguation)}}<br /> {{Use mdy dates|date=September 2015}}<br /> {{Infobox website<br /> | name = 8chan<br /> | logo = InfiniteChan∞chanLogo.svg<br /> | logo alt = A green infinity symbol left of the word chan.<br /> | logo caption = <br /> | logo size = 200px<br /> | screenshot = <br /> | alt = <br /> | caption = <br /> | url = {{URL|https://8ch.net}}<br /> | slogan = <br /> | commercial = Yes<br /> | type = [[Imageboard]]<br /> | language = English, Japanese (users can create language specific boards)<br /> | registration = Optional<br /> | author = [[Fredrick Brennan]]<br /> | owner = [[:ja:ジム・ワトキンス|Jim Watkins]],&lt;br /&gt; N.T. Technology ([[2channel]])&lt;ref&gt;[https://8ch.net/who.html 8chan] - Who owns 8chan?&lt;/ref&gt;<br /> | launch date = {{start date and age|2013|10|22|df=no}}<br /> | alexa = {{IncreaseNegative}} 10,084 ({{as of|2015|8|22|alt=August 2015}})&lt;ref name=&quot;alexa&quot;&gt;{{cite web|url= http://www.alexa.com/siteinfo/8ch.net |title= 8ch.net Site Info | publisher= [[Alexa Internet]] |accessdate= August 22, 2015 }}&lt;/ref&gt;<br /> | current status = Online<br /> }}<br /> <br /> '''8chan,''' also called '''Infinitechan,''' is an [[English language|English-language]] [[imageboard]] website composed of user-created [[Internet forum|boards]]. Each board is moderated by its respective creator, with minimal interaction from other site administration.&lt;ref name=&quot;faq&quot;&gt;{{cite web|last=Brennan|first=Fredrick|url=https://8ch.net/faq.html|title=FAQ|publisher=Infinitechan|website=8chan.co|accessdate=November 23, 2014}}&lt;/ref&gt;<br /> <br /> The site has received both praise and criticism for its stance on [[Freedom of speech|free speech]], which involves allowing any content to be posted, so long as it adheres to United States law.<br /> <br /> Several sites's boards have played an active role in the [[Gamergate controversy]], encouraging Gamergate affiliates to frequent 8chan after the topic was banned on the unaffiliated imageboard [[4chan]]. As of August 2015, the site was the 10,204th most visited site in the world,&lt;ref name=&quot;alexa&quot; /&gt; and in November 2014, it was receiving an average of 35,000 unique visitors per day and 400,000 posts per week when it was at a higher rank.&lt;ref name=Howell2014 /&gt;<br /> <br /> ==History==<br /> 8chan was created in October 2013 by computer programmer [[Fredrick Brennan]],&lt;ref name=Howell2014 /&gt;&lt;ref&gt;{{cite web|last1=Machkovech|first1=Sam|title=Full transcript: Ars interviews 8chan founder Fredrick Brennan|url=http://arstechnica.com/business/2015/03/full-transcript-ars-interviews-8chan-founder-fredrick-brennan/|publisher=Ars Technica|accessdate=June 15, 2015|date=March 17, 2015}}&lt;/ref&gt; also known by the nickname &quot;Hotwheels.&quot;&lt;ref name=&quot;KYM&quot;/&gt; Brennan created the website after he observed what he perceived to be rapidly escalating [[surveillance]] and a loss of [[free speech]] on the Internet.&lt;ref name=Howell2014 /&gt; Brennan, who considers the imageboard [[4chan]] to have grown into authoritarianism, describes 8chan as a &quot;free-speech-friendly&quot; alternative,&lt;ref name=&quot;Howell2014&quot;&gt;{{cite web|last=Howell O'Neill|first=Patrick|date=November 17, 2014|url=http://www.dailydot.com/politics/8chan-pedophiles-child-porn-gamergate/|title=8chan, the central hive of Gamergate, is also an active pedophile network|work=The Daily Dot}}&lt;/ref&gt; and had originally conceptualized the site while experiencing a [[psychedelic experience|psychedelic mushrooms trip]].&lt;ref name=&quot;KYM&quot;/&gt;&lt;ref name=WashPost /&gt;<br /> <br /> No experience or programming knowledge is necessary for users to create their own boards.&lt;ref name=&quot;faq&quot; /&gt; Since as early as March 2014, its [[FAQ]] has stated only one rule that is to be globally enforced: &quot;Do not post, request, or link to any content illegal in the United States of America. Do not create boards with the sole purpose of posting or spreading such content.&quot;&lt;ref name=&quot;faq&quot; /&gt; Brennan has claimed that, while he finds some of the content posted by users to be &quot;reprehensible,&quot; he feels personally obligated to uphold the site's integrity by tolerating discussion he does not necessarily support regardless of his moral stance.&lt;ref name=Howell2014 /&gt;<br /> <br /> Brennan agreed to partner 8chan with the Japanese message board [[2channel]],&lt;ref name=&quot;KYM&quot;&gt;{{cite web|url=http://knowyourmeme.com/blog/interviews/qa-with-fredrick-brennan-of-8chan|title=Q&amp;A with Fredrick Brennan of 8chan|last=Caldwell|first=Don|date=October 9, 2014|work=[[Know Your Meme]]|accessdate=December 18, 2014}}&lt;/ref&gt; and subsequently relocated to the [[Philippines]] in October 2014.&lt;ref name=Chen /&gt;<br /> <br /> In January 2015, the site changed its [[Domain name|domain]] 8chan.co to 8ch.net after multiple people filed reports complaining to 8chan’s [[Domain name registrar|registrar]] that the message board hosted [[child pornography]]. Despite subsequently regaining the domain, the site remained at 8ch.net, with the old domain redirecting to it.&lt;ref name=WashPost /&gt;<br /> <br /> Numerous bugs in the Infinity software led to the funding and development of a successor platform dubbed &quot;Infinity Next&quot;. After a several-month-long testing period, a migration to the new software was attempted in December 2015, but failed.&lt;ref&gt;{{cite web |url=https://ghostbin.com/paste/qt2ww |format=Plaintext |title=qt2ww |last=Moon |first=Joshua |date=2015-12-19 |accessdate=2015-12-20 }}&lt;/ref&gt;{{clarify|date=December 2015}} Eventually, development was halted, and the main developer, Joshua Moon, fired by Brennan.&lt;ref&gt;{{cite web|last1=Brennan|first1=Fredrick|title=Infinity Never|url=https://medium.com/@infinitechan/infinity-never-3d5f733af739#.dfm7b7te5|website=Medium|accessdate=2 February 2016|language=English|date=26 January 2016}}&lt;/ref&gt;<br /> <br /> ==Controversies==<br /> <br /> ===Child pornography===<br /> ''[[The Washington Post]]'' described it as &quot;the more-lawless, more-libertarian, more 'free' follow-up to 4chan.&quot;&lt;ref name=&quot;WashPost&quot;&gt;{{cite web|url=http://www.washingtonpost.com/news/the-intersect/wp/2015/01/13/this-is-what-happens-when-you-create-an-online-community-without-any-rules/|title=This is what happens when you create an online community without any rules|work=[[The Washington Post]]|last=Caitlin|first=Dewey|date=January 13, 2015}}&lt;/ref&gt; Boards have been created to discuss controversial topics, including [[pedophilia]]. While the sharing of illegal content is against site rules, ''[[The Daily Dot]]'' wrote that boards do exist to share sexualized images of minors in provocative poses, and that some users of those boards do post links to explicit child pornography hosted elsewhere.&lt;ref name=&quot;Howell2014&quot;/&gt; When asked whether such boards were an inevitable result of free speech, Brennan responded, &quot;Unfortunately, yes. I don’t support the content on the boards you mentioned, but it is simply the cost of free speech and being the only active site to not impose more 'laws' than those that were passed in [[Washington, D.C.]]&quot;&lt;ref name=&quot;Howell2014&quot;/&gt;<br /> <br /> In August 2015, for a brief period, 8chan was blacklisted from [[Google Search]] for containing content constituting &quot;suspected child abuse content.&quot;&lt;ref name=ars-8chancensor&gt;{{cite web|title=8chan-hosted content disappears from Google searches|url=http://arstechnica.com/tech-policy/2015/08/8chan-hosted-content-disappears-from-google-searches/|last=Machkovech|first=Sam|website=[[Ars Technica]]|publisher=[[Condé Nast]]|date=August 14, 2015|accessdate=August 17, 2015}}&lt;/ref&gt; It was later restored to the search engine's listings without explanation.&lt;ref&gt;{{Cite web|url = https://medium.com/@infinitechan/google-is-not-your-friend-5a6636af0651|title = Google is not your friend?|date = August 13, 2015|accessdate = September 9, 2015|website = Medium|publisher = |last = Brennan|first = Frederick}}&lt;/ref&gt;<br /> <br /> ===Gamergate===<br /> {{main|Gamergate controversy}}<br /> On September 18, 2014, the website gained prominence in the [[Gamergate controversy]] after 4chan banned discussion of Gamergate,&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;/&gt;&lt;ref&gt;{{cite news|last=Audureau|first=William|title=4chan, wizardchan, 8chan... s'y retrouver dans la jungle des forums anonymes les plus populaires du Web|url=http://www.lemonde.fr/pixels/article/2014/10/15/4chan-wizardchan-8chan-le-guide-des-forums-anonymes-les-plus-populaires-du-web_4505380_4408996.html|work=[[Le Monde]]|location=France|language=French|date=October 15, 2014}}&lt;/ref&gt; whereupon 8chan became one of several hubs of Gamergate activity.&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;&gt;{{cite web|last=Chen|first=Adrian|date=October 27, 2014|url=http://nymag.com/daily/intelligencer/2014/10/gamergate-supporters-party-at-strip-club.html|title=Gamergate Supporters Partied at a Strip Club This Weekend|work=[[New York (magazine)]]}}&lt;/ref&gt;&lt;ref name=&quot;Buzz&quot;/&gt;&lt;ref name=&quot;Guardian 2015-01-13&quot; /&gt; &quot;/gg/,&quot; 8chan's initial Gamergate-oriented board, also gained attention after being compromised by members of the internet troll group [[Gay Nigger Association of America]], forcing Gamergate activists to migrate to &quot;/gamergate/.&quot; This replacement quickly became the site's second most populous board.&lt;ref name=&quot;Buzz&quot;&gt;{{cite web|last1=Bernstein|first1=Joseph|title=GamerGate’s Headquarters Has Been Destroyed By Trolls|url=http://www.buzzfeed.com/josephbernstein/gamergates-headquarters-has-been-destroyed-by-trolls|publisher=''[[Buzzfeed]]''|date=December 4, 2014}}&lt;/ref&gt;<br /> <br /> ===Swatting incidents===<br /> In January 2015 the site was used as a base for [[swatting]] exploits in [[Portland, Oregon|Portland]], [[Seattle]], and [[Burnaby|Burnaby, British Columbia]], most of them tied to the victims' criticism of Gamergate and 8chan's association with it;&lt;ref name=&quot;Mattise&quot;&gt;{{cite web|last=Mattise|first=Nathan|date=January 4, 2015|url=http://arstechnica.com/tech-policy/2015/01/8chan-tries-swatting-gamergate-critic-sends-cops-to-an-old-address/|title=8chan tries &quot;swatting&quot; GamerGate critic, sends cops to an old address|work=[[Ars Technica]]}}&lt;/ref&gt; the attacks were coordinated on a [[Internet forum|board]] on the website called &quot;/baphomet/.&quot;&lt;ref name=&quot;Guardian 2015-01-13&quot;&gt;{{cite news |last=Hern |first=Alex |url=http://www.theguardian.com/technology/2015/jan/13/gamergate-hits-new-low-with-attempts-to-send-swat-teams-to-critics |title=Gamergate hits new low with attempts to send Swat teams to critics |work=[[The Guardian]] |date=January 13, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt; One of the victims of a swatting attack said that she was singled out because she had followed someone on [[Twitter]].&lt;ref name=&quot;GlobalNews 2015-01-15&quot;&gt;{{cite news |last=McElroy |first=Justin |url=http://globalnews.ca/news/1773840/police-called-to-burnaby-womens-home-by-online-harassers/ |title=Police falsely called to Burnaby women’s home by online harassers |work=[[Global News]] |date=January 15, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt;&lt;ref&gt;{{cite web|url=http://www.gameranx.com/updates/id/26081/article/canadian-victim-of-gamergate-swatting-attempt-comes-forward/|title=Canadian Victim of Gamergate SWATing Attempt Comes Forward|work=Gameranx|last=Cheong|first=Ian Miles|date=January 13, 2015|accessdate=January 16, 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://bc.ctvnews.ca/reckless-swatting-prank-sends-police-to-b-c-woman-s-home-1.2189547|title=Reckless ‘swatting’ prank sends police to B.C. woman’s home|work=[[CTV News]]|date=January 14, 2015|accessdate=September 30, 2015|author=&lt;!-- Staff writers --&gt;}}&lt;/ref&gt; On February 9, 2015, contents on the &quot;/baphomet/&quot; subboard were wiped after [[doxxing|personal information]] of [[Katherine B. Forrest|Katherine Forrest]], the presiding judge in the [[Silk Road (marketplace)|Silk Road]] case, had been posted there.&lt;ref name=&quot;silkroad&quot;&gt;{{Cite web| title = Notorious 8chan &quot;subboard&quot; has history wiped after federal judge’s doxing| first = Sam |last = Machkovech|work = Ars Technica| date = February 12, 2015| accessdate = February 13, 2015| url = http://arstechnica.com/security/2015/02/notorious-8chan-subboard-has-history-wiped-after-federal-judges-doxing/}}&lt;/ref&gt;<br /> <br /> ===Los Angeles school-closure incident===<br /> [[File:CWh686mUwAEQLoj.png|thumb|upright=0.35|alt=Photograph of Vincent Canfield|Owner and operator of cock.li, Vincent Canfield]]<br /> On Tuesday, December 15, 2015, the New York City and Los Angeles County Boards of Education were both sent a superficially threatening, but actually fraudulent, e-mail message that had originated from an 8chan-linked service called &quot;cock.li&quot;. The New York City school board did not take the message seriously, but the Los Angeles County school board refused to take the chance and ordered all public schools closed for the entire day, citing what it called a &quot;credible terror threat.&quot; Sam Biddle, a contributor to [[Gawker.com]], called the message &quot;extremely dumb&quot; in an article on the site he filed under &quot;Pranks,&quot; writing:<br /> {{cquote|Even if this message hadn’t been sent from a “cock.li” email account, it would’ve been hard to imagine it was a credible threat of violence, particularly since it conflates 4chan-style “death to the normies” rhetoric with convoluted Islamism. It looks very much like the work of a kid who really didn’t want to go to school.}}<br /> In the article, which he titled “Here’s the Full, Extremely Dumb Email That Shut Down the Entire L.A. Public School System,” Biddle quoted the e-mail message itself, word for word.&lt;ref&gt;{{Cite web| title = Here’s the Full, Extremely Dumb Email That Shut Down the Entire L.A. Public School System| first = Sam |last = Biddle|work = Gawker| date = December 16, 2015| accessdate = December 16, 2015| url = http://gawker.com/heres-the-full-extremely-dumb-email-that-shut-down-the-1748402588/}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Bluestone, Gabrielle|title=Bicoastal School Bomb Threats Were Sent From an 8Chan-Linked &quot;Cockmail&quot; Service|url=http://gawker.com/bicoastal-school-bomb-threats-sent-from-8chan-linked-c-1748175650|publisher=Gawker|accessdate=4 January 2016|date=15 December 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Farivar, Cyrus|title=All LA schools shut down over message sent from 8chan’s e-mail host, cock.li|url=http://arstechnica.com/tech-policy/2015/12/all-la-schools-shut-down-over-message-sent-from-8chans-e-mail-host-cock-li/|website=Ars Technica|publisher=Condé Nast|accessdate=4 January 2016|date=16 December 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Neff, Blake|title=LA School Threat Came From Online ‘Meme Sewer’|url=http://dailycaller.com/2015/12/15/la-school-threat-came-from-online-meme-sewer/|publisher=The Daily Caller|accessdate=4 January 2016|date=12 December 2015}}&lt;/ref&gt;<br /> <br /> === Minor incidents ===<br /> 8chan users proposed to actualize a [[White nationalism|white-only nation]] in Africa named &quot;Namibia&quot;.&lt;ref&gt;{{cite news |url=http://www.vice.com/read/white-colony-in-namibia-773 |title=Internet Neo-Nazis Are Trying to Build a White Supremacist Utopia in Namibia |author=Tom Sanders |date=February 12, 2015}}&lt;/ref&gt; Users [[Internet troll|trolled]] the French Girls iPhone app by drawing derogatory images of other people using the app (mainly racially offensive images of [[Person of color|people of color]]).&lt;ref&gt;{{cite news |title=Trolls Are Already Ruining The Internet's Nice New Thing |url=https://www.buzzfeed.com/josephbernstein/hateful-losers-are-already-ruining-the-internets-nice-new-th |date=June 9, 2015 |author=Joseph Bernstein}}&lt;/ref&gt;<br /> <br /> ==References==<br /> {{Reflist|30em}}<br /> <br /> ==External links==<br /> * {{Official website}}<br /> <br /> {{Gamergate controversy}}<br /> {{Tor hidden services}}<br /> <br /> {{DEFAULTSORT:8chan}}<br /> [[Category:2channel]]<br /> [[Category:American websites]]<br /> [[Category:Community websites]]<br /> [[Category:Free web software]]<br /> [[Category:Internet forums]]<br /> [[Category:Imageboards]]<br /> [[Category:Internet properties established in 2013]]<br /> [[Category:Obscenity controversies]]<br /> [[Category:Tor hidden services]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=Linux-Distribution&diff=154996359 Linux-Distribution 2016-06-04T23:50:55Z <p>Dsprc: /* Smartphone-Distributionen */</p> <hr /> <div>[[Datei:Tux.svg|mini|Das Linux-Maskottchen [[Tux (Maskottchen)|Tux]]]]<br /> Eine '''Linux-Distribution''' ist ein Komplettpaket von aufeinander abgestimmter [[Linux]]-[[Software]]. Es besteht je nach Distribution aus folgenden Teilen:<br /> * Betriebssystem<br /> ** [[Kernel (Betriebssystem)|Betriebssystemkern]] ([[Linux (Kernel)|Linux-Kernel]])<br /> ** [[Kernel-Modul|Kernelmodule]]<br /> ** essenzielle [[Programmbibliothek|Bibliotheken]]<br /> ** essenzielle [[Computerprogramm|Programme]]<br /> * weitere Programme<br /> * weitere Bibliotheken<br /> * [[Quelltext#Lizenzierung|Quelltexte]]<br /> * Dokumentation<br /> <br /> Die [[Distribution (Software)|Distributionen]], in denen [[GNU]]-Programme enthalten sind, werden auch als '''GNU/Linux-Distributionen''' bezeichnet. Die Namensgebung mit oder ohne GNU-Namenszusatz wird von den Distributoren je nach ihrer Position im [[GNU/Linux-Namensstreit]] unterschiedlich gehandhabt.<br /> <br /> Fast jede Distribution ist um eine [[Paketverwaltung]] herum zusammengestellt, d.&amp;nbsp;h., dass sämtliche Bestandteile der Installation (einschließlich des Linux-Kernels, der Ordnerstruktur und der Paketverwaltung) als Pakete vorliegen und sich über den Paketmanager installieren, deinstallieren und auch updaten lassen. Die Pakete werden dazu online in sogenannten [[Repository|Repositories]] vorgehalten.<br /> <br /> Eine Linux-Distribution wird vom bereits erwähnten Distributor zusammengestellt, bedingt durch den Umstand, dass der Linux Kernel und der überwiegende Anteil der Programme freie Software sind und somit die Weitergabe und Verbreitung durch Dritte ausdrücklich erlaubt ist. Der Distributor wählt sich beliebige Software aus dem ganzen Pool an verfügbarer freier Software aus, passt diese mehr oder weniger an seine Vorstellungen an, paketiert diese für die Paketverwaltung seiner Wahl und bietet das Ergebnis, die Linux-Distribution, aller Welt oder Kunden an. Lediglich wenige Programme werden vom Distributor selbst geschrieben, z.&amp;nbsp;B. meist die [[Installer]]. Der Distributor kann ein Unternehmen oder eine Gruppe von weltweit verteilten Freiwilligen sein und er kann kommerziellen Support anbieten.<br /> <br /> == Konzept ==<br /> <br /> Aufgabe eines Linux-Distributors ist die Zusammenstellung eines für den vorgesehenen Anwendungszweck verwendbaren Gesamtsystems aus Software von anderen Softwareherstellern, um dieses dann als sogenannte Distribution anzubieten. Den zentralen Teil bilden dabei der [[Linux (Kernel)|Linux-Kernel]] selbst sowie Systemprogramme und Bibliotheken. Je nach dem vorgesehenen Anwendungszweck der Distribution werden verschiedene [[Anwendungssoftware|Anwendungsprogramme]] (z.&amp;nbsp;B. [[Webbrowser]], [[Office-Paket|Office-Anwendungen]], [[Grafiksoftware|Zeichenprogramme]], [[Mediaplayer]] etc.) hinzugefügt.<br /> <br /> Linux-Distributionen halten in der Regel eine große Anzahl an Programmen in den Repositories zur Installation bereit. Dies steht im konzeptuellen Gegensatz zu anderen Betriebssystemen wie [[Microsoft Windows|Windows]] und [[OS X]], die neben dem Betriebssystem selbst nur wenige Anwendungen enthalten, dafür auf die Integration von Programmen von externen Anbietern, sogenannten [[Independent Software Vendor|ISVs]], setzen.<br /> <br /> Ein Differenzierungsmerkmal der Distributionen untereinander sind die Unterstützungszeiträume bzw. die Update-Zyklen. Es existieren Distributionen, bei denen dieselbe Version über mehr als 7 Jahre mit Updates versorgt wird, (z.&amp;nbsp;B. [[Red Hat Enterprise Linux|RHEL]]) während bei anderen schon nach einem halben Jahr zu einem Update auf die nächste Version geraten wird. Andere Distributionen haben gar keine Versionen, sondern sind sogenannte ''[[Rolling Release]]s'' (z.&amp;nbsp;B. [[Arch Linux]]), welche permanent Systemteile und Anwendungen erneuern.<br /> <br /> Weitere Unterschiede zwischen den Distributionen können bezüglich der Lizenzpolitik gesehen werden. Einige Distributionen integrieren ausschließlich [[Freie Software]]. Binär vertriebene proprietäre Software wird nicht in einer solchen Distribution zugelassen. Andere integrieren auch [[Proprietäre Software]].<br /> <br /> Weitere Aufgaben der Distributionen sind die Anpassung der Programme (durch [[Patch (Software)|Patchen]]), Hinzugabe von eigenen Programmentwicklungen (vor allem zur Installation und Konfiguration des Systems wie zum Beispiel [[Advanced Packaging Tool|apt]], [[Synaptic]], [[YaST]]) sowie (bis auf wenige Ausnahmen, z.&amp;nbsp;B. [[Gentoo Linux|Gentoo]]) Kompilierung und Paketierung ([[Debian-Paket|.deb]], [[RPM Package Manager|.rpm]]) der Programme. Die Bereitstellung von zusätzlichen Programmen und Updates erfolgt typischerweise zentral über ein [[Repository]], welches über ein [[Paketverwaltung]]s-System mit dem Betriebssystem synchronisiert wird.<br /> <br /> Auch wenn Linux-Betriebssysteme in der Form einer Distribution die bei weitem üblichste Variante ist, ist ein Betrieb von Linux auch ohne eine vorgefertigte Distribution möglich, wie das Projekt [[Linux From Scratch]] zeigt.<br /> <br /> === Zusammensetzung ===<br /> <br /> [[Datei:Linux-Distribution.svg|mini|Bestandteile einer Linux-Distribution]]<br /> Neben dem Linux-Kernel besteht eine Distribution meist aus der [[GNU]]-Software-Umgebung, die das grundlegende Basissystem mit den zahlreichen Systemdiensten (sogenannte [[Daemon]]s) sowie diverse Anwendungen bereitstellt, die bei einem [[Unixoides System|unixoiden System]] erwartet werden. Distributionen, welche auch oder nur für Desktop-Systeme gedacht sind, verfügen meist über ein [[X Window System]]. Ein solches ist für das Ausführen einer [[Grafische Benutzeroberfläche|grafischen Benutzeroberfläche]] erforderlich. Darauf aufbauend steht meist eine [[Desktop-Umgebung]], wie bspw. [[Gnome]] oder die [[KDE Software Compilation 4|KDE Software Compilation]] zur Verfügung, welche neben der reinen Benutzeroberfläche noch eine Vielzahl an [[Anwendungssoftware|Anwendungsprogrammen]] mitbringt.<br /> <br /> Ergänzend fügt ein Distributor normalerweise zahlreiche weitere Anwendungen bei. Dies sind beispielsweise [[Office-Paket]]e, Multimediasoftware, [[Editor (Software)|Editoren]], [[E-Mail-Programm]]e, [[Webbrowser|Browser]], aber auch [[Server]]-Dienste. Daneben finden sich meist Softwareentwicklungs-Werkzeuge wie [[Compiler]] bzw. [[Interpreter]] sowie Editoren.<br /> <br /> Viele Softwarebestandteile (z.&amp;nbsp;B. der [[Compiler]] [[GNU Compiler Collection|GCC]]), aus denen Linux-Distributionen bestehen, stammen aus dem älteren GNU-Projekt. Dieses hatte sich schon vor der Entwicklung von Linux die Aufgabe gestellt, eine Alternative zu den kommerziellen [[Unix]]-Betriebssystemen zu entwickeln. Da der eigene Kernel des GNU-Projekts, [[GNU Hurd]], beim Erscheinen von Linux noch in der Entwicklung war, wurde als verfügbarer Ersatz der Linux-Kernel verwendet. Daher ist auch der Doppelname ''GNU/Linux'' für eine Distribution geläufig (z.&amp;nbsp;B. bei [[Debian]]).<br /> <br /> Es gibt auch Linux-Distributionen, die auf die GNU-Softwareanteile oder ein [[X Window System]] komplett verzichten und alternative Software an deren Stelle nutzen. Diese Distributionen verhalten sich, wie beispielsweise [[FreeVMS]] oder [[BeOS#Cosmoe|Cosmoe]], teilweise auch nicht annähernd wie ein Unix-System.<br /> <br /> === Vertrieb ===<br /> <br /> Während proprietäre Betriebssysteme häufig über den [[Einzelhandel]] vertrieben werden, ist dies bei Linux-Distributionen eher die Ausnahme. Die meisten Distributionen können heute kostenlos von der [[Website]] der Anbieter heruntergeladen werden. Diese finanzieren sich über Spenden, über kostenpflichtigen [[Support (Dienstleistung)|Support]] oder auch einfach nur über die Beteiligung von Freiwilligen. Nur vergleichsweise wenige Distributionen werden von gewinnorientierten Firmen entwickelt und sind teilweise über den Einzelhandel verfügbar. Zahlreiche Linux-Distributionen werden auch, von den Kunden unbemerkt, als [[Firmware]] auf einem [[Gerät]] oder sogar in größeren [[Maschine]]n oder [[Anlage (Technik)|Anlagen]] erworben. Dabei kann es sich z.&amp;nbsp;B. um [[Werkzeugmaschine]]n, [[Fahrzeug]]e, [[Haushaltsgerät]]e, [[Speicherprogrammierbare Steuerung|SPS]], [[Messgerät]]e, [[Mobiltelefon]]e, [[Modem]]s, [[Digitalkamera]]s, [[Network Attached Storage|NAS]] oder [[Fernsehgerät|Fernseher]] handeln.<br /> <br /> == Geschichte ==<br /> <br /> {{Hauptartikel|Geschichte von Linux}}<br /> <br /> [[Datei:Linux Distribution Timeline.svg|mini|upright|Zeitleiste mit der Entwicklung verschiedener Linux-Distributionen]]<br /> Da [[Linux]] nur ein Betriebssystem-[[Kernel (Betriebssystem)|Kernel]] ist, wird weitere Software benötigt, um ein benutzbares Betriebssystem zu erhalten. Aus diesem Grund kamen die ersten Linux-[[Distribution (Software)|Distributionen]] schon kurz nach der [[GNU General Public License|GPL-Lizenzierung]] von Linux auf, als Anwender, die nicht zum direkten Entwicklerkreis gehörten, Linux zu nutzen begannen. Die ersten Distributionen hatten dabei das Ziel, das System beispielsweise mit der Software des [[GNU-Projekt]]s zu einem arbeitsfähigen Betriebssystem zu bündeln. Zu ihnen gehörten ''MCC Interim Linux'', das auf den FTP-Servern der University of Manchester im Februar 1992 veröffentlicht wurde, ''TAMU'', das von einigen Programmierern der ''Texas A&amp;M University'' etwa zur gleichen Zeit erstellt wurde, und [[Softlanding Linux System]] (SLS). Die erste kommerziell auf CD erhältliche Distribution war 1992 das von Adam J. Richters entwickelte [[Yggdrasil Linux]]. Am 16. Juli 1993 veröffentlichte [[Patrick Volkerding]] die Distribution [[Slackware]], die auf SLS basiert. Sie ist die älteste heute noch aktive Linux-Distribution.<br /> <br /> Die ersten Nutzer kannten noch freie Software aus der Zeit vor den 1980er-Jahren und schätzten Linux, weil sie wieder die [[Verwertungsrecht]]e an der von ihnen verwendeten Software besaßen. Spätere Nutzer waren Unix-Anwender, die Linux zunächst vor allem privat einsetzten und sich vor allem über den geringen Preis freuten. Waren die ersten Distributionen nur der Bequemlichkeit halber geschaffen worden, sind sie doch heute die übliche Art für Nutzer wie auch Entwickler, ein Linux-System zu installieren. Dabei werden die Linux-Distributionen heutzutage sowohl von Entwicklergruppen als auch von Firmen oder gemeinnützigen Projekten entwickelt und betrieben.<br /> <br /> Die Frage, welche Distributionen besonders beliebt sind, lässt sich nur schwer beantworten. Im deutschsprachigen Raum werden vor allem [[Ubuntu]], [[Debian]], [[openSUSE]] und [[Knoppix]] häufiger auch außerhalb der IT-Presse erwähnt. Darüber hinaus wäre [[Fedora (Linux-Distribution)|Fedora]] zu nennen, das von dem börsennotierten US-Unternehmen [[Red Hat]] entwickelt wird.<br /> <br /> == Arten von Distributionen ==<br /> <br /> Da Distributionen praktisch eigene [[Produkt (Wirtschaft)|Produkte]] sind, konkurrieren diese am Markt miteinander und versuchen sich einerseits voneinander abzugrenzen, andererseits aber auch anderen Distributionen keinen zu großen Vorteil zu überlassen. Daher unterscheiden sich zwar sämtliche Distributionen, es gibt aber kaum etwas, wofür sich nicht jede Distribution anpassen ließe. Hiervon ausgenommen sind nur Spezial-Systeme, etwa als Software im [[Eingebettetes System|Embedded]]-Bereich.<br /> <br /> Einige Distributionen sind speziell auf einen Anwendungsfall optimiert, so gibt es etwa Systeme speziell für den Einsatz in Bildungseinrichtungen mit hierfür spezialisierter Software und zumeist einem [[Terminal-Server]]-System, wodurch nur ein leistungsstarker Rechner benötigt wird und ansonsten auch ältere Hardware ausreicht. Beispiele sind hier [[Edubuntu]] oder [[DebianEdu]]. Ebenso gibt es Systeme speziell für veraltete Rechner, die einen geringeren Funktionsumfang haben und geringe Systemanforderungen stellen. Beispiele sind etwa [[Damn Small Linux]] oder [[Puppy Linux]], die einen Umfang von nur 50 beziehungsweise 100&amp;nbsp;MB haben.<br /> <br /> === Smartphone-Distributionen ===<br /> <br /> [[Datei:Android 4.1 on the Galaxy Nexus.jpeg|mini|upright|200px|Android-4.1-Oberfläche]]<br /> <br /> [[Datei:Galaxy Nexus smartphone.jpg|mini|upright|hochkant=0.5|[[Galaxy Nexus]] mit [[Android (Betriebssystem)|Android]]]]<br /> Für [[Smartphone]]s und [[Tabletcomputer|Tablets]] gibt es speziell optimierte Linux-Distributionen. Sie bieten neben den [[Telefon]]ie- und [[Short Message Service|SMS]]-Funktionen, diverse [[Personal Information Manager|PIM]]-, [[GPS|Navigations]]- und [[Multimedia]]-Funktionen. Die Bedienung erfolgt typischerweise über [[Multi-Touch]] oder mit einem Stift. Linux-basierte Smartphonesysteme werden meist von einem Firmen[[konsortium]] oder einer einzelnen Firma entwickelt und unterscheiden sich teilweise sehr stark von den sonst klassischen Desktop-, Embedded- und Server-Distributionen. Anders als im [[Eingebettetes System|Embedded]]-Bereich sind Linux-basierte Smartphonesysteme aber nicht auf ein bestimmtes Gerät beschränkt, vielmehr dienen sie als Betriebssystem für Geräte ganz unterschiedlicher Modellreihen und werden oft herstellerübergreifend eingesetzt.<br /> <br /> Die Architektur vieler Linux-basierter Smartphone- und Tablet-Betriebssysteme wie z.&amp;nbsp;B. Android, hat neben dem Linux-Kernel nur wenig Gemeinsamkeiten mit klassischen Linux-Distributionskonzepten.&lt;ref name=&quot;chrishoffman&quot; /&gt;&lt;ref name=&quot;APIs&quot; /&gt;&lt;ref name=&quot;Smartphone Disto&quot;&gt;{{cite web|url=http://www.zdnet.com/blog/hardware/the-death-of-the-linux-distro/18152 |title=The death of the Linux distro |work=The death of the Linux distro |author=Adrian Kingsley-Hughes |publisher=CBS Interactive |accessdate=2012-09-19 |date=2012-02-14 |quote=Take a look at how Android has become the dominant Linux distro on mobile platforms. […] So again, while B2G is essentially a Linux distro, people will come […]'' |language=englisch}}&lt;/ref&gt; Ob Android als wichtigstes Linux-Kernel basierendes Smartphone-Betriebssystem auch als Linux-Distribution einzuordnen ist, wird kontrovers diskutiert.&lt;ref&gt;{{cite web|url=http://jeffhoogland.blogspot.de/2011/07/six-signs-android-really-isnt-linux.html |first=Jeff |last=Hoogland |quote=''Many people argue that Android has put Linux into the hands of millions of users. While there is no doubting that Android has been a raging success, I would argue that Google has put Android into the hands of millions of people – not Linux.'' |title=Six Signs Android really isn't Linux |date=2011-07-07 |accessdate=2015-04-20 |publisher=Thoughts on technology |language=englisch}}&lt;/ref&gt; U.a. wird typischerweise auch nur ein kleiner Teil der sonst üblichen GNU-Software-Umgebung und -Tools genutzt.&lt;ref name=&quot;stallman2011&quot; /&gt; Da Android nicht vollständig freie Software ist und Googles [[Android Market]] die Verwendung unkontrollierter proprietärer Binär-Software ermöglicht, stehen [[Richard Stallman]] und die [[Free Software Foundation|FSF]] Android sehr kritisch gegenüber und empfehlen die Verwendung von Alternativen.&lt;ref name=&quot;stallman2011&quot;&gt;{{cite web|url=http://www.guardian.co.uk/technology/2011/sep/19/android-free-software-stallman |publisher=[[The Guardian]] |title=Is Android really free software? – Google’s smartphone code is often described as 'open' or 'free' – but when examined by the Free Software Foundation, it starts to look like something different|first=Richard |last=Stallman |date=2011-09-19 |accessdate=2012-09-09 |quote=the software of Android versions 1 and 2 was mostly developed by Google; Google released it under the Apache 2.0 license, which is a lax free software license without copyleft. […] The version of Linux included in Android is not entirely free software, since it contains non-free „binary blobs“ […] Android is very different from the GNU/Linux operating system because it contains very little of GNU.|language=englisch}}&lt;/ref&gt;&lt;ref&gt;{{cite web|url=http://www.gnu.org/philosophy/android-and-users-freedom.html|title=Android und die Freiheit der Nutzer – Unterstützen Sie die Kampagne Befreien Sie Ihr Android! |first=Richard|last=Stallman |publisher=gnu.org |quote=Obwohl heutige Android-Telefone erheblich weniger schlecht als Apple- oder Windows-Smartphones sind, kann nicht gesagt werden, dass sie die Freiheit der Nutzer respektieren.''|date=2012-08-05|accessdate=2012-09-09}}&lt;/ref&gt; Die meist auf Linux genutzten UNIX-artigen Dienste und Tools werden teilweise durch eine [[Java-Laufzeitumgebung]] ersetzt. Dadurch entstehen neue [[Programmierschnittstelle]]n, die sich auf beliebigen anderen Plattformen emulieren bzw. umsetzen lassen.&lt;ref&gt;{{Internetquelle |url=http://developer.android.com/guide/basics/what-is-android.html |titel=What is Android? |zugriff=2011-09-08 |werk=Android Developers Guide |sprache=en}}&lt;/ref&gt; Trotz großer Diskrepanzen&lt;ref&gt;zdnet.de: [http://www.zdnet.de/41553061/android-architektur-wieviel-linux-steckt-in-googles-os/ „Wieviel Linux steckt in Googles OS?“] von Christoph H. Hochstätter, 18. Mai 2011. Abgerufen am 11. September 2013&lt;/ref&gt;&lt;ref&gt;Anika Kehrer: [http://www.linux-magazin.de/NEWS/Wieviel-Linux-steckt-in-Android ''Wieviel Linux steckt in Android?'']. Online auf linux-magazin.de vom 10. November 2009; abgerufen am 11. September 2013.&lt;/ref&gt;&lt;ref name=&quot;APIs&quot;&gt;{{cite web|last=Paul |first=Ryan |url=http://arstechnica.com/gadgets/2009/02/an-introduction-to-google-android-for-developers/ |language=englisch |title=Dream(sheep++): A developer’s introduction to Google Android |work=[[Ars Technica]] |date=2009-02-24 |accessdate=2013-04-03}}&lt;/ref&gt;&lt;ref name=&quot;chrishoffman&quot;&gt;{{cite web|url=http://www.howtogeek.com/189036/android-is-based-on-linux-but-what-does-that-mean/ |title=Android is Based on Linux, But What Does That Mean?| quote=''Android may be based on Linux, but it’s not based on the type of Linux system you may have used on your PC. You can’t run Android apps on typical Linux distributions and you can’t run the Linux programs you’re familiar with on Android. Linux makes up the core part of Android, but Google hasn’t added all the typical software and libraries you’d find on a Linux distribution like Ubuntu. This makes all the difference.'' |date=2014-05-12 |language=englisch |accessdate=2015-04-23 |first=Chris |last=Hoffman}}&lt;/ref&gt; wird Android jedoch von manchen über gemeinsame Eigenschaften mit [[Embedded Linux|Embedded-Linux]]-Distributionen bei den Linux-Distributionen eingeordnet.&lt;ref name=&quot;BillAnderson&quot;&gt;{{Internetquelle | url=http://www.all-things-android.com/content/android-just-another-distribution-linux | titel=Android is Just Another Distribution of Linux| autor=Bill Anderson | hrsg=Android News for Costa Rica | datum=2014-05-13 | zugriff=2014-09-12 | sprache=en| zitat=''Android is not a GNU/Linux distribution, but it is a distribution of Linux. More specifically, it is a distribution of embedded Linux that uses many NetBSD utilities.''}}&lt;/ref&gt; Andere Linux-basierende Smartphone-Betriebssysteme, wie etwa [[Firefox OS]], [[Ubuntu#Ubuntu auf Smartphones|Ubuntu for phones]],&lt;ref&gt;{{Internetquelle|url=http://netzsieger.de/blog/elektronik/smartphones/ubuntu-smartphones/|titel=Canonical bringt Ubuntu auf Smartphones|zugriff=2013-01-18}}&lt;/ref&gt; [[Maemo]], [[Tizen]], [[MeeGo#Mer-Projekt|Mer]], [[Sailfish OS]]&lt;ref name=&quot;chip12&quot;&gt;{{Internetquelle |url=http://www.chip.de/news/Jolla-Erstes-Sailfish-Smartphone-Ende-2013-fuer-400__58662225.html |titel=Jolla: Erstes Sailfish-Smartphone Ende 2013 für 400&amp;nbsp;€ |hrsg=chip.de |zugriff=2013-05-29 }}&lt;/ref&gt; und [[MeeGo]] nutzen größere Teile der klassischen GNU-Software-Umgebung, so dass diese teilweise einfacher mit klassischen Linux-Anwendungen ergänzt werden können und somit eher Linux-Distributionen im klassischen Sinne entsprechen.<br /> <br /> Während die Marktanteile von bisher verbreiteten Mobil-Plattformen wie [[Apple]]s [[Apple iOS|iOS]], [[Microsoft]]s [[Windows Mobile]] und [[Nokia]]s [[Symbian OS]] sanken, konnte Android Marktanteile hinzugewinnen.&lt;ref name=&quot;smartphones&quot;&gt;[http://mobilemetrics.de/wordpress/wp-content/uploads/2012/04/iOS_vs_Android.jpg Kennzahlen zum Mobile-Markt von Business Insider], 15. April 2012, Alexander Oschatz, Radenbul, zugegriffen: 19. Juni 2012.&lt;/ref&gt; Seit Ende 2010 haben Linux-Systeme die Marktführerschaft auf dem schnell wachsenden Smartphone-Markt übernommen.&lt;ref name=&quot;Marktführerschaft&quot;&gt;[http://www.canalys.com/newsroom/google%E2%80%99s-android-becomes-world%E2%80%99s-leading-smart-phone-platform Google’s Android becomes the world’s leading smart phone platform] (englisch), zugegriffen 11. August 2011&lt;/ref&gt; Sie wiesen zusammen im Juli 2011 eine Marktanteil von mindestens &lt;!-- nicht allein Android --&gt;45 %&lt;ref name=&quot;a45&quot;&gt;{{cite web|url=http://www.nzz.ch/nachrichten/digital/nokia_krise_1.11867798.html |title=Nokias Krise verschärft sich |publisher=[[Neue Zürcher Zeitung|NZZ]]-Online |accessdate=2012-01-10 |date=2011-08-11}}&lt;/ref&gt; auf.<br /> Während sich die Linux-basierenden Smartphone-Distributionen Bada oder WebOs nicht am Markt durchsetzen konnten (Stand 2012), ist die Nachfrage nach Googles Android weiter gewachsen. Während im August 2012 die Android-Distribution bereits einen Marktanteil von 69,1 % erreicht hatte, konnte er ein Jahr später noch weiter auf 79,&amp;nbsp;3 % gesteigert werden.&lt;ref&gt;{{cite web | url=http://www.heise.de/newsticker/meldung/Marktforscher-Windows-Phone-explodiert-1931586.html | title=Marktforscher: Windows Phone explodiert | accessdate=2014-04-08 | last= | first= | authorlink= | coauthors= | date=2013-08-07 | format= | work= | publisher=[[Heise Verlag|heise online news]] | pages= | language= | quote= }}&lt;/ref&gt;<br /> <br /> === Live-Systeme ===<br /> <br /> {{Hauptartikel|Live-System}}<br /> Eine Besonderheit bilden [[Live-System]]e, die von CD, DVD, USB und anderen Medien gebootet werden. Handelte es sich hierbei zunächst nur um spezialisierte Distributionen, die den Funktionsumfang von Linux demonstrieren sollten, gehört es inzwischen zum guten Ton unter Linux-Distributionen, den Standard-Umfang in Form einer Live-CD oder (seltener) -DVD anzubieten. Einige dieser Systeme lassen sich auch direkt von der CD aus installieren.<br /> <br /> Live-Systeme können als vollständiges Linux gestartet werden, ohne auf die Festplatte zu schreiben und ohne die bestehende Konfiguration eines Rechners zu verändern. So kann die entsprechende Linux-Distribution gefahrlos auf einem Computer getestet werden. Live-Systeme eignen sich auch hervorragend zur Datenrettung und Systemanalyse, da sie von der Konfiguration des bereits bestehenden Systems unabhängig sind und so auch von möglichen Infektionen durch Würmer und Viren nicht betroffen werden können.<br /> <br /> == Linux-Distributionen neben anderen Betriebssystemen ==<br /> <br /> Die meisten Linux-Distributionen können auf derselben Hardware parallel zu anderen Betriebssystemen installiert werden. Als solche kommen bspw. eine weitere Linux-Distribution, ein anderes [[unixoid]]es Betriebssystem wie [[Mac OS X]] oder [[Solaris (Betriebssystem)|Solaris]], oder aber auch ein [[Windows]] in Betracht. Prinzipiell sind zwei Vorgehensweisen zu unterscheiden:<br /> <br /> === Multi-Boot ===<br /> <br /> {{Hauptartikel|Multi-Boot-System}}<br /> In einer [[Multi-Boot-System|Multi-Boot]]-Konfiguration werden zwei oder mehr Betriebssysteme parallel auf verschiedene Festplatten-Partitionen installiert. [[Installationsprogramm]]e moderner Linux-Distributionen können meist bereits installierte Betriebssysteme erkennen und eigenständig eine Multi-Boot-Konfiguration einrichten. Nach der Installation kann beim Bootvorgang über einen [[Bootloader]] oder [[Bootmanager]] gewählt werden, welches Betriebssystem starten soll.<br /> <br /> === Virtualisierung ===<br /> <br /> {{Hauptartikel|Virtualisierung (Informatik)}}<br /> Werden die Betriebssysteme häufig gleichzeitig genutzt, bietet sich u.&amp;nbsp;U. eher eine [[Virtualisierung (Informatik)|Virtualisierungs]]-Lösung an. Zu unterscheiden sind hierbei das Host- und Gast-System. Ersteres ist tatsächlich physisch auf der Hardware installiert. Innerhalb dessen kommt eine Virtualisierungssoftware wie bspw. [[VirtualBox]] oder [[Kernel-based Virtual Machine|KVM]] zum Einsatz. Diese emuliert für das Gast-System die gesamte erforderliche Hardware oder bietet durch ein Sicherheitssystem direkten Zugriff auf die tatsächlich vorhandene Hardware des Computers. Da diese in einer solchen Konfiguration für den gleichzeitigen Betrieb beider Systeme erforderlich ist, kann es zu Geschwindigkeitseinbußen kommen.<br /> <br /> == Unterschiede zwischen einzelnen Distributionen ==<br /> <br /> Selbst wenn man Spezial-Distributionen außer Acht lässt, unterscheiden sich auch gängige Linux-Distributionen in einigen Punkten.<br /> Wichtige Alleinstellungsmerkmale bilden zunächst Werkzeuge zur Installation wie bspw. Partitionierungstools. Diese richten sich meist nach dem Nutzerkreis einer Distribution. Während Anfängern bspw. nur wenig Optionen angeboten werden, um diese nicht zu überfordern, richten sich andere Distributionen an fortgeschrittenere Anwender, welche mehr Einstellungsmöglichkeiten bereits im Installationsstadium bevorzugen. Nach der Installation setzt sich dieser Unterschied, orientiert am Nutzerkreis, meist im Umfang von Konfigurationsprogrammen fort. So bieten manche Distributionen ausgereifte grafische Werkzeuge zur Bearbeitung von Konfigurationsdateien an, während andere lediglich die direkte Bearbeitung solcher vorsehen. Letzteres bietet jedoch oftmals die Möglichkeit einer genaueren Anpassung auf die eigenen Bedürfnisse, setzt im Gegenzug allerdings umfangreicheres Wissen beim Anwender voraus.<br /> <br /> Weiter unterscheiden sich Distributionen häufig erheblich in ihrem Umfang und der Anzahl der unterstützten [[Architektur (Informatik)|Architekturen]]. Auch spielen Art und Umfang der Dokumentation eine Rolle. So liegen einigen Produkten Handbücher bei, während andere nur Dokumentation auf Webseiten veröffentlichen. Manche verzichten ganz auf eine offizielle Dokumentation und lassen eine solche lieber – bspw. in Form von Wikis – von der Nutzerschaft pflegen. Kommerzielle Distributoren bieten daneben meist offiziellen [[Support (Dienstleistung)|Support]] an, welcher als Dienstleistung allerdings vergütet werden muss. Daneben gibt es Unterschiede im Hinblick auf die jeweilige Politik bezüglich [[Proprietäre Software|proprietärer Software]] wie bspw. [[Adobe Flash]], dem [[MP3]]-Codec oder proprietären Hardwaretreibern. Während einige Distributionen wie zum Beispiel [[Debian]] auf proprietäre Pakete prinzipiell verzichten, liefern andere diese mit, um die Nutzung zu vereinfachen. Zu unterscheiden sind weiter Community-Distributionen (bspw. Debian) von solchen, hinter denen Unternehmen stehen (bspw. [[Ubuntu]]). Entsprechend der Zielgruppe einer Distribution sind auch Größe und Fachkenntnis und Größe der Nutzerschaft verschieden. Hinsichtlich der installierbaren Software spielt für viele Nutzer auch das Angebot von bereits angepassten und fertig verpackten Softwarepaketen eine Rolle.<br /> <br /> === Kompatibilität zwischen den Distributionen ===<br /> Die Unterschiede zwischen den Distributionen wirken sich oftmals auf deren Kompatibilität aus.&lt;ref name=&quot;stillbrokeninstallation&quot;&gt;{{cite web<br /> | last = Mobily<br /> | first = Tony<br /> | title = 2009: software installation in GNU/Linux is still broken – and a path to fixing it<br /> | publisher = www.freesoftwaremagazine.com<br /> | date = 2009-06-23<br /> | url = http://www.freesoftwaremagazine.com/columns/2009_software_installation_linux_broken_and_path_fixing_it<br /> | accessdate = 2011-08-04}}&lt;/ref&gt;<br /> <br /> Schon früh in der Geschichte der Distributionen entstanden Konzepte, die Installation weiterer Software zu vereinfachen. Meist sollte Software in Form kompilierter Pakete bereitgestellt und ein Mechanismus mitgeliefert werden, der funktionelle Abhängigkeiten zwischen installierten und nachgeladenen Paketen auflösen kann. Die entstandenen [[Paketmanagement]]-Systeme arbeiten mit je eigenen Paketformaten, zum Beispiel [[RPM Package Manager|RPM]] oder [[dpkg]]. Viele Linux-Distributionen haben eine eigene Softwareverwaltung mit eigenen Binärpaketen, die zu anderen Distributionen teilweise inkompatibel sind.<br /> <br /> Die Kritik am Prinzip der Linux-Distributionen setzt unter anderem an diesem Punkt an.&lt;ref name=&quot;stillbrokeninstallation&quot; /&gt;&lt;ref name=&quot;troy&quot;&gt;{{cite web|archiveurl=https://web.archive.org/web/20071013034536/http://www.gamedev.net/reference/programming/features/linuxprogramming2/page2.asp|url=http://www.gamedev.net/reference/programming/features/linuxprogramming2/page2.asp |title=Linux Game Development Part 2 – Distributable Binaries|first=Troy |last=Hepfner |date=2007-10-01|accessdate=2011-12-19 |archivedate=2007-10-13|language=englisch|quote=Creating an executable that works on almost all Linux distributions is a challenge. There are a number of factors that contribute to the problem […]}}&lt;/ref&gt; Da nicht jedes Software-Projekt und nicht jeder Software-Entwickler die Kenntnisse und Ressourcen hat, Software für jede einzelne Linux-Distribution bereitzustellen, wird oft nur der [[Quelltext]] veröffentlicht. Aus dem veröffentlichten Quelltext lauffähige Anwendungen zu erzeugen, ist jedoch potentiell ein komplizierter und fehlerträchtiger Prozess, der vielen Anwendern zu kompliziert sein kann. Diese bleiben dann oft auf die von der Distribution mitgelieferte Software angewiesen bzw. limitiert.&lt;ref name=&quot;launchpad2010&quot;&gt;{{cite web|url=https://bugs.launchpad.net/bugs/578045 |title=Upgrading packaged Ubuntu application unreasonably involves upgrading entire OS – Bug #578045 |first=John |last=King |date=2010-05-10 |accessdate=2012-05-27 |language=englisch |work=Launchpad |publisher=Ubuntu |quote=It is easier to upgrade to the newest stable versions of most applications – even open source applications – on a proprietary operating system than it is on Ubuntu.}}&lt;/ref&gt; Die Bereitstellung des Quellcodes als Softwareauslieferungsmethode ist jedoch für Anbieter kommerzieller Software, die Software binär ausliefern wollen, keine Option, weswegen diese die Menge von Distributionen und deren Paketformaten mit spezifischen Paketen bedienen müssen, was einen großen Mehraufwand bedeutet.&lt;ref name=&quot;lgp&quot;&gt;{{cite web|url=http://blog.linuxgamepublishing.com/2009/11/24/playing-well-with-distros/|title=Playing well with distros |date=2009-11-24 |accessdate=2012-01-15|first=Eskild|last=Hustvedt|publisher=[[Linux Game Publishing]]|language=englisch|archiveurl=https://web.archive.org/web/20110921031204/http://blog.linuxgamepublishing.com/2009/11/24/playing-well-with-distros/|archivedate=2011-09-21}}&lt;/ref&gt;&lt;ref name=&quot;icaza2003&quot;&gt;{{cite web|url=http://primates.ximian.com/~miguel/texts/linux-developers.html |date=2003-11-04 |author=[[Miguel de Icaza]]|title=Linux and Independent Software Vendors |publisher=primates.ximian.com |accessdate=2012-04-07 |language=englisch |quote=[…] staffing requirements for maintaining and testing […] software for a dozen of distributions and release versions quickly becomes a big burden […]}}&lt;/ref&gt;&lt;ref&gt;{{cite web|url=http://www.hemispheregames.com/2010/05/18/porting-osmos-to-linux-a-post-mortem-part-23/|first=Dave|last=Burke|title=Porting Osmos to Linux: A Post-Mortem (part 2/3)|date=2010-05-18|accessdate=2012-06-16|language=englisch|quote=Didn’t Love: Packaging the Game. It took days of effort to create the binary packages for Osmos […] How should an app be packaged in Linux? […]There are no standards or clear answers to any of these questions. There’s no documentation for this stuff! Asking on the forums will typically net you a spectrum of answers with no consensus answer and lots of little side arguments. I basically reverse engineered what I saw other apps doing (which sadly was of little comfort because everyone does it differently). I settled on supporting .deb/.rpm/.tar.gz with explicit 32 bit and 64 bit executables […]|publisher=hemispheregames.com}}&lt;/ref&gt; Im Umfeld von Unternehmen hat deshalb nur eine begrenzte Auswahl an Distributionen eine Chance als allgemeine Arbeitsplattform.<br /> <br /> === Standardisierungsansätze ===<br /> <br /> Damit sich die Distributionen nicht weiter auseinanderentwickeln, wurde die Free Standards Group (heute [[Linux Foundation]]) mit dem Ziel gegründet, entsprechende Standards zwischen Distributionen zu fördern. Der Bekannteste ist die [[Linux Standard Base]] zur Förderung der binären Kompatibilität der Distributionen. Die LSB wird dabei von den verschiedenen Distributionen unterschiedlich strikt umgesetzt. Sie definiert übereinstimmende [[Binärschnittstelle]]n („''ABI''“ genannt, für ''Application Binary Interface''), einige Details zum inneren Aufbau und ein Paketsystem (hier [[RPM Package Manager|RPM]]), das für die Installation von Software anderer Anbieter unterstützt werden muss.<br /> <br /> Die praktische Bedeutung dieser Regeln ist allerdings nur begrenzt.&lt;ref name=&quot;linuxfordevices&quot;&gt;{{cite web|url=http://archive.linuxgizmos.com/lsb-40-certifications-aim-to-heal-linux-fragmentation/|title=LSB 4.0 certifications aim to heal Linux fragmentation |first=Eric|last=Brown |date=2010-12-08 |accessdate=2011-11-16 |language=englisch |publisher=linuxfordevices.com |quote=[…] LSB helps to reduce fragmentation, it does not eliminate it. „The issue of packaging and broader dependencies is still a big one (for me) at least“ writes Kerner. „The same RPM that I get for Fedora won’t work on Ubuntu, and Ubuntu DEB packages won’t work on SUSE etc etc.“ […]}}&lt;/ref&gt; Die einseitige Festlegung auf des RPM-Paketformat wird teilweise angezweifelt, nachdem in den letzten Jahren durch [[Ubuntu]] oder [[Linux Mint]] das [[dpkg]]-Format eine große Verbreitung erlangt hat. Weil die meisten jener Distributionen, die dpkg nutzen, direkt auf [[Debian]] basieren, sind deren Pakete oft in anderen Distributionen, die ebenfalls auf Debian basieren, installierbar. Auf der anderen Seite setzen alle von [[Fedora (Linux-Distribution)|Fedora]] (respektive [[Red Hat Linux]]), [[OpenSuse]] und [[Mandriva Linux|Mandriva]] abstammenden Distributionen auf RPM. Es ist mit einigen Einschränkungen durchaus möglich – z.&amp;nbsp;B. mit Hilfe des ''OpenSuse Build Service'' – RPM-Pakete zu erstellen, die auf allen diesen Distributionen nutzbar sind.&lt;ref name=&quot;OpenSuse Build Service&quot;&gt;{{Internetquelle | url=http://en.opensuse.org/openSUSE:Build_Service_cross_distribution_howto#Detect_a_distribution_flavor_for_special_code | titel=openSUSE:Build Service cross distribution howto | hrsg=Suse ([[Novell]]) | datum=2013-5-11 | zugriff=2014-02-06 | sprache=en}}&lt;/ref&gt;<br /> <br /> Eine weitere Standardisierung stellt der [[Filesystem Hierarchy Standard]] dar, der eine gemeinsame Benennung einiger Datei- und Verzeichnisnamen und eine übereinstimmende Struktur der Basisverzeichnisse ermöglichen soll. Allerdings sind auch hier Details nicht geregelt, die bisher die Inkompatibilitäten erzeugten. Andere Probleme ergeben sich erst durch die feste Integration von Anwendungen in den Systemverzeichnisbaum.&lt;ref name=&quot;gobolinux&quot;&gt;{{cite web<br /> | url = http://www.kuro5hin.org/story/2003/5/9/05015/62649<br /> | title = The Unix tree rethought: an introduction to GoboLinux<br /> | accessdate = 2010-06-03<br /> | publisher = www.kuro5hin.org<br /> | last=Muhammad<br /> | first=Hisham<br /> | date=2003-05-09}}&lt;/ref&gt; Er wird von der ''Linux Standard Base'' vorausgesetzt.<br /> <br /> Weil die Standards nicht ausreichend umgesetzt wurden, kündigte im Dezember 2006 [[Ian Murdock]], damals Technikchef der Free Standards Group, im Rahmen der Linux Standard Base eine weitere Initiative an, die Installation von Software zu vereinfachen. Kern des Verfahrens ist eine [[Programmierschnittstelle]], die über das Paketmanagement der jeweiligen Distribution gelegt wird. Diese Schnittstelle kann Standardfunktionen für das Softwarepaket bereitstellen und sie für die jeweilige Distribution umsetzen. So soll es möglich sein, Dateien und Abhängigkeiten an das distributionseigene Paketmanagementsystem weiterzugeben.&lt;ref name=&quot;ian-part1&quot;&gt;[[Ian Murdock]]: ''[http://ianmurdock.com/?p=388 Software installation on Linux: Today, it sucks (part 1)]'' in seinem Weblog, 15. Dezember 2006&lt;/ref&gt;&lt;ref name=&quot;ian-part2&quot;&gt;[[Ian Murdock]]: ''[http://ianmurdock.com/?p=391 Software installation on Linux: Tomorrow, it won’t (with some cooperation) (part 2)]'' in seinem Weblog, 19. Dezember 2006&lt;/ref&gt; Eine praktische Umsetzung hierzu gab es jedoch zumindest bis Anfang 2013 nicht.<br /> <br /> == Alternativansätze für die Programmverbreitung ==<br /> <br /> Es gibt einige Alternativansätze zu dem Modell der zentralen Softwareverbreitung über die Distributionen und deren [[Repository|Repositories]]. Projekte wie [[Autopackage]]&lt;ref&gt;{{cite web|url=http://www.linux-magazin.de/Heft-Abo/Ausgaben/2006/02/Eines-fuer-alle |title=Distributionsunabhängige Pakete mit Autopackage – Eines für alle|first=Robert |last=Staudinger |publisher=[[Linux-Magazin]] 2006/02 |date=2006-02-01 |accessdate=2012-04-11 |quote=Obwohl sie nach dem gleichen Prinzip arbeiten, laufen RPMs von Suse 9.2 nicht unter Suse 9.3 und schon gar nicht unter Red Hat. Das Autopackage-Projekt setzt auf einen einheitlichen Standard für die Erstellung von Installationspaketen. Dabei lösen die einzelnen Pakete ihre Abhängigkeiten selbst auf.}}&lt;/ref&gt;, [[Zero Install]]&lt;ref name=&quot;leonard2007&quot;&gt;{{cite web|url=http://www.osnews.com/story/16956/Decentralised_Installation_Systems |title=Decentralised Installation Systems|first=Thomas|last=Leonard|date=2007-01-16 |accessdate=2012-05-03 |language=englisch |publisher=osnews.com}}&lt;/ref&gt; oder der [[Klik]]-Nachfolger ''PortableLinuxApps''&lt;ref name=&quot;portableapps&quot;&gt;{{cite web|url=http://portablelinuxapps.org/docs/1.0/AppImageKit.pdf |format=pdf; 38&amp;nbsp;kB |publisher=PortableLinuxApps.org |first=Simon| last=Peter |date=2010 |accessdate=2011-07-29 |title=AppImageKit Documentation 1.0 |pages=2-3|quote=Linux distributions mostly use package managers for everything. While this is perceived superior to Windows and the Mac by many Linux enthusiasts, it also creates a number of disadvantages: Centralization […], Duplication of effort […], Need to be online […], No recent apps on mature operating systems […], No way to use multiple versions in parallel […], Not easy to move an app from one machine to another […]. The AppImage format has been created with specific objectives in mind: Be distribution-agnostic […], Maintain binary compatibility […]}}&lt;/ref&gt; versuchen eine einheitliche, aber dezentrale, distributionsunabhängige, binäre Softwareverbreitungsmöglichkeit zu schaffen, konnten aber bis jetzt faktisch keine relevante Verbreitung oder Unterstützung der Linux-[[Online-Community#Entwicklungs-Community|Community]] erreichen.&lt;ref name=&quot;byfield&quot;&gt;{{cite web|archiveurl=https://web.archive.org/web/20080331092730/http://www.linux.com/articles/60124 |url=http://www.linux.com/articles/60124|title=Autopackage struggling to gain acceptance |first=Bruce |last=Byfield|date=2007-02-12 |accessdate=2012-01-21|publisher=linux.com |archivedate=2008-03-31|language=en|quote=If Hearn is correct, the real lesson of Autopackage is not how to improve software installation, but the difficulty – perhaps the impossibility – of large-scale changes in Linux architecture this late in its history. It’s a sobering, disappointing conclusion to a project that once seemed so promising.}}&lt;/ref&gt;<br /> <br /> Ein Schritt in diese Richtung war 2011 die Einführung eines ''Software Center'' in [[Ubuntu]],&lt;ref name=&quot;softwarecenter&quot;&gt;{{Internetquelle |url=http://techie-buzz.com/foss/synaptics-removed-ubuntu-11-10.html |titel=Software Center ersetzt Synaptic |zugriff=2011-09-29 |sprache=en|datum=2011-06-23 |autor=Ricky Laishram}}&lt;/ref&gt; nach dem Modell des [[App Store (iOS)|App Stores]] von [[Apple]], um die Anzahl der Applikationen signifikant erhöhen zu können, da das Distributionsmodell nur begrenzt skaliert.&lt;ref name=&quot;UDS2010&quot;&gt;{{cite web|title=UDS N Monday plenary: Getting great applications on Ubuntu |work=Ubuntu Developer Summit 2010|date=2010-10-25 |url=http://www.youtube.com/watch?v=GT5fUcMUfYg |first=Matthew Paul|last=Thomas |language=englisch |accessdate=2012-04-29}}&lt;/ref&gt;<br /> <br /> 2012 betonte auch der [[Linux-Kernel|Kernelentwickler]] [[Ingo Molnár]] die Notwendigkeit der Bereitstellung einer solchen dezentralen, skalierbaren und distributionsunabhängigen Softwareverbreitungsmethode; das Fehlen eines solchen Mechanismus sei eines der Kernprobleme des Linux-Desktops.&lt;ref name=&quot;molnar2012&quot;&gt;{{cite web|url=https://plus.google.com/109922199462633401279/posts/VSdDJnscewS|quote=So, to fix desktop Linux we need a radically different software distribution model: less of a cathedral, more of a bazaar. […] – totally flat package dependencies (i.e. a package update does not forcibly pull in other package updates) […] – a guaranteed ABI platform going forward (once a package is installed it will never break or require forced updates again). Users want to be free of update pressure from the rest of the system, if they choose to.|date=2012-03-17|title=Ingo Molnar|accessdate=2012-06-16|language=englisch |publisher=plus.google.com |author=[[Ingo Molnár]]}}&lt;/ref&gt;<br /> <br /> == Siehe auch ==<br /> * [[Liste von Linux-Distributionen]]<br /> <br /> == Literatur ==<br /> <br /> * Johannes Plötner, [[Steffen Wendzel]]: ''Linux. Das umfassende Handbuch.'' 4. Auflage. Galileo Press, Bonn 2010, ISBN 978-3-8362-1704-0.<br /> * [[Michael Kofler]]:'' Linux 2010: Debian, Fedora, openSUSE, Ubuntu.'' 9. Auflage. Addison-Wesley, München 2009, ISBN 978-3-8273-2158-9. (bis zur 8. Auflage unter dem Titel: ''Linux. Installation, Konfiguration, Anwendung.'')<br /> <br /> == Weblinks ==<br /> {{Commonscat|Linux distributions|Linux-Distribution}}<br /> * [http://distrowatch.com/index.php?language=DE Distributionsübersicht mit Ranglisten auf DistroWatch.com]<br /> * [http://www.frozentech.com/content/livecd.php Auflistung der Live-CD-Distributionen]<br /> * [http://futurist.se/gldt/ Timeline der Linuxdistributionen als Grafik]<br /> * [http://distrochooser.de/ Linux Distribution Chooser]&amp;nbsp;– ein Hilfswerkzeug für die Wahl zwischen verschiedenen verbreiteten Linux-Distributionen<br /> * [http://linuxhelp.blogspot.com/2006/04/mind-map-of-linux-distributions.html Mind Map of Linux distributions] – eine Übersicht über den Linux-Stammbaum<br /> * [http://www.downloadlinux.org/ Download Linux]<br /> <br /> == Einzelnachweise ==<br /> &lt;references /&gt;<br /> <br /> [[Kategorie:Linux-Distribution| ]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=Linux-Distribution&diff=154996348 Linux-Distribution 2016-06-04T23:50:05Z <p>Dsprc: /* Geschichte */</p> <hr /> <div>[[Datei:Tux.svg|mini|Das Linux-Maskottchen [[Tux (Maskottchen)|Tux]]]]<br /> Eine '''Linux-Distribution''' ist ein Komplettpaket von aufeinander abgestimmter [[Linux]]-[[Software]]. Es besteht je nach Distribution aus folgenden Teilen:<br /> * Betriebssystem<br /> ** [[Kernel (Betriebssystem)|Betriebssystemkern]] ([[Linux (Kernel)|Linux-Kernel]])<br /> ** [[Kernel-Modul|Kernelmodule]]<br /> ** essenzielle [[Programmbibliothek|Bibliotheken]]<br /> ** essenzielle [[Computerprogramm|Programme]]<br /> * weitere Programme<br /> * weitere Bibliotheken<br /> * [[Quelltext#Lizenzierung|Quelltexte]]<br /> * Dokumentation<br /> <br /> Die [[Distribution (Software)|Distributionen]], in denen [[GNU]]-Programme enthalten sind, werden auch als '''GNU/Linux-Distributionen''' bezeichnet. Die Namensgebung mit oder ohne GNU-Namenszusatz wird von den Distributoren je nach ihrer Position im [[GNU/Linux-Namensstreit]] unterschiedlich gehandhabt.<br /> <br /> Fast jede Distribution ist um eine [[Paketverwaltung]] herum zusammengestellt, d.&amp;nbsp;h., dass sämtliche Bestandteile der Installation (einschließlich des Linux-Kernels, der Ordnerstruktur und der Paketverwaltung) als Pakete vorliegen und sich über den Paketmanager installieren, deinstallieren und auch updaten lassen. Die Pakete werden dazu online in sogenannten [[Repository|Repositories]] vorgehalten.<br /> <br /> Eine Linux-Distribution wird vom bereits erwähnten Distributor zusammengestellt, bedingt durch den Umstand, dass der Linux Kernel und der überwiegende Anteil der Programme freie Software sind und somit die Weitergabe und Verbreitung durch Dritte ausdrücklich erlaubt ist. Der Distributor wählt sich beliebige Software aus dem ganzen Pool an verfügbarer freier Software aus, passt diese mehr oder weniger an seine Vorstellungen an, paketiert diese für die Paketverwaltung seiner Wahl und bietet das Ergebnis, die Linux-Distribution, aller Welt oder Kunden an. Lediglich wenige Programme werden vom Distributor selbst geschrieben, z.&amp;nbsp;B. meist die [[Installer]]. Der Distributor kann ein Unternehmen oder eine Gruppe von weltweit verteilten Freiwilligen sein und er kann kommerziellen Support anbieten.<br /> <br /> == Konzept ==<br /> <br /> Aufgabe eines Linux-Distributors ist die Zusammenstellung eines für den vorgesehenen Anwendungszweck verwendbaren Gesamtsystems aus Software von anderen Softwareherstellern, um dieses dann als sogenannte Distribution anzubieten. Den zentralen Teil bilden dabei der [[Linux (Kernel)|Linux-Kernel]] selbst sowie Systemprogramme und Bibliotheken. Je nach dem vorgesehenen Anwendungszweck der Distribution werden verschiedene [[Anwendungssoftware|Anwendungsprogramme]] (z.&amp;nbsp;B. [[Webbrowser]], [[Office-Paket|Office-Anwendungen]], [[Grafiksoftware|Zeichenprogramme]], [[Mediaplayer]] etc.) hinzugefügt.<br /> <br /> Linux-Distributionen halten in der Regel eine große Anzahl an Programmen in den Repositories zur Installation bereit. Dies steht im konzeptuellen Gegensatz zu anderen Betriebssystemen wie [[Microsoft Windows|Windows]] und [[OS X]], die neben dem Betriebssystem selbst nur wenige Anwendungen enthalten, dafür auf die Integration von Programmen von externen Anbietern, sogenannten [[Independent Software Vendor|ISVs]], setzen.<br /> <br /> Ein Differenzierungsmerkmal der Distributionen untereinander sind die Unterstützungszeiträume bzw. die Update-Zyklen. Es existieren Distributionen, bei denen dieselbe Version über mehr als 7 Jahre mit Updates versorgt wird, (z.&amp;nbsp;B. [[Red Hat Enterprise Linux|RHEL]]) während bei anderen schon nach einem halben Jahr zu einem Update auf die nächste Version geraten wird. Andere Distributionen haben gar keine Versionen, sondern sind sogenannte ''[[Rolling Release]]s'' (z.&amp;nbsp;B. [[Arch Linux]]), welche permanent Systemteile und Anwendungen erneuern.<br /> <br /> Weitere Unterschiede zwischen den Distributionen können bezüglich der Lizenzpolitik gesehen werden. Einige Distributionen integrieren ausschließlich [[Freie Software]]. Binär vertriebene proprietäre Software wird nicht in einer solchen Distribution zugelassen. Andere integrieren auch [[Proprietäre Software]].<br /> <br /> Weitere Aufgaben der Distributionen sind die Anpassung der Programme (durch [[Patch (Software)|Patchen]]), Hinzugabe von eigenen Programmentwicklungen (vor allem zur Installation und Konfiguration des Systems wie zum Beispiel [[Advanced Packaging Tool|apt]], [[Synaptic]], [[YaST]]) sowie (bis auf wenige Ausnahmen, z.&amp;nbsp;B. [[Gentoo Linux|Gentoo]]) Kompilierung und Paketierung ([[Debian-Paket|.deb]], [[RPM Package Manager|.rpm]]) der Programme. Die Bereitstellung von zusätzlichen Programmen und Updates erfolgt typischerweise zentral über ein [[Repository]], welches über ein [[Paketverwaltung]]s-System mit dem Betriebssystem synchronisiert wird.<br /> <br /> Auch wenn Linux-Betriebssysteme in der Form einer Distribution die bei weitem üblichste Variante ist, ist ein Betrieb von Linux auch ohne eine vorgefertigte Distribution möglich, wie das Projekt [[Linux From Scratch]] zeigt.<br /> <br /> === Zusammensetzung ===<br /> <br /> [[Datei:Linux-Distribution.svg|mini|Bestandteile einer Linux-Distribution]]<br /> Neben dem Linux-Kernel besteht eine Distribution meist aus der [[GNU]]-Software-Umgebung, die das grundlegende Basissystem mit den zahlreichen Systemdiensten (sogenannte [[Daemon]]s) sowie diverse Anwendungen bereitstellt, die bei einem [[Unixoides System|unixoiden System]] erwartet werden. Distributionen, welche auch oder nur für Desktop-Systeme gedacht sind, verfügen meist über ein [[X Window System]]. Ein solches ist für das Ausführen einer [[Grafische Benutzeroberfläche|grafischen Benutzeroberfläche]] erforderlich. Darauf aufbauend steht meist eine [[Desktop-Umgebung]], wie bspw. [[Gnome]] oder die [[KDE Software Compilation 4|KDE Software Compilation]] zur Verfügung, welche neben der reinen Benutzeroberfläche noch eine Vielzahl an [[Anwendungssoftware|Anwendungsprogrammen]] mitbringt.<br /> <br /> Ergänzend fügt ein Distributor normalerweise zahlreiche weitere Anwendungen bei. Dies sind beispielsweise [[Office-Paket]]e, Multimediasoftware, [[Editor (Software)|Editoren]], [[E-Mail-Programm]]e, [[Webbrowser|Browser]], aber auch [[Server]]-Dienste. Daneben finden sich meist Softwareentwicklungs-Werkzeuge wie [[Compiler]] bzw. [[Interpreter]] sowie Editoren.<br /> <br /> Viele Softwarebestandteile (z.&amp;nbsp;B. der [[Compiler]] [[GNU Compiler Collection|GCC]]), aus denen Linux-Distributionen bestehen, stammen aus dem älteren GNU-Projekt. Dieses hatte sich schon vor der Entwicklung von Linux die Aufgabe gestellt, eine Alternative zu den kommerziellen [[Unix]]-Betriebssystemen zu entwickeln. Da der eigene Kernel des GNU-Projekts, [[GNU Hurd]], beim Erscheinen von Linux noch in der Entwicklung war, wurde als verfügbarer Ersatz der Linux-Kernel verwendet. Daher ist auch der Doppelname ''GNU/Linux'' für eine Distribution geläufig (z.&amp;nbsp;B. bei [[Debian]]).<br /> <br /> Es gibt auch Linux-Distributionen, die auf die GNU-Softwareanteile oder ein [[X Window System]] komplett verzichten und alternative Software an deren Stelle nutzen. Diese Distributionen verhalten sich, wie beispielsweise [[FreeVMS]] oder [[BeOS#Cosmoe|Cosmoe]], teilweise auch nicht annähernd wie ein Unix-System.<br /> <br /> === Vertrieb ===<br /> <br /> Während proprietäre Betriebssysteme häufig über den [[Einzelhandel]] vertrieben werden, ist dies bei Linux-Distributionen eher die Ausnahme. Die meisten Distributionen können heute kostenlos von der [[Website]] der Anbieter heruntergeladen werden. Diese finanzieren sich über Spenden, über kostenpflichtigen [[Support (Dienstleistung)|Support]] oder auch einfach nur über die Beteiligung von Freiwilligen. Nur vergleichsweise wenige Distributionen werden von gewinnorientierten Firmen entwickelt und sind teilweise über den Einzelhandel verfügbar. Zahlreiche Linux-Distributionen werden auch, von den Kunden unbemerkt, als [[Firmware]] auf einem [[Gerät]] oder sogar in größeren [[Maschine]]n oder [[Anlage (Technik)|Anlagen]] erworben. Dabei kann es sich z.&amp;nbsp;B. um [[Werkzeugmaschine]]n, [[Fahrzeug]]e, [[Haushaltsgerät]]e, [[Speicherprogrammierbare Steuerung|SPS]], [[Messgerät]]e, [[Mobiltelefon]]e, [[Modem]]s, [[Digitalkamera]]s, [[Network Attached Storage|NAS]] oder [[Fernsehgerät|Fernseher]] handeln.<br /> <br /> == Geschichte ==<br /> <br /> {{Hauptartikel|Geschichte von Linux}}<br /> <br /> [[Datei:Linux Distribution Timeline.svg|mini|upright|Zeitleiste mit der Entwicklung verschiedener Linux-Distributionen]]<br /> Da [[Linux]] nur ein Betriebssystem-[[Kernel (Betriebssystem)|Kernel]] ist, wird weitere Software benötigt, um ein benutzbares Betriebssystem zu erhalten. Aus diesem Grund kamen die ersten Linux-[[Distribution (Software)|Distributionen]] schon kurz nach der [[GNU General Public License|GPL-Lizenzierung]] von Linux auf, als Anwender, die nicht zum direkten Entwicklerkreis gehörten, Linux zu nutzen begannen. Die ersten Distributionen hatten dabei das Ziel, das System beispielsweise mit der Software des [[GNU-Projekt]]s zu einem arbeitsfähigen Betriebssystem zu bündeln. Zu ihnen gehörten ''MCC Interim Linux'', das auf den FTP-Servern der University of Manchester im Februar 1992 veröffentlicht wurde, ''TAMU'', das von einigen Programmierern der ''Texas A&amp;M University'' etwa zur gleichen Zeit erstellt wurde, und [[Softlanding Linux System]] (SLS). Die erste kommerziell auf CD erhältliche Distribution war 1992 das von Adam J. Richters entwickelte [[Yggdrasil Linux]]. Am 16. Juli 1993 veröffentlichte [[Patrick Volkerding]] die Distribution [[Slackware]], die auf SLS basiert. Sie ist die älteste heute noch aktive Linux-Distribution.<br /> <br /> Die ersten Nutzer kannten noch freie Software aus der Zeit vor den 1980er-Jahren und schätzten Linux, weil sie wieder die [[Verwertungsrecht]]e an der von ihnen verwendeten Software besaßen. Spätere Nutzer waren Unix-Anwender, die Linux zunächst vor allem privat einsetzten und sich vor allem über den geringen Preis freuten. Waren die ersten Distributionen nur der Bequemlichkeit halber geschaffen worden, sind sie doch heute die übliche Art für Nutzer wie auch Entwickler, ein Linux-System zu installieren. Dabei werden die Linux-Distributionen heutzutage sowohl von Entwicklergruppen als auch von Firmen oder gemeinnützigen Projekten entwickelt und betrieben.<br /> <br /> Die Frage, welche Distributionen besonders beliebt sind, lässt sich nur schwer beantworten. Im deutschsprachigen Raum werden vor allem [[Ubuntu]], [[Debian]], [[openSUSE]] und [[Knoppix]] häufiger auch außerhalb der IT-Presse erwähnt. Darüber hinaus wäre [[Fedora (Linux-Distribution)|Fedora]] zu nennen, das von dem börsennotierten US-Unternehmen [[Red Hat]] entwickelt wird.<br /> <br /> == Arten von Distributionen ==<br /> <br /> Da Distributionen praktisch eigene [[Produkt (Wirtschaft)|Produkte]] sind, konkurrieren diese am Markt miteinander und versuchen sich einerseits voneinander abzugrenzen, andererseits aber auch anderen Distributionen keinen zu großen Vorteil zu überlassen. Daher unterscheiden sich zwar sämtliche Distributionen, es gibt aber kaum etwas, wofür sich nicht jede Distribution anpassen ließe. Hiervon ausgenommen sind nur Spezial-Systeme, etwa als Software im [[Eingebettetes System|Embedded]]-Bereich.<br /> <br /> Einige Distributionen sind speziell auf einen Anwendungsfall optimiert, so gibt es etwa Systeme speziell für den Einsatz in Bildungseinrichtungen mit hierfür spezialisierter Software und zumeist einem [[Terminal-Server]]-System, wodurch nur ein leistungsstarker Rechner benötigt wird und ansonsten auch ältere Hardware ausreicht. Beispiele sind hier [[Edubuntu]] oder [[DebianEdu]]. Ebenso gibt es Systeme speziell für veraltete Rechner, die einen geringeren Funktionsumfang haben und geringe Systemanforderungen stellen. Beispiele sind etwa [[Damn Small Linux]] oder [[Puppy Linux]], die einen Umfang von nur 50 beziehungsweise 100&amp;nbsp;MB haben.<br /> <br /> === Smartphone-Distributionen ===<br /> <br /> [[Datei:Android 4.1 on the Galaxy Nexus.jpeg|mini|200px|Android-4.1-Oberfläche]]<br /> <br /> [[Datei:Galaxy Nexus smartphone.jpg|mini|hochkant=0.5|[[Galaxy Nexus]] mit [[Android (Betriebssystem)|Android]]]]<br /> Für [[Smartphone]]s und [[Tabletcomputer|Tablets]] gibt es speziell optimierte Linux-Distributionen. Sie bieten neben den [[Telefon]]ie- und [[Short Message Service|SMS]]-Funktionen, diverse [[Personal Information Manager|PIM]]-, [[GPS|Navigations]]- und [[Multimedia]]-Funktionen. Die Bedienung erfolgt typischerweise über [[Multi-Touch]] oder mit einem Stift. Linux-basierte Smartphonesysteme werden meist von einem Firmen[[konsortium]] oder einer einzelnen Firma entwickelt und unterscheiden sich teilweise sehr stark von den sonst klassischen Desktop-, Embedded- und Server-Distributionen. Anders als im [[Eingebettetes System|Embedded]]-Bereich sind Linux-basierte Smartphonesysteme aber nicht auf ein bestimmtes Gerät beschränkt, vielmehr dienen sie als Betriebssystem für Geräte ganz unterschiedlicher Modellreihen und werden oft herstellerübergreifend eingesetzt.<br /> <br /> Die Architektur vieler Linux-basierter Smartphone- und Tablet-Betriebssysteme wie z.&amp;nbsp;B. Android, hat neben dem Linux-Kernel nur wenig Gemeinsamkeiten mit klassischen Linux-Distributionskonzepten.&lt;ref name=&quot;chrishoffman&quot; /&gt;&lt;ref name=&quot;APIs&quot; /&gt;&lt;ref name=&quot;Smartphone Disto&quot;&gt;{{cite web|url=http://www.zdnet.com/blog/hardware/the-death-of-the-linux-distro/18152 |title=The death of the Linux distro |work=The death of the Linux distro |author=Adrian Kingsley-Hughes |publisher=CBS Interactive |accessdate=2012-09-19 |date=2012-02-14 |quote=Take a look at how Android has become the dominant Linux distro on mobile platforms. […] So again, while B2G is essentially a Linux distro, people will come […]'' |language=englisch}}&lt;/ref&gt; Ob Android als wichtigstes Linux-Kernel basierendes Smartphone-Betriebssystem auch als Linux-Distribution einzuordnen ist, wird kontrovers diskutiert.&lt;ref&gt;{{cite web|url=http://jeffhoogland.blogspot.de/2011/07/six-signs-android-really-isnt-linux.html |first=Jeff |last=Hoogland |quote=''Many people argue that Android has put Linux into the hands of millions of users. While there is no doubting that Android has been a raging success, I would argue that Google has put Android into the hands of millions of people – not Linux.'' |title=Six Signs Android really isn't Linux |date=2011-07-07 |accessdate=2015-04-20 |publisher=Thoughts on technology |language=englisch}}&lt;/ref&gt; U.a. wird typischerweise auch nur ein kleiner Teil der sonst üblichen GNU-Software-Umgebung und -Tools genutzt.&lt;ref name=&quot;stallman2011&quot; /&gt; Da Android nicht vollständig freie Software ist und Googles [[Android Market]] die Verwendung unkontrollierter proprietärer Binär-Software ermöglicht, stehen [[Richard Stallman]] und die [[Free Software Foundation|FSF]] Android sehr kritisch gegenüber und empfehlen die Verwendung von Alternativen.&lt;ref name=&quot;stallman2011&quot;&gt;{{cite web|url=http://www.guardian.co.uk/technology/2011/sep/19/android-free-software-stallman |publisher=[[The Guardian]] |title=Is Android really free software? – Google’s smartphone code is often described as 'open' or 'free' – but when examined by the Free Software Foundation, it starts to look like something different|first=Richard |last=Stallman |date=2011-09-19 |accessdate=2012-09-09 |quote=the software of Android versions 1 and 2 was mostly developed by Google; Google released it under the Apache 2.0 license, which is a lax free software license without copyleft. […] The version of Linux included in Android is not entirely free software, since it contains non-free „binary blobs“ […] Android is very different from the GNU/Linux operating system because it contains very little of GNU.|language=englisch}}&lt;/ref&gt;&lt;ref&gt;{{cite web|url=http://www.gnu.org/philosophy/android-and-users-freedom.html|title=Android und die Freiheit der Nutzer – Unterstützen Sie die Kampagne Befreien Sie Ihr Android! |first=Richard|last=Stallman |publisher=gnu.org |quote=Obwohl heutige Android-Telefone erheblich weniger schlecht als Apple- oder Windows-Smartphones sind, kann nicht gesagt werden, dass sie die Freiheit der Nutzer respektieren.''|date=2012-08-05|accessdate=2012-09-09}}&lt;/ref&gt; Die meist auf Linux genutzten UNIX-artigen Dienste und Tools werden teilweise durch eine [[Java-Laufzeitumgebung]] ersetzt. Dadurch entstehen neue [[Programmierschnittstelle]]n, die sich auf beliebigen anderen Plattformen emulieren bzw. umsetzen lassen.&lt;ref&gt;{{Internetquelle |url=http://developer.android.com/guide/basics/what-is-android.html |titel=What is Android? |zugriff=2011-09-08 |werk=Android Developers Guide |sprache=en}}&lt;/ref&gt; Trotz großer Diskrepanzen&lt;ref&gt;zdnet.de: [http://www.zdnet.de/41553061/android-architektur-wieviel-linux-steckt-in-googles-os/ „Wieviel Linux steckt in Googles OS?“] von Christoph H. Hochstätter, 18. Mai 2011. Abgerufen am 11. September 2013&lt;/ref&gt;&lt;ref&gt;Anika Kehrer: [http://www.linux-magazin.de/NEWS/Wieviel-Linux-steckt-in-Android ''Wieviel Linux steckt in Android?'']. Online auf linux-magazin.de vom 10. November 2009; abgerufen am 11. September 2013.&lt;/ref&gt;&lt;ref name=&quot;APIs&quot;&gt;{{cite web|last=Paul |first=Ryan |url=http://arstechnica.com/gadgets/2009/02/an-introduction-to-google-android-for-developers/ |language=englisch |title=Dream(sheep++): A developer’s introduction to Google Android |work=[[Ars Technica]] |date=2009-02-24 |accessdate=2013-04-03}}&lt;/ref&gt;&lt;ref name=&quot;chrishoffman&quot;&gt;{{cite web|url=http://www.howtogeek.com/189036/android-is-based-on-linux-but-what-does-that-mean/ |title=Android is Based on Linux, But What Does That Mean?| quote=''Android may be based on Linux, but it’s not based on the type of Linux system you may have used on your PC. You can’t run Android apps on typical Linux distributions and you can’t run the Linux programs you’re familiar with on Android. Linux makes up the core part of Android, but Google hasn’t added all the typical software and libraries you’d find on a Linux distribution like Ubuntu. This makes all the difference.'' |date=2014-05-12 |language=englisch |accessdate=2015-04-23 |first=Chris |last=Hoffman}}&lt;/ref&gt; wird Android jedoch von manchen über gemeinsame Eigenschaften mit [[Embedded Linux|Embedded-Linux]]-Distributionen bei den Linux-Distributionen eingeordnet.&lt;ref name=&quot;BillAnderson&quot;&gt;{{Internetquelle | url=http://www.all-things-android.com/content/android-just-another-distribution-linux | titel=Android is Just Another Distribution of Linux| autor=Bill Anderson | hrsg=Android News for Costa Rica | datum=2014-05-13 | zugriff=2014-09-12 | sprache=en| zitat=''Android is not a GNU/Linux distribution, but it is a distribution of Linux. More specifically, it is a distribution of embedded Linux that uses many NetBSD utilities.''}}&lt;/ref&gt; Andere Linux-basierende Smartphone-Betriebssysteme, wie etwa [[Firefox OS]], [[Ubuntu#Ubuntu auf Smartphones|Ubuntu for phones]],&lt;ref&gt;{{Internetquelle|url=http://netzsieger.de/blog/elektronik/smartphones/ubuntu-smartphones/|titel=Canonical bringt Ubuntu auf Smartphones|zugriff=2013-01-18}}&lt;/ref&gt; [[Maemo]], [[Tizen]], [[MeeGo#Mer-Projekt|Mer]], [[Sailfish OS]]&lt;ref name=&quot;chip12&quot;&gt;{{Internetquelle |url=http://www.chip.de/news/Jolla-Erstes-Sailfish-Smartphone-Ende-2013-fuer-400__58662225.html |titel=Jolla: Erstes Sailfish-Smartphone Ende 2013 für 400&amp;nbsp;€ |hrsg=chip.de |zugriff=2013-05-29 }}&lt;/ref&gt; und [[MeeGo]] nutzen größere Teile der klassischen GNU-Software-Umgebung, so dass diese teilweise einfacher mit klassischen Linux-Anwendungen ergänzt werden können und somit eher Linux-Distributionen im klassischen Sinne entsprechen.<br /> <br /> Während die Marktanteile von bisher verbreiteten Mobil-Plattformen wie [[Apple]]s [[Apple iOS|iOS]], [[Microsoft]]s [[Windows Mobile]] und [[Nokia]]s [[Symbian OS]] sanken, konnte Android Marktanteile hinzugewinnen.&lt;ref name=&quot;smartphones&quot;&gt;[http://mobilemetrics.de/wordpress/wp-content/uploads/2012/04/iOS_vs_Android.jpg Kennzahlen zum Mobile-Markt von Business Insider], 15. April 2012, Alexander Oschatz, Radenbul, zugegriffen: 19. Juni 2012.&lt;/ref&gt; Seit Ende 2010 haben Linux-Systeme die Marktführerschaft auf dem schnell wachsenden Smartphone-Markt übernommen.&lt;ref name=&quot;Marktführerschaft&quot;&gt;[http://www.canalys.com/newsroom/google%E2%80%99s-android-becomes-world%E2%80%99s-leading-smart-phone-platform Google’s Android becomes the world’s leading smart phone platform] (englisch), zugegriffen 11. August 2011&lt;/ref&gt; Sie wiesen zusammen im Juli 2011 eine Marktanteil von mindestens &lt;!-- nicht allein Android --&gt;45 %&lt;ref name=&quot;a45&quot;&gt;{{cite web|url=http://www.nzz.ch/nachrichten/digital/nokia_krise_1.11867798.html |title=Nokias Krise verschärft sich |publisher=[[Neue Zürcher Zeitung|NZZ]]-Online |accessdate=2012-01-10 |date=2011-08-11}}&lt;/ref&gt; auf.<br /> Während sich die Linux-basierenden Smartphone-Distributionen Bada oder WebOs nicht am Markt durchsetzen konnten (Stand 2012), ist die Nachfrage nach Googles Android weiter gewachsen. Während im August 2012 die Android-Distribution bereits einen Marktanteil von 69,1 % erreicht hatte, konnte er ein Jahr später noch weiter auf 79,&amp;nbsp;3 % gesteigert werden.&lt;ref&gt;{{cite web | url=http://www.heise.de/newsticker/meldung/Marktforscher-Windows-Phone-explodiert-1931586.html | title=Marktforscher: Windows Phone explodiert | accessdate=2014-04-08 | last= | first= | authorlink= | coauthors= | date=2013-08-07 | format= | work= | publisher=[[Heise Verlag|heise online news]] | pages= | language= | quote= }}&lt;/ref&gt;<br /> <br /> === Live-Systeme ===<br /> <br /> {{Hauptartikel|Live-System}}<br /> Eine Besonderheit bilden [[Live-System]]e, die von CD, DVD, USB und anderen Medien gebootet werden. Handelte es sich hierbei zunächst nur um spezialisierte Distributionen, die den Funktionsumfang von Linux demonstrieren sollten, gehört es inzwischen zum guten Ton unter Linux-Distributionen, den Standard-Umfang in Form einer Live-CD oder (seltener) -DVD anzubieten. Einige dieser Systeme lassen sich auch direkt von der CD aus installieren.<br /> <br /> Live-Systeme können als vollständiges Linux gestartet werden, ohne auf die Festplatte zu schreiben und ohne die bestehende Konfiguration eines Rechners zu verändern. So kann die entsprechende Linux-Distribution gefahrlos auf einem Computer getestet werden. Live-Systeme eignen sich auch hervorragend zur Datenrettung und Systemanalyse, da sie von der Konfiguration des bereits bestehenden Systems unabhängig sind und so auch von möglichen Infektionen durch Würmer und Viren nicht betroffen werden können.<br /> <br /> == Linux-Distributionen neben anderen Betriebssystemen ==<br /> <br /> Die meisten Linux-Distributionen können auf derselben Hardware parallel zu anderen Betriebssystemen installiert werden. Als solche kommen bspw. eine weitere Linux-Distribution, ein anderes [[unixoid]]es Betriebssystem wie [[Mac OS X]] oder [[Solaris (Betriebssystem)|Solaris]], oder aber auch ein [[Windows]] in Betracht. Prinzipiell sind zwei Vorgehensweisen zu unterscheiden:<br /> <br /> === Multi-Boot ===<br /> <br /> {{Hauptartikel|Multi-Boot-System}}<br /> In einer [[Multi-Boot-System|Multi-Boot]]-Konfiguration werden zwei oder mehr Betriebssysteme parallel auf verschiedene Festplatten-Partitionen installiert. [[Installationsprogramm]]e moderner Linux-Distributionen können meist bereits installierte Betriebssysteme erkennen und eigenständig eine Multi-Boot-Konfiguration einrichten. Nach der Installation kann beim Bootvorgang über einen [[Bootloader]] oder [[Bootmanager]] gewählt werden, welches Betriebssystem starten soll.<br /> <br /> === Virtualisierung ===<br /> <br /> {{Hauptartikel|Virtualisierung (Informatik)}}<br /> Werden die Betriebssysteme häufig gleichzeitig genutzt, bietet sich u.&amp;nbsp;U. eher eine [[Virtualisierung (Informatik)|Virtualisierungs]]-Lösung an. Zu unterscheiden sind hierbei das Host- und Gast-System. Ersteres ist tatsächlich physisch auf der Hardware installiert. Innerhalb dessen kommt eine Virtualisierungssoftware wie bspw. [[VirtualBox]] oder [[Kernel-based Virtual Machine|KVM]] zum Einsatz. Diese emuliert für das Gast-System die gesamte erforderliche Hardware oder bietet durch ein Sicherheitssystem direkten Zugriff auf die tatsächlich vorhandene Hardware des Computers. Da diese in einer solchen Konfiguration für den gleichzeitigen Betrieb beider Systeme erforderlich ist, kann es zu Geschwindigkeitseinbußen kommen.<br /> <br /> == Unterschiede zwischen einzelnen Distributionen ==<br /> <br /> Selbst wenn man Spezial-Distributionen außer Acht lässt, unterscheiden sich auch gängige Linux-Distributionen in einigen Punkten.<br /> Wichtige Alleinstellungsmerkmale bilden zunächst Werkzeuge zur Installation wie bspw. Partitionierungstools. Diese richten sich meist nach dem Nutzerkreis einer Distribution. Während Anfängern bspw. nur wenig Optionen angeboten werden, um diese nicht zu überfordern, richten sich andere Distributionen an fortgeschrittenere Anwender, welche mehr Einstellungsmöglichkeiten bereits im Installationsstadium bevorzugen. Nach der Installation setzt sich dieser Unterschied, orientiert am Nutzerkreis, meist im Umfang von Konfigurationsprogrammen fort. So bieten manche Distributionen ausgereifte grafische Werkzeuge zur Bearbeitung von Konfigurationsdateien an, während andere lediglich die direkte Bearbeitung solcher vorsehen. Letzteres bietet jedoch oftmals die Möglichkeit einer genaueren Anpassung auf die eigenen Bedürfnisse, setzt im Gegenzug allerdings umfangreicheres Wissen beim Anwender voraus.<br /> <br /> Weiter unterscheiden sich Distributionen häufig erheblich in ihrem Umfang und der Anzahl der unterstützten [[Architektur (Informatik)|Architekturen]]. Auch spielen Art und Umfang der Dokumentation eine Rolle. So liegen einigen Produkten Handbücher bei, während andere nur Dokumentation auf Webseiten veröffentlichen. Manche verzichten ganz auf eine offizielle Dokumentation und lassen eine solche lieber – bspw. in Form von Wikis – von der Nutzerschaft pflegen. Kommerzielle Distributoren bieten daneben meist offiziellen [[Support (Dienstleistung)|Support]] an, welcher als Dienstleistung allerdings vergütet werden muss. Daneben gibt es Unterschiede im Hinblick auf die jeweilige Politik bezüglich [[Proprietäre Software|proprietärer Software]] wie bspw. [[Adobe Flash]], dem [[MP3]]-Codec oder proprietären Hardwaretreibern. Während einige Distributionen wie zum Beispiel [[Debian]] auf proprietäre Pakete prinzipiell verzichten, liefern andere diese mit, um die Nutzung zu vereinfachen. Zu unterscheiden sind weiter Community-Distributionen (bspw. Debian) von solchen, hinter denen Unternehmen stehen (bspw. [[Ubuntu]]). Entsprechend der Zielgruppe einer Distribution sind auch Größe und Fachkenntnis und Größe der Nutzerschaft verschieden. Hinsichtlich der installierbaren Software spielt für viele Nutzer auch das Angebot von bereits angepassten und fertig verpackten Softwarepaketen eine Rolle.<br /> <br /> === Kompatibilität zwischen den Distributionen ===<br /> Die Unterschiede zwischen den Distributionen wirken sich oftmals auf deren Kompatibilität aus.&lt;ref name=&quot;stillbrokeninstallation&quot;&gt;{{cite web<br /> | last = Mobily<br /> | first = Tony<br /> | title = 2009: software installation in GNU/Linux is still broken – and a path to fixing it<br /> | publisher = www.freesoftwaremagazine.com<br /> | date = 2009-06-23<br /> | url = http://www.freesoftwaremagazine.com/columns/2009_software_installation_linux_broken_and_path_fixing_it<br /> | accessdate = 2011-08-04}}&lt;/ref&gt;<br /> <br /> Schon früh in der Geschichte der Distributionen entstanden Konzepte, die Installation weiterer Software zu vereinfachen. Meist sollte Software in Form kompilierter Pakete bereitgestellt und ein Mechanismus mitgeliefert werden, der funktionelle Abhängigkeiten zwischen installierten und nachgeladenen Paketen auflösen kann. Die entstandenen [[Paketmanagement]]-Systeme arbeiten mit je eigenen Paketformaten, zum Beispiel [[RPM Package Manager|RPM]] oder [[dpkg]]. Viele Linux-Distributionen haben eine eigene Softwareverwaltung mit eigenen Binärpaketen, die zu anderen Distributionen teilweise inkompatibel sind.<br /> <br /> Die Kritik am Prinzip der Linux-Distributionen setzt unter anderem an diesem Punkt an.&lt;ref name=&quot;stillbrokeninstallation&quot; /&gt;&lt;ref name=&quot;troy&quot;&gt;{{cite web|archiveurl=https://web.archive.org/web/20071013034536/http://www.gamedev.net/reference/programming/features/linuxprogramming2/page2.asp|url=http://www.gamedev.net/reference/programming/features/linuxprogramming2/page2.asp |title=Linux Game Development Part 2 – Distributable Binaries|first=Troy |last=Hepfner |date=2007-10-01|accessdate=2011-12-19 |archivedate=2007-10-13|language=englisch|quote=Creating an executable that works on almost all Linux distributions is a challenge. There are a number of factors that contribute to the problem […]}}&lt;/ref&gt; Da nicht jedes Software-Projekt und nicht jeder Software-Entwickler die Kenntnisse und Ressourcen hat, Software für jede einzelne Linux-Distribution bereitzustellen, wird oft nur der [[Quelltext]] veröffentlicht. Aus dem veröffentlichten Quelltext lauffähige Anwendungen zu erzeugen, ist jedoch potentiell ein komplizierter und fehlerträchtiger Prozess, der vielen Anwendern zu kompliziert sein kann. Diese bleiben dann oft auf die von der Distribution mitgelieferte Software angewiesen bzw. limitiert.&lt;ref name=&quot;launchpad2010&quot;&gt;{{cite web|url=https://bugs.launchpad.net/bugs/578045 |title=Upgrading packaged Ubuntu application unreasonably involves upgrading entire OS – Bug #578045 |first=John |last=King |date=2010-05-10 |accessdate=2012-05-27 |language=englisch |work=Launchpad |publisher=Ubuntu |quote=It is easier to upgrade to the newest stable versions of most applications – even open source applications – on a proprietary operating system than it is on Ubuntu.}}&lt;/ref&gt; Die Bereitstellung des Quellcodes als Softwareauslieferungsmethode ist jedoch für Anbieter kommerzieller Software, die Software binär ausliefern wollen, keine Option, weswegen diese die Menge von Distributionen und deren Paketformaten mit spezifischen Paketen bedienen müssen, was einen großen Mehraufwand bedeutet.&lt;ref name=&quot;lgp&quot;&gt;{{cite web|url=http://blog.linuxgamepublishing.com/2009/11/24/playing-well-with-distros/|title=Playing well with distros |date=2009-11-24 |accessdate=2012-01-15|first=Eskild|last=Hustvedt|publisher=[[Linux Game Publishing]]|language=englisch|archiveurl=https://web.archive.org/web/20110921031204/http://blog.linuxgamepublishing.com/2009/11/24/playing-well-with-distros/|archivedate=2011-09-21}}&lt;/ref&gt;&lt;ref name=&quot;icaza2003&quot;&gt;{{cite web|url=http://primates.ximian.com/~miguel/texts/linux-developers.html |date=2003-11-04 |author=[[Miguel de Icaza]]|title=Linux and Independent Software Vendors |publisher=primates.ximian.com |accessdate=2012-04-07 |language=englisch |quote=[…] staffing requirements for maintaining and testing […] software for a dozen of distributions and release versions quickly becomes a big burden […]}}&lt;/ref&gt;&lt;ref&gt;{{cite web|url=http://www.hemispheregames.com/2010/05/18/porting-osmos-to-linux-a-post-mortem-part-23/|first=Dave|last=Burke|title=Porting Osmos to Linux: A Post-Mortem (part 2/3)|date=2010-05-18|accessdate=2012-06-16|language=englisch|quote=Didn’t Love: Packaging the Game. It took days of effort to create the binary packages for Osmos […] How should an app be packaged in Linux? […]There are no standards or clear answers to any of these questions. There’s no documentation for this stuff! Asking on the forums will typically net you a spectrum of answers with no consensus answer and lots of little side arguments. I basically reverse engineered what I saw other apps doing (which sadly was of little comfort because everyone does it differently). I settled on supporting .deb/.rpm/.tar.gz with explicit 32 bit and 64 bit executables […]|publisher=hemispheregames.com}}&lt;/ref&gt; Im Umfeld von Unternehmen hat deshalb nur eine begrenzte Auswahl an Distributionen eine Chance als allgemeine Arbeitsplattform.<br /> <br /> === Standardisierungsansätze ===<br /> <br /> Damit sich die Distributionen nicht weiter auseinanderentwickeln, wurde die Free Standards Group (heute [[Linux Foundation]]) mit dem Ziel gegründet, entsprechende Standards zwischen Distributionen zu fördern. Der Bekannteste ist die [[Linux Standard Base]] zur Förderung der binären Kompatibilität der Distributionen. Die LSB wird dabei von den verschiedenen Distributionen unterschiedlich strikt umgesetzt. Sie definiert übereinstimmende [[Binärschnittstelle]]n („''ABI''“ genannt, für ''Application Binary Interface''), einige Details zum inneren Aufbau und ein Paketsystem (hier [[RPM Package Manager|RPM]]), das für die Installation von Software anderer Anbieter unterstützt werden muss.<br /> <br /> Die praktische Bedeutung dieser Regeln ist allerdings nur begrenzt.&lt;ref name=&quot;linuxfordevices&quot;&gt;{{cite web|url=http://archive.linuxgizmos.com/lsb-40-certifications-aim-to-heal-linux-fragmentation/|title=LSB 4.0 certifications aim to heal Linux fragmentation |first=Eric|last=Brown |date=2010-12-08 |accessdate=2011-11-16 |language=englisch |publisher=linuxfordevices.com |quote=[…] LSB helps to reduce fragmentation, it does not eliminate it. „The issue of packaging and broader dependencies is still a big one (for me) at least“ writes Kerner. „The same RPM that I get for Fedora won’t work on Ubuntu, and Ubuntu DEB packages won’t work on SUSE etc etc.“ […]}}&lt;/ref&gt; Die einseitige Festlegung auf des RPM-Paketformat wird teilweise angezweifelt, nachdem in den letzten Jahren durch [[Ubuntu]] oder [[Linux Mint]] das [[dpkg]]-Format eine große Verbreitung erlangt hat. Weil die meisten jener Distributionen, die dpkg nutzen, direkt auf [[Debian]] basieren, sind deren Pakete oft in anderen Distributionen, die ebenfalls auf Debian basieren, installierbar. Auf der anderen Seite setzen alle von [[Fedora (Linux-Distribution)|Fedora]] (respektive [[Red Hat Linux]]), [[OpenSuse]] und [[Mandriva Linux|Mandriva]] abstammenden Distributionen auf RPM. Es ist mit einigen Einschränkungen durchaus möglich – z.&amp;nbsp;B. mit Hilfe des ''OpenSuse Build Service'' – RPM-Pakete zu erstellen, die auf allen diesen Distributionen nutzbar sind.&lt;ref name=&quot;OpenSuse Build Service&quot;&gt;{{Internetquelle | url=http://en.opensuse.org/openSUSE:Build_Service_cross_distribution_howto#Detect_a_distribution_flavor_for_special_code | titel=openSUSE:Build Service cross distribution howto | hrsg=Suse ([[Novell]]) | datum=2013-5-11 | zugriff=2014-02-06 | sprache=en}}&lt;/ref&gt;<br /> <br /> Eine weitere Standardisierung stellt der [[Filesystem Hierarchy Standard]] dar, der eine gemeinsame Benennung einiger Datei- und Verzeichnisnamen und eine übereinstimmende Struktur der Basisverzeichnisse ermöglichen soll. Allerdings sind auch hier Details nicht geregelt, die bisher die Inkompatibilitäten erzeugten. Andere Probleme ergeben sich erst durch die feste Integration von Anwendungen in den Systemverzeichnisbaum.&lt;ref name=&quot;gobolinux&quot;&gt;{{cite web<br /> | url = http://www.kuro5hin.org/story/2003/5/9/05015/62649<br /> | title = The Unix tree rethought: an introduction to GoboLinux<br /> | accessdate = 2010-06-03<br /> | publisher = www.kuro5hin.org<br /> | last=Muhammad<br /> | first=Hisham<br /> | date=2003-05-09}}&lt;/ref&gt; Er wird von der ''Linux Standard Base'' vorausgesetzt.<br /> <br /> Weil die Standards nicht ausreichend umgesetzt wurden, kündigte im Dezember 2006 [[Ian Murdock]], damals Technikchef der Free Standards Group, im Rahmen der Linux Standard Base eine weitere Initiative an, die Installation von Software zu vereinfachen. Kern des Verfahrens ist eine [[Programmierschnittstelle]], die über das Paketmanagement der jeweiligen Distribution gelegt wird. Diese Schnittstelle kann Standardfunktionen für das Softwarepaket bereitstellen und sie für die jeweilige Distribution umsetzen. So soll es möglich sein, Dateien und Abhängigkeiten an das distributionseigene Paketmanagementsystem weiterzugeben.&lt;ref name=&quot;ian-part1&quot;&gt;[[Ian Murdock]]: ''[http://ianmurdock.com/?p=388 Software installation on Linux: Today, it sucks (part 1)]'' in seinem Weblog, 15. Dezember 2006&lt;/ref&gt;&lt;ref name=&quot;ian-part2&quot;&gt;[[Ian Murdock]]: ''[http://ianmurdock.com/?p=391 Software installation on Linux: Tomorrow, it won’t (with some cooperation) (part 2)]'' in seinem Weblog, 19. Dezember 2006&lt;/ref&gt; Eine praktische Umsetzung hierzu gab es jedoch zumindest bis Anfang 2013 nicht.<br /> <br /> == Alternativansätze für die Programmverbreitung ==<br /> <br /> Es gibt einige Alternativansätze zu dem Modell der zentralen Softwareverbreitung über die Distributionen und deren [[Repository|Repositories]]. Projekte wie [[Autopackage]]&lt;ref&gt;{{cite web|url=http://www.linux-magazin.de/Heft-Abo/Ausgaben/2006/02/Eines-fuer-alle |title=Distributionsunabhängige Pakete mit Autopackage – Eines für alle|first=Robert |last=Staudinger |publisher=[[Linux-Magazin]] 2006/02 |date=2006-02-01 |accessdate=2012-04-11 |quote=Obwohl sie nach dem gleichen Prinzip arbeiten, laufen RPMs von Suse 9.2 nicht unter Suse 9.3 und schon gar nicht unter Red Hat. Das Autopackage-Projekt setzt auf einen einheitlichen Standard für die Erstellung von Installationspaketen. Dabei lösen die einzelnen Pakete ihre Abhängigkeiten selbst auf.}}&lt;/ref&gt;, [[Zero Install]]&lt;ref name=&quot;leonard2007&quot;&gt;{{cite web|url=http://www.osnews.com/story/16956/Decentralised_Installation_Systems |title=Decentralised Installation Systems|first=Thomas|last=Leonard|date=2007-01-16 |accessdate=2012-05-03 |language=englisch |publisher=osnews.com}}&lt;/ref&gt; oder der [[Klik]]-Nachfolger ''PortableLinuxApps''&lt;ref name=&quot;portableapps&quot;&gt;{{cite web|url=http://portablelinuxapps.org/docs/1.0/AppImageKit.pdf |format=pdf; 38&amp;nbsp;kB |publisher=PortableLinuxApps.org |first=Simon| last=Peter |date=2010 |accessdate=2011-07-29 |title=AppImageKit Documentation 1.0 |pages=2-3|quote=Linux distributions mostly use package managers for everything. While this is perceived superior to Windows and the Mac by many Linux enthusiasts, it also creates a number of disadvantages: Centralization […], Duplication of effort […], Need to be online […], No recent apps on mature operating systems […], No way to use multiple versions in parallel […], Not easy to move an app from one machine to another […]. The AppImage format has been created with specific objectives in mind: Be distribution-agnostic […], Maintain binary compatibility […]}}&lt;/ref&gt; versuchen eine einheitliche, aber dezentrale, distributionsunabhängige, binäre Softwareverbreitungsmöglichkeit zu schaffen, konnten aber bis jetzt faktisch keine relevante Verbreitung oder Unterstützung der Linux-[[Online-Community#Entwicklungs-Community|Community]] erreichen.&lt;ref name=&quot;byfield&quot;&gt;{{cite web|archiveurl=https://web.archive.org/web/20080331092730/http://www.linux.com/articles/60124 |url=http://www.linux.com/articles/60124|title=Autopackage struggling to gain acceptance |first=Bruce |last=Byfield|date=2007-02-12 |accessdate=2012-01-21|publisher=linux.com |archivedate=2008-03-31|language=en|quote=If Hearn is correct, the real lesson of Autopackage is not how to improve software installation, but the difficulty – perhaps the impossibility – of large-scale changes in Linux architecture this late in its history. It’s a sobering, disappointing conclusion to a project that once seemed so promising.}}&lt;/ref&gt;<br /> <br /> Ein Schritt in diese Richtung war 2011 die Einführung eines ''Software Center'' in [[Ubuntu]],&lt;ref name=&quot;softwarecenter&quot;&gt;{{Internetquelle |url=http://techie-buzz.com/foss/synaptics-removed-ubuntu-11-10.html |titel=Software Center ersetzt Synaptic |zugriff=2011-09-29 |sprache=en|datum=2011-06-23 |autor=Ricky Laishram}}&lt;/ref&gt; nach dem Modell des [[App Store (iOS)|App Stores]] von [[Apple]], um die Anzahl der Applikationen signifikant erhöhen zu können, da das Distributionsmodell nur begrenzt skaliert.&lt;ref name=&quot;UDS2010&quot;&gt;{{cite web|title=UDS N Monday plenary: Getting great applications on Ubuntu |work=Ubuntu Developer Summit 2010|date=2010-10-25 |url=http://www.youtube.com/watch?v=GT5fUcMUfYg |first=Matthew Paul|last=Thomas |language=englisch |accessdate=2012-04-29}}&lt;/ref&gt;<br /> <br /> 2012 betonte auch der [[Linux-Kernel|Kernelentwickler]] [[Ingo Molnár]] die Notwendigkeit der Bereitstellung einer solchen dezentralen, skalierbaren und distributionsunabhängigen Softwareverbreitungsmethode; das Fehlen eines solchen Mechanismus sei eines der Kernprobleme des Linux-Desktops.&lt;ref name=&quot;molnar2012&quot;&gt;{{cite web|url=https://plus.google.com/109922199462633401279/posts/VSdDJnscewS|quote=So, to fix desktop Linux we need a radically different software distribution model: less of a cathedral, more of a bazaar. […] – totally flat package dependencies (i.e. a package update does not forcibly pull in other package updates) […] – a guaranteed ABI platform going forward (once a package is installed it will never break or require forced updates again). Users want to be free of update pressure from the rest of the system, if they choose to.|date=2012-03-17|title=Ingo Molnar|accessdate=2012-06-16|language=englisch |publisher=plus.google.com |author=[[Ingo Molnár]]}}&lt;/ref&gt;<br /> <br /> == Siehe auch ==<br /> * [[Liste von Linux-Distributionen]]<br /> <br /> == Literatur ==<br /> <br /> * Johannes Plötner, [[Steffen Wendzel]]: ''Linux. Das umfassende Handbuch.'' 4. Auflage. Galileo Press, Bonn 2010, ISBN 978-3-8362-1704-0.<br /> * [[Michael Kofler]]:'' Linux 2010: Debian, Fedora, openSUSE, Ubuntu.'' 9. Auflage. Addison-Wesley, München 2009, ISBN 978-3-8273-2158-9. (bis zur 8. Auflage unter dem Titel: ''Linux. Installation, Konfiguration, Anwendung.'')<br /> <br /> == Weblinks ==<br /> {{Commonscat|Linux distributions|Linux-Distribution}}<br /> * [http://distrowatch.com/index.php?language=DE Distributionsübersicht mit Ranglisten auf DistroWatch.com]<br /> * [http://www.frozentech.com/content/livecd.php Auflistung der Live-CD-Distributionen]<br /> * [http://futurist.se/gldt/ Timeline der Linuxdistributionen als Grafik]<br /> * [http://distrochooser.de/ Linux Distribution Chooser]&amp;nbsp;– ein Hilfswerkzeug für die Wahl zwischen verschiedenen verbreiteten Linux-Distributionen<br /> * [http://linuxhelp.blogspot.com/2006/04/mind-map-of-linux-distributions.html Mind Map of Linux distributions] – eine Übersicht über den Linux-Stammbaum<br /> * [http://www.downloadlinux.org/ Download Linux]<br /> <br /> == Einzelnachweise ==<br /> &lt;references /&gt;<br /> <br /> [[Kategorie:Linux-Distribution| ]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=LibrePlanet&diff=161791853 LibrePlanet 2016-06-04T23:37:56Z <p>Dsprc: /* LibrePlanet conference */</p> <hr /> <div>{{multiple issues|<br /> {{refimprove|date=June 2016}}<br /> {{third-party|date=June 2016}}<br /> }}<br /> <br /> {{Infobox recurring event|logo = File:LibrePlanetWiki.png}}'''LibrePlanet''' (literally, &quot;Free Planet&quot;) is a community project created and supported by the [[Free Software Foundation]]. Its objective is the promotion of [[free software]] around the world by bringing every year an international conference to local communities&lt;ref&gt;[http://libreplanet.org/wiki/ Wiki].&lt;/ref&gt; and organizations.&lt;ref&gt;[http://libreplanet.org/wiki/LibrePlanet2011 Planète Libre 2011].&lt;/ref&gt;<br /> <br /> ==History==<br /> The project was born in 2006, at a gathering of members associated with the Foundation and the will to organize into geographical groups.<br /> <br /> ==LibrePlanet conference==<br /> [[File:Libreplanet.png|380x380px|thumb|&lt;center&gt;Logo used for the LibrePlanet conference from 2010-2012<br /> Based on the graphical style of [[The Haçienda]] in keeping with<br /> <br /> the theme of &quot;[[Ivan Chtcheglov|The Hacienda Must Be Built]]&quot;<br /> &lt;/center&gt;]]The conference is organized annually by the [[Free Software Foundation]] in or around [[Boston, Massachusetts]] and staffed by a mixture of foundation staff and community volunteers. The conference replaces the FSF Annual Members Meeting (AMM) which ran around the same time each year.<br /> <br /> Each conference has its own theme and a website, t-shirt and posters are produced on this theme. From 2010-2012 the posters closely mimicked the style of flyers from [[The Haçienda]] and [[Factory Records]] in general, followed by a large party at a nearby bar paid for by members of the Libre.fm and GNU social communities.<br /> <br /> The event typically includes a speech from FSF president, [[Richard Stallman]] and FSF executive director [[William John Sullivan|John Sullivan]], as well as members of the wider free software community. <br /> {| class=&quot;wikitable&quot;<br /> !Year<br /> !Dates<br /> !Location<br /> !Themes<br /> !Prominent events<br /> |-<br /> |2009<br /> |March 21/22<br /> |[[Harvard Science Center]]<br /> |<br /> * End Software Patents<br /> * Free Network Services<br /> |<br /> * [[Libre.fm]] project was conceived <br /> * A [[book sprint]] was run by [[FLOSS Manuals]] to create &quot;Introduction to the Command Line&quot;<br /> * [[Creative Commons]] and [[Wietse Venema]] win the [[FSF Free Software Awards|annual FSF awards]]<br /> |-<br /> |2010<br /> |March 20/21<br /> |Harvard Science Center<br /> |<br /> * Working Together For Free Software<br /> |<br /> * March 19 was a [[GNU Project|GNU developers]] conference<br /> * [[Internet Archive]] and [[John Gilmore (activist)|John Gilmore]] win the FSF awards<br /> |-<br /> |2011<br /> |March 19<br /> |[[Bunker Hill Community College]]<br /> |<br /> * Acting locally for global free software adoption.<br /> |<br /> * Single Day conference with a number of local students invited<br /> * [[Tor (anonymity network)|Tor]] and [[Rob Savoye]] win the annual FSF awards<br /> * Additionally, a special mention was made to honor the memory and contribution of Adrian Hands, who used a morse input device to code and successfully submit a GNOME patch, three days before he died from ALS.<br /> |-<br /> |2012<br /> |March 24/25<br /> |[[University of Massachusetts Boston|University of Massachusetts, Boston]]<br /> |<br /> |<br /> * [[GNU Health]] and [[Yukihiro Matsumoto]] win the FSF awards<br /> |-<br /> |2013<br /> |March 23/24<br /> |Cambridge, MA<br /> |<br /> |<br /> * [[OpenMRS]] and [[Fernando Pérez (software developer)|Fernando Pérez]]<br /> |-<br /> |2014<br /> |March 22/23<br /> |Cambridge, MA<br /> |<br /> |<br /> * [[Outreachy]] (then known as Free and Open Source Software Outreach Program for Women) and [[Matthew Garrett]]<br /> |-<br /> |2015<br /> |March 21/22<br /> |[[Ray and Maria Stata Center|MIT Stata Center]]<br /> |<br /> |<br /> * Reglue and Sébastien Jodogne<br /> |-<br /> |2016<br /> |March 19/20<br /> |Cambridge, MA; [[Massachusetts Institute of Technology|MIT]]<br /> | ''&quot;[[Fork (software development)|Fork]] the System&quot;''<br /> |<br /> *[[Edward Snowden]]: ''&quot;The Last Lighthouse&quot;''&lt;ref&gt;{{cite web|author1=Snowden, Edward|author2=Daniel Kahn Gillmor|title=Libreplanet 2016: The Last Lighthouse: Free Software In Dark Times|url=https://media.libreplanet.org/u/libreplanet/m/libreplanet-2016-the-last-lighthouse-3d51/|website=media.libreplanet.org|publisher=Free Software Foundation|accessdate=2 June 2016|format=video, [[WebM]]}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Nicholson, Deb|title=LibrePlanet begins with Snowden, ends with DRM protest|url=https://opensource.com/life/16/3/libreplanet-2016|website=opensource.com|accessdate=2 June 2016|date=29 March 2016}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Gold, Jon|title=Edward Snowden: Privacy can't depend on corporations standing up to the government|url=http://www.networkworld.com/article/3046135/security/edward-snowden-privacy-cant-depend-on-corporations-standing-up-to-the-government.html|website=networkworld.com|accessdate=2 June 2016|date=19 March 2016}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Popa, Bogdan|title=Snowden Used Free Software Because He Was Afraid of Backdoors in Microsoft Apps|url=http://news.softpedia.com/news/snowden-used-free-software-because-he-was-afraid-of-backdoors-in-microsoft-apps-502039.shtml|publisher=''SoftPedia'' News|accessdate=2 June 2016|date=22 March 2016|quote=NSA whistleblower Edward Snowden attended the Free Software Foundation LibrePlanet 2016 conference remotely from Russia to discuss the advantages of free applications, explaining that he couldn’t trust Microsoft software when revealing government’s surveillance programs in 2013.}}&lt;/ref&gt;<br /> |}<br /> <br /> == See also ==<br /> * [[GNU Hurd]]<br /> * [[Libre Software Meeting]]<br /> * [[Linux-libre]]<br /> <br /> == References ==<br /> {{reflist}}<br /> <br /> ==External links==<br /> * [https://libreplanet.org/wiki/Main_Page LibrePlanet official website and wiki]<br /> <br /> [[Category:International conferences]]<br /> [[Category:Free software culture and documents]]<br /> [[Category:Computer-related events]]<br /> [[Category:Free Software Foundation]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=LibrePlanet&diff=161791852 LibrePlanet 2016-06-04T23:36:57Z <p>Dsprc: /* LibrePlanet conference */</p> <hr /> <div>{{multiple issues|<br /> {{refimprove|date=June 2016}}<br /> {{third-party|date=June 2016}}<br /> }}<br /> <br /> {{Infobox recurring event|logo = File:LibrePlanetWiki.png}}'''LibrePlanet''' (literally, &quot;Free Planet&quot;) is a community project created and supported by the [[Free Software Foundation]]. Its objective is the promotion of [[free software]] around the world by bringing every year an international conference to local communities&lt;ref&gt;[http://libreplanet.org/wiki/ Wiki].&lt;/ref&gt; and organizations.&lt;ref&gt;[http://libreplanet.org/wiki/LibrePlanet2011 Planète Libre 2011].&lt;/ref&gt;<br /> <br /> ==History==<br /> The project was born in 2006, at a gathering of members associated with the Foundation and the will to organize into geographical groups.<br /> <br /> ==LibrePlanet conference==<br /> [[File:Libreplanet.png|380x380px|thumb|&lt;center&gt;Logo used for the LibrePlanet conference from 2010-2012<br /> Based on the graphical style of [[The Haçienda]] in keeping with<br /> <br /> the theme of &quot;[[Ivan Chtcheglov|The Hacienda Must Be Built]]&quot;<br /> &lt;/center&gt;]]The conference is organized annually by the [[Free Software Foundation]] in or around [[Boston, Massachusetts]] and staffed by a mixture of foundation staff and community volunteers. The conference replaces the FSF Annual Members Meeting (AMM) which ran around the same time each year.<br /> <br /> Each conference has its own theme and a website, t-shirt and posters are produced on this theme. From 2010-2012 the posters closely mimicked the style of flyers from [[The Haçienda]] and [[Factory Records]] in general, followed by a large party at a nearby bar paid for by members of the Libre.fm and GNU social communities.<br /> <br /> The event typically includes a speech from FSF president, [[Richard Stallman]] and FSF executive director [[William John Sullivan|John Sullivan]], as well as members of the wider free software community. <br /> {| class=&quot;wikitable&quot;<br /> !Year<br /> !Dates<br /> !Location<br /> !Themes<br /> !Prominent events<br /> |-<br /> |2009<br /> |March 21/22<br /> |[[Harvard Science Center]]<br /> |<br /> * End Software Patents<br /> * Free Network Services<br /> |<br /> * [[Libre.fm]] project was conceived <br /> * A [[book sprint]] was run by [[FLOSS Manuals]] to create &quot;Introduction to the Command Line&quot;<br /> * [[Creative Commons]] and [[Wietse Venema]] win the [[FSF Free Software Awards|annual FSF awards]]<br /> |-<br /> |2010<br /> |March 20/21<br /> |Harvard Science Center<br /> |<br /> * Working Together For Free Software<br /> |<br /> * March 19 was a [[GNU Project|GNU developers]] conference<br /> * [[Internet Archive]] and [[John Gilmore (activist)|John Gilmore]] win the FSF awards<br /> |-<br /> |2011<br /> |March 19<br /> |[[Bunker Hill Community College]]<br /> |<br /> * Acting locally for global free software adoption.<br /> |<br /> * Single Day conference with a number of local students invited<br /> * [[Tor (anonymity network)|Tor]] and [[Rob Savoye]] win the annual FSF awards<br /> * Additionally, a special mention was made to honor the memory and contribution of Adrian Hands, who used a morse input device to code and successfully submit a GNOME patch, three days before he died from ALS.<br /> |-<br /> |2012<br /> |March 24/25<br /> |[[University of Massachusetts Boston|University of Massachusetts, Boston]]<br /> |<br /> |<br /> * [[GNU Health]] and [[Yukihiro Matsumoto]] win the FSF awards<br /> |-<br /> |2013<br /> |March 23/24<br /> |Cambridge, MA<br /> |<br /> |<br /> * [[OpenMRS]] and [[Fernando Pérez (software developer)|Fernando Pérez]]<br /> |-<br /> |2014<br /> |March 22/23<br /> |Cambridge, MA<br /> |<br /> |<br /> * [[Outreachy]] (then known as Free and Open Source Software Outreach Program for Women) and [[Matthew Garrett]]<br /> |-<br /> |2015<br /> |March 21/22<br /> |[[Ray and Maria Stata Center|MIT Stata Center]]<br /> |<br /> |<br /> * Reglue and Sébastien Jodogne<br /> |-<br /> |2016<br /> |March 19/20<br /> |Cambridge, MA; [[Massachusetts Institute of Technology|MIT]]<br /> | ''&quot;[[Fork (software development)|Fork]] the System&quot;''<br /> |<br /> *[[Edward Snowden]]: ''&quot;The Last Lighthouse&quot;''<br /> |}<br /> <br /> == See also ==<br /> * [[GNU Hurd]]<br /> * [[Libre Software Meeting]]<br /> * [[Linux-libre]]<br /> <br /> == References ==<br /> {{reflist}}<br /> <br /> ==External links==<br /> * [https://libreplanet.org/wiki/Main_Page LibrePlanet official website and wiki]<br /> <br /> [[Category:International conferences]]<br /> [[Category:Free software culture and documents]]<br /> [[Category:Computer-related events]]<br /> [[Category:Free Software Foundation]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=8kun&diff=187755820 8kun 2016-05-26T22:58:30Z <p>Dsprc: </p> <hr /> <div>{{other uses|8chan (disambiguation)}}<br /> {{Use mdy dates|date=September 2015}}<br /> {{Infobox website<br /> | name = 8chan<br /> | logo = InfiniteChan∞chanLogo.svg<br /> | logo alt = A green infinity symbol left of the word chan.<br /> | logo caption = <br /> | logo size = 200px<br /> | screenshot = <br /> | alt = <br /> | caption = <br /> | url = {{URL|https://8ch.net}}<br /> | slogan = <br /> | commercial = Yes<br /> | type = [[Imageboard]]<br /> | language = English, Japanese (users can create language specific boards)<br /> | registration = Optional<br /> | author = [[Fredrick Brennan]]<br /> | owner = [[:ja:ジム・ワトキンス|Jim Watkins]],&lt;br /&gt; N.T. Technology ([[2channel]])&lt;ref&gt;[https://8ch.net/who.html 8chan] - Who owns 8chan?&lt;/ref&gt;<br /> | launch date = {{start date and age|2013|10|22|df=no}}<br /> | alexa = {{IncreaseNegative}} 10,084 ({{as of|2015|8|22|alt=August 2015}})&lt;ref name=&quot;alexa&quot;&gt;{{cite web|url= http://www.alexa.com/siteinfo/8ch.net |title= 8ch.net Site Info | publisher= [[Alexa Internet]] |accessdate= August 22, 2015 }}&lt;/ref&gt;<br /> | current status = Online<br /> }}<br /> <br /> '''8chan,''' also called '''Infinitechan,''' is an [[English language|English-language]] [[imageboard]] website composed of user-created [[Internet forum|boards]]. Each board is moderated by its respective creator, with minimal interaction from other site administration.&lt;ref name=&quot;faq&quot;&gt;{{cite web|last=Brennan|first=Fredrick|url=https://8ch.net/faq.html|title=FAQ|publisher=Infinitechan|website=8chan.co|accessdate=November 23, 2014}}&lt;/ref&gt;<br /> <br /> The site has received both praise and criticism for its stance on [[Freedom of speech|free speech]], which involves allowing any content to be posted, so long as it adheres to United States law.<br /> <br /> Several sites's boards have played an active role in the [[Gamergate controversy]], encouraging Gamergate affiliates to frequent 8chan after the topic was banned on the unaffiliated imageboard [[4chan]]. As of August 2015, the site was the 10,204th most visited site in the world,&lt;ref name=&quot;alexa&quot; /&gt; and in November 2014, it was receiving an average of 35,000 unique visitors per day and 400,000 posts per week when it was at a higher rank.&lt;ref name=Howell2014 /&gt;<br /> <br /> ==History==<br /> 8chan was created in October 2013 by computer programmer [[Fredrick Brennan]],&lt;ref name=Howell2014 /&gt;&lt;ref&gt;{{cite web|last1=Machkovech|first1=Sam|title=Full transcript: Ars interviews 8chan founder Fredrick Brennan|url=http://arstechnica.com/business/2015/03/full-transcript-ars-interviews-8chan-founder-fredrick-brennan/|publisher=Ars Technica|accessdate=June 15, 2015|date=March 17, 2015}}&lt;/ref&gt; also known by the nickname &quot;Hotwheels.&quot;&lt;ref name=&quot;KYM&quot;/&gt; Brennan created the website after he observed what he perceived to be rapidly escalating [[surveillance]] and a loss of [[free speech]] on the Internet.&lt;ref name=Howell2014 /&gt; Brennan, who considers the imageboard [[4chan]] to have grown into authoritarianism, describes 8chan as a &quot;free-speech-friendly&quot; alternative,&lt;ref name=&quot;Howell2014&quot;&gt;{{cite web|last=Howell O'Neill|first=Patrick|date=November 17, 2014|url=http://www.dailydot.com/politics/8chan-pedophiles-child-porn-gamergate/|title=8chan, the central hive of Gamergate, is also an active pedophile network|work=The Daily Dot}}&lt;/ref&gt; and had originally conceptualized the site while experiencing a [[psychedelic experience|psychedelic mushrooms trip]].&lt;ref name=&quot;KYM&quot;/&gt;&lt;ref name=WashPost /&gt;<br /> <br /> No experience or programming knowledge is necessary for users to create their own boards.&lt;ref name=&quot;faq&quot; /&gt; Since as early as March 2014, its [[FAQ]] has stated only one rule that is to be globally enforced: &quot;Do not post, request, or link to any content illegal in the United States of America. Do not create boards with the sole purpose of posting or spreading such content.&quot;&lt;ref name=&quot;faq&quot; /&gt; Brennan has claimed that, while he finds some of the content posted by users to be &quot;reprehensible,&quot; he feels personally obligated to uphold the site's integrity by tolerating discussion he does not necessarily support regardless of his moral stance.&lt;ref name=Howell2014 /&gt;<br /> <br /> Brennan agreed to partner 8chan with the Japanese message board [[2channel]],&lt;ref name=&quot;KYM&quot;&gt;{{cite web|url=http://knowyourmeme.com/blog/interviews/qa-with-fredrick-brennan-of-8chan|title=Q&amp;A with Fredrick Brennan of 8chan|last=Caldwell|first=Don|date=October 9, 2014|work=[[Know Your Meme]]|accessdate=December 18, 2014}}&lt;/ref&gt; and subsequently relocated to the [[Philippines]] in October 2014.&lt;ref name=Chen /&gt;<br /> <br /> In January 2015, the site changed its [[Domain name|domain]] 8chan.co to 8ch.net after multiple people filed reports complaining to 8chan’s [[Domain name registrar|registrar]] that the message board hosted [[child pornography]]. Despite subsequently regaining the domain, the site remained at 8ch.net, with the old domain redirecting to it.&lt;ref name=WashPost /&gt;<br /> <br /> Numerous bugs in the Infinity software led to the funding and development of a successor platform dubbed &quot;Infinity Next&quot;. After a several-month-long testing period, a migration to the new software was attempted in December 2015, but failed.&lt;ref&gt;{{cite web |url=https://ghostbin.com/paste/qt2ww |format=Plaintext |title=qt2ww |last=Moon |first=Joshua |date=2015-12-19 |accessdate=2015-12-20 }}&lt;/ref&gt;{{clarify|date=December 2015}} Eventually, development was halted, and the main developer, Joshua Moon, fired by Brennan.&lt;ref&gt;{{cite web|last1=Brennan|first1=Fredrick|title=Infinity Never|url=https://medium.com/@infinitechan/infinity-never-3d5f733af739#.dfm7b7te5|website=Medium|accessdate=2 February 2016|language=English|date=26 January 2016}}&lt;/ref&gt;<br /> <br /> ==Controversies==<br /> <br /> ===Child pornography===<br /> ''[[The Washington Post]]'' described it as &quot;the more-lawless, more-libertarian, more 'free' follow-up to 4chan.&quot;&lt;ref name=&quot;WashPost&quot;&gt;{{cite web|url=http://www.washingtonpost.com/news/the-intersect/wp/2015/01/13/this-is-what-happens-when-you-create-an-online-community-without-any-rules/|title=This is what happens when you create an online community without any rules|work=[[The Washington Post]]|last=Caitlin|first=Dewey|date=January 13, 2015}}&lt;/ref&gt; Boards have been created to discuss controversial topics, including [[pedophilia]]. While the sharing of illegal content is against site rules, ''[[The Daily Dot]]'' wrote that boards do exist to share sexualized images of minors in provocative poses, and that some users of those boards do post links to explicit child pornography hosted elsewhere.&lt;ref name=&quot;Howell2014&quot;/&gt; When asked whether such boards were an inevitable result of free speech, Brennan responded, &quot;Unfortunately, yes. I don’t support the content on the boards you mentioned, but it is simply the cost of free speech and being the only active site to not impose more 'laws' than those that were passed in [[Washington, D.C.]]&quot;&lt;ref name=&quot;Howell2014&quot;/&gt;<br /> <br /> In August 2015, for a brief period, 8chan was blacklisted from [[Google Search]] for containing content constituting &quot;suspected child abuse content.&quot;&lt;ref name=ars-8chancensor&gt;{{cite web|title=8chan-hosted content disappears from Google searches|url=http://arstechnica.com/tech-policy/2015/08/8chan-hosted-content-disappears-from-google-searches/|last=Machkovech|first=Sam|website=[[Ars Technica]]|publisher=[[Condé Nast]]|date=August 14, 2015|accessdate=August 17, 2015}}&lt;/ref&gt; It was later restored to the search engine's listings without explanation.&lt;ref&gt;{{Cite web|url = https://medium.com/@infinitechan/google-is-not-your-friend-5a6636af0651|title = Google is not your friend?|date = August 13, 2015|accessdate = September 9, 2015|website = Medium|publisher = |last = Brennan|first = Frederick}}&lt;/ref&gt;<br /> <br /> ===Gamergate===<br /> {{main|Gamergate controversy}}<br /> On September 18, 2014, the website gained prominence in the [[Gamergate controversy]] after 4chan banned discussion of Gamergate,&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;/&gt;&lt;ref&gt;{{cite news|last=Audureau|first=William|title=4chan, wizardchan, 8chan... s'y retrouver dans la jungle des forums anonymes les plus populaires du Web|url=http://www.lemonde.fr/pixels/article/2014/10/15/4chan-wizardchan-8chan-le-guide-des-forums-anonymes-les-plus-populaires-du-web_4505380_4408996.html|work=[[Le Monde]]|location=France|language=French|date=October 15, 2014}}&lt;/ref&gt; whereupon 8chan became one of several hubs of Gamergate activity.&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;&gt;{{cite web|last=Chen|first=Adrian|date=October 27, 2014|url=http://nymag.com/daily/intelligencer/2014/10/gamergate-supporters-party-at-strip-club.html|title=Gamergate Supporters Partied at a Strip Club This Weekend|work=[[New York (magazine)]]}}&lt;/ref&gt;&lt;ref name=&quot;Buzz&quot;/&gt;&lt;ref name=&quot;Guardian 2015-01-13&quot; /&gt; &quot;/gg/,&quot; 8chan's initial Gamergate-oriented board, also gained attention after being compromised by members of the internet troll group [[Gay Nigger Association of America]], forcing Gamergate activists to migrate to &quot;/gamergate/.&quot; This replacement quickly became the site's second most populous board.&lt;ref name=&quot;Buzz&quot;&gt;{{cite web|last1=Bernstein|first1=Joseph|title=GamerGate’s Headquarters Has Been Destroyed By Trolls|url=http://www.buzzfeed.com/josephbernstein/gamergates-headquarters-has-been-destroyed-by-trolls|publisher=''[[Buzzfeed]]''|date=December 4, 2014}}&lt;/ref&gt;<br /> <br /> ===Swatting incidents===<br /> In January 2015 the site was used as a base for [[swatting]] exploits in [[Portland, Oregon|Portland]], [[Seattle]], and [[Burnaby|Burnaby, British Columbia]], most of them tied to the victims' criticism of Gamergate and 8chan's association with it;&lt;ref name=&quot;Mattise&quot;&gt;{{cite web|last=Mattise|first=Nathan|date=January 4, 2015|url=http://arstechnica.com/tech-policy/2015/01/8chan-tries-swatting-gamergate-critic-sends-cops-to-an-old-address/|title=8chan tries &quot;swatting&quot; GamerGate critic, sends cops to an old address|work=[[Ars Technica]]}}&lt;/ref&gt; the attacks were coordinated on a [[Internet forum|board]] on the website called &quot;/baphomet/.&quot;&lt;ref name=&quot;Guardian 2015-01-13&quot;&gt;{{cite news |last=Hern |first=Alex |url=http://www.theguardian.com/technology/2015/jan/13/gamergate-hits-new-low-with-attempts-to-send-swat-teams-to-critics |title=Gamergate hits new low with attempts to send Swat teams to critics |work=[[The Guardian]] |date=January 13, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt; One of the victims of a swatting attack said that she was singled out because she had followed someone on [[Twitter]].&lt;ref name=&quot;GlobalNews 2015-01-15&quot;&gt;{{cite news |last=McElroy |first=Justin |url=http://globalnews.ca/news/1773840/police-called-to-burnaby-womens-home-by-online-harassers/ |title=Police falsely called to Burnaby women’s home by online harassers |work=[[Global News]] |date=January 15, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt;&lt;ref&gt;{{cite web|url=http://www.gameranx.com/updates/id/26081/article/canadian-victim-of-gamergate-swatting-attempt-comes-forward/|title=Canadian Victim of Gamergate SWATing Attempt Comes Forward|work=Gameranx|last=Cheong|first=Ian Miles|date=January 13, 2015|accessdate=January 16, 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://bc.ctvnews.ca/reckless-swatting-prank-sends-police-to-b-c-woman-s-home-1.2189547|title=Reckless ‘swatting’ prank sends police to B.C. woman’s home|work=[[CTV News]]|date=January 14, 2015|accessdate=September 30, 2015|author=&lt;!-- Staff writers --&gt;}}&lt;/ref&gt; On February 9, 2015, contents on the &quot;/baphomet/&quot; subboard were wiped after [[doxxing|personal information]] of [[Katherine B. Forrest|Katherine Forrest]], the presiding judge in the [[Silk Road (marketplace)|Silk Road]] case, had been posted there.&lt;ref name=&quot;silkroad&quot;&gt;{{Cite web| title = Notorious 8chan &quot;subboard&quot; has history wiped after federal judge’s doxing| first = Sam |last = Machkovech|work = Ars Technica| date = February 12, 2015| accessdate = February 13, 2015| url = http://arstechnica.com/security/2015/02/notorious-8chan-subboard-has-history-wiped-after-federal-judges-doxing/}}&lt;/ref&gt;<br /> <br /> ===Los Angeles school-closure incident===<br /> [[File:CWh686mUwAEQLoj.png|thumb|upright=0.35|alt=Photograph of Vincent Canfield|Owner and operator of cock.li, Vincent Canfield]]<br /> On Tuesday, December 15, 2015, the New York City and Los Angeles County Boards of Education were both sent a superficially threatening, but actually fraudulent, e-mail message that had originated from an 8chan-linked service called &quot;cock.li&quot;. The New York City school board did not take the message seriously, but the Los Angeles County school board refused to take the chance and ordered all public schools closed for the entire day, citing what it called a &quot;credible terror threat.&quot; Sam Biddle, a contributor to [[Gawker.com]], called the message &quot;extremely dumb&quot; in an article on the site he filed under &quot;Pranks,&quot; writing:<br /> {{cquote|Even if this message hadn’t been sent from a “cock.li” email account, it would’ve been hard to imagine it was a credible threat of violence, particularly since it conflates 4chan-style “death to the normies” rhetoric with convoluted Islamism. It looks very much like the work of a kid who really didn’t want to go to school.}}<br /> In the article, which he titled “Here’s the Full, Extremely Dumb Email That Shut Down the Entire L.A. Public School System,” Biddle quoted the e-mail message itself, word for word.&lt;ref&gt;{{Cite web| title = Here’s the Full, Extremely Dumb Email That Shut Down the Entire L.A. Public School System| first = Sam |last = Biddle|work = Gawker| date = December 16, 2015| accessdate = December 16, 2015| url = http://gawker.com/heres-the-full-extremely-dumb-email-that-shut-down-the-1748402588/}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Bluestone, Gabrielle|title=Bicoastal School Bomb Threats Were Sent From an 8Chan-Linked &quot;Cockmail&quot; Service|url=http://gawker.com/bicoastal-school-bomb-threats-sent-from-8chan-linked-c-1748175650|publisher=Gawker|accessdate=4 January 2016|date=15 December 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Farivar, Cyrus|title=All LA schools shut down over message sent from 8chan’s e-mail host, cock.li|url=http://arstechnica.com/tech-policy/2015/12/all-la-schools-shut-down-over-message-sent-from-8chans-e-mail-host-cock-li/|website=Ars Technica|publisher=Condé Nast|accessdate=4 January 2016|date=16 December 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Neff, Blake|title=LA School Threat Came From Online ‘Meme Sewer’|url=http://dailycaller.com/2015/12/15/la-school-threat-came-from-online-meme-sewer/|publisher=The Daily Caller|accessdate=4 January 2016|date=12 December 2015}}&lt;/ref&gt;<br /> <br /> ==References==<br /> {{Reflist|30em}}<br /> <br /> ==External links==<br /> * {{Official website}}<br /> <br /> {{Gamergate controversy}}<br /> {{Tor hidden services}}<br /> <br /> {{DEFAULTSORT:8chan}}<br /> [[Category:2channel]]<br /> [[Category:American websites]]<br /> [[Category:Community websites]]<br /> [[Category:Free web software]]<br /> [[Category:Internet forums]]<br /> [[Category:Imageboards]]<br /> [[Category:Internet properties established in 2013]]<br /> [[Category:Obscenity controversies]]<br /> [[Category:Tor hidden services]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=Parted_Magic&diff=152258576 Parted Magic 2016-03-07T08:39:10Z <p>Dsprc: update version und datum</p> <hr /> <div>{{Infobox Betriebssystem<br /> | Logo = [[Datei:Logo Parted Magic.png|Logo von Parted Magic]]<br /> | Screenshot = [[Datei:Parted Magic 2014 04 28.png|300px|Screenshot]]<br /> | Beschreibung = Parted Magic, Version 2014_04_28<br /> | Entwickler = Patrick Verner<br /> | Sprache = Englisch<br /> | Version = 2016_03_02<br /> | Freigabedatum = 2. März 2016<br /> | Stammbaum = [[GNU]]/[[Linux]] {{Kind|1}}[[Softlanding Linux System|SLS]] {{Kind|2}}[[Slackware]] {{Kind|3}}Parted Magic&lt;ref name=&quot;Netzwelt.de_2011-04-15&quot;&gt;[http://www.netzwelt.de/news/86300-parted-magic-6-0-rettungs-linux-festplatten-test.html Parted Magic 6.0: Das Rettungs-Linux für Festplatten im Test] – Artikel bei ''[[Netzwelt.de]]'', vom 15.&amp;nbsp;April 2011&lt;/ref&gt;<br /> | Kernel = 4.4.2<br /> | Chronik = <br /> | Architekturen = <br /> | Lizenz = [[GNU General Public License|GNU GPL]] ([[Freie Software]])<br /> | Installationsmedium = [[Compact Disc|CD]], [[USB-Stick]]<br /> | Sonstiges = Unterstützte [[Dateisystem]]e: [[ext2]], [[ext3]], [[ext4]], [[File Allocation Table#FAT16|FAT16]], [[File Allocation Table#FAT32|FAT32]], [[HFS (Dateisystem)|HFS]], [[HFS Plus|HFS+]], [[Journaled File System|JFS]], [[Linux-Swap]], [[NTFS]], [[Reiser File System|ReiserFS]], Reiser4 und [[XFS (Dateisystem)|xfs]]<br /> | Website = [http://www.partedmagic.com/ partedmagic.com]<br /> }}<br /> <br /> '''Parted Magic''' ist eine rund 480&amp;nbsp;[[Megabyte]]&lt;ref&gt;&lt;!-- 479.199.232 Byte --&gt;Stand: Version 2014_04_28 (ISO-Abbild „[https://partedmagic.com/downloads/ pmagic_2014_04_28.iso]“)&lt;/ref&gt; große [[Live-System|Live]]-[[Linux-Distribution]] aus den [[Vereinigte Staaten|Vereinigten Staaten]] mit dem Ziel, eine komplette [[Festplattenlaufwerk|Festplatten]]-Management-Lösung zu bieten. Dazu bietet das System unter anderem das Partitionierungsprogramm ''[[GNU Parted]]'' und das darauf aufbauende [[Grafische Benutzeroberfläche|GUI]]-Programm ''GParted'' an.<br /> <br /> == Details ==<br /> Parted Magic ist als [[Direktstartsystem]] für die Speichermedien [[Compact Disc|CD]] und [[USB-Stick]], sowie im [[Preboot Execution Environment|PXE]]-Format erhältlich und lädt sich beim Startvorgang komplett in den [[Arbeitsspeicher]]. Für den Betrieb werden mindestens 1 Gigabyte Arbeitsspeicher benötigt (als Direktsystem 512&amp;nbsp;MB).<br /> <br /> == Funktionsumfang ==<br /> Neben GNU Parted und dem darauf aufbauenden [[GNU Parted#GParted|GParted]] bietet Parted Magic unter anderem folgende Programme an, um Festplatten auf Fehler zu untersuchen und diese wenn möglich zu beheben:<br /> * [[Partimage]], dessen Nachfolger [[FSArchiver]] inklusive [[Grafische Benutzeroberfläche|GUI]] ([[qt4-fsarchiver]]) und [[Clonezilla]] – Dient der Sicherung und Wiederherstellung von [[Festplattenlaufwerk|Festplatten]] und [[Partition (Datenträger)|Partitionen]]<br /> * [[smartmontools]] inklusive GUI ([[GSmartControl]]) – Überprüft und erkennt mögliche Defekte von Festplatten via [[Self-Monitoring, Analysis and Reporting Technology|SMART]]<br /> * [[TestDisk]] – Überprüft und stellt gelöschte Partitionen und Daten wieder her<br /> * Eine eigene simple GUI zum sicheren Löschen von Partitionen, ganzen Festplatten oder des [[Master Boot Record|MBR]] – verwendet unter anderem [[dd (Unix)|dd]], [[Shred (Unix)|shred]] und [[Darik’s Boot and Nuke|nwipe]]<br /> * [[NTFS-3G]] – [[Gerätetreiber|Treiber]] für Schreib- und Lesezugriff auf das [[NTFS]]-Dateisystem von [[Microsoft Windows]].<br /> * Zahlreiche [[fdisk]]-Programme (Partitionierungsprogramme)<br /> <br /> '''Warnung bei Windows 8:''' Zur Zeit sollte man Schreibzugriffe auf das Dateisystem von Windows 8 meiden.&lt;ref&gt;http://www.heise.de/open/artikel/Linux-und-Windows-8-Schnellstart-gefaehrdet-Daten-1780057.html&lt;/ref&gt; Es besteht die Gefahr von Datenverlust, da bei dem mit Standardeinstellungen benutzten Schnellstart oder auch im normalen [[Ruhezustand]] Informationen zum Zustand aller eingebundenen Dateisysteme (z.&amp;nbsp;B. NTFS und FAT32) in ein Speicherabbild geschrieben werden. Abhilfe schafft unter anderem die Deaktivierung des Schnellstarts.<br /> <br /> Die Distribution verwendet die [[Desktop-Umgebung]] [[LXDE]] und bietet die in vielen heutigen [[Betriebssystem]]en üblichen Programme wie [[Portable Document Format|PDF]]-Betrachter ([[Evince]]), [[Bildbetrachter]] ([[Mirage (Software)|Mirage]]), [[Packprogramm]]e ([[File Roller]]), Musik-Player ([[Audacious]]), [[Brennprogramm]]e ([[Xfburn]]), [[CD-Ripper]] ([[Asunder]]) und das [[Drucksystem]] [[Common Unix Printing System|CUPS]] an.<br /> Zudem sind einige Internet-Programme wie ein [[IRC-Client]] ([[XChat]]) und der [[Webbrowser]] [[Mozilla Firefox|Firefox]] mit nachladbarem [[Adobe Flash#Flash Player|Flash]] und [[Java-Laufzeitumgebung|Java]] als auch der [[Freie Software|freie]] [[Virenscanner]] [[ClamAV]] mit der [[Grafische Benutzeroberfläche|grafischen Benutzeroberfläche]] ClamTk vorhanden.<br /> Eine simple [[Grafische Benutzeroberfläche|GUI]] ermöglicht das Speichern von getätigten Einstellungen für zukünftige Sitzungen. Auch die Installation auf einer [[Festplatte]] ist möglich.<br /> <br /> == Lizenz &amp; Preis ==<br /> Parted Magic wird unter der [[GNU General Public License]] veröffentlicht und ist damit [[Freie Software]].<br /> <br /> Früher konnte Parted Magic kostenfrei von der Webseite des Projektes heruntergeladen werden. Seit Anfang August 2013 jedoch (ab Version 2013_08_01) wird für den Bezug von Parted Magic über eine [[Paywall]] der Projekt-Webseite eine Gebühr erhoben. Das Preismodell sieht verschiedene Tarife vor und reicht von 9,99 [[US-Dollar|USD]] für einen Einmal-Download des CD-Images, über 12,99 USD für den Erhalt von Parted Magic auf CD bzw. ab 17,99 USD auf USB-Stick, bis zu 49,99 USD für ein Jahresabonnement, welches zu unbeschränkten Downloads aller erscheinenden Versionen incl. der wöchentlichen Builds legitimiert.&lt;ref&gt;https://partedmagic.com/downloads/ Paywall&lt;/ref&gt;<br /> <br /> Der Sourcecode von Parted Magic ist weiterhin gratis herunterladbar.&lt;ref&gt;http://beefdrapes.partedmagic.com/source/ Source Code&lt;/ref&gt;<br /> <br /> == Sonstiges ==<br /> Der Autor spendet monatlich einen gewissen Betrag an andere Freie Software- und Open Source-Projekte, welche in Parted Magic verwendet werden. Regelmäßige Spenden begannen, schon bevor sich der Autor zum Einrichten einer Paywall entschlossen hat. Die Spenden betrugen 2013 3.000 USD und 2014 (Stand 2. Juli) bislang 2.500 USD. Sie werden in einer eigenen Forums-Sektion bekanntgegeben.&lt;ref&gt;http://forums.partedmagic.com/viewforum.php?f=11 Open Source Donations from Parted Magic&lt;/ref&gt;<br /> <br /> == Entwicklungsgeschichte ==<br /> <br /> {| class=&quot;wikitable&quot;<br /> |- class=&quot;hintergrundfarbe5&quot;<br /> ! Version<br /> ! Datum<br /> ! Anmerkungen<br /> |-<br /> | {{Version|o|1.0–1.9}}<br /> | style=&quot;white-space: nowrap;&quot; | 25. Dezember 2006 (1.0)<br /> | Erste Version 1.0 wurde veröffentlicht.<br /> |-<br /> | {{Version|o|2.0–2.2}}<br /> | style=&quot;white-space: nowrap;&quot; | 11. Februar 2008 (2.0)<br /> | Entfernung von [[Gnome Partition Editor|GParted]] zugunsten des neu hinzugefügten, eigenentwickelten Partitionierungs-Programmes ''VisParted''; weitere Programme können manuell als Module hinzugefügt werden. In Version 2.1 wurde zusätzlich die Unterstützung von [[ext4]]-Dateisystemen in VisParted hinzugefügt; VisParted wurde in Version 2.2 jedoch entfernt und GParted wieder hinzugefügt, da letzteres Projekt trotzdem weitergeführt wird.<br /> |-<br /> | {{Version|o|3.0–3.7}}<br /> | style=&quot;white-space: nowrap;&quot; | 25. Juli 2008 (3.0)<br /> | Die Desktop-Umgebung ''[[Xfce]]'' wurde in Version 3.1 durch ''[[LXDE]]'' ersetzt, in Version 3.2 wurde [[Slackware]]s ''installpkg'' hinzugefügt. Die Unterstützung für das ext4-Dateisystem wurde in Version 3.5 wieder hinzugefügt, da GParted dieses Dateisystem nun unterstützt.<br /> |-<br /> | {{Version|o|4.0–4.11}}<br /> | style=&quot;white-space: nowrap;&quot; | 4. April 2009 (4.0)<br /> | Unter anderem Unterstützung für [[Device Mapper|Device-Mapper]]-[[RAID]]-Partitionen, neues [[Artwork]], [[initramfs]] anstelle von [[initrd]]; in Version 4.6 wurde das Virenschutzprogramm ''[[ClamAV]]'' aufgenommen; mit Version 4.11 kam der Internet-Browser ''[[Google Chrome#Chromium|Chromium]]'' dazu.<br /> |-<br /> | {{Version|o|5.0-5.10}}<br /> | style=&quot;white-space: nowrap;&quot; | 12. Juli 2010 (5.0)<br /> | Implementierung der Programmiersprache [[awk]] und Anzeige von System- und Festplatteninformationen. Mit Version 5.2 wird die Eingabemethode ''{{lang|en|Smart Common Input Method}}'' (SCIM) unterstützt, mit Version 5.3 wird keine ''LiveUSB''-Version mehr zum Download angeboten, aber [[UNetbootin]] unterstützt. In Version 5.10 wird Chromium durch [[Mozilla Firefox]] ersetzt.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Parted Magic 5.0-5.10|url=http://partedmagic.com/doku.php?id=changelog |zugriff=11. November 2011|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|6.0-6.7}}<br /> | style=&quot;white-space: nowrap;&quot; | 12. April 2011 (6.0)<br /> | Das grafische Startmenü (zum Hochfahren) wurde durch eine minimalistisch gehaltene Version ersetzt. Mit Version 6.2 wird die Anzeige des Desktops unter Rox und feh aufgeteilt; [[ntfsprogs]] wird durch [[NTFS-3G]] ersetzt. In Version 6.3 werden mehr CPU-Kerneloptionen hinzugefügt (i486, i686, x86_64); in Version 6.7 wurden PCManFM und SimpleBurn durch PCMan-Mod und Xfburn ersetzt.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 6.0 bis 6.7|url=http://partedmagic.com/doku.php?id=changelog |zugriff=11. November 2011|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|11.11.11 bis 2011_12_30}}<br /> | style=&quot;white-space: nowrap;&quot; | 11. November 2011 (11.11.11)<br /> | Einführung einer neuen Versionsbenennung (nach Datum), die mit der nächsten Version wieder leicht modifiziert wurde. In Version 2011_12_30 wurden cifs-utils-5.2 und keyutils_1.5.2 hinzugefügt.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2011er Reihe|url=http://partedmagic.com/doku.php?id=changelog |zugriff=28. Februar 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_2_19}}<br /> | style=&quot;white-space: nowrap;&quot; | 19. Februar 2012<br /> | ''Aktualisierungen:'' TrueCrypt 7.1, wxGTK-2.8.12, linux-3.2.6, clonezilla-1.2.12-10, partclone_0.2.45, ddrescue-1.15, e2fsprogs-1.42, hdparm-9.38, pciutils-3.1.9, nilfs-utils-2.1.1, ntfs-3g_ntfsprogs-2012.1.15, pcmanfm-mod-1.2.4, unetbootin-linux-568, firefox-10.0.1&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_2_19|url=http://partedmagic.com/doku.php?id=changelog |zugriff=20. Februar 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_2_27}}<br /> | style=&quot;white-space: nowrap;&quot; | 27. Februar 2012<br /> | ''Aktualisierung:'' GParted 0.12.0&lt;br /&gt;Außerdem wurde ein Bug in Clonezilla behoben.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_2_27|url=http://partedmagic.com/doku.php?id=changelog |zugriff=28. Februar 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_3_24}}<br /> | style=&quot;white-space: nowrap;&quot; | 24. März 2012<br /> | ''Aktualisierungen:'' Xorg drivers Nouveau-git, linux-3.2.13, firefox-11.0, nwipe-0.08, und e2fsprogs-1.42.1&lt;br /&gt;''Neue Programme:'' bar_1.11.1 und md5deep-4.1&lt;br /&gt;Die Kompatibilität von [[Clonezilla]] mit [[Busybox]] wurde verbessert.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_3_24|url=http://partedmagic.com/doku.php?id=changelog |zugriff=30. März 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_4_21}}<br /> | style=&quot;white-space: nowrap;&quot; | 21. April 2012<br /> | ''Aktualisierungen:'' e2fsprogs-1.42.2, dosfstools_3.0.12, mtools_4.0.17, util-linux-2.21.1, coreutils-8.16, bootinfoscript-061, gptfdisk-0.8.4, ms-sys-2.3.0, pigz-2.2.4, safecopy-1.7, gparted-0.12.1, lzip-1.13, parted-3.1, plzip-0.8, ddrescue-1.16-rc3, dhcp-4.2.1_P1, dhcpcd-5.2.12, ethtool-2.6.36, net-tools-1.60, hdparm-9.39, wicd-1.7.2, linux-3.2.15, clonezilla-1.2.12-37, ntfs-3g_ntfsprogs-2012.1.15AR.1, testdisk-6.14-WIP, smartmontools-5.42, flashrom-0.9.5.2.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_4_21|url=http://partedmagic.com/doku.php?id=changelog |zugriff=23. April 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_05_14}}<br /> | style=&quot;white-space: nowrap;&quot; | 14. Mai 2012<br /> | ''Aktualisierungen:'' openssl-0.9.8v, mount-gtk-1.2.0, MesaLib-8.0.2, fontconfig-2.8.0, freeglut-2.8.0, glew-1.5.7, libdrm-2.4.33, mtdev-1.1.2, xf86-input-*(9x), xf86-video-*(34x), xorg-server-1.12.1, glibc-2.15, linux-3.3.6, lxpanel-0.5.9, plpbt-5.0.14. ''Hinzugefügt:'' iptables-1.4.10, ConsoleKit-0.4.3, polkit-0.101, polkit-gnome-0.101, spacefm-0.7.6, sudo-1.7.4p6, udisks-1.0.4.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_5_14|url=http://partedmagic.com/doku.php?id=changelog |zugriff=17. Mai 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_05_30}}<br /> | style=&quot;white-space: nowrap;&quot; | 30. Mai 2012<br /> | ''Aktualisierungen:'' coreutils-8.17, file-5.11, lftp-4.3.6, mbr-1.1.11, openssh-6.0p1, openssl-0.9.8x, rdesktop-1.7.1, sshfs-fuse-2.4, unetbootin-575, zerofree-1.0.2, clamav-0.97.4, e2fsprogs-1.42.3, fuse-2.9.0, rsync-3.0.9, cifs-utils-5.4, keyutils-1.5.5, krb5-1.7.1, curl-7.25.0, libidn-1.25, openldap-client-2.4.31, spacefm-0.7.7. ''Hinzugefügt:'' pyneighborhood-0.5.4, shorewall-4.4.27, shorewall6-4.4.27.3, gptsync-0.14, udevil-0.2.4.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_5_30|url=http://partedmagic.com/doku.php?id=changelog |zugriff=1. Juni 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_06_07}}<br /> | style=&quot;white-space: nowrap;&quot; | 7. Juni 2012<br /> | ''Aktualisierungen:'' clonezilla-1.2.12-60, ntfs-3g_ntfsprogs-2012.1.15AR.5, partclone-0.2.48, testdisk-6.14-WIP, bash-4.2.024, lxinput-0.3.2, menu-cache-0.3.3, xmms2-0.8DrO_o, libogg-1.2.2, libvorbis-1.3.2, lxmusic-0.4.5, mpg123-1.13.3, alsa-lib-1.0.25, alsa-utils-1.0.25. ''Hinzugefügt:'' dislocker, libdiscid-0.2.2, libsndfile-1.0.24, kmod-8, nmap-5.51&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_6_07|url=http://partedmagic.com/doku.php?id=changelog |zugriff=9. Juni 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_06_26}}<br /> | style=&quot;white-space: nowrap;&quot; | 26. Juni 2012<br /> | ''Aktualisierungen:'' xrandr-1.3.5, bluez-4.91, fsarchiver-0.6.15, linux-3.4.3, e2fsprogs-1.42.4, sed-4.2.1, libdrm-2.4.35, xf86-video-nouveau-git_20120614_36d3f8c, freetype-2.4.10, ddrescue-1.16, pixman-0.26.0, xorg-server-1.12.2, firefox-13.0.1, gzip-1.5, psmisc-22.18, clamav-0.97.5, ethtool-3.4.1, xz-5.0.4, conky-1.9.0., xdg-user-dirs-0.13, xdg-utils-1.1.0_rc1, boost_1_49_0, cifs-utils-5.5. ''Hinzugefügt:'' arpwatch-2.1a15, sallu-xclamscan-1.1.1, arandr-0.1.6, samba-3.5.14, pm-utils-1.4.1, libmcs-0.7.2, libmowgli-0.7.1.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_6_26|url=http://partedmagic.com/doku.php?id=changelog |zugriff=29. Juni 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_07_05}}<br /> | style=&quot;white-space: nowrap;&quot; | 5. Juli 2012<br /> | ''Aktualisierungen:'' grep-2.13, mount-gtk-1.2.1, linux-3.4.4, udevil-0.2.9, lshw-B.02.16, partclone-0.2.49, clonezilla-1.2.12-67, nbd-3.0.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_07_05|url=http://partedmagic.com/doku.php?id=changelog |zugriff=5. Juli 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_07_13}}<br /> | style=&quot;white-space: nowrap;&quot; | 13. Juli 2012<br /> | ''Aktualisierungen:'' gparted-0.13.0, exfat-utils-0.9.7, fuse-exfat-0.9.7, gparted-0.12.1-git, udev-182, xorg-server-1.12.3, btrfs-progs-20120708, pciutils-3.1.10, smartmontools-5.43.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_07_13|url=http://partedmagic.com/doku.php?id=changelog |zugriff=14. Juli 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_07_28}}<br /> | style=&quot;white-space: nowrap;&quot; | 28. Juli 2012<br /> | ''Aktualisierungen:'' gopenssl-1.0.1c, cryptsetup-1.4.3, dbus-1.4.20, LVM2.2.02.96, mdadm-3.2.5, util-linux-2.21.2, atk-2.4.0, dbus-glib-0.98, gdk-pixbuf-2.26.1, glib-2.32.3, gtk+-2.24.10, libnotify-0.7.5, pango-1.30.1, bind-9.9.1-P1, curl-7.26.0, elinks-0.11.7, lftp-4.3.8, nmap-6.01, ntp-4.2.6p5, openldap-2.4.31, openssh-6.0p1, gftp-2.0.19, newt-0.52.14, slang2-2.2.4, vte-0.28.2, spacefm-0.7.10, udevil-0.3.1, linux-3.4.6, iptables-1.4.14, xfce4-screenshooter-1.8.1, xfburn-git from 07/26/2012, libpng-1.2.50, libpng-1.4.12.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_07_28|url=http://partedmagic.com/doku.php?id=changelog |zugriff=3. August 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_08_09}}<br /> | style=&quot;white-space: nowrap;&quot; | 9. August 2012<br /> | ''Aktualisierungen:'' gparted-0.13.1, gptfdisk-0.8.5, lm_sensors-3.3.2, firefox-14.0.1, xf86-video-nv-2.1.20.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_08_09|url=http://partedmagic.com/doku.php?id=changelog |zugriff=15. August 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_09_12}}<br /> | style=&quot;white-space: nowrap;&quot; | 12. September 2012<br /> |<br /> |-<br /> | {{Version|o|2012_10_10}}<br /> | style=&quot;white-space: nowrap;&quot; | 10. Oktober 2012<br /> | ''Aktualisierungen:'' python-2.7.3, bzip2-1.0.6, dbus-python-1.1.0, libgpg-error-1.10, mesa-9.0, nmap-6.01, notify-python-0.1.1, pixman-0.27.2, py2cairo-1.8.10, pygobject-2.28.6, pygtk-2.24.0, pyneighborhood-0.5.4, smartmontools-6.0, wicd-1.7.2.4, gparted-0.14.0, firefox-16.0, ethtool-3.6, linux-3.5.6, gnome-ppp-0.3.23, libtorrent-0.13.0, rtorrent-0.9.0, wvdial-1.61, wvstreams-4.6.1, zfs-fuse-20120201_6abfdcf, xf86-input-*(11x), xf86-video-*(36x), xorg-server-1.13.0, reiser4progs-1.0.7, libaal-1.0.5, hdparm-9.42, cryptsetup-1.4.3, libcap-2.22, libgcrypt-1.5.0, pcre-8.12, ncurses-5.9, ncdu-1.9, nwipe-0.11, e2fsprogs-1.42.6, lilo-23.2, clamav-0.97.6, dhcp-4.2.4-P2, hdt-0.5.2, spacefm-0.8.0, udevil-0.3.3<br /> |-<br /> | {{Version|o|2012_11_30}}<br /> | style=&quot;white-space: nowrap;&quot; | 30. November 2012<br /> | ''Änderungen:'' Kernel 3.6.8 (PAE), Firefox 17.0, gparted-11.23.2012, Sonstiges ''(engl. 72x Upgrade, 32x Rebuilt, 106x Added, 10x Removed)''<br /> |-<br /> | {{Version|o|2012_12_25}}<br /> | style=&quot;white-space: nowrap;&quot; | 25. Dezember 2012<br /> |<br /> |-<br /> | {{Version|o|2013_01_29}}<br /> | style=&quot;white-space: nowrap;&quot; | 29. Januar 2013<br /> | ''Aktualisierungen:'' Kernel 3.7.5, Firefox 18.0.1<br /> |-<br /> | {{Version|o|2013_02_28}}<br /> | style=&quot;white-space: nowrap;&quot; | 28. Februar 2013<br /> | ''Aktualisierungen:'' Kernel 3.7.9, Firefox 19.0.1, u.v.m.<br /> |-<br /> | {{Version|o|2013_05_01}}<br /> | style=&quot;white-space: nowrap;&quot; | 1. Mai 2013<br /> | ''Aktualisierungen:'' Kernel 3.8.10, Firefox 20.0.1, GParted 0.16.1, EFI boot von CD wurde deutlich verbessert<br /> |-<br /> | {{Version|o|2013_06_15}}<br /> | style=&quot;white-space: nowrap;&quot; | 15. Juni 2013<br /> | ''Aktualisierungen:'' Kernel 3.8.13, Clonezilla 3.3.40<br /> |-<br /> | {{Version|o|2013_08_01}}<br /> | style=&quot;white-space: nowrap;&quot; | 1. August 2013<br /> | ''Aktualisierungen:'' Kernel 3.10.4, Clonezilla 3.5.1, Firefox 22.0<br /> |-<br /> | {{Version|o|2013_09_26}}<br /> | style=&quot;white-space: nowrap;&quot; | 26. September 2013<br /> | ''Aktualisierungen:'' Kernel 3.10.12, Firefox 24.0<br /> |-<br /> | {{Version|o|2013_11_11}}<br /> | style=&quot;white-space: nowrap;&quot; | 11. November 2013<br /> | ''Aktualisierungen:'' Kernel 3.10.18, Firefox 24.1ESR<br /> |-<br /> | {{Version|o|2014_01_04}}<br /> | style=&quot;white-space: nowrap;&quot; | 4. Januar 2014<br /> | ''Aktualisierungen:'' Kernel 3.12.6, Firefox 26.0<br /> |-<br /> | {{Version|o|2014_02_26}}<br /> | style=&quot;white-space: nowrap;&quot; | 26. Februar 2014<br /> | ''Aktualisierungen:'' Kernel 3.13.4, Firefox 27.0.1<br /> |-<br /> | {{Version|o|2014_04_28}}<br /> | style=&quot;white-space: nowrap;&quot; | 28. April 2014<br /> | ''Aktualisierungen:'' Kernel 3.14.2<br /> |-<br /> | {{Version|o|2014_06_10}}<br /> | style=&quot;white-space: nowrap;&quot; | 10. Juni 2014<br /> | ''Aktualisierungen:'' Kernel 3.14.4, Firefox 29.0.1, clamav-0.98.3, e2fsprogs-1.42.10, eudev-20140510, gparted-0.19.0, gparted-badsectors-0.19.0, libdrm-2.4.54, libevdev-1.2.1, libxml2-2.9.1, libxslt-1.1.28, openssl-1.0.1h, xf86-input-evdev-2.9.0, xf86-input-synaptics-1.7.6<br /> |-<br /> | {{Version|o|2014_08_14}}<br /> | style=&quot;white-space: nowrap;&quot; | 14. August 2014<br /> |''Aktualisierungen:'' Kernel 3.15.9, Firefox 31.0, parted-3.2<br /> |-<br /> | {{Version|o|2014_09_22}}<br /> | style=&quot;white-space: nowrap;&quot; | 22. September 2014<br /> |''Aktualisierungen:'' Firefox 32.0, ddrescue-1.18.1, clonezilla-3.10.33<br /> |-<br /> | {{Version|o|2014_09_29}}<br /> | style=&quot;white-space: nowrap;&quot; | 29. September 2014<br /> | ''Aktualisierungen:'' Firefox 32.0.3, bash-4.3.026<br /> |-<br /> | {{Version|o|2014_11_19}}<br /> | style=&quot;white-space: nowrap;&quot; | 19. November 2014<br /> |<br /> |-<br /> | {{Version|o|2015_01_13}}<br /> | style=&quot;white-space: nowrap;&quot; | 13. Januar 2015<br /> |<br /> |-<br /> | {{Version|o|2015_03_06}}<br /> | style=&quot;white-space: nowrap;&quot; | 6. März 2015<br /> | ''Aktualisierungen:'' Truecrypt ersetzt durch Veracrypt 1.0f<br /> |-<br /> | {{Version|o|2015_05_04}}<br /> | style=&quot;white-space: nowrap;&quot; | 4. Mai 2015<br /> | <br /> |-<br /> | {{Version|o|2015_07_07}}<br /> | style=&quot;white-space: nowrap;&quot; | 7. Juli 2015<br /> | <br /> |-<br /> | {{Version|o|2015_08_12}}<br /> | style=&quot;white-space: nowrap;&quot; | 12. August 2015<br /> |<br /> |-<br /> | {{Version|o|2015_09_29}}<br /> | style=&quot;white-space: nowrap;&quot; | 29. September 2015<br /> | ''Aktualisierungen:'' Firefox 41<br /> |-<br /> | {{Version|o|2015_11_13}}<br /> | style=&quot;white-space: nowrap;&quot; | 13. November 2015<br /> | ''Aktualisierungen:'' Firefox 42, Kernel 4.2.6<br /> |-<br /> | {{Version|c|2016_01_06}}<br /> | style=&quot;white-space: nowrap;&quot; | 6. Januar 2016<br /> | <br /> |-<br /> | colspan=&quot;3&quot;| {{Version |l |zeige=110100}}<br /> |}<br /> <br /> == Siehe auch ==<br /> <br /> * [[SystemRescueCd]] – Ein startfähiges Notfallsystem für die Reparatur eines nicht mehr startbaren Betriebssystems und die Wiederherstellung von Daten<br /> * [[G4L]] – Ein startfähiges Notfallsystem zum Sichern (backup) oder Kopieren (clone) von Festplatten oder deren Partitionen (GPL)<br /> * [[GNU Parted#GParted|GParted]] – GNU Parted mit grafischer Oberfläche. Gibt es auch als Live-CD (GPL)<br /> * [[Liste von Linux-Distributionen]]<br /> <br /> == Weblinks ==<br /> <br /> {{Commonscat}}<br /> * [http://partedmagic.com/ Parted Magic] (englisch) – Offizielle Webseite<br /> <br /> == Einzelnachweise ==<br /> <br /> &lt;references /&gt;<br /> <br /> [[Kategorie:Linux-Distribution]]<br /> [[Kategorie:Live-CD]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=HackingTeam&diff=177174977 HackingTeam 2016-01-23T23:12:05Z <p>Dsprc: Reverted 1 edit by Hte08g (talk) to last revision by Dsprc. (TW)</p> <hr /> <div>{{Primary sources|date=July 2015}}<br /> <br /> {{Infobox company<br /> | name = Hacking Team<br /> | logo = Hacking Team logo.png<br /> | logo_size = <br /> | logo_alt = The words Hacking Team enclosed with in reversed square brackets &lt;nowiki&gt;][&lt;/nowiki&gt;<br /> | logo_caption = Company logo<br /> | logo_padding = <br /> | image = <br /> | image_size = <br /> | image_alt = <br /> | image_caption = <br /> | type = <br /> | industry = [[Information technology]]<br /> | founded = 2003<br /> | founders = David Vincenzetti, Valeriano Bedeschi<br /> | hq_location = <br /> | hq_location_city = [[Milan]]<br /> | hq_location_country = [[Italy]]<br /> | area_served = &lt;!-- or: | areas_served = --&gt;<br /> | key_people = Alberto Ornaghi, Marco Valleri<br /> | products = {{unbulleted list|Software}}<br /> | brands = <br /> | services = <br /> | owner = &lt;!-- or: | owners = --&gt;<br /> | website = {{URL|http://www.hackingteam.it/}}<br /> }}<br /> <br /> '''Hacking Team''' is a [[Milan]]-based [[information technology]] company that sells offensive intrusion and [[surveillance]] capabilities to governments, law enforcement agencies and corporations.&lt;ref name=spies&gt;{{cite web |title=The spies behind your screen |url=http://www.telegraph.co.uk/technology/8899353/The-spies-behind-your-screen.html |author=Batey, Angus |date=24 November 2011 |publisher=''The Telegraph'' |accessdate=26 July 2015}}&lt;/ref&gt; Its &quot;''Remote Control Systems''&quot; enable governments and corporations to monitor the communications of internet users, decipher their [[cryptography|encrypted]] files and emails, record [[Skype]] and other [[Voice over IP]] communications, and remotely activate microphones and camera on target computers.&lt;ref&gt;{{cite web|title=Enemies of the Internet: Hacking Team|url=http://surveillance.rsf.org/en/hacking-team/|work=[[Reporters Without Borders]]|accessdate=24 April 2014}}&lt;/ref&gt; The company has been criticized for providing these capabilities to governments with poor [[human rights]] records.&lt;ref&gt;{{cite web | last3 = Marquis-Boire | first3 = Morgan | last1 = Marczak | first1 = Bill | last2 = Gaurnieri | first2 = Claudio | last4 = Scott-Railton | first4 = John | title = Mapping Hacking Team's &quot;Untraceable&quot; Spyware | url = https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ | date = February 17, 2014}}&lt;/ref&gt; Hacking Team states that they have the ability to disable their software if it is used unethically.&lt;ref&gt;{{cite news|url=http://www.newyorker.com/online/blogs/elements/2014/03/hacked-by-ones-own-government.html|title=Hackers Without Borders|last=Kopstein|first=Joshua|work=[[The New Yorker]]|date=10 March 2014|accessdate=24 April 2014}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url = https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/|title = Police Story: Hacking Team’s Government Surveillance Malware|date = June 24, 2014|accessdate = August 3, 2014|website = Citizen Lab|publisher = University of Toronto|last1 = Marquis-Boire|first1 = Morgan | last2 = Gaurnieri | first2 = Claudio | first3 = John | last3 = Scott-Railton | first4 = Katie | last4 = Kleemola }}&lt;/ref&gt;<br /> <br /> Hacking Team employs around 40 people in its Italian office, and has subsidiary branches in [[Annapolis]], [[Washington, D.C.]] and [[Singapore]].&lt;ref name=know&gt;''[[Human Rights Watch]]'' (25 March 2014). ''&quot;[https://www.hrw.org/report/2014/03/25/they-know-everything-we-do/telecom-and-internet-surveillance-ethiopia They Know Everything We Do]&quot;''. Retrieved 1 August 2015.&lt;/ref&gt; Its products are in use in dozens of countries across six continents.&lt;ref name=Jeffries&gt;{{cite web|last=Jeffries|first=Adrianne|title=Meet Hacking Team, the company that helps the police hack you|url=http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers|accessdate=21 April 2014|work=[[The Verge]]|date=13 September 2013}}&lt;/ref&gt;<br /> <br /> ==History==<br /> Hacking Team was started by two Italian programmers: Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri created a set of tools that could be used to monitor and remotely manipulate target computers. The program, called [[Ettercap (software)|Ettercap]], was embraced both by hackers looking to spy on people, and by companies that hoped to test the security of their own networks.<br /> <br /> The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their [[Skype]] calls, the police contacted Ornaghi and Valleri and asked them to help modify the program. Hacking Team was born, and became &quot;the first sellers of commercial hacking software to the police.&quot;&lt;ref name=Jeffries/&gt;<br /> <br /> According to former employee Alberto Pelliccione, the company began as security services provider, offering [[penetration testing]], auditing and other defensive capabilities to clients.&lt;ref name=war&gt;Farivar, Cyrus (20 July 2015) &quot;''[http://arstechnica.com/security/2015/07/italian-prosecutors-investigate-former-hacking-team-employees-for-role-in-hack/ ''Hacking Team goes to war against former employees, suspects some helped hackers]''&quot;. ''Ars Technica''. Retrieved 26 July 2015.&lt;/ref&gt; Pelliccione states that as malware and other offensive capabilities were developed and accounted for a larger percentage of revenues, the organization pivoted in a more offensive direction and became increasingly compartmentalized. Pelliccione claims fellow employees working on aspects of the same platform - for example, Android exploits and payloads - would not communicate with one another, possibly leading to tensions and strife within the organization.&lt;ref name=war/&gt;<br /> <br /> In February 2014, a report from [[Citizen Lab]] identified the organisation to be using hosting services from [[Linode]], [[Telecom Italia]], [[Rackspace]], [[NOC4Hosts]] and notorious [[bullet proof hosting]] company [[Santrex]].&lt;ref&gt;{{cite news|title=Hacking Team’s US Nexus|url=https://citizenlab.org/2014/02/hacking-teams-us-nexus/|accessdate=2 August 2015|date=28 February 2014}}&lt;/ref&gt;<br /> <br /> On July 5, 2015 the company suffered a major data breach of customer data, software code, internal documents and emails. - ''See: [[#2015 data breach|§ 2015 data breach]]''<br /> <br /> ==Products and Capabilities==<br /> Hacking Team enables clients to perform remote monitoring functions against citizens via their [[Remote administration tool|RCS (Remote Control Systems)]], including their '''Da Vinci''' and '''Galileo''' platforms:&lt;ref name=spies/&gt;<br /> <br /> *Covert collection of emails, text message, phone call history and address books<br /> *[[Keystroke logging]]<br /> *Uncover search history data and take screenshots<br /> *Record audio from phone calls<br /> :*Capture audio and video stream from device memory to bypass [[cryptography]] of [[Skype]] sessions&lt;ref&gt;{{cite web | title=Mideast Uses Western Tools to Battle the Skype Rebellion |url=http://www.wsj.com/articles/SB10001424052702304520804576345970862420038 |author=Stecklow, Steve; Sonne, Paul; Bradley, Matt |date=1 June 2011 |publisher=''Wall Street Journal'' |accessdate=26 July 2015}}&lt;/ref&gt;<br /> :*Use microphones on device to collect ambient background noise and conversations<br /> *Activate phone or computer cameras<br /> *Hijack telephone GPS systems to monitor target's location<br /> *Infect target computer's [[UEFI]] [[BIOS]] [[firmware]] with a [[rootkit]]&lt;ref&gt;{{Cite web|first=Philippe |last=Lin |url=http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-uses-uefi-bios-rootkit-to-keep-rcs-9-agent-in-target-systems/ |title=Hacking Team Uses UEFI BIOS Rootkit to Keep RCS 9 Agent in Target Systems |work=TrendLabs Security Intelligence Blog |publisher=[[Trend Micro]] |date=July 13, 2015 |accessdate=July 26, 2015}}&lt;/ref&gt;<br /> *Extract WiFi passwords&lt;ref name=skiddies&gt;[http://arstechnica.com/security/2015/07/advanced-spyware-for-android-now-available-to-script-kiddies-everywhere/ &quot;Advanced spyware for Android now available to script kiddies everywhere&quot;]. ''Ars Technica''. Retrieved on 2 August 2015.&lt;/ref&gt;<br /> *Exfiltrate [[Bitcoin]] and other cryptocurrency wallet files to collect data on local accounts, contacts and transaction histories.&lt;ref name=coin&gt;Farivar, Cyrus (14 July 2015). &quot;''[http://arstechnica.com/security/2015/07/hacking-team-broke-bitcoin-secrecy-by-targeting-crucial-wallet-file/ Hacking Team broke Bitcoin secrecy by targeting crucial wallet file]''&quot;. ''Ars Technica''. Retrieved 26 July 2015.&lt;/ref&gt;<br /> <br /> Hacking Team uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.&lt;ref&gt;{{cite news|last1=Schneier|first1=Bruce|title=More on Hacking Team's Government Spying Software|url=https://www.schneier.com/blog/archives/2014/06/more_on_hacking.html}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Hacking Team Tools Allow Governments To Take Full Control of Your Smartphone|url = http://www.ibtimes.co.uk/hacking-team-tools-allow-governments-take-full-control-your-smartphone-1453987|accessdate = 2015-07-06}}&lt;/ref&gt;<br /> <br /> The malware has payloads for [[Android (operating system)|Android]],&lt;ref name=skiddies/&gt; [[BlackBerry]], Apple [[iOS]], [[Linux]], [[Mac OS X]], [[Symbian]], as well as [[Microsoft Windows]], [[Windows Mobile]] and [[Windows Phone]] class of [[operating system]]s.&lt;ref name=C3&gt;Guarnieri, Claudio; Marquis-Boire, Morgan (13 January 2014). ''[https://media.ccc.de/browse/congress/2013/30C3_-_5439_-_en_-_saal_1_-_201312292105_-_to_protect_and_infect_-_claudio_guarnieri_-_morgan_marquis-boire.html &quot;To Protect And Infect: The militarization of the Internet&quot;]''. At the 30th [[Chaos Communications Congress]] – &quot;30C3&quot;. (Video or Audio). [[Chaos Computer Club]]. Retrieved on 15 August 2015.&lt;/ref&gt;<br /> <br /> RCS is a management platform that allows operators to remotely deploy exploits and payloads against targeted systems, remotely manage devices once compromised, and exfiltrate data for remote analysis.<br /> <br /> == Controversies ==<br /> === Use by repressive goverments ===<br /> Hacking Team has been criticized for selling its products and services to governments with poor human rights records, including [[Sudan]], [[Bahrain]], and [[Saudi Arabia]].&lt;ref name=repress/&gt;<br /> <br /> In June 2014, a United Nations panel monitoring the implementation of sanctions on Sudan requested information from Hacking Team about their alleged sales of software to the country in contravention of United Nations weapons export bans to Sudan. Documents leaked in the 2015 data breach of Hacking Team revealed the organization sold Sudanese National Intelligence and Security Service access to their &quot;Remote Control System&quot; software in 2012 for 960,000 Euros.&lt;ref name=repress/&gt;&lt;ref&gt;{{Cite web|title = A Company That Sells Surveillance Software to Authoritarian Regimes Got Hacked Itself|url = http://www.slate.com/blogs/future_tense/2015/07/06/hacking_team_which_sells_spyware_to_governments_was_hacked_itself.html|accessdate = 2015-07-06|first = Lily|last = Hay Newman}}&lt;/ref&gt;<br /> <br /> In response to the United Nations panel, the company responded in January 2015 that they were not currently selling to Sudan. In a follow-up exchange, Hacking Team asserted that their product was not controlled as a weapon, and so the request was beyond the scope of the panel. There was no need for them to disclose previous sales, which they considered confidential business information.&lt;ref name=repress&gt;{{Cite web |title=A Detailed Look at Hacking Team’s Emails About Its Repressive Clients |url=https://firstlook.org/theintercept/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/ |accessdate=7 July 2015 |first1=Cora |last1=Currier |first2=Morgan |last2=Marquis-Boire}}&lt;/ref&gt;&lt;ref&gt;{{Cite web |title=Hacking Team Leaks Reveal Spyware Industry's Growth, Negligence of Human Rights |url=https://www.eff.org/deeplinks/2015/07/hacking-team-leaks-reveal-spyware-industrys-growth |accessdate=8 July 2015 |first=Sarah |last=Myers West}}&lt;/ref&gt;<br /> <br /> The U.N. disagreed. “The view of the panel is that as such software is ideally suited to support military electronic intelligence (ELINT) operations it may potentially fall under the category of ‘military … equipment’ or ‘assistance’ related to prohibited items,” the secretary wrote in March. “Thus its potential use in targeting any of the belligerents in the Darfur conflict is of interest to the Panel.”&lt;ref name=repress/&gt;&lt;ref&gt;{{Cite web|title = Hacking Team's Lame Excuse for Selling Digital Weapons to Sudan|url = http://gizmodo.com/hacking-teams-lame-excuse-for-selling-digital-weapons-t-1716375503|accessdate = 2015-07-08|first = Kate|last = Knibbs}}&lt;/ref&gt;<br /> <br /> In the fall of 2014, the Italian government abruptly froze all of Hacking Team’s exports, citing human rights concerns. After lobbying Italian officials, the company eventually won back the right to sell its products abroad.&lt;ref name=repress/&gt;<br /> <br /> === 2015 data breach ===<br /> {{Update|section|date=January 2016}}<br /> <br /> On July 5, 2015, the [[Twitter]] account of the company was compromised by an unknown individual who published an announcement of a [[data breach]] against Hacking Team's computer systems. The initial message read, &quot;''Since we have nothing to hide, we're publishing all our e-mails, files, and source code …''&quot; and provided links to over 400 [[gigabyte]]s of data, including alleged internal e-mails, invoices, and [[source code]]; which were leaked via [[BitTorrent]] and [[Mega (service)|Mega]].&lt;ref&gt;{{Wayback|url=https://twitter.com/hackingteam|title=Hacked Team (@hackingteam)|date=20150706010312}}&lt;/ref&gt; An announcement of the data breach, including a link to the bittorrent seed, was retweeted by [[WikiLeaks]] and by many others through social media.&lt;ref&gt;{{Twitter status|wikileaks|617865712611233792|Inside malware makers &quot;Hacking Team&quot;: hundreds of gigabytes of e-mails, files, and source code|[[WikiLeaks]]|July 6, 2015|July 6, 2015}}&lt;/ref&gt;&lt;ref name=&quot;ibtimes.co.uk&quot;&gt;{{Cite web|title = Hacking Team hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan|url = http://www.ibtimes.co.uk/hacking-team-hacked-spy-tools-sold-oppressive-regimes-sudan-bahrain-kazakhstan-1509460|accessdate = 2015-07-06}}&lt;/ref&gt;<br /> <br /> The material was voluminous and early analysis appeared to reveal that Hacking Team had invoiced the [[Lebanese Army]]&lt;ref&gt;{{Twitter|url=https://twitter.com/SynAckPwn/status/617955067006578689}} {{dead link|date=July 2015}}&lt;/ref&gt; and [[Sudan]] and that spy tools were also sold to [[Bahrain]] and [[Kazakhstan]].&lt;ref name=&quot;ibtimes.co.uk&quot;/&gt; Hacking Team had previously claimed they had never done business with Sudan.&lt;ref&gt;{{Cite web|title = Hacking Team hacked, attackers claim 400GB in dumped data|url = http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html|accessdate = 2015-07-06|first = Steve|last = Ragan}}&lt;/ref&gt;<br /> <br /> The leaked data revealed a [[zero-day (computing)|zero-day]] cross-platform Flash exploit ([[Common Vulnerabilities and Exposures|CVE]] number: CVE-2015-5119).&lt;ref&gt;{{Cite web|title = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html|url = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html}}&lt;/ref&gt; The dump included a demo of this exploit by opening [[Calculator (computer program)|Calculator]] from a test webpage.&lt;ref&gt;{{Cite web|title = Zero-Day Flash Player Exploit Disclosed In 'Hacking Team' Data Dump|url = http://thehackernews.com/2015/07/flash-zero-day-vulnerability.html|accessdate = 2015-07-06|first = Swati|last = Khandelwal}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Unpatched Flash Player Flaw, More POCs Found in Hacking Team Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/|accessdate = 2015-07-08|first = Peter|last = Pi}}&lt;/ref&gt; Adobe [[software patch|patched]] the hole on July 8, 2015.&lt;ref&gt;{{Cite web|title = Adobe Security Bulletin|url = https://helpx.adobe.com/security/products/flash-player/apsb15-16.html|accessdate = 2015-07-11|last = Adobe Systems (corporate author)}}&lt;/ref&gt; Another vulnerability involving Adobe was revealed in the dumps, which took advantage of a [[buffer overflow]] attack on an Adobe Open Type Manager [[Dynamic-link library|DLL]] included with [[Microsoft Windows]]. The DLL is run in [[protection ring|kernel mode]], so the attack could perform [[privilege escalation]] to bypass the [[sandbox (computer security)|sandbox]].&lt;ref&gt;{{Cite web|title = A Look at the Open Type Font Manager Vulnerability from the Hacking Team Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-the-open-type-font-manager-vulnerability-from-the-hacking-team-leak/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29|accessdate = 2015-07-08|first = Jack|last = Tang}}&lt;/ref&gt;<br /> <br /> Also revealed in leaked data was Hacking Team employees' use of weak passwords, including 'P4ssword', 'wolverine', and 'universo'.&lt;ref&gt;{{Cite web|title = Hacking Team used shockingly bad passwords|url = http://www.zdnet.com/article/no-wonder-hacking-team-got-hacked/|accessdate = 2015-07-06|first = Zack|last = Whittaker}}&lt;/ref&gt;<br /> <br /> After a few hours without response from Hacking Team, member Christian Pozzi tweeted the company was working closely with police and &quot;''what the attackers are claiming regarding our company is not true.''&quot;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964180042190848|accessdate = 2015-07-06}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964660705234944|accessdate = 2015-07-06}}&lt;/ref&gt; He also claimed the leaked archive &quot;contains a virus&quot; and that it constituted &quot;false info&quot;.&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617962663188926465|accessdate = 2015-07-06}}&lt;/ref&gt; Shortly after these tweets, Pozzi's Twitter account itself was apparently compromised.&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter: &quot;Uh Oh - my twitter account was also hacked.&quot;|url = https://web.archive.org/web/20150706084837/https://twitter.com/christian_pozzi/status/617977753250496512|date = 2015-07-06|accessdate = 2015-07-06}}&lt;/ref&gt;<br /> <br /> Responsibility for this attack was claimed by the hacker known as Phineas Fisher on Twitter.&lt;ref&gt;{{cite tweet | user=gammagrouppr | author=Phineas Fisher | number=617937092497178624 | title=gamma and HT down, a few more to go :) | date=6 July 2015}}&lt;/ref&gt; Phineas has previously attacked spyware firm Gamma International, who produce malware, such as [[FinFisher]], for governments and corporations.&lt;ref&gt;{{Cite web|title = Hacking Team: We won't 'shrivel up and go away' after cyberattack|url = http://www.zdnet.com/article/hacking-team-cyberattack-aftermath-interview/|accessdate = 2015-07-06|first = Charlie|last = Osbourne}}&lt;/ref&gt;<br /> <br /> == Customer List ==<br /> {{Table to prose|section|date=September 2015}}<br /> Hacking Team's clientele include not just governments, but also corporate clients such as [[Barclay's]] Bank and [[British Telecom]] (BT) of the [[United Kingdom]], as well as [[Deutsche Bank]] of [[Germany]].&lt;ref name=spies/&gt;<br /> <br /> A full list of Hacking Team's customers were leaked in the 2015 breach. Disclosed documents show Hacking Team had 70 current customers, mostly military, police, federal and provincial governments. The total company revenues disclosed exceeded 40 million [[Euro]]s.&lt;ref&gt;{{cite web |author=Kopstein, Justin |title= Here Are All the Sketchy Government Agencies Buying Hacking Team's Spy Tech |url=http://motherboard.vice.com/read/here-are-all-the-sketchy-government-agencies-buying-hacking-teams-spy-tech |publisher=Vice Magazine |date=6 July 2015<br /> }}&lt;/ref&gt;&lt;ref&gt;{{cite web |author=Weissman, Cale Guthrie |title=Hacked security company's documents show a laundry list of questionable clients |url=http://www.businessinsider.com/hacked-security-companys-document-2015-7 |date=6 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |author=Ragan, Steve |title=In Pictures: Hacking Team's hack curated |url=http://www.cso.com.au/slideshow/579158/pictures-hacking-team-hack-curated/?image=9 |publisher=CSO Online (Australia)}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=Hacking Team hacked: firm sold spying tools to repressive regimes, documents claim |url=http://www.theguardian.com/technology/2015/jul/06/hacking-team-hacked-firm-sold-spying-tools-to-repressive-regimes-documents-claim |author=Hern, Alex |publisher=''The Guardian'' |date=6 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=Hacking Team responds to data breach, issues public threats and denials |url=http://www.csoonline.com/article/2944333/data-breach/hacking-team-responds-to-data-breach-issues-public-threats-and-denials.html |author=Ragan, Steve |publisher=''CSO Online'' |date=6 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=A whole bunch of downed government surveillance programs are about to go back online |url=http://www.businessinsider.com/hacking-team-promises-customers-they-can-resume-surveillance-operations-soon-2015-7 |author=Stevenson, Alastair |publisher=''Business Insider'' |date=14 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;<br /> <br /> {| class=&quot;wikitable sortable&quot;<br /> |-<br /> ! Customer<br /> ! Country<br /> ! Area<br /> ! Agency<br /> ! Year First Sale<br /> ! Annual Maintenance Fees<br /> ! Total Client Revenues<br /> |-<br /> | [[Polizia Postale e delle Comunicazioni]]&lt;ref&gt;Jone Pierantonio. [http://it.ibtimes.com/cyber-space/ecco-chi-ha-bucato-hacking-team-1408915 &quot;Ecco chi ha bucato Hacking Team&quot;]. ''International Business Times''. Retrieved on 2 August 2015.&lt;/ref&gt;||Italy||Europe||LEA||2004||€100,000||€808,833<br /> |-<br /> | [[Centro Nacional de Inteligencia]]&lt;ref&gt;Ediciones El País (8 July 2015). [http://internacional.elpais.com/internacional/2015/07/08/actualidad/1436343710_282978.html &quot;Hacking Team: “Ofrecemos tecnología ofensiva para la Policía”&quot;]. ''EL PAÍS''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Spain]]||Europe||Intelligence||2006||€52,000||€538,000<br /> |-<br /> | [[Infocomm Development Authority of Singapore]]||[[Singapore]]||APAC||Intelligence||2008||€89,000||€1,209,967<br /> |-<br /> | Information Office||[[Hungary]]||Europe||Intelligence||2008||€41,000||€885,000<br /> |-<br /> | CSDN||[[Morocco]]||MEA||Intelligence||2009||€140,000||€1,936,050<br /> |-<br /> | UPDF (Uganda Peoples Defense Force), ISO (Internal Security Organization), Office of the President||[[Uganda]]||Africa||Intelligence||2015||€831,000||€52,197,100<br /> |-<br /> | Italy - DA - Rental||Italy||Europe||Other||2009||€50,000||€628,250<br /> |-<br /> | [[Malaysian Anti-Corruption Commission]]||[[Malaysia]]||APAC||Intelligence||2009||€77,000||€789,123<br /> |-<br /> | PCM||Italy||Europe||Intelligence||2009||€90,000||€764,297<br /> |-<br /> | SSNS - Ungheria||Hungary||Europe||Intelligence||2009||€64,000||€1,011,000<br /> |-<br /> | CC - Italy||Italy||Europe||LEA||2010||€50,000||€497,349<br /> |-<br /> | [[Al Mukhabarat Al A'amah]]||[[Saudi Arabia]]||MEA||Intelligence||2010||€45,000||€600,000<br /> |-<br /> | IR Authorities (Condor)||[[Luxembourg]]||Europe||Other||2010||€45,000||€446,000<br /> |-<br /> | La Dependencia y/o CISEN&lt;ref&gt;[http://fusion.net/story/163872/the-hacking-team-leak-shows-mexico-was-the-top-client-but-why/ &quot;The Hacking Team leak shows Mexico was its top client, but why?&quot;]. ''Fusion''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Mexico]]||LATAM||Intelligence||2010||€130,000||€1,390,000<br /> |-<br /> | UZC&lt;ref name=fortune/&gt; ||[[Czech Republic]] ||Europe||LEA||2010||€55,000||€689,779<br /> |-<br /> | Egypt - MOD&lt;ref name=fortune/&gt;||[[Egypt]]||MEA||Other||2011||€70,000||€598,000<br /> |-<br /> | [[Federal Bureau of Investigation]]&lt;ref name=fbidea/&gt;||USA||North America||LEA||2011||€100,000||€697,710<br /> |-<br /> | Oman - Intelligence||[[Oman]]||MEA||Intelligence||2011||€30,000||€500,000<br /> |-<br /> | President Security&lt;ref&gt;[http://motherboard.vice.com/read/hacking-teams-equipment-got-stolen-in-panama &quot;Hacking Team's Equipment Got Stolen in Panama&quot;]. ''Motherboard''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref&gt;Molina, Thabata (13 August 2015). ''[http://panampost.com/thabata-molina/2015/08/13/panama-to-investigate-martinelli-in-hacking-team-spying-scandal/ &quot;Panama to Investigate Martinelli in Hacking Team Spying Scandal&quot;]''. ''Panama Post''. Retrieved 15 August 2015.&lt;/ref&gt;<br /> ||[[Panama]]||LATAM||Intelligence||2011||€110,000||€750,000<br /> |-<br /> | [[Turkish National Police]]||[[Turkey]]||Europe||LEA||2011||€45,000||€440,000<br /> |-<br /> | UAE - MOI||[[United Arab Emirates|UAE]]||MEA||LEA||2011||€90,000||€634,500<br /> |-<br /> | [[National Security Service (Uzbekistan)|National Security Service]]&lt;ref name=fortune&gt;[http://fortune.com/2015/07/16/governments-used-spy-software/ &quot;Leaked emails from security firm Hacking Team show government use - Fortune&quot;]. ''Fortune''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Uzbekistan]]||Europe||Intelligence||2011||€50,000||€917,038<br /> |-<br /> | [[United States Department of Defense|Department of Defense]]&lt;ref name=fbidea/&gt;||USA||North America||LEA||2011||||€190,000<br /> |-<br /> | Bayelsa State Government||[[Nigeria]]||MEA||Intelligence||2012||€75,000||€450,000<br /> |-<br /> | Estado del Mexico||Mexico||LATAM||LEA||2012||€120,000||€783,000<br /> |-<br /> | Information Network Security Agency||[[Ethiopia]]||MEA||Intelligence||2012||€80,000||€750,000<br /> |-<br /> | State security (Falcon)||Luxemburg||Europe||Other||2012||€38,000||€316,000<br /> |-<br /> | Italy - DA - Rental||Italy||Europe||Other||2012||€60,000||€496,000<br /> |-<br /> | MAL - MI||Malaysia||APAC||Intelligence||2012||€77,000||€552,000<br /> |-<br /> | [[Direction générale de la surveillance du territoire]]||Morocco||MEA||Intelligence||2012||€160,000||€1,237,500<br /> |-<br /> | [[National Intelligence and Security Service]]&lt;ref name=fortune/&gt;||[[Sudan]]||MEA||Intelligence||2012||€76,000||€960,000<br /> |-<br /> | Russia - KVANT&lt;ref name=kvant&gt;[http://arstechnica.com/tech-policy/2015/07/hacking-teams-surveillance-software-sold-to-kgb-successor/ &quot;Hacking Team apparently violated EU rules in sale of spyware to Russian agency&quot;]. ''Ars Technica''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Russia]]||Europe||Intelligence||2012||€72,000||€451,017<br /> |-<br /> | Saudi - GID||Saudi||MEA||LEA||2012||€114,000||€1,201,000<br /> |-<br /> | SIS of [[National Security Committee of the Republic of Kazakhstan]]&lt;ref name=fortune/&gt;||[[Kazakhstan]]||Europe||Intelligence||2012||€140,000||€1,012,500<br /> |-<br /> | The 5163 Army Division (Alias of South Korean National Intelligence Service)&lt;ref name=fortune/&gt;&lt;ref name=torbrowser&gt;[https://firstlook.org/theintercept/2015/07/16/hackingteam-attacked-tor-browser/ &quot;How Hacking Team Created Spyware that Allowed the FBI To Monitor Tor Browser&quot;]. ''The Intercept''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref name=wswskorea&gt;McGrath, Ben (25 July 2015). &quot;''[https://www.wsws.org/en/articles/2015/07/25/kore-j25.html Further revelations in South Korean hacking scandal]''&quot;. ''World Socialist Web Site''. Retrieved 26 July 2015.&lt;/ref&gt;||[[South Korea|S. Korea]]||APAC||Other||2012||€67,000||€686,400<br /> |-<br /> | UAE - Intelligence||[[United Arab Emirates|UAE]]||MEA||Other||2012||€150,000||€1,200,000<br /> |-<br /> | [[Drug Enforcement Administration]]&lt;ref name=fbidea&gt;[https://firstlook.org/theintercept/2015/07/06/hacking-team-spyware-fbi/ &quot;Leaked Documents Show FBI, DEA and U.S. Army Buying Italian Spyware&quot;]. ''The Intercept''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref name=dea&gt;[http://motherboard.vice.com/read/the-dea-just-cancelled-its-contract-with-hacking-team &quot;The DEA Just Cancelled Its Contract With Hacking Team&quot;]. ''Motherboard''. Retrieved on 2 August 2015.&lt;/ref&gt;||USA||North America||Other||2012||€70,000||€567,984<br /> |-<br /> | [[Central Anticorruption Bureau]]||[[Poland]]||Europe||LEA||2012||€35,000||€249,200<br /> |-<br /> | MOD Saudi||Saudi||MEA||Other||2013||€220,000||€1,108,687<br /> |-<br /> | PMO||Malaysia||APAC||Intelligence||2013||€64,500||€520,000<br /> |-<br /> | Estado de Qeretaro||Mexico||LATAM||LEA||2013||€48,000||€234,500<br /> |-<br /> | Azerbaijan NS&lt;ref name=fortune/&gt;||[[Azerbaijan]]||Europe||Intelligence||2013||€32,000||€349,000<br /> |-<br /> | Gobierno de Puebla||Mexico||LATAM||Other||2013||€64,000||€428,835<br /> |-<br /> | Gobierno de Campeche||Mexico||LATAM||Other||2013||€78,000||€386,296<br /> |-<br /> | AC Mongolia||[[Mongolia]]||APAC||Intelligence||2013||€100,000||€799,000<br /> |-<br /> | Dept. of Correction Thai Police ||[[Thailand]]||APAC||LEA||2013||€52,000||€286,482<br /> |-<br /> | [[National Intelligence Secretariat (Ecuador)|National Intelligence Secretariat]]&lt;ref&gt;http://panampost.com/rebeca-morla/2015/07/13/ecuadorian-websites-report-on-hacking-team-get-taken-down/&lt;br /&gt;http://panampost.com/panam-staff/2015/08/10/hacking-team-helped-ecuador-spy-on-opposition-activist/&lt;br /&gt;http://bigstory.ap.org/article/6f41d49888174b45857d34511fda1caf/apnewsbreak-email-leak-suggests-ecuador-spied-opposition&lt;/ref&gt;<br /> ||[[Ecuador]]||LATAM||LEA||2013||€75,000||€535,000<br /> |-<br /> | Police Intelligence Directorate&lt;ref name=dipol_telesur&gt;Podour, Justin (23 July 2015). &quot;''[http://www.telesurtv.net/opinion/HackedTeam-y-Colombia-Como-la-vigilancia-ayuda-a-un-Estado-violento-20150723-0062.html #HackedTeam y Colombia: Cómo la vigilancia ayuda a un Estado violento]''&quot;. ''Telesur''. Retrieved 26 July 2015.&lt;/ref&gt;||[[Colombia]]||LATAM||LEA||2013||€35,000||€335,000<br /> |-<br /> | [[Guardia di Finanza]]||Italy||Europe||LEA||2013||€80,000||€400,000<br /> |-<br /> | Intelligence&lt;ref name=cyprus&gt;In Cyprus (11 July 2015).[http://in-cyprus.com/intelligence-service-chief-steps-down/ &quot;''Intelligence Service chief steps down]''&quot;. Retrieved 26 July 2015.&lt;/ref&gt;||[[Cyprus]]||Europe||LEA||2013||€40,000||€375,625<br /> |-<br /> | MidWorld&lt;ref name=ifex&gt;Bahrain Center for Human Rights (15 July 2015). &quot;''[https://www.ifex.org/bahrain/2015/07/15/bahrain_hacking_team Hacking Team's troubling connections to Bahrain]''&quot; IFEX. Retrieved 26 July 2015.&lt;/ref&gt;||[[Bahrain]]||MEA||Intelligence||2013||||€210,000<br /> |-<br /> | Mexico - PEMEX||Mexico ||LATAM||LEA ||2013||||€321,120<br /> |-<br /> | Malysia K||Malaysia||APAC||LEA||2013||||€0<br /> |-<br /> | Honduras||[[Honduras]]||LATAM||LEA||2014||||€355,000<br /> |-<br /> | Mex Taumalipas||Mexico||LATAM||||2014||||€322,900<br /> |-<br /> | Secretaría de Planeación y Finanzas||Mexico||LATAM||LEA||2014||€91,000||€371,035<br /> |-<br /> | AREA||Italia||Europe||||2014||||€430,000<br /> |-<br /> | Mexico Yucatán||Mexico||LATAM||LEA||2014||||€401,788<br /> |-<br /> | Mexico Durango||Mexico||LATAM||LEA||2014||||€421,397<br /> |-<br /> | [[Investigations Police of Chile]]||[[Chile]]||LATAM||LEA||2014||||€2,289,155<br /> |-<br /> | Jalisco Mexico||Mexico||LATAM||LEA||2014||||€748,003<br /> |-<br /> | [[Royal Thai Army]]||Thailand||APAC||LEA||2014||||€360,000<br /> |-<br /> | Vietnam GD5||[[Vietnam]]||APAC||||2014||||€281,170<br /> |-<br /> | [[Kantonspolizei Zürich]]||Switzerland||Europe||LEA||2014||||€486,500<br /> |-<br /> | Vietnam GD1||Vietnam||APAC||LEA||2015||||€543,810<br /> |-<br /> | Egypt TRD GNSE||Egypt||MEA||LEA||2015||||€137,500<br /> |-<br /> | [[Lebanon Army Forces]]||[[Lebanon]]||MEA||LEA||2015||||<br /> |-<br /> | [[Federal Police Department]]||Brazil||LATAM||LEA||2015||||<br /> |-<br /> | [[SHISH|State Informative Service]]&lt;ref&gt;Lexime (14 July 2015). &quot;''[http://www.balkanweb.com/site/burime-te-sigurta-shish-perdor-programet-pergjuese-qe-prej-2015-hacking-teams-nuk-e-kemi-nen-kontroll-sistemin/ Burime të sigurta, SHISH përdor programet përgjuese që prej 2015. Hacking Teams: Nuk e kemi nën kontroll sistemin!]''&quot; (video). BalkanWeb. Retrieved 27 July 2015.&lt;/ref&gt;||[[Albania]]||Europe||SHIK||2015||||<br /> |}<br /> <br /> == See also ==<br /> *[[FinFisher]]<br /> *[[Vupen]], 0-day exploit provider linked to Hacking Team.&lt;ref&gt;[https://tsyrklevich.net/2015/07/22/hacking-team-0day-market/ Hacking Team: a zero-day market case study], Vlad Tsyrklevich's blog&lt;/ref&gt;<br /> *[[Mamfakinch]], a citizen media organization targeted with malware allegedly developed by Hacking Team&lt;ref&gt;Perlroth, Nicole (10 October 2012). ''[http://bits.blogs.nytimes.com/2012/10/10/ahead-of-spyware-conference-more-evidence-of-abuse/?_r=0 Ahead of Spyware Conference, More Evidence of Abuse]''. ''New York Times'' (Bits).&lt;/ref&gt;<br /> <br /> ==References==<br /> {{reflist}}<br /> <br /> == External links ==<br /> * {{Official website| http://www.hackingteam.it/}}<br /> * [https://citizenlab.org/tag/hacking-team/ Hacking Team Archives] - investigative reports published by The [[Citizen Lab]]<br /> * [https://wikileaks.org/hackingteam/emails WikiLeaks: ''The Hackingteam Archives''] - searchable database of 1 million internal emails<br /> * [https://wikileaks.org/spyfiles/list/company-name/hackingteam.html Hacking Team presentations] in the [[WikiLeaks]] &quot;''Spy Files''&quot;<br /> {{Hacking in the 2010s}}<br /> <br /> [[Category:Computer security software]]<br /> [[Category:Spyware]]<br /> [[Category:Surveillance]]<br /> [[Category:Trojan horses]]<br /> [[Category:Espionage techniques]]<br /> [[Category:Espionage devices]]<br /> [[Category:Malware toolkits]]<br /> [[Category:Computer access control]]<br /> [[Category:Cyberwarfare]]<br /> [[Category:Espionage scandals and incidents]]<br /> [[Category:Companies based in Milan]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=HackingTeam&diff=177174975 HackingTeam 2016-01-16T00:16:03Z <p>Dsprc: /* 2015 data breach */ tag section outdated</p> <hr /> <div>{{Primary sources|date=July 2015}}<br /> <br /> {{Infobox company<br /> | name = Hacking Team<br /> | logo = Hacking Team logo.png<br /> | logo_size = <br /> | logo_alt = The words Hacking Team enclosed with in reversed square brackets &lt;nowiki&gt;][&lt;/nowiki&gt;<br /> | logo_caption = Company logo<br /> | logo_padding = <br /> | image = <br /> | image_size = <br /> | image_alt = <br /> | image_caption = <br /> | type = <br /> | industry = [[Information technology]]<br /> | founded = 2003<br /> | founders = David Vincenzetti, Valeriano Bedeschi<br /> | hq_location = <br /> | hq_location_city = [[Milan]]<br /> | hq_location_country = [[Italy]]<br /> | area_served = &lt;!-- or: | areas_served = --&gt;<br /> | key_people = Alberto Ornaghi, Marco Valleri<br /> | products = {{unbulleted list|Software}}<br /> | brands = <br /> | services = <br /> | owner = &lt;!-- or: | owners = --&gt;<br /> | website = {{URL|http://www.hackingteam.it/}}<br /> }}<br /> <br /> '''Hacking Team''' is a [[Milan]]-based [[information technology]] company that sells offensive intrusion and [[surveillance]] capabilities to governments, law enforcement agencies and corporations.&lt;ref name=spies&gt;{{cite web |title=The spies behind your screen |url=http://www.telegraph.co.uk/technology/8899353/The-spies-behind-your-screen.html |author=Batey, Angus |date=24 November 2011 |publisher=''The Telegraph'' |accessdate=26 July 2015}}&lt;/ref&gt; Its &quot;''Remote Control Systems''&quot; enable governments and corporations to monitor the communications of internet users, decipher their [[cryptography|encrypted]] files and emails, record [[Skype]] and other [[Voice over IP]] communications, and remotely activate microphones and camera on target computers.&lt;ref&gt;{{cite web|title=Enemies of the Internet: Hacking Team|url=http://surveillance.rsf.org/en/hacking-team/|work=[[Reporters Without Borders]]|accessdate=24 April 2014}}&lt;/ref&gt; The company has been criticized for providing these capabilities to governments with poor [[human rights]] records.&lt;ref&gt;{{cite web | last3 = Marquis-Boire | first3 = Morgan | last1 = Marczak | first1 = Bill | last2 = Gaurnieri | first2 = Claudio | last4 = Scott-Railton | first4 = John | title = Mapping Hacking Team's &quot;Untraceable&quot; Spyware | url = https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ | date = February 17, 2014}}&lt;/ref&gt; Hacking Team states that they have the ability to disable their software if it is used unethically.&lt;ref&gt;{{cite news|url=http://www.newyorker.com/online/blogs/elements/2014/03/hacked-by-ones-own-government.html|title=Hackers Without Borders|last=Kopstein|first=Joshua|work=[[The New Yorker]]|date=10 March 2014|accessdate=24 April 2014}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url = https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/|title = Police Story: Hacking Team’s Government Surveillance Malware|date = June 24, 2014|accessdate = August 3, 2014|website = Citizen Lab|publisher = University of Toronto|last1 = Marquis-Boire|first1 = Morgan | last2 = Gaurnieri | first2 = Claudio | first3 = John | last3 = Scott-Railton | first4 = Katie | last4 = Kleemola }}&lt;/ref&gt;<br /> <br /> Hacking Team employs around 40 people in its Italian office, and has subsidiary branches in [[Annapolis]], [[Washington, D.C.]] and [[Singapore]].&lt;ref name=know&gt;''[[Human Rights Watch]]'' (25 March 2014). ''&quot;[https://www.hrw.org/report/2014/03/25/they-know-everything-we-do/telecom-and-internet-surveillance-ethiopia They Know Everything We Do]&quot;''. Retrieved 1 August 2015.&lt;/ref&gt; Its products are in use in dozens of countries across six continents.&lt;ref name=Jeffries&gt;{{cite web|last=Jeffries|first=Adrianne|title=Meet Hacking Team, the company that helps the police hack you|url=http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers|accessdate=21 April 2014|work=[[The Verge]]|date=13 September 2013}}&lt;/ref&gt;<br /> <br /> ==History==<br /> Hacking Team was started by two Italian programmers: Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri created a set of tools that could be used to monitor and remotely manipulate target computers. The program, called [[Ettercap (software)|Ettercap]], was embraced both by hackers looking to spy on people, and by companies that hoped to test the security of their own networks.<br /> <br /> The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their [[Skype]] calls, the police contacted Ornaghi and Valleri and asked them to help modify the program. Hacking Team was born, and became &quot;the first sellers of commercial hacking software to the police.&quot;&lt;ref name=Jeffries/&gt;<br /> <br /> According to former employee Alberto Pelliccione, the company began as security services provider, offering [[penetration testing]], auditing and other defensive capabilities to clients.&lt;ref name=war&gt;Farivar, Cyrus (20 July 2015) &quot;''[http://arstechnica.com/security/2015/07/italian-prosecutors-investigate-former-hacking-team-employees-for-role-in-hack/ ''Hacking Team goes to war against former employees, suspects some helped hackers]''&quot;. ''Ars Technica''. Retrieved 26 July 2015.&lt;/ref&gt; Pelliccione states that as malware and other offensive capabilities were developed and accounted for a larger percentage of revenues, the organization pivoted in a more offensive direction and became increasingly compartmentalized. Pelliccione claims fellow employees working on aspects of the same platform - for example, Android exploits and payloads - would not communicate with one another, possibly leading to tensions and strife within the organization.&lt;ref name=war/&gt;<br /> <br /> In February 2014, a report from [[Citizen Lab]] identified the organisation to be using hosting services from [[Linode]], [[Telecom Italia]], [[Rackspace]], [[NOC4Hosts]] and notorious [[bullet proof hosting]] company [[Santrex]].&lt;ref&gt;{{cite news|title=Hacking Team’s US Nexus|url=https://citizenlab.org/2014/02/hacking-teams-us-nexus/|accessdate=2 August 2015|date=28 February 2014}}&lt;/ref&gt;<br /> <br /> On July 5, 2015 the company suffered a major data breach of customer data, software code, internal documents and emails. - ''See: [[#2015 data breach|§ 2015 data breach]]''<br /> <br /> ==Products and Capabilities==<br /> Hacking Team enables clients to perform remote monitoring functions against citizens via their [[Remote administration tool|RCS (Remote Control Systems)]], including their '''Da Vinci''' and '''Galileo''' platforms:&lt;ref name=spies/&gt;<br /> <br /> *Covert collection of emails, text message, phone call history and address books<br /> *[[Keystroke logging]]<br /> *Uncover search history data and take screenshots<br /> *Record audio from phone calls<br /> :*Capture audio and video stream from device memory to bypass [[cryptography]] of [[Skype]] sessions&lt;ref&gt;{{cite web | title=Mideast Uses Western Tools to Battle the Skype Rebellion |url=http://www.wsj.com/articles/SB10001424052702304520804576345970862420038 |author=Stecklow, Steve; Sonne, Paul; Bradley, Matt |date=1 June 2011 |publisher=''Wall Street Journal'' |accessdate=26 July 2015}}&lt;/ref&gt;<br /> :*Use microphones on device to collect ambient background noise and conversations<br /> *Activate phone or computer cameras<br /> *Hijack telephone GPS systems to monitor target's location<br /> *Infect target computer's [[UEFI]] [[BIOS]] [[firmware]] with a [[rootkit]]&lt;ref&gt;{{Cite web|first=Philippe |last=Lin |url=http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-uses-uefi-bios-rootkit-to-keep-rcs-9-agent-in-target-systems/ |title=Hacking Team Uses UEFI BIOS Rootkit to Keep RCS 9 Agent in Target Systems |work=TrendLabs Security Intelligence Blog |publisher=[[Trend Micro]] |date=July 13, 2015 |accessdate=July 26, 2015}}&lt;/ref&gt;<br /> *Extract WiFi passwords&lt;ref name=skiddies&gt;[http://arstechnica.com/security/2015/07/advanced-spyware-for-android-now-available-to-script-kiddies-everywhere/ &quot;Advanced spyware for Android now available to script kiddies everywhere&quot;]. ''Ars Technica''. Retrieved on 2 August 2015.&lt;/ref&gt;<br /> *Exfiltrate [[Bitcoin]] and other cryptocurrency wallet files to collect data on local accounts, contacts and transaction histories.&lt;ref name=coin&gt;Farivar, Cyrus (14 July 2015). &quot;''[http://arstechnica.com/security/2015/07/hacking-team-broke-bitcoin-secrecy-by-targeting-crucial-wallet-file/ Hacking Team broke Bitcoin secrecy by targeting crucial wallet file]''&quot;. ''Ars Technica''. Retrieved 26 July 2015.&lt;/ref&gt;<br /> <br /> Hacking Team uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.&lt;ref&gt;{{cite news|last1=Schneier|first1=Bruce|title=More on Hacking Team's Government Spying Software|url=https://www.schneier.com/blog/archives/2014/06/more_on_hacking.html}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Hacking Team Tools Allow Governments To Take Full Control of Your Smartphone|url = http://www.ibtimes.co.uk/hacking-team-tools-allow-governments-take-full-control-your-smartphone-1453987|accessdate = 2015-07-06}}&lt;/ref&gt;<br /> <br /> The malware has payloads for [[Android (operating system)|Android]],&lt;ref name=skiddies/&gt; [[BlackBerry]], Apple [[iOS]], [[Linux]], [[Mac OS X]], [[Symbian]], as well as [[Microsoft Windows]], [[Windows Mobile]] and [[Windows Phone]] class of [[operating system]]s.&lt;ref name=C3&gt;Guarnieri, Claudio; Marquis-Boire, Morgan (13 January 2014). ''[https://media.ccc.de/browse/congress/2013/30C3_-_5439_-_en_-_saal_1_-_201312292105_-_to_protect_and_infect_-_claudio_guarnieri_-_morgan_marquis-boire.html &quot;To Protect And Infect: The militarization of the Internet&quot;]''. At the 30th [[Chaos Communications Congress]] – &quot;30C3&quot;. (Video or Audio). [[Chaos Computer Club]]. Retrieved on 15 August 2015.&lt;/ref&gt;<br /> <br /> RCS is a management platform that allows operators to remotely deploy exploits and payloads against targeted systems, remotely manage devices once compromised, and exfiltrate data for remote analysis.<br /> <br /> == Controversies ==<br /> === Use by repressive goverments ===<br /> Hacking Team has been criticized for selling its products and services to governments with poor human rights records, including [[Sudan]], [[Bahrain]], and [[Saudi Arabia]].&lt;ref name=repress/&gt;<br /> <br /> In June 2014, a United Nations panel monitoring the implementation of sanctions on Sudan requested information from Hacking Team about their alleged sales of software to the country in contravention of United Nations weapons export bans to Sudan. Documents leaked in the 2015 data breach of Hacking Team revealed the organization sold Sudanese National Intelligence and Security Service access to their &quot;Remote Control System&quot; software in 2012 for 960,000 Euros.&lt;ref name=repress/&gt;&lt;ref&gt;{{Cite web|title = A Company That Sells Surveillance Software to Authoritarian Regimes Got Hacked Itself|url = http://www.slate.com/blogs/future_tense/2015/07/06/hacking_team_which_sells_spyware_to_governments_was_hacked_itself.html|accessdate = 2015-07-06|first = Lily|last = Hay Newman}}&lt;/ref&gt;<br /> <br /> In response to the United Nations panel, the company responded in January 2015 that they were not currently selling to Sudan. In a follow-up exchange, Hacking Team asserted that their product was not controlled as a weapon, and so the request was beyond the scope of the panel. There was no need for them to disclose previous sales, which they considered confidential business information.&lt;ref name=repress&gt;{{Cite web |title=A Detailed Look at Hacking Team’s Emails About Its Repressive Clients |url=https://firstlook.org/theintercept/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/ |accessdate=7 July 2015 |first1=Cora |last1=Currier |first2=Morgan |last2=Marquis-Boire}}&lt;/ref&gt;&lt;ref&gt;{{Cite web |title=Hacking Team Leaks Reveal Spyware Industry's Growth, Negligence of Human Rights |url=https://www.eff.org/deeplinks/2015/07/hacking-team-leaks-reveal-spyware-industrys-growth |accessdate=8 July 2015 |first=Sarah |last=Myers West}}&lt;/ref&gt;<br /> <br /> The U.N. disagreed. “The view of the panel is that as such software is ideally suited to support military electronic intelligence (ELINT) operations it may potentially fall under the category of ‘military … equipment’ or ‘assistance’ related to prohibited items,” the secretary wrote in March. “Thus its potential use in targeting any of the belligerents in the Darfur conflict is of interest to the Panel.”&lt;ref name=repress/&gt;&lt;ref&gt;{{Cite web|title = Hacking Team's Lame Excuse for Selling Digital Weapons to Sudan|url = http://gizmodo.com/hacking-teams-lame-excuse-for-selling-digital-weapons-t-1716375503|accessdate = 2015-07-08|first = Kate|last = Knibbs}}&lt;/ref&gt;<br /> <br /> In the fall of 2014, the Italian government abruptly froze all of Hacking Team’s exports, citing human rights concerns. After lobbying Italian officials, the company eventually won back the right to sell its products abroad.&lt;ref name=repress/&gt;<br /> <br /> === 2015 data breach ===<br /> {{Update|section|date=January 2016}}<br /> <br /> On July 5, 2015, the [[Twitter]] account of the company was compromised by an unknown individual who published an announcement of a [[data breach]] against Hacking Team's computer systems. The initial message read, &quot;''Since we have nothing to hide, we're publishing all our e-mails, files, and source code …''&quot; and provided links to over 400 [[gigabyte]]s of data, including alleged internal e-mails, invoices, and [[source code]]; which were leaked via [[BitTorrent]] and [[Mega (service)|Mega]].&lt;ref&gt;{{Wayback|url=https://twitter.com/hackingteam|title=Hacked Team (@hackingteam)|date=20150706010312}}&lt;/ref&gt; An announcement of the data breach, including a link to the bittorrent seed, was retweeted by [[WikiLeaks]] and by many others through social media.&lt;ref&gt;{{Twitter status|wikileaks|617865712611233792|Inside malware makers &quot;Hacking Team&quot;: hundreds of gigabytes of e-mails, files, and source code|[[WikiLeaks]]|July 6, 2015|July 6, 2015}}&lt;/ref&gt;&lt;ref name=&quot;ibtimes.co.uk&quot;&gt;{{Cite web|title = Hacking Team hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan|url = http://www.ibtimes.co.uk/hacking-team-hacked-spy-tools-sold-oppressive-regimes-sudan-bahrain-kazakhstan-1509460|accessdate = 2015-07-06}}&lt;/ref&gt;<br /> <br /> The material was voluminous and early analysis appeared to reveal that Hacking Team had invoiced the [[Lebanese Army]]&lt;ref&gt;{{Twitter|url=https://twitter.com/SynAckPwn/status/617955067006578689}} {{dead link|date=July 2015}}&lt;/ref&gt; and [[Sudan]] and that spy tools were also sold to [[Bahrain]] and [[Kazakhstan]].&lt;ref name=&quot;ibtimes.co.uk&quot;/&gt; Hacking Team had previously claimed they had never done business with Sudan.&lt;ref&gt;{{Cite web|title = Hacking Team hacked, attackers claim 400GB in dumped data|url = http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html|accessdate = 2015-07-06|first = Steve|last = Ragan}}&lt;/ref&gt;<br /> <br /> The leaked data revealed a [[zero-day (computing)|zero-day]] cross-platform Flash exploit ([[Common Vulnerabilities and Exposures|CVE]] number: CVE-2015-5119).&lt;ref&gt;{{Cite web|title = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html|url = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html}}&lt;/ref&gt; The dump included a demo of this exploit by opening [[Calculator (computer program)|Calculator]] from a test webpage.&lt;ref&gt;{{Cite web|title = Zero-Day Flash Player Exploit Disclosed In 'Hacking Team' Data Dump|url = http://thehackernews.com/2015/07/flash-zero-day-vulnerability.html|accessdate = 2015-07-06|first = Swati|last = Khandelwal}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Unpatched Flash Player Flaw, More POCs Found in Hacking Team Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/|accessdate = 2015-07-08|first = Peter|last = Pi}}&lt;/ref&gt; Adobe [[software patch|patched]] the hole on July 8, 2015.&lt;ref&gt;{{Cite web|title = Adobe Security Bulletin|url = https://helpx.adobe.com/security/products/flash-player/apsb15-16.html|accessdate = 2015-07-11|last = Adobe Systems (corporate author)}}&lt;/ref&gt; Another vulnerability involving Adobe was revealed in the dumps, which took advantage of a [[buffer overflow]] attack on an Adobe Open Type Manager [[Dynamic-link library|DLL]] included with [[Microsoft Windows]]. The DLL is run in [[protection ring|kernel mode]], so the attack could perform [[privilege escalation]] to bypass the [[sandbox (computer security)|sandbox]].&lt;ref&gt;{{Cite web|title = A Look at the Open Type Font Manager Vulnerability from the Hacking Team Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-the-open-type-font-manager-vulnerability-from-the-hacking-team-leak/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29|accessdate = 2015-07-08|first = Jack|last = Tang}}&lt;/ref&gt;<br /> <br /> Also revealed in leaked data was Hacking Team employees' use of weak passwords, including 'P4ssword', 'wolverine', and 'universo'.&lt;ref&gt;{{Cite web|title = Hacking Team used shockingly bad passwords|url = http://www.zdnet.com/article/no-wonder-hacking-team-got-hacked/|accessdate = 2015-07-06|first = Zack|last = Whittaker}}&lt;/ref&gt;<br /> <br /> After a few hours without response from Hacking Team, member Christian Pozzi tweeted the company was working closely with police and &quot;''what the attackers are claiming regarding our company is not true.''&quot;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964180042190848|accessdate = 2015-07-06}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964660705234944|accessdate = 2015-07-06}}&lt;/ref&gt; He also claimed the leaked archive &quot;contains a virus&quot; and that it constituted &quot;false info&quot;.&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617962663188926465|accessdate = 2015-07-06}}&lt;/ref&gt; Shortly after these tweets, Pozzi's Twitter account itself was apparently compromised.&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter: &quot;Uh Oh - my twitter account was also hacked.&quot;|url = https://web.archive.org/web/20150706084837/https://twitter.com/christian_pozzi/status/617977753250496512|date = 2015-07-06|accessdate = 2015-07-06}}&lt;/ref&gt;<br /> <br /> Responsibility for this attack was claimed by the hacker known as Phineas Fisher on Twitter.&lt;ref&gt;{{cite tweet | user=gammagrouppr | author=Phineas Fisher | number=617937092497178624 | title=gamma and HT down, a few more to go :) | date=6 July 2015}}&lt;/ref&gt; Phineas has previously attacked spyware firm Gamma International, who produce malware, such as [[FinFisher]], for governments and corporations.&lt;ref&gt;{{Cite web|title = Hacking Team: We won't 'shrivel up and go away' after cyberattack|url = http://www.zdnet.com/article/hacking-team-cyberattack-aftermath-interview/|accessdate = 2015-07-06|first = Charlie|last = Osbourne}}&lt;/ref&gt;<br /> <br /> == Customer List ==<br /> {{Table to prose|section|date=September 2015}}<br /> Hacking Team's clientele include not just governments, but also corporate clients such as [[Barclay's]] Bank and [[British Telecom]] (BT) of the [[United Kingdom]], as well as [[Deutsche Bank]] of [[Germany]].&lt;ref name=spies/&gt;<br /> <br /> A full list of Hacking Team's customers were leaked in the 2015 breach. Disclosed documents show Hacking Team had 70 current customers, mostly military, police, federal and provincial governments. The total company revenues disclosed exceeded 40 million [[Euro]]s.&lt;ref&gt;{{cite web |author=Kopstein, Justin |title= Here Are All the Sketchy Government Agencies Buying Hacking Team's Spy Tech |url=http://motherboard.vice.com/read/here-are-all-the-sketchy-government-agencies-buying-hacking-teams-spy-tech |publisher=Vice Magazine |date=6 July 2015<br /> }}&lt;/ref&gt;&lt;ref&gt;{{cite web |author=Weissman, Cale Guthrie |title=Hacked security company's documents show a laundry list of questionable clients |url=http://www.businessinsider.com/hacked-security-companys-document-2015-7 |date=6 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |author=Ragan, Steve |title=In Pictures: Hacking Team's hack curated |url=http://www.cso.com.au/slideshow/579158/pictures-hacking-team-hack-curated/?image=9 |publisher=CSO Online (Australia)}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=Hacking Team hacked: firm sold spying tools to repressive regimes, documents claim |url=http://www.theguardian.com/technology/2015/jul/06/hacking-team-hacked-firm-sold-spying-tools-to-repressive-regimes-documents-claim |author=Hern, Alex |publisher=''The Guardian'' |date=6 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=Hacking Team responds to data breach, issues public threats and denials |url=http://www.csoonline.com/article/2944333/data-breach/hacking-team-responds-to-data-breach-issues-public-threats-and-denials.html |author=Ragan, Steve |publisher=''CSO Online'' |date=6 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=A whole bunch of downed government surveillance programs are about to go back online |url=http://www.businessinsider.com/hacking-team-promises-customers-they-can-resume-surveillance-operations-soon-2015-7 |author=Stevenson, Alastair |publisher=''Business Insider'' |date=14 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;<br /> <br /> {| class=&quot;wikitable sortable&quot;<br /> |-<br /> ! Customer<br /> ! Country<br /> ! Area<br /> ! Agency<br /> ! Year First Sale<br /> ! Annual Maintenance Fees<br /> ! Total Client Revenues<br /> |-<br /> | [[Polizia Postale e delle Comunicazioni]]&lt;ref&gt;Jone Pierantonio. [http://it.ibtimes.com/cyber-space/ecco-chi-ha-bucato-hacking-team-1408915 &quot;Ecco chi ha bucato Hacking Team&quot;]. ''International Business Times''. Retrieved on 2 August 2015.&lt;/ref&gt;||Italy||Europe||LEA||2004||€100,000||€808,833<br /> |-<br /> | [[Centro Nacional de Inteligencia]]&lt;ref&gt;Ediciones El País (8 July 2015). [http://internacional.elpais.com/internacional/2015/07/08/actualidad/1436343710_282978.html &quot;Hacking Team: “Ofrecemos tecnología ofensiva para la Policía”&quot;]. ''EL PAÍS''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Spain]]||Europe||Intelligence||2006||€52,000||€538,000<br /> |-<br /> | [[Infocomm Development Authority of Singapore]]||[[Singapore]]||APAC||Intelligence||2008||€89,000||€1,209,967<br /> |-<br /> | Information Office||[[Hungary]]||Europe||Intelligence||2008||€41,000||€885,000<br /> |-<br /> | CSDN||[[Morocco]]||MEA||Intelligence||2009||€140,000||€1,936,050<br /> |-<br /> | UPDF (Uganda Peoples Defense Force), ISO (Internal Security Organization), Office of the President||[[Uganda]]||Africa||Intelligence||2015||€831,000||€52,197,100<br /> |-<br /> | Italy - DA - Rental||Italy||Europe||Other||2009||€50,000||€628,250<br /> |-<br /> | [[Malaysian Anti-Corruption Commission]]||[[Malaysia]]||APAC||Intelligence||2009||€77,000||€789,123<br /> |-<br /> | PCM||Italy||Europe||Intelligence||2009||€90,000||€764,297<br /> |-<br /> | SSNS - Ungheria||Hungary||Europe||Intelligence||2009||€64,000||€1,011,000<br /> |-<br /> | CC - Italy||Italy||Europe||LEA||2010||€50,000||€497,349<br /> |-<br /> | [[Al Mukhabarat Al A'amah]]||[[Saudi Arabia]]||MEA||Intelligence||2010||€45,000||€600,000<br /> |-<br /> | IR Authorities (Condor)||[[Luxembourg]]||Europe||Other||2010||€45,000||€446,000<br /> |-<br /> | La Dependencia y/o CISEN&lt;ref&gt;[http://fusion.net/story/163872/the-hacking-team-leak-shows-mexico-was-the-top-client-but-why/ &quot;The Hacking Team leak shows Mexico was its top client, but why?&quot;]. ''Fusion''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Mexico]]||LATAM||Intelligence||2010||€130,000||€1,390,000<br /> |-<br /> | UZC&lt;ref name=fortune/&gt; ||[[Czech Republic]] ||Europe||LEA||2010||€55,000||€689,779<br /> |-<br /> | Egypt - MOD&lt;ref name=fortune/&gt;||[[Egypt]]||MEA||Other||2011||€70,000||€598,000<br /> |-<br /> | [[Federal Bureau of Investigation]]&lt;ref name=fbidea/&gt;||USA||North America||LEA||2011||€100,000||€697,710<br /> |-<br /> | Oman - Intelligence||[[Oman]]||MEA||Intelligence||2011||€30,000||€500,000<br /> |-<br /> | President Security&lt;ref&gt;[http://motherboard.vice.com/read/hacking-teams-equipment-got-stolen-in-panama &quot;Hacking Team's Equipment Got Stolen in Panama&quot;]. ''Motherboard''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref&gt;Molina, Thabata (13 August 2015). ''[http://panampost.com/thabata-molina/2015/08/13/panama-to-investigate-martinelli-in-hacking-team-spying-scandal/ &quot;Panama to Investigate Martinelli in Hacking Team Spying Scandal&quot;]''. ''Panama Post''. Retrieved 15 August 2015.&lt;/ref&gt;<br /> ||[[Panama]]||LATAM||Intelligence||2011||€110,000||€750,000<br /> |-<br /> | [[Turkish National Police]]||[[Turkey]]||Europe||LEA||2011||€45,000||€440,000<br /> |-<br /> | UAE - MOI||[[United Arab Emirates|UAE]]||MEA||LEA||2011||€90,000||€634,500<br /> |-<br /> | [[National Security Service (Uzbekistan)|National Security Service]]&lt;ref name=fortune&gt;[http://fortune.com/2015/07/16/governments-used-spy-software/ &quot;Leaked emails from security firm Hacking Team show government use - Fortune&quot;]. ''Fortune''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Uzbekistan]]||Europe||Intelligence||2011||€50,000||€917,038<br /> |-<br /> | [[United States Department of Defense|Department of Defense]]&lt;ref name=fbidea/&gt;||USA||North America||LEA||2011||||€190,000<br /> |-<br /> | Bayelsa State Government||[[Nigeria]]||MEA||Intelligence||2012||€75,000||€450,000<br /> |-<br /> | Estado del Mexico||Mexico||LATAM||LEA||2012||€120,000||€783,000<br /> |-<br /> | Information Network Security Agency||[[Ethiopia]]||MEA||Intelligence||2012||€80,000||€750,000<br /> |-<br /> | State security (Falcon)||Luxemburg||Europe||Other||2012||€38,000||€316,000<br /> |-<br /> | Italy - DA - Rental||Italy||Europe||Other||2012||€60,000||€496,000<br /> |-<br /> | MAL - MI||Malaysia||APAC||Intelligence||2012||€77,000||€552,000<br /> |-<br /> | [[Direction générale de la surveillance du territoire]]||Morocco||MEA||Intelligence||2012||€160,000||€1,237,500<br /> |-<br /> | [[National Intelligence and Security Service]]&lt;ref name=fortune/&gt;||[[Sudan]]||MEA||Intelligence||2012||€76,000||€960,000<br /> |-<br /> | Russia - KVANT&lt;ref name=kvant&gt;[http://arstechnica.com/tech-policy/2015/07/hacking-teams-surveillance-software-sold-to-kgb-successor/ &quot;Hacking Team apparently violated EU rules in sale of spyware to Russian agency&quot;]. ''Ars Technica''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Russia]]||Europe||Intelligence||2012||€72,000||€451,017<br /> |-<br /> | Saudi - GID||Saudi||MEA||LEA||2012||€114,000||€1,201,000<br /> |-<br /> | SIS of [[National Security Committee of the Republic of Kazakhstan]]&lt;ref name=fortune/&gt;||[[Kazakhstan]]||Europe||Intelligence||2012||€140,000||€1,012,500<br /> |-<br /> | The 5163 Army Division (Alias of South Korean National Intelligence Service)&lt;ref name=fortune/&gt;&lt;ref name=torbrowser&gt;[https://firstlook.org/theintercept/2015/07/16/hackingteam-attacked-tor-browser/ &quot;How Hacking Team Created Spyware that Allowed the FBI To Monitor Tor Browser&quot;]. ''The Intercept''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref name=wswskorea&gt;McGrath, Ben (25 July 2015). &quot;''[https://www.wsws.org/en/articles/2015/07/25/kore-j25.html Further revelations in South Korean hacking scandal]''&quot;. ''World Socialist Web Site''. Retrieved 26 July 2015.&lt;/ref&gt;||[[South Korea|S. Korea]]||APAC||Other||2012||€67,000||€686,400<br /> |-<br /> | UAE - Intelligence||[[United Arab Emirates|UAE]]||MEA||Other||2012||€150,000||€1,200,000<br /> |-<br /> | [[Drug Enforcement Administration]]&lt;ref name=fbidea&gt;[https://firstlook.org/theintercept/2015/07/06/hacking-team-spyware-fbi/ &quot;Leaked Documents Show FBI, DEA and U.S. Army Buying Italian Spyware&quot;]. ''The Intercept''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref name=dea&gt;[http://motherboard.vice.com/read/the-dea-just-cancelled-its-contract-with-hacking-team &quot;The DEA Just Cancelled Its Contract With Hacking Team&quot;]. ''Motherboard''. Retrieved on 2 August 2015.&lt;/ref&gt;||USA||North America||Other||2012||€70,000||€567,984<br /> |-<br /> | [[Central Anticorruption Bureau]]||[[Poland]]||Europe||LEA||2012||€35,000||€249,200<br /> |-<br /> | MOD Saudi||Saudi||MEA||Other||2013||€220,000||€1,108,687<br /> |-<br /> | PMO||Malaysia||APAC||Intelligence||2013||€64,500||€520,000<br /> |-<br /> | Estado de Qeretaro||Mexico||LATAM||LEA||2013||€48,000||€234,500<br /> |-<br /> | Azerbaijan NS&lt;ref name=fortune/&gt;||[[Azerbaijan]]||Europe||Intelligence||2013||€32,000||€349,000<br /> |-<br /> | Gobierno de Puebla||Mexico||LATAM||Other||2013||€64,000||€428,835<br /> |-<br /> | Gobierno de Campeche||Mexico||LATAM||Other||2013||€78,000||€386,296<br /> |-<br /> | AC Mongolia||[[Mongolia]]||APAC||Intelligence||2013||€100,000||€799,000<br /> |-<br /> | Dept. of Correction Thai Police ||[[Thailand]]||APAC||LEA||2013||€52,000||€286,482<br /> |-<br /> | [[National Intelligence Secretariat (Ecuador)|National Intelligence Secretariat]]&lt;ref&gt;http://panampost.com/rebeca-morla/2015/07/13/ecuadorian-websites-report-on-hacking-team-get-taken-down/&lt;br /&gt;http://panampost.com/panam-staff/2015/08/10/hacking-team-helped-ecuador-spy-on-opposition-activist/&lt;br /&gt;http://bigstory.ap.org/article/6f41d49888174b45857d34511fda1caf/apnewsbreak-email-leak-suggests-ecuador-spied-opposition&lt;/ref&gt;<br /> ||[[Ecuador]]||LATAM||LEA||2013||€75,000||€535,000<br /> |-<br /> | Police Intelligence Directorate&lt;ref name=dipol_telesur&gt;Podour, Justin (23 July 2015). &quot;''[http://www.telesurtv.net/opinion/HackedTeam-y-Colombia-Como-la-vigilancia-ayuda-a-un-Estado-violento-20150723-0062.html #HackedTeam y Colombia: Cómo la vigilancia ayuda a un Estado violento]''&quot;. ''Telesur''. Retrieved 26 July 2015.&lt;/ref&gt;||[[Colombia]]||LATAM||LEA||2013||€35,000||€335,000<br /> |-<br /> | [[Guardia di Finanza]]||Italy||Europe||LEA||2013||€80,000||€400,000<br /> |-<br /> | Intelligence&lt;ref name=cyprus&gt;In Cyprus (11 July 2015).[http://in-cyprus.com/intelligence-service-chief-steps-down/ &quot;''Intelligence Service chief steps down]''&quot;. Retrieved 26 July 2015.&lt;/ref&gt;||[[Cyprus]]||Europe||LEA||2013||€40,000||€375,625<br /> |-<br /> | MidWorld&lt;ref name=ifex&gt;Bahrain Center for Human Rights (15 July 2015). &quot;''[https://www.ifex.org/bahrain/2015/07/15/bahrain_hacking_team Hacking Team's troubling connections to Bahrain]''&quot; IFEX. Retrieved 26 July 2015.&lt;/ref&gt;||[[Bahrain]]||MEA||Intelligence||2013||||€210,000<br /> |-<br /> | Mexico - PEMEX||Mexico ||LATAM||LEA ||2013||||€321,120<br /> |-<br /> | Malysia K||Malaysia||APAC||LEA||2013||||€0<br /> |-<br /> | Honduras||[[Honduras]]||LATAM||LEA||2014||||€355,000<br /> |-<br /> | Mex Taumalipas||Mexico||LATAM||||2014||||€322,900<br /> |-<br /> | Secretaría de Planeación y Finanzas||Mexico||LATAM||LEA||2014||€91,000||€371,035<br /> |-<br /> | AREA||Italia||Europe||||2014||||€430,000<br /> |-<br /> | Mexico Yucatán||Mexico||LATAM||LEA||2014||||€401,788<br /> |-<br /> | Mexico Durango||Mexico||LATAM||LEA||2014||||€421,397<br /> |-<br /> | [[Investigations Police of Chile]]||[[Chile]]||LATAM||LEA||2014||||€2,289,155<br /> |-<br /> | Jalisco Mexico||Mexico||LATAM||LEA||2014||||€748,003<br /> |-<br /> | [[Royal Thai Army]]||Thailand||APAC||LEA||2014||||€360,000<br /> |-<br /> | Vietnam GD5||[[Vietnam]]||APAC||||2014||||€281,170<br /> |-<br /> | [[Kantonspolizei Zürich]]||Switzerland||Europe||LEA||2014||||€486,500<br /> |-<br /> | Vietnam GD1||Vietnam||APAC||LEA||2015||||€543,810<br /> |-<br /> | Egypt TRD GNSE||Egypt||MEA||LEA||2015||||€137,500<br /> |-<br /> | [[Lebanon Army Forces]]||[[Lebanon]]||MEA||LEA||2015||||<br /> |-<br /> | [[Federal Police Department]]||Brazil||LATAM||LEA||2015||||<br /> |-<br /> | [[SHISH|State Informative Service]]&lt;ref&gt;Lexime (14 July 2015). &quot;''[http://www.balkanweb.com/site/burime-te-sigurta-shish-perdor-programet-pergjuese-qe-prej-2015-hacking-teams-nuk-e-kemi-nen-kontroll-sistemin/ Burime të sigurta, SHISH përdor programet përgjuese që prej 2015. Hacking Teams: Nuk e kemi nën kontroll sistemin!]''&quot; (video). BalkanWeb. Retrieved 27 July 2015.&lt;/ref&gt;||[[Albania]]||Europe||SHIK||2015||||<br /> |}<br /> <br /> == See also ==<br /> *[[FinFisher]]<br /> *[[Vupen]], 0-day exploit provider linked to Hacking Team.&lt;ref&gt;[https://tsyrklevich.net/2015/07/22/hacking-team-0day-market/ Hacking Team: a zero-day market case study], Vlad Tsyrklevich's blog&lt;/ref&gt;<br /> *[[Mamfakinch]], a citizen media organization targeted with malware allegedly developed by Hacking Team&lt;ref&gt;Perlroth, Nicole (10 October 2012). ''[http://bits.blogs.nytimes.com/2012/10/10/ahead-of-spyware-conference-more-evidence-of-abuse/?_r=0 Ahead of Spyware Conference, More Evidence of Abuse]''. ''New York Times'' (Bits).&lt;/ref&gt;<br /> <br /> ==References==<br /> {{reflist}}<br /> <br /> == External links ==<br /> * {{Official website| http://www.hackingteam.it/}}<br /> * [https://citizenlab.org/tag/hacking-team/ Hacking Team Archives] - investigative reports published by The [[Citizen Lab]]<br /> * [https://wikileaks.org/hackingteam/emails WikiLeaks: ''The Hackingteam Archives''] - searchable database of 1 million internal emails<br /> * [https://wikileaks.org/spyfiles/list/company-name/hackingteam.html Hacking Team presentations] in the [[WikiLeaks]] &quot;''Spy Files''&quot;<br /> {{Hacking in the 2010s}}<br /> <br /> [[Category:Computer security software]]<br /> [[Category:Spyware]]<br /> [[Category:Surveillance]]<br /> [[Category:Trojan horses]]<br /> [[Category:Espionage techniques]]<br /> [[Category:Espionage devices]]<br /> [[Category:Malware toolkits]]<br /> [[Category:Computer access control]]<br /> [[Category:Cyberwarfare]]<br /> [[Category:Espionage scandals and incidents]]<br /> [[Category:Companies based in Milan]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=Parted_Magic&diff=150275767 Parted Magic 2016-01-15T23:54:38Z <p>Dsprc: new release und kernel</p> <hr /> <div>{{Infobox Betriebssystem<br /> | Logo = [[Datei:Logo Parted Magic.png|Logo von Parted Magic]]<br /> | Screenshot = [[Datei:Parted Magic 2014 04 28.png|300px|Screenshot]]<br /> | Beschreibung = Parted Magic, Version 2014_04_28<br /> | Entwickler = Patrick Verner<br /> | Sprache = Englisch<br /> | Version = 2016_01_06<br /> | Freigabedatum = 6 January 2016<br /> | Stammbaum = [[GNU]]/[[Linux]] {{Kind|1}}[[Softlanding Linux System|SLS]] {{Kind|2}}[[Slackware]] {{Kind|3}}Parted Magic&lt;ref name=&quot;Netzwelt.de_2011-04-15&quot;&gt;[http://www.netzwelt.de/news/86300-parted-magic-6-0-rettungs-linux-festplatten-test.html Parted Magic 6.0: Das Rettungs-Linux für Festplatten im Test] – Artikel bei ''[[Netzwelt.de]]'', vom 15.&amp;nbsp;April 2011&lt;/ref&gt;<br /> | Kernel = 4.4.0<br /> | Chronik = <br /> | Architekturen = <br /> | Lizenz = [[GNU General Public License|GNU GPL]] ([[Freie Software]])<br /> | Installationsmedium = [[Compact Disc|CD]], [[USB-Stick]]<br /> | Sonstiges = Unterstützte [[Dateisystem]]e: [[ext2]], [[ext3]], [[ext4]], [[File Allocation Table#FAT16|FAT16]], [[File Allocation Table#FAT32|FAT32]], [[HFS (Dateisystem)|HFS]], [[HFS Plus|HFS+]], [[Journaled File System|JFS]], [[Linux-Swap]], [[NTFS]], [[Reiser File System|ReiserFS]], Reiser4 und [[XFS (Dateisystem)|xfs]]<br /> | Website = [http://www.partedmagic.com/ partedmagic.com]<br /> }}<br /> <br /> '''Parted Magic''' ist eine rund 480&amp;nbsp;[[Megabyte]]&lt;ref&gt;&lt;!-- 479.199.232 Byte --&gt;Stand: Version 2014_04_28 (ISO-Abbild „[https://partedmagic.com/downloads/ pmagic_2014_04_28.iso]“)&lt;/ref&gt; große [[Live-System|Live]]-[[Linux-Distribution]] aus den [[Vereinigte Staaten|Vereinigten Staaten]] mit dem Ziel, eine komplette [[Festplattenlaufwerk|Festplatten]]-Management-Lösung zu bieten. Dazu bietet das System unter anderem das Partitionierungsprogramm ''[[GNU Parted]]'' und das darauf aufbauende [[Grafische Benutzeroberfläche|GUI]]-Programm ''GParted'' an.<br /> <br /> == Details ==<br /> Parted Magic ist als [[Direktstartsystem]] für die Speichermedien [[Compact Disc|CD]] und [[USB-Stick]], sowie im [[Preboot Execution Environment|PXE]]-Format erhältlich und lädt sich beim Startvorgang komplett in den [[Arbeitsspeicher]]. Für den Betrieb werden mindestens 1 Gigabyte Arbeitsspeicher benötigt (als Direktsystem 512&amp;nbsp;MB).<br /> <br /> == Funktionsumfang ==<br /> Neben GNU Parted und dem darauf aufbauenden [[GNU Parted#GParted|GParted]] bietet Parted Magic unter anderem folgende Programme an, um Festplatten auf Fehler zu untersuchen und diese wenn möglich zu beheben:<br /> * [[Partimage]], dessen Nachfolger [[FSArchiver]] inklusive [[Grafische Benutzeroberfläche|GUI]] ([[qt4-fsarchiver]]) und [[Clonezilla]] – Dient der Sicherung und Wiederherstellung von [[Festplattenlaufwerk|Festplatten]] und [[Partition (Datenträger)|Partitionen]]<br /> * [[smartmontools]] inklusive GUI ([[GSmartControl]]) – Überprüft und erkennt mögliche Defekte von Festplatten via [[Self-Monitoring, Analysis and Reporting Technology|SMART]]<br /> * [[TestDisk]] – Überprüft und stellt gelöschte Partitionen und Daten wieder her<br /> * Eine eigene simple GUI zum sicheren Löschen von Partitionen, ganzen Festplatten oder des [[Master Boot Record|MBR]] – verwendet unter anderem [[dd (Unix)|dd]], [[Shred (Unix)|shred]] und [[Darik’s Boot and Nuke|nwipe]]<br /> * [[NTFS-3G]] – [[Gerätetreiber|Treiber]] für Schreib- und Lesezugriff auf das [[NTFS]]-Dateisystem von [[Microsoft Windows]].<br /> * Zahlreiche [[fdisk]]-Programme (Partitionierungsprogramme)<br /> <br /> '''Warnung bei Windows 8:''' Zur Zeit sollte man Schreibzugriffe auf das Dateisystem von Windows 8 meiden.&lt;ref&gt;http://www.heise.de/open/artikel/Linux-und-Windows-8-Schnellstart-gefaehrdet-Daten-1780057.html&lt;/ref&gt; Es besteht die Gefahr von Datenverlust, da bei dem mit Standardeinstellungen benutzten Schnellstart oder auch im normalen [[Ruhezustand]] Informationen zum Zustand aller eingebundenen Dateisysteme (z.&amp;nbsp;B. NTFS und FAT32) in ein Speicherabbild geschrieben werden. Abhilfe schafft unter anderem die Deaktivierung des Schnellstarts.<br /> <br /> Die Distribution verwendet die [[Desktop-Umgebung]] [[LXDE]] und bietet die in vielen heutigen [[Betriebssystem]]en üblichen Programme wie [[Portable Document Format|PDF]]-Betrachter ([[Evince]]), [[Bildbetrachter]] ([[Mirage (Software)|Mirage]]), [[Packprogramm]]e ([[File Roller]]), Musik-Player ([[Audacious]]), [[Brennprogramm]]e ([[Xfburn]]), [[CD-Ripper]] ([[Asunder]]) und das [[Drucksystem]] [[Common Unix Printing System|CUPS]] an.<br /> Zudem sind einige Internet-Programme wie ein [[IRC-Client]] ([[XChat]]) und der [[Webbrowser]] [[Mozilla Firefox|Firefox]] mit nachladbarem [[Adobe Flash#Flash Player|Flash]] und [[Java-Laufzeitumgebung|Java]] als auch der [[Freie Software|freie]] [[Virenscanner]] [[ClamAV]] mit der [[Grafische Benutzeroberfläche|grafischen Benutzeroberfläche]] ClamTk vorhanden.<br /> Eine simple [[Grafische Benutzeroberfläche|GUI]] ermöglicht das Speichern von getätigten Einstellungen für zukünftige Sitzungen. Auch die Installation auf einer [[Festplatte]] ist möglich.<br /> <br /> == Lizenz &amp; Preis ==<br /> Parted Magic wird unter der [[GNU General Public License]] veröffentlicht und ist damit [[Freie Software]].<br /> <br /> Früher konnte Parted Magic kostenfrei von der Webseite des Projektes heruntergeladen werden. Seit Anfang August 2013 jedoch (ab Version 2013_08_01) wird für den Bezug von Parted Magic über eine [[Paywall]] der Projekt-Webseite eine Gebühr erhoben. Das Preismodell sieht verschiedene Tarife vor und reicht von 9,99 [[US-Dollar|USD]] für einen Einmal-Download des CD-Images, über 12,99 USD für den Erhalt von Parted Magic auf CD bzw. ab 17,99 USD auf USB-Stick, bis zu 49,99 USD für ein Jahresabonnement, welches zu unbeschränkten Downloads aller erscheinenden Versionen incl. der wöchentlichen Builds legitimiert.&lt;ref&gt;https://partedmagic.com/downloads/ Paywall&lt;/ref&gt;<br /> <br /> Der Sourcecode von Parted Magic ist weiterhin gratis herunterladbar.&lt;ref&gt;http://beefdrapes.partedmagic.com/source/ Source Code&lt;/ref&gt;<br /> <br /> == Sonstiges ==<br /> Der Autor spendet monatlich einen gewissen Betrag an andere Freie Software- und Open Source-Projekte, welche in Parted Magic verwendet werden. Regelmäßige Spenden begannen, schon bevor sich der Autor zum Einrichten einer Paywall entschlossen hat. Die Spenden betrugen 2013 3.000 USD und 2014 (Stand 2. Juli) bislang 2.500 USD. Sie werden in einer eigenen Forums-Sektion bekanntgegeben.&lt;ref&gt;http://forums.partedmagic.com/viewforum.php?f=11 Open Source Donations from Parted Magic&lt;/ref&gt;<br /> <br /> == Entwicklungsgeschichte ==<br /> <br /> {| class=&quot;wikitable&quot;<br /> |- class=&quot;hintergrundfarbe5&quot;<br /> ! Version<br /> ! Datum<br /> ! Anmerkungen<br /> |-<br /> | {{Version|o|1.0–1.9}}<br /> | style=&quot;white-space: nowrap;&quot; | 25. Dezember 2006 (1.0)<br /> | Erste Version 1.0 wurde veröffentlicht.<br /> |-<br /> | {{Version|o|2.0–2.2}}<br /> | style=&quot;white-space: nowrap;&quot; | 11. Februar 2008 (2.0)<br /> | Entfernung von [[Gnome Partition Editor|GParted]] zugunsten des neu hinzugefügten, eigenentwickelten Partitionierungs-Programmes ''VisParted''; weitere Programme können manuell als Module hinzugefügt werden. In Version 2.1 wurde zusätzlich die Unterstützung von [[ext4]]-Dateisystemen in VisParted hinzugefügt; VisParted wurde in Version 2.2 jedoch entfernt und GParted wieder hinzugefügt, da letzteres Projekt trotzdem weitergeführt wird.<br /> |-<br /> | {{Version|o|3.0–3.7}}<br /> | style=&quot;white-space: nowrap;&quot; | 25. Juli 2008 (3.0)<br /> | Die Desktop-Umgebung ''[[Xfce]]'' wurde in Version 3.1 durch ''[[LXDE]]'' ersetzt, in Version 3.2 wurde [[Slackware]]s ''installpkg'' hinzugefügt. Die Unterstützung für das ext4-Dateisystem wurde in Version 3.5 wieder hinzugefügt, da GParted dieses Dateisystem nun unterstützt.<br /> |-<br /> | {{Version|o|4.0–4.11}}<br /> | style=&quot;white-space: nowrap;&quot; | 4. April 2009 (4.0)<br /> | Unter anderem Unterstützung für [[Device Mapper|Device-Mapper]]-[[RAID]]-Partitionen, neues [[Artwork]], [[initramfs]] anstelle von [[initrd]]; in Version 4.6 wurde das Virenschutzprogramm ''[[ClamAV]]'' aufgenommen; mit Version 4.11 kam der Internet-Browser ''[[Google Chrome#Chromium|Chromium]]'' dazu.<br /> |-<br /> | {{Version|o|5.0-5.10}}<br /> | style=&quot;white-space: nowrap;&quot; | 12. Juli 2010 (5.0)<br /> | Implementierung der Programmiersprache [[awk]] und Anzeige von System- und Festplatteninformationen. Mit Version 5.2 wird die Eingabemethode ''{{lang|en|Smart Common Input Method}}'' (SCIM) unterstützt, mit Version 5.3 wird keine ''LiveUSB''-Version mehr zum Download angeboten, aber [[UNetbootin]] unterstützt. In Version 5.10 wird Chromium durch [[Mozilla Firefox]] ersetzt.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Parted Magic 5.0-5.10|url=http://partedmagic.com/doku.php?id=changelog |zugriff=11. November 2011|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|6.0-6.7}}<br /> | style=&quot;white-space: nowrap;&quot; | 12. April 2011 (6.0)<br /> | Das grafische Startmenü (zum Hochfahren) wurde durch eine minimalistisch gehaltene Version ersetzt. Mit Version 6.2 wird die Anzeige des Desktops unter Rox und feh aufgeteilt; [[ntfsprogs]] wird durch [[NTFS-3G]] ersetzt. In Version 6.3 werden mehr CPU-Kerneloptionen hinzugefügt (i486, i686, x86_64); in Version 6.7 wurden PCManFM und SimpleBurn durch PCMan-Mod und Xfburn ersetzt.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 6.0 bis 6.7|url=http://partedmagic.com/doku.php?id=changelog |zugriff=11. November 2011|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|11.11.11 bis 2011_12_30}}<br /> | style=&quot;white-space: nowrap;&quot; | 11. November 2011 (11.11.11)<br /> | Einführung einer neuen Versionsbenennung (nach Datum), die mit der nächsten Version wieder leicht modifiziert wurde. In Version 2011_12_30 wurden cifs-utils-5.2 und keyutils_1.5.2 hinzugefügt.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2011er Reihe|url=http://partedmagic.com/doku.php?id=changelog |zugriff=28. Februar 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_2_19}}<br /> | style=&quot;white-space: nowrap;&quot; | 19. Februar 2012<br /> | ''Aktualisierungen:'' TrueCrypt 7.1, wxGTK-2.8.12, linux-3.2.6, clonezilla-1.2.12-10, partclone_0.2.45, ddrescue-1.15, e2fsprogs-1.42, hdparm-9.38, pciutils-3.1.9, nilfs-utils-2.1.1, ntfs-3g_ntfsprogs-2012.1.15, pcmanfm-mod-1.2.4, unetbootin-linux-568, firefox-10.0.1&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_2_19|url=http://partedmagic.com/doku.php?id=changelog |zugriff=20. Februar 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_2_27}}<br /> | style=&quot;white-space: nowrap;&quot; | 27. Februar 2012<br /> | ''Aktualisierung:'' GParted 0.12.0&lt;br /&gt;Außerdem wurde ein Bug in Clonezilla behoben.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_2_27|url=http://partedmagic.com/doku.php?id=changelog |zugriff=28. Februar 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_3_24}}<br /> | style=&quot;white-space: nowrap;&quot; | 24. März 2012<br /> | ''Aktualisierungen:'' Xorg drivers Nouveau-git, linux-3.2.13, firefox-11.0, nwipe-0.08, und e2fsprogs-1.42.1&lt;br /&gt;''Neue Programme:'' bar_1.11.1 und md5deep-4.1&lt;br /&gt;Die Kompatibilität von [[Clonezilla]] mit [[Busybox]] wurde verbessert.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_3_24|url=http://partedmagic.com/doku.php?id=changelog |zugriff=30. März 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_4_21}}<br /> | style=&quot;white-space: nowrap;&quot; | 21. April 2012<br /> | ''Aktualisierungen:'' e2fsprogs-1.42.2, dosfstools_3.0.12, mtools_4.0.17, util-linux-2.21.1, coreutils-8.16, bootinfoscript-061, gptfdisk-0.8.4, ms-sys-2.3.0, pigz-2.2.4, safecopy-1.7, gparted-0.12.1, lzip-1.13, parted-3.1, plzip-0.8, ddrescue-1.16-rc3, dhcp-4.2.1_P1, dhcpcd-5.2.12, ethtool-2.6.36, net-tools-1.60, hdparm-9.39, wicd-1.7.2, linux-3.2.15, clonezilla-1.2.12-37, ntfs-3g_ntfsprogs-2012.1.15AR.1, testdisk-6.14-WIP, smartmontools-5.42, flashrom-0.9.5.2.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_4_21|url=http://partedmagic.com/doku.php?id=changelog |zugriff=23. April 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_05_14}}<br /> | style=&quot;white-space: nowrap;&quot; | 14. Mai 2012<br /> | ''Aktualisierungen:'' openssl-0.9.8v, mount-gtk-1.2.0, MesaLib-8.0.2, fontconfig-2.8.0, freeglut-2.8.0, glew-1.5.7, libdrm-2.4.33, mtdev-1.1.2, xf86-input-*(9x), xf86-video-*(34x), xorg-server-1.12.1, glibc-2.15, linux-3.3.6, lxpanel-0.5.9, plpbt-5.0.14. ''Hinzugefügt:'' iptables-1.4.10, ConsoleKit-0.4.3, polkit-0.101, polkit-gnome-0.101, spacefm-0.7.6, sudo-1.7.4p6, udisks-1.0.4.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_5_14|url=http://partedmagic.com/doku.php?id=changelog |zugriff=17. Mai 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_05_30}}<br /> | style=&quot;white-space: nowrap;&quot; | 30. Mai 2012<br /> | ''Aktualisierungen:'' coreutils-8.17, file-5.11, lftp-4.3.6, mbr-1.1.11, openssh-6.0p1, openssl-0.9.8x, rdesktop-1.7.1, sshfs-fuse-2.4, unetbootin-575, zerofree-1.0.2, clamav-0.97.4, e2fsprogs-1.42.3, fuse-2.9.0, rsync-3.0.9, cifs-utils-5.4, keyutils-1.5.5, krb5-1.7.1, curl-7.25.0, libidn-1.25, openldap-client-2.4.31, spacefm-0.7.7. ''Hinzugefügt:'' pyneighborhood-0.5.4, shorewall-4.4.27, shorewall6-4.4.27.3, gptsync-0.14, udevil-0.2.4.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_5_30|url=http://partedmagic.com/doku.php?id=changelog |zugriff=1. Juni 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_06_07}}<br /> | style=&quot;white-space: nowrap;&quot; | 7. Juni 2012<br /> | ''Aktualisierungen:'' clonezilla-1.2.12-60, ntfs-3g_ntfsprogs-2012.1.15AR.5, partclone-0.2.48, testdisk-6.14-WIP, bash-4.2.024, lxinput-0.3.2, menu-cache-0.3.3, xmms2-0.8DrO_o, libogg-1.2.2, libvorbis-1.3.2, lxmusic-0.4.5, mpg123-1.13.3, alsa-lib-1.0.25, alsa-utils-1.0.25. ''Hinzugefügt:'' dislocker, libdiscid-0.2.2, libsndfile-1.0.24, kmod-8, nmap-5.51&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_6_07|url=http://partedmagic.com/doku.php?id=changelog |zugriff=9. Juni 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_06_26}}<br /> | style=&quot;white-space: nowrap;&quot; | 26. Juni 2012<br /> | ''Aktualisierungen:'' xrandr-1.3.5, bluez-4.91, fsarchiver-0.6.15, linux-3.4.3, e2fsprogs-1.42.4, sed-4.2.1, libdrm-2.4.35, xf86-video-nouveau-git_20120614_36d3f8c, freetype-2.4.10, ddrescue-1.16, pixman-0.26.0, xorg-server-1.12.2, firefox-13.0.1, gzip-1.5, psmisc-22.18, clamav-0.97.5, ethtool-3.4.1, xz-5.0.4, conky-1.9.0., xdg-user-dirs-0.13, xdg-utils-1.1.0_rc1, boost_1_49_0, cifs-utils-5.5. ''Hinzugefügt:'' arpwatch-2.1a15, sallu-xclamscan-1.1.1, arandr-0.1.6, samba-3.5.14, pm-utils-1.4.1, libmcs-0.7.2, libmowgli-0.7.1.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_6_26|url=http://partedmagic.com/doku.php?id=changelog |zugriff=29. Juni 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_07_05}}<br /> | style=&quot;white-space: nowrap;&quot; | 5. Juli 2012<br /> | ''Aktualisierungen:'' grep-2.13, mount-gtk-1.2.1, linux-3.4.4, udevil-0.2.9, lshw-B.02.16, partclone-0.2.49, clonezilla-1.2.12-67, nbd-3.0.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_07_05|url=http://partedmagic.com/doku.php?id=changelog |zugriff=5. Juli 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_07_13}}<br /> | style=&quot;white-space: nowrap;&quot; | 13. Juli 2012<br /> | ''Aktualisierungen:'' gparted-0.13.0, exfat-utils-0.9.7, fuse-exfat-0.9.7, gparted-0.12.1-git, udev-182, xorg-server-1.12.3, btrfs-progs-20120708, pciutils-3.1.10, smartmontools-5.43.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_07_13|url=http://partedmagic.com/doku.php?id=changelog |zugriff=14. Juli 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_07_28}}<br /> | style=&quot;white-space: nowrap;&quot; | 28. Juli 2012<br /> | ''Aktualisierungen:'' gopenssl-1.0.1c, cryptsetup-1.4.3, dbus-1.4.20, LVM2.2.02.96, mdadm-3.2.5, util-linux-2.21.2, atk-2.4.0, dbus-glib-0.98, gdk-pixbuf-2.26.1, glib-2.32.3, gtk+-2.24.10, libnotify-0.7.5, pango-1.30.1, bind-9.9.1-P1, curl-7.26.0, elinks-0.11.7, lftp-4.3.8, nmap-6.01, ntp-4.2.6p5, openldap-2.4.31, openssh-6.0p1, gftp-2.0.19, newt-0.52.14, slang2-2.2.4, vte-0.28.2, spacefm-0.7.10, udevil-0.3.1, linux-3.4.6, iptables-1.4.14, xfce4-screenshooter-1.8.1, xfburn-git from 07/26/2012, libpng-1.2.50, libpng-1.4.12.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_07_28|url=http://partedmagic.com/doku.php?id=changelog |zugriff=3. August 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_08_09}}<br /> | style=&quot;white-space: nowrap;&quot; | 9. August 2012<br /> | ''Aktualisierungen:'' gparted-0.13.1, gptfdisk-0.8.5, lm_sensors-3.3.2, firefox-14.0.1, xf86-video-nv-2.1.20.&lt;ref&gt;{{Internetquelle|autor=Patrick Verner|hrsg=Parted Magic|titel=Changelog Parted Magic 2012_08_09|url=http://partedmagic.com/doku.php?id=changelog |zugriff=15. August 2012|sprache=en}}&lt;/ref&gt;<br /> |-<br /> | {{Version|o|2012_09_12}}<br /> | style=&quot;white-space: nowrap;&quot; | 12. September 2012<br /> |<br /> |-<br /> | {{Version|o|2012_10_10}}<br /> | style=&quot;white-space: nowrap;&quot; | 10. Oktober 2012<br /> | ''Aktualisierungen:'' python-2.7.3, bzip2-1.0.6, dbus-python-1.1.0, libgpg-error-1.10, mesa-9.0, nmap-6.01, notify-python-0.1.1, pixman-0.27.2, py2cairo-1.8.10, pygobject-2.28.6, pygtk-2.24.0, pyneighborhood-0.5.4, smartmontools-6.0, wicd-1.7.2.4, gparted-0.14.0, firefox-16.0, ethtool-3.6, linux-3.5.6, gnome-ppp-0.3.23, libtorrent-0.13.0, rtorrent-0.9.0, wvdial-1.61, wvstreams-4.6.1, zfs-fuse-20120201_6abfdcf, xf86-input-*(11x), xf86-video-*(36x), xorg-server-1.13.0, reiser4progs-1.0.7, libaal-1.0.5, hdparm-9.42, cryptsetup-1.4.3, libcap-2.22, libgcrypt-1.5.0, pcre-8.12, ncurses-5.9, ncdu-1.9, nwipe-0.11, e2fsprogs-1.42.6, lilo-23.2, clamav-0.97.6, dhcp-4.2.4-P2, hdt-0.5.2, spacefm-0.8.0, udevil-0.3.3<br /> |-<br /> | {{Version|o|2012_11_30}}<br /> | style=&quot;white-space: nowrap;&quot; | 30. November 2012<br /> | ''Änderungen:'' Kernel 3.6.8 (PAE), Firefox 17.0, gparted-11.23.2012, Sonstiges ''(engl. 72x Upgrade, 32x Rebuilt, 106x Added, 10x Removed)''<br /> |-<br /> | {{Version|o|2012_12_25}}<br /> | style=&quot;white-space: nowrap;&quot; | 25. Dezember 2012<br /> |<br /> |-<br /> | {{Version|o|2013_01_29}}<br /> | style=&quot;white-space: nowrap;&quot; | 29. Januar 2013<br /> | ''Aktualisierungen:'' Kernel 3.7.5, Firefox 18.0.1<br /> |-<br /> | {{Version|o|2013_02_28}}<br /> | style=&quot;white-space: nowrap;&quot; | 28. Februar 2013<br /> | ''Aktualisierungen:'' Kernel 3.7.9, Firefox 19.0.1, u.v.m.<br /> |-<br /> | {{Version|o|2013_05_01}}<br /> | style=&quot;white-space: nowrap;&quot; | 1. Mai 2013<br /> | ''Aktualisierungen:'' Kernel 3.8.10, Firefox 20.0.1, GParted 0.16.1, EFI boot von CD wurde deutlich verbessert<br /> |-<br /> | {{Version|o|2013_06_15}}<br /> | style=&quot;white-space: nowrap;&quot; | 15. Juni 2013<br /> | ''Aktualisierungen:'' Kernel 3.8.13, Clonezilla 3.3.40<br /> |-<br /> | {{Version|o|2013_08_01}}<br /> | style=&quot;white-space: nowrap;&quot; | 1. August 2013<br /> | ''Aktualisierungen:'' Kernel 3.10.4, Clonezilla 3.5.1, Firefox 22.0<br /> |-<br /> | {{Version|o|2013_09_26}}<br /> | style=&quot;white-space: nowrap;&quot; | 26. September 2013<br /> | ''Aktualisierungen:'' Kernel 3.10.12, Firefox 24.0<br /> |-<br /> | {{Version|o|2013_11_11}}<br /> | style=&quot;white-space: nowrap;&quot; | 11. November 2013<br /> | ''Aktualisierungen:'' Kernel 3.10.18, Firefox 24.1ESR<br /> |-<br /> | {{Version|o|2014_01_04}}<br /> | style=&quot;white-space: nowrap;&quot; | 4. Januar 2014<br /> | ''Aktualisierungen:'' Kernel 3.12.6, Firefox 26.0<br /> |-<br /> | {{Version|o|2014_02_26}}<br /> | style=&quot;white-space: nowrap;&quot; | 26. Februar 2014<br /> | ''Aktualisierungen:'' Kernel 3.13.4, Firefox 27.0.1<br /> |-<br /> | {{Version|o|2014_04_28}}<br /> | style=&quot;white-space: nowrap;&quot; | 28. April 2014<br /> | ''Aktualisierungen:'' Kernel 3.14.2<br /> |-<br /> | {{Version|o|2014_06_10}}<br /> | style=&quot;white-space: nowrap;&quot; | 10. Juni 2014<br /> | ''Aktualisierungen:'' Kernel 3.14.4, Firefox 29.0.1, clamav-0.98.3, e2fsprogs-1.42.10, eudev-20140510, gparted-0.19.0, gparted-badsectors-0.19.0, libdrm-2.4.54, libevdev-1.2.1, libxml2-2.9.1, libxslt-1.1.28, openssl-1.0.1h, xf86-input-evdev-2.9.0, xf86-input-synaptics-1.7.6<br /> |-<br /> | {{Version|o|2014_08_14}}<br /> | style=&quot;white-space: nowrap;&quot; | 14. August 2014<br /> |''Aktualisierungen:'' Kernel 3.15.9, Firefox 31.0, parted-3.2<br /> |-<br /> | {{Version|o|2014_09_22}}<br /> | style=&quot;white-space: nowrap;&quot; | 22. September 2014<br /> |''Aktualisierungen:'' Firefox 32.0, ddrescue-1.18.1, clonezilla-3.10.33<br /> |-<br /> | {{Version|o|2014_09_29}}<br /> | style=&quot;white-space: nowrap;&quot; | 29. September 2014<br /> | ''Aktualisierungen:'' Firefox 32.0.3, bash-4.3.026<br /> |-<br /> | {{Version|o|2014_11_19}}<br /> | style=&quot;white-space: nowrap;&quot; | 19. November 2014<br /> |<br /> |-<br /> | {{Version|o|2015_01_13}}<br /> | style=&quot;white-space: nowrap;&quot; | 13. Januar 2015<br /> |<br /> |-<br /> | {{Version|o|2015_03_06}}<br /> | style=&quot;white-space: nowrap;&quot; | 6. März 2015<br /> | ''Aktualisierungen:'' Truecrypt ersetzt durch Veracrypt 1.0f<br /> |-<br /> | {{Version|o|2015_05_04}}<br /> | style=&quot;white-space: nowrap;&quot; | 4. Mai 2015<br /> | <br /> |-<br /> | {{Version|o|2015_07_07}}<br /> | style=&quot;white-space: nowrap;&quot; | 7. Juli 2015<br /> | <br /> |-<br /> | {{Version|o|2015_08_12}}<br /> | style=&quot;white-space: nowrap;&quot; | 12. August 2015<br /> |<br /> |-<br /> | {{Version|o|2015_09_29}}<br /> | style=&quot;white-space: nowrap;&quot; | 29. September 2015<br /> | ''Aktualisierungen:'' Firefox 41<br /> |-<br /> | {{Version|c|2015_11_13}}<br /> | style=&quot;white-space: nowrap;&quot; | 13. November 2015<br /> | ''Aktualisierungen:'' Firefox 42, Kernel 4.2.6<br /> |-<br /> | colspan=&quot;3&quot;| {{Version |l |zeige=110100}}<br /> |}<br /> <br /> == Siehe auch ==<br /> <br /> * [[SystemRescueCd]] – Ein startfähiges Notfallsystem für die Reparatur eines nicht mehr startbaren Betriebssystems und die Wiederherstellung von Daten<br /> * [[G4L]] – Ein startfähiges Notfallsystem zum Sichern (backup) oder Kopieren (clone) von Festplatten oder deren Partitionen (GPL)<br /> * [[GNU Parted#GParted|GParted]] – GNU Parted mit grafischer Oberfläche. Gibt es auch als Live-CD (GPL)<br /> * [[Liste von Linux-Distributionen]]<br /> <br /> == Weblinks ==<br /> <br /> {{Commonscat}}<br /> * [http://partedmagic.com/ Parted Magic] (englisch) – Offizielle Webseite<br /> <br /> == Einzelnachweise ==<br /> <br /> &lt;references /&gt;<br /> <br /> [[Kategorie:Linux-Distribution]]<br /> [[Kategorie:Live-CD]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=8kun&diff=187755786 8kun 2016-01-04T22:19:36Z <p>Dsprc: /* External links */ explain what is going on here with ref and ext links sect with comment in markup source</p> <hr /> <div>{{other uses|8chan (disambiguation)}}<br /> {{Use mdy dates|date=September 2015}}<br /> {{Infobox website<br /> | name = 8chan<br /> | logo =<br /> | screenshot = [[File:InfiniteChan∞chanLogo.svg|200px]]<br /> | alt = green infinity symbol left of the word chan.<br /> | caption = The ∞chan logo of 8chan<br /> | url = {{URL|https://8ch.net}}<br /> | slogan = <br /> | commercial = Yes<br /> | type = [[Imageboard]]<br /> | language = English, Japanese (users can create language specific boards)<br /> | registration = Optional<br /> | author = [[Fredrick Brennan]]<br /> | owner = [[:ja:ジム・ワトキンス|Jim Watkins]],&lt;br /&gt; N.T. Technology ([[2channel]])&lt;ref&gt;[https://8ch.net/who.html 8chan] - Who owns 8chan?&lt;/ref&gt;<br /> | launch date = {{start date and age|2013|10|22|df=no}}<br /> | alexa = {{IncreaseNegative}} 10,084 ({{as of|2015|8|22|alt=August 2015}})&lt;ref name=&quot;alexa&quot;&gt;{{cite web|url= http://www.alexa.com/siteinfo/8ch.net |title= 8ch.net Site Info | publisher= [[Alexa Internet]] |accessdate= August 22, 2015 }}&lt;/ref&gt;<br /> | current status = Online<br /> }}<br /> <br /> '''8chan,''' also called '''Infinitechan,''' is an [[English language|English-language]] [[imageboard]] website composed of user-created [[Internet forum|boards]]. Each board is moderated by its respective creator, with minimal interaction from other site administration.&lt;ref name=&quot;faq&quot;&gt;{{cite web|last=Brennan|first=Fredrick|url=https://8ch.net/faq.html|title=FAQ|publisher=Infinitechan|website=8chan.co|accessdate=November 23, 2014}}&lt;/ref&gt;<br /> <br /> The site has received both praise and criticism for its stance on [[Freedom of speech|free speech]], which involves allowing any content to be posted, so long as it adheres to United States law.<br /> <br /> Several sites's boards have played an active role in the [[Gamergate controversy]], encouraging Gamergate affiliates to frequent 8chan after the topic was banned on the unaffiliated imageboard [[4chan]]. As of August of 2015, the site was the 10,204th most visited site in the world,&lt;ref name=&quot;alexa&quot; /&gt; and in November of 2014, it was receiving an average of 35,000 unique visitors per day and 400,000 posts per week when it was at a higher rank.&lt;ref name=Howell2014 /&gt;<br /> <br /> ==History==<br /> 8chan was created in October of 2013 by computer programmer [[Fredrick Brennan]],&lt;ref name=Howell2014 /&gt;&lt;ref&gt;{{cite web|last1=Machkovech|first1=Sam|title=Full transcript: Ars interviews 8chan founder Fredrick Brennan|url=http://arstechnica.com/business/2015/03/full-transcript-ars-interviews-8chan-founder-fredrick-brennan/|publisher=Ars Technica|accessdate=June 15, 2015|date=March 17, 2015}}&lt;/ref&gt; also known by the nickname &quot;Hotwheels.&quot;&lt;ref name=&quot;KYM&quot;/&gt; Brennan created the website after he observed what he perceived to be rapidly escalating [[surveillance]] and a loss of [[free speech]] on the Internet.&lt;ref name=Howell2014 /&gt; Brennan, who considers the imageboard [[4chan]] to have grown into authoritarianism, describes 8chan as a &quot;free-speech-friendly&quot; alternative,&lt;ref name=&quot;Howell2014&quot;&gt;{{cite web|last=Howell O'Neill|first=Patrick|date=November 17, 2014|url=http://www.dailydot.com/politics/8chan-pedophiles-child-porn-gamergate/|title=8chan, the central hive of Gamergate, is also an active pedophile network|work=The Daily Dot}}&lt;/ref&gt; and had originally conceptualized the site while experiencing a [[psychedelic experience|psychedelic mushrooms trip]].&lt;ref name=&quot;KYM&quot;/&gt;&lt;ref name=WashPost /&gt;<br /> <br /> No experience or programming knowledge is necessary for users to create their own boards.&lt;ref name=&quot;faq&quot; /&gt; Since as early as March of 2014, its [[FAQ]] has stated only one rule that is to be globally enforced: &quot;Do not post, request, or link to any content illegal in the United States of America. Do not create boards with the sole purpose of posting or spreading such content.&quot;&lt;ref name=&quot;faq&quot; /&gt; Brennan has claimed that, while he finds some of the content posted by users to be &quot;reprehensible,&quot; he feels personally obligated to uphold the site's integrity by tolerating discussion he does not necessarily support regardless of his moral stance.&lt;ref name=Howell2014 /&gt;<br /> <br /> Brennan agreed to partner 8chan with the Japanese message board [[2channel]],&lt;ref name=&quot;KYM&quot;&gt;{{cite web|url=http://knowyourmeme.com/blog/interviews/qa-with-fredrick-brennan-of-8chan|title=Q&amp;A with Fredrick Brennan of 8chan|last=Caldwell|first=Don|date=October 9, 2014|work=[[Know Your Meme]]|accessdate=December 18, 2014}}&lt;/ref&gt; and subsequently relocated to the [[Philippines]] in October 2014.&lt;ref name=Chen /&gt;<br /> <br /> In January of 2015, the site changed its [[Domain name|domain]] 8chan.co to 8ch.net after multiple people filed reports complaining to 8chan’s [[Domain name registrar|registrar]] that the message board hosted [[child pornography]]. Despite subsequently regaining the domain, the site remained at 8ch.net, with the old domain redirecting to it.&lt;ref name=WashPost /&gt;<br /> <br /> Numerous bugs in the Infinity software led to the funding and development of a successor platform dubbed &quot;Infinity Next&quot;. After a several-month-long testing period, a migration to the new software was attempted in December 2015, but failed.&lt;ref&gt;{{cite web |url=https://ghostbin.com/paste/qt2ww |format=Plaintext |title=qt2ww |last=Moon |first=Joshua |date=2015-12-19 |accessdate=2015-12-20 }}&lt;/ref&gt;{{clarify|date=December 2015}}<br /> <br /> ==Controversies==<br /> ===Child pornography===<br /> ''[[The Washington Post]]'' described it as &quot;the more-lawless, more-libertarian, more 'free' follow-up to 4chan.&quot;&lt;ref name=&quot;WashPost&quot;&gt;{{cite web|url=http://www.washingtonpost.com/news/the-intersect/wp/2015/01/13/this-is-what-happens-when-you-create-an-online-community-without-any-rules/|title=This is what happens when you create an online community without any rules|work=[[The Washington Post]]|last=Caitlin|first=Dewey|date=January 13, 2015}}&lt;/ref&gt; Boards have been created to discuss controversial topics, including [[pedophilia]]. While the sharing of illegal content is against site rules, ''[[The Daily Dot]]'' wrote that boards do exist to share sexualized images of minors in provocative poses, and that some users of those boards do post links to explicit child pornography hosted elsewhere.&lt;ref name=&quot;Howell2014&quot;/&gt; When asked whether such boards were an inevitable result of free speech, Brennan responded, &quot;Unfortunately, yes. I don’t support the content on the boards you mentioned, but it is simply the cost of free speech and being the only active site to not impose more 'laws' than those that were passed in [[Washington, D.C.]]&quot;&lt;ref name=&quot;Howell2014&quot;/&gt;<br /> <br /> In August of 2015, for a brief period, 8chan was blacklisted from [[Google Search]] for containing content constituting &quot;suspected child abuse content.&quot;&lt;ref name=ars-8chancensor&gt;{{cite web|title=8chan-hosted content disappears from Google searches|url=http://arstechnica.com/tech-policy/2015/08/8chan-hosted-content-disappears-from-google-searches/|last=Machkovech|first=Sam|website=[[Ars Technica]]|publisher=[[Condé Nast]]|date=August 14, 2015|accessdate=August 17, 2015}}&lt;/ref&gt; It was later restored to the search engine's listings without explanation.&lt;ref&gt;{{Cite web|url = https://medium.com/@infinitechan/google-is-not-your-friend-5a6636af0651|title = Google is not your friend?|date = August 13, 2015|accessdate = September 9, 2015|website = Medium|publisher = |last = Brennan|first = Frederick}}&lt;/ref&gt;<br /> <br /> ===Gamergate===<br /> {{main|Gamergate controversy}}<br /> On September 18, 2014, the website gained prominence in the [[Gamergate controversy]] after 4chan banned discussion of Gamergate,&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;/&gt;&lt;ref&gt;{{cite news|last=Audureau|first=William|title=4chan, wizardchan, 8chan... s'y retrouver dans la jungle des forums anonymes les plus populaires du Web|url=http://www.lemonde.fr/pixels/article/2014/10/15/4chan-wizardchan-8chan-le-guide-des-forums-anonymes-les-plus-populaires-du-web_4505380_4408996.html|work=[[Le Monde]]|location=France|language=French|date=October 15, 2014}}&lt;/ref&gt; whereupon 8chan became one of several hubs of Gamergate activity.&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;&gt;{{cite web|last=Chen|first=Adrian|date=October 27, 2014|url=http://nymag.com/daily/intelligencer/2014/10/gamergate-supporters-party-at-strip-club.html|title=Gamergate Supporters Partied at a Strip Club This Weekend|work=[[New York (magazine)]]}}&lt;/ref&gt;&lt;ref name=&quot;Buzz&quot;/&gt;&lt;ref name=&quot;Guardian 2015-01-13&quot; /&gt; &quot;/gg/,&quot; 8chan's initial Gamergate-oriented board, also gained attention after being compromised by members of the internet troll group [[Gay Nigger Association of America]], forcing Gamergate activists to migrate to &quot;/gamergate/.&quot; This replacement quickly became the site's second most populous board.&lt;ref name=&quot;Buzz&quot;&gt;{{cite web|last1=Bernstein|first1=Joseph|title=GamerGate’s Headquarters Has Been Destroyed By Trolls|url=http://www.buzzfeed.com/josephbernstein/gamergates-headquarters-has-been-destroyed-by-trolls|publisher=''[[Buzzfeed]]''|date=December 4, 2014}}&lt;/ref&gt;<br /> <br /> ===Swatting incidents===<br /> In January of 2015 the site was used as a base for [[swatting]] exploits in [[Portland, Oregon|Portland]], [[Seattle]], and [[Burnaby|Burnaby, British Columbia]], most of them tied to the victims' criticism of Gamergate and 8chan's association with it;&lt;ref name=&quot;Mattise&quot;&gt;{{cite web|last=Mattise|first=Nathan|date=January 4, 2015|url=http://arstechnica.com/tech-policy/2015/01/8chan-tries-swatting-gamergate-critic-sends-cops-to-an-old-address/|title=8chan tries &quot;swatting&quot; GamerGate critic, sends cops to an old address|work=[[Ars Technica]]}}&lt;/ref&gt; the attacks were coordinated on a [[Internet forum|board]] on the website called &quot;/baphomet/.&quot;&lt;ref name=&quot;Guardian 2015-01-13&quot;&gt;{{cite news |last=Hern |first=Alex |url=http://www.theguardian.com/technology/2015/jan/13/gamergate-hits-new-low-with-attempts-to-send-swat-teams-to-critics |title=Gamergate hits new low with attempts to send Swat teams to critics |work=[[The Guardian]] |date=January 13, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt; One of the victims of a swatting attack said that she was singled out because she had followed someone on [[Twitter]].&lt;ref name=&quot;GlobalNews 2015-01-15&quot;&gt;{{cite news |last=McElroy |first=Justin |url=http://globalnews.ca/news/1773840/police-called-to-burnaby-womens-home-by-online-harassers/ |title=Police falsely called to Burnaby women’s home by online harassers |work=[[Global News]] |date=January 15, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt;&lt;ref&gt;{{cite web|url=http://www.gameranx.com/updates/id/26081/article/canadian-victim-of-gamergate-swatting-attempt-comes-forward/|title=Canadian Victim of Gamergate SWATing Attempt Comes Forward|work=Gameranx|last=Cheong|first=Ian Miles|date=January 13, 2015|accessdate=January 16, 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://bc.ctvnews.ca/reckless-swatting-prank-sends-police-to-b-c-woman-s-home-1.2189547|title=Reckless ‘swatting’ prank sends police to B.C. woman’s home|work=[[CTV News]]|date=January 14, 2015|accessdate=September 30, 2015|author=&lt;!-- Staff writers --&gt;}}&lt;/ref&gt; On February 9, 2015, contents on the &quot;/baphomet/&quot; subboard were wiped after [[doxxing|personal information]] of [[Katherine B. Forrest|Katherine Forrest]], the presiding judge in the [[Silk Road (marketplace)|Silk Road]] case, had been posted there.&lt;ref name=&quot;silkroad&quot;&gt;{{Cite web| title = Notorious 8chan &quot;subboard&quot; has history wiped after federal judge’s doxing| first = Sam |last = Machkovech|work = Ars Technica| date = February 12, 2015| accessdate = February 13, 2015| url = http://arstechnica.com/security/2015/02/notorious-8chan-subboard-has-history-wiped-after-federal-judges-doxing/}}&lt;/ref&gt;<br /> <br /> ===Los Angeles school-closure incident===<br /> [[File:CWh686mUwAEQLoj.png|thumb|upright=0.35|alt=Photograph of Vincent Canfield|Owner and operator of cock.li, Vincent Canfield]]<br /> On Tuesday, December 15, 2015, the New York City and Los Angeles County Boards of Education were both sent a superficially threatening, but actually fraudulent, e-mail message that had originated from an 8chan-linked service called &quot;cock.li&quot;. The New York City school board did not take the message seriously, but the Los Angeles County school board refused to take the chance and ordered all public schools closed for the entire day, citing what it called a &quot;credible terror threat.&quot; Sam Biddle, a contributor to [[Gawker.com]], called the message &quot;extremely dumb&quot; in an article on the site he filed under &quot;Pranks,&quot; writing:<br /> {{cquote|Even if this message hadn’t been sent from a “cock.li” email account, it would’ve been hard to imagine it was a credible threat of violence, particularly since it conflates 4chan-style “death to the normies” rhetoric with convoluted Islamism. It looks very much like the work of a kid who really didn’t want to go to school.}}<br /> In the article, which he titled “Here’s the Full, Extremely Dumb Email That Shut Down the Entire L.A. Public School System,” Biddle quoted the e-mail message itself, word for word.&lt;ref&gt;{{Cite web| title = Here’s the Full, Extremely Dumb Email That Shut Down the Entire L.A. Public School System| first = Sam |last = Biddle|work = Gawker| date = December 16, 2015| accessdate = December 16, 2015| url = http://gawker.com/heres-the-full-extremely-dumb-email-that-shut-down-the-1748402588/}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Bluestone, Gabrielle|title=Bicoastal School Bomb Threats Were Sent From an 8Chan-Linked &quot;Cockmail&quot; Service|url=http://gawker.com/bicoastal-school-bomb-threats-sent-from-8chan-linked-c-1748175650|publisher=Gawker|accessdate=4 January 2016|date=15 December 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Farivar, Cyrus|title=All LA schools shut down over message sent from 8chan’s e-mail host, cock.li|url=http://arstechnica.com/tech-policy/2015/12/all-la-schools-shut-down-over-message-sent-from-8chans-e-mail-host-cock-li/|website=Ars Technica|publisher=Condé Nast|accessdate=4 January 2016|date=16 December 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Neff, Blake|title=LA School Threat Came From Online ‘Meme Sewer’|url=http://dailycaller.com/2015/12/15/la-school-threat-came-from-online-meme-sewer/|publisher=The Daily Caller|accessdate=4 January 2016|date=12 December 2015}}&lt;/ref&gt;<br /> <br /> ==External links==<br /> &lt;!--<br /> * External links (EL) are listed above reference section due to it containing a reference itself. <br /> * If EL section is below ref section, it causes a citation to hang below the navbox at bottom of page and not respective ref section as normal.<br /> * Please incorporate this text into article body or have some way for reference to not be messed up before moving it. --dsprc<br /> --&gt;<br /> * {{Official website}}<br /> * &lt;nowiki&gt;oxwugzccvk3dk6tj.onion&lt;/nowiki&gt;&lt;ref&gt;{{cite web|title=Hidden service key leaked |author=Brennan, Fredrick| archiveurl=https://web.archive.org/web/20150810171533/https://8ch.net/_g/1153.txt|archivedate=10 August 2015|url=https://8ch.net/_g/1153.txt|publisher=8ch.net|accessdate=August 18, 2015}}&lt;/ref&gt; - [[.onion]] address for [[Tor (network)|Tor]] hidden service<br /> * {{Twitter|infinitechan|8chan}}<br /> <br /> ==References==<br /> {{Reflist|30em}}<br /> <br /> {{Tor hidden services}}<br /> {{DEFAULTSORT:8chan}}<br /> [[Category:2channel]]<br /> [[Category:American websites]]<br /> [[Category:Community websites]]<br /> [[Category:Free web software]]<br /> [[Category:Internet forums]]<br /> [[Category:Imageboards]]<br /> [[Category:Internet properties established in 2013]]<br /> [[Category:Obscenity controversies]]<br /> [[Category:Tor hidden services]]<br /> [[Category:Virtual communities]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=8kun&diff=187755785 8kun 2016-01-04T22:11:20Z <p>Dsprc: /* External links */</p> <hr /> <div>{{other uses|8chan (disambiguation)}}<br /> {{Use mdy dates|date=September 2015}}<br /> {{Infobox website<br /> | name = 8chan<br /> | logo =<br /> | screenshot = [[File:InfiniteChan∞chanLogo.svg|200px]]<br /> | alt = green infinity symbol left of the word chan.<br /> | caption = The ∞chan logo of 8chan<br /> | url = {{URL|https://8ch.net}}<br /> | slogan = <br /> | commercial = Yes<br /> | type = [[Imageboard]]<br /> | language = English, Japanese (users can create language specific boards)<br /> | registration = Optional<br /> | author = [[Fredrick Brennan]]<br /> | owner = [[:ja:ジム・ワトキンス|Jim Watkins]],&lt;br /&gt; N.T. Technology ([[2channel]])&lt;ref&gt;[https://8ch.net/who.html 8chan] - Who owns 8chan?&lt;/ref&gt;<br /> | launch date = {{start date and age|2013|10|22|df=no}}<br /> | alexa = {{IncreaseNegative}} 10,084 ({{as of|2015|8|22|alt=August 2015}})&lt;ref name=&quot;alexa&quot;&gt;{{cite web|url= http://www.alexa.com/siteinfo/8ch.net |title= 8ch.net Site Info | publisher= [[Alexa Internet]] |accessdate= August 22, 2015 }}&lt;/ref&gt;<br /> | current status = Online<br /> }}<br /> <br /> '''8chan,''' also called '''Infinitechan,''' is an [[English language|English-language]] [[imageboard]] website composed of user-created [[Internet forum|boards]]. Each board is moderated by its respective creator, with minimal interaction from other site administration.&lt;ref name=&quot;faq&quot;&gt;{{cite web|last=Brennan|first=Fredrick|url=https://8ch.net/faq.html|title=FAQ|publisher=Infinitechan|website=8chan.co|accessdate=November 23, 2014}}&lt;/ref&gt;<br /> <br /> The site has received both praise and criticism for its stance on [[Freedom of speech|free speech]], which involves allowing any content to be posted, so long as it adheres to United States law.<br /> <br /> Several sites's boards have played an active role in the [[Gamergate controversy]], encouraging Gamergate affiliates to frequent 8chan after the topic was banned on the unaffiliated imageboard [[4chan]]. As of August of 2015, the site was the 10,204th most visited site in the world,&lt;ref name=&quot;alexa&quot; /&gt; and in November of 2014, it was receiving an average of 35,000 unique visitors per day and 400,000 posts per week when it was at a higher rank.&lt;ref name=Howell2014 /&gt;<br /> <br /> ==History==<br /> 8chan was created in October of 2013 by computer programmer [[Fredrick Brennan]],&lt;ref name=Howell2014 /&gt;&lt;ref&gt;{{cite web|last1=Machkovech|first1=Sam|title=Full transcript: Ars interviews 8chan founder Fredrick Brennan|url=http://arstechnica.com/business/2015/03/full-transcript-ars-interviews-8chan-founder-fredrick-brennan/|publisher=Ars Technica|accessdate=June 15, 2015|date=March 17, 2015}}&lt;/ref&gt; also known by the nickname &quot;Hotwheels.&quot;&lt;ref name=&quot;KYM&quot;/&gt; Brennan created the website after he observed what he perceived to be rapidly escalating [[surveillance]] and a loss of [[free speech]] on the Internet.&lt;ref name=Howell2014 /&gt; Brennan, who considers the imageboard [[4chan]] to have grown into authoritarianism, describes 8chan as a &quot;free-speech-friendly&quot; alternative,&lt;ref name=&quot;Howell2014&quot;&gt;{{cite web|last=Howell O'Neill|first=Patrick|date=November 17, 2014|url=http://www.dailydot.com/politics/8chan-pedophiles-child-porn-gamergate/|title=8chan, the central hive of Gamergate, is also an active pedophile network|work=The Daily Dot}}&lt;/ref&gt; and had originally conceptualized the site while experiencing a [[psychedelic experience|psychedelic mushrooms trip]].&lt;ref name=&quot;KYM&quot;/&gt;&lt;ref name=WashPost /&gt;<br /> <br /> No experience or programming knowledge is necessary for users to create their own boards.&lt;ref name=&quot;faq&quot; /&gt; Since as early as March of 2014, its [[FAQ]] has stated only one rule that is to be globally enforced: &quot;Do not post, request, or link to any content illegal in the United States of America. Do not create boards with the sole purpose of posting or spreading such content.&quot;&lt;ref name=&quot;faq&quot; /&gt; Brennan has claimed that, while he finds some of the content posted by users to be &quot;reprehensible,&quot; he feels personally obligated to uphold the site's integrity by tolerating discussion he does not necessarily support regardless of his moral stance.&lt;ref name=Howell2014 /&gt;<br /> <br /> Brennan agreed to partner 8chan with the Japanese message board [[2channel]],&lt;ref name=&quot;KYM&quot;&gt;{{cite web|url=http://knowyourmeme.com/blog/interviews/qa-with-fredrick-brennan-of-8chan|title=Q&amp;A with Fredrick Brennan of 8chan|last=Caldwell|first=Don|date=October 9, 2014|work=[[Know Your Meme]]|accessdate=December 18, 2014}}&lt;/ref&gt; and subsequently relocated to the [[Philippines]] in October 2014.&lt;ref name=Chen /&gt;<br /> <br /> In January of 2015, the site changed its [[Domain name|domain]] 8chan.co to 8ch.net after multiple people filed reports complaining to 8chan’s [[Domain name registrar|registrar]] that the message board hosted [[child pornography]]. Despite subsequently regaining the domain, the site remained at 8ch.net, with the old domain redirecting to it.&lt;ref name=WashPost /&gt;<br /> <br /> Numerous bugs in the Infinity software led to the funding and development of a successor platform dubbed &quot;Infinity Next&quot;. After a several-month-long testing period, a migration to the new software was attempted in December 2015, but failed.&lt;ref&gt;{{cite web |url=https://ghostbin.com/paste/qt2ww |format=Plaintext |title=qt2ww |last=Moon |first=Joshua |date=2015-12-19 |accessdate=2015-12-20 }}&lt;/ref&gt;{{clarify|date=December 2015}}<br /> <br /> ==Controversies==<br /> ===Child pornography===<br /> ''[[The Washington Post]]'' described it as &quot;the more-lawless, more-libertarian, more 'free' follow-up to 4chan.&quot;&lt;ref name=&quot;WashPost&quot;&gt;{{cite web|url=http://www.washingtonpost.com/news/the-intersect/wp/2015/01/13/this-is-what-happens-when-you-create-an-online-community-without-any-rules/|title=This is what happens when you create an online community without any rules|work=[[The Washington Post]]|last=Caitlin|first=Dewey|date=January 13, 2015}}&lt;/ref&gt; Boards have been created to discuss controversial topics, including [[pedophilia]]. While the sharing of illegal content is against site rules, ''[[The Daily Dot]]'' wrote that boards do exist to share sexualized images of minors in provocative poses, and that some users of those boards do post links to explicit child pornography hosted elsewhere.&lt;ref name=&quot;Howell2014&quot;/&gt; When asked whether such boards were an inevitable result of free speech, Brennan responded, &quot;Unfortunately, yes. I don’t support the content on the boards you mentioned, but it is simply the cost of free speech and being the only active site to not impose more 'laws' than those that were passed in [[Washington, D.C.]]&quot;&lt;ref name=&quot;Howell2014&quot;/&gt;<br /> <br /> In August of 2015, for a brief period, 8chan was blacklisted from [[Google Search]] for containing content constituting &quot;suspected child abuse content.&quot;&lt;ref name=ars-8chancensor&gt;{{cite web|title=8chan-hosted content disappears from Google searches|url=http://arstechnica.com/tech-policy/2015/08/8chan-hosted-content-disappears-from-google-searches/|last=Machkovech|first=Sam|website=[[Ars Technica]]|publisher=[[Condé Nast]]|date=August 14, 2015|accessdate=August 17, 2015}}&lt;/ref&gt; It was later restored to the search engine's listings without explanation.&lt;ref&gt;{{Cite web|url = https://medium.com/@infinitechan/google-is-not-your-friend-5a6636af0651|title = Google is not your friend?|date = August 13, 2015|accessdate = September 9, 2015|website = Medium|publisher = |last = Brennan|first = Frederick}}&lt;/ref&gt;<br /> <br /> ===Gamergate===<br /> {{main|Gamergate controversy}}<br /> On September 18, 2014, the website gained prominence in the [[Gamergate controversy]] after 4chan banned discussion of Gamergate,&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;/&gt;&lt;ref&gt;{{cite news|last=Audureau|first=William|title=4chan, wizardchan, 8chan... s'y retrouver dans la jungle des forums anonymes les plus populaires du Web|url=http://www.lemonde.fr/pixels/article/2014/10/15/4chan-wizardchan-8chan-le-guide-des-forums-anonymes-les-plus-populaires-du-web_4505380_4408996.html|work=[[Le Monde]]|location=France|language=French|date=October 15, 2014}}&lt;/ref&gt; whereupon 8chan became one of several hubs of Gamergate activity.&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;&gt;{{cite web|last=Chen|first=Adrian|date=October 27, 2014|url=http://nymag.com/daily/intelligencer/2014/10/gamergate-supporters-party-at-strip-club.html|title=Gamergate Supporters Partied at a Strip Club This Weekend|work=[[New York (magazine)]]}}&lt;/ref&gt;&lt;ref name=&quot;Buzz&quot;/&gt;&lt;ref name=&quot;Guardian 2015-01-13&quot; /&gt; &quot;/gg/,&quot; 8chan's initial Gamergate-oriented board, also gained attention after being compromised by members of the internet troll group [[Gay Nigger Association of America]], forcing Gamergate activists to migrate to &quot;/gamergate/.&quot; This replacement quickly became the site's second most populous board.&lt;ref name=&quot;Buzz&quot;&gt;{{cite web|last1=Bernstein|first1=Joseph|title=GamerGate’s Headquarters Has Been Destroyed By Trolls|url=http://www.buzzfeed.com/josephbernstein/gamergates-headquarters-has-been-destroyed-by-trolls|publisher=''[[Buzzfeed]]''|date=December 4, 2014}}&lt;/ref&gt;<br /> <br /> ===Swatting incidents===<br /> In January of 2015 the site was used as a base for [[swatting]] exploits in [[Portland, Oregon|Portland]], [[Seattle]], and [[Burnaby|Burnaby, British Columbia]], most of them tied to the victims' criticism of Gamergate and 8chan's association with it;&lt;ref name=&quot;Mattise&quot;&gt;{{cite web|last=Mattise|first=Nathan|date=January 4, 2015|url=http://arstechnica.com/tech-policy/2015/01/8chan-tries-swatting-gamergate-critic-sends-cops-to-an-old-address/|title=8chan tries &quot;swatting&quot; GamerGate critic, sends cops to an old address|work=[[Ars Technica]]}}&lt;/ref&gt; the attacks were coordinated on a [[Internet forum|board]] on the website called &quot;/baphomet/.&quot;&lt;ref name=&quot;Guardian 2015-01-13&quot;&gt;{{cite news |last=Hern |first=Alex |url=http://www.theguardian.com/technology/2015/jan/13/gamergate-hits-new-low-with-attempts-to-send-swat-teams-to-critics |title=Gamergate hits new low with attempts to send Swat teams to critics |work=[[The Guardian]] |date=January 13, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt; One of the victims of a swatting attack said that she was singled out because she had followed someone on [[Twitter]].&lt;ref name=&quot;GlobalNews 2015-01-15&quot;&gt;{{cite news |last=McElroy |first=Justin |url=http://globalnews.ca/news/1773840/police-called-to-burnaby-womens-home-by-online-harassers/ |title=Police falsely called to Burnaby women’s home by online harassers |work=[[Global News]] |date=January 15, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt;&lt;ref&gt;{{cite web|url=http://www.gameranx.com/updates/id/26081/article/canadian-victim-of-gamergate-swatting-attempt-comes-forward/|title=Canadian Victim of Gamergate SWATing Attempt Comes Forward|work=Gameranx|last=Cheong|first=Ian Miles|date=January 13, 2015|accessdate=January 16, 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://bc.ctvnews.ca/reckless-swatting-prank-sends-police-to-b-c-woman-s-home-1.2189547|title=Reckless ‘swatting’ prank sends police to B.C. woman’s home|work=[[CTV News]]|date=January 14, 2015|accessdate=September 30, 2015|author=&lt;!-- Staff writers --&gt;}}&lt;/ref&gt; On February 9, 2015, contents on the &quot;/baphomet/&quot; subboard were wiped after [[doxxing|personal information]] of [[Katherine B. Forrest|Katherine Forrest]], the presiding judge in the [[Silk Road (marketplace)|Silk Road]] case, had been posted there.&lt;ref name=&quot;silkroad&quot;&gt;{{Cite web| title = Notorious 8chan &quot;subboard&quot; has history wiped after federal judge’s doxing| first = Sam |last = Machkovech|work = Ars Technica| date = February 12, 2015| accessdate = February 13, 2015| url = http://arstechnica.com/security/2015/02/notorious-8chan-subboard-has-history-wiped-after-federal-judges-doxing/}}&lt;/ref&gt;<br /> <br /> ===Los Angeles school-closure incident===<br /> [[File:CWh686mUwAEQLoj.png|thumb|upright=0.35|alt=Photograph of Vincent Canfield|Owner and operator of cock.li, Vincent Canfield]]<br /> On Tuesday, December 15, 2015, the New York City and Los Angeles County Boards of Education were both sent a superficially threatening, but actually fraudulent, e-mail message that had originated from an 8chan-linked service called &quot;cock.li&quot;. The New York City school board did not take the message seriously, but the Los Angeles County school board refused to take the chance and ordered all public schools closed for the entire day, citing what it called a &quot;credible terror threat.&quot; Sam Biddle, a contributor to [[Gawker.com]], called the message &quot;extremely dumb&quot; in an article on the site he filed under &quot;Pranks,&quot; writing:<br /> {{cquote|Even if this message hadn’t been sent from a “cock.li” email account, it would’ve been hard to imagine it was a credible threat of violence, particularly since it conflates 4chan-style “death to the normies” rhetoric with convoluted Islamism. It looks very much like the work of a kid who really didn’t want to go to school.}}<br /> In the article, which he titled “Here’s the Full, Extremely Dumb Email That Shut Down the Entire L.A. Public School System,” Biddle quoted the e-mail message itself, word for word.&lt;ref&gt;{{Cite web| title = Here’s the Full, Extremely Dumb Email That Shut Down the Entire L.A. Public School System| first = Sam |last = Biddle|work = Gawker| date = December 16, 2015| accessdate = December 16, 2015| url = http://gawker.com/heres-the-full-extremely-dumb-email-that-shut-down-the-1748402588/}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Bluestone, Gabrielle|title=Bicoastal School Bomb Threats Were Sent From an 8Chan-Linked &quot;Cockmail&quot; Service|url=http://gawker.com/bicoastal-school-bomb-threats-sent-from-8chan-linked-c-1748175650|publisher=Gawker|accessdate=4 January 2016|date=15 December 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Farivar, Cyrus|title=All LA schools shut down over message sent from 8chan’s e-mail host, cock.li|url=http://arstechnica.com/tech-policy/2015/12/all-la-schools-shut-down-over-message-sent-from-8chans-e-mail-host-cock-li/|website=Ars Technica|publisher=Condé Nast|accessdate=4 January 2016|date=16 December 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Neff, Blake|title=LA School Threat Came From Online ‘Meme Sewer’|url=http://dailycaller.com/2015/12/15/la-school-threat-came-from-online-meme-sewer/|publisher=The Daily Caller|accessdate=4 January 2016|date=12 December 2015}}&lt;/ref&gt;<br /> <br /> ==External links==<br /> * {{Official website}}<br /> * &lt;nowiki&gt;oxwugzccvk3dk6tj.onion&lt;/nowiki&gt;&lt;ref&gt;{{cite web|title=Hidden service key leaked |author=Brennan, Fredrick| archiveurl=https://web.archive.org/web/20150810171533/https://8ch.net/_g/1153.txt|archivedate=10 August 2015|url=https://8ch.net/_g/1153.txt|publisher=8ch.net|accessdate=August 18, 2015}}&lt;/ref&gt; - [[.onion]] address for [[Tor (network)|Tor]] hidden service<br /> * {{Twitter|infinitechan|8chan}}<br /> <br /> ==References==<br /> {{Reflist|30em}}<br /> <br /> {{Tor hidden services}}<br /> {{DEFAULTSORT:8chan}}<br /> [[Category:2channel]]<br /> [[Category:American websites]]<br /> [[Category:Community websites]]<br /> [[Category:Free web software]]<br /> [[Category:Internet forums]]<br /> [[Category:Imageboards]]<br /> [[Category:Internet properties established in 2013]]<br /> [[Category:Obscenity controversies]]<br /> [[Category:Tor hidden services]]<br /> [[Category:Virtual communities]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=8kun&diff=187755784 8kun 2016-01-04T22:09:40Z <p>Dsprc: cited the cockli stuff and wayback machined onion (last one was right there if not been lazy about it)</p> <hr /> <div>{{other uses|8chan (disambiguation)}}<br /> {{Use mdy dates|date=September 2015}}<br /> {{Infobox website<br /> | name = 8chan<br /> | logo =<br /> | screenshot = [[File:InfiniteChan∞chanLogo.svg|200px]]<br /> | alt = green infinity symbol left of the word chan.<br /> | caption = The ∞chan logo of 8chan<br /> | url = {{URL|https://8ch.net}}<br /> | slogan = <br /> | commercial = Yes<br /> | type = [[Imageboard]]<br /> | language = English, Japanese (users can create language specific boards)<br /> | registration = Optional<br /> | author = [[Fredrick Brennan]]<br /> | owner = [[:ja:ジム・ワトキンス|Jim Watkins]],&lt;br /&gt; N.T. Technology ([[2channel]])&lt;ref&gt;[https://8ch.net/who.html 8chan] - Who owns 8chan?&lt;/ref&gt;<br /> | launch date = {{start date and age|2013|10|22|df=no}}<br /> | alexa = {{IncreaseNegative}} 10,084 ({{as of|2015|8|22|alt=August 2015}})&lt;ref name=&quot;alexa&quot;&gt;{{cite web|url= http://www.alexa.com/siteinfo/8ch.net |title= 8ch.net Site Info | publisher= [[Alexa Internet]] |accessdate= August 22, 2015 }}&lt;/ref&gt;<br /> | current status = Online<br /> }}<br /> <br /> '''8chan,''' also called '''Infinitechan,''' is an [[English language|English-language]] [[imageboard]] website composed of user-created [[Internet forum|boards]]. Each board is moderated by its respective creator, with minimal interaction from other site administration.&lt;ref name=&quot;faq&quot;&gt;{{cite web|last=Brennan|first=Fredrick|url=https://8ch.net/faq.html|title=FAQ|publisher=Infinitechan|website=8chan.co|accessdate=November 23, 2014}}&lt;/ref&gt;<br /> <br /> The site has received both praise and criticism for its stance on [[Freedom of speech|free speech]], which involves allowing any content to be posted, so long as it adheres to United States law.<br /> <br /> Several sites's boards have played an active role in the [[Gamergate controversy]], encouraging Gamergate affiliates to frequent 8chan after the topic was banned on the unaffiliated imageboard [[4chan]]. As of August of 2015, the site was the 10,204th most visited site in the world,&lt;ref name=&quot;alexa&quot; /&gt; and in November of 2014, it was receiving an average of 35,000 unique visitors per day and 400,000 posts per week when it was at a higher rank.&lt;ref name=Howell2014 /&gt;<br /> <br /> ==History==<br /> 8chan was created in October of 2013 by computer programmer [[Fredrick Brennan]],&lt;ref name=Howell2014 /&gt;&lt;ref&gt;{{cite web|last1=Machkovech|first1=Sam|title=Full transcript: Ars interviews 8chan founder Fredrick Brennan|url=http://arstechnica.com/business/2015/03/full-transcript-ars-interviews-8chan-founder-fredrick-brennan/|publisher=Ars Technica|accessdate=June 15, 2015|date=March 17, 2015}}&lt;/ref&gt; also known by the nickname &quot;Hotwheels.&quot;&lt;ref name=&quot;KYM&quot;/&gt; Brennan created the website after he observed what he perceived to be rapidly escalating [[surveillance]] and a loss of [[free speech]] on the Internet.&lt;ref name=Howell2014 /&gt; Brennan, who considers the imageboard [[4chan]] to have grown into authoritarianism, describes 8chan as a &quot;free-speech-friendly&quot; alternative,&lt;ref name=&quot;Howell2014&quot;&gt;{{cite web|last=Howell O'Neill|first=Patrick|date=November 17, 2014|url=http://www.dailydot.com/politics/8chan-pedophiles-child-porn-gamergate/|title=8chan, the central hive of Gamergate, is also an active pedophile network|work=The Daily Dot}}&lt;/ref&gt; and had originally conceptualized the site while experiencing a [[psychedelic experience|psychedelic mushrooms trip]].&lt;ref name=&quot;KYM&quot;/&gt;&lt;ref name=WashPost /&gt;<br /> <br /> No experience or programming knowledge is necessary for users to create their own boards.&lt;ref name=&quot;faq&quot; /&gt; Since as early as March of 2014, its [[FAQ]] has stated only one rule that is to be globally enforced: &quot;Do not post, request, or link to any content illegal in the United States of America. Do not create boards with the sole purpose of posting or spreading such content.&quot;&lt;ref name=&quot;faq&quot; /&gt; Brennan has claimed that, while he finds some of the content posted by users to be &quot;reprehensible,&quot; he feels personally obligated to uphold the site's integrity by tolerating discussion he does not necessarily support regardless of his moral stance.&lt;ref name=Howell2014 /&gt;<br /> <br /> Brennan agreed to partner 8chan with the Japanese message board [[2channel]],&lt;ref name=&quot;KYM&quot;&gt;{{cite web|url=http://knowyourmeme.com/blog/interviews/qa-with-fredrick-brennan-of-8chan|title=Q&amp;A with Fredrick Brennan of 8chan|last=Caldwell|first=Don|date=October 9, 2014|work=[[Know Your Meme]]|accessdate=December 18, 2014}}&lt;/ref&gt; and subsequently relocated to the [[Philippines]] in October 2014.&lt;ref name=Chen /&gt;<br /> <br /> In January of 2015, the site changed its [[Domain name|domain]] 8chan.co to 8ch.net after multiple people filed reports complaining to 8chan’s [[Domain name registrar|registrar]] that the message board hosted [[child pornography]]. Despite subsequently regaining the domain, the site remained at 8ch.net, with the old domain redirecting to it.&lt;ref name=WashPost /&gt;<br /> <br /> Numerous bugs in the Infinity software led to the funding and development of a successor platform dubbed &quot;Infinity Next&quot;. After a several-month-long testing period, a migration to the new software was attempted in December 2015, but failed.&lt;ref&gt;{{cite web |url=https://ghostbin.com/paste/qt2ww |format=Plaintext |title=qt2ww |last=Moon |first=Joshua |date=2015-12-19 |accessdate=2015-12-20 }}&lt;/ref&gt;{{clarify|date=December 2015}}<br /> <br /> ==Controversies==<br /> ===Child pornography===<br /> ''[[The Washington Post]]'' described it as &quot;the more-lawless, more-libertarian, more 'free' follow-up to 4chan.&quot;&lt;ref name=&quot;WashPost&quot;&gt;{{cite web|url=http://www.washingtonpost.com/news/the-intersect/wp/2015/01/13/this-is-what-happens-when-you-create-an-online-community-without-any-rules/|title=This is what happens when you create an online community without any rules|work=[[The Washington Post]]|last=Caitlin|first=Dewey|date=January 13, 2015}}&lt;/ref&gt; Boards have been created to discuss controversial topics, including [[pedophilia]]. While the sharing of illegal content is against site rules, ''[[The Daily Dot]]'' wrote that boards do exist to share sexualized images of minors in provocative poses, and that some users of those boards do post links to explicit child pornography hosted elsewhere.&lt;ref name=&quot;Howell2014&quot;/&gt; When asked whether such boards were an inevitable result of free speech, Brennan responded, &quot;Unfortunately, yes. I don’t support the content on the boards you mentioned, but it is simply the cost of free speech and being the only active site to not impose more 'laws' than those that were passed in [[Washington, D.C.]]&quot;&lt;ref name=&quot;Howell2014&quot;/&gt;<br /> <br /> In August of 2015, for a brief period, 8chan was blacklisted from [[Google Search]] for containing content constituting &quot;suspected child abuse content.&quot;&lt;ref name=ars-8chancensor&gt;{{cite web|title=8chan-hosted content disappears from Google searches|url=http://arstechnica.com/tech-policy/2015/08/8chan-hosted-content-disappears-from-google-searches/|last=Machkovech|first=Sam|website=[[Ars Technica]]|publisher=[[Condé Nast]]|date=August 14, 2015|accessdate=August 17, 2015}}&lt;/ref&gt; It was later restored to the search engine's listings without explanation.&lt;ref&gt;{{Cite web|url = https://medium.com/@infinitechan/google-is-not-your-friend-5a6636af0651|title = Google is not your friend?|date = August 13, 2015|accessdate = September 9, 2015|website = Medium|publisher = |last = Brennan|first = Frederick}}&lt;/ref&gt;<br /> <br /> ===Gamergate===<br /> {{main|Gamergate controversy}}<br /> On September 18, 2014, the website gained prominence in the [[Gamergate controversy]] after 4chan banned discussion of Gamergate,&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;/&gt;&lt;ref&gt;{{cite news|last=Audureau|first=William|title=4chan, wizardchan, 8chan... s'y retrouver dans la jungle des forums anonymes les plus populaires du Web|url=http://www.lemonde.fr/pixels/article/2014/10/15/4chan-wizardchan-8chan-le-guide-des-forums-anonymes-les-plus-populaires-du-web_4505380_4408996.html|work=[[Le Monde]]|location=France|language=French|date=October 15, 2014}}&lt;/ref&gt; whereupon 8chan became one of several hubs of Gamergate activity.&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;&gt;{{cite web|last=Chen|first=Adrian|date=October 27, 2014|url=http://nymag.com/daily/intelligencer/2014/10/gamergate-supporters-party-at-strip-club.html|title=Gamergate Supporters Partied at a Strip Club This Weekend|work=[[New York (magazine)]]}}&lt;/ref&gt;&lt;ref name=&quot;Buzz&quot;/&gt;&lt;ref name=&quot;Guardian 2015-01-13&quot; /&gt; &quot;/gg/,&quot; 8chan's initial Gamergate-oriented board, also gained attention after being compromised by members of the internet troll group [[Gay Nigger Association of America]], forcing Gamergate activists to migrate to &quot;/gamergate/.&quot; This replacement quickly became the site's second most populous board.&lt;ref name=&quot;Buzz&quot;&gt;{{cite web|last1=Bernstein|first1=Joseph|title=GamerGate’s Headquarters Has Been Destroyed By Trolls|url=http://www.buzzfeed.com/josephbernstein/gamergates-headquarters-has-been-destroyed-by-trolls|publisher=''[[Buzzfeed]]''|date=December 4, 2014}}&lt;/ref&gt;<br /> <br /> ===Swatting incidents===<br /> In January of 2015 the site was used as a base for [[swatting]] exploits in [[Portland, Oregon|Portland]], [[Seattle]], and [[Burnaby|Burnaby, British Columbia]], most of them tied to the victims' criticism of Gamergate and 8chan's association with it;&lt;ref name=&quot;Mattise&quot;&gt;{{cite web|last=Mattise|first=Nathan|date=January 4, 2015|url=http://arstechnica.com/tech-policy/2015/01/8chan-tries-swatting-gamergate-critic-sends-cops-to-an-old-address/|title=8chan tries &quot;swatting&quot; GamerGate critic, sends cops to an old address|work=[[Ars Technica]]}}&lt;/ref&gt; the attacks were coordinated on a [[Internet forum|board]] on the website called &quot;/baphomet/.&quot;&lt;ref name=&quot;Guardian 2015-01-13&quot;&gt;{{cite news |last=Hern |first=Alex |url=http://www.theguardian.com/technology/2015/jan/13/gamergate-hits-new-low-with-attempts-to-send-swat-teams-to-critics |title=Gamergate hits new low with attempts to send Swat teams to critics |work=[[The Guardian]] |date=January 13, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt; One of the victims of a swatting attack said that she was singled out because she had followed someone on [[Twitter]].&lt;ref name=&quot;GlobalNews 2015-01-15&quot;&gt;{{cite news |last=McElroy |first=Justin |url=http://globalnews.ca/news/1773840/police-called-to-burnaby-womens-home-by-online-harassers/ |title=Police falsely called to Burnaby women’s home by online harassers |work=[[Global News]] |date=January 15, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt;&lt;ref&gt;{{cite web|url=http://www.gameranx.com/updates/id/26081/article/canadian-victim-of-gamergate-swatting-attempt-comes-forward/|title=Canadian Victim of Gamergate SWATing Attempt Comes Forward|work=Gameranx|last=Cheong|first=Ian Miles|date=January 13, 2015|accessdate=January 16, 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://bc.ctvnews.ca/reckless-swatting-prank-sends-police-to-b-c-woman-s-home-1.2189547|title=Reckless ‘swatting’ prank sends police to B.C. woman’s home|work=[[CTV News]]|date=January 14, 2015|accessdate=September 30, 2015|author=&lt;!-- Staff writers --&gt;}}&lt;/ref&gt; On February 9, 2015, contents on the &quot;/baphomet/&quot; subboard were wiped after [[doxxing|personal information]] of [[Katherine B. Forrest|Katherine Forrest]], the presiding judge in the [[Silk Road (marketplace)|Silk Road]] case, had been posted there.&lt;ref name=&quot;silkroad&quot;&gt;{{Cite web| title = Notorious 8chan &quot;subboard&quot; has history wiped after federal judge’s doxing| first = Sam |last = Machkovech|work = Ars Technica| date = February 12, 2015| accessdate = February 13, 2015| url = http://arstechnica.com/security/2015/02/notorious-8chan-subboard-has-history-wiped-after-federal-judges-doxing/}}&lt;/ref&gt;<br /> <br /> ===Los Angeles school-closure incident===<br /> [[File:CWh686mUwAEQLoj.png|thumb|upright=0.35|alt=Photograph of Vincent Canfield|Owner and operator of cock.li, Vincent Canfield]]<br /> On Tuesday, December 15, 2015, the New York City and Los Angeles County Boards of Education were both sent a superficially threatening, but actually fraudulent, e-mail message that had originated from an 8chan-linked service called &quot;cock.li&quot;. The New York City school board did not take the message seriously, but the Los Angeles County school board refused to take the chance and ordered all public schools closed for the entire day, citing what it called a &quot;credible terror threat.&quot; Sam Biddle, a contributor to [[Gawker.com]], called the message &quot;extremely dumb&quot; in an article on the site he filed under &quot;Pranks,&quot; writing:<br /> {{cquote|Even if this message hadn’t been sent from a “cock.li” email account, it would’ve been hard to imagine it was a credible threat of violence, particularly since it conflates 4chan-style “death to the normies” rhetoric with convoluted Islamism. It looks very much like the work of a kid who really didn’t want to go to school.}}<br /> In the article, which he titled “Here’s the Full, Extremely Dumb Email That Shut Down the Entire L.A. Public School System,” Biddle quoted the e-mail message itself, word for word.&lt;ref&gt;{{Cite web| title = Here’s the Full, Extremely Dumb Email That Shut Down the Entire L.A. Public School System| first = Sam |last = Biddle|work = Gawker| date = December 16, 2015| accessdate = December 16, 2015| url = http://gawker.com/heres-the-full-extremely-dumb-email-that-shut-down-the-1748402588/}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Bluestone, Gabrielle|title=Bicoastal School Bomb Threats Were Sent From an 8Chan-Linked &quot;Cockmail&quot; Service|url=http://gawker.com/bicoastal-school-bomb-threats-sent-from-8chan-linked-c-1748175650|publisher=Gawker|accessdate=4 January 2016|date=15 December 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Farivar, Cyrus|title=All LA schools shut down over message sent from 8chan’s e-mail host, cock.li|url=http://arstechnica.com/tech-policy/2015/12/all-la-schools-shut-down-over-message-sent-from-8chans-e-mail-host-cock-li/|website=Ars Technica|publisher=Condé Nast|accessdate=4 January 2016|date=16 December 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web|author1=Neff, Blake|title=LA School Threat Came From Online ‘Meme Sewer’|url=http://dailycaller.com/2015/12/15/la-school-threat-came-from-online-meme-sewer/|publisher=The Daily Caller|accessdate=4 January 2016|date=12 December 2015}}&lt;/ref&gt;<br /> <br /> ==External links==<br /> * {{Official website}}<br /> * &lt;nowiki&gt;oxwugzccvk3dk6tj.onion&lt;/nowiki&gt;&lt;ref&gt;{{cite web|title=Hidden service key leaked |author=Brennan, Fredrick| archiveurl=https://web.archive.org/web/20150810171533/https://8ch.net/_g/1153.txt|archivedate=10 August 2015|url=https://8ch.net/_g/1153.txt|accessdate=August 18, 2015}}&lt;/ref&gt; - [[.onion]] address for [[Tor (network)|Tor]] hidden service<br /> * {{Twitter|infinitechan|8chan}}<br /> <br /> ==References==<br /> {{Reflist|30em}}<br /> <br /> {{Tor hidden services}}<br /> {{DEFAULTSORT:8chan}}<br /> [[Category:2channel]]<br /> [[Category:American websites]]<br /> [[Category:Community websites]]<br /> [[Category:Free web software]]<br /> [[Category:Internet forums]]<br /> [[Category:Imageboards]]<br /> [[Category:Internet properties established in 2013]]<br /> [[Category:Obscenity controversies]]<br /> [[Category:Tor hidden services]]<br /> [[Category:Virtual communities]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=8kun&diff=187755781 8kun 2016-01-01T18:25:21Z <p>Dsprc: /* top */ rm &quot;slogan&quot; from infobox as is just a blurb written in header of their homepage</p> <hr /> <div>{{other uses|8chan (disambiguation)}}<br /> {{Use mdy dates|date=September 2015}}<br /> {{Infobox website<br /> | name = 8chan<br /> | logo =<br /> | screenshot = [[File:InfiniteChan∞chanLogo.svg|200px]]<br /> | alt = green infinity symbol left of the word chan.<br /> | caption = The ∞chan logo of 8chan<br /> | url = {{URL|https://8ch.net}}<br /> | slogan = <br /> | commercial = Yes<br /> | type = [[Imageboard]]<br /> | language = English, Japanese (users can create language specific boards)<br /> | registration = Optional<br /> | author = [[Fredrick Brennan]]<br /> | owner = [[:ja:ジム・ワトキンス|Jim Watkins]],&lt;br /&gt; N.T. Technology ([[2channel]])&lt;ref&gt;[https://8ch.net/who.html 8chan] - Who owns 8chan?&lt;/ref&gt;<br /> | launch date = {{start date and age|2013|10|22|df=no}}<br /> | alexa = {{IncreaseNegative}} 10,084 ({{as of|2015|8|22|alt=August 2015}})&lt;ref name=&quot;alexa&quot;&gt;{{cite web|url= http://www.alexa.com/siteinfo/8ch.net |title= 8ch.net Site Info | publisher= [[Alexa Internet]] |accessdate= August 22, 2015 }}&lt;/ref&gt;<br /> | current status = Online<br /> }}<br /> <br /> '''8chan,''' also called '''Infinitechan,''' is an [[English language|English-language]] [[imageboard]] website composed of user-created [[Internet forum|boards]]. Each board is moderated by its respective creator, with minimal interaction from other site administration.&lt;ref name=&quot;faq&quot;&gt;{{cite web|last=Brennan|first=Fredrick|url=https://8ch.net/faq.html|title=FAQ|publisher=Infinitechan|website=8chan.co|accessdate=November 23, 2014}}&lt;/ref&gt;<br /> <br /> The site has received both praise and criticism for its stance on [[Freedom of speech|free speech]], which involves allowing any content to be posted, so long as it adheres to United States law.<br /> <br /> Several sites's boards have played an active role in the [[Gamergate controversy]], encouraging Gamergate affiliates to frequent 8chan after the topic was banned on the unaffiliated imageboard [[4chan]]. As of August of 2015, the site was the 10,204th most visited site in the world,&lt;ref name=&quot;alexa&quot; /&gt; and in November of 2014, it was receiving an average of 35,000 unique visitors per day and 400,000 posts per week when it was at a higher rank.&lt;ref name=Howell2014 /&gt;<br /> <br /> ==History==<br /> 8chan was created in October of 2013 by computer programmer [[Fredrick Brennan]],&lt;ref name=Howell2014 /&gt;&lt;ref&gt;{{cite web|last1=Machkovech|first1=Sam|title=Full transcript: Ars interviews 8chan founder Fredrick Brennan|url=http://arstechnica.com/business/2015/03/full-transcript-ars-interviews-8chan-founder-fredrick-brennan/|publisher=Ars Technica|accessdate=June 15, 2015|date=March 17, 2015}}&lt;/ref&gt; also known by the nickname &quot;Hotwheels.&quot;&lt;ref name=&quot;KYM&quot;/&gt; Brennan created the website after he observed what he perceived to be rapidly escalating [[surveillance]] and a loss of [[free speech]] on the Internet.&lt;ref name=Howell2014 /&gt; Brennan, who considers the imageboard [[4chan]] to have grown into authoritarianism, describes 8chan as a &quot;free-speech-friendly&quot; alternative,&lt;ref name=&quot;Howell2014&quot;&gt;{{cite web|last=Howell O'Neill|first=Patrick|date=November 17, 2014|url=http://www.dailydot.com/politics/8chan-pedophiles-child-porn-gamergate/|title=8chan, the central hive of Gamergate, is also an active pedophile network|work=The Daily Dot}}&lt;/ref&gt; and had originally conceptualized the site while experiencing a [[psychedelic experience|psychedelic mushrooms trip]].&lt;ref name=&quot;KYM&quot;/&gt;&lt;ref name=WashPost /&gt;<br /> <br /> No experience or programming knowledge is necessary for users to create their own boards.&lt;ref name=&quot;faq&quot; /&gt; Since as early as March of 2014, its [[FAQ]] has stated only one rule that is to be globally enforced: &quot;Do not post, request, or link to any content illegal in the United States of America. Do not create boards with the sole purpose of posting or spreading such content.&quot;&lt;ref name=&quot;faq&quot; /&gt; Brennan has claimed that, while he finds some of the content posted by users to be &quot;reprehensible,&quot; he feels personally obligated to uphold the site's integrity by tolerating discussion he does not necessarily support regardless of his moral stance.&lt;ref name=Howell2014 /&gt;<br /> <br /> Brennan agreed to partner 8chan with the Japanese message board [[2channel]],&lt;ref name=&quot;KYM&quot;&gt;{{cite web|url=http://knowyourmeme.com/blog/interviews/qa-with-fredrick-brennan-of-8chan|title=Q&amp;A with Fredrick Brennan of 8chan|last=Caldwell|first=Don|date=October 9, 2014|work=[[Know Your Meme]]|accessdate=December 18, 2014}}&lt;/ref&gt; and subsequently relocated to the [[Philippines]] in October 2014.&lt;ref name=Chen /&gt;<br /> <br /> In January of 2015, the site changed its [[Domain name|domain]] 8chan.co to 8ch.net after multiple people filed reports complaining to 8chan’s [[Domain name registrar|registrar]] that the message board hosted [[child pornography]]. Despite subsequently regaining the domain, the site remained at 8ch.net, with the old domain redirecting to it.&lt;ref name=WashPost /&gt;<br /> <br /> Numerous bugs in the Infinity software led to the funding and development of a successor platform dubbed &quot;Infinity Next&quot;. After a several-month-long testing period, a migration to the new software was attempted in December 2015, but failed.&lt;ref&gt;{{cite web |url=https://ghostbin.com/paste/qt2ww |format=Plaintext |title=qt2ww |last=Moon |first=Joshua |date=2015-12-19 |accessdate=2015-12-20 }}&lt;/ref&gt;{{clarify|date=December 2015}}<br /> <br /> ==Controversies==<br /> ===Child pornography===<br /> ''[[The Washington Post]]'' described it as &quot;the more-lawless, more-libertarian, more 'free' follow-up to 4chan.&quot;&lt;ref name=&quot;WashPost&quot;&gt;{{cite web|url=http://www.washingtonpost.com/news/the-intersect/wp/2015/01/13/this-is-what-happens-when-you-create-an-online-community-without-any-rules/|title=This is what happens when you create an online community without any rules|work=[[The Washington Post]]|last=Caitlin|first=Dewey|date=January 13, 2015}}&lt;/ref&gt; Boards have been created to discuss controversial topics, including [[pedophilia]]. While the sharing of illegal content is against site rules, ''[[The Daily Dot]]'' wrote that boards do exist to share sexualized images of minors in provocative poses, and that some users of those boards do post links to explicit child pornography hosted elsewhere.&lt;ref name=&quot;Howell2014&quot;/&gt; When asked whether such boards were an inevitable result of free speech, Brennan responded, &quot;Unfortunately, yes. I don’t support the content on the boards you mentioned, but it is simply the cost of free speech and being the only active site to not impose more 'laws' than those that were passed in [[Washington, D.C.]]&quot;&lt;ref name=&quot;Howell2014&quot;/&gt;<br /> <br /> In August of 2015, for a brief period, 8chan was blacklisted from [[Google Search]] for containing content constituting &quot;suspected child abuse content.&quot;&lt;ref name=ars-8chancensor&gt;{{cite web|title=8chan-hosted content disappears from Google searches|url=http://arstechnica.com/tech-policy/2015/08/8chan-hosted-content-disappears-from-google-searches/|last=Machkovech|first=Sam|website=[[Ars Technica]]|publisher=[[Condé Nast]]|date=August 14, 2015|accessdate=August 17, 2015}}&lt;/ref&gt; It was later restored to the search engine's listings without explanation.&lt;ref&gt;{{Cite web|url = https://medium.com/@infinitechan/google-is-not-your-friend-5a6636af0651|title = Google is not your friend?|date = August 13, 2015|accessdate = September 9, 2015|website = Medium|publisher = |last = Brennan|first = Frederick}}&lt;/ref&gt;<br /> <br /> ===Gamergate===<br /> {{main|Gamergate controversy}}<br /> On September 18, 2014, the website gained prominence in the [[Gamergate controversy]] after 4chan banned discussion of Gamergate,&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;/&gt;&lt;ref&gt;{{cite news|last=Audureau|first=William|title=4chan, wizardchan, 8chan... s'y retrouver dans la jungle des forums anonymes les plus populaires du Web|url=http://www.lemonde.fr/pixels/article/2014/10/15/4chan-wizardchan-8chan-le-guide-des-forums-anonymes-les-plus-populaires-du-web_4505380_4408996.html|work=[[Le Monde]]|location=France|language=French|date=October 15, 2014}}&lt;/ref&gt; whereupon 8chan became one of several hubs of Gamergate activity.&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;&gt;{{cite web|last=Chen|first=Adrian|date=October 27, 2014|url=http://nymag.com/daily/intelligencer/2014/10/gamergate-supporters-party-at-strip-club.html|title=Gamergate Supporters Partied at a Strip Club This Weekend|work=[[New York (magazine)]]}}&lt;/ref&gt;&lt;ref name=&quot;Buzz&quot;/&gt;&lt;ref name=&quot;Guardian 2015-01-13&quot; /&gt; &quot;/gg/,&quot; 8chan's initial Gamergate-oriented board, also gained attention after being compromised by members of the internet troll group [[Gay Nigger Association of America]], forcing Gamergate activists to migrate to &quot;/gamergate/.&quot; This replacement quickly became the site's second most populous board.&lt;ref name=&quot;Buzz&quot;&gt;{{cite web|last1=Bernstein|first1=Joseph|title=GamerGate’s Headquarters Has Been Destroyed By Trolls|url=http://www.buzzfeed.com/josephbernstein/gamergates-headquarters-has-been-destroyed-by-trolls|publisher=''[[Buzzfeed]]''|date=December 4, 2014}}&lt;/ref&gt;<br /> <br /> ===Swatting incidents===<br /> In January of 2015 the site was used as a base for [[swatting]] exploits in [[Portland, Oregon|Portland]], [[Seattle]], and [[Burnaby|Burnaby, British Columbia]], most of them tied to the victims' criticism of Gamergate and 8chan's association with it;&lt;ref name=&quot;Mattise&quot;&gt;{{cite web|last=Mattise|first=Nathan|date=January 4, 2015|url=http://arstechnica.com/tech-policy/2015/01/8chan-tries-swatting-gamergate-critic-sends-cops-to-an-old-address/|title=8chan tries &quot;swatting&quot; GamerGate critic, sends cops to an old address|work=[[Ars Technica]]}}&lt;/ref&gt; the attacks were coordinated on a [[Internet forum|board]] on the website called &quot;/baphomet/.&quot;&lt;ref name=&quot;Guardian 2015-01-13&quot;&gt;{{cite news |last=Hern |first=Alex |url=http://www.theguardian.com/technology/2015/jan/13/gamergate-hits-new-low-with-attempts-to-send-swat-teams-to-critics |title=Gamergate hits new low with attempts to send Swat teams to critics |work=[[The Guardian]] |date=January 13, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt; One of the victims of a swatting attack said that she was singled out because she had followed someone on [[Twitter]].&lt;ref name=&quot;GlobalNews 2015-01-15&quot;&gt;{{cite news |last=McElroy |first=Justin |url=http://globalnews.ca/news/1773840/police-called-to-burnaby-womens-home-by-online-harassers/ |title=Police falsely called to Burnaby women’s home by online harassers |work=[[Global News]] |date=January 15, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt;&lt;ref&gt;{{cite web|url=http://www.gameranx.com/updates/id/26081/article/canadian-victim-of-gamergate-swatting-attempt-comes-forward/|title=Canadian Victim of Gamergate SWATing Attempt Comes Forward|work=Gameranx|last=Cheong|first=Ian Miles|date=January 13, 2015|accessdate=January 16, 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://bc.ctvnews.ca/reckless-swatting-prank-sends-police-to-b-c-woman-s-home-1.2189547|title=Reckless ‘swatting’ prank sends police to B.C. woman’s home|work=[[CTV News]]|date=January 14, 2015|accessdate=September 30, 2015|author=&lt;!-- Staff writers --&gt;}}&lt;/ref&gt; On February 9, 2015, contents on the &quot;/baphomet/&quot; subboard were wiped after [[doxxing|personal information]] of [[Katherine B. Forrest|Katherine Forrest]], the presiding judge in the [[Silk Road (marketplace)|Silk Road]] case, had been posted there.&lt;ref name=&quot;silkroad&quot;&gt;{{Cite web| title = Notorious 8chan &quot;subboard&quot; has history wiped after federal judge’s doxing| first = Sam |last = Machkovech|work = Ars Technica| date = February 12, 2015| accessdate = February 13, 2015| url = http://arstechnica.com/security/2015/02/notorious-8chan-subboard-has-history-wiped-after-federal-judges-doxing/}}&lt;/ref&gt;<br /> <br /> ===Los Angeles school-closure incident===<br /> [[File:CWh686mUwAEQLoj.png|thumb|upright=0.35|alt=Photograph of Vincent Canfield|Owner and operator of cock.li, Vincent Canfield]]<br /> On Tuesday, December 15, 2015, the New York City and Los Angeles County Boards of Education were both sent a superficially threatening, but actually fraudulent, e-mail message that had originated from an 8chan-linked service called &quot;cock.li&quot;. The New York City school board did not take the message seriously, but the Los Angeles County school board refused to take the chance and ordered all public schools closed for the entire day, citing what it called a &quot;credible terror threat.&quot; Sam Biddle, a contributor to [[Gawker.com]], called the message &quot;extremely dumb&quot; in an article on the site he filed under &quot;Pranks,&quot; writing:<br /> {{cquote|Even if this message hadn’t been sent from a “cock.li” email account, it would’ve been hard to imagine it was a credible threat of violence, particularly since it conflates 4chan-style “death to the normies” rhetoric with convoluted Islamism. It looks very much like the work of a kid who really didn’t want to go to school.}}<br /> In the article, which he titled “Here’s the Full, Extremely Dumb Email That Shut Down the Entire L.A. Public School System,” Biddle quoted the e-mail message itself, word for word.&lt;ref&gt;{{Cite web| title = Here’s the Full, Extremely Dumb Email That Shut Down the Entire L.A. Public School System| first = Sam |last = Biddle|work = Gawker| date = December 16, 2015| accessdate = December 16, 2015| url = http://gawker.com/heres-the-full-extremely-dumb-email-that-shut-down-the-1748402588/}}&lt;/ref&gt;<br /> <br /> ==External links==<br /> * {{Official website}}<br /> * &lt;nowiki&gt;oxwugzccvk3dk6tj.onion&lt;/nowiki&gt;&lt;ref&gt;{{cite web|title=ATTENTION TOR USERS: I accidentally released the PRIVATE key for the Tor hidden service into a public IRC channel. The Tor URL fullchan4jtta4sx.onion is now considered COMPROMISED and NOT OWNED by the 8chan administration. The new URL is oxwugzccvk3dk6tj.onion.|url=https://8ch.net/onion/res/357.html|accessdate=August 18, 2015}}&lt;/ref&gt; - [[.onion]] address for [[Tor (network)|Tor]] hidden service &lt;!-- SEE: http://web.archive.org/web/20150818121142/https://8ch.net/_g/1153.txt --&gt;<br /> * {{Twitter|infinitechan|8chan}}<br /> <br /> ==References==<br /> {{Reflist|30em}}<br /> <br /> {{Tor hidden services}}<br /> {{DEFAULTSORT:8chan}}<br /> [[Category:2channel]]<br /> [[Category:American websites]]<br /> [[Category:Community websites]]<br /> [[Category:Free web software]]<br /> [[Category:Internet forums]]<br /> [[Category:Imageboards]]<br /> [[Category:Internet properties established in 2013]]<br /> [[Category:Obscenity controversies]]<br /> [[Category:Tor hidden services]]<br /> [[Category:Virtual communities]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=8kun&diff=187755780 8kun 2016-01-01T18:19:49Z <p>Dsprc: Undid revision 697635664 by 71.170.80.110 -- This was put here for a reason; a ref is included but below reflist so munges stuff up below navbox</p> <hr /> <div>{{other uses|8chan (disambiguation)}}<br /> {{Use mdy dates|date=September 2015}}<br /> {{Infobox website<br /> | name = 8chan<br /> | logo =<br /> | screenshot = [[File:InfiniteChan∞chanLogo.svg|200px]]<br /> | alt = green infinity symbol left of the word chan.<br /> | caption = The ∞chan logo of 8chan<br /> | url = {{URL|https://8ch.net}}<br /> | slogan = '''''Welcome to 8chan, the infinitely expanding imageboard.'''''<br /> | commercial = Yes<br /> | type = [[Imageboard]]<br /> | language = English, Japanese (users can create language specific boards)<br /> | registration = Optional<br /> | author = [[Fredrick Brennan]]<br /> | owner = [[:ja:ジム・ワトキンス|Jim Watkins]],&lt;br /&gt; N.T. Technology ([[2channel]])&lt;ref&gt;[https://8ch.net/who.html 8chan] - Who owns 8chan?&lt;/ref&gt;<br /> | launch date = {{start date and age|2013|10|22|df=no}}<br /> | alexa = {{IncreaseNegative}} 10,084 ({{as of|2015|8|22|alt=August 2015}})&lt;ref name=&quot;alexa&quot;&gt;{{cite web|url= http://www.alexa.com/siteinfo/8ch.net |title= 8ch.net Site Info | publisher= [[Alexa Internet]] |accessdate= August 22, 2015 }}&lt;/ref&gt;<br /> | current status = Online<br /> }}<br /> <br /> '''8chan,''' also called '''Infinitechan,''' is an [[English language|English-language]] [[imageboard]] website composed of user-created [[Internet forum|boards]]. Each board is moderated by its respective creator, with minimal interaction from other site administration.&lt;ref name=&quot;faq&quot;&gt;{{cite web|last=Brennan|first=Fredrick|url=https://8ch.net/faq.html|title=FAQ|publisher=Infinitechan|website=8chan.co|accessdate=November 23, 2014}}&lt;/ref&gt;<br /> <br /> The site has received both praise and criticism for its stance on [[Freedom of speech|free speech]], which involves allowing any content to be posted, so long as it adheres to United States law.<br /> <br /> Several sites's boards have played an active role in the [[Gamergate controversy]], encouraging Gamergate affiliates to frequent 8chan after the topic was banned on the unaffiliated imageboard [[4chan]]. As of August of 2015, the site was the 10,204th most visited site in the world,&lt;ref name=&quot;alexa&quot; /&gt; and in November of 2014, it was receiving an average of 35,000 unique visitors per day and 400,000 posts per week when it was at a higher rank.&lt;ref name=Howell2014 /&gt;<br /> <br /> ==History==<br /> 8chan was created in October of 2013 by computer programmer [[Fredrick Brennan]],&lt;ref name=Howell2014 /&gt;&lt;ref&gt;{{cite web|last1=Machkovech|first1=Sam|title=Full transcript: Ars interviews 8chan founder Fredrick Brennan|url=http://arstechnica.com/business/2015/03/full-transcript-ars-interviews-8chan-founder-fredrick-brennan/|publisher=Ars Technica|accessdate=June 15, 2015|date=March 17, 2015}}&lt;/ref&gt; also known by the nickname &quot;Hotwheels.&quot;&lt;ref name=&quot;KYM&quot;/&gt; Brennan created the website after he observed what he perceived to be rapidly escalating [[surveillance]] and a loss of [[free speech]] on the Internet.&lt;ref name=Howell2014 /&gt; Brennan, who considers the imageboard [[4chan]] to have grown into authoritarianism, describes 8chan as a &quot;free-speech-friendly&quot; alternative,&lt;ref name=&quot;Howell2014&quot;&gt;{{cite web|last=Howell O'Neill|first=Patrick|date=November 17, 2014|url=http://www.dailydot.com/politics/8chan-pedophiles-child-porn-gamergate/|title=8chan, the central hive of Gamergate, is also an active pedophile network|work=The Daily Dot}}&lt;/ref&gt; and had originally conceptualized the site while experiencing a [[psychedelic experience|psychedelic mushrooms trip]].&lt;ref name=&quot;KYM&quot;/&gt;&lt;ref name=WashPost /&gt;<br /> <br /> No experience or programming knowledge is necessary for users to create their own boards.&lt;ref name=&quot;faq&quot; /&gt; Since as early as March of 2014, its [[FAQ]] has stated only one rule that is to be globally enforced: &quot;Do not post, request, or link to any content illegal in the United States of America. Do not create boards with the sole purpose of posting or spreading such content.&quot;&lt;ref name=&quot;faq&quot; /&gt; Brennan has claimed that, while he finds some of the content posted by users to be &quot;reprehensible,&quot; he feels personally obligated to uphold the site's integrity by tolerating discussion he does not necessarily support regardless of his moral stance.&lt;ref name=Howell2014 /&gt;<br /> <br /> Brennan agreed to partner 8chan with the Japanese message board [[2channel]],&lt;ref name=&quot;KYM&quot;&gt;{{cite web|url=http://knowyourmeme.com/blog/interviews/qa-with-fredrick-brennan-of-8chan|title=Q&amp;A with Fredrick Brennan of 8chan|last=Caldwell|first=Don|date=October 9, 2014|work=[[Know Your Meme]]|accessdate=December 18, 2014}}&lt;/ref&gt; and subsequently relocated to the [[Philippines]] in October 2014.&lt;ref name=Chen /&gt;<br /> <br /> In January of 2015, the site changed its [[Domain name|domain]] 8chan.co to 8ch.net after multiple people filed reports complaining to 8chan’s [[Domain name registrar|registrar]] that the message board hosted [[child pornography]]. Despite subsequently regaining the domain, the site remained at 8ch.net, with the old domain redirecting to it.&lt;ref name=WashPost /&gt;<br /> <br /> Numerous bugs in the Infinity software led to the funding and development of a successor platform dubbed &quot;Infinity Next&quot;. After a several-month-long testing period, a migration to the new software was attempted in December 2015, but failed.&lt;ref&gt;{{cite web |url=https://ghostbin.com/paste/qt2ww |format=Plaintext |title=qt2ww |last=Moon |first=Joshua |date=2015-12-19 |accessdate=2015-12-20 }}&lt;/ref&gt;{{clarify|date=December 2015}}<br /> <br /> ==Controversies==<br /> ===Child pornography===<br /> ''[[The Washington Post]]'' described it as &quot;the more-lawless, more-libertarian, more 'free' follow-up to 4chan.&quot;&lt;ref name=&quot;WashPost&quot;&gt;{{cite web|url=http://www.washingtonpost.com/news/the-intersect/wp/2015/01/13/this-is-what-happens-when-you-create-an-online-community-without-any-rules/|title=This is what happens when you create an online community without any rules|work=[[The Washington Post]]|last=Caitlin|first=Dewey|date=January 13, 2015}}&lt;/ref&gt; Boards have been created to discuss controversial topics, including [[pedophilia]]. While the sharing of illegal content is against site rules, ''[[The Daily Dot]]'' wrote that boards do exist to share sexualized images of minors in provocative poses, and that some users of those boards do post links to explicit child pornography hosted elsewhere.&lt;ref name=&quot;Howell2014&quot;/&gt; When asked whether such boards were an inevitable result of free speech, Brennan responded, &quot;Unfortunately, yes. I don’t support the content on the boards you mentioned, but it is simply the cost of free speech and being the only active site to not impose more 'laws' than those that were passed in [[Washington, D.C.]]&quot;&lt;ref name=&quot;Howell2014&quot;/&gt;<br /> <br /> In August of 2015, for a brief period, 8chan was blacklisted from [[Google Search]] for containing content constituting &quot;suspected child abuse content.&quot;&lt;ref name=ars-8chancensor&gt;{{cite web|title=8chan-hosted content disappears from Google searches|url=http://arstechnica.com/tech-policy/2015/08/8chan-hosted-content-disappears-from-google-searches/|last=Machkovech|first=Sam|website=[[Ars Technica]]|publisher=[[Condé Nast]]|date=August 14, 2015|accessdate=August 17, 2015}}&lt;/ref&gt; It was later restored to the search engine's listings without explanation.&lt;ref&gt;{{Cite web|url = https://medium.com/@infinitechan/google-is-not-your-friend-5a6636af0651|title = Google is not your friend?|date = August 13, 2015|accessdate = September 9, 2015|website = Medium|publisher = |last = Brennan|first = Frederick}}&lt;/ref&gt;<br /> <br /> ===Gamergate===<br /> {{main|Gamergate controversy}}<br /> On September 18, 2014, the website gained prominence in the [[Gamergate controversy]] after 4chan banned discussion of Gamergate,&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;/&gt;&lt;ref&gt;{{cite news|last=Audureau|first=William|title=4chan, wizardchan, 8chan... s'y retrouver dans la jungle des forums anonymes les plus populaires du Web|url=http://www.lemonde.fr/pixels/article/2014/10/15/4chan-wizardchan-8chan-le-guide-des-forums-anonymes-les-plus-populaires-du-web_4505380_4408996.html|work=[[Le Monde]]|location=France|language=French|date=October 15, 2014}}&lt;/ref&gt; whereupon 8chan became one of several hubs of Gamergate activity.&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;&gt;{{cite web|last=Chen|first=Adrian|date=October 27, 2014|url=http://nymag.com/daily/intelligencer/2014/10/gamergate-supporters-party-at-strip-club.html|title=Gamergate Supporters Partied at a Strip Club This Weekend|work=[[New York (magazine)]]}}&lt;/ref&gt;&lt;ref name=&quot;Buzz&quot;/&gt;&lt;ref name=&quot;Guardian 2015-01-13&quot; /&gt; &quot;/gg/,&quot; 8chan's initial Gamergate-oriented board, also gained attention after being compromised by members of the internet troll group [[Gay Nigger Association of America]], forcing Gamergate activists to migrate to &quot;/gamergate/.&quot; This replacement quickly became the site's second most populous board.&lt;ref name=&quot;Buzz&quot;&gt;{{cite web|last1=Bernstein|first1=Joseph|title=GamerGate’s Headquarters Has Been Destroyed By Trolls|url=http://www.buzzfeed.com/josephbernstein/gamergates-headquarters-has-been-destroyed-by-trolls|publisher=''[[Buzzfeed]]''|date=December 4, 2014}}&lt;/ref&gt;<br /> <br /> ===Swatting incidents===<br /> In January of 2015 the site was used as a base for [[swatting]] exploits in [[Portland, Oregon|Portland]], [[Seattle]], and [[Burnaby|Burnaby, British Columbia]], most of them tied to the victims' criticism of Gamergate and 8chan's association with it;&lt;ref name=&quot;Mattise&quot;&gt;{{cite web|last=Mattise|first=Nathan|date=January 4, 2015|url=http://arstechnica.com/tech-policy/2015/01/8chan-tries-swatting-gamergate-critic-sends-cops-to-an-old-address/|title=8chan tries &quot;swatting&quot; GamerGate critic, sends cops to an old address|work=[[Ars Technica]]}}&lt;/ref&gt; the attacks were coordinated on a [[Internet forum|board]] on the website called &quot;/baphomet/.&quot;&lt;ref name=&quot;Guardian 2015-01-13&quot;&gt;{{cite news |last=Hern |first=Alex |url=http://www.theguardian.com/technology/2015/jan/13/gamergate-hits-new-low-with-attempts-to-send-swat-teams-to-critics |title=Gamergate hits new low with attempts to send Swat teams to critics |work=[[The Guardian]] |date=January 13, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt; One of the victims of a swatting attack said that she was singled out because she had followed someone on [[Twitter]].&lt;ref name=&quot;GlobalNews 2015-01-15&quot;&gt;{{cite news |last=McElroy |first=Justin |url=http://globalnews.ca/news/1773840/police-called-to-burnaby-womens-home-by-online-harassers/ |title=Police falsely called to Burnaby women’s home by online harassers |work=[[Global News]] |date=January 15, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt;&lt;ref&gt;{{cite web|url=http://www.gameranx.com/updates/id/26081/article/canadian-victim-of-gamergate-swatting-attempt-comes-forward/|title=Canadian Victim of Gamergate SWATing Attempt Comes Forward|work=Gameranx|last=Cheong|first=Ian Miles|date=January 13, 2015|accessdate=January 16, 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://bc.ctvnews.ca/reckless-swatting-prank-sends-police-to-b-c-woman-s-home-1.2189547|title=Reckless ‘swatting’ prank sends police to B.C. woman’s home|work=[[CTV News]]|date=January 14, 2015|accessdate=September 30, 2015|author=&lt;!-- Staff writers --&gt;}}&lt;/ref&gt; On February 9, 2015, contents on the &quot;/baphomet/&quot; subboard were wiped after [[doxxing|personal information]] of [[Katherine B. Forrest|Katherine Forrest]], the presiding judge in the [[Silk Road (marketplace)|Silk Road]] case, had been posted there.&lt;ref name=&quot;silkroad&quot;&gt;{{Cite web| title = Notorious 8chan &quot;subboard&quot; has history wiped after federal judge’s doxing| first = Sam |last = Machkovech|work = Ars Technica| date = February 12, 2015| accessdate = February 13, 2015| url = http://arstechnica.com/security/2015/02/notorious-8chan-subboard-has-history-wiped-after-federal-judges-doxing/}}&lt;/ref&gt;<br /> <br /> ===Los Angeles school-closure incident===<br /> [[File:CWh686mUwAEQLoj.png|thumb|upright=0.35|alt=Photograph of Vincent Canfield|Owner and operator of cock.li, Vincent Canfield]]<br /> On Tuesday, December 15, 2015, the New York City and Los Angeles County Boards of Education were both sent a superficially threatening, but actually fraudulent, e-mail message that had originated from an 8chan-linked service called &quot;cock.li&quot;. The New York City school board did not take the message seriously, but the Los Angeles County school board refused to take the chance and ordered all public schools closed for the entire day, citing what it called a &quot;credible terror threat.&quot; Sam Biddle, a contributor to [[Gawker.com]], called the message &quot;extremely dumb&quot; in an article on the site he filed under &quot;Pranks,&quot; writing:<br /> {{cquote|Even if this message hadn’t been sent from a “cock.li” email account, it would’ve been hard to imagine it was a credible threat of violence, particularly since it conflates 4chan-style “death to the normies” rhetoric with convoluted Islamism. It looks very much like the work of a kid who really didn’t want to go to school.}}<br /> In the article, which he titled “Here’s the Full, Extremely Dumb Email That Shut Down the Entire L.A. Public School System,” Biddle quoted the e-mail message itself, word for word.&lt;ref&gt;{{Cite web| title = Here’s the Full, Extremely Dumb Email That Shut Down the Entire L.A. Public School System| first = Sam |last = Biddle|work = Gawker| date = December 16, 2015| accessdate = December 16, 2015| url = http://gawker.com/heres-the-full-extremely-dumb-email-that-shut-down-the-1748402588/}}&lt;/ref&gt;<br /> <br /> ==External links==<br /> * {{Official website}}<br /> * &lt;nowiki&gt;oxwugzccvk3dk6tj.onion&lt;/nowiki&gt;&lt;ref&gt;{{cite web|title=ATTENTION TOR USERS: I accidentally released the PRIVATE key for the Tor hidden service into a public IRC channel. The Tor URL fullchan4jtta4sx.onion is now considered COMPROMISED and NOT OWNED by the 8chan administration. The new URL is oxwugzccvk3dk6tj.onion.|url=https://8ch.net/onion/res/357.html|accessdate=August 18, 2015}}&lt;/ref&gt; - [[.onion]] address for [[Tor (network)|Tor]] hidden service &lt;!-- SEE: http://web.archive.org/web/20150818121142/https://8ch.net/_g/1153.txt --&gt;<br /> * {{Twitter|infinitechan|8chan}}<br /> <br /> ==References==<br /> {{Reflist|30em}}<br /> <br /> {{Tor hidden services}}<br /> {{DEFAULTSORT:8chan}}<br /> [[Category:2channel]]<br /> [[Category:American websites]]<br /> [[Category:Community websites]]<br /> [[Category:Free web software]]<br /> [[Category:Internet forums]]<br /> [[Category:Imageboards]]<br /> [[Category:Internet properties established in 2013]]<br /> [[Category:Obscenity controversies]]<br /> [[Category:Tor hidden services]]<br /> [[Category:Virtual communities]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=GNU_IceCat&diff=150007189 GNU IceCat 2015-12-30T06:03:21Z <p>Dsprc: /* External links */ -GNU Proj / +GNU Proj Soft</p> <hr /> <div>{{For|the Debian Iceweasel package|Mozilla Corporation software rebranded by the Debian project}}<br /> <br /> {{Infobox software<br /> | name = GNU IceCat <br /> | logo = [[Image:Icecat1-300x300.svg|center|80px]]<br /> | screenshot = [[File:IceCat 38 Start Page.png|300px]]<br /> | caption = GNU IceCat 38.3.0 on [[Trisquel]]<br /> | developer = [[Gnuzilla]] team<br /> | frequently updated = yes<br /> | latest preview version = <br /> | latest preview date = &lt;!-- {{Start date and age|YYYY|MM|DD}} --&gt;<br /> | operating system = [[Linux]], [[OS X]], [[Android (operating system)|Android]], [[Windows]]<br /> | platform =<br /> | genre = [[Web browser]]<br /> | license = [[Mozilla Public License|MPL]]&lt;ref&gt;{{cite web<br /> |url=http://bzr.savannah.gnu.org/lh/gnuzilla/icecat-latest/annotate/head:/toolkit/content/license.html<br /> |title=Savannah source code system: gnuzilla/icecat-latest : /toolkit/content/license.html |last= |first= |date=<br /> |accessdate=2013-05-15}}&lt;/ref&gt;<br /> | website = {{URL|www.gnu.org/software/icecat/}}<br /> }}<br /> <br /> '''GNU IceCat''', formerly known as '''GNU IceWeasel''',&lt;ref name=notWeasel&gt;{{cite mailing list |url=http://lists.gnu.org/archive/html/bug-gnuzilla/2007-09/msg00004.html |title=Ice Weasel |last=Berry |first=Karl |date=2007-09-23 |accessdate=2008-12-09 |mailinglist=bug-gnuzilla }}&lt;/ref&gt; is a [[free software]] rebranding of the [[Mozilla Firefox]] [[web browser]] distributed by the [[GNU Project]]. It is compatible with [[Linux]], [[Windows]], [[Android (operating system)|Android]] and [[OS X]].&lt;ref name=&quot;31.5 release&quot;&gt;{{Cite web|url=https://savannah.gnu.org/forum/forum.php?forum_id=8233|title=IceCat 31.5.0 release|publisher=GNUzilla|author=Ruben Rodriguez|date=2015-03-09}}&lt;/ref&gt;<br /> <br /> The GNU Project attempts to keep IceCat in synchronization with upstream development of Firefox while removing all [[trademark]]ed artwork. It also maintains a large list of free software [[Plug-in (computing)|plugin]]s. In addition, it features a few [[#Additional_security_features|security features]] not found in the mainline Firefox browser.<br /> <br /> == History ==<br /> <br /> === Origins of the name ===<br /> The Mozilla Corporation owns trademark to the Firefox name and denies the use of the name &quot;Firefox&quot; to unofficial builds that fall outside certain guidelines.&lt;ref name=MozillaTrademarkPolicy&gt;{{cite web | url=http://www.mozilla.org/foundation/trademarks/policy.html | title=Mozilla Trademark Policy}}&lt;/ref&gt; Unless distributions use the [[binary file]]s supplied by Mozilla, fall within the stated guidelines, or else have special permission, they must [[Compiler|compile]] the Firefox source with a compile-time option enabled that creates binaries without the official branding of Firefox and related artwork, using either the built-in free artwork, or artwork provided at compile time.&lt;ref name=&quot;MozillaTrademarkPolicy&quot;/&gt;<br /> <br /> This policy led to a long debate within the [[Debian Project]] in 2004 and 2005. During this debate, the name &quot;Iceweasel&quot; was coined to refer to rebranded versions of Firefox. The first known use of the name in this context is by Nathanael Nerode,&lt;ref name=naming&gt;{{cite mailing list | url=http://lists.debian.org/debian-legal/2004/02/msg00279.html | title= Mozilla Firefox's icon and trademark |last=Nerode |first=Nathanael |date=2004-02-27 |accessdate=2008-12-09 |mailinglist=debian-legal }}&lt;/ref&gt; in reply to Eric Dorland's suggestion of &quot;Icerabbit&quot;.&lt;ref name=naming2&gt;{{cite mailing list | url=http://lists.debian.org/debian-devel/2004/02/msg01876.html | title=Mozilla Firefox's icon and trademark |last=Dorland |first=Eric |date=2004-12-27 |accessdate=2008-12-09 |mailinglist=debian-devel }}&lt;/ref&gt; It was intended as a parody of &quot;Firefox.&quot;&lt;ref name=&quot;gzhome&quot;/&gt; Iceweasel was subsequently used as the example name for a rebranded Firefox in the Mozilla Trademark Policy,&lt;ref name=&quot;MozillaTrademarkPolicy&quot;/&gt; and became the most commonly used name for a hypothetical rebranded version of Firefox. By January 1, 2005, rebranding was being referred to as the &quot;Iceweasel route&quot;.&lt;ref name=naming3&gt;{{cite mailing list | url=http://lists.debian.org/debian-legal/2005/01/msg00010.html | title=Mozilla and Trademarks |last=Aelwyn |first=Joel |date=2005-01-01 |accessdate=2008-12-09 |mailinglist=debian-legal }}&lt;/ref&gt;<br /> <br /> In August 2005,&lt;ref name=projectapplication&gt;{{cite web | url=http://savannah.gnu.org/task/?func=detailitem&amp;item_id=4529 | title=Gnuzilla/IceWeasel Project Application}}&lt;/ref&gt; the [[Gnuzilla]] project adopted the GNU IceWeasel name for a rebranded distribution of Firefox that made no references to nonfree plugins.&lt;ref name=&quot;projectapplication&quot;/&gt; The first Gnuzilla IceWeasel release was based on the 1.5.0.4&lt;ref name=iw1.5.0.4Download&gt;{{cite web | url=ftp://aeneas.mit.edu/pub/gnu/gnuzilla/ | title=IceWeasel 1.5.0.4 Download location}}&lt;/ref&gt; version of Firefox.&lt;!--anyone know when they made their first release?--&gt; There was no release based on Firefox 1.5.0.5 or 1.5.0.6.<br /> <br /> The term &quot;ice weasel&quot; appeared earlier in a line which [[Matt Groening]] fictionally attributed to [[Friedrich Nietzsche]]: &quot;''Love is a snowmobile racing across the tundra and then suddenly it flips over, pinning you underneath. At night, the ice weasels come.''&quot;&lt;ref&gt;{{cite book | last = Groening | first = Matt | authorlink = Matt Groening | title = Love Is Hell | publisher = [[Pantheon Books]] | year = 1986 | isbn = 0-394-74454-3 }}&lt;/ref&gt;<br /> <br /> Debian was originally given permission to use the trademarks, and adopted the Firefox name.&lt;ref name=Gervsemail&gt;{{cite mailing list | url=http://lists.debian.org/debian-devel/2005/06/msg01182.html | title=Ongoing Firefox (and Thunderbird) Trademark problems |last=Markham |first=Gervase |date=2005-07-14 |accessdate=2008-12-09 |mailinglist=debian-devel}}&lt;/ref&gt; However, because the artwork in Firefox used to have a proprietary copyright license that was not compatible with the [[Debian Free Software Guidelines]], the substituted logo had to remain.&lt;ref name=Gervsemail2&gt;{{cite mailing list | url=http://lists.debian.org/debian-legal/2005/01/msg00757.html | title=Firefox/Thunderbird trademarks: a proposal |last=Markham |first=Gervase |date=2005-06-19 |accessdate=2008-12-09 |mailinglist=debian-devel }}&lt;/ref&gt; In 2006, Mozilla withdrew their permission for Debian to use the Firefox name due to significant changes to the browser that Mozilla deemed outside the boundaries of its policy, changes which Debian felt were important enough to keep, and Iceweasel was revived in its place.<br /> <br /> On 23 September 2007, one of the developers announced that the name would be changed to '''GNU IceCat''' from Iceweasel in the next release. This was to avoid confusion with [[Debian]]'s separately maintained, unrelated rebranding of Firefox.&lt;ref name=notWeasel/&gt; The name change took place as planned and IceCat is the current name.&lt;ref name=gzhome/&gt;<br /> <br /> === Releases ===<br /> * GNU IceCat 2 (Version was 2.0.0.11-g1, released January 12, 2008) <br /> * GNU IceCat 3 (July 23, 2008)<br /> * GNU IceCat 4 (April 10, 2011)&lt;ref&gt;{{cite mailing list |url=http://lists.gnu.org/archive/html/bug-gnuzilla/2011-04/msg00019.html |title=GNU IceCat 4.0 |last=Scrivano |first=Giuseppe |date=2011-04-11 |accessdate=2011-04-11 |mailinglist=bug-gnuzilla }}&lt;/ref&gt;<br /> * GNU IceCat 5 (June 27, 2011)&lt;ref&gt;{{cite web |url=http://savannah.gnu.org/forum/forum.php?forum_id=6858 |title=GNU IceCat 5.0 |last=Scrivano |first=Giuseppe |date=2011-06-27 |accessdate=2011-06-28}}&lt;/ref&gt;<br /> * GNU IceCat 6<br /> * GNU IceCat 7<br /> * GNU IceCat 9<br /> * GNU IceCat 10<br /> * GNU IceCat 12<br /> * GNU IceCat 13<br /> * GNU IceCat 14<br /> * GNU IceCat 17<br /> * GNU IceCat 24<br /> * GNU IceCat 31 (2014)&lt;ref&gt;{{cite web |url=http://ftp.gnu.org/gnu/gnuzilla/ |title=GNU Icecat 31 |accessdate=November 29, 2014 }}&lt;/ref&gt;<br /> * GNU IceCat 38 (2015)&lt;ref&gt;{{cite web |url=http://ftp.gnu.org/gnu/gnuzilla/ |title=GNU Icecat 38 |accessdate=October 21, 2015 }}&lt;/ref&gt;<br /> <br /> Releases usually keep up to date with the Mozilla Firefox source code.<br /> <br /> == Distribution ==<br /> <br /> GNU IceCat is available as a free download for the [[IA-32]] and [[PowerPC]] architectures. Both binaries and source are available, though the current build is available only for [[Linux]].<br /> <br /> IceCat is also available for Mac OS X 10.4 &amp; 10.5. Any Mac user with these versions of Mac OS X can install IceCat through [[Fink]].<br /> For the Mac, it is available for both [[IA-32]] &amp; [[PowerPC]] architectures.<br /> <br /> It is also available for Windows (Vista or newer) and Android (2.3 or newer).&lt;ref name=&quot;31.5 release&quot; /&gt;<br /> <br /> == Additional security features ==<br /> IceCat includes additional security features, such as the option to block third party zero-length image files resulting in third party [[HTTP cookie|cookie]], also known as [[web bugs]]&lt;ref name=gzhome&gt;[https://www.gnu.org/software/gnuzilla/ Gnuzilla Homepage]&lt;/ref&gt; (This feature is available in Firefox 1.0, 1.5, and 3.0, but the UI option was absent on 2.0).&lt;ref name=gzhome/&gt; GNU IceCat also provides warnings for [[URL redirection]].&lt;ref name=gzhome/&gt;<br /> <br /> In version 3.0.2-g1, the certificate of [[CAcert.org]], a [[certificate authority]], has been added to the list of trusted root certificates. Concern{{according to whom|date=June 2014}} about that decision has been raised in a discussion on the savannah-hackers-public mailing list.&lt;ref&gt;{{cite mailing list |url=http://lists.gnu.org/archive/html/savannah-hackers-public/2008-10/msg00006.html |title=CAcert, GNU IceCat, and savannah |last=Berry |first=Karl |date=2008-10-07 |accessdate=2008-12-09 |mailinglist=savannah-hackers-public }}&lt;/ref&gt;<br /> <br /> The GNU [[LibreJS]] extension detects and blocks [[non-free software|nonfree]] nontrivial JavaScript.<br /> <br /> == Licensing ==<br /> <br /> Gnuzilla was available under the [[Mozilla Public License|MPL]]/[[GNU General Public License|GPL]]/[[GNU Lesser General Public License|LGPL]] tri-license that Mozilla used for source code. Unlike Mozilla, IceCat's default icons are under the same tri-license.<br /> <br /> == Google Summer of Code 2008 ==<br /> There were some suggestions made for the [[Google Summer of Code]] for 2008 to improve GNU IceCat.&lt;ref&gt;{{ cite web | url = https://www.gnu.org/software/soc-projects/ideas-2008.html#icecat | title = Summer of Code project suggestions for GNU | accessdate = 2008-04-13 }}&lt;/ref&gt;{{Citation needed|reason=third-party source to confirm relevance|date=October 2008}}<br /> These included:<br /> * Porting IceCat to the [[Mozilla Firefox 3|Firefox 3]] codebase<br /> * More support for free plugins such as [[Gnash]]<br /> * Privacy features changes<br /> <br /> The proposal to port IceCat to the Firefox 3 codebase was accepted and completed by [[Giuseppe Scrivano]].&lt;ref&gt;{{ cite web | url = https://code.google.com/soc/2008/gnu/appinfo.html?csaid=4DA69A85DB948064 | title = Google Code - Summer of Code - Application Information | accessdate = 2008-08-07 |archiveurl = https://web.archive.org/web/20080621145715/http://code.google.com/soc/2008/gnu/appinfo.html?csaid=4DA69A85DB948064 &lt;!-- Bot retrieved archive --&gt; |archivedate = 2008-06-21}}&lt;/ref&gt;<br /> <br /> == See also ==<br /> {{Portal|Free software}}<br /> * [[Comparison of web browsers]]<br /> * [[Gnuzilla|GNUzilla]]<br /> * [[History of Mozilla Firefox]]<br /> * [[Mozilla Corporation software rebranded by the Debian project]]<br /> * [[Open ICEcat]]<br /> <br /> ==References==<br /> <br /> {{Reflist|2}}<br /> <br /> ==External links==<br /> {{commons category|GNU IceCat}}<br /> * [https://www.gnu.org/software/gnuzilla/ GNU.org], Homepage of Gnuzilla and IceCat<br /> * {{cite news |date=2006-09-27 | title = Firefox Not Really Free? | publisher = internetnews.com | author = Kerner, Sean Michael | url = http://www.internetnews.com/dev-news/article.php/3634591 }}<br /> * {{cite news |date=2006-10-06 | title = Firefox Set Free in IceWeasel | publisher = internetnews.com | author = Kerner, Sean Michael | url = http://www.internetnews.com/dev-news/article.php/3636651 }}<br /> * [http://gnuzilla-watcher.blogspot.com/ GNUzilla-watcher.blogspot.com], GNUzilla Watcher - GNUzilla and IceCat blog (inComplete)<br /> * [http://pdb.finkproject.org/pdb/package.php/icecat PDB.Finkproject.org], IceCat in Fink Package Database<br /> <br /> {{GNU}}<br /> {{Web browsers|desktop}}<br /> <br /> {{DEFAULTSORT:Gnu Icecat}}<br /> [[Category:Debian]]<br /> [[Category:Free web browsers]]<br /> [[Category:Gecko-based software]]<br /> [[Category:GNU Project software|IceCat]]<br /> [[Category:POSIX web browsers]]<br /> [[Category:Software forks]]<br /> [[Category:Web browsers based on Firefox]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=GNU_IceCat&diff=150007188 GNU IceCat 2015-12-30T06:01:40Z <p>Dsprc: /* External links */ +cat GNU Proj</p> <hr /> <div>{{For|the Debian Iceweasel package|Mozilla Corporation software rebranded by the Debian project}}<br /> <br /> {{Infobox software<br /> | name = GNU IceCat <br /> | logo = [[Image:Icecat1-300x300.svg|center|80px]]<br /> | screenshot = [[File:IceCat 38 Start Page.png|300px]]<br /> | caption = GNU IceCat 38.3.0 on [[Trisquel]]<br /> | developer = [[Gnuzilla]] team<br /> | frequently updated = yes<br /> | latest preview version = <br /> | latest preview date = &lt;!-- {{Start date and age|YYYY|MM|DD}} --&gt;<br /> | operating system = [[Linux]], [[OS X]], [[Android (operating system)|Android]], [[Windows]]<br /> | platform =<br /> | genre = [[Web browser]]<br /> | license = [[Mozilla Public License|MPL]]&lt;ref&gt;{{cite web<br /> |url=http://bzr.savannah.gnu.org/lh/gnuzilla/icecat-latest/annotate/head:/toolkit/content/license.html<br /> |title=Savannah source code system: gnuzilla/icecat-latest : /toolkit/content/license.html |last= |first= |date=<br /> |accessdate=2013-05-15}}&lt;/ref&gt;<br /> | website = {{URL|www.gnu.org/software/icecat/}}<br /> }}<br /> <br /> '''GNU IceCat''', formerly known as '''GNU IceWeasel''',&lt;ref name=notWeasel&gt;{{cite mailing list |url=http://lists.gnu.org/archive/html/bug-gnuzilla/2007-09/msg00004.html |title=Ice Weasel |last=Berry |first=Karl |date=2007-09-23 |accessdate=2008-12-09 |mailinglist=bug-gnuzilla }}&lt;/ref&gt; is a [[free software]] rebranding of the [[Mozilla Firefox]] [[web browser]] distributed by the [[GNU Project]]. It is compatible with [[Linux]], [[Windows]], [[Android (operating system)|Android]] and [[OS X]].&lt;ref name=&quot;31.5 release&quot;&gt;{{Cite web|url=https://savannah.gnu.org/forum/forum.php?forum_id=8233|title=IceCat 31.5.0 release|publisher=GNUzilla|author=Ruben Rodriguez|date=2015-03-09}}&lt;/ref&gt;<br /> <br /> The GNU Project attempts to keep IceCat in synchronization with upstream development of Firefox while removing all [[trademark]]ed artwork. It also maintains a large list of free software [[Plug-in (computing)|plugin]]s. In addition, it features a few [[#Additional_security_features|security features]] not found in the mainline Firefox browser.<br /> <br /> == History ==<br /> <br /> === Origins of the name ===<br /> The Mozilla Corporation owns trademark to the Firefox name and denies the use of the name &quot;Firefox&quot; to unofficial builds that fall outside certain guidelines.&lt;ref name=MozillaTrademarkPolicy&gt;{{cite web | url=http://www.mozilla.org/foundation/trademarks/policy.html | title=Mozilla Trademark Policy}}&lt;/ref&gt; Unless distributions use the [[binary file]]s supplied by Mozilla, fall within the stated guidelines, or else have special permission, they must [[Compiler|compile]] the Firefox source with a compile-time option enabled that creates binaries without the official branding of Firefox and related artwork, using either the built-in free artwork, or artwork provided at compile time.&lt;ref name=&quot;MozillaTrademarkPolicy&quot;/&gt;<br /> <br /> This policy led to a long debate within the [[Debian Project]] in 2004 and 2005. During this debate, the name &quot;Iceweasel&quot; was coined to refer to rebranded versions of Firefox. The first known use of the name in this context is by Nathanael Nerode,&lt;ref name=naming&gt;{{cite mailing list | url=http://lists.debian.org/debian-legal/2004/02/msg00279.html | title= Mozilla Firefox's icon and trademark |last=Nerode |first=Nathanael |date=2004-02-27 |accessdate=2008-12-09 |mailinglist=debian-legal }}&lt;/ref&gt; in reply to Eric Dorland's suggestion of &quot;Icerabbit&quot;.&lt;ref name=naming2&gt;{{cite mailing list | url=http://lists.debian.org/debian-devel/2004/02/msg01876.html | title=Mozilla Firefox's icon and trademark |last=Dorland |first=Eric |date=2004-12-27 |accessdate=2008-12-09 |mailinglist=debian-devel }}&lt;/ref&gt; It was intended as a parody of &quot;Firefox.&quot;&lt;ref name=&quot;gzhome&quot;/&gt; Iceweasel was subsequently used as the example name for a rebranded Firefox in the Mozilla Trademark Policy,&lt;ref name=&quot;MozillaTrademarkPolicy&quot;/&gt; and became the most commonly used name for a hypothetical rebranded version of Firefox. By January 1, 2005, rebranding was being referred to as the &quot;Iceweasel route&quot;.&lt;ref name=naming3&gt;{{cite mailing list | url=http://lists.debian.org/debian-legal/2005/01/msg00010.html | title=Mozilla and Trademarks |last=Aelwyn |first=Joel |date=2005-01-01 |accessdate=2008-12-09 |mailinglist=debian-legal }}&lt;/ref&gt;<br /> <br /> In August 2005,&lt;ref name=projectapplication&gt;{{cite web | url=http://savannah.gnu.org/task/?func=detailitem&amp;item_id=4529 | title=Gnuzilla/IceWeasel Project Application}}&lt;/ref&gt; the [[Gnuzilla]] project adopted the GNU IceWeasel name for a rebranded distribution of Firefox that made no references to nonfree plugins.&lt;ref name=&quot;projectapplication&quot;/&gt; The first Gnuzilla IceWeasel release was based on the 1.5.0.4&lt;ref name=iw1.5.0.4Download&gt;{{cite web | url=ftp://aeneas.mit.edu/pub/gnu/gnuzilla/ | title=IceWeasel 1.5.0.4 Download location}}&lt;/ref&gt; version of Firefox.&lt;!--anyone know when they made their first release?--&gt; There was no release based on Firefox 1.5.0.5 or 1.5.0.6.<br /> <br /> The term &quot;ice weasel&quot; appeared earlier in a line which [[Matt Groening]] fictionally attributed to [[Friedrich Nietzsche]]: &quot;''Love is a snowmobile racing across the tundra and then suddenly it flips over, pinning you underneath. At night, the ice weasels come.''&quot;&lt;ref&gt;{{cite book | last = Groening | first = Matt | authorlink = Matt Groening | title = Love Is Hell | publisher = [[Pantheon Books]] | year = 1986 | isbn = 0-394-74454-3 }}&lt;/ref&gt;<br /> <br /> Debian was originally given permission to use the trademarks, and adopted the Firefox name.&lt;ref name=Gervsemail&gt;{{cite mailing list | url=http://lists.debian.org/debian-devel/2005/06/msg01182.html | title=Ongoing Firefox (and Thunderbird) Trademark problems |last=Markham |first=Gervase |date=2005-07-14 |accessdate=2008-12-09 |mailinglist=debian-devel}}&lt;/ref&gt; However, because the artwork in Firefox used to have a proprietary copyright license that was not compatible with the [[Debian Free Software Guidelines]], the substituted logo had to remain.&lt;ref name=Gervsemail2&gt;{{cite mailing list | url=http://lists.debian.org/debian-legal/2005/01/msg00757.html | title=Firefox/Thunderbird trademarks: a proposal |last=Markham |first=Gervase |date=2005-06-19 |accessdate=2008-12-09 |mailinglist=debian-devel }}&lt;/ref&gt; In 2006, Mozilla withdrew their permission for Debian to use the Firefox name due to significant changes to the browser that Mozilla deemed outside the boundaries of its policy, changes which Debian felt were important enough to keep, and Iceweasel was revived in its place.<br /> <br /> On 23 September 2007, one of the developers announced that the name would be changed to '''GNU IceCat''' from Iceweasel in the next release. This was to avoid confusion with [[Debian]]'s separately maintained, unrelated rebranding of Firefox.&lt;ref name=notWeasel/&gt; The name change took place as planned and IceCat is the current name.&lt;ref name=gzhome/&gt;<br /> <br /> === Releases ===<br /> * GNU IceCat 2 (Version was 2.0.0.11-g1, released January 12, 2008) <br /> * GNU IceCat 3 (July 23, 2008)<br /> * GNU IceCat 4 (April 10, 2011)&lt;ref&gt;{{cite mailing list |url=http://lists.gnu.org/archive/html/bug-gnuzilla/2011-04/msg00019.html |title=GNU IceCat 4.0 |last=Scrivano |first=Giuseppe |date=2011-04-11 |accessdate=2011-04-11 |mailinglist=bug-gnuzilla }}&lt;/ref&gt;<br /> * GNU IceCat 5 (June 27, 2011)&lt;ref&gt;{{cite web |url=http://savannah.gnu.org/forum/forum.php?forum_id=6858 |title=GNU IceCat 5.0 |last=Scrivano |first=Giuseppe |date=2011-06-27 |accessdate=2011-06-28}}&lt;/ref&gt;<br /> * GNU IceCat 6<br /> * GNU IceCat 7<br /> * GNU IceCat 9<br /> * GNU IceCat 10<br /> * GNU IceCat 12<br /> * GNU IceCat 13<br /> * GNU IceCat 14<br /> * GNU IceCat 17<br /> * GNU IceCat 24<br /> * GNU IceCat 31 (2014)&lt;ref&gt;{{cite web |url=http://ftp.gnu.org/gnu/gnuzilla/ |title=GNU Icecat 31 |accessdate=November 29, 2014 }}&lt;/ref&gt;<br /> * GNU IceCat 38 (2015)&lt;ref&gt;{{cite web |url=http://ftp.gnu.org/gnu/gnuzilla/ |title=GNU Icecat 38 |accessdate=October 21, 2015 }}&lt;/ref&gt;<br /> <br /> Releases usually keep up to date with the Mozilla Firefox source code.<br /> <br /> == Distribution ==<br /> <br /> GNU IceCat is available as a free download for the [[IA-32]] and [[PowerPC]] architectures. Both binaries and source are available, though the current build is available only for [[Linux]].<br /> <br /> IceCat is also available for Mac OS X 10.4 &amp; 10.5. Any Mac user with these versions of Mac OS X can install IceCat through [[Fink]].<br /> For the Mac, it is available for both [[IA-32]] &amp; [[PowerPC]] architectures.<br /> <br /> It is also available for Windows (Vista or newer) and Android (2.3 or newer).&lt;ref name=&quot;31.5 release&quot; /&gt;<br /> <br /> == Additional security features ==<br /> IceCat includes additional security features, such as the option to block third party zero-length image files resulting in third party [[HTTP cookie|cookie]], also known as [[web bugs]]&lt;ref name=gzhome&gt;[https://www.gnu.org/software/gnuzilla/ Gnuzilla Homepage]&lt;/ref&gt; (This feature is available in Firefox 1.0, 1.5, and 3.0, but the UI option was absent on 2.0).&lt;ref name=gzhome/&gt; GNU IceCat also provides warnings for [[URL redirection]].&lt;ref name=gzhome/&gt;<br /> <br /> In version 3.0.2-g1, the certificate of [[CAcert.org]], a [[certificate authority]], has been added to the list of trusted root certificates. Concern{{according to whom|date=June 2014}} about that decision has been raised in a discussion on the savannah-hackers-public mailing list.&lt;ref&gt;{{cite mailing list |url=http://lists.gnu.org/archive/html/savannah-hackers-public/2008-10/msg00006.html |title=CAcert, GNU IceCat, and savannah |last=Berry |first=Karl |date=2008-10-07 |accessdate=2008-12-09 |mailinglist=savannah-hackers-public }}&lt;/ref&gt;<br /> <br /> The GNU [[LibreJS]] extension detects and blocks [[non-free software|nonfree]] nontrivial JavaScript.<br /> <br /> == Licensing ==<br /> <br /> Gnuzilla was available under the [[Mozilla Public License|MPL]]/[[GNU General Public License|GPL]]/[[GNU Lesser General Public License|LGPL]] tri-license that Mozilla used for source code. Unlike Mozilla, IceCat's default icons are under the same tri-license.<br /> <br /> == Google Summer of Code 2008 ==<br /> There were some suggestions made for the [[Google Summer of Code]] for 2008 to improve GNU IceCat.&lt;ref&gt;{{ cite web | url = https://www.gnu.org/software/soc-projects/ideas-2008.html#icecat | title = Summer of Code project suggestions for GNU | accessdate = 2008-04-13 }}&lt;/ref&gt;{{Citation needed|reason=third-party source to confirm relevance|date=October 2008}}<br /> These included:<br /> * Porting IceCat to the [[Mozilla Firefox 3|Firefox 3]] codebase<br /> * More support for free plugins such as [[Gnash]]<br /> * Privacy features changes<br /> <br /> The proposal to port IceCat to the Firefox 3 codebase was accepted and completed by [[Giuseppe Scrivano]].&lt;ref&gt;{{ cite web | url = https://code.google.com/soc/2008/gnu/appinfo.html?csaid=4DA69A85DB948064 | title = Google Code - Summer of Code - Application Information | accessdate = 2008-08-07 |archiveurl = https://web.archive.org/web/20080621145715/http://code.google.com/soc/2008/gnu/appinfo.html?csaid=4DA69A85DB948064 &lt;!-- Bot retrieved archive --&gt; |archivedate = 2008-06-21}}&lt;/ref&gt;<br /> <br /> == See also ==<br /> {{Portal|Free software}}<br /> * [[Comparison of web browsers]]<br /> * [[Gnuzilla|GNUzilla]]<br /> * [[History of Mozilla Firefox]]<br /> * [[Mozilla Corporation software rebranded by the Debian project]]<br /> * [[Open ICEcat]]<br /> <br /> ==References==<br /> <br /> {{Reflist|2}}<br /> <br /> ==External links==<br /> {{commons category|GNU IceCat}}<br /> * [https://www.gnu.org/software/gnuzilla/ GNU.org], Homepage of Gnuzilla and IceCat<br /> * {{cite news |date=2006-09-27 | title = Firefox Not Really Free? | publisher = internetnews.com | author = Kerner, Sean Michael | url = http://www.internetnews.com/dev-news/article.php/3634591 }}<br /> * {{cite news |date=2006-10-06 | title = Firefox Set Free in IceWeasel | publisher = internetnews.com | author = Kerner, Sean Michael | url = http://www.internetnews.com/dev-news/article.php/3636651 }}<br /> * [http://gnuzilla-watcher.blogspot.com/ GNUzilla-watcher.blogspot.com], GNUzilla Watcher - GNUzilla and IceCat blog (inComplete)<br /> * [http://pdb.finkproject.org/pdb/package.php/icecat PDB.Finkproject.org], IceCat in Fink Package Database<br /> <br /> {{GNU}}<br /> {{Web browsers|desktop}}<br /> <br /> {{DEFAULTSORT:Gnu Icecat}}<br /> [[Category:Debian]]<br /> [[Category:Free web browsers]]<br /> [[Category:Gecko-based software]]<br /> [[Category:GNU Project]]<br /> [[Category:POSIX web browsers]]<br /> [[Category:Software forks]]<br /> [[Category:Web browsers based on Firefox]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=8kun&diff=187755778 8kun 2015-12-22T08:17:51Z <p>Dsprc: /* Los Angeles school-closure incident */ rm page break</p> <hr /> <div>{{other uses|8chan (disambiguation)}}<br /> {{Use mdy dates|date=September 2015}}<br /> {{Infobox website<br /> | name = 8chan<br /> | logo =<br /> | screenshot = [[File:InfiniteChan∞chanLogo.svg|200px]]<br /> | alt = green infinity symbol left of the word chan.<br /> | caption = The ∞chan logo of 8chan<br /> | url = {{URL|https://8ch.net}}<br /> | slogan = '''''Welcome to 8chan, the infinitely expanding imageboard.'''''<br /> | commercial = Yes<br /> | type = [[Imageboard]]<br /> | language = English, Japanese (users can create language specific boards)<br /> | registration = Optional<br /> | author = [[Fredrick Brennan]]<br /> | owner = [[:ja:ジム・ワトキンス|Jim Watkins]],&lt;br /&gt; N.T. Technology ([[2channel]])&lt;ref&gt;[https://8ch.net/who.html 8chan] - Who owns 8chan?&lt;/ref&gt;<br /> | launch date = {{start date and age|2013|10|22|df=no}}<br /> | alexa = {{IncreaseNegative}} 10,084 ({{as of|2015|8|22|alt=August 2015}})&lt;ref name=&quot;alexa&quot;&gt;{{cite web|url= http://www.alexa.com/siteinfo/8ch.net |title= 8ch.net Site Info | publisher= [[Alexa Internet]] |accessdate= August 22, 2015 }}&lt;/ref&gt;<br /> | current status = Online<br /> }}<br /> <br /> '''8chan,''' also called '''Infinitechan,''' is an [[English language|English-language]] [[imageboard]] website composed of user-created [[Internet forum|boards]]. Each board is moderated by its respective creator, with minimal interaction from other site administration.&lt;ref name=&quot;faq&quot;&gt;{{cite web|last=Brennan|first=Fredrick|url=https://8ch.net/faq.html|title=FAQ|publisher=Infinitechan|website=8chan.co|accessdate=November 23, 2014}}&lt;/ref&gt;<br /> <br /> The site has received both praise and criticism for its stance on [[Freedom of speech|free speech]], which involves allowing any content to be posted, so long as it adheres to United States law.<br /> <br /> Several sites's boards have played an active role in the [[Gamergate controversy]], encouraging Gamergate affiliates to frequent 8chan after the topic was banned on the unaffiliated imageboard [[4chan]]. As of August of 2015, the site was the 10,204th most visited site in the world,&lt;ref name=&quot;alexa&quot; /&gt; and in November of 2014, it was receiving an average of 35,000 unique visitors per day and 400,000 posts per week when it was at a higher rank.&lt;ref name=Howell2014 /&gt;<br /> <br /> ==History==<br /> 8chan was created in October of 2013 by computer programmer [[Fredrick Brennan]],&lt;ref name=Howell2014 /&gt;&lt;ref&gt;{{cite web|last1=Machkovech|first1=Sam|title=Full transcript: Ars interviews 8chan founder Fredrick Brennan|url=http://arstechnica.com/business/2015/03/full-transcript-ars-interviews-8chan-founder-fredrick-brennan/|publisher=Ars Technica|accessdate=June 15, 2015|date=March 17, 2015}}&lt;/ref&gt; also known by the nickname &quot;Hotwheels.&quot;&lt;ref name=&quot;KYM&quot;/&gt; Brennan created the website after he observed what he perceived to be rapidly escalating [[surveillance]] and a loss of [[free speech]] on the Internet.&lt;ref name=Howell2014 /&gt; Brennan, who considers the imageboard [[4chan]] to have grown into authoritarianism, describes 8chan as a &quot;free-speech-friendly&quot; alternative,&lt;ref name=&quot;Howell2014&quot;&gt;{{cite web|last=Howell O'Neill|first=Patrick|date=November 17, 2014|url=http://www.dailydot.com/politics/8chan-pedophiles-child-porn-gamergate/|title=8chan, the central hive of Gamergate, is also an active pedophile network|work=The Daily Dot}}&lt;/ref&gt; and had originally conceptualized the site while experiencing a [[psychedelic experience|psychedelic mushrooms trip]].&lt;ref name=&quot;KYM&quot;/&gt;&lt;ref name=WashPost /&gt;<br /> <br /> No experience or programming knowledge is necessary for users to create their own boards.&lt;ref name=&quot;faq&quot; /&gt; Since as early as March of 2014, its [[FAQ]] has stated only one rule that is to be globally enforced: &quot;Do not post, request, or link to any content illegal in the United States of America. Do not create boards with the sole purpose of posting or spreading such content.&quot;&lt;ref name=&quot;faq&quot; /&gt; Brennan has claimed that, while he finds some of the content posted by users to be &quot;reprehensible,&quot; he feels personally obligated to uphold the site's integrity by tolerating discussion he does not necessarily support regardless of his moral stance.&lt;ref name=Howell2014 /&gt;<br /> <br /> Brennan agreed to partner 8chan with the Japanese message board [[2channel]],&lt;ref name=&quot;KYM&quot;&gt;{{cite web|url=http://knowyourmeme.com/blog/interviews/qa-with-fredrick-brennan-of-8chan|title=Q&amp;A with Fredrick Brennan of 8chan|last=Caldwell|first=Don|date=October 9, 2014|work=[[Know Your Meme]]|accessdate=December 18, 2014}}&lt;/ref&gt; and subsequently relocated to the [[Philippines]] in October 2014.&lt;ref name=Chen /&gt;<br /> <br /> In January of 2015, the site changed its [[Domain name|domain]] 8chan.co to 8ch.net after multiple people filed reports complaining to 8chan’s [[Domain name registrar|registrar]] that the message board hosted [[child pornography]]. Despite subsequently regaining the domain, the site remained at 8ch.net, with the old domain redirecting to it.&lt;ref name=WashPost /&gt;<br /> <br /> Numerous bugs in the Infinity software led to the funding and development of a successor platform dubbed &quot;Infinity Next&quot;. After a several-month-long testing period, a migration to the new software was attempted in December 2015, but failed.&lt;ref&gt;{{cite web |url=https://ghostbin.com/paste/qt2ww |format=Plaintext |title=qt2ww |last=Moon |first=Joshua |date=2015-12-19 |accessdate=2015-12-20 }}&lt;/ref&gt;{{clarify|date=December 2015}}<br /> <br /> ==Controversies==<br /> ===Child pornography===<br /> ''[[The Washington Post]]'' described it as &quot;the more-lawless, more-libertarian, more 'free' follow-up to 4chan.&quot;&lt;ref name=&quot;WashPost&quot;&gt;{{cite web|url=http://www.washingtonpost.com/news/the-intersect/wp/2015/01/13/this-is-what-happens-when-you-create-an-online-community-without-any-rules/|title=This is what happens when you create an online community without any rules|work=[[The Washington Post]]|last=Caitlin|first=Dewey|date=January 13, 2015}}&lt;/ref&gt; Boards have been created to discuss controversial topics, including [[pedophilia]]. While the sharing of illegal content is against site rules, ''[[The Daily Dot]]'' wrote that boards do exist to share sexualized images of minors in provocative poses, and that some users of those boards do post links to explicit child pornography hosted elsewhere.&lt;ref name=&quot;Howell2014&quot;/&gt; When asked whether such boards were an inevitable result of free speech, Brennan responded, &quot;Unfortunately, yes. I don’t support the content on the boards you mentioned, but it is simply the cost of free speech and being the only active site to not impose more 'laws' than those that were passed in [[Washington, D.C.]]&quot;&lt;ref name=&quot;Howell2014&quot;/&gt;<br /> <br /> In August of 2015, for a brief period, 8chan was blacklisted from [[Google Search]] for containing content constituting &quot;suspected child abuse content.&quot;&lt;ref name=ars-8chancensor&gt;{{cite web|title=8chan-hosted content disappears from Google searches|url=http://arstechnica.com/tech-policy/2015/08/8chan-hosted-content-disappears-from-google-searches/|last=Machkovech|first=Sam|website=[[Ars Technica]]|publisher=[[Condé Nast]]|date=August 14, 2015|accessdate=August 17, 2015}}&lt;/ref&gt; It was later restored to the search engine's listings without explanation.&lt;ref&gt;{{Cite web|url = https://medium.com/@infinitechan/google-is-not-your-friend-5a6636af0651|title = Google is not your friend?|date = August 13, 2015|accessdate = September 9, 2015|website = Medium|publisher = |last = Brennan|first = Frederick}}&lt;/ref&gt;<br /> <br /> ===Gamergate===<br /> {{main|Gamergate controversy}}<br /> On September 18, 2014, the website gained prominence in the [[Gamergate controversy]] after 4chan banned discussion of Gamergate,&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;/&gt;&lt;ref&gt;{{cite news|last=Audureau|first=William|title=4chan, wizardchan, 8chan... s'y retrouver dans la jungle des forums anonymes les plus populaires du Web|url=http://www.lemonde.fr/pixels/article/2014/10/15/4chan-wizardchan-8chan-le-guide-des-forums-anonymes-les-plus-populaires-du-web_4505380_4408996.html|work=[[Le Monde]]|location=France|language=French|date=October 15, 2014}}&lt;/ref&gt; whereupon 8chan became one of several hubs of Gamergate activity.&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;&gt;{{cite web|last=Chen|first=Adrian|date=October 27, 2014|url=http://nymag.com/daily/intelligencer/2014/10/gamergate-supporters-party-at-strip-club.html|title=Gamergate Supporters Partied at a Strip Club This Weekend|work=[[New York (magazine)]]}}&lt;/ref&gt;&lt;ref name=&quot;Buzz&quot;/&gt;&lt;ref name=&quot;Guardian 2015-01-13&quot; /&gt; &quot;/gg/,&quot; 8chan's initial Gamergate-oriented board, also gained attention after being compromised by members of the internet troll group [[Gay Nigger Association of America]], forcing Gamergate activists to migrate to &quot;/gamergate/.&quot; This replacement quickly became the site's second most populous board.&lt;ref name=&quot;Buzz&quot;&gt;{{cite web|last1=Bernstein|first1=Joseph|title=GamerGate’s Headquarters Has Been Destroyed By Trolls|url=http://www.buzzfeed.com/josephbernstein/gamergates-headquarters-has-been-destroyed-by-trolls|publisher=''[[Buzzfeed]]''|date=December 4, 2014}}&lt;/ref&gt;<br /> <br /> ===Swatting incidents===<br /> In January of 2015 the site was used as a base for [[swatting]] exploits in [[Portland, Oregon|Portland]], [[Seattle]], and [[Burnaby|Burnaby, British Columbia]], most of them tied to the victims' criticism of Gamergate and 8chan's association with it;&lt;ref name=&quot;Mattise&quot;&gt;{{cite web|last=Mattise|first=Nathan|date=January 4, 2015|url=http://arstechnica.com/tech-policy/2015/01/8chan-tries-swatting-gamergate-critic-sends-cops-to-an-old-address/|title=8chan tries &quot;swatting&quot; GamerGate critic, sends cops to an old address|work=[[Ars Technica]]}}&lt;/ref&gt; the attacks were coordinated on a [[Internet forum|board]] on the website called &quot;/baphomet/.&quot;&lt;ref name=&quot;Guardian 2015-01-13&quot;&gt;{{cite news |last=Hern |first=Alex |url=http://www.theguardian.com/technology/2015/jan/13/gamergate-hits-new-low-with-attempts-to-send-swat-teams-to-critics |title=Gamergate hits new low with attempts to send Swat teams to critics |work=[[The Guardian]] |date=January 13, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt; One of the victims of a swatting attack said that she was singled out because she had followed someone on [[Twitter]].&lt;ref name=&quot;GlobalNews 2015-01-15&quot;&gt;{{cite news |last=McElroy |first=Justin |url=http://globalnews.ca/news/1773840/police-called-to-burnaby-womens-home-by-online-harassers/ |title=Police falsely called to Burnaby women’s home by online harassers |work=[[Global News]] |date=January 15, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt;&lt;ref&gt;{{cite web|url=http://www.gameranx.com/updates/id/26081/article/canadian-victim-of-gamergate-swatting-attempt-comes-forward/|title=Canadian Victim of Gamergate SWATing Attempt Comes Forward|work=Gameranx|last=Cheong|first=Ian Miles|date=January 13, 2015|accessdate=January 16, 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://bc.ctvnews.ca/reckless-swatting-prank-sends-police-to-b-c-woman-s-home-1.2189547|title=Reckless ‘swatting’ prank sends police to B.C. woman’s home|work=[[CTV News]]|date=January 14, 2015|accessdate=September 30, 2015|author=&lt;!-- Staff writers --&gt;}}&lt;/ref&gt; On February 9, 2015, contents on the &quot;/baphomet/&quot; subboard were wiped after [[doxxing|personal information]] of [[Katherine B. Forrest|Katherine Forrest]], the presiding judge in the [[Silk Road (marketplace)|Silk Road]] case, had been posted there.&lt;ref name=&quot;silkroad&quot;&gt;{{Cite web| title = Notorious 8chan &quot;subboard&quot; has history wiped after federal judge’s doxing| first = Sam |last = Machkovech|work = Ars Technica| date = February 12, 2015| accessdate = February 13, 2015| url = http://arstechnica.com/security/2015/02/notorious-8chan-subboard-has-history-wiped-after-federal-judges-doxing/}}&lt;/ref&gt;<br /> <br /> ===Los Angeles school-closure incident===<br /> [[File:CWh686mUwAEQLoj.png|thumb|upright=0.35|alt=Photograph of Vincent Canfield|Owner and operator of cock.li, Vincent Canfield]]<br /> On Tuesday, December 15, 2015, the New York City and Los Angeles County Boards of Education were both sent a superficially threatening, but actually fraudulent, e-mail message that had originated from an 8chan-linked service called &quot;cock.li&quot;. The New York City school board did not take the message seriously, but the Los Angeles County school board refused to take the chance and ordered all public schools closed for the entire day, citing what it called a &quot;credible terror threat.&quot; Sam Biddle, a contributor to [[Gawker.com]], called the message &quot;extremely dumb&quot; in an article on the site he filed under &quot;Pranks,&quot; writing:<br /> {{cquote|Even if this message hadn’t been sent from a “cock.li” email account, it would’ve been hard to imagine it was a credible threat of violence, particularly since it conflates 4chan-style “death to the normies” rhetoric with convoluted Islamism. It looks very much like the work of a kid who really didn’t want to go to school.}}<br /> In the article, which he titled “Here’s the Full, Extremely Dumb Email That Shut Down the Entire L.A. Public School System,” Biddle quoted the e-mail message itself, word for word.&lt;ref&gt;{{Cite web| title = Here’s the Full, Extremely Dumb Email That Shut Down the Entire L.A. Public School System| first = Sam |last = Biddle|work = Gawker| date = December 16, 2015| accessdate = December 16, 2015| url = http://gawker.com/heres-the-full-extremely-dumb-email-that-shut-down-the-1748402588/}}&lt;/ref&gt;<br /> <br /> ==External links==<br /> * {{Official website}}<br /> * &lt;nowiki&gt;oxwugzccvk3dk6tj.onion&lt;/nowiki&gt;&lt;ref&gt;{{cite web|title=ATTENTION TOR USERS: I accidentally released the PRIVATE key for the Tor hidden service into a public IRC channel. The Tor URL fullchan4jtta4sx.onion is now considered COMPROMISED and NOT OWNED by the 8chan administration. The new URL is oxwugzccvk3dk6tj.onion.|url=https://8ch.net/onion/res/357.html|accessdate=August 18, 2015}}&lt;/ref&gt; - [[.onion]] address for [[Tor (network)|Tor]] hidden service &lt;!-- SEE: http://web.archive.org/web/20150818121142/https://8ch.net/_g/1153.txt --&gt;<br /> * {{Twitter|infinitechan|8chan}}<br /> <br /> ==References==<br /> {{Reflist|30em}}<br /> <br /> {{Tor hidden services}}<br /> {{DEFAULTSORT:8chan}}<br /> [[Category:2channel]]<br /> [[Category:American websites]]<br /> [[Category:Community websites]]<br /> [[Category:Free web software]]<br /> [[Category:Internet forums]]<br /> [[Category:Imageboards]]<br /> [[Category:Internet properties established in 2013]]<br /> [[Category:Obscenity controversies]]<br /> [[Category:Tor hidden services]]<br /> [[Category:Virtual communities]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=8kun&diff=187755777 8kun 2015-12-22T08:13:15Z <p>Dsprc: /* top */</p> <hr /> <div>{{other uses|8chan (disambiguation)}}<br /> {{Use mdy dates|date=September 2015}}<br /> {{Infobox website<br /> | name = 8chan<br /> | logo =<br /> | screenshot = [[File:InfiniteChan∞chanLogo.svg|200px]]<br /> | alt = green infinity symbol left of the word chan.<br /> | caption = The ∞chan logo of 8chan<br /> | url = {{URL|https://8ch.net}}<br /> | slogan = '''''Welcome to 8chan, the infinitely expanding imageboard.'''''<br /> | commercial = Yes<br /> | type = [[Imageboard]]<br /> | language = English, Japanese (users can create language specific boards)<br /> | registration = Optional<br /> | author = [[Fredrick Brennan]]<br /> | owner = [[:ja:ジム・ワトキンス|Jim Watkins]],&lt;br /&gt; N.T. Technology ([[2channel]])&lt;ref&gt;[https://8ch.net/who.html 8chan] - Who owns 8chan?&lt;/ref&gt;<br /> | launch date = {{start date and age|2013|10|22|df=no}}<br /> | alexa = {{IncreaseNegative}} 10,084 ({{as of|2015|8|22|alt=August 2015}})&lt;ref name=&quot;alexa&quot;&gt;{{cite web|url= http://www.alexa.com/siteinfo/8ch.net |title= 8ch.net Site Info | publisher= [[Alexa Internet]] |accessdate= August 22, 2015 }}&lt;/ref&gt;<br /> | current status = Online<br /> }}<br /> <br /> '''8chan,''' also called '''Infinitechan,''' is an [[English language|English-language]] [[imageboard]] website composed of user-created [[Internet forum|boards]]. Each board is moderated by its respective creator, with minimal interaction from other site administration.&lt;ref name=&quot;faq&quot;&gt;{{cite web|last=Brennan|first=Fredrick|url=https://8ch.net/faq.html|title=FAQ|publisher=Infinitechan|website=8chan.co|accessdate=November 23, 2014}}&lt;/ref&gt;<br /> <br /> The site has received both praise and criticism for its stance on [[Freedom of speech|free speech]], which involves allowing any content to be posted, so long as it adheres to United States law.<br /> <br /> Several sites's boards have played an active role in the [[Gamergate controversy]], encouraging Gamergate affiliates to frequent 8chan after the topic was banned on the unaffiliated imageboard [[4chan]]. As of August of 2015, the site was the 10,204th most visited site in the world,&lt;ref name=&quot;alexa&quot; /&gt; and in November of 2014, it was receiving an average of 35,000 unique visitors per day and 400,000 posts per week when it was at a higher rank.&lt;ref name=Howell2014 /&gt;<br /> <br /> ==History==<br /> 8chan was created in October of 2013 by computer programmer [[Fredrick Brennan]],&lt;ref name=Howell2014 /&gt;&lt;ref&gt;{{cite web|last1=Machkovech|first1=Sam|title=Full transcript: Ars interviews 8chan founder Fredrick Brennan|url=http://arstechnica.com/business/2015/03/full-transcript-ars-interviews-8chan-founder-fredrick-brennan/|publisher=Ars Technica|accessdate=June 15, 2015|date=March 17, 2015}}&lt;/ref&gt; also known by the nickname &quot;Hotwheels.&quot;&lt;ref name=&quot;KYM&quot;/&gt; Brennan created the website after he observed what he perceived to be rapidly escalating [[surveillance]] and a loss of [[free speech]] on the Internet.&lt;ref name=Howell2014 /&gt; Brennan, who considers the imageboard [[4chan]] to have grown into authoritarianism, describes 8chan as a &quot;free-speech-friendly&quot; alternative,&lt;ref name=&quot;Howell2014&quot;&gt;{{cite web|last=Howell O'Neill|first=Patrick|date=November 17, 2014|url=http://www.dailydot.com/politics/8chan-pedophiles-child-porn-gamergate/|title=8chan, the central hive of Gamergate, is also an active pedophile network|work=The Daily Dot}}&lt;/ref&gt; and had originally conceptualized the site while experiencing a [[psychedelic experience|psychedelic mushrooms trip]].&lt;ref name=&quot;KYM&quot;/&gt;&lt;ref name=WashPost /&gt;<br /> <br /> No experience or programming knowledge is necessary for users to create their own boards.&lt;ref name=&quot;faq&quot; /&gt; Since as early as March of 2014, its [[FAQ]] has stated only one rule that is to be globally enforced: &quot;Do not post, request, or link to any content illegal in the United States of America. Do not create boards with the sole purpose of posting or spreading such content.&quot;&lt;ref name=&quot;faq&quot; /&gt; Brennan has claimed that, while he finds some of the content posted by users to be &quot;reprehensible,&quot; he feels personally obligated to uphold the site's integrity by tolerating discussion he does not necessarily support regardless of his moral stance.&lt;ref name=Howell2014 /&gt;<br /> <br /> Brennan agreed to partner 8chan with the Japanese message board [[2channel]],&lt;ref name=&quot;KYM&quot;&gt;{{cite web|url=http://knowyourmeme.com/blog/interviews/qa-with-fredrick-brennan-of-8chan|title=Q&amp;A with Fredrick Brennan of 8chan|last=Caldwell|first=Don|date=October 9, 2014|work=[[Know Your Meme]]|accessdate=December 18, 2014}}&lt;/ref&gt; and subsequently relocated to the [[Philippines]] in October 2014.&lt;ref name=Chen /&gt;<br /> <br /> In January of 2015, the site changed its [[Domain name|domain]] 8chan.co to 8ch.net after multiple people filed reports complaining to 8chan’s [[Domain name registrar|registrar]] that the message board hosted [[child pornography]]. Despite subsequently regaining the domain, the site remained at 8ch.net, with the old domain redirecting to it.&lt;ref name=WashPost /&gt;<br /> <br /> Numerous bugs in the Infinity software led to the funding and development of a successor platform dubbed &quot;Infinity Next&quot;. After a several-month-long testing period, a migration to the new software was attempted in December 2015, but failed.&lt;ref&gt;{{cite web |url=https://ghostbin.com/paste/qt2ww |format=Plaintext |title=qt2ww |last=Moon |first=Joshua |date=2015-12-19 |accessdate=2015-12-20 }}&lt;/ref&gt;{{clarify|date=December 2015}}<br /> <br /> ==Controversies==<br /> ===Child pornography===<br /> ''[[The Washington Post]]'' described it as &quot;the more-lawless, more-libertarian, more 'free' follow-up to 4chan.&quot;&lt;ref name=&quot;WashPost&quot;&gt;{{cite web|url=http://www.washingtonpost.com/news/the-intersect/wp/2015/01/13/this-is-what-happens-when-you-create-an-online-community-without-any-rules/|title=This is what happens when you create an online community without any rules|work=[[The Washington Post]]|last=Caitlin|first=Dewey|date=January 13, 2015}}&lt;/ref&gt; Boards have been created to discuss controversial topics, including [[pedophilia]]. While the sharing of illegal content is against site rules, ''[[The Daily Dot]]'' wrote that boards do exist to share sexualized images of minors in provocative poses, and that some users of those boards do post links to explicit child pornography hosted elsewhere.&lt;ref name=&quot;Howell2014&quot;/&gt; When asked whether such boards were an inevitable result of free speech, Brennan responded, &quot;Unfortunately, yes. I don’t support the content on the boards you mentioned, but it is simply the cost of free speech and being the only active site to not impose more 'laws' than those that were passed in [[Washington, D.C.]]&quot;&lt;ref name=&quot;Howell2014&quot;/&gt;<br /> <br /> In August of 2015, for a brief period, 8chan was blacklisted from [[Google Search]] for containing content constituting &quot;suspected child abuse content.&quot;&lt;ref name=ars-8chancensor&gt;{{cite web|title=8chan-hosted content disappears from Google searches|url=http://arstechnica.com/tech-policy/2015/08/8chan-hosted-content-disappears-from-google-searches/|last=Machkovech|first=Sam|website=[[Ars Technica]]|publisher=[[Condé Nast]]|date=August 14, 2015|accessdate=August 17, 2015}}&lt;/ref&gt; It was later restored to the search engine's listings without explanation.&lt;ref&gt;{{Cite web|url = https://medium.com/@infinitechan/google-is-not-your-friend-5a6636af0651|title = Google is not your friend?|date = August 13, 2015|accessdate = September 9, 2015|website = Medium|publisher = |last = Brennan|first = Frederick}}&lt;/ref&gt;<br /> <br /> ===Gamergate===<br /> {{main|Gamergate controversy}}<br /> On September 18, 2014, the website gained prominence in the [[Gamergate controversy]] after 4chan banned discussion of Gamergate,&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;/&gt;&lt;ref&gt;{{cite news|last=Audureau|first=William|title=4chan, wizardchan, 8chan... s'y retrouver dans la jungle des forums anonymes les plus populaires du Web|url=http://www.lemonde.fr/pixels/article/2014/10/15/4chan-wizardchan-8chan-le-guide-des-forums-anonymes-les-plus-populaires-du-web_4505380_4408996.html|work=[[Le Monde]]|location=France|language=French|date=October 15, 2014}}&lt;/ref&gt; whereupon 8chan became one of several hubs of Gamergate activity.&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;&gt;{{cite web|last=Chen|first=Adrian|date=October 27, 2014|url=http://nymag.com/daily/intelligencer/2014/10/gamergate-supporters-party-at-strip-club.html|title=Gamergate Supporters Partied at a Strip Club This Weekend|work=[[New York (magazine)]]}}&lt;/ref&gt;&lt;ref name=&quot;Buzz&quot;/&gt;&lt;ref name=&quot;Guardian 2015-01-13&quot; /&gt; &quot;/gg/,&quot; 8chan's initial Gamergate-oriented board, also gained attention after being compromised by members of the internet troll group [[Gay Nigger Association of America]], forcing Gamergate activists to migrate to &quot;/gamergate/.&quot; This replacement quickly became the site's second most populous board.&lt;ref name=&quot;Buzz&quot;&gt;{{cite web|last1=Bernstein|first1=Joseph|title=GamerGate’s Headquarters Has Been Destroyed By Trolls|url=http://www.buzzfeed.com/josephbernstein/gamergates-headquarters-has-been-destroyed-by-trolls|publisher=''[[Buzzfeed]]''|date=December 4, 2014}}&lt;/ref&gt;<br /> <br /> ===Swatting incidents===<br /> In January of 2015 the site was used as a base for [[swatting]] exploits in [[Portland, Oregon|Portland]], [[Seattle]], and [[Burnaby|Burnaby, British Columbia]], most of them tied to the victims' criticism of Gamergate and 8chan's association with it;&lt;ref name=&quot;Mattise&quot;&gt;{{cite web|last=Mattise|first=Nathan|date=January 4, 2015|url=http://arstechnica.com/tech-policy/2015/01/8chan-tries-swatting-gamergate-critic-sends-cops-to-an-old-address/|title=8chan tries &quot;swatting&quot; GamerGate critic, sends cops to an old address|work=[[Ars Technica]]}}&lt;/ref&gt; the attacks were coordinated on a [[Internet forum|board]] on the website called &quot;/baphomet/.&quot;&lt;ref name=&quot;Guardian 2015-01-13&quot;&gt;{{cite news |last=Hern |first=Alex |url=http://www.theguardian.com/technology/2015/jan/13/gamergate-hits-new-low-with-attempts-to-send-swat-teams-to-critics |title=Gamergate hits new low with attempts to send Swat teams to critics |work=[[The Guardian]] |date=January 13, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt; One of the victims of a swatting attack said that she was singled out because she had followed someone on [[Twitter]].&lt;ref name=&quot;GlobalNews 2015-01-15&quot;&gt;{{cite news |last=McElroy |first=Justin |url=http://globalnews.ca/news/1773840/police-called-to-burnaby-womens-home-by-online-harassers/ |title=Police falsely called to Burnaby women’s home by online harassers |work=[[Global News]] |date=January 15, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt;&lt;ref&gt;{{cite web|url=http://www.gameranx.com/updates/id/26081/article/canadian-victim-of-gamergate-swatting-attempt-comes-forward/|title=Canadian Victim of Gamergate SWATing Attempt Comes Forward|work=Gameranx|last=Cheong|first=Ian Miles|date=January 13, 2015|accessdate=January 16, 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://bc.ctvnews.ca/reckless-swatting-prank-sends-police-to-b-c-woman-s-home-1.2189547|title=Reckless ‘swatting’ prank sends police to B.C. woman’s home|work=[[CTV News]]|date=January 14, 2015|accessdate=September 30, 2015|author=&lt;!-- Staff writers --&gt;}}&lt;/ref&gt; On February 9, 2015, contents on the &quot;/baphomet/&quot; subboard were wiped after [[doxxing|personal information]] of [[Katherine B. Forrest|Katherine Forrest]], the presiding judge in the [[Silk Road (marketplace)|Silk Road]] case, had been posted there.&lt;ref name=&quot;silkroad&quot;&gt;{{Cite web| title = Notorious 8chan &quot;subboard&quot; has history wiped after federal judge’s doxing| first = Sam |last = Machkovech|work = Ars Technica| date = February 12, 2015| accessdate = February 13, 2015| url = http://arstechnica.com/security/2015/02/notorious-8chan-subboard-has-history-wiped-after-federal-judges-doxing/}}&lt;/ref&gt;<br /> <br /> ===Los Angeles school-closure incident===<br /> [[File:CWh686mUwAEQLoj.png|thumb|upright=0.35|alt=Photograph of Vincent Canfield|Owner and operator of cock.li, Vincent Canfield]]<br /> On Tuesday, December 15, 2015, the New York City and Los Angeles County Boards of Education were both sent a superficially threatening, but actually fraudulent, e-mail message that had originated from an 8chan-linked service called &quot;cock.li&quot;. The New York City school board did not take the message seriously, but the Los Angeles County school board refused to take the chance and ordered all public schools closed for the entire day, citing what it called a &quot;credible terror threat.&quot; Sam Biddle, a contributor to [[Gawker.com]], called the message &quot;extremely dumb&quot; in an article on the site he filed under &quot;Pranks,&quot; writing:<br /> {{cquote|Even if this message hadn’t been sent from a “cock.li” email account, it would’ve been hard to imagine it was a credible threat of violence, particularly since it conflates 4chan-style “death to the normies” rhetoric with convoluted Islamism. It looks very much like the work of a kid who really didn’t want to go to school.}}<br /> In the article, which he titled “Here’s the Full, Extremely Dumb Email That Shut Down the Entire L.A. Public School System,” Biddle quoted the e-mail message itself, word for word.&lt;br&gt;&lt;ref&gt;{{Cite web| title = Here’s the Full, Extremely Dumb Email That Shut Down the Entire L.A. Public School System| first = Sam |last = Biddle|work = Gawker| date = December 16, 2015| accessdate = December 16, 2015| url = http://gawker.com/heres-the-full-extremely-dumb-email-that-shut-down-the-1748402588/}}&lt;/ref&gt;<br /> <br /> ==External links==<br /> * {{Official website}}<br /> * &lt;nowiki&gt;oxwugzccvk3dk6tj.onion&lt;/nowiki&gt;&lt;ref&gt;{{cite web|title=ATTENTION TOR USERS: I accidentally released the PRIVATE key for the Tor hidden service into a public IRC channel. The Tor URL fullchan4jtta4sx.onion is now considered COMPROMISED and NOT OWNED by the 8chan administration. The new URL is oxwugzccvk3dk6tj.onion.|url=https://8ch.net/onion/res/357.html|accessdate=August 18, 2015}}&lt;/ref&gt; - [[.onion]] address for [[Tor (network)|Tor]] hidden service &lt;!-- SEE: http://web.archive.org/web/20150818121142/https://8ch.net/_g/1153.txt --&gt;<br /> * {{Twitter|infinitechan|8chan}}<br /> <br /> ==References==<br /> {{Reflist|30em}}<br /> <br /> {{Tor hidden services}}<br /> {{DEFAULTSORT:8chan}}<br /> [[Category:2channel]]<br /> [[Category:American websites]]<br /> [[Category:Community websites]]<br /> [[Category:Free web software]]<br /> [[Category:Internet forums]]<br /> [[Category:Imageboards]]<br /> [[Category:Internet properties established in 2013]]<br /> [[Category:Obscenity controversies]]<br /> [[Category:Tor hidden services]]<br /> [[Category:Virtual communities]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=8kun&diff=187755776 8kun 2015-12-22T08:12:46Z <p>Dsprc: /* top */ superflous</p> <hr /> <div>{{other uses|8chan (disambiguation)}}<br /> {{Use mdy dates|date=September 2015}}<br /> {{Infobox website<br /> | name = 8chan<br /> | logo =<br /> | screenshot = [[File:InfiniteChan∞chanLogo.svg|200px]]<br /> | alt = green infinity symbol left of the word chan.<br /> | caption = The ∞chan logo of 8ch.net<br /> | url = {{URL|https://8ch.net}}<br /> | slogan = '''''Welcome to 8chan, the infinitely expanding imageboard.'''''<br /> | commercial = Yes<br /> | type = [[Imageboard]]<br /> | language = English, Japanese (users can create language specific boards)<br /> | registration = Optional<br /> | author = [[Fredrick Brennan]]<br /> | owner = [[:ja:ジム・ワトキンス|Jim Watkins]],&lt;br /&gt; N.T. Technology ([[2channel]])&lt;ref&gt;[https://8ch.net/who.html 8chan] - Who owns 8chan?&lt;/ref&gt;<br /> | launch date = {{start date and age|2013|10|22|df=no}}<br /> | alexa = {{IncreaseNegative}} 10,084 ({{as of|2015|8|22|alt=August 2015}})&lt;ref name=&quot;alexa&quot;&gt;{{cite web|url= http://www.alexa.com/siteinfo/8ch.net |title= 8ch.net Site Info | publisher= [[Alexa Internet]] |accessdate= August 22, 2015 }}&lt;/ref&gt;<br /> | current status = Online<br /> }}<br /> <br /> '''8chan,''' also called '''Infinitechan,''' is an [[English language|English-language]] [[imageboard]] website composed of user-created [[Internet forum|boards]]. Each board is moderated by its respective creator, with minimal interaction from other site administration.&lt;ref name=&quot;faq&quot;&gt;{{cite web|last=Brennan|first=Fredrick|url=https://8ch.net/faq.html|title=FAQ|publisher=Infinitechan|website=8chan.co|accessdate=November 23, 2014}}&lt;/ref&gt;<br /> <br /> The site has received both praise and criticism for its stance on [[Freedom of speech|free speech]], which involves allowing any content to be posted, so long as it adheres to United States law.<br /> <br /> Several sites's boards have played an active role in the [[Gamergate controversy]], encouraging Gamergate affiliates to frequent 8chan after the topic was banned on the unaffiliated imageboard [[4chan]]. As of August of 2015, the site was the 10,204th most visited site in the world,&lt;ref name=&quot;alexa&quot; /&gt; and in November of 2014, it was receiving an average of 35,000 unique visitors per day and 400,000 posts per week when it was at a higher rank.&lt;ref name=Howell2014 /&gt;<br /> <br /> ==History==<br /> 8chan was created in October of 2013 by computer programmer [[Fredrick Brennan]],&lt;ref name=Howell2014 /&gt;&lt;ref&gt;{{cite web|last1=Machkovech|first1=Sam|title=Full transcript: Ars interviews 8chan founder Fredrick Brennan|url=http://arstechnica.com/business/2015/03/full-transcript-ars-interviews-8chan-founder-fredrick-brennan/|publisher=Ars Technica|accessdate=June 15, 2015|date=March 17, 2015}}&lt;/ref&gt; also known by the nickname &quot;Hotwheels.&quot;&lt;ref name=&quot;KYM&quot;/&gt; Brennan created the website after he observed what he perceived to be rapidly escalating [[surveillance]] and a loss of [[free speech]] on the Internet.&lt;ref name=Howell2014 /&gt; Brennan, who considers the imageboard [[4chan]] to have grown into authoritarianism, describes 8chan as a &quot;free-speech-friendly&quot; alternative,&lt;ref name=&quot;Howell2014&quot;&gt;{{cite web|last=Howell O'Neill|first=Patrick|date=November 17, 2014|url=http://www.dailydot.com/politics/8chan-pedophiles-child-porn-gamergate/|title=8chan, the central hive of Gamergate, is also an active pedophile network|work=The Daily Dot}}&lt;/ref&gt; and had originally conceptualized the site while experiencing a [[psychedelic experience|psychedelic mushrooms trip]].&lt;ref name=&quot;KYM&quot;/&gt;&lt;ref name=WashPost /&gt;<br /> <br /> No experience or programming knowledge is necessary for users to create their own boards.&lt;ref name=&quot;faq&quot; /&gt; Since as early as March of 2014, its [[FAQ]] has stated only one rule that is to be globally enforced: &quot;Do not post, request, or link to any content illegal in the United States of America. Do not create boards with the sole purpose of posting or spreading such content.&quot;&lt;ref name=&quot;faq&quot; /&gt; Brennan has claimed that, while he finds some of the content posted by users to be &quot;reprehensible,&quot; he feels personally obligated to uphold the site's integrity by tolerating discussion he does not necessarily support regardless of his moral stance.&lt;ref name=Howell2014 /&gt;<br /> <br /> Brennan agreed to partner 8chan with the Japanese message board [[2channel]],&lt;ref name=&quot;KYM&quot;&gt;{{cite web|url=http://knowyourmeme.com/blog/interviews/qa-with-fredrick-brennan-of-8chan|title=Q&amp;A with Fredrick Brennan of 8chan|last=Caldwell|first=Don|date=October 9, 2014|work=[[Know Your Meme]]|accessdate=December 18, 2014}}&lt;/ref&gt; and subsequently relocated to the [[Philippines]] in October 2014.&lt;ref name=Chen /&gt;<br /> <br /> In January of 2015, the site changed its [[Domain name|domain]] 8chan.co to 8ch.net after multiple people filed reports complaining to 8chan’s [[Domain name registrar|registrar]] that the message board hosted [[child pornography]]. Despite subsequently regaining the domain, the site remained at 8ch.net, with the old domain redirecting to it.&lt;ref name=WashPost /&gt;<br /> <br /> Numerous bugs in the Infinity software led to the funding and development of a successor platform dubbed &quot;Infinity Next&quot;. After a several-month-long testing period, a migration to the new software was attempted in December 2015, but failed.&lt;ref&gt;{{cite web |url=https://ghostbin.com/paste/qt2ww |format=Plaintext |title=qt2ww |last=Moon |first=Joshua |date=2015-12-19 |accessdate=2015-12-20 }}&lt;/ref&gt;{{clarify|date=December 2015}}<br /> <br /> ==Controversies==<br /> ===Child pornography===<br /> ''[[The Washington Post]]'' described it as &quot;the more-lawless, more-libertarian, more 'free' follow-up to 4chan.&quot;&lt;ref name=&quot;WashPost&quot;&gt;{{cite web|url=http://www.washingtonpost.com/news/the-intersect/wp/2015/01/13/this-is-what-happens-when-you-create-an-online-community-without-any-rules/|title=This is what happens when you create an online community without any rules|work=[[The Washington Post]]|last=Caitlin|first=Dewey|date=January 13, 2015}}&lt;/ref&gt; Boards have been created to discuss controversial topics, including [[pedophilia]]. While the sharing of illegal content is against site rules, ''[[The Daily Dot]]'' wrote that boards do exist to share sexualized images of minors in provocative poses, and that some users of those boards do post links to explicit child pornography hosted elsewhere.&lt;ref name=&quot;Howell2014&quot;/&gt; When asked whether such boards were an inevitable result of free speech, Brennan responded, &quot;Unfortunately, yes. I don’t support the content on the boards you mentioned, but it is simply the cost of free speech and being the only active site to not impose more 'laws' than those that were passed in [[Washington, D.C.]]&quot;&lt;ref name=&quot;Howell2014&quot;/&gt;<br /> <br /> In August of 2015, for a brief period, 8chan was blacklisted from [[Google Search]] for containing content constituting &quot;suspected child abuse content.&quot;&lt;ref name=ars-8chancensor&gt;{{cite web|title=8chan-hosted content disappears from Google searches|url=http://arstechnica.com/tech-policy/2015/08/8chan-hosted-content-disappears-from-google-searches/|last=Machkovech|first=Sam|website=[[Ars Technica]]|publisher=[[Condé Nast]]|date=August 14, 2015|accessdate=August 17, 2015}}&lt;/ref&gt; It was later restored to the search engine's listings without explanation.&lt;ref&gt;{{Cite web|url = https://medium.com/@infinitechan/google-is-not-your-friend-5a6636af0651|title = Google is not your friend?|date = August 13, 2015|accessdate = September 9, 2015|website = Medium|publisher = |last = Brennan|first = Frederick}}&lt;/ref&gt;<br /> <br /> ===Gamergate===<br /> {{main|Gamergate controversy}}<br /> On September 18, 2014, the website gained prominence in the [[Gamergate controversy]] after 4chan banned discussion of Gamergate,&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;/&gt;&lt;ref&gt;{{cite news|last=Audureau|first=William|title=4chan, wizardchan, 8chan... s'y retrouver dans la jungle des forums anonymes les plus populaires du Web|url=http://www.lemonde.fr/pixels/article/2014/10/15/4chan-wizardchan-8chan-le-guide-des-forums-anonymes-les-plus-populaires-du-web_4505380_4408996.html|work=[[Le Monde]]|location=France|language=French|date=October 15, 2014}}&lt;/ref&gt; whereupon 8chan became one of several hubs of Gamergate activity.&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;&gt;{{cite web|last=Chen|first=Adrian|date=October 27, 2014|url=http://nymag.com/daily/intelligencer/2014/10/gamergate-supporters-party-at-strip-club.html|title=Gamergate Supporters Partied at a Strip Club This Weekend|work=[[New York (magazine)]]}}&lt;/ref&gt;&lt;ref name=&quot;Buzz&quot;/&gt;&lt;ref name=&quot;Guardian 2015-01-13&quot; /&gt; &quot;/gg/,&quot; 8chan's initial Gamergate-oriented board, also gained attention after being compromised by members of the internet troll group [[Gay Nigger Association of America]], forcing Gamergate activists to migrate to &quot;/gamergate/.&quot; This replacement quickly became the site's second most populous board.&lt;ref name=&quot;Buzz&quot;&gt;{{cite web|last1=Bernstein|first1=Joseph|title=GamerGate’s Headquarters Has Been Destroyed By Trolls|url=http://www.buzzfeed.com/josephbernstein/gamergates-headquarters-has-been-destroyed-by-trolls|publisher=''[[Buzzfeed]]''|date=December 4, 2014}}&lt;/ref&gt;<br /> <br /> ===Swatting incidents===<br /> In January of 2015 the site was used as a base for [[swatting]] exploits in [[Portland, Oregon|Portland]], [[Seattle]], and [[Burnaby|Burnaby, British Columbia]], most of them tied to the victims' criticism of Gamergate and 8chan's association with it;&lt;ref name=&quot;Mattise&quot;&gt;{{cite web|last=Mattise|first=Nathan|date=January 4, 2015|url=http://arstechnica.com/tech-policy/2015/01/8chan-tries-swatting-gamergate-critic-sends-cops-to-an-old-address/|title=8chan tries &quot;swatting&quot; GamerGate critic, sends cops to an old address|work=[[Ars Technica]]}}&lt;/ref&gt; the attacks were coordinated on a [[Internet forum|board]] on the website called &quot;/baphomet/.&quot;&lt;ref name=&quot;Guardian 2015-01-13&quot;&gt;{{cite news |last=Hern |first=Alex |url=http://www.theguardian.com/technology/2015/jan/13/gamergate-hits-new-low-with-attempts-to-send-swat-teams-to-critics |title=Gamergate hits new low with attempts to send Swat teams to critics |work=[[The Guardian]] |date=January 13, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt; One of the victims of a swatting attack said that she was singled out because she had followed someone on [[Twitter]].&lt;ref name=&quot;GlobalNews 2015-01-15&quot;&gt;{{cite news |last=McElroy |first=Justin |url=http://globalnews.ca/news/1773840/police-called-to-burnaby-womens-home-by-online-harassers/ |title=Police falsely called to Burnaby women’s home by online harassers |work=[[Global News]] |date=January 15, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt;&lt;ref&gt;{{cite web|url=http://www.gameranx.com/updates/id/26081/article/canadian-victim-of-gamergate-swatting-attempt-comes-forward/|title=Canadian Victim of Gamergate SWATing Attempt Comes Forward|work=Gameranx|last=Cheong|first=Ian Miles|date=January 13, 2015|accessdate=January 16, 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://bc.ctvnews.ca/reckless-swatting-prank-sends-police-to-b-c-woman-s-home-1.2189547|title=Reckless ‘swatting’ prank sends police to B.C. woman’s home|work=[[CTV News]]|date=January 14, 2015|accessdate=September 30, 2015|author=&lt;!-- Staff writers --&gt;}}&lt;/ref&gt; On February 9, 2015, contents on the &quot;/baphomet/&quot; subboard were wiped after [[doxxing|personal information]] of [[Katherine B. Forrest|Katherine Forrest]], the presiding judge in the [[Silk Road (marketplace)|Silk Road]] case, had been posted there.&lt;ref name=&quot;silkroad&quot;&gt;{{Cite web| title = Notorious 8chan &quot;subboard&quot; has history wiped after federal judge’s doxing| first = Sam |last = Machkovech|work = Ars Technica| date = February 12, 2015| accessdate = February 13, 2015| url = http://arstechnica.com/security/2015/02/notorious-8chan-subboard-has-history-wiped-after-federal-judges-doxing/}}&lt;/ref&gt;<br /> <br /> ===Los Angeles school-closure incident===<br /> [[File:CWh686mUwAEQLoj.png|thumb|upright=0.35|alt=Photograph of Vincent Canfield|Owner and operator of cock.li, Vincent Canfield]]<br /> On Tuesday, December 15, 2015, the New York City and Los Angeles County Boards of Education were both sent a superficially threatening, but actually fraudulent, e-mail message that had originated from an 8chan-linked service called &quot;cock.li&quot;. The New York City school board did not take the message seriously, but the Los Angeles County school board refused to take the chance and ordered all public schools closed for the entire day, citing what it called a &quot;credible terror threat.&quot; Sam Biddle, a contributor to [[Gawker.com]], called the message &quot;extremely dumb&quot; in an article on the site he filed under &quot;Pranks,&quot; writing:<br /> {{cquote|Even if this message hadn’t been sent from a “cock.li” email account, it would’ve been hard to imagine it was a credible threat of violence, particularly since it conflates 4chan-style “death to the normies” rhetoric with convoluted Islamism. It looks very much like the work of a kid who really didn’t want to go to school.}}<br /> In the article, which he titled “Here’s the Full, Extremely Dumb Email That Shut Down the Entire L.A. Public School System,” Biddle quoted the e-mail message itself, word for word.&lt;br&gt;&lt;ref&gt;{{Cite web| title = Here’s the Full, Extremely Dumb Email That Shut Down the Entire L.A. Public School System| first = Sam |last = Biddle|work = Gawker| date = December 16, 2015| accessdate = December 16, 2015| url = http://gawker.com/heres-the-full-extremely-dumb-email-that-shut-down-the-1748402588/}}&lt;/ref&gt;<br /> <br /> ==External links==<br /> * {{Official website}}<br /> * &lt;nowiki&gt;oxwugzccvk3dk6tj.onion&lt;/nowiki&gt;&lt;ref&gt;{{cite web|title=ATTENTION TOR USERS: I accidentally released the PRIVATE key for the Tor hidden service into a public IRC channel. The Tor URL fullchan4jtta4sx.onion is now considered COMPROMISED and NOT OWNED by the 8chan administration. The new URL is oxwugzccvk3dk6tj.onion.|url=https://8ch.net/onion/res/357.html|accessdate=August 18, 2015}}&lt;/ref&gt; - [[.onion]] address for [[Tor (network)|Tor]] hidden service &lt;!-- SEE: http://web.archive.org/web/20150818121142/https://8ch.net/_g/1153.txt --&gt;<br /> * {{Twitter|infinitechan|8chan}}<br /> <br /> ==References==<br /> {{Reflist|30em}}<br /> <br /> {{Tor hidden services}}<br /> {{DEFAULTSORT:8chan}}<br /> [[Category:2channel]]<br /> [[Category:American websites]]<br /> [[Category:Community websites]]<br /> [[Category:Free web software]]<br /> [[Category:Internet forums]]<br /> [[Category:Imageboards]]<br /> [[Category:Internet properties established in 2013]]<br /> [[Category:Obscenity controversies]]<br /> [[Category:Tor hidden services]]<br /> [[Category:Virtual communities]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=8kun&diff=187755775 8kun 2015-12-22T08:05:49Z <p>Dsprc: /* History */ no src; paste likely to be challenged as well. tagged clarify</p> <hr /> <div>{{other uses|8chan (disambiguation)}}<br /> {{Use mdy dates|date=September 2015}}<br /> {{Infobox website<br /> | name = 8chan<br /> | logo =<br /> | screenshot = [[File:InfiniteChan∞chanLogo.svg|200px]]<br /> | alt = green infinity symbol left of the word chan.<br /> | caption = The ∞chan logo of 8ch.net.&lt;br&gt;It consists of a green &lt;br&gt;infinity symbol left of &lt;br&gt;the word &quot;chan.&quot;<br /> | url = {{URL|https://8ch.net}}<br /> | slogan = '''''Welcome to 8chan, the infinitely expanding imageboard.'''''<br /> | commercial = Yes<br /> | type = [[Imageboard]]<br /> | language = English, Japanese (users can create language specific boards)<br /> | registration = Optional<br /> | author = [[Fredrick Brennan]]<br /> | owner = [[:ja:ジム・ワトキンス|Jim Watkins]],&lt;br /&gt; N.T. Technology ([[2channel]])&lt;ref&gt;[https://8ch.net/who.html 8chan] - Who owns 8chan?&lt;/ref&gt;<br /> | launch date = {{start date and age|2013|10|22|df=no}}<br /> | alexa = {{IncreaseNegative}} 10,084 ({{as of|2015|8|22|alt=August 2015}})&lt;ref name=&quot;alexa&quot;&gt;{{cite web|url= http://www.alexa.com/siteinfo/8ch.net |title= 8ch.net Site Info | publisher= [[Alexa Internet]] |accessdate= August 22, 2015 }}&lt;/ref&gt;<br /> | current status = Online<br /> }}<br /> <br /> '''8chan,''' also called '''Infinitechan,''' is an [[English language|English-language]] [[imageboard]] website composed of user-created [[Internet forum|boards]]. Each board is moderated by its respective creator, with minimal interaction from other site administration.&lt;ref name=&quot;faq&quot;&gt;{{cite web|last=Brennan|first=Fredrick|url=https://8ch.net/faq.html|title=FAQ|publisher=Infinitechan|website=8chan.co|accessdate=November 23, 2014}}&lt;/ref&gt;<br /> <br /> The site has received both praise and criticism for its stance on [[Freedom of speech|free speech]], which involves allowing any content to be posted, so long as it adheres to United States law.<br /> <br /> Several sites's boards have played an active role in the [[Gamergate controversy]], encouraging Gamergate affiliates to frequent 8chan after the topic was banned on the unaffiliated imageboard [[4chan]]. As of August of 2015, the site was the 10,204th most visited site in the world,&lt;ref name=&quot;alexa&quot; /&gt; and in November of 2014, it was receiving an average of 35,000 unique visitors per day and 400,000 posts per week when it was at a higher rank.&lt;ref name=Howell2014 /&gt;<br /> <br /> ==History==<br /> 8chan was created in October of 2013 by computer programmer [[Fredrick Brennan]],&lt;ref name=Howell2014 /&gt;&lt;ref&gt;{{cite web|last1=Machkovech|first1=Sam|title=Full transcript: Ars interviews 8chan founder Fredrick Brennan|url=http://arstechnica.com/business/2015/03/full-transcript-ars-interviews-8chan-founder-fredrick-brennan/|publisher=Ars Technica|accessdate=June 15, 2015|date=March 17, 2015}}&lt;/ref&gt; also known by the nickname &quot;Hotwheels.&quot;&lt;ref name=&quot;KYM&quot;/&gt; Brennan created the website after he observed what he perceived to be rapidly escalating [[surveillance]] and a loss of [[free speech]] on the Internet.&lt;ref name=Howell2014 /&gt; Brennan, who considers the imageboard [[4chan]] to have grown into authoritarianism, describes 8chan as a &quot;free-speech-friendly&quot; alternative,&lt;ref name=&quot;Howell2014&quot;&gt;{{cite web|last=Howell O'Neill|first=Patrick|date=November 17, 2014|url=http://www.dailydot.com/politics/8chan-pedophiles-child-porn-gamergate/|title=8chan, the central hive of Gamergate, is also an active pedophile network|work=The Daily Dot}}&lt;/ref&gt; and had originally conceptualized the site while experiencing a [[psychedelic experience|psychedelic mushrooms trip]].&lt;ref name=&quot;KYM&quot;/&gt;&lt;ref name=WashPost /&gt;<br /> <br /> No experience or programming knowledge is necessary for users to create their own boards.&lt;ref name=&quot;faq&quot; /&gt; Since as early as March of 2014, its [[FAQ]] has stated only one rule that is to be globally enforced: &quot;Do not post, request, or link to any content illegal in the United States of America. Do not create boards with the sole purpose of posting or spreading such content.&quot;&lt;ref name=&quot;faq&quot; /&gt; Brennan has claimed that, while he finds some of the content posted by users to be &quot;reprehensible,&quot; he feels personally obligated to uphold the site's integrity by tolerating discussion he does not necessarily support regardless of his moral stance.&lt;ref name=Howell2014 /&gt;<br /> <br /> Brennan agreed to partner 8chan with the Japanese message board [[2channel]],&lt;ref name=&quot;KYM&quot;&gt;{{cite web|url=http://knowyourmeme.com/blog/interviews/qa-with-fredrick-brennan-of-8chan|title=Q&amp;A with Fredrick Brennan of 8chan|last=Caldwell|first=Don|date=October 9, 2014|work=[[Know Your Meme]]|accessdate=December 18, 2014}}&lt;/ref&gt; and subsequently relocated to the [[Philippines]] in October 2014.&lt;ref name=Chen /&gt;<br /> <br /> In January of 2015, the site changed its [[Domain name|domain]] 8chan.co to 8ch.net after multiple people filed reports complaining to 8chan’s [[Domain name registrar|registrar]] that the message board hosted [[child pornography]]. Despite subsequently regaining the domain, the site remained at 8ch.net, with the old domain redirecting to it.&lt;ref name=WashPost /&gt;<br /> <br /> Numerous bugs in the Infinity software led to the funding and development of a successor platform dubbed &quot;Infinity Next&quot;. After a several-month-long testing period, a migration to the new software was attempted in December 2015, but failed.&lt;ref&gt;{{cite web |url=https://ghostbin.com/paste/qt2ww |format=Plaintext |title=qt2ww |last=Moon |first=Joshua |date=2015-12-19 |accessdate=2015-12-20 }}&lt;/ref&gt;{{clarify|date=December 2015}}<br /> <br /> ==Controversies==<br /> ===Child pornography===<br /> ''[[The Washington Post]]'' described it as &quot;the more-lawless, more-libertarian, more 'free' follow-up to 4chan.&quot;&lt;ref name=&quot;WashPost&quot;&gt;{{cite web|url=http://www.washingtonpost.com/news/the-intersect/wp/2015/01/13/this-is-what-happens-when-you-create-an-online-community-without-any-rules/|title=This is what happens when you create an online community without any rules|work=[[The Washington Post]]|last=Caitlin|first=Dewey|date=January 13, 2015}}&lt;/ref&gt; Boards have been created to discuss controversial topics, including [[pedophilia]]. While the sharing of illegal content is against site rules, ''[[The Daily Dot]]'' wrote that boards do exist to share sexualized images of minors in provocative poses, and that some users of those boards do post links to explicit child pornography hosted elsewhere.&lt;ref name=&quot;Howell2014&quot;/&gt; When asked whether such boards were an inevitable result of free speech, Brennan responded, &quot;Unfortunately, yes. I don’t support the content on the boards you mentioned, but it is simply the cost of free speech and being the only active site to not impose more 'laws' than those that were passed in [[Washington, D.C.]]&quot;&lt;ref name=&quot;Howell2014&quot;/&gt;<br /> <br /> In August of 2015, for a brief period, 8chan was blacklisted from [[Google Search]] for containing content constituting &quot;suspected child abuse content.&quot;&lt;ref name=ars-8chancensor&gt;{{cite web|title=8chan-hosted content disappears from Google searches|url=http://arstechnica.com/tech-policy/2015/08/8chan-hosted-content-disappears-from-google-searches/|last=Machkovech|first=Sam|website=[[Ars Technica]]|publisher=[[Condé Nast]]|date=August 14, 2015|accessdate=August 17, 2015}}&lt;/ref&gt; It was later restored to the search engine's listings without explanation.&lt;ref&gt;{{Cite web|url = https://medium.com/@infinitechan/google-is-not-your-friend-5a6636af0651|title = Google is not your friend?|date = August 13, 2015|accessdate = September 9, 2015|website = Medium|publisher = |last = Brennan|first = Frederick}}&lt;/ref&gt;<br /> <br /> ===Gamergate===<br /> {{main|Gamergate controversy}}<br /> On September 18, 2014, the website gained prominence in the [[Gamergate controversy]] after 4chan banned discussion of Gamergate,&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;/&gt;&lt;ref&gt;{{cite news|last=Audureau|first=William|title=4chan, wizardchan, 8chan... s'y retrouver dans la jungle des forums anonymes les plus populaires du Web|url=http://www.lemonde.fr/pixels/article/2014/10/15/4chan-wizardchan-8chan-le-guide-des-forums-anonymes-les-plus-populaires-du-web_4505380_4408996.html|work=[[Le Monde]]|location=France|language=French|date=October 15, 2014}}&lt;/ref&gt; whereupon 8chan became one of several hubs of Gamergate activity.&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;&gt;{{cite web|last=Chen|first=Adrian|date=October 27, 2014|url=http://nymag.com/daily/intelligencer/2014/10/gamergate-supporters-party-at-strip-club.html|title=Gamergate Supporters Partied at a Strip Club This Weekend|work=[[New York (magazine)]]}}&lt;/ref&gt;&lt;ref name=&quot;Buzz&quot;/&gt;&lt;ref name=&quot;Guardian 2015-01-13&quot; /&gt; &quot;/gg/,&quot; 8chan's initial Gamergate-oriented board, also gained attention after being compromised by members of the internet troll group [[Gay Nigger Association of America]], forcing Gamergate activists to migrate to &quot;/gamergate/.&quot; This replacement quickly became the site's second most populous board.&lt;ref name=&quot;Buzz&quot;&gt;{{cite web|last1=Bernstein|first1=Joseph|title=GamerGate’s Headquarters Has Been Destroyed By Trolls|url=http://www.buzzfeed.com/josephbernstein/gamergates-headquarters-has-been-destroyed-by-trolls|publisher=''[[Buzzfeed]]''|date=December 4, 2014}}&lt;/ref&gt;<br /> <br /> ===Swatting incidents===<br /> In January of 2015 the site was used as a base for [[swatting]] exploits in [[Portland, Oregon|Portland]], [[Seattle]], and [[Burnaby|Burnaby, British Columbia]], most of them tied to the victims' criticism of Gamergate and 8chan's association with it;&lt;ref name=&quot;Mattise&quot;&gt;{{cite web|last=Mattise|first=Nathan|date=January 4, 2015|url=http://arstechnica.com/tech-policy/2015/01/8chan-tries-swatting-gamergate-critic-sends-cops-to-an-old-address/|title=8chan tries &quot;swatting&quot; GamerGate critic, sends cops to an old address|work=[[Ars Technica]]}}&lt;/ref&gt; the attacks were coordinated on a [[Internet forum|board]] on the website called &quot;/baphomet/.&quot;&lt;ref name=&quot;Guardian 2015-01-13&quot;&gt;{{cite news |last=Hern |first=Alex |url=http://www.theguardian.com/technology/2015/jan/13/gamergate-hits-new-low-with-attempts-to-send-swat-teams-to-critics |title=Gamergate hits new low with attempts to send Swat teams to critics |work=[[The Guardian]] |date=January 13, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt; One of the victims of a swatting attack said that she was singled out because she had followed someone on [[Twitter]].&lt;ref name=&quot;GlobalNews 2015-01-15&quot;&gt;{{cite news |last=McElroy |first=Justin |url=http://globalnews.ca/news/1773840/police-called-to-burnaby-womens-home-by-online-harassers/ |title=Police falsely called to Burnaby women’s home by online harassers |work=[[Global News]] |date=January 15, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt;&lt;ref&gt;{{cite web|url=http://www.gameranx.com/updates/id/26081/article/canadian-victim-of-gamergate-swatting-attempt-comes-forward/|title=Canadian Victim of Gamergate SWATing Attempt Comes Forward|work=Gameranx|last=Cheong|first=Ian Miles|date=January 13, 2015|accessdate=January 16, 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://bc.ctvnews.ca/reckless-swatting-prank-sends-police-to-b-c-woman-s-home-1.2189547|title=Reckless ‘swatting’ prank sends police to B.C. woman’s home|work=[[CTV News]]|date=January 14, 2015|accessdate=September 30, 2015|author=&lt;!-- Staff writers --&gt;}}&lt;/ref&gt; On February 9, 2015, contents on the &quot;/baphomet/&quot; subboard were wiped after [[doxxing|personal information]] of [[Katherine B. Forrest|Katherine Forrest]], the presiding judge in the [[Silk Road (marketplace)|Silk Road]] case, had been posted there.&lt;ref name=&quot;silkroad&quot;&gt;{{Cite web| title = Notorious 8chan &quot;subboard&quot; has history wiped after federal judge’s doxing| first = Sam |last = Machkovech|work = Ars Technica| date = February 12, 2015| accessdate = February 13, 2015| url = http://arstechnica.com/security/2015/02/notorious-8chan-subboard-has-history-wiped-after-federal-judges-doxing/}}&lt;/ref&gt;<br /> <br /> ===Los Angeles school-closure incident===<br /> [[File:CWh686mUwAEQLoj.png|thumb|upright=0.35|alt=Photograph of Vincent Canfield|Owner and operator of cock.li, Vincent Canfield]]<br /> On Tuesday, December 15, 2015, the New York City and Los Angeles County Boards of Education were both sent a superficially threatening, but actually fraudulent, e-mail message that had originated from an 8chan-linked service called &quot;cock.li&quot;. The New York City school board did not take the message seriously, but the Los Angeles County school board refused to take the chance and ordered all public schools closed for the entire day, citing what it called a &quot;credible terror threat.&quot; Sam Biddle, a contributor to [[Gawker.com]], called the message &quot;extremely dumb&quot; in an article on the site he filed under &quot;Pranks,&quot; writing:<br /> {{cquote|Even if this message hadn’t been sent from a “cock.li” email account, it would’ve been hard to imagine it was a credible threat of violence, particularly since it conflates 4chan-style “death to the normies” rhetoric with convoluted Islamism. It looks very much like the work of a kid who really didn’t want to go to school.}}<br /> In the article, which he titled “Here’s the Full, Extremely Dumb Email That Shut Down the Entire L.A. Public School System,” Biddle quoted the e-mail message itself, word for word.&lt;br&gt;&lt;ref&gt;{{Cite web| title = Here’s the Full, Extremely Dumb Email That Shut Down the Entire L.A. Public School System| first = Sam |last = Biddle|work = Gawker| date = December 16, 2015| accessdate = December 16, 2015| url = http://gawker.com/heres-the-full-extremely-dumb-email-that-shut-down-the-1748402588/}}&lt;/ref&gt;<br /> <br /> ==External links==<br /> * {{Official website}}<br /> * &lt;nowiki&gt;oxwugzccvk3dk6tj.onion&lt;/nowiki&gt;&lt;ref&gt;{{cite web|title=ATTENTION TOR USERS: I accidentally released the PRIVATE key for the Tor hidden service into a public IRC channel. The Tor URL fullchan4jtta4sx.onion is now considered COMPROMISED and NOT OWNED by the 8chan administration. The new URL is oxwugzccvk3dk6tj.onion.|url=https://8ch.net/onion/res/357.html|accessdate=August 18, 2015}}&lt;/ref&gt; - [[.onion]] address for [[Tor (network)|Tor]] hidden service &lt;!-- SEE: http://web.archive.org/web/20150818121142/https://8ch.net/_g/1153.txt --&gt;<br /> * {{Twitter|infinitechan|8chan}}<br /> <br /> ==References==<br /> {{Reflist|30em}}<br /> <br /> {{Tor hidden services}}<br /> {{DEFAULTSORT:8chan}}<br /> [[Category:2channel]]<br /> [[Category:American websites]]<br /> [[Category:Community websites]]<br /> [[Category:Free web software]]<br /> [[Category:Internet forums]]<br /> [[Category:Imageboards]]<br /> [[Category:Internet properties established in 2013]]<br /> [[Category:Obscenity controversies]]<br /> [[Category:Tor hidden services]]<br /> [[Category:Virtual communities]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=HackingTeam&diff=177174967 HackingTeam 2015-11-02T10:21:54Z <p>Dsprc: /* Customer List */ if no evidence of sales taking place that has been published by 3rd party org (emails are 1st party), then we can not include IE DefForce within customer list</p> <hr /> <div>{{Primary sources|date=July 2015}}<br /> <br /> {{Infobox company<br /> | name = Hacking Team<br /> | logo = Hacking Team logo.png<br /> | logo_size = <br /> | logo_alt = The words Hacking Team enclosed with in reversed square brackets &lt;nowiki&gt;][&lt;/nowiki&gt;<br /> | logo_caption = Company logo<br /> | logo_padding = <br /> | image = <br /> | image_size = <br /> | image_alt = <br /> | image_caption = <br /> | type = <br /> | industry = [[Information technology]]<br /> | founded = 2003<br /> | founders = David Vincenzetti, Valeriano Bedeschi<br /> | hq_location = <br /> | hq_location_city = [[Milan]]<br /> | hq_location_country = [[Italy]]<br /> | area_served = &lt;!-- or: | areas_served = --&gt;<br /> | key_people = Alberto Ornaghi, Marco Valleri<br /> | products = {{unbulleted list|Software}}<br /> | brands = <br /> | services = <br /> | owner = &lt;!-- or: | owners = --&gt;<br /> | website = {{URL|http://www.hackingteam.it/}}<br /> }}<br /> <br /> '''Hacking Team''' is a [[Milan]]-based [[information technology]] company that sells offensive intrusion and [[surveillance]] capabilities to governments, law enforcement agencies and corporations.&lt;ref name=spies&gt;{{cite web |title=The spies behind your screen |url=http://www.telegraph.co.uk/technology/8899353/The-spies-behind-your-screen.html |author=Batey, Angus |date=24 November 2011 |publisher=''The Telegraph'' |accessdate=26 July 2015}}&lt;/ref&gt; Its &quot;''Remote Control Systems''&quot; enable governments and corporations to monitor the communications of internet users, decipher their [[cryptography|encrypted]] files and emails, record [[Skype]] and other [[Voice over IP]] communications, and remotely activate microphones and camera on target computers.&lt;ref&gt;{{cite web|title=Enemies of the Internet: Hacking Team|url=http://surveillance.rsf.org/en/hacking-team/|work=[[Reporters Without Borders]]|accessdate=24 April 2014}}&lt;/ref&gt; The company has been criticized for providing these capabilities to governments with poor [[human rights]] records.&lt;ref&gt;{{cite web | last3 = Marquis-Boire | first3 = Morgan | last1 = Marczak | first1 = Bill | last2 = Gaurnieri | first2 = Claudio | last4 = Scott-Railton | first4 = John | title = Mapping Hacking Team's &quot;Untraceable&quot; Spyware | url = https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ | date = February 17, 2014}}&lt;/ref&gt; Hacking Team states that they have the ability to disable their software if it is used unethically.&lt;ref&gt;{{cite news|url=http://www.newyorker.com/online/blogs/elements/2014/03/hacked-by-ones-own-government.html|title=Hackers Without Borders|last=Kopstein|first=Joshua|work=[[The New Yorker]]|date=10 March 2014|accessdate=24 April 2014}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|url = https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/|title = Police Story: Hacking Team’s Government Surveillance Malware|date = June 24, 2014|accessdate = August 3, 2014|website = Citizen Lab|publisher = University of Toronto|last1 = Marquis-Boire|first1 = Morgan | last2 = Gaurnieri | first2 = Claudio | first3 = John | last3 = Scott-Railton | first4 = Katie | last4 = Kleemola }}&lt;/ref&gt;<br /> <br /> Hacking Team employs around 40 people in its Italian office, and has subsidiary branches in [[Annapolis]], [[Washington, D.C.]] and [[Singapore]].&lt;ref name=know&gt;''[[Human Rights Watch]]'' (25 March 2014). ''&quot;[https://www.hrw.org/report/2014/03/25/they-know-everything-we-do/telecom-and-internet-surveillance-ethiopia They Know Everything We Do]&quot;''. Retrieved 1 August 2015.&lt;/ref&gt; Its products are in use in dozens of countries across six continents.&lt;ref name=Jeffries&gt;{{cite web|last=Jeffries|first=Adrianne|title=Meet Hacking Team, the company that helps the police hack you|url=http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers|accessdate=21 April 2014|work=[[The Verge]]|date=13 September 2013}}&lt;/ref&gt;<br /> <br /> ==History==<br /> Hacking Team was started by two Italian programmers: Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri created a set of tools that could be used to monitor and remotely manipulate target computers. The program, called [[Ettercap (software)|Ettercap]], was embraced both by hackers looking to spy on people, and by companies that hoped to test the security of their own networks.<br /> <br /> The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their [[Skype]] calls, the police contacted Ornaghi and Valleri and asked them to help modify the program. Hacking Team was born, and became &quot;the first sellers of commercial hacking software to the police.&quot;&lt;ref name=Jeffries/&gt;<br /> <br /> According to former employee Alberto Pelliccione, the company began as security services provider, offering [[penetration testing]], auditing and other defensive capabilities to clients.&lt;ref name=war&gt;Farivar, Cyrus (20 July 2015) &quot;''[http://arstechnica.com/security/2015/07/italian-prosecutors-investigate-former-hacking-team-employees-for-role-in-hack/ ''Hacking Team goes to war against former employees, suspects some helped hackers]''&quot;. ''Ars Technica''. Retrieved 26 July 2015.&lt;/ref&gt; Pelliccione states that as malware and other offensive capabilities were developed and accounted for a larger percentage of revenues, the organization pivoted in a more offensive direction and became increasingly compartmentalized. Pelliccione claims fellow employees working on aspects of the same platform - for example, Android exploits and payloads - would not communicate with one another, possibly leading to tensions and strife within the organization.&lt;ref name=war/&gt;<br /> <br /> In February 2014, a report from [[Citizen Lab]] identified the organisation to be using hosting services from [[Linode]], [[Telecom Italia]], [[Rackspace]], [[NOC4Hosts]] and notorious [[bullet proof hosting]] company [[Santrex]].&lt;ref&gt;{{cite news|title=Hacking Team’s US Nexus|url=https://citizenlab.org/2014/02/hacking-teams-us-nexus/|accessdate=2 August 2015|date=28 February 2014}}&lt;/ref&gt;<br /> <br /> On July 5, 2015 the company suffered a major data breach of customer data, software code, internal documents and emails. - ''See: [[#2015 data breach|§ 2015 data breach]]''<br /> <br /> ==Capabilities==<br /> Hacking Team enables clients to perform remote monitoring functions against citizens via their &quot;''Remote Control Systems''&quot; (RCS), including their &quot;Da Vinci&quot; and &quot;Galileo&quot; platforms:&lt;ref name=spies/&gt;<br /> <br /> *Covert collection of emails, text message, phone call history and address books<br /> *[[Keystroke logging]]<br /> *Uncover search history data and take screenshots<br /> *Record audio from phone calls<br /> :*Capture audio and video stream from device memory to bypass [[cryptography]] of [[Skype]] sessions&lt;ref&gt;{{cite web | title=Mideast Uses Western Tools to Battle the Skype Rebellion |url=http://www.wsj.com/articles/SB10001424052702304520804576345970862420038 |author=Stecklow, Steve; Sonne, Paul; Bradley, Matt |date=1 June 2011 |publisher=''Wall Street Journal'' |accessdate=26 July 2015}}&lt;/ref&gt;<br /> :*Use microphones on device to collect ambient background noise and conversations<br /> *Activate phone or computer cameras<br /> *Hijack telephone GPS systems to monitor target's location<br /> *Infect target computer's [[UEFI]] [[BIOS]] [[firmware]] with a [[rootkit]]&lt;ref&gt;{{Cite web|first=Philippe |last=Lin |url=http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-uses-uefi-bios-rootkit-to-keep-rcs-9-agent-in-target-systems/ |title=Hacking Team Uses UEFI BIOS Rootkit to Keep RCS 9 Agent in Target Systems |work=TrendLabs Security Intelligence Blog |publisher=[[Trend Micro]] |date=July 13, 2015 |accessdate=July 26, 2015}}&lt;/ref&gt;<br /> *Extract WiFi passwords&lt;ref name=skiddies&gt;[http://arstechnica.com/security/2015/07/advanced-spyware-for-android-now-available-to-script-kiddies-everywhere/ &quot;Advanced spyware for Android now available to script kiddies everywhere&quot;]. ''Ars Technica''. Retrieved on 2 August 2015.&lt;/ref&gt;<br /> *Exfiltrate [[Bitcoin]] and other cryptocurrency wallet files to collect data on local accounts, contacts and transaction histories.&lt;ref name=coin&gt;Farivar, Cyrus (14 July 2015). &quot;''[http://arstechnica.com/security/2015/07/hacking-team-broke-bitcoin-secrecy-by-targeting-crucial-wallet-file/ Hacking Team broke Bitcoin secrecy by targeting crucial wallet file]''&quot;. ''Ars Technica''. Retrieved 26 July 2015.&lt;/ref&gt;<br /> <br /> Hacking Team uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.&lt;ref&gt;{{cite news|last1=Schneier|first1=Bruce|title=More on Hacking Team's Government Spying Software|url=https://www.schneier.com/blog/archives/2014/06/more_on_hacking.html}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Hacking Team Tools Allow Governments To Take Full Control of Your Smartphone|url = http://www.ibtimes.co.uk/hacking-team-tools-allow-governments-take-full-control-your-smartphone-1453987|accessdate = 2015-07-06}}&lt;/ref&gt;<br /> <br /> The malware has payloads for [[Android (operating system)|Android]],&lt;ref name=skiddies/&gt; [[BlackBerry]], Apple [[iOS]], [[Linux]], [[Mac OS X]], [[Symbian]], as well as [[Microsoft Windows]], [[Windows Mobile]] and [[Windows Phone]] class of [[operating system]]s.&lt;ref name=C3&gt;Guarnieri, Claudio; Marquis-Boire, Morgan (13 January 2014). ''[https://media.ccc.de/browse/congress/2013/30C3_-_5439_-_en_-_saal_1_-_201312292105_-_to_protect_and_infect_-_claudio_guarnieri_-_morgan_marquis-boire.html &quot;To Protect And Infect: The militarization of the Internet&quot;]''. At the 30th [[Chaos Communications Congress]] – &quot;30C3&quot;. (Video or Audio). [[Chaos Computer Club]]. Retrieved on 15 August 2015.&lt;/ref&gt;<br /> <br /> RCS is a management platform that allows operators to remotely deploy exploits and payloads against targeted systems, remotely manage devices once compromised, and exfiltrate data for remote analysis.<br /> <br /> == Human rights implications ==<br /> Hacking Team has been criticized for selling its products and services to governments with poor human rights records, including [[Sudan]], [[Bahrain]], and [[Saudi Arabia]].&lt;ref name=repress/&gt;<br /> <br /> In June 2014, a United Nations panel monitoring the implementation of sanctions on Sudan requested information from Hacking Team about their alleged sales of software to the country in contravention of United Nations weapons export bans to Sudan. Documents leaked in the 2015 data breach of Hacking Team revealed the organization sold Sudanese National Intelligence and Security Service access to their &quot;Remote Control System&quot; software in 2012 for 960,000 Euros.&lt;ref name=repress/&gt;&lt;ref&gt;{{Cite web|title = A Company That Sells Surveillance Software to Authoritarian Regimes Got Hacked Itself|url = http://www.slate.com/blogs/future_tense/2015/07/06/hacking_team_which_sells_spyware_to_governments_was_hacked_itself.html|accessdate = 2015-07-06|first = Lily|last = Hay Newman}}&lt;/ref&gt;<br /> <br /> In response to the United Nations panel, the company responded in January 2015 that they were not currently selling to Sudan. In a follow-up exchange, Hacking Team asserted that their product was not controlled as a weapon, and so the request was beyond the scope of the panel. There was no need for them to disclose previous sales, which they considered confidential business information.&lt;ref name=repress&gt;{{Cite web |title=A Detailed Look at Hacking Team’s Emails About Its Repressive Clients |url=https://firstlook.org/theintercept/2015/07/07/leaked-documents-confirm-hacking-team-sells-spyware-repressive-countries/ |accessdate=7 July 2015 |first1=Cora |last1=Currier |first2=Morgan |last2=Marquis-Boire}}&lt;/ref&gt;&lt;ref&gt;{{Cite web |title=Hacking Team Leaks Reveal Spyware Industry's Growth, Negligence of Human Rights |url=https://www.eff.org/deeplinks/2015/07/hacking-team-leaks-reveal-spyware-industrys-growth |accessdate=8 July 2015 |first=Sarah |last=Myers West}}&lt;/ref&gt;<br /> <br /> The U.N. disagreed. “The view of the panel is that as such software is ideally suited to support military electronic intelligence (ELINT) operations it may potentially fall under the category of ‘military … equipment’ or ‘assistance’ related to prohibited items,” the secretary wrote in March. “Thus its potential use in targeting any of the belligerents in the Darfur conflict is of interest to the Panel.”&lt;ref name=repress/&gt;&lt;ref&gt;{{Cite web|title = Hacking Team's Lame Excuse for Selling Digital Weapons to Sudan|url = http://gizmodo.com/hacking-teams-lame-excuse-for-selling-digital-weapons-t-1716375503|accessdate = 2015-07-08|first = Kate|last = Knibbs}}&lt;/ref&gt;<br /> <br /> In the fall of 2014, the Italian government abruptly froze all of Hacking Team’s exports, citing human rights concerns. After lobbying Italian officials, the company eventually won back the right to sell its products abroad.&lt;ref name=repress/&gt;<br /> <br /> == 2015 data breach ==<br /> <br /> On July 5, 2015, the [[Twitter]] account of the company was compromised by an unknown individual who published an announcement of a [[data breach]] against Hacking Team's computer systems. The initial message read, &quot;''Since we have nothing to hide, we're publishing all our e-mails, files, and source code …''&quot; and provided links to over 400 [[gigabyte]]s of data, including alleged internal e-mails, invoices, and [[source code]]; which were leaked via [[BitTorrent]] and [[Mega (service)|Mega]].&lt;ref&gt;{{Wayback|url=https://twitter.com/hackingteam|title=Hacked Team (@hackingteam)|date=20150706010312}}&lt;/ref&gt; An announcement of the data breach, including a link to the bittorrent seed, was retweeted by [[WikiLeaks]] and by many others through social media.&lt;ref&gt;{{Twitter status|wikileaks|617865712611233792|Inside malware makers &quot;Hacking Team&quot;: hundreds of gigabytes of e-mails, files, and source code|[[WikiLeaks]]|July 6, 2015|July 6, 2015}}&lt;/ref&gt;&lt;ref name=&quot;ibtimes.co.uk&quot;&gt;{{Cite web|title = Hacking Team hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan|url = http://www.ibtimes.co.uk/hacking-team-hacked-spy-tools-sold-oppressive-regimes-sudan-bahrain-kazakhstan-1509460|accessdate = 2015-07-06}}&lt;/ref&gt;<br /> <br /> The material was voluminous and early analysis appeared to reveal that Hacking Team had invoiced the [[Lebanese Army]]&lt;ref&gt;{{Twitter|url=https://twitter.com/SynAckPwn/status/617955067006578689}} {{dead link|date=July 2015}}&lt;/ref&gt; and [[Sudan]] and that spy tools were also sold to [[Bahrain]] and [[Kazakhstan]].&lt;ref name=&quot;ibtimes.co.uk&quot;/&gt; Hacking Team had previously claimed they had never done business with Sudan.&lt;ref&gt;{{Cite web|title = Hacking Team hacked, attackers claim 400GB in dumped data|url = http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html|accessdate = 2015-07-06|first = Steve|last = Ragan}}&lt;/ref&gt;<br /> <br /> The leaked data revealed a [[zero-day (computing)|zero-day]] cross-platform Flash exploit ([[Common Vulnerabilities and Exposures|CVE]] number: CVE-2015-5119).&lt;ref&gt;{{Cite web|title = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html|url = https://helpx.adobe.com/security/products/flash-player/apsa15-03.html}}&lt;/ref&gt; The dump included a demo of this exploit by opening [[Calculator (computer program)|Calculator]] from a test webpage.&lt;ref&gt;{{Cite web|title = Zero-Day Flash Player Exploit Disclosed In 'Hacking Team' Data Dump|url = http://thehackernews.com/2015/07/flash-zero-day-vulnerability.html|accessdate = 2015-07-06|first = Swati|last = Khandelwal}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Unpatched Flash Player Flaw, More POCs Found in Hacking Team Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/|accessdate = 2015-07-08|first = Peter|last = Pi}}&lt;/ref&gt; Adobe [[software patch|patched]] the hole on July 8, 2015.&lt;ref&gt;{{Cite web|title = Adobe Security Bulletin|url = https://helpx.adobe.com/security/products/flash-player/apsb15-16.html|accessdate = 2015-07-11|last = Adobe Systems (corporate author)}}&lt;/ref&gt; Another vulnerability involving Adobe was revealed in the dumps, which took advantage of a [[buffer overflow]] attack on an Adobe Open Type Manager [[Dynamic-link library|DLL]] included with [[Microsoft Windows]]. The DLL is run in [[protection ring|kernel mode]], so the attack could perform [[privilege escalation]] to bypass the [[sandbox (computer security)|sandbox]].&lt;ref&gt;{{Cite web|title = A Look at the Open Type Font Manager Vulnerability from the Hacking Team Leak|url = http://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-the-open-type-font-manager-vulnerability-from-the-hacking-team-leak/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29|accessdate = 2015-07-08|first = Jack|last = Tang}}&lt;/ref&gt;<br /> <br /> Also revealed in leaked data was Hacking Team employees' use of weak passwords, including 'P4ssword', 'wolverine', and 'universo'.&lt;ref&gt;{{Cite web|title = Hacking Team used shockingly bad passwords|url = http://www.zdnet.com/article/no-wonder-hacking-team-got-hacked/|accessdate = 2015-07-06|first = Zack|last = Whittaker}}&lt;/ref&gt;<br /> <br /> After a few hours without response from Hacking Team, member Christian Pozzi tweeted the company was working closely with police and &quot;''what the attackers are claiming regarding our company is not true.''&quot;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964180042190848|accessdate = 2015-07-06}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964660705234944|accessdate = 2015-07-06}}&lt;/ref&gt; He also claimed the leaked archive &quot;contains a virus&quot; and that it constituted &quot;false info&quot;.&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617962663188926465|accessdate = 2015-07-06}}&lt;/ref&gt; Shortly after these tweets, Pozzi's Twitter account itself was apparently compromised.&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter: &quot;Uh Oh - my twitter account was also hacked.&quot;|url = https://web.archive.org/web/20150706084837/https://twitter.com/christian_pozzi/status/617977753250496512|date = 2015-07-06|accessdate = 2015-07-06}}&lt;/ref&gt;<br /> <br /> Responsibility for this attack was claimed by the hacker known as Phineas Fisher on Twitter.&lt;ref&gt;{{cite tweet | user=gammagrouppr | author=Phineas Fisher | number=617937092497178624 | title=gamma and HT down, a few more to go :) | date=6 July 2015}}&lt;/ref&gt; Phineas has previously attacked spyware firm Gamma International, who produce malware, such as [[FinFisher]], for governments and corporations.&lt;ref&gt;{{Cite web|title = Hacking Team: We won't 'shrivel up and go away' after cyberattack|url = http://www.zdnet.com/article/hacking-team-cyberattack-aftermath-interview/|accessdate = 2015-07-06|first = Charlie|last = Osbourne}}&lt;/ref&gt;<br /> <br /> === Customer List ===<br /> {{Table to prose|section|date=September 2015}}<br /> Hacking Team's clientele include not just governments, but also corporate clients such as [[Barclay's]] Bank and [[British Telecom]] (BT) of the [[United Kingdom]], as well as [[Deutsche Bank]] of [[Germany]].&lt;ref name=spies/&gt;<br /> <br /> A full list of Hacking Team's customers were leaked in the 2015 breach. Disclosed documents show Hacking Team had 70 current customers, mostly military, police, federal and provincial governments. The total company revenues disclosed exceeded 40 million [[Euro]]s.&lt;ref&gt;{{cite web |author=Kopstein, Justin |title= Here Are All the Sketchy Government Agencies Buying Hacking Team's Spy Tech |url=http://motherboard.vice.com/read/here-are-all-the-sketchy-government-agencies-buying-hacking-teams-spy-tech |publisher=Vice Magazine |date=6 July 2015<br /> }}&lt;/ref&gt;&lt;ref&gt;{{cite web |author=Weissman, Cale Guthrie |title=Hacked security company's documents show a laundry list of questionable clients |url=http://www.businessinsider.com/hacked-security-companys-document-2015-7 |date=6 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |author=Ragan, Steve |title=In Pictures: Hacking Team's hack curated |url=http://www.cso.com.au/slideshow/579158/pictures-hacking-team-hack-curated/?image=9 |publisher=CSO Online (Australia)}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=Hacking Team hacked: firm sold spying tools to repressive regimes, documents claim |url=http://www.theguardian.com/technology/2015/jul/06/hacking-team-hacked-firm-sold-spying-tools-to-repressive-regimes-documents-claim |author=Hern, Alex |publisher=''The Guardian'' |date=6 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=Hacking Team responds to data breach, issues public threats and denials |url=http://www.csoonline.com/article/2944333/data-breach/hacking-team-responds-to-data-breach-issues-public-threats-and-denials.html |author=Ragan, Steve |publisher=''CSO Online'' |date=6 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web |title=A whole bunch of downed government surveillance programs are about to go back online |url=http://www.businessinsider.com/hacking-team-promises-customers-they-can-resume-surveillance-operations-soon-2015-7 |author=Stevenson, Alastair |publisher=''Business Insider'' |date=14 July 2015 |access-date=22 July 2015}}&lt;/ref&gt;<br /> <br /> {| class=&quot;wikitable sortable&quot;<br /> |-<br /> ! Customer<br /> ! Country<br /> ! Area<br /> ! Agency<br /> ! Year First Sale<br /> ! Annual Maintenance Fees<br /> ! Total Client Revenues<br /> |-<br /> | [[Polizia Postale e delle Comunicazioni]]&lt;ref&gt;Jone Pierantonio. [http://it.ibtimes.com/cyber-space/ecco-chi-ha-bucato-hacking-team-1408915 &quot;Ecco chi ha bucato Hacking Team&quot;]. ''International Business Times''. Retrieved on 2 August 2015.&lt;/ref&gt;||Italy||Europe||LEA||2004||€100,000||€808,833<br /> |-<br /> | [[Centro Nacional de Inteligencia]]&lt;ref&gt;Ediciones El País (8 July 2015). [http://internacional.elpais.com/internacional/2015/07/08/actualidad/1436343710_282978.html &quot;Hacking Team: “Ofrecemos tecnología ofensiva para la Policía”&quot;]. ''EL PAÍS''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Spain]]||Europe||Intelligence||2006||€52,000||€538,000<br /> |-<br /> | [[Infocomm Development Authority of Singapore]]||[[Singapore]]||APAC||Intelligence||2008||€89,000||€1,209,967<br /> |-<br /> | Information Office||[[Hungary]]||Europe||Intelligence||2008||€41,000||€885,000<br /> |-<br /> | CSDN||[[Morocco]]||MEA||Intelligence||2009||€140,000||€1,936,050<br /> |-<br /> | UPDF (Uganda Peoples Defense Force), ISO (Internal Security Organization), Office of the President||[[Uganda]]||Africa||Intelligence||2015||€831,000||€52,197,100<br /> |-<br /> | Italy - DA - Rental||Italy||Europe||Other||2009||€50,000||€628,250<br /> |-<br /> | [[Malaysian Anti-Corruption Commission]]||[[Malaysia]]||APAC||Intelligence||2009||€77,000||€789,123<br /> |-<br /> | PCM||Italy||Europe||Intelligence||2009||€90,000||€764,297<br /> |-<br /> | SSNS - Ungheria||Hungary||Europe||Intelligence||2009||€64,000||€1,011,000<br /> |-<br /> | CC - Italy||Italy||Europe||LEA||2010||€50,000||€497,349<br /> |-<br /> | [[Al Mukhabarat Al A'amah]]||[[Saudi Arabia]]||MEA||Intelligence||2010||€45,000||€600,000<br /> |-<br /> | IR Authorities (Condor)||[[Luxembourg]]||Europe||Other||2010||€45,000||€446,000<br /> |-<br /> | La Dependencia y/o CISEN&lt;ref&gt;[http://fusion.net/story/163872/the-hacking-team-leak-shows-mexico-was-the-top-client-but-why/ &quot;The Hacking Team leak shows Mexico was its top client, but why?&quot;]. ''Fusion''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Mexico]]||LATAM||Intelligence||2010||€130,000||€1,390,000<br /> |-<br /> | UZC&lt;ref name=fortune/&gt; ||[[Czech Republic]] ||Europe||LEA||2010||€55,000||€689,779<br /> |-<br /> | Egypt - MOD&lt;ref name=fortune/&gt;||[[Egypt]]||MEA||Other||2011||€70,000||€598,000<br /> |-<br /> | [[Federal Bureau of Investigation]]&lt;ref name=fbidea/&gt;||USA||North America||LEA||2011||€100,000||€697,710<br /> |-<br /> | Oman - Intelligence||[[Oman]]||MEA||Intelligence||2011||€30,000||€500,000<br /> |-<br /> | President Security&lt;ref&gt;[http://motherboard.vice.com/read/hacking-teams-equipment-got-stolen-in-panama &quot;Hacking Team's Equipment Got Stolen in Panama&quot;]. ''Motherboard''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref&gt;Molina, Thabata (13 August 2015). ''[http://panampost.com/thabata-molina/2015/08/13/panama-to-investigate-martinelli-in-hacking-team-spying-scandal/ &quot;Panama to Investigate Martinelli in Hacking Team Spying Scandal&quot;]''. ''Panama Post''. Retrieved 15 August 2015.&lt;/ref&gt;<br /> ||[[Panama]]||LATAM||Intelligence||2011||€110,000||€750,000<br /> |-<br /> | [[Turkish National Police]]||[[Turkey]]||Europe||LEA||2011||€45,000||€440,000<br /> |-<br /> | UAE - MOI||[[United Arab Emirates|UAE]]||MEA||LEA||2011||€90,000||€634,500<br /> |-<br /> | [[National Security Service (Uzbekistan)|National Security Service]]&lt;ref name=fortune&gt;[http://fortune.com/2015/07/16/governments-used-spy-software/ &quot;Leaked emails from security firm Hacking Team show government use - Fortune&quot;]. ''Fortune''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Uzbekistan]]||Europe||Intelligence||2011||€50,000||€917,038<br /> |-<br /> | [[United States Department of Defense|Department of Defense]]&lt;ref name=fbidea/&gt;||USA||North America||LEA||2011||||€190,000<br /> |-<br /> | Bayelsa State Government||[[Nigeria]]||MEA||Intelligence||2012||€75,000||€450,000<br /> |-<br /> | Estado del Mexico||Mexico||LATAM||LEA||2012||€120,000||€783,000<br /> |-<br /> | Information Network Security Agency||[[Ethiopia]]||MEA||Intelligence||2012||€80,000||€750,000<br /> |-<br /> | State security (Falcon)||Luxemburg||Europe||Other||2012||€38,000||€316,000<br /> |-<br /> | Italy - DA - Rental||Italy||Europe||Other||2012||€60,000||€496,000<br /> |-<br /> | MAL - MI||Malaysia||APAC||Intelligence||2012||€77,000||€552,000<br /> |-<br /> | [[Direction générale de la surveillance du territoire]]||Morocco||MEA||Intelligence||2012||€160,000||€1,237,500<br /> |-<br /> | [[National Intelligence and Security Service]]&lt;ref name=fortune/&gt;||[[Sudan]]||MEA||Intelligence||2012||€76,000||€960,000<br /> |-<br /> | Russia - KVANT&lt;ref name=kvant&gt;[http://arstechnica.com/tech-policy/2015/07/hacking-teams-surveillance-software-sold-to-kgb-successor/ &quot;Hacking Team apparently violated EU rules in sale of spyware to Russian agency&quot;]. ''Ars Technica''. Retrieved on 2 August 2015.&lt;/ref&gt;||[[Russia]]||Europe||Intelligence||2012||€72,000||€451,017<br /> |-<br /> | Saudi - GID||Saudi||MEA||LEA||2012||€114,000||€1,201,000<br /> |-<br /> | SIS of [[National Security Committee of the Republic of Kazakhstan]]&lt;ref name=fortune/&gt;||[[Kazakhstan]]||Europe||Intelligence||2012||€140,000||€1,012,500<br /> |-<br /> | The 5163 Army Division (Alias of South Korean National Intelligence Service)&lt;ref name=fortune/&gt;&lt;ref name=torbrowser&gt;[https://firstlook.org/theintercept/2015/07/16/hackingteam-attacked-tor-browser/ &quot;How Hacking Team Created Spyware that Allowed the FBI To Monitor Tor Browser&quot;]. ''The Intercept''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref name=wswskorea&gt;McGrath, Ben (25 July 2015). &quot;''[https://www.wsws.org/en/articles/2015/07/25/kore-j25.html Further revelations in South Korean hacking scandal]''&quot;. ''World Socialist Web Site''. Retrieved 26 July 2015.&lt;/ref&gt;||[[South Korea|S. Korea]]||APAC||Other||2012||€67,000||€686,400<br /> |-<br /> | UAE - Intelligence||[[United Arab Emirates|UAE]]||MEA||Other||2012||€150,000||€1,200,000<br /> |-<br /> | [[Drug Enforcement Administration]]&lt;ref name=fbidea&gt;[https://firstlook.org/theintercept/2015/07/06/hacking-team-spyware-fbi/ &quot;Leaked Documents Show FBI, DEA and U.S. Army Buying Italian Spyware&quot;]. ''The Intercept''. Retrieved on 2 August 2015.&lt;/ref&gt;&lt;ref name=dea&gt;[http://motherboard.vice.com/read/the-dea-just-cancelled-its-contract-with-hacking-team &quot;The DEA Just Cancelled Its Contract With Hacking Team&quot;]. ''Motherboard''. Retrieved on 2 August 2015.&lt;/ref&gt;||USA||North America||Other||2012||€70,000||€567,984<br /> |-<br /> | [[Central Anticorruption Bureau]]||[[Poland]]||Europe||LEA||2012||€35,000||€249,200<br /> |-<br /> | MOD Saudi||Saudi||MEA||Other||2013||€220,000||€1,108,687<br /> |-<br /> | PMO||Malaysia||APAC||Intelligence||2013||€64,500||€520,000<br /> |-<br /> | Estado de Qeretaro||Mexico||LATAM||LEA||2013||€48,000||€234,500<br /> |-<br /> | Azerbajan NS&lt;ref name=fortune/&gt;||[[Azerbaijan]]||Europe||Intelligence||2013||€32,000||€349,000<br /> |-<br /> | Gobierno de Puebla||Mexico||LATAM||Other||2013||€64,000||€428,835<br /> |-<br /> | Gobierno de Campeche||Mexico||LATAM||Other||2013||€78,000||€386,296<br /> |-<br /> | AC Mongolia||[[Mongolia]]||APAC||Intelligence||2013||€100,000||€799,000<br /> |-<br /> | Dept. of Correction Thai Police ||[[Thailand]]||APAC||LEA||2013||€52,000||€286,482<br /> |-<br /> | [[National Intelligence Secretariat (Ecuador)|National Intelligence Secretariat]]&lt;ref&gt;http://panampost.com/rebeca-morla/2015/07/13/ecuadorian-websites-report-on-hacking-team-get-taken-down/&lt;br /&gt;http://panampost.com/panam-staff/2015/08/10/hacking-team-helped-ecuador-spy-on-opposition-activist/&lt;br /&gt;http://bigstory.ap.org/article/6f41d49888174b45857d34511fda1caf/apnewsbreak-email-leak-suggests-ecuador-spied-opposition&lt;/ref&gt;<br /> ||[[Ecuador]]||LATAM||LEA||2013||€75,000||€535,000<br /> |-<br /> | Police Intelligence Directorate&lt;ref name=dipol_telesur&gt;Podour, Justin (23 July 2015). &quot;''[http://www.telesurtv.net/opinion/HackedTeam-y-Colombia-Como-la-vigilancia-ayuda-a-un-Estado-violento-20150723-0062.html #HackedTeam y Colombia: Cómo la vigilancia ayuda a un Estado violento]''&quot;. ''Telesur''. Retrieved 26 July 2015.&lt;/ref&gt;||[[Colombia]]||LATAM||LEA||2013||€35,000||€335,000<br /> |-<br /> | [[Guardia di Finanza]]||Italy||Europe||LEA||2013||€80,000||€400,000<br /> |-<br /> | Intelligence&lt;ref name=cyprus&gt;In Cyprus (11 July 2015).[http://in-cyprus.com/intelligence-service-chief-steps-down/ &quot;''Intelligence Service chief steps down]''&quot;. Retrieved 26 July 2015.&lt;/ref&gt;||[[Cyprus]]||Europe||LEA||2013||€40,000||€375,625<br /> |-<br /> | MidWorld&lt;ref name=ifex&gt;Bahrain Center for Human Rights (15 July 2015). &quot;''[https://www.ifex.org/bahrain/2015/07/15/bahrain_hacking_team Hacking Team's troubling connections to Bahrain]''&quot; IFEX. Retrieved 26 July 2015.&lt;/ref&gt;||[[Bahrain]]||MEA||Intelligence||2013||||€210,000<br /> |-<br /> | Mexico - PEMEX||Mexico ||LATAM||LEA ||2013||||€321,120<br /> |-<br /> | Malysia K||Malaysia||APAC||LEA||2013||||€0<br /> |-<br /> | Honduras||[[Honduras]]||LATAM||LEA||2014||||€355,000<br /> |-<br /> | Mex Taumalipas||Mexico||LATAM||||2014||||€322,900<br /> |-<br /> | Secretaría de Planeación y Finanzas||Mexico||LATAM||LEA||2014||€91,000||€371,035<br /> |-<br /> | AREA||Italia||Europe||||2014||||€430,000<br /> |-<br /> | Mexico Yucatán||Mexico||LATAM||LEA||2014||||€401,788<br /> |-<br /> | Mexico Durango||Mexico||LATAM||LEA||2014||||€421,397<br /> |-<br /> | [[Investigations Police of Chile]]||[[Chile]]||LATAM||LEA||2014||||€2,289,155<br /> |-<br /> | Jalisco Mexico||Mexico||LATAM||LEA||2014||||€748,003<br /> |-<br /> | [[Royal Thai Army]]||Thailand||APAC||LEA||2014||||€360,000<br /> |-<br /> | Vietnam GD5||[[Vietnam]]||APAC||||2014||||€281,170<br /> |-<br /> | [[Kantonspolizei Zürich]]||Switzerland||Europe||LEA||2014||||€486,500<br /> |-<br /> | Vietnam GD1||Vietnam||APAC||LEA||2015||||€543,810<br /> |-<br /> | Egypt TRD GNSE||Egypt||MEA||LEA||2015||||€137,500<br /> |-<br /> | [[Lebanon Army Forces]]||[[Lebanon]]||MEA||LEA||2015||||<br /> |-<br /> | [[Federal Police Department]]||Brazil||LATAM||LEA||2015||||<br /> |-<br /> | [[SHISH|State Informative Service]]&lt;ref&gt;Lexime (14 July 2015). &quot;''[http://www.balkanweb.com/site/burime-te-sigurta-shish-perdor-programet-pergjuese-qe-prej-2015-hacking-teams-nuk-e-kemi-nen-kontroll-sistemin/ Burime të sigurta, SHISH përdor programet përgjuese që prej 2015. Hacking Teams: Nuk e kemi nën kontroll sistemin!]''&quot; (video). BalkanWeb. Retrieved 27 July 2015.&lt;/ref&gt;||[[Albania]]||Europe||SHIK||2015||||<br /> |}<br /> <br /> == See also ==<br /> *[[FinFisher]]<br /> *[[Vupen]], 0-day exploit provider linked to Hacking Team.&lt;ref&gt;[https://tsyrklevich.net/2015/07/22/hacking-team-0day-market/ Hacking Team: a zero-day market case study], Vlad Tsyrklevich's blog&lt;/ref&gt;<br /> *[[Mamfakinch]], a citizen media organization targeted with malware allegedly developed by Hacking Team&lt;ref&gt;Perlroth, Nicole (10 October 2012). ''[http://bits.blogs.nytimes.com/2012/10/10/ahead-of-spyware-conference-more-evidence-of-abuse/?_r=0 Ahead of Spyware Conference, More Evidence of Abuse]''. ''New York Times'' (Bits).&lt;/ref&gt;<br /> <br /> ==References==<br /> {{reflist}}<br /> <br /> == External links ==<br /> * {{Official website| http://www.hackingteam.it/}}<br /> * [https://citizenlab.org/tag/hacking-team/ Hacking Team Archives] - investigative reports published by The [[Citizen Lab]]<br /> * [https://wikileaks.org/hackingteam/emails WikiLeaks: ''The Hackingteam Archives''] - searchable database of 1 million internal emails<br /> * [https://wikileaks.org/spyfiles/list/company-name/hackingteam.html Hacking Team presentations] in the [[WikiLeaks]] &quot;''Spy Files''&quot;<br /> {{Hacking in the 2010s}}<br /> <br /> [[Category:Computer security software]]<br /> [[Category:Spyware]]<br /> [[Category:Surveillance]]<br /> [[Category:Trojan horses]]<br /> [[Category:Espionage techniques]]<br /> [[Category:Espionage devices]]<br /> [[Category:Malware toolkits]]<br /> [[Category:Computer access control]]<br /> [[Category:Cyberwarfare]]<br /> [[Category:Espionage scandals and incidents]]<br /> [[Category:Companies based in Milan]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=8kun&diff=187755755 8kun 2015-10-27T20:35:35Z <p>Dsprc: /* top */ registration is optional should one wish to moderate a board</p> <hr /> <div>{{other uses|8chan (disambiguation)}}<br /> {{Use mdy dates|date=September 2015}}<br /> {{Infobox website<br /> | name = 8chan<br /> | logo =<br /> | screenshot = [[File:InfiniteChan∞chanLogo.svg|200px]]<br /> | alt = green infinity symbol left of the word chan.<br /> | caption = The ∞chan logo of 8ch.net<br /> | url = {{URL|https://8ch.net}}<br /> | slogan = '''''Welcome to ∞chan, the infinitely expanding imageboard.'''''<br /> | commercial = Yes<br /> | type = [[Imageboard]]<br /> | language = English, Japanese (users can create language specific boards)<br /> | registration = Optional<br /> | author = [[Fredrick Brennan]]<br /> | owner = [[:ja:ジム・ワトキンス|Jim Watkins]],&lt;br /&gt; N.T. Technology ([[2channel]])<br /> | launch date = {{start date and age|2013|10|22|df=no}}<br /> | alexa = {{IncreaseNegative}} 10,084 ({{as of|2015|8|22|alt=August 2015}})&lt;ref name=&quot;alexa&quot;&gt;{{cite web|url= http://www.alexa.com/siteinfo/8ch.net |title= 8ch.net Site Info | publisher= [[Alexa Internet]] |accessdate= August 22, 2015 }}&lt;/ref&gt;<br /> | current status = Online<br /> }}<br /> <br /> '''8chan''' (also called '''Infinitechan''' and stylized as '''∞chan''') is an [[English language|English-language]] [[imageboard]] website composed of user-created [[Internet forum|boards]]. Each board is moderated by its creator with minimal interaction from other site administration.&lt;ref name=&quot;faq&quot;&gt;{{cite web|last=Brennan|first=Fredrick|url=https://8ch.net/faq.html|title=FAQ|publisher=Infinitechan|website=8chan.co|accessdate=November 23, 2014}}&lt;/ref&gt;<br /> <br /> The site has received both praise and criticism for its stance on [[Freedom of speech|free speech]], which involves allowing any content to be posted, so long as it adheres to United States law.<br /> <br /> Several sites' boards have played an active role in the [[Gamergate controversy]], encouraging Gamergate affiliates to frequent 8chan after the topic was banned on the unaffiliated imageboard [[4chan]]. As of August 2015, the site was the 10,204th most visited site in the world,&lt;ref name=&quot;alexa&quot; /&gt; and in November 2014 was receiving an average of 35,000 unique visitors per day and 400,000 posts per week when it was at a higher rank.&lt;ref name=Howell2014 /&gt;<br /> <br /> ==History==<br /> 8chan was created in October 2013 by computer programmer [[Fredrick Brennan]],&lt;ref name=Howell2014 /&gt;&lt;ref&gt;{{cite web|last1=Machkovech|first1=Sam|title=Full transcript: Ars interviews 8chan founder Fredrick Brennan|url=http://arstechnica.com/business/2015/03/full-transcript-ars-interviews-8chan-founder-fredrick-brennan/|publisher=Ars Technica|accessdate=June 15, 2015|date=March 17, 2015}}&lt;/ref&gt; also known by the nickname &quot;Hotwheels&quot;.&lt;ref name=&quot;KYM&quot;/&gt; The website was created after Brennan observed what he perceived to be rapidly escalating [[surveillance]] and a loss of [[free speech]] on the Internet.&lt;ref name=Howell2014 /&gt; Brennan, who considers the imageboard [[4chan]] to have grown into authoritarianism, describes 8chan as a &quot;free-speech-friendly&quot; alternative,&lt;ref name=&quot;Howell2014&quot;&gt;{{cite web|last=Howell O'Neill|first=Patrick|date=November 17, 2014|url=http://www.dailydot.com/politics/8chan-pedophiles-child-porn-gamergate/|title=8chan, the central hive of Gamergate, is also an active pedophile network|work=The Daily Dot}}&lt;/ref&gt; and had originally conceptualized the site while experiencing a [[psychedelic experience|psychedelic mushrooms trip]].&lt;ref name=&quot;KYM&quot;/&gt;&lt;ref name=WashPost /&gt;<br /> <br /> No experience or programming knowledge is necessary for users to create their own boards.&lt;ref name=&quot;faq&quot; /&gt; Since as early as March 2014, its [[FAQ]] has stated only one rule that is to be globally enforced: &quot;Do not post, request, or link to any content illegal in the United States of America. Do not create boards with the sole purpose of posting or spreading such content.&quot;&lt;ref name=&quot;faq&quot; /&gt; Brennan has claimed that, while he finds some of the content posted by users to be &quot;reprehensible&quot;, he feels personally obligated to uphold the site's integrity by tolerating discussion he doesn't necessarily support regardless of his moral stance.&lt;ref name=Howell2014 /&gt;<br /> <br /> Brennan agreed to partner 8chan with the Japanese message board [[2channel]]&lt;ref name=&quot;KYM&quot;&gt;{{cite web|url=http://knowyourmeme.com/blog/interviews/qa-with-fredrick-brennan-of-8chan|title=Q&amp;A with Fredrick Brennan of 8chan|last=Caldwell|first=Don|date=October 9, 2014|work=[[Know Your Meme]]|accessdate=December 18, 2014}}&lt;/ref&gt; and subsequently relocated to the [[Philippines]] in October 2014.&lt;ref name=Chen /&gt;<br /> <br /> In January 2015, the site changed its [[Domain name|domain]] 8chan.co to 8ch.net after multiple people filed reports complaining to 8chan’s [[Domain name registrar|registrar]] that the message board hosted [[child pornography]]. Despite regaining the domain, the site remained at 8ch.net, with the old domain redirecting to it.&lt;ref name=WashPost /&gt;<br /> <br /> ==Controversies==<br /> ===Child pornography===<br /> ''[[The Washington Post]]'' described it as &quot;the more-lawless, more-libertarian, more 'free' follow-up to 4chan.&quot;&lt;ref name=&quot;WashPost&quot;&gt;{{cite web|url=http://www.washingtonpost.com/news/the-intersect/wp/2015/01/13/this-is-what-happens-when-you-create-an-online-community-without-any-rules/|title=This is what happens when you create an online community without any rules|work=[[The Washington Post]]|last=Caitlin|first=Dewey|date=January 13, 2014}}&lt;/ref&gt; Boards have been created to discuss controversial topics, including [[pedophilia]]. While the sharing of illegal content is against site rules, ''[[The Daily Dot]]'' wrote that boards exist to share sexualized images of minors in provocative poses, and that some users of those boards post links to explicit child pornography hosted elsewhere.&lt;ref name=&quot;Howell2014&quot;/&gt; When asked whether such boards were an inevitable result of free speech, Brennan responded, &quot;Unfortunately, yes. I don’t support the content on the boards you mentioned, but it is simply the cost of free speech and being the only active site to not impose more 'laws' than those that were passed in [[Washington, D.C.]]&quot;&lt;ref name=&quot;Howell2014&quot;/&gt;<br /> <br /> In August 2015, for a brief period, 8chan was blacklisted from [[Google Search]] for containing content constituting &quot;suspected child abuse content&quot;.&lt;ref name=ars-8chancensor&gt;{{cite web|title=8chan-hosted content disappears from Google searches|url=http://arstechnica.com/tech-policy/2015/08/8chan-hosted-content-disappears-from-google-searches/|last=Machkovech|first=Sam|website=[[Ars Technica]]|publisher=[[Condé Nast]]|date=August 14, 2015|accessdate=August 17, 2015}}&lt;/ref&gt; It was later restored to the search engine's listings without explanation.&lt;ref&gt;{{Cite web|url = https://medium.com/@infinitechan/google-is-not-your-friend-5a6636af0651|title = Google is not your friend?|date = August 13, 2015|accessdate = September 9, 2015|website = Medium|publisher = |last = Brennan|first = Frederick}}&lt;/ref&gt;<br /> <br /> ===Gamergate===<br /> On September 18, 2014, the website gained prominence in the [[Gamergate controversy]] after 4chan banned discussion of Gamergate,&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;/&gt;&lt;ref&gt;{{cite news|last=Audureau|first=William|title=4chan, wizardchan, 8chan... s'y retrouver dans la jungle des forums anonymes les plus populaires du Web|url=http://www.lemonde.fr/pixels/article/2014/10/15/4chan-wizardchan-8chan-le-guide-des-forums-anonymes-les-plus-populaires-du-web_4505380_4408996.html|work=[[Le Monde]]|location=France|language=French|date=October 15, 2014}}&lt;/ref&gt; whereupon 8chan became one of several hubs of Gamergate activity.&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;&gt;{{cite web|last=Chen|first=Adrian|date=October 27, 2014|url=http://nymag.com/daily/intelligencer/2014/10/gamergate-supporters-party-at-strip-club.html|title=Gamergate Supporters Partied at a Strip Club This Weekend|work=[[New York (magazine)]]}}&lt;/ref&gt;&lt;ref name=&quot;Buzz&quot;/&gt;&lt;ref name=&quot;Guardian 2015-01-13&quot; /&gt; &quot;/gg/&quot;, 8chan's initial Gamergate-oriented board, also gained attention after being compromised by members of the internet troll group [[Gay Nigger Association of America]], forcing Gamergate activists to migrate to &quot;/gamergate/&quot;. This replacement quickly became the site's second most populous board.&lt;ref name=&quot;Buzz&quot;&gt;{{cite web|last1=Bernstein|first1=Joseph|title=GamerGate’s Headquarters Has Been Destroyed By Trolls|url=http://www.buzzfeed.com/josephbernstein/gamergates-headquarters-has-been-destroyed-by-trolls|publisher=''[[Buzzfeed]]''|date=December 4, 2014}}&lt;/ref&gt;<br /> <br /> ===Swatting incidents===<br /> In January 2015 the site was used as a base for [[swatting]] exploits in [[Portland, Oregon|Portland]], [[Seattle]], and [[Burnaby|Burnaby, British Columbia]], most of them tied to the victims' criticism of Gamergate and 8chan's association with it;&lt;ref name=&quot;Mattise&quot;&gt;{{cite web|last=Mattise|first=Nathan|date=January 4, 2015|url=http://arstechnica.com/tech-policy/2015/01/8chan-tries-swatting-gamergate-critic-sends-cops-to-an-old-address/|title=8chan tries &quot;swatting&quot; GamerGate critic, sends cops to an old address|work=[[Ars Technica]]}}&lt;/ref&gt; the attacks were coordinated on a [[Internet forum|board]] on the website called &quot;/baphomet/&quot;.&lt;ref name=&quot;Guardian 2015-01-13&quot;&gt;{{cite news |last=Hern |first=Alex |url=http://www.theguardian.com/technology/2015/jan/13/gamergate-hits-new-low-with-attempts-to-send-swat-teams-to-critics |title=Gamergate hits new low with attempts to send Swat teams to critics |work=[[The Guardian]] |date=January 13, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt; One of the victims of a swatting attack said she was singled out because she followed someone on [[Twitter]].&lt;ref name=&quot;GlobalNews 2015-01-15&quot;&gt;{{cite news |last=McElroy |first=Justin |url=http://globalnews.ca/news/1773840/police-called-to-burnaby-womens-home-by-online-harassers/ |title=Police falsely called to Burnaby women’s home by online harassers |work=[[Global News]] |date=January 15, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt;&lt;ref&gt;{{cite web|url=http://www.gameranx.com/updates/id/26081/article/canadian-victim-of-gamergate-swatting-attempt-comes-forward/|title=Canadian Victim of Gamergate SWATing Attempt Comes Forward|work=Gameranx|last=Cheong|first=Ian Miles|date=January 13, 2015|accessdate=January 16, 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://bc.ctvnews.ca/reckless-swatting-prank-sends-police-to-b-c-woman-s-home-1.2189547|title=Reckless ‘swatting’ prank sends police to B.C. woman’s home|work=[[CTV News]]|date=January 14, 2015|accessdate=September 30, 2015|author=&lt;!-- Staff writers --&gt;}}&lt;/ref&gt; On February 9, 2015, contents on the &quot;/baphomet/&quot; subboard were wiped after [[doxxing|personal information]] of [[Katherine B. Forrest|Katherine Forrest]], the presiding judge in the [[Silk Road (marketplace)|Silk Road]] case, had been posted there.&lt;ref name=&quot;silkroad&quot;&gt;{{Cite web| title = Notorious 8chan &quot;subboard&quot; has history wiped after federal judge’s doxing| first = Sam |last = Machkovech|work = Ars Technica| date = February 12, 2015| accessdate = February 13, 2015| url = http://arstechnica.com/security/2015/02/notorious-8chan-subboard-has-history-wiped-after-federal-judges-doxing/}}&lt;/ref&gt;<br /> <br /> ==External links==<br /> * {{Official website}}<br /> * &lt;nowiki&gt;oxwugzccvk3dk6tj.onion&lt;/nowiki&gt;&lt;ref&gt;{{cite web|title=ATTENTION TOR USERS: I accidentally released the PRIVATE key for the Tor hidden service into a public IRC channel. The Tor URL fullchan4jtta4sx.onion is now considered COMPROMISED and NOT OWNED by the 8chan administration. The new URL is oxwugzccvk3dk6tj.onion.|url=https://8ch.net/onion/res/357.html|accessdate=August 18, 2015}}&lt;/ref&gt; - [[.onion]] address for [[Tor (network)|Tor]] hidden service &lt;!-- SEE: http://web.archive.org/web/20150818121142/https://8ch.net/_g/1153.txt --&gt;<br /> * {{Twitter|infinitechan|8chan}}<br /> <br /> ==References==<br /> {{Reflist|30em}}<br /> <br /> {{Tor hidden services}}<br /> {{DEFAULTSORT:8chan}}<br /> [[Category:2channel]]<br /> [[Category:American websites]]<br /> [[Category:Community websites]]<br /> [[Category:Free web software]]<br /> [[Category:Internet forums]]<br /> [[Category:Imageboards]]<br /> [[Category:Internet properties established in 2013]]<br /> [[Category:Obscenity controversies]]<br /> [[Category:Tor hidden services]]<br /> [[Category:Virtual communities]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=8kun&diff=187755749 8kun 2015-09-24T12:33:37Z <p>Dsprc: /* References */</p> <hr /> <div>{{other uses|8chan (disambiguation)}}<br /> {{Use mdy dates|date=September 2015}}<br /> {{Infobox website<br /> | name = 8chan<br /> | logo =<br /> | screenshot = [[File:InfiniteChan∞chanLogo.svg|200px]]<br /> | alt = green infinity symbol left of the word chan.<br /> | caption = The ∞chan logo of 8ch.net<br /> | url = {{URL|https://8ch.net}}<br /> | slogan = '''''Welcome to ∞chan, the infinitely expanding imageboard.'''''<br /> | commercial = Yes<br /> | type = [[Imageboard]]<br /> | language = English, Japanese (users can create language specific boards)<br /> | registration = None available<br /> | author = [[Fredrick Brennan]]<br /> | owner = [[:ja:ジム・ワトキンス|Jim Watkins]],&lt;br /&gt; N.T. Technology ([[2channel]])<br /> | launch date = {{start date and age|2013|10|22|df=no}}<br /> | alexa = {{IncreaseNegative}} 10,084 ({{as of|2015|8|22|alt=August 2015}})&lt;ref name=&quot;alexa&quot;&gt;{{cite web|url= http://www.alexa.com/siteinfo/8ch.net |title= 8ch.net Site Info | publisher= [[Alexa Internet]] |accessdate= August 22, 2015 }}&lt;/ref&gt;<br /> | current status = Online<br /> }}<br /> <br /> '''8chan''' (also called '''Infinitechan''' and stylized as '''∞chan''') is an [[English language|English-language]] [[imageboard]] website composed of user-created [[Internet forum|boards]]. Each board is moderated by its creator with minimal interaction from other site administration.&lt;ref name=&quot;faq&quot;&gt;{{cite web|last=Brennan|first=Fredrick|url=https://8ch.net/faq.html|title=FAQ|publisher=Infinitechan|website=8chan.co|accessdate=November 23, 2014}}&lt;/ref&gt;<br /> <br /> The site has received both praise and criticism for its stance on [[Freedom of speech|free speech]], which involves allowing any content to be posted, so long as it adheres to United States law.<br /> <br /> Several sites' boards have played an active role in the [[Gamergate controversy]], encouraging Gamergate affiliates to frequent 8chan after the topic was banned on the unaffiliated imageboard [[4chan]]. As of August 2015, the site was the 10,204th most visited site in the world,&lt;ref name=&quot;alexa&quot; /&gt; and in November 2014 was receiving an average of 35,000 unique visitors per day and 400,000 posts per week when it was at a higher rank.&lt;ref name=Howell2014 /&gt;<br /> <br /> ==History==<br /> 8chan was created in October 2013 by computer programmer [[Fredrick Brennan]],&lt;ref name=Howell2014 /&gt;&lt;ref&gt;{{cite web|last1=Machkovech|first1=Sam|title=Full transcript: Ars interviews 8chan founder Fredrick Brennan|url=http://arstechnica.com/business/2015/03/full-transcript-ars-interviews-8chan-founder-fredrick-brennan/|publisher=Ars Technica|accessdate=June 15, 2015|date=March 17, 2015}}&lt;/ref&gt; also known by the nickname &quot;Hotwheels&quot;.&lt;ref name=&quot;KYM&quot;/&gt; The website was created after Brennan observed what he perceived to be rapidly escalating [[surveillance]] and a loss of [[free speech]] on the Internet.&lt;ref name=Howell2014 /&gt; Brennan, who considers the imageboard [[4chan]] to have grown into authoritarianism, describes 8chan as a &quot;free-speech-friendly&quot; alternative,&lt;ref name=&quot;Howell2014&quot;&gt;{{cite web|last=Howell O'Neill|first=Patrick|date=November 17, 2014|url=http://www.dailydot.com/politics/8chan-pedophiles-child-porn-gamergate/|title=8chan, the central hive of Gamergate, is also an active pedophile network|work=The Daily Dot}}&lt;/ref&gt; and had originally conceptualized the site while experiencing a [[psychedelic experience|psychedelic mushrooms trip]].&lt;ref name=&quot;KYM&quot;/&gt;&lt;ref name=WashPost /&gt;<br /> <br /> No experience or programming knowledge is necessary for users to create their own boards.&lt;ref name=&quot;faq&quot; /&gt; Since as early as March 2014, its [[FAQ]] has stated only one rule that is to be globally enforced: &quot;Do not post, request, or link to any content illegal in the United States of America. Do not create boards with the sole purpose of posting or spreading such content.&quot;&lt;ref name=&quot;faq&quot; /&gt; Brennan has claimed that, while he finds some of the content posted by users to be &quot;reprehensible&quot;, he feels personally obligated to uphold the site's integrity by tolerating discussion he doesn't necessarily support regardless of his moral stance.&lt;ref name=Howell2014 /&gt;<br /> <br /> Brennan agreed to partner 8chan with the Japanese message board [[2channel]]&lt;ref name=&quot;KYM&quot;&gt;{{cite web|url=http://knowyourmeme.com/blog/interviews/qa-with-fredrick-brennan-of-8chan|title=Q&amp;A with Fredrick Brennan of 8chan|last=Caldwell|first=Don|date=October 9, 2014|work=[[Know Your Meme]]|accessdate=December 18, 2014}}&lt;/ref&gt; and subsequently relocated to the [[Philippines]] in October 2014.&lt;ref name=Chen /&gt;<br /> <br /> In January 2015, the site changed its [[Domain name|domain]] 8chan.co to 8ch.net after multiple people filed reports complaining to 8chan’s [[Domain name registrar|registrar]] that the message board hosted [[child pornography]]. Despite regaining the domain, the site remained at 8ch.net, with the old domain redirecting to it.&lt;ref name=WashPost /&gt;<br /> <br /> ==Controversies==<br /> ===Child pornography===<br /> ''[[The Washington Post]]'' described it as &quot;the more-lawless, more-libertarian, more 'free' follow-up to 4chan.&quot;&lt;ref name=&quot;WashPost&quot;&gt;{{cite web|url=http://www.washingtonpost.com/news/the-intersect/wp/2015/01/13/this-is-what-happens-when-you-create-an-online-community-without-any-rules/|title=This is what happens when you create an online community without any rules|work=[[The Washington Post]]|last=Caitlin|first=Dewey|date=January 13, 2014}}&lt;/ref&gt; Boards have been created to discuss controversial topics, including [[pedophilia]]. While the sharing of illegal content is against site rules, ''[[The Daily Dot]]'' wrote that boards exist to share sexualized images of minors in provocative poses, and that some users of those boards post links to explicit child pornography hosted elsewhere.&lt;ref name=&quot;Howell2014&quot;/&gt; When asked whether such boards were an inevitable result of free speech, Brennan responded, &quot;Unfortunately, yes. I don’t support the content on the boards you mentioned, but it is simply the cost of free speech and being the only active site to not impose more 'laws' than those that were passed in [[Washington, D.C.]]&quot;&lt;ref name=&quot;Howell2014&quot;/&gt;<br /> <br /> In August 2015, for a brief period, 8chan was blacklisted from [[Google Search]] for containing content constituting &quot;suspected child abuse content&quot;.&lt;ref name=ars-8chancensor&gt;{{cite web|title=8chan-hosted content disappears from Google searches|url=http://arstechnica.com/tech-policy/2015/08/8chan-hosted-content-disappears-from-google-searches/|last=Machkovech|first=Sam|website=[[Ars Technica]]|publisher=[[Condé Nast]]|date=August 14, 2015|accessdate=August 17, 2015}}&lt;/ref&gt; It was later restored to the search engine's listings without explanation.&lt;ref&gt;{{Cite web|url = https://medium.com/@infinitechan/google-is-not-your-friend-5a6636af0651|title = Google is not your friend?|date = August 13, 2015|accessdate = September 9, 2015|website = Medium|publisher = |last = Brennan|first = Frederick}}&lt;/ref&gt;<br /> <br /> ===Gamergate===<br /> On September 18, 2014, the website gained prominence in the [[Gamergate controversy]] after 4chan banned discussion of Gamergate,&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;/&gt;&lt;ref&gt;{{cite news|last=Audureau|first=William|title=4chan, wizardchan, 8chan... s'y retrouver dans la jungle des forums anonymes les plus populaires du Web|url=http://www.lemonde.fr/pixels/article/2014/10/15/4chan-wizardchan-8chan-le-guide-des-forums-anonymes-les-plus-populaires-du-web_4505380_4408996.html|work=[[Le Monde]]|location=France|language=French|date=October 15, 2014}}&lt;/ref&gt; whereupon 8chan became one of several hubs of Gamergate activity.&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;&gt;{{cite web|last=Chen|first=Adrian|date=October 27, 2014|url=http://nymag.com/daily/intelligencer/2014/10/gamergate-supporters-party-at-strip-club.html|title=Gamergate Supporters Partied at a Strip Club This Weekend|work=[[New York (magazine)]]}}&lt;/ref&gt;&lt;ref name=&quot;Buzz&quot;/&gt;&lt;ref name=&quot;Guardian 2015-01-13&quot; /&gt; &quot;/gg/&quot;, 8chan's initial Gamergate-oriented board, also gained attention after being compromised by members of the internet troll group [[Gay Nigger Association of America]], forcing Gamergate activists to migrate to &quot;/gamergate/&quot;. This replacement quickly became the site's second most populous board.&lt;ref name=&quot;Buzz&quot;&gt;{{cite web|last1=Bernstein|first1=Joseph|title=GamerGate’s Headquarters Has Been Destroyed By Trolls|url=http://www.buzzfeed.com/josephbernstein/gamergates-headquarters-has-been-destroyed-by-trolls|publisher=''[[Buzzfeed]]''|date=December 4, 2014}}&lt;/ref&gt;<br /> <br /> ===Swatting incidents===<br /> In January 2015 the site was used as a base for [[swatting]] exploits in [[Portland, Oregon|Portland]], [[Seattle]], and [[Burnaby|Burnaby, British Columbia]], most of them tied to the victims' criticism of Gamergate and 8chan's association with it;&lt;ref name=&quot;Mattise&quot;&gt;{{cite web|last=Mattise|first=Nathan|date=January 4, 2015|url=http://arstechnica.com/tech-policy/2015/01/8chan-tries-swatting-gamergate-critic-sends-cops-to-an-old-address/|title=8chan tries &quot;swatting&quot; GamerGate critic, sends cops to an old address|work=[[Ars Technica]]}}&lt;/ref&gt; the attacks were coordinated on a [[Internet forum|board]] on the website called &quot;/baphomet/&quot;.&lt;ref name=&quot;Guardian 2015-01-13&quot;&gt;{{cite news |last=Hern |first=Alex |url=http://www.theguardian.com/technology/2015/jan/13/gamergate-hits-new-low-with-attempts-to-send-swat-teams-to-critics |title=Gamergate hits new low with attempts to send Swat teams to critics |work=[[The Guardian]] |date=January 13, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt; One of the victims of a swatting attack said she was singled out because she followed someone on [[Twitter]].&lt;ref name=&quot;GlobalNews 2015-01-15&quot;&gt;{{cite news |last=McElroy |first=Justin |url=http://globalnews.ca/news/1773840/police-called-to-burnaby-womens-home-by-online-harassers/ |title=Police falsely called to Burnaby women’s home by online harassers |work=[[Global News]] |date=January 15, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://www.theprovince.com/cent+terrorism+Burnaby+victim+decries+Internet+swatting+that+brought+Mounties+door/10725977/story.html|title=It's '100 per cent terrorism': Burnaby victim decries Internet 'swatting' that brought Mounties to her door|work=[[The Province]]|publisher=[[Postmedia Network]]|location=Vancouver|last=Eagland|first=Nick|date=January 13, 2015|accessdate=January 16, 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web|url=http://www.gameranx.com/updates/id/26081/article/canadian-victim-of-gamergate-swatting-attempt-comes-forward/|title=Canadian Victim of Gamergate SWATing Attempt Comes Forward|work=Gameranx|last=Cheong|first=Ian Miles|date=January 13, 2015|accessdate=January 16, 2015}}&lt;/ref&gt; On February 9, 2015, contents on the &quot;/baphomet/&quot; subboard were wiped after [[doxxing|personal information]] of [[Katherine B. Forrest|Katherine Forrest]], the presiding judge in the [[Silk Road (marketplace)|Silk Road]] case, had been posted there.&lt;ref name=&quot;silkroad&quot;&gt;{{Cite web| title = Notorious 8chan &quot;subboard&quot; has history wiped after federal judge’s doxing| first = Sam |last = Machkovech|work = Ars Technica| date = February 12, 2015| accessdate = February 13, 2015| url = http://arstechnica.com/security/2015/02/notorious-8chan-subboard-has-history-wiped-after-federal-judges-doxing/}}&lt;/ref&gt;<br /> <br /> ==External links==<br /> * {{Official website}}<br /> * &lt;nowiki&gt;oxwugzccvk3dk6tj.onion&lt;/nowiki&gt;&lt;ref&gt;{{cite web|title=ATTENTION TOR USERS: I accidentally released the PRIVATE key for the Tor hidden service into a public IRC channel. The Tor URL fullchan4jtta4sx.onion is now considered COMPROMISED and NOT OWNED by the 8chan administration. The new URL is oxwugzccvk3dk6tj.onion.|url=https://8ch.net/onion/res/357.html|accessdate=August 18, 2015}}&lt;/ref&gt; - [[.onion]] address for [[Tor (network)|Tor]] hidden service &lt;!-- SEE: http://web.archive.org/web/20150818121142/https://8ch.net/_g/1153.txt --&gt;<br /> * {{Twitter|infinitechan|8chan}}<br /> <br /> ==References==<br /> {{Reflist|30em}}<br /> <br /> {{Tor hidden services}}<br /> {{DEFAULTSORT:8chan}}<br /> [[Category:2channel]]<br /> [[Category:American websites]]<br /> [[Category:Community websites]]<br /> [[Category:Free web software]]<br /> [[Category:Internet forums]]<br /> [[Category:Imageboards]]<br /> [[Category:Internet properties established in 2013]]<br /> [[Category:Obscenity controversies]]<br /> [[Category:Tor hidden services]]<br /> [[Category:Virtual communities]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=8kun&diff=187755748 8kun 2015-09-24T12:31:56Z <p>Dsprc: /* References */</p> <hr /> <div>{{other uses|8chan (disambiguation)}}<br /> {{Use mdy dates|date=September 2015}}<br /> {{Infobox website<br /> | name = 8chan<br /> | logo =<br /> | screenshot = [[File:InfiniteChan∞chanLogo.svg|200px]]<br /> | alt = green infinity symbol left of the word chan.<br /> | caption = The ∞chan logo of 8ch.net<br /> | url = {{URL|https://8ch.net}}<br /> | slogan = '''''Welcome to ∞chan, the infinitely expanding imageboard.'''''<br /> | commercial = Yes<br /> | type = [[Imageboard]]<br /> | language = English, Japanese (users can create language specific boards)<br /> | registration = None available<br /> | author = [[Fredrick Brennan]]<br /> | owner = [[:ja:ジム・ワトキンス|Jim Watkins]],&lt;br /&gt; N.T. Technology ([[2channel]])<br /> | launch date = {{start date and age|2013|10|22|df=no}}<br /> | alexa = {{IncreaseNegative}} 10,084 ({{as of|2015|8|22|alt=August 2015}})&lt;ref name=&quot;alexa&quot;&gt;{{cite web|url= http://www.alexa.com/siteinfo/8ch.net |title= 8ch.net Site Info | publisher= [[Alexa Internet]] |accessdate= August 22, 2015 }}&lt;/ref&gt;<br /> | current status = Online<br /> }}<br /> <br /> '''8chan''' (also called '''Infinitechan''' and stylized as '''∞chan''') is an [[English language|English-language]] [[imageboard]] website composed of user-created [[Internet forum|boards]]. Each board is moderated by its creator with minimal interaction from other site administration.&lt;ref name=&quot;faq&quot;&gt;{{cite web|last=Brennan|first=Fredrick|url=https://8ch.net/faq.html|title=FAQ|publisher=Infinitechan|website=8chan.co|accessdate=November 23, 2014}}&lt;/ref&gt;<br /> <br /> The site has received both praise and criticism for its stance on [[Freedom of speech|free speech]], which involves allowing any content to be posted, so long as it adheres to United States law.<br /> <br /> Several sites' boards have played an active role in the [[Gamergate controversy]], encouraging Gamergate affiliates to frequent 8chan after the topic was banned on the unaffiliated imageboard [[4chan]]. As of August 2015, the site was the 10,204th most visited site in the world,&lt;ref name=&quot;alexa&quot; /&gt; and in November 2014 was receiving an average of 35,000 unique visitors per day and 400,000 posts per week when it was at a higher rank.&lt;ref name=Howell2014 /&gt;<br /> <br /> ==History==<br /> 8chan was created in October 2013 by computer programmer [[Fredrick Brennan]],&lt;ref name=Howell2014 /&gt;&lt;ref&gt;{{cite web|last1=Machkovech|first1=Sam|title=Full transcript: Ars interviews 8chan founder Fredrick Brennan|url=http://arstechnica.com/business/2015/03/full-transcript-ars-interviews-8chan-founder-fredrick-brennan/|publisher=Ars Technica|accessdate=June 15, 2015|date=March 17, 2015}}&lt;/ref&gt; also known by the nickname &quot;Hotwheels&quot;.&lt;ref name=&quot;KYM&quot;/&gt; The website was created after Brennan observed what he perceived to be rapidly escalating [[surveillance]] and a loss of [[free speech]] on the Internet.&lt;ref name=Howell2014 /&gt; Brennan, who considers the imageboard [[4chan]] to have grown into authoritarianism, describes 8chan as a &quot;free-speech-friendly&quot; alternative,&lt;ref name=&quot;Howell2014&quot;&gt;{{cite web|last=Howell O'Neill|first=Patrick|date=November 17, 2014|url=http://www.dailydot.com/politics/8chan-pedophiles-child-porn-gamergate/|title=8chan, the central hive of Gamergate, is also an active pedophile network|work=The Daily Dot}}&lt;/ref&gt; and had originally conceptualized the site while experiencing a [[psychedelic experience|psychedelic mushrooms trip]].&lt;ref name=&quot;KYM&quot;/&gt;&lt;ref name=WashPost /&gt;<br /> <br /> No experience or programming knowledge is necessary for users to create their own boards.&lt;ref name=&quot;faq&quot; /&gt; Since as early as March 2014, its [[FAQ]] has stated only one rule that is to be globally enforced: &quot;Do not post, request, or link to any content illegal in the United States of America. Do not create boards with the sole purpose of posting or spreading such content.&quot;&lt;ref name=&quot;faq&quot; /&gt; Brennan has claimed that, while he finds some of the content posted by users to be &quot;reprehensible&quot;, he feels personally obligated to uphold the site's integrity by tolerating discussion he doesn't necessarily support regardless of his moral stance.&lt;ref name=Howell2014 /&gt;<br /> <br /> Brennan agreed to partner 8chan with the Japanese message board [[2channel]]&lt;ref name=&quot;KYM&quot;&gt;{{cite web|url=http://knowyourmeme.com/blog/interviews/qa-with-fredrick-brennan-of-8chan|title=Q&amp;A with Fredrick Brennan of 8chan|last=Caldwell|first=Don|date=October 9, 2014|work=[[Know Your Meme]]|accessdate=December 18, 2014}}&lt;/ref&gt; and subsequently relocated to the [[Philippines]] in October 2014.&lt;ref name=Chen /&gt;<br /> <br /> In January 2015, the site changed its [[Domain name|domain]] 8chan.co to 8ch.net after multiple people filed reports complaining to 8chan’s [[Domain name registrar|registrar]] that the message board hosted [[child pornography]]. Despite regaining the domain, the site remained at 8ch.net, with the old domain redirecting to it.&lt;ref name=WashPost /&gt;<br /> <br /> ==Controversies==<br /> ===Child pornography===<br /> ''[[The Washington Post]]'' described it as &quot;the more-lawless, more-libertarian, more 'free' follow-up to 4chan.&quot;&lt;ref name=&quot;WashPost&quot;&gt;{{cite web|url=http://www.washingtonpost.com/news/the-intersect/wp/2015/01/13/this-is-what-happens-when-you-create-an-online-community-without-any-rules/|title=This is what happens when you create an online community without any rules|work=[[The Washington Post]]|last=Caitlin|first=Dewey|date=January 13, 2014}}&lt;/ref&gt; Boards have been created to discuss controversial topics, including [[pedophilia]]. While the sharing of illegal content is against site rules, ''[[The Daily Dot]]'' wrote that boards exist to share sexualized images of minors in provocative poses, and that some users of those boards post links to explicit child pornography hosted elsewhere.&lt;ref name=&quot;Howell2014&quot;/&gt; When asked whether such boards were an inevitable result of free speech, Brennan responded, &quot;Unfortunately, yes. I don’t support the content on the boards you mentioned, but it is simply the cost of free speech and being the only active site to not impose more 'laws' than those that were passed in [[Washington, D.C.]]&quot;&lt;ref name=&quot;Howell2014&quot;/&gt;<br /> <br /> In August 2015, for a brief period, 8chan was blacklisted from [[Google Search]] for containing content constituting &quot;suspected child abuse content&quot;.&lt;ref name=ars-8chancensor&gt;{{cite web|title=8chan-hosted content disappears from Google searches|url=http://arstechnica.com/tech-policy/2015/08/8chan-hosted-content-disappears-from-google-searches/|last=Machkovech|first=Sam|website=[[Ars Technica]]|publisher=[[Condé Nast]]|date=August 14, 2015|accessdate=August 17, 2015}}&lt;/ref&gt; It was later restored to the search engine's listings without explanation.&lt;ref&gt;{{Cite web|url = https://medium.com/@infinitechan/google-is-not-your-friend-5a6636af0651|title = Google is not your friend?|date = August 13, 2015|accessdate = September 9, 2015|website = Medium|publisher = |last = Brennan|first = Frederick}}&lt;/ref&gt;<br /> <br /> ===Gamergate===<br /> On September 18, 2014, the website gained prominence in the [[Gamergate controversy]] after 4chan banned discussion of Gamergate,&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;/&gt;&lt;ref&gt;{{cite news|last=Audureau|first=William|title=4chan, wizardchan, 8chan... s'y retrouver dans la jungle des forums anonymes les plus populaires du Web|url=http://www.lemonde.fr/pixels/article/2014/10/15/4chan-wizardchan-8chan-le-guide-des-forums-anonymes-les-plus-populaires-du-web_4505380_4408996.html|work=[[Le Monde]]|location=France|language=French|date=October 15, 2014}}&lt;/ref&gt; whereupon 8chan became one of several hubs of Gamergate activity.&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;&gt;{{cite web|last=Chen|first=Adrian|date=October 27, 2014|url=http://nymag.com/daily/intelligencer/2014/10/gamergate-supporters-party-at-strip-club.html|title=Gamergate Supporters Partied at a Strip Club This Weekend|work=[[New York (magazine)]]}}&lt;/ref&gt;&lt;ref name=&quot;Buzz&quot;/&gt;&lt;ref name=&quot;Guardian 2015-01-13&quot; /&gt; &quot;/gg/&quot;, 8chan's initial Gamergate-oriented board, also gained attention after being compromised by members of the internet troll group [[Gay Nigger Association of America]], forcing Gamergate activists to migrate to &quot;/gamergate/&quot;. This replacement quickly became the site's second most populous board.&lt;ref name=&quot;Buzz&quot;&gt;{{cite web|last1=Bernstein|first1=Joseph|title=GamerGate’s Headquarters Has Been Destroyed By Trolls|url=http://www.buzzfeed.com/josephbernstein/gamergates-headquarters-has-been-destroyed-by-trolls|publisher=''[[Buzzfeed]]''|date=December 4, 2014}}&lt;/ref&gt;<br /> <br /> ===Swatting incidents===<br /> In January 2015 the site was used as a base for [[swatting]] exploits in [[Portland, Oregon|Portland]], [[Seattle]], and [[Burnaby|Burnaby, British Columbia]], most of them tied to the victims' criticism of Gamergate and 8chan's association with it;&lt;ref name=&quot;Mattise&quot;&gt;{{cite web|last=Mattise|first=Nathan|date=January 4, 2015|url=http://arstechnica.com/tech-policy/2015/01/8chan-tries-swatting-gamergate-critic-sends-cops-to-an-old-address/|title=8chan tries &quot;swatting&quot; GamerGate critic, sends cops to an old address|work=[[Ars Technica]]}}&lt;/ref&gt; the attacks were coordinated on a [[Internet forum|board]] on the website called &quot;/baphomet/&quot;.&lt;ref name=&quot;Guardian 2015-01-13&quot;&gt;{{cite news |last=Hern |first=Alex |url=http://www.theguardian.com/technology/2015/jan/13/gamergate-hits-new-low-with-attempts-to-send-swat-teams-to-critics |title=Gamergate hits new low with attempts to send Swat teams to critics |work=[[The Guardian]] |date=January 13, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt; One of the victims of a swatting attack said she was singled out because she followed someone on [[Twitter]].&lt;ref name=&quot;GlobalNews 2015-01-15&quot;&gt;{{cite news |last=McElroy |first=Justin |url=http://globalnews.ca/news/1773840/police-called-to-burnaby-womens-home-by-online-harassers/ |title=Police falsely called to Burnaby women’s home by online harassers |work=[[Global News]] |date=January 15, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://www.theprovince.com/cent+terrorism+Burnaby+victim+decries+Internet+swatting+that+brought+Mounties+door/10725977/story.html|title=It's '100 per cent terrorism': Burnaby victim decries Internet 'swatting' that brought Mounties to her door|work=[[The Province]]|publisher=[[Postmedia Network]]|location=Vancouver|last=Eagland|first=Nick|date=January 13, 2015|accessdate=January 16, 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web|url=http://www.gameranx.com/updates/id/26081/article/canadian-victim-of-gamergate-swatting-attempt-comes-forward/|title=Canadian Victim of Gamergate SWATing Attempt Comes Forward|work=Gameranx|last=Cheong|first=Ian Miles|date=January 13, 2015|accessdate=January 16, 2015}}&lt;/ref&gt; On February 9, 2015, contents on the &quot;/baphomet/&quot; subboard were wiped after [[doxxing|personal information]] of [[Katherine B. Forrest|Katherine Forrest]], the presiding judge in the [[Silk Road (marketplace)|Silk Road]] case, had been posted there.&lt;ref name=&quot;silkroad&quot;&gt;{{Cite web| title = Notorious 8chan &quot;subboard&quot; has history wiped after federal judge’s doxing| first = Sam |last = Machkovech|work = Ars Technica| date = February 12, 2015| accessdate = February 13, 2015| url = http://arstechnica.com/security/2015/02/notorious-8chan-subboard-has-history-wiped-after-federal-judges-doxing/}}&lt;/ref&gt;<br /> <br /> ==External links==<br /> * {{Official website}}<br /> * &lt;nowiki&gt;oxwugzccvk3dk6tj.onion&lt;/nowiki&gt;&lt;ref&gt;{{cite web|title=ATTENTION TOR USERS: I accidentally released the PRIVATE key for the Tor hidden service into a public IRC channel. The Tor URL fullchan4jtta4sx.onion is now considered COMPROMISED and NOT OWNED by the 8chan administration. The new URL is oxwugzccvk3dk6tj.onion.|url=https://8ch.net/onion/res/357.html|accessdate=August 18, 2015}}&lt;/ref&gt; - [[.onion]] address for [[Tor (network)|Tor]] hidden service &lt;!-- SEE: http://web.archive.org/web/20150818121142/https://8ch.net/_g/1153.txt --&gt;<br /> * {{Twitter|infinitechan|8chan}}<br /> <br /> ==References==<br /> {{Reflist|30em}}<br /> <br /> {{Tor hidden services}}<br /> {{DEFAULTSORT:8chan}}<br /> [[Category:2channel]]<br /> [[Category:American websites]]<br /> [[Category:Community websites]]<br /> [[Category:Free web software]]<br /> [[Category:Internet forums]]<br /> [[Category:Imageboards]]<br /> [[Category:Internet properties established in 2013]]<br /> [[Category:Obscenity controversies]]<br /> [[Category:Tor hidden services]]</div> Dsprc https://de.wikipedia.org/w/index.php?title=8kun&diff=187755746 8kun 2015-09-22T06:24:17Z <p>Dsprc: /* top */</p> <hr /> <div>{{other uses|8chan (disambiguation)}}<br /> {{Use mdy dates|date=September 2015}}<br /> {{Infobox website<br /> | name = 8chan<br /> | logo =<br /> | screenshot = [[File:InfiniteChan∞chanLogo.svg|200px]]<br /> | alt = green infinity symbol left of the word chan.<br /> | caption = The ∞chan logo of 8ch.net<br /> | url = {{URL|https://8ch.net}}<br /> | slogan = '''''Welcome to ∞chan, the infinitely expanding imageboard.'''''<br /> | commercial = Yes<br /> | type = [[Imageboard]]<br /> | language = English, Japanese (users can create language specific boards)<br /> | registration = None available<br /> | author = [[Fredrick Brennan]]<br /> | owner = Jim Watkins,&lt;br /&gt; N.T. Technology ([[2channel]])<br /> | launch date = {{start date and age|2013|10|22|df=no}}<br /> | alexa = {{IncreaseNegative}} 10,084 ({{as of|2015|8|22|alt=August 2015}})&lt;ref name=&quot;alexa&quot;&gt;{{cite web|url= http://www.alexa.com/siteinfo/8ch.net |title= 8ch.net Site Info | publisher= [[Alexa Internet]] |accessdate= August 22, 2015 }}&lt;/ref&gt;<br /> | current status = Online<br /> }}<br /> <br /> '''8chan''' (also called '''Infinitechan''' and stylized as '''∞chan''') is an [[English language|English-language]] [[imageboard]] website composed of user-created [[Internet forum|boards]]. Each board is moderated by its creator with minimal interaction from other site administration.&lt;ref name=&quot;faq&quot;&gt;{{cite web|last=Brennan|first=Fredrick|url=https://8ch.net/faq.html|title=FAQ|publisher=Infinitechan|website=8chan.co|accessdate=November 23, 2014}}&lt;/ref&gt;<br /> <br /> The site has received both praise and criticism for its stance on [[Freedom of speech|free speech]], which involves allowing any content to be posted, so long as it adheres to United States law.<br /> <br /> Several sites' boards have played an active role in the [[Gamergate controversy]], encouraging Gamergate affiliates to frequent 8chan after the topic was banned on the unaffiliated imageboard [[4chan]]. As of August 2015, the site was the 10,204th most visited site in the world,&lt;ref name=&quot;alexa&quot; /&gt; and in November 2014 was receiving an average of 35,000 unique visitors per day and 400,000 posts per week when it was at a higher rank.&lt;ref name=Howell2014 /&gt;<br /> <br /> ==History==<br /> 8chan was created in October 2013 by computer programmer [[Fredrick Brennan]],&lt;ref name=Howell2014 /&gt;&lt;ref&gt;{{cite web|last1=Machkovech|first1=Sam|title=Full transcript: Ars interviews 8chan founder Fredrick Brennan|url=http://arstechnica.com/business/2015/03/full-transcript-ars-interviews-8chan-founder-fredrick-brennan/|publisher=Ars Technica|accessdate=June 15, 2015|date=March 17, 2015}}&lt;/ref&gt; also known by the nickname &quot;Hotwheels&quot;.&lt;ref name=&quot;KYM&quot;/&gt; The website was created after Brennan observed what he perceived to be rapidly escalating [[surveillance]] and a loss of [[free speech]] on the Internet.&lt;ref name=Howell2014 /&gt; Brennan, who considers the imageboard [[4chan]] to have grown into authoritarianism, describes 8chan as a &quot;free-speech-friendly&quot; alternative,&lt;ref name=&quot;Howell2014&quot;&gt;{{cite web|last=Howell O'Neill|first=Patrick|date=November 17, 2014|url=http://www.dailydot.com/politics/8chan-pedophiles-child-porn-gamergate/|title=8chan, the central hive of Gamergate, is also an active pedophile network|work=The Daily Dot}}&lt;/ref&gt; and had originally conceptualized the site while experiencing a [[psychedelic experience|psychedelic mushrooms trip]].&lt;ref name=&quot;KYM&quot;/&gt;&lt;ref name=WashPost /&gt;<br /> <br /> No experience or programming knowledge is necessary for users to create their own boards.&lt;ref name=&quot;faq&quot; /&gt; Since as early as March 2014, its [[FAQ]] has stated only one rule that is to be globally enforced: &quot;Do not post, request, or link to any content illegal in the United States of America. Do not create boards with the sole purpose of posting or spreading such content.&quot;&lt;ref name=&quot;faq&quot; /&gt; Brennan has claimed that, while he finds some of the content posted by users to be &quot;reprehensible&quot;, he feels personally obligated to uphold the site's integrity by tolerating discussion he doesn't necessarily support regardless of his moral stance.&lt;ref name=Howell2014 /&gt;<br /> <br /> Brennan agreed to partner 8chan with the Japanese message board [[2channel]]&lt;ref name=&quot;KYM&quot;&gt;{{cite web|url=http://knowyourmeme.com/blog/interviews/qa-with-fredrick-brennan-of-8chan|title=Q&amp;A with Fredrick Brennan of 8chan|last=Caldwell|first=Don|date=October 9, 2014|work=[[Know Your Meme]]|accessdate=December 18, 2014}}&lt;/ref&gt; and subsequently relocated to the [[Philippines]] in October 2014.&lt;ref name=Chen /&gt;<br /> <br /> In January 2015, the site changed its [[Domain name|domain]] 8chan.co to 8ch.net after multiple people filed reports complaining to 8chan’s [[Domain name registrar|registrar]] that the message board hosted [[child pornography]]. Despite regaining the domain, the site remained at 8ch.net, with the old domain redirecting to it.&lt;ref name=WashPost /&gt;<br /> <br /> ==Controversies==<br /> ===Child pornography===<br /> ''[[The Washington Post]]'' described it as &quot;the more-lawless, more-libertarian, more 'free' follow-up to 4chan.&quot;&lt;ref name=&quot;WashPost&quot;&gt;{{cite web|url=http://www.washingtonpost.com/news/the-intersect/wp/2015/01/13/this-is-what-happens-when-you-create-an-online-community-without-any-rules/|title=This is what happens when you create an online community without any rules|work=[[The Washington Post]]|last=Caitlin|first=Dewey|date=January 13, 2014}}&lt;/ref&gt; Boards have been created to discuss controversial topics, including [[pedophilia]]. While the sharing of illegal content is against site rules, ''[[The Daily Dot]]'' wrote that boards exist to share sexualized images of minors in provocative poses, and that some users of those boards post links to explicit child pornography hosted elsewhere.&lt;ref name=&quot;Howell2014&quot;/&gt; When asked whether such boards were an inevitable result of free speech, Brennan responded, &quot;Unfortunately, yes. I don’t support the content on the boards you mentioned, but it is simply the cost of free speech and being the only active site to not impose more 'laws' than those that were passed in [[Washington, D.C.]]&quot;&lt;ref name=&quot;Howell2014&quot;/&gt;<br /> <br /> In August 2015, for a brief period, 8chan was blacklisted from [[Google Search]] for containing content constituting &quot;suspected child abuse content&quot;.&lt;ref name=ars-8chancensor&gt;{{cite web|title=8chan-hosted content disappears from Google searches|url=http://arstechnica.com/tech-policy/2015/08/8chan-hosted-content-disappears-from-google-searches/|last=Machkovech|first=Sam|website=[[Ars Technica]]|publisher=[[Condé Nast]]|date=August 14, 2015|accessdate=August 17, 2015}}&lt;/ref&gt; It was later restored to the search engine's listings without explanation.&lt;ref&gt;{{Cite web|url = https://medium.com/@infinitechan/google-is-not-your-friend-5a6636af0651|title = Google is not your friend?|date = August 13, 2015|accessdate = September 9, 2015|website = Medium|publisher = |last = Brennan|first = Frederick}}&lt;/ref&gt;<br /> <br /> ===Gamergate===<br /> On September 18, 2014, the website gained prominence in the [[Gamergate controversy]] after 4chan banned discussion of Gamergate,&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;/&gt;&lt;ref&gt;{{cite news|last=Audureau|first=William|title=4chan, wizardchan, 8chan... s'y retrouver dans la jungle des forums anonymes les plus populaires du Web|url=http://www.lemonde.fr/pixels/article/2014/10/15/4chan-wizardchan-8chan-le-guide-des-forums-anonymes-les-plus-populaires-du-web_4505380_4408996.html|work=[[Le Monde]]|location=France|language=French|date=October 15, 2014}}&lt;/ref&gt; whereupon 8chan became one of several hubs of Gamergate activity.&lt;ref name=Howell2014 /&gt;&lt;ref name=&quot;Chen&quot;&gt;{{cite web|last=Chen|first=Adrian|date=October 27, 2014|url=http://nymag.com/daily/intelligencer/2014/10/gamergate-supporters-party-at-strip-club.html|title=Gamergate Supporters Partied at a Strip Club This Weekend|work=[[New York (magazine)]]}}&lt;/ref&gt;&lt;ref name=&quot;Buzz&quot;/&gt;&lt;ref name=&quot;Guardian 2015-01-13&quot; /&gt; &quot;/gg/&quot;, 8chan's initial Gamergate-oriented board, also gained attention after being compromised by members of the internet troll group [[Gay Nigger Association of America]], forcing Gamergate activists to migrate to &quot;/gamergate/&quot;. This replacement quickly became the site's second most populous board.&lt;ref name=&quot;Buzz&quot;&gt;{{cite web|last1=Bernstein|first1=Joseph|title=GamerGate’s Headquarters Has Been Destroyed By Trolls|url=http://www.buzzfeed.com/josephbernstein/gamergates-headquarters-has-been-destroyed-by-trolls|publisher=''[[Buzzfeed]]''|date=December 4, 2014}}&lt;/ref&gt;<br /> <br /> ===Swatting incidents===<br /> In January 2015 the site was used as a base for [[swatting]] exploits in [[Portland, Oregon|Portland]], [[Seattle]], and [[Burnaby|Burnaby, British Columbia]], most of them tied to the victims' criticism of Gamergate and 8chan's association with it;&lt;ref name=&quot;Mattise&quot;&gt;{{cite web|last=Mattise|first=Nathan|date=January 4, 2015|url=http://arstechnica.com/tech-policy/2015/01/8chan-tries-swatting-gamergate-critic-sends-cops-to-an-old-address/|title=8chan tries &quot;swatting&quot; GamerGate critic, sends cops to an old address|work=[[Ars Technica]]}}&lt;/ref&gt; the attacks were coordinated on a [[Internet forum|board]] on the website called &quot;/baphomet/&quot;.&lt;ref name=&quot;Guardian 2015-01-13&quot;&gt;{{cite news |last=Hern |first=Alex |url=http://www.theguardian.com/technology/2015/jan/13/gamergate-hits-new-low-with-attempts-to-send-swat-teams-to-critics |title=Gamergate hits new low with attempts to send Swat teams to critics |work=[[The Guardian]] |date=January 13, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt; One of the victims of a swatting attack said she was singled out because she followed someone on [[Twitter]].&lt;ref name=&quot;GlobalNews 2015-01-15&quot;&gt;{{cite news |last=McElroy |first=Justin |url=http://globalnews.ca/news/1773840/police-called-to-burnaby-womens-home-by-online-harassers/ |title=Police falsely called to Burnaby women’s home by online harassers |work=[[Global News]] |date=January 15, 2015 |accessdate=January 15, 2015 }}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://www.theprovince.com/cent+terrorism+Burnaby+victim+decries+Internet+swatting+that+brought+Mounties+door/10725977/story.html|title=It's '100 per cent terrorism': Burnaby victim decries Internet 'swatting' that brought Mounties to her door|work=[[The Province]]|publisher=[[Postmedia Network]]|location=Vancouver|last=Eagland|first=Nick|date=January 13, 2015|accessdate=January 16, 2015}}&lt;/ref&gt;&lt;ref&gt;{{cite web|url=http://www.gameranx.com/updates/id/26081/article/canadian-victim-of-gamergate-swatting-attempt-comes-forward/|title=Canadian Victim of Gamergate SWATing Attempt Comes Forward|work=Gameranx|last=Cheong|first=Ian Miles|date=January 13, 2015|accessdate=January 16, 2015}}&lt;/ref&gt; On February 9, 2015, contents on the &quot;/baphomet/&quot; subboard were wiped after [[doxxing|personal information]] of [[Katherine B. Forrest|Katherine Forrest]], the presiding judge in the [[Silk Road (marketplace)|Silk Road]] case, had been posted there.&lt;ref name=&quot;silkroad&quot;&gt;{{Cite web| title = Notorious 8chan &quot;subboard&quot; has history wiped after federal judge’s doxing| first = Sam |last = Machkovech|work = Ars Technica| date = February 12, 2015| accessdate = February 13, 2015| url = http://arstechnica.com/security/2015/02/notorious-8chan-subboard-has-history-wiped-after-federal-judges-doxing/}}&lt;/ref&gt;<br /> <br /> ==External links==<br /> * {{Official website}}<br /> * &lt;nowiki&gt;oxwugzccvk3dk6tj.onion&lt;/nowiki&gt;&lt;ref&gt;{{cite web|title=ATTENTION TOR USERS: I accidentally released the PRIVATE key for the Tor hidden service into a public IRC channel. The Tor URL fullchan4jtta4sx.onion is now considered COMPROMISED and NOT OWNED by the 8chan administration. The new URL is oxwugzccvk3dk6tj.onion.|url=https://8ch.net/onion/res/357.html|accessdate=August 18, 2015}}&lt;/ref&gt; - [[.onion]] address for [[Tor (network)|Tor]] hidden service &lt;!-- SEE: http://web.archive.org/web/20150818121142/https://8ch.net/_g/1153.txt --&gt;<br /> * {{Twitter|infinitechan|8chan}}<br /> <br /> ==References==<br /> {{Reflist|30em}}<br /> <br /> {{Tor hidden services}}<br /> {{DEFAULTSORT:8chan}}<br /> [[Category:2channel]]<br /> [[Category:American websites]]<br /> [[Category:Community websites]]<br /> [[Category:Internet forums]]<br /> [[Category:Imageboards]]<br /> [[Category:Internet properties established in 2013]]<br /> [[Category:Obscenity controversies]]<br /> [[Category:Tor hidden services]]</div> Dsprc