https://de.wikipedia.org/w/api.php?action=feedcontributions&feedformat=atom&user=Replysixty Wikipedia - Benutzerbeiträge [de] 2025-06-23T12:50:39Z Benutzerbeiträge MediaWiki 1.45.0-wmf.6 https://de.wikipedia.org/w/index.php?title=HackingTeam&diff=177174746 HackingTeam 2015-07-06T09:14:32Z <p>Replysixty: /* Hacking Team is itself hacked */ twitter hack is only alleged.</p> <hr /> <div>'''Hacking Team''' is a [[Milan]]-based IT company that sells offensive intrusion and surveillance capabilities to governments and law enforcement agencies. Its remote control systems enable governments to monitor the communications of internet users, decipher their encrypted files and emails, record [[Skype]] and other Voice over IP communications, and remotely activate microphones and camera on target computers.&lt;ref&gt;{{cite web|title=Enemies of the Internet: Hacking Team|url=http://surveillance.rsf.org/en/hacking-team/|work=[[Reporters Without Borders]]|accessdate=24 April 2014}}&lt;/ref&gt; The company has been criticized for providing these capabilities to governments with poor human rights records.&lt;ref&gt;{{cite web | last3 = Marquis-Boire | first3 = Morgan | last1 = Marczak | first1 = Bill | last2 = Gaurnieri | first2 = Claudio | last4 = Scott-Railton | first4 = John | title = Mapping Hacking Team's &quot;Untraceable&quot; Spyware | url = https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ | date = February 17, 2014}}&lt;/ref&gt; Hacking Team states that they have the ability to disable their software if it is used unethically.&lt;ref&gt;{{cite news|url=http://www.newyorker.com/online/blogs/elements/2014/03/hacked-by-ones-own-government.html|title=Hackers Without Borders|last=Kopstein|first=Joshua|work=[[The New Yorker]]|date=10 March 2014|accessdate=24 April 2014}}&lt;/ref&gt;<br /> <br /> In June 2014, a report from the University of Toronto detailed the functionality and architecture of Hacking Team’s Remote Control System (RCS) software and operator tradecraft.&lt;ref&gt;{{Cite web|url = https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/|title = Police Story: Hacking Team’s Government Surveillance Malware|date = June 24, 2014|accessdate = August 3, 2014|website = Citizen Lab|publisher = University of Toronto|last1 = Marquis-Boire|first1 = Morgan | last2 = Gaurnieri | first2 = Claudio | first3 = John | last3 = Scott-Railton | first4 = Katie | last4 = Kleemola }}&lt;/ref&gt;<br /> <br /> Hacking Team employs around 40 people in its Italian office, and has subsidiary branches in [[Annapolis]] and [[Singapore]]. Its products are in use in dozens of countries across six continents.&lt;ref name=Jeffries&gt;{{cite web|last=Jeffries|first=Adrianne|title=Meet Hacking Team, the company that helps the police hack you|url=http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers|accessdate=21 April 2014|work=[[The Verge]]|date=13 September 2013}}&lt;/ref&gt;<br /> <br /> ==Company history==<br /> Hacking Team was started by two Italian programmers, Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri created a set of tools that could used for monitoring and remotely manipulating target computers. The program, called [[Ettercap (software)|Ettercap]], was embraced both by hackers looking to spy on people, and by companies that hoped to test the security of their own networks.<br /> <br /> The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their skype calls, the police contacted Ornaghi and Valleri and asked them for help modifying the program for these purposes. Hacking Team was born, and became &quot;the first sellers of commercial hacking software to the police.&quot;&lt;ref name=Jeffries/&gt;<br /> <br /> === Hacking Team is itself hacked ===<br /> <br /> On July 5, 2015, the Twitter account of the company was compromised, and 400 GB of data, including alleged internal e-mails, invoices, and source code were leaked via [[BitTorrent]]&lt;ref&gt;{{Wayback|url=https://twitter.com/hackingteam|title=Hacked Team (@hackingteam)|date=20150706010312}}&lt;/ref&gt;. An announcement of the hack, including a link to the bittorrent seed, was retweeted by [[WikiLeaks]] and by many others through social media&lt;ref&gt;{{Twitter status|wikileaks|617865712611233792|Inside malware makers &quot;Hacking Team&quot;: hundreds of Gb of e-mails, files, and source code|[[WikiLeaks]]|July 6, 2015|July 6, 2015}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Hacking Team hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan|url = http://www.ibtimes.co.uk/hacking-team-hacked-spy-tools-sold-oppressive-regimes-sudan-bahrain-kazakhstan-1509460|accessdate = 2015-07-06}}&lt;/ref&gt;.<br /> <br /> Although the material was voluminous, early analysis of the hacked material appeared to reveal that Hacking Team had invoiced the Lebanese Army&lt;ref&gt;{{Twitter|url=https://twitter.com/SynAckPwn/status/617955067006578689}}&lt;/ref&gt; and [[Sudan]] and that spy tools were also sold to Bahrain and Kazakhstan.&lt;ref&gt;{{Cite web|title = Hacking Team hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan|url = http://www.ibtimes.co.uk/hacking-team-hacked-spy-tools-sold-oppressive-regimes-sudan-bahrain-kazakhstan-1509460|accessdate = 2015-07-06}}&lt;/ref&gt; Hacking Team had previous claimed they had never done business with Sudan.&lt;ref&gt;{{Cite web|title = Hacking Team hacked, attackers claim 400GB in dumped data|url = http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html|accessdate = 2015-07-06|first = Steve|last = Ragan}}&lt;/ref&gt;<br /> <br /> After a few hours without response from Hacking Team, member Christian Pozzi tweeted that the company was working closely with police and that &quot;what the attackers are claiming regarding our company is not true.&quot;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964180042190848|accessdate = 2015-07-06}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964660705234944|accessdate = 2015-07-06}}&lt;/ref&gt; He also claimed that the torrented material &quot;contains a virus&quot; and that it constituted &quot;false info&quot;.&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617962663188926465|accessdate = 2015-07-06}}&lt;/ref&gt; Shortly after these tweets, Pozzi's Twitter account itself was apparently hacked.&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter: &quot;Uh Oh - my twitter account was also hacked.&quot;|url = https://web.archive.org/web/20150706084837/https://twitter.com/christian_pozzi/status/617977753250496512|date = 2015-07-06|accessdate = 2015-07-06}}&lt;/ref&gt;<br /> <br /> ==Capabilities==<br /> Hacking Team enables clients to perform remote monitoring functions against citizens via their Remote Control Systems (RCS) including Da Vinci:<br /> <br /> *Covert collection of emails, text message, phone call history and address books<br /> *[[Keystroke logging]]<br /> *Uncover search history data and take screenshots<br /> *record audio from phone calls <br /> *Use phones to collect ambient noise and conversations<br /> *Activate phone or computer cameras <br /> *Hijack telephone GPS systems to monitor target's location<br /> <br /> Hacking team uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.&lt;ref&gt;{{cite news|last1=Schneier|first1=Bruce|title=More on Hacking Team's Government Spying Software|url=https://www.schneier.com/blog/archives/2014/06/more_on_hacking.html}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Hacking Team Tools Allow Governments To Take Full Control of Your Smartphone|url = http://www.ibtimes.co.uk/hacking-team-tools-allow-governments-take-full-control-your-smartphone-1453987|accessdate = 2015-07-06}}&lt;/ref&gt;<br /> <br /> ==See also==<br /> *[[FinFisher]]<br /> <br /> ==References==<br /> {{reflist}}<br /> <br /> [[Category:Computer security software]]<br /> [[Category:Spyware]]<br /> [[Category:Surveillance]]<br /> [[Category:Trojan horses]]<br /> [[Category:Espionage techniques]]<br /> [[Category:Espionage devices]]<br /> [[Category:Malware toolkits]]<br /> [[Category:Computer access control]]<br /> [[Category:Cyberwarfare]]<br /> [[Category:Espionage scandals and incidents]]<br /> [[Category:Companies based in Milan]]</div> Replysixty https://de.wikipedia.org/w/index.php?title=HackingTeam&diff=177174745 HackingTeam 2015-07-06T08:51:45Z <p>Replysixty: /* Hacking Team is itself hacked */ Pozzi&#039;s Twitter account hacked.</p> <hr /> <div>'''Hacking Team''' is a [[Milan]]-based IT company that sells offensive intrusion and surveillance capabilities to governments and law enforcement agencies. Its remote control systems enable governments to monitor the communications of internet users, decipher their encrypted files and emails, record [[Skype]] and other Voice over IP communications, and remotely activate microphones and camera on target computers.&lt;ref&gt;{{cite web|title=Enemies of the Internet: Hacking Team|url=http://surveillance.rsf.org/en/hacking-team/|work=[[Reporters Without Borders]]|accessdate=24 April 2014}}&lt;/ref&gt; The company has been criticized for providing these capabilities to governments with poor human rights records.&lt;ref&gt;{{cite web | last3 = Marquis-Boire | first3 = Morgan | last1 = Marczak | first1 = Bill | last2 = Gaurnieri | first2 = Claudio | last4 = Scott-Railton | first4 = John | title = Mapping Hacking Team's &quot;Untraceable&quot; Spyware | url = https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ | date = February 17, 2014}}&lt;/ref&gt; Hacking Team states that they have the ability to disable their software if it is used unethically.&lt;ref&gt;{{cite news|url=http://www.newyorker.com/online/blogs/elements/2014/03/hacked-by-ones-own-government.html|title=Hackers Without Borders|last=Kopstein|first=Joshua|work=[[The New Yorker]]|date=10 March 2014|accessdate=24 April 2014}}&lt;/ref&gt;<br /> <br /> In June 2014, a report from the University of Toronto detailed the functionality and architecture of Hacking Team’s Remote Control System (RCS) software and operator tradecraft.&lt;ref&gt;{{Cite web|url = https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/|title = Police Story: Hacking Team’s Government Surveillance Malware|date = June 24, 2014|accessdate = August 3, 2014|website = Citizen Lab|publisher = University of Toronto|last1 = Marquis-Boire|first1 = Morgan | last2 = Gaurnieri | first2 = Claudio | first3 = John | last3 = Scott-Railton | first4 = Katie | last4 = Kleemola }}&lt;/ref&gt;<br /> <br /> Hacking Team employs around 40 people in its Italian office, and has subsidiary branches in [[Annapolis]] and [[Singapore]]. Its products are in use in dozens of countries across six continents.&lt;ref name=Jeffries&gt;{{cite web|last=Jeffries|first=Adrianne|title=Meet Hacking Team, the company that helps the police hack you|url=http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers|accessdate=21 April 2014|work=[[The Verge]]|date=13 September 2013}}&lt;/ref&gt;<br /> <br /> ==Company history==<br /> Hacking Team was started by two Italian programmers, Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri created a set of tools that could used for monitoring and remotely manipulating target computers. The program, called [[Ettercap (software)|Ettercap]], was embraced both by hackers looking to spy on people, and by companies that hoped to test the security of their own networks.<br /> <br /> The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their skype calls, the police contacted Ornaghi and Valleri and asked them for help modifying the program for these purposes. Hacking Team was born, and became &quot;the first sellers of commercial hacking software to the police.&quot;&lt;ref name=Jeffries/&gt;<br /> <br /> === Hacking Team is itself hacked ===<br /> <br /> On July 5, 2015, the Twitter account of the company was compromised, and 400 GB of data, including alleged internal e-mails, invoices, and source code were leaked via [[BitTorrent]]&lt;ref&gt;{{Wayback|url=https://twitter.com/hackingteam|title=Hacked Team (@hackingteam)|date=20150706010312}}&lt;/ref&gt;. An announcement of the hack, including a link to the bittorrent seed, was retweeted by [[WikiLeaks]] and by many others through social media&lt;ref&gt;{{Twitter status|wikileaks|617865712611233792|Inside malware makers &quot;Hacking Team&quot;: hundreds of Gb of e-mails, files, and source code|[[WikiLeaks]]|July 6, 2015|July 6, 2015}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Hacking Team hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan|url = http://www.ibtimes.co.uk/hacking-team-hacked-spy-tools-sold-oppressive-regimes-sudan-bahrain-kazakhstan-1509460|accessdate = 2015-07-06}}&lt;/ref&gt;.<br /> <br /> Although the material was voluminous, early analysis of the hacked material appeared to reveal that Hacking Team had invoiced the Lebanese Army&lt;ref&gt;{{Twitter|url=https://twitter.com/SynAckPwn/status/617955067006578689}}&lt;/ref&gt; and [[Sudan]] and that spy tools were also sold to Bahrain and Kazakhstan.&lt;ref&gt;{{Cite web|title = Hacking Team hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan|url = http://www.ibtimes.co.uk/hacking-team-hacked-spy-tools-sold-oppressive-regimes-sudan-bahrain-kazakhstan-1509460|accessdate = 2015-07-06}}&lt;/ref&gt; Hacking Team had previous claimed they had never done business with Sudan.&lt;ref&gt;{{Cite web|title = Hacking Team hacked, attackers claim 400GB in dumped data|url = http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html|accessdate = 2015-07-06|first = Steve|last = Ragan}}&lt;/ref&gt;<br /> <br /> After a few hours without response from Hacking Team, member Christian Pozzi tweeted that the company was working closely with police and that &quot;what the attackers are claiming regarding our company is not true.&quot;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964180042190848|accessdate = 2015-07-06}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964660705234944|accessdate = 2015-07-06}}&lt;/ref&gt; He also claimed that the torrented material &quot;contains a virus&quot; and that it constituted &quot;false info&quot;.&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617962663188926465|accessdate = 2015-07-06}}&lt;/ref&gt; Shortly after these tweets, Pozzi's Twitter account itself was hacked.&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter: &quot;Uh Oh - my twitter account was also hacked.&quot;|url = https://web.archive.org/web/20150706084837/https://twitter.com/christian_pozzi/status/617977753250496512|date = 2015-07-06|accessdate = 2015-07-06}}&lt;/ref&gt;<br /> <br /> ==Capabilities==<br /> Hacking Team enables clients to perform remote monitoring functions against citizens via their Remote Control Systems (RCS) including Da Vinci:<br /> <br /> *Covert collection of emails, text message, phone call history and address books<br /> *[[Keystroke logging]]<br /> *Uncover search history data and take screenshots<br /> *record audio from phone calls <br /> *Use phones to collect ambient noise and conversations<br /> *Activate phone or computer cameras <br /> *Hijack telephone GPS systems to monitor target's location<br /> <br /> Hacking team uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.&lt;ref&gt;{{cite news|last1=Schneier|first1=Bruce|title=More on Hacking Team's Government Spying Software|url=https://www.schneier.com/blog/archives/2014/06/more_on_hacking.html}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Hacking Team Tools Allow Governments To Take Full Control of Your Smartphone|url = http://www.ibtimes.co.uk/hacking-team-tools-allow-governments-take-full-control-your-smartphone-1453987|accessdate = 2015-07-06}}&lt;/ref&gt;<br /> <br /> ==See also==<br /> *[[FinFisher]]<br /> <br /> ==References==<br /> {{reflist}}<br /> <br /> [[Category:Computer security software]]<br /> [[Category:Spyware]]<br /> [[Category:Surveillance]]<br /> [[Category:Trojan horses]]<br /> [[Category:Espionage techniques]]<br /> [[Category:Espionage devices]]<br /> [[Category:Malware toolkits]]<br /> [[Category:Computer access control]]<br /> [[Category:Cyberwarfare]]<br /> [[Category:Espionage scandals and incidents]]<br /> [[Category:Companies based in Milan]]</div> Replysixty https://de.wikipedia.org/w/index.php?title=HackingTeam&diff=177174744 HackingTeam 2015-07-06T08:15:24Z <p>Replysixty: slight update</p> <hr /> <div>'''Hacking Team''' is a [[Milan]]-based IT company that sells offensive intrusion and surveillance capabilities to governments and law enforcement agencies. Its remote control systems enable governments to monitor the communications of internet users, decipher their encrypted files and emails, record [[Skype]] and other Voice over IP communications, and remotely activate microphones and camera on target computers.&lt;ref&gt;{{cite web|title=Enemies of the Internet: Hacking Team|url=http://surveillance.rsf.org/en/hacking-team/|work=[[Reporters Without Borders]]|accessdate=24 April 2014}}&lt;/ref&gt; The company has been criticized for providing these capabilities to governments with poor human rights records.&lt;ref&gt;{{cite web | last3 = Marquis-Boire | first3 = Morgan | last1 = Marczak | first1 = Bill | last2 = Gaurnieri | first2 = Claudio | last4 = Scott-Railton | first4 = John | title = Mapping Hacking Team's &quot;Untraceable&quot; Spyware | url = https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ | date = February 17, 2014}}&lt;/ref&gt; Hacking Team states that they have the ability to disable their software if it is used unethically.&lt;ref&gt;{{cite news|url=http://www.newyorker.com/online/blogs/elements/2014/03/hacked-by-ones-own-government.html|title=Hackers Without Borders|last=Kopstein|first=Joshua|work=[[The New Yorker]]|date=10 March 2014|accessdate=24 April 2014}}&lt;/ref&gt;<br /> <br /> In June 2014, a report from the University of Toronto detailed the functionality and architecture of Hacking Team’s Remote Control System (RCS) software and operator tradecraft.&lt;ref&gt;{{Cite web|url = https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/|title = Police Story: Hacking Team’s Government Surveillance Malware|date = June 24, 2014|accessdate = August 3, 2014|website = Citizen Lab|publisher = University of Toronto|last1 = Marquis-Boire|first1 = Morgan | last2 = Gaurnieri | first2 = Claudio | first3 = John | last3 = Scott-Railton | first4 = Katie | last4 = Kleemola }}&lt;/ref&gt;<br /> <br /> Hacking Team employs around 40 people in its Italian office, and has subsidiary branches in [[Annapolis]] and [[Singapore]]. Its products are in use in dozens of countries across six continents.&lt;ref name=Jeffries&gt;{{cite web|last=Jeffries|first=Adrianne|title=Meet Hacking Team, the company that helps the police hack you|url=http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers|accessdate=21 April 2014|work=[[The Verge]]|date=13 September 2013}}&lt;/ref&gt;<br /> <br /> ==Company history==<br /> Hacking Team was started by two Italian programmers, Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri created a set of tools that could used for monitoring and remotely manipulating target computers. The program, called [[Ettercap (software)|Ettercap]], was embraced both by hackers looking to spy on people, and by companies that hoped to test the security of their own networks.<br /> <br /> The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their skype calls, the police contacted Ornaghi and Valleri and asked them for help modifying the program for these purposes. Hacking Team was born, and became &quot;the first sellers of commercial hacking software to the police.&quot;&lt;ref name=Jeffries/&gt;<br /> <br /> === Hacking Team is itself hacked ===<br /> <br /> On July 5, 2015, the Twitter account of the company was compromised, and 400 GB of data, including alleged internal e-mails, invoices, and source code were leaked via [[BitTorrent]]&lt;ref&gt;{{Wayback|url=https://twitter.com/hackingteam|title=Hacked Team (@hackingteam)|date=20150706010312}}&lt;/ref&gt;. An announcement of the hack, including a link to the bittorrent seed, was retweeted by [[WikiLeaks]] and by many others through social media&lt;ref&gt;{{Twitter status|wikileaks|617865712611233792|Inside malware makers &quot;Hacking Team&quot;: hundreds of Gb of e-mails, files, and source code|[[WikiLeaks]]|July 6, 2015|July 6, 2015}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Hacking Team hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan|url = http://www.ibtimes.co.uk/hacking-team-hacked-spy-tools-sold-oppressive-regimes-sudan-bahrain-kazakhstan-1509460|accessdate = 2015-07-06}}&lt;/ref&gt;.<br /> <br /> Although the material was voluminous, early analysis of the hacked material appeared to reveal that Hacking Team had invoiced the Lebanese Army&lt;ref&gt;{{Twitter|url=https://twitter.com/SynAckPwn/status/617955067006578689}}&lt;/ref&gt; and [[Sudan]] and that spy tools were also sold to Bahrain and Kazakhstan.&lt;ref&gt;{{Cite web|title = Hacking Team hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan|url = http://www.ibtimes.co.uk/hacking-team-hacked-spy-tools-sold-oppressive-regimes-sudan-bahrain-kazakhstan-1509460|accessdate = 2015-07-06}}&lt;/ref&gt; Hacking Team had previous claimed they had never done business with Sudan.&lt;ref&gt;{{Cite web|title = Hacking Team hacked, attackers claim 400GB in dumped data|url = http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html|accessdate = 2015-07-06|first = Steve|last = Ragan}}&lt;/ref&gt;<br /> <br /> After a few hours without response from Hacking Team, member Christian Pozzi tweeted that the company was working closely with police and that &quot;what the attackers are claiming regarding our company is not true.&quot;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964180042190848|accessdate = 2015-07-06}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964660705234944|accessdate = 2015-07-06}}&lt;/ref&gt; He also claimed that the torrented material &quot;contains a virus&quot; and that it constituted &quot;false info&quot;.&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617962663188926465|accessdate = 2015-07-06}}&lt;/ref&gt;<br /> <br /> ==Capabilities==<br /> Hacking Team enables clients to perform remote monitoring functions against citizens via their Remote Control Systems (RCS) including Da Vinci:<br /> <br /> *Covert collection of emails, text message, phone call history and address books<br /> *[[Keystroke logging]]<br /> *Uncover search history data and take screenshots<br /> *record audio from phone calls <br /> *Use phones to collect ambient noise and conversations<br /> *Activate phone or computer cameras <br /> *Hijack telephone GPS systems to monitor target's location<br /> <br /> Hacking team uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.&lt;ref&gt;{{cite news|last1=Schneier|first1=Bruce|title=More on Hacking Team's Government Spying Software|url=https://www.schneier.com/blog/archives/2014/06/more_on_hacking.html}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Hacking Team Tools Allow Governments To Take Full Control of Your Smartphone|url = http://www.ibtimes.co.uk/hacking-team-tools-allow-governments-take-full-control-your-smartphone-1453987|accessdate = 2015-07-06}}&lt;/ref&gt;<br /> <br /> ==See also==<br /> *[[FinFisher]]<br /> <br /> ==References==<br /> {{reflist}}<br /> <br /> [[Category:Computer security software]]<br /> [[Category:Spyware]]<br /> [[Category:Surveillance]]<br /> [[Category:Trojan horses]]<br /> [[Category:Espionage techniques]]<br /> [[Category:Espionage devices]]<br /> [[Category:Malware toolkits]]<br /> [[Category:Computer access control]]<br /> [[Category:Cyberwarfare]]<br /> [[Category:Espionage scandals and incidents]]<br /> [[Category:Companies based in Milan]]</div> Replysixty https://de.wikipedia.org/w/index.php?title=HackingTeam&diff=177174743 HackingTeam 2015-07-06T08:11:24Z <p>Replysixty: /* Hacking Team is itself hacked */ More info on the hack</p> <hr /> <div>'''Hacking Team''' is a [[Milan]]-based IT company that sells offensive intrusion and surveillance capabilities to governments and law enforcement agencies. Its remote control systems enable governments to monitor the communications of internet users, decipher their encrypted files and emails, record [[Skype]] and other Voice over IP communications, and remotely activate microphones and camera on target computers.&lt;ref&gt;{{cite web|title=Enemies of the Internet: Hacking Team|url=http://surveillance.rsf.org/en/hacking-team/|work=[[Reporters Without Borders]]|accessdate=24 April 2014}}&lt;/ref&gt; The company has been criticized for providing these capabilities to governments with poor human rights records.&lt;ref&gt;{{cite web | last3 = Marquis-Boire | first3 = Morgan | last1 = Marczak | first1 = Bill | last2 = Gaurnieri | first2 = Claudio | last4 = Scott-Railton | first4 = John | title = Mapping Hacking Team's &quot;Untraceable&quot; Spyware | url = https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ | date = February 17, 2014}}&lt;/ref&gt; Hacking Team states that they have the ability to disable their software if it is used unethically.&lt;ref&gt;{{cite news|url=http://www.newyorker.com/online/blogs/elements/2014/03/hacked-by-ones-own-government.html|title=Hackers Without Borders|last=Kopstein|first=Joshua|work=[[The New Yorker]]|date=10 March 2014|accessdate=24 April 2014}}&lt;/ref&gt;<br /> <br /> In June 2014, a report from the University of Toronto detailed the functionality and architecture of Hacking Team’s Remote Control System (RCS) software and operator tradecraft.&lt;ref&gt;{{Cite web|url = https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/|title = Police Story: Hacking Team’s Government Surveillance Malware|date = June 24, 2014|accessdate = August 3, 2014|website = Citizen Lab|publisher = University of Toronto|last1 = Marquis-Boire|first1 = Morgan | last2 = Gaurnieri | first2 = Claudio | first3 = John | last3 = Scott-Railton | first4 = Katie | last4 = Kleemola }}&lt;/ref&gt;<br /> <br /> Hacking Team employs around 40 people in its Italian office, and has subsidiary branches in [[Annapolis]] and [[Singapore]]. Its products are in use in dozens of countries across six continents.&lt;ref name=Jeffries&gt;{{cite web|last=Jeffries|first=Adrianne|title=Meet Hacking Team, the company that helps the police hack you|url=http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers|accessdate=21 April 2014|work=[[The Verge]]|date=13 September 2013}}&lt;/ref&gt;<br /> <br /> ==Company history==<br /> Hacking Team was started by two Italian programmers, Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri created a set of tools that could used for monitoring and remotely manipulating target computers. The program, called [[Ettercap (software)|Ettercap]], was embraced both by hackers looking to spy on people, and by companies that hoped to test the security of their own networks.<br /> <br /> The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their skype calls, the police contacted Ornaghi and Valleri and asked them for help modifying the program for these purposes. Hacking Team was born, and became &quot;the first sellers of commercial hacking software to the police.&quot;&lt;ref name=Jeffries/&gt;<br /> <br /> === Hacking Team is itself hacked ===<br /> <br /> On July 5, 2015, the Twitter account of the company was compromised, and 400 GB of data, including alleged internal e-mails, invoices, and source code were leaked via [[BitTorrent]]&lt;ref&gt;{{Wayback|url=https://twitter.com/hackingteam|title=Hacked Team (@hackingteam)|date=20150706010312}}&lt;/ref&gt;. An announcement of the hack, including a link to the bittorrent seed, was retweeted by [[WikiLeaks]] and by many others through social media&lt;ref&gt;{{Twitter status|wikileaks|617865712611233792|Inside malware makers &quot;Hacking Team&quot;: hundreds of Gb of e-mails, files, and source code|[[WikiLeaks]]|July 6, 2015|July 6, 2015}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Hacking Team hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan|url = http://www.ibtimes.co.uk/hacking-team-hacked-spy-tools-sold-oppressive-regimes-sudan-bahrain-kazakhstan-1509460|accessdate = 2015-07-06}}&lt;/ref&gt;.<br /> <br /> Although the material was voluminous, early analysis of the hacked material appeared to reveal that Hacking Team had invoiced the Lebanese Army&lt;ref&gt;{{Twitter|url=https://twitter.com/SynAckPwn/status/617955067006578689}}&lt;/ref&gt; and [[Sudan]] and that spy tools were also sold to Bahrain and Kazakhstan.&lt;ref&gt;{{Cite web|title = Hacking Team hacked: Spy tools sold to oppressive regimes Sudan, Bahrain and Kazakhstan|url = http://www.ibtimes.co.uk/hacking-team-hacked-spy-tools-sold-oppressive-regimes-sudan-bahrain-kazakhstan-1509460|accessdate = 2015-07-06}}&lt;/ref&gt; Hacking Team had previous claimed they had never done business with Sudan.&lt;ref&gt;{{Cite web|title = Hacking Team hacked, attackers claim 400GB in dumped data|url = http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html|accessdate = 2015-07-06|first = Steve|last = Ragan}}&lt;/ref&gt;<br /> <br /> After a few hours without response from Hacking Team, member Christian Pozzi tweeted that the company was working closely with police and that &quot;what the attackers are claiming regarding our company is not true.&quot;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964180042190848|accessdate = 2015-07-06}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964660705234944|accessdate = 2015-07-06}}&lt;/ref&gt; He also claimed that the torrented material &quot;contains a virus&quot; and that it constituted &quot;false info&quot;.&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617962663188926465|accessdate = 2015-07-06}}&lt;/ref&gt;<br /> <br /> ==Capabilities==<br /> Hacking team enables governments to perform the following remote monitoring functions against citizens:<br /> <br /> *Covert collection of emails, text message, phone call history and address books<br /> *[[Keystroke logging]]<br /> *Uncover search history data and take screenshots<br /> *record audio from phone calls <br /> *Use phones to collect ambient noise and conversations<br /> *Activate phone or computer cameras <br /> *Hijack telephone GPS systems to monitor target's location<br /> <br /> Hacking team uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.&lt;ref&gt;{{cite news|last1=Schneier|first1=Bruce|title=More on Hacking Team's Government Spying Software|url=https://www.schneier.com/blog/archives/2014/06/more_on_hacking.html}}&lt;/ref&gt;<br /> <br /> ==See also==<br /> *[[FinFisher]]<br /> <br /> ==References==<br /> {{reflist}}<br /> <br /> [[Category:Computer security software]]<br /> [[Category:Spyware]]<br /> [[Category:Surveillance]]<br /> [[Category:Trojan horses]]<br /> [[Category:Espionage techniques]]<br /> [[Category:Espionage devices]]<br /> [[Category:Malware toolkits]]<br /> [[Category:Computer access control]]<br /> [[Category:Cyberwarfare]]<br /> [[Category:Espionage scandals and incidents]]<br /> [[Category:Companies based in Milan]]</div> Replysixty https://de.wikipedia.org/w/index.php?title=HackingTeam&diff=177174742 HackingTeam 2015-07-06T08:07:22Z <p>Replysixty: /* Hacking Team is itself hacked */</p> <hr /> <div>'''Hacking Team''' is a [[Milan]]-based IT company that sells offensive intrusion and surveillance capabilities to governments and law enforcement agencies. Its remote control systems enable governments to monitor the communications of internet users, decipher their encrypted files and emails, record [[Skype]] and other Voice over IP communications, and remotely activate microphones and camera on target computers.&lt;ref&gt;{{cite web|title=Enemies of the Internet: Hacking Team|url=http://surveillance.rsf.org/en/hacking-team/|work=[[Reporters Without Borders]]|accessdate=24 April 2014}}&lt;/ref&gt; The company has been criticized for providing these capabilities to governments with poor human rights records.&lt;ref&gt;{{cite web | last3 = Marquis-Boire | first3 = Morgan | last1 = Marczak | first1 = Bill | last2 = Gaurnieri | first2 = Claudio | last4 = Scott-Railton | first4 = John | title = Mapping Hacking Team's &quot;Untraceable&quot; Spyware | url = https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ | date = February 17, 2014}}&lt;/ref&gt; Hacking Team states that they have the ability to disable their software if it is used unethically.&lt;ref&gt;{{cite news|url=http://www.newyorker.com/online/blogs/elements/2014/03/hacked-by-ones-own-government.html|title=Hackers Without Borders|last=Kopstein|first=Joshua|work=[[The New Yorker]]|date=10 March 2014|accessdate=24 April 2014}}&lt;/ref&gt;<br /> <br /> In June 2014, a report from the University of Toronto detailed the functionality and architecture of Hacking Team’s Remote Control System (RCS) software and operator tradecraft.&lt;ref&gt;{{Cite web|url = https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/|title = Police Story: Hacking Team’s Government Surveillance Malware|date = June 24, 2014|accessdate = August 3, 2014|website = Citizen Lab|publisher = University of Toronto|last1 = Marquis-Boire|first1 = Morgan | last2 = Gaurnieri | first2 = Claudio | first3 = John | last3 = Scott-Railton | first4 = Katie | last4 = Kleemola }}&lt;/ref&gt;<br /> <br /> Hacking Team employs around 40 people in its Italian office, and has subsidiary branches in [[Annapolis]] and [[Singapore]]. Its products are in use in dozens of countries across six continents.&lt;ref name=Jeffries&gt;{{cite web|last=Jeffries|first=Adrianne|title=Meet Hacking Team, the company that helps the police hack you|url=http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers|accessdate=21 April 2014|work=[[The Verge]]|date=13 September 2013}}&lt;/ref&gt;<br /> <br /> ==Company history==<br /> Hacking Team was started by two Italian programmers, Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri created a set of tools that could used for monitoring and remotely manipulating target computers. The program, called [[Ettercap (software)|Ettercap]], was embraced both by hackers looking to spy on people, and by companies that hoped to test the security of their own networks.<br /> <br /> The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their skype calls, the police contacted Ornaghi and Valleri and asked them for help modifying the program for these purposes. Hacking Team was born, and became &quot;the first sellers of commercial hacking software to the police.&quot;&lt;ref name=Jeffries/&gt;<br /> <br /> === Hacking Team is itself hacked ===<br /> <br /> On July 5, 2015, the Twitter account of the company was compromised, and 400 GB of data, including alleged internal e-mails, invoices, and source code were leaked via [[BitTorrent]]&lt;ref&gt;{{Wayback|url=https://twitter.com/hackingteam|title=Hacked Team (@hackingteam)|date=20150706010312}}&lt;/ref&gt;. An announcement of the hack, including a link to the bittorrent seed, was retweeted by [[WikiLeaks]] and by many others through social media&lt;ref&gt;{{Twitter status|wikileaks|617865712611233792|Inside malware makers &quot;Hacking Team&quot;: hundreds of Gb of e-mails, files, and source code|[[WikiLeaks]]|July 6, 2015|July 6, 2015}}&lt;/ref&gt;.<br /> <br /> Although the material was voluminous, early analysis of the hacked material appeared to reveal that Hacking Team had invoiced the Lebanese Army&lt;ref&gt;{{Twitter|url=https://twitter.com/SynAckPwn/status/617955067006578689}}&lt;/ref&gt; and [[Sudan]]. Hacking Team had previous claimed they had never done business with Sudan.&lt;ref&gt;{{Cite web|title = Hacking Team hacked, attackers claim 400GB in dumped data|url = http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html|accessdate = 2015-07-06|first = Steve|last = Ragan}}&lt;/ref&gt;<br /> <br /> After a few hours without response from Hacking Team, member Christian Pozzi tweeted that the company was working closely with police and that &quot;what the attackers are claiming regarding our company is not true.&quot;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964180042190848|accessdate = 2015-07-06}}&lt;/ref&gt;&lt;ref&gt;{{Cite web|title = Christian Pozzi on Twitter|url = https://twitter.com/christian_pozzi/status/617964660705234944|accessdate = 2015-07-06}}&lt;/ref&gt;<br /> <br /> ==Capabilities==<br /> Hacking team enables governments to perform the following remote monitoring functions against citizens:<br /> <br /> *Covert collection of emails, text message, phone call history and address books<br /> *[[Keystroke logging]]<br /> *Uncover search history data and take screenshots<br /> *record audio from phone calls <br /> *Use phones to collect ambient noise and conversations<br /> *Activate phone or computer cameras <br /> *Hijack telephone GPS systems to monitor target's location<br /> <br /> Hacking team uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.&lt;ref&gt;{{cite news|last1=Schneier|first1=Bruce|title=More on Hacking Team's Government Spying Software|url=https://www.schneier.com/blog/archives/2014/06/more_on_hacking.html}}&lt;/ref&gt;<br /> <br /> ==See also==<br /> *[[FinFisher]]<br /> <br /> ==References==<br /> {{reflist}}<br /> <br /> [[Category:Computer security software]]<br /> [[Category:Spyware]]<br /> [[Category:Surveillance]]<br /> [[Category:Trojan horses]]<br /> [[Category:Espionage techniques]]<br /> [[Category:Espionage devices]]<br /> [[Category:Malware toolkits]]<br /> [[Category:Computer access control]]<br /> [[Category:Cyberwarfare]]<br /> [[Category:Espionage scandals and incidents]]<br /> [[Category:Companies based in Milan]]</div> Replysixty https://de.wikipedia.org/w/index.php?title=HackingTeam&diff=177174741 HackingTeam 2015-07-06T07:49:23Z <p>Replysixty: citation fix</p> <hr /> <div>'''Hacking Team''' is a [[Milan]]-based IT company that sells offensive intrusion and surveillance capabilities to governments and law enforcement agencies. Its remote control systems enable governments to monitor the communications of internet users, decipher their encrypted files and emails, record [[Skype]] and other Voice over IP communications, and remotely activate microphones and camera on target computers.&lt;ref&gt;{{cite web|title=Enemies of the Internet: Hacking Team|url=http://surveillance.rsf.org/en/hacking-team/|work=[[Reporters Without Borders]]|accessdate=24 April 2014}}&lt;/ref&gt; The company has been criticized for providing these capabilities to governments with poor human rights records.&lt;ref&gt;{{cite web | last3 = Marquis-Boire | first3 = Morgan | last1 = Marczak | first1 = Bill | last2 = Gaurnieri | first2 = Claudio | last4 = Scott-Railton | first4 = John | title = Mapping Hacking Team's &quot;Untraceable&quot; Spyware | url = https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ | date = February 17, 2014}}&lt;/ref&gt; Hacking Team states that they have the ability to disable their software if it is used unethically.&lt;ref&gt;{{cite news|url=http://www.newyorker.com/online/blogs/elements/2014/03/hacked-by-ones-own-government.html|title=Hackers Without Borders|last=Kopstein|first=Joshua|work=[[The New Yorker]]|date=10 March 2014|accessdate=24 April 2014}}&lt;/ref&gt;<br /> <br /> In June 2014, a report from the University of Toronto detailed the functionality and architecture of Hacking Team’s Remote Control System (RCS) software and operator tradecraft.&lt;ref&gt;{{Cite web|url = https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/|title = Police Story: Hacking Team’s Government Surveillance Malware|date = June 24, 2014|accessdate = August 3, 2014|website = Citizen Lab|publisher = University of Toronto|last1 = Marquis-Boire|first1 = Morgan | last2 = Gaurnieri | first2 = Claudio | first3 = John | last3 = Scott-Railton | first4 = Katie | last4 = Kleemola }}&lt;/ref&gt;<br /> <br /> Hacking Team employs around 40 people in its Italian office, and has subsidiary branches in [[Annapolis]] and [[Singapore]]. Its products are in use in dozens of countries across six continents.&lt;ref name=Jeffries&gt;{{cite web|last=Jeffries|first=Adrianne|title=Meet Hacking Team, the company that helps the police hack you|url=http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers|accessdate=21 April 2014|work=[[The Verge]]|date=13 September 2013}}&lt;/ref&gt;<br /> <br /> ==Company history==<br /> Hacking Team was started by two Italian programmers, Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri created a set of tools that could used for monitoring and remotely manipulating target computers. The program, called [[Ettercap (software)|Ettercap]], was embraced both by hackers looking to spy on people, and by companies that hoped to test the security of their own networks.<br /> <br /> The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their skype calls, the police contacted Ornaghi and Valleri and asked them for help modifying the program for these purposes. Hacking Team was born, and became &quot;the first sellers of commercial hacking software to the police.&quot;&lt;ref name=Jeffries/&gt;<br /> <br /> === Hacking Team is itself hacked ===<br /> <br /> On July 6, 2015, the Twitter account of the company was compromised, and 400 GB of internal e-mails, invoices, and source code were leaked via [[BitTorrent]]&lt;ref&gt;{{Wayback|url=https://twitter.com/hackingteam|title=Hacked Team (@hackingteam)|date=20150706010312}}&lt;/ref&gt;. An announcement of the hack, including a link to the bittorrent seed, was retweeted by [[WikiLeaks]] and by many others through social media&lt;ref&gt;{{Twitter status|wikileaks|617865712611233792|Inside malware makers &quot;Hacking Team&quot;: hundreds of Gb of e-mails, files, and source code|[[WikiLeaks]]|July 6, 2015|July 6, 2015}}&lt;/ref&gt;.<br /> <br /> Although the material was voluminous at 400GB, early analysis of the hacked material appeared to reveal that Hacking Team had invoiced the Lebanese Army&lt;ref&gt;{{Twitter|url=https://twitter.com/SynAckPwn/status/617955067006578689}}&lt;/ref&gt; and [[Sudan]]. Hacking Team had previous claimed they had never done business with Sudan.&lt;ref&gt;{{Cite web|title = Hacking Team hacked, attackers claim 400GB in dumped data|url = http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html|accessdate = 2015-07-06|first = Steve|last = Ragan}}&lt;/ref&gt;<br /> <br /> ==Capabilities==<br /> Hacking team enables governments to perform the following remote monitoring functions against citizens:<br /> <br /> *Covert collection of emails, text message, phone call history and address books<br /> *[[Keystroke logging]]<br /> *Uncover search history data and take screenshots<br /> *record audio from phone calls <br /> *Use phones to collect ambient noise and conversations<br /> *Activate phone or computer cameras <br /> *Hijack telephone GPS systems to monitor target's location<br /> <br /> Hacking team uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.&lt;ref&gt;{{cite news|last1=Schneier|first1=Bruce|title=More on Hacking Team's Government Spying Software|url=https://www.schneier.com/blog/archives/2014/06/more_on_hacking.html}}&lt;/ref&gt;<br /> <br /> ==See also==<br /> *[[FinFisher]]<br /> <br /> ==References==<br /> {{reflist}}<br /> <br /> [[Category:Computer security software]]<br /> [[Category:Spyware]]<br /> [[Category:Surveillance]]<br /> [[Category:Trojan horses]]<br /> [[Category:Espionage techniques]]<br /> [[Category:Espionage devices]]<br /> [[Category:Malware toolkits]]<br /> [[Category:Computer access control]]<br /> [[Category:Cyberwarfare]]<br /> [[Category:Espionage scandals and incidents]]<br /> [[Category:Companies based in Milan]]</div> Replysixty https://de.wikipedia.org/w/index.php?title=HackingTeam&diff=177174740 HackingTeam 2015-07-06T07:41:15Z <p>Replysixty: /* Hacking Team is itself hacked */ fix bad link</p> <hr /> <div>'''Hacking Team''' is a [[Milan]]-based IT company that sells offensive intrusion and surveillance capabilities to governments and law enforcement agencies. Its remote control systems enable governments to monitor the communications of internet users, decipher their encrypted files and emails, record [[Skype]] and other Voice over IP communications, and remotely activate microphones and camera on target computers.&lt;ref&gt;{{cite web|title=Enemies of the Internet: Hacking Team|url=http://surveillance.rsf.org/en/hacking-team/|work=[[Reporters Without Borders]]|accessdate=24 April 2014}}&lt;/ref&gt; The company has been criticized for providing these capabilities to governments with poor human rights records.&lt;ref&gt;{{cite web | last3 = Marquis-Boire | first3 = Morgan | last1 = Marczak | first1 = Bill | last2 = Gaurnieri | first2 = Claudio | last4 = Scott-Railton | first4 = John | title = Mapping Hacking Team's &quot;Untraceable&quot; Spyware | url = https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ | date = February 17, 2014}}&lt;/ref&gt; Hacking Team states that they have the ability to disable their software if it is used unethically.&lt;ref&gt;{{cite news|url=http://www.newyorker.com/online/blogs/elements/2014/03/hacked-by-ones-own-government.html|title=Hackers Without Borders|last=Kopstein|first=Joshua|work=[[The New Yorker]]|date=10 March 2014|accessdate=24 April 2014}}&lt;/ref&gt;<br /> <br /> In June 2014, a report from the University of Toronto detailed the functionality and architecture of Hacking Team’s Remote Control System (RCS) software and operator tradecraft.&lt;ref&gt;{{Cite web|url = https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/|title = Police Story: Hacking Team’s Government Surveillance Malware|date = June 24, 2014|accessdate = August 3, 2014|website = Citizen Lab|publisher = University of Toronto|last1 = Marquis-Boire|first1 = Morgan | last2 = Gaurnieri | first2 = Claudio | first3 = John | last3 = Scott-Railton | first4 = Katie | last4 = Kleemola }}&lt;/ref&gt;<br /> <br /> Hacking Team employs around 40 people in its Italian office, and has subsidiary branches in [[Annapolis]] and [[Singapore]]. Its products are in use in dozens of countries across six continents.&lt;ref name=Jeffries&gt;{{cite web|last=Jeffries|first=Adrianne|title=Meet Hacking Team, the company that helps the police hack you|url=http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers|accessdate=21 April 2014|work=[[The Verge]]|date=13 September 2013}}&lt;/ref&gt;<br /> <br /> ==Company history==<br /> Hacking Team was started by two Italian programmers, Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri created a set of tools that could used for monitoring and remotely manipulating target computers. The program, called [[Ettercap (software)|Ettercap]], was embraced both by hackers looking to spy on people, and by companies that hoped to test the security of their own networks.<br /> <br /> The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their skype calls, the police contacted Ornaghi and Valleri and asked them for help modifying the program for these purposes. Hacking Team was born, and became &quot;the first sellers of commercial hacking software to the police.&quot;&lt;ref name=Jeffries/&gt;<br /> <br /> === Hacking Team is itself hacked ===<br /> <br /> On July 6, 2015, the Twitter account of the company was compromised, and 400 GB of internal e-mails, invoices, and source code were leaked via [[BitTorrent]]&lt;ref&gt;{{Wayback|url=https://twitter.com/hackingteam|title=Hacked Team (@hackingteam)|date=20150706010312}}&lt;/ref&gt;. An announcement of the hack, including a link to the bittorrent seed, was retweeted by [[WikiLeaks]] and by many others through social media&lt;ref&gt;{{Twitter status|wikileaks|617865712611233792|Inside malware makers &quot;Hacking Team&quot;: hundreds of Gb of e-mails, files, and source code|[[WikiLeaks]]|July 6, 2015|July 6, 2015}}&lt;/ref&gt;.<br /> <br /> Although the material was voluminous at 400GB, early analysis of the hacked material appeared to reveal that Hacking Team had invoiced the Lebanese Army&lt;ref&gt;{{Twitter|url=https://twitter.com/SynAckPwn/status/617955067006578689}}&lt;/ref&gt; and [[Sudan]]. Hacking Team had previous claimed they had never done business with Sudan.&lt;ref&gt;{{csoonline.com|url=http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html}}&lt;/ref&gt;<br /> <br /> ==Capabilities==<br /> Hacking team enables governments to perform the following remote monitoring functions against citizens:<br /> <br /> *Covert collection of emails, text message, phone call history and address books<br /> *[[Keystroke logging]]<br /> *Uncover search history data and take screenshots<br /> *record audio from phone calls <br /> *Use phones to collect ambient noise and conversations<br /> *Activate phone or computer cameras <br /> *Hijack telephone GPS systems to monitor target's location<br /> <br /> Hacking team uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.&lt;ref&gt;{{cite news|last1=Schneier|first1=Bruce|title=More on Hacking Team's Government Spying Software|url=https://www.schneier.com/blog/archives/2014/06/more_on_hacking.html}}&lt;/ref&gt;<br /> <br /> ==See also==<br /> *[[FinFisher]]<br /> <br /> ==References==<br /> {{reflist}}<br /> <br /> [[Category:Computer security software]]<br /> [[Category:Spyware]]<br /> [[Category:Surveillance]]<br /> [[Category:Trojan horses]]<br /> [[Category:Espionage techniques]]<br /> [[Category:Espionage devices]]<br /> [[Category:Malware toolkits]]<br /> [[Category:Computer access control]]<br /> [[Category:Cyberwarfare]]<br /> [[Category:Espionage scandals and incidents]]<br /> [[Category:Companies based in Milan]]</div> Replysixty https://de.wikipedia.org/w/index.php?title=HackingTeam&diff=177174739 HackingTeam 2015-07-06T07:40:16Z <p>Replysixty: /* Hacking Team hacked */</p> <hr /> <div>'''Hacking Team''' is a [[Milan]]-based IT company that sells offensive intrusion and surveillance capabilities to governments and law enforcement agencies. Its remote control systems enable governments to monitor the communications of internet users, decipher their encrypted files and emails, record [[Skype]] and other Voice over IP communications, and remotely activate microphones and camera on target computers.&lt;ref&gt;{{cite web|title=Enemies of the Internet: Hacking Team|url=http://surveillance.rsf.org/en/hacking-team/|work=[[Reporters Without Borders]]|accessdate=24 April 2014}}&lt;/ref&gt; The company has been criticized for providing these capabilities to governments with poor human rights records.&lt;ref&gt;{{cite web | last3 = Marquis-Boire | first3 = Morgan | last1 = Marczak | first1 = Bill | last2 = Gaurnieri | first2 = Claudio | last4 = Scott-Railton | first4 = John | title = Mapping Hacking Team's &quot;Untraceable&quot; Spyware | url = https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ | date = February 17, 2014}}&lt;/ref&gt; Hacking Team states that they have the ability to disable their software if it is used unethically.&lt;ref&gt;{{cite news|url=http://www.newyorker.com/online/blogs/elements/2014/03/hacked-by-ones-own-government.html|title=Hackers Without Borders|last=Kopstein|first=Joshua|work=[[The New Yorker]]|date=10 March 2014|accessdate=24 April 2014}}&lt;/ref&gt;<br /> <br /> In June 2014, a report from the University of Toronto detailed the functionality and architecture of Hacking Team’s Remote Control System (RCS) software and operator tradecraft.&lt;ref&gt;{{Cite web|url = https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/|title = Police Story: Hacking Team’s Government Surveillance Malware|date = June 24, 2014|accessdate = August 3, 2014|website = Citizen Lab|publisher = University of Toronto|last1 = Marquis-Boire|first1 = Morgan | last2 = Gaurnieri | first2 = Claudio | first3 = John | last3 = Scott-Railton | first4 = Katie | last4 = Kleemola }}&lt;/ref&gt;<br /> <br /> Hacking Team employs around 40 people in its Italian office, and has subsidiary branches in [[Annapolis]] and [[Singapore]]. Its products are in use in dozens of countries across six continents.&lt;ref name=Jeffries&gt;{{cite web|last=Jeffries|first=Adrianne|title=Meet Hacking Team, the company that helps the police hack you|url=http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers|accessdate=21 April 2014|work=[[The Verge]]|date=13 September 2013}}&lt;/ref&gt;<br /> <br /> ==Company history==<br /> Hacking Team was started by two Italian programmers, Alberto Ornaghi and Marco Valleri. Prior to the company's formal establishment, Ornaghi and Valleri created a set of tools that could used for monitoring and remotely manipulating target computers. The program, called [[Ettercap (software)|Ettercap]], was embraced both by hackers looking to spy on people, and by companies that hoped to test the security of their own networks.<br /> <br /> The Milan police department learned of the tools. Hoping to use Ettercap to spy on Italian citizens and listen to their skype calls, the police contacted Ornaghi and Valleri and asked them for help modifying the program for these purposes. Hacking Team was born, and became &quot;the first sellers of commercial hacking software to the police.&quot;&lt;ref name=Jeffries/&gt;<br /> <br /> === Hacking Team is itself hacked ===<br /> <br /> On July 6, 2015, the Twitter account of the company was compromised, and 400 GB of internal e-mails, invoices, and source code were leaked via [[BitTorrent]]&lt;ref&gt;{{Wayback|url=https://twitter.com/hackingteam|title=Hacked Team (@hackingteam)|date=20150706010312}}&lt;/ref&gt;. An announcement of the hack, including a link to the bittorrent seed, was retweeted by [[WikiLeaks]] and by many others through social media&lt;ref&gt;{{Twitter status|wikileaks|617865712611233792|Inside malware makers &quot;Hacking Team&quot;: hundreds of Gb of e-mails, files, and source code|[[WikiLeaks]]|July 6, 2015|July 6, 2015}}&lt;/ref&gt;.<br /> <br /> Although the material was voluminous at 400GB, early analysis of the hacked material appeared to reveal that Hacking Team had invoiced the Lebanese Army&lt;ref&gt;{{Twitter|url=https://twitter.com/SynAckPwn/status/617955067006578689}}&lt;/ref&gt; and [[Sudan]]. Hacking Team had previous claimed they had never done business with Sudan.&lt;ref&gt;{{[[csoonline.com|url=http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html}}&lt;/ref&gt;<br /> <br /> ==Capabilities==<br /> Hacking team enables governments to perform the following remote monitoring functions against citizens:<br /> <br /> *Covert collection of emails, text message, phone call history and address books<br /> *[[Keystroke logging]]<br /> *Uncover search history data and take screenshots<br /> *record audio from phone calls <br /> *Use phones to collect ambient noise and conversations<br /> *Activate phone or computer cameras <br /> *Hijack telephone GPS systems to monitor target's location<br /> <br /> Hacking team uses advanced techniques to avoid draining cell phone batteries, which could potentially raise suspicions, and other methods to avoid detection.&lt;ref&gt;{{cite news|last1=Schneier|first1=Bruce|title=More on Hacking Team's Government Spying Software|url=https://www.schneier.com/blog/archives/2014/06/more_on_hacking.html}}&lt;/ref&gt;<br /> <br /> ==See also==<br /> *[[FinFisher]]<br /> <br /> ==References==<br /> {{reflist}}<br /> <br /> [[Category:Computer security software]]<br /> [[Category:Spyware]]<br /> [[Category:Surveillance]]<br /> [[Category:Trojan horses]]<br /> [[Category:Espionage techniques]]<br /> [[Category:Espionage devices]]<br /> [[Category:Malware toolkits]]<br /> [[Category:Computer access control]]<br /> [[Category:Cyberwarfare]]<br /> [[Category:Espionage scandals and incidents]]<br /> [[Category:Companies based in Milan]]</div> Replysixty https://de.wikipedia.org/w/index.php?title=Brick_(Elektronik)&diff=109251618 Brick (Elektronik) 2012-05-23T09:00:50Z <p>Replysixty: </p> <hr /> <div>{{Refimprove|date=November 2008}}<br /> {{wiktionary|brick}}<br /> When used in reference to [[consumer electronics]], a &quot;'''brick'''&quot; describes an electronic device such as a [[smart phone]], [[game console]], [[router (computing)|router]], or [[tablet computer]] that owing to a serious misconfiguration, corrupted [[firmware]], [[software]], or a [[computer hardware|hardware]] problem, can no longer function. The term derives from the vaguely [[cuboid]] shape of many electronic devices (and their [[AC adapter|detachable power supplies]]) and the suggestion that non-functional devices are only fit for use as a traditional ceramic [[brick]] commonly used in masonry.<br /> The term can also be used as a verb. For example, &quot;I bricked my [[digital audio player|MP3 player]] when I tried to modify its [[firmware]].&quot;&lt;ref&gt;[http://www.catb.org/jargon/html/B/brick.html CATB.ORG Jargon File]&lt;/ref&gt;<br /> <br /> In one common sense of the term, &quot;bricking&quot; suggests that the damage, often a misconfiguration of essential on-board software, is so serious as to have rendered the device ''permanently unusable''.<br /> <br /> However, another use of the term &quot;bricked&quot; is understood to describe a situation where a device is unable to function even when the device ''does'' have potential to be recovered later to a working state. In this sense, the damage may be reversible; it is only during the period that it's unable to function that the device is deemed &quot;bricked&quot;.<br /> <br /> ==Cause and Prevention==<br /> Bricking a device is usually an unwanted consequence of an attempt to [[software update|update]] the device. Many devices have an update procedure that must not be interrupted; if interrupted by a power failure, user intervention, or any other reason the existing firmware may be partially overwritten and unusable. The risk of corruption can be minimized by taking all possible precautions against interruption.<br /> <br /> Installing incorrect [[firmware]] can also brick a device, e.g., installing firmware for a different revision of the hardware, or installing firmware incompetently [[software patch|patched]] to get around restrictions imposed by official firmware, such as DVD firmware that only plays DVDs [[DVD region code|sold in a particular region]]. Most updating software makes all possible checks that firmware is valid for the device, but this cannot be relied upon.<br /> <br /> Devices can also be bricked by [[malware]] (malicious software), and sometimes by running software not intentionally harmful but with errors that cause damage.<br /> <br /> Some devices include two copies of firmware, one active and the other stored in fixed [[Read-only memory|ROM]] or writable [[non-volatile memory]] and not normally accessible to processes that could corrupt it, and a way to copy the stored firmware over the active version even if corrupt, so that if the active firmware is damaged it can be replaced by the copy and the device will not be bricked. Other devices have minimal &quot;[[bootloader]]&quot; firmware, enabled usually by operating a [[switch]] or [[jumper (computing)|jumper]], which does not enable the device to work normally but can reload the main firmware.<br /> <br /> ==Unbricking==<br /> Some devices &quot;bricked&quot; because the contents of their nonvolatile memory are incorrect can be &quot;unbricked&quot; using separate hardware (a debug board) that accesses this memory directly.&lt;ref&gt;[http://wiki.openmoko.org/wiki/Neo1973_Debug_Board_v2/Unbricking Neo1973 Debug Board v2/Unbricking - Openmoko]&lt;/ref&gt; This is similar to the procedure for loading firmware into a new device when the memory is still empty. This kind of &quot;bricking&quot; and &quot;unbricking&quot; occasionally happens during firmware testing and development. In other cases software and hardware procedures, often complex, have been developed that have a good chance of unbricking the device. There is no general method; each device is different. There are also user-created modifier programs to use on bricked or partially bricked devices to make them functional. Examples include the Wiibrew program [[BootMii]] used to fix semi-bricked Nintendo Wii's or [[ClockworkMod]] on various [[Android device]]s.<br /> <br /> ==Systems==<br /> In principle any device with rewriteable firmware, or certain crucial settings stored into [[Flash ROM|flash]] or [[EEPROM|eeprom]] memory, can be bricked. Many, but not all, devices with user-updateable firmware have protection against bricking; devices intended to be updated only by official service personnel generally do not.<br /> <br /> Amongst devices known to have bricking issues are: older PCs (more recent models often have dual [[BIOS]]es or some other form of protection), many [[mobile phone]]s, [[handheld game console]]s like the [[PlayStation Portable]] and [[Nintendo DS]], [[video game console]]s like the [[Nintendo Wii]], [[Xbox 360]] and [[PlayStation 3]], many [[SCSI]] devices and some lines of [[hard disk drive]]s and [[Router (computing)|router]]s.{{fact|date=September 2010}} <br /> <br /> At least some older consumer market router models can become unresponsive when the user tries to define a [[subnet mask]] that does not contain one contiguous run of 1's and then 0's. If even a single bit is set so that it breaks one of the runs, the router may become bricked, unresponsive to any standard troubleshooting or resolving procedures listed in the manual. Unbricking the router may require opening the case, shorting some [[Jumper (computing)|jumper pins]] on the board, then connecting the router by the USB cable to an old PC with USB 1.1 hardware, running a special DOS level program supplied by the manufacturer, and powering the router up. This procedure will flash the router to factory settings and original firmware.{{CN|date=April 2012}}<br /> <br /> Sometimes an interrupted flash upgrade of a PC motherboard will brick the board, for example, due to a power outage (or user impatience) during the upgrade process. It is sometimes possible to unbrick such a motherboard, by scavenging a similar but otherwise broken board for a BIOS chip, in the hopes that the bios will work even halfway, far enough to boot from floppy. Then it will be possible to retry the flash process. Sometimes it is possible to boot from floppy, then swap the old presumably dead BIOS chip in and reflash it.{{CN|date=April 2012}}<br /> <br /> ==Online and mobile services==<br /> Many newer systems capable of accessing [[online service]]s (such as the [[Xbox]], [[Xbox 360]], [[PlayStation 3]], and [[iPhone]]) have internal hardware-based unique identifiers, allowing individual systems to be tracked over a network and banned from accessing certain online services. Such systems usually continue to operate for purposes unrelated to the online service, but they are often considered &quot;bricked&quot; by users of the online service.<br /> <br /> Mobile telephones have a fixed identification code, the [[IMEI]]; a telephone reported stolen can have its IMEI blocked by [[Cellular network|networks]]&amp;mdash;effectively bricked&amp;mdash;although anyone with the necessary expertise and equipment can usually change the IMEI. In 2011 a United States Senator proposed that phones be &quot;bricked&quot; when reported stolen.&lt;ref&gt;[http://www.financetechnews.com/senator-wants-stolen-cellphones-bricked/ Finance Tech News] Senator wants stolen cellphones &quot;bricked&quot;&lt;/ref&gt; Some local police chiefs agreed&lt;ref&gt;[http://www.wjla.com/articles/2012/02/mpd-fights-robbery-surge-seeks-new-fcc-rule-72491.html WJLA-TV News] Police Department seeks new FCC Rule&lt;/ref&gt; and in April 2012 the FCC announced that the service would be available later in the year. &lt;ref&gt;[http://www.washingtoncitypaper.com/blogs/citydesk/2012/04/10/lanier-fcc-and-wireless-carriers-to-allow-customers-to-brick-stolen-phones/ Carries to allow Customers to Brick Stolen Phones] by Shani Hilton, Apr. 10, 2012, Washington City Paper&lt;/ref&gt;<br /> <br /> ==References==<br /> {{reflist}}<br /> <br /> {{DEFAULTSORT:Brick (Electronics)}}<br /> [[Category:Computer jargon]]</div> Replysixty https://de.wikipedia.org/w/index.php?title=Brick_(Elektronik)&diff=109251617 Brick (Elektronik) 2012-05-23T08:59:13Z <p>Replysixty: computer hardware, not hardware in general</p> <hr /> <div>{{Refimprove|date=November 2008}}<br /> {{wiktionary|brick}}<br /> When used in reference to [[consumer electronics]], a &quot;'''brick'''&quot; describes an electronic device such as a [[smart phone]], [[router (computing)|router]], or [[tablet computer]] that owing to a serious misconfiguration, corrupted [[firmware]], [[software]], or a [[computer hardware|hardware]] problem, can no longer function. The term derives from the vaguely [[cuboid]] shape of many electronic devices (and their [[AC adapter|detachable power supplies]]) and the suggestion that non-functional devices are only fit for use as a traditional ceramic [[brick]] commonly used in masonry.<br /> The term can also be used as a verb. For example, &quot;I bricked my [[digital audio player|MP3 player]] when I tried to modify its [[firmware]].&quot;&lt;ref&gt;[http://www.catb.org/jargon/html/B/brick.html CATB.ORG Jargon File]&lt;/ref&gt;<br /> <br /> In one common sense of the term, &quot;bricking&quot; suggests that the damage, often a misconfiguration of essential on-board software, is so serious as to have rendered the device ''permanently unusable''.<br /> <br /> However, another use of the term &quot;bricked&quot; is understood to describe a situation where a device is unable to function even when the device ''does'' have potential to be recovered later to a working state. In this sense, the damage may be reversible; it is only during the period that it's unable to function that the device is deemed &quot;bricked&quot;.<br /> <br /> ==Cause and Prevention==<br /> Bricking a device is usually an unwanted consequence of an attempt to [[software update|update]] the device. Many devices have an update procedure that must not be interrupted; if interrupted by a power failure, user intervention, or any other reason the existing firmware may be partially overwritten and unusable. The risk of corruption can be minimized by taking all possible precautions against interruption.<br /> <br /> Installing incorrect [[firmware]] can also brick a device, e.g., installing firmware for a different revision of the hardware, or installing firmware incompetently [[software patch|patched]] to get around restrictions imposed by official firmware, such as DVD firmware that only plays DVDs [[DVD region code|sold in a particular region]]. Most updating software makes all possible checks that firmware is valid for the device, but this cannot be relied upon.<br /> <br /> Devices can also be bricked by [[malware]] (malicious software), and sometimes by running software not intentionally harmful but with errors that cause damage.<br /> <br /> Some devices include two copies of firmware, one active and the other stored in fixed [[Read-only memory|ROM]] or writable [[non-volatile memory]] and not normally accessible to processes that could corrupt it, and a way to copy the stored firmware over the active version even if corrupt, so that if the active firmware is damaged it can be replaced by the copy and the device will not be bricked. Other devices have minimal &quot;[[bootloader]]&quot; firmware, enabled usually by operating a [[switch]] or [[jumper (computing)|jumper]], which does not enable the device to work normally but can reload the main firmware.<br /> <br /> ==Unbricking==<br /> Some devices &quot;bricked&quot; because the contents of their nonvolatile memory are incorrect can be &quot;unbricked&quot; using separate hardware (a debug board) that accesses this memory directly.&lt;ref&gt;[http://wiki.openmoko.org/wiki/Neo1973_Debug_Board_v2/Unbricking Neo1973 Debug Board v2/Unbricking - Openmoko]&lt;/ref&gt; This is similar to the procedure for loading firmware into a new device when the memory is still empty. This kind of &quot;bricking&quot; and &quot;unbricking&quot; occasionally happens during firmware testing and development. In other cases software and hardware procedures, often complex, have been developed that have a good chance of unbricking the device. There is no general method; each device is different. There are also user-created modifier programs to use on bricked or partially bricked devices to make them functional. Examples include the Wiibrew program [[BootMii]] used to fix semi-bricked Nintendo Wii's or [[ClockworkMod]] on various [[Android device]]s.<br /> <br /> ==Systems==<br /> In principle any device with rewriteable firmware, or certain crucial settings stored into [[Flash ROM|flash]] or [[EEPROM|eeprom]] memory, can be bricked. Many, but not all, devices with user-updateable firmware have protection against bricking; devices intended to be updated only by official service personnel generally do not.<br /> <br /> Amongst devices known to have bricking issues are: older PCs (more recent models often have dual [[BIOS]]es or some other form of protection), many [[mobile phone]]s, [[handheld game console]]s like the [[PlayStation Portable]] and [[Nintendo DS]], [[video game console]]s like the [[Nintendo Wii]], [[Xbox 360]] and [[PlayStation 3]], many [[SCSI]] devices and some lines of [[hard disk drive]]s and [[Router (computing)|router]]s.{{fact|date=September 2010}} <br /> <br /> At least some older consumer market router models can become unresponsive when the user tries to define a [[subnet mask]] that does not contain one contiguous run of 1's and then 0's. If even a single bit is set so that it breaks one of the runs, the router may become bricked, unresponsive to any standard troubleshooting or resolving procedures listed in the manual. Unbricking the router may require opening the case, shorting some [[Jumper (computing)|jumper pins]] on the board, then connecting the router by the USB cable to an old PC with USB 1.1 hardware, running a special DOS level program supplied by the manufacturer, and powering the router up. This procedure will flash the router to factory settings and original firmware.{{CN|date=April 2012}}<br /> <br /> Sometimes an interrupted flash upgrade of a PC motherboard will brick the board, for example, due to a power outage (or user impatience) during the upgrade process. It is sometimes possible to unbrick such a motherboard, by scavenging a similar but otherwise broken board for a BIOS chip, in the hopes that the bios will work even halfway, far enough to boot from floppy. Then it will be possible to retry the flash process. Sometimes it is possible to boot from floppy, then swap the old presumably dead BIOS chip in and reflash it.{{CN|date=April 2012}}<br /> <br /> ==Online and mobile services==<br /> Many newer systems capable of accessing [[online service]]s (such as the [[Xbox]], [[Xbox 360]], [[PlayStation 3]], and [[iPhone]]) have internal hardware-based unique identifiers, allowing individual systems to be tracked over a network and banned from accessing certain online services. Such systems usually continue to operate for purposes unrelated to the online service, but they are often considered &quot;bricked&quot; by users of the online service.<br /> <br /> Mobile telephones have a fixed identification code, the [[IMEI]]; a telephone reported stolen can have its IMEI blocked by [[Cellular network|networks]]&amp;mdash;effectively bricked&amp;mdash;although anyone with the necessary expertise and equipment can usually change the IMEI. In 2011 a United States Senator proposed that phones be &quot;bricked&quot; when reported stolen.&lt;ref&gt;[http://www.financetechnews.com/senator-wants-stolen-cellphones-bricked/ Finance Tech News] Senator wants stolen cellphones &quot;bricked&quot;&lt;/ref&gt; Some local police chiefs agreed&lt;ref&gt;[http://www.wjla.com/articles/2012/02/mpd-fights-robbery-surge-seeks-new-fcc-rule-72491.html WJLA-TV News] Police Department seeks new FCC Rule&lt;/ref&gt; and in April 2012 the FCC announced that the service would be available later in the year. &lt;ref&gt;[http://www.washingtoncitypaper.com/blogs/citydesk/2012/04/10/lanier-fcc-and-wireless-carriers-to-allow-customers-to-brick-stolen-phones/ Carries to allow Customers to Brick Stolen Phones] by Shani Hilton, Apr. 10, 2012, Washington City Paper&lt;/ref&gt;<br /> <br /> ==References==<br /> {{reflist}}<br /> <br /> {{DEFAULTSORT:Brick (Electronics)}}<br /> [[Category:Computer jargon]]</div> Replysixty https://de.wikipedia.org/w/index.php?title=Brick_(Elektronik)&diff=109251616 Brick (Elektronik) 2012-05-23T08:58:01Z <p>Replysixty: cleanup and clarify the two meanings... not judging on which, if either, is correct. Needs citation...</p> <hr /> <div>{{Refimprove|date=November 2008}}<br /> {{wiktionary|brick}}<br /> When used in reference to [[consumer electronics]], a &quot;'''brick'''&quot; describes an electronic device such as a [[smart phone]], [[router (computing)|router]], or [[tablet computer]] that owing to a serious misconfiguration, corrupted [[firmware]], [[software]], or a [[hardware]] problem, can no longer function. The term derives from the vaguely [[cuboid]] shape of many electronic devices (and their [[AC adapter|detachable power supplies]]) and the suggestion that non-functional devices are only fit for use as a traditional ceramic [[brick]] commonly used in masonry.<br /> The term can also be used as a verb. For example, &quot;I bricked my [[digital audio player|MP3 player]] when I tried to modify its [[firmware]].&quot;&lt;ref&gt;[http://www.catb.org/jargon/html/B/brick.html CATB.ORG Jargon File]&lt;/ref&gt;<br /> <br /> In one common sense of the term, &quot;bricking&quot; suggests that the damage, often a misconfiguration of essential on-board software, is so serious as to have rendered the device ''permanently unusable''.<br /> <br /> However, another use of the term &quot;bricked&quot; is understood to describe a situation where a device is unable to function even when the device ''does'' have potential to be recovered later to a working state. In this sense, the damage may be reversible; it is only during the period that it's unable to function that the device is deemed &quot;bricked&quot;.<br /> <br /> ==Cause and Prevention==<br /> Bricking a device is usually an unwanted consequence of an attempt to [[software update|update]] the device. Many devices have an update procedure that must not be interrupted; if interrupted by a power failure, user intervention, or any other reason the existing firmware may be partially overwritten and unusable. The risk of corruption can be minimized by taking all possible precautions against interruption.<br /> <br /> Installing incorrect [[firmware]] can also brick a device, e.g., installing firmware for a different revision of the hardware, or installing firmware incompetently [[software patch|patched]] to get around restrictions imposed by official firmware, such as DVD firmware that only plays DVDs [[DVD region code|sold in a particular region]]. Most updating software makes all possible checks that firmware is valid for the device, but this cannot be relied upon.<br /> <br /> Devices can also be bricked by [[malware]] (malicious software), and sometimes by running software not intentionally harmful but with errors that cause damage.<br /> <br /> Some devices include two copies of firmware, one active and the other stored in fixed [[Read-only memory|ROM]] or writable [[non-volatile memory]] and not normally accessible to processes that could corrupt it, and a way to copy the stored firmware over the active version even if corrupt, so that if the active firmware is damaged it can be replaced by the copy and the device will not be bricked. Other devices have minimal &quot;[[bootloader]]&quot; firmware, enabled usually by operating a [[switch]] or [[jumper (computing)|jumper]], which does not enable the device to work normally but can reload the main firmware.<br /> <br /> ==Unbricking==<br /> Some devices &quot;bricked&quot; because the contents of their nonvolatile memory are incorrect can be &quot;unbricked&quot; using separate hardware (a debug board) that accesses this memory directly.&lt;ref&gt;[http://wiki.openmoko.org/wiki/Neo1973_Debug_Board_v2/Unbricking Neo1973 Debug Board v2/Unbricking - Openmoko]&lt;/ref&gt; This is similar to the procedure for loading firmware into a new device when the memory is still empty. This kind of &quot;bricking&quot; and &quot;unbricking&quot; occasionally happens during firmware testing and development. In other cases software and hardware procedures, often complex, have been developed that have a good chance of unbricking the device. There is no general method; each device is different. There are also user-created modifier programs to use on bricked or partially bricked devices to make them functional. Examples include the Wiibrew program [[BootMii]] used to fix semi-bricked Nintendo Wii's or [[ClockworkMod]] on various [[Android device]]s.<br /> <br /> ==Systems==<br /> In principle any device with rewriteable firmware, or certain crucial settings stored into [[Flash ROM|flash]] or [[EEPROM|eeprom]] memory, can be bricked. Many, but not all, devices with user-updateable firmware have protection against bricking; devices intended to be updated only by official service personnel generally do not.<br /> <br /> Amongst devices known to have bricking issues are: older PCs (more recent models often have dual [[BIOS]]es or some other form of protection), many [[mobile phone]]s, [[handheld game console]]s like the [[PlayStation Portable]] and [[Nintendo DS]], [[video game console]]s like the [[Nintendo Wii]], [[Xbox 360]] and [[PlayStation 3]], many [[SCSI]] devices and some lines of [[hard disk drive]]s and [[Router (computing)|router]]s.{{fact|date=September 2010}} <br /> <br /> At least some older consumer market router models can become unresponsive when the user tries to define a [[subnet mask]] that does not contain one contiguous run of 1's and then 0's. If even a single bit is set so that it breaks one of the runs, the router may become bricked, unresponsive to any standard troubleshooting or resolving procedures listed in the manual. Unbricking the router may require opening the case, shorting some [[Jumper (computing)|jumper pins]] on the board, then connecting the router by the USB cable to an old PC with USB 1.1 hardware, running a special DOS level program supplied by the manufacturer, and powering the router up. This procedure will flash the router to factory settings and original firmware.{{CN|date=April 2012}}<br /> <br /> Sometimes an interrupted flash upgrade of a PC motherboard will brick the board, for example, due to a power outage (or user impatience) during the upgrade process. It is sometimes possible to unbrick such a motherboard, by scavenging a similar but otherwise broken board for a BIOS chip, in the hopes that the bios will work even halfway, far enough to boot from floppy. Then it will be possible to retry the flash process. Sometimes it is possible to boot from floppy, then swap the old presumably dead BIOS chip in and reflash it.{{CN|date=April 2012}}<br /> <br /> ==Online and mobile services==<br /> Many newer systems capable of accessing [[online service]]s (such as the [[Xbox]], [[Xbox 360]], [[PlayStation 3]], and [[iPhone]]) have internal hardware-based unique identifiers, allowing individual systems to be tracked over a network and banned from accessing certain online services. Such systems usually continue to operate for purposes unrelated to the online service, but they are often considered &quot;bricked&quot; by users of the online service.<br /> <br /> Mobile telephones have a fixed identification code, the [[IMEI]]; a telephone reported stolen can have its IMEI blocked by [[Cellular network|networks]]&amp;mdash;effectively bricked&amp;mdash;although anyone with the necessary expertise and equipment can usually change the IMEI. In 2011 a United States Senator proposed that phones be &quot;bricked&quot; when reported stolen.&lt;ref&gt;[http://www.financetechnews.com/senator-wants-stolen-cellphones-bricked/ Finance Tech News] Senator wants stolen cellphones &quot;bricked&quot;&lt;/ref&gt; Some local police chiefs agreed&lt;ref&gt;[http://www.wjla.com/articles/2012/02/mpd-fights-robbery-surge-seeks-new-fcc-rule-72491.html WJLA-TV News] Police Department seeks new FCC Rule&lt;/ref&gt; and in April 2012 the FCC announced that the service would be available later in the year. &lt;ref&gt;[http://www.washingtoncitypaper.com/blogs/citydesk/2012/04/10/lanier-fcc-and-wireless-carriers-to-allow-customers-to-brick-stolen-phones/ Carries to allow Customers to Brick Stolen Phones] by Shani Hilton, Apr. 10, 2012, Washington City Paper&lt;/ref&gt;<br /> <br /> ==References==<br /> {{reflist}}<br /> <br /> {{DEFAULTSORT:Brick (Electronics)}}<br /> [[Category:Computer jargon]]</div> Replysixty https://de.wikipedia.org/w/index.php?title=Man_of_Constant_Sorrow&diff=142131874 Man of Constant Sorrow 2009-10-15T06:54:16Z <p>Replysixty: /* History */ added extra space.</p> <hr /> <div>{{cleanup|date=March 2009}}<br /> &quot;'''Man of Constant Sorrow'''&quot; is a traditional American [[folk music|folk]] song first recorded by [[Dick Burnett (musician)|Dick Burnett]], a partially blind [[fiddler]] from [[Kentucky]]. The song was originally recorded by Burnett as &quot;Farewell Song&quot; printed in a Richard Burnett songbook, c. 1913. An early version was recorded by Emry Arthur in 1928 (Vocalion Vo 5208).<br /> <br /> ==History==<br /> There is some uncertainty whether Dick Burnett himself wrote the song. In an interview he gave toward the end of his life, Burnett himself indicated that he could not remember:<br /> <br /> Charles Wolfe: &quot;What about this &quot;Farewell Song&quot; — 'I am a man of constant sorrow' — did you write it?&quot;&lt;br /&gt;<br /> Richard Burnett: &quot;No, I think I got the ballet [sic (ballad)] from somebody — I dunno. It may be my song...&quot;&lt;ref&gt;&quot;Man of Constant Sorrow — Richard Burnett's Story,&quot; ''Old Time Music'', No. 10 (Autumn 1973), p. 8.&lt;/ref&gt;<br /> <br /> If Burnett wrote the song, the dating of the writing of the song, or perhaps the editing of certain lyrics by Burnett, can be made to about 1913. Since it is known that Burnett was born in 1883, married in 1905, and blinded in 1907, the dating of two of these texts can be made on the basis of internal evidence. The second stanza of &quot;Farewell Song&quot; mentions the singer has been blind six years, which would date it at 1913. According to the [[Country Music Annual]], Burnett &quot;probably tailored a pre-existing song to fit his blindness&quot; and may have adapted a hymn. Charles Wolfe argues that &quot;Burnett probably based his melody on an old [[Baptist]] [[hymn]] called &quot;Wandering Boy&quot;.&lt;ref&gt;Charles K Wolfe, James E Akenson, Country Music Annual 2002, p.28&lt;/ref&gt;<br /> <br /> During 1918, [[Cecil Sharp]] collected the song and published it as &quot;In Old Virginny&quot; (Sharp II, 233).<br /> <br /> Sarah Ogan Gunning's re-writing of the traditional &quot;Man&quot; into a more personal &quot;Girl&quot; took place about 1936 in New York, where her first husband, Andrew Ogan, was fatally ill. The text was descriptive of loneliness away from home and anticipated her bereavement; the melody she remembered from a 78 rpm [[hillbilly]] record (Emry Arthur, probably Vocalion Vo 5208, 1928) she had heard some years before in the mountains.<br /> <br /> On October 13, 2009 on the [[Diane Rehm Show]], [[Ralph Stanley|Dr. Ralph Stanley]] of the [[Stanley Brothers]], born in 1927, discussed his the song, its origin, and his effort to revive it:<br /> <br /> Ralph Stanley: &quot;Man of Constant Sorrow&quot; is probably two or three hundred years old. But the first time I heard it when I was y'know, like a small boy, my daddy- my father- uh, he had some of the words to it, and I heard him sing it, and uh, we- uh, my brother and me- we put a few more words to it, and uh, brought it back in existence. I guess if it hadn't been for that it'd have been gone forever. I'm proud to be the one that, uh, that brought that song back, because I think it's wonderful.&quot;&lt;ref&gt;[http://wamu.org/programs/dr/09/10/14.php#27945 Stanley discusses song's origins on Diane Rehm Show (link to audio program's web page)]&lt;/ref&gt;<br /> <br /> Stanley's autobiography is titled &quot;Man of Constant Sorrow.&quot;&lt;ref&gt;[http://www.bluegrassjournal.com/2009/09/29/dr-ralph-stanley-man-of-constant-sorrow-my-life-and-times-autobiography/ Article on Stanley's Autobiography]&lt;/ref&gt;<br /> <br /> ==Recordings and cover versions==<br /> * The song was recorded in 1928 by [[Emry Arthur]].<br /> * It was popularized by the [[The Stanley Brothers|Stanley Brothers]], who recorded it for Columbia Records in 1951.<br /> * A version of the song, &quot;Girl of Constant Sorrow&quot;, was on the album ''Joan Baez'', recorded in the very early 1960s on the Vanguard label.{{fact|date=January 2009}}<br /> * Recorded by Roscoe Holcomb (Daisy Kentucky) in 1961–1962 with an arrangement more like Dylan's than that of the Stanleys.(Music of Roscoe Holcomb and Wade Ward,Smithsonian Folkways, Smithsonian Center for Folklife and Cultural Heritage.)<br /> * It appears on [[Bob Dylan]]'s 1962 [[Bob Dylan (album)|eponymous debut album]] and Dylan performed the song during his first national television appearance in 1963.<br /> * In their 1962 self-titled debut album [[Peter, Paul and Mary]] recorded another version as &quot;Sorrow.&quot;<br /> * [[Judy Collins]]'s 1961 debut album, ''Maid of Constant Sorrow'', took its name from a variant of the song that was performed on the album.<br /> * It was recorded by [[Waylon Jennings]] on his 1966 major-label debut ''[[Folk-Country]]''.<br /> * [[Rod Stewart]] performed the song on his debut solo album in 1969.<br /> * It was also recorded by [[Ginger Baker's Air Force]] on their eponymous debut album in 1970, sung by Air Force guitarist and vocalist (and former [[Moody Blues]], future [[Wings (band)|Wings]] member) [[Denny Laine]]. The band used the same melody, and for the most part the same lyrics (but substituted 'Birmingham' for 'Colorado'). The arrangement differed, though, as this was a loosely improvised live version, with violin and saxophones, that stays very much in the major scales of A, D and E, unlike its future bluesier brethren. It was the only band single; it charted #36 on the U.S. country charts and #86 in UK.<br /> * An [[a capella]] version appears on [[The Dillards]]' 1972 LP ''[[Roots and Branches]]''.<br /> * &quot;Man of Constant Sorrow&quot; was one of many songs recorded by Jerry Garcia, David Grisman, and Tony Rice one weekend in February 1993. Jerry's taped copy of the session was later stolen by his pizza delivery man, eventually became an underground classic, and finally edited and released in 2000 as ''The Pizza Tapes''.&lt;ref&gt;[http://www.amazon.com/Pizza-Tapes-Jerry-Garcia/dp/B00004SBZ6 Amazon.com: The Pizza Tapes: Music: Jerry Garcia,David Grisman,Tony Rice&lt;!-- Bot generated title --&gt;]&lt;/ref&gt; Jerry Garcia also sang an a cappella version on June 11, 1962, at the Jewish Community Center in San Carlos, California, with the Sleepy Hollow Hog Stompers, his bluegrass band at the time, whom Garcia 'renamed' throughout the performance several times, including at one point calling them &quot;The Slugs.&quot; Though unreleased, it has been widely circulated among 'traders' at least since the 1980s.<br /> * [[Jackson Browne]] and Irish accordionist [[Sharon Shannon]] recorded their version of the song in 2000. It also appeared in Shannon's album ''The Diamond Mountain Sessions''.<br /> *[[Image:OBrotherWhereArtThou ManOfConstantSorrow.jpg|thumb|The &quot;Soggy Bottom Boys&quot; singing &quot;Man of Constant Sorrow&quot; in ''[[O Brother, Where Art Thou?]]'']] The song appears in the 2000 film ''[[O Brother, Where Art Thou?]]'', under the title &quot;I Am a Man of Constant Sorrow.&quot; Performed by the fictitious [[Soggy Bottom Boys]] in the movie, it was recorded by Dan Tyminski, [[Harley Allen]], and [[Pat Enright]]. It was a hit in the movie for the Soggy Bottom Boys and later became a hit single in [[real life]]. It received a [[Country Music Association|CMA]] for &quot;Single of the Year&quot; and a [[Grammy]] for &quot;Best Country Collaboration with Vocals&quot; and it peaked at #35 on Billboard's [[Hot Country Songs]] chart. [[Dan Tyminski]] performed this song at the [[Crossroads Guitar Festival]] with [[Ron Block]] and live with [[Alison Krauss]]. The versions by Dylan and Soggy Bottom Boys use somewhat different arrangements and while the lyrics have many similarities, they are by no means identical. The Soggy Bottom Boys said goodbye to &quot;old Kentucky,&quot; as the original versions do, while in Dylan's version the singer said goodbye to &quot;Colorado.&quot;<br /> * A version entitled &quot;Soul of Constant Sorrow&quot; appears on the 2001 album ''[[Mountain Soul]]'' by country singer [[Patty Loveless]].<br /> * Canadian hard rock group [[Tin Foil Phoenix]] reimagined the song into a more rock-based style. It was later released on their 2007 second album ''[[Age of Vipers]]'' as a bonus track.<br /> * In 2003, musicians [[Skeewiff]] remixed &quot;Man of Constant Sorrow.&quot; The song was so popular in [[Australia]] that it featured at #96 in the [[Triple J Hottest 100, 2003|Triple J's hottest 100 songs of 2003]]. That same year, the ''O Brother Where Art Thou?'' version of the song ranked #20 in ''CMT's 100 Greatest Songs in Country Music''.<br /> * The Brooklyn-based [[country-hip-hop]] band Battlestar recorded a version of the song on their 2002 album ''Above Market Value''.<br /> * [[Osaka Popstar]] recorded a [[punk rock]] cover of this song for their debut album ''[[Osaka Popstar and the American Legends of Punk]]''.<br /> * Demented Scumcats - English psychobilly band in their album called ''Splatter Baby'' released in 2005.<br /> * [[Chris Daughtry]]'s band [[Absent Element]] performed a [[rock music|rock]] version live during Chris's homecoming in [[Greensboro, North Carolina]] on [[June 3]], [[2006]].<br /> * In 2007, artists [[Kraak and Smaak]] included a remix of &quot;Man of Constant Sorrow&quot; originally recorded by [[Skeewiff]], on their album ''The Remix Sessions''.<br /> * In [[Stephen King]]'s [[The Dark Tower series]], [[Susannah Dean]] sings the song (replacing 'man' with 'maid') during their visit to the Calla in ''[[The Dark Tower V: Wolves of the Calla|Wolves of the Calla]]''. In the following book, ''[[The Dark Tower VI: Song of Susannah|Song of Susannah]]'', when the possessing spirit [[Mia (Dark Tower)|Mia]] takes control of Susannah and brings her to the [[New York City]] of [[1999]], a street performer playing the song gives Mia pause, allowing Susannah to leave a valuable artifact behind for her allies, who are in pursuit, while Mia is distracted.<br /> *The folk group [[Donna the Buffalo]] did a [[reggae]]-influenced cover on their album ''Positive Friction''.<br /> <br /> ==Parodies==<br /> * [[Filk]] performer [[Luke Ski]] recorded a parody of the Tyminski/Allen/Enright recording of &quot;Man of Constant Sorrow&quot; for his 2002 album, ''Uber Geek'', titled &quot;I Am a Vamp of Constant Sorrow,&quot; about [[Angel (Buffy the Vampire Slayer)|Angel]], a vampire from the ''[[Buffy the Vampire Slayer (TV series)|Buffy the Vampire Slayer]]'' television series.<br /> * American country music parodist [[Cledus T. Judd]] recorded a parody of the song, called &quot;Man of Constant Borrow&quot; (about a man who never returns what he borrows from his neighbors) on his 2002 album ''[[Cledus Envy]]''. Judd's version featured [[hip-hop]] instrumentation, and background vocals from country group [[Diamond Rio]].<br /> * In 2007, the greeting cards website AmericanGreetings.com released a Thanksgiving [[eCard]] called [http://www.americangreetings.com/ecards/display.pd?prodnum=3126715&amp;path=25203 Bird with No Tomorrow]. The parody features turkeys dancing in the exact style as ''[[O Brother, Where Art Thou?]]'', with the lead turkey singing of his escape from his &quot;native farmland&quot; in order to survive.<br /> <br /> ==See also==<br /> * [[In the Jailhouse Now]]<br /> * [[I'll Fly Away]]<br /> * [[Big Rock Candy Mountain]]<br /> <br /> ==References==<br /> {{reflist}}<br /> <br /> ==External links==<br /> * [http://www.bluegrassnet.com/lyrics/m/man-of-constant-sorrow Song lyrics]<br /> * [http://www.fretplay.com/tabs/s/soggy_bottom_boys/i_am_a_man_of_constant_sorrow-tab.shtml Song tuning] and [[Tablature|Tab]]<br /> <br /> {{Soundtrack of O Brother, Where Art Thou?}}<br /> <br /> {{DEFAULTSORT:Man Of Constant Sorrow}}<br /> [[Category:2000 singles]]<br /> [[Category:1962 songs]]<br /> [[Category:Bob Dylan songs]]<br /> [[Category:American folk songs]]<br /> [[Category:American folklore]]<br /> [[Category:The Stanley Brothers songs]]<br /> <br /> [[pl:Man of Constant Sorrow]]<br /> [[ro:Man of Constant Sorrow]]</div> Replysixty https://de.wikipedia.org/w/index.php?title=Man_of_Constant_Sorrow&diff=142131873 Man of Constant Sorrow 2009-10-15T06:51:22Z <p>Replysixty: /* History */ Ralph Stanley&#039;s comments on origin of song (2-300 years old) on Diane Rehm Show.</p> <hr /> <div>{{cleanup|date=March 2009}}<br /> &quot;'''Man of Constant Sorrow'''&quot; is a traditional American [[folk music|folk]] song first recorded by [[Dick Burnett (musician)|Dick Burnett]], a partially blind [[fiddler]] from [[Kentucky]]. The song was originally recorded by Burnett as &quot;Farewell Song&quot; printed in a Richard Burnett songbook, c. 1913. An early version was recorded by Emry Arthur in 1928 (Vocalion Vo 5208).<br /> <br /> ==History==<br /> There is some uncertainty whether Dick Burnett himself wrote the song. In an interview he gave toward the end of his life, Burnett himself indicated that he could not remember:<br /> <br /> Charles Wolfe: &quot;What about this &quot;Farewell Song&quot; — 'I am a man of constant sorrow' — did you write it?&quot;&lt;br /&gt;<br /> Richard Burnett: &quot;No, I think I got the ballet [sic (ballad)] from somebody — I dunno. It may be my song...&quot;&lt;ref&gt;&quot;Man of Constant Sorrow — Richard Burnett's Story,&quot; ''Old Time Music'', No. 10 (Autumn 1973), p. 8.&lt;/ref&gt;<br /> <br /> If Burnett wrote the song, the dating of the writing of the song, or perhaps the editing of certain lyrics by Burnett, can be made to about 1913. Since it is known that Burnett was born in 1883, married in 1905, and blinded in 1907, the dating of two of these texts can be made on the basis of internal evidence. The second stanza of &quot;Farewell Song&quot; mentions the singer has been blind six years, which would date it at 1913. According to the [[Country Music Annual]], Burnett &quot;probably tailored a pre-existing song to fit his blindness&quot; and may have adapted a hymn. Charles Wolfe argues that &quot;Burnett probably based his melody on an old [[Baptist]] [[hymn]] called &quot;Wandering Boy&quot;.&lt;ref&gt;Charles K Wolfe, James E Akenson, Country Music Annual 2002, p.28&lt;/ref&gt;<br /> <br /> During 1918, [[Cecil Sharp]] collected the song and published it as &quot;In Old Virginny&quot; (Sharp II, 233).<br /> <br /> Sarah Ogan Gunning's re-writing of the traditional &quot;Man&quot; into a more personal &quot;Girl&quot; took place about 1936 in New York, where her first husband, Andrew Ogan, was fatally ill. The text was descriptive of loneliness away from home and anticipated her bereavement; the melody she remembered from a 78 rpm [[hillbilly]] record (Emry Arthur, probably Vocalion Vo 5208, 1928) she had heard some years before in the mountains.<br /> On October 13, 2009 on the [[Diane Rehm Show]], [[Ralph Stanley|Dr. Ralph Stanley]] of the [[Stanley Brothers]], born in 1927, discussed his the song, its origin, and his effort to revive it:<br /> <br /> Ralph Stanley: &quot;Man of Constant Sorrow&quot; is probably two or three hundred years old. But the first time I heard it when I was y'know, like a small boy, my daddy- my father- uh, he had some of the words to it, and I heard him sing it, and uh, we- uh, my brother and me- we put a few more words to it, and uh, brought it back in existence. I guess if it hadn't been for that it'd have been gone forever. I'm proud to be the one that, uh, that brought that song back, because I think it's wonderful.&quot;&lt;ref&gt;[http://wamu.org/programs/dr/09/10/14.php#27945 Stanley discusses song's origins on Diane Rehm Show (link to audio program's web page)]&lt;/ref&gt;<br /> <br /> Stanley's autobiography is titled &quot;Man of Constant Sorrow.&quot;&lt;ref&gt;[http://www.bluegrassjournal.com/2009/09/29/dr-ralph-stanley-man-of-constant-sorrow-my-life-and-times-autobiography/ Article on Stanley's Autobiography]&lt;/ref&gt;<br /> <br /> ==Recordings and cover versions==<br /> * The song was recorded in 1928 by [[Emry Arthur]].<br /> * It was popularized by the [[The Stanley Brothers|Stanley Brothers]], who recorded it for Columbia Records in 1951.<br /> * A version of the song, &quot;Girl of Constant Sorrow&quot;, was on the album ''Joan Baez'', recorded in the very early 1960s on the Vanguard label.{{fact|date=January 2009}}<br /> * Recorded by Roscoe Holcomb (Daisy Kentucky) in 1961–1962 with an arrangement more like Dylan's than that of the Stanleys.(Music of Roscoe Holcomb and Wade Ward,Smithsonian Folkways, Smithsonian Center for Folklife and Cultural Heritage.)<br /> * It appears on [[Bob Dylan]]'s 1962 [[Bob Dylan (album)|eponymous debut album]] and Dylan performed the song during his first national television appearance in 1963.<br /> * In their 1962 self-titled debut album [[Peter, Paul and Mary]] recorded another version as &quot;Sorrow.&quot;<br /> * [[Judy Collins]]'s 1961 debut album, ''Maid of Constant Sorrow'', took its name from a variant of the song that was performed on the album.<br /> * It was recorded by [[Waylon Jennings]] on his 1966 major-label debut ''[[Folk-Country]]''.<br /> * [[Rod Stewart]] performed the song on his debut solo album in 1969.<br /> * It was also recorded by [[Ginger Baker's Air Force]] on their eponymous debut album in 1970, sung by Air Force guitarist and vocalist (and former [[Moody Blues]], future [[Wings (band)|Wings]] member) [[Denny Laine]]. The band used the same melody, and for the most part the same lyrics (but substituted 'Birmingham' for 'Colorado'). The arrangement differed, though, as this was a loosely improvised live version, with violin and saxophones, that stays very much in the major scales of A, D and E, unlike its future bluesier brethren. It was the only band single; it charted #36 on the U.S. country charts and #86 in UK.<br /> * An [[a capella]] version appears on [[The Dillards]]' 1972 LP ''[[Roots and Branches]]''.<br /> * &quot;Man of Constant Sorrow&quot; was one of many songs recorded by Jerry Garcia, David Grisman, and Tony Rice one weekend in February 1993. Jerry's taped copy of the session was later stolen by his pizza delivery man, eventually became an underground classic, and finally edited and released in 2000 as ''The Pizza Tapes''.&lt;ref&gt;[http://www.amazon.com/Pizza-Tapes-Jerry-Garcia/dp/B00004SBZ6 Amazon.com: The Pizza Tapes: Music: Jerry Garcia,David Grisman,Tony Rice&lt;!-- Bot generated title --&gt;]&lt;/ref&gt; Jerry Garcia also sang an a cappella version on June 11, 1962, at the Jewish Community Center in San Carlos, California, with the Sleepy Hollow Hog Stompers, his bluegrass band at the time, whom Garcia 'renamed' throughout the performance several times, including at one point calling them &quot;The Slugs.&quot; Though unreleased, it has been widely circulated among 'traders' at least since the 1980s.<br /> * [[Jackson Browne]] and Irish accordionist [[Sharon Shannon]] recorded their version of the song in 2000. It also appeared in Shannon's album ''The Diamond Mountain Sessions''.<br /> *[[Image:OBrotherWhereArtThou ManOfConstantSorrow.jpg|thumb|The &quot;Soggy Bottom Boys&quot; singing &quot;Man of Constant Sorrow&quot; in ''[[O Brother, Where Art Thou?]]'']] The song appears in the 2000 film ''[[O Brother, Where Art Thou?]]'', under the title &quot;I Am a Man of Constant Sorrow.&quot; Performed by the fictitious [[Soggy Bottom Boys]] in the movie, it was recorded by Dan Tyminski, [[Harley Allen]], and [[Pat Enright]]. It was a hit in the movie for the Soggy Bottom Boys and later became a hit single in [[real life]]. It received a [[Country Music Association|CMA]] for &quot;Single of the Year&quot; and a [[Grammy]] for &quot;Best Country Collaboration with Vocals&quot; and it peaked at #35 on Billboard's [[Hot Country Songs]] chart. [[Dan Tyminski]] performed this song at the [[Crossroads Guitar Festival]] with [[Ron Block]] and live with [[Alison Krauss]]. The versions by Dylan and Soggy Bottom Boys use somewhat different arrangements and while the lyrics have many similarities, they are by no means identical. The Soggy Bottom Boys said goodbye to &quot;old Kentucky,&quot; as the original versions do, while in Dylan's version the singer said goodbye to &quot;Colorado.&quot;<br /> * A version entitled &quot;Soul of Constant Sorrow&quot; appears on the 2001 album ''[[Mountain Soul]]'' by country singer [[Patty Loveless]].<br /> * Canadian hard rock group [[Tin Foil Phoenix]] reimagined the song into a more rock-based style. It was later released on their 2007 second album ''[[Age of Vipers]]'' as a bonus track.<br /> * In 2003, musicians [[Skeewiff]] remixed &quot;Man of Constant Sorrow.&quot; The song was so popular in [[Australia]] that it featured at #96 in the [[Triple J Hottest 100, 2003|Triple J's hottest 100 songs of 2003]]. That same year, the ''O Brother Where Art Thou?'' version of the song ranked #20 in ''CMT's 100 Greatest Songs in Country Music''.<br /> * The Brooklyn-based [[country-hip-hop]] band Battlestar recorded a version of the song on their 2002 album ''Above Market Value''.<br /> * [[Osaka Popstar]] recorded a [[punk rock]] cover of this song for their debut album ''[[Osaka Popstar and the American Legends of Punk]]''.<br /> * Demented Scumcats - English psychobilly band in their album called ''Splatter Baby'' released in 2005.<br /> * [[Chris Daughtry]]'s band [[Absent Element]] performed a [[rock music|rock]] version live during Chris's homecoming in [[Greensboro, North Carolina]] on [[June 3]], [[2006]].<br /> * In 2007, artists [[Kraak and Smaak]] included a remix of &quot;Man of Constant Sorrow&quot; originally recorded by [[Skeewiff]], on their album ''The Remix Sessions''.<br /> * In [[Stephen King]]'s [[The Dark Tower series]], [[Susannah Dean]] sings the song (replacing 'man' with 'maid') during their visit to the Calla in ''[[The Dark Tower V: Wolves of the Calla|Wolves of the Calla]]''. In the following book, ''[[The Dark Tower VI: Song of Susannah|Song of Susannah]]'', when the possessing spirit [[Mia (Dark Tower)|Mia]] takes control of Susannah and brings her to the [[New York City]] of [[1999]], a street performer playing the song gives Mia pause, allowing Susannah to leave a valuable artifact behind for her allies, who are in pursuit, while Mia is distracted.<br /> *The folk group [[Donna the Buffalo]] did a [[reggae]]-influenced cover on their album ''Positive Friction''.<br /> <br /> ==Parodies==<br /> * [[Filk]] performer [[Luke Ski]] recorded a parody of the Tyminski/Allen/Enright recording of &quot;Man of Constant Sorrow&quot; for his 2002 album, ''Uber Geek'', titled &quot;I Am a Vamp of Constant Sorrow,&quot; about [[Angel (Buffy the Vampire Slayer)|Angel]], a vampire from the ''[[Buffy the Vampire Slayer (TV series)|Buffy the Vampire Slayer]]'' television series.<br /> * American country music parodist [[Cledus T. Judd]] recorded a parody of the song, called &quot;Man of Constant Borrow&quot; (about a man who never returns what he borrows from his neighbors) on his 2002 album ''[[Cledus Envy]]''. Judd's version featured [[hip-hop]] instrumentation, and background vocals from country group [[Diamond Rio]].<br /> * In 2007, the greeting cards website AmericanGreetings.com released a Thanksgiving [[eCard]] called [http://www.americangreetings.com/ecards/display.pd?prodnum=3126715&amp;path=25203 Bird with No Tomorrow]. The parody features turkeys dancing in the exact style as ''[[O Brother, Where Art Thou?]]'', with the lead turkey singing of his escape from his &quot;native farmland&quot; in order to survive.<br /> <br /> ==See also==<br /> * [[In the Jailhouse Now]]<br /> * [[I'll Fly Away]]<br /> * [[Big Rock Candy Mountain]]<br /> <br /> ==References==<br /> {{reflist}}<br /> <br /> ==External links==<br /> * [http://www.bluegrassnet.com/lyrics/m/man-of-constant-sorrow Song lyrics]<br /> * [http://www.fretplay.com/tabs/s/soggy_bottom_boys/i_am_a_man_of_constant_sorrow-tab.shtml Song tuning] and [[Tablature|Tab]]<br /> <br /> {{Soundtrack of O Brother, Where Art Thou?}}<br /> <br /> {{DEFAULTSORT:Man Of Constant Sorrow}}<br /> [[Category:2000 singles]]<br /> [[Category:1962 songs]]<br /> [[Category:Bob Dylan songs]]<br /> [[Category:American folk songs]]<br /> [[Category:American folklore]]<br /> [[Category:The Stanley Brothers songs]]<br /> <br /> [[pl:Man of Constant Sorrow]]<br /> [[ro:Man of Constant Sorrow]]</div> Replysixty