{"id":31541,"date":"2011-02-20T16:42:29","date_gmt":"2011-02-20T16:42:29","guid":{"rendered":"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/hacking-for-the-u-s-government-security\/"},"modified":"2011-02-20T16:42:29","modified_gmt":"2011-02-20T16:42:29","slug":"hacking-for-the-u-s-government-security","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/futurist\/hacking-for-the-u-s-government-security.php","title":{"rendered":"Hacking for the U.S. Government [Security]"},"content":{"rendered":"<div>\t\t\t\t\t\t\t\t\t<\/div><p>\t\t\t\tBackdoor installers, malware loaders and social media propaganda bots.These are all tools the U.S. Government contracts IT security firms to develop for them in order to fight enemies. Check out the full story over at [<a href=\"http:\/\/arstechnica.com\/tech-policy\/news\/2011\/02\/black-ops-how-hbgary-wrote-backdoors-and-rootkits-for-the-government.ars\">Ars Technica<\/a>].\t\t\t\t<a href=\"http:\/\/gizmodo.com\/#!5764778\/hacking-for-the-us-government\" title=\"Click here to read more about Hacking for the U.S. Government [Security]\">More&nbsp;&raquo;<\/a><\/p><p><a href=\"http:\/\/ads.pheedo.com\/click.phdo?s=fb6e04503dca19de12e09905755df8b4&amp;p=1\"><img decoding=\"async\" alt=\"\" style=\"padding-left:10px; padding-right: 10px;\" border=\"0\" src=\"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/wp-content\/plugins\/wp-o-matic\/cache\/4d307_img.phdo?s=fb6e04503dca19de12e09905755df8b4&amp;p=1\"><\/a><br><img loading=\"lazy\" decoding=\"async\" alt=\"\" height=\"0\" width=\"0\" border=\"0\" src=\"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/wp-content\/plugins\/wp-o-matic\/cache\/4d307_pixel?code=TechCons&amp;partnerID=167&amp;key=segment\" style=\"padding-left:10px; padding-right: 10px;\"><img loading=\"lazy\" decoding=\"async\" alt=\"\" height=\"0\" width=\"0\" border=\"0\" src=\"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/wp-content\/plugins\/wp-o-matic\/cache\/4d307_p-8bUhLiluj0fAw.gif?labels=pub.28252.rss.TechCons.5726,cat.TechCons.rss\" style=\"padding-left:10px; padding-right: 10px;\"><\/p><div><a href=\"http:\/\/feeds.gawker.com\/~ff\/gizmodo\/full?a=LNKIbMyzWGQ:_p2Aq1gNb8g:H0mrP-F8Qgo\"><img decoding=\"async\" src=\"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/wp-content\/plugins\/wp-o-matic\/cache\/4d307_full?d=H0mrP-F8Qgo\" border=\"0\" style=\"padding-left:10px; padding-right: 10px;\"><\/a> <a href=\"http:\/\/feeds.gawker.com\/~ff\/gizmodo\/full?a=LNKIbMyzWGQ:_p2Aq1gNb8g:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/wp-content\/plugins\/wp-o-matic\/cache\/4d307_full?d=yIl2AUoC8zA\" border=\"0\" style=\"padding-left:10px; padding-right: 10px;\"><\/a> <a href=\"http:\/\/feeds.gawker.com\/~ff\/gizmodo\/full?a=LNKIbMyzWGQ:_p2Aq1gNb8g:D7DqB2pKExk\"><img decoding=\"async\" src=\"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/wp-content\/plugins\/wp-o-matic\/cache\/4d307_full?i=LNKIbMyzWGQ:_p2Aq1gNb8g:D7DqB2pKExk\" border=\"0\" style=\"padding-left:10px; padding-right: 10px;\"><\/a> <a href=\"http:\/\/feeds.gawker.com\/~ff\/gizmodo\/full?a=LNKIbMyzWGQ:_p2Aq1gNb8g:V_sGLiPBpWU\"><img decoding=\"async\" src=\"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/wp-content\/plugins\/wp-o-matic\/cache\/4d307_full?i=LNKIbMyzWGQ:_p2Aq1gNb8g:V_sGLiPBpWU\" border=\"0\" style=\"padding-left:10px; padding-right: 10px;\"><\/a><\/div><p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/wp-content\/plugins\/wp-o-matic\/cache\/4d307_LNKIbMyzWGQ\" height=\"1\" width=\"1\" style=\"padding-left:10px; padding-right: 10px;\"><\/p>","protected":false},"excerpt":{"rendered":"<p>Backdoor installers, malware loaders and social media propaganda bots.These are all tools the U.S. Government contracts IT security firms to develop for them in order to fight enemies. Check out the full story over at [Ars Technica]. More&nbsp;&raquo;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[10],"tags":[],"class_list":["post-31541","post","type-post","status-publish","format-standard","hentry","category-futurist"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/31541"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=31541"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/31541\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=31541"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=31541"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=31541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}