Summary of The Post-Snowden Cyber Arms Hustle

Looking for the article?
We have the summary! Get the key insights in just 5 minutes.

The Post-Snowden Cyber Arms Hustle summary
Start getting smarter:
or see our plans

Rating

7

Qualities

  • Eye Opening
  • Background

Recommendation

In a gripping real-life story that reads like a thriller, Bloomberg Businessweek cybersecurity reporters Jordan Robertson and Michael Riley uncover the dangerous territory of international cybersecurity and chronicle the recklessness of an inexperienced, albeit driven, businessman. The journalists expertly unfold the series of decisions Manish Kumar made, which ultimately led to the ongoing plight of an innocent Italian bodyguard, Cristian Provvisionato, now held by the Mauritania government. getAbstract recommends this exposé and morality tale to cybersecurity enthusiasts and human rights advocates.

About the Authors

 Jordan Robertson and Michael Riley are cybersecurity reporters for Bloomberg Businessweek

 

Summary

After trying out several business ventures, entrepreneur Manish Kumar founded Wolf Intelligence, a spy technology provider. In 2014, he presented at the major industry trade show, Milipol Qatar. Mauritanian officials were interested in his offer – software that performs a “silent SMS attack,” whereby you can hack someone’s cell phone. Kumar struck a deal with them for $2.5 million with the country’s representative, Ahmed Bah dit Hmeida.

In February 2015, Kumar flew to Mauritania. One crucial piece of code was missing, but he knew where to get it: Israel. But with a price tag of $1 million, he’d need another...


More on this topic

Customers who read this summary also read

The Confessions of Marcus Hutchins, the Hacker Who Saved the Internet
9
The Unaddressed Gap in Cybersecurity: Human Performance
9
Biased AI Is Another Sign We Need to Solve the Cybersecurity Diversity Problem
7
How Pandemics Change History
Casting the Dark Web in a New Light
9
Are You Managing Your Risks from Social Media?
7

Related Channels

Comment on this summary