Nintendo Conducted Invasive Surveillance Operation Against Homebrew Hacker * TorrentFreak
Leaked Nintendo documents have revealed a frightening surveillance operation carried out against a hacker who was researching exploits for the 3DS handheld. In addition to monitoring his private life, including aspects of his education, when he left the house and where he went, the company followed its target from his place of work in order to pressure him into stopping his activities.
SpyProjects to protect the intellectual property rights of corporations are underway all around the world on a continual basis but it is rare for operational details to leak out to the public.
Unfortunately for Nintendo, leaked documents are now revealing how frightening things can get for console hackers in their crosshairs, even when those targets have already declared that their work isn’t designed for piracy purposes.
Leaked Documents Reveal Police-Style Surveillance Operation
During the past 24 hours, various Twitter accounts (1,2) have been posting snippets from documents that were recently leaked from Nintendo. While there are numerous items of interest, the most shocking revelations involve Neimod, a hacker who several years ago developed exploits for the 3DS handheld console.
Of course, it’s not surprising for a company like Nintendo to have a keen interest in work carried out by someone like Neimod. Nintendo’s documentation described him as a “highly skilled hardware engineer” with “a very high reputation within the hacker scene, for Nintendo products.”
However, the scale of the operation, which is revealed in detail in the leaked documents, shows just how far the gaming giant was prepared to go to stop his work.
For example, the leak reveals personal profiling that dug deeply into Neimod’s education status, listed details of his working life, while offering evidence of physical snooping on his daily lifestyle. What time he could be found at home, who came to see him there, and even when he visited places like banks and restaurants are all included.
While this kind of surveillance is creepy in its own right, additional documents reveal a detailed plan to use the gathered intelligence to physically confront Neimod in order to pressurize him into complying with the company’s demands.
Detailed Operational Planning to Intercept Target
According to Nintendo’s planning, the operation would begin around April 15, 2013, with its team meeting at a local hotel to discuss and finalize their plans. Following a review of Neimod’s movements of the previous week, the team would then decide where and when contact would be made – after work or at home, for example.
With an undercover investigator monitoring Neimod to discover what time he left work, Neimod was to be approached by a ‘contact team’, who were instructed to approach their target “in a friendly, non-threatening, professional, and courteous manner. “Provide a business card,” the instructions read.
After Neimod had been engaged in conversation, the team was instructed to flatter the hacker by “acknowledging his engineering/programming aptitude.” They were also told to reference his stated aim of not “facilitating piracy” with his hacks but point out Nintendo’s concerns that a release of his hack could do just that.
Whether Neimod complied or resisted, Nintendo prepared for both eventualities. The following slide, posted to Twitter by Eclipse-TT, shows a flow chart that begins with instructions for the “Knock and Talk Team”, details a staging area, rules of engagement, and plans for what should happen when things go to plan – or otherwise.
SpyProjects to protect the intellectual property rights of corporations are underway all around the world on a continual basis but it is rare for operational details to leak out to the public.
Unfortunately for Nintendo, leaked documents are now revealing how frightening things can get for console hackers in their crosshairs, even when those targets have already declared that their work isn’t designed for piracy purposes.
Leaked Documents Reveal Police-Style Surveillance Operation
During the past 24 hours, various Twitter accounts (1,2) have been posting snippets from documents that were recently leaked from Nintendo. While there are numerous items of interest, the most shocking revelations involve Neimod, a hacker who several years ago developed exploits for the 3DS handheld console.
Of course, it’s not surprising for a company like Nintendo to have a keen interest in work carried out by someone like Neimod. Nintendo’s documentation described him as a “highly skilled hardware engineer” with “a very high reputation within the hacker scene, for Nintendo products.”
However, the scale of the operation, which is revealed in detail in the leaked documents, shows just how far the gaming giant was prepared to go to stop his work.
For example, the leak reveals personal profiling that dug deeply into Neimod’s education status, listed details of his working life, while offering evidence of physical snooping on his daily lifestyle. What time he could be found at home, who came to see him there, and even when he visited places like banks and restaurants are all included.
While this kind of surveillance is creepy in its own right, additional documents reveal a detailed plan to use the gathered intelligence to physically confront Neimod in order to pressurize him into complying with the company’s demands.
Detailed Operational Planning to Intercept Target
According to Nintendo’s planning, the operation would begin around April 15, 2013, with its team meeting at a local hotel to discuss and finalize their plans. Following a review of Neimod’s movements of the previous week, the team would then decide where and when contact would be made – after work or at home, for example.
With an undercover investigator monitoring Neimod to discover what time he left work, Neimod was to be approached by a ‘contact team’, who were instructed to approach their target “in a friendly, non-threatening, professional, and courteous manner. “Provide a business card,” the instructions read.
After Neimod had been engaged in conversation, the team was instructed to flatter the hacker by “acknowledging his engineering/programming aptitude.” They were also told to reference his stated aim of not “facilitating piracy” with his hacks but point out Nintendo’s concerns that a release of his hack could do just that.
Whether Neimod complied or resisted, Nintendo prepared for both eventualities. The following slide, posted to Twitter by Eclipse-TT, shows a flow chart that begins with instructions for the “Knock and Talk Team”, details a staging area, rules of engagement, and plans for what should happen when things go to plan – or otherwise.