There are people who play a fundamental role in the immense mechanism of the world economy, but whose existence remains unknown to the wider public. An exemplar is David Vincenzetti’s[1], whose life is comparable to a script written for a Hollywood spy thriller, even to the name of the company with which he built his reputation, Hacking Team Srl Milano[2].

David is an autodidact. The son of a high school teacher and a chemicals salesman, he began teaching himself computing aged 14 and instead of spending time with friends or the mysterious world of girls, he was reading data and learning cryptographic codes in online forums until he became a master hacker. After leaving school, he enrolled at Bicocca University in Milan, where he was hired as an administrator for the university’s computer network security even before he graduated [3].

In 2002, he and some colleagues built the RCS software (Remote Control System) “which takes control of target devices without being discovered so that governments can launch malware[4] against their enemies[5]; this software is considered by Julan Assange’s Wikileaks to be both very efficient and very dangerous.[6]

The remote control software created by Vincenzetti’s team was called “Da Vinci” and later “Galileo[7] and has been sold to armies and secret services from all over the world: to Saudi Arabia to spy on and damage an Iranian nuclear[8] power plant, to the defense ministries of Egypt and Azerbaijan, to the Malaysian Secret Service, to the security services of Uzbekistan, the secret services of Morocco and Sudan[9], to the INSA of Ethiopia[10].

Julien Assange’s Wikileaks spyfiles exposés destroyed the very successful Hacking Team venture, when[11] it published files hacked from the Hacking Team’s websites, and published thousands of documents of Vincenzetti’s business secrets, including the source code for the software, in July 2015.[12] So, it is no coincidence that Vincenzetti is angry with Assange. Vincenzetti considers him a terrorist who must be stopped[13]:

The Nerds’ Army

A Hacking Team technician at work

Hacking Team was scattered between Milan and distant countries: Spain, China, Nigeria, Pakistan, Korea and 40 other countries, including Egypt, which was a proven customer. Indeed, Vincenzetti’s sale of the “Galileo” application to the Cairo National Defense Council became notorious following reports from national[14] and international[15] newspapers that it was apparently used to spy on Giulio Regeni[16], an Italian student who was kidnapped tortured and killed.[17]

The discovery of the massive role of Hacking Team’s spyware in the battle of intelligence agencies against political opponents began in Rouen[18] in July 2013, according to the publisher and founder of the Moroccan web project of the ‘Mamfakinch’[19] democratic movement. Mamfakinch is a movement born during the Arab Spring which developed independently of political parties and religious organizations[20].

The chief editor of  Mamfakinch, Hisham Almiraat[21], received an email in July 2013 with the subject “Complaint“, asking him not to mention the sender’s name. Other members of the movement then received the same email[22]. Shortly afterwards, everyone who received and opened the email was infected with very complex spyware sent from an IP in Rabat, behind which was hidden the Moroccan Supreme Council of National Defence, which had by this simple means made all of the dissident’s equipment and files accessible and was secretly taking control of them[23]. The spyware attack was so severe that Mamfakinch was forced to stop the project in 2014. The domain is now closed[24] and the military repression supported by Vincenzetti’s technology prevents the Mamfakinch dissidents from regrouping.[25]

The discovery of Vincenzetti’s role can be traced back to a few lines of computer code left behind, which led investigators to Hacking Team, the main supplier of the tools used for interception, and identified them as the company that designed the malware attack.

The “government eavesdropping hacking suite[26], as described on the company’s website, at the time was managed by approximately 40 specialized engineers and commercial advisors who offered services to up to 40 countries. NGO Reporters without Borders called Hacking Team “Digital Mercenaries[27], whose services officially support government agencies to criminals and terrorists but are also secretly deployed against dissidents.

David Vincenzetti’s strategy in response to the allegations was to treat them as entertaining[28], along with company lawyer Rabe[29].  But the reality was soon clear to everyone; large profits were the bottom line, no matter what the military purpose of the application was[30].

Eric Rabe, the American partner

Eric Rabe is watching you

Eric Rabe, once senior counsel for Hacking Team, claims to own Eric Rabe Communications Strategies Llc, Haversford, Pennsylvania[31], but the commercial register claims that this company does not exist[32]. What does exist, however, is the Greater Philadelphia Economy League[33], an important lobbying association that brings together politicians, industrialists, financiers, IT experts and religious leaders from Pennsylvania,[34]. Rabe was chairman of the board of directors at the beginning of the century (he still works as a freelance consultant[35]). At that time, he held a vice-presidential position with the Verizon Group, the largest multinational American telecommunications company[36], before joining the Hacking Team[37].

Another protagonist of the group is Alberto Pelliccione, now 35 years old, but at that time a very young programmer[38], who left the company for ethical reasons because strategic decisions were never shared.  Pelliccione has always explained that the company’ software has been deliberately used for political attacks[39].  He is is only now recovering from years of allegations of stealing and illegally forwarding over 400 gigabytes of political and military[40] secrets – allegations made personally by his old friend David Vincenzetti.

Today Pelliccione is the founder and CEO of the ReaQta-Hive group[41], a cybersecurity and artificial intelligence company, known for developing advanced anti-hacker[42] defense software called Cytrix[43]. The group consists of ReaQta Ltd. Pte Singapore[44], ReaQta BV Amsterdam[45], ReaQta Ltd, La Valletta[46] and the financial holding ReaQta Group BV Amsterdam [47], whose majority owner is Pelliccione.

Guido Landi is the last member of the triad of Hacking Team: a former Windows employee who today defines Hacking Team as “a cage of madmen“, which was “dominated by a fascist who doesn’t forgive those who leave[48]. In his LinkedIn profile, he asserts he is the owner of a new secret company based in the United Arab Emirates[49].

Hacking Teams has changed its name to Memento Labs Srl Milan, but has kept the office address at Via della Moscova 13[50]. Its  president is Paolo Lezzi, founder and owner of Milan based InTheCyber ​​Group SA Lugano, which deals with industrial espionage.

Lezzi speaks of SoD (Segregation of Duties), a high-sounding English name that serves to preserve the use of old software. Over several interviews, Lezzi has preferred not to answer questions about the past, but rather to focus on his new company, which consists of 50 very young computer scientists who, according to Lezzi[51], can make people forget the past of the previous team[52].

David Vincenzetti himself, a thin, harmless-looking man who loves luxury and designer clothing[53] now wants to distance himself from his past , according to his Linkedin page.  His position is contradictory, though;  despite the desire for distance he remains connected to his trademark. In fact, he’s proud to have been a Hacking Team[54] partner for 16 years, and not only as co-founder.  It appears that until he started his new business in Abu Dhabi, he worked for the United Arab Emirates government, where he has worked regularly since 2015. He remained secrective about the future (“I’m working to get my fifth company started. I’m afraid I can’t reveal anymore, I’m sorry[55]). He announced that he is nowadays CEO of Enrico Fermi Manhattan Project Ltd.[56] (a company that is not yet registered), and adds: “I sold Hacking Team in April 2019 and left it shortly thereafter. To the best of my knowledge, the hacking team quickly disbanded[57].


[1] https://www.linkedin.com/in/vincenzetti/?originalSubdomain=it

[2] https://it.wikipedia.org/wiki/Hacking_Team

[3] https://d-art.it/news/chi-e-david-vincenzetti-uno-degli-uomini-piu-odiati-e-temuti-al-mondo/22493

[4] https://it.malwarebytes.com/malware/

[5] https://wikileaks.org/spyfiles/document/hackingteam/31_remote-control-system-v5-1/31_remote-control-system-v5-1.pdf

[6] https://wikileaks.org/spyfiles/document/hackingteam/31_remote-control-system-v5-1/31_remote-control-system-v5-1.pdf

[7] http://www.digitaljournal.com/internet/spyware-firm-hacking-team-hacked-embarrassing-data-leaked/article/437666

[8] https://www.ilfattoquotidiano.it/2015/08/05/hacking-team-regione-lombardia-tra-i-soci-pronti-a-vendere-la-societa-di-spionaggio-al-regime-saudita/1937489/

[9] https://www.lastampa.it/tecnologia/2015/07/10/news/cosi-il-sudan-ha-messo-in-crisi-hacking-team-1.35240127

[10] https://www.lastampa.it/tecnologia/2015/07/14/news/intelligence-o-panini-la-doppia-vita-di-hacking-team-1.35241523


[12] https://www.lastampa.it/tecnologia/2015/07/07/news/hacking-team-hackerata-file-diffusi-dal-suo-stesso-profilo-twitter-1.35239134 ; https://www.repubblica.it/tecnologia/2015/07/10/news/servizi_segreti_forze_dell_ordine_e_politici_nelle_mail_riservate_dell_hacking_team-118794772/

[13] https://www.corriere.it/cronache/15_luglio_11/vincezetti-hacking-team-assange-9e9f13c8-27f0-11e5-ab65-6757d01b480d.shtml

[14] https://foreignpolicy.com/2016/04/26/fear-this-man-cyber-warfare-hacking-team-david-vincenzetti/

[15] https://www.repubblica.it/esteri/2018/12/09/news/khashoggi_wp_anche_una_societa_italiana_nella_cyber_guerra_saudita_per_catturare_il_giornalista_dissidente_-213789698/

[16] https://www.lastampa.it/tecnologia/news/2016/04/11/news/l-ombra-di-hacking-team-sull-omicidio-regeni-1.36591226

[17] https://www.lastampa.it/tecnologia/news/2016/04/11/news/l-ombra-di-hacking-team-sull-omicidio-regeni-1.36591226

[18] https://www.courrierinternational.com/article/espions-david-vincenzetti-lhomme-qui-leve-une-armee-de-hackers

[19] https://web.archive.org/web/20150415045504/http://moroccansforchange.com/2011/04/03/mamfakinch/

[20] Kerric Harvey, “Mamfakinch“, Encyclopedia of Social Media and Politics, SAGE Publishing, Thousand Oaks (California) 2014, pages 787-789

[21] https://globalvoices.org/author/hisham/

[22] https://www.courrierinternational.com/article/espions-david-vincenzetti-lhomme-qui-leve-une-armee-de-hackers

[23] https://www.courrierinternational.com/article/espions-david-vincenzetti-lhomme-qui-leve-une-armee-de-hackers

[24] http://mamfakinch.com


[26] http://ilkim.it/caso-khashoggi-e-il-software-spia/

[27] https://foreignpolicy.com/2016/04/26/fear-this-man-cyber-warfare-hacking-team-david-vincenzetti/

[28] https://www.corriere.it/tecnologia/15_luglio_12/david-vincenzetti-hacking-team-intervista-b4d96884-2861-11e5-8e27-9292b85fb2a2.shtml

[29] https://www.vice.com/en_us/article/gvyemx/hacking-team-the-hack-on-us-was-not-done-by-some-random-guy

[30] https://www.dday.it/redazione/17035/hacking-team-a-nudo-cosa-faceva-come-intercettava-e-cosa-succedera-adesso

[31] https://www.linkedin.com/in/ericrabe/

[32] https://www.corporations.pa.gov/Search/CorpSearch

[33] http://economyleague.org/about-us

[34] https://www.wharton.upenn.edu/story/how-a-nonprofit-can-become-a-boundary-spanner-to-help-alleviate-poverty-in-philadelphia/ ; https://www.pennlive.com/news/2016/04/who_has_the_most_lobbying_powe.html ; https://generocity.org/philly/2016/04/01/economy-league-los-angeles-coalition-building/

[35] https://globalphiladelphia.org/sites/globalphiladelphia.org/files/GPA%20Annual%20Report%202010.pdf

[36] https://www.verizon.com/about

[37] http://economyleague.org/providing-insight/newsroom/2009/03/26/economy-league-names-john-f-smith-and-james-k-wujcik-to-lead-board

[38] https://www.linkedin.com/in/albertopelliccione/?originalSubdomain=nl

[39] http://www.giustiziami.it/gm/distrutto-dallinchiesta-su-hacking-team-3-anni-dopo-torno-a-vivere/

[40] https://www.ilgiornale.it/news/cronache/hacker-archiviata-posizione-pelliccione-dellhacking-team-1552124.html

[41] https://reaqta.com

[42] https://www.vice.com/it/article/784a9x/i-disertori-di-hacking-team

[43] http://cytrix.net/endpoint-protection.html

[44] https://opencorporates.com/companies/sg/201812231C

[45] https://opencorporates.com/companies/nl/69518947

[46] https://opencorporates.com/companies/mt/C65166

[47] https://opencorporates.com/companies/nl/69514852

[48] https://www.linkedin.com/in/guidolandi/

[49] https://www.linkedin.com/in/guidolandi/

[50] https://www.key4biz.it/cyber-intelligence-nasce-memento-labs-dalla-fusione-delle-attivita-di-inthecyber-group-e-la-storica-hacking-team/252368/

[51] https://www.linkedin.com/in/paololezzi/detail/recent-activity/posts/

[52] InTheCyber Group SA Lugano

[53] https://d-art.it/news/chi-e-david-vincenzetti-uno-degli-uomini-piu-odiati-e-temuti-al-mondo/22493

[54] https://www.linkedin.com/in/vincenzetti/?originalSubdomain=it

[55] https://www.linkedin.com/in/vincenzetti/?originalSubdomain=it

[56] https://rocketreach.co/david-vincenzetti-email_427486

[57] https://www.linkedin.com/in/vincenzetti/?originalSubdomain=it

Leave a Reply