Information warfare has been an ongoing war between various entities in the cyber world. Intelligence agencies, terrorists and others have been fighting a "silent" cyber warfare ever since computers have been used as the resource for storing and processing data and the Internet as the medium for transportation in the cyber world. Rootkits have played its role in various situations. We live in a competing world of technologies and secrets. War and defenses has not only been funding the weapons division, but also the security and intelligence communities to defend oneself. Though no single individual talk about offense "legally", offense is part of warfare and intelligence agencies or terrorists do not need any legal permissions.
In the midst of such diverse communities, rootkit plays a major role depending on the side that chooses to use it. Rootkits has been used for:
-- Spying technological secrets among competing nations
-- Spying opponents national security
-- Spying for constructing oneself or destructing the other
-- Total control without knowledge of compromise
-- Combining rootkit with other destructive technologies, such as botnets lead to something worse.
-- And more...
The shocking truth is that rootkits can also be used in information warfare with good intent. Though, this depends on which side you are looking at it from. If you are a country that likes to protect its innocents, then rootkits can be used to spy on the cyber terrorists and other criminals. A major drawback is that the legal system is still backward in terms of technology. Hence a large organization that used this technology to enhance their Digital Rights Protection was opposed by many, for using such products to protect themselves from pirates in cyber world. Here, pirates are defined as the ones who support pirated products, a.k.a. piracy.
NOTE: Our tools are listed in many sites and torrents, which makes it hard for us to track all downloads. Hence, we are listing only the total installations from our website.