What's new

Does Washington Post article on Israeli spy software mention Pakistan ?

Zarvan

ELITE MEMBER
Joined
Apr 28, 2011
Messages
54,470
Reaction score
87
Country
Pakistan
Location
Pakistan
I have a request to every one. Those who have the article in full can you post it here. And also does the article mention Pakistan ?
 
.
US peace envoy visits Islamabad as Pakistan-Afghan ties sour

ISLAMABAD — Washington’s point man in talks aimed at ending decades of war in Afghanistan made a brief visit Monday to Pakistan as relations between Islamabad and Kabul reached a new low.
Zalmay Khalilzad’s visit came just hours after Afghanistan withdrew its ambassador from Pakistan late Sunday after the diplomat’s daughter was brutally attacked last week. The U.S. envoy met with Pakistan’s powerful army Chief Gen. Qamar Javed Bajwa but nothing was immediately known of their discussions.

Pakistan and Afghanistan have a long and troubled history, their relationship fraught with mistrust and suspicion. Each accuses the other of fomenting violence on its territory while also harboring its enemies. Pakistan also hosts nearly 2 million Afghans, refugees from four decades of war in their homeland, and many in Afghanistan have grown up as refugees in Pakistan before returning.
Advertisement

Khalilzad arrived in Islamabad from Qatar where the Taliban and Afghan government representatives have held two days of talks that ended late Sunday, with a promise by the warring sides to meet again.
It was the highest level of talks so far, aimed at jumpstarting a peace process that has stagnated for months while fighting inside Afghanistan soared as the U.S. and NATO complete their troop withdrawal.
Khalilzad had expressed hope that the sides would agree even to a temporary truce — to mark the most important Islamic holiday, Eid al-Adha or “Feast of Sacrifice,” which begins on Tuesday in most Muslim countries. Instead, the talks ended with a communiqué that offered little prospects of an end to fighting anytime soon.

It promised more high-level talks and offered promises of greater protection for Afghan civilians caught in the crossfire and for infrastructure.
Advertisement
Last week, Khalilzad attended an international conference in Uzbekistan that tried to find a resolution for the rapidly deteriorating situation in Afghanistan but the gathering did not produce a roadmap to end the fighting.
Pakistan is seen as key to peace in Afghanistan. The Taliban leadership is headquartered in Pakistan and Islamabad has used its leverage, which it says is now waning, to press the Taliban to talk peace.
Still, Kabul is deeply critical of Islamabad’s assistance to the Taliban, including hospital treatment for Taliban fighters wounded in battles in Afghanistan. In the most recent fighting in the town of Spin Boldak in southeastern Afghanistan, Taliban fighters were seen receiving treatment at a Pakistani hospital across the border in Chaman.

Senior Pakistani security officials had previously said that Khalilzad pressed Pakistan to push Taliban leaders to embrace a cease-fire or at least substantially reduce the violence in Afghanistan to allow a peace process to take root. The officials spoke on condition of anonymity because they were not authorized to speak to the media.
Advertisement
Pakistan’s military leadership has reportedly warned the Taliban — who have recently taken more and more territory amid battlefield wins against beleaguered Afghan forces — not to make a push on Kabul. Islamabad has also reportedly told the Taliban it will not recognize a government that comes to power by force.
Pakistan has also been deeply critical of Kabul saying it has allowed another militant group, the Pakistani Taliban — Tehreek-e-Taliban Pakistan — to find safety in Afghanistan from where they have launched a growing number of attacks targeting the Pakistan military.

While the two insurgent groups are separate, Afghan Taliban leaders have close ties with the Pakistani Taliban. Some analysts say Pakistan worries that if it pushed the Afghan Taliban too hard, they will in turn push the Pakistani Taliban to step-up their attacks.
Advertisement
In Kabul, the Afghan foreign ministry issued a statement Sunday saying it was recalling its senior diplomats from Islamabad over the assault on the ambassador’s daughter. Silsila Alikhil, 26, was abducted in the middle of the afternoon in the Pakistani capital, held for several hours and brutally assaulted.
The ministry said the diplomats would not return to Islamabad “until all security threats are met including the arrest and trial of the perpetrators of the abduction.”

Not this one the one which mentioned the use of software by India. Does that article also mention Pakistan.
 
. .
ARY was reporting that Nawaz Sharif used the same spypare against one of our Intel agency & IK as well.
1626700849379.png

1626700861925.png

Not this one the one which mentioned the use of software by India. Does that article also mention Pakistan.


Try to go through the posts in Forum.
 
.
Even if it isn't mentioned even a kid can figure it out it has already been targeted against the top leadership of Pakistan. If anyone thinks otherwise, he/she may need to see a doctor.
 
.
Even if it isn't mentioned even a kid can figure it out it has already been targeted against the top leadership of Pakistan. If anyone thinks otherwise, he/she may need to see a doctor.
O bhai if Nawaz Shareef have used against Imran Khan that is bad thing but if he has used it on Generals and ISI then that is straight up treason.
 
.
I have a request to every one. Those who have the article in full can you post it here. And also does the article mention Pakistan ?
can you point out the article you want see?
 
.
O bhai if Nawaz Shareef have used against Imran Khan that is bad thing but if he has used it on Generals and ISI then that is straight up treason.
traitor Politicians are allood to leave the country for the greater good of Commercial enterprise run by the brave and mighty!
 
.
O bhai if Nawaz Shareef have used against Imran Khan that is bad thing but if he has used it on Generals and ISI then that is straight up treason.

There was already a report where it was used against Generals. I think the report was from The Washington Post but it wasn't from NS but foreign elements if I remember correctly.
 
. . .
I have a request to every one. Those who have the article in full can you post it here. And also does the article mention Pakistan ?

Here's the full article:


The Pegasus ProjectA global investigation
Private Israeli spyware
used to hack cellphones
of journalists,
activists worldwide

NSO Group’s Pegasus spyware, licensed to governments
around the globe, can infect phones without a click



By
Dana Priest

By Craig Timberg
National reporter covering technology

Updated July 18 at 8:15 p.m.Originally published July 18, 2021


Military-grade spyware licensed by an Israeli firm to governments for tracking terrorists and criminals was used in attempted and successful hacks of 37 smartphones belonging to journalists, human rights activists, business executives and two women close to murdered Saudi journalist Jamal Khashoggi, according to an investigation by The Washington Post and 16 media partners.

The phones appeared on a list of more than 50,000 numbers that are concentrated in countries known to engage in surveillance of their citizens and also known to have been clients of the Israeli firm, NSO Group, a worldwide leader in the growing and largely unregulated private spyware industry, the investigation found.

The list does not identify who put the numbers on it, or why, and it is unknown how many of the phones were targeted or surveilled. But forensic analysis of the 37 smartphones shows that many display a tight correlation between time stamps associated with a number on the list and the initiation of surveillance, in some cases as brief as a few seconds.


Forbidden Stories, a Paris-based journalism nonprofit, and Amnesty International, a human rights group, had access to the list and shared it with the news organizations, which did further research and analysis. Amnesty’s Security Lab did the forensic analyses on the smartphones.

The numbers on the list are unattributed, but reporters were able to identify more than 1,000 people spanning more than 50 countries through research and interviews on four continents: several Arab royal family members, at least 65 business executives, 85 human rights activists, 189 journalists, and more than 600 politicians and government officials — including cabinet ministers, diplomats, and military and security officers. The numbers of several heads of state and prime ministers also appeared on the list.

Among the journalists whose numbers appear on the list, which dates to 2016, are reporters working overseas for several leading news organizations, including a small number from CNN, the Associated Press, Voice of America, the New York Times, the Wall Street Journal, Bloomberg News, Le Monde in France, the Financial Times in London and Al Jazeera in Qatar.

The targeting of the 37 smartphones would appear to conflict with the stated purpose of NSO’s licensing of the Pegasus spyware, which the company says is intended only for use in surveilling terrorists and major criminals. The evidence extracted from these smartphones, revealed here for the first time, calls into question pledges by the Israeli company to police its clients for human rights abuses.

The media consortium, titled the Pegasus Project, analyzed the list through interviews and forensic analysis of the phones, and by comparing details with previously reported information about NSO. Amnesty’s Security Lab examined 67 smartphones where attacks were suspected. Of those, 23 were successfully infected and 14 showed signs of attempted penetration.

For the remaining 30, the tests were inconclusive, in several cases because the phones had been replaced. Fifteen of the phones were Android devices, none of which showed evidence of successful infection. However, unlike iPhones, Androids do not log the kinds of information required for Amnesty’s detective work. Three Android phones showed signs of targeting, such as Pegasus-linked SMS messages.

Amnesty shared backup copies of data on four iPhones with Citizen Lab, which confirmed that they showed signs of Pegasus infection. Citizen Lab, a research group at the University of Toronto that specializes in studying Pegasus, also conducted a peer review of Amnesty’s forensic methods and found them to be sound.


In lengthy responses before publication, NSO called the investigation’s findings exaggerated and baseless. It also said it does not operate the spyware licensed to its clients and “has no insight” into their specific intelligence activities.
After publication, NSO chief executive Shalev Hulio expressed concern in a phone interview with The Post about some of the details he had read in Pegasus Project stories Sunday, while continuing to dispute that the list of more than 50,000 phone numbers had anything to do with NSO or Pegasus.
“The company cares about journalists and activists and civil society in general,” Hulio said. “We understand that in some circumstances our customers might misuse the system and, in some cases like we reported in [NSO’s] Transparency and Responsibility Report, we have shut down systems for customers who have misused the system.”
He said that in the past 12 months NSO had terminated two contracts over allegations of human rights abuses, but he declined to name the countries involved.
“Every allegation about misuse of the system is concerning me,” he said. “It violates the trust that we give customers. We are investigating every allegation.”
NSO describes its customers as 60 intelligence, military and law enforcement agencies in 40 countries, although it will not confirm the identities of any of them, citing client confidentiality obligations. The consortium found many of the phone numbers in at least 10 country clusters, which were subjected to deeper analysis: Azerbaijan, Bahrain, Hungary, India, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia and the United Arab Emirates. Citizen Lab also has found evidence that all 10 have been clients of NSO, according to Bill Marczak, a senior research fellow.
Forbidden Stories organized the media consortium’s investigation, and Amnesty provided analysis and technical support but had no editorial input. Amnesty has openly criticized NSO’s spyware business and supported an unsuccessful lawsuit against the company in an Israeli court seeking to have its export license revoked. After the investigation began, several reporters in the consortium learned that they or their family members had been successfully attacked with Pegasus spyware.


Beyond the personal intrusions made possible by smartphone surveillance, the widespread use of spyware has emerged as a leading threat to democracies worldwide, critics say. Journalists under surveillance cannot safely gather sensitive news without endangering themselves and their sources. Opposition politicians cannot plot their campaign strategies without those in power anticipating their moves. Human rights workers cannot work with vulnerable people — some of whom are victims of their own governments — without exposing them to renewed abuse.

Read key takeaways from the Pegasus Project
For example, Amnesty’s forensics found evidence that Pegasus was targeted at the two women closest to Saudi columnist Khashoggi, who wrote for The Post’s Opinions section. The phone of his fiancee, Hatice Cengiz, was successfully infected during the days after his murder in Turkey on Oct. 2, 2018, according to a forensic analysis by Amnesty’s Security Lab. Also on the list were the numbers of two Turkish officials involved in investigating his dismemberment by a Saudi hit team. Khashoggi also had a wife, Hanan Elatr, whose phone was targeted by someone using Pegasus in the months before his killing. Amnesty was unable to determine whether the hack was successful.

“This is nasty software — like eloquently nasty,” said Timothy Summers, a former cybersecurity engineer at a U.S. intelligence agency and now director of IT at Arizona State University. With it “one could spy on almost the entire world population. … There’s not anything wrong with building technologies that allows you to collect data; it’s necessary sometimes. But humanity is not in a place where we can have that much power just accessible to anybody.”


In response to detailed questions from the consortium before publication, NSO said in a statement that it did not operate the spyware it licensed to clients and did not have regular access to the data they gather. The company also said its technologies have helped prevent attacks and bombings and broken up rings that trafficked in drugs, sex and children. “Simply put, NSO Group is on a life-saving mission, and the company will faithfully execute this mission undeterred, despite any and all continued attempts to discredit it on false grounds,” NSO said. “Your sources have supplied you with information that has no factual basis, as evidenced by the lack of supporting documentation for many of the claims.”

The company denied that its technology was used against Khashoggi, or his relatives or associates.

“As NSO has previously stated, our technology was not associated in any way with the heinous murder of Jamal Khashoggi. This includes listening, monitoring, tracking, or collecting information. We previously investigated this claim, immediately after the heinous murder, which again, is being made without validation.”

Thomas Clare, a libel attorney hired by NSO, said that the consortium had “apparently misinterpreted and mischaracterized crucial source data on which it relied” and that its reporting contained flawed assumptions and factual errors.


“NSO Group has good reason to believe that this list of ‘thousands of phone numbers’ is not a list of numbers targeted by governments using Pegasus, but instead, may be part of a larger list of numbers that might have been used by NSO Group customers for other purposes,” Clare wrote.

In response to follow-up questions, NSO called the 50,000 number “exaggerated” and said it was far too large to represent numbers targeted by its clients. Based on the questions it was being asked, NSO said, it had reason to believe that the consortium was basing its findings “on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers targets of Pegasus or any other NSO products … we still do not see any correlation of these lists to anything related to use of NSO Group technologies.”

The term HLR, or Home Location Register, refers to a database that is essential to operating cellular phone networks. Such registers keep records on the networks of cellphone users and their general locations, along with other identifying information that is used routinely in routing calls and texts. HLR lookup services operate on the SS7 system that cellular carriers use to communicate with each other. The services can be used as a step toward spying on targets.


Telecommunications security expert Karsten Nohl, chief scientist for Security Research Labs in Berlin, said that he does not have direct knowledge of NSO’s systems but that HLR lookups and other SS7 queries are widely and inexpensively used by the surveillance industry — often for just tens of thousands of dollars a year.

“It’s not difficult to get that access. Given the resources of NSO, it’d be crazy to assume that they don’t have SS7 access from at least a dozen countries,” Nohl said. “From a dozen countries, you can spy on the rest of the world.”

Pegasus was engineered a decade ago by Israeli ex-cyberspies with government-honed skills. The Israeli Defense Ministry must approve any license to a government that wants to buy it, according to previous NSO statements.

“As a matter of policy, the State of Israel approves the export of cyber products exclusively to governmental entities, for lawful use, and only for the purpose of preventing and investigating crime and counterterrorism, under end-use/end user certificates provided by the acquiring government,” a spokesperson for the Israeli defense establishment said Sunday. “In cases where exported items are used in violation of export licenses or end-use certificates, appropriate measures are taken.”

The numbers of about a dozen Americans working overseas were discovered on the list, in all but one case while using phones registered to foreign cellular networks. The consortium could not perform forensic analysis on most of these phones. NSO has said for years that its product cannot be used to surveil American phones. The consortium did not find evidence of successful spyware penetration on phones with the U.S. country code.

“We also stand by our previous statements that our products, sold to vetted foreign governments, cannot be used to conduct cybersurveillance within the United States, and no customer has ever been granted technology that would enable them to access phones with U.S. numbers,” the company said in its statement. “It is technologically impossible and reaffirms the fact your sources’ claims have no merit.”

How Pegasus works
Target:
Someone sends what’s known as a trap link to a smartphone that persuades the victim to tap and activate — or activates itself without any input, as in the most sophisticated “zero-click” hacks.

Infect: The spyware captures and copies the phone’s most basic functions, NSO marketing materials show, recording from the cameras and microphone and collecting location data, call logs and contacts.

Track: The implant secretly reports that information to an operative who can use it to map out sensitive details of the victim’s life.

Read more about why it’s hard to protect yourself from hacks.



Apple and other smartphone manufacturers are years into a cat-and-mouse game with NSO and other spyware makers.

“Apple unequivocally condemns cyberattacks against journalists, human rights activists and others seeking to make the world a better place,” said Ivan Krstić, head of Apple Security Engineering and Architecture. “For over a decade, Apple has led the industry in security innovation and, as a result, security researchers agree iPhone is the safest, most secure consumer mobile device on the market. Attacks like the ones described are highly sophisticated, cost millions of dollars to develop, often have a short shelf life and are used to target specific individuals. While that means they are not a threat to the overwhelming majority of our users, we continue to work tirelessly to defend all our customers, and we are constantly adding new protections for their devices and data.”

Some Pegasus intrusion techniques detailed in a 2016 report were changed in a matter of hours after they were made public, underscoring NSO’s ability to adapt to countermeasures.

Pegasus is engineered to evade defenses on iPhones and Android devices and to leave few traces of its attack. Familiar privacy measures like strong passwords and encryption offer little help against Pegasus, which can attack phones without any warning to users. It can read anything on a device that a user can, while also stealing photos, recordings, location records, communications, passwords, call logs and social media posts. Spyware also can activate cameras and microphones for real-time surveillance.

“There is just nothing from an encryption standpoint to protect against this,” said Claudio Guarnieri, a.k.a. “Nex,” the Amnesty Security Lab’s 33-year-old Italian researcher who developed and performed the digital forensics on 37 smartphones that showed evidence of Pegasus attacks.


That sense of helplessness makes Guarnieri, who often dresses head-to-toe in black, feel as useless as a 14th-century doctor confronting the Black Plague without any useful medication. “Primarily I’m here just to keep the death count,” he said.

The attack can begin in different ways. It can come from a malicious link in an SMS text message or an iMessage. In some cases, a user must click on the link to start the infection. In recent years, spyware companies have developed what they call “zero-click” attacks, which deliver spyware simply by sending a message to a user’s phone that produces no notification. Users do not even need to touch their phones for infections to begin.

Many countries have laws pertaining to traditional wiretapping and interception of communications, but few have effective safeguards against deeper intrusions made possible by hacking into smartphones. “This is more devious in a sense because it really is no longer about intercepting communications and overhearing conversation. … This covers all of them and goes way beyond that,” Guarnieri said. “It has raised a lot of questions from not only human rights, but even national constitutional laws as to is this even legal?”

Clare, NSO’s attorney, attacked the forensic examinations as “a compilation of speculative and baseless assumptions” built on assumptions based on earlier reports. He also said, “NSO does not have insight into the specific intelligence activities of its customers.”


The Pegasus Project’s findings are similar to previous discoveries by Amnesty, Citizen Lab and news organizations worldwide, but the new reporting offers a detailed view of the personal consequences and scale of surveillance and its abuses.

The consortium analyzed the list and found clusters of numbers with similar country codes and geographical focus that align with previous reporting and additional research about NSO clients overseas. For example, Mexico has been previously identified in published reports and documents as an NSO client, and entries on the list are clustered by Mexican country code, area code and geography. In several cases, clusters also contained numbers from other countries.

In response to questions from reporters, spokespeople for the countries with clusters either denied Pegasus was used or denied that their country had abused their powers of surveillance.

Hungarian Prime Minister Viktor Orban’s office said any surveillance carried out by that nation is done in accordance with the law.

“In Hungary, state bodies authorized to use covert instruments are regularly monitored by governmental and non-governmental institutions,” the office said. “Have you asked the same questions of the governments of the United States of America, the United Kingdom, Germany or France?”

Moroccan authorities responded: “It should be recalled that the unfounded allegations previously published by Amnesty International and conveyed by Forbidden Stories have already been the subject of an official response from the Moroccan authorities, who have categorically rejected these allegations.”

Vincent Biruta, Rwanda’s foreign affairs minister, also denied the use of Pegasus.

“Rwanda does not use this software system, as previously confirmed in November 2019, and does not possess this technical capability in any form,” Biruta said. “These false accusations are part of an ongoing campaign to cause tensions between Rwanda and other countries, and to sow disinformation about Rwanda domestically and internationally.”

‘What a question!’

Carmen Aristegui, one of the most prominent investigative journalists in Mexico, is routinely threatened for exposing the corruption of the nation's politicians and cartels. She was previously revealed as a Pegasus target in several media reports. (Bernardo Montoya/AFP/Getty Images)
Some expressed outrage even at the suggestion of spying on journalists.

A reporter for the French daily Le Monde working on the Pegasus Project recently posed such a question to Hungarian Justice Minister Judit Varga during an interview about the legal requirements for eavesdropping:

“If someone asked you to tape a journalist or an opponent, you wouldn’t accept this?”

“What a question!” Varga responded. “This is a provocation in itself!” A day later, her office requested that this question and her answer to it “be erased” from the interview.

In the past, NSO has blamed its client countries for any alleged abuses. NSO released its first “Transparency and Responsibility Report” last month, arguing that its services are essential to law enforcement and intelligence agencies trying to keep up with the 21st century.

“Terror organizations, drug cartels, human traffickers, pedophile rings and other criminal syndicates today exploit off-the-shelf encryption capabilities offered by mobile messaging and communications applications.


“These technologies provide criminals and their networks a safe haven, allowing them to ‘go dark’ and avoid detection, communicating through impenetrable mobile messaging systems. Law enforcement and counterterrorism state agencies around the world have struggled to keep up.”

NSO also said it conducts rigorous reviews of potential customers’ human rights records before contracting with them and investigates reports of abuses, although it did not cite any specific cases. It asserted that it has discontinued contracts with five clients for documented violations and that the company’s due diligence has cost it $100 million in lost revenue. A person familiar with NSO operations who spoke on the condition of anonymity to discuss internal company matters noted that in the last year alone NSO had terminated contracts with Saudi Arabia and Dubai in the United Arab Emirates over human rights concerns.

“Pegasus is very useful for fighting organized crime,” said Guillermo Valdes Castellanos, head of Mexico’s domestic intelligence agency CISEN from 2006 to 2011. “But the total lack of checks and balances [in Mexican agencies] means it easily ends up in private hands and is used for political and personal gain.”

Mexico was NSO’s first overseas client in 2011, less than a year after the firm was founded in Israel’s Silicon Valley, in northern Tel Aviv.

In 2016 and 2017, more than 15,000 Mexicans appeared on the list examined by the media consortium, among them at least 25 reporters working for the country’s major media outlets, according to the records and interviews.

One of them was Carmen Aristegui, one of the most prominent investigative journalists in the country and a regular contributor to CNN. Aristegui, who is routinely threatened for exposing the corruption of Mexican politicians and cartels, was previously revealed as a Pegasus target in several media reports. At the time, she said in a recent interview, her producer was also targeted. The new records and forensics show that Pegasus links were detected on the phone of her personal assistant.


“Pegasus is something that comes to your office, your home, your bed, every corner of your existence,” Aristegui said. “It is a tool that destroys the essential codes of civilization.”

Unlike Aristegui, freelance reporter Cecilio Pineda was unknown outside his violence-wracked southern state of Guerrero. His number appears twice on the list of 50,000. A month after the second listing, he was gunned down while lying in a hammock at a carwash while waiting for his car. It is unclear what role, if any, Pegasus’s ability to geolocate its targets in real time contributed to his murder. Mexico is among the deadliest countries for journalists; 11 were killed in 2017, according to Reporters Without Borders.

“Even if Forbidden Stories were correct that an NSO Group client in Mexico targeted the journalist’s phone number in February 2017, that does not mean that the NSO Group client or data collected by NSO Group software were in any way connected to the journalist’s murder the following month,” Clare, NSO’s lawyer, wrote in his letter to Forbidden Stories. “Correlation does not equal causation, and the gunmen who murdered the journalist could have learned of his location at a public carwash through any number of means not related to NSO Group, its technologies, or its clients.”

Mexico’s Public Security Ministry acknowledged last year that the domestic intelligence agency, CISEN, and the attorney general’s office acquired Pegasus in 2014 and discontinued its use in 2017 when the license expired. Mexican media have also reported that the Defense Ministry used the spyware.

Snowden’s legacy

Edward Snowden’s 2013 disclosure of highly classified National Security Agency documents revealed the agency’s ability to tap the electronic communications of almost anyone and triggered an international boom in spyware development and deployment. (The Guardian/Getty Images)
Today’s thriving international spyware industry dates back decades but got a boost after the unprecedented 2013 disclosure of highly classified National Security Agency documents by contractor Edward Snowden. They revealed that the NSA could obtain the electronic communications of almost anyone because it had secret access to the transnational cables carrying Internet traffic worldwide and data from Internet companies such as Google and giant telecommunications companies such as AT&T.

Even U.S. allies in Europe were shocked by the comprehensive scale of the American digital spying, and many national intelligence agencies set out to improve their own surveillance abilities. For-profit firms staffed with midcareer retirees from intelligence agencies saw a lucrative market-in-waiting free from the government regulations and oversight imposed on other industries.

The dramatic expansion of end-to-end encryption by Google, Microsoft, Facebook, Apple and other major technology firms also prompted law enforcement and intelligence officials to complain they had lost access to the communications of legitimate criminal targets. That in turn sparked more investment in technologies, such as Pegasus, that worked by targeting individual devices.


“When you build a building, you want to make sure the building holds up, so we follow certain protocols,” said Ido Sivan-Sevilla, an expert on cyber governance at the University of Maryland. By promoting the sale of unregulated private surveillance tools, “we encourage building buildings that can be broken into. We are building a monster. We need an international norms treaty that says certain things are not okay.”

Without international standards and rules, there are secret deals between companies like NSO and the countries they service.

The unfettered use of a military-grade spyware such as Pegasus can help governments to suppress civic activism at a time when authoritarianism is on the rise worldwide. It also gives countries without the technical sophistication of such leading nations as the United States, Israel and China the ability to conduct far deeper digital cyberespionage than ever before.

‘Your body stops functioning’

The regime in Azerbaijan has worked for a decade to silence investigative journalist Khadija Ismayilova. Forensics by Security Lab determined that Pegasus attacked and penetrated her smartphone numerous times from March 2019 to as late as May of this year. (Aziz Karimov/Pacific Press/LightRocket/Getty Images)
Azerbaijan, a longtime ally of Israel, has been identified as an NSO client by Citizen Lab and others. The country is a family-run kleptocracy with no free elections, no impartial court system and no independent news media. The former Soviet territory has been ruled since the Soviet Union collapsed 30 years ago by the Aliyev family, whose theft of the country’s wealth and money-laundering schemes abroad have resulted in foreign embargoes, international sanctions and criminal indictments.

Despite the difficulties, roughly three dozen Azerbaijani reporters continue to document the family’s corruption. Some are hiding inside the country, but most were forced into exile where they are not so easy to capture. Some work for the Prague-based, U.S.-funded Radio Free Europe/Radio Liberty, which was kicked out of the country in 2015 for its reporting. The others work for an investigative reporting nonprofit called the Organized Crime and Corruption Reporting Project, which is based in Sarajevo, the Bosnian capital, and is one of the partners in the Pegasus Project.

The foremost investigative reporter in the region is Khadija Ismayilova, whom the regime has worked for a decade to silence: It planted a secret camera in her apartment wall, took videos of her having sex with her boyfriend and then posted them on the Internet in 2012; she was arrested in 2014, tried and convicted on trumped-up tax-evasion and other charges, and held in prison cells with hardened criminals. After global outrage and the high-profile intervention of human rights attorney Amal Clooney, she was released in 2016 and put under a travel ban.


“It is important that people see examples of journalists who do not stop because they were threatened,” Ismayilova said in a recent interview. “It’s like a war. You leave your trench, then the attacker comes in. … You have to keep your position, otherwise it will be taken and then you will have less space, less space, the space will be shrinking and then you will find it hard to breathe.”

Last month, her health failing, she was allowed to leave the country. Colleagues arranged to test her smartphone immediately. Forensics by Security Lab determined that Pegasus had attacked and penetrated her device numerous times from March 2019 to as late as May of this year.

She had assumed some kind of surveillance, Ismayilova said, but was still surprised at the number of attacks. “When you think maybe there’s a camera in the toilet, your body stops functioning,” she said. “I went through this, and for eight or nine days I could not use the toilet, anywhere, not even in public places. My body stopped functioning.”

She stopped communicating with people because whoever she spoke with ended up harassed by security services. “You don’t trust anyone, and then you try not to have any long-term plans with your own life because you don’t want any person to have problems because of you.”

Confirmation of the Pegasus penetration galled her. “My family members are also victimized. The sources are victimized. People I’ve been working with, people who told me their private secrets are victimized,” she said. “It’s despicable. … I don’t know who else has been exposed because of me, who else is in danger because of me.”

Is the minister paranoid or sensible?

When Siddharth Varadarajan, co-founder of India’s independent online news outlet the Wire, learned his phone had been penetrated by Pegasus, his mind immediately ran through his sensitive sources. (Raj K Raj/Hindustan Times/Getty Images)
The fear of widespread surveillance impedes the already difficult mechanics of civic activism.

“Sometimes, that fear is the point,” said John Scott-Railton, a senior researcher at Citizen Lab, who has researched Pegasus extensively. “The psychological hardship and the self-censorship it causes are key tools of modern-day dictators and authoritarians.”

When Siddharth Varadarajan, co-founder of the Wire, an independent online outlet in India, learned that Security Lab’s analysis showed that his phone had been targeted and penetrated by Pegasus, his mind immediately ran through his sensitive sources. He thought about a minister in Prime Minister Narendra Modi’s government who had displayed an unusual concern about surveillance when they met.


The minister first moved the meeting from one location to another at the last moment, then switched off his phone and told Varadarajan to do the same.

Then “the two phones were put in a room and music was put on in that room … and I thought: ‘Boy, this guy is really paranoid. But maybe he was being sensible,'" Varadarajan said in a recent interview.

When forensics showed his phone had been penetrated, he knew the feeling himself. “You feel violated, there’s no doubt about it,” he said. “This is an incredible intrusion, and journalists should not have to deal with this. Nobody should have to deal with this.”

 
.
Pegasus Project | India’s Gandhi and Pakistan’s Khan Tapped as Targets in Israeli NSO Spyware Scandal
Project Pegasus reveals massive list of potential targets of Israeli spyware, including Modi’s biggest rival – Rahul Gandhi – and even an old number belonging to Pakistani leader Khan


Prominent Indian politician Rahul Gandhi and Pakistani Prime Minister Imran Khan were selected as potential targets of the Israeli-made Pegasus spyware program by clients of the NSO Group cyberespionage firm, a global investigation can reveal Monday.


>> Never miss a cyber story: Sign up for our tech newsletter and get all the updates about NSO and Project Pegasus


Forbidden Stories – a Paris-based journalism nonprofit – and Amnesty International had access to a leak of more than 50,000 records of phone numbers that NSO clients selected for surveillance. The leak was shared with Haaretz and 16 other news organizations worldwide that have worked collaboratively to conduct further analysis and reporting over past months.


Forbidden Stories oversaw the investigation, called the Pegasus Project, and Amnesty International provided forensic analyses and technical support.


Project Pegasus partners The Guardian and the Washington Post, as well as the Indian newspaper The Wire, revealed Monday that Rahul Gandhi, Indian Prime Minister Narendra Modi’s biggest political rival, was selected to be a target at least twice.


Open gallery view
Rahul Gandhi in Karnataka in 2018. Two numbers linked to Gandhi were selected for targeting by an NSO client and are being revealed as part of the Pegasus Project

Rahul Gandhi in Karnataka in 2018. Two numbers linked to Gandhi were selected for targeting by an NSO client and are being revealed as part of the Pegasus ProjectCredit: Sidheeq via WikiCommons
The database only includes potential targets – a wish list of sorts from NSO’s clients – and not verified targets. But traces of NSO software were found in more than 85 percent of the analyses conducted by Amnesty International on iPhones that were used by potential victims across the world at the time of their number's selection.




According to the Pegasus Project investigation, out of the 50,000 phone numbers leaked, over 1,000 Indian numbers were selected as potential targets. According to The Guardian, the numbers “strongly indicate that intelligence agencies within the Indian government were operating the system.”


Read more >> The Israeli cyber weapon used against 180 journalistsKhashoggi’s fiancee, son targeted by NSO tech, investigation revealsHow NSO's Pegasus is used to spy on journalistsAnalysis: How Israeli spy-tech became dictators' weapon of choice



India has not confirmed nor denied whether it is a client of NSO, and its regulation does not require the government to disclose the use of such technology.


Among those potentially targeted in India were two of Gandhi's closest advisors - Alankar Sawai and Sachin Rao – and Ashok Lavasa, a senior Indian election official. The local head of the Bill and Melinda Gates foundation, M. Hari Menon, was also tapped as a potential target.


Open gallery view
[IMG alt="Pakistan's Prime Minister Imran Khan speaks during an interview with Reuters in Islamabad, Pakistan June 4, 2021. REUTERS/Saiyna Bashir
"]https://img.haarets.co.il/img/1.100...op=2200,1470,x0,y0&height=234&width=350[/IMG]
Pakistan's Prime Minister Imran Khan speaks during an interview with Reuters in Islamabad, Pakistan June 4, 2021. Credit: SAIYNA BASHIR/ REUTERS
Additional potential targets included Pakistani officials, including a number once associated with Pakistani leader Khan. They also included Kashmiri separatists, leading Tibetan religious figures and even an Indian supreme court judge. Khan did not respond to a request for comment from the Washington Post.


Gandhi, who said he changes phones every few months to avoid being hacked, said in response: “Targeted surveillance of the type you describe, whether in regard to me, other leaders of the opposition or indeed any law-abiding citizen of India, is illegal and deplorable.


- Advertisment -


“If your information is correct, the scale and nature of surveillance you describe goes beyond an attack on the privacy of individuals. It is an attack on the democratic foundations of our country. It must be thoroughly investigated, and those responsible be identified and punished.”


According to an analysis of the Pegasus Project records, more than 180 journalists were selected in 21 countries by at least 12 NSO clients. The potential targets and clients hail from Bahrain, Morocco, Saudi Arabia, India, Mexico, Hungary, Azerbaijan, Togo and Rwanda.


The Amnesty International Security Lab conducted forensics analyses of cell phones targeted with Pegasus as part of the project. Their findings are consistent with past analyses of those targeted with NSO’s spyware, including the case of dozens of journalists allegedly hacked in the UAE and Saudi Arabia, identified by Citizen Lab in December of last year.


Open gallery view
[IMG alt="Indian Prime Minister Narendra Modi and former Israeli Prime Minister Benjamin Netanyahu in Israel in 2017. Over 1,000 Indian numbers were potentially targeted by NSO's Pegasus software
"]https://img.haarets.co.il/img/1.100...op=2200,1465,x0,y0&height=233&width=350[/IMG]
Indian Prime Minister Narendra Modi and former Israeli Prime Minister Benjamin Netanyahu in Israel in 2017. Over 1,000 Indian numbers were potentially targeted by NSO's Pegasus softwareCredit: Koby Gideon, GPO
India is Israel’s biggest arms market, buying around $1 billion worth of weapons every year, according to Reuters. The two countries have grown closer since Modi became Indian prime minister in 2014, widening commercial cooperation beyond their longstanding defense ties. Modi became the first sitting Indian leader to visit Israel in July 2017, while former Prime Minister Benjamin Netanyahu held a state visit to India at the start of 2018.


- Advertisment -

NSO issued a response to the 17 media partners led by the journalism nonprofit Forbidden Stories and Amnesty International, calling the leak an "international conspiracy."


"The report by Forbidden Stories is full of wrong assumptions and uncorroborated theories that raise serious doubts about the reliability and interests of the sources. It seems like the 'unidentified sources' have supplied information that has no factual basis and are far from reality," the company said in the statement.


"After checking their claims, we firmly deny the false allegations made in their report," NSO’s statement said.


In response to questions from the Washington Post, India’s Ministry of Electronics and Information Technology said the claim that specific people were targeted “had no concrete basis or truth associated with it whatsoever.” They added that “any interception, monitoring or decryption of any information through any computer resource is done as per due process of law.”


 
.

Pakistan Defence Latest Posts

Pakistan Affairs Latest Posts

Back
Top Bottom