• Private equity executive sought to undermine #NSO critics, data suggests
    https://www.theguardian.com/world/2022/apr/28/private-equity-executive-sought-to-undermine-nso-critics-data-suggests

    Ron Deibert, the longtime director of the Canadian research group, is one of the world’s leading experts on identifying digital threats against civil society.

    John Scott-Railton, a senior researcher at #Citizen_Lab, is among a relatively small group of experts globally who can identify which iPhones and Android devices have been infected with #Pegasus, and which government clients are likely to have been responsible.

    It is unsurprising, then, that the pair were an intense focus at #Novalpina, the London-based private equity group which took over NSO Group in 2019, and quickly sought to stem its reputation for enabling repressive governments to commit widespread human rights abuses.
    Using UK data protection laws, Deibert and Scott-Railton last year sought the personal data held on them by Novalpina. The results of their so-called subject access requests, recently shared with the Guardian, contain snippets of hundreds of emails and attachments that included their names.

    #surveillance

  • NSO Group / Q Cyber Technologies
    Citizen Lab, le 29 octobre 2019
    https://citizenlab.ca/2019/10/nso-q-cyber-technologies-100-new-abuse-cases

    As part of our investigation into the [Whatsapp] incident, Citizen Lab has identified over 100 cases of abusive targeting of human rights defenders and journalists in at least 20 countries across the globe, ranging from Africa, Asia, Europe, the Middle East, and North America that took place after Novalpina Capital acquired NSO Group and began an ongoing public relations campaign to promote the narrative that the new ownership would curb abuses.

    Other vectors used in prior cases of NSO targeting include tricking targets into clicking on a link using social engineering. For example, in 2017, the wife of a murdered Mexican journalist was sent alarming text messages concerning her husband’s murder, designed to trick her into clicking on a link and infecting her phone with the Pegasus spyware. In 2018, a close confidant of Jamal Khashoggi was targeted in Canada with a fake package notification, resulting in the infection of his iPhone. Citizen Lab has tracked more than two dozen cases using similar techniques.

    #Palestine #israel #NSO #Pegasus #surveillance #Jamal_Khashoggi #Javier_Valdez

  • NSO, l’espionnage tous azimuts
    https://www.liberation.fr/planete/2019/10/31/nso-l-espionnage-tous-azimuts_1760866

    Selon Reuters, le logiciel Pegasus développé par la sulfureuse entreprise israélienne, dénoncé pour avoir servi à surveiller des militants des droits de l’homme et des opposants politiques, a aussi été utilisé pour cibler « de hauts responsables gouvernementaux » dans une vingtaine de pays. La recension publique des états de service de l’entreprise israélienne NSO Group, « pépite » de la « start-up nation » du Proche-Orient en matière de logiciels espions, continue de s’enrichir. Ce jeudi, Reuters affirme en (...)

    #NSO #WhatsApp #Pegasus #smartphone #spyware #activisme #journalisme #écoutes #hacking #surveillance #AmnestyInternational (...)

    ##CitizenLab

  • WhatsApp dépose plainte contre un cabinet de technologie israélien dont les logiciels espions ont ciblé des militants des droits de l’homme et des journalistes
    30 octobre | Adam Entous pour The New Yorker |Traduction BP pour l’AURDIP
    https://www.aurdip.org/whatsapp-depose-plainte-contre-un.html

    (...) Mardi, WhatsApp a pris l’extraordinaire mesure d’annoncer qu’elle avait remonté la trace du malware jusqu’à NSO Group, un fabricant de logiciels d’espionnage basé en Israël, et elle a intenté un procès contre cette société – et contre sa société mère, Q Cyber Technologies – devant un tribunal de Californie du Nord, l’accusant d’ « accès et utilisation illicites » des ordinateurs de WhatsApp. Selon le procès, NSO Group développait le malware afin d’accéder à des messages et autres communications après avoir décrypté les systèmes ciblés, permettant aux intrus de contourner le cryptage de WhatsApp. (...)

  • Undercover agents target cybersecurity watchdog who detailed Israeli firm NSO’s link to #Khashoggi scandal
    Haaretz.Com
    https://www.haaretz.com/misc/article-print-page/.premium-undercover-agents-target-watchdog-who-detailed-israeli-firm-nso-s-

    Operatives with fake identities are pursuing members of #Citizen_Lab, the group that uncovered the connection between Jamal Khashoggi’s murder and Israel’s surveillance company #NSO
    The Associated Press | Jan. 26, 2019 | 4:19 PM

    The researchers who reported that Israeli software was used to spy on Washington Post journalist Jamal Khashoggi’s inner circle before his gruesome death are being targeted in turn by international undercover operatives, The Associated Press has found.

    Twice in the past two months, men masquerading as socially conscious investors have lured members of the Citizen Lab internet watchdog group to meetings at luxury hotels to quiz them for hours about their work exposing Israeli surveillance and the details of their personal lives. In both cases, the researchers believe they were secretly recorded.

    Citizen Lab Director Ron Deibert described the stunts as “a new low.”

    “We condemn these sinister, underhanded activities in the strongest possible terms,” he said in a statement Friday. “Such a deceitful attack on an academic group like the Citizen Lab is an attack on academic freedom everywhere.”

    Who these operatives are working for remains a riddle, but their tactics recall those of private investigators who assume elaborate false identities to gather intelligence or compromising material on critics of powerful figures in government or business.

    Citizen Lab, based out of the Munk School of Global Affairs at the University of Toronto, has for years played a leading role in exposing state-backed hackers operating in places as far afield as Tibet , Ethiopia and Syria . Lately the group has drawn attention for its repeated exposés of an Israeli surveillance software vendor called the NSO Group, a firm whose wares have been used by governments to target journalists in Mexico , opposition figures in Panama and human rights activists in the Middle East .

    In October, Citizen Lab reported that an iPhone belonging to one of Khashoggi’s confidantes had been infected by the NSO’s signature spy software only months before Khashoggi’s grisly murder. The friend, Saudi dissident Omar Abdulaziz, would later claim that the hacking had exposed Khashoggi’s private criticisms of the Saudi royal family to the Arab kingdom’s spies and thus “played a major role” in his death.

    In a statement, NSO denied having anything to do with the undercover operations targeting Citizen Lab, “either directly or indirectly” and said it had neither hired nor asked anyone to hire private investigators to pursue the Canadian organization. “Any suggestion to the contrary is factually incorrect and nothing more than baseless speculation,” NSO said.

    NSO has long denied that its software was used to target Khashoggi, although it has refused to comment when asked whether it has sold its software to the Saudi government more generally.

    The first message reached Bahr Abdul Razzak, a Syrian refugee who works as a Citizen Lab researcher, Dec. 6, when a man calling himself Gary Bowman got in touch via LinkedIn. The man described himself as a South African financial technology executive based in Madrid.

    “I came across your profile and think that the work you’ve done helping Syrian refugees and your extensive technical background could be a great fit for our new initiative,” Bowman wrote.

    Abdul Razzak said he thought the proposal was a bit odd, but he eventually agreed to meet the man at Toronto’s swanky Shangri-La Hotel on the morning of Dec. 18.

    The conversation got weird very quickly, Abdul Razzak said.

    Instead of talking about refugees, Abdul Razzak said, Bowman grilled him about his work for Citizen Lab and its investigations into the use of NSO’s software. Abdul Razzak said Bowman appeared to be reading off cue cards, asking him if he was earning enough money and throwing out pointed questions about Israel, the war in Syria and Abdul Razzak’s religiosity.

    “Do you pray?” Abdul Razzak recalled Bowman asking. “Why do you write only about NSO?” ’’Do you write about it because it’s an Israeli company?" ’’Do you hate #Israel?"

    Abdul Razzak said he emerged from the meeting feeling shaken. He alerted his Citizen Lab colleagues, who quickly determined that the breakfast get-together had been a ruse. Bowman’s supposed Madrid-based company, FlameTech, had no web presence beyond a LinkedIn page, a handful of social media profiles and an entry in the business information platform Crunchbase. A reverse image search revealed that the profile picture of the man listed as FlameTech’s chief executive, Mauricio Alonso, was a stock photograph.

    “My immediate gut feeling was: ’This is a fake,’” said John Scott-Railton, one of Abdul Razzak’s colleagues.

    Scott-Railton flagged the incident to the AP, which confirmed that FlameTech was a digital facade.

    Searches of the Orbis database of corporate records, which has data on some 300 million global companies, turned up no evidence of a Spanish firm called FlameTech or Flame Tech or any company anywhere in the world matching its description. Similarly, the AP found no record of FlameTech in Madrid’s official registry or of a Gary Bowman in the city’s telephone listings. An Orbis search for Alonso, the supposed chief executive, also drew a blank. When an AP reporter visited Madrid’s Crystal Tower high-rise, where FlameTech claimed to have 250 sq. meters (2,700 sq. feet) of office space, he could find no trace of the firm and calls to the number listed on its website went unanswered.

    The AP was about to publish a story about the curious company when, on Jan. 9, Scott-Railton received an intriguing message of his own.

    This time the contact came not from Bowman of FlameTech but from someone who identified himself as Michel Lambert, a director at the Paris-based agricultural technology firm CPW-Consulting.

    Lambert had done his homework. In his introductory email , he referred to Scott-Railton’s early doctoral research on kite aerial photography — a mapping technique using kite-mounted cameras — and said he was “quite impressed.

    We have a few projects and clients coming up that could significantly benefit from implementing Kite Aerial Photography,” he said.

    Like FlameTech, CPW-Consulting was a fiction. Searches of Orbis and the French commercial court registry Infogreffe turned up no trace of the supposedly Paris-based company or indeed of any Paris-based company bearing the acronym CPW. And when the AP visited CPW’s alleged office there was no evidence of the company; the address was home to a mainly residential apartment building. Residents and the building’s caretaker said they had never heard of the firm.

    Whoever dreamed up CPW had taken steps to ensure the illusion survived a casual web search, but even those efforts didn’t bear much scrutiny. The company had issued a help wanted ad, for example, seeking a digital mapping specialist for their Paris office, but Scott-Railton discovered that the language had been lifted almost word-for-word from an ad from an unrelated company seeking a mapping specialist in London. A blog post touted CPW as a major player in Africa, but an examination of the author’s profile suggests the article was the only one the blogger had ever written.

    When Lambert suggested an in-person meeting in New York during a Jan. 19 phone call , Scott-Railton felt certain that Lambert was trying to set him up.

    But Scott-Railton agreed to the meeting. He planned to lay a trap of his own.

    Anyone watching Scott-Railton and Lambert laughing over wagyu beef and lobster bisque at the Peninsula Hotel’s upscale restaurant on Thursday afternoon might have mistaken the pair for friends.

    In fact, the lunch was Spy vs. Spy. Scott-Railton had spent the night before trying to secret a homemade camera into his tie, he later told AP, eventually settling for a GoPro action camera and several recording devices hidden about his person. On the table, Lambert had placed a large pen in which Scott-Railton said he spotted a tiny camera lens peeking out from an opening in the top.

    Lambert didn’t seem to be alone. At the beginning of the meal, a man sat behind him, holding up his phone as if to take pictures and then abruptly left the restaurant, having eaten nothing. Later, two or three men materialized at the bar and appeared to be monitoring proceedings.

    Scott-Railton wasn’t alone either. A few tables away, two Associated Press journalists were making small talk as they waited for a signal from Scott-Railton, who had invited the reporters to observe the lunch from nearby and then interview Lambert near the end of the meal.

    The conversation began with a discussion of kites, gossip about African politicians, and a detour through Scott-Railton’s family background. But Lambert, just like Bowman, eventually steered the talk to Citizen Lab and NSO.

    “Work drama? Tell me, I like drama!” Lambert said at one point, according to Scott-Railton’s recording of the conversation. “Is there a big competition between the people inside Citizen Lab?” he asked later.

    Like Bowman, Lambert appeared to be working off cue cards and occasionally made awkward conversational gambits. At one point he repeated a racist French expression, insisting it wasn’t offensive. He also asked Scott-Railton questions about the Holocaust, anti-Semitism and whether he grew up with any Jewish friends. At another point he asked whether there might not be a “racist element” to Citizen Lab’s interest in Israeli spyware.

    After dessert arrived, the AP reporters approached Lambert at his table and asked him why his company didn’t seem to exist.
    He seemed to stiffen.

    “I know what I’m doing,” Lambert said, as he put his files — and his pen — into a bag. Then he stood up, bumped into a chair and walked off, saying “Ciao” and waving his hand, before returning because he had neglected to pay the bill.

    As he paced around the restaurant waiting for the check, Lambert refused to answer questions about who he worked for or why no trace of his firm could be found.

    “I don’t have to give you any explanation,” he said. He eventually retreated to a back room and closed the door.

    Who Lambert and Bowman really are isn’t clear. Neither men returned emails, LinkedIn messages or phone calls. And despite their keen focus on NSO the AP has found no evidence of any link to the Israeli spyware merchant, which is adamant that it wasn’t involved.

    The kind of aggressive investigative tactics used by the mystery men who targeted Citizen Lab have come under fire in the wake of the Harvey Weinstein sexual abuse scandal. Black Cube, an Israeli private investigation firm apologized after The New Yorker and other media outlets revealed that the company’s operatives had used subterfuge and dirty tricks to help the Hollywood mogul suppress allegations of rape and sexual assault.

    Scott-Railton and Abdul Razzak said they didn’t want to speculate about who was involved. But both said they believed they were being steered toward making controversial comments that could be used to blacken Citizen Lab’s reputation.

    “It could be they wanted me to say, ’Yes, I hate Israel,’ or ’Yes, Citizen Lab is against NSO because it’s Israeli,’” said Abdul Razzak.
    Scott-Railton said the elaborate, multinational operation was gratifying, in a way.

    “People were paid to fly to a city to sit you down to an expensive meal and try to convince you to say bad things about your work, your colleagues and your employer,” he said.

    “That means that your work is important.”

  • Acheteurs, attention : cette société israélienne aide les gouvernements à espionner leurs citoyens | Middle East Eye
    http://www.middleeasteye.net/fr/opinions/acheteurs-attention-cette-soci-t-isra-lienne-aide-les-gouvernements-e

    Alors que les #smartphones ont proliféré au cours des dernières années et sont devenus des outils de communication indispensables pour nous tous, les #start-ups spécialisées dans le piratage de ces #téléphones au nom de gouvernements – notamment des services militaires, de renseignement et de police – se sont également multipliées.

    Les clients de ces start-ups se servent des nouvelles %technologies pour surveiller les criminels et les terroristes afin de détecter et de perturber leurs plans. C’est un usage légitime. Mais il y en a d’autres qui sont beaucoup plus lucratifs pour les entreprises – et beaucoup moins convenables pour des sociétés transparentes.

    Prenons l’exemple de l’activiste des droits de l’homme émirati Ahmed Mansour. En août 2016, il a reçu un message de #hameçonnage semblant provenir d’une source légitime. Il s’est toutefois montré méfiant et a immédiatement envoyé son téléphone au #Citizen_Lab de l’université de Toronto pour une analyse légale.

    Il est ressorti de cette analyse que les autorités émiraties avaient acheté #Pegasus, le plus puissant programme malveillant jamais créé et mis sur le marché, à la société israélienne #NSO_Group.

    Si Mansour avait ouvert le lien, ce programme aurait pris le contrôle de son téléphone et donné à la police accès non seulement à tous les éléments de son téléphone (e-mails, contacts et SMS, par exemple), mais aussi à son appareil photo et à ses fonctionnalités vidéo et audio. La police aurait entendu et vu tous ses faits et gestes et aurait pu anticiper toutes ses actions.

    #emirats_arabes_unis #e.a.u. #israel #Israël

  • The Million Dollar Dissident: NSO Group’s iPhone Zero-Days used against a UAE Human Rights Defender
    https://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae

    We recognized the links as belonging to an exploit infrastructure connected to #NSO_Group, an Israel-based “cyber war” company that sells #Pegasus, a government-exclusive “lawful intercept” spyware product. NSO Group is reportedly owned by an American venture capital firm, #Francisco_Partners_Management.

    –-------------
    #flagrant_délit #médias_dominants #mensonge_par_omission #lemonde

    lemonde :

    L’identité et l’activité de la cible, le prix qu’il a fallu dépenser et le fournisseur du logiciel espion ne laissent guère place au doute, selon #Citizen_Labs : le commanditaire est très certainement le gouvernement émirati.

    –--------------

    http://www.forbes.com/sites/thomasbrewster/2016/08/25/everything-we-know-about-nso-group-the-professional-spies-who-hacked-iphones-with-a-single-text/#760cd8c1e3d6

    Everything We Know About NSO Group: The Professional Spies Who Hacked iPhones With A Single Text

    #espionnage #apple #droits_de_l'humain #Ahmed_Mansoor #lanceur_d'alerte

    • June 20, 2016
      Francisco Partners et Elliott Management acquièrent Dell Software Group
      https://software.dell.com/fr-fr/acquisitions/dsg.aspx

      “La vraie passion pour la technologie et la solide expérience de Francisco Partners et Elliott Management à développer des entreprises de logiciel permettra aux employés de Dell Software de continuer à promouvoir l’innovation,” a déclaré Tom Sweet, vice-président senior et directeur financier, Dell. “Nous nous réjouissons de continuer à travailler en étroite collaboration avec les équipes de Francisco Partners et Elliott Management pour améliorer encore les relations déjà grandes que Dell Software a avec ses clients et partenaires.”

      La gamme complète de solutions logicielles de Dell Software couvrent un certain nombre de domaines essentiels pour l’entreprise moderne comprenant des systèmes d’analyse avancée, la gestion de base de données, la protection des données, la gestion des postes clients, la gestion des identités et des accès, la gestion des plateformes Microsoft, la sécurité des réseaux et le suivi de performance. Grâce aux solutions de Dell Software, les organisations de toutes tailles peuvent mieux sécuriser, gérer, surveiller, protéger et analyser les informations et les infrastructures afin d’accélérer l’innovation et leur modernisation.

    • WP :
      #Francisco_Partners
      Industry Private Equity
      Founded 1999
      Founders David Stanton, Dipanjan Deb, Benjamin Ball, Neil Garfinkel, Sanford R. “Sandy” Robertson

      –-----
      http://news.stanford.edu/pr/2015/pr-new-alumni-trustees-071415.html
      Newly elected members of the #Stanford_University Board of Trustees are, clockwise from upper left, Mary Barra, #Dipanjan_DJ_Deb, Christy MacLear and Bradley A. Geier. (Courtesy Board of Trustees)

  • When #Hacking_Team thought #The_Intercept published « conjectures »
    https://reflets.info/when-hacking-team-thought-the-intercept-published-conjectures

    Time is on our side… It is always interesting to look at what the marketing bullshit generator has generated in the past when a leak appears. On Oct. 30 of 2014, The Intercept published a story about Hacking Team. Hacking Team was not very happy and as always, would generate the same kind of marketing […]

    #Bienvenue_chez_Hacking_Team #Citizen_Lab

  • #Ethiopie/Hacking Team : et que croyez-vous qu’il arriva ?
    https://reflets.info/ethiopiehacking-team-et-que-croyez-vous-quil-arriva

    Vous nous direz, à la suite de la lecture de notre précédent article, que peut-être, bénéfice du doute oblige, #Hacking_Team a décidé de rompre sa relation avec l’Éthiopie… Au risque de perdre de l’argent. Oui, mais non. Voici ce qui s’est passé. Une nouvelle proposition a été faite à ce pays. Une sorte de […]

    #Bienvenue_chez_Hacking_Team #Citizen_Lab #David_Vincenzetti #Eric_Rabe #INSA #Philippe_Vinci