company:nso group

  • Pegasus, ce logiciel israélien dont les gouvernements sont friands pour espionner leurs opposants
    https://www.bastamag.net/Khashoggi-Mansoor-Whatsapp-espionnage-spyware-Pegasus-droits-humains-oppos

    Elle est accusée d’être mêlée à l’affaire Khashoggi, d’être responsable du hackage de Whatsapp révélé il y a peu, l’un de ses logiciels espions est utilisé pour surveiller des défenseurs des droits humains un peu partout dans le monde… Amnesty International la qualifie d’« entreprise incontournable pour les violeurs des droits humains ». La société israélienne NSO Group est la cible d’actions en #Justice pour avoir fabriqué et vendu un spyware à des gouvernements qui l’utilisent pour surveiller dissidents et (...)

    #Décrypter

    / A la une, #Proche_et_Moyen_Orient, Surveillance, fichage, censure : la démocratie en danger ?, Justice, #Atteintes_aux_libertés, Surveillance et (...)

    #Surveillance,fichage,_censure:la_démocratie_en_danger ? #Surveillance_et_biométrie

  • UK rights advocate co-owns firm whose spyware is ’used to target dissidents’
    https://www.theguardian.com/law/2019/jun/14/yana-peel-uk-rights-advocate-serpentine-nso-spyware-pegasus

    A leading human rights campaigner and head of a prestigious London art gallery is the co-owner of an Israeli cyberweapons company whose software has allegedly been used by authoritarian regimes to spy on dissidents, the Guardian can reveal.

    Yana Peel, the chief executive of the Serpentine Galleries and a self-proclaimed champion of free speech, co-owns NSO Group, a $1bn (£790m) Israeli tech firm, according to corporate records in the US and Luxembourg.

    NSO is the subject of multiple ongoing lawsuits and has been criticised by human rights groups, including Amnesty International, which has asked Israel’s ministry of defence to revoke the company’s export licences.

    However, Peel, who has declared the Serpentine a “safe space for unsafe ideas” and served as a judge for international freedom-of-expression awards, defended her stake in NSO, which she has held since February. She described criticism of the company as “misinformed”.

    #surveillance

  • The Dark Side of Israel’s Cold Peace With Saudi Arabia
    https://www.bloomberg.com/opinion/articles/2019-06-03/israel-s-cold-peace-with-saudi-arabia-has-a-dark-side

    The Saudis’ phone hacking is enabled by a privately owned Israeli company called the NSO Group Ltd. Its cyberweapon suite, Pegasus, has come under deserved scrutiny in the last year because governments have misused the weapon to hack the phones of journalists and human-rights activists. Last year, two groups of victims sued the company in Israel and Cyprus for providing phone surveillance to the Mexican and Emirati governments, which then used it against political targets.

    Pegasus and similar hacking programs are now able to break into a phone without requiring the user to even click a link. In some cases, a bogus WhatsApp call is enough to infect the phone and make it a powerful tracking device. That makes it particularly suited to monitor Arab dissidents like Al-Baghdadi, who rely on the encrypted messaging service to make contact with networks of activists across the Middle East.

  • Israël. Amnesty International engage une action judiciaire pour mettre fin au système de surveillance créé par NSO Group | Amnesty International
    https://www.amnesty.org/fr/latest/news/2019/05/israel-amnesty-legal-action-stop-nso-group-web-of-surveillance

    Israël. Amnesty International engage une action judiciaire pour mettre fin au système de surveillance créé par NSO Group
    13 mai 2019, 00:01 UTC

    Amnesty International soutient une action judiciaire visant à faire comparaître devant la justice le ministère de la Défense israélien pour lui demander d’annuler l’autorisation d’exportation accordée à NSO Group, une entreprise israélienne qui vend des logiciels ayant été utilisés pour commettre des attaques contre des défenseur·e·s des droits humains dans le monde entier.

    NSO Group vend ses produits à des gouvernements qui commettent de façon notoire de révoltantes violations des droits humains, leur octroyant ainsi des outils qui leur permettent de pister des militants et des détracteurs.

    Dans le recours qui sera déposé demain devant le tribunal de district de Tel-Aviv, une cinquantaine de membres et de sympathisant-e-s d’Amnesty International Israël ainsi que d’autres représentant·e·s de la communauté de défense des droits humains expliquent que le ministère de la Défense a mis les droits humains en danger en autorisant NSO à continuer d’exporter ses produits. En août 2018, un membre du personnel d’Amnesty a fait l’objet d’une attaque menée au moyen d’un logiciel de surveillance de NSO Group particulièrement invasif appelé Pegasus, qui a également été utilisé contre des militants et des journalistes en Arabie saoudite, au Mexique et aux Émirats arabes unis.

    #amnesty #israël

  • WhatsApp voice calls used to inject Israeli spyware on phones | Financial Times
    https://www.ft.com/content/4da1117e-756c-11e9-be7d-6d846537acab
    https://www.ft.com/__origami/service/image/v2/images/raw/http%3A%2F%2Fprod-upp-image-read.ft.com%2Fa5e1805e-75a7-11e9-be7d-6d846537acab?s

    A vulnerability in the messaging app WhatsApp has allowed attackers to inject commercial Israeli spyware on to phones, the company and a spyware technology dealer said.

    WhatsApp, which is used by 1.5bn people worldwide, discovered in early May that attackers were able to install surveillance software on to both iPhones and Android phones by ringing up targets using the app’s phone call function.

    The malicious code, developed by the secretive Israeli company NSO Group, could be transmitted even if users did not answer their phones, and the calls often disappeared from call logs, said the spyware dealer, who was recently briefed on the WhatsApp hack.

    WhatsApp is too early into its own investigations of the vulnerability to estimate how many phones were targeted using this method, a person familiar with the issue said.

    #israël #piraterie

    • repris par Le Monde sans #paywall

      Une faille de sécurité de WhatsApp utilisée pour installer un logiciel espion israélien
      https://www.lemonde.fr/pixels/article/2019/05/14/une-faille-de-securite-de-whatsapp-utilisee-pour-installer-un-logiciel-espio

      WhatsApp a annoncé avoir corrigé la faille, et plusieurs ONG veulent porter plainte contre l’éditeur du logiciel, NSO group.

      Une importante faille de sécurité touchant la fonction « appel téléphonique » de WhatsApp a été corrigée lundi 13 mai, a annoncé l’entreprise, propriété de Facebook. La faille pouvait permettre d’installer, à l’insu de l’utilisateur, un logiciel espion sur son téléphone, si l’utilisateur ne décrochait pas lorsqu’il recevait l’appel « infecté ».

      Difficile à détecter, la faille de sécurité en question ne pouvait être trouvée que par des équipes de haut niveau.

      Selon le Financial Times, cette faille a été exploitée pour installer les logiciels espions Pegasus de l’entreprise israélienne NSO Group, qui fournit ses logiciels aux forces de sécurité de nombreux pays dans le monde, y compris à des régimes peu ou pas démocratiques. Selon l’ONG antisurveillance Citizen Lab, un avocat militant pour la défense des droits de l’homme a été visé dimanche 12 mai par Pegasus. Le programme permet notamment de collecter la géolocalisation de sa cible, de lire ses messages et e-mails, et de déclencher à son insu le micro et la caméra de son téléphone.

      « Le groupe NSO vend ses produits à des gouvernements connus pour leurs violations répétées des droits de l’homme, et leur fournit les outils pour espionner leurs opposants et critiques », écrit l’ONG Amnesty International dans un communiqué publié ce 13 mai. « En août 2018, un employé d’Amnesty International a été ciblé par Pegasus, comme l’ont été des militants et des journalistes en Arabie saoudite, au Mexique et aux Emirats arabes unis. »

      L’ONG a annoncé qu’elle allait déposer une plainte contre le ministère de la défense israélien, autorité de tutelle de NSO Group, « qui a ignoré les monceaux de preuves liant NSO Group à des attaques contre des défenseurs des droits de l’homme. […] Tant que des produits comme Pegasus sont vendus sans contrôle effectif, les droits et la sécurité des salariés d’Amnesty International, des journalistes et des dissidents dans le monde entier sont en danger ». Plusieurs associations israéliennes ont déposé des plaintes similaires.

      Sans citer le nom de NSO Group, WhatsApp a confirmé que la faille avait été exploitée par « une entreprise privée dont il est connu qu’elle travaille avec ces gouvernements pour installer des logiciels espions sur des téléphones mobiles ». « Nous avons briefé un certain nombre d’organisations de défense des droits de l’homme à ce sujet », a déclaré WhatsApp.

      Les utilisateurs de WhatsApp – 1,5 milliard de personnes dans le monde, selon l’entreprise – sont incités à mettre à jour leur application si elle ne s’est pas faite automatiquement.

    • Israeli Firm Tied to Tool That Uses WhatsApp Flaw to Spy on Activists
      https://www.nytimes.com/2019/05/13/technology/nso-group-whatsapp-spying.html

      SAN FRANCISCO — An Israeli firm accused of supplying tools for spying on human-rights activists and journalists now faces claims that its technology can use a security hole in WhatsApp, the messaging app used by 1.5 billion people, to break into the digital communications of iPhone and Android phone users.

      Security researchers said they had found so-called spyware — designed to take advantage of the WhatsApp flaw — that bears the characteristics of technology from the company, the NSO Group.

  • Interview with CEO of NSO Group – Israeli spyware-maker – on fighting terror, Khashoggi murder, and Saudi Arabia - 60 Minutes - CBS News
    https://www.cbsnews.com/news/interview-with-ceo-of-nso-group-israeli-spyware-maker-on-fighting-terror-kh

    Tonight we’ll take you inside the growing, shadowy global market of cyber espionage. We looked specifically at a controversial Israeli company called the NSO Group, valued at nearly a billion dollars, that says it developed a hacking tool that can break into just about any smartphone on Earth.

    NSO licenses this software, called Pegasus, to intelligence and law enforcement agencies worldwide, so they can infiltrate the encrypted phones and apps of criminals and terrorists. Problem is this same tool can also be deployed by a government to crush dissent. And so it is that Pegasus has been linked to human rights abuses, unethical surveillance, and even to the notoriously brutal murder of the Saudi Arabian critic Jamal Khashoggi.

    Headquartered in the Israeli city of Herzliya, NSO Group operates in strict secrecy. But co-founder and CEO, Shalev Hulio, has been forced out of the shadows and not into a good light, accused of selling Pegasus to Saudi Arabia despite its abysmal record on human rights.

    Lesley Stahl: And the word is that you sold Pegasus to them, and then they turned it around to get Khashoggi.

    Shalev Hulio: Khashoggi murder is horrible. Really horrible. And therefore, when I first heard there are accusations that our technology been used on Jamal Khashoggi or on his relatives, I started an immediate check about it. And I can tell you very clear, we had nothing to do with this horrible murder.

    #NSO organise sa défense dans l’affaire #kashoggi ?

  • Undercover agents target cybersecurity watchdog who detailed Israeli firm NSO’s link to #Khashoggi scandal
    Haaretz.Com
    https://www.haaretz.com/misc/article-print-page/.premium-undercover-agents-target-watchdog-who-detailed-israeli-firm-nso-s-

    Operatives with fake identities are pursuing members of #Citizen_Lab, the group that uncovered the connection between Jamal Khashoggi’s murder and Israel’s surveillance company #NSO
    The Associated Press | Jan. 26, 2019 | 4:19 PM

    The researchers who reported that Israeli software was used to spy on Washington Post journalist Jamal Khashoggi’s inner circle before his gruesome death are being targeted in turn by international undercover operatives, The Associated Press has found.

    Twice in the past two months, men masquerading as socially conscious investors have lured members of the Citizen Lab internet watchdog group to meetings at luxury hotels to quiz them for hours about their work exposing Israeli surveillance and the details of their personal lives. In both cases, the researchers believe they were secretly recorded.

    Citizen Lab Director Ron Deibert described the stunts as “a new low.”

    “We condemn these sinister, underhanded activities in the strongest possible terms,” he said in a statement Friday. “Such a deceitful attack on an academic group like the Citizen Lab is an attack on academic freedom everywhere.”

    Who these operatives are working for remains a riddle, but their tactics recall those of private investigators who assume elaborate false identities to gather intelligence or compromising material on critics of powerful figures in government or business.

    Citizen Lab, based out of the Munk School of Global Affairs at the University of Toronto, has for years played a leading role in exposing state-backed hackers operating in places as far afield as Tibet , Ethiopia and Syria . Lately the group has drawn attention for its repeated exposés of an Israeli surveillance software vendor called the NSO Group, a firm whose wares have been used by governments to target journalists in Mexico , opposition figures in Panama and human rights activists in the Middle East .

    In October, Citizen Lab reported that an iPhone belonging to one of Khashoggi’s confidantes had been infected by the NSO’s signature spy software only months before Khashoggi’s grisly murder. The friend, Saudi dissident Omar Abdulaziz, would later claim that the hacking had exposed Khashoggi’s private criticisms of the Saudi royal family to the Arab kingdom’s spies and thus “played a major role” in his death.

    In a statement, NSO denied having anything to do with the undercover operations targeting Citizen Lab, “either directly or indirectly” and said it had neither hired nor asked anyone to hire private investigators to pursue the Canadian organization. “Any suggestion to the contrary is factually incorrect and nothing more than baseless speculation,” NSO said.

    NSO has long denied that its software was used to target Khashoggi, although it has refused to comment when asked whether it has sold its software to the Saudi government more generally.

    The first message reached Bahr Abdul Razzak, a Syrian refugee who works as a Citizen Lab researcher, Dec. 6, when a man calling himself Gary Bowman got in touch via LinkedIn. The man described himself as a South African financial technology executive based in Madrid.

    “I came across your profile and think that the work you’ve done helping Syrian refugees and your extensive technical background could be a great fit for our new initiative,” Bowman wrote.

    Abdul Razzak said he thought the proposal was a bit odd, but he eventually agreed to meet the man at Toronto’s swanky Shangri-La Hotel on the morning of Dec. 18.

    The conversation got weird very quickly, Abdul Razzak said.

    Instead of talking about refugees, Abdul Razzak said, Bowman grilled him about his work for Citizen Lab and its investigations into the use of NSO’s software. Abdul Razzak said Bowman appeared to be reading off cue cards, asking him if he was earning enough money and throwing out pointed questions about Israel, the war in Syria and Abdul Razzak’s religiosity.

    “Do you pray?” Abdul Razzak recalled Bowman asking. “Why do you write only about NSO?” ’’Do you write about it because it’s an Israeli company?" ’’Do you hate #Israel?"

    Abdul Razzak said he emerged from the meeting feeling shaken. He alerted his Citizen Lab colleagues, who quickly determined that the breakfast get-together had been a ruse. Bowman’s supposed Madrid-based company, FlameTech, had no web presence beyond a LinkedIn page, a handful of social media profiles and an entry in the business information platform Crunchbase. A reverse image search revealed that the profile picture of the man listed as FlameTech’s chief executive, Mauricio Alonso, was a stock photograph.

    “My immediate gut feeling was: ’This is a fake,’” said John Scott-Railton, one of Abdul Razzak’s colleagues.

    Scott-Railton flagged the incident to the AP, which confirmed that FlameTech was a digital facade.

    Searches of the Orbis database of corporate records, which has data on some 300 million global companies, turned up no evidence of a Spanish firm called FlameTech or Flame Tech or any company anywhere in the world matching its description. Similarly, the AP found no record of FlameTech in Madrid’s official registry or of a Gary Bowman in the city’s telephone listings. An Orbis search for Alonso, the supposed chief executive, also drew a blank. When an AP reporter visited Madrid’s Crystal Tower high-rise, where FlameTech claimed to have 250 sq. meters (2,700 sq. feet) of office space, he could find no trace of the firm and calls to the number listed on its website went unanswered.

    The AP was about to publish a story about the curious company when, on Jan. 9, Scott-Railton received an intriguing message of his own.

    This time the contact came not from Bowman of FlameTech but from someone who identified himself as Michel Lambert, a director at the Paris-based agricultural technology firm CPW-Consulting.

    Lambert had done his homework. In his introductory email , he referred to Scott-Railton’s early doctoral research on kite aerial photography — a mapping technique using kite-mounted cameras — and said he was “quite impressed.

    We have a few projects and clients coming up that could significantly benefit from implementing Kite Aerial Photography,” he said.

    Like FlameTech, CPW-Consulting was a fiction. Searches of Orbis and the French commercial court registry Infogreffe turned up no trace of the supposedly Paris-based company or indeed of any Paris-based company bearing the acronym CPW. And when the AP visited CPW’s alleged office there was no evidence of the company; the address was home to a mainly residential apartment building. Residents and the building’s caretaker said they had never heard of the firm.

    Whoever dreamed up CPW had taken steps to ensure the illusion survived a casual web search, but even those efforts didn’t bear much scrutiny. The company had issued a help wanted ad, for example, seeking a digital mapping specialist for their Paris office, but Scott-Railton discovered that the language had been lifted almost word-for-word from an ad from an unrelated company seeking a mapping specialist in London. A blog post touted CPW as a major player in Africa, but an examination of the author’s profile suggests the article was the only one the blogger had ever written.

    When Lambert suggested an in-person meeting in New York during a Jan. 19 phone call , Scott-Railton felt certain that Lambert was trying to set him up.

    But Scott-Railton agreed to the meeting. He planned to lay a trap of his own.

    Anyone watching Scott-Railton and Lambert laughing over wagyu beef and lobster bisque at the Peninsula Hotel’s upscale restaurant on Thursday afternoon might have mistaken the pair for friends.

    In fact, the lunch was Spy vs. Spy. Scott-Railton had spent the night before trying to secret a homemade camera into his tie, he later told AP, eventually settling for a GoPro action camera and several recording devices hidden about his person. On the table, Lambert had placed a large pen in which Scott-Railton said he spotted a tiny camera lens peeking out from an opening in the top.

    Lambert didn’t seem to be alone. At the beginning of the meal, a man sat behind him, holding up his phone as if to take pictures and then abruptly left the restaurant, having eaten nothing. Later, two or three men materialized at the bar and appeared to be monitoring proceedings.

    Scott-Railton wasn’t alone either. A few tables away, two Associated Press journalists were making small talk as they waited for a signal from Scott-Railton, who had invited the reporters to observe the lunch from nearby and then interview Lambert near the end of the meal.

    The conversation began with a discussion of kites, gossip about African politicians, and a detour through Scott-Railton’s family background. But Lambert, just like Bowman, eventually steered the talk to Citizen Lab and NSO.

    “Work drama? Tell me, I like drama!” Lambert said at one point, according to Scott-Railton’s recording of the conversation. “Is there a big competition between the people inside Citizen Lab?” he asked later.

    Like Bowman, Lambert appeared to be working off cue cards and occasionally made awkward conversational gambits. At one point he repeated a racist French expression, insisting it wasn’t offensive. He also asked Scott-Railton questions about the Holocaust, anti-Semitism and whether he grew up with any Jewish friends. At another point he asked whether there might not be a “racist element” to Citizen Lab’s interest in Israeli spyware.

    After dessert arrived, the AP reporters approached Lambert at his table and asked him why his company didn’t seem to exist.
    He seemed to stiffen.

    “I know what I’m doing,” Lambert said, as he put his files — and his pen — into a bag. Then he stood up, bumped into a chair and walked off, saying “Ciao” and waving his hand, before returning because he had neglected to pay the bill.

    As he paced around the restaurant waiting for the check, Lambert refused to answer questions about who he worked for or why no trace of his firm could be found.

    “I don’t have to give you any explanation,” he said. He eventually retreated to a back room and closed the door.

    Who Lambert and Bowman really are isn’t clear. Neither men returned emails, LinkedIn messages or phone calls. And despite their keen focus on NSO the AP has found no evidence of any link to the Israeli spyware merchant, which is adamant that it wasn’t involved.

    The kind of aggressive investigative tactics used by the mystery men who targeted Citizen Lab have come under fire in the wake of the Harvey Weinstein sexual abuse scandal. Black Cube, an Israeli private investigation firm apologized after The New Yorker and other media outlets revealed that the company’s operatives had used subterfuge and dirty tricks to help the Hollywood mogul suppress allegations of rape and sexual assault.

    Scott-Railton and Abdul Razzak said they didn’t want to speculate about who was involved. But both said they believed they were being steered toward making controversial comments that could be used to blacken Citizen Lab’s reputation.

    “It could be they wanted me to say, ’Yes, I hate Israel,’ or ’Yes, Citizen Lab is against NSO because it’s Israeli,’” said Abdul Razzak.
    Scott-Railton said the elaborate, multinational operation was gratifying, in a way.

    “People were paid to fly to a city to sit you down to an expensive meal and try to convince you to say bad things about your work, your colleagues and your employer,” he said.

    “That means that your work is important.”

  • Israeli cyber firm negotiated advanced attack capabilities sale with Saudis, Haaretz reveals

    Just months before crown prince launched a purge against his opponents, NSO offered Saudi intelligence officials a system to hack into cellular phones ■ NSO: We abide the law, our products are used to combat crime and terrorism

    Amos Harel, Chaim Levinson and Yaniv Kubovich Nov 25, 2018

    https://www.haaretz.com/israel-news/.premium-israeli-company-negotiated-to-sell-advanced-cybertech-to-the-saudi

    The Israeli company NSO Group Technologies offered Saudi Arabia a system that hacks cellphones, a few months before Crown Prince Mohammed bin Salman began his purge of regime opponents, according to a complaint to the Israel Police now under investigation.
    But NSO, whose development headquarters is in Herzliya, says that it has acted according to the law and its products are used in the fight against crime and terror.
    Either way, a Haaretz investigation based on testimony and photos, as well as travel and legal documents, reveals the Saudis’ behind-the-scenes attempts to buy Israeli technology.
    In June 2017, a diverse group gathered in a hotel room in Vienna, a city between East and West that for decades has been a center for espionage, defense-procurement contacts and unofficial diplomatic meetings.
    skip -

    Subscribe Now for Just $1
    Truly understand Israel and the Middle East, from the most trustworthy news source in the region >>

    Arriving at the hotel were Abdullah al-Malihi, a close associate of Prince Turki al-Faisal – a former head of Saudi Arabia’s intelligence services – and another senior Saudi official, Nasser al-Qahtani, who presented himself as the deputy of the current intelligence chief. Their interlocutors were two Israeli businessmen, representatives of NSO, who presented to the Saudis highly advanced technology.

    >> Israel’s cyber-spy industry helps world dictators hunt dissidents and gays | Revealed
    In 2017, NSO was avidly promoting its new technology, its Pegasus 3 software, an espionage tool so sophisticated that it does not depend on the victim clicking on a link before the phone is breached.
    During the June 2017 meeting, NSO officials showed a PowerPoint presentation of the system’s capabilities. To demonstrate it, they asked Qahtani to go to a nearby mall, buy an iPhone and give them its number. During that meeting they showed how this was enough to hack into the new phone and record and photograph the participants in the meeting.
    The meeting in Vienna wasn’t the first one between the two sides. Prime Minister Benjamin Netanyahu has recently expressed pride in the tightening ties with Gulf states, with Israel’s strength its technology. The message is clear: Israel is willing to sell these countries security-related technologies, and they forge closer ties with Israel in the strategic battle against Iran.

  • Jamal Khashoggi’s private WhatsApp messages may offer new clues to killing - CNN
    https://www.cnn.com/2018/12/02/middleeast/jamal-khashoggi-whatsapp-messages-intl/index.html

    Le téléphone de #khashoggi espionné grâce à un logiciel israélien.

    Abdulaziz first spoke publicly about his contact with Khashoggi last month after researchers at the University of Toronto’s Citizen Lab reported his phone had been hacked by military-grade spyware.

    According to Bill Marczak, a research fellow at the Citizen Lab, the software was the invention of an Israeli firm named NSO Group, and deployed at the behest of the Saudi Arabian government.
    Marczak said at least two other Saudi dissidents have been targeted with NSO tools: an activist named Yahya Assiri and a staff member who had been involved in Amnesty International’s work on Saudi Arabia.
    Danna Ingleton, an Amnesty deputy program director, said its technology experts studied the staff member’s phone and confirmed it was targeted with the spyware. Amnesty is currently exploring potential recourse against NSO Group and last week wrote a letter to the Israeli Ministry of Defense requesting it revoke NSO’s export license, Ingleton said.
    On Sunday, Abdulaziz’s lawyers filed a lawsuit in Tel Aviv, alleging NSO broke international laws by selling its software to oppressive regimes, knowing it could be used to infringe human rights. “NSO should be held accountable in order to protect the lives of political dissidents, journalists and human rights activists,” said the Jerusalem-based lawyer Alaa Mahajna, who is acting for Abdulaziz.
    The lawsuit follows another filed in Israel and Cyprus by citizens in Mexico and Qatar.

    *#mbs #israël

  • Israeli cyber firm negotiated advanced attack capabilities sale with Saudis, Haaretz reveals

    Just months before crown prince launched a purge against his opponents, NSO offered Saudi intelligence officials a system to hack into cellular phones ■ NSO: We abide the law, our products are used to combat crime and terrorism

    https://www.haaretz.com/israel-news/.premium-israeli-company-negotiated-to-sell-advanced-cybertech-to-the-saudi

    The Israeli company NSO Group Technologies offered Saudi Arabia a system that hacks cellphones, a few months before Crown Prince Mohammed bin Salman began his purge of regime opponents, according to a complaint to the Israel Police now under investigation.
    But NSO, whose development headquarters is in Herzliya, says that it has acted according to the law and its products are used in the fight against crime and terror.
    To really understand Israel and the Middle East - subscribe to Haaretz
    Either way, a Haaretz investigation based on testimony and photos, as well as travel and legal documents, reveals the Saudis’ behind-the-scenes attempts to buy Israeli technology.
    In June 2017, a diverse group gathered in a hotel room in Vienna, a city between East and West that for decades has been a center for espionage, defense-procurement contacts and unofficial diplomatic meetings.
    Keep updated: Sign up to our newsletter
    Email* Sign up

    Arriving at the hotel were Abdullah al-Malihi, a close associate of Prince Turki al-Faisal – a former head of Saudi Arabia’s intelligence services – and another senior Saudi official, Nasser al-Qahtani, who presented himself as the deputy of the current intelligence chief. Their interlocutors were two Israeli businessmen, representatives of NSO, who presented to the Saudis highly advanced technology.

    >> Israel’s cyber-spy industry helps world dictators hunt dissidents and gays | Revealed
    In 2017, NSO was avidly promoting its new technology, its Pegasus 3 software, an espionage tool so sophisticated that it does not depend on the victim clicking on a link before the phone is breached.
    During the June 2017 meeting, NSO officials showed a PowerPoint presentation of the system’s capabilities. To demonstrate it, they asked Qahtani to go to a nearby mall, buy an iPhone and give them its number. During that meeting they showed how this was enough to hack into the new phone and record and photograph the participants in the meeting.
    The meeting in Vienna wasn’t the first one between the two sides. Prime Minister Benjamin Netanyahu has recently expressed pride in the tightening ties with Gulf states, with Israel’s strength its technology. The message is clear: Israel is willing to sell these countries security-related technologies, and they forge closer ties with Israel in the strategic battle against Iran.
    >> $6 billion of Iranian money: Why Israeli firm Black Cube really went after Obama’s team
    According to the complaint, the affair began with a phone call received by a man identified as a European businessman with connections in the Gulf states. On the line was W., an Israeli dealing in defense-related technologies and who operates through Cyprus-based companies. (Many defense-related companies do business in Cyprus because of its favorable tax laws.) W. asked his European interlocutor to help him do business in the Gulf.

    FILE Photo: Two of the founders of NSO, Shalev Julio and Omri Lavi.
    Among the European businessman’s acquaintances were the two senior Saudi officials, Malihi and Qahtani.
    On February 1, 2017, W. and the businessman met for the first time. The main topic was the marketing of cyberattack software. Unlike ordinary weapons systems, the price depends only on a customer’s eagerness to buy the system.
    The following month, the European businessman traveled to a weapons exhibition in the United Arab Emirates, where a friend introduced him to Malihi, the Saudi businessman.
    In April 2017, a meeting was arranged in Vienna between Malihi, Qahtani and representatives of Israeli companies. Two more meetings subsequently took place with officials of Israeli companies in which other Israelis were present. These meetings took place at the Four Seasons Hotel in Limassol, Cyprus, where Israeli cybercompanies often meet with foreign clients.
    >> Snowden: Israeli firm’s spyware was used to track Khashoggi
    The meetings were attended by W. and his son. They were apparently friendly: In photographs documenting one of them, W. and Qahtani are shown after a hunting trip, with the Saudi aiming a rifle at a dead animal.
    In the Vienna meeting of April 2017, the Saudis presented a list of 23 systems they sought to acquire. Their main interest was cybersystems. For a few dozens of millions of dollars, they would be able to hack into the phones of regime opponents in Saudi Arabia and around the world and collect classified information about them.
    According to the European businessman, the Saudis, already at the first meeting, passed along to the representatives of one of the companies details of a Twitter account of a person who had tweeted against the regime. They wanted to know who was behind the account, but the Israeli company refused to say.

    Offices of Israeli NSO Group company in Herzliya, Israel, Aug. 25, 2016Daniella Cheslow/AP
    In the June 2017 meeting, the Saudis expressed interest in NSO’s technology.
    According to the European businessman, in July 2017 another meeting was held between the parties, the first at W.’s home in Cyprus. W. proposed selling Pegasus 3 software to the Saudis for $208 million.
    Malihi subsequently contacted W. and invited him to Riyadh to present the software to members of the royal family. The department that oversees defense exports in Israel’s Defense Ministry and the ministry’s department for defense assistance, responsible for encouraging exports, refused to approve W.’s trip.
    Using the initials for the defense assistance department, W. reportedly said “screw the D.A.” and chartered a small plane, taking with him NSO’s founder, Shalev Hulio, to the meetings in the Gulf. According to the European businessman, the pair were there for three days, beginning on July 18, 2017.
    At these meetings, the European businessman said, an agreement was made to sell the Pegasus 3 to the Saudis for $55 million.
    According to the European businessman, the details of the deal became known to him only through his contacts in the defense assistance department. He said he had agreed orally with W. that his commission in the deal would be 5 percent – $2.75 million.
    But W. and his son stopped answering the European businessman’s phone calls. Later, the businessman told the police, he received an email from W.’s lawyer that contained a fake contract in which the company would agree to pay only his expenses and to consider whether to pay him a bonus if the deal went through.
    The European businessman, assisted by an Israeli lawyer, filed a complaint in April 2018. He was questioned by the police’s national fraud squad and was told that the affair had been transferred to another unit specializing in such matters. Since then he has been contacted by the income tax authorities, who are apparently checking whether there has been any unreported income from the deal.
    The European businessman’s claims seem to be substantiated by correspondence Haaretz has obtained between Cem Koksal, a Turkish businessman living in the UAE, and W.’s lawyers in Israel. The European businessman said in his complaint that Koksal was involved in mediating the deal.
    In a letter sent by Koksal’s lawyer in February of this year, he demanded his portion from W. In a response letter, sent in early March, W.’s attorney denied the existence of the deal. The deal had not been signed, the letter claimed, due to Koksal’s negligence, therefore he was due no commission or compensation of any kind.
    These issues have a wider context. From the claims by the European businessman and Koksal’s letter, it emerges that the deal was signed in the summer of 2017, a few months before Crown Prince Mohammed began his purge of regime opponents. During that purge, the Saudi regime arrested and tortured members of the royal family and Saudi businessmen accused of corruption. The Saudis also held Lebanese Prime Minister Saad al-Hariri for a few days in a Riyadh hotel.
    In the following months the Saudis continued their hunt for regime opponents living abroad, which raised international attention only when the murder of journalist Jamal Khashoggi in the Saudi Consulate in Istanbul came to light in October.
    It has recently been claimed that NSO helped the Saudi regime surveil its opponents. According to an article in Forbes magazine and reports from the Canadian cyber-related think tank Citizen Lab, among the surveillance targets were the satirist Ghanem Almasrir and human rights activist Yahya Asiri, who live in London, and Omar Abdulaziz, who lives in exile in Canada.
    These three men were in contact with Khashoggi. Last month, Edward Snowden, who uncovered the classified surveillance program of the U.S. National Security Agency, claimed that Pegasus had been used by the Saudi authorities to surveil Khashoggi.
    “They are the worst of the worst,” Snowden said of NSO, whose people he accused of aiding and abetting human rights violations.
    NSO’s founders and chief executives are Omri Lavie and Shalev Hulio. The company is registered in Cyprus but its development headquarters is in Herzliya. In 2014 the company was sold to private equity firm Francisco Partners based on a valuation of $250 million.
    Francisco Partners did not respond to Haaretz’s request for comment.
    In May, Verint Systems offered to buy NSO for $1 billion, but the offer was rejected. The company is awash in cash. Earlier this month all its employees went on vacation in Phuket, Thailand. Netta Barzilai, Lior Suchard, the Ma Kashur Trio and the band Infected Mushroom were also flown there to entertain them.
    The Pegasus system developed by NSO was a “one-click system,” meaning that the victim had to press on a link sent to him through phishing. The new system no longer requires this. Only the number of the SIM card is needed to hack into the phone. It’s unknown how Pegasus does this.
    Technology sources believe that the technology either exploits breaches in the cellphone’s modem, the part that receives messages from the antenna, or security breaches in the apps installed on a phone. As soon as a phone is hacked, the speaker and camera can be used for recording conversations. Even encoded apps such as WhatsApp can be monitored.
    NSO’s operations are extremely profitable.
    The company, which conceals its client list, has been linked to countries that violate human rights. NSO says its products are used in the fight against crime and terror, but in certain countries the authorities identify anti-regime activists and journalists as terrorists and subject them to surveillance.
    In 2012, NSO sold an earlier version of Pegasus to Mexico to help it combat the drug cartel in that country. According to the company, all its contracts include a clause specifically permitting the use of its software only to “investigate and prevent crime or acts of terror.” But The New York Times reported in 2016 that the Mexican authorities also surveilled journalists and lawyers.
    Following that report, Mexican victims of the surveillance filed a lawsuit in Israel against NSO last September. This year, The New York Times reported that the software had been sold to the UAE, where it helped the authorities track leaders of neighboring countries as well as a London newspaper editor.
    In response to these reports, NSO said it “operated and operates solely in compliance with defense export laws and under the guidelines and close oversight of all elements of the defense establishment, including all matters relating to export policies and licenses.
    “The information presented by Haaretz about the company and its products and their use is wrong, based on partial rumors and gossip. The presentation distorts reality.
    “The company has an independent, external ethics committee such as no other company like it has. It includes experts in legal affairs and international relations. The committee examines every deal so that the use of the system will take place only according to permitted objectives of investigating and preventing terror and crime.
    “The company’s products assist law enforcement agencies in protecting people around the world from terror attacks, drug cartels, child kidnappers for ransom, pedophiles, and other criminals and terrorists.
    “In contrast to newspaper reports, the company does not sell its products or allow their use in many countries. Moreover, the company greatly limits the extent to which its customers use its products and is not involved in the operation of the systems by customers.”
    A statement on W.’s behalf said: “This is a false and completely baseless complaint, leverage for an act of extortion by the complainants, knowing that there is no basis for their claims and that if they would turn to the relevant courts they would be immediately rejected.”

  • Saudis used Israeli spyware to track Khashoggi: Snowden - World News

    http://www.hurriyetdailynews.com/saudis-used-israeli-spyware-to-track-khashoggi-snowden-138669

    Software made by an Israeli cyber security firm was used to track murdered journalist Jamal Khashoggi, a former U.S. National Security Agency contractor and whistleblower claimed Nov. 7.

    Addressing a conference in Tel Aviv, Israel via a video call from Russia, Edward Snowden said Pegasus spyware sold to governments by NSO Group Technologies was used to track opponents.

    “The Saudis, of course, knew that Khashoggi was going to go to the consulate, as he got an appointment. But how did they know his intention and plans?”

    Khashoggi, a Saudi national and columnist for The Washington Post, was killed on Oct. 2 after entering the Saudi Consulate in Istanbul.

  • Revealed: Israel’s cyber-spy industry helps world dictators hunt dissidents and gays

    Haaretz investigation spanning 100 sources in 15 countries reveals Israel has become a leading exporter of tools for spying on civilians. Dictators around the world – even in countries with no formal ties to Israel – use them eavesdrop on human rights activists, monitor emails, hack into apps and record conversations
    By Hagar Shezaf and Jonathan Jacobson Oct 20, 2018

    https://www.haaretz.com/israel-news/.premium.MAGAZINE-israel-s-cyber-spy-industry-aids-dictators-hunt-dissident

    During the summer of 2016, Santiago Aguirre divided his time between part-time university lecturing and working for an organization that helps locate missing people. Mexico was then in the news internationally because of presidential candidate Donald Trump’s promise to build a wall on the American border with its southern neighbor. However, for Aguirre, a Mexican human rights activist, the problems of the present were far more pressing than any future wall. At the time, he was in the midst of a lengthy investigation to solve the mystery of the disappearance and presumed murder of 43 students in the city of Iguala two years before. It was becoming increasingly clear that his findings were incompatible with the results of the investigation conducted by the government.
    Aguirre wasn’t concerned when he received a series of text messages containing broken links. “Please help me with my brother, the police took him only because he is a teacher,” one message read. And another: “Professor, I encountered a problem. I am sending back my thesis, which is based on your dissertation, so that you can give me your comments.” The messages looked no different from many of the legitimate messages he received every day as part of his work. And therein lay the secret of their power. When Aguirre clicked on the links, however, he was inadvertently turning his smartphone into a surveillance device in the hands of the government.
    To really understand Israel and the Middle East - subscribe to Haaretz

    “Those text messages had information that was personal,” Aguirre notes, “the kind of information that could make the message interesting for me so I would click. It wasn’t until later that I actually thought – well, it is actually pretty weird that I received three messages with broken links.”

    Mexican human rights activist Santiago Aguirre, left, and colleague Mario Patron. Centro Prodh
    The discovery had a brutally chilling effect on the work of his organization. For the first time, he says, speaking with Haaretz by phone, he really and truly feared that every step he took was being watched, and that perhaps his family too was under surveillance.
    “Over the past 10 years, we have a figure of around 30,000 people who disappeared” in Mexico, Aguirre explains. “Many places in Mexico are controlled by organized crime. It has under its influence and power the authorities of some regions of the country, so they use the police to detain and then disappear people that they think are the enemy. I can tell you of many examples in which the Mexican military, for example, has presented the work human rights defenders as [benefiting] the drug cartels and organized crime. So there’s a pattern of thinking about the human rights sector in Mexico as a sector that needs to be surveilled.”

    The public revelation of the fact that Aguirre was under surveillance was made possible by cooperation between Mexican organizations and the Canadian research institute Citizen Lab. It turned out that Aguirre was one of a group of 22 journalists, lawyers, politicians, researchers and activists who were being tracked by local authorities. An examination of Aguirre’s telephone revealed that the links in the text messages were related to Pegasus spyware, which the authorities were using.
    But how did Pegasus get to Mexico? The trail of the malware led to Herzliya Pituah, the prosperous Tel Aviv suburb that is one of the major hubs of Israel’s high-tech industry. It’s there, in a narrow stretch of land between Israel’s coastal highway and the Mediterranean Sea, that NSO Group, the company that developed this Trojan-horse program, has its headquarters. Pegasus, which Forbes magazine called “the world’s most invasive mobile spy kit” in 2016, allows almost unlimited monitoring, even commandeering, of cellphones: to discover the phone’s location, eavesdrop on it, record nearby conversations, photograph those in the vicinity of the phone, read and write text messages and emails, download apps and penetrate apps already in the phone, and access photographs, clips, calendar reminders and the contacts list. And all in total secrecy.
    Pegasus’ invasive capability was rapidly transformed into dazzling economic success. In 2014, less than five years after entering the world from a space in a chicken coop in Bnei Zion, a moshav in the country’s center, 70 percent of the company’s holdings were purchased for $130 million. The buyer was Francisco Partners, one of the world’s largest private equity firms, which specializes in high-tech investments. That deal followed Francisco Partners’ earlier purchases of Israeli firms Ex Libris and Dmatek, According to Reuters, a year after the NSO takeover, Francisco Partners enjoyed a profit of $75 million.
    But the big money of NSO is only a small part of the big picture. Within a few years, the Israeli espionage industry has become the spearhead of the global commerce in surveillance tools and communications interception. Today, every self-respecting governmental agency that has no respect for the privacy of its citizens, is equipped with spy capabilities created in Herzliya Pituah.

  • HIDE AND SEEK Tracking NSO Group’s Pegasus Spyware to Operations in 45 Countries
    https://citizenlab.ca/2018/09/hide-and-seek-tracking-nso-groups-pegasus-spyware-to-operations-in-45-cou

    In this post, we develop new Internet scanning techniques to identify 45 countries in which operators of NSO Group’s Pegasus spyware may be conducting operations. 1. Executive Summary Israel-based “Cyber Warfare” vendor NSO Group produces and sells a mobile phone spyware suite called Pegasus. To monitor a target, a government operator of Pegasus must convince the target to click on a specially crafted exploit link, which, when clicked, delivers a chain of zero-day exploits to penetrate (...)

    #NSO #smartphone #Pegasus #spyware #écoutes #exportation #sécuritaire #activisme #web (...)

    ##surveillance

  • Une société israélienne accusée d’avoir aidé les EAU à espionner Hariri et le Qatar
    https://french.almanar.com.lb/1024190

    Le gouvernement des Emirats arabes unis a utilisé une technologie de piratage téléphonique israélienne afin d’espionner ses rivaux politiques et régionaux ainsi que des membres des médias. La société israélienne aurait elle-même participé aux cyber-attaques, a rapporté vendredi le New York Times. NSO Group, basé à Herzliya, a utilisé son controversé logiciel espion Pegasus afin de transformer les smartphones en appareils d’écoute. Afin de vendre Pegasus aux Émirats arabes unis, le NY Times a noté que la (...)

    #NSO #smartphone #spyware #écoutes #sécuritaire #exportation #surveillance

  • Hacking a Prince, an Emir and a Journalist to Impress a Client
    https://www.nytimes.com/2018/08/31/world/middleeast/hacking-united-arab-emirates-nso-group.html

    The rulers of the United Arab Emirates had been using Israeli spyware for more than a year, secretly turning the smartphones of dissidents at home or rivals abroad into surveillance devices. So when top Emirati officials were offered a pricey update of the spying technology, they wanted to make sure it worked, according to leaked emails submitted Thursday in two lawsuits against the spyware’s maker, the Israel-based NSO Group. Could the company secretly record the phones of the emir of (...)

    #NSO #smartphone #spyware #écoutes #exportation #sécuritaire #surveillance

  • Hacking a Prince, an Emir and a Journalist to Impress a Client - The New York Times

    With Israel help

    https://www.nytimes.com/2018/08/31/world/middleeast/hacking-united-arab-emirates-nso-group.html?imp_id=299442091&action=click&m

    The lawsuits also shed new light on the political intrigues involving Israel and the Persian Gulf monarchies, which have increasingly turned to hacking as a favorite weapon against one another.
    Image
    The NSO Group’s actions are now at the heart of the twin lawsuits accusing the company of actively participating in illegal spying.CreditDaniella Cheslow/Associated Press
    The U.A.E. does not recognize Israel, but the two appear to have a growing behind-the-scenes alliance. Because Israel deems the spyware a weapon, the lawsuits note, the NSO Group and its affiliates could have sold it to the Emirates only with approval by the Israeli Defense Ministry.

    Leaked emails submitted in the lawsuits show that the U.A.E. signed a contract to license the company’s surveillance software as early as August 2013.
    ADVERTISEMENT

    A year and a half later, a British affiliate of the NSO Group asked its Emirati client to provide a sixth payment of $3 million under the original contract, suggesting a total licensing fee of at least $18 million over that period.

    An update the next year was sold through a different affiliate, based in Cyprus, at a cost of $11 million in four installments, according to leaked invoices.

    Tensions between the U.A.E. and its neighbor Qatar reached a boil in 2013 over a struggle for power in Egypt. Qatar had allied itself with the Egyptian Islamist movement that won the elections after the Arab Spring. Then the U.A.E. backed a military takeover that cast the Islamists into prison instead.

    In the escalating feud, each side accused the other of cyberespionage. Hackers broke into the email accounts of two outspoken opponents of Qatar — the Emirati ambassador to Washington, Yousef al-Otaiba, and an American Republican fund-raiser who does business with the U.A.E., Elliott Broidy. Mr. Broidy has filed a separate lawsuit accusing Qatar and its Washington lobbyists of conspiring to steal and leak his emails.

    Other hackers briefly took over the website of the Qatari news service to post a false report of an embarrassing speech by the emir to damage him, and later leaked Qatari emails exposing awkward details of Qatari negotiations over the release of a royal hunting party kidnapped in Iraq. Allies of Qatar blamed the Emiratis.

    The leaked emails disclosed in the new lawsuits may also have been stolen through hacking. Lawyers involved said the documents were provided by a Qatari journalist who did not disclose how he had obtained them.

    The messages show that the Emiratis were seeking to intercept the phone calls of the emir of Qatar as early as 2014.
    ADVERTISEMENT

    But the Emirati target list also included Saudi Arabia. In the email discussions about updating the NSO Group’s technology, the Emiratis asked to intercept the phone calls of a Saudi prince, Mutaib bin Abdullah, who was considered at the time to be a possible contender for the throne.

    The Emiratis have been active promoters of Prince Mutaib’s younger rival, Crown Prince Mohammed bin Salman. Last year, the crown prince removed Prince Mutaib from his role as minister of the national guard and ordered his temporary detention in connection with corruption allegations.

    In a telephone interview, Prince Mutaib expressed surprise that the Emiratis had attempted to record his calls.

    “They don’t need to hack my phone,” he said. “I will tell them what I am doing.”

    According to the emails, the Emiratis also asked to intercept the phone calls of Saad Hariri, who is now prime minister of Lebanon.

    Mr. Hariri has sometimes been accused of failing to push back hard enough against Hezbollah, the powerful Lebanese movement backed by Iran. Last year, the U.A.E.’s Saudi ally, Crown Prince Mohammed, temporarily detained Mr. Harari in Riyadh, the Saudi capital, and forced him to announce his resignation as prime minister. (He later rescinded the announcement, and he remains prime minister.)

    Mr. Alkhamis, who resigned in 2014 as the editor of the London-based newspaper Al Arab, called the surveillance of his phone calls “very strange” but not unexpected, since he had published “sensitive” articles about Persian Gulf politics.

    The U.A.E.’s use of the NSO Group’s spyware was first reported in 2016. Ahmed Mansoor, an Emirati human rights advocate, noticed suspicious text messages and exposed an attempt to hack his Apple iPhone. The U.A.E. arrested him on apparently unrelated charges the next year and he remains in jail.

  • Le personnel d’#Amnesty_International cible de logiciels malveillants | Amnesty International
    https://www.amnesty.org/fr/press-releases/2018/08/staff-targeted-with-malicious-spyware

    Début juin 2018, un membre du personnel d’Amnesty International a reçu un message WhatsApp suspect rédigé en arabe. Ce texte comportait des informations détaillées au sujet d’une prétendue manifestation devant l’ambassade d’#Arabie_saoudite à Washington, et un lien vers un site Internet. Les investigations menées par les informaticiens d’Amnesty International ont montré que le fait de cliquer sur ce lien aurait, d’après leurs connaissances préalables, installé un « #Pegasus », qui est un outil de #surveillance sophistiqué créé par l’entreprise #NSO Group, basée en #Israël.

    How Israeli spyware tried to hack an Amnesty activist’s phone
    https://www.fastcompany.com/90212318/how-israeli-spyware-tried-to-hack-an-amnesty-activists-phone

    NSO, founded in 2010 by former Israeli intelligence officials...

  • Amnesty International alleges Israeli spyware linked to Saudi Arabia - Middle East - Jerusalem Post
    https://www.jpost.com/Middle-East/Amnesty-International-alleges-Israeli-spyware-linked-to-Saudi-Arabia-563963

    The report released Wednesday coincided with a second report from Citizen Lab, an interdisciplinary lab that deals with information technology and human rights, which examined the suspicious messages and corroborated Amnesty’s findings. “The SMS messages contain domain names pointing to websites that appear to be part of NSO Group’s Pegasus infrastructure.”

    NSO Group “develops mobile device surveillance software. The software called Pegasus developed by the company can be used to record conversations and gain access to photos, text messages and websites viewed from a smartphone,” according to Bloomberg.

    The company was founded in 2010 and is based in Herzliya, Israel. Calcalist reported that NSO’s co-founder has asserted the company only sells to “government bodies that are defined as legitimate.”

    The malicious messages arrived in June and appeared to target human rights activists. The messages ostensibly provided information about a protest or court case that lured the potential victim to click on a link. One message even mimicked an Amnesty report title about Saudi Arabia’s lifting the ban on women driving.

    #israël la seule démocratie post-moderne au Moyen-Orient

  • Reckless III : Investigation Into Mexican Mass Disappearance Targeted with NSO Spyware
    https://citizenlab.org/2017/07/mexico-disappearances-nso

    This research note reveals that an international group of experts investigating the 2014 Iguala Mass Disappearance of 43 Mexican students were targeted with Pegasus, the government-exclusive commercial spyware made by NSO Group. NSO Group, the creator of the Pegasus spyware, is an Israeli company that describes their spyware product as designed for tracking criminals and terrorists. Notably, some have reported that it is re-branding as Q Cyber Technologies. Prior Citizen Lab reporting has (...)

    #NSO #Pegasus #spyware #écoutes #exportation #sécuritaire #activisme #surveillance (...)

    ##CitizenLab

  • How Spy Tech Firms Let Governments See Everything on a Smartphone
    http://www.nytimes.com/2016/09/03/technology/nso-group-how-spy-tech-firms-let-governments-see-everything-on-a-smartphone

    Want to invisibly spy on 10 iPhone owners without their knowledge ? Gather their every keystroke, sound, message and location ? That will cost you $650,000, plus a $500,000 setup fee with an Israeli outfit called the NSO Group. You can spy on more people if you would like — just check out the company’s price list. The NSO Group is one of a number of companies that sell surveillance tools that can capture all the activity on a smartphone, like a user’s location and personal contacts. These (...)

    #Apple #smartphone #iPhone #écoutes #géolocalisation #clavier #NSO_Group #spyware

  • Apple corrige de graves failles de sécurité sur iOS grâce à un militant des droits de l’homme
    http://www.lemonde.fr/pixels/article/2016/08/26/apple-corrige-de-graves-failles-de-securite-sur-ios-grace-a-un-militant-des-

    Collaboration #Israël #EAU : voilà qui intéressera @gonzo

    Ahmed Mansoor, un activiste émirati défenseur des droits de l’homme, [...] militant de 46 ans a reçu le 10 août sur son iPhone plusieurs messages contenant des liens, promettant des informations sur des abus commis par le régime émirati. Intrigué, il décide de ne pas cliquer et de les transférer au Citizen Lab, une entité de l’université de Toronto (Ontario, Canada) spécialisée en cybersécurité.

    Le Citizen Lab a remonté la trace du programme espion jusqu’à NSO Group, une firme israélienne spécialisée dans les solutions d’écoute pour téléphone mobile à destination des Etats et fondée par un ancien membre des hackeurs d’élite de l’armée israélienne. Réaliser ce type de piratage de haut vol a un coût, et il est très élevé. Une faille « zero day » pour iOS s’est récemment monnayée pour 1 million de dollars (900 000 euros).

    L’identité et l’activité de la cible, le prix qu’il a fallu dépenser et le fournisseur du logiciel espion ne laissent guère place au doute, selon Citizen Labs : le commanditaire est très certainement le gouvernement émirati.

  • The Million Dollar Dissident: NSO Group’s iPhone Zero-Days used against a UAE Human Rights Defender
    https://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae

    We recognized the links as belonging to an exploit infrastructure connected to #NSO_Group, an Israel-based “cyber war” company that sells #Pegasus, a government-exclusive “lawful intercept” spyware product. NSO Group is reportedly owned by an American venture capital firm, #Francisco_Partners_Management.

    –-------------
    #flagrant_délit #médias_dominants #mensonge_par_omission #lemonde

    lemonde :

    L’identité et l’activité de la cible, le prix qu’il a fallu dépenser et le fournisseur du logiciel espion ne laissent guère place au doute, selon #Citizen_Labs : le commanditaire est très certainement le gouvernement émirati.

    –--------------

    http://www.forbes.com/sites/thomasbrewster/2016/08/25/everything-we-know-about-nso-group-the-professional-spies-who-hacked-iphones-with-a-single-text/#760cd8c1e3d6

    Everything We Know About NSO Group: The Professional Spies Who Hacked iPhones With A Single Text

    #espionnage #apple #droits_de_l'humain #Ahmed_Mansoor #lanceur_d'alerte

    • June 20, 2016
      Francisco Partners et Elliott Management acquièrent Dell Software Group
      https://software.dell.com/fr-fr/acquisitions/dsg.aspx

      “La vraie passion pour la technologie et la solide expérience de Francisco Partners et Elliott Management à développer des entreprises de logiciel permettra aux employés de Dell Software de continuer à promouvoir l’innovation,” a déclaré Tom Sweet, vice-président senior et directeur financier, Dell. “Nous nous réjouissons de continuer à travailler en étroite collaboration avec les équipes de Francisco Partners et Elliott Management pour améliorer encore les relations déjà grandes que Dell Software a avec ses clients et partenaires.”

      La gamme complète de solutions logicielles de Dell Software couvrent un certain nombre de domaines essentiels pour l’entreprise moderne comprenant des systèmes d’analyse avancée, la gestion de base de données, la protection des données, la gestion des postes clients, la gestion des identités et des accès, la gestion des plateformes Microsoft, la sécurité des réseaux et le suivi de performance. Grâce aux solutions de Dell Software, les organisations de toutes tailles peuvent mieux sécuriser, gérer, surveiller, protéger et analyser les informations et les infrastructures afin d’accélérer l’innovation et leur modernisation.

    • WP :
      #Francisco_Partners
      Industry Private Equity
      Founded 1999
      Founders David Stanton, Dipanjan Deb, Benjamin Ball, Neil Garfinkel, Sanford R. “Sandy” Robertson

      –-----
      http://news.stanford.edu/pr/2015/pr-new-alumni-trustees-071415.html
      Newly elected members of the #Stanford_University Board of Trustees are, clockwise from upper left, Mary Barra, #Dipanjan_DJ_Deb, Christy MacLear and Bradley A. Geier. (Courtesy Board of Trustees)