Seenthis
•
 
Identifiants personnels
  • [mot de passe oublié ?]

 
  • #n
  • #ns
RSS: #nso

#nso

  • #nso_group
0 | 25 | 50 | 75
  • @etraces
    e-traces @etraces ART LIBRE 10/01/2021

    Inside NSO, Israel’s billion-dollar spyware giant
    ▻https://www.technologyreview.com/2020/08/19/1006458/nso-spyware-controversy-pegasus-human-rights

    The world’s most notorious surveillance company says it wants to clean up its act. Go on, we’re listening.

    Maâti Monjib speaks slowly, like a man who knows he’s being listened to.

    It’s the day of his 58th birthday when we speak, but there’s little celebration in his voice. “The surveillance is hellish,” Monjib tells me. “It is really difficult. It controls everything I do in my life.”

    A history professor at the University of Mohammed V in Rabat, Morocco, Monjib vividly remembers the day in 2017 when his life changed. Charged with endangering state security by the government he has fiercely and publicly criticized, he was sitting outside a courtroom when his iPhone suddenly lit up with a series of text messages from numbers he didn’t recognize. They contained links to salacious news, petitions, and even Black Friday shopping deals.

    A month later, an article accusing him of treason appeared on a popular national news site with close ties to Morocco’s royal rulers. Monjib was used to attacks, but now it seemed his harassers knew everything about him: another article included information about a pro-democracy event he was set to attend but had told almost no one about. One story even proclaimed that the professor “has no secrets from us.”

    He’d been hacked. The messages had all led to websites that researchers say were set up as lures to infect visitors’ devices with Pegasus, the most notorious spyware in the world.

    Pegasus is the blockbuster product of NSO Group, a secretive billion-dollar Israeli surveillance company. It is sold to law enforcement and intelligence agencies around the world, which use the company’s tools to choose a human target, infect the person’s phone with the spyware, and then take over the device. Once Pegasus is on your phone, it is no longer your phone.

    NSO sells Pegasus with the same pitch arms dealers use to sell conventional weapons, positioning it as a crucial aid in the hunt for terrorists and criminals. In an age of ubiquitous technology and strong encryption, such “lawful hacking” has emerged as a powerful tool for public safety when law enforcement needs access to data. NSO insists that the vast majority of its customers are European democracies, although since it doesn’t release client lists and the countries themselves remain silent, that has never been verified.

    Monjib’s case, however, is one of a long list of incidents in which Pegasus has been used as a tool of oppression. It has been linked to cases including the murder of Saudi journalist Jamal Khashoggi, the targeting of scientists and campaigners pushing for political reform in Mexico, and Spanish government surveillance of Catalan separatist politicians. Mexico and Spain have denied using Pegasus to spy on opponents, but accusations that they have done so are backed by substantial technical evidence.

    NSO’s basic argument is that it is the creator of a technology that governments use, but that since it doesn’t attack anyone itself, it can’t be held responsible.

    Some of that evidence is contained in a lawsuit filed last October in California by WhatsApp and its parent company, Facebook, alleging that Pegasus manipulated WhatsApp’s infrastructure to infect more than 1,400 cell phones. Investigators at Facebook found more than 100 human rights defenders, journalists, and public figures among the targets, according to court documents. Each call that was picked up, they discovered, sent malicious code through WhatsApp’s infrastructure and caused the recipient’s phone to download spyware from servers owned by NSO. This, WhatsApp argued, was a violation of American law.

    NSO has long faced such accusations with silence. Claiming that much of its business is an Israeli state secret, it has offered precious little public detail about its operations, customers, or safeguards.

    Now, though, the company suggests things are changing. In 2019, NSO, which was owned by a private equity firm, was sold back to its founders and another private equity firm, Novalpina, for $1 billion. The new owners decided on a fresh strategy: emerge from the shadows. The company hired elite public relations firms, crafted new human rights policies, and developed new self-­governance documents. It even began showing off some of its other products, such as a covid-19 tracking system called Fleming, and Eclipse, which can hack drones deemed a security threat.

    Over several months, I’ve spoken with NSO leadership to understand how the company works and what it says it is doing to prevent human rights abuses carried out using its tools. I have spoken to its critics, who see it as a danger to democratic values; to those who urge more regulation of the hacking business; and to the Israeli regulators responsible for governing it today. The company’s leaders talked about NSO’s future and its policies and procedures for dealing with problems, and it shared documents that detail its relationship with the agencies to which it sells Pegasus and other tools. What I found was a thriving arms dealer—inside the company, employees acknowledge that Pegasus is a genuine weapon—struggling with new levels of scrutiny that threaten the foundations of its entire industry.Retour ligne automatique
    “A difficult task”

    From the first day Shmuel Sunray joined NSO as its general counsel, he faced one international incident after another. Hired just days after WhatsApp’s lawsuit was filed, he found other legal problems waiting on his desk as soon as he arrived. They all centered on the same basic accusation: NSO Group’s hacking tools are sold to, and can be abused by, rich and repressive regimes with little or no accountability.

    Sunray had plenty of experience with secrecy and controversy: his previous job was as vice president of a major weapons manufacturer. Over several conversations, he was friendly as he told me that he’s been instructed by the owners to change NSO’s culture and operations, making it more transparent and trying to prevent human rights abuses from happening. But he was also obviously frustrated by the secrecy that he felt prevented him from responding to critics.

    “It’s a difficult task,” Sunray told me over the phone from the company’s headquarters in Herzliya, north of Tel Aviv. “We understand the power of the tool; we understand the impact of misuse of the tool. We’re trying to do the right thing. We have real challenges dealing with government, intelligence agencies, confidentiality, operational necessities, operational limitations. It’s not a classic case of human rights abuse by a company, because we don’t operate the systems—we’re not involved in actual operations of the systems—but we understand there is a real risk of misuse from the customers. We’re trying to find the right balance.”

    This underpins NSO’s basic argument, one that is common among weapons manufacturers: the company is the creator of a technology that governments use, but it doesn’t attack anyone itself, so it can’t be held responsible.

    Still, according to Sunray, there are several layers of protection in place to try to make sure the wrong people don’t have access.Retour ligne automatique
    Making a sale

    Like most other countries, Israel has export controls that require weapons manufacturers to be licensed and subject to government oversight. In addition, NSO does its own due diligence, says Sunray: its staff examine a country, look at its human rights record, and scrutinize its relationship with Israel. They assess the specific agency’s track record on corruption, safety, finance, and abuse—as well as factoring in how much it needs the tool.

    Sometimes negatives are weighed against positives. Morocco, for example, has a worsening human rights record but a lengthy history of cooperating with Israel and the West on security, as well as a genuine terrorism problem, so a sale was reportedly approved. By contrast, NSO has said that China, Russia, Iran, Cuba, North Korea, Qatar, and Turkey are among 21 nations that will never be customers.

    Finally, before a sale is made, NSO’s governance, risk, and compliance committee has to sign off. The company says the committee, made up of managers and shareholders, can decline sales or add conditions, such as technological restrictions, that are decided case by case. Retour ligne automatique
    Preventing abuse

    Once a sale is agreed to, the company says, technological guardrails prevent certain kinds of abuse. For example, Pegasus does not allow American phone numbers to be infected, NSO says, and infected phones cannot even be physically located in the United States: if one does find itself within American borders, the Pegasus software is supposed to self-destruct.

    NSO says Israeli phone numbers are among others also protected, though who else gets protection and why remains unclear.

    When a report of abuse comes in, an ad hoc team of up to 10 NSO employees is assembled to investigate. They interview the customer about the allegations, and they request Pegasus data logs. These logs don’t contain the content the spyware extracted, like chats or emails—NSO insists it never sees specific intelligence—but do include metadata such as a list of all the phones the spyware tried to infect and their locations at the time.

    According to one recent contract I obtained, customers must “use the system only for the detection, prevention, and investigation of crimes and terrorism and ensure the system will not be used for human rights violations.” They must notify the company of potential misuse. NSO says it has terminated three contracts in the past for infractions including abuse of Pegasus, but it refuses to say which countries or agencies were involved or who the victims were.

    “We’re not naïve”

    Lack of transparency is not the only problem: the safeguards have limits. While the Israeli government can revoke NSO’s license for violations of export law, the regulators do not take it on themselves to look for abuse by potential customers and aren’t involved in the company’s abuse investigations.

    Many of the other procedures are merely reactive as well. NSO has no permanent internal abuse team, unlike almost any other billion-dollar tech firm, and most of its investigations are spun up only when an outside source such as Amnesty International or Citizen Lab claims there has been malfeasance. NSO staff interview the agencies and customers under scrutiny but do not talk to the alleged victims, and while the company often disputes the technical reports offered as evidence, it also claims that both state secrecy and business confidentiality prevent it from sharing more information.

    The Pegasus logs that are crucial to any abuse inquiry also raise plenty of questions. NSO Group’s customers are hackers who work for spy agencies; how hard would it be for them to tamper with the logs? In a statement, the company insisted this isn’t possible but declined to offer details.

    If the logs aren’t disputed, NSO and its customers will decide together whether targets are legitimate, whether genuine crimes have been committed, and whether surveillance was done under due process of law or whether autocratic regimes spied on opponents.

    Sunray, audibly exasperated, says he feels as if secrecy is forcing him to operate with his hands tied behind his back.

    “It’s frustrating,” he told me. “We’re not naïve. There have been misuses. There will be misuses. We sell to many governments. Even the US government—no government is perfect. Misuse can happen, and it should be addressed.”

    But Sunray also returns to the company’s standard response, the argument that underpins its defense in the WhatsApp lawsuit: NSO is a manufacturer, but it’s not the operator of the spyware. We built it but they did the hacking—and they are sovereign nations.

    That’s not enough for many critics. “No company that believes it can be the independent watchdog of their own products ever convinces me,” says Marietje Schaake, a Dutch politician and former member of the European Parliament. “The whole idea that they have their own mechanisms while they have no problem selling commercial spyware to whoever wants to buy it, knowing that it’s used against human rights defenders and journalists—I think it shows the lack of responsibility on the part of this company more than anything.”

    So why the internal push for more transparency now? Because the deluge of technical reports from human rights groups, the WhatsApp lawsuit, and increasing governmental scrutiny threaten NSO’s status quo. And if there is going to be a new debate over how the industry gets regulated, it pays to have a powerful voice. Retour ligne automatique
    Growing scrutiny

    Lawful hacking and cyber-espionage have grown enormously as a business over the past decade, with no signs of retreat. NSO Group’s previous owners bought the company in 2014 for $130 million, less than one-seventh of the valuation it was sold for last year. The rest of the industry is expanding too, profiting from the spread of communications technology and deepening global instability. “There’s no doubt that any state has the right to buy this technology to fight crime and terrorism,” says Amnesty International’s deputy director, Danna Ingleton. “States are rightfully and lawfully able to use these tools. But that needs to be accompanied more with a regulatory system that prevents abuses and provides an accountability mechanism when abuse has happened.” Shining a much brighter light on the hacking industry, she argues, will allow for better regulation and more accountability.

    Earlier this year Amnesty International was in court in Israel arguing that the Ministry of Defense should revoke NSO’s license because of abuses of Pegasus. But just as the case was starting, officials from Amnesty and 29 other petitioners were told to leave the courtroom: a gag order was being placed on the proceedings at the ministry’s urging. Then, in July, a judge rejected the case outright.

    “I do not believe as a matter of principle and as a matter of law that NSO can claim a complete lack of responsibility for the way their tools are being used,” says United Nations special rapporteur Agnès Callamard. “That’s not how it works under international law.”

    Callamard advises the UN on extrajudicial executions and has been vocal about NSO Group and the spyware industry ever since it emerged that Pegasus was being used to spy on friends and associates of Khashoggi shortly before he was murdered. For her, the issue has life-or-death consequences.

    If NSO loses the WhatsApp case, one lawyer says, it calls into question all those companies that make their living by finding flaws in software and exploiting them.

    “We’re not calling for something radically new,” says Callamard. “We are saying that what’s in place at the moment is proving insufficient, and therefore governments or regulatory agencies need to move into a different gear quickly. The industry is expanding, and it should expand on the basis of the proper framework to regulate misuse. It’s important for global peace.”

    There have been calls for a temporary moratorium on sales until stronger regulation is enacted, but it’s not clear what that legal framework would look like. Unlike conventional arms, which are subject to various international laws, cyber weapons are currently not regulated by any worldwide arms control agreement. And while nonproliferation treaties have been suggested, there is little clarity on how they would measure existing capabilities, how monitoring or enforcement would work, or how the rules would keep up with rapid technological developments. Instead, most scrutiny today is happening at the national legal level.

    In the US, both the FBI and Congress are looking into possible hacks of American targets, while an investigation led by Senator Ron Wyden’s office wants to find out whether any Americans are involved in exporting surveillance technology to authoritarian governments. A recent draft US intelligence bill would require a government report on commercial spyware and surveillance technology.

    The WhatsApp lawsuit, meanwhile, has taken aim close to the heart of NSO’s business. The Silicon Valley giant argues that by targeting California residents—that is, WhatsApp and Facebook—NSO has given the court in San Francisco jurisdiction, and that the judge in the case can bar the Israeli company from future attempts to misuse WhatsApp’s and Facebook’s networks. That opens the door to an awful lot of possibilities: Apple, whose iPhone has been a paramount NSO target, could feasibly mount a similar legal attack. Google, too, has spotted NSO targeting Android devices.

    And financial damages are not the only sword hanging over NSO’s head. Such lawsuits also bring with them the threat of courtroom discovery, which has the potential to bring details of NSO’s business deals and customers into the public eye.

    “A lot depends on exactly how the court rules and how broadly it characterizes the violation NSO is alleged to have committed here,” says Alan Rozenshtein, a former Justice Department lawyer now at the University of Minnesota Law School. “At a minimum, if NSO loses this case, it calls into question all of those companies that make their products or make their living by finding flaws in messaging software and providing services exploiting those flaws. This will create enough legal uncertainty that I would imagine these would-be clients would think twice before contracting with them. You don’t know if the company will continue to operate, if they’ll get dragged to court, if your secrets will be exposed.” NSO declined to comment on the alleged WhatsApp hack, since it is still an active case. Retour ligne automatique
    “We are always spied on”

    In Morocco, Maâti Monjib was subjected to at least four more hacking attacks throughout 2019, each more advanced than the one before. At some point, his phone browser was invisibly redirected to a suspicious domain that researchers suspect was used to silently install malware. Instead of something like a text message that can raise the alarm and leaves a visible trace, this one was a much quieter network injection attack, a tactic valued because it’s almost imperceptible except to expert investigators.

    On September 13, 2019, Monjib had lunch at home with his friend Omar Radi, a Moroccan journalist who is one of the regime’s sharpest critics. That very day, an investigation later found, Radi was hit with the same kind of network injection attacks that had snared Monjib. The hacking campaign against Radi lasted at least into January 2020, Amnesty International researchers said. He’s been subject to regular police harassment ever since.

    At least seven more Moroccans received warnings from WhatsApp about Pegasus being used to spy on their phones, including human rights activists, journalists, and politicians. Are these the kinds of legitimate spying targets—the terrorists and criminals—laid out in the contract that Morocco and all NSO customers sign?

    In December, Monjib and the other victims sent a letter to Morocco’s data protection authority asking for an investigation and action. Nothing formally came of it, but one of the men, the pro-democracy economist Fouad Abdelmoumni, says his friends high up at the agency told him the letter was hopeless and urged him to drop the matter. The Moroccan government, meanwhile, has responded by threatening to expel Amnesty International from the country.

    What’s happening in Morocco is emblematic of what’s happening around the world. While it’s clear that democracies are major beneficiaries of lawful hacking, a long and growing list of credible, detailed, technical, and public investigations shows Pegasus being misused by authoritarian regimes with long records of human rights abuse.

    “Morocco is a country under an authoritarian regime who believe people like Monjib and myself have to be destroyed,” says Abdelmoumni. “To destroy us, having access to all information is key. We always consider that we are spied on. All of our information is in the hands of the palace.”

    #Apple #NSO #Facebook #WhatsApp #iPhone #Pegasus #smartphone #spyware #activisme #journalisme #écoutes #hacking #surveillance #Amnesty (...)

    ##CitizenLab

    https://wp.technologyreview.com/wp-content/uploads/2020/08/Untitled-design.png

    e-traces @etraces ART LIBRE
    Écrire un commentaire

  • @etraces
    e-traces @etraces via RSS ART LIBRE 8/01/2021

    Human rights organizations respond to NSO : victims’ voices will not be silenced
    ▻https://www.accessnow.org/nso-victims-voices-will-not-be-silenced

    Today, January 7, Access Now, along with seven other human rights organizations, filed a reply to NSO Group’s opposition to the coalition’s amicus brief in the case of WhatsApp v. NSO in the U.S. Federal 9th Circuit Court. In their opposition, NSO argued that the court should reject the brief on the grounds that it duplicates other amici briefs and introduces allegedly impermissible facts about NSO and its customers. In reply, Access Now argues that the brief meets the Federal Rules of (...)

    #Microsoft #NSO #WhatsApp #Pegasus #spyware #écoutes #surveillance #AccessNow #Amnesty (...)

    ##EFF

    https://www.accessnow.org/cms/assets/uploads/2020/12/WHATSAPP-NSO-social.jpg

    e-traces @etraces via RSS ART LIBRE
    Écrire un commentaire

  • @etraces
    e-traces @etraces via RSS ART LIBRE 2/01/2021

    Facebook Joined by Human Rights Groups to Fight Spyware Maker
    ▻https://www.bloomberg.com/news/articles/2020-12-23/facebook-joined-by-human-rights-groups-to-fight-spyware-maker

    A coalition of human rights and press freedom groups have filed a brief supporting Facebook Inc.’s lawsuit against the Israeli surveillance technology company NSO Group, arguing that the “very core of the principles that America represents” are at stake in the case. Facebook last year initiated the lawsuit against NSO Group, accusing the company of reverse-engineering WhatsApp and using the popular chat service to send spyware to the devices of approximately 1,400 people, including attorneys, (...)

    #Cisco #Google #Microsoft #NSO #Facebook #WhatsApp #Pegasus #hacking #surveillance #écoutes #AccessNow #Amnesty (...)

    ##RSF

    e-traces @etraces via RSS ART LIBRE
    Écrire un commentaire

  • @etraces
    e-traces @etraces via RSS ART LIBRE 2/01/2021

    Sandvine ... the surveillance octopus in the Arab region
    ▻https://masaar.net/en/sandvine-the-surveillance-octopus-in-the-arab-region

    Partnership and business agreements between Arab governments and corporates on the one hand, and foreign companies working in the internet and communication surveillance industry (software/hardware) on the other, is currently witnessing an increase in rate and scale. The aim is to manipulate the flow of information, restrain freedom of expression, and control internet and communication systems to curtail the use of free cyber and communication space by activists calling for political and (...)

    #BlueCoat_Systems_Inc. #HackingTeam #AMESys #Ercom #Gamma #Orange #Sandvine/Procera #Vodafone #censure #écoutes #surveillance (...)

    ##BlueCoat_Systems_Inc. ##Sandvine/Procera ##NSO

    https://i0.wp.com/masaar.net/wp-content/uploads/2020/10/index-2.jpeg

    e-traces @etraces via RSS ART LIBRE
    Écrire un commentaire

  • @etraces
    e-traces @etraces via RSS ART LIBRE 22/12/2020

    Google, Cisco and VMware join Microsoft to oppose NSO Group in WhatsApp spyware case
    ▻https://techcrunch.com/2020/12/21/google-cisco-and-vmware-join-microsoft-to-oppose-nso-group-in-whatsapp-s

    A coalition of companies have filed an amicus brief in support of a legal case brought by WhatsApp against Israeli intelligence firm NSO Group, accusing the company of using an undisclosed vulnerability in the messaging app to hack into at least 1,400 devices, some of which were owned by journalists and human rights activists. NSO develops and sells governments access to its Pegasus spyware, allowing its nation-state customers to target and stealthily hack into the devices of its targets. (...)

    #NSO #Cisco #Google #Microsoft #VMWare #WhatsApp #Pegasus #smartphone #spyware #activisme #journalisme #écoutes #hacking (...)

    ##surveillance

    e-traces @etraces via RSS ART LIBRE
    Écrire un commentaire

  • @etraces
    e-traces @etraces via RSS ART LIBRE 21/12/2020
    1
    @sinehebdo
    1

    Les iPhone de journalistes d’Al-Jazira ciblés par des logiciels d’espionnage ultrasophistiqués
    ▻https://www.lemonde.fr/pixels/article/2020/12/21/les-iphone-de-journalistes-d-al-jazira-cibles-par-des-logiciels-d-espionnage

    Des dizaines d’iPhone de journalistes de la chaîne d’informations qatarie ont été surveillés de manière indétectable grâce à des outils de l’entreprise israélienne NSO Group, révèle un rapport du Citizen Lab de Toronto, expert dans l’étude des logiciels espions. Les iPhone de dizaines d’employés de la chaîne d’information Al-Jazira auraient été espionnés, en 2019 et en 2020, grâce à des outils d’espionnage sophistiqués fourni par l’entreprise israélienne NSO Group. L’accusation, qui repose sur une analyse (...)

    #NSO #iPhone #Pegasus #smartphone #spyware #journalisme #écoutes #hacking #surveillance (...)

    ##CitizenLab

    https://img.lemde.fr/2020/12/20/348/0/4000/2000/1440/720/60/0/859198b_e0fc5a7ae0cc494187e8081a319a8bde-e0fc5a7ae0cc494187e8081a319a8bde-0.jpg

    e-traces @etraces via RSS ART LIBRE
    • @vanderling
      Vanderling @vanderling 21/12/2020

      Dozens of Al Jazeera journalists allegedly hacked using Israeli firm’s spyware
      ▻https://www.theguardian.com/media/2020/dec/20/citizen-lab-nso-dozens-of-aljazeera-journalists-allegedly-hacked-using-
      #Al_Jazeera

      Vanderling @vanderling
    • @sinehebdo
      Dror@sinehebdo @sinehebdo 26/12/2020

      #espionnage #Israel #vidéo-surveillance #surveillance #NSO #Pegasus #Qatar #Maroc #Rwanda #Espagne #Togo

      But the new allegation by Citizen Lab marks the latest in a long line of alleged human rights violations involving the company’s software on behalf of its clients, including the alleged targeting of journalists in Morocco, political dissidents from Rwanda, politicians in Spain, and pro-democracy clergy in Togo.

      Dror@sinehebdo @sinehebdo
    Écrire un commentaire

  • @etraces
    e-traces @etraces via RSS ART LIBRE 21/12/2020

    Journalists Hacked with Suspected NSO Group iMessage ’Zero-Click’ Exploit
    ▻https://citizenlab.ca/2020/12/the-great-ipwn-journalists-hacked-with-suspected-nso-group-imessage-zero-

    Summary & Key Findings In July and August 2020, government operatives used NSO Group’s Pegasus spyware to hack 36 personal phones belonging to journalists, producers, anchors, and executives at Al Jazeera. The personal phone of a journalist at London-based Al Araby TV was also hacked. The phones were compromised using an exploit chain that we call KISMET, which appears to involve an invisible zero-click exploit in iMessage. In July 2020, KISMET was a zero-day against at least (...)

    #NSO #iPhone #Pegasus #smartphone #spyware #journalisme #écoutes #hacking #surveillance #CitizenLab

    https://citizenlab.ca/wp-content/uploads/2020/12/ajArtboard-1@4x.png

    e-traces @etraces via RSS ART LIBRE
    Écrire un commentaire

  • @etraces
    e-traces @etraces via RSS ART LIBRE 19/12/2020

    NSO Group WhatsApp hack victims speak out, from India to Rwanda
    ▻https://www.accessnow.org/nso-whatsapp-hacking-victims-stories

    Around the world, governments are using surveillance tools they have purchased from Israeli spyware firm NSO Group — the infamous creator of Pegasus — to monitor and crack down on human rights defenders. Access Now and our partners have repeatedly called on NSO Group and its investors to stop providing its products to countries who use them as tools of oppression, but the company has failed to take any meaningful steps to address these harms. Since 2016 — when UAE human rights activist Ahmed (...)

    #NSO #WhatsApp #Pegasus #smartphone #spyware #activisme #écoutes #surveillance #AccessNow (...)

    ##CitizenLab

    https://www.accessnow.org/cms/assets/uploads/2020/12/WHATSAPP-NSO-social.jpg

    e-traces @etraces via RSS ART LIBRE
    Écrire un commentaire

  • @etraces
    e-traces @etraces via RSS ART LIBRE 8/12/2020

    Espionnage des journalistes mexicains : enquête sur le marché très rentable de la cyber surveillance
    ▻https://forbiddenstories.org/fr/espionnage-des-journalistes-mexicains-enquete-sur-le-marche-tres-r

    Malgré des scandales à répétition, l’industrie mondiale de la cyber surveillance, aidée par quelques intermédiaires bien connectés, continue de fournir au Mexique des technologies toujours plus invasives. Plusieurs journalistes ont été pris pour cible par ces outils sans qu’aucun responsable mexicain ne soit jamais inquiété. Le Veracruz, État qui dénombre le plus de journalistes assassinés dont Regina Martínez, est allé jusqu’à mettre en place une unité d’espionnage suréquipée qui gardait un œil sur la (...)

    #NSO #HackingTeam #Pegasus #RemoteControlSystem #spyware #criminalité #journalisme #surveillance #corruption #activisme #CitizenLab (...)

    ##criminalité ##Amnesty

    https://forbiddenstories.org/wp-content/uploads/2020/12/ILLUSTRATION-PRINCIPALE-scaled.jpg

    e-traces @etraces via RSS ART LIBRE
    Écrire un commentaire

  • @etraces
    e-traces @etraces via RSS ART LIBRE 8/12/2020

    Spying on Mexican journalists : investigating the lucrative market of cyber-surveillance
    ▻https://forbiddenstories.org/spying-on-mexican-journalists-investigating-the-lucrative-market-o

    Despite repeated scandals, the global cyber-surveillance industry continues to supply Mexico with more and more invasive technologies, assisted by well-connected intermediaries. Multiple journalists have been targeted by these tools, but Mexican authorities remain unconcerned. Veracruz, the state with the highest count of murdered journalists, including Regina Martínez, even used a sophisticated espionage unit to monitor journalists. KEY FINDINGS A forensic analysis done by Amnesty (...)

    #NSO #HackingTeam #Pegasus #RemoteControlSystem #spyware #activisme #journalisme #criminalité #surveillance #CitizenLab #corruption (...)

    ##criminalité ##données

    https://forbiddenstories.org/wp-content/uploads/2020/12/ILLUSTRATION-PRINCIPALE-scaled.jpg

    e-traces @etraces via RSS ART LIBRE
    Écrire un commentaire

  • @loutre
    Loutre @loutre 7/12/2020
    2
    @kassem
    @sinehebdo
    2

    Espionnage des journalistes mexicains : le marché très rentable de la cybersurveillance
    07/12/2020
    Par Cécile Schilis-Gallego, Forbidden Stories et Cellule investigation de Radio France
    ▻https://www.franceculture.fr/medias/espionnage-des-journalistes-mexicains-le-marche-tres-rentable-de-la-cy

    https://cdn.radiofrance.fr/s3/cruiser-production/2020/12/852e953d-a6e0-4dab-b178-ca48238fbed6/838_main_illustration.jpg

    (...) Un attrait pour la technologie israélienne

    Selon un haut responsable de la DEA, l’agence américaine anti-drogue, une vingtaine de sociétés privées de logiciels espions ont vendu leurs logiciels à plusieurs services de police fédéraux et d’État mexicains.

    Les technologies israéliennes ont particulièrement bonne réputation auprès des responsables mexicains.

    Le Mexique a d’ailleurs longtemps été l’un des plus gros clients de NSO Group. Après un premier contrat mitigé avec le secrétariat à la Défense nationale, l’entreprise israélienne s’implante définitivement sur le marché en 2014 en signant un contrat de 32 millions de dollars avec le bureau du procureur général. Dans les mails du concurrent italien Hacking Team, qui ont été massivement piratés et diffusés en 2015, on lit au détour de quelques phrases la montée en puissance de NSO à l’époque. Les vendeurs italiens ont alors pour objectif de « déboulonner le mythe NSO » auprès des clients mexicains qui s’enthousiasment pour cette technologie qui promet un accès total aux téléphones ciblés.

    Sur ce marché, NSO s’est imposé comme leader. « Nous sommes comme un fantôme, se vantait le cofondateur Omri Lavie en 2013. Nous sommes totalement transparents pour la cible, et nous ne laissons aucune trace. » Mais l’entreprise se rend compte après quelques années que ce n’est pas tout à fait vrai. « Les SMS sont très visibles et laissent derrière eux beaucoup de traces qui ont été utilisées à maintes reprises par des enquêteurs pour confirmer un ciblage NSO », explique Claudio Guarnieri. Un « défaut » corrigé en 2019. On apprend que l’entreprise israélienne utilise désormais une faille de l’application WhatsApp. Aujourd’hui, plus aucune action de l’utilisateur n’est nécessaire grâce à des redirections presque invisibles du trafic internet. Une fois l’attaque réussie, le client peut tout voir du téléphone ciblé. (...)

    #espionnage #Israel

    Loutre @loutre
    • @sinehebdo
      Dror@sinehebdo @sinehebdo 10/12/2020

      #vidéo-surveillance #surveillance #NSO #Pegasus #Mexique

      Déjà un peu abordé ici:
      ▻https://seenthis.net/messages/738370
      ►https://seenthis.net/messages/788143
      ▻https://seenthis.net/messages/795496
      ►https://seenthis.net/messages/798560

      Dror@sinehebdo @sinehebdo
    Écrire un commentaire

  • @etraces
    e-traces @etraces ART LIBRE 26/08/2020
    2
    @sinehebdo
    @loutre
    2

    With Israel’s encouragement, NSO sold spyware to UAE and other Gulf states
    ▻https://www.haaretz.com/middle-east-news/.premium-with-israel-s-encouragement-nso-sold-spyware-to-uae-and-other-gulf

    The Israeli spyware firm has signed contracts with Bahrain, Oman and Saudi Arabia. Despite its claims, NSO exercises little control over use of its software, which dictatorships can use to monitor dissidents The Israeli firm NSO Group Technologies, whose software is used to hack into cellphones, has in the past few years sold its Pegasus spyware for hundreds of millions of dollars to the United Arab Emirates and other Persian Gulf States, where it has been used to monitor anti-regime (...)

    #NSO #Pegasus #spyware #smartphone #activisme #journalisme #surveillance #écoutes

    https://img.haarets.co.il/img/1.9093744/205137843.jpg

    e-traces @etraces ART LIBRE
    • @sinehebdo
      Dror@sinehebdo @sinehebdo 27/08/2020

      #Palestine #israel #Espionnage #Illégal #Emirats_arabes_unis #Bahrein #Oman #Arabie_Saoudite #Abu_Dhabi

      Dror@sinehebdo @sinehebdo
    Écrire un commentaire

  • @nidal
    Nidal @nidal CC BY 20/08/2020
    9
    @gonzo
    @loutre
    @simplicissimus
    @sinehebdo
    @kassem
    @biggrizzly
    @7h36
    @colporteur
    @nicolas2
    9

    Ça m’avait échappé : Gérard Araud a « rejoint » NSO Group en septembre 2019 :
    ▻https://twitter.com/oliviertesquet/status/1227555925977899010
    (tout le thread sur NSO est intéressant par ailleurs) :

    Au passage, pour son rôle de conseiller auprès du marchand d’armes numériques israélien (que j’avais relevé ici en octobre dernier), Gérard Araud, l’ancien ambassadeur de France aux Etats-Unis, est en majesté dans la presse du jour... (@canardenchaine & @Le_Figaro)

    https://pbs.twimg.com/media/EQknmfHW4AER-P9?format=jpg&name=medium#.jpg https://pbs.twimg.com/media/EQknmggX0AADtJn?format=jpg&name=medium#.jpg

    Nidal @nidal CC BY
    • @sinehebdo
      Dror@sinehebdo @sinehebdo 20/08/2020

      #Palestine #israel #NSO #Pegasus #surveillance #WhatsApp #Espionnage #Illégal #France #Gérard_Araud #Richard_Attias #Nicolas_Sarkozy #Emmanuel_Macron #Mohammed_Ben_Salman #Arabie_Saoudite #MBS

      Dror@sinehebdo @sinehebdo
    • @loutre
      Loutre @loutre 20/08/2020

      L’ancien ambassadeur Gérard Araud est-il employé par une entreprise israélienne accusée d’espionnage sur WhatsApp ?
      Par Jacques Pezet 31 octobre 2019
      ▻https://www.liberation.fr/checknews/2019/10/31/l-ancien-ambassadeur-gerard-araud-est-il-employe-par-une-entreprise-israe

      ▻https://twitter.com/GerardAraud/status/1189588294612504576

      Loutre @loutre
    Écrire un commentaire

  • @etraces
    e-traces @etraces ART LIBRE 4/08/2020

    Comment le Togo a utilisé le logiciel israélien Pegasus pour espionner des religieux catholiques et des opposants
    ▻https://www.lemonde.fr/afrique/article/2020/08/03/au-togo-un-espion-dans-les-smartphones_6048023_3212.html

    Selon une enquête menée par « Le Monde » et « The Guardian », le régime togolais a utilisé un logiciel ultra-sophisitiqué pour cibler des religieux catholiques, des militants de la société civile et des opposants politiques. A ses paroissiens de Kpalimé, ville agricole du sud-ouest du Togo, Mgr Benoît Alowonou aime répéter que « Dieu connaît la vérité du cœur ». Pas tout à fait les secrets qui intéressent le régime togolais ; lui « connaît » jusqu’au contenu du smartphone de l’homme de foi. Selon une enquête (...)

    #NSO #Pegasus #smartphone #spyware #activisme #écoutes #hacking #surveillance

    https://img.lemde.fr/2020/08/03/178/0/4928/2461/1440/720/60/0/fab5684_128296338-000_1OY3L4.jpg

    e-traces @etraces ART LIBRE
    Écrire un commentaire

  • @etraces
    e-traces @etraces ART LIBRE 4/08/2020

    WhatsApp spyware attack : senior clergymen in Togo among activists targeted
    ▻https://www.theguardian.com/technology/2020/aug/03/senior-clergymen-among-activists-targeted-by-spyware

    Bishop from Togo among 1,400 individuals alerted by WhatsApp to malware attack A prominent Catholic bishop and a priest in Togo have been told they were targeted by spyware made by the private surveillance firm NSO Group, in the first known case of its kind involving members of the clergy. A joint investigation by the Guardian and the French newspaper Le Monde can reveal that Bishop Benoît Alowonou and five other critics of Togo’s repressive government were alerted by WhatsApp last year (...)

    #WhatsApp #NSO #Pegasus #spyware #activisme #écoutes #hacking

    ▻https://i.guim.co.uk/img/media/3f0dba84b7baa6098307e323e15388bb4f5168dc/0_0_1578_947/master/1578.jpg

    e-traces @etraces ART LIBRE
    Écrire un commentaire

  • @sinehebdo
    Dror@sinehebdo @sinehebdo 30/07/2020

    Une entreprise émiratie conclut un marché avec les géants israéliens de l’armement
    Tamara Nassar, Electronic Intifada, le 22 juillet 2020
    ▻https://agencemediapalestine.fr/blog/2020/07/24/une-entreprise-emiratie-conclut-un-marche-avec-les-geants-israe

    L’enquête de Marczak a découvert que Group 42 était impliqué dans la création de l’appli de messagerie ToTok.

    Google et Apple ont retiré ToTok de leurs réserves en décembre dernier craignant entre autres que les utilisateurs de l’appli soient susceptibles de voir leurs messages et leurs conversations contrôlés par le gouvernement des EAU.

    ToTok était très populaire dans les Emirats parce qu’il servait d’alternative gratuite aux applis de messagerie mondiales, FaceTime, WhatsApp et Skype, parce qu’elles sont restreintes par le gouvernement et ne permettent pas les appels.

    #israel #Emirats_Arabes_Unis #Group_42 #DarkMatter_Group #Unit_8200 #Pegasus_LLC #PAX_AI #NSO #ToTok #Israel_Aerospace_Industries #Rafael_Advanced_Defense_Systems #complicité #boycott #BDS

    Dror@sinehebdo @sinehebdo
    Écrire un commentaire

  • @etraces
    e-traces @etraces ART LIBRE 20/07/2020
    2
    @gonzo
    @sinehebdo
    2

    Logiciel espion : les procédures judiciaires se multiplient contre NSO Group
    ▻https://www.lemonde.fr/pixels/article/2020/07/17/logiciel-espion-les-procedures-judiciaires-se-multiplient-contre-nso-group_6

    En Espagne, Podemos demande l’ouverture d’une enquête parlementaire à la suite de révélations concernant l’espionnage d’indépendantistes catalans. Pablo Iglesias, le secrétaire général du parti Podemos et membre du gouvernement espagnol, a réclamé ce 16 juillet l’ouverture d’une enquête parlementaire sur la surveillance électronique ayant visé plusieurs militants du mouvement indépendantiste catalan. Le Guardian et El Pais avaient révélé, en début de semaine, qu’au moins trois indépendantistes catalans, dont (...)

    #NSO #Facebook #WhatsApp #algorithme #Pegasus #smartphone #spyware #activisme #journalisme #écoutes #hacking (...)

    ##surveillance

    https://img.lemde.fr/2019/06/24/279/1/1798/898/1440/720/60/0/8044234_Um3vafKsn1QvF06lv__a_h0_.jpg

    e-traces @etraces ART LIBRE
    • @sinehebdo
      Dror@sinehebdo @sinehebdo 20/07/2020

      #Palestine #israel #Espionnage #Illégal

      Dror@sinehebdo @sinehebdo
    Écrire un commentaire

  • @etraces
    e-traces @etraces ART LIBRE 19/07/2020

    US, UK, Interpol give Ghana phone hacking tools, raising journalist concerns on safety and confidentiality
    ▻https://cpj.org/2020/07/us-uk-interpol-give-ghana-phone-hacking-tools-raising-journalist-concerns-on-sa

    In May 2019, senior members of Ghana’s law enforcement posed for photos with the U.S. ambassador to their country at a ceremonyExternal link in the capital, Accra. Between them they held boxes and bags, gifts from the U.S. government to Ghana which, according to one of the recipients, contained Israeli phone hacking technology. That recipient was Maame Yaa Tiwaa Addo-Danquah, then-director general of the Ghana police’s criminal investigation departmentExternal link. In May 2020, she spoke to (...)

    #Cellebrite #Interpol #IBM #NSO #algorithme #smartphone #spyware #activisme #journalisme #surveillance #écoutes #hacking (...)

    ##CPJ

    https://cpj.org/wp-content/uploads/2020/07/Ghana-hacking-photo-1-Police-receive-Cellebrite-from-US-Source_-US-Embassy-youtube.png

    e-traces @etraces ART LIBRE
    Écrire un commentaire

  • @etraces
    e-traces @etraces ART LIBRE 19/07/2020

    Israeli court dismisses Amnesty’s petition against spyware firm NSO
    ▻https://www.reuters.com/article/us-cyber-nso-group-amnesty/israeli-court-dismisses-amnestys-petition-against-spyware-firm-nso-idUSKCN2

    JERUSALEM (Reuters) - An Israeli court has dismissed Amnesty International’s legal bid to stop NSO Group from exporting surveillance software, saying the rights organization did not prove NSO’s technology had been used to spy on its members. Amnesty alleged that governments around the world have used the Israeli company’s cellphone-hacking software, Pegasus, to crack down on activists, and petitioned to get NSO’s export license revoked. A Tel Aviv District Court judge, however, found Amnesty (...)

    #NSO #algorithme #Pegasus #smartphone #spyware #activisme #journalisme #procès #écoutes #hacking #surveillance (...)

    ##Amnesty

    https://s4.reutersmedia.net/resources_v2/images/rcom-default.png

    e-traces @etraces ART LIBRE
    Écrire un commentaire

  • @kassem
    Kassem @kassem CC BY-NC-SA 18/07/2020
    4
    @ericw
    @sinehebdo
    @gonzo
    @loutre
    4

    #Deepfake used to attack activist couple shows new disinformation frontier - Reuters
    ▻https://www.reuters.com/article/us-cyber-deepfake-activist-idUSKCN24G15E

    https://s3.reutersmedia.net/resources/r/?m=02&d=20200715&t=2&i=1525792093&w=1200&r=LYNXNPEG6E0L5#.jpg

    Kassem @kassem CC BY-NC-SA
    • @sinehebdo
      Dror@sinehebdo @sinehebdo 18/07/2020

      #Palestine #israel #NSO #surveillance #attaques #sionisme

      Dror@sinehebdo @sinehebdo
    • @gonzo
      gonzo @gonzo CC BY-NC 18/07/2020

      Terrifiant !...

      gonzo @gonzo CC BY-NC
    Écrire un commentaire

  • @sinehebdo
    Dror@sinehebdo @sinehebdo 15/07/2020
    3
    @kassem
    @loutre
    @gonzo
    3

    #Amnesty_International déboutée par un tribunal israélien pour son procès contre le groupe NSO :

    Israël continuera d’exporter ses systèmes d’espionnage
    Nicolas Barotte, La Figaro, le 14 juillet 2020
    ▻https://www.lefigaro.fr/international/israel-continuera-d-exporter-ses-systemes-d-espionnage-20200714

    NSO l’a échappé belle. Cette firme israélienne connue de tous les services de renseignement dans le monde et à la réputation sulfureuse est sortie victorieuse d’une bataille juridique engagée notamment par Amnesty International. Un tribunal de Tel-Aviv a rejeté la demande présentée par l’ONG d’annuler les permis d’exportation délivrés par le ministère de la Défense israélien à cette firme privée.

    #Palestine #israel #NSO #Pegasus #surveillance #WhatsApp #Espionnage #Illégal

    Dror@sinehebdo @sinehebdo
    Écrire un commentaire

  • @etraces
    e-traces @etraces ART LIBRE 14/07/2020
    2
    @arno
    @sinehebdo
    2

    Phone of top Catalan politician ’targeted by government-grade spyware’
    ▻https://www.theguardian.com/world/2020/jul/13/phone-of-top-catalan-politician-targeted-by-government-grade-spyware

    Exclusive : Guardian and El País find regional speaker was targeted in ‘possible domestic political espionage’ One of Catalonia’s most senior politicians has been warned his mobile phone was targeted using spyware its makers say is only sold to governments to track criminals and terrorists. A joint investigation by the Guardian and El País has revealed that the speaker of the Catalan regional parliament, Roger Torrent and at least two other pro-independence supporters were told they were (...)

    #Pegasus #smartphone #spyware #activisme #écoutes #hacking #surveillance

    ▻https://i.guim.co.uk/img/media/c979cd1e8f761c8c0e6b38bc64b6791806eef185/1387_1224_2360_1416/master/2360.jpg

    e-traces @etraces ART LIBRE
    • @sinehebdo
      Dror@sinehebdo @sinehebdo 15/07/2020

      Des militants catalans visés par un logiciel espion ultraperfectionné
      Damien Leloup, Le Monde, le 14 juillet 2020
      ▻https://seenthis.net/messages/867172

      #Palestine #israel #NSO #Pegasus #surveillance #WhatsApp #Espagne #Catalogne #Députés #Militants #Espionnage #Illégal

      Dror@sinehebdo @sinehebdo
    Écrire un commentaire

  • @sinehebdo
    Dror@sinehebdo @sinehebdo 14/07/2020
    1
    @etraces
    1

    Des militants catalans visés par un logiciel espion ultraperfectionné
    Damien Leloup, Le Monde, le 14 juillet 2020
    ▻https://www.lemonde.fr/pixels/article/2020/07/14/des-militants-catalans-vises-par-un-logiciel-espion-ultraperfectionne_604613

    M. Torrent a été prévenu de la campagne l’ayant ciblé directement par WhatsApp. L’entreprise américaine a découvert à la mi-2019 l’existence d’une faille de sécurité dans son logiciel, qui était utilisée par l’entreprise israélienne NSO Group pour installer, à l’insu des utilisateurs, de puissants logiciels espions sur leurs téléphones. Cette faille est notamment suspectée d’avoir permis la mise sur écoute du téléphone du multimilliardaire Jeff Bezos ou du journaliste Jamal Khashoggi, assassiné dans le consulat d’Arabie saoudite à Istanbul en 2019.

    #Palestine #israel #NSO #Pegasus #surveillance #WhatsApp #Espagne #Catalogne #Députés #Militants #Espionnage #Illégal

    Dror@sinehebdo @sinehebdo
    Écrire un commentaire

  • @etraces
    e-traces @etraces ART LIBRE 22/06/2020

    VIDEO. Amnesty International soupçonne le pouvoir marocain d’avoir espionné un journaliste d’investigation à l’aide du logiciel Pegasus
    ▻https://www.francetvinfo.fr/monde/afrique/maroc/video-amnesty-international-soupconne-le-pouvoir-marocain-davoir-espion

    Un rapport d’Amnesty International que la Cellule investigation de Radio France révèle lundi avec l’organisation Forbidden Stories établit qu’un journaliste d’investigation marocain a été victime d’une attaque de Pegasus. Ce logiciel espion, qui permet de prendre le contrôle des smartphones, serait utilisé par plusieurs régimes autoritaires. Pegasus a-t-il encore été utilisé à des fins de surveillance politique ? C’est la conviction de l’ONG Amnesty International qui vient de rédiger un rapport, révélé (...)

    #NSO #iPhone #Pegasus #smartphone #spyware #activisme #journalisme #écoutes #hacking #surveillance (...)

    ##Amnesty

    https://www.francetvinfo.fr/image/75s1c75lp-2a9b/908/510/21718479.png

    e-traces @etraces ART LIBRE
    Écrire un commentaire

  • @etraces
    e-traces @etraces ART LIBRE 22/06/2020
    3
    @loutre
    @etraces
    @sinehebdo
    3

    Un journaliste marocain victime d’attaques par injection réseau au moyen d’outils conçus par NSO Group
    ►https://www.amnesty.org/fr/latest/research/2020/06/moroccan-journalist-targeted-with-network-injection-attacks-using-nso-group

    Résumé En octobre 2019, Amnesty International a publié un premier rapport sur l’utilisation d’un logiciel espion produit par l’entreprise israélienne NSO Group en vue de cibler des défenseurs des droits humains marocains, Maati Monjib et Abdessadak El Bouchattaoui. À l’issue des investigations qu’a continué de mener Security Lab, l’équipe de spécialistes de la sécurité numérique de l’organisation, Amnesty International a mis au jour d’autres éléments similaires révélant qu’Omar Radi, journaliste et (...)

    #NSO #iPhone #Pegasus #smartphone #spyware #journalisme #écoutes #surveillance #Amnesty

    https://www.amnesty.org:443/remote.axd/aineupstrmediaprd.blob.core.windows.net/media/21474/man-holding-phone.jpg

    e-traces @etraces ART LIBRE
    • @loutre
      Loutre @loutre 22/06/2020

      Le Maroc soupçonné d’utiliser le logiciel espion Pegasus pour surveiller ses opposants
      22/06/2020 (mis à jour à 09:07)
      Par Sylvain Tronchet et Cellule investigation de Radio France
      ▻https://www.franceculture.fr/geopolitique/le-maroc-soupconne-dutiliser-le-logiciel-espion-pegasus-pour-surveille

      Loutre @loutre
    • @sinehebdo
      Dror@sinehebdo @sinehebdo 22/06/2020

      Plus d’infos là :

      La technologie israélienne au service de l’espionnage des journalistes marocains
      Phineas Rueckert et Cécile Schilis-Gallego, le 22 juin 2020
      ▻https://seenthis.net/messages/862320

      #Palestine #israel #NSO #Pegasus #surveillance #WhatsApp

      Dror@sinehebdo @sinehebdo
    Écrire un commentaire

0 | 25 | 50 | 75

Thèmes liés

  • #nso
  • #surveillance
  • #pegasus
  • #spyware
  • #écoutes
  • #smartphone
  • #activisme
  • #israel
  • #journalisme
  • #hacking
  • #whatsapp
  • #palestine
  • #citizenlab
  • #algorithme
  • #facebook
  • #sécuritaire
  • #jamal_khashoggi
  • #iphone
  • company: nso group
  • #géolocalisation
  • #amnesty
  • #exportation
  • #apple
  • #malware
  • #google
  • #verint
  • #santé
  • #mexique
  • #arabie_saoudite
  • #illégal
  • #espionnage
  • company: pegasus
  • #vidéo-surveillance
  • #candiru
  • #microsoft
  • #anyvision_interactive_technologies
  • #anyvision
  • #citizen_lab
  • technology: smartphone
  • #amazon