Israeli technologies in particular have a good reputation with Mexican officials. „In Mexico, it’s typical for the security and intelligence community to think that Israel has the most advanced technologies and the best techniques for civilian and military training,“ said Paloma Mendoza Cortés, analyst and consultant on national security issues.
In an age of ubiquitous technology and strong encryption, such “lawful hacking” has emerged as a powerful tool for public safety when law enforcement needs access to data. NSO insists that the vast majority of its customers are European democracies, although since it doesn’t release client lists and the countries themselves remain silent, that has never been verified.
The Israeli company has signed contracts with Bahrain, Oman and Saudi Arabia.
Israeli cyber espionage company NSO provided tools that helped the Moroccan regime track a local journalist named Omar Radi, according to a thorough investigation that human rights organization Amnesty International conducted over the past few months. The report was released on Monday.
The espionage against Radi began only a few days after NSO ostensibly committed itself to a new policy of transparency in keeping with the United Nations’ human rights guidelines for companies, according to the Amnesty investigation.
Das Programm, das auf sein Handy gespielt worden sein soll, soll laut Amnesty-Analyse von der israelischen Firma NSO stammen und nennt sich „Pegasus“. Mithilfe der Software ist es möglich, jegliche Kommunikation eines Mobiltelefons mitzuschneiden – egal, ob es sich dabei um Telefonate, SMS oder E-Mails handelt. Offiziell wird die NSO-Software zur Jagd auf Verbrecher und Terroristen eingesetzt.
The tech giant’s counsel filed a response to NSO’s move for dismissal that included two IP addresses and a handful of websites it claims were used by NSO Group to attack WhatsApp users in spring 2019. One was hosted by Amazon Web Services in the U.S., the others by Californian company QuadraNet and a German provider.
According to WhatsApp’s filing, NSO gained “unauthorised access” to its servers by reverse-engineering the messaging app and then evading the company’s security features that prevent manipulation of the company’s call features. One WhatsApp engineer who investigated the hacks said in a sworn statement submitted to the court that in 720 instances, the IP address of a remote server was included in the malicious code used in the attacks. The remote server, the engineer said, was based in Los Angeles and owned by a company whose data centre was used by NSO.
NSO also claimed that it and Q Cyber are entitled to immunity because they operate in the service of foreign countries. Facebook claims that the Israeli companies are not entitled to such immunity under U.S. law.
Auch auf dem Smartphone des in Istanbul ermordeten saudiarabischen Journalisten Dschamal Kashoggi wurde der NSO-Trojaner gefunden. Dafür hatte NSO die Übertragungsprotokolle von WhatsApp angegriffen, so die Klage. In Israel hingegen wird NSO-Software gerade zur Smartphone-Überwachung gegen die Verbreitung des Coronavirus vom Inlandsgeheimdienst Shin Bet eingesetzt.
The sources stressed that the Saudi intelligence services have sought to obtain advanced spyware in order to trace the Kingdom’s citizens – both in the country and abroad – amidst increasing criticism of the Saudi royal family.
Saudi Arabia therefore reached out to the Israeli market and struck a deal worth $300m with representatives of Israeli firms, the sources said, adding that both sides met and reached the deal in UK capital London.
– Amnesty International have filed a lawsuit in Israel following the WhatsApp hack
– Amnesty have accused NSO of not giving due diligence in selling their product
– This week WhatsApp said NSO’s spyware software was used in a security breach
– WhatsApp said the attack may have been launched against human rights groups
Amnesty International is supporting a legal action to take the Israeli Ministry of Defence (MoD) to court, to demand that it revokes the export license of NSO Group, an Israeli company whose spyware products have been used in chilling attacks on human rights defenders around the world.
In a petition to be filed tomorrow at the District Court of Tel Aviv, approximately 30 members and supporters of Amnesty International Israel and others from the human rights community set out how the MoD has put human rights at risk by allowing NSO to continue exporting its products.
An Israeli firm accused of supplying tools for spying on human-rights activists and journalists now faces claims that its technology can use a security hole in WhatsApp, the messaging app used by 1.5 billion people, to break into the digital communications of iPhone and Android phone users.
Security researchers said they had found so-called spyware — designed to take advantage of the WhatsApp flaw — that bears the characteristics of technology from the company, the NSO Group.
Unabhängig davon, ob ein Anruf angenommen wird oder nicht, kann allein schon mit dem Versuch eines Verbindungsaufbaus der Exploit-Code übermittelt werden, so dass sich die Malware installieren lässt.
Eine Schad-Software, die diesen Bug bereits aktiv ausnutzt, ist ein Staatstrojaner namens Pegasus. Dieser wird von der israelischen Firma NSO Group entwickelt und an verschiedene staatliche Behörden lizenziert.
WhatsApp told the Financial Times, which broke the story, that „the attack has all the hallmarks of a private company known to work with governments to deliver spyware that reportedly takes over the functions of mobile phone operating systems. We have briefed a number of human rights organizations to share the information we can, and to work with them to notify civil society.“
On Monday, Amnesty International said it was backing legal action against the Israeli Ministry of Defence demanding that it revokes NSO Group’s export licence. Danna Ingleton, deputy director of Amnesty Tech, said: ‘NSO Group sells its products to governments who are known for outrageous human rights abuses, giving them the tools to track activists and critics.’
An Israeli company licenses software around the world that can crack just about any smartphone, but is its use always on the side of good?
Hulio’s company, worth hundreds of millions of dollars, first made global headlines in 2016 when its tools were used by the authoritarian government of the UAE in order to spy on Ahmed Mansoor, an award-winning human rights activist. The company has never fully addressed the spying; Mansoor currently sits, untried and unable to regularly contact his family, in an unidentified prison somewhere in the UAE on charges of criticizing the UAE government.
The spotlight did not dissuade the company. Instead, it served as an advertisement to other authoritarian governments about NSO Group’s exceptional ability …
Saudi dissident Omar Abdulaziz, who lives in Canada, has filed a lawsuit against an Israeli technology company called the NSO Group accusing it of providing the Saudi government with the surveillance software to spy on him and his friends — including Jamal Khashoggi. The program, known as Pegasus, not only allows the monitoring of all communications from a phone — all texts, all emails, all phone calls — but can also hijack a mobile phone’s microphone and camera to turn it into a surveillance device.
Before NSO helped the Saudi government track its adversaries outside the kingdom, and helped the Mexican government hunt drug kingpins, and earned hundreds of millions of dollars working for dozens of countries on six continents, the company consisted of two high school friends in northern Israel with one relatively mundane idea.
Using technology developed by graduates of Intelligence Unit 8200 — Israel’s equivalent of the N.S.A.— Shalev Hulio and Omri Lavie started a company in 2008 that allowed cellphone firms to gain remote access to their customers’ devices to perform maintenance.
Word spread to Western spy services, whose operatives spotted an opportunity.
(8.10.2018) Developed by Israeli cyber company NSO Group, Pegasus sends „exploit links“ to operators‘ targets, who can then access virtually all the phone’s data and can even use the phone’s camera to spy on conversations.
(2.10.201) Agents apparently linked to the Saudi regime used spy technology from Israeli firm NSO Group Technologies to eavesdrop on a Saudi dissident in Canada, according to a report on Monday.
The Citizen Lab research group said it had “high confidence” that NSO’s Pegasus software had been used this summer to eavesdrop on a 27-year-old Saudi exile, Omar Abdulaziz.
In early June 2018, an Amnesty International staff member received a suspicious WhatsApp message in Arabic. The text contained details about an alleged protest outside the Saudi embassy in Washington D.C., followed by a link to a website. Investigations by Amnesty International’s technology team revealed that clicking the link would have, according to prior knowledge, installed “Pegasus”, a sophisticated surveillance tool developed by the Israel-based company NSO Group.
Like many other Israeli startups in the security field, NSO was founded in 2010 by three veterans of the army’s premier signals intelligence unit, 8200: Niv Carmi, Omri Lavie and Shalev Hulio. They started work on Pegasus, which remains NSO’s only product, immediately after founding the company.