{"id":5561,"date":"2021-07-25T07:56:34","date_gmt":"2021-07-25T07:56:34","guid":{"rendered":"https:\/\/umuakatimes.com\/topnews\/?p=5561"},"modified":"2021-07-25T07:56:34","modified_gmt":"2021-07-25T07:56:34","slug":"new-york-times-examines-pegasus-hacking-device","status":"publish","type":"post","link":"https:\/\/umuakatimes.com\/topnews\/new-york-times-examines-pegasus-hacking-device\/","title":{"rendered":"New York Times examines Pegasus hacking device."},"content":{"rendered":"<div class='epvc-post-count'><span class='epvc-eye'><\/span>  <span class=\"epvc-count\"> 452<\/span><span class='epvc-label'> Views<\/span><\/div><p>Dana Priest and Craig Timberg of New York Times give more details about the capabilities of Pegasus.<\/p>\n<p>Military-grade spyware licensed by an Israeli firm to governments for tracking terrorists and criminals was used in attempted and successful hacks of 37 smartphones belonging to journalists, human rights activists, business executives and two women close to murdered Saudi journalist Jamal Khashoggi, according to an investigation by The Washington Post and 16 media partners.<\/p>\n<p>The phones appeared on a list of more than 50,000 numbers that are concentrated in countries known to engage in surveillance of their citizens and also known to have been clients of the Israeli firm, NSO Group, a worldwide leader in the growing and largely unregulated private spyware industry, the investigation found.<\/p>\n<p>The list does not identify who put the numbers on it, or why, and it is unknown how many of the phones were targeted or surveilled. But forensic analysis of the 37 smartphones shows that many display a tight correlation between time stamps associated with a number on the list and the initiation of surveillance, in some cases as brief as a few seconds.<\/p>\n<p>Forbidden Stories, a Paris-based journalism nonprofit, and Amnesty International, a human rights group, had access to the list and shared it with the news organizations, which did further research and analysis. Amnesty\u2019s Security Lab did the forensic analyses on the smartphones.<\/p>\n<p>The numbers on the list are unattributed, but reporters were able to identify more than 1,000 people spanning more than 50 countries through research and interviews on four continents: several Arab royal family members, at least 65 business executives, 85 human rights activists, 189 journalists, and more than 600 politicians and government officials \u2014 including cabinet ministers, diplomats, and military and security officers. The numbers of several heads of state and prime ministers also appeared on the list.<\/p>\n<p>Among the journalists whose numbers appear on the list, which dates to 2016, are reporters working overseas for several leading news organizations, including a small number from CNN, the Associated Press, Voice of America, the New York Times, the Wall Street Journal, Bloomberg News, Le Monde in France, the Financial Times in London and Al Jazeera in Qatar.<\/p>\n<p>The targeting of the 37 smartphones would appear to conflict with the stated purpose of NSO\u2019s licensing of the Pegasus spyware, which the company says is intended only for use in surveilling terrorists and major criminals. The evidence extracted from these smartphones, revealed here for the first time, calls into question pledges by the Israeli company to police its clients for human rights abuses.<\/p>\n<p>The media consortium, titled the Pegasus Project, analyzed the list through interviews and forensic analysis of the phones, and by comparing details with previously reported information about NSO. Amnesty\u2019s Security Lab examined 67 smartphones where attacks were suspected. Of those, 23 were successfully infected and 14 showed signs of attempted penetration.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-5562\" src=\"http:\/\/umuakatimes.com\/topnews\/wp-content\/uploads\/2021\/07\/11-1.png\" alt=\"\" width=\"628\" height=\"421\" srcset=\"https:\/\/umuakatimes.com\/topnews\/wp-content\/uploads\/2021\/07\/11-1.png 628w, https:\/\/umuakatimes.com\/topnews\/wp-content\/uploads\/2021\/07\/11-1-300x201.png 300w\" sizes=\"(max-width: 628px) 100vw, 628px\" \/><\/p>\n<p>For the remaining 30, the tests were inconclusive, in several cases because the phones had been replaced. Fifteen of the phones were Android devices, none of which showed evidence of successful infection. However, unlike iPhones, Androids do not log the kinds of information required for Amnesty\u2019s detective work. Three Android phones showed signs of targeting, such as Pegasus-linked SMS messages.<\/p>\n<p>Amnesty shared backup copies of data on four iPhones with Citizen Lab, which confirmed that they showed signs of Pegasus infection. Citizen Lab, a research group at the University of Toronto that specializes in studying Pegasus, also conducted a peer review of Amnesty\u2019s forensic methods and found them to be sound.<\/p>\n<p>In lengthy responses before publication, NSO called the investigation\u2019s findings exaggerated and baseless. It also said it does not operate the spyware licensed to its clients and \u201chas no insight\u201d into their specific intelligence activities.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-5564\" src=\"http:\/\/umuakatimes.com\/topnews\/wp-content\/uploads\/2021\/07\/10.jpg\" alt=\"\" width=\"667\" height=\"397\" srcset=\"https:\/\/umuakatimes.com\/topnews\/wp-content\/uploads\/2021\/07\/10.jpg 667w, https:\/\/umuakatimes.com\/topnews\/wp-content\/uploads\/2021\/07\/10-300x179.jpg 300w\" sizes=\"(max-width: 667px) 100vw, 667px\" \/><\/p>\n<p>After publication, NSO chief executive Shalev Hulio expressed concern in a phone interview with The Post about some of the details he had read in Pegasus Project stories Sunday, while continuing to dispute that the list of more than 50,000 phone numbers had anything to do with NSO or Pegasus.<\/p>\n<p>\u201cThe company cares about journalists and activists and civil society in general,\u201d Hulio said. \u201cWe understand that in some circumstances our customers might misuse the system and, in some cases like we reported in [NSO\u2019s] Transparency and Responsibility Report, we have shut down systems for customers who have misused the system.\u201d<\/p>\n<p>He said that in the past 12 months NSO had terminated two contracts over allegations of human rights abuses, but he declined to name the countries involved.<\/p>\n<p>\u201cEvery allegation about misuse of the system is concerning me,\u201d he said. \u201cIt violates the trust that we give customers. We are investigating every allegation.\u201d<\/p>\n<p>NSO describes its customers as 60 intelligence, military and law enforcement agencies in 40 countries, although it will not confirm the identities of any of them, citing client confidentiality obligations. The consortium found many of the phone numbers in at least 10 country clusters, which were subjected to deeper analysis: Azerbaijan, Bahrain, Hungary, India, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia and the United Arab Emirates. Citizen Lab also has found evidence that all 10 have been clients of NSO, according to Bill Marczak, a senior research fellow.<\/p>\n<p>Forbidden Stories organized the media consortium\u2019s investigation, and Amnesty provided analysis and technical support but had no editorial input. Amnesty has openly criticized NSO\u2019s spyware business and supported an unsuccessful lawsuit against the company in an Israeli court seeking to have its export license revoked. After the investigation began, several reporters in the consortium learned that they or their family members had been successfully attacked with Pegasus spyware.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>452 ViewsDana Priest and Craig Timberg of New York Times give more details about the&#8230;<\/p>\n","protected":false},"author":1,"featured_media":5563,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[46],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New York Times examines Pegasus hacking device. -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/umuakatimes.com\/topnews\/new-york-times-examines-pegasus-hacking-device\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New York Times examines Pegasus hacking device. -\" \/>\n<meta property=\"og:description\" content=\"452 ViewsDana Priest and Craig Timberg of New York Times give more details about the...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/umuakatimes.com\/topnews\/new-york-times-examines-pegasus-hacking-device\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-25T07:56:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/umuakatimes.com\/topnews\/wp-content\/uploads\/2021\/07\/12-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nnabuife\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/umuakatimes.com\/topnews\/#website\",\"url\":\"https:\/\/umuakatimes.com\/topnews\/\",\"name\":\"\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/umuakatimes.com\/topnews\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/umuakatimes.com\/topnews\/new-york-times-examines-pegasus-hacking-device\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/umuakatimes.com\/topnews\/wp-content\/uploads\/2021\/07\/12-2.png\",\"contentUrl\":\"https:\/\/umuakatimes.com\/topnews\/wp-content\/uploads\/2021\/07\/12-2.png\",\"width\":900,\"height\":600},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/umuakatimes.com\/topnews\/new-york-times-examines-pegasus-hacking-device\/#webpage\",\"url\":\"https:\/\/umuakatimes.com\/topnews\/new-york-times-examines-pegasus-hacking-device\/\",\"name\":\"New York Times examines Pegasus hacking device. -\",\"isPartOf\":{\"@id\":\"https:\/\/umuakatimes.com\/topnews\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/umuakatimes.com\/topnews\/new-york-times-examines-pegasus-hacking-device\/#primaryimage\"},\"datePublished\":\"2021-07-25T07:56:34+00:00\",\"dateModified\":\"2021-07-25T07:56:34+00:00\",\"author\":{\"@id\":\"https:\/\/umuakatimes.com\/topnews\/#\/schema\/person\/2bc6c3e39958c06697651244ed5a4962\"},\"breadcrumb\":{\"@id\":\"https:\/\/umuakatimes.com\/topnews\/new-york-times-examines-pegasus-hacking-device\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/umuakatimes.com\/topnews\/new-york-times-examines-pegasus-hacking-device\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/umuakatimes.com\/topnews\/new-york-times-examines-pegasus-hacking-device\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/umuakatimes.com\/topnews\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New York Times examines Pegasus hacking device.\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/umuakatimes.com\/topnews\/#\/schema\/person\/2bc6c3e39958c06697651244ed5a4962\",\"name\":\"Nnabuife\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/umuakatimes.com\/topnews\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/722699e00da7ed3dbbf6a91b54214edd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/722699e00da7ed3dbbf6a91b54214edd?s=96&d=mm&r=g\",\"caption\":\"Nnabuife\"},\"sameAs\":[\"http:\/\/umuakatimes.com\"],\"url\":\"https:\/\/umuakatimes.com\/topnews\/author\/gamexplay\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New York Times examines Pegasus hacking device. -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/umuakatimes.com\/topnews\/new-york-times-examines-pegasus-hacking-device\/","og_locale":"en_US","og_type":"article","og_title":"New York Times examines Pegasus hacking device. -","og_description":"452 ViewsDana Priest and Craig Timberg of New York Times give more details about the...","og_url":"https:\/\/umuakatimes.com\/topnews\/new-york-times-examines-pegasus-hacking-device\/","article_published_time":"2021-07-25T07:56:34+00:00","og_image":[{"width":900,"height":600,"url":"https:\/\/umuakatimes.com\/topnews\/wp-content\/uploads\/2021\/07\/12-2.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Nnabuife","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/umuakatimes.com\/topnews\/#website","url":"https:\/\/umuakatimes.com\/topnews\/","name":"","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/umuakatimes.com\/topnews\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/umuakatimes.com\/topnews\/new-york-times-examines-pegasus-hacking-device\/#primaryimage","inLanguage":"en-US","url":"https:\/\/umuakatimes.com\/topnews\/wp-content\/uploads\/2021\/07\/12-2.png","contentUrl":"https:\/\/umuakatimes.com\/topnews\/wp-content\/uploads\/2021\/07\/12-2.png","width":900,"height":600},{"@type":"WebPage","@id":"https:\/\/umuakatimes.com\/topnews\/new-york-times-examines-pegasus-hacking-device\/#webpage","url":"https:\/\/umuakatimes.com\/topnews\/new-york-times-examines-pegasus-hacking-device\/","name":"New York Times examines Pegasus hacking device. -","isPartOf":{"@id":"https:\/\/umuakatimes.com\/topnews\/#website"},"primaryImageOfPage":{"@id":"https:\/\/umuakatimes.com\/topnews\/new-york-times-examines-pegasus-hacking-device\/#primaryimage"},"datePublished":"2021-07-25T07:56:34+00:00","dateModified":"2021-07-25T07:56:34+00:00","author":{"@id":"https:\/\/umuakatimes.com\/topnews\/#\/schema\/person\/2bc6c3e39958c06697651244ed5a4962"},"breadcrumb":{"@id":"https:\/\/umuakatimes.com\/topnews\/new-york-times-examines-pegasus-hacking-device\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/umuakatimes.com\/topnews\/new-york-times-examines-pegasus-hacking-device\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/umuakatimes.com\/topnews\/new-york-times-examines-pegasus-hacking-device\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/umuakatimes.com\/topnews\/"},{"@type":"ListItem","position":2,"name":"New York Times examines Pegasus hacking device."}]},{"@type":"Person","@id":"https:\/\/umuakatimes.com\/topnews\/#\/schema\/person\/2bc6c3e39958c06697651244ed5a4962","name":"Nnabuife","image":{"@type":"ImageObject","@id":"https:\/\/umuakatimes.com\/topnews\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/722699e00da7ed3dbbf6a91b54214edd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/722699e00da7ed3dbbf6a91b54214edd?s=96&d=mm&r=g","caption":"Nnabuife"},"sameAs":["http:\/\/umuakatimes.com"],"url":"https:\/\/umuakatimes.com\/topnews\/author\/gamexplay\/"}]}},"views":268,"_links":{"self":[{"href":"https:\/\/umuakatimes.com\/topnews\/wp-json\/wp\/v2\/posts\/5561"}],"collection":[{"href":"https:\/\/umuakatimes.com\/topnews\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/umuakatimes.com\/topnews\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/umuakatimes.com\/topnews\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/umuakatimes.com\/topnews\/wp-json\/wp\/v2\/comments?post=5561"}],"version-history":[{"count":1,"href":"https:\/\/umuakatimes.com\/topnews\/wp-json\/wp\/v2\/posts\/5561\/revisions"}],"predecessor-version":[{"id":5565,"href":"https:\/\/umuakatimes.com\/topnews\/wp-json\/wp\/v2\/posts\/5561\/revisions\/5565"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/umuakatimes.com\/topnews\/wp-json\/wp\/v2\/media\/5563"}],"wp:attachment":[{"href":"https:\/\/umuakatimes.com\/topnews\/wp-json\/wp\/v2\/media?parent=5561"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/umuakatimes.com\/topnews\/wp-json\/wp\/v2\/categories?post=5561"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/umuakatimes.com\/topnews\/wp-json\/wp\/v2\/tags?post=5561"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}