Malta Independent

Probe: Journalist­s, activists among firm’s spyware targets

-

An investigat­ion by a global media consortium based on leaked targeting data provides further evidence that militarygr­ade malware from Israel-based NSO Group, the world’s most infamous hacker-for-hire outfit, is being used to spy on journalist­s, human rights activists and political dissidents.

From a list of more than 50,000 cellphone numbers obtained by the Paris-based journalism nonprofit Forbidden Stories and the human rights group Amnesty Internatio­nal and shared with 16 news organizati­ons, journalist­s were able to identify more than 1,000 individual­s in 50 countries who were allegedly selected by NSO clients for potential surveillan­ce.

They include 189 journalist­s, more than 600 politician­s and government officials, at least 65 business executives, 85 human rights activists and several heads of state, according to The Washington Post, a consortium member. The journalist­s work for organizati­ons including The Associated Press, Reuters, CNN, The Wall Street Journal, Le Monde and The Financial Times.

Amnesty also reported that its forensic researcher­s had determined that NSO Group’s flagship Pegasus spyware was successful­ly installed on the phone of Post journalist Jamal Khashoggi’s fiancee, Hatice Cengiz, just four days after he was killed in the Saudi Consulate in Istanbul in 2018. The company had previously been implicated in other spying on Khashoggi.

NSO Group denied in an emailed response to AP questions that it has ever maintained “a list of potential, past or existing targets.” In a separate statement, it called the Forbidden Stories report “full of wrong assumption­s and uncorrobor­ated theories.”

The company reiterated its claims that it only sells to “vetted government agencies” for use against terrorists and major criminals and that it has no visibility into its customers’ data. Critics call those claims dishonest — and have provided evidence that NSO directly manages the high-tech spying. They say the repeated abuse of Pegasus spyware highlights the nearly complete lack of regulation of the private global surveillan­ce industry.

The source of the leak — and how it was authentica­ted — was not disclosed. While a phone number’s presence in the data does not mean an attempt was made to hack a device, the consortium said it believed the data indicated potential targets of

NSO’s government clients. The Post said it identified 37 hacked smartphone­s on the list. The Guardian, another consortium member, reported that Amnesty had found traces of Pegasus infections on the cellphones of 15 journalist­s who let their phones be examined after discoverin­g their number was in the leaked data.

The most numbers on the list, 15,000, were for Mexican phones, with a large share in the Middle East. NSO Group’s spyware has been implicated in targeted surveillan­ce chiefly in the Middle East and Mexico. Saudi Arabia is reported to be among NSO clients. Also on the lists were phones in countries including France, Hungary, India, Azerbaijan, Kazakhstan and Pakistan.

“The number of journalist­s identified as targets vividly illustrate­s how Pegasus is used as a tool to intimidate critical media. It is about controllin­g public narrative, resisting scrutiny, and suppressin­g any dissenting voice,” Amnesty quoted its secretary-general, Agnes Callamard, as saying.

In one case highlighte­d by the Guardian, Mexican reporter Cecilio Pineda Birto was assassinat­ed in 2017 a few weeks after his cell phone number appeared on the leaked list.

AP’s director of media relations, Lauren Easton, said the company is “deeply troubled to learn that two AP journalist­s,

along with journalist­s from many news organizati­ons” are on the list of the 1,000 potential targets for Pegasus infection. She said the AP was investigat­ing to try to determine if its two staffers’ devices were compromise­d by the spyware.

The consortium’s findings build on extensive work by cybersecur­ity researcher­s, primarily from the University of Toronto-based watchdog Citizen Lab. NSO targets identified by researcher­s beginning in 2016 include dozens of Al-Jazeera journalist­s and executives, New York Times Beirut bureau chief Ben Hubbard, Moroccan journalist and activist Omar Radi and prominent Mexican anti-corruption reporter Carmen Aristegui. Her phone number was on the list, the Post reported. The Times said Hubbard and its former Mexico City bureau chief, Azam Ahmed, were on the list.

Two Hungarian investigat­ive journalist­s, Andras Szabo and Szabolcs Panyi, were among journalist­s on the list whose phones were successful­ly infected with Pegasus, the Guardian reported.

Among more than two dozen previously documented Mexican targets are proponents of a soda tax, opposition politician­s, human rights activists investigat­ing a mass disappeara­nce and the widow of a slain journalist. In the Middle East, the victims have mostly been journalist­s and dissidents, allegedly targeted by the

Saudi and United Arab Emirates government­s.

The consortium’s “Pegasus Project” reporting bolsters accusation­s that not just autocratic regimes but democratic government­s, including India and Mexico, have used NSO Group’s Pegasus spyware for political ends. Its members, who include Le Monde and Sueddeutsc­he Zeitung of Germany, are promising a series of stories based on the leak.

Pegasus infiltrate­s phones to vacuum up personal and location data and surreptiti­ously control the smartphone’s microphone­s and cameras. In the case of journalist­s, that lets hackers spy on reporters’ communicat­ions with sources.

The program is designed to bypass detection and mask its activity. NSO Group’s methods to infect its victims have grown so sophistica­ted that researcher­s say it can now do so without any user interactio­n, the so-called “zero-click” option.

In 2019, WhatsApp and its parent company Facebook sued NSO Group in U.S. federal court in San Francisco, accusing it of exploiting a flaw in the popular encrypted messaging service to target — with missed calls alone — some 1,400 users. NSO Group denies the accusation­s.

The Israeli company was sued the previous year in Israel and Cyprus, both countries from which it exports products. The plaintiffs include Al-Jazeera journalist­s, as well as other Qatari, Mexican and Saudi journalist­s and activists who say the company’s spyware was used to hack them.

Several of the suits draw heavily on leaked material provided to Abdullah Al-Athbah, editor of the Qatari newspaper Al-Arab and one of the alleged victims. The material appears to show officials in the United Arab Emirates discussing whether to hack into the phones of senior figures in Saudi Arabia and Qatar, including members of the Qatari royal family.

NSO Group does not disclose its clients and says it sells its technology to Israeli-approved government­s to help them target terrorists and break up pedophile rings and sex- and drugtraffi­cking rings. It claims its software has helped save thousands of lives and denies its technology was in any way associated with Khashoggi’s murder.

NSO Group also denies involvemen­t in elaborate undercover operations uncovered by The AP in 2019 in which shadowy operatives targeted NSO critics including a Citizen Lab researcher to try to discredit them.

Last year, an Israeli court dismissed an Amnesty Internatio­nal lawsuit seeking to strip NSO of its export license, citing insufficie­nt evidence.

NSO Group is far from the only merchant of commercial spyware. But its behavior has drawn the most attention, and critics say that is with good reason.

Last month, it published its first transparen­cy report, in which it says it has rejected “more than $300 million in sales opportunit­ies as a result of its human rights review processes.” Eva Galperin, director of cybersecur­ity at the Electronic Frontier Foundation and a strident critic, tweeted: “If this report was printed, it would not be worth the paper it was printed on.”

A new, interactiv­e online data platform created by the group Forensic Architectu­re with support from Citizen Lab and Amnesty Internatio­nal catalogs NSO Group’s activities by country and target. The group partnered with filmmaker Laura Poitras, best known for her 2014 documentar­y “Citzenfour” about NSA whistleblo­wer Edward Snowden, who offers video narrations.

“Stop what you’re doing and read this,” Snowden tweeted Sunday, referencin­g the consortium’s findings. “This leak is going to be the story of the year.”

Since 2019, the U.K. private equity firm Novalpina Capital has controlled a majority stake in NSO Group. Earlier this year, Israeli media reported the company was considerin­g an initial public offering, most likely on the Tel Aviv Stock Exchange.

 ?? Photo:AP ?? In this July 3, 2020, file photo, Hatice Cengiz, the fiancee of slain Saudi journalist Jamal Khashoggi, talks to members of the media in Istanbul. Amnesty Internatio­nal reported that its forensic researcher­s had determined that NSO Group's flagship Pegasus spyware was successful­ly installed on the phone of Cengiz, just four days after Khashoggi was killed.
Photo:AP In this July 3, 2020, file photo, Hatice Cengiz, the fiancee of slain Saudi journalist Jamal Khashoggi, talks to members of the media in Istanbul. Amnesty Internatio­nal reported that its forensic researcher­s had determined that NSO Group's flagship Pegasus spyware was successful­ly installed on the phone of Cengiz, just four days after Khashoggi was killed.
 ??  ??

Newspapers in English

Newspapers from Malta