Los Angeles Times

Spyware sector quietly booming

Developers in a largely unregulate­d industry are selling tools to government entities and others.

- BY RYAN GALLAGHER Gallagher writes for Bloomberg. William Turton of Bloomberg contribute­d to this report.

The alleged theft of data from the iPhone X used by billionair­e Jeff Bezos has cast an unflatteri­ng light on the swiftly growing and highly secretive cottage industry of software developers specializi­ng in digital surveillan­ce.

NSO Group and Hacking Team are among the most well-known surveillan­ce companies. Both have sold tools to law enforcemen­t agencies that are used to covertly infect targeted cellphones and computers with spyware, which can record calls, harvest text messages, take photograph­s using the device’s camera and record audio using its microphone.

But many more companies, some of them not as well known to the public, are selling similar technology across the globe, as part of an industry that isn’t well understood and often subject to minimal regulation or oversight. The hack of Bezos’ phone has renewed calls from some officials for a moratorium on sales until more rigorous global controls are enacted.

“This industry seems to just keep growing,” said Eric Kind, director of AWO, a London-based data rights law firm and consulting agency. “Ten years ago, there were just a few companies. Now there are 20 or more, aggressive­ly pitching their stuff at trade shows around the world.”

Spyware developers have maintained that they sell their technology to law enforcemen­t and intelligen­ce agencies to help catch criminals and terrorists. But as the surveillan­ce trade has grown, it has been repeatedly criticized because its technology has been used to target activists, journalist­s and most recently Bezos, the world’s richest person. Last week, it was revealed that the cellphone of the Amazon.com Inc. chief executive was allegedly compromise­d by spyware sent to him from a WhatsApp account belonging to Mohammed bin Salman, the crown prince of Saudi Arabia. The Saudi Embassy denied the allegation.

While investigat­ors haven’t identified the spyware that they suspect was used on Bezos’ iPhone, they cited NSO Group and Hacking Team as developing malware capable of such an attack. NSO has denied involvemen­t, as has Memento Labs, which acquired the Hacking Team last year.

“Companies and government­s make the argument that they need spyware tools in order to address counterter­rorism and other kinds of violent crime,” David Kaye, the United Nations special rapporteur on freedom of opinion and expression, said Thursday in an interview. “But the problem is you have no legal framework to ensure that when you sell and transfer the technology, it is actually used for those legitimate purposes and that it is used according to basic ruleof-law standards, such as surveillan­ce only according to warrants issued by a court.”

Kaye and another U.N. expert, Agnes Callamard, the special rapporteur on summary executions and extrajudic­ial killings, said last week that the allegation­s involving Bezos’ phone were “a concrete example of the harms that result from the unconstrai­ned marketing, sale and use of spyware.” Kaye described the current spyware trade as a “free for all” and, along with Callamard, called for a moratorium on the global sale and transfer of private surveillan­ce technology.

Rory Byrne, co-founder of Security First, an organizati­on that provides digital security advice to journalist­s and human rights activists, said he expected to see an uptick in episodes involving spyware as the technology spreads.

“The truth is, it’s becoming easier and easier and easier for government­s to build the capability themselves or to just buy it off the shelf,” Byrne said.

Only a few countries — including the U.K., Germany, Austria and Italy — have any kind of legal framework governing hacking by law enforcemen­t, said Ilia Siatitsa, legal officer and director of the government program at Privacy Internatio­nal. In 2016, a new law in the U.K. expanded and defined how police and spies in the country could hack devices, which it termed “equipment interferen­ce.” The tactic must be approved either by a senior police chief or a government minister and then, in most cases, additional­ly authorized by a current or former high court judge, known as a judicial commission­er.

In the U.S., the FBI has since the late 1990s been using forms of spyware to gather informatio­n on electronic communicat­ion. The FBI has since secured expanded powers to hack computers across the U.S., as long as it has obtained a search warrant from a judge to use the method.

In most countries, however, “there is not a clear picture of what government­s are permitted by law to do” in terms of hacking, Siatitsa said. “The fact is that we don’t even know which government­s are engaging in this. It’s very problemati­c. It goes against the internatio­nal human rights framework, which requires that if there’s interferen­ce with our privacy, it must be explicitly provided for by law.”

Demand for the technology has increased among law enforcemen­t agencies, which have turned to hacking as a method of spying on encrypted messages sent using popular apps such as WhatsApp, Signal and Telegram, Kind said. But other factors have made the technology appealing, too. Hacking allows law enforcemen­t and intelligen­ce agencies to maintain constant surveillan­ce on targets who frequently travel internatio­nally, Kind added.

“Hacking tools allow you to get access to all the communicat­ions on a device no matter where the target is in the world, no matter what platform they are using or who they are communicat­ing with,” Kind said. “That’s why hacking is so attractive to government­s. It’s a single tool that they can use to get access to all communicat­ions on your phone at one easy point of access.”

Italy’s GR Sistemi is among the companies that have marketed surveillan­ce technology, offering government agencies a spyware system named Dark Eagle. Company marketing brochures, which were published by Privacy Internatio­nal, say the technology could be used to hack phones and computers, providing “full intercepti­on of Skype and other encrypted communicat­ion software.” The Dark Eagle system can covertly capture images from a person’s webcam, record sent and received email, capture instant messenger conversati­ons and monitor web traffic, according to the company’s documents. The company didn’t respond to a message seeking comment.

Israel’s Wintego Systems Ltd. has offered its customers a spy tool that it claims can intercept Wi-Fi traffic, steal their login credential­s to their accounts, and extract “years of archived email, contacts, messages, calendars and more,” according to company documents. A Wintego representa­tive didn’t return messages seeking comment.

India’s ClearTrail Technologi­es, meanwhile, has marketed a system named Astra, which it describes as a “remote infection and monitoring framework” and promises “non-traceable payload delivery,” according to documents published by Privacy Internatio­nal. Once ClearTrail’s spyware is delivered to a computer or cellphone, it can gather data stored on the device, including location, screen shots, Skype calls and search history, according to the documents. The company didn’t return a message seeking comment.

Similar spyware tools have also allegedly been developed by Israel’s MerlinX, France’s Nexa Technologi­es and California-based SS8 Networks Inc., according to company profiles and research reports, and Bloomberg News found at least a dozen other companies that appear to sell similar technology. MerlinX, Nexa and SS8 didn’t returned a message seeking comment.

In recent years, some spyware developers have come under fire because their products have been sold to authoritar­ian government­s whose security agencies have used the technology to target political opponents and critics.

In 2012, for instance, Bloomberg News reported that a prominent human rights activist in Bahrain was targeted with spyware traced to the company FinFisher. In 2014, WikiLeaks used leaked documents to identify FinFisher sales worth $52 million to countries including Qatar, Bahrain, Pakistan, Vietnam, Nigeria, Singapore and Bangladesh. FinFisher, which didn’t return a message seeking comment, has previously said its technology is necessary in the fight against terrorism and serious organized crime.

Spyware sold by Israel’s NSO Group has been linked to hacks that have targeted human rights activists, journalist­s and politician­s in countries including Morocco, Saudi Arabia and Mexico. Similar technology sold by Italy’s Hacking Team has been traced to hacks on activists and journalist­s in countries including Morocco, Ethiopia and the United Arab Emirates. Both companies have said they sell their equipment to law enforcemen­t and intelligen­ce agencies to fight crime and terrorism.

“Our products are only used to investigat­e terror and serious crime,” a NSO spokesman said in a statement. Memento Labs, which acquired Hacking Team, didn’t respond to a message seeking comment. But in a post on its LinkedIn page, the company said, “Memento Labs underlines its position in condemning any misuse of hacking technologi­es and capabiliti­es, having always acted in compliance with all the relevant internatio­nal laws.”

Government­s that possess hacking technologi­es are likelier to use them to target high-profile individual­s than ordinary citizens, according to Byrne of Security First.

“You have to understand who is likely to target you,” Byrne said. “It’s important not to panic and become too paranoid.”

‘Ten years ago, there were just a few companies. Now there are 20 or more, aggressive­ly pitching their stuff at trade shows.’ — Eric Kind, director of AWO, a data rights law firm and consulting agency

 ?? Mandel Ngan AFP/Getty Images ?? JEFF BEZOS’ iPhone was allegedly compromise­d by spyware sent to him from a WhatsApp account belonging to Mohammed bin Salman, the crown prince of Saudi Arabia. The Saudi Embassy denied the allegation.
Mandel Ngan AFP/Getty Images JEFF BEZOS’ iPhone was allegedly compromise­d by spyware sent to him from a WhatsApp account belonging to Mohammed bin Salman, the crown prince of Saudi Arabia. The Saudi Embassy denied the allegation.

Newspapers in English

Newspapers from United States