<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>🎖️🪖Military Tech🤖 Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<atom:link href="https://goodshepherdmedia.net/category/truthful-news/tech/military-technology/feed/" rel="self" type="application/rss+xml" />
	<link>https://goodshepherdmedia.net/category/truthful-news/tech/military-technology/</link>
	<description>Christian, Political, ‎‏‏‎Social &#38; Legal Free Speech News &#124; Ⓒ2024 Good News Media LLC &#124; Shepherd for the Herd! God 1st Programming</description>
	<lastBuildDate>Tue, 16 Sep 2025 05:51:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://goodshepherdmedia.net/wp-content/uploads/2023/08/Good-Shepherd-News-Logo-150x150.png</url>
	<title>🎖️🪖Military Tech🤖 Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<link>https://goodshepherdmedia.net/category/truthful-news/tech/military-technology/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>PATRIOT Act Author The NSA Is Actively Violating The Law</title>
		<link>https://goodshepherdmedia.net/patriot-act-author-the-nsa-is-actively-violating-the-law/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Tue, 16 Sep 2025 05:51:38 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[14th Amendment]]></category>
		<category><![CDATA[1st Amendment]]></category>
		<category><![CDATA[4th Amendment]]></category>
		<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Corruption Over the Years]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Legal News The Motivation]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Rights]]></category>
		<category><![CDATA[Science & Engineering]]></category>
		<category><![CDATA[Supreme Court - SCOTUS]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[PATRIOT Act]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21927</guid>

					<description><![CDATA[PATRIOT Act Author: The NSA Is Actively Violating The Law Jim Sensenbrenner (R-WI), the author of the original USA PATRIOT Act, disagrees. In a amicus brief filed in support of the American Civil Liberties Union&#8217;s lawsuit against the National Security Agency&#8217;s bulk collection of U.S. phone records, Sensenbrenner argues that the government has gone far beyond what the legislation authorizes. [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="headline heading-xl ">PATRIOT Act Author: The NSA Is Actively Violating The Law</h1>
<p>Jim Sensenbrenner (R-WI), the author of the original USA PATRIOT Act, disagrees.</p>
<p>In a amicus brief filed in support of the American Civil Liberties Union&#8217;s lawsuit against the National Security Agency&#8217;s bulk collection of U.S. phone records, Sensenbrenner argues that the government has gone far beyond what the legislation authorizes.</p>
<p class="p1">Section 215, known as the business records provision, authorizes intelligence agencies to apply for information if &#8220;the records are relevant to an ongoing foreign intelligence investigation.&#8221;</p>
<p class="p1">In practice, the NSA uses section 215 to collect data pertaining to every phone call to, from, and within the U.S. in the name of combating terrorism.</p>
<p class="p1">Sensenbrenner and the other members of Congress who enacted Section 215 &#8220;did not intend to authorize the program at issue in this lawsuit or any program of a comparable scope,&#8221; according to the brief.</p>
<p class="p1">The brief goes on to propose this question (emphasis ours):</p>
<p class="p1">The NSA is gathering on a daily basis the details of every call that every American makes, as well as every call made by foreigners to or from the United States. <strong>How can every call that every American makes or receives be relevant to a specific investigation?</strong>&#8220;</p>
<p class="p1">Filed by the Electronic Frontier Foundation, the brief notes that Sensenbrenner &#8220;was not aware of the full scope of the program when he voted to reauthorize Section 215&#8221; and would have voted against it if he had known.</p>
<p class="p1">In Sensenbrenner&#8217;s words: &#8220;The suggestion that the administration can violate the law because Congress failed to object is outrageous. But let them be on notice: I am objecting right now.&#8221;  <a href="https://www.businessinsider.com/patriot-act-author-nsa-abused-its-power-2013-9">source</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Detecting IMSI Catchers: Tools, Apps and Methods You Should Know</title>
		<link>https://goodshepherdmedia.net/detecting-imsi-catchers-tools-apps-and-methods-you-should-know/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 25 Aug 2025 21:49:26 +0000</pubDate>
				<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[Home Defense / Safety]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Phone Hacks]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[Apps and Methods You Should Know]]></category>
		<category><![CDATA[Cell-site simulators]]></category>
		<category><![CDATA[Detecting IMSI Catchers: Tools]]></category>
		<category><![CDATA[IMSI Catcher]]></category>
		<category><![CDATA[imsi catchers]]></category>
		<category><![CDATA[IMSI catchers: a security threat]]></category>
		<category><![CDATA[Stingray phone tracker]]></category>
		<category><![CDATA[Understanding How IMSI-Catchers Exploit Cell Networks]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21336</guid>

					<description><![CDATA[Detecting IMSI Catchers: Tools, Apps and Methods You Should Know An IMSI-catcher is a device that intercepts mobile phone communications, acting as a fake cell tower to eavesdrop on calls and track location data. It&#8217;s essentially a &#8220;man-in-the-middle&#8221; attack, placing the device between the target phone and the real cell network. While some security measures exist in [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="entry-title">Detecting IMSI Catchers: Tools, Apps and Methods You Should Know</h1>
<p><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-21340" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Detecting-IMSI-Catchers-Tools-Apps-and-Methods-You-Should-Know.jpg" alt="" width="800" height="800" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/Detecting-IMSI-Catchers-Tools-Apps-and-Methods-You-Should-Know.jpg 800w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/Detecting-IMSI-Catchers-Tools-Apps-and-Methods-You-Should-Know-400x400.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/Detecting-IMSI-Catchers-Tools-Apps-and-Methods-You-Should-Know-150x150.jpg 150w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/Detecting-IMSI-Catchers-Tools-Apps-and-Methods-You-Should-Know-768x768.jpg 768w" sizes="(max-width: 800px) 100vw, 800px" /></p>
<p><span data-huuid="12916251619821288363">An IMSI-catcher is a device that intercepts mobile phone communications, acting as a fake cell tower to eavesdrop on calls and track location data. </span><span data-huuid="12916251619821288608">It&#8217;s essentially a &#8220;man-in-the-middle&#8221; attack, placing the device between the target phone and the real cell network. </span><span data-huuid="12916251619821288853">While some security measures exist in newer standards (like 3G), sophisticated attacks can bypass these, especially on older networks. </span><span data-huuid="12916251619821289098">These devices, like the <span class="M5tQyf"><strong>StingRay</strong>,</span> are used by law enforcement and intelligence agencies, but their use raises privacy and civil liberty concerns.<span class="pjBG2e" data-cid="0254da5d-6a60-4252-9748-b8be8c5ec492"><span class="UV3uM"> </span></span></span></p>
<h2>IMSI catchers: a security threat</h2>
<div id="aim-chrome-initial-inline-async-container" data-ved="2ahUKEwj5tOPnsMyOAxXsJEQIHf4cG7QQ_ZkOegYIAQgAEBQ" data-hveid="CAEIABAU">
<div data-processed="true">
<div class="CKgc1d" data-scope-id="turn" data-processed="true" data-complete="true">
<div class="Zkbeff" data-subtree="aimc" data-aimmrs="true" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQ2O0OegQIABAA" data-hveid="CAAQAA" data-processed="true" data-complete="true">
<div class="pWvJNd" data-processed="true" data-complete="true">
<div class="mZJni" data-container-id="main-col" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQ3KYQegQIABAD" data-processed="true" data-complete="true">
<div class="Y3BBE" data-hveid="CAAQEg" data-complete="true" data-processed="true">An IMSI catcher, sometimes called a Stingray, is a device that impersonates a legitimate cell tower. It works by mimicking cell tower signals and attracting nearby mobile devices, tricking them into connecting to the device instead of a genuine cell tower. Once a device connects, the IMSI catcher can capture the device&#8217;s unique identifier, the International Mobile Subscriber Identity (IMSI).<span class="" data-wiz-rootname="ohfaMd" data-complete="true" data-processed="true"><span class="vKEkVd" data-animation-atomic="" data-sae=""> <button class="rBl3me" tabindex="0" data-amic="true" data-icl-uuid="daf9ecda-6d56-4163-b71b-24f3c7686c4a" aria-label="View related links" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQye0OegQIABAT"></button></span></span></div>
<div class="Y3BBE" data-hveid="CAAQFA" data-processed="true" data-complete="true">This allows the IMSI catcher to:</div>
<ul class="U6u95" data-complete="true" data-processed="true">
<li data-hveid="CAAQFg" data-complete="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Track the device&#8217;s location</b> by analyzing the signal strength of the phone.</span></li>
<li data-hveid="CAAQFw" data-complete="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Identify and monitor activity</b>, and potentially even intercept communications, including SMS and calls, depending on the network protocol.</span><span class="" data-wiz-rootname="ohfaMd" data-complete="true"><span class="vKEkVd" data-animation-atomic="" data-sae=""> <button class="rBl3me" tabindex="0" data-amic="true" data-icl-uuid="670887ed-08de-4a8c-9ff5-7bf40ef17ffd" aria-label="View related links" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQye0OegQIABAY"></button></span></span></li>
</ul>
<div class="Y3BBE" data-hveid="CAAQGg" data-processed="true" data-complete="true">IMSI catchers can be used by law enforcement, and potentially by unauthorized actors including criminals or foreign intelligence services. The use of these devices raises significant privacy concerns due to the indiscriminate collection of data, which may include bystanders as well as targeted individuals.<span class="" data-wiz-rootname="ohfaMd" data-complete="true" data-processed="true"><span class="vKEkVd" data-animation-atomic="" data-sae=""> <button class="rBl3me" tabindex="0" data-amic="true" data-icl-uuid="54c6456f-6f79-45d6-8c0f-760c83c9443a" aria-label="View related links" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQye0OegQIABAb"></button></span></span></div>
<div class="Fsg96" data-processed="true" data-complete="true"></div>
<div class="otQkpb" role="heading" aria-level="3" data-processed="true" data-complete="true">Potential threats</div>
<ul class="U6u95" data-complete="true" data-processed="true">
<li data-hveid="CAAQHQ" data-complete="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Location Tracking:</b> IMSI catchers can track a phone&#8217;s location and movements.</span></li>
<li data-hveid="CAAQHg" data-complete="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Communication Interception:</b> Older generation networks (like 2G) are more vulnerable, allowing interception of calls and texts. While 3G, 4G, and 5G networks are more secure, some IMSI catchers can potentially force a device to downgrade to an older, less secure network.</span></li>
<li data-hveid="CAAQHw" data-complete="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Denial of Service:</b> IMSI catchers can also disrupt mobile network connectivity.</span><span class="" data-wiz-rootname="ohfaMd" data-complete="true"><span class="vKEkVd" data-animation-atomic="" data-sae=""> <button class="rBl3me" tabindex="0" data-amic="true" data-icl-uuid="b15d0dc0-c4f4-4750-be02-e68a02eaf8c9" aria-label="View related links" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQye0OegQIABAg"></button></span></span></li>
</ul>
<div class="Fsg96" data-complete="true" data-processed="true"></div>
<div class="otQkpb" role="heading" aria-level="3" data-processed="true" data-complete="true">Detection</div>
<div class="Y3BBE" data-hveid="CAAQIg" data-complete="true" data-processed="true">Detecting IMSI catchers with a smartphone alone can be difficult. Hardware-based detection systems provide a more reliable means of identification.<span class="" data-wiz-rootname="ohfaMd" data-complete="true" data-processed="true"><span class="vKEkVd" data-animation-atomic="" data-sae=""> <button class="rBl3me" tabindex="0" data-amic="true" data-icl-uuid="7d40a971-c6b4-42c0-8686-6b9a9a15c3a0" aria-label="View related links" data-ved="2ahUKEwjc6uXnsMyOAxUehu4BHdiqIgUQye0OegQIABAj"></button></span></span></div>
<div class="Fsg96" data-processed="true" data-complete="true"></div>
<div class="otQkpb" role="heading" aria-level="3" data-processed="true" data-complete="true">Protecting yourself</div>
<ul class="U6u95" data-processed="true" data-complete="true">
<li data-hveid="CAAQJQ" data-complete="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Keep software updated:</b> Ensure your phone&#8217;s operating system and applications are up to date.</span></li>
<li data-hveid="CAAQJg" data-sae="" data-complete="true"><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Use encrypted communication tools:</b> Utilize apps like Signal or WhatsApp that offer end-to-end encryption.</span></li>
<li data-hveid="CAAQJw" data-complete="true" data-processed="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Consider using a VPN:</b> A VPN can encrypt your internet traffic.</span></li>
<li data-hveid="CAAQKA" data-complete="true" data-processed="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Enable Airplane mode:</b> When not actively using your phone, switching to airplane mode can help prevent connections to cell towers, including IMSI catchers.</span></li>
<li data-hveid="CAAQKQ" data-complete="true" data-processed="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Be aware of your surroundings:</b> Pay attention to suspicious devices resembling cell towers, especially in sensitive areas or during events like protests or rallies.</span></li>
<li data-hveid="CAAQKg" data-complete="true" data-processed="true" data-sae=""><span class="T286Pc" data-complete="true"><b class="Yjhzub" data-complete="true">Consider a Faraday cage:</b> A Faraday cage can block radio waves and protect your phone from interception.</span><span class="" data-wiz-rootname="ohfaMd" data-complete="true"><span class="vKEkVd" data-animation-atomic="" data-sae=""> </span></span></li>
</ul>
</div>
</div>
</div>
</div>
</div>
</div>
<p><iframe title="What is an IMSI Catcher?" width="640" height="360" src="https://www.youtube.com/embed/wqhtMiKaLk0?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>IMSI catchers, sometimes referred to as cell-site simulators or fake cell towers, can be difficult to detect since they imitate real cell towers to capture mobile phone data. With proper cybersecurity testing measures, you can effectively be alert to these unwanted interceptions. Take a look at these common tools and methods that can efficiently assist in identifying IMSI catchers:</p>
<h2><strong>Top Techniques and Resources to Detect IMSI Catchers</strong></h2>
<h3><strong>1. Use Mobile Apps and Tools</strong></h3>
<p>Some apps and technologies are designed to monitor and detect irregularities in cell networks.</p>
<p><strong>SnoopSnitch (Android):</strong> This app analyses your phone’s network traffic and alerts you of strange cell tower behaviour. It requires access to low-level network data, which is mostly limited to particular Android phones equipped with Qualcomm chipsets.</p>
<p><strong>Cell Spy Catcher (Android):</strong> After starting the learning process of this app, it collects data on local networks to identify which one among them is a trap. Then it alerts you with a red interface screen.<br />
<strong>AIMSICD (Android):</strong> Detects IMSI catchers and reports on odd network activity, such as quick cell tower changes or downgrades to earlier network technologies (such as 2G). Phones switching to older network technologies usually happen due to IMSI catchers.</p>
<p><strong>Croatian Telecom’s AntiSpy (Android/iOS):</strong> An app that uses radio signal analysis to determine when your phone connects to a rogue cell tower.</p>
<p>Apple’s limitations on low-level network data access have led to a decrease in the number of apps accessible for iOS; however, network abnormalities can occasionally be found by keeping an eye on variations in signals.</p>
<h3><strong>2. Look for Unusual Network Activity</strong></h3>
<p>IMSI catchers can force phones to connect to low-security older networks (2G or 3G) to facilitate communication interceptions. Look out for:</p>
<p><strong>Downgraded connection:</strong> Your phone may unexpectedly switch from 4G/5G to 2G/3G or lose high-speed internet connection. Specifically, if it happens in an area that has outstanding coverage, it could be due to an IMSI catcher.</p>
<p><strong>Frequent disconnections:</strong> When an IMSI catcher is nearby, your phone might keep on disconnecting and reconnecting with the network.</p>
<p><strong>Suspicious network names:</strong> IMSI catchers can also broadcast non-standard or dubious network IDs. For example, a tower with an unusual name or ID might be a fake one.</p>
<h3><strong>3. Observe Battery and Signal Behaviour</strong></h3>
<p>IMSI catchers compel gadgets to transmit at faster speeds and consume more power.</p>
<p><strong>Rapid battery drain:</strong> If the battery on your phone runs out more quickly than usual, it can be because it’s transferring an unusual amount of data to a fake tower.</p>
<p><strong>Unusual signal intensity:</strong> An IMSI catcher may be indicated by abrupt, inexplicable changes in signal strength or highly fluctuating signal bars. Strong signals can be sent by these devices to overpower authorised cell towers.</p>
<h3><strong>4. Monitoring Tools for Experts</strong></h3>
<p>Advanced phone users with proper cybersecurity knowledge can utilise monitoring software or equipment to analyse cellular networks themselves.</p>
<p><strong>Software-defined radios (SDRs):</strong> SDR devices enable users to identify and analyse mobile phone signals. By identifying aberrant radio frequencies and patterns, an SDR can aid in the detection of IMSI catchers if used with the appropriate software.</p>
<p><strong>Cellular anomaly detectors:</strong> These are sophisticated technologies used by security experts and researchers that monitor local signals. These help detect abnormal cell tower behaviour that is essential in the <strong>current rise of data breaches</strong>, unexpected cyber attacks, or traffic demand in Australia.</p>
<h3><strong>5. Network Data Monitoring</strong></h3>
<p>Certified cyber security consultants in Australia suggest users to monitor network data. This includes the phone’s network logs like signal strength, base station ID, and encryption status that certain apps or customised firmware can access. Keeping an eye on this data can help determine when the phone connects to a dubious tower that may have less secure encryption or an unidentified ID.</p>
<h3><strong>6. Physical Indicators</strong></h3>
<p>IMSI catchers are usually non-stationary and can be implanted on vehicles or drones. So if you observe any strange and unknown vehicles or equipment within your local area and your phone network falters near it, it could be a clue.</p>
<h3><strong>7. Use Encrypted Communication</strong></h3>
<p>If you are wary of an IMSI catcher but are tech savvy or cannot locate it, resolve to the simple methods of using end-to-end encrypted apps. Switch to apps like WhatsApp, Signal, or Telegram for calls and texts for that while. These platforms prevent intercepted communications from being decoded, even if you do not know how to use tools for detecting IMSI catcher.</p>
<p><strong>Limitations</strong></p>
<p><strong>False positives:</strong> Certain apps, software, or devices may identify normal network issues as suspicious.</p>
<p><strong>Limited detection on iPhones:</strong> iOS restricts access to low-level radio data, making it more difficult to operate apps that monitor cellular networks. <a href="https://www.cyberneticgi.com/2024/10/15/detecting-imsi-catchers-tools-apps-and-methods/" target="_blank" rel="noopener">source</a></p>
<hr />
<h1 class="entry-title wp-block-post-title">With $20 of Gear from Amazon, Nearly Anyone Can Make This IMSI-Catcher in 30 Minutes</h1>
<p>With some dirt cheap tech I bought from Amazon and 30-minutes of set-up time, I was streaming sensitive information from phones all around me. IMSIs, the unique identifier given to each SIM card, can be used to <a href="https://motherboard.vice.com/en_us/article/zmkj38/emf-camp-imsi-catcher-" target="_blank" rel="noopener">confirm whether someone is in a particular area</a>. They can also be used as part of another attack to take over a person’s phone number and redirect their text messages. Obtaining this information was incredibly easy, even for a non-expert.</p>
<div class="wp-block-savage-platform-primis-video">
<div class="wp-block-savage-platform-primis-video__wrapper">
<div>
<div class="primisslate">
<div id="primis_container_div_687d600c04235">
<div id="primis_playerSekindoSPlayer687d600c04232">
<div id="Player-Div-SekindoSPlayer687d600c04232">
<div id="Video-Div-SekindoSPlayer687d600c04232">
<div id="pixelsDiv"></div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p>This attack isn’t revolutionary in any way—IMSI-catchers <a href="https://motherboard.vice.com/en_us/article/nz798m/harris-imsi-catcher-picture-phone-tracking-device-in-the-wild" target="_blank" rel="noopener">are certainly not new</a>, and have become famous because they are commonly (and controversially) used by law enforcement to track suspected criminals. A commercial version made by Harris is called a “Stingray,” and they are sometimes called “cell-site simulators” or “fake cell towers.” This is because they spoof a cell phone tower’s connection, meaning that cell phones in the area will try to connect to it; in doing so, the IMSI-catcher is able to passively collect information about phones in the area.</p>
<div class="code-block code-block-1">
<div id="htlad-post-article-2" class="lngtd-dynamic-inarticle lngtd-dyn-ph">
<div id="vice_D_inarticle_2-1" class="lngtd-dynamic-ad-container" data-label="Advertisement" data-state="loaded"></div>
</div>
</div>
<p>Harris’s Stingray was so secretive that, for years, the <a href="https://arstechnica.com/tech-policy/2015/04/fbi-would-rather-prosecutors-drop-cases-than-disclose-stingray-details/" target="_blank" rel="noopener">FBI dropped criminal court cases</a> that used Stingrays rather than reveal the details of how the evidence was gathered.</p>
<p>But a DIY IMSI catcher is relatively trivial to setup, and the technology is accessible to anyone with a cheap laptop, $20 of gear, and, the ability to essentially copy and paste some commands into a computer terminal. This is about ease of access; a lower barrier of technical entry. In a similar way to so-called spouseware—<a href="https://motherboard.vice.com/en_us/article/53vm7n/inside-stalkerware-surveillance-market-flexispy-retina-x" target="_blank" rel="noopener">malware used by abusive partners</a>—surveillance takes on different character when it trickles down to more ordinary, everyday users. The significance and threat from IMSI-catchers is multiplied when a lot more people can deploy one.</p>
<p class="article__blockquote"><i><b>Got a tip? You can contact Joseph Cox securely on Signal on +44 20 8133 5190, OTR chat on jfcox@<span class="skimlinks-unlinked">jabber.ccc.de</span>, or email <span class="skimlinks-unlinked">joseph.cox@vice.com</span>.</b></i></p>
<p>For legal and technical reasons, our IMSI-catcher did not intercept text messages or phone calls, like more powerful versions can. It only captured IMSIs from devices, as well as provides some additional information such as the country and telecom operator of the phone. Motherboard did not store any of the collected data. You should be aware of the laws in your local region before attempting to do this; Motherboard does not condone or suggest you do anything illegal (and, even if legal, you shouldn’t use an IMSI catcher to do anything creepy.)</p>
<p>We’ll explain what each of these are, but in short, the process was:</p>
<ul class="wp-block-list">
<li>Buy a cheap, software defined radio</li>
<li>Install Ubuntu</li>
<li>Download IMSI-catcher script with its dependencies</li>
<li>Find the right frequency to scan for</li>
<li>Start scanning on that frequency and picking up IMSIs</li>
</ul>
<div class="code-block code-block-1"></div>
<div class="article__media--image"></div>
<p>As the name implies, a software defined radio, or SDR, is simply a radio that instead of having its feature baked in at a hardware level, can be controlled by a computer program. We bought <a href="https://www.amazon.co.uk/NooElec-NESDR-Mini-Previously-Compatible/dp/B009U7WZCA" target="_blank" rel="noopener" data-ml-dynamic="true" data-ml-dynamic-type="sl" data-orig-url="https://www.amazon.co.uk/NooElec-NESDR-Mini-Previously-Compatible/dp/B009U7WZCA" data-ml-id="0" data-ml="true" data-xid="fr1753047054953cei" data-skimlinks-tracking="xid:fr1753047054953cei">the ‘NooElec NESDR Mini’ from Amazon for around $20</a> and received it a few days later.</p>
<p>To get the SDR to talk to phones, I needed to give it some instructions. Fortunately, I didn’t need to write my own, but just take some code from GitHub. I used a Python tool <a href="https://github.com/Oros42/IMSI-catcher" target="_blank" rel="noopener">simply called ‘IMSI-catcher’</a>, written by the hacker known as Oros42. The program requires an up-to-date version of Ubuntu, a particular Linux distribution, that can be downloaded for free and written either to a USB stick or installed inside a virtual machine.</p>
<p>To install the IMSI-catcher software, I just followed the instructions on <a href="https://github.com/Oros42/IMSI-catcher" target="_blank" rel="noopener">the project’s GitHub</a>.</p>
<p>Once installed, I booted up grgsm_livemon, one of the programs included with the project. which presented a slider and a graph, to find a frequency to scan. This required a bit of trial and error—moving the frequency slider until finding a sweet spot where the graph represented a bell curve. The curve meant that the SDR had found what frequency nearby phones were broadcasting on. Depending on where you are, that frequency is going to be different.</p>
<div class="code-block code-block-1">
<div id="htlad-post-article-7" class="lngtd-dynamic-inarticle lngtd-dyn-ph">
<div id="vice_D_inarticle_1-4" class="lngtd-dynamic-ad-container" data-label="Advertisement"></div>
</div>
</div>
<p>Once I found the sweet spot, after a few seconds IMSIs started appearing on my screen.</p>
<figure class="wp-block-image"><img decoding="async" class="attachment-full size-full" src="https://www.vice.com/wp-content/uploads/sites/2/2018/11/1542319074607-IMG_4742.png" alt="imsi-catcher" width="1107" height="584" /><figcaption class="wp-element-caption">Caption: A redacted photo of IMSIs captured by the SDR and related script. Image: Motherboard</figcaption></figure>
<div class="code-block code-block-1">
<div id="htlad-post-article-8" class="lngtd-dynamic-inarticle lngtd-dyn-ph">
<div id="vice_D_inarticle_2-4" class="lngtd-dynamic-ad-container" data-label="Advertisement" data-state="loaded" data-google-query-id="CIOr6aC0zI4DFUjcuAgdCJ0Z_g">
<div id="google_ads_iframe_/16916245/vice/vice_D_inarticle_2_3__container__"></div>
</div>
</div>
</div>
<p>If I wanted to make the IMSI-catcher a bit more portable, I could theoretically run it on a Raspberry-Pi, a miniature computer you can buy for as little as $30 or cheaper, depending on what model you need. Note that the IMSI-catcher would still need to have Ubuntu on the Pi, which it is not traditionally designed for, <a href="https://linuxconfig.org/install-ubuntu-16-04-mate-or-ubuntu-18-04-on-raspberry-pi" target="_blank" rel="noopener">but it is likely possible</a>. I would also need to make sure the SDR is receiving enough power from the USB port.</p>
<p>In all, the process of making an IMSI-catcher didn’t take much time at all, as I thankfully didn’t hit any roadblocks. I just made sure I had the latest version of Ubuntu, followed the instructions carefully, and ended up with an IMSI-catcher on my laptop. <a href="https://www.vice.com/en/article/how-i-made-imsi-catcher-cheap-amazon-github/" target="_blank" rel="noopener">source</a></p>
<p>&nbsp;</p>
<p><iframe title="This $50 Device lets anyone spy and track your phone!" width="640" height="360" src="https://www.youtube.com/embed/PpkLts5fdII?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<blockquote>
<h3><span style="color: #008080;"><a class="url fn" href="https://github.com/Oros42" rel="author" data-hovercard-type="user" data-hovercard-url="/users/Oros42/hovercard" data-octo-click="hovercard-link-click" data-octo-dimensions="link_type:self" aria-keyshortcuts="Alt+ArrowUp">Oros42</a></span><span class="mx-1 flex-self-stretch color-fg-muted">/</span><strong class="mr-2 flex-self-stretch"><a href="https://github.com/Oros42/IMSI-catcher" data-pjax="#repo-content-pjax-container" data-turbo-frame="repo-content-turbo-frame">IMSI-catcher DOWNLOAD HERE</a> i</strong>MSI CATHER SOFTWARE AND BUILD YOUR OWN!<span style="color: #ff0000;"> TO OF COURSE SOLVE SECURITY FLAWS IN YOUR OWN SYSTEM ONLY </span></h3>
<h3><span class="author flex-self-stretch"><a class="url fn" href="https://github.com/CellularPrivacy" rel="author" data-hovercard-type="organization" data-hovercard-url="/orgs/CellularPrivacy/hovercard" data-octo-click="hovercard-link-click" data-octo-dimensions="link_type:self" aria-keyshortcuts="Alt+ArrowUp">CellularPrivacy</a></span><span class="mx-1 flex-self-stretch color-fg-muted">/</span><strong class="mr-2 flex-self-stretch"><a href="https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector" data-pjax="#repo-content-pjax-container" data-turbo-frame="repo-content-turbo-frame">Android-IMSI-Catcher-Detector DOWNLOAD HERE </a></strong><span style="color: #008080;">IMSI CATHER SOFTWARE AND BUILD YOUR OWN!</span><span style="color: #ff0000;"> TO OF COURSE SOLVE SECURITY FLAWS IN YOUR OWN SYSTEM ONLY </span></h3>
</blockquote>
<p>&nbsp;</p>
<hr />
<h1>Gotta Catch &#8216;Em All: Understanding How IMSI-Catchers Exploit Cell Networks</h1>
<div class="panel-pane pane-node-content">
<article class="node node--whitepaper node--full node--whitepaper--full" role="article">
<div class="node__content">
<div class="field field--name-body field--type-text-with-summary field--label-hidden">
<div class="field__items">
<div class="field__item even">
<h2>Section 1: Introduction</h2>
<p>You’ve probably heard of Stingrays or IMSI-catchers, which belong to the broader category of “Cell Site Simulators” (CSSs). These devices let their operators “snoop” on the phone usage of people nearby. There’s a lot of confusion about what CSSs are actually capable of, and different groups—from activists to policy makers to technologists—understand them differently.</p>
<p>In the research community, there has been a tendency to dismiss the prevalence of CSS and the threat they pose to the public. Congress <a href="https://fcw.com/articles/2019/02/21/cell-site-simulators-congress.aspx">recently asked</a> the Department of Homeland Security for more information about their use by federal law enforcement, as well as state and local partners. It&#8217;s unclear how much oversight the Department has been exercising, and when it comes to state and local law enforcement, only a few cities have any protections at all. Many activists aren’t aware that CSSs could be in use around them without their knowledge, particularly during protests. The truth is that CSSs are significantly more widespread than most policy makers, researchers, and activists are aware, and their danger to privacy is more significant than most realize. Of course, it’s hard to acknowledge the prevalence of CSSs when law enforcement goes to great lengths to keep information about them from the public.</p>
<p>There is a plethora of low-level academic research in the area of cell network security, and many high-level posts that don’t really explain in any meaningful detail what’s going on with “IMSI-catcher” type cell network attacks. Our goal is to bridge that gap, and with this post we hope <strong>to make accessible the technical inner workings of CSSs, or rather, the details of the kind of attacks they might rely on</strong>. For example, what are the different kinds of location tracking attacks and how do they actually work? Another example: it’s also widely believed that CSSs are capable of communication interception, but what are the known limits around cell network communication interception and how does that actually work?</p>
<p>We won’t be updating this post with new kinds of attacks as they come out, and we can’t cover every potentially relevant detail of every attack we explain, but this post should form a basis for non-experts to better understand new attacks.</p>
<h2><a id="BackgroundInfo"></a>Section 2: Necessary background info</h2>
<p>There’s a lot of confusion about what CSSs actually do and how they do it. This confusion comes from the fact that the term “cell site simulator” actually encapsulates quite a variety of different cell network attacks that have evolved significantly over the last 25 years or so. Adding to the confusion is the fact that the term “IMSI-catcher” is both used interchangeably with “cell site simulator” and also refers to specific capabilities that some CSSs have.</p>
<p>A very important distinction when talking about CSSs is which cell network generations they use when operating. The term “cell network generation” refers to the complete set of operating protocols covering everything from how cell towers are laid out geographically to how a mobile phone establishes a connection with a cell tower.</p>
<p>Here’s a high-level overview of the most relevant cell network generations:</p>
<ul>
<li>2G (e.g. GSM): the oldest type of cell network still in use and still very widely used. 2G only supports calling/texting, but in 2.5G the capability to support data transmission (e.g. email and Internet access) was introduced.</li>
<li>3G (e.g. UMTS or CDMA2000): improved upon 2G by having much faster data rates (which could support video calls, for example) and adding better security (more on this later).</li>
<li>4G (e.g. LTE or WiMax): significantly faster speeds and better security.</li>
</ul>
<p>The specifications for these networks are developed by working groups organized by the 3GPP,<sup id="fnref1"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn1" rel="footnote">1</a></sup> an international organization that any group can apply to join (though it has a high membership fee). Members typically include mobile carriers, university research labs, and wireless gear manufacturers (including surveillance tech manufacturers).</p>
<p>It’s important to note that in practice there’s often a lot of variance between what the specifications say and what actually ends up being implemented. This is usually due to (1) implementers needing to differ from the specifications for practical reasons (many parts of the specifications get marked as optional), and (2) mistakes.</p>
<p>There’s a bit more vocabulary and background that needs to be introduced:</p>
<ul>
<li>IMSI (International Mobile Subscriber Identity): the unique identifier linked to your SIM card that is one of the pieces of data used to authenticate you to the mobile network. It’s meant to be kept private (because, as we’ll see later, it can be linked to your physical location and your phone calls/messages/data).</li>
<li>TMSI: upon first connecting to a network, the network will ask for your IMSI to identify you, and then will assign you a TMSI (Temporary Mobile Subscriber Identifier) to use while on their network. The purpose of the pseudonymous TMSI is to try and make it difficult for anyone eavesdropping on the network to associate data sent over the network with your phone.</li>
<li>IMEI (International Mobile Equipment Identity): the unique identifier linked to your physical mobile device.</li>
<li>Ki: a secret cryptographic key also stored on the SIM card used to authenticate your phone to the network (and prove you are who you say you are).</li>
<li>MCC (Mobile Country Code): your mobile country code, but not to be confused with a country’s <a href="https://en.wikipedia.org/wiki/List_of_mobile_telephone_prefixes_by_country">mobile telephone prefix</a>. For example, Canada’s MCC is 302, but its telephone prefix is +001.</li>
<li>MNC (Mobile Network Code): the code that represents which carrier you’re using. For example, 410 is one of AT&amp;T’s MNCs.</li>
<li>Cell ID: each cell tower is responsible for serving a small geographic area called a cell, which has a cell ID attached it.</li>
<li>LAC/TAC (“Location Area Code”): in GSM, groups of nearby cells are organized by ID into “Location Areas” (“LA” for short), with each LA’s identifier being referred to as a “Location Area Code”. In 4G these are respectively referred to as Tracking Area (TA) and Tracking Area Code (TAC).</li>
<li>BTS (“base station”): a more general term for devices like cell towers (and CSSs pretending to be cell towers).<sup id="fnref2"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn2" rel="footnote">2</a></sup></li>
</ul>
<p>It’s important to note that some of this terminology varies by network generation. For example, in LTE a base station is referred to as an eNodeB, and in 3G/UMTS the LAC and Cell ID are replaced by PSC (primary scrambling code) and CPI (Cell Parameter ID). For simplicity, we will be sticking to the above terminology.</p>
<h2><a id="OverviewAttacks"></a>Section 3: Overview of attacks</h2>
<p>To be clear, as far as we know no one (outside of government or surveillance tech vendors) has ever gotten their hands on a commercial CSS (e.g. a Harris Corp Stingray) and published publicly available details of its inner workings, so this information all comes from academic literature and the work of open source hackers attempting to reproduce how commercial CSSs might work.</p>
<p>There are three main categories of attacks that will be covered:</p>
<ol>
<li>Communication interception</li>
<li>Denial of service and service downgrading</li>
<li>Location tracking</li>
</ol>
<p>Practical implementation details are left out of the following explanations for the sake of brevity.</p>
<h3><a id="BasicIMSICatcher"></a>Section 3.1: Basic IMSI-catcher</h3>
<p>Classic “IMSI-catchers” simply record nearby IMSIs, and then don’t interact with their target phones in a significant way beyond that. They quite literally “catch” (i.e. record) IMSIs by pretending to be real base stations and then release the target phones (Paget, 2010). Let’s go over how they work in more detail.</p>
<p>In GSM networks, phones will try to connect to whatever base station is broadcasting at the highest signal strength.</p>
<p><img decoding="async" class="alignnone size-full wp-image-21365" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css.png" alt="" width="2400" height="1200" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css.png 2400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css-400x200.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css-1024x512.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css-768x384.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css-1536x768.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/basic_css-2048x1024.png 2048w" sizes="(max-width: 2400px) 100vw, 2400px" /></p>
<p>Once a phone has identified a base station as having the best signal strength, it can begin negotiating a connection to it. The base station first asks the phone to send its encryption capabilities to it. If the base station is a CSS rather than a cell tower, it can then either ignore the response or set it to have no encryption.<sup id="fnref3"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn3" rel="footnote">3</a></sup></p>
<p>After this, the base station sends an Identity Request, which the phone responds to with its IMSI. The phone does this because the IMSI is stored on your SIM card, which was issued by your mobile carrier, and the phone network needs to identify that you are in fact a paying customer associated with a mobile carrier. After receiving your IMSI, the CSS then releases your phone back to the real network and moves on to try and capture another phone’s IMSI. That’s all it takes to collect an IMSI from a nearby phone!</p>
<p>&nbsp;</p>
<div class="caption caption-center">
<div class="caption-width-container">
<div class="caption-inner">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21364" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image4imsicatchers.png" alt="" width="1999" height="1000" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image4imsicatchers.png 1999w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image4imsicatchers-400x200.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image4imsicatchers-1024x512.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image4imsicatchers-768x384.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image4imsicatchers-1536x768.png 1536w" sizes="(max-width: 1999px) 100vw, 1999px" /></p>
<p class="caption-text">The CSS sends an Identity Request to collect the target mobile phone’s IMSI. Afterwards, it proceeds to repeat this same action with other phones.</p>
</div>
</div>
</div>
<p>If law enforcement is operating such a CSS in a geographic area, once they’ve obtained the relevant IMSIs, they can then use legal process to get more data on all the users who were present.<sup id="fnref4"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn4" rel="footnote">4</a></sup></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21363" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised.png" alt="" width="2400" height="1200" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised.png 2400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised-400x200.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised-1024x512.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised-768x384.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised-1536x768.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/a_css_in_a_geographic_area_-_revised-2048x1024.png 2048w" sizes="(max-width: 2400px) 100vw, 2400px" /></p>
<p>From here, many more sophisticated attacks can be launched, but that’s how the most basic kind of IMSI-catchers work: they simply collect IMSIs during the connection procedure, then abort the connection procedure and move on to their next target.</p>
<p>In later protocols (e.g. 4G/LTE), phones are a bit smarter about not connecting to any random base station with high signal strength, so an attacker needs more involved techniques to convince a phone to connect to their CSS. See section 3.3 for details.</p>
<h3><a id="Interception"></a>Section 3.2: Communication interception</h3>
<p>As far as we know, communication interception between a mobile phone and a legitimate cell tower is <strong>only possible in GSM</strong> (as opposed to later 3G or 4G protocols). There are two reasons for this:</p>
<ol>
<li>Communicating over GSM doesn’t always require encryption.</li>
<li>Even when encryption is enabled, several of the cryptographic algorithms used in GSM can be broken (and in real time).</li>
</ol>
<p>Imagine that the CSS is trying to launch an active attack where it intercepts a phone’s communications. The CSS must be able to situate itself between the phone and the tower to be able to do so, which is what’s usually referred to as a “machine in the middle” (MitM) attack.</p>
<p>There are two main steps to completing the MitM:</p>
<ol>
<li>Spoofing authentication: the CSS needs to convince the network that it’s actually the targeted mobile phone. (Section 3.2.1)</li>
<li>Deal with any encryption the network tries to set (i.e. disable it or try to break it). (Section 3.2.2)</li>
</ol>
<h4><a id="Spoofing"></a>Section 3.2.1: Spoofing authentication</h4>
<p>Picking up from Section 3.1 where the CSS has already obtained a phone’s IMSI via an Identity Request:</p>
<ol>
<li>The CSS reaches out to a legitimate cell tower with a Location Update Request. This type of request is used to update the cell network about a phone’s location (specifically, its LAC), which the phone needs to do periodically in order for the network to be able to route calls and messages to it quickly.</li>
<li>In response to the Location Update Request, the cell network asks the CSS to identify itself using an Identity Request. The CSS responds using the stolen IMSI.</li>
<li>At this point the tower responds with a cryptographic challenge that requires the secret key Ki (stored on the SIM card) to solve. Since the CSS doesn’t have access to Ki, it passes it onto the phone to solve. The phone solves the challenge, passes it to the CSS, who then passes it back to the network.</li>
<li>After this, the network accepts the connection between it and the CSS as being authenticated.</li>
</ol>
<p>Reminder: this is only applicable to 2G.</p>
<p>&nbsp;</p>
<div class="caption caption-center">
<div class="caption-width-container">
<div class="caption-inner">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21362" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image2imsicatchers.png" alt="" width="1999" height="730" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image2imsicatchers.png 1999w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image2imsicatchers-400x146.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image2imsicatchers-1024x374.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image2imsicatchers-768x280.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image2imsicatchers-1536x561.png 1536w" sizes="(max-width: 1999px) 100vw, 1999px" /></p>
<p class="caption-text">An illustration of steps 1-4 from above on how the CSS is able to complete the authentication MitM.</p>
</div>
</div>
</div>
<h4><a id="Encryption"></a>Section 3.2.2: Dealing with encryption</h4>
<p>There are several encryption algorithms used in GSM, and at a high level, they have names like: A5/1, A5/2, etc &#8230; with A5/0 being used to indicate that no encryption is being used.</p>
<p>If the network tries to specify that it wants to communicate using encryption, the CSS can just respond by saying it doesn’t have encryption capabilities and defaults to A5/0. The CSS has now completed the MitM attack and can read the plaintext messages being sent between the phone and the real network.</p>
<p>Alternatively, if the network decides to use the A5/1 algorithm to communicate, this type of encryption can be broken in real time. The details of this attack are beyond the scope of this post, but you can read about it in the Barkan et al 2006 paper. Additionally, the A5/2 algorithm is so weak that its use <a href="https://en.wikipedia.org/wiki/A5/2">has been banned since 2006</a>. While there are <a href="https://en.wikipedia.org/wiki/KASUMI#Cryptanalysis">known attacks against A5/3</a>, there are no known real-time attacks.</p>
<h4><a id="UserAlert"></a>Section 3.2.3: Why aren’t users alerted that encryption is off?</h4>
<p>At this point, many people ask: why doesn’t their phone tell them something’s up? According to the GSM specifications, cell phone users are supposed to be notified when encryption is disabled, and in some markets they used to be. However, this caused a lot of confusion because:</p>
<ol>
<li>People would travel with their phones to places where cell towers were configured very differently (e.g. in some countries cell network encryption is banned) and it would cause a “Warning: encryption disabled” pop-up to come up a lot.</li>
<li>Cell towers everywhere were misconfigured, also causing this pop-up to appear a lot.</li>
</ol>
<p>These issues led to many confused consumers and support calls to mobile carriers, resulting in the warning ultimately being disabled.</p>
<h4><a id="ServiceDowngrading"></a>Section 3.2.4: Service downgrading</h4>
<p>Even though, as far as we know, communication interception is only possible in GSM, it’s trivial to downgrade a target cell phone’s connection from 3G or 4G to GSM (see Section 3.5 for more information). This is because in general the base station gets to pick whatever configuration settings it wants, which includes the ability to request a protocol downgrade. Alternatively, someone could jam the 3G or 4G bands by pumping lots of white noise into them, making it too noisy to establish a connection, and phones will downgrade in search of a usable signal. LTE service downgrading is covered in detail at the end of Section 3.5.</p>
<h3><a id="LTECSS"></a>Section 3.3: LTE CSS connection techniques</h3>
<p>It’s also important to understand how it’s possible for a CSS to get around the safeguards in LTE and other modern protocols that are meant to stop phones from connecting to any base station with a high enough power.</p>
<p>In GSM, phones are always scanning looking for a tower with a higher signal strength to connect to. However, in LTE if the signal strength is above a certain sufficient threshold, the phone will not scan for other towers to connect to in order to save power.</p>
<p>Additionally, in LTE phones keep track of a “nearest neighbors” list that is broadcast from the tower that they are connected to. If for any reason they lose the connection with the tower they’re connected to (or the ability to connect to it), they’ll try to connect to ones that were advertised in the nearest neighbors list first, before doing a full scan of the available LTE bands for other eligible cell towers.</p>
<p>So, how can an attacker force a phone using LTE into connecting to their CSS? One technique would be to masquerade as a tower in the nearest neighbor’s list (e.g. same frequency, same cell id, etc &#8230;) and transmit at a higher power, so the phone will eventually switch over.</p>
<p>But there is a faster technique! It relies on the fact that LTE frequencies are assigned various priorities (this is referred to as “absolute priority based cell reselection”), and if a phone sees that there is a base station operating on a higher priority frequency than the one it’s on, it must switch to it, regardless of its signal strength. To discover the higher priority frequencies used in a given area, all that’s required is to extract them from the unencrypted configuration messages from base stations, which anyone can monitor (Shaik et al, 2017).</p>
<p>Using these techniques, attackers can probably force even an LTE phone to connect to their CSS, which reveals the phone’s IMSI and allows followup attacks.</p>
<h3><a id="TrackingAttacks"></a>Section 3.4: Location tracking attacks</h3>
<p>Often when the dangers of CSSs are being discussed, the focus is on their communication interception ability. However, in practice the consequences of real time location tracking <a href="https://www.eff.org/deeplinks/2017/05/no-hunting-undocumented-immigrants-stingrays">are often much more severe</a>. The potential for location tracking by your cell provider is unavoidable, so the specific threat model being used here is a 3rd party (such as a law enforcement agency) trying to get your location without cooperation from your cell provider.</p>
<p>There are generally two types of location tracking that CSSs are capable of:</p>
<ol>
<li><strong>Presence testing:</strong> check if a phone is present in or absent from a geographic area (where geographic area usually means a “Location Area” from before, i.e. a group of cells)</li>
<li><strong>Fine-grained location:</strong> figure out the exact or rough GPS coordinates of a phone either through trilateration or by getting the phone to tell the attacker its exact GPS coordinates</li>
</ol>
<h4><a id="PresenceTesting"></a>Section 3.4.1: Presence Testing in LTE</h4>
<p><strong><em>Passive Presence Testing</em></strong></p>
<p>The simplest way to do presence testing in LTE doesn’t actually require someone to have what we usually consider a CSS (e.g. a device that pretends to be a legitimate cell tower). Instead, all that’s required is simple radio equipment to scan the LTE frequencies, e.g. an antenna, an SDR (Software Defined Radio), and a laptop. Passive presence testing gets its name because the attacker doesn’t actually need to do anything other than scan for readily available signals (Shaik et al, 2017).</p>
<p>A fundamental aspect of wireless technology is the paging model. When the network has a message it wants to route to a phone, it sends an “RRC paging message” which is received by every phone listening to their carrier’s paging frequency in that area (which is basically every phone),<sup id="fnref5"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn5" rel="footnote">5</a></sup> asking for that particular phone to contact the base station to negotiate completing a connection to receive a call or message. Thus, phones are constantly listening for RRC paging messages and receiving and discarding ones not addressed to them.</p>
<p>RRC is short for Radio Resource Control, which is the protocol used to communicate between a cell phone and a base station. The RRC takes care of connection establishment and paging notifications that you’re getting a message or phone call, among other things.</p>
<p>The exact way paging works varies based on several factors, including the type of message the network is trying to route to you. For example, say the network is trying to route a phone call to you. Phone calls are considered high priority (since there’s someone on the other side waiting for you to connect), so the network notifies every cell tower in the last Location Area your phone was in to send out the RRC paging message addressed to your phone (as opposed to only the last cell tower the phone was using). More on this later!</p>
<p>RRC paging messages are usually addressed to a TMSI, but sometimes IMSI and IMEI are also used. By monitoring these unencrypted paging channels, anyone can record the IMSIs and TMSIs the network believes is in a given area. In the next section, we’ll see how an attacker can correlate a TMSI to a specific target phone, as right now collecting TMSIs simply means recording pseudonyms.</p>
<p>Additionally, phones periodically transmit unencrypted messages about their location and measurements of cell service quality that anyone with the right equipment can easily intercept. Sometimes these messages contain the phone’s exact GPS location, but usually the information about the signal strength of nearby cells is enough to calculate the phone’s location. We’ll look at these measurement reports in detail in the Exact GPS Coordinates section below.</p>
<p><strong><em>Semi-Passive Presence Testing</em></strong></p>
<p>Semi-passive means that the attacker only uses network functions in ways in which they are meant to be used. An example of what it means for an adversary to be “semi-passive”: the attacker can text the person they’re trying to track (assuming they know their phone number) in order to generate a paging message being sent to their phone, but they can’t go and send malicious or malformed data to phones or towers in the area (Shaik et al, 2017).</p>
<p>In this section, we are going to cover two location attacks: one which checks for a phone in a given Location Area (“Basic Location Area Test”), and one which checks for a phone connected to a specific cell tower (the “Smart Paging Test” method, which has a much smaller radius of use).</p>
<p><strong><em>Basic Location Area Test</em></strong></p>
<p>The first step of a basic Location Area test is to trigger about 10-20 notifications to the target’s phone via phone calls while also monitoring the RRC paging messages that are sent out. To not alert the user, the attacker can almost immediately hang up after initiating the call so that the paging message makes it to the phone, but the user doesn’t actually get an incoming call notification.</p>
<p>Because there’s someone waiting on the other line to connect to you, phone calls are considered higher priority, so the network notifies every cell tower in the last Location Area the phone was in to send out the RRC paging message (as opposed to only the last cell tower the phone was using). The attacker can then use set intersection analysis (explained in <sup id="fnref6"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn6" rel="footnote">6</a></sup>) with their well-timed calls to figure out the target’s TMSI from the RRC messages.</p>
<p>&nbsp;</p>
<div class="caption caption-center">
<div class="caption-width-container">
<div class="caption-inner">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21360" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image7imsicatchers.png" alt="" width="1999" height="1000" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image7imsicatchers.png 1999w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image7imsicatchers-400x200.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image7imsicatchers-1024x512.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image7imsicatchers-768x384.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image7imsicatchers-1536x768.png 1536w" sizes="(max-width: 1999px) 100vw, 1999px" /></p>
<p class="caption-text">CSS triggering many RRC paging requests to determine if a phone is in a given LA.</p>
</div>
</div>
</div>
<p><strong><em>Smart Paging Test</em></strong></p>
<p>Usually the radius of a Location Area is quite large, so from here the attacker can use something referred to as “smart paging” (explained below) to figure out the exact cell tower the target is using (which translates to knowing the user’s location within a ~2 km radius) (Shaik et al, 2017).</p>
<p>Because general data messages (e.g. WhatsApp and FB Messenger messages) are not high priority, the network initially only broadcasts paging messages for them from the last tower the phone was known to be connected to (this is referred to as “smart paging”). Thus, once the attacker has confirmed the target’s location in a TA (“Tracking Area”), they can test various cells to find the target’s cell. (Note: we’re switching briefly from the “Location Area” terminology to “Tracking Area” here for the sake of a concept covered below.) Similar to before, they send timed WhatsApp or FB Messenger messages and use set intersection analysis to verify the TMSIs being sent in RRC messages in that cell.<sup id="fnref7"><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fn7" rel="footnote">7</a></sup></p>
<p>Note that in order for this to work, the attacker needs to either have equipment in every cell (which is expensive), or move about through cells repeating this procedure until they get a match.</p>
<h4><strong><a id="ActiveLocationTracking"></a>Section 3.4.2: Active location tracking and exact GPS coordinates</strong></h4>
<p>In this section, the attacker’s assumed goal is to find the target’s exact or rough GPS coordinates. In this section, we’ll be describing active attacks, meaning ones in which the attacker can use any means available to them to figure out their target’s information, including operating a CSS and sending malicious or false information to the phone or other cell towers.</p>
<p>In this scenario, suppose the attacker has a CSS and they’ve managed to lure their target into trying to connect using techniques described in Section 3.3. After completing the initial connection procedure steps, the phone enters into a CONNECTED state.</p>
<p>Now the attacker creates a “RRC Connection Reconfiguration” command, which contains the cell IDs of at least 3 neighbouring cell towers and their connection frequencies and sends this command to their target’s phone.</p>
<p>Usually, the “RRC Connection Reconfiguration” command is used to modify an existing connection to a base station, but the attacker is only interested in the target phone’s initial response to its message. This response contains the signal strengths of the previously specified cell towers, which can then be used to find the phone’s location via trilateration:</p>
<p>&nbsp;</p>
<div class="caption caption-center">
<div class="caption-width-container">
<div class="caption-inner">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21359" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised.png" alt="" width="2400" height="1200" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised.png 2400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised-400x200.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised-1024x512.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised-768x384.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised-1536x768.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/trilateration-revised-2048x1024.png 2048w" sizes="(max-width: 2400px) 100vw, 2400px" /></p>
<p class="caption-text">In short, trilateration involves calculating the intersection of circles drawn around the previously specified cell towers, where the radius of each circle is a function of the reported signal strength. Note: trilateration is different than triangulation.</p>
</div>
</div>
</div>
<p>For newer phones and networks which support the “locationInfo-r10” feature, this report will also contain the phone’s exact GPS coordinates, meaning no trilateration calculations are required. The exact GPS coordinates are just a field in the response (Shaik et al, 2017).</p>
<p>In addition to the technique described above, there is another way to get similar trilateration and GPS data by using RLF (“Radio Link Failure”) reports, but we will not cover it in any detail as it’s similar to the techniques just covered.</p>
<h3><a id="DoSDowngrading"></a>Section 3.5: Denial of Service and Downgrading</h3>
<p>Cell network denial of service and protocol downgrade attacks are possible (and can have quite similar implementation details, as we’ll see below). Additionally, downgrade attacks make it such that a target phone can be forced down to a less secure protocol, where more severe privacy invasive attacks can be launched.</p>
<h4><a id="ProtocolDowngrade"></a>Section 3.5.1: Protocol downgrade attacks</h4>
<p>Suppose that the attacker has set up their CSS and tricked the target into trying to connect (which was covered in Section 3.3). After the initial connection procedure, the phone will send a “Tracking Area Update Request” (“TAU” for short). This kind of message is used by the phone to keep the cell network updated about the phone’s most recent location, so that the network can route calls to it faster. TAU Requests are usually sent by phones whenever they’re connecting to a new base station.</p>
<p>The CSS responds with a “TAU Reject” message. Within the Reject message is something referred to as the “EMM cause numbers”, which indicates why the message was rejected. In this case, the attacker sets it to 7 (“LTE services not allowed”).</p>
<p>Upon receiving this EMM value, the phone deletes all information it had about the previous real network it was connected to, and then puts itself in a state where it considers its SIM card to be invalid for LTE. It then searches for 3G and GSM networks to connect to, and will not again try to negotiate an LTE connection until it is rebooted (Shaik et al, 2017).</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21358" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image6imsicatchers.png" alt="" width="1999" height="1000" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/image6imsicatchers.png 1999w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image6imsicatchers-400x200.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image6imsicatchers-1024x512.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image6imsicatchers-768x384.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/image6imsicatchers-1536x768.png 1536w" sizes="(max-width: 1999px) 100vw, 1999px" /></p>
<p>The key reason why protocol downgrade attacks are so bad is that it renders LTE-capable phones vulnerable to attacks that normally only work on earlier protocols (e.g. the communication interception from Section 3.2).</p>
<h4><a id="DoS"></a>Section 3.5.2: Denial of Service (DoS)</h4>
<p>If the attacker is looking to launch a large scale DoS attack, the simplest thing is to jam the LTE frequencies by pumping them full of white noise. However, there are also techniques for DoS attacks that only target individual phones.</p>
<p>Launching a denial of service attack against an individual phone is exactly the same as the protocol downgrade attack described above, except the CSS responds with EMM cause number 8 (“LTE and non-LTE services not allowed”). The phone then puts itself in a state where it does not try to negotiate any network connections until it’s been rebooted.</p>
<p>Additionally, there has been some research done into denying select network services (e.g. only allowing SMS, and disallowing calls and data), but for the sake of space we will not be covering this. Please see Shaik et al, 2017 below for details.</p>
<h2><a id="Detection"></a>Section 4: Detection methods &amp; apps</h2>
<p>At this point you’re probably wondering:</p>
<ul>
<li>Are there ways to detect CSSs?</li>
<li>How to defend oneself from a CSS?</li>
<li>What led to these vulnerabilities in the cell networks and what do we do about them?</li>
</ul>
<p>These are three questions we’re going to explore in this section, and unfortunately they don’t have simple answers.</p>
<h3><a id="Methods"></a>Section 4.1: Detection methods</h3>
<p>To reiterate an important truth from before: a fundamental problem when researching detection methods is that <strong>we don’t know how commercial CSSs work</strong>. Instead we rely on how we think they might work based on research findings. It’s important to keep this in mind when going over some of the known detection methods below. This following list is not exhaustive, and instead is meant to be an introduction to this topic.</p>
<p><strong>Unusual base station parameters or fingerprints</strong></p>
<ul>
<li>There’s been some speculation that commercial CSSs mask themselves as cell towers that are normally in the area, but with some configuration parameters or characteristics being subtly off (e.g. broadcast power is suddenly much higher), enough so that the “fingerprint” of the tower is different. While configuration parameters and other characteristics differ across network operators, they’re usually uniform across a specific operator (Dabrowski et al, 2014).</li>
</ul>
<p><strong>Missing normal base station capabilities</strong></p>
<ul>
<li>It’s unlikely that a CSS manufacturer will have implemented the full set of capabilities of a normal base station. Missing capabilities, such as not broadcasting certain standard System Information Broadcast (SIB) messages, being unable to respond to certain standard requests, or there being very little to no paging traffic coming from the base station might be indicators of a CSS (Dabrowski et al, 2014).</li>
</ul>
<p><strong>Ephemerality</strong></p>
<ul>
<li>It’s generally believed that CSSs don’t stay in a single place for a significant period of time, and so a base station appearing for only a short period of time could be worth investigating. However, there are also many completely normal reasons why something would only appear for a short period of time. For example, it could simply be testing equipment, or if there’s a large event happening, it could be there to help facilitate the increased traffic load.</li>
</ul>
<p>The cell landscape is ever changing. Large scale and long term data collection is the best way to survey an area to be able to determine what’s normal versus what’s unusual. The <a href="https://seaglass.cs.washington.edu/">University of Washington’s Sea Glass project</a> is a great example of this.</p>
<p>You can read much more about this topic in Dabrowski et al’s IMSI-Catch Me If You Can: IMSI-Catcher-Catchers. To reiterate, while these could be indicators that something’s amiss, there are also many completely normal reasons (that have nothing to do with surveillance) as to why we’d be seeing unusual behaviour. E.g. testing equipment, temporary equipment brought in for a large event (e.g. at a sporting event), a cell tower crashed and upon restarting broadcasts temporarily incorrect values until it’s completely finished restarting, and so on.</p>
<h3><a id="Apps"></a>Section 4.2: Detection apps</h3>
<p>Many apps have been released that claim to alert users when it seems likely they’re connected to a CSS. The most popular ones include: <a href="https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector/wiki">Android IMSI-Catcher Detector (AIMSICD)</a>, <a href="https://opensource.srlabs.de/projects/snoopsnitch">SnoopSnitch</a>, <a href="https://sitch.io/">Sitch</a>, <a href="https://play.google.com/store/apps/details?id=kz.galan.antispy">GSM Spy Finder</a>, <a href="https://play.google.com/store/apps/details?id=com.skibapps.cellspycatcher&amp;hl=en_US">Cell Spy Catcher</a>. The quality of these apps varies, and some are still popular despite no longer being maintained.</p>
<p>Most of these apps implement at least some of the detection methods listed above and in Dabrowski et al. Even though sometimes multiple apps will have implemented the same detection methods, they won’t necessarily produce the same result when evaluating if a particular base station is suspicious or not (Borgaonkar et al, 2017). Let’s look at some examples of how detection apps have failed to include basic detection heuristics, as well as how there could be discrepancies in the evaluations they produce.</p>
<p><em>Varying power levels</em></p>
<p>One of the previously described detection methods is to track if a tower you’ve seen before suddenly broadcasts at much higher power. In Borgaonkar et al’s <em>White-Stingray: Evaluating IMSI Catchers Detection Applications</em>, researchers analyzed four of the previously mentioned apps and found that while most of them stored regular measurements of BTS power levels, none of them compared new values to historical values. This means that none of the apps could detect when towers had an unusually high broadcast power.</p>
<p><strong><em>LAC change</em></strong></p>
<p>As we saw in Section 3.2.1, when phones move to a new Location Area (or when they’re in the process of connecting to a base station that’s advertising as having a different LAC), they’ll need to update their information. As a result, they’ll eventually respond to an <em>Identity Request</em> (the command that reveals a phone’s IMSI). It’s generally believed that CSSs advertise as having a different LAC than the one that corresponds to the area they’re in, allowing them to exploit this mechanism to force phones to hand over their IMSIs or connect to them.</p>
<p>All previously mentioned detection apps monitor for LAC changes. As Borgaonkar et al point out, one of them checks to see if the LAC matches that of neighbouring base stations, and displays a warning to the user when it’s close to the edge of an LA. Since LAC changes are common when the user is near the edge of a LA, these warnings are often false positives. Another app stores all LACs the phone has seen before, and sends out warnings whenever a new one appears, meaning false positive warnings are constantly sent out when the user travels to new places. Another app defaults to marking anything broadcasting a LAC value between 0-9 as suspicious. This is an example of how even though all the detection apps have heuristics for detecting if a base station is suspicious based on a determination that a required value (the LAC) is unusual, their interpretations of how to do this and their implementations vary so much that they produce different results.</p>
<p>Because we don’t have global standards for what’s normal, and because things vary so wildly by country, carrier, etc, it’s difficult to come up with heuristics that could universally work for detecting CSSs. As a result, the apps that have attempted to tackle this problem so far have ended up having dramatically different thresholds for alerts.</p>
<h3><a id="Defending"></a><strong>Section 4.3: Defending against CSSs</strong></h3>
<p>CSSs have such a wide range of capabilities (based on what we know about possible cell network attacks they could be based on) that there is no feasible way to defend against all of the things they can do. Defense should begin by considering what someone’s specific threat model is and coming up with ways to defend after that.</p>
<p><strong><em>Examples</em></strong></p>
<p>At the time of writing, there are no publicly known confirmed examples of CSSs being used by law enforcement for communication interception or service denial. However, there are <a href="https://www.detroitnews.com/story/news/local/detroit-city/2017/05/18/cell-snooping-fbi-immigrant/101859616/">quite</a> <a href="http://cnsmaryland.org/interactives/spring-2016/maryland-police-cell-phone-trackers/index.html">a few</a> <a href="https://shadowproof.com/2019/05/08/detroit-police-spent-more-than-half-million-dollars-on-cell-site-simulator-to-track-peoples-locations/">examples</a> of CSSs being used for location tracking.</p>
<p>Since the main threat CSSs pose is that of real time location tracking, and there are no adjustable user settings one can change to affect this, there are currently no immediate steps one can take to defend themselves against these devices, other than either not having a cell phone, (which isn’t a reasonable option for many of us) or turning off and/or leaving behind your phone when doing something important.</p>
<p>Despite that, there are many steps you can take to defend against online surveillance, many of which we’ve outlined in EFF’s <a href="https://ssd.eff.org/">Surveillance Self Defense Guide</a>.</p>
<h2><a id="Conclusion"></a>Conclusion: the past &amp; future of cell network security</h2>
<p>The intersection of cell networks, security, and user privacy has historically not been an accessible field, but that’s slowly changing. Each year there is more research in this field being published and open source projects (such as <a href="https://github.com/srsLTE/srsLTE">srsLTE</a>) that enable this research are improving dramatically—and more people are starting to question why more work isn’t being done to fix these issues.</p>
<p>Cell network security <a href="https://www.nytimes.com/2018/12/26/opinion/cellphones-security-spying.html">is broken in some pretty fundamental ways</a>. It’s up to all of us over the next few years to demand lawmakers pay closer attention to the issue, and to put pressure on standards groups, carriers, network operators, and vendors to make necessary improvements. Together, we can protect and defend users’ privacy.</p>
<h2><a id="References"></a>References</h2>
<p><em>IMSI-Catch Me If You Can: IMSI-Catcher-Catchers.</em> Adrian Dabrowski, Nicola Pianta, Thomas Klepp, Martin Mulazzani, Edgar Weippl. <a href="https://www.sba-research.org/wp-content/uploads/publications/DabrowskiEtAl-IMSI-Catcher-Catcher-ACSAC2014.pdf">https://www.sba-research.org/wp-content/uploads/publications/DabrowskiEtAl-IMSI-Catcher-Catcher-ACSAC2014.pdf </a>(Dabrowski et al, 2014)</p>
<p><em>IMSI Catcher Detection Apps Might Not Be All That Good, Research Suggests.</em> Joseph Cox. <a href="https://www.vice.com/en_us/article/neeb5g/stingray-detection-apps-might-not-be-all-that-good-research-suggests">https://www.vice.com/en_us/article/neeb5g/stingray-detection-apps-might-not-be-all-that-good-research-suggests</a></p>
<p><em>Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication</em>. Elad Barkan, Eli Biham, Nathan Keller. <a href="http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/2006/CS/CS-2006-07.pdf">http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/2006/CS/CS-2006-07.pdf </a>(Barkan et al, 2006)</p>
<p><em>Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems.</em> Altaf Shaik, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi§and Jean-Pierre Seifert. <a href="https://arxiv.org/pdf/1510.07563.pdf">https://arxiv.org/pdf/1510.07563.pdf </a>(Shaik et al, 2017)</p>
<p><em>Practical Cellphone Spying</em>. Kristen Paget. Defcon 18. <a href="https://www.youtube.com/watch?v=fQSu9cBaojc">https://www.youtube.com/watch?v=fQSu9cBaojc </a>(Paget, 2010)</p>
<p><em>White-Stingray: Evaluating IMSI Catchers Detection Applications.</em> Ravishankar Borgaonkar, Andrew Martin, Shinjo Park, Altaf Shaik, Jean-Pierre Seifert. <a href="https://ora.ox.ac.uk/objects/uuid:15738ed0-c144-49e9-a4fa-466362cf7754">https://ora.ox.ac.uk/objects/uuid:15738ed0-c144-49e9-a4fa-466362cf7754 </a>(Borgaonkar et al, 2017)</p>
<h2>Notes</h2>
<ol>
<li id="fn1">The name “3GPP” is confusing since it contains “3G”. While they didn’t exist when GSM (a 2G technology) was originally being developed, they did later absorb some of the organizations that were responsible for developing GSM. It is still one of the main organizations that develops and maintains existing and future protocols. <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref1" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
<li id="fn2">Unfortunately, most phones usually don’t have an ability to specify connection settings. Recently some phones have begun to implement features like “use LTE only” though. <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref2" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
<li id="fn3">Unfortunately, most phones usually don’t have an ability to specify connection settings. Recently some phones have begun to implement features like “use LTE only” though. <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref3" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
<li id="fn4">According to the Department of Justice, some CSSs can directly collect a subscriber’s phone number, meaning LE can skip the step of subpoenaing a service provider to obtain the subscriber’s phone number. See page 6 of https://www.eff.org/files/2015/11/30/illinois.dist_.ct_.stingrays.pdf. <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref4" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
<li id="fn5">Generally, the network will first direct the message to the last known cell tower the phone was connected to, and that tower will send out a paging message to everyone listening on its paging frequency. If it doesn’t get a response, then it will spread out and try all the towers in a given Location Area, and so on. The exact details of how this works varies by type of data being routed (e.g. SMS vs phone call vs LTE data message) and by carrier. <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref5" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
<li id="fn6">Basically, you compare the paging identities in the RRC messages sent out after each short call you initiate, and extract the value(s) that are repeated the number of times you placed calls. You can read a much more here in the R<em>evealing Identities</em> section here: <a href="https://www-users.cs.umn.edu/~hoppernj/celluloc.pdf">https://www-users.cs.umn.edu/~hoppernj/celluloc.pdf</a> <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref6" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
<li id="fn7">Note that Facebook messages have the advantage of not needing to know your target’s phone number to be able to trigger a notification being sent to their phone! (The attacker doesn’t need to be Facebook friends with their target either, as Facebook Messenger messages sent to strangers end up in the ‘Other’ folder, but still trigger LTE push notifications that aren’t displayed to the user.) <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#fnref7" rev="footnote"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/21a9.png" alt="↩" class="wp-smiley" style="height: 1em; max-height: 1em;" /></a></li>
</ol>
</div>
</div>
</div>
</div>
</article>
</div>
<div class="panel-pane pane-entity-field pane-node-field-attachments">
<h2 class="pane-title">Downloads</h2>
<div class="field field--name-field-attachments field--type-file field--label-hidden">
<div class="field__items">
<div class="field__item even"><span class="file"><img decoding="async" class="file-icon" title="application/pdf" src="https://www.eff.org/modules/file/icons/application-pdf.png" alt="PDF icon" /> <a title="whitepaper_imsicatchers_eff.pdf" href="https://www.eff.org/files/2019/07/09/whitepaper_imsicatchers_eff_0.pdf" type="application/pdf; length=999909">Gotta Catch &#8216;Em All</a></span></div>
</div>
</div>
</div>
<p><a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks" target="_blank" rel="noopener">source</a></p>
<hr />
<div class="editor-content title-wrap">
<h1 class="h1 ">Understanding and Detecting IMSI Catchers around the World</h1>
</div>
<p>One of the good things about working in the area of core network security, is the opportunity to find new and unexpected types of attacks. These are attacks you didn’t even know could happen, much less have a chance to prevent. Finding these unexpected attacks doesn’t just happen though, it requires experience and investigation, but most importantly it needs the mindset to dig deeper into any strange events that are encountered, and try to understand them, rather than just assuming they are random malicious events.</p>
<p>In this particular case, we are discussing IMSI Catchers. First off, the term IMSI catcher is a misused and sometimes contradictory term however. As explained <a href="https://www.eff.org/pages/cell-site-simulatorsimsi-catchers" target="_blank" rel="noopener">here</a>, there are actually 2 types of equipment that those in the public (and many in the industry) would conflate into what they would call IMSI catchers.</p>
<ul>
<li>‘Active’ IMSI Catchers, also termed Cell Site Simulators (CSS) or Fake Base Stations – these attempt to force local devices to connect to a Call Site Simulator, in order to decrypt the conversation and texts, and to execute man in the middle interception. These would be considered the more ‘traditional’ type of IMSI catchers most would be aware of. Stingrays are also a common term used for these (named after the brand built by Harris Corporation). A good overview of how the Active IMSI /Cell Site Simulators work is <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks" target="_blank" rel="noopener">here</a>.</li>
<li>Passive IMSI Catchers – these passively listen into the paging of mobile devices as they move and register to new real Cell towers in the local area, in order to get the IMSI numbers of these devices. They are far less precise, and are unable to do any of the more sophisticated type of interception, but involve no interaction between the mobile device and the IMSI Catcher. An overview of how these could work, and how they function is <a href="https://harrisonsand.com/posts/imsi-catcher/" target="_blank" rel="noopener">here</a>.</li>
</ul>
<picture class="wp-image-82879 aligncenter"><source srcset="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1.png.webp 932w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-300x100.png.webp 300w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-768x257.png.webp 768w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-546x183.png.webp 546w" type="image/webp" sizes="(max-width: 800px) 100vw, 800px" data-lazy-srcset="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1.png.webp 932w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-300x100.png.webp 300w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-768x257.png.webp 768w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-546x183.png.webp 546w" /><img loading="lazy" decoding="async" class="entered lazyloaded" src="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1.png" sizes="(max-width: 800px) 100vw, 800px" srcset="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1.png 932w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-300x100.png 300w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-768x257.png 768w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-546x183.png 546w" alt="two diagrams showing the difference between active IMSI Catcher and Passive IMSI Catcher" width="800" height="268" data-lazy-srcset="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1.png 932w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-300x100.png 300w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-768x257.png 768w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1-546x183.png 546w" data-lazy-sizes="(max-width: 800px) 100vw, 800px" data-lazy-src="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_1.png" data-ll-status="loaded" /></picture>
<p>The primary difference between these two is that the more traditional Active IMSI Catcher/CSSs always involves some form of interaction with the mobile device, whereas the Passive IMSI Catcher doesn’t – it literally just listens in to the paging that occurs in the local areas as the mobile device changes between legitimate cell towers in the vicinity. This makes a big difference when it comes to detection of these IMSI Catcher types.</p>
<p>A lot of research has gone into various ways of detecting Active IMSI Catchers, by looking at how they differ from real Cell towers. One distinctive example of what an Active IMSI Catcher might do is the forced downgrading of their target mobile device to use a less secure radio interface. This detection of an Active IMSI Catchers can be difficult, involves a lot of local measurements and often can and has in the past led to false positives, but it gives some results. From the attacker’s perspective it’s also a trade-off in that they must make the effort to physically deploy an Active IMSI Catchers in a sensitive area, and then hope its radio activity doesn’t give it away. This is often why more sophisticated attackers may often resort to using attacks over signalling interfaces such as SS7 and Diameter to achieve their aims, which can be sent from any part of the world.</p>
<p>A Passive IMSI Catcher changes things somewhat. It still involves physical deployment of a system to listen in the local targeted area, but it is essentially undetectable on the radio interface, as it emits nothing that would allow it to be detected. This makes it very valuable to perform long-term surveillance in sensitive areas, when the goal is to have the least chance of being detected, while still trying to determine the IMSIs of who is in the local area.</p>
<p>The issue with both types of IMSI Catchers, from the attacker’s perspective, is that what they are left with are a collection of IMSIs from around the world. While this information may be useful, often you need more information to profile who has been ‘caught’. For Active IMSI Catcher deployments; the attackers may also intercept calls/text messages etc, so have a better idea of the target, but for passive IMSI catchers they won’t have that. What the attackers really need is the co-corresponding phone number – the MSISDN of the mobile device associated with the IMSI – in order to truly figure out the identities of the mobile device their IMSI catcher has caught.</p>
<p>This is where our analysis and investigation has come in. Over time, we have been seeing patterns of unusual requests over the SS7 interface, for particular IMSIs. Specifically, what we have been seeing is our Signalling Firewalls, deployed at multiple customer mobile operators, receiving suspicious MAP_RESTORE_DATA packets for IMSIs from unexpected sources. A MAP_RESTORE_DATA packet is a particular command that requests that the home operator sends details for a particular IMSI to the roamed-to network. Details in this case includes MSISDN (the actual phone number), call forwarding setting and other specific information. Further investigation showed that we always received this command when these IMSIs were near or attached to specific Cell Sites while roaming in a 3rd country and nowhere else.</p>
<picture class="wp-image-82881 aligncenter"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21343" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMSI_Catcher_sequence_wide-1536x662.png.webp" alt="" width="1536" height="662" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMSI_Catcher_sequence_wide-1536x662.png.webp 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMSI_Catcher_sequence_wide-1536x662.png-400x172.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMSI_Catcher_sequence_wide-1536x662.png-1024x441.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/IMSI_Catcher_sequence_wide-1536x662.png-768x331.webp 768w" sizes="(max-width: 1536px) 100vw, 1536px" /></picture> <picture class="wp-image-82881 aligncenter"><source srcset="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide.png.webp 1985w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-300x129.png.webp 300w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1024x441.png.webp 1024w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-768x331.png.webp 768w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1536x662.png.webp 1536w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-546x235.png.webp 546w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1060x457.png.webp 1060w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1002x432.png.webp 1002w" type="image/webp" sizes="(max-width: 800px) 100vw, 800px" data-lazy-srcset="https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide.png.webp 1985w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-300x129.png.webp 300w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1024x441.png.webp 1024w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-768x331.png.webp 768w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1536x662.png.webp 1536w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-546x235.png.webp 546w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1060x457.png.webp 1060w, https://www.enea.com/wp-content/uploads/2023/06/IMSI_Catcher_sequence_wide-1002x432.png.webp 1002w" /></picture>
<p>Our working theory, is that what we are observing is what we now call “<strong>IMSI Profilers</strong>”. These IMSI Profilers work in conjunction with IMSI Catchers – they take the list of IMSIs that have been detected and request profile information, in order to feed these phone numbers back to the IMSI catcher operator. The sequence of events that we believe to happen is shown above. From log analysis it also seems likely (but can’t be confirmed 100%) that the IMSI Catcher in the 3rd country is of the passive variety. In this particular case, the IMSI Profiler is using a source SS7 address (called a SCCP Global Title or GT) in a small European mobile operator that we have detected previously in our SIGIL/Signalling Intelligence system to be used by multiple surveillance companies, further confirming our suspicion that it is malicious.</p>
<p>Regardless of the IMSI catcher type used, this method of analysing incoming suspicious signalling activity gives the opportunity for mobile operators to partially protect their subscribers against IMSI Catchers around the world, something they didn’t have in the past. It won’t stop an Active IMSI Catcher from forcing a subscriber to connect to them, but it would stop additional information being retrieved. And in the case of passive IMSI catcher it is potentially one of the <strong>only ways</strong> to detect these remotely and block any more useful information being obtained.</p>
<p>In the long term, improvements in the new 5G radio and core network standards means that mobile operators should be able to greatly improve the ability to block IMSI Catchers over 5G. If these are implemented correctly and no loopholes are introduced then effective 5G IMSI Catchers may never arise. In the interim however, IMSI Catchers – both Passive and Active – are being used globally in the world to track and record individuals without their consent. By analysing incoming signalling traffic, and detecting and blocking these IMSI Profilers, mobile operators now have the opportunity to help protect their subscribers globally, regardless of how stealthy the IMSI Catcher is. <a href="https://www.enea.com/insights/adaptive-mobile-imsi-catchers/" target="_blank" rel="noopener">source</a></p>
<hr />
<div class="et_pb_row et_pb_row_1_tb_body">
<div class="et_pb_column et_pb_column_3_5 et_pb_column_3_tb_body et_pb_css_mix_blend_mode_passthrough et-last-child">
<div class="et_pb_module et_pb_post_title et_pb_post_title_0_tb_body et_pb_bg_layout_light et_pb_text_align_left">
<div class="et_pb_title_container">
<h1 class="entry-title">How to Catch an IMSI Catcher</h1>
</div>
</div>
<div class="et_pb_module et_pb_text et_pb_text_1_tb_body article-excerpt et_pb_text_align_left et_pb_bg_layout_light">
<div class="et_pb_text_inner">IMSI catchers, or fake antennas, are a common cell phone surveillance method. The FADe project helped local NGOs in Latin America detect and document these devices.</div>
</div>
<div class="et_pb_module et_pb_text et_pb_text_3_tb_body et_pb_text_align_left et_pb_bg_layout_light">
<div class="et_pb_text_inner"></div>
</div>
</div>
</div>
<div class="et_pb_row et_pb_row_2_tb_body">
<div class="et_pb_column et_pb_column_4_4 et_pb_column_4_tb_body et_pb_css_mix_blend_mode_passthrough et-last-child">
<div class="et_pb_module et_pb_post_content et_pb_post_content_0_tb_body news-body">
<h2 class="wp-block-heading"><strong>Civil Society Needs Help Catching IMSI Catchers </strong></h2>
<p>Law enforcement, criminals, and repressive governments monitor cell phone signals for the purpose of counter-terrorism, espionage, or political persecution. One common surveillance method is the placement of fake antennas—or <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks#BackgroundInfo" target="_blank" rel="noreferrer noopener">IMSI catchers</a>—which imitate legitimate cell towers in order to track individual mobile subscribers, monitor their communications, or even disable their network connections.</p>
<p>In a high-profile example, <a href="https://nomada.gt/pais/la-corrupcion-no-es-normal/espionaje-ilegal-del-gobierno-aqui-esta-la-investigacion-de-nuestro-diario-parte-i/" target="_blank" rel="noreferrer noopener">a Guatemalan investigation revealed</a> large-scale <a href="https://www.eff.org/deeplinks/2018/12/where-government-hack-their-own-people-and-people-fight-back-latin-american" target="_blank" rel="noreferrer noopener">illegal spying</a> targeting “activists, entrepreneurs, politicians, journalists, diplomats, and social leaders.” Many governments engage in similar practices, often <a href="https://privacyinternational.org/strategic-areas/contesting-government-data-and-system-exploitation" target="_blank" rel="noreferrer noopener">without any meaningful oversight</a> or accountability.</p>
<p>The battle against authoritarian or illegal spying demands a range of methodologies—from legal policies and telecommunications regulations to physical interventions like “Faraday bags,” which shield devices in a casing that blocks electromagnetic transmissions. But the fight between eavesdroppers and victims (often human rights defenders) is not an even one. Most civil society organizations lack the equipment or expertise to effectively monitor phone surveillance.</p>
<h2 class="wp-block-heading"><strong>Equipping Civil Society with Resources to Expose Surveillance</strong></h2>
<p>To help Latin American NGOs level the playing field, <a href="http://www.southlighthouse.org/" target="_blank" rel="noreferrer noopener">South Lighthouse</a> created the <a href="http://fadeproject.org/" target="_blank" rel="noreferrer noopener">Fake Antenna Detection project (FADe)</a>, with support from Open Technology Fund’s <a href="https://www.opentech.fund/funds/internet-freedom-fund/" target="_blank" rel="noreferrer noopener">Internet Freedom Fund</a>. The project’s primary focus was detecting and documenting IMSI catchers—surveillance devices that imitate legitimate cell towers in order to track individual mobile subscribers, monitor their communications, or even disable their network connections.</p>
<p>The FADe team provided training, equipment, and other support to enable local partners to scan for IMSI catchers, analyze their findings and, ideally, make use of the results for advocacy. “A fundamental principle of the program has been partnership and capacitation,” says Andrés Schiavi, Executive Director of South Lighthouse.</p>
<p>FADe’s technology coordinator, Carlos Guerra says, “We wanted to open up a discussion for NGOs about how cell technology works and about how it <em>should</em> work to ensure optimal benefits to people’s safety and people’s rights.”</p>
<p>Using methods initially developed by the <a href="https://seaglass.cs.washington.edu/" target="_blank" rel="noreferrer noopener">SEAGLASS</a> project at the University of Washington and the <a href="https://www.eff.org/pages/crocodile-hunter" target="_blank" rel="noreferrer noopener">Electronic Frontier Foundation (EFF)</a>, FADe partners assembled simple sensors using a few off-the-shelf electronics, a smartphone, and a “feature phone” (a basic device resembling an early mobile phone that is usually more affordable and durable than a smartphone). The sensor setup sits in a moving vehicle and collects signal information over several weeks from local cell towers.</p>
<p>By analyzing the resulting data, groups can differentiate between signals consistent with legitimate cell towers and signals showing anomalous behaviors, such as a “tower” that changes locations (see animation below); or only operates during certain times; or uses frequencies or signal parameters not used anywhere else in the network. Another common warning sign is suspicious instructions sent to a device, such as a request to disconnect from all other towers, or a command to downgrade from 3G or 4G to a 2G network, which will make the device more vulnerable to surveillance.</p>
<p><em>A specific cell tower physically moving among different locations is one of the anomalous behaviors that can help identify an IMSI-catcher.</em></p>
<p>But analysis of these signals can be tricky, says Guerra. “There is no cookie-cutter method,” he says. The data is “noisy,” and cell providers configure their towers differently. It takes many days of monitoring to set a baseline that helps distinguish between legitimate and fake antennas.</p>
<p>The FADe team began working with local organizations in 2018. To mitigate technical and security risks, Schiavi says the first FADe partners were drawn from among South Lighthouse’s network of Latin American organizations. But interest grew rapidly, he says, in part because nothing comparable to the FADe/SEAGLASS approach had ever been available to these organizations. From 2019 to 2022, FADe worked with partners in <a href="https://fadeproject.org/?page_id=38" target="_blank" rel="noreferrer noopener">nine different countries</a>, documenting signals from almost 9,000 antennas, catching more than 150 likely IMSI-catchers.</p>
<p>One of FADe’s local partners, a digital security specialist from Nicaragua, says he was familiar with FADe in 2018 when he read the bombshell reports about Guatemalan surveillance. “The media found the police were using an IMSI-catcher,” he says. “We have known about methods like this in Central America, but we never had the evidence. I said, ‘We need to monitor that. I need to bring this to Nicaragua.&#8217;”</p>
<h2 class="wp-block-heading"><strong>Some of the Findings</strong></h2>
<p>The results in Nicaragua revealed <a href="https://fadeproject.org/?project=managua-2g-2" target="_blank" rel="noreferrer noopener">23 antennas around Managua</a> with anomalies that indicated the presence of an IMSI catcher. The local partner (who is remaining anonymous for security reasons) says the findings informed a wider discussion in Nicaragua about telephone eavesdropping. Although it was common knowledge that the government had an “open door” from the national ISP to eavesdrop online, the FADe data drove new public scrutiny and <a href="https://confidencial.digital/english/39-fake-antennas-discovered-monitoring-cell-phones-in-nicaragua/" target="_blank" rel="noreferrer noopener">media coverage</a> about the use of fake antennas.</p>
<p>Among the other FADe sites, <a href="https://www.reuters.com/article/us-mexico-tech-rights-trfn-analysis/birds-on-the-wire-concerns-over-mexico-cell-phone-surveillance-idUSKBN23J2CC/" target="_blank" rel="noreferrer noopener">Mexico</a> and <a href="https://openinternet.global/news/reality-digital-authoritarianism-venezuela" target="_blank" rel="noreferrer noopener">Venezuela</a> recorded an especially high number of fake antennas, as experts from <a href="https://poderlatam.org/" target="_blank" rel="noreferrer noopener">PODER</a> recounted <a href="https://www.washingtonpost.com/es/post-opinion/2020/05/31/datos-y-llamadas-de-celulares-en-riesgo-de-espionaje-por-antenas-falsas-en-america-latina/" target="_blank" rel="noreferrer noopener">in the Washington Post</a> (ES). Data from Caracas, Venezuela, showed <a href="https://fadeproject.org/?project=caracas" target="_blank" rel="noreferrer noopener">33 different devices</a> with irregular readings that could indicate IMSI-catchers. In Buenos Aires, Argentina, out of 1,000 cell towers monitored, <a href="https://fadeproject.org/?project=buenos-aires-2g&amp;lang=es" target="_blank" rel="noreferrer noopener">suspicious patterns</a> were found in 17 antennas, with most concentrated around the downtown and university areas. Notably, the suspicious antennas found in Buenos Aires were all on the 2G network, with no irregularities seen in the <a href="https://fadeproject.org/?project=buenos-aires-4g" target="_blank" rel="noreferrer noopener">smaller group</a> of devices on the 4G network, which is known to be harder to surveil. For summaries of the observations in all locations, see the project’s <a href="https://fadeproject.org/?page_id=38" target="_blank" rel="noreferrer noopener">results section</a>.  <a href="https://www.opentech.fund/news/how-to-catch-an-imsi-catcher/" target="_blank" rel="noopener">source</a></p>
</div>
</div>
</div>
<blockquote class="wp-embedded-content" data-secret="CwUzk2Zogw"><p><a href="https://goodshepherdmedia.net/cell-site-simulators-imsi-catchers-aka-stingray-phone-tracker/">Cell-site simulators/ imsi catchers aka Stingray phone tracker</a></p></blockquote>
<p><iframe class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;Cell-site simulators/ imsi catchers aka Stingray phone tracker&#8221; &#8212; Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content" src="https://goodshepherdmedia.net/cell-site-simulators-imsi-catchers-aka-stingray-phone-tracker/embed/#?secret=QHM7OzueSq#?secret=CwUzk2Zogw" data-secret="CwUzk2Zogw" width="600" height="338" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><iframe title="Pacamarra: IMSI catcher intercepts calls, not personal data | Morning Matters" width="640" height="360" src="https://www.youtube.com/embed/fTCnf6mAgxk?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><iframe title="RayHunter - Building the EFFs IMSI Catcher Detector" width="640" height="360" src="https://www.youtube.com/embed/SbSYSNuAetI?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><iframe title="NDSS 2025 - Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic" width="640" height="360" src="https://www.youtube.com/embed/jY3idyn11Tc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><iframe title="DICT: IMSI catchers may operate in public spaces, tracking, intercepting mobile communications | ANC" width="640" height="360" src="https://www.youtube.com/embed/iUIcCMG30ZY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cell-site simulators/ imsi catchers aka Stingray phone tracker</title>
		<link>https://goodshepherdmedia.net/cell-site-simulators-imsi-catchers-aka-stingray-phone-tracker/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Sun, 24 Aug 2025 21:49:24 +0000</pubDate>
				<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Phone Hacks]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[📱Mobile📱]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[Cell-site simulators]]></category>
		<category><![CDATA[Cell-site simulators/ imsi catchers]]></category>
		<category><![CDATA[imsi catchers]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21346</guid>

					<description><![CDATA[Cell-site simulators/ imsi catchers aka Stingray phone tracker Cell-site simulators/ imsi catchers Cell-site simulators, also known as Stingrays or IMSI catchers, are devices that masquerade as legitimate cell-phone towers, tricking phones within a certain radius into connecting to the device rather than a tower. Cell-site simulators operate by conducting a general search of all cell phones within [&#8230;]]]></description>
										<content:encoded><![CDATA[<h2>Cell-site simulators/ imsi catchers aka <span class="mw-page-title-main">Stingray phone tracker</span></h2>
<p><iframe title="5G IMSI Catchers Mirage5G IMSI Catchers Mirage" width="640" height="360" src="https://www.youtube.com/embed/Bg1HVaw1Sm4?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Cell-site simulators/ imsi catchers</h2>
<div dir="ltr">
<div class="content">
<p>Cell-site simulators, also known as Stingrays or IMSI catchers, are devices that<a href="https://www.eff.org/deeplinks/2015/01/2014-review-stingrays-go-mainstream"> masquerade as legitimate cell-phone towers</a>, tricking phones within a certain radius into<a href="https://www.justice.gov/opa/file/767321/download"> connecting to the device rather than a tower</a>.</p>
<p>Cell-site simulators operate by conducting a general search of all cell phones within the device’s radius, in violation of basic constitutional protections.  Law enforcement use cell-site simulators to pinpoint the location of phones with greater accuracy than phone companies and without needing to involve the phone company at all. Cell-site simulators can also log IMSI numbers, (International Mobile Subscriber Identifiers) unique to each SIM card, of all of the mobile devices within a given area. Some cell-site simulators may have advanced features allowing law enforcement to intercept communications.</p>
</div>
</div>
<p><iframe title="This $50 Device lets anyone spy and track your phone!" width="640" height="360" src="https://www.youtube.com/embed/PpkLts5fdII?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<div dir="ltr">
<div class="content">
<h3><span style="color: #008080;"><a href="https://www.opentech.fund/news/how-to-catch-an-imsi-catcher/" target="_blank" rel="noopener"><span style="color: #0000ff;">DOWNLOAD</span></a> IMSI CATHER SOFTWARE AND BUILD YOUR OWN!</span><span style="color: #ff0000;"> TO OF COURSE SOLVE SECURITY FLAWS IN YOUR OWN SYSTEM ONLY </span></h3>
<h3>How Cell-Site Simulators Work</h3>
<h4>Standard Communication</h4>
<p>Cellular networks are distributed over geographic areas called &#8220;cells.&#8221; Each cell is served by one transceiver, also known as a cell-site or base station. Your phone naturally connects with the closest base station to provide you service as you move through various cells.</p>
<figure class="image"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21348" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/content_CSS-2.png" alt="" width="700" height="373" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/content_CSS-2.png 700w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/content_CSS-2-400x213.png 400w" sizes="(max-width: 700px) 100vw, 700px" /><figcaption>
<div class="image-attribution">Source: EFF</div>
<div class="image-caption"></div>
</figcaption></figure>
<p>&nbsp;</p>
<p>Generally, there are two types of device used by law enforcement that are often referred to interchangeably: passive devices (which we will call IMSI catchers), and active devices (which we will call cell-site simulators.) Passive devices, as a rule, do not transmit any signals. They work by plucking cellular transmissions out of the air, the same way an FM radio works. They then decode (and sometimes decrypt) those signals to find the IMSI of the mobile device and track it.</p>
<p>Active cell-site simulators are much more commonly used by law enforcement, and work very differently from their passive cousins. Cellular devices are designed to connect to the cell site nearby with the strongest signal. To exploit this, cell-site simulators broadcast signals that are either stronger than the legitimate cell sites around them, or are made to appear stronger. This causes devices within range to disconnect from their service providers’ legitimate cell sites and to instead establish a new connection with the cell-site simulator. Cell-site simulators can also take advantage of flaws in the design of cellular protocols (such as 2G/3G/4G/5G) to cause phones to disconnect from a legitimate cell-site and connect to the cell-site simulator instead.  For the purposes of this article we will focus on active cell-site simulators.</p>
<p>It is difficult for most people to know whether or not their phone’s signals have been accessed by an active cell-site simulator, and it is impossible for anyone to know if their phone’s signals have been accessed by a passive IMSI catcher. Apps for identifying the use of cell-site simulators, such as SnoopSnitch, may not be verifiably accurate. Some more advanced tools have been built, which may be more accurate. For instance, security researchers at the University of Washington have<a href="https://seaglass.cs.washington.edu/"> designed a system to measure the use of cell-site simulators across Seattle</a>, and EFF researchers <a href="https://github.com/EFForg/crocodilehunter/">have designed a similar system</a>.</p>
<h3>What Kinds of Data Cell-Site Simulators Collect</h3>
<p>Data collected by cell-site simulators can reveal intensely personal information about anyone who carries a phone, whether or not they have ever been suspected of a crime.</p>
<figure class="image"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21349" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/content_CSS-3.png" alt="" width="700" height="438" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/content_CSS-3.png 700w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/content_CSS-3-400x250.png 400w" sizes="(max-width: 700px) 100vw, 700px" /><figcaption>
<div class="image-attribution">Source: EFF</div>
<div class="image-caption">Cell-site simulator surveillance: Cell-site simulators trick your phone into thinking they are base stations.</div>
</figcaption></figure>
<p>&nbsp;</p>
<p>Once your cellular device has connected to a cell-site simulator, the cell-site simulator can determine your location and trigger your device to transmit its  IMSI for later identification. If the cell-site simulator is able to downgrade the cellular connection to a 2G/GSM connection then it can potentially perform much more intrusive acts such as intercepting call metadata (what numbers were called or called the phone and the amount of time on each call),<a href="https://www.justice.gov/sites/default/files/criminal/legacy/2014/10/29/elec-sur-manual.pdf"> the content of unencrypted phone calls and text messages</a> and some types of data usage (such as websites visited).  Additionally, marketing materials produced by the manufacturers of cell-site simulators indicate that they<a href="https://info.publicintelligence.net/Gamma-GSM.pdf"> can be configured</a> to divert calls and text messages, edit messages, and even spoof the identity of a caller in text messages and calls on a 2G/GSM network.</p>
<h3>How Law Enforcement Uses Cell-Site Simulators</h3>
<p>Police can use cell-site simulators to try to locate a person when they already know their phone’s identifying information, or to gather the IMSI (and later the identity) of anyone in a specific area. Some cell-site simulators are small enough to fit in a police cruiser, or even on the vest of an officer, allowing law enforcement officers to drive to multiple locations, capturing from every mobile device in a given area—in some cases<a href="https://theintercept.com/2015/12/17/a-secret-catalogue-of-government-gear-for-spying-on-your-cellphone/"> up to 10,000 phones</a> at a time. These indiscriminate, dragnet searches include phones located in traditionally protected private spaces, such as homes and doctors’ offices.</p>
<p>Law enforcement officers have used information from cell-site simulators to investigate major and minor crimes and civil offenses.<a href="https://www.usatoday.com/story/news/2015/08/23/baltimore-police-stingray-cell-surveillance/31994181/"> Baltimore Police, for example,</a> have used their devices for a wide variety of purposes, ranging from tracking a kidnapper to trying to locate a man who took his wife’s phone during an argument (and later returned it to her).<a href="https://gizmodo.com/maryland-police-used-an-indiscriminate-cellphone-spy-to-1774831661"> In one case</a>, Annapolis Police used a cell-site simulator to investigate a robbery involving $56 worth of submarine sandwiches and chicken wings. In Detroit,<a href="https://www.eff.org/deeplinks/2017/05/no-hunting-undocumented-immigrants-stingrays"> U.S. Immigration and Customs Enforcement used a cell-site simulator</a> to locate and arrest an undocumented immigrant. In California, the San Bernardino county sheriff&#8217;s office <a href="https://arstechnica.com/tech-policy/2018/10/eff-sues-county-sheriff-claims-agency-wont-give-up-stingray-related-records/">used their cell-site simulator over 300 times in a little over a year</a>.</p>
<p>Police may have deployed cell-site simulators at protests. The Miami-Dade Police Department apparently<a href="http://cdn.arstechnica.net/wp-content/uploads/2013/09/miami-dade.pdf"> first purchased a cell-site simulator in 2003 to surveil protestors at a Free Trade of the Americas Agreement conference</a>. And it is suspected that they have been used <a href="https://www.law.georgetown.edu/american-criminal-law-review/wp-content/uploads/sites/15/2022/02/59-1-Owsley-George_Floyd_General_Warrants.pdf">more recently than that </a>during protests against police violence in 2020.</p>
<p>Cell-site simulators<a href="http://www.vocativ.com/389656/stingray-devices-in-trumps-america/"> are used</a> by the FBI, DEA, NSA, Secret Service, and ICE, as well as the U.S. Army, Navy, Marine Corps, and National Guard. U.S. Marshals and the FBI <a href="https://www.wsj.com/articles/americans-cellphones-targeted-in-secret-u-s-spy-program-1415917533">have attached cell-site simulators to airplanes</a> to track suspects, gathering massive amounts of data about many innocent people in the process. The<a href="https://www.texasobserver.org/texas-national-guard-spying-devices-surveillance/"> Texas Observer</a> also uncovered airborne cell-site simulators in use by the Texas National Guard. In 2023 it was revealed that ICE, DHS, and the Secret Service have all <a href="https://www.eff.org/deeplinks/2023/03/report-ice-and-secret-service-conducted-illegal-surveillance-cell-phones">used cell-site simulators many times without following their own rules on deployment or getting a warrant</a>.</p>
<p>A<a href="https://www.eff.org/deeplinks/2017/02/bipartisan-congressional-oversight-committee-wants-probable-cause-warrants-0"> recent Congressional Oversight Committee report</a> called on Congress to pass laws requiring a warrant before using cell-site simulators. Some states,<a href="https://www.eff.org/cases/californias-electronic-communications-privacy-act-calecpa"> such as California</a>, already require a warrant, except in emergency situations.</p>
<h3>Who Sells Cell-site Simulators</h3>
<p>Harris Corporation is the most well known company providing cell-site simulators to law enforcement. Their Stingray product has become the catchphrase for these devices, but they have subsequently introduced other models, such as Hailstorm,<a href="https://www.documentcloud.org/documents/3105805-Arrowhead-1-0-1-Release-Notes.html"> ArrowHead</a>,<a href="https://www.documentcloud.org/documents/3105793-Gemini-3-3-Quick-Start-Guide.html"> AmberJack, and KingFish</a>. Harris has stopped selling cell-site simulator technology to local law enforcement agencies but still works with the federal government. Digital Receiver Technology, a division of Boeing, is also a common supplier of the technology, often referred to as “<a href="https://www.revealnews.org/article/chicago-and-los-angeles-have-used-dirt-box-surveillance-for-a-decade/">dirtboxes</a>.”</p>
<p>Other sellers of cell-site simulators include Keyw, Octastic, Tactical Support Equipment, Berkeley Varitronics, Cogynte, X-Surveillance, Atos, Rayzone, Martone Radio Technology, Septier Communication, PKI Electronic Intelligence, Datong (Seven Technologies Group), Ability Computers and Software Industries, Gamma Group, Rohde &amp; Schwarz, Meganet Corporation. Manufacturers<a href="http://www.septier.com/law-enforcement/"> Septier</a> and<a href="https://info.publicintelligence.net/Gamma-GSM.pdf"> Gamma GSM</a> both provide information on what the devices can capture. The Intercept published a<a href="https://theintercept.com/2015/12/17/a-secret-catalogue-of-government-gear-for-spying-on-your-cellphone/"> secret, internal U.S. government catalogue</a> of various cellphone surveillance devices, as well as an<a href="https://theintercept.com/2016/09/12/long-secret-stingray-manuals-detail-how-police-can-spy-on-phones/"> older cell-site simulator manual</a> made available through a Freedom of Information Act request.</p>
<h3>Threats Posed by Cell-Site Simulators</h3>
<p>Cell-site simulators invade the privacy of everyone who happens to be in a given area, regardless of the fact that the vast majority have not been accused of committing a crime. These are <a href="https://www.hoover.org/sites/default/files/research/docs/lynch_webreadypdf.pdf">general searches</a> that violate the Fourth Amendment requirement that warrants “particularly” describe who or what is to be searched.</p>
<p>The use of cell-site simulators have been shrouded in government secrecy. Police have used cell-site simulators to track location data without a warrant, by deceptively obtaining “pen register” orders from courts without explaining the true nature of the surveillance. In Baltimore, a judge concluded that law enforcement had <a href="https://www.aclu.org/other/state-v-andrews-stingray-june-4-2015-transcript?redirect=state-v-andrews-stingray-june-4-2015-transcript">intentionally withheld the information</a> from the defense, in violation of their legal disclosure obligations. For a while, police departments tried to keep the use of cell-site simulators secret from not just the public but also the court system, withholding information from defense attorneys and judges—likely due in part to<a href="http://www.baltimoresun.com/news/maryland/baltimore-city/bs-md-ci-stingray-case-20150408-story.html"> non-disclosure agreements</a> with Harris Corporation. Prosecutors have<a href="https://www.washingtonpost.com/world/national-security/secrecy-around-police-surveillance-equipment-proves-a-cases-undoing/2015/02/22/ce72308a-b7ac-11e4-aa05-1ce812b3fdd2_story.html"> accepted plea deals</a> to hide their use of cell-site simulators and have even<a href="http://arstechnica.com/tech-policy/2015/04/fbi-would-rather-prosecutors-drop-cases-than-disclose-stingray-details/"> dropped cases</a> rather than revealing information about their use of the technology. U.S. Marshalls have<a href="https://arstechnica.com/tech-policy/2014/06/us-marshals-step-in-thwart-efforts-to-learn-about-cell-tracking-devices/"> driven files hundreds of miles</a> to thwart public records requests. Police have <a href="https://www.eff.org/deeplinks/2015/01/2014-review-stingrays-go-mainstream">tried to keep information secret</a> in Sarasota, Florida, Tacoma, Washington,<a href="https://arstechnica.com/tech-policy/2014/11/prosecutors-drop-key-evidence-at-trial-to-avoid-explaining-stingray-use/"> Baltimore, Maryland</a>, and St. Louis, Missouri.</p>
<p>To preserve this secrecy, the<a href="https://theintercept.com/2016/05/05/fbi-told-cops-to-recreate-evidence-from-secret-cell-phone-trackers/"> FBI told police officers to recreate evidence</a> from the devices, according to a document obtained by the nonprofit investigative journalism outlet Oklahoma Watch.</p>
<p>Cell-site simulators often disrupt cell phone communications within as much as a<a href="http://www.theglobeandmail.com/news/national/rcmp-listening-tool-capable-of-knocking-out-911-calls-memoreveals/article29672075/"> 500-meter radius</a> of the device, interrupting important communications and even <a href="http://www.theglobeandmail.com/news/national/rcmp-listening-tool-capable-of-knocking-out-911-calls-memoreveals/article29672075/">emergency phone calls</a>.  Cell-site simulators have been shown to disproportionately affect low-income communities and communities of color. In Baltimore, the use of cell-site simulators disproportionately impacted African-American communities, according to a map included in an <a href="https://www.eff.org/deeplinks/2016/08/civil-liberties-groups-file-fcc-complaint-arguing-baltimore-police-are-illegally">FCC complaint</a> that overlaid where Baltimore Police were using stingrays over census data on the city’s black population.</p>
<p><a href="https://www.eff.org/deeplinks/2018/08/blog-post-wyden-911-disruption-css">Cell-site simulators can also disrupt emergency calls</a>, such as 911 in the US, making them not only a menace to privacy but to public safety as well.</p>
<p>Cell-site simulators rely on vulnerabilities in our communications system that the government should help fix rather than exploit.</p>
<h3>EFF’s Work on Cell-Site Simulators</h3>
<p>For the reasons above, EFF opposes police use of cell site simulators. Insofar as law enforcement agencies are using cell-site simulators in criminal investigations, EFF argues that use should be limited in the following ways:</p>
<ol>
<li>Law enforcement should obtain individualized warrants based on probable cause;</li>
<li>Cell-site simulators should only be used for serious, violent crimes;</li>
<li>Cell-site simulators should only be used for identifying location of a particular phone;</li>
<li>Law enforcement must minimize the collection of data from people who are not the targets of the investigation.</li>
<li>Companies making cell-site simulators must confirm that their technology does not disrupt calls to emergency services.</li>
</ol>
<h4>Litigation</h4>
<p>We <a href="https://www.eff.org/press/releases/eff-files-foia-suit-over-us-marshals-spy-planes">filed a Freedom of Information Act lawsuit</a> to expose and shine light on the U.S. Marshals Service’s use of cell-site simulators on planes.</p>
<p>Along with the ACLU and ACLU of Maryland, we <a href="https://www.eff.org/deeplinks/2015/12/eff-joins-aclu-amicus-brief-supporting-warrant-requirement-cell-site-simulators">filed an amicus brief</a> in the first case in the country where a judge threw out evidence obtained as a result of using a cell-site simulator without a warrant.</p>
<p>We filed an amicus brief, along with the ACLU, pointing a court to facts indicating that the Milwaukee Police Department secretly used a cell-site simulator to locate a defendant through his cell phone without a warrant in U.S. vs. Damian Patrick. (The government then <a href="https://www.eff.org/document/us-v-patrick-government-letter-admitting-stingray-use">admitted</a> to having used it.)</p>
<h4>Legislation</h4>
<p>We were original co-sponsors of the <a href="https://www.eff.org/cases/californias-electronic-communications-privacy-act-calecpa">California Electronic Communications Privacy Act (CalECPA)</a>, along with the ACLU and the California Newspaper Publisher Association. This law requires California police to get a warrant before using a cell-site simulator. Any evidence obtained from a cell-site simulator without a warrant is inadmissible in court.</p>
<p>EFF supported S.B. 741, which requires transparency measures regarding the use of cell-site simulators. We <a href="https://www.eff.org/deeplinks/2016/04/here-are-79-policies-california-surveillance-tech-where-are-other-90">collected many of these policies</a>.</p>
<h4>Further Research</h4>
<p>We have written a report on the <a href="https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks">technical means possibly used by cell-site simulators called “Gotta Catch ‘em All”</a>, and we have developed a proof of concept technical means of <a href="https://github.com/EFForg/crocodilehunter">detecting cell-site simulators called Crocodile Hunter</a>.</p>
<h3>EFF Cases</h3>
<p><a href="https://www.eff.org/cases/state-maryland-v-kerron-andrews">State of Maryland v. Kerron Andrews</a></p>
<p><a href="https://www.eff.org/cases/us-v-damian-patrick">U.S. v. Damian Patrick</a></p>
<p><a href="https://www.eff.org/cases/us-marshals-airborne-imsi-catchers">EFF v. U.S. Department of Justice</a></p>
<h3><strong>Suggested Additional Reading</strong></h3>
<p><a href="https://www.aclu.org/issues/privacy-technology/surveillance-technologies/stingray-tracking-devices-whos-got-them">Stingray Tracking Devices: Who&#8217;s Got Them?</a> (ACLU)</p>
<p><a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2437678">Your Secret Stingray&#8217;s No Secret Anymore: The Vanishing Government Monopoly over Cell Phone Surveillance and Its Impact on National Security and Consumer Privacy</a> (Harvard Journal of Law and Technology)</p>
<p><a href="https://oversight.house.gov/hearing/examining-law-enforcement-use-of-cell-phone-tracking-devices/">Examining Law Enforcement Use of Cell Phone Tracking Devices</a> (House Oversight Committee)</p>
<p><a href="http://centerformediajustice.org/resources/the-relentless-eye/">The Relentless “Eye” Local Surveillance: Its Impact on Human Rights and Its Relationship to National and International Surveillance</a> (Center for Media Justice and others)</p>
<p><a href="https://www.justice.gov/opa/file/767321/download">Department of Justice Policy Guidance: Use of Cell-Site Simulator Technology</a> (U.S. Department of Justice)</p>
<p><a href="https://theintercept.com/2016/09/12/long-secret-stingray-manuals-detail-how-police-can-spy-on-phones/">Long-Secret Stingray Manuals Detail How Police Can Spy on Phones</a>  (The Intercept)</p>
<p><a href="https://theintercept.com/2015/12/17/a-secret-catalogue-of-government-gear-for-spying-on-your-cellphone/">A Secret Catalogue of Government Gear for Spying on Your Cellphone</a> (The Intercept)</p>
<p><a href="https://gizmodo.com/american-cops-turns-to-canadian-phone-tracking-firm-aft-1845442778">Cops Turn to Canadian Phone-Tracking Firm After Infamous &#8216;Stingrays&#8217; Become &#8216;Obsolete&#8217;</a> (Gizmodo)</p>
</div>
</div>
<p><a href="https://sls.eff.org/technologies/cell-site-simulators-imsi-catchers" target="_blank" rel="noopener">source</a></p>
<p>&nbsp;</p>
<hr />
<div id="tm-row-687d638d57d7d" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d58012" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-heading-687d638d582dd" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">IMSI Catcher System</h4>
</div>
<div id="tm-spacer-687d638d58705" class="tm-spacer"></div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<p>Cellular Interception Solutions help law enforcement authorities to acquire, intercept, analyze and manage cellular communications such as voice, SMS, and Call Related Information (CRI) data. This becomes vital as terrorists and criminal elements rely upon cellular mobile communications to carry out their subversive operations.</p>
<p>The initial step in the interception of any phone is identifying the presence of target phones in the areas of interest. This can be achieved using IMSI-Catcher. IMSI Catcher Systems are designed to collect basic identities (IMSI, IMEI) of 2G, 3G, and 4G mobile phones working within their coverage area without the knowledge of the service providers and the phone users. This enables the agencies to identify the presence of the target in their area of operation. These phones can then be intercepted by Passive, Semi-Active, or Hybrid Interception systems.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5895d" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d58b4f" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-spacer-687d638d58d40" class="tm-spacer"></div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d58e24" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d590a0" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="imsi_contact" class="tm-button-wrapper tm-animation move-up animate"><a class="tm-button style-flat tm-button-nm tm-button- has-icon icon-right" href="https://www.stratign.com/gsm-interception-system-v2/"><span class="button-text" data-text="Contact">Contact </span><i class="fa fa-phone-square"></i></a></div>
<div id="tm-spacer-687d638d59451" class="tm-spacer"></div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d59563" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5977f" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-heading-687d638d599fb" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">Passive GSM Interception System</h4>
</div>
<div id="tm-spacer-687d638d59e54" class="tm-spacer"></div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<p>Passive GSM Interception System is the most advanced monitoring system that does not transmit any information, hence making it completely undetectable by the operator or by the target that is being intercepted.</p>
</div>
</div>
<div id="tm-spacer-687d638d59f14" class="tm-spacer"></div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d59fdc" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5a1c4" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div class="wpb_raw_code wpb_content_element wpb_raw_html">
<div class="wpb_wrapper"><img loading="lazy" decoding="async" class="alignnone wp-image-21350" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-scaled.png" alt="" width="715" height="455" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-scaled.png 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-400x255.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-1024x652.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-768x489.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-1536x978.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-PASSIVE-CELLPHONE-INTERCEPTION-SYSTEM-2048x1304.png 2048w" sizes="(max-width: 715px) 100vw, 715px" /></div>
</div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5a4d5" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5a6dc" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-heading-687d638d5a934" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">Features</h4>
</div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<ul>
<li>System is completely passive, and its presence cannot be detected either by the target or by the service provider.</li>
<li>Capable of intercepting 2G, 3G, 4G and 5G networks.</li>
<li>Capable of intercepting calls and messages.</li>
<li>Location of targets can be displayed on a digital map</li>
<li>Capable of intercepting 4 to 32 at a time from across multiple service providers.</li>
<li>Real-time passive deciphering of A5/1, A5/2, and A5/0 encrypted signals.</li>
<li>System stores intercepted voice calls, SMS, and protocol information on the control PC hard drive.</li>
<li>Addition configuration of Open-Source Intelligence (OSINT), Voice Print Analysis, Link analysis.</li>
</ul>
</div>
</div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5af4e" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5b1de" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-spacer-687d638d5b36c" class="tm-spacer"></div>
<div id="tm-heading-687d638d5b46a" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">Semi-Active GSM Interception System</h4>
</div>
<div id="tm-spacer-687d638d5b8ad" class="tm-spacer"></div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<p>Semi-Active GSM Interception System can intercept incoming and outgoing communications between the Base Station, and the Mobile Handset using the principle of Man-in-the-Middle, without being detectable by the operator or by the target that is being intercepted.</p>
</div>
</div>
<div id="tm-spacer-687d638d5b96f" class="tm-spacer"></div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5ba45" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5bc44" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div class="wpb_raw_code wpb_content_element wpb_raw_html">
<div class="wpb_wrapper"><img loading="lazy" decoding="async" class="alignnone wp-image-21351" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-scaled.png" alt="" width="865" height="551" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-scaled.png 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-400x255.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-1024x652.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-768x489.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-1536x978.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-SEMI-ACTIVE-CELLPHONE-INTERCEPTION-SYSTEM-2048x1305.png 2048w" sizes="(max-width: 865px) 100vw, 865px" /></div>
</div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5beb6" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5c149" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-heading-687d638d5c3d3" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">Features</h4>
</div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<ul>
<li>Interception does not require the service provider’s assistance or SIM for operation.</li>
<li>Real-time listening of the intercepted cell phone calls.</li>
<li>Capable of intercepting 2G, 3G, 4G and 5G networks.</li>
<li>Real-time deciphering of A5/1, A5/2, and A5/0 encrypted signals.</li>
<li>Capable of intercepting voice, SMS, and Call Related Information (CRI) data.</li>
<li>Location of targets can be determined with an accuracy for up to 5 meters.</li>
<li>Handheld direction finder for better location accuracy</li>
<li>Selective jamming capability using which the operator can disable certain services of the target like outgoing call, incoming call, SMS, etc.</li>
<li>Spoofing and manipulating Text Messages and Calls.</li>
<li>Capable of intercepting 4 to 32 at a time from across multiple service providers.</li>
<li>Addition configuration of Open-Source Intelligence (OSINT), Voice Forensics, Keyword Spotting.</li>
</ul>
</div>
</div>
<div id="tm-spacer-687d638d5c8bb" class="tm-spacer"></div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5c9a5" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5cbf8" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-spacer-687d638d5cd57" class="tm-spacer"></div>
<div id="tm-heading-687d638d5cdf7" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">Hybrid GSM Interception System</h4>
</div>
<div id="tm-spacer-687d638d5d1f8" class="tm-spacer"></div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<p>Hybrid GSM Interception system is a combination of Passive and Semi-Active interception systems. The basic functioning of the system is like the passive system and is turned into an active one only when required.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5d378" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5d593" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div class="wpb_raw_code wpb_content_element wpb_raw_html">
<div class="wpb_wrapper"><img loading="lazy" decoding="async" class="alignnone wp-image-21352" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-scaled.png" alt="" width="774" height="493" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-scaled.png 2560w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-400x255.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-1024x652.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-768x489.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-1536x978.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/f-HYBRID-CELLPHONE-INTERCEPTION-SYSTEM-2048x1305.png 2048w" sizes="(max-width: 774px) 100vw, 774px" /></div>
</div>
</div>
</div>
</div>
</div>
<div id="tm-row-687d638d5d82b" class="vc_row vc_row-outer vc_row-fluid">
<div id="tm-column-687d638d5d9eb" class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div id="tm-heading-687d638d5dbb8" class="tm-heading left tm-animation move-up animate">
<h4 class="heading">Features</h4>
</div>
<div class="wpb_text_column wpb_content_element tm-animation move-up animate">
<div class="wpb_wrapper">
<ul>
<li>In Passive Mode all features of the passive system will apply.</li>
<li>In Semi-Active Mode all features of the Semi-Active Mode system will apply. <a href="https://www.stratign.com/gsm-interception-system-v2/" target="_blank" rel="noopener">source</a></li>
</ul>
</div>
</div>
</div>
</div>
</div>
</div>
<hr />
<h1 class="entry-title">Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic</h1>
<p><strong>Tyler Tucker (University of Florida), Nathaniel Bennett (University of Florida), Martin Kotuliak (ETH Zurich), Simon Erni (ETH Zurich), Srdjan Capkun (ETH Zuerich), Kevin Butler (University of Florida), Patrick Traynor (University of Florida)</strong></p>
<p>&nbsp;</p>
<p>IMSI-Catchers allow parties other than cellular network providers to covertly track mobile device users. While the research community has developed many tools to combat this problem, current solutions focus on correlated behavior and are therefore subject to substantial false classifications. In this paper, we present a standards-driven methodology that focuses on the messages an IMSI-Catcher textit{must} use to cause mobile devices to provide their permanent identifiers. That is, our approach focuses on causal attributes rather than correlated ones. We systematically analyze message flows that would lead to IMSI exposure (most of which have not been previously considered in the research community), and identify 53 messages an IMSI-Catcher can use for its attack. We then perform a measurement study on two continents to characterize the ratio in which connections use these messages in normal operations. We use these benchmarks to compare against open-source IMSI-Catcher implementations and then observe anomalous behavior at a large-scale event with significant media attention. Our analysis strongly implies the presence of an IMSI-Catcher at said public event ($p &lt;&lt; 0.005$), thus representing the first publication to provide evidence of the statistical significance of its findings. <a href="https://www.ndss-symposium.org/ndss-paper/detecting-imsi-catchers-by-characterizing-identity-exposing-messages-in-cellular-traffic/" target="_blank" rel="noopener">source</a></p>
<p>&nbsp;</p>
<blockquote class="wp-embedded-content" data-secret="148xCekYPH"><p><a href="https://goodshepherdmedia.net/detecting-imsi-catchers-tools-apps-and-methods-you-should-know/">Detecting IMSI Catchers: Tools, Apps and Methods You Should Know</a></p></blockquote>
<p><iframe class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;Detecting IMSI Catchers: Tools, Apps and Methods You Should Know&#8221; &#8212; Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content" src="https://goodshepherdmedia.net/detecting-imsi-catchers-tools-apps-and-methods-you-should-know/embed/#?secret=adQrYGaIcF#?secret=148xCekYPH" data-secret="148xCekYPH" width="600" height="338" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DHS: Salt Typhoon hackers breached Army National Guard, exposing admin credentials and network diagrams</title>
		<link>https://goodshepherdmedia.net/dhs-salt-typhoon-hackers-breached-army-national-guard-exposing-admin-credentials-and-network-diagrams/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Wed, 23 Jul 2025 20:16:24 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[breached Army National Guard]]></category>
		<category><![CDATA[DHS: Salt Typhoon hack]]></category>
		<category><![CDATA[Salt Typhoon hackers breach]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=21330</guid>

					<description><![CDATA[DHS: Salt Typhoon hackers breached Army National Guard, exposing admin credentials and network diagrams Following the &#8220;Salt Typhoon&#8221; breach, which compromised U.S. Army National Guard networks, a former Air National Guard servicemember stated that all U.S. forces should now operate under the assumption that their networks are compromised and will be degraded, according to Nextgov/FCW. This reflects [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="single-post-title">DHS: Salt Typhoon hackers breached Army National Guard, exposing admin credentials and network diagrams</h1>
<div class="WaaZC">
<div class="RJPOee EIJn2">
<div class="rPeykc" data-hveid="CAMQAQ" data-ved="2ahUKEwihv7D_n8yOAxXPM0QIHZo6AEcQo_EKegQIAxAB"><span data-huuid="12237279190710991000"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21332" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/hacker.jpg" alt="" width="800" height="450" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/hacker.jpg 800w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hacker-400x225.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/hacker-768x432.jpg 768w" sizes="(max-width: 800px) 100vw, 800px" /></span></div>
<div class="rPeykc" data-hveid="CAMQAQ" data-ved="2ahUKEwihv7D_n8yOAxXPM0QIHZo6AEcQo_EKegQIAxAB"><span data-huuid="12237279190710991000">Following the &#8220;Salt Typhoon&#8221; breach, which compromised U.S. Army National Guard networks, a former Air National Guard servicemember stated that all U.S. forces should now operate under the assumption that their networks are compromised and will be degraded, <a class="uVhVib" href="http://www.fcw.com/cybersecurity/2025/07/salt-typhoon-hacks-national-guard-systems-serious-escalation-experts-warn/406765/?oref=ng-homepage-river" target="_blank" rel="noopener">accordin</a>g to Nextgov/FCW. </span><span data-huuid="12237279190710988909">This reflects a heightened state of alert and a need for enhanced cybersecurity measures due to the severity of the breach, which has been described as the &#8220;worst telecom breach&#8221; in American history.<span class="pjBG2e" data-cid="0797aaf2-ae2f-4700-a36d-426170506124"><span class="UV3uM"> </span></span></span></p>
<div class="NPrrbc" data-cid="0797aaf2-ae2f-4700-a36d-426170506124" data-uuids="12237279190710991000,12237279190710988909">
<div class="BMebGe btku5b fCrZyc LwdV0e FR7ZSc qVhvac OJeuxf" tabindex="0" role="button" aria-label="View related links" data-hveid="CAYQAQ" data-ved="2ahUKEwihv7D_n8yOAxXPM0QIHZo6AEcQ3fYKegQIBhAB">
<div class="niO4u">
<div class="kHtcsd"></div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="WaaZC">
<div class="RJPOee EIJn2">
<div class="rPeykc" data-hveid="CAsQAQ" data-ved="2ahUKEwihv7D_n8yOAxXPM0QIHZo6AEcQo_EKegQICxAB"><span data-huuid="12237279190710988823">The Salt Typhoon breach, attributed to hackers connected to China, targeted a U.S. state&#8217;s Army National Guard network, starting in March. </span><span data-huuid="12237279190710990828">The extent of the compromise and the potential for further damage have prompted this call for a more cautious approach to network security across all U.S. forces, according to Nextgov/FCW.</span></div>
</div>
</div>
<div data-hveid="CAsQAQ" data-ved="2ahUKEwihv7D_n8yOAxXPM0QIHZo6AEcQo_EKegQICxAB"></div>
<div data-hveid="CAsQAQ" data-ved="2ahUKEwihv7D_n8yOAxXPM0QIHZo6AEcQo_EKegQICxAB">
<p><iframe title="Salt Typhoon hack targeted National Guard computer networks" width="640" height="360" src="https://www.youtube.com/embed/xHuiRx6Tw18?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
</div>
<div class="WaaZC">
<div data-hveid="CAsQAQ" data-ved="2ahUKEwihv7D_n8yOAxXPM0QIHZo6AEcQo_EKegQICxAB">
<p>Officials with both the National Guard Bureau and the Department of Homeland Security (DHS) confirmed to MeriTalk today that the China-based Salt Typhoon hacking group targeted National Guard networks for attacks between March and December 2024.</p>
<p>These attacks have potentially far-reaching implications for the security of other National Guard unit networks and critical infrastructure entities that the guard helps to protect.</p>
<p>Both agencies indicated that the attacks targeted multiple National Guard networks, and that they have been working on steps to mitigate the impact of the attacks.</p>
<p>A <strong>re</strong><strong>p</strong><strong>ort</strong> from NBC News last night broke the news of the attacks, and cited as a primary source of its reporting a June 11 <a href="https://www.documentcloud.org/documents/25998809-20250611-dhs-salt-typhoon/"><strong>memo</strong></a> from DHS’s Office of Intelligence and Analysis detailing the Salt Typhoon attacks. That memo lays out how extensive the blast radius of the attack may have been.</p>
<p>“A recent compromise of a US state’s Army National Guard network by People’s Republic of China (PRC)-associated cyber actors – publicly tracked as Salt Typhoon – likely provided Beijing with data that could facilitate the hacking of other states’ Army National Guard units, and possibly many of their state-level cybersecurity partners,” the DHS memo says.</p>
<p>“If the PRC-associated cyber actors that conducted the hack succeeded in the latter, it could hamstring state-level cybersecurity partners’ ability to defend US critical infrastructure against PRC cyber campaigns in the event of a crisis or conflict,” the DHS memo warns.</p>
<p>The memo also offers guidance to help the National Guard and state governments to detect, prevent, and mitigate against threats emanating from the Salt Typhoon attacks.</p>
<p>The DHS memo goes on to say that that the Salt Typhoon attacks “extensively compromised” the unnamed state National Guard’s network, “and, among other things, collected its network configuration and its data traffic with its counterparts’ networks in every other US state and at least four US territories, according to a DOD [Defense Department] report.”</p>
<p>“This data also included these networks’ administrator credentials and network diagrams – which could be used to facilitate follow-on Salt Typhoon hacks of these units,” the memo says.</p>
<p>“Salt Typhoon has previously used exfiltrated network configuration files to enable cyber intrusions elsewhere,” the memo says, adding, “Between January and March 2024, Salt Typhoon exfiltrated configuration files associated with other US government and critical infrastructure entities, including at least two US state government agencies. At least one of these files later informed their compromise of a vulnerable device on another US government agency’s network.”</p>
<p>“Salt Typhoon’s success in compromising states’ Army National Guard networks nationwide could undermine local cybersecurity efforts to protect critical infrastructure,” the memo warns, adding, “In some 14 states, Army National Guard units are integrated with state fusion centers responsible for sharing threat information – including cyber threats. In at least one state, the local Army National Guard unit directly provides network defense services.”</p>
<p>“DHS regularly communicates threat information with its partners and in June shared an update on the People’s Republic of China-affiliated hacking group, Salt Typhoon, targeting National Guard networks between March and December 2024,” a DHS spokesperson said today.</p>
<p>“DHS is continuing to analyze these types of attacks and is coordinating closely with the National Guard and other partners to prevent future attacks and mitigate risk,” the spokesperson said.</p>
<p>“The National Guard is aware of recent Department of Defense and Department of Homeland Security reporting regarding the Peoples Republic of China-affiliated hacking group, Salt Typhoon, and their targeting of Army National Guard networks between March and December 2024,” a spokesperson for the National Guard Bureau told MeriTalk today.</p>
<p>“While we cannot provide specific details on the attack or our response to it, we can say this attack has not prevented the National Guard from accomplishing assigned state or federal missions, and that NGB continues to investigate the intrusion to determine its full scope,” the spokesperson said.</p>
<p>“We are taking this matter extremely seriously,” the spokesperson said. “Security protocols are in place to mitigate further risk and contain any potential data compromises, and the response is ongoing. We are coordinating closely with DHS and other federal partners.”</p>
<p>At least one private sector cybersecurity expert reacted with considerable alarm to the news.</p>
<p>“Salt Typhoon’s compromise of the US National Guard is a significant event and potentially poses a serious threat to many Department of Defense systems,” said Gary Barlet, Illumio’s public sector chief technology officer.</p>
<p>“Going forward, all US forces must now assume their networks are compromised and will be degraded,” Barlet warned.</p>
<p>This isn’t the first breach of Department of Defense systems we’ve seen,” Barlet said. “There have been numerous instances across both the public and private sector where sensitive information has been compromised and critical systems accessed via lateral movement.”</p>
<p>“In fact, the <strong><a href="https://www.illumio.com/news/cost-of-ransomware-study">Ponemon Institute</a></strong> highlighted that 55% of organizations admitted a compromised device had infected other devices on the network,” he said.</p>
<p>“The ability of groups such as Salt Typhoon to move laterally across different units and systems is why government agencies must accelerate Zero Trust adoption and go even further with a breach containment strategy,” Barlet emphasized. “It is critical that services and data remain secure even when attackers have compromised a section of the network.”</p>
<p>The Salt Typhoon and related Volt Typhoon hacking groups backed by the Chinese government have emerged in recent years as sophisticated threat actors. Earlier this year, a U.S. intelligence community report <strong>said</strong> that the PRC poses the biggest cyber threat to the United States. <a href="https://www.meritalk.com/articles/dhs-national-guard-confirm-salt-typhoon-attacks-on-guard-networks/" target="_blank" rel="noopener">source</a></p>
</div>
</div>
<p id="anchor-8046ae" class="body-graf">An elite Chinese cyberspy group hacked at least one state’s National Guard network for nearly a year, the Department of Defense has found.</p>
<p id="anchor-72a2f6" class="body-graf">The hackers, already responsible for one of the most expansive cyberespionage campaigns against the U.S. to date, are alleged to have burrowed even further than previously known and may have obtained sensitive military or law enforcement information. Authorities are still working to discover the extent of the data accessed.</p>
<p id="anchor-225054" class="body-graf">A Department of Homeland Security <a href="https://www.documentcloud.org/documents/25998809-20250611-dhs-salt-typhoon/" target="_blank" rel="noopener">memo from June</a>, describing the Pentagon’s findings, said that the group, publicly known by the nickname Salt Typhoon, “extensively compromised a U.S. state’s Army National Guard network” from March 2024 through December. The memo did not say which state.</p>
<p id="anchor-e19aa3" class="body-graf">The report was provided to NBC News through the national security transparency nonprofit Property of the People, which obtained it through a freedom of information request.</p>
<p id="anchor-cb9f01" class="body-graf">The Department of Defense didn’t respond to a request for comment. A National Guard Bureau spokesperson confirmed the compromise but declined to share details.</p>
<p id="anchor-ffa686" class="body-graf">“While we cannot provide specific details on the attack or our response to it, we can say this attack has not prevented the National Guard from accomplishing assigned state or federal missions, and that NGB continues to investigate the intrusion to determine its full scope,” the spokesperson said.</p>
<p id="anchor-87fa2a" class="body-graf">A spokesperson for China’s embassy in Washington did not deny the campaign but said the U.S. has failed to prove China is behind the Salt Typhoon hacks.</p>
<p id="anchor-85c708" class="body-graf">“Cyberattacks are a common threat faced by all countries, China included,” the spokesperson said, adding that the U.S. “has been unable to produce conclusive and reliable evidence that the ‘Salt Typhoon’ is linked to the Chinese government.</p>
<p id="anchor-384df2" class="body-graf">Salt Typhoon is notorious even by the standards of China’s massive cyberspy efforts because of its ability to jump from one organization to another. Last year, U.S. authorities found that it had hacked <a href="https://www.nbcnews.com/tech/security/chinese-hackers-stole-americans-phone-data-8-telecoms-us-officials-say-rcna182942" target="_blank" rel="noopener">at least eight</a> of the country’s largest internet and phone companies, including AT&amp;T and Verizon, using access to <a href="https://www.nbcnews.com/tech/security/china-phone-target-hack-trump-vance-harris-rcna177383" target="_blank" rel="noopener">spy on the calls and text messages</a> of both the Harris and Trump presidential campaigns, as well as the office of then-Senate Majority Leader Chuck Schumer.</p>
<p id="anchor-f2148e" class="body-graf">While part of the Department of Defense, National Guard units are also under the authority of their states; some are deeply integrated with local governments or law enforcement, which may have given the Salt Typhoon hackers the ability to compromise other organizations.</p>
<p id="anchor-3b146e" class="body-graf">The hack “likely provided Beijing with data that could facilitate the hacking of other states’ Army National Guard units, and possibly many of their state-level cybersecurity partners,” the DHS report found. The National Guard in 14 U.S. states work with law enforcement “fusion centers” to share intelligence, the DHS memo notes. The hackers accessed a map of geographic locations in the targeted state, diagrams of how internal networks are set up, and personal information of service members, it said.</p>
<p id="anchor-0e3f15" class="body-graf">In January, the Treasury Department — also a recent target of alleged Chinese hacking — <a href="https://home.treasury.gov/news/press-releases/sb0042" target="_blank" rel="noopener">sanctioned a Sichuan company</a> for allegedly helping Beijing’s Ministry of State Security conduct Salt Typhoon operations.</p>
<p id="anchor-807819" class="endmark body-graf">Salt Typhoon can be pernicious and hard to root out once the hackers take hold. In the AT&amp;T case, <a href="https://www.reuters.com/technology/cybersecurity/chinese-salt-typhoon-cyberespionage-targets-att-networks-secure-carrier-says-2024-12-29/" target="_blank" rel="noopener">the company announced</a> in December that it appeared as if they were no longer being affected and <a href="https://www.verizon.com/about/news/verizon-provides-update-salt-typhoon-matter" target="_blank" rel="noopener">Verizon said in January it had “contained”</a> the incident. Both companies stopped short of saying they were fully protected from the hackers returning. A <a href="https://blog.talosintelligence.com/salt-typhoon-analysis/" target="_blank" rel="noopener">report from Cisco</a> said that, in at least one instance, Salt Typhoon hackers remained in an affected environment for up to three years. <a href="https://www.nbcnews.com/tech/security/national-guard-was-hacked-chinas-salt-typhoon-group-dhs-says-rcna218648" target="_blank" rel="noopener">source</a></p>
<hr />
<h1 class="single-post-title"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-21333" src="https://goodshepherdmedia.net/wp-content/uploads/2025/07/china-hacks-us-1-1024x585-1.jpg" alt="" width="1024" height="585" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/07/china-hacks-us-1-1024x585-1.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/china-hacks-us-1-1024x585-1-400x229.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/07/china-hacks-us-1-1024x585-1-768x439.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" /></h1>
<h1 class="single-post-title">DHS: Salt Typhoon hackers breached Army National Guard, exposing admin credentials and network diagrams</h1>
<p>A U.S. Department of Homeland Security (DHS) memo circulated in June revealed that a Chinese cyberespionage group known as Salt Typhoon ‘extensively compromised a U.S. state’s Army National Guard network over nine months in 2024. The memo, which cites findings from the Department of Defense, said the breach lasted from March through December and did not specify which state was targeted. It also revealed that the stolen data included administrator credentials and detailed network diagrams, basically information that could enable Salt Typhoon hackers to carry out follow-on attacks against the compromised installations.</p>
<p>The memo, however, <a href="https://www.documentcloud.org/documents/25998809-20250611-dhs-salt-typhoon/" target="_blank" rel="noreferrer noopener">noted that</a> “If the PRC-associated cyber actors that conducted the hack succeeded in the latter, it could hamstring state-level cybersecurity partners’ ability to defend US critical infrastructure against PRC cyber campaigns in the event of a crisis or conflict.”</p>
<p>The DHS also identified that in 2023 and 2024, Salt Typhoon also stole 1,462 network configuration files associated with approximately 70 U.S. government and critical infrastructure entities from 12 sectors, including energy, <a href="https://industrialcyber.co/critical-infrastructure/ericsson-to-lead-security-first-overhaul-of-telecom-defense-as-nation-state-cyber-threats-intensify-in-2025/">communications</a>, transportation, and water and wastewater sectors. “These configuration files could enable further computer network exploitation of other networks, including data capture, administrator account manipulation, and <a href="https://industrialcyber.co/ics-security-framework/vedere-labs-details-deep-lateral-movement-in-ot-networks-provides-mitigation-strategies/">lateral movement</a> between networks, according to CISA reporting and NSA guidance.”</p>
<p>Salt Typhoon, already tied to some of the most aggressive cyber operations against the U.S., is now believed to have gained deeper access than previously known, raising concerns that the hackers may have obtained sensitive military or law enforcement information. Federal officials are still investigating the extent of the data exposure.</p>
<p>A National Guard Bureau spokesperson <a href="https://www-nbcnews-com.cdn.ampproject.org/c/s/www.nbcnews.com/news/amp/rcna218648" target="_blank" rel="noreferrer noopener">confirmed</a> the compromise to NBC News, but declined to share details. “While we cannot provide specific details on the attack or our response to it, we can say this attack has not prevented the National Guard from accomplishing assigned state or federal missions, and that NGB continues to investigate the intrusion to determine its full scope,” the spokesperson said.</p>
<p>The DHS revealed that between January and March 2024, Salt Typhoon exfiltrated configuration files associated with other U.S. government and critical infrastructure entities, including at least two U.S. state government agencies. At least one of these files later informed them of a compromise of a vulnerable device on another U.S. government agency’s network.</p>
<p>It added that Salt Typhoon’s success in compromising states’ Army National Guard networks nationwide could undermine local cybersecurity efforts to protect critical infrastructure. “In some 14 states, Army National Guard units are integrated with state fusion centers responsible for sharing threat information—including cyber threats. In at least one state, the local Army National Guard unit directly provides network defense services.”</p>
<p>The memo also identified that Salt Typhoon access to Army National Guard networks in these states could include information on state cyber defense posture, as well as the personally identifiable information (PII) and work locations of state cybersecurity personnel data that could be used to inform future cyber-targeting efforts.</p>
<p>According to DOD reporting, in 2024, Salt Typhoon used its access to a US state’s Army National Guard network to exfiltrate administrator credentials, network traffic diagrams, a map of geographic locations throughout the state, and PII of its service members.</p>
<p>The DHS memo surfaces as senior cybersecurity officials from the National Security Agency and the FBI report progress in disrupting Chinese cyber campaigns targeting U.S. critical infrastructure.</p>
<p>Speaking Tuesday at the International Conference on Cyber Security at Fordham University in New York City, experts <a href="https://therecord.media/china-typhoon-hackers-nsa-fbi-response" target="_blank" rel="noreferrer noopener">detailed</a> Beijing’s so-called Typhoon campaigns, where coordinated efforts involving both Chinese government entities and private sector actors aimed at infiltrating U.S. government agencies and critical infrastructure installations.</p>
<p>Kristina Walter, director of the NSA’s Cybersecurity Collaboration Center, focused on <a href="https://industrialcyber.co/critical-infrastructure/uat-5918-apt-group-targets-taiwan-critical-infrastructure-possible-linkage-to-volt-typhoon/">Volt Typhoon,</a> an effort by Chinese actors to preposition themselves on U.S. critical infrastructure for disruptive or destructive cyberattacks in the event of a <a href="https://industrialcyber.co/analysis/digital-battlegrounds-evolving-hybrid-kinetic-warfare/">kinetic conflict</a> centered around Taiwan.</p>
<p>“The good news is, they really failed. They wanted to persist in domestic networks very quietly for a very long time so that if and when they needed to disrupt those networks, they could. They were not successful in that campaign,” she said.</p>
<p>“We, with private sector, with FBI, found them, understood how they were using the operating systems, how they’re using legitimate credentials to maintain persistence, and frankly, we equipped the entire private sector and U.S. government to hunt for them and detect them.”</p>
<p>Walter did not offer further details about those efforts. She said that after the NSA and other agencies released a <a href="https://industrialcyber.co/critical-infrastructure/cyber-attacks-continue-to-hit-critical-infrastructure-exposing-vulnerabilities-in-oil-water-healthcare-sectors/">public advisory in 2024</a>, owners of <a href="https://industrialcyber.co/industrial-cyber-attacks/cyble-warns-hacktivists-shift-tactics-targeting-critical-infrastructure-with-ics-attacks-data-breaches-intrusions/">critical infrastructure</a> reached out to them to confirm that they had found evidence of Volt Typhoon and ask for help.</p>
<p>Brett Leatherman, who was <a href="https://industrialcyber.co/critical-infrastructure/federal-cyber-posts-see-fresh-faces-amid-push-to-boost-national-resilience-reinforce-digital-defenses/">recently appointed</a> assistant director for cyber at the FBI, echoed those remarks and noted that Volt Typhoon was specifically focused on critical infrastructure centered around the U.S. Navy, particularly <a href="https://therecord.media/chinese-hackers-behind-guam-hack-targeting-us-for-years" target="_blank" rel="noreferrer noopener">in island communities like Guam</a>.</p>
<p>He said U.S. efforts to shine a light on the campaign forced Chinese actors to pull back, adapt their tactics, and burn previous methods they used to breach critical infrastructure systems. The publicity fostered by U.S. agencies forced Chinese groups to come up with new ways to breach organizations while also providing ways for private industry to better defend itself.</p>
<p>“Even if you’re not dismantling that network — we’re never going to dismantle the CCP hacking apparatus — but if you can bring real relief to victims, you’re also protecting national security by doing that, and that’s why public attribution is so important when it comes to PRC hacking activity,” he said.</p>
<p>Commenting on the DHS memo, Ensar Seker, CISO at SOCRadar, wrote in an emailed statement that the revelation that Salt Typhoon maintained access to a U.S. National Guard network for nearly a year is a serious escalation in the cyber domain.</p>
<p>“This isn’t just an opportunistic intrusion. It reflects deliberate, long-term espionage designed to quietly extract strategic intelligence. The group’s sustained presence suggests they were gathering more than just files, they were likely mapping infrastructure, monitoring communication flows, and identifying exploitable weak points for future use,” according to Seker. “What’s deeply concerning is that this activity went undetected for so long in a military environment. It raises questions about visibility gaps, segmentation policies, and detection capabilities in hybrid federal-state defense networks.”</p>
<p>He added that it’s another reminder that advanced persistent threat actors like Salt Typhoon are not only targeting federal agencies but also state-level components, where the security posture might be more varied.</p>
<p>“In a time where we are often fooled into thinking cybercrime means somebody telling us that we missed jury duty, or convincing our loved ones of a long-distance romantic relationship, we sometimes miss the fact that this is more than a game and is played at the nation state level,” Erich Kron, security awareness advocate at KnowBe4, wrote in an emailed statement. “Cybercrime has real dangers for real people and real governments as well. The Typhoon groups, several different alleged Chinese-backed cybercrime groups that carry the ‘Typhoon’ moniker as part of their name, have been known to be very stealthy and very effective. While this was at the state level with the National Guard, it still goes to demonstrate that even our military forces are at risk from these cybercrime groups.”</p>
<p>He added that “These criminal groups must be taken seriously, which means that everyone from senior government leadership to the average citizen needs to be at least somewhat aware of the threats, how to spot them, and who to report them to. Whether it’s stealing money from individuals to fund other operations or trying to cripple infrastructure through cyberattacks, these bad actors are a clear and present danger.” <a href="https://industrialcyber.co/critical-infrastructure/dhs-salt-typhoon-hackers-breached-army-national-guard-exposing-admin-credentials-and-network-diagrams/" target="_blank" rel="noopener">source</a></p>
<hr />
<div class="dw-term-title">
<h1>Major US telecom hack prompts security push after Salt Typhoon attack</h1>
<p><iframe title="Salt Typhoon ‘largely contained’ in telecom networks; Pentagon AI office eliminates CTO directorate" width="640" height="360" src="https://www.youtube.com/embed/R__Ikzi4HGM?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
</div>
<div class="updates-excerpt dw-content-box-p">
<p>Officials urge stronger defences after Chinese hackers infiltrated major US telecom networks.</p>
<div class="dw-term-description dw-content-box-p">
<p id="Lawmakershave">Lawmakers <a href="https://www.reuters.com/technology/cybersecurity/senators-say-us-must-boost-security-after-chinese-salt-typhoon-telecom-hacking-2024-12-11/" target="_blank" rel="noreferrer noopener nofollow">have called</a> for urgent measures to strengthen US telecommunications security following a massive cyberattack linked to China. The hacking campaign, referred to as Salt Typhoon, targeted American telecom companies, compromising vast amounts of metadata and call records. Federal agencies have briefed Congress on the incident, which officials say could be the largest telecom breach in US history.</p>
<p id="SenatorBen">Senator Ben Ray Luján described the hack as a wake-up call, urging the full implementation of federal recommendations to secure networks. Senator Ted Cruz warned of future threats, emphasising the need to close vulnerabilities in critical infrastructure. Debate also surfaced over the role of offensive cybersecurity measures, with Senator Dan Sullivan questioning whether deterrence efforts are adequate.</p>
<p id="TheWhite">The White House reported that <a href="https://dig.watch/updates/salt-typhoon-cyberespionage-operation-raises-alarm-over-us-telecommunications-security-vulnerabilities" target="_blank" rel="noreferrer noopener">at least eight telecommunications firms were affected</a>, with significant data theft. In response, Federal Communications Commission Chairwoman Jessica Rosenworcel proposed annual cybersecurity certifications for telecom companies. Efforts to replace insecure Chinese-made equipment in US networks continue, but funding shortfalls have hampered progress.</p>
<p id="Chinahas"><a href="https://dig.watch/countries/china" target="_blank" rel="noreferrer noopener">China</a> has dismissed the allegations, claiming opposition to all forms of cybercrime. However, US officials have cited evidence of data theft involving companies like Verizon, AT&amp;T, and Lumen. Congress is set to vote on a defence bill allocating $3.1 billion to remove and replace vulnerable telecom hardware. <a href="https://dig.watch/updates/major-us-telecom-hack-prompts-security-push-after-salt-typhoon-attack" target="_blank" rel="noopener">source</a></p>
</div>
</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Setting Up A Police Scanner With An RTL-SDR</title>
		<link>https://goodshepherdmedia.net/setting-up-a-police-scanner-with-an-rtl-sdr/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 10 Mar 2025 00:15:19 +0000</pubDate>
				<category><![CDATA[Adult Fun]]></category>
		<category><![CDATA[Computer Hacks]]></category>
		<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Corruption Over the Years]]></category>
		<category><![CDATA[Electronic Projects]]></category>
		<category><![CDATA[Entertainment]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Tools Questions]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[🙂Fun Facts🙂]]></category>
		<category><![CDATA[🚨👮Cops Gone Wild 🤡💩]]></category>
		<category><![CDATA[Setting Up A Police Scanner With An RTL-SDR]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=19248</guid>

					<description><![CDATA[Setting Up A Police Scanner With An RTL-SDR The RTL-SDR Blog V4 dongle can be used with SDRTrunk software to listen to trunked police radio and other communications. The RTL-SDR is a wide band radio scanner that can be used for a variety of purposes, including police radio scanning, listening to EMS and fire communications, and more. [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>Setting Up A Police Scanner With An RTL-SDR</h1>
<div class="WaaZC">
<div class="RJPOee EIJn2">
<div class="rPeykc" data-hveid="CAMQAQ" data-ved="2ahUKEwjfhvni-f2KAxWKJ0QIHcb2KfsQo_EKegQIAxAB">
<p><span data-huuid="7081602413228056754">The RTL-SDR Blog V4 dongle <mark class="QVRyCf">can be used with SDRTrunk software to listen to trunked police radio and other communications</mark>. </span><span data-huuid="7081602413228060523">The RTL-SDR is a wide band radio scanner that can be used for a variety of purposes, including police radio scanning, listening to EMS and fire communications, and more.</span></p>
<div class="NPrrbc" data-cid="214fe8dd-f069-4ae1-ac58-93e32083cde4" data-uuids="7081602413228056754,7081602413228060523">
<div class="BMebGe btku5b fCrZyc LwdV0e FR7ZSc OJeuxf" tabindex="0" role="button" aria-label="View related links" data-hveid="CAcQAQ" data-ved="2ahUKEwjfhvni-f2KAxWKJ0QIHcb2KfsQ3fYKegQIBxAB">
<div class="niO4u">
<div class="kHtcsd"></div>
</div>
</div>
</div>
</div>
</div>
</div>
<div data-hveid="CAMQAQ" data-ved="2ahUKEwjfhvni-f2KAxWKJ0QIHcb2KfsQo_EKegQIAxAB">
<p><iframe title="Turn your Computer into a Trunked Police Scanner for 35$ Unitrunker v2" width="640" height="360" src="https://www.youtube.com/embed/xtVNX9kv22Q?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<div style="width: 640px;" class="wp-video"><video class="wp-video-shortcode" id="video-19248-1" width="640" height="360" preload="metadata" controls="controls"><source type="video/mp4" src="https://goodshepherdmedia.net/wp-content/uploads/2025/01/police-scanner.mp4?_=1" /><a href="https://goodshepherdmedia.net/wp-content/uploads/2025/01/police-scanner.mp4">https://goodshepherdmedia.net/wp-content/uploads/2025/01/police-scanner.mp4</a></video></div>
</div>
<div data-hveid="CAMQAQ" data-ved="2ahUKEwjfhvni-f2KAxWKJ0QIHcb2KfsQo_EKegQIAxAB"></div>
<div data-hveid="CAMQAQ" data-ved="2ahUKEwjfhvni-f2KAxWKJ0QIHcb2KfsQo_EKegQIAxAB"></div>
<div class="WaaZC">
<div class="RJPOee EIJn2">
<div class="rPeykc uP58nb" data-hveid="CA0QAQ" data-ved="2ahUKEwjfhvni-f2KAxWKJ0QIHcb2KfsQo_EKegQIDRAB"><span data-huuid="11803490536340609537"><span role="heading" aria-level="2">How it works</span></span></div>
</div>
</div>
<div class="WaaZC">
<div class="RJPOee EIJn2">
<ul>
<li><span data-huuid="11803490536340607360">The RTL-SDR uses a control channel to listen to a frequency that changes often during a conversation.<span class="pjBG2e" data-cid="3a9a539a-1c05-4e12-aacd-b670206805d9"><span class="UV3uM"> </span></span></span></li>
<li class="NPrrbc" data-cid="3a9a539a-1c05-4e12-aacd-b670206805d9" data-uuids="11803490536340607360"><span data-huuid="11803490536340607274">The SDRTrunk software can import trunked system network data from a RadioReference subscription.<span class="pjBG2e" data-cid="7f73e306-93e1-40ce-a11a-34f49c8c5990"><span class="UV3uM"> </span></span></span></li>
<li class="NPrrbc" data-cid="7f73e306-93e1-40ce-a11a-34f49c8c5990" data-uuids="11803490536340607274"><span data-huuid="11803490536340607188">The SDRTrunk software can also blacklist unwanted talkgroups.<span class="pjBG2e" data-cid="c70aca23-8f94-414a-bbcd-7b1f6a682068"><span class="UV3uM"> </span></span></span></li>
<li class="NPrrbc" data-cid="c70aca23-8f94-414a-bbcd-7b1f6a682068" data-uuids="11803490536340607188"><span data-huuid="11803490536340607102">The SDRTrunk software can record and upload trunked radio conversations to a site like openmhz.com.<span class="pjBG2e" data-cid="7fb05838-e878-4243-a6ef-ade1face66b7"><span class="UV3uM"> </span></span></span></li>
</ul>
</div>
</div>
<div class="WaaZC">
<div class="RJPOee EIJn2">
<div class="rPeykc" data-hveid="CCAQAQ" data-ved="2ahUKEwjfhvni-f2KAxWKJ0QIHcb2KfsQo_EKegQIIBAB">
<p><span data-huuid="13536315053031529434">What you&#8217;ll need </span><span data-huuid="11510408485515957098">RTL-SDR Blog V4 dongle, SDRTrunk software, A decent antenna, and A computer with a dual core processor or more.<span class="pjBG2e" data-cid="8d3dba75-be97-4859-90e1-5255b0c54f4a"><span class="UV3uM"> </span></span></span></p>
<div class="NPrrbc" data-cid="8d3dba75-be97-4859-90e1-5255b0c54f4a" data-uuids="13536315053031529434,11510408485515957098">
<div class="BMebGe btku5b fCrZyc LwdV0e FR7ZSc OJeuxf" tabindex="0" role="button" aria-label="View related links" data-hveid="CCMQAQ" data-ved="2ahUKEwjfhvni-f2KAxWKJ0QIHcb2KfsQ3fYKegQIIxAB">
<div class="niO4u">
<div class="kHtcsd"></div>
</div>
</div>
</div>
</div>
</div>
</div>
<h2 id="shopping" tabindex="-1">shopping</h2>
<p>you&#8217;ll need <a href="https://www.rtl-sdr.com/buy-rtl-sdr-dvb-t-dongles/">an RTL-SDR unit</a>. i recommend the dipole antenna kit as well, so you don&#8217;t need to make any additional purchases. if you&#8217;re a radio enthusiast already, you might have a better antenna available, but if you&#8217;re like me you do not and it&#8217;s worth the US$10. mine took a bit over a week to arrive. if you&#8217;re extremely unlucky, you might need two of them, but i was fine with just one. <strong><span style="color: #0000ff;"><em><a style="color: #0000ff;" href="https://www.amazon.com/s?k=sdr+rtl+v4&amp;hvadid=692721048132&amp;hvdev=c&amp;hvlocphy=9031181&amp;hvnetw=g&amp;hvqmt=e&amp;hvrand=7350757278038370506&amp;hvtargid=kwd-2259975973389&amp;hydadcr=24326_13533824&amp;tag=googhydr-20&amp;ref=pd_sl_2787y6f5z8_e" target="_blank" rel="noopener">buy here</a></em></span></strong></p>
<h2 id="basic-setup" tabindex="-1">basic setup</h2>
<p>once your RTL-SDR arrives, you&#8217;ll want to put together your antenna. if you&#8217;re lucky, like i am, you can just extend the antennas arbitrarily and it&#8217;ll work fine; if you&#8217;re cursed, the RTL-SDR website has resources on how long is ideal for various frequencies.</p>
<p>connect the antenna to the RTL-SDR unit, plug it in, and follow the RTL-SDR <a href="https://www.rtl-sdr.com/rtl-sdr-quick-start-guide/">quick start guide</a>. SDRSharp will work, or any of the other Windows options. some of what we&#8217;ll need is only available on windows.</p>
<p>once your RTL-SDR&#8217;s drivers are sorted out, find the specifications for police radio in your area on <a href="https://www.radioreference.com/apps/db/">RadioReference</a>. click your state, click your county, scroll down and see if there&#8217;s a link above a frequency table for you. if you&#8217;re lucky, there is, and if you click it there&#8217;s a page with a table with System Type and System Voice entries at the top. mine has a system type of EDACS Networked Standard and a system voice of ProVoice and Analog, so the rest of this assumes that&#8217;s what you&#8217;ve got as well. if not, good luck.</p>
<p>there should be a table for System Frequencies on your RadioReference page. start up SDRSharp and tune your radio to the first frequency listed there. you&#8217;ll probably hear a bunch of static and the UI will look something like this:</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-19253" src="https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-1.png" alt="" width="928" height="800" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-1.png 928w, https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-1-400x345.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-1-768x662.png 768w" sizes="(max-width: 928px) 100vw, 928px" /></p>
<p>see how there&#8217;s one constant signal and a bunch of other signals that appear and disappear all over the place? well, that&#8217;s trunking, and the constant signal is our <em>control channel</em>. if you don&#8217;t see it, you can click and drag on the bottom axis of the top panel to change the view. once you&#8217;ve found that constant signal, click on it to get the approximate frequency, go back to your frequency table and the closest thing to that will be the exact frequency. it should sound like a series of weird beeps instead of static. remember that frequency, it&#8217;ll be important later.</p>
<p><em>update 2020-07-31</em>: that control channel can change between the frequencies listed on RadioReference. if things randomly quit working, come back to this step, and see if the control channel has moved. i&#8217;ll mark down below the places that need changing accordingly.</p>
<h2 id="specific-setup" tabindex="-1">specific setup</h2>
<p>EDACS is a trunked system, so we&#8217;re using <a href="https://www.rtl-sdr.com/rtl-sdr-tutorial-following-trunked-radio-unitrunker/">RTL-SDR&#8217;s trunked radio tutorial</a> as our guide, mostly. that guide assumes we have two RTL-SDRs, but there&#8217;s a piece at the end explaining how to do it with just one. that sucks. i&#8217;m going to paraphrase it here.</p>
<p>first, we&#8217;re going to download the software we need: <a href="http://www.unitrunker.com/">Unitrunker</a>, <a href="http://www.vb-cable.com/">VB-Cable</a>, and <a href="https://www.dsdplus.com/">DSD+</a> (extract both the regular and DLL downloads to the same folder). install unitrunker and VB-Cable and extract dsd+ somewhere convenient. you might need to reboot after installing VB-Cable because computers are bad. VB-Cable might set your default input and output devices to the wrong things when you install it, so switch them back if it does. <em><strong><a href="https://www.unitrunker.com/download.html" target="_blank" rel="noopener">https://www.unitrunker.com/download.html</a></strong></em></p>
<p>or dowmload zippped MSI file from us <a href="https://goodshepherdmedia.net/wp-content/uploads/2025/01/UniTrunker-2.1.0.108.zip" target="_blank" rel="noopener">HERE </a> <a href="https://goodshepherdmedia.net/wp-content/uploads/2025/01/UniTrunker-2.1.0.108.zip">UniTrunker-2.1.0.108</a></p>
<p>open up dsd+. it&#8217;ll open four different windows, one of them should have a list of audio input and output devices. check the number in the input list that goes with CABLE Output &#8211; for me it&#8217;s 3. pull up notepad and make a new file. since my input was number 3, i&#8217;m typing</p>
<pre class="language-batch"><strong><code class="language-batch"><span class="token command"><span class="token keyword">DSDPlus</span>.exe -i3M</span></code></strong></pre>
<p>in that file: if yours is not 3, put whatever the correct number is for you instead of 3. then, save the file, find your DSDPlus folder, make sure the type is set to &#8220;All Files&#8221;, and name the file <code>run.bat</code>. close dsd+, go to that folder, and open that <code>run.bat</code> file you just created. it should pull up dsd+ and if you&#8217;re lucky it&#8217;ll print</p>
<pre class="language-text"><strong><code class="language-text">audio input device #3 (CABLE Output (VB-Audio Virtual ) initialized</code></strong></pre>
<p>or something like that. leave that open.</p>
<p>open up unitrunker. click the <code>+</code> to add a new receiver, and click the RTL2832 button to add your RTL-SDR. set your settings around like this:</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-19252" src="https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-2.png" alt="" width="387" height="513" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-2.png 387w, https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-2-302x400.png 302w" sizes="(max-width: 387px) 100vw, 387px" /></p>
<p>the most important things are the RTL Device, the sample rate (2.56 msps), and the VCOs (2 VCOs). i do not know what a VCO is and i do not care enough to find out. we should now have two VCO tabs next to our info tab. the first one needs to look kinda like this:</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-19251" src="https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-3.png" alt="" width="387" height="717" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-3.png 387w, https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-3-216x400.png 216w" sizes="(max-width: 387px) 100vw, 387px" /></p>
<p>the important things are the Role being Signal, the Park frequency being the control channel we found earlier (mine is 851.7625), and the Mute box being checked.</p>
<p><em>update 2020-07-31</em>: if the control channel changes, this Park frequency is one of the two things you&#8217;ll need to update.</p>
<p>the second VCO should look kinda like this:</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-19250" src="https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-4.png" alt="" width="387" height="727" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-4.png 387w, https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-4-213x400.png 213w" sizes="(max-width: 387px) 100vw, 387px" /></p>
<p>the important things are the Role being Voice, the Deemphasis box being unchecked, and the Digital Output being set to your CABLE Input. this means it will connect up with dsd+ listening to our CABLE Output.</p>
<p>press Play now; it should pull up a window with a Channels tab. the Channels tab should look something like this:</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-19249" src="https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-5.png" alt="" width="821" height="633" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-5.png 821w, https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-5-400x308.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/01/2020-06-26-police-scanner-setup-5-768x592.png 768w" sizes="(max-width: 821px) 100vw, 821px" /></p>
<p>but the Frequency column will all be zeroes except for the control frequency we found earlier. you&#8217;ll need to copy over the rest of the frequencies manually from the RadioReference site.</p>
<p><em>update 2020-07-31</em>: if the control channel changes, you&#8217;ll need to uncheck the Control box on the old control channel, and check the Control box on the new control channel.</p>
<p>press the stop button and the play button again, and everything should in theory be working. ideally, the Call History tab will be crowded and updating pretty frequently, and unitrunker will be passing things along to dsd+ which will give us the audio we want. technically, this is enough.</p>
<h2 id="groups" tabindex="-1">groups</h2>
<p>the thing, though, is we don&#8217;t have context for any of this. for now, at least. RadioReference should have a table or several of talkgroups &#8211; the &#8220;list all in one table&#8221; button may come in handy &#8211; and we can use that information to figure out who we&#8217;re hearing, and have at least some control over who takes priority if multiple people in different contexts are talking at once.</p>
<p>find the main unitrunker window &#8211; it&#8217;s titled &#8220;Universal Trunker&#8221; and if you don&#8217;t have it open just click the home button a bunch until it opens &#8211; and then open the Systems tab and double-click the one that exists. open the Groups tab in that window, and it should give you a massive list with columns for ID, Label, and a bunch of stuff we don&#8217;t care about right now. the ID matches up with the DEC column in the RadioReference table, and the Label can be either &#8220;Description&#8221; or &#8220;Alpha Tag&#8221; or something you make up yourself if you feel creative. if you pay RadioReference $15 for a Premium subscription then unitrunker can import that data automatically.</p>
<p>once you&#8217;ve filled that all in, open the Sites tab and double-click the entry you see there, then open the Call History tab. the group labels you added should now be appearing in the Audience column; the LCN and Frequency should turn green for what unitrunker is currently listening to.</p>
<p>back in the Groups tab, you can edit the Priority values to control which groups will be chosen more often &#8211; as far as i can tell, higher priority groups will interrupt lower priority groups, and equal priority groups will just play whoever started talking first.</p>
<h2 id="broadcasting" tabindex="-1">broadcasting</h2>
<p>this setup lets you listen to things locally, but what if you want your comrades with no hardware to be able to also listen? the laziest option is to just stream the Call History window on Twitch or something, but in theory there are better options. RadioReference runs Broadcastify, which is designed for hosting police scanner livestreams, but they have to manually approve your broadcast, which is annoying for short term activity. you could run an icecast server yourself or something, but that takes effort to configure. honestly all of those kinda suck but those are your options as far as i know.</p>
<p><em>update 2020-07-31</em>: you can also let your friendly neighborhood succulent run an icecast server for you; reach out to me if you need something like this. if you&#8217;ve got an icecast server, you&#8217;ll need to pay for (or otherwise obtain) <a href="https://www.vb-audio.com/Cable/index.htm#DownloadCable">VB-CABLE A+B</a>, set up VB-CABLE A, and grab <a href="https://danielnoethen.de/butt/">butt (broadcast using this tool)</a>.</p>
<p>you&#8217;ll need to set DSD+ to output to &#8220;CABLE-A Input&#8221; like how you set it to input from &#8220;CABLE Output&#8221; &#8211; Cable A is the fourth output in DSD+, so my run.bat now looks like this:</p>
<pre class="language-batch"><strong><code class="language-batch"><span class="token command"><span class="token keyword">DSDPlus</span>.exe -i3M -o4</span></code></strong></pre>
<p>run butt, pull up the settings, and under the Audio tab set the Input Device to &#8220;CABLE-A Output&#8221;. (for bonus points, set the Streaming Codec to AAC+.) under the Main tab, Add a new Server and put in whatever info your icecast server admin told you to use. now restart your DSD+ and hit butt&#8217;s play button to start streaming, and you should be running a livestream of your police scanner that is accessible over the internet. <a href="https://www.boringcactus.com/2020/06/26/police-scanner-setup.html" target="_blank" rel="noopener">source</a></p>
<p>&nbsp;</p>
<hr />
<h1>Understanding, Listening and Recording Trunked Radio Systems with an RTL-SDR and Trunk-Recorder</h1>
<div id="site-name"><a title="rtl-sdr.com" href="https://www.rtl-sdr.com/" rel="home">rtl-sdr.com</a></div>
<div id="header-message">RTL-SDR (RTL2832U) and software defined radio news and projects. Also featuring Airspy, HackRF, FCD, SDRplay and more.</div>
<div>
<div class="content">
<p>Trunked radio systems for voice communications can be easily found when browsing the spectrum with an SDR. Listening to a voice communication is easy, but actually following a conversation along is almost impossible to do manually. This is because in a trunking system the frequency in use during a conversation can change often. The frequency of the voice is dictated by a control channel that all radios listen to. This allows multiple talk groups (Police, EMS, business etc) to share one chunk of the spectrum without having to allocate fixed channels for each user.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-19254" src="https://goodshepherdmedia.net/wp-content/uploads/2025/01/trunked_radio_andrewm.png" alt="" width="1024" height="582" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/01/trunked_radio_andrewm.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/01/trunked_radio_andrewm-400x227.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/01/trunked_radio_andrewm-768x437.png 768w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p>Over on his blog Andrew Nohawk has <a href="https://www.andrewmohawk.com/2020/06/12/trunked-radio-a-guide/" target="_blank" rel="noopener">uploaded an excellent guide that explains trunked radio</a>, how it works, how to use radioreference to look up trunked radio frequencies in your area, and how to use an RTL-SDR to listen in. He then shows how to use a program called &#8220;trunk-recorder&#8221; which will automatically record and upload trunked radio conversations to a site like <a href="https://openmhz.com/" target="_blank" rel="noopener">openmhz.com</a> for sharing.  <a href="https://www.rtl-sdr.com/understanding-listening-and-recording-trunked-radio-systems-with-an-rtl-sdr-and-trunk-recorder/" target="_blank" rel="noopener">source</a></p>
</div>
</div>
]]></content:encoded>
					
		
		<enclosure url="https://goodshepherdmedia.net/wp-content/uploads/2025/01/police-scanner.mp4" length="0" type="video/mp4" />

			</item>
		<item>
		<title>NSA Plans to Infect Millions of Computers with Malware using AI</title>
		<link>https://goodshepherdmedia.net/nsa-plans-to-infect-millions-of-computers-with-malware-using-ai/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Sat, 25 Jan 2025 19:43:47 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[Corrupt Politicians]]></category>
		<category><![CDATA[Corruption Over the Years]]></category>
		<category><![CDATA[Disaster]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Legal News The Motivation]]></category>
		<category><![CDATA[Man Made]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Science & Engineering]]></category>
		<category><![CDATA[Software Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Tragic]]></category>
		<category><![CDATA[United States 🇺🇸]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🌍World Stage🌍]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[📱Mobile📱]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[🤖 AI Artificial Intelligence]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[NSA Plans to Infect Millions of Computers with Malware using AI]]></category>
		<category><![CDATA[spyware]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=18039</guid>

					<description><![CDATA[NSA Plans to Infect Millions of Computers with Malware using AI Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>NSA Plans to Infect Millions of Computers with Malware using AI</h1>
<p>Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.</p>
<p>The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks.</p>
<p>The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.</p>
<p>In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.</p>
<p>The implants being deployed were once reserved for a few hundred hard-to-reach targets, whose communications could not be monitored through traditional wiretaps. But the documents analyzed by <em>The Intercept</em> show how the NSA has aggressively accelerated its hacking initiatives in the past decade by computerizing some processes previously handled by humans. The automated system – codenamed TURBINE – is designed to “allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.”</p>
<p>In a top-secret presentation, dated August 2009, the NSA describes a pre-programmed part of the covert infrastructure called the “Expert System,” which is designed to operate “like the brain.” The system manages the applications and functions of the implants and “decides” what tools they need to best extract data from infected machines.</p>
<p>Mikko Hypponen, an expert in malware who serves as chief research officer at the Finnish security firm <a href="http://home.f-secure.com/en_US/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">F-Secure</a>, calls the revelations “disturbing.” The NSA’s surveillance techniques, he warns, could inadvertently be undermining the security of the Internet.</p>
<p>“When they deploy malware on systems,” Hypponen says, “they potentially create new vulnerabilities in these systems, making them more vulnerable for attacks by third parties.”</p>
<p>Hypponen believes that governments could arguably justify using malware in a small number of targeted cases against adversaries. But millions of malware implants being deployed by the NSA as part of an automated process, he says, would be “out of control.”</p>
<p>“That would definitely not be proportionate,” Hypponen says. “It couldn’t possibly be targeted and named. It sounds like wholesale infection and wholesale surveillance.”</p>
<p>The NSA declined to answer questions about its deployment of implants, pointing to a new presidential policy directive announced by President Obama. “As the president made clear on 17 January,” the agency said in a statement, “signals intelligence shall be collected exclusively where there is a foreign intelligence or counterintelligence purpose to support national and departmental missions, and not for any other purposes.”</p>
<p>&nbsp;</p>
<h4>“Owning the Net”</h4>
<p>The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret <a href="https://theintercept.com/document/2014/03/12/thousands-implants/">internal records</a>, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands.</p>
<p>To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices.</p>
<p>In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations.</p>
<p>But the NSA recognized that managing a massive network of implants is too big a job for humans alone.</p>
<p>“One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).”</p>
<p>The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that <a href="https://theintercept.com/document/2014/03/12/industrial-scale-exploitation/">enables</a> “industrial-scale exploitation.”</p>
<p><iframe title="Exposed: Secret Government Surveillance Tools They DON&#039;T Want You to Know About!" width="640" height="360" src="https://www.youtube.com/embed/iRYji0Q2K30?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in <a href="https://theintercept.com/document/2014/03/12/nsa-technology-directorate-analysis-converged-data/">one secret document</a> from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.”</p>
<p>In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations.</p>
<p>The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)</p>
<p>&nbsp;</p>
<div class="default"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18041" src="https://goodshepherdmedia.net/wp-content/uploads/2024/05/turbine-large-1024x86-1.webp" alt="" width="1024" height="86" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/05/turbine-large-1024x86-1.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/05/turbine-large-1024x86-1-400x34.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/05/turbine-large-1024x86-1-768x65.webp 768w" sizes="(max-width: 1024px) 100vw, 1024px" /></div>
<p>&nbsp;</p>
<p>Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations.</p>
<p><a href="http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html?_r=1" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">Earlier</a> <a href="http://www.washingtonpost.com/world/national-security/us-spy-agencies-mounted-231-offensive-cyber-operations-in-2011-documents-show/2013/08/30/d090a6ae-119e-11e3-b4cb-fd7ce041d814_story.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">reports</a> based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks <a href="http://www.nrc.nl/nieuws/2013/11/23/nsa-infected-50000-computer-networks-with-malicious-software/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">across the world</a>, with plans to keep on scaling up those numbers.</p>
<p>The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.”</p>
<p>The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”</p>
<h4>Circumventing Encryption</h4>
<p>The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes.</p>
<p>One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer.</p>
<p>An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer.</p>
<p>The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption.</p>
<p>It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.</p>
<p>Previous reports <a href="http://www.washingtonpost.com/world/national-security/stuxnet-was-work-of-us-and-israeli-experts-officials-say/2012/06/01/gJQAlnEy6U_story.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">have alleged</a> that the NSA worked with Israel to develop the Stuxnet malware, which was used to sabotage Iranian nuclear facilities. The agency also <a href="http://www.washingtonpost.com/world/national-security/us-israel-developed-computer-virus-to-slow-iranian-nuclear-efforts-officials-say/2012/06/19/gJQA6xBPoV_story.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">reportedly</a> worked with Israel to deploy malware called Flame to infiltrate computers and spy on communications in countries across the Middle East.</p>
<p>According to the Snowden files, the technology has been used to seek out terror suspects as well as individuals regarded by the NSA as “extremist.” But the mandate of the NSA’s hackers is not limited to invading the systems of those who pose a threat to national security.</p>
<p>In one secret post on an internal message board, an operative from the NSA’s Signals Intelligence Directorate describes using malware attacks against systems administrators who work at foreign phone and Internet service providers. By hacking an administrator’s computer, the agency can gain covert access to communications that are processed by his company. “Sys admins are a means to an end,” the NSA operative writes.</p>
<p>The internal post – titled “I hunt sys admins” – makes clear that terrorists aren’t the only targets of such NSA attacks. Compromising a systems administrator, the operative notes, makes it easier to get to other targets of interest, including any “government official that happens to be using the network some admin takes care of.”</p>
<p>Similar tactics have been adopted by Government Communications Headquarters, the NSA’s British counterpart. As the German newspaper <em>Der Spiegel</em> <a href="http://www.spiegel.de/international/europe/british-spy-agency-gchq-hacked-belgian-telecoms-firm-a-923406.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">reported</a> in September, GCHQ hacked computers belonging to network engineers at Belgacom, the Belgian telecommunications provider.</p>
<p>The mission, codenamed “Operation Socialist,” was designed to enable GCHQ to monitor mobile phones connected to Belgacom’s network. The secret files deem the mission a “success,” and indicate that the agency had the ability to covertly access Belgacom’s systems since at least 2010.</p>
<p>Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications.</p>
<p>Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a <a href="http://www.techterms.com/definition/vpn" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">Virtual Private Network</a>, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.</p>
<div class="default"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18042" src="https://goodshepherdmedia.net/wp-content/uploads/2024/05/hammer-vpn.webp" alt="" width="618" height="467" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/05/hammer-vpn.webp 618w, https://goodshepherdmedia.net/wp-content/uploads/2024/05/hammer-vpn-400x302.webp 400w" sizes="(max-width: 618px) 100vw, 618px" /></div>
<p>The implants also track phone calls sent across the network via Skype and other Voice Over IP software, revealing the username of the person making the call. If the audio of the VOIP conversation is sent over the Internet using unencrypted “Real-time Transport Protocol” packets, the implants can covertly record the audio data and then return it to the NSA for analysis.</p>
<div class="default"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18043" src="https://goodshepherdmedia.net/wp-content/uploads/2024/05/hammer-voip.webp" alt="" width="621" height="469" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/05/hammer-voip.webp 621w, https://goodshepherdmedia.net/wp-content/uploads/2024/05/hammer-voip-400x302.webp 400w" sizes="(max-width: 621px) 100vw, 621px" /></div>
<p>But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on <a href="https://theintercept.com/document/2014/03/12/one-way-quantum/">a classified list</a> that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.</p>
<p>&nbsp;</p>
<h4>“Mass exploitation potential”</h4>
<p>Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network.</p>
<p>According to <a href="https://theintercept.com/document/2014/03/12/nsa-phishing-tactics-man-middle-attacks/">one top-secret document</a> from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds.</p>
<p>There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious.</p>
<p>Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.</p>
<p>To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors <a href="https://theintercept.com/document/2014/03/12/quantum-insert-diagrams/">alert the TURBINE system</a>, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second.</p>
<p>In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.</p>
<p><iframe id="vimeo-3998515" class="social-iframe social-iframe--vimeo" src="https://player.vimeo.com/video/88822483?title=0&amp;byline=0&amp;portrait=0&amp;badge=0&amp;color=8280FF" width="100%" frameborder="0" allowfullscreen="allowfullscreen" data-mce-fragment="1"></iframe></p>
<p>The documents show that QUANTUMHAND became operational in October 2010, after being successfully tested by the NSA against about a dozen targets.</p>
<p>According to Matt Blaze, a surveillance and cryptography expert at the University of Pennsylvania, it appears that the QUANTUMHAND technique is aimed at targeting specific individuals. But he expresses concerns about how it has been covertly integrated within Internet networks as part of the NSA’s automated TURBINE system.</p>
<p>“As soon as you put this capability in the backbone infrastructure, the software and security engineer in me says that’s terrifying,” Blaze says.</p>
<p>“Forget about how the NSA is intending to use it. How do we know it is working correctly and only targeting who the NSA wants? And even if it does work correctly, which is itself a really dubious assumption, how is it controlled?”</p>
<p>In an email statement to <em>The Intercept</em>, Facebook spokesman Jay Nancarrow said the company had “no evidence of this alleged activity.” He added that Facebook implemented HTTPS encryption for users last year, making browsing sessions less vulnerable to malware attacks.</p>
<p>Nancarrow also pointed out that other services besides Facebook could have been compromised by the NSA. “If government agencies indeed have privileged access to network service providers,” he said, “any site running only [unencrypted] HTTP could conceivably have its traffic misdirected.”</p>
<p>A man-in-the-middle attack is a similar but slightly more aggressive method that can be used by the NSA to deploy its malware. It refers to a hacking technique in which the agency covertly places itself between computers as they are communicating with each other.</p>
<p>This allows the NSA not only to observe and redirect browsing sessions, but to modify the content of data packets that are passing between computers.</p>
<p>The man-in-the-middle tactic can be used, for instance, to covertly change the content of a message as it is being sent between two people, without either knowing that any change has been made by a third party. The same technique is <a href="https://blogs.rsa.com/man-in-the-middle-standing-between-you-and-your-cash/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">sometimes used by criminal hackers</a> to defraud people.</p>
<p>A top-secret NSA presentation from 2012 reveals that the agency developed a man-in-the-middle capability called SECONDDATE to “influence real-time communications between client and server” and to “quietly redirect web-browsers” to NSA malware servers called FOXACID. In October, details about the FOXACID system were <a href="http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">reported by the <em>Guardian</em></a>, which revealed its links to attacks against users of the Internet anonymity service Tor.</p>
<p>But SECONDDATE is tailored not only for “surgical” surveillance attacks on individual suspects. It can also be used to launch bulk malware attacks against computers.</p>
<p>According to the 2012 presentation, the tactic has “mass exploitation potential for clients passing through network choke points.”</p>
<div class="default"><img decoding="async" title="" src="https://theintercept.com/wp-content/uploads/2014/03/tao-2-1024x768.png" alt="" /></div>
<p>Blaze, the University of Pennsylvania surveillance expert, says the potential use of man-in-the-middle attacks on such a scale “seems very disturbing.” Such an approach would involve indiscriminately monitoring entire networks as opposed to targeting individual suspects.</p>
<p>“The thing that raises a red flag for me is the reference to ‘network choke points,’” he says. “That’s the last place that we should be allowing intelligence agencies to compromise the infrastructure – because that is by definition a mass surveillance technique.”</p>
<p>To deploy some of its malware implants, the NSA exploits security vulnerabilities in commonly used Internet browsers such as Mozilla Firefox and Internet Explorer.</p>
<p>The agency’s hackers also exploit security weaknesses in network routers and in popular software plugins such as Flash and Java to deliver malicious code onto targeted machines.</p>
<p>The implants can circumvent anti-virus programs, and the NSA has gone to extreme lengths to ensure that its clandestine technology is extremely difficult to detect. An implant named VALIDATOR, used by the NSA to upload and download data to and from an infected machine, can be set to self-destruct – deleting itself from an infected computer after a set time expires.</p>
<p>In many cases, firewalls and other security measures do not appear to pose much of an obstacle to the NSA. Indeed, the agency’s hackers appear confident in their ability to circumvent any security mechanism that stands between them and compromising a computer or network. “If we can get the target to visit us in some sort of web browser, we can probably own them,” an agency hacker boasts in one secret document. “The only limitation is the ‘how.’”</p>
<p>&nbsp;</p>
<h4>Covert Infrastructure</h4>
<p>The TURBINE implants system does not operate in isolation.</p>
<p>It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has <a href="https://theintercept.com/document/2014/03/12/turbine-turmoil/">installed at locations across the world</a>.</p>
<div class="default"><img decoding="async" title="" src="https://theintercept.com/wp-content/uploads/2014/03/turbine_turmoil_maps-1-1024x768.png" alt="" /></div>
<p>The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England.</p>
<p>The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet.</p>
<p>When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack.</p>
<p>The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter.</p>
<p>Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.</p>
<div class="default"><img decoding="async" title="" src="https://theintercept.com/wp-content/uploads/2014/03/selectors-1024x768.png" alt="" /></div>
<p>What’s more, the TURBINE system operates with the knowledge and support of other governments, some of which have participated in the malware attacks.</p>
<p>Classification markings on the Snowden documents indicate that NSA has shared many of its files on the use of implants with its counterparts in the so-called Five Eyes surveillance alliance – the United Kingdom, Canada, New Zealand, and Australia.</p>
<p>GCHQ, the British agency, has taken on a particularly important role in helping to develop the malware tactics. The Menwith Hill satellite eavesdropping base that is part of the TURMOIL network, located in a rural part of Northern England, is operated by the NSA in close cooperation with GCHQ.</p>
<p><a href="https://theintercept.com/document/2014/03/12/turbine-turmoil/">Top-secret documents</a> show that the British base – referred to by the NSA as “MHS” for Menwith Hill Station – is an integral component of the TURBINE malware infrastructure and has been used to <a href="https://theintercept.com/document/2014/03/12/menwith-hill-station-leverages-xkeyscore-quantum-yahoo-hotmail/">experiment</a> with implant “exploitation” attacks against users of Yahoo and Hotmail.</p>
<p>In <a href="https://theintercept.com/document/2014/03/12/nsa-gchqs-quantumtheory-hacking-tactics/">one document</a> dated 2010, at least five variants of the QUANTUM hacking method were listed as being “operational” at Menwith Hill. The same document also reveals that GCHQ helped integrate three of the QUANTUM malware capabilities – and test two others – as part of a surveillance system it operates codenamed INSENSER.</p>
<p>GCHQ cooperated with the hacking attacks despite having reservations about their legality. One of the Snowden files, <a href="https://www.documentcloud.org/documents/894386-legal-issues-uk-regarding-sweden-and-quantum.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">previously disclosed</a> by Swedish broadcaster SVT, revealed that as recently as April 2013, GCHQ was apparently reluctant to get involved in deploying the QUANTUM malware due to “legal/policy restrictions.” A representative from a unit of the British surveillance agency, meeting with an obscure telecommunications standards committee in 2010, separately <a href="https://www.documentcloud.org/documents/1077367-uk-perspective-on-mikey-ibake.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">voiced concerns</a> that performing “active” hacking attacks for surveillance “may be illegal” under British law.</p>
<p>In response to questions from <em>The Intercept</em>, GCHQ refused to comment on its involvement in the covert hacking operations. Citing its boilerplate response to inquiries, the agency said in a statement that “all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorized, necessary and proportionate, and that there is rigorous oversight.”</p>
<p>Whatever the legalities of the United Kingdom and United States infiltrating computer networks, the Snowden files bring into sharp focus the broader implications. Under cover of secrecy and without public debate, there has been an unprecedented proliferation of aggressive surveillance techniques. One of the NSA’s primary concerns, in fact, appears to be that its clandestine tactics are now being adopted by foreign rivals, too.</p>
<p>“Hacking routers has been good business for us and our 5-eyes partners for some time,” notes one NSA analyst in <a href="https://theintercept.com/document/2014/03/12/five-eyes-hacking-large-routers/">a top-secret document</a> dated December 2012. “But it is becoming more apparent that other nation states are honing their skillz [sic] and joining the scene.” <a href="https://theintercept.com/2014/03/12/nsa-plans-infect-millions-computers-malware/" target="_blank" rel="noopener">source</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>FBI’s Encrypted Phone Platform Infiltrated Hundreds of Criminal Syndicates; Result is Massive Worldwide Takedown</title>
		<link>https://goodshepherdmedia.net/fbis-encrypted-phone-platform-infiltrated-hundreds-of-criminal-syndicates-result-is-massive-worldwide-takedown/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 09 Dec 2024 09:00:14 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Legal News The Motivation]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Software Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[📱Mobile📱]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[🙂Fun Facts🙂]]></category>
		<category><![CDATA[ANØM]]></category>
		<category><![CDATA[FBI’s Encrypted Phone Platform]]></category>
		<category><![CDATA[Massive Criminal Takedown]]></category>
		<category><![CDATA[Massive Worldwide Takedown]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=18981</guid>

					<description><![CDATA[FBI’s Encrypted Phone Platform ANØM​ Infiltrated Hundreds of Criminal Syndicates; Result is Massive Worldwide Takedown SAN DIEGO – A wave of hundreds of arrests that began in Australia and stretched across Europe culminated today with the unsealing of a federal grand jury indictment in San Diego charging 17 foreign nationals with distributing thousands of encrypted [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="page-title"><span class="field-formatter--string">FBI’s Encrypted Phone Platform ANØM​ Infiltrated Hundreds of Criminal Syndicates; Result is Massive Worldwide Takedown</span></h1>
<div class="node-body">
<div class="field-formatter--text-default field-text-format--wysiwyg text-formatted field_body">
<p>SAN DIEGO – A wave of hundreds of arrests that began in Australia and stretched across Europe culminated today with the unsealing of a federal grand jury indictment in San Diego charging 17 foreign nationals with distributing thousands of encrypted communication devices to criminal syndicates.</p>
<p>The 500-plus arrests that took place during a worldwide two-day takedown were possible because of a San Diego-based investigation like no other. For the first time, the FBI operated its own encrypted device company, called “ANOM,” which was promoted by criminal groups worldwide. These criminals sold more than 12,000 ANOM encrypted devices and services to more than 300 criminal syndicates operating in more than 100 countries, including Italian organized crime, Outlaw Motorcycle Gangs, and various international drug trafficking organizations, according to court records.</p>
<div class="media entity-type-media entity-bundle-document media--document--embedded entity-document-1145201" data-link-text-override="SEARCH WARRANT - Operation Trojan Shield">
<div>
<ul>
<li class="field-formatter--media-entity-download-download-link field_media_file"><a class="file file--mime-application-pdf file--application-pdf" title="unsealed_trojan_shield_search_warrant_21mj1948.pdf" href="https://www.justice.gov/usao-sdca/press-release/file/1402426/dl?inline" type="application/pdf; length=1831954" data-once="doj-analytics">SEARCH WARRANT &#8211; Operation Trojan Shield</a></li>
<li><a class="file file--mime-application-pdf file--application-pdf" title="unsealed_trojan_shield_indictment_21cr1623-jls.pdf" href="https://www.justice.gov/usao-sdca/press-release/file/1402421/dl?inline" type="application/pdf; length=7161282" data-once="doj-analytics">INDICTMENT &#8211; Operation Trojan Shield</a></li>
</ul>
</div>
</div>
</div>
</div>
<div></div>
<div>
<p><iframe title="ANØM: The Most Genius FBI Operation" width="640" height="360" src="https://www.youtube.com/embed/f6FRIDG8TPY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
</div>
<div></div>
<div></div>
<div></div>
<div></div>
<div class="node-body">
<div class="field-formatter--text-default field-text-format--wysiwyg text-formatted field_body">
<div class="media entity-type-media entity-bundle-image media--image--s12 entity-image-121486">
<div class="field__item img_wrp"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18987" src="https://goodshepherdmedia.net/wp-content/uploads/2024/12/worldmap.jpg" alt="" width="1200" height="629" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/12/worldmap.jpg 1200w, https://goodshepherdmedia.net/wp-content/uploads/2024/12/worldmap-400x210.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/12/worldmap-1024x537.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/12/worldmap-768x403.jpg 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></div>
</div>
<p>During the course of the investigation, while ANOM’s criminal users unknowingly promoted and communicated on a system operated lawfully by the FBI, agents catalogued more than 27 million messages between users around the world who had their criminal discussions reviewed, recorded, and translated by the FBI, until the platform was taken down yesterday.</p>
<p>The users, believing their ANOM devices were protected from law enforcement by the shield of impenetrable encryption, openly discussed narcotics concealment methods, shipments of narcotics, money laundering, and in some groups—violent threats, the indictment said. Some users negotiated drug deals via these encrypted messages and sent pictures of drugs, in one instance hundreds of kilograms of cocaine concealed in shipments of pineapples and bananas, and in another instance, in cans of tuna, in order to evade law enforcement.</p>
<p>The indictment charges 17 alleged distributors of the FBI’s devices and platform. They are charged with conspiring to violate the Racketeer Influenced and Corrupt Organizations Act (RICO), pertaining to their alleged involvement in marketing and distributing thousands of encrypted communication devices to transnational criminal organizations worldwide.</p>
<p>During the last 24 to 48 hours, in addition to the more than 500 arrests around the world, authorities searched more than 700 locations deploying more than 9,000 law enforcement officers worldwide and seized multi-ton quantities of illicit drugs.</p>
<h3><a class="ext" href="https://youtube.com/playlist?list=PLGvHJHdPh24XB-t5vUVzMP4FBvF-V1dmk" target="_blank" rel="noopener" data-extlink="">CLICK HERE &#8211; Video Messages from International Partners</a></h3>
<p><iframe title="Operation Trojan Shield International Partners" width="640" height="360" src="https://www.youtube.com/embed/videoseries?list=PLGvHJHdPh24XB-t5vUVzMP4FBvF-V1dmk" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Grand totals for the entire investigation include 800 arrests; and seizures of more than 8 tons of cocaine; 22 tons of marijuana; 2 tons of methamphetamine/amphetamine; six tons of precursor chemicals; 250 firearms; and more than $48 million in various worldwide currencies<s>.</s> Dozens of public corruption cases have been initiated over the course of the investigation. And, during the course of the investigation, more than 50 clandestine drug labs have been dismantled. One of the labs hit yesterday was one of the largest clandestine labs in German history.</p>
<p>“This was an unprecedented operation in terms of its massive scale, innovative strategy and technological and investigative achievement,” said Acting U.S. Attorney Randy Grossman. “Hardened encrypted devices usually provide an impenetrable shield against law enforcement surveillance and detection. The supreme irony here is that the very devices that these criminals were using to hide from law enforcement were actually beacons for law enforcement. We aim to shatter any confidence in the hardened encrypted device industry with our indictment and announcement that this platform was run by the FBI.”</p>
<div class="align-left entity-type-media entity-bundle-image media--image--s07 entity-image-121491">
<div class="field__item img_wrp"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18982" src="https://goodshepherdmedia.net/wp-content/uploads/2024/12/may2021.jpg" alt="" width="700" height="380" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/12/may2021.jpg 700w, https://goodshepherdmedia.net/wp-content/uploads/2024/12/may2021-400x217.jpg 400w" sizes="(max-width: 700px) 100vw, 700px" /></div>
</div>
<div class="align-left entity-type-media entity-bundle-image media--image--s07 entity-image-121496">
<div class="field__item img_wrp"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18983" src="https://goodshepherdmedia.net/wp-content/uploads/2024/12/october_2020.jpg" alt="" width="700" height="377" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/12/october_2020.jpg 700w, https://goodshepherdmedia.net/wp-content/uploads/2024/12/october_2020-400x215.jpg 400w" sizes="(max-width: 700px) 100vw, 700px" /></div>
</div>
<p>“Today marks the culmination of more than five years of innovative and complex investigative work strategically aimed to disrupt the encrypted communications space that caters to the criminal element,” said Suzanne Turner, Special Agent in Charge of the Federal Bureau of Investigation (FBI) &#8211; San Diego Field Office.  “The FBI has brought together a network of dedicated international law enforcement partners who are steadfast in combating the global threat of organized crime. The immense and unprecedented success of Operation Trojan Shield should be a warning to international criminal organizations  – your criminal communications may not be secure; and you can count on law enforcement worldwide working together to combat dangerous crime that crosses international borders.”</p>
<p>“Operation Trojan Shield is a perfect example of an OCDETF case &#8211; an investigation driven by intelligence and maximizing the strengths of partner law enforcement agencies in coordinated efforts to dismantle command and control elements of criminal networks,” said OCDETF Director Adam W. Cohen.  “Coordination is the cornerstone of the OCDETF program, and the impressiveness of the combined efforts of the U.S. Attorney’s Office, FBI, and our foreign partners cannot be overstated.  This effort has created lasting disruptive impacts to these transnational criminal organizations.”</p>
<p>“The AFP and FBI have been working together on a world-first operation to bring to justice the organised crime gangs flooding our communities with drugs, guns and violence,” said AFP Commissioner Reece Kershaw APM. “The FBI provided an encrypted communications platform while the AFP deployed the technical capability which helped unmask some of the biggest criminals in the world. This week the AFP and our state police partners will execute hundreds of warrants and we expect to arrest hundreds of offenders linked to the platform. This is the culmination of hard work, perseverance and an invaluable, trusted relationship with the FBI.</p>
<p>We thank the FBI for their long and integral partnership with the AFP.”</p>
<p>Europol’s Deputy Executive Director Jean-Philippe Lecouffe: “This operation is an exceptional success by the authorities in the United States, Sweden, the Netherlands, Australia, New Zealand and the other European members of the Operational Task Force. Europol coordinated the international law enforcement community, enriched the information picture and brought criminal intelligence into ongoing operations to target organised crime and drug trafficking organisations, wherever they are and however they choose to communicate. I am very satisfied to see Europol supporting this operation and strengthen law enforcement partnerships by emphasizing the multi-agency aspect of the case.”</p>
<div class="align-left entity-type-media entity-bundle-image media--image--s04 entity-image-121511">
<div class="field__item img_wrp"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18985" src="https://goodshepherdmedia.net/wp-content/uploads/2024/12/batman.jpg" alt="" width="400" height="535" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/12/batman.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/12/batman-299x400.jpg 299w" sizes="(max-width: 400px) 100vw, 400px" /></div>
</div>
<div class="align-left entity-type-media entity-bundle-image media--image--s03 entity-image-121526">
<div class="field__item img_wrp"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18984" src="https://goodshepherdmedia.net/wp-content/uploads/2024/12/cipher.jpg" alt="" width="300" height="520" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/12/cipher.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2024/12/cipher-231x400.jpg 231w" sizes="(max-width: 300px) 100vw, 300px" /></div>
</div>
<p>“I am exceptionally proud of our New Zealand Police staff who supported Operation Trojan Shield,” said New Zealand Police Commissioner Andrew Coster. “This operation will have an unprecedented impact on organised crime syndicates across the globe. We value our strong relationship with the FBI, AFP and Europol and it is through these partnerships and the unrelenting efforts by law enforcement agencies from multiple countries that this operation has seen such incredible success This is a fantastic result and reiterates the importance of our transnational partnerships with law enforcement agencies across the globe in our common ongoing efforts to dismantle organised crime groups and the enormous harm they cause to our communities.”</p>
<p>“This remarkably successful operation demonstrates what can be accomplished when law enforcement agencies throughout the world work together,” said DEA Los Angeles Division Special Agent in Charge Bill Bodner. “Through strong relationships with our partners in more than 67 countries, professionals throughout the DEA, including experts in the Los Angeles Division, supported this unprecedented collaboration and our own mission to disrupt and dismantle the criminal organizations that profit from the distribution of illegal drugs.”</p>
<p>According to the San Diego indictment, ANOM’s administrators, distributors, and agents described the platform to potential users as “designed by criminals for criminals” and targeted the sale of ANOM to individuals that they knew participated in illegal activities.</p>
<p>All defendants are foreign nationals located outside of the U.S. In total, eight of the indicted defendants were taken into custody last night.  Authorities are continuing to search for the remaining nine defendants.</p>
<p>The indictment alleges the defendants knew the devices they distributed were being used exclusively by criminals to coordinate drug trafficking and money laundering, including in the U.S. The defendants personally fielded “wipe requests” from users when devices fell into the hands of law enforcement.</p>
<p>The FBI’s review of ANOM users’ communications worked like a blind carbon copy function in an email. A copy of every message being sent from each device was sent to a server in a third-party country where the messages were collected and stored. The data was then provided to the FBI on a regular basis pursuant to an international cooperation agreement. Communications such as text messages, photos, audio messages, and other digital information were reviewed by the FBI for criminal activity and disseminated to partner law enforcement agencies in other countries. Each user was using ANOM for a criminal purpose. Those countries have built their own cases against ANOM users, many of whom were arrested in takedowns in Europe, Australia and New Zealand over the last several days.</p>
<p>Intelligence derived from the FBI’s communications platform presented opportunities to disrupt major drug trafficking, money laundering, and other criminal activity while the platform was active. For example, over 150 unique threats to human life were mitigated.</p>
<p>This operation was led by the FBI and coordinated with the U.S. Drug Enforcement Administration, the U.S. Marshals Service, Australian Federal Police, Swedish Police Authority, National Police of the Netherlands, Lithuanian Criminal Police Bureau, Europol, and numerous other law enforcement partners from over a dozen other countries.</p>
<p>This investigation began after Canada-based encrypted device company Phantom Secure was dismantled by the FBI in 2018 through a San Diego-based federal RICO indictment and court-authorized seizure of the Phantom Secure platform, forcing many criminals to seek other secret communication methods to avoid law enforcement detection. The FBI—along with substantial contributions by the Australian Federal Police—filled that void with ANOM.</p>
<p>When the FBI and the San Diego U.S. Attorney’s Office dismantled Sky Global in March 2021, the demand for ANOM devices grew exponentially as criminal users sought a new brand of hardened encryption device to plot their drug trafficking and money laundering transactions and to evade law enforcement.  Demand for ANOM from criminal groups also increased after European investigators announced the dismantlement of the EncroChat platform in July 2020. The ANOM platform &#8211; unlike Phantom Secure, EncroChat, and Sky Global &#8211; was exploited by the FBI from the very beginning of ANOM’s existence and was not an infiltration of an existing popular encrypted communications company.</p>
<p>In October 2018, Phantom Secure’s CEO pleaded guilty to a RICO conspiracy in the Southern District of California.  He was sentenced to nine years in prison and ordered to forfeit $80 million in proceeds from the sale of Phantom devices.</p>
<p>For further information, please see <a href="https://www.justice.gov/usao-sdca/pr/chief-executive-communications-company-sentenced-prison-providing-encryption-services">https://www.justice.gov/usao-sdca/pr/chief-executive-communications-company-sentenced-prison-providing-encryption-services</a> and <a href="https://www.justice.gov/usao-sdca/pr/sky-global-executive-and-associate-indicted-providing-encrypted-communication-devices">https://www.justice.gov/usao-sdca/pr/sky-global-executive-and-associate-indicted-providing-encrypted-communication-devices</a>.</p>
<p>Operation Trojan Shield is an Organized Crime Drug Enforcement Task Forces (OCDETF) investigation.  OCDETF identifies, disrupts, and dismantles the highest-level drug traffickers, money launderers, gangs, and transnational criminal organizations that threaten the United States by using a prosecutor-led, intelligence-driven, multi-agency approach that leverages the strengths of federal, state, and local law enforcement agencies against criminal networks.</p>
<p>Assistant U.S. Attorneys Meghan E. Heesch, Joshua C. Mellor, Shauna Prewitt, and Mikaela Weber of the U.S. Attorney’s Office for the Southern District of California are prosecuting the case, with assistance from Paralegal Specialist Tracie Jarvis.  Former Assistant U.S. Attorney Andrew P. Young made invaluable contributions during his tenure on the case team.</p>
<p>Acting U.S. Attorney Grossman praised federal prosecutors and FBI agents and international law enforcement partners for their relentless pursuit of justice in this extraordinary case. Additionally, Acting U.S. Attorney Grossman thanked the coordinated efforts of the Department of Justice’s Office of International Affairs which facilitated many international components of this complex investigation.</p>
<p>The charges and allegations contained in an indictment are merely accusations, and the defendants are considered innocent unless and until proven guilty.</p>
<table style="height: 653px;" border="1" width="1031" cellspacing="1" cellpadding="1">
<thead>
<tr>
<th scope="col">
<h3><strong>DEFENDANTS  21-CR-1623-JLS</strong></h3>
</th>
<th scope="col">
<h3><strong>COUNTRY</strong></h3>
</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>*Joseph Hakan Ayik (1)</strong></td>
<td></td>
</tr>
<tr>
<td><strong>Domenico Catanzariti (2)</strong></td>
<td><strong>Australia</strong></td>
</tr>
<tr>
<td><strong>*Maximilian Rivkin (3)</strong></td>
<td></td>
</tr>
<tr>
<td><strong>Abdelhakim Aharchaou (4)</strong></td>
<td><strong>The Netherlands</strong></td>
</tr>
<tr>
<td><strong>*Seyyed Hossein Hosseini (5)</strong></td>
<td></td>
</tr>
<tr>
<td><strong>Alexander Dmitrienko (6)</strong></td>
<td><strong>Spain</strong></td>
</tr>
<tr>
<td><strong>*Baris Tukel (7)</strong></td>
<td></td>
</tr>
<tr>
<td><strong>*Erkan Yusef Dogan (8)</strong></td>
<td></td>
</tr>
<tr>
<td><strong>*Shane Geoffrey May (9)</strong></td>
<td></td>
</tr>
<tr>
<td><strong>Aurangzeb Ayub (10)</strong></td>
<td><strong>The Netherlands</strong></td>
</tr>
<tr>
<td><strong>James Thomas Flood (11)</strong></td>
<td><strong>Spain</strong></td>
</tr>
<tr>
<td><strong>*Srdjan Todorovic aka Dr. Djek (12)</strong></td>
<td></td>
</tr>
<tr>
<td><strong>*Shane Ngakuru (13)</strong></td>
<td></td>
</tr>
<tr>
<td><strong>Edwin Harmendra Kumar (14)</strong></td>
<td><strong>Australia</strong></td>
</tr>
<tr>
<td><strong>Omar Malik (15)</strong></td>
<td><strong>The Netherlands</strong></td>
</tr>
<tr>
<td><strong>Miwand Zakhimi (16)</strong></td>
<td><strong>The Netherlands</strong></td>
</tr>
<tr>
<td><strong>*Osemah Elhassen (17)</strong></td>
<td></td>
</tr>
<tr>
<td><strong>*Fugitive</strong></td>
<td></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p><b><u>SUMMARY OF CHARGES</u></b></p>
<p>Conspiracy to Conduct Enterprise Affairs Through Pattern of Racketeering Activity (RICO Conspiracy), in violation of 18 U.S.C. § 1962(d)</p>
<p>Maximum Penalty: Twenty years in prion</p>
<p><b><u>AGENCIES</u></b></p>
<p>Federal Bureau of Investigation</p>
<p>Drug Enforcement Administration</p>
<p>United States Marshals Service</p>
<p>Department of Justice, Office of International Affairs</p>
<p>Australian Federal Police</p>
<p>Swedish Police Authority</p>
<p>Lithuanian Criminal Police Bureau</p>
<p>National Police of the Netherlands</p>
<p>EUROPOL</p>
<p>&nbsp;</p>
<p><strong>For further information, please see</strong></p>
<p><a class="ext" href="https://www.europol.europa.eu/newsroom/news/800-criminals-arrested-in-biggest-ever-law-enforcement-operation-against-encrypted-communication" target="_blank" rel="noopener" data-extlink="">https://www.europol.europa.eu/newsroom/news/800-criminals-arrested-in-biggest-ever-law-enforcement-operation-against-encrypted-communication</a></p>
<p><a class="ext" href="https://www.afp.gov.au/news-media/media-releases/afp-led-operation-ironside-smashes-organised-crime" target="_blank" rel="noopener" data-extlink="">https://www.afp.gov.au/news-media/media-releases/afp-led-operation-ironside-smashes-organised-crime</a></p>
</div>
</div>
<div class="node-updated-date">Updated June 8, 2021 <a href="https://www.justice.gov/usao-sdca/pr/fbi-s-encrypted-phone-platform-infiltrated-hundreds-criminal-syndicates-result-massive" target="_blank" rel="noopener">SOURCE</a></div>
<div></div>
<div></div>
<hr />
<p>&nbsp;</p>
<h1 class="b-headline">Encrypted Phone Company Was Secretly Commandeered by FBI to Track Criminals’ GPS Data</h1>
<div class="Rubric">
<div class="Rubric__content">CLOAK AND DAGGER</div>
<div class="Rubric__divider">
<div class="Rubric__divider__bottom"></div>
</div>
</div>
<h2 class="c-heading b-subheadline">The agency’s backdoor access to Anom phones collected the locations of users across the world, transferring the data to authorities.</h2>
<h1 class="font-stretch-ultra-condensed mb-4 text-4xl font-semibold leading-compact tracking-wide md:text-5xl">FBI Sold Criminals Fake Encrypted Phones That Actually Copied Their Messages</h1>
<p class="mb-4 text-lg leading-normal">The Anom company helped international law enforcement arrest over 800 suspected criminals in what marks the FBI&#8217;s latest attempt to overcome encryption.</p>
<p><iframe title="The REAL Story Behind ANOM:" width="640" height="360" src="https://www.youtube.com/embed/pJryRIRCcTM?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p>An encrypted chat platform that catered to criminals is actually an FBI sting operation.</p>
<p>Since 2019, the FBI has been secretly operating Anom, a company that pretended to offer encrypted messaging to criminal organizations. In reality, the Anom app would relay to federal investigators a copy of every message sent.</p>
<p>The operation enabled the FBI and international law enforcement to arrest over 800 suspected criminals across the globe, according to Europol.</p>
<p>Anom ended up serving more than 12,000 devices belonging to over 300 criminal organizations, including the Italian mafia, outlaw motorcycle gangs, and crime syndicates based in Asia. The encrypted chat platform recorded messages covering assassination plots, mass drug trafficking, and illegal gun distribution.</p>
<p><img loading="lazy" decoding="async" class="" src="https://i.pcmag.com/imagery/articles/03jOJGuIpeqeliE8C173FGN-2.fit_lim.size_1152x.png" alt="A phone installed with Anom" width="734" height="415" data-image-loader="https://i.pcmag.com/imagery/articles/03jOJGuIpeqeliE8C173FGN-2.png" data-lazy-sized="" data-image-path="articles/03jOJGuIpeqeliE8C173FGN-2.png" data-viewed="true" /></p>
<div class="-mt-4 mb-8"><small>Credit: Australian Federal Police</small></div>
<p>The operation marks US law enforcement’s latest attempt to circumvent encryption on smartphones. For years now, the FBI has been urging Apple to create a backdoor into its iPhones, citing the need to collect evidence against suspected criminals. Apple has thus far refused, so the agency has contracted professional smartphone hacking services to help it unlock devices seized in investigations.</p>
<p>&nbsp;</p>
<div id="incontent-1" data-pogo="incontent" data-google-query-id="CK_lytenmooDFZJCCAQdHrIqHg">
<div id="google_ads_iframe_/4585/zd.pcmag/security_article_incontent_0__container__">With Anom, the FBI used an entirely different strategy to tackle the challenge of encryption. The genesis for the sting operation occurred with the FBI takedown of a separate encrypted chat platform popular among criminals called Phantom Secure.</div>
</div>
<p>“When we took down Phantom Secure in 2018, we found the criminal organizations moved quickly to back-up options with other encrypted platforms,” said FBI San Diego Assistant Special Agent in Charge Jamie Arnold in a statement.</p>
<p>As a result, the FBI and its law enforcement partners attempted to fill the void with Anom. According to Vice, a confidential source who sold phones using Phantom Secure had been developing their own encrypted chat platform; the source then offered up the platform to the FBI, which began working to circulate Anom in criminal underground circles.</p>
<p>According to Australian Federal Police, the Anom encrypted messaging app was installed on special phones that had been stripped of other capabilities. “The mobile phones, which were bought on the black market, could not make calls or send emails. It could only send messages to another device that had the organized crime app. Criminals needed to know a criminal to get a device,” Australian Federal Police added.</p>
<p>&nbsp;</p>
<p><iframe title="Operation Ironside Australian Federal Police" width="640" height="360" src="https://www.youtube.com/embed/MB7Pnp0lUpo?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p>To market itself, Anom also had its own YouTube, Twitter, Facebook, and Reddit pages, which advertised the app as a secure communications platform.</p>
<p>&nbsp;</p>
<div id="native-1" data-adunit="/4585/pcmag_native/pcmag_native_article" data-pogo="native" data-google-query-id="CPfh2_2lmooDFTXi_QUdSHED9w">
<div id="google_ads_iframe_/4585/pcmag_native/pcmag_native_article_0__container__"></div>
</div>
<p>&nbsp;</p>
<p>The FBI has since replaced the <a title="(Opens in a new tab)" href="https://www.anom.io/" target="_blank" rel="noopener">Anom.io</a> website with a notice that says: “Law enforcement has been monitoring messages and attachments from the ANØM platform. A number of investigations have been initiated and are ongoing.” Users of Anom can learn if they’re under investigation by typing in their username and smartphone details into a form on the site. <a href="https://www.pcmag.com/news/fbi-sold-criminals-fake-encrypted-phones-that-actually-copied-their-messages" target="_blank" rel="noopener">SOURCE</a></p>
<div></div>
<div></div>
<hr />
<h1 class="entry-title wp-block-post-title">We Got the Phone the FBI Secretly Sold to Criminals</h1>
<p>Unlocking the Google Pixel 4a with a PIN code reveals some common apps: Tinder, Instagram, Facebook, Netflix, and even Candy Crush. But none of those apps work, and tapping their icons doesn’t do anything. Resetting the phone and typing in another PIN opens up an entirely different section of the device, with a new background and new apps. Now in place of the old apps sit a clock, a calculator, and the device’s settings.</p>
<p>“Enter Anom ID” and a password, the screen reads. Hidden in the calculator is a concealed messaging app called Anom, which last month we learned was an FBI honeypot. On Anom, criminals believed they could communicate securely, with the app encrypting their messages. They were wrong: an international group of law enforcement agencies including the FBI were monitoring their messages and announced hundreds of arrests last month. International authorities have held press conferences to tout the operation’s success, but have provided few details on how the phones actually functioned.</p>
<p>Motherboard has obtained and analyzed an Anom phone from a source who unknowingly bought one on a classified ads site. On that site, the phone was advertised as just a cheap Android device. But when the person received it, they realized it wasn’t an ordinary phone, and after being contacted by Motherboard, found that it contained the secret Anom app.</p>
<p>The person Motherboard bought the phone from said they panicked “when I realised what I had just purchased.” Motherboard granted the person anonymity to protect them from any retaliation.</p>
<p>When booting up the phone, it displays a logo for an operating system called “ArcaneOS.” Very little information is publicly available on ArcaneOS. It’s this detail that has helped lead several people who have ended up with Anom phones to realize something was unusual about their device. Most posts online discussing the operating system appear to be written by people who have recently inadvertently bought an Anom device, and found it doesn’t work like an ordinary phone. After the FBI announced the Anom operation, some Anom users have scrambled to get rid of their device, including selling it to unsuspecting people online. The person Motherboard obtained the phone from was in Australia, where authorities initially spread the Anom devices as a pilot before expanding into other countries. They said they contacted the Australian Federal Police (AFP) in case the phone or the person who sold it was of interest to them; when the AFP didn’t follow up, the person agreed to sell the phone to Motherboard for the same price they paid. They said they originally bought it from a site similar to Craigslist.</p>
<p>Another person Motherboard spoke to who bought one of the phones said they were in Lithuania.</p>
<p>“I bought this phone online, for ridiculously low price, now I understand why,” that second person said. That person also provided Motherboard with photos and a video of their device. In that case, the Anom login screen appeared inaccessible, but other settings such as the decoy PIN code remained. “Probably this phone was used by some drug dealer :D,” they said.</p>
<p>For the past few months, members of Android hobbyist and developer forums have been trying to help the people who bought the strange phones return them to a usable state.</p>
<p>“I cannot install any apps because there is no [App Store], everything has been removed,” one person who said they bought the phone second-hand wrote on a German language forum in March, before the FBI and its partners stopped the operation.</p>
<div class="ai-viewport-1" data-insertion-position="prepend" data-selector=".ai-insert-18-87241182" data-insertion-no-dbg="" data-code="PGRpdiBjbGFzcz0nY29kZS1ibG9jayBjb2RlLWJsb2NrLTE4JyBzdHlsZT0nbWFyZ2luOiA4cHggMDsgY2xlYXI6IGJvdGg7Jz4KPGRpdiBjbGFzcz0iaHRsYWQtdmljZV9kZXNrdG9wX2luX2FydGljbGVfNSI+PC9kaXY+PC9kaXY+Cg==" data-block="18">
<div class="code-block code-block-18">
<div class="htlad-vice_desktop_in_article_5">
<div id="htlad-5" class="htl-ad" data-unit="vice_desktop_in_article_5" data-lazy-pixels="500" data-sizes="0x0:|750x0:640x360,620x366,336x280,728x90,728x250,300x250,468x60,320x100,1x3,1x4,1x6|1050x0:640x360,620x366,336x280,728x90,728x250,300x250,468x60,320x100,1x3,1x4,1x6|1000x0:640x360,620x366,336x280,728x90,728x250,300x250,468x60,320x100,1x3,1x4,1x6" data-prebid="0x0:|750x0:active-post-article-Tablet|1050x0:active-post-article-Desktop_Large|1000x0:active-post-article-Desktop_Large" data-refresh="viewable" data-refresh-secs="30" data-refresh-max="1000" data-targeting="{&quot;htl_refresh&quot;:[&quot;0&quot;]}">
<div id="htlad-5-gpt" class="htl-ad-gpt htl-size-728x366" data-google-query-id="CODIyJ2omooDFdXl_QUdRD0sDA">
<p>“If he also had access to/data, he could change all of the cell phone’s settings manually,” one forum user replied.</p>
<figure class="wp-block-image"><img loading="lazy" decoding="async" class="attachment-full " src="https://www.vice.com/wp-content/uploads/sites/2/2021/07/1625759121359-scrambled-hand.jpeg" alt="scrambled-hand.JPG" width="764" height="509" /><figcaption class="wp-element-caption">A photo of the scrambled PIN entry screen on the Anom device. Image: Motherboard.</figcaption></figure>
<p>“That’s strange… You have the boot screen saying that the phone has been modified, yet you seem to have a locked bootloader… Doesn’t make any sense to me :/,” a user on another forum replied to someone facing similar issues.</p>
<p>“I have the same thing. A friend got a used pixel 4a and it’s running arcaneos with the same issues described by the OP. Nothing works when attempting to flash,” someone else added to the thread.</p>
<div class="ai-viewport-1" data-insertion-position="prepend" data-selector=".ai-insert-19-21844728" data-insertion-no-dbg="" data-code="PGRpdiBjbGFzcz0nY29kZS1ibG9jayBjb2RlLWJsb2NrLTE5JyBzdHlsZT0nbWFyZ2luOiA4cHggMDsgY2xlYXI6IGJvdGg7Jz4KPGRpdiBjbGFzcz0iaHRsYWQtdmljZV9kZXNrdG9wX2luX2FydGljbGVfNiI+PC9kaXY+PC9kaXY+Cg==" data-block="19">
<div class="code-block code-block-19">
<div class="htlad-vice_desktop_in_article_6">
<div id="htlad-6" class="htl-ad" data-unit="vice_desktop_in_article_6" data-lazy-pixels="500" data-sizes="0x0:|750x0:640x360,620x366,336x280,728x90,728x250,300x250,468x60,320x100,1x3,1x4,1x6|1050x0:640x360,620x366,336x280,728x90,728x250,300x250,468x60,320x100,1x3,1x4,1x6|1000x0:640x360,620x366,336x280,728x90,728x250,300x250,468x60,320x100,1x3,1x4,1x6" data-prebid="0x0:|750x0:active-post-article-Tablet|1050x0:active-post-article-Desktop_Large|1000x0:active-post-article-Desktop_Large" data-refresh="viewable" data-refresh-secs="30" data-refresh-max="1000" data-targeting="{&quot;htl_refresh&quot;:[&quot;0&quot;]}">
<div id="htlad-6-gpt" class="htl-ad-gpt htl-size-728x366" data-google-query-id="CMyWh6ComooDFfzKuAgdrsgdmA">
<p>After Motherboard determined that ArcaneOS was linked to the Anom devices and had bought the phone, someone else on one of the forums also made the connection.</p>
<p>“This is a phone the used with that FBI ANON <i>[sic] </i>application to read the message with the users,” a user wrote on a thread. That user did not respond to a request for comment on how they also came to the same conclusion.</p>
<p><b>The Phone</b></p>
<div class="ai-viewport-1" data-insertion-position="prepend" data-selector=".ai-insert-20-94587253" data-insertion-no-dbg="" data-code="PGRpdiBjbGFzcz0nY29kZS1ibG9jayBjb2RlLWJsb2NrLTIwJyBzdHlsZT0nbWFyZ2luOiA4cHggMDsgY2xlYXI6IGJvdGg7Jz4KPGRpdiBjbGFzcz0iaHRsYWQtdmljZV9kZXNrdG9wX2luX2FydGljbGVfNyI+PC9kaXY+PC9kaXY+Cg==" data-block="20">
<div class="code-block code-block-20">
<div class="htlad-vice_desktop_in_article_7">
<div id="htlad-7" class="htl-ad" data-unit="vice_desktop_in_article_7" data-lazy-pixels="500" data-sizes="0x0:|750x0:640x360,620x366,336x280,728x90,728x250,300x250,468x60,320x100,1x3,1x4,1x6|1050x0:640x360,620x366,336x280,728x90,728x250,300x250,468x60,320x100,1x3,1x4,1x6|1000x0:640x360,620x366,336x280,728x90,728x250,300x250,468x60,320x100,1x3,1x4,1x6" data-prebid="0x0:|750x0:active-post-article-Tablet|1050x0:active-post-article-Desktop_Large|1000x0:active-post-article-Desktop_Large" data-refresh="viewable" data-refresh-secs="30" data-refresh-max="1000" data-targeting="{&quot;htl_refresh&quot;:[&quot;0&quot;]}">
<div id="htlad-7-gpt" class="htl-ad-gpt htl-size-728x366" data-google-query-id="CPyRjKGomooDFSVZCAQd28Y2aQ">
<p>Besides ArcaneOS, the phone has a few other interesting features and settings.</p>
<p>Ordinarily, Android phones have a setting to turn location tracking off or on. There appears to be no setting for either on this device.</p>
<p>The phone offers “PIN scrambling,” where the PIN entry screen will randomly rearrange the digits, potentially stopping third-parties from figuring out the device’s passcode if watching someone type it in. The status bar at the top of the screen includes a shortcut for what appears to be a wipe feature on the phone, with an icon showing a piece of paper going through a shredder. Users can also set up a “wipe code,” which will wipe the device from the lockscreen, and configure the phone to automatically wipe if left offline for a specific period of time, according to the phone’s settings reviewed by Motherboard.</p>
<p>Encrypted phone companies typically offer similar data destruction capabilities, and at least in some cases companies have remotely wiped phones while they’re in authorities’ possession, hindering investigations. The Department of Justice has charged multiple people who allegedly worked for Anom in part for obstructing law enforcement by using this wipe feature.</p>
<p>Daniel Micay, lead developer of security and privacy focused Android operating system GrapheneOS, also provided Motherboard with images someone had recently sent him of a third Anom device. That phone was a Google Pixel 3a, suggesting Anom loaded its software onto multiple iterations of phones over time, and the Anom login screen was not immediately accessible.</p>
<p>“The calculator theoretically opens chat but it doesn’t work anymore. They said it requires entering a specific calculation,” Micay said. “Quite amusing security theater.”</p>
<div class="ai-viewport-1" data-insertion-position="prepend" data-selector=".ai-insert-22-86504143" data-insertion-no-dbg="" data-code="PGRpdiBjbGFzcz0nY29kZS1ibG9jayBjb2RlLWJsb2NrLTIyJyBzdHlsZT0nbWFyZ2luOiA4cHggMDsgY2xlYXI6IGJvdGg7Jz4KPGRpdiBjbGFzcz0iaHRsYWQtdmljZV9kZXNrdG9wX2luX2FydGljbGVfOSI+PC9kaXY+PC9kaXY+Cg==" data-block="22">
<div class="code-block code-block-22">
<div class="htlad-vice_desktop_in_article_9">
<div id="htlad-9" class="htl-ad" data-unit="vice_desktop_in_article_9" data-lazy-pixels="500" data-sizes="0x0:|750x0:640x360,620x366,336x280,728x90,728x250,300x250,468x60,320x100,1x3,1x4,1x6|1050x0:640x360,620x366,336x280,728x90,728x250,300x250,468x60,320x100,1x3,1x4,1x6|1000x0:640x360,620x366,336x280,728x90,728x250,300x250,468x60,320x100,1x3,1x4,1x6" data-prebid="0x0:|750x0:active-post-article-Tablet|1050x0:active-post-article-Desktop_Large|1000x0:active-post-article-Desktop_Large" data-refresh="viewable" data-refresh-secs="30" data-refresh-max="1000" data-targeting="{&quot;htl_refresh&quot;:[&quot;0&quot;]}">
<div id="htlad-9-gpt" class="htl-ad-gpt htl-size-640x360" data-google-query-id="CKj7iqaomooDFeNNCAQdLlEoPg">
<figure class="wp-block-image"><img loading="lazy" decoding="async" class="attachment-full " src="https://www.vice.com/wp-content/uploads/sites/2/2021/07/1625758993828-few-apps-flat.jpeg" alt="few-apps-flat.JPG" width="828" height="552" /><figcaption class="wp-element-caption">A photo of the hidden apps page of the Anom device. Image: Motherboard.</figcaption></figure>
<figure class="wp-block-image"><img loading="lazy" decoding="async" class="attachment-full " src="https://www.vice.com/wp-content/uploads/sites/2/2021/07/1625758554121-apps-flat.jpeg" alt="apps-flat.JPG" width="836" height="557" /><figcaption class="wp-element-caption">A photo of the normal apps page of the Anom device. Image: Motherboard.</figcaption></figure>
<p>Micay said others claimed that Anom used GrapheneOS itself, but “it sounds like they may have advertised it to some people by saying it uses GrapheneOS but it has no basis.”</p>
<p>“Basically [it] sounds like people have heard of GrapheneOS so these companies either use it in some way (maybe actual GrapheneOS, maybe a fork) or just claim they did when they didn’t,” he said.</p>
<p>The phone obtained by Motherboard and the one included in the video both have an identical list of contacts saved to the innocuous looking section of the device. However, at least some of these appear to be placeholder contacts generated by a specific tool available on Github. None of the people included in the contact list responded to a request for comment.</p>
<p>With its wipe features and the hidden user interface, the Anom device does look like one from any of the other encrypted phone firms that serious organized criminals have used in the past, such as Encrochat and Phantom Secure. That was very much on purpose, according to Andrew Young, a partner in the Litigation Department in law firm Barnes &amp; Thornburg’s San Diego office and former Department of Justice lead prosecutor on the Anom case.</p>
<p>“We can’t just run a good investigation; we have to run a good company,” he previously told Motherboard in a phone call. That included providing customer service and solving users’ tech issues, and potentially dealing with hackers who may target the company too.</p>
<p>Anom started when an FBI confidential human source (CHS), who had previously sold devices from Phantom Secure and another firm called Sky Global, was developing their own product. The CHS then “offered this next generation device, named ‘Anom,’ to the FBI to use in ongoing and new investigations,” court documents read.</p>
<p>In June the FBI and its law enforcement partners in Australia and Europe announced over 800 arrests after they had surreptitiously been listening in on Anom users’ messages for years. In all, authorities obtained over 27 million messages from over 11,800 devices running the Anom software in more than 100 countries by silently adding an extra encryption key which allowed agencies to read a copy of the messages. People allegedly smuggling cocaine hidden inside cans of tuna, hollowed out pineapples, and even diplomatic pouches all used Anom to coordinate their large-scale trafficking operations, according to court documents.</p>
<p>The FBI declined to comment. <a href="https://www.vice.com/en/article/anom-phone-arcaneos-fbi-backdoor/" target="_blank" rel="noopener">SOURCE</a></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p>&nbsp;</p>
<p><iframe title="ANØM: Global Criminals Took the BAIT - The FBI&#039;s Encrypted Messaging App" width="640" height="360" src="https://www.youtube.com/embed/pOF3pXRksD8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Check if Your Cellphone Is Infected With Pegasus Spyware</title>
		<link>https://goodshepherdmedia.net/how-to-check-if-your-cellphone-is-infected-with-pegasus-spyware/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Tue, 30 Jul 2024 20:54:24 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[4th Amendment]]></category>
		<category><![CDATA[Computer Hacks]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[Home Computing]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Software Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Tragic]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[A Complete (Updating) List of Individuals Targeted With Pegasus Spyware]]></category>
		<category><![CDATA[A Complete List of Individuals Targeted With Pegasus Spyware]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[How to Check if Your Cellphone Is Infected With Pegasus Spyware]]></category>
		<category><![CDATA[HOW TO DETECT SPYWARE ON PHONE]]></category>
		<category><![CDATA[NSO GROUP]]></category>
		<category><![CDATA[Pegasus]]></category>
		<category><![CDATA[Pegasus Spyware]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[The NSO File]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=18275</guid>

					<description><![CDATA[They’re watching us: How to detect Pegasus and other spyware on your iOS device? The infamous Pegasus spyware created by Israeli firm NSO can turn any infected smartphone into a remote microphone or camera. Here’s how to stay safe and know if you’ve been hacked How does Pegasus and other spyware work discreetly to access [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="header__title title-h2 mb-24 mt-md-48 mt-lg-64 mt-xl-64">They’re watching us: How to detect Pegasus and other spyware on your iOS device?</h1>
<blockquote>
<h3><span style="color: #ff0000;"><em><strong>The infamous Pegasus spyware created by Israeli firm NSO can turn any infected smartphone into a remote microphone or camera. Here’s how to stay safe and know if you’ve been hacked</strong></em></span></h3>
</blockquote>
<div class="c-16 c-md-9">
<div class="header--blog-post">
<div class="header__wrapper">
<div class="header__post-info post-info">
<h2 class="header__text mb-xs-48 mb-64 mb-lg-96 mb-xl-96">How does Pegasus and other spyware work discreetly to access everything on your iOS device?</h2>
</div>
</div>
</div>
</div>
<p><img loading="lazy" decoding="async" class="size-large wp-image-18276 alignright" src="https://goodshepherdmedia.net/wp-content/uploads/2024/06/How-to-Check-if-Your-Cellphone-Is-Infected-With-Pegasus-Spyware-1024x595.webp" alt="" width="640" height="372" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/06/How-to-Check-if-Your-Cellphone-Is-Infected-With-Pegasus-Spyware-1024x595.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/06/How-to-Check-if-Your-Cellphone-Is-Infected-With-Pegasus-Spyware-400x233.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/06/How-to-Check-if-Your-Cellphone-Is-Infected-With-Pegasus-Spyware-768x446.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2024/06/How-to-Check-if-Your-Cellphone-Is-Infected-With-Pegasus-Spyware.webp 1280w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<div class="blog-post-content__section--text">
<h2>Introduction</h2>
<p>In today’s digital age, mobile phones and devices have evolved from being exclusive to a few to becoming an absolute need for everyone, aiding us in both personal and professional pursuits. However, these devices, often considered personal, can compromise our privacy when accessed by nefarious cybercriminals.</p>
<p>Malicious mobile software has time and again been wielded as a sneaky weapon to compromise the sensitive information of targeted individuals. Cybercriminals build complex applications capable of operating on victims’ devices unbeknownst to them, concealing the threat and the intentions behind it. Despite the common belief among iOS users that their devices offer complete security, shielding them from such attacks, recent developments, such as the emergence of Pegasus spyware, have shattered this pretense.</p>
<p>The first iOS exploitation by Pegasus spyware was <a href="https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/">recorded</a> in August 2016, facilitated through spear-phishing attempts—text messages or emails that trick a target into clicking on a malicious link.</p>
<h2>What is Pegasus spyware?</h2>
<p>Developed by the <a href="https://www.nsogroup.com/">Israeli company NSO Group</a>, Pegasus spyware is malicious software designed to gather sensitive information from devices and users illicitly. Initially licensed by governments for targeted cyber espionage purposes, it is a sophisticated tool for remotely placing spyware on targeted devices to pry into and reveal information. Its ‘zero-click’ capability makes it particularly dangerous as it can infiltrate devices without any action required from the user.</p>
<p>Pegasus can gather a wide range of sensitive information from infected devices, including messages, audio logs, GPS location, device information, and more. It can also remotely activate the device’s camera and microphone, essentially turning the device into a powerful tool for illegal surveillance.</p>
<p>Over time, NSO Group has become more creative in its methods of unwarranted intrusions into devices.  The company, which was founded in 2010, claims itself to be a “leader” in <a href="https://www.documentcloud.org/documents/815991-1276-nso-group-brochure-pegasus.html">mobile and cellular cyber warfare</a>.</p>
<p>Pegasus is also capable of accessing data from both iOS and Android-powered devices. The fact that it can be deployed through convenient gateways such as SMS, WhatsApp, or iMessage makes it an effortless tool to trick users into installing the spyware without their knowledge. This poses a significant threat to the privacy and security of individuals and organizations targeted by such attacks.</p>
<h2>How does Pegasus spyware work?</h2>
<p>Pegasus is extremely efficient due to its strategic development to use zero-day vulnerabilities, code obfuscation, and encryption. NSO Group provides two methods for remotely installing spyware on a target’s device: a zero-click method and a one-click method. The one-click method includes sending the target a regular SMS text message containing a link to a malicious website. This website then exploits vulnerabilities in the target’s web browser, along with any additional exploits needed to implant the spyware.</p>
<p>Zero-click attacks do not require any action from device users to establish an unauthorized connection, as they exploit ‘zero-day’ vulnerabilities to gain entry into the system. Once the spyware is installed, Pegasus actively captures the intended data about the device. After installation, Pegasus needs to be constantly upgraded and managed to adapt to device settings and configurations. Additionally, it may be programmed to uninstall itself or self-destruct if exposed or if it no longer provides valuable information to the threat actor.</p>
<p>Now that we’ve studied what Pegasus is and the privacy concerns it raises for users, this blog will further focus on discussing precautionary and investigation measures. The suggested methodology can be leveraged to detect not just Pegasus spyware but also <a href="https://www.group-ib.com/blog/operation-triangulation/">Operation Triangulation</a>, <a href="https://www.itpro.com/security/spyware/370302/greek-intelligence-predator-spyware-wiretap-facebook-staffer">Predator spyware</a>, and more.</p>
<p>Let’s explore how to check iOS or iPadOS devices for signs of compromise when only an iTunes backup is available and obtaining a full file system dump isn’t a viable option.</p>
<p>In recent years, targeted attacks against iOS devices have made headlines regularly. Although the infections are not widespread and they hardly affect more than 100 devices per wave, such attacks still pose serious risks to Apple users. The risks have appeared as a result of iOS becoming an increasingly complex and open system, over the years, to enhance user experience. <b>A good example of this is the flawed design of the iMessage application, which wasn’t protected through the operating system’s sandbox mechanisms. </b></p>
<p>Apple failed to patch this flaw with a security feature called BlastDoorin iOS 14, instead implementing a Lockdown Mode mechanism that, for now, cybercriminals have not been able to bypass. <a href="https://github.com/blacktop/presentations/blob/main/0x41con_2023/PDF/AnatomyOfLockdownMode.pdf">Learn more about Lockdown Mode here</a>.</p>
<p>While BlastDoor provides a flexible solution through sandbox analysis, Lockdown Mode imposes limitations on iMessage functionality. Nonetheless, the vulnerabilities associated with ImageIO may prompt users to consider disabling iMessage permanently. Another major problem is that there are no mechanisms to examine an infected iOS device directly. Researchers have three options:</p>
<ol>
<li>Put the device in a safe and wait until an exploit is developed that can extract the full file system dump</li>
<li>Analyze the device’s network traffic (with certain limitations as not all viruses can transmit data via Wi-Fi)</li>
<li>Explore a backup copy of an iOS device, despite data extraction limitations</li>
</ol>
<p>The backup copy must be taken only with encryption (password protection) as data sets in encrypted and unencrypted copies differ. Here, our analysts focus on the third approach, as it is a pragmatic way to safely examine potential infections without directly interacting with the compromised device. This approach allows researchers to analyze the device’s data in a controlled environment, avoiding any risk of further compromising the device and losing valuable evidence that forms the ground for crucial investigation and analysis.</p>
<p>To conduct research effectively, the users will need either a Mac or Linux device. Linux virtual machines can also be used, but it is recommended that users avoid using Windows Subsystem for Linux as it has issues with forwarding USB ports.</p>
<p>In the analysis performed by Group-IB experts, we use an open-source tool called <a href="https://docs.mvt.re/en/latest/">Mobile Verification Toolkit (MVT)</a>, which is supported by a <a href="https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/">methodology report</a>.</p>
<p>Let’s start with installing dependencies:</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">sudo apt install python3 python3-pip libusb-1.0-0 sqlite3</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>Next, install a set of tools for creating and working with iTunes backups:</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">sudo apt install libimobiledevice-utils</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>Lastly, install MVT:</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">git clone https://github.com/mvt-project/mvt.git<br />
cd mvt<br />
pip3 install</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>Now, let’s begin with the analysis. To create a backup, perform the following:</p>
<ol>
<li>Connect the iOS device and verify the pairing process by entering your passcode.</li>
<li>Enter the following command:</li>
</ol>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">ideviceinfo</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>Users will receive a substantial output with information about the connected device, such as the iOS version and model type:</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">ProductName: iPhone OS<br />
ProductType: iPhone12.5<br />
ProductVersion: 17.2.1</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>After that, users can set a password for the device backup:</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">idevicebackup2 -i encryption on</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>Enter the password for the backup copy and confirm it by entering your phone’s passcode.</p>
<p>As mentioned, the above step is crucial to ensure the integrity of the data extracted from the device.</p>
<p>Create the encrypted copy:</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">idevicebackup2 backup &#8211;full /path/to/backup/</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>This process may take a while depending on the amount of space available on your device. Users will also need to enter the passcode again.</p>
<p>Once the backup is complete (as indicated by the<i> Backup Successful</i> message), the users will need to decrypt it.</p>
<p>To do so, use MVT:</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">mvt-ios decrypt-backup -p [password] -d /path/to/decrypted /path/to/backup</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>After being through with the process, users may have successfully decrypted the backup.</p>
<p>Now, let’s check for known indicators. Download the most recent IoCs (Indicators of Compromise):</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">mvt-ios download-iocs</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>We can also track IoCs relating to other spyware attacks from several sources, such as:</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">&#8220;NSO Group Pegasus Indicators of Compromise&#8221;<br />
&#8220;Predator Spyware Indicators of Compromise&#8221;<br />
&#8220;RCS Lab Spyware Indicators of Compromise&#8221;<br />
&#8220;Stalkerware Indicators of Compromise&#8221;<br />
&#8220;Surveillance Campaign linked to mercenary spyware company&#8221;<br />
&#8220;Quadream KingSpawn Indicators of Compromise&#8221;<br />
&#8220;Operation Triangulation Indicators of Compromise&#8221;<br />
&#8220;WyrmSpy and DragonEgg Indicators of Compromise&#8221;</div>
</div>
</div>
<div class="blog-post-content__section--text">
<ul>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded"><a href="https://github.com/AmnestyTech/investigations">Indicators from Amnesty International’s investigations</a></li>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded"><a href="https://github.com/mvt-project/mvt-indicators">Index and collection of MVT compatibile indicators of compromise</a></li>
</ul>
<p>The next step is to launch the scanning:</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">mvt-ios check-backup &#8211;output /path/to/output/ /path/to/decrypted/</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>The users will obtain the following <a href="https://docs.mvt.re/en/latest/ios/records/">set of JSON files for analysis</a>.</p>
<p>If any infections are detected, the users will receive a *_detected.json file with detections.</p>
<div id="attachment_31382" class="wp-caption alignnone">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18333" src="https://goodshepherdmedia.net/wp-content/uploads/2024/07/1-8.png" alt="" width="1600" height="399" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/07/1-8.png 1600w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/1-8-400x100.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/1-8-1024x255.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/1-8-768x192.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/1-8-1536x383.png 1536w" sizes="(max-width: 1600px) 100vw, 1600px" /></p>
<p id="caption-attachment-31382" class="wp-caption-text">Image 1: Result of MVT IOCs scan with four detections</p>
</div>
<div id="attachment_31383" class="wp-caption alignnone">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18334" src="https://goodshepherdmedia.net/wp-content/uploads/2024/07/2-7.png" alt="" width="1600" height="380" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/07/2-7.png 1600w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/2-7-400x95.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/2-7-1024x243.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/2-7-768x182.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/2-7-1536x365.png 1536w" sizes="(max-width: 1600px) 100vw, 1600px" /></p>
<p id="caption-attachment-31383" class="wp-caption-text">Image 2: The detected results are saved in separate files with “_detected” ending</p>
</div>
<p>If there are suspicions of spyware or malware without IOCs, but there are no detections, and a full file system dump isn’t feasible, users will need to work with the resources at hand. The most valuable files in the backup include:</p>
<p><em><b>Safari_history.json</b></em> – check for any suspicious redirects and websites.</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">&#8220;id&#8221;: 5,<br />
&#8220;url&#8221;: &#8220;http://yahoo.fr/&#8221;,<br />
&#8220;visit_id&#8221;: 7,<br />
&#8220;timestamp&#8221;: 726652004.790012,<br />
&#8220;isodate&#8221;: &#8220;2024-01-11 07:46:44.790012&#8221;,<br />
&#8220;redirect_source&#8221;: null,<br />
&#8220;redirect_destination&#8221;: 8,<br />
&#8220;safari_history_db&#8221;: &#8220;1a/1a0e7afc19d307da602ccdcece51af33afe92c53&#8221;</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p><em><b>Datausage.json </b></em>– check for suspicious processes.</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">&#8220;first_isodate&#8221;: &#8220;2023-11-21 15:39:34.001225&#8221;,<br />
&#8220;isodate&#8221;: &#8220;2023-12-14 03:05:02.321592&#8221;,<br />
&#8220;proc_name&#8221;: &#8220;mDNSResponder/com.apple.datausage.maps&#8221;,<br />
&#8220;bundle_id&#8221;: &#8220;com.apple.datausage.maps&#8221;,<br />
&#8220;proc_id&#8221;: 69,<br />
&#8220;wifi_in&#8221;: 0.0,<br />
&#8220;wifi_out&#8221;: 0.0,<br />
&#8220;wwan_in&#8221;: 3381.0,<br />
&#8220;wwan_out&#8221;: 8224.0,<br />
&#8220;live_id&#8221;: 130,<br />
&#8220;live_proc_id&#8221;: 69,<br />
&#8220;live_isodate&#8221;: &#8220;2023-12-14 02:45:10.343919&#8221;</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p><em><b>Os_analytics_ad_daily.json</b></em> – check for suspicious processes.</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">&#8220;package&#8221;: &#8220;storekitd&#8221;,<br />
&#8220;ts&#8221;: &#8220;2023-07-11 05:24:31.981691&#8221;,<br />
&#8220;wifi_in&#8221;: 400771.0,<br />
&#8220;wifi_out&#8221;: 52607.0,<br />
&#8220;wwan_in&#8221;: 0.0,<br />
&#8220;wwan_out&#8221;: 0.0</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>Keeping a backup copy of a control device is required to maintain a record of the current names of legitimate processes within a specific iOS version. This control device can be completely reset and reconfigured with the same iOS version. Although annual releases often introduce significant changes, new legitimate processes may still be added, even within a year, through major system updates.</p>
<p><em><b>Sms.json</b></em> – check for links, the content of these links, and domain information.</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">
<pre>        "ROWID": 97,
        "guid": "9CCE3479-D446-65BF-6D00-00FC30F105F1",
        "text": "",
        "replace": 0,
        "service_center": null,
        "handle_id": 1,
        "subject": null,
        "country": null,
        "attributedBody": "",
        "version": 10,
        "type": 0,
        "service": "SMS",
        "account": "P:+66********",
        "account_guid": "54EB51F8-A905-42D5-832E-D98E86E4F919",
        "error": 0,
        "date": 718245997147878016,
        "date_read": 720004865472528896,
        "date_delivered": 0,
        "is_delivered": 1,
        "is_finished": 1,
        "is_emote": 0,
        "is_from_me": 0,
        "is_empty": 0,
        "is_delayed": 0,
        "is_auto_reply": 0,
        "is_prepared": 0,
        "is_read": 1,
        "is_system_message": 0,
        "is_sent": 0,
        "has_dd_results": 1,
        "is_service_message": 0,
        "is_forward": 0,
        "was_downgraded": 0,
        "is_archive": 0,
        "cache_has_attachments": 0,
        "cache_roomnames": null,
        "was_data_detected": 1,
        "was_deduplicated": 0,
        "is_audio_message": 0,
        "is_played": 0,
        "date_played": 0,
        "item_type": 0,
        "other_handle": 0,
        "group_title": null,
        "group_action_type": 0,
        "share_status": 0,
        "share_direction": 0,
        "is_expirable": 0,
        "expire_state": 0,
        "message_action_type": 0,
        "message_source": 0,
        "associated_message_guid": null,
        "associated_message_type": 0,
        "balloon_bundle_id": null,
        "payload_data": null,
        "expressive_send_style_id": null,
        "associated_message_range_location": 0,
        "associated_message_range_length": 0,
        "time_expressive_send_played": 0,
        "message_summary_info": null,
        "ck_sync_state": 0,
        "ck_record_id": null,
        "ck_record_change_tag": null,
        "destination_caller_id": "+66926477437",
        "is_corrupt": 0,
        "reply_to_guid": "814A603F-4FEC-7442-0CBF-970C14217E1B",
        "sort_id": 0,
        "is_spam": 0,
        "has_unseen_mention": 0,
        "thread_originator_guid": null,
        "thread_originator_part": null,
        "syndication_ranges": null,
        "synced_syndication_ranges": null,
        "was_delivered_quietly": 0,
        "did_notify_recipient": 0,
        "date_retracted": 0,
        "date_edited": 0,
        "was_detonated": 0,
        "part_count": 1,
        "is_stewie": 0,
        "is_kt_verified": 0,
        "is_sos": 0,
        "is_critical": 0,
        "bia_reference_id": null,
        "fallback_hash": "s:mailto:ais|(null)(4)&lt;7AD4E8732BAF100ABBAF4FAE21CBC3AE05487253AC4F373B7D1470FDED6CFE91&gt;",
        "phone_number": "AIS",
        "isodate": "2023-10-06 00:46:37.000000",
        "isodate_read": "2023-10-26 09:21:05.000000",
        "direction": "received",
        "links": [
            "https://m.ais.co.th/J1Hpm91ix"
        ]
    },</pre>
</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p><em><b>Sms_attachments.json</b></em> – check for suspicious attachments.</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">
<pre>        "attachment_id": 4,
        "ROWID": 4,
        "guid": "97883E8C-99FA-40ED-8E78-36DAC89B2939",
        "created_date": 726724286,
        "start_date": "",
        "filename": "~/Library/SMS/Attachments/b8/08/97883E8C-99FA-40ED-8E78-36DAC89B2939/IMG_0005.HEIC",
        "uti": "public.heic",
        "mime_type": "image/heic",
        "transfer_state": 5,
        "is_outgoing": 1,
        "user_info": ",
        "transfer_name": "IMG_0005.HEIC",
        "total_bytes": 1614577,
        "is_sticker": 0,
        "sticker_user_info": null,
        "attribution_info": null,
        "hide_attachment": 0,
        "ck_sync_state": 0,
        "ck_server_change_token_blob": null,
        "ck_record_id": null,
        "original_guid": "97883E8C-99FA-40ED-8E78-36DAC89B2939",
        "is_commsafety_sensitive": 0,
        "service": "iMessage",
        "phone_number": "*",
        "isodate": "2024-01-12 03:51:26.000000",
        "direction": "sent",
        "has_user_info": true
    }</pre>
</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p><em><b>Webkit_session_resource_log.json </b></em>and<b> </b><em><b>webkit_resource_load_statistics.json</b></em> – check for suspicious domains.</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">
<pre>{
        "domain_id": 22,
        "registrable_domain": "sitecdn.com",
        "last_seen": 1704959295.0,
        "had_user_interaction": false,
        "last_seen_isodate": "2024-01-11 07:48:15.000000",
        "domain": "AppDomain-com.apple.mobilesafari",
        "path": "Library/WebKit/WebsiteData/ResourceLoadStatistics/observations.db"
    }</pre>
</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p><em><b>Tcc.json </b></em>– check which applications have been granted which permissions.</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">
<pre>        "service": "kTCCServiceMotion",
        "client": "com.apple.Health",
        "client_type": "bundle_id",
        "auth_value": "allowed",
        "auth_reason_desc": "system_set",
        "last_modified": "2023-07-11 06:25:15.000000"</pre>
</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>To collect data about processes, users can use XCode Instruments.</p>
<p><b><i>Note: Developer mode must be enabled on the iOS device.</i></b></p>
<div id="attachment_31384" class="wp-caption alignnone">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18331" src="https://goodshepherdmedia.net/wp-content/uploads/2024/07/3.jpg.webp" alt="" width="787" height="482" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/07/3.jpg.webp 787w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/3.jpg-400x245.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/3.jpg-768x470.webp 768w" sizes="(max-width: 787px) 100vw, 787px" /></p>
<p id="caption-attachment-31384" class="wp-caption-text">Image 3: Showcasing XCode instruments profile selection</p>
</div>
<p>Process data collection:</p>
<div id="attachment_31381" class="wp-caption alignnone">
<figure id="attachment_18332" aria-describedby="caption-attachment-18332" style="width: 1600px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-18332" src="https://goodshepherdmedia.net/wp-content/uploads/2024/07/4.jpg" alt="" width="1600" height="791" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/07/4.jpg 1600w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/4-400x198.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/4-1024x506.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/4-768x380.jpg 768w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/4-1536x759.jpg 1536w" sizes="(max-width: 1600px) 100vw, 1600px" /><figcaption id="caption-attachment-18332" class="wp-caption-text">Screenshot</figcaption></figure>
<p id="caption-attachment-31381" class="wp-caption-text">Image 4: Process list from iPhone</p>
</div>
<h2>Overcoming the iOS interception challenge</h2>
<h3>For the common public</h3>
<p>iOS security architecture typically prevents normal apps from performing unauthorized surveillance. However, a jailbroken device can bypass these security measures. Pegasus and other mobile malware may exploit remote jailbreak exploits to steer clear of detection by security mechanisms. This enables operators to install new software, extract data, and monitor and collect information from targeted devices.</p>
<p>Warning signs of an infection on the device include:</p>
<ul>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Slower device performance</li>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Spontaneous reboots or shutdowns</li>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Rapid battery drain</li>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Appearance of previously uninstalled applications</li>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Unexpected redirects to unfamiliar websites</li>
</ul>
<p>This reinstates the critical importance of maintaining up-to-date devices and prioritizing mobile security. Recommendations for end-users include:</p>
<ul>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Avoid clicking on suspicious links</li>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Review app permissions regularly</li>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Enable Lockdown mode for protection against spyware attacks</li>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Consider disabling iMessage and FaceTime for added security</li>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Always install the updated version of the iOS</li>
</ul>
<h3>For businesses: Protect against Pegasus and other APT mobile malware</h3>
<p>Securing mobile devices, applications, and APIs is crucial, particularly when they handle financial transactions and store sensitive data. Organizations operating in critical sectors, government, and other industries are prime targets for cyberattacks such as espionage and more, especially high-level employees.</p>
<p>Researching iOS devices presents challenges due to the closed nature of the system. <a href="https://www.group-ib.com/products/threat-intelligence/">Group-IB Threat Intelligence</a>, however, helps organizations worldwide identify cyber threats in different environments, including iOS, with our recent discovery being <a href="https://www.group-ib.com/media-center/press-releases/golddigger-trojan-vietnam/"><strong>GoldPickaxe.iOS</strong></a> – the first iOS Trojan harvesting facial scans and using them to potentially gain unauthorized access to bank accounts. Group-IB Threat Intelligence provides a constant feed on new and previously conducted cyber attacks, the tactics, techniques, and behaviors of threat actors, and susceptibility of attacks based on your organization’s risk profile— giving a clear picture of how your devices can be exploited by vectors, to initiate timely and effective defense mechanisms.</p>
<p>If you suspect your iOS or Android device has been compromised by Pegasus or similar spyware, turn to our <a href="https://www.group-ib.com/contacts/">experts for immediate support</a>. To perform device analysis or set up additional security measures, organizations can also get in touch with <a href="https://www.group-ib.com/services/digital-forensics/">Group-IB’s Digital Forensics team</a> for assistance. <a href="https://www.group-ib.com/blog/pegasus-spyware/" target="_blank" rel="noopener">source</a></p>
</div>
<hr />
<h1 class="post__title">HOW TO DEFEND YOURSELF AGAINST THE POWERFUL NEW NSO SPYWARE ATTACKS DISCOVERED AROUND THE WORLD</h1>
<p>Even iPhones were vulnerable to the surveillance software, which appears to have been used against activists, journalists, and others.</p>
<p><u>AN INTERNATIONAL GROUP</u> of journalists this month <a href="https://www.theguardian.com/world/2021/jul/18/revealed-leak-uncovers-global-abuse-of-cyber-surveillance-weapon-nso-group-pegasus" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">detailed </a><a href="https://www.theguardian.com/world/2021/jul/18/revealed-leak-uncovers-global-abuse-of-cyber-surveillance-weapon-nso-group-pegasus" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">extensive</a> new <a href="https://www.theguardian.com/world/2021/jul/18/revealed-leak-uncovers-global-abuse-of-cyber-surveillance-weapon-nso-group-pegasus" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">evidence</a> that spyware made by Israeli company NSO Group was used against activists, business executives, journalists, and lawyers around the world. Even Apple’s iPhone, frequently lauded for its tight security, was found to be “<a href="https://www.washingtonpost.com/technology/2021/07/19/apple-iphone-nso" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">no match</a>” for the surveillance software, leading Johns Hopkins cryptographer Matthew Green to fret that the NSO revelations had led some hacking experts to descend into a posture of “<a href="https://blog.cryptographyengineering.com/2021/07/20/a-case-against-security-nihilism/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">security nihilism</a>.”</p>
<p>Security nihilism is the idea that digital attacks have grown so sophisticated that there’s nothing to be done to prevent them from happening or to blunt their impact. That sort of conclusion would be a mistake. For one thing, it plays into the hands of malicious hackers, who would love nothing more than for targets to stop trying to defend themselves. It’s also mistaken factually: You <i>can</i> defend yourself against NSO’s spyware — for example, by following operational security techniques like not clicking unknown links, practicing device compartmentalization (such as using separate devices for separate apps), and having a virtual private network, or VPN, on mobile devices. Such techniques are effective against any number of digital attacks and thus useful even if NSO Group turns out to be correct in its <a href="https://zetter.substack.com/p/the-nso-surveillance-list-what-it" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">claim that the purported evidence against the company is not valid</a>.</p>
<p>There may be no such thing as perfect security, as one classic adage in the field states, but that’s no excuse for passivity. Here, then, are practical steps you can take to reduce your “attack surface” and protect yourself against spyware like NSO’s.</p>
<h3>Pegasus Offers “Unlimited Access to Target’s Mobile Devices”</h3>
<p>The recent revelations concern a specific NSO spyware product known as Pegasus. They follow extensive prior studies of the company’s software from entities like <a href="https://citizenlab.ca/tag/nso-group/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">the Citizen Lab</a>, <a href="https://www.amnesty.org/en/latest/research/2019/10/Morocco-Human-Rights-Defenders-Targeted-with-NSO-Groups-Spyware/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">Amnesty International</a>, <a href="https://articulo19.org/wp-content/uploads/2017/06/Reporte-Gobierno-Espi%CC%81a-Final.pdf" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">Article 19, R3D, and SocialTIC</a>. Here’s what we know about Pegasus specifically.</p>
<p>The software’s capabilities were outlined in what appears to be a <a href="https://www.documentcloud.org/documents/4599753-NSO-Pegasus.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">promotional brochure</a> from NSO Group dating to <a href="https://wikileaks.org/hackingteam/emails/emailid/5391" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">2014</a> or earlier and made available when WikiLeaks published a <a href="https://wikileaks.org/hackingteam/emails/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">trove of emails</a> related to a different spyware firm, Italy’s Hacking Team. The brochure’s authenticity cannot be confirmed, and NSO has said it is not commenting further on Pegasus. But the document markets Pegasus aggressively, saying it provides “unlimited access to target’s mobile devices” and allows clients to “remotely and covertly collect information about your target’s relationships, location, phone calls, plans and activities — whenever and wherever they are.” The brochure also states the Pegasus can:</p>
<ul>
<li>Monitor voice and VoIP calls in real-time.</li>
<li>Siphon contacts, passwords, files, and encrypted content from the phone.</li>
<li>Operate as an “environmental wiretap,” listening through the microphone.</li>
<li>Monitor communications through apps like WhatsApp, Facebook, Skype, Blackberry Messenger, and Viber.</li>
<li>Track the phone’s location via GPS.</li>
</ul>
<p>For all the hype, Pegasus is, however, just a glorified version of an old type of malware known as a Remote Access Trojan, or RAT: a program that allows an unauthorized party full access over a target device. In other words, while Pegasus may be potent, the security community knows well how to defend against this type of threat.</p>
<p>Let’s look at the different ways Pegasus can potentially infect phones — its various “agent installation vectors,” in the brochure’s own vernacular — and how to defend against each one.</p>
<h3>Dodging Social Engineering Clickbait</h3>
<p>There are numerous examples in reports of Pegasus attacks of journalists and human rights defenders receiving <a href="https://citizenlab.ca/2020/01/stopping-the-press-new-york-times-journalist-targeted-by-saudi-linked-pegasus-spyware-operator/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">SMS</a> and <a href="https://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">WhatsApp</a> bait messages enjoining them to click malicious links. The links download spyware that lodges into devices through security holes in browsers and operating systems. This attack vector is called an Enhanced Social Engineer Message, or ESEM, in the leaked brochure. It states that “the chances that the target will click the link are totally dependent on the level of content credibility. The Pegasus solution provides a wide range of tools to compose a tailored and innocent message to lure the target to open the message.”</p>
<blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><p>“The chances that the target will click the link are totally dependent on the level of content credibility.”</p></blockquote>
<p>As the Committee to Protect Journalists has <a href="https://cpj.org/2019/11/cpj-safety-advisory-journalist-targets-of-pegasus/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">detailed</a>, ESEM bait messages linked to Pegasus fall into various categories. Some claim to be from established organizations like banks, embassies, news agencies, or parcel delivery services. Others relate to personal matters, like work or alleged evidence of infidelity, or claim that the targeted person is facing some immediate security risk.</p>
<p>Future ESEM attacks may use different types of bait messages, which is why it’s important to treat any correspondence that tries to convince you to perform a digital action with caution. Here are some examples of what that means in practice:</p>
<ul>
<li>If you receive a message with a link, particularly if it includes a sense of urgency (stating a package is about to arrive or that your credit card is going to be charged), avoid the impulse to immediately click on it.</li>
<li>If you trust the linked site, type out the link’s web address manually.</li>
<li>If going to a website you frequently visit, save that website in a bookmark folder and only access the site from the link in your folder.</li>
<li>If you decide you’re going to click a link rather than typing it out or visiting the site via bookmark, at least scrutinize the link to confirm that it is pointing to a website you are familiar with. And remember that it’s possible you will still be fooled: Some phishing links use similar-looking letters from a non-English character set, in what is known as a <a href="https://en.wikipedia.org/wiki/IDN_homograph_attack" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">homograph attack</a>. For example, a Cyrillic “О” might be used to mimic the usual Latin “O” we see in English.</li>
<li>If the link appears to be a shortened URL, use a URL expander service such as <a href="https://urlex.org/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">URL Expander</a> or <a href="https://www.expandurl.net/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">ExpandURL</a> to reveal the actual, long link it points to before clicking.</li>
<li>Before you click a link apparently sent by someone you know, confirm that the person really did send it; their account may have been hacked or their phone number spoofed. Confirm with them using a different communication channel from the one on which you received the message. For instance, if the link came via a text or email message, give the sender a call. This is known as out-of-band verification or authentication.</li>
<li>Practice device compartmentalization, using a secondary device without any sensitive information on it to open untrusted links. Keep in mind that if the secondary device is infected, it may still be used to monitor you via the microphone or camera, so keep it in a <a href="https://www.google.com/search?tbm=shop&amp;q=phone+faraday+bag" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">Faraday bag</a> when not in use — or at least away from where you have sensitive conversations (a good idea even if it’s in a Faraday bag).</li>
<li>Use nondefault browsers. According to a section titled “Installation Failure” in the leaked Pegasus brochure, installation may fail if the target is running an <a href="https://www.documentcloud.org/documents/4599753-NSO-Pegasus.html#document/p15/a437978" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">unsupported browser</a> and in particular a browser other than “the default browser of the device.” But the document is now several years old, and it is possible that Pegasus today supports all kinds of browsers.</li>
<li>If there is ever any doubt about a given link, the safest operational security measure is to avoid opening the link.</li>
</ul>
<h3>Thwarting Network Injection Attacks</h3>
<p>Another way Pegasus <a href="https://www.amnesty.org/en/latest/research/2019/10/Morocco-Human-Rights-Defenders-Targeted-with-NSO-Groups-Spyware/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">infected</a> devices in multiple <a href="https://www.amnesty.org/en/latest/research/2020/06/moroccan-journalist-targeted-with-network-injection-attacks-using-nso-groups-tools/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">cases</a> was by intercepting a phone’s network traffic using what’s known as a man-in-the-middle, or <a href="https://en.wikipedia.org/wiki/Man-in-the-middle_attack" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">MITM</a>, attack, in which Pegasus intercepted unencrypted network traffic, like HTTP web requests, and redirected it toward malicious payloads. Pulling this off entailed either tricking the phone into connecting to a rogue portable device which pretends to be a cell tower nearby or gaining access to the target’s cellular carrier (plausible if the target is in a repressive regime where the government provides telecommunication services). This attack worked even if the phone was in mobile data-only mode, and not connected to Wi-Fi.</p>
<p>When <a href="https://www.amnesty.org/en/latest/research/2019/10/Morocco-Human-Rights-Defenders-Targeted-with-NSO-Groups-Spyware/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">Maati Monjib</a>, the co-founder of the Freedom Now NGO and the Moroccan Association for Investigative Journalism, opened the iPhone Safari browser and typed yahoo.fr, Safari first tried going to http://yahoo.fr. Normally this would have redirected to https://fr.yahoo.com, an encrypted connection. But since Monjib’s connection was being intercepted, it instead redirected to a malicious third-party site which ultimately hacked his phone.</p>
<blockquote class="stylized pull-left" data-shortcode-type="pullquote" data-pull="left"><p>Typing just the website domain into a browser opens you to attacks, because your browser will attempt an unencrypted connection to the site.</p></blockquote>
<p>Typing just the website domain (such as yahoo.fr) into a browser address bar without specifying a protocol (such as https://) opens the possibility for MITM attacks, because your browser by default will attempt an unencrypted HTTP connection to the site. Usually, you reach the genuine site, which immediately redirects you to a safe HTTPS connection. But if someone is tracking to hack your device, that first HTTP connection is enough of an opening to hijack your connection.</p>
<p>Some websites protect against this using a complicated security feature known as <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">HTTP Strict Transport Security</a>, which prevents your browser from ever making an unencrypted request to them, but you can’t always count on this, even for some websites that implement it correctly.</p>
<p>Here are some things you can do to prevent these kinds of attacks:</p>
<ul>
<li>Always type out https:// when going to websites.</li>
<li>Bookmark secure (HTTPS) URLs for your favorite sites, and use those instead of typing the domain name directly.</li>
<li>Alternately, use a <a href="https://en.wikipedia.org/wiki/Virtual_private_network" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">VPN</a> on both your desktop and mobile devices. A VPN tunnels all connections securely to the VPN server, which then accesses websites on your behalf and relays them back to you. This means that an attacker monitoring your network will likely not be able to perform a successful MITM attack as your connection is encrypted to the VPN — even if you type a domain directly into your browser without the “https://” part.</li>
</ul>
<p>If you use a VPN, keep in mind that your VPN provider has the ability to spy on your internet traffic, so it’s important to pick a trustworthy one. Wirecutter publishes a regularly updated, thorough <a href="https://www.nytimes.com/wirecutter/reviews/best-vpn-service/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">comparison of VPN providers</a> based on their history of third-party security audits, their privacy and terms of use policies, the security of the VPN technology used, and other factors.</p>
<h3>Zero-Click Exploits</h3>
<p>Unlike infection attempts which require that the target perform some action like clicking a link or opening an attachment, zero-click exploits are so called because they require no interaction from the target. All that is required is for the targeted person to have a particular vulnerable app or operating system installed. Amnesty International’s <a href="https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">forensic report </a>on the recently revealed Pegasus evidence states that some infections were transmitted through zero-click attacks leveraging the Apple Music and iMessage apps.</p>
<blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><p>Your device should have the bare minimum of apps that you need.</p></blockquote>
<p>This is not the first time NSO Group’s tools have been linked to zero-click attacks. A 2017 <a href="https://cdn2.uvnimg.com/db/e1/9105935b4499804fd3feb1f7f933/martinelli-complaint.pdf" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">complaint</a> against Panama’s former President Ricardo Martinelli states that journalists, political figures, union activists, and civic association leaders were targeted with Pegasus and rogue push notifications delivered to their devices, while in 2019 WhatsApp and Facebook filed a <a href="https://context-cdn.washingtonpost.com/notes/prod/default/documents/bf5edf35-5672-49fa-aca1-edefadff683f/note/8ef25c0d-fee9-416a-b7f9-e0a4dedc66f2.pdf" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">complaint</a> claiming NSO Group developed malware capable of exploiting a zero-click vulnerability in WhatsApp.</p>
<p>As zero-click vulnerabilities by definition do not require any user interaction, they are the hardest to defend against. But users can reduce their chances of succumbing to these exploits by reducing what is known as their “attack surface” and by practicing device compartmentalization. Reducing your attack surface simply means minimizing the possible ways that your device may be infected. Device compartmentalization means spreading your data and apps across multiple devices.</p>
<p>Specifically, users can:</p>
<ul>
<li>Reduce the number of apps on your phone. The fewer unlocked doors your home has, the fewer opportunities a burglar has to enter; similarly, fewer apps means fewer virtual doors on your phone for an adversary to exploit. Your device should have the bare minimum apps that you need to perform day-to-day function. There are some apps you cannot remove, such as iMessage; in those cases you can often <a href="https://selfsolve.apple.com/deregister-imessage/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">disable</a> them, though doing so will also make text messages no longer work on your iPhone.</li>
<li>Regularly audit your installed apps (and their permissions), and remove any that you no longer need. It is safer to remove a seldom-used app and download it again when you actually need it than to let it remain on your phone.</li>
<li>Regularly update both your phone’s operating system and individual apps, since updates close vulnerabilities, <a href="https://www.vice.com/en_us/article/v7gd9b/facebook-helped-fbi-hack-child-predator-buster-hernandez" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">sometimes even unintentionally</a>.</li>
<li>Compartmentalize your remaining apps. If a phone only has WhatsApp installed and is compromised, the hacker will get WhatsApp data, but not other sensitive information like email, calendar, photos, or <a href="https://theintercept.com/2017/05/01/cybersecurity-for-the-people-how-to-keep-your-chats-truly-private-with-signal/">Signal messages</a>.</li>
<li>Even a compartmentalized phone can still be used as a wiretap and a tracking device, so keep devices physically compartmentalized — that is, leave them in another room, ideally in a <a href="https://www.google.com/search?tbm=shop&amp;q=tamper+evident+bag" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">tamper bag</a>.</li>
</ul>
<h3>Physical Access</h3>
<p>A final way an attacker can infect your phone is by physically interacting with it. According to the brochure, “when physical access to the device is an option, the Pegasus agent can be manually injected and installed in less than five minutes” — though it is unclear if the phone needs to be unlocked or if attackers are able to infect even a PIN-protected phone.</p>
<p>There seem to be no known cases of physically launched Pegasus attacks, though such exploits may be difficult to spot and distinguish from online attacks. Here’s how you can mitigate them:</p>
<ul>
<li>Always maintain a line of sight to your devices. Losing sight of your devices opens the possibility of physical compromise. Obviously there is a difference between a customs agent taking your phone at the airport versus you leaving your laptop behind in a room in your residence when you go to the bathroom, but all involve some risk, and you will have to calibrate your own risk tolerance.</li>
<li>Put your device in a tamper bag when it needs to be left unattended, particularly in riskier locations like hotel rooms. This will not prevent the device from being manipulated but will at the least provide a ready alert that the device has been taken out of the bag and <i>might</i> have been tampered with, at which point the device should no longer be used.</li>
<li>Use burner phones and other compartmented devices when entering potentially hostile environments such as government buildings, including embassies and consulates, or when going through border checkpoints.</li>
</ul>
<p>Generally:</p>
<ul>
<li>Use Amnesty International’s <a href="https://mvt.readthedocs.io/en/latest/index.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">Mobile Verification Toolkit</a> if you suspect your phone is infected with Pegasus.</li>
<li>Regularly back up important files.</li>
<li>And finally, there’s no harm in regularly <a href="https://support.apple.com/guide/iphone/erase-iphone-iph7a2a9399b/ios" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">resetting</a> your phone.</li>
</ul>
<p>Although Pegasus is a sophisticated piece of spyware, there are tangible steps you can take to minimize the chance that your devices will be infected. There’s no foolproof method to eliminate your risk entirely, but there are definitely things you can do to lower that risk, and there’s certainly no need to resort to the defeatist view that we’re “no match” for Pegasus. <a href="https://theintercept.com/2021/07/27/pegasus-nso-spyware-security/" target="_blank" rel="noopener">source</a></p>
<hr />
<h1>How to Check if Your Cellphone Is Infected With Pegasus Spyware</h1>
<p class="rz ti ky tj tk tl">NSO Group’s Pegasus spyware can turn any infected smartphone into a remote microphone and camera, spying on its own owner while also offering the hacker – usually in the form of a state intelligence or law enforcement agency – full access to files, messages and, of course, the user’s location.</p>
<p class="rz ti ky tj tk tl"><a class="su sv sw sx iy ks sy sz ta tb tc td sc fj jl jm" href="https://www.haaretz.com/ty-tag/nso-0000017f-da35-d718-a5ff-fab5bc8e0000">Pegasus</a> is one of a number of proprietary tools sold as part of the hacker-for-hire industry – and one found at the very high-end of that dark market. Other companies offer less expensive services – for example, only providing geolocation services for its clients. So how can you protect yourself? And how can you check to see if your phone has been targeted in the past or is infected now?</p>
<p class="rz ti ky tj tk tl">Haaretz offers a simple, nontechnical explanation on how to check and stay safe&#8230;</p>
<p class="rz ti ky tj tk tl"><strong class="ey">The weakest link</strong></p>
<p class="rz ti ky tj tk tl">Most cellphone spyware operates in a similar fashion: a message is sent to a phone with a nefarious message. The message usually contains a link that will either download the malware onto your device directly, or refer it to a website that will prompt a download – all unbeknown to the phone’s owner.</p>
<p class="rz ti ky tj tk tl">There are other ways to get your phone to download something that don&#8217;t involve a message. However, from the moment of infection, most spyware tools follow a similar protocol: once installed, the spyware contacts what is called a “command-and-control” server, which provides it with instructions remotely.</p>
<p class="rz ti ky tj tk tl">“Let’s say the Israel Police are the ones who installed Pegasus on your smartphone and they want to know where you – or, more precisely, your phone – has been in the previous 24 hours. To get that information, instructions to obtain that data are sent to a C&amp;C server connected to the phone,” explains Dr. Gil David, a researcher and cybersecurity consultant.</p>
<div class="undefined hy">
<div class="FI_PH">The best way to stay safe, any cybersecurity expert will tell you, is to never – ever! – open any link sent to you, unless it&#8217;s a link you are expecting from someone you know and trust.</div>
</div>
<div class="undefined hy">
<div class="FI_PH">The reason is that, once infected, “the C&amp;C server communicates between the hacker and the spyware installed on your phone. Without it, the hacker has no way of relaying instructions to Pegasus, and Pegasus has no way to get information from the victim’s phone back to the hacker,” David writes in Haaretz Hebrew.</div>
</div>
<p class="rz ti ky tj tk tl">Many times, the links sent to you will appear innocent. It may look like a message from the Post Office or Amazon. But don’t be fooled: Through some simple social engineering and a process called “DNS spoofing,” even an official-looking URL may be a trap.</p>
<div class="undefined hy">
<div class="FI_PH"><strong class="ey" style="color: #ff0000;">Double zero</strong></div>
</div>
<p class="rz ti ky tj tk tl">Sadly, staying safe is not always possible.</p>
<p class="rz ti ky tj tk tl">What makes Pegasus so expensive is its ability to not just potentially infect any smartphone selected for targeting remotely, but to do so with a “zero click” infection. This means your phone can be infected without you even having to click on a link – for example, with the code instructing your phone to reach out to the server secretly encoded into a WhatsApp message or even in a file like a photo texted to you via iMessage.</p>
<p class="rz ti ky tj tk tl">These “zero click” attacks make use of what is called “zero-day” exploits: unknown loopholes in your phone’s defenses that allow these hidden bits of code to kick into action without the victim doing anything.</p>
<p class="rz ti ky tj tk tl">So, another good practice is to make sure your phone’s operating system is as updated as possible: As new exploits are discovered, they are quickly “patched” by the likes of Apple and Google.</p>
<p class="rz ti ky tj tk tl">According to digital forensics experts Amnesty International and Citizen Lab, Pegasus’ zero click infections have only been found on iPhones. “Most recently, a successful ‘zero-click’ attack has been observed exploiting multiple zero-days to attack a fully patched iPhone 12 running iOS 14.6 in July 2021,” Amnesty notes in its instructive report <a class="su sv sw sx iy ks sy sz ta tb tc td sc fj jl jm" href="https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/">&#8220;How to Catch NSO Group&#8217;s Pegasus.&#8221;</a></p>
<p class="rz ti ky tj tk tl">It seems Pegasus’ ability to infect iPhones was based on a previously unknown loophole in the iMessage service, and this too has subsequently been patched. However, other Israel firms, for instance QuadDream, reportedly have such abilities as well.</p>
<p class="rz ti ky tj tk tl">“From 2019, an increasing amount of vulnerabilities in iOS, especially iMessage and FaceTime, started getting patched thanks to their discoveries by vulnerability researchers, or to cybersecurity vendors reporting exploits discovered in-the-wild,” Amnesty writes – so make sure your phone is updated.</p>
<h2 class="rz ti ky tj tk tl"><span style="color: #ff0000;"><strong class="ey">Indicators of compromise</strong></span></h2>
<p class="rz ti ky tj tk tl">Groups like Amnesty and Citizen Lab find NSO’s spyware on phones using two different methods. Both involve searching for what is termed “indicators of compromise,” or IOCs.</p>
<p class="rz ti ky tj tk tl">Amnesty maintains a database of nefarious domains used by NSO’s clients. The list is constantly updating as more bogus URLs are found. Citizen Lab, meanwhile, also maintains a database of so-called vectors: messages sent to victims containing nefarious code or URLS. The two groups each maintain updated lists of Pegasus’ related processes that together permit attribution.</p>
<p class="rz ti ky tj tk tl">The only thing that has changed with Pegasus over the years is the way your phone is referred to the server, and the way the so-called payload is delivered.</p>
<p class="rz ti ky tj tk tl">“While SMS messages carrying malicious links were the tactic of choice for NSO Group’s customers between 2016 and 2018, in more recent years they appear to have become increasingly rare,” Amnesty wrote in its <a class="su sv sw sx iy ks sy sz ta tb tc td sc fj jl jm" href="https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/">July 2021 report</a>.</p>
<p class="rz ti ky tj tk tl">The newer trend, discovered in the case of Moroccan journalist <a class="su sv sw sx iy ks sy sz ta tb tc td sc fj jl jm" href="https://www.amnesty.org/en/latest/news/2020/06/nso-spyware-used-against-moroccan-journalist/">Omar Radi, who was infected with Pegasus in 2020</a>, is what is known as “packet injection.” This means that the download order is delivered not through a message but instead through your network, in the form of a hidden command “injected” into the phone through what Amnesty describes as “tactical devices, such as rogue cell towers, or through dedicated equipment placed at the mobile operator.</p>
<p class="rz ti ky tj tk tl">“The discovery of network injection attacks in Morocco signaled that the attackers’ tactics were indeed changing. Network injection is an effective and cost-efficient attack vector for domestic use especially in countries with leverage over mobile operators,” it explained.</p>
<p class="rz ti ky tj tk tl">As NSO’s clients are state agencies, they can easily make use of the mobile infrastructure to infect phones.</p>
<p class="rz ti ky tj tk tl">Therefore, and though such injection infections can also be forced upon you, other good practices include never using free Wi-Fi; never connecting to wireless networks you do not absolutely know are secure – as these networks can easily be hacked so they infect your phone and refer it to the snooping server. Not using so-called VPNs is also advisable for the same reason.</p>
<p class="rz ti ky tj tk tl">Chances are you have not been infected with Pegasus. However, if you have cause for concern and are scared you are or were infected, there are a few options:  Amnesty offers a useful, free and open source tool called the Mobile Verification Toolkit that can check a backup of your device or its logs for any IOC. The MVT will scan your iPhone’s logs for Pegasus-related processes or search your Android&#8217;s messages for nefarious links. The tool <a class="su sv sw sx iy ks sy sz ta tb tc td sc fj jl jm" href="https://github.com/mvt-project/mvt?fbclid=IwAR0JV7V9TcMh5Kbe5aKi9cnxqbv5IFyhgHpdT8aesFiwS5h5xSztlEoOg6k">can be downloaded here</a>. The bad news is that it requires some technical know-how and is currently devoid of a simple-to-use interface. To get it to work, you first need to make a specific type of backup of your phone, and then you need to download the program and run the code on your computer so it can scan the file you created. Running the program requires you to download Python. Luckily, the <a class="su sv sw sx iy ks sy sz ta tb tc td sc fj jl jm" href="https://web.archive.org/web/20210830112025/https://docs.mvt.re/en/latest/install.html">tool comes with very clear instructions</a>, and even those unskilled in code can make use of it with a bit of effort. Furthermore, it also allows you to conduct the test yourself. A similar product is <a class="su sv sw sx iy ks sy sz ta tb tc td sc fj jl jm" href="https://imazing.com/guides/detect-pegasus-and-other-spyware-on-iphone">iMazing</a>, a phone-backup platform that runs on your desktop and provides a MVT-like analysis of your device. It does not prevent infections but can check your phone for IOCs. If the best offense is defense, there’s also a growing cellphone security market. Cyberdefense firms like ZecOps offer organizations like the BBC and Fortune 2000 companies a platform that inspects phones for current infections or traces of historic attacks. ZecOps also provides this service pro bono for journalists involved in the <a class="su sv sw sx iy ks sy sz ta tb tc td sc fj jl jm" href="https://www.haaretz.com/israel-news/tech-news/2021-07-18/ty-article/.premium/nsos-pegasus-the-israeli-cyber-weapon-used-against-180-journalists/0000017f-dc8d-df62-a9ff-dcdfe86d0000">Pegasus Project</a>. Private users can also buy such services. For example, the Israeli-Indian security firm SafeHouse Technologies offers an app called “BodyGuard” that provides defenses for your phone, for a small price. It already has more than a million users, mostly in India. If you can’t get the Mobile Verification Toolkit to work and are reluctant to use an app, and you genuinely fear you have been targeted, you can also <a class="su sv sw sx iy ks sy sz ta tb tc td sc fj jl jm" href="mailto:omerbenj@protonmail.com?subject=Pegasus%20test%20request%20tip">drop us a tip here</a> and we at Haaretz will get you checked. <a href="https://www.haaretz.com/israel-news/tech-news/2022-02-09/ty-article/how-to-check-if-your-cellphone-is-infected-with-pegasus/0000017f-e5a4-df5f-a17f-fffe3ea20000" target="_blank" rel="noopener">source</a></p>
<hr />
<h1 class="post-title single-post-title entry-title">HOW TO DETECT PEGASUS SPYWARE</h1>
<p>As one of the leading commercial spyware programs, Pegasus has been used by a host of companies, governments, and other entities to collect sensitive data from individuals’ smartphones. If Pegasus is deployed on your smartphone, your sensitive data could be at risk.<span id="more-12891"></span></p>
<p>Read on to learn how to detect Pegasus spyware on your smartphone.</p>
<p>&nbsp;</p>
<h2><b>How to Detect Pegasus Spyware</b><b> on Your Smartphone</b></h2>
<p>The data privacy demands of today’s IT landscape call for robust mobile security, as more individuals rely on smartphone applications for essential day-to-day tasks.</p>
<p>Safeguarding your smartphone data from threats like Pegasus starts with knowing how to:</p>
<ul>
<li aria-level="1"><em>Scan for and detect Pegasus spyware on your smartphone</em></li>
<li aria-level="1"><em>Identify Pegasus spyware installed on your smartphone</em></li>
<li aria-level="1"><em>Remove Pegasus spyware from your Android or iPhone</em></li>
<li aria-level="1"><em>Prevent Pegasus spyware from compromising your smartphone data </em></li>
</ul>
<p>Dealing with advanced mobile security risks like Pegasus spyware is much easier with the help of a managed security services provider (MSSP), who can advise on how to detect pegasus spyware on iPhone or Android.</p>
<p>&nbsp;</p>
<h2><b>What is Pegasus Spyware?</b></h2>
<p>Developed by the NSO group in Israel, Pegasus is signature spyware that has been implicated in the secret surveillance of individuals worldwide. Pegasus spyware is considered dangerous because it allows an attacker to control a victim’s smartphone.</p>
<p>Using Pegasus spyware, a perpetrator can:</p>
<ul>
<li aria-level="1">Wiretap and listen to conversations</li>
<li aria-level="1">Access photos and videos</li>
<li aria-level="1">Control applications on a smartphone</li>
</ul>
<p>It is difficult and often impossible for antivirus solutions to detect Pegasus spyware because it exploits zero-day vulnerabilities, which are unknown to the developers of these solutions.</p>
<p>&nbsp;</p>
<h2><b>How to Detect Pegasus Spyware</b></h2>
<p>Over years of extensive research, Amnesty International has developed a methodology to detect Pegasus spyware on smartphones, providing it to the public as a resource on Github.</p>
<p>Using Amnesty International’s methodology, you can find a list of:</p>
<ul>
<li aria-level="1"><em>Domain names of Pegasus infrastructure</em></li>
<li aria-level="1"><em>Email addresses identified in previous attacks</em></li>
<li aria-level="1"><em>Process names associated with Pegasus</em></li>
</ul>
<p>Beyond the indicators of Pegasus compromise methodology, Amnesty International also released a Mobile Verification Toolkit (MVT) to help support users interested in detecting Pegasus spyware on their smartphones. With the help of Amnesty International’s spyware detection tools, you can learn how to detect pegasus spyware on Android or iPhone.</p>
<p>&nbsp;</p>
<h3><b>How to Detect Pegasus </b><b>Spyware </b><b>on iOS</b></h3>
<p>Here’s how to check for pegasus spyware on iOS devices such as iPhones:</p>
<ul>
<li aria-level="1">Create a backup of encrypted data on a device other than your smartphone</li>
<li aria-level="1">Once your smartphone is securely backed up, download the MVT tool onto your iPhone and follow Amnesty International’s instructions for detecting Pegasus.</li>
</ul>
<p>Whereas other apps can detect Pegasus on iOS, it’s best to follow Amnesty International’s instructions or work with a <strong>qualified MSSP</strong> to avoid running into any issues while detecting the spyware.</p>
<p>&nbsp;</p>
<h3><b>How to Detect Pegasus </b><b>Spyware </b><b>on Android</b></h3>
<p>Although the MVT mostly caters to iOS devices, it can still detect Pegasus on Android.</p>
<p>If you are wondering how to detect Pegasus spyware on Android with the MVT, the first places to start looking are potentially malicious text messages and APKs on your smartphone.</p>
<p>&nbsp;</p>
<h2><b>How Pegasus Works</b></h2>
<p>For most Pegasus infections, the spyware is installed remotely on victims’ smartphones. However, Pegasus can be installed physically, and, in some cases, it can use the victim’s smartphone for data storage prior to transmitting data to a remote server.</p>
<h3><b>Pegasus Remote Installation</b></h3>
<p>Pegasus spyware can be remotely installed on a smartphone via:</p>
<ul>
<li aria-level="1"><b>Zero-click attacks</b> – Zero-click exploits typically leverage applications such as Apple Music or iMessage to send requests to the victim’s smartphone. Here, the victim does not interact with the spyware and is clueless about the download of Pegasus spyware.</li>
<li aria-level="1"><b>Malicious text messages</b> –  A victim receives a text message containing an exploit link for a Pegasus spyware download. Clicking the link deploys spyware on the victim’s smartphone.</li>
<li aria-level="1"><b>Network injection attack</b> – While browsing the Internet, a victim is redirected from a clear-text HTTP website to a decoy of a legitimate business. Unknowingly, a victim may then provide access credentials or other sensitive information.</li>
</ul>
<p>In most cases, remote installation of Pegasus spyware on victims’ phones via zero-click attacks leverages zero-day vulnerabilities, of which the smartphone manufacturer may not be aware.</p>
<p>This makes Pegasus spyware very dangerous to its victims, who may not realize their sensitive data is being surveilled until it is too late.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-10971" src="https://blog.rsisecurity.com/wp-content/uploads/2021/12/planning-300x120.jpg" sizes="(max-width: 825px) 100vw, 825px" srcset="https://blog.rsisecurity.com/wp-content/uploads/2021/12/planning-300x120.jpg 300w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/planning-768x306.jpg 768w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/planning-1024x408.jpg 1024w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/planning-1170x466.jpg 1170w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/planning-585x233.jpg 585w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/planning.jpg 1277w" alt="planning" width="825" height="330" /></p>
<h3><b>Pegasus Physical Installation</b></h3>
<p>While it is uncommon, Pegasus can be installed by connecting a victim’s smartphone to another device such as a computer to deploy the spyware. However, this would involve the difficult task of accessing a victim’s smartphone without their knowledge.</p>
<p>&nbsp;</p>
<h3><b>Pegasus Data Management</b></h3>
<p>According to NSO, the spyware will transmit data from a victim’s smartphone to a server where the attacker can access the data. However, if Pegasus is unable to send data to a server, it will transmit the data to a “hidden and encrypted buffer” within the phone’s storage.</p>
<p>&nbsp;</p>
<h2><b>What Data Can Pegasus Access?</b></h2>
<p>Once deployed on a smartphone, Pegasus spyware can access a range of data, including:</p>
<ul>
<li aria-level="1">Text messages</li>
<li aria-level="1">Emails</li>
<li aria-level="1">Photos and videos</li>
<li aria-level="1">Personal contacts</li>
<li aria-level="1">Location</li>
<li aria-level="1">Audio messages and recordings</li>
</ul>
<p>Detecting Pegasus spyware on your smartphone is critical to minimizing the risks of your sensitive data being exposed by perpetrators.</p>
<p>&nbsp;</p>
<h3><b>Can Pegasus be Removed?</b></h3>
<p>You can remove Pegasus from your smartphone by attempting the following actions:</p>
<ul>
<li aria-level="1">Restarting your smartphone, to put a temporary stop to Pegasus</li>
<li aria-level="1">Resetting your smartphone to its factory settings, which <i>may</i> remove Pegasus</li>
<li aria-level="1">Updating your smartphone’s system software and apps to current versions</li>
<li aria-level="1">Removing any unknown device connections to social media platforms</li>
</ul>
<p>When removing Pegasus from your smartphone, it is always best to work with the MVT resource provided by Amnesty International. If Pegasus spyware removal becomes difficult, consider consulting an MSSP for help.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-10968" src="https://blog.rsisecurity.com/wp-content/uploads/2021/12/incident-300x117.jpg" sizes="(max-width: 818px) 100vw, 818px" srcset="https://blog.rsisecurity.com/wp-content/uploads/2021/12/incident-300x117.jpg 300w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/incident-768x300.jpg 768w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/incident-1024x400.jpg 1024w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/incident-1170x456.jpg 1170w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/incident-585x228.jpg 585w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/incident.jpg 1279w" alt="incident" width="818" height="319" /></p>
<h2><b>What to Do if You Have Pegasus</b></h2>
<p>According to Reporters Without Borders (RSF), here’s what to do if you have Pegasus:</p>
<ul>
<li aria-level="1">Buy a new smartphone and stop using the one infected with Pegasus, ensuring the compromised smartphone is not close to you or your work environment.</li>
<li aria-level="1">Change passwords for all accounts on the new smartphone and remember to sign out of the accounts on the compromised one.</li>
</ul>
<p>If you have Pegasus, it is best to contact an experienced MSSP, who will point you to Pegasus spyware removal tools that will help remove Pegasus and keep your data safe.</p>
<p>&nbsp;</p>
<h2><b>Other Spyware like Pegasus</b></h2>
<p>Besides Pegasus, other types of spyware include:</p>
<ul>
<li aria-level="1">Trojans, which can steal a victim’s funds or credentials to make fraudulent purchases.</li>
<li aria-level="1">Stealware, which can intercept traffic from online shopping sites like those offering credits or rewards for purchases.</li>
</ul>
<p>With everyone using smartphones or tablets to store sensitive information like account passwords, securing these devices from spyware and other forms of malware is paramount.</p>
<p>In an organizational setting, it is critical for leadership to emphasize the importance of mobile security in defending sensitive data stored on smartphones from various types of spyware.</p>
<p>&nbsp;</p>
<h2><b>How to Protect From Pegasus and Other Spyware</b></h2>
<p>Protecting your organization from Pegasus and other spyware revolves around implementing mobile device security best practices such as:</p>
<ul>
<li aria-level="1">Encrypting any communication of sensitive data with industry-standard algorithms</li>
<li aria-level="1">Keeping up-to-date with the latest phishing and malware attempts</li>
<li aria-level="1">Updating your smartphone or mobile device with the latest security patches</li>
<li aria-level="1">Using strong passwords and multi-factor authentication on all mobile devices</li>
<li aria-level="1">Conducting routine penetration testing on mobile devices that contain sensitive data</li>
</ul>
<p>If you are wondering how to block Pegasus spyware, some of the mobile security best practices above can help. However, it’s best to implement them with the guidance of a leading MSSP. <a href="https://blog.rsisecurity.com/how-to-detect-pegasus-spyware/#:~:text=Although%20the%20MVT%20mostly%20caters,and%20APKs%20on%20your%20smartphone." target="_blank" rel="noopener">source</a></p>
<hr />
<h1 class="Page-headline">Journalists, lawyers and activists hacked with Pegasus spyware in Jordan, forensic probe finds</h1>
<div class="StoryPage-actions-wrapper">
<div class="Page-byline"></div>
</div>
<div class="RichTextStoryBody RichTextBody">
<p>de Pegasus spyware was used in Jordan to hack the cellphones of at least 30 people, including journalists, lawyers, human rights and political activists, the digital rights group Access Now said Thursday.</p>
<p>The hacking with <span class="LinkEnhancement">spyware</span> made by Israel’s <span class="LinkEnhancement">NSO Group</span> occurred from 2019 until last September, Access Now said in its report. It did not accuse Jordan’s government of the hacking.</p>
<p>One of the targets was Human Rights Watch’s deputy director for the region, Adam Coogle, who said in an interview that it was difficult to imagine who other than Jordan’s government would be interested in hacking those who were targeted.</p>
<p>The Jordanian government had no immediate comment on <span class="LinkEnhancement">Thursday’s report</span>.</p>
<p><span class="LinkEnhancement">In a 2022 report</span> detailing a much smaller group of Pegasus victims in Jordan, digital sleuths at the University of Toronto’s Citizen Lab identified two operators of the spyware it said may have been agents of the Jordanian government. A year earlier, <span class="LinkEnhancement">Axios reported</span> on negotiations between Jordan’s government and NSO Group.</p>
<p>“We believe this is just the tip of the iceberg when it comes to the use of Pegasus spyware in Jordan, and that the true number of victims is likely much higher,” Access Now said. Its Middle East and North Africa director, Marwa Fatafta, said at least 30 of 35 known targeted individuals were successfully hacked.</p>
<p>Citizen Lab <span class="LinkEnhancement"><a class="Link AnClick-LinkEnhancement" href="https://citizenlab.ca/2024/02/confirming-large-scale-pegasus-surveillance-of-jordan-based-civil-society" target="_blank" rel="noopener" data-gtm-enhancement-style="LinkEnhancementA">confirmed all but five of the infections</a></span>, with 21 victims asking to remain anonymous, citing the risk of reprisal. The rest were identified by Human Rights Watch, Amnesty International’s Security Lab, and the Organized Crime and Corruption Reporting Project.</p>
<p>NSO Group says it only sells to vetted intelligence and law enforcement agencies — and only for use against terrorists and serious criminals. But cybersecurity researchers who have tracked the spyware’s use in 45 countries have documented dozens of cases of politically motivated abuse of the spyware — from <span class="LinkEnhancement"><a class="Link AnClick-LinkEnhancement" href="https://apnews.com/article/mexico-pegasus-spyware-activists-press-freedom-army-76477e1d4e3e09250e20aa4896b1f9e1" target="_blank" rel="noopener" data-gtm-enhancement-style="LinkEnhancementA">Mexico</a></span> and <span class="LinkEnhancement"><a class="Link AnClick-LinkEnhancement" href="https://apnews.com/article/thailand-surveillance-nso-spyware-1081ac34cf80e15c048af8c2d1db0e33" target="_blank" rel="noopener" data-gtm-enhancement-style="LinkEnhancementA">Thailand</a></span> to <span class="LinkEnhancement"><a class="Link AnClick-LinkEnhancement" href="https://apnews.com/article/technology-business-software-spyware-jaroslaw-kaczynski-0c41a504e8fbdbb6b9b06f6869848a48" target="_blank" rel="noopener" data-gtm-enhancement-style="LinkEnhancementA">Poland</a></span> and <span class="LinkEnhancement"><a class="Link AnClick-LinkEnhancement" href="https://www.theguardian.com/world/2022/aug/19/british-judge-rules-dissident-ghanem-almasarir-can-sue-saudi-arabia-for-pegasus-hacking" target="_blank" rel="noopener" data-gtm-enhancement-style="LinkEnhancementA">Saudi Arabia.</a></span></p>
<p>An NSO Group spokesperson said the company would not confirm or deny its clients’ identities. NSO Group says it vets customers and investigates any report its spyware has been abused.</p>
<p>The U.S. government was unpersuaded and blacklisted the NSO Group in November 2021, when iPhone maker Apple Inc. sued it, calling its employees “amoral 21st century mercenaries who have created highly sophisticated cyber-surveillance machinery that invites routine and flagrant abuse.”</p>
<p>Those targeted in Jordan include Human Rights Watch’s senior researcher for Jordan and Syria, Hiba Zayadin. Both she and Coogle had received threat notifications from Apple on Aug. 29 that state-sponsored attackers had attempted to compromise their iPhones.</p>
<p>Coogle’s local, personal iPhone was successfully hacked in October 2022, he said, just two weeks after the human rights group <span class="LinkEnhancement"><a class="Link AnClick-LinkEnhancement" href="https://www.hrw.org/news/2022/09/18/jordan-government-crushes-civic-space" target="_blank" rel="noopener" data-gtm-enhancement-style="LinkEnhancementA">published a report</a></span> documenting the persecution and harassment of citizens organizing peaceful political dissent.</p>
<p>After that, Coogle activated <span class="LinkEnhancement"><a class="Link AnClick-LinkEnhancement" href="https://apnews.com/article/technology-hacking-apple-inc-spyware-ad4fb8df901b525d6fddc359670ce3a9" target="_blank" rel="noopener" data-gtm-enhancement-style="LinkEnhancementA">“Lockdown Mode,”</a></span> on the iPhone, which Apple recommends for users at high risk.</p>
<p>Human Rights Watch said <span class="LinkEnhancement"><a class="Link AnClick-LinkEnhancement" href="https://www.hrw.org/news/2024/02/01/spyware-targets-human-rights-watch-staff-jordan" target="_blank" rel="noopener" data-gtm-enhancement-style="LinkEnhancementA">in a statement</a></span> Thursday that it had contacted NSO Group about the attacks and specifically asked it to investigate the hack of Coogle’s device “but has received no substantive response to these inquiries.”</p>
<p>Jordanian human rights lawyer Hala Ahed — known for defending women’s and workers rights and prisoners of conscience — was also targeted at least twice by Pegasus, successfully in March 2021 then unsuccessfully in February 2023, Access Now said.</p>
<p>About half of those found to have been targeted by Pegasus in Jordan — 16 in all — were journalists or media workers, the report said.</p>
<p>One veteran Palestinian-American journalist and columnist, Dauod Kuttab, was hacked with Pegasus three times between February 2022 and September 2023.</p>
<p>Along the way, he said, he’s learned important lessons about not clicking on links in messages purporting to be from legitimate contacts, which is how one of the Pegasus hacks snared him.</p>
<p>Kuttab refused to speculate about who might have targeted him.</p>
<p>“I always assume that somebody is listening to my conversations,” he said, as getting surveilled “comes with the territory” when you are journalist in the Middle East.</p>
<p>But Kuttab does worry about his sources being compromised by hacks — and the violation of his privacy.</p>
<p>“Regardless of who did it, it’s not right to intervene into my personal, family privacy and my professional privacy.” <a href="https://apnews.com/article/jordan-hacking-pegasus-spyware-nso-group-99b0b1e4ee256e0b4df055f926349a43" target="_blank" rel="noopener">source</a></p>
</div>
<hr />
<h1 class="ao ap aq ar as at nx ny nz oa m" data-test="articleHeaderTitle">The NSO File: A Complete (Updating) List of Individuals Targeted With Pegasus Spyware</h1>
<p class="ob q r oc od oe of og oh oi oj ok ol om ac ae af ag" data-test="articleHeaderSubtitle">The Israeli-made Pegasus spyware is suspected of infecting over 450 phones targeted by clients of NSO, who range from Saudi Arabia to Mexican drug lords. Here’s a list of the confirmed Pegasus victims.</p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">The Israeli-made Pegasus spyware, sold by the cyberoffense firm NSO to state intelligence agencies around the world, has become infamous in recent years. Exploiting unknown loopholes in WhatsApp, iMessage and Android has allowed the group’s clients to potentially infect any smartphone and gain full access to it – in some cases without the owner even clicking or opening a file.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Digital forensics groups such as Amnesty International and the University of Toronto’s Citizen Lab have revealed numerous potential targets with traces of the spyware on their phones. Last summer, Project Pegasus – led by Paris-based NGO Forbidden Stories with the help of Amnesty’s Security Lab – organized an international consortium of journalists, including Haaretz and its sister publication TheMarker, to investigate thousands of additional potential targets selected for possible surveillance by <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/ty-tag/nso-0000017f-da35-d718-a5ff-fab5bc8e0000">NSO Group</a> clients worldwide.</p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">So far, targets have been found across the world: from India and Uganda to Mexico and the West Bank, with high-profile victims including U.S. officials and a New York Times journalist.</p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Now, for the first time, Haaretz has assembled a list of confirmed cases involving Pegasus spyware.</p>
<p data-test="articleHeaderSubtitle"><img loading="lazy" decoding="async" class="alignnone wp-image-18277" src="https://goodshepherdmedia.net/wp-content/uploads/2024/06/NSO-Group-Spyare-Pegasus.webp" alt="" width="681" height="681" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/06/NSO-Group-Spyare-Pegasus.webp 960w, https://goodshepherdmedia.net/wp-content/uploads/2024/06/NSO-Group-Spyare-Pegasus-400x400.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/06/NSO-Group-Spyare-Pegasus-150x150.webp 150w, https://goodshepherdmedia.net/wp-content/uploads/2024/06/NSO-Group-Spyare-Pegasus-768x768.webp 768w" sizes="(max-width: 681px) 100vw, 681px" /></p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Though there have been over 450 suspected hacking cases, this list, which was put together with the help of Amnesty’s Security Lab, includes only the cases in which infections were confirmed either by Amnesty or another digital forensics group like Citizen Lab (which also helped construct this list). It also includes a few instances where official bodies such as French intelligence agencies or private firms like Apple or WhatsApp have publicly confirmed attacks.</p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">The list does not include those suspected of being targeted – for example, Amazon’s Jeff Bezos, who was reportedly sent the spyware via a WhatsApp message from no less than <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/ty-tag/mohammed-bin-salman-0000017f-da25-d718-a5ff-faa5ec430000">Saudi Crown Prince Mohammed bin Salman</a>. Rather, it is those who have actually been found with Pegasus on their phones.</p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">The NSO Group, which refuses to confirm the identity of its clients and claims it has no knowledge of their targets, has denied most of these cases and says digital forensic analysis cannot fully identify its software.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<ul class="py ue r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv go gn gm vi vj vk vl" data-test="relatedArticles">
<li class="vn m a vo vp vq vr vs vt vu jn vv vw vx vy vz wa wb wc wd we wf wg"><a href="https://www.haaretz.com/israel-news/tech-news/2022-02-09/ty-article/how-to-check-if-your-cellphone-is-infected-with-pegasus/0000017f-e5a4-df5f-a17f-fffe3ea20000" data-test="articleLink"><span class="vq dm m mj wh wi wj wk wl wm wn wo wp wq wr ws ve wt vg wu bj ln wv ww wx">How to Check if Your Cellphone Is Infected With Pegasus Spyware</span></a></li>
<li class="vn m a vo vp vq vr vs vt vu jn vv vw vx vy vz wa wb wc wd we wf wg"><a href="https://www.haaretz.com/israel-news/2022-01-18/ty-article/police-used-nsos-pegasus-to-spy-on-israelis-without-court-order-report-says/0000017f-e3bc-d804-ad7f-f3fefd210000" data-test="articleLink"><span class="vq dm m mj wh wi wj wk wl wm wn wo wp wq wr ws ve wt vg wu bj ln wv ww wx">Police Use NSO&#8217;s Pegasus to Spy on Israelis Without Warrant, Report Says</span></a></li>
<li class="vn m a vo vp vq vr vs vt vu jn vv vw vx vy vz wa wb wc wd we wf wg"><a href="https://www.haaretz.com/middle-east-news/2022-01-17/ty-article/.premium/israeli-nso-spyware-found-on-phones-of-jordanian-bahraini-womens-rights-activists/0000017f-e17f-df7c-a5ff-e37f6bfe0000" data-test="articleLink"><span class="vq dm m mj wh wi wj wk wl wm wn wo wp wq wr ws ve wt vg wu bj ln wv ww wx">Israeli NSO Spyware Found on Phones of Jordanian, Bahraini Women’s Rights Activists</span></a></li>
</ul>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">The gap between the massive list of potential targets and those who were actually infected highlights how hard it is to confirm the presence of Pegasus spyware on phones. For instance, a private investigation commissioned by Bezos himself found that his phone had received a strange message from Crown Prince Mohammed, after which the tycoon’s device began sending out a lot of data. However, Bezos was reluctant to hand his phone over to anyone other than the handpicked investigators he had hired; they said it was very likely his phone had been infected.</p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Here is the list of most, if not all, known and confirmed Pegasus cases. They are sorted by the nationality of the victims or their country of residence when they were targeted.</p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">The list of confirmed cases is followed by an additional list of names of those who have been confirmed to have been targeted but whose actual infection has not been verified.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<div class="q r gl gm gn go gp gq gr gs gt gu gv fp fq fr fs ft fu fv ah fj fk fl fm fn fo gw gx gy gz ha hb ac ae af ag">
<figure class="} m ev f pt py">
<div class="eg m pu">
<p><button class="ei pv pw px py kh ew mj et eg pz qa qb bk qc qd" type="button"><span class="ea eb ec ed ee ef eg eh ei ej ek cz">Open gallery view</span></button></p>
<div class="qg wy m f qk"><img loading="lazy" decoding="async" class="hx bu ei hi f ql qm qn qo auw id aux auy" title="The NSO Group logo on one of its Israeli offices., Credit: AMIR COHEN/REUTERS" src="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=1280&amp;width=1920" sizes="(min-width: 80em) 602px,(min-width: 64em) 594px,(min-width: 48em) 564px,(min-width: 37.5em) 576px,calc(100vw - 24px)" srcset="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=1280&amp;width=1920 1920w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=960&amp;width=1440 1440w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=854&amp;width=1280 1280w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=685&amp;width=1028 1028w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=612&amp;width=918 918w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=484&amp;width=726 726w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=400&amp;width=600 600w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=283&amp;width=425 425w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=250&amp;width=375 375w" alt="The NSO Group logo on one of its Israeli offices." width="767" height="511" data-test="articleBodyImage" /></div>
</div>
<div class="qq qr db dm ie dn wz dp dq qs qt dv dw"><span class="qp">The NSO Group logo on one of its Israeli offices.</span><span class="ao pt rj dp dq qs qt">Credit: AMIR COHEN/REUTERS</span></div>
</figure>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">AZERBAIJAN</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Khadija Ismayilova</strong><br />
The Azerbaijani investigative journalist based in Baku was targeted repeatedly for over three years as part of government persecution as a result of her work, <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2021-07-18/ty-article/.premium/nsos-pegasus-the-israeli-cyber-weapon-used-against-180-journalists/0000017f-dc8d-df62-a9ff-dcdfe86d0000">the Project Pegasus investigation revealed</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<div class="q r gl gm gn go gp gq gr gs gt gu gv fp fq fr fs ft fu fv ah fj fk fl fm fn fo gw gx gy gz ha hb ac ae af ag"></div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Sevinc Vaqifqizi</strong><br />
Freelance Azerbaijanii journalist Vaqifqizi was found by Amnesty and Forbidden Stories to have had their phone infected with Pegasus in 2019 and 2020.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">BAHRAIN</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Moosa Abd-Ali</strong><br />
Moosa Abd-Ali is a Bahraini activist living in exile in London who was found to have been targeted in the past, with the Bahraini government hacking his personal computer in 2011. <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://citizenlab.ca/2021/08/bahrain-hacks-activists-with-nso-group-zero-click-iphone-exploits/">According to Citizen Lab</a>, Abd-Ali’s iPhone 8 appears to have been hacked with Pegasus at some point prior to September 2020.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Yusuf al-Jamri</strong><br />
A Bahraini blogger who says he was tortured by his government, Yusuf al-Jamri was granted asylum in the U.K. in 2018. According to Citizen Lab, Jamri’s iPhone 7 appears to have been hacked with Pegasus at some point prior to September 2019.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Seven rights activists</strong><br />
At least three members of the Bahrain Centre for Human Rights, another three from the nonprofit Waad and one from the group Al Wefaq were also infected, Citizen Lab found. At least another seven members of BCHR and the other groups were actually targeted, but their infection was not confirmed by Citizen Lab.</p>
<div class="undefined ev"></div>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">EL SALVADOR</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Carlos Martínez</strong><br />
A reporter for El Faro, he was one of over 35 journalists and members of civil society groups infected by the Pegasus spyware between July 2020 and November 2021.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Daniel Lizárraga</strong><br />
A Mexican journalist and the editor of El Faro, who was expelled from El Salvador. Citizen Lab found that his phne had been infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Nine El Faro journalists</strong><br />
The following journalists with El Faro were all found by Citizen Lab to have been infected by the Pegasus spyware: Gabriela Cáceres, Carlos Dada, Carlos Ernesto Martínez D’aubuisson, Julia Gavarrete (who had two phones hacked), Valeria Guzmán, Ana Beatriz Lazo, Rebeca Monge, Víctor Peña, Nelson Rauda.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">El Salvadorian journalists</strong><br />
Citizen Lab discovered that the following journalists were also infected with Pegasus: Efren Lemus, Gabriel Labrador, José Luis Sanz, María Luz Nóchez, Mauricio Ernesto Sandoval Soriano, Óscar Martínez, Roman Gressier, Roxana Lazo, Sergio Arauz, Beatriz Benitez, Ezequiel Barrera, Xenia Oliva, an unnamed journalist from Diario El Mundo, and Daniel Reyes.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Noah Bullock</strong><br />
The head of Cristosal, a human rights organization based in El Salvador, who was also found by Citizen Lab to have been infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ricardo Avelar</strong><br />
A journalist with El Diario de Hoy, Citizen Lab confirmed that his device had been infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Jose Marinero</strong><br />
An official with the activism group Fundación DTJ in El Salvador whose phone was found by Citizen Lab to have been infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Xenia Hernandez</strong><br />
Another official with the activism group Fundación DTJ in El Salvador whose phone was found by Citizen Lab to have been infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Oscar Luna</strong><br />
An activist with the digital rights group Revista Digital Disruptiva. Citizen Lab found that their phone had been infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Mariana Belloso</strong><br />
An independent journalist whose phone was found by Citizen Lab to have been infected by the Pegasus spyware.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Carmen Tatiana Marroquín</strong><br />
An economist and columnist whose phone was found by Citizen Lab to have been infected by the Pegasus spyware.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">FINLAND</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Finnish diplomats</strong><br />
An unknown number of Finnish diplomats stationed abroad were found to have been infected, the Finnish Foreign Ministry confirmed. Their identity was not disclosed, nor was the suspected operator.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">FRANCE</strong></mark></p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Bruno Delport</strong><br />
The phone of the director of Parisian radio station TSF Jazz was found by Citizen Lab to have been infected in 2019, just as he was applying for the presidency of Radio France.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Lénaïg Bredoux</strong><br />
The investigative journalist and general editor of Mediapart was confirmed to have been infected by Pegasus. The confirmation was made by France’s computer security agency following Project Pegasus. Bredoux was involved in a story about the head of Morocco’s intelligence agency, a known NSO client.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Edwy Plenel</strong><br />
The investigative journalist with Mediapart was confirmed to have been infected by Pegasus. The confirmation was made by France’s computer security agency following Project Pegasus.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Unnamed France 24 journalist</strong><br />
A senior journalist with France 24 was confirmed to have been infected by Pegasus in May 2019, September 2020 and January 2021. That was confirmed by France’s computer security agency after Project Pegasus.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Claude Mangin</strong><br />
French national whose husband, Naama Asfari, is jailed in Morocco for advocating for Western Saharan independence. As part of Project Pegasus, it was found that <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.washingtonpost.com/technology/2021/07/19/apple-iphone-nso/">at least two of her phones were infected</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Arnaud Montebourg</strong><br />
A former minister in the government of Manuel Valls, Montebourg was targeted in 2019, most likely by Morocco, an analysis by Amnesty found. Montebourg has given testimony to ANSSI and its investigation into NSO in France.<br />
<strong class="dm">Suspected operator:</strong> Morocco</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">HUNGARY</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Dániel Németh</strong><br />
A Hungarian photojournalist involved in covering President Viktor Orbán and the country’s elites, two of his phones were infected in 2021. Direkt36, working with Citizen Lab and Amnesty’s Security Lab, confirmed the infections.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Zoltán Páva</strong><br />
The former Hungarian politician, now the publisher of an opposition news website, was also infected by Pegasus in March and May 2021.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Adrien Beauduin</strong><br />
A gender studies student at Central European University in Hungary, Beauduin was confirmed to have had his phone infected after being arrested in a protest against Orbán’s policies.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Szabolcs Panyi</strong><br />
The journalist with Direkt36, which was a partner in the Pegasus Project, was infected a number of times in 2019. The confirmation was made by Amnesty as part of the global investigation.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">András Szabó</strong><br />
An investigative journalist with Direkt36, Szabó’s phone was infected a number of times in 2019. The confirmation was made by Amnesty as part of the global investigation.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Brigitta Csikász</strong><br />
A Hungarian journalist covering crime stories, Csikász’s phone was infected in 2019 – which <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2021-07-18/ty-article/.premium/nsos-pegasus-the-israeli-cyber-weapon-used-against-180-journalists/0000017f-dc8d-df62-a9ff-dcdfe86d0000">was confirmed by Direkt36 and Amnesty</a>.</p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">INDIA</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Jagdeep Singh Randhawa</strong><br />
Human rights lawyer and activist from Punjab <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://thewire.in/tech/punjab-pegasus-project-lawyers-police-brutality-uapa-surveillance">had his phone hacked in July and August 2019</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Mangalam Kesavan Venu</strong><br />
Founding editor of The Wire – a nonprofit Indian investigative journalism outlet that was part of the Project Pegasus investigation – was found to have been infected with the spyware.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Paranjoy Guha Thakurta</strong><br />
Investigative journalist who was looking into how the Modi government used Facebook to spread disinformation; Amnesty confirmed his phone had been infected by NSO’s spyware as part of the Project Pegasus investigation.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Prashant Kishor</strong><br />
Political pollster working with a number of opposition parties in India, his phone was infected in 2018, Amnesty confirmed, months before an election – in what critics say was an attempt by Modi’s party to use the spyware to collect political information.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Rona Wilson</strong><br />
An activist focused on minorities and prisoners’ rights, digital forensics firm Arsenal Consulting found that his phone had been infected in July 2017 and April 2018. His phone number appeared in the Project Pegasus leaks.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Syed Abdul Rahman Geelani</strong><br />
Geelani (also known as SAR Geelani), a Delhi University professor serving time in India for ties to an outlawed Maoist group and prisoners’ rights activist, was found by Amnesty to have been infected between 2017 and 2019.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Sushant Singh</strong><br />
A journalist who covered defense issues for The Indian Express, and was investigating a massive deal between India and France, was found by Amnesty to have <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/2021-07-22/ty-article/.premium/indian-journalists-on-target-list-for-pegasus-spyware-are-furious-at-israel/0000017f-e690-d97e-a37f-f7f529950000">been infected as part of Project Pegasus</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">S.N.M. Abdi</strong><br />
Journalist for India’s Outlook had his phone infected by Pegasus in April 2019, May 2019, July 2019, October 2019 and December 2019, Amnesty <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://thewire.in/media/pegasus-project-spyware-indian-journalists">found as part of Project Pegasus</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Bela Bhatia</strong><br />
An Indian human rights lawyer whose phone was found to have been infected in 2019, and is one of five victims <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.nytimes.com/2019/11/09/technology/nso-group-spyware-india.html">who are part of WhatsApp suit against NSO</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Siddharth Varadarajan</strong><br />
An Indian investigative journalist who is the former editor of The Hindu and founding editor of The Wire, a Pegasus Project partner. He had his phone targeted with NSO-made spyware in April 2018. Forbidden Stories and Amnesty International’s Security Lab’s forensic analysis revealed he was successfully infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Unnamed legal officer</strong><br />
The legal officer was also confirmed to have been hacked with spyware <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2021-08-02/ty-article/.premium/in-first-israeli-spyware-found-on-u-k-phone-the-target-a-british-rights-lawyer/0000017f-dbc2-d856-a37f-ffc2dafe0000">following the Project Pegasus investigation</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ankit Grewal</strong><br />
The lawyer and so-called anti-caste activist was found to have been targeted in 2019 – one of a large group of victims named by WhatsApp in its suit against NSO.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm"><a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/2021-07-22/ty-article/.premium/indian-journalists-on-target-list-for-pegasus-spyware-are-furious-at-israel/0000017f-e690-d97e-a37f-f7f529950000">Read our full story on Pegasus in India</a></strong></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">ISRAEL</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Shai Babad</strong><br />
A former director general of the Finance Ministry who was also a politician and also served in a senior position in Israel’s public broadcaster. Israeli business daily Calcalist said his phone had been infected with Pegasus by the Israel Police. All of the Israeli cases listed below <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/2022-02-07/ty-article/israel-police-used-nsos-pegasus-spyware-against-top-govt-officials-journalists-and-activists/0000017f-e7ff-da9b-a1ff-efff62400000">are based on Calcalist reporting</a> that has yet to be confirmed or reviewed by Haaretz or international bodies.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Avi Berger</strong><br />
The former director general of the Communications Ministry and a witness in the ongoing Case 4000 trial against former Prime Minister Benjamin Netanyahu. Calcalist reported that Berger&#8217;s phone had been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Aviram Elad</strong><br />
The former editor of Walla, which allegedly provided Netanyahu with better coverage in a quid pro quo involving its parent company, the telecom giant Bezeq, in Case 4000. Calcalist said his phone was infected by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Iris Elovitch</strong><br />
The wife of Bezeq owner Shaul Elovitch; both are defendants in Case 4000. Her phone was infected with Pegasus by the Israel Police, Calcalist reported.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<div class="q r gl gm gn go gp gq gr gs gt gu gv fp fq fr fs ft fu fv ah fj fk fl fm fn fo gw gx gy gz ha hb ac ae af ag">
<figure class="} m ev f pt py">
<div class="eg m pu">
<div class="qg xn m f qk"><img loading="lazy" decoding="async" class="hx bu ei hi f ql qm qn qo auw id aux auy" title="Iris Elovitch looking at her iPhone in court with husband Shaul Elovitch last year. , Credit: Reuben Castro" src="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=1279&amp;width=1920" sizes="(min-width: 80em) 602px,(min-width: 64em) 594px,(min-width: 48em) 564px,(min-width: 37.5em) 576px,calc(100vw - 24px)" srcset="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=1279&amp;width=1920 1920w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=960&amp;width=1440 1440w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=853&amp;width=1280 1280w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=685&amp;width=1028 1028w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=612&amp;width=918 918w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=484&amp;width=726 726w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=400&amp;width=600 600w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=283&amp;width=425 425w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=250&amp;width=375 375w" alt="Iris Elovitch looking at her iPhone in court with husband Shaul Elovitch last year. " width="2200" height="1466" data-test="articleBodyImage" /></div>
</div>
<div class="qq qr db dm ie dn wz dp dq qs qt dv dw"><span class="qp">Iris Elovitch looking at her iPhone in court with husband Shaul Elovitch last year. </span><span class="ao pt rj dp dq qs qt">Credit: Reuben Castro</span></div>
</figure>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Keren Terner-Eyal</strong><br />
A former director general of the transportation and finance ministries, Terner-Eyal assumed the latter position after Babad left the role. Calcalist said her phone was infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Shlomo Filber</strong><br />
A former director general of the Communications Ministry, who was appointed by Netanyahu in 2015 and now serves as a key state&#8217;s witness in the Bezeq quid pro quo case. Filber was the first Israeli whose name was published by Calcalist as having been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Miriam Feirberg</strong><br />
The mayor of Netanya, who was suspected of corruption and investigated by the police until her case was closed in 2019. Calcalist said her phone had been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Stella Handler</strong><br />
The former CEO of Bezeq, was said by Calcalist to have been infected with Pegasus by the Israel Police. Handler is part of Case 4000.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Yair Katz</strong><br />
The chairman of the workers union at Israel Aerospace Industries and son of former Likud lawmaker Haim Katz was said by Calcalist to have been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Rami Levy</strong><br />
A prominent Israeli businessman famous for his low-cost supermarket chain who also owns a small telecom firm. Calcalist reported that his phone was infected with Pegasus by the Israel Police. He was investigated by the police in the past.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Topaz Luk</strong><br />
A former adviser to Netanyahu who is considered close to his son, Yair Netanyahu, and served a number of roles in past campaigns. He is also credited with key aspects of the then-prime minister’s media strategy. Calcalist said Luk’s phone had been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Dudu Mizrahi</strong><br />
The CEO of Bezeq, who took over the telecom company after Handler. Calcalist said his device was infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Avner Netanyahu</strong><br />
The youngest son of former Prime Minister Benjamin Netanyahu. Calcalist reported that Avner Netanyahu’s phone had been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Emi Palmor</strong><br />
A jurist and former director general of the Justice Ministry who currently serves on Facebook’s Advisory Board. Calcalist reported that his phone had been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Yaakov Peretz</strong><br />
The mayor of Kiryat Ata, who was suspected of corruption in 2019 and investigated by the police until the case was closed in 2020. Calcalist reported that his phone had been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Moti Sasson</strong><br />
The six-term mayor of the Tel Aviv suburb of Holon was another mayor whose phone was infected with Pegasus by the Israel Police, according to Calcalist.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ilan Yeshua</strong><br />
The CEO of the news website Walla, which allegedly provided Netanyahu with better coverage in a quid pro quo involving its parent company Bezeq. Yeshua is also part of Case 4000 and was infected with Pegasus by the Israel Police. Calcalist reported.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Jonatan Urich</strong><br />
A former adviser to Benjamin Netanyahu and considered close to his son, Yair. He served a number of roles in various electoral campaigns and is credited with key aspects in Netanyahu’s media strategy. Urich, whose phone was hacked by Israeli police as part of an investigation, was also said by Calcalist to have been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Walla journalists</strong><br />
As part of Case 4000, a number of journalists with the news site were said by Calcalist to have been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Protest leaders</strong><br />
The leaders of three protest movements were said by Calcalist to have been infected with Pegasus by the Israel Police. The protest movements targeted were: Israelis with disabilities; Israelis of Ethiopian descent; and heads of the anti-Netanyahu protests. The first were fighting for better rights, the second demonstrated against police violence and the third sought to oust Netanyahu.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Extreme settlers</strong><br />
A number of extreme settlers were said by Calcalist to have been infected with Pegasus by the Israel Police ahead of the evacuations of illegal outposts.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><em class="un"><strong class="dm"><a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/2022-02-07/ty-article/.premium/israel-polices-spyware-scandal-politicians-demand-commission-of-inquiry/0000017f-e7d8-df5f-a17f-ffde9b610000">Read our full story on Pegasus in Israel</a></strong></em></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">JORDAN</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Hala Ahed Deeb</strong><br />
Jordanian human rights lawyer, unionizer and feminist activist was found by Front Line Defenders <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/middle-east-news/2022-01-17/ty-article/.premium/israeli-nso-spyware-found-on-phones-of-jordanian-bahraini-womens-rights-activists/0000017f-e17f-df7c-a5ff-e37f6bfe0000">to have been infected with Pegasus since March 2021</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ahmed al-Neimat</strong><br />
A rights activist focused on workers rights and combating corruption. He works with a reform group called Hirak and has been targeted in the past, facing arrest for “insulting the king” and even a travel ban. <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.frontlinedefenders.org/en/statement-report/report-jordanian-human-rights-defenders-and-journalists-hacked-pegasus-spyware">Front Line Defenders</a> and <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://citizenlab.ca/2022/04/peace-through-pegasus-jordanian-human-rights-defenders-and-journalists-hacked-with-pegasus-spyware/">Citizen Lab found</a> his phone was hacked at the end of January 2021, likely through the FORCEDENTRY exploit, <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2022-04-05/ty-article/.premium/especially-remarkable-jordanian-activists-hacked-with-israeli-pegasus-spyware/00000180-5bb9-dee0-afd6-7bfdf16f0000">making him the earliest victim of that particular method</a>. His phone was likely hacked using the exploit’s zero-click capabilities.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Suhair Jaradat</strong><br />
A rights activist and journalist focused on women’s rights in Jordan and the Arab world who serves on the executive committee of the International Federation for Journalists. She was hacked six times between February and December 2021, through the FORCEDENTRY exploit in iPhones. The last hack took place after Apple had patched the breach, informed potential victims across the world and sued NSO. Jaradat did not update her phone and was thus still exposed.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Malik Abu Orabi</strong><br />
A rights lawyer who works with prominent Jordanian unions and was previously arrested by the state for his efforts. He was hacked at least 21 times between August 2019 and July 2021.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Anonymous journalist</strong><br />
A female journalist was also hacked, Front Line Defenders and Citizen Lab found. She requested to remain anonymous.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2022-04-05/ty-article/.premium/especially-remarkable-jordanian-activists-hacked-with-israeli-pegasus-spyware/00000180-5bb9-dee0-afd6-7bfdf16f0000"><strong class="dm">Read our full story on Pegasus in Jordan</strong></a></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">KAZAKHSTAN</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Aizat Abilseit, Dimash Alzhanov and Tamina Ospanova</strong><br />
Three members of the opposition group Wake Up, Kazakhstan whose phones were found by Amnesty’s Security Lab to have been infected by Pegasus in June 2021. Apple also warned them about the hack, which it attributed to a “state-sponsored attacker.”</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Darkhan Sharipov</strong><br />
The Kazakh activist’s phone was also found by Amnesty to have been infected by Pegasus in June 2021.<br />
<strong class="dm">Suspected operator:</strong> Kazakhstan</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm"><a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2022-01-09/ty-article/israeli-nso-spyware-found-on-kazakhstan-activists-phones/0000017f-e48a-d568-ad7f-f7eb86f30000">Read our full story on Pegasus in Kazakhstan</a></strong></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">LEBANON</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Lama Fakih</strong><br />
Human Rights Watch’s crisis and conflict director also heads the group’s Beirut office. She was targeted with Pegasus spyware at least five times between April and August 2021, HRW and Amnesty International’s Security Lab found.<br />
<strong class="dm">Suspected operator:</strong> Unknown</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm"><a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2022-01-26/ty-article/human-rights-watch-official-in-beirut-reportedly-targeted-by-israeli-nso-spyware/0000017f-db87-db5a-a57f-dbef14a50000">Read our full story</a></strong></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">MOROCCO</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Hicham Mansouri</strong><br />
Freelance investigative journalist and co-founder of the Moroccan Association of Investigative Journalists had his iPhone infected with Pegasus more than 20 times between February and April 2021, the Project Pegasus investigation revealed. Mansouri fled Morocco in 2016 and is now based in Paris.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Mahjoub Mleiha</strong><br />
Human rights activist from Western Sahara who is active in the Collective of Sahrawi Human Rights Defenders, now lives in Belgium, where he is also a citizen. Amnesty found that his phone had been infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Joseph Breham</strong><br />
A French lawyer who is involved in a lawsuit against Saudi Crown Prince Mohammed over claims of torture and inhumane treatment in Yemen. Amnesty confirmed that his phone had been infected with Pegasus using the same type of messages <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/middle-east-news/2018-04-10/ty-article/rights-group-files-lawsuit-against-saudi-prince-over-yemen/0000017f-dc26-df62-a9ff-dcf715ef0000">other alleged victims in Morocco also received</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Oubi Buchraya Bachir</strong><br />
Sahrawi diplomat who has served as its representative in a number of African countries. Amnesty confirmed as part of Project Pegasus that his phone was infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Maati Monjib</strong><br />
Founder of the Moroccan Association for Investigative Journalism and the NGO Freedom Now (dedicated to protecting the rights of journalists and writers), Amnesty found that <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.amnesty.org/en/latest/research/2019/10/morocco-human-rights-defenders-targeted-with-nso-groups-spyware/">his phone had been infected in 2019</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<div class="q r gl gm gn go gp gq gr gs gt gu gv fp fq fr fs ft fu fv ah fj fk fl fm fn fo gw gx gy gz ha hb ac ae af ag">
<figure class="} m ev f pt py">
<div class="eg m pu">
<p><button class="ei pv pw px py kh ew mj et eg pz qa qb bk qc qd" type="button"><span class="ea eb ec ed ee ef eg eh ei ej ek cz">Open gallery view</span></button></p>
<div class="qg xo m f qk"><img loading="lazy" decoding="async" class="hx bu ei hi f ql qm qn qo auw id aux auy" title="Shawan Jabarin, director of the al-Haq human rights group. One of the Palestinian NGO's workers' phones was infected by Pegasus., Credit: Majdi Mohammed/AP" src="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=1280&amp;width=1920" sizes="(min-width: 80em) 602px,(min-width: 64em) 594px,(min-width: 48em) 564px,(min-width: 37.5em) 576px,calc(100vw - 24px)" srcset="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=1280&amp;width=1920 1920w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=960&amp;width=1440 1440w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=853&amp;width=1280 1280w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=685&amp;width=1028 1028w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=612&amp;width=918 918w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=484&amp;width=726 726w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=400&amp;width=600 600w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=283&amp;width=425 425w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=250&amp;width=375 375w" alt="Shawan Jabarin, director of the al-Haq human rights group. One of the Palestinian NGO's workers' phones was infected by Pegasus." width="2448" height="1632" data-test="articleBodyImage" /></div>
</div>
<div class="qq qr db dm ie dn wz dp dq qs qt dv dw"><span class="qp">Shawan Jabarin, director of the al-Haq human rights group. One of the Palestinian NGO&#8217;s workers&#8217; phones was infected by Pegasus.</span><span class="ao pt rj dp dq qs qt">Credit: Majdi Mohammed/AP</span></div>
</figure>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Omar Radi</strong><br />
An independent, award-winning Moroccan journalist whose phone was <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/2020-06-22/ty-article/.premium/israels-nso-helped-moroccan-govt-spy-on-journalist-amnesty-claims/0000017f-f4fb-d5bd-a17f-f6fb56ad0000">found by Amnesty to have been infected in 2019</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Aboubakr Jamaï</strong><br />
Jamaï is a journalist who has long inspired the ire of Morocco’s royal family. Citizen Lab together with <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.accessnow.org/nso-whatsapp-hacking-victims-stories/">Access Now found</a> his phone had been infected with Pegasus after materials on it were leaked online in an attempt to tarnish Jamaï and his associates.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Fouad Abdelmoumni</strong><br />
A Moroccan human rights and democracy activist who works with Human Rights Watch and Transparency International Morocco, Abdelmoumni’s phone was found to have been infected, most likely by the Moroccan intelligence services. Citizen Lab investigated the hacking after being commissioned by WhatsApp.<br />
<strong class="dm">Suspected operator:</strong> Morocco</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">PALESTINIAN TERRITORIES (WEST BANK)</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ghassan Halaika</strong><br />
Human rights activist working for Al-Haq, a Palestinian NGO blacklisted by Israel, whose phone was infected in July 2020. The confirmation was made by human rights organization Front Line Defenders.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ubai Aboudi</strong><br />
The phone of the director of the Bisan Center for Research and Development, a Palestinian NGO blacklisted by Israel, was infected in 2020 and confirmed by Front Line Defenders.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Salah Hammouri</strong><br />
Lawyer and researcher with the Addameer Prisoner Support and Human Rights Association, a Palestinian NGO blacklisted by Israel, whose phone was infected in 2020, according to Front Line Defenders.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Three unnamed activists</strong><br />
Phones of three activists working with Palestinian NGOs blacklisted by Israel were infected in 2020, and confirmed by Front Line Defenders.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Suspected operator in all six cases:</strong> Israel</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<div class="q r gl gm gn go gp gq gr gs gt gu gv fp fq fr fs ft fu fv ah fj fk fl fm fn fo gw gx gy gz ha hb ac ae af ag">
<figure class="} m ev f pt py">
<div class="eg m pu">
<p><button class="ei pv pw px py kh ew mj et eg pz qa qb bk qc qd" type="button"><span class="ea eb ec ed ee ef eg eh ei ej ek cz">Open gallery view</span></button></p>
<div class="qg xp m f qk"><img loading="lazy" decoding="async" class="hx bu ei hi f ql qm qn qo auw id aux auy" title="Polish prosecutor Ewa Wrzosek holding her phone outside her Warsaw office last month., Credit: Czarek Sokolowski/AP" src="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=1319&amp;width=1920" sizes="(min-width: 80em) 602px,(min-width: 64em) 594px,(min-width: 48em) 564px,(min-width: 37.5em) 576px,calc(100vw - 24px)" srcset="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=1319&amp;width=1920 1920w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=989&amp;width=1440 1440w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=880&amp;width=1280 1280w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=706&amp;width=1028 1028w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=631&amp;width=918 918w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=499&amp;width=726 726w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=412&amp;width=600 600w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=292&amp;width=425 425w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=258&amp;width=375 375w" alt="Polish prosecutor Ewa Wrzosek holding her phone outside her Warsaw office last month." width="2362" height="1623" data-test="articleBodyImage" /></div>
</div>
<div class="qq qr db dm ie dn wz dp dq qs qt dv dw"><span class="qp">Polish prosecutor Ewa Wrzosek holding her phone outside her Warsaw office last month.</span><span class="ao pt rj dp dq qs qt">Credit: Czarek Sokolowski/AP</span></div>
</figure>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm"><a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/2021-11-08/ty-article/.highlight/nso-spyware-used-against-palestinian-activists-in-blacklisted-ngos-report-says/0000017f-ded8-d3a5-af7f-fefe14b60000">Read our full story on Pegasus in the West Bank</a></strong></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">POLAND</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Krzysztof Brejza</strong><br />
Polish senator and member of the opposition party Civic Platform whose phone was confirmed to have been infected over 30 times in 2019. The confirmation was made by Citizen Lab and reported by AP.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Roman Giertych</strong><br />
A lawyer who has represented leaders of Brejza’s Civic Platform party in sensitive cases, and was confirmed to have been infected over 10 times in 2019. The confirmation was made by Citizen Lab.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ewa Wrzosek</strong><br />
The phone of the prosecutor and critic of the ruling Law and Justice party’s attempt to undermine Poland’s judiciary was confirmed to have been infected a number of times in 2019. The confirmation was made by Citizen Lab after she received a notification from Apple warning that her phone had been hacked.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Michal Kolodziejczak</strong><br />
The agrarian social movement leader was hacked several times in May 2019 ahead of a fall election in which Kolodziejczak was hoping to have his group, AGROunia, become a formal political party. Courts have so far blocked his efforts to form a political party.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Tomasz Szwejgiert</strong><br />
An author and collaborator with Polish secret services who found himself at odds with powerful figures was hacked while co-authoring a book about the head of Poland’s secret services, Mariusz Kaminski. He was hacked 21 times with Pegasus from late March to June 2019.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Suspected operator in all cases:</strong> Poland</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm"><a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2022-01-03/ty-article/.highlight/poland-reportedly-purchased-pegasus-spyware-after-netanyahu-meeting/0000017f-f7c6-d47e-a37f-fffe908b0000">Read our full story on Pegasus in Poland</a></strong></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">RWANDA</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Carine Kanimba</strong><br />
A U.S.-Belgian citizen, Kanimba is the daughter of Rwandan activist Paul Rusesabagina, who was arrested and forcibly returned to the country. Her father’s plight inspired the 2004 movie “Hotel Rwanda” and she was confirmed by Amnesty to have been hacked at the start of 2021.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<div class="q r gl gm gn go gp gq gr gs gt gu gv fp fq fr fs ft fu fv ah fj fk fl fm fn fo gw gx gy gz ha hb ac ae af ag">
<figure class="} m ev f pt py">
<div class="eg m pu">
<p><button class="ei pv pw px py kh ew mj et eg pz qa qb bk qc qd" type="button"><span class="ea eb ec ed ee ef eg eh ei ej ek cz">Open gallery view</span></button></p>
<div class="qg xq m f qk"><img loading="lazy" decoding="async" class="hx bu ei hi f ql qm qn qo auw id aux auy" title="Hatice Cengiz, fiancee of the murdered Saudi journalist Jamal Khashoggi, talking to the media last year., Credit: MURAD SEZER/REUTERS" src="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=1263&amp;width=1920" sizes="(min-width: 80em) 602px,(min-width: 64em) 594px,(min-width: 48em) 564px,(min-width: 37.5em) 576px,calc(100vw - 24px)" srcset="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=1263&amp;width=1920 1920w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=947&amp;width=1440 1440w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=842&amp;width=1280 1280w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=676&amp;width=1028 1028w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=604&amp;width=918 918w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=477&amp;width=726 726w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=395&amp;width=600 600w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=279&amp;width=425 425w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=247&amp;width=375 375w" alt="Hatice Cengiz, fiancee of the murdered Saudi journalist Jamal Khashoggi, talking to the media last year." width="2465" height="1621" data-test="articleBodyImage" /></div>
</div>
<div class="qq qr db dm ie dn wz dp dq qs qt dv dw"><span class="qp">Hatice Cengiz, fiancee of the murdered Saudi journalist Jamal Khashoggi, talking to the media last year.</span><span class="ao pt rj dp dq qs qt">Credit: MURAD SEZER/REUTERS</span></div>
</figure>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Peter Verlinden</strong><br />
The Belgian journalist stationed in Africa has worked for the national Flemish broadcaster VTR. Belgian intelligence services and Amnesty found that his phone had been infected in September, October and November 2020.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Marie Bamutese</strong><br />
The phone of Peter Verlinden’s wife was also found to have been hacked. This was confirmed <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.theguardian.com/news/2021/jul/19/hotel-rwanda-activist-daughter-pegasus-surveillance">by Belgium&#8217;s General Intelligence and Security Service</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Placide Kayumba</strong><br />
A Rwandan activist and member of the opposition in exile, Kayumba was found to have been targeted as part of an investigation by Citizen Lab commissioned by WhatsApp into hacking of its clients.<br />
<strong class="dm">Suspected operator:</strong> Rwanda</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">SAUDI ARABIA</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Hatice Cengiz</strong><br />
The Turkish national was the fiancée of the late Washington Post columnist Jamal Khashoggi, and her phone was infected a few days after her partner was murdered at the Saudi Embassy in Istanbul in October 2018 – as revealed by Amnesty as part of Pegasus Project.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Omar Abdulaziz</strong><br />
A close friend of Khashoggi’s, Abdulaziz’s phone was infected with Pegasus in the months before the Saudi dissident’s murder in 2018, CItizen Lab found. Based in Canada, <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.theguardian.com/world/2021/jul/18/nso-spyware-used-to-target-family-of-jamal-khashoggi-leaked-data-shows-saudis-pegasus">he has filed a lawsuit against NSO in Israel</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Wadah Khanfar</strong><br />
Al Jazeera’s former director general and another close friend of Khashoggi, Amnesty found that his phone was infected as recently as July 2021.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ragip Soylu</strong><br />
A Turkish journalist who heads Middle East Eye’s bureau in Ankara. <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.middleeasteye.net/news/pegasus-israel-spyware-target-turkey-middle-east-eye-journalist">Amnesty confirmed that his phone was infected</a> several times between February and July 2021.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ben Hubbard</strong><br />
The phone of the New York Times journalist <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://citizenlab.ca/2021/10/breaking-news-new-york-times-journalist-ben-hubbard-pegasus/">was confirmed by Citizen Lab</a> to have been infected between June 2018 to June 2021 while he was based in Lebanon, reporting on Saudi Arabia and writing a book about Crown Prince Mohammed.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Suspected operator in all cases:</strong> Saudi Arabia</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm"><a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2021-07-18/ty-article/.premium/khashoggis-fiancee-son-targeted-by-nso-tech-investigation-reveals/0000017f-dc92-db5a-a57f-dcfa206c0000">Read our full story on Pegasus in Saudi Arabia</a></strong></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">TOGO</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<div class="q r gl gm gn go gp gq gr gs gt gu gv fp fq fr fs ft fu fv ah fj fk fl fm fn fo gw gx gy gz ha hb ac ae af ag">
<figure class="} m ev f pt py">
<div class="eg m pu">
<p><button class="ei pv pw px py kh ew mj et eg pz qa qb bk qc qd" type="button"><span class="ea eb ec ed ee ef eg eh ei ej ek cz">Open gallery view</span></button></p>
<div class="qg wy m f qk"><img loading="lazy" decoding="async" class="hx bu ei hi f ql qm qn qo auw id aux auy" title="Egyptian dissident Ayman Nour speaking in Istanbul in 2019. , Credit: Burhan Ozbilici/AP" src="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=1280&amp;width=1920" sizes="(min-width: 80em) 602px,(min-width: 64em) 594px,(min-width: 48em) 564px,(min-width: 37.5em) 576px,calc(100vw - 24px)" srcset="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=1280&amp;width=1920 1920w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=960&amp;width=1440 1440w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=854&amp;width=1280 1280w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=685&amp;width=1028 1028w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=612&amp;width=918 918w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=484&amp;width=726 726w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=400&amp;width=600 600w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=283&amp;width=425 425w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=250&amp;width=375 375w" alt="Egyptian dissident Ayman Nour speaking in Istanbul in 2019. " width="2449" height="1633" data-test="articleBodyImage" /></div>
</div>
<div class="qq qr db dm ie dn wz dp dq qs qt dv dw"><span class="qp">Egyptian dissident Ayman Nour speaking in Istanbul in 2019. </span><span class="ao pt rj dp dq qs qt">Credit: Burhan Ozbilici/AP</span></div>
</figure>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Father Pierre Marie-Chanel Affognon</strong><br />
A Catholic priest from Togo who is an anti-corruption activist fighting for constitutional and electoral reform in the West African country. An investigation by Citizen Lab commissioned by WhatsApp into the hacking of its clients found his phone was infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">UNITED ARAB EMIRATES</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Alaa al-Siddiq</strong><br />
Executive director of ALQST, a nonprofit advocating for human rights in the UAE and the Gulf region. Her phone was found to have been infected a number of times from 2015, when she was living in Qatar (where she had moved to flee persecution), and up until 2019, when she had relocated to Britain. She died in a car crash in 2021. Citizen Lab made the hacking confirmation.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Abdulaziz Alkhamis</strong><br />
The former editor of Al Arab, Alkhamis was hacked as part of a showcase NSO organized for the UAE. According to a lawsuit filed on behalf of Alkhamis, the UAE, which were already NSO clients from 2014, were offered an expensive upgrade of the Pegasus spyware. To show the new product’s value, <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/2018-08-31/ty-article/uae-used-israeli-spyware-to-track-qatari-royals/0000017f-f2b9-d5bd-a17f-f6bb091f0000">NSO emailed two audio recordings of Alkhamis to Emerati officials, the New York Times reported in 2018</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ayman Nour</strong><br />
Egyptian dissident, 2005 Egyptian presidential candidate and opposition activist. Citizen Lab found his phone had been <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/2021-12-17/ty-article/two-israeli-spyware-firms-hacked-dissidents-phones-in-egypt-india/0000017f-ed9b-d639-af7f-eddf0b8f0000">infected by Pegasus, as well as an additional spyware</a> called Predator – which was developed by NSO competitor Cytrox.<br />
<strong class="dm">Suspected operator:</strong> UAE</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Rania Dridi</strong><br />
A journalist with Alaraby TV, she had her phone infected at least six times during 2020, as confirmed by Citizen Lab.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Tamer Almisshal</strong><br />
Investigative journalist for Al Jazeera in Arabic who has covered the Gulf region extensively, including the Khashoggi killing. His phone was infected in 2020, Citizen Lab confirmed.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ebtisam al-Saegh</strong><br />
Bahraini human rights activist focused on women’s rights. Front Line Defenders found that <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/middle-east-news/2022-01-17/ty-article/.premium/israeli-nso-spyware-found-on-phones-of-jordanian-bahraini-womens-rights-activists/0000017f-e17f-df7c-a5ff-e37f6bfe0000">her phone was hacked at least eight times</a> between August and November 2019. Saegh had been arrested in Bahrain for her activism in the past and has faced persecution for her work.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">34 Al Jazeera staffers</strong><br />
The phones of 34 other journalists, producers, anchors and executives at Al Jazeera were confirmed to have been infected in 2020, Citizen Lab reported.<br />
<strong class="dm">Suspected operator:</strong> Saudi Arabia, Bahrain and/or the UAE</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<div class="q r gl xa xb go gp xc xd xe xf xg xh fp fq xi fs ft xj xk ah fj fk fl fm fn fo xl gw gx gy gz ha hb ac ae af ag">
<figure class="} m ev f pt py">
<div class="eg m pu">
<p><button class="ei pv pw px py kh ew mj et eg pz qa qb bk qc qd" type="button"><span class="ea eb ec ed ee ef eg eh ei ej ek cz">Open gallery view</span></button></p>
<div class="qg xo m f qk"><img loading="lazy" decoding="async" class="hx bu ei hi f ql qm qn qo auw id aux auy" title="Mexican President Andres Manuel Lopez Obrador speaking last July about being targeted by the previous administration of President Enrique Pena Nieto after it purchased Pegasus spyware from NSO., Credit: MEXICO'S PRESIDENCY / REUTERS" src="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b58e90000/c2/d2/b22012fdb5078280ec8f54f2ac74/1533837127.jpg?precrop=2448,1632,x0,y0&amp;height=1280&amp;width=1920" sizes="(min-width: 80em) 1232px,(min-width: 64em) 978px,(min-width: 48em) 660px,(min-width: 37.5em) 576px,calc(100vw - 24px)" srcset="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b58e90000/c2/d2/b22012fdb5078280ec8f54f2ac74/1533837127.jpg?precrop=2448,1632,x0,y0&amp;height=1280&amp;width=1920 1920w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b58e90000/c2/d2/b22012fdb5078280ec8f54f2ac74/1533837127.jpg?precrop=2448,1632,x0,y0&amp;height=960&amp;width=1440 1440w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b58e90000/c2/d2/b22012fdb5078280ec8f54f2ac74/1533837127.jpg?precrop=2448,1632,x0,y0&amp;height=853&amp;width=1280 1280w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b58e90000/c2/d2/b22012fdb5078280ec8f54f2ac74/1533837127.jpg?precrop=2448,1632,x0,y0&amp;height=685&amp;width=1028 1028w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b58e90000/c2/d2/b22012fdb5078280ec8f54f2ac74/1533837127.jpg?precrop=2448,1632,x0,y0&amp;height=512&amp;width=768 768w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b58e90000/c2/d2/b22012fdb5078280ec8f54f2ac74/1533837127.jpg?precrop=2448,1632,x0,y0&amp;height=400&amp;width=600 600w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b58e90000/c2/d2/b22012fdb5078280ec8f54f2ac74/1533837127.jpg?precrop=2448,1632,x0,y0&amp;height=283&amp;width=425 425w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b58e90000/c2/d2/b22012fdb5078280ec8f54f2ac74/1533837127.jpg?precrop=2448,1632,x0,y0&amp;height=250&amp;width=375 375w" alt="Mexican President Andres Manuel Lopez Obrador speaking last July about allegedly being targeted by the previous administration of President Enrique Pena Nieto after it purchased Pegasus spyware from NSO." width="2448" height="1632" data-test="articleBodyImage" /></div>
</div>
<div class="qq qr db dm ie dn wz dp dq qs qt dv dw"><span class="qp">Mexican President Andres Manuel Lopez Obrador speaking last July about being targeted by the previous administration of President Enrique Pena Nieto after it purchased Pegasus spyware from NSO.</span><span class="ao pt rj dp dq qs qt">Credit: MEXICO&#8217;S PRESIDENCY / REUTERS</span></div>
</figure>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">UNITED KINGDOM</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">David Haigh</strong><br />
The <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2021-08-02/ty-article/.premium/in-first-israeli-spyware-found-on-u-k-phone-the-target-a-british-rights-lawyer/0000017f-dbc2-d856-a37f-ffc2dafe0000">human rights lawyer and LGBTQ activist</a> who represented Princess Latifa of Dubai was the first British target confirmed to have been infected by Pegasus. He supplied Amnesty with his phone in the wake of Project Pegasus.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Anas Altikriti</strong><br />
Muslim anti-war activist based in the U.K. whose phone was confirmed to have been infected with Pegasus. His interfaith thinktank, the Cordoba Foundation, has been accused of maintaining ties with the Muslim Brotherhood and Hamas. <strong class="dm">Suspected operator:</strong> UAE</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">UNITED STATES</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">11 unnamed U.S. officials</strong><br />
Eleven officials with the U.S. State Department in Uganda <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2021-12-05/ty-article/.premium/targeting-u-s-officials-could-mean-death-sentence-for-israeli-nso/0000017f-f7da-d2d5-a9ff-f7de3c070000">were confirmed to have been hacked with Pegasus</a>. The revelation led to a U.S. Department of Commerce decision last November to blacklist NSO.<br />
<strong class="dm">Suspected operator:</strong> Uganda or Rwanda</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">LIST OF THOSE WHO HAVE ALSO BEEN TARGETED BY PEGASUS:</strong></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Ahmed Mansoor (Emirati human rights activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Rafael Cabrera (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Dr. Simon Barquera (Mexican researcher)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Alejandro Calvillo (Mexican whistleblower)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Luis Encarnación (Mexican activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Karla Micheel Salas (Mexican human rights lawyer)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">David Peña (Mexican human rights lawyer)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Carmen Aristegui (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Emilio Aristegui (son of Carmen Aristegui)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Sebastián Barragán (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Carlos Loret de Mola (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Salvador Camarena (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Daniel Lizárraga (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Mario E. Patrón (Mexican human rights activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Stephanie Brewer (U.S. human rights activist working in Mexico)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Santiago Aguirre (Mexican human rights activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Juan Pardinas (Mexican anti-corruption activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Juan Pardinas’s wife</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Alexandra Zapata (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Azam Ahmed (Former New York Times bureau chief for Mexico)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<div class="q r gl gm gn go gp gq gr gs gt gu gv fp fq fr fs ft fu fv ah fj fk fl fm fn fo gw gx gy gz ha hb ac ae af ag">
<figure class="} m ev f pt py">
<div class="eg m pu">
<p><button class="ei pv pw px py kh ew mj et eg pz qa qb bk qc qd" type="button"><span class="ea eb ec ed ee ef eg eh ei ej ek cz">Open gallery view</span></button></p>
<div class="qg xo m f qk"><img loading="lazy" decoding="async" class="hx bu ei hi f ql qm qn qo auw id aux auy" title="Family members and supporters of 43 missing college students from Guerrero state. Mexico, carrying pictures of the disappeared, during an event in April 2016., Credit: AP Photo/Rebecca Blackwell" src="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=1280&amp;width=1920" sizes="(min-width: 80em) 602px,(min-width: 64em) 594px,(min-width: 48em) 564px,(min-width: 37.5em) 576px,calc(100vw - 24px)" srcset="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=1280&amp;width=1920 1920w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=960&amp;width=1440 1440w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=853&amp;width=1280 1280w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=685&amp;width=1028 1028w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=612&amp;width=918 918w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=484&amp;width=726 726w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=400&amp;width=600 600w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=283&amp;width=425 425w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=250&amp;width=375 375w" alt="Family members and supporters of 43 missing college students from Guerrero state. Mexico, carrying pictures of the disappeared, during an event in April 2016." width="2448" height="1632" data-test="articleBodyImage" /></div>
</div>
<div class="qq qr db dm ie dn wz dp dq qs qt dv dw"><span class="qp">Family members and supporters of 43 missing college students from Guerrero state. Mexico, carrying pictures of the disappeared, during an event in April 2016.</span><span class="ao pt rj dp dq qs qt">Credit: AP Photo/Rebecca Blackwell</span></div>
</figure>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Ricardo Anaya Cortés (Mexican lawyer/politician)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Sen. Roberto Gil Zuarth (Mexican senator)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Fernando Rodríguez Doval (Mexican politician)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Claudio X. González (Mexican anti-corruption activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">GIEI investigation (Mexican probe into mass disappearances)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Ghanem Almasarir (Saudi dissident)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Yahya Assiri (Saudi activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Unnamed Amnesty International employee</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Abdessadak El Bouchattaoui (Moroccan journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Griselda Triana (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Nihalsing Rathod (Indian human rights lawyer)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Priyanka Gandhi Vadra (General secretary, Indian National Congress)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Santosh Bhartiya (Indian journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Shubhranshu Choudhary (Indian peace activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Unnamed U.K. lawyer</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Shalini Gera (Indian lawyer)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Degree Prasad Chauhan (Indian human rights activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Anand Teltumbde (Indian activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Ashish Gupta (Indian activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Seema Azad (Indian activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Vivek Sundara (Indian activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Saroj Giri (Indian activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Sidhant Sibal (Indian journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Rajeev Sharma (Indian journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Rupali Jadhav (Indian activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Jagdish Meshram (Indian lawyer)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Alok Shukla (Indian activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Ajmal Khan (Indian research scholar)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Balla Ravindranath (Indian lawyer/activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Mandeep Singh (Indian activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">P. Pavana (Indian, daughter of activist P. Varavara Rao)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Arunank (Indian law graduate)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Smita Sharma (Indian journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Hanan Elatr (wife of Jamal Khashoggi)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Jorge Carrasco (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Álvaro Delgado Gómez (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Princess Latifa al Maktoum (daughter of the prime minister of the UAE)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Princess Haya bint Hussein (estranged wife of the prime minister of the UAE)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Juan Mayer (aerial photographer who recorded Princess Latifa’s skydives)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Lynda Bouchikhi (Princess Latifa’s officially sanctioned chaperone)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Sioned Taylor (friend of Princess Latifa)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Martin Smith (head of U.K. private security firm hired by Princess Haya)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Shimon Cohen (British PR expert)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Ross Smith (head of investigations at U.K. private security firm hired by Princess Haya)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">John Gosden (British horse trainer, friend of Princess Haya)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Aisha bint Hussein (half sister of Princess Haya)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Stuart Page (British private investigator)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">K.K. Sharma (former Indian Border Security Force chief)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Jagdish Maithani (Indian Border Security Force officer)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Jitendra Kumar Ojha (former Indian espionage officer)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Jitendra Kumar Ojha’s wife</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Col. Mukul Dev (former Indian army officer)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Rupesh Kumar Singh (Indian journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Rupesh Kumar Singh’s wife</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Devirupa Mitra (Indian diplomatic correspondent)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Vijaita Singh (Indian journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Bishop Benoit Alowonou (Togolese clergyman)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Elliott Ohin (Togolese opposition figure)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Raymond Houndjo (Togolese opposition figure)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Roger Torrent (Catalan parliamentary speaker)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">A Complete (Updating) List of Individuals Targeted With Pegasus Spyware Plus 1,400 other potential targets who WhatsApp believes were hacked.</p>
<p>&nbsp;</p>
<p><a href="https://www.haaretz.com/israel-news/tech-news/2022-04-05/ty-article-magazine/nso-pegasus-spyware-file-complete-list-of-individuals-targeted/0000017f-ed7a-d3be-ad7f-ff7b5a600000" target="_blank" rel="noopener">source</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NSA sets 2035 deadline for adoption of post-quantum cryptography across national security systems</title>
		<link>https://goodshepherdmedia.net/nsa-sets-2035-deadline-for-adoption-of-post-quantum-cryptography-across-national-security-systems/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Sun, 02 Jun 2024 07:44:09 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Disaster]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Laws]]></category>
		<category><![CDATA[Legal News The Motivation]]></category>
		<category><![CDATA[Man Made]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Science & Engineering]]></category>
		<category><![CDATA[Software Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Tragic]]></category>
		<category><![CDATA[🌍World Stage🌍]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[🤖 AI Artificial Intelligence]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[NSA deadline]]></category>
		<category><![CDATA[NSA deadline for adoption of post-quantum cryptography]]></category>
		<category><![CDATA[post-quantum cryptograph]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=18044</guid>

					<description><![CDATA[NSA sets 2035 deadline for adoption of post-quantum cryptography across national security systems The intelligence agency expects traditional networking equipment to comply with the new standards by 2030. (Scoop News Group photo) The National Security Agency in new guidance Wednesday said it expects the owners and operators of national security systems to start using post-quantum [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="single-article__title">NSA sets 2035 deadline for adoption of post-quantum cryptography across national security systems</h1>
<h2 class="single-article__excerpt">The intelligence agency expects traditional networking equipment to comply with the new standards by 2030.</h2>
<header class="single-article__header ">
<div class="single-article__cover-wrap">
<figure class="single-article__cover"><img loading="lazy" decoding="async" class="single-article__cover-image wp-post-image" src="https://fedscoop.com/wp-content/uploads/sites/5/2019/03/nsa-rsa-2019.jpg?w=1200" sizes="(max-width: 1200px) 100vw, 1200px" srcset="https://fedscoop.com/wp-content/uploads/sites/5/2019/03/nsa-rsa-2019.jpg 1920w, https://fedscoop.com/wp-content/uploads/sites/5/2019/03/nsa-rsa-2019.jpg?resize=300,160 300w, https://fedscoop.com/wp-content/uploads/sites/5/2019/03/nsa-rsa-2019.jpg?resize=768,410 768w, https://fedscoop.com/wp-content/uploads/sites/5/2019/03/nsa-rsa-2019.jpg?resize=1024,546 1024w, https://fedscoop.com/wp-content/uploads/sites/5/2019/03/nsa-rsa-2019.jpg?resize=1536,819 1536w, https://fedscoop.com/wp-content/uploads/sites/5/2019/03/nsa-rsa-2019.jpg?resize=600,320 600w, https://fedscoop.com/wp-content/uploads/sites/5/2019/03/nsa-rsa-2019.jpg?resize=1200,640 1200w, https://fedscoop.com/wp-content/uploads/sites/5/2019/03/nsa-rsa-2019.jpg?resize=1500,800 1500w" alt="NSA, National Security Agency, RSA 2019" width="1200" height="640" /><figcaption>(Scoop News Group photo)</figcaption></figure>
</div>
</header>
<div class="single-article__content">
<div class="single-article__content-inner has-drop-cap">
<p>The National Security Agency in new guidance Wednesday said it expects the owners and operators of national security systems to start using post-quantum algorithms by 2035.</p>
<p>In an <a href="https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/3148990/nsa-releases-future-quantum-resistant-qr-algorithm-requirements-for-national-se/">advisory note</a>, the intelligence agency recommended that vendors start preparing for the new technology requirements but acknowledged that some quantum-resistant algorithms have yet to be approved for use.</p>
<p>Prior to full adoption within the intelligence community and U.S. military, the new algorithmic standards will be approved by the National Institute of Standards and Technology and the National Information Assurance Partnership.</p>
<p>The memorandum includes <a href="https://media.defense.gov/2022/Sep/07/2003071747/-1/-1/0/CSA_CNSA_2.0_ALGORITHMS.PDF">Commercial National Security Algorithm Suite 2.0</a> — a new set of cryptographic standards from the agency — and comes amid rising concern about the potential for foreign adversaries to use advanced computing technology to break the public-key cryptography that for years has secured most federal systems.</p>
<div class="ad ad--inline_1 ">
<div class="ad__inner">
<div id="ap_inline_1" class="ad__embed" data-loadad="0" data-google-query-id="CJqh_pKGsIYDFSo9RAgdbt4AsQ">
<div id="google_ads_iframe_/18430785/sng_fedscoop/ap_inline_1_0__container__">Alongside the overall 2035 deadline, NSA said it expected the timeframe for the adoption of post-quantum algorithms to vary between technologies, and issued a range of additional milestones it expects the intelligence community and its vendors to hit.</div>
</div>
</div>
</div>
<p>According to the advisory, NSA expects that software and firmware signing for national security systems will exclusively use Commercial National Security Algorithm Suite 2.0 by 2030.</p>
<p>The agency expects also that traditional networking equipment such as virtual private networks and routers adopt the new standards by 2030, and that web browsers, servers and cloud services exclusively use the new algorithms by 2033.</p>
<p>NSA’s new guidance comes after the National Institute of Standards and Technology <a href="https://fedscoop.com/nist-chooses-4-quantum-resistant-algorithms/">in July chose four quantum-resistant cryptographic algorithms</a> it will standardize to protect sensitive data from quantum computers.</p>
<blockquote><p><em>At the time, <a href="https://fedscoop.com/tag/national-institute-of-standards-and-technology-nist/">NIST</a> selected the <a href="https://pq-crystals.org/kyber/index.shtml">CRYSTALS-Kyber</a> algorithm for general encryption of data exchanged across public networks and the <a href="https://pq-crystals.org/dilithium/index.shtml">CRYSTALS-Dilithium</a>, <a href="https://falcon-sign.info/">FALCON</a> and <a href="https://sphincs.org/">SPHINCS+</a> algorithms for digital signatures used to verify identities often during transactions.</em></p></blockquote>
<div class="ad ad--inline_1 ">
<div class="ad__inner">
<div id="ap_inline_2" class="ad__embed" data-loadad="0" data-google-query-id="CJuh_pKGsIYDFSo9RAgdbt4AsQ">
<div id="google_ads_iframe_/18430785/sng_fedscoop/ap_inline_2_0__container__">The standards agency continues to consider four alternative algorithms with different approaches for general encryption, should others prove vulnerable to quantum computers in the long run.</div>
</div>
</div>
</div>
<p>Commenting on the new guidance, NSA Director of Cybersecurity Rob Joyce said: “This transition to quantum-resistant technology in our most critical systems will require collaboration between government, National Security System owners and operators, and industry.”</p>
<p>He added: “Our hope is that sharing these requirements now will help efficiently operationalize these requirements when the time comes. We want people to take note of these requirements to plan and budget for the expected transition, but we don’t want to get ahead of the standards process.” <a href="https://fedscoop.com/nsa-sets-2035-deadline-for-adoption-of-post-quantum-cryptography-across-natsec-systems/" target="_blank" rel="noopener">source</a></p>
</div>
</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>US Navy Autoated Weaopons Systems Targets a Civilian 737</title>
		<link>https://goodshepherdmedia.net/us-navy-autoated-weaopons-systems-targets-a-civilian-737/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Thu, 23 Nov 2023 09:15:29 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Travel / Vacation]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[737]]></category>
		<category><![CDATA[CIWS]]></category>
		<category><![CDATA[Phalanx]]></category>
		<category><![CDATA[U.S. Navy]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=16469</guid>

					<description><![CDATA[A U.S. Navy Phalanx Gun Targeted a Civilian 737 This Week In a video that went viral yesterday, you can see a Mk 15 Phalanx Close-In Weapon System (CIWS) begin to target what appears to be a civilian 737. In an example of our collective dark sense of humor in the military, you can hear [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 id="81f8" class="pw-post-title ff fg fh be fi fj fk fl fm fn fo fp fq fr fs ft fu fv fw fx fy fz ga gb gc gd bj" data-testid="storyTitle" data-selectable-paragraph="">A U.S. Navy Phalanx Gun Targeted a Civilian 737 This Week</h1>
<p><iframe title="Killer US Air Defense System Almost Takes Down a Civilian Plane - Caught on Camera" width="640" height="360" src="https://www.youtube.com/embed/tWddG6KSHsA?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<div class="ab ca">
<div class="ch bg dy dz ea eb">
<p id="597e" class="pw-post-body-paragraph kt ku fh kv b kw kx ky kz la lb lc ld le lf lg lh li lj lk ll lm ln lo lp lq fa bj" data-selectable-paragraph="">In a video that went viral yesterday, you can see a Mk 15 Phalanx Close-In Weapon System (CIWS) begin to target what appears to be a civilian 737.</p>
<p id="2d54" class="pw-post-body-paragraph kt ku fh kv b kw kx ky kz la lb lc ld le lf lg lh li lj lk ll lm ln lo lp lq fa bj" data-selectable-paragraph="">In an example of our collective dark sense of humor in the military, you can hear a sailor scolding the automated Phalanx as if it were a naughty toddler about to touch a hot stove.</p>
</div>
</div>
<div class="ab ca">
<div class="ch bg dy dz ea eb">
<figure class="lr ls lt lu lv lw">
<div class="lx ly l gw">
<div class="abo ma l"><iframe class="ei n ej rb bg" title="ToastyNarwhals on Twitter: &quot;intrusive thoughts pic.twitter.com/8mZfOwXESD / Twitter&quot;" src="https://cdn.embedly.com/widgets/media.html?type=text%2Fhtml&amp;key=d04bfffea46d4aeda930ec88cc64b87c&amp;schema=twitter&amp;url=https%3A//twitter.com/NarwhalsToasty/status/1658864786090672132&amp;image=https%3A//i.embed.ly/1/image%3Furl%3Dhttps%253A%252F%252Fabs.twimg.com%252Ferrors%252Flogo46x38.png%26key%3D4fce0568f2ce49e8b54624ef71a8a5bd" width="680" height="753" frameborder="0" scrolling="no" allowfullscreen="allowfullscreen" data-mce-fragment="1"></iframe></div>
</div>
</figure>
</div>
</div>
<div class="ab ca">
<div class="ch bg dy dz ea eb">
<p id="4afc" class="pw-post-body-paragraph kt ku fh kv b kw kx ky kz la lb lc ld le lf lg lh li lj lk ll lm ln lo lp lq fa bj" data-selectable-paragraph="">It’s worth noting that this probably happens all the time. Ever flown into Reagan Washington National Airport (DCA)? Your plane was likely lit up like a Christmas tree.</p>
<p id="29da" class="pw-post-body-paragraph kt ku fh kv b kw kx ky kz la lb lc ld le lf lg lh li lj lk ll lm ln lo lp lq fa bj" data-selectable-paragraph="">The CIWS (often spoken as “sea-wiz”) in the video appears to be mounted on a U.S. Whidbey Island-class amphibious dock landing ship, although it could also be a Harpers Ferry-class.</p>
<p id="984b" class="pw-post-body-paragraph kt ku fh kv b kw kx ky kz la lb lc ld le lf lg lh li lj lk ll lm ln lo lp lq fa bj" data-selectable-paragraph="">According to the U.S. Navy, the CIWS is a fast-reaction, detect-through-engage, radar-guided, 20-millimeter gun weapon system. It’s used primarily as an inner layer of protection against anti-ship missiles (ASM), aircraft, and small boats that have penetrated other fleet defenses.</p>
<p id="f68b" class="pw-post-body-paragraph kt ku fh kv b kw kx ky kz la lb lc ld le lf lg lh li lj lk ll lm ln lo lp lq fa bj" data-selectable-paragraph="">The weapon system has various modes, from fully manual, to semi-automated (where it needs approval to fire), to fully automated mode. In fully automated, the CIWS can engage targets as it sees fit, under certain conditions.</p>
</div>
</div>
<div class="lx ly l gw">
<p><iframe title="Phalanx CIWS Close-in Weapon System In Action - US Navy&#039;s Deadly Autocannon" width="640" height="360" src="https://www.youtube.com/embed/Zsf38NYzo5Q?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
</div>
<p id="5e17" class="pw-post-body-paragraph mj mk gx ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gr bj" data-selectable-paragraph="">Over the years, the CIWS has undergone a number of upgrades to both its gun and its radar. Since 2015, the Navy has upgraded all Phalanx systems to the Block 1B variant.</p>
<p id="1e57" class="pw-post-body-paragraph mj mk gx ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gr bj" data-selectable-paragraph="">Block 1B incorporates an automatic acquisition video tracker, optimized gun barrels (OGB), and Enhanced Lethality Cartridges (ELC) for additional capabilities against asymmetric threats such as small maneuvering surface craft, slow-flying planes and helicopters, and drones.</p>
<p id="44a3" class="pw-post-body-paragraph mj mk gx ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gr bj" data-selectable-paragraph="">The CIWS has downed friendly aircraft before: In 1996, the Phalanx onboard the Asagiri-class Japanese destroyer JDS Yūgiri accidentally shot down a U.S. A-6 Intruder from the aircraft carrier USS Independence. The Intruder was towing a radar target during gunnery exercises about 1,500 mi (2,400 km) west of Oahu.</p>
<p id="f93e" class="pw-post-body-paragraph mj mk gx ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gr bj" data-selectable-paragraph="">Both the pilot and navigator ejected safely.</p>
<p id="1cac" class="pw-post-body-paragraph mj mk gx ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gr bj" data-selectable-paragraph="">In 2005, the U.S. Army started deploying a land-based version of the Phalanx, called the Centurion C-RAM, (for Counter-Rocket, Artillery, Mortar) to Iraq to protect U.S. bases from mortar attack. Unlike the naval variant, which fires tungsten armor-piercing rounds, the land variant fires 20–mm HEIT-SD (High-Explosive Incendiary Tracer, Self-Destruct) ammunition which greatly reduces collateral damage.</p>
<p id="6fc1" class="pw-post-body-paragraph mj mk gx ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gr bj" data-selectable-paragraph="">Still, there’s just something creepy about watching a Phalanx target a civilian airliner.</p>
<p id="5e5f" class="pw-post-body-paragraph mj mk gx ml b mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng gr bj" data-selectable-paragraph="">I don’t know about you, but the video seems to add to the general feeling of dread that we feel with each new AI announcement. While the CIWS is not technically AI-controlled, its fully automated functions do give it a real Terminator vibe.</p>
<figure class="nh ni nj nk nl nm ns nt paragraph-image">
<div class="nv nw ee nx bg ny" tabindex="0" role="button">
<div class="ns nt nu"><picture><source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/1*YynP5nV0J-4-jt4RD5GVBA.jpeg 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/1*YynP5nV0J-4-jt4RD5GVBA.jpeg 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/1*YynP5nV0J-4-jt4RD5GVBA.jpeg 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/1*YynP5nV0J-4-jt4RD5GVBA.jpeg 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/1*YynP5nV0J-4-jt4RD5GVBA.jpeg 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/1*YynP5nV0J-4-jt4RD5GVBA.jpeg 1100w, https://miro.medium.com/v2/resize:fit:1400/format:webp/1*YynP5nV0J-4-jt4RD5GVBA.jpeg 1400w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px" /><source srcset="https://miro.medium.com/v2/resize:fit:640/1*YynP5nV0J-4-jt4RD5GVBA.jpeg 640w, https://miro.medium.com/v2/resize:fit:720/1*YynP5nV0J-4-jt4RD5GVBA.jpeg 720w, https://miro.medium.com/v2/resize:fit:750/1*YynP5nV0J-4-jt4RD5GVBA.jpeg 750w, https://miro.medium.com/v2/resize:fit:786/1*YynP5nV0J-4-jt4RD5GVBA.jpeg 786w, https://miro.medium.com/v2/resize:fit:828/1*YynP5nV0J-4-jt4RD5GVBA.jpeg 828w, https://miro.medium.com/v2/resize:fit:1100/1*YynP5nV0J-4-jt4RD5GVBA.jpeg 1100w, https://miro.medium.com/v2/resize:fit:1400/1*YynP5nV0J-4-jt4RD5GVBA.jpeg 1400w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px" data-testid="og" /><img loading="lazy" decoding="async" class="bg nz oa c" role="presentation" src="https://miro.medium.com/v2/resize:fit:1050/1*YynP5nV0J-4-jt4RD5GVBA.jpeg" alt="" width="700" height="407" /></picture></div>
</div><figcaption class="ob oc fr ns nt od oe be b bf z dw" data-selectable-paragraph="">The Ticonderoga-class guided-missile cruiser USS Chancellorsville (CG 62) fires its Phalanx close-in weapons system (CIWS) as a part of a live fire exercise while underway, Jan. 15 in the Philippine Sea. Public domain. <a href="https://wesodonnell.medium.com/a-u-s-navy-phalanx-gun-targeted-a-civilian-737-this-week-ba58ea0dfdb6" target="_blank" rel="noopener">source</a></figcaption></figure>
<p>&nbsp;</p>
<section class="MuiBox-root css-0">
<hr />
<h1 class="MuiTypography-root MuiTypography-h2 css-fnmlms">Sailors Talk To Phalanx CIWS As It Targets A 737 Like A Dog About To Bite The Mailman</h1>
</section>
<section class="MuiBox-root css-0">
<p class="MuiTypography-root MuiTypography-h6 css-1aggaz0">The Mk 15 Phalanx has experienced its share of personification, but telling it no like a dog is a hilarious and welcome new installment.</p>
</section>
<p>https://youtu.be/3_qSLR7a5qI?si=x1MRmOFytYQLoyqr</p>
<div class="MuiTypography-root MuiTypography-paragraph paragraph css-1ogu1k5" data-og-block-area="article-blocks" data-og-block-nth="1" data-og-block-type="core/paragraph" data-rawhtml="1">
<p>n what has to be one of the funniest and also creepiest military videos in some time, a Mk 15 Phalanx Close-In Weapon System (CIWS) is seen drawing a bead on a 737 passing over what appears to be a Harpers Ferry or Whidbey Island class amphibious dock landing ship. Sailors nearby laugh as they tell the sinister-looking Phalanx &#8220;No&#8230; No&#8230; NO!&#8221; as if it&#8217;s a dog about to do something it shouldn&#8217;t before it drops its barrel and forgets about the juicy target passing overhead.</p>
</div>
<div class="MuiTypography-root MuiTypography-paragraph paragraph css-1el4t9i" data-og-block-area="article-blocks" data-og-block-nth="2" data-og-block-type="core/paragraph" data-rawhtml="1">
<p>Check out the viral video here:</p>
</div>
<div class="embed MuiBox-root css-0" data-og-block-area="article-blocks" data-og-block-nth="1" data-og-block-type="core/embed">
<div class="MuiBox-root css-1sw8tu5">
<div class="MuiBox-root css-1bmc1xu">
<div>
<div class="twitter-tweet twitter-tweet-rendered"><iframe id="twitter-widget-0" class="" title="Twitter Tweet" src="https://platform.twitter.com/embed/Tweet.html?dnt=false&amp;embedId=twitter-widget-0&amp;features=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%3D%3D&amp;frame=false&amp;hideCard=false&amp;hideThread=false&amp;id=1658864786090672132&amp;lang=en&amp;origin=https%3A%2F%2Fwww.thedrive.com%2Fthe-war-zone%2Fsailors-talk-to-phalanx-ciws-as-it-targets-a-737-like-a-dog-about-to-bite-the-mailman&amp;sessionId=758356261c8b5f793a06e9fbc02ced6778c4574b&amp;siteScreenName=https%3A%2F%2Ftwitter.com%2Fthedrive&amp;theme=light&amp;widgetsVersion=01917f4d1d4cb%3A1696883169554&amp;width=550px" frameborder="0" scrolling="no" allowfullscreen="allowfullscreen" data-tweet-id="1658864786090672132" data-mce-fragment="1"></iframe></div>
</div>
</div>
<div class="MuiBox-root css-1i311vc"></div>
</div>
</div>
<div class="MuiTypography-root MuiTypography-paragraph paragraph css-1el4t9i" data-og-block-area="article-blocks" data-og-block-nth="3" data-og-block-type="core/paragraph" data-rawhtml="1">
<p>The Mk 15 Phalanx is no stranger to personification. There have been endless jokes about its appearance and twitchy personality. From R2D2 to Frosty to an aroused Minion, Phalanx and its land-based cousin, Centurion, have brought some smiles.</p>
</div>
<div class="embed MuiBox-root css-0" data-og-block-area="article-blocks" data-og-block-nth="2" data-og-block-type="core/embed">
<div class="MuiBox-root css-1sw8tu5">
<div class="MuiBox-root css-1bmc1xu">
<div>
<div class="twitter-tweet twitter-tweet-rendered"><iframe id="twitter-widget-1" class="" title="Twitter Tweet" src="https://platform.twitter.com/embed/Tweet.html?dnt=false&amp;embedId=twitter-widget-1&amp;features=eyJ0ZndfdGltZWxpbmVfbGlzdCI6eyJidWNrZXQiOltdLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2ZvbGxvd2VyX2NvdW50X3N1bnNldCI6eyJidWNrZXQiOnRydWUsInZlcnNpb24iOm51bGx9LCJ0ZndfdHdlZXRfZWRpdF9iYWNrZW5kIjp7ImJ1Y2tldCI6Im9uIiwidmVyc2lvbiI6bnVsbH0sInRmd19yZWZzcmNfc2Vzc2lvbiI6eyJidWNrZXQiOiJvbiIsInZlcnNpb24iOm51bGx9LCJ0ZndfZm9zbnJfc29mdF9pbnRlcnZlbnRpb25zX2VuYWJsZWQiOnsiYnVja2V0Ijoib24iLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X21peGVkX21lZGlhXzE1ODk3Ijp7ImJ1Y2tldCI6InRyZWF0bWVudCIsInZlcnNpb24iOm51bGx9LCJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3Nob3dfYmlyZHdhdGNoX3Bpdm90c19lbmFibGVkIjp7ImJ1Y2tldCI6Im9uIiwidmVyc2lvbiI6bnVsbH0sInRmd19kdXBsaWNhdGVfc2NyaWJlc190b19zZXR0aW5ncyI6eyJidWNrZXQiOiJvbiIsInZlcnNpb24iOm51bGx9LCJ0ZndfdXNlX3Byb2ZpbGVfaW1hZ2Vfc2hhcGVfZW5hYmxlZCI6eyJidWNrZXQiOiJvbiIsInZlcnNpb24iOm51bGx9LCJ0ZndfdmlkZW9faGxzX2R5bmFtaWNfbWFuaWZlc3RzXzE1MDgyIjp7ImJ1Y2tldCI6InRydWVfYml0cmF0ZSIsInZlcnNpb24iOm51bGx9LCJ0ZndfbGVnYWN5X3RpbWVsaW5lX3N1bnNldCI6eyJidWNrZXQiOnRydWUsInZlcnNpb24iOm51bGx9LCJ0ZndfdHdlZXRfZWRpdF9mcm9udGVuZCI6eyJidWNrZXQiOiJvbiIsInZlcnNpb24iOm51bGx9fQ%3D%3D&amp;frame=false&amp;hideCard=false&amp;hideThread=false&amp;id=1182969854476869632&amp;lang=en&amp;origin=https%3A%2F%2Fwww.thedrive.com%2Fthe-war-zone%2Fsailors-talk-to-phalanx-ciws-as-it-targets-a-737-like-a-dog-about-to-bite-the-mailman&amp;sessionId=758356261c8b5f793a06e9fbc02ced6778c4574b&amp;siteScreenName=https%3A%2F%2Ftwitter.com%2Fthedrive&amp;theme=light&amp;widgetsVersion=01917f4d1d4cb%3A1696883169554&amp;width=550px" frameborder="0" scrolling="no" allowfullscreen="allowfullscreen" data-tweet-id="1182969854476869632" data-mce-fragment="1"></iframe></div>
</div>
</div>
<div class="MuiBox-root css-1i311vc"></div>
</div>
</div>
<div class="embed MuiBox-root css-0" data-og-block-area="article-blocks" data-og-block-nth="3" data-og-block-type="core/embed">
<div class="MuiBox-root css-1sw8tu5">
<div class="MuiBox-root css-1bmc1xu">
<div>
<div class="twitter-tweet twitter-tweet-rendered"><iframe id="twitter-widget-2" class="" title="Twitter Tweet" src="https://platform.twitter.com/embed/Tweet.html?dnt=false&amp;embedId=twitter-widget-2&amp;features=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%3D%3D&amp;frame=false&amp;hideCard=false&amp;hideThread=false&amp;id=1473758005237846016&amp;lang=en&amp;origin=https%3A%2F%2Fwww.thedrive.com%2Fthe-war-zone%2Fsailors-talk-to-phalanx-ciws-as-it-targets-a-737-like-a-dog-about-to-bite-the-mailman&amp;sessionId=758356261c8b5f793a06e9fbc02ced6778c4574b&amp;siteScreenName=https%3A%2F%2Ftwitter.com%2Fthedrive&amp;theme=light&amp;widgetsVersion=01917f4d1d4cb%3A1696883169554&amp;width=550px" frameborder="0" scrolling="no" allowfullscreen="allowfullscreen" data-tweet-id="1473758005237846016" data-mce-fragment="1"></iframe></div>
</div>
</div>
<div class="MuiBox-root css-1i311vc"></div>
</div>
</div>
<div class="embed MuiBox-root css-0" data-og-block-area="article-blocks" data-og-block-nth="4" data-og-block-type="core/embed">
<div class="MuiBox-root css-1sw8tu5">
<div class="MuiBox-root css-1bmc1xu">
<div>
<div class="twitter-tweet twitter-tweet-rendered"><iframe id="twitter-widget-3" class="" title="Twitter Tweet" src="https://platform.twitter.com/embed/Tweet.html?dnt=false&amp;embedId=twitter-widget-3&amp;features=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%3D%3D&amp;frame=false&amp;hideCard=false&amp;hideThread=false&amp;id=878883659092250625&amp;lang=en&amp;origin=https%3A%2F%2Fwww.thedrive.com%2Fthe-war-zone%2Fsailors-talk-to-phalanx-ciws-as-it-targets-a-737-like-a-dog-about-to-bite-the-mailman&amp;sessionId=758356261c8b5f793a06e9fbc02ced6778c4574b&amp;siteScreenName=https%3A%2F%2Ftwitter.com%2Fthedrive&amp;theme=light&amp;widgetsVersion=01917f4d1d4cb%3A1696883169554&amp;width=550px" frameborder="0" scrolling="no" allowfullscreen="allowfullscreen" data-tweet-id="878883659092250625" data-mce-fragment="1"></iframe></div>
</div>
</div>
<div class="MuiBox-root css-1i311vc"></div>
</div>
</div>
<div class="MuiTypography-root MuiTypography-paragraph paragraph css-1el4t9i" data-og-block-area="article-blocks" data-og-block-nth="4" data-og-block-type="core/paragraph" data-rawhtml="1">
<p>As for any danger to the 737, which could have been a Navy P-8 Poseidon, although the markings don&#8217;t look that way, we just don&#8217;t know for sure. Regardless, there shouldn&#8217;t have been any real risk at all. The system has various modes, from fully manual, to semi-automatic where it needs approval to fire, to fully automatic mode. The latter of which allows it to engage targets as it sees fit in very specific combat situations.</p>
</div>
<div class="ad-slot-wrapper ad__w728 ad__h250 ad__align" data-viewport-child="KnXlbcVx">
<div id="InContent1" class="ad__slot ad__h90-inner" role="region" aria-label="Advertisement" data-google-query-id="CMSDn4eNuYIDFeuH7gEdmfIMNA">
<div class="MuiTypography-root MuiTypography-paragraph paragraph css-1el4t9i" data-og-block-area="article-blocks" data-og-block-nth="5" data-og-block-type="core/paragraph" data-rawhtml="1">
<p>Infamously, during Operation Desert Storm, a Phalanx operating in the fully automatic mode on the <em>Oliver Hazard Perry</em> class frigate USS <em>Jarrett</em> ended up spraying the <em>Iowa</em> class battleship USS <em>Missouri</em> with armor-piercing 20mm rounds after the battleship fired a Super Rapid Bloom Offboard Countermeasures (SRBOC) chaff canister while under threat from a Silkworm anti-ship missile attack. Thankfully, nobody was injured in that &#8216;blue on blue&#8217; friendly fire incident and certainly other &#8216;Phalanx gone wild&#8217; incidents have occurred.</p>
</div>
<div class="MuiTypography-root MuiTypography-paragraph paragraph css-1el4t9i" data-og-block-area="article-blocks" data-og-block-nth="6" data-og-block-type="core/paragraph" data-rawhtml="1">
<p>The Mk 15 has been progressively upgraded over its decades of service and, in most configurations, it now features a host of electro-optical cameras to help visually identify targets before firing on them and to use the Phalanx&#8217;s 20mm cannon manually against small boats and other lower-end threats.</p>
</div>
<div class="MuiTypography-root MuiTypography-paragraph paragraph css-1el4t9i" data-og-block-area="article-blocks" data-og-block-nth="7" data-og-block-type="core/paragraph" data-rawhtml="1">
<p>Still, that doesn&#8217;t mean it isn&#8217;t extremely creepy watching that Vulcan cannon slewing sinisterly on a hapless 737 overhead.</p>
</div>
<div class="MuiTypography-root MuiTypography-paragraph paragraph css-1el4t9i" data-og-block-area="article-blocks" data-og-block-nth="8" data-og-block-type="core/paragraph" data-rawhtml="1">
<p>Thank goodness its masters were there to verbally command CIWS to &#8216;let it go.&#8217; <a href="https://www.thedrive.com/the-war-zone/sailors-talk-to-phalanx-ciws-as-it-targets-a-737-like-a-dog-about-to-bite-the-mailman">source</a></p>
</div>
</div>
</div>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
