<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Pegasus Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<atom:link href="https://goodshepherdmedia.net/tag/pegasus/feed/" rel="self" type="application/rss+xml" />
	<link>https://goodshepherdmedia.net/tag/pegasus/</link>
	<description>Christian, Political, ‎‏‏‎Social &#38; Legal Free Speech News &#124; Ⓒ2024 Good News Media LLC &#124; Shepherd for the Herd! God 1st Programming</description>
	<lastBuildDate>Wed, 15 Jan 2025 02:27:35 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://goodshepherdmedia.net/wp-content/uploads/2023/08/Good-Shepherd-News-Logo-150x150.png</url>
	<title>Pegasus Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<link>https://goodshepherdmedia.net/tag/pegasus/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Pegasus spyware: FBI vows not to use after grilling from Capitol Hill</title>
		<link>https://goodshepherdmedia.net/fbi-vows-not-to-use-pegasus-spyware-after-grilling-from-capitol-hill/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Sun, 26 Jan 2025 20:36:53 +0000</pubDate>
				<category><![CDATA[Corruption Over the Years]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🌍World Stage🌍]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[exposing Pegasus]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Frontline PBS Special]]></category>
		<category><![CDATA[Frontline Special]]></category>
		<category><![CDATA[Global Spyware]]></category>
		<category><![CDATA[NSA’s]]></category>
		<category><![CDATA[PBS Special]]></category>
		<category><![CDATA[Pegasus]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[XKeyscore]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=6410</guid>

					<description><![CDATA[ Pegasus spyware: FBI vows not to use after grilling from Capitol Hill The FBI insisted it never planned to use the program to trhttps://www.foxnews.com/ack Americans By Anders Hagstrom , Gillian Turner &#124; Fox News Watch the latest video at foxnews.com The FBI has come under scrutiny in recent months after it purchased a license to use the highly effective [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="headline" style="text-align: center;"> Pegasus spyware: FBI vows not to use after grilling from Capitol Hill</h1>
<h2 class="sub-headline speakable">The FBI insisted it never planned to use the program to trhttps://www.foxnews.com/ack Americans</h2>
<div class="article-meta article-meta-lower">
<div class="author-byline">By <a href="https://www.foxnews.com/person/h/anders-hagstrom">Anders Hagstrom</a> , <a href="https://www.foxnews.com/person/t/gillian-turner">Gillian Turner</a> <span class="article-source"><a href="https://www.foxnews.com/politics/fbi-vows-not-use-pegasus-spyware-grilling-capitol-hill" target="_blank" rel="noopener">| Fox News</a></span></div>
</div>
<p><script type="text/javascript" src="https://video.foxnews.com/v/embed.js?id=6304943982001&#038;w=466&#038;h=263"></script><noscript>Watch the latest video at <a href="https://www.foxnews.com">foxnews.com</a></noscript></p>
<div>
<p class="speakable">The FBI has come under scrutiny in recent months after it purchased a license to use the highly effective spyware program. FBI officials have insisted they did not end up using the program and had intended to only use it for research. Nevertheless, internal documents suggest they had plans to expand its use&#8211;including for tracking Americans. The FBI now tells Fox News it will drop the program.</p>
<p><a href="https://www.foxnews.com/politics/fbi-agents-lost-confidence-christopher-wray-lawyer-representing-whistleblowers-says-report" target="_blank" rel="noopener">Director Wray</a> faced a grilling from members of Congress on the issue in hearings earlier this year, when he stated that his organization had never used to program.</p>
<div class="image-ct inline">
<div class="m">
<figure id="attachment_6411" aria-describedby="caption-attachment-6411" style="width: 425px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" class=" wp-image-6411" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/GettyImages-813266746.webp" alt="FBI director nominee Christopher Wray testifies during his confirmation hearing before the Senate Judiciary Committee July 12, 2017 on Capitol Hill in Washington, D.C. (Photo by Alex Wong/Getty Images)" width="425" height="239" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/GettyImages-813266746.webp 720w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/GettyImages-813266746-300x169.webp 300w" sizes="(max-width: 425px) 100vw, 425px" /><figcaption id="caption-attachment-6411" class="wp-caption-text"><span style="color: #ff6600;"><em>FBI director nominee Christopher Wray testifies during his confirmation hearing before the Senate Judiciary Committee July 12, 2017 on Capitol Hill in Washington, D.C. (Photo by Alex Wong/Getty Images)</em></span></figcaption></figure>
</div>
<div class="caption">
<p>&nbsp;</p>
</div>
</div>
<div class="image-ct inline">
<div class="m">
<figure id="attachment_6412" aria-describedby="caption-attachment-6412" style="width: 400px" class="wp-caption aligncenter"><img decoding="async" class=" wp-image-6412" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/Jan.-6-Committee-Adam-Schiff.webp" alt="Rep. Adam Schiff, D-Calif., a member of the House select committee investigating the Jan. 6 attack on the U.S. Capitol, speaks with members of the press after a hearing at the Capitol in Washington, Tuesday, June 21, 2022. (AP Photo/Patrick Semansky)" width="400" height="224" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/Jan.-6-Committee-Adam-Schiff.webp 686w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/Jan.-6-Committee-Adam-Schiff-300x168.webp 300w" sizes="(max-width: 400px) 100vw, 400px" /><figcaption id="caption-attachment-6412" class="wp-caption-text"><span style="color: #ff6600;"><em>Rep. Adam Schiff, D-Calif., a member of the House select committee investigating the Jan. 6 attack on the U.S. Capitol, speaks with members of the press after a hearing at the Capitol in Washington, Tuesday, June 21, 2022. (AP Photo/Patrick Semansky)</em></span></figcaption></figure>
</div>
<div class="caption">
<p>&#8220;The Director&#8217;s testimony was accurate when given and remains true today – there has been no operational use of the NSO product to support any FBI investigation,&#8221; the FBI told Fox.</p>
</div>
</div>
<p><a href="https://www.foxnews.com/politics/sen-wydens-son-blasts-dad-hating-american-dream" target="_blank" rel="noopener">Sen. Ron Wyden, D-OR,</a> accused Wray of essentially lying – or at least fudging the truth – in testimony earlier this year.<img decoding="async" class="wp-image-6418 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2022/11/pegasus-mobile-spyware-featured-1.jpg" alt="" width="358" height="235" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/11/pegasus-mobile-spyware-featured-1.jpg 1460w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/pegasus-mobile-spyware-featured-1-300x197.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/pegasus-mobile-spyware-featured-1-1024x673.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/pegasus-mobile-spyware-featured-1-768x505.jpg 768w" sizes="(max-width: 358px) 100vw, 358px" /> Wray was asked about the FBI’s purchase of the spyware and bureau plans to use it in criminal investigations, including tracking Americans. Wray insisted the FBI would only use Pegasus for &#8220;research,&#8221; but the New York Times soon obtained internal FBI documents indicating this was not accurate – the FBI had hoped to use Pegasus more broadly.</p>
<p><img loading="lazy" decoding="async" class="wp-image-6419 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2022/11/279732-scaled-1.jpg" alt="" width="286" height="121" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/11/279732-scaled-1.jpg 2560w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/279732-scaled-1-300x127.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/279732-scaled-1-1024x433.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/279732-scaled-1-768x325.jpg 768w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/279732-scaled-1-1536x649.jpg 1536w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/279732-scaled-1-2048x866.jpg 2048w" sizes="(max-width: 286px) 100vw, 286px" />Pegasus has already proven capable of infiltrating the phones of U.S. officials working overseas, something Rep. Adam Schiff, D-Calif., highlighted in a spyware hearing this summer.<img loading="lazy" decoding="async" class="wp-image-6420 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2022/11/Pegasus.jpg" alt="" width="307" height="173" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/11/Pegasus.jpg 696w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/Pegasus-300x169.jpg 300w" sizes="(max-width: 307px) 100vw, 307px" /></p>
<p>&#8220;Late last year, multiple news organizations reported that mobile phones used by U.S. diplomats in Uganda had been compromised by NASA&#8217;s Pegasus tool,&#8221; Schiff said at the time. &#8220;It is my belief that we are very likely looking at the tip of the iceberg and that other U.S. government personnel have had their devices compromised, whether by a nation state using NSA services or tools offered by one of its lesser known but equally potent competitors.&#8221;</p>
<div class="image-ct inline">
<div class="m">
<figure id="attachment_6413" aria-describedby="caption-attachment-6413" style="width: 359px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class=" wp-image-6413" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/GettyImages-1053441404.webp" alt="People hold posters picturing Saudi journalist Jamal Khashoggi and lightened candles during a gathering outside the Saudi Arabia consulate in Istanbul, on Oct. 25, 2018. Khashoggi, a Washington Post contributor, was killed on Oct. 2, 2018 after a visit to the Saudi consulate in Istanbul to obtain paperwork before marrying his Turkish fiancée. (YASIN AKGUL/AFP via Getty Images)" width="359" height="202" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/GettyImages-1053441404.webp 931w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/GettyImages-1053441404-300x169.webp 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/GettyImages-1053441404-768x431.webp 768w" sizes="(max-width: 359px) 100vw, 359px" /><figcaption id="caption-attachment-6413" class="wp-caption-text"><em><span style="color: #ff6600;">People hold posters picturing Saudi journalist Jamal Khashoggi and lightened candles during a gathering outside the Saudi Arabia consulate in Istanbul, on Oct. 25, 2018. Khashoggi, a Washington Post contributor, was killed on Oct. 2, 2018 after a visit to the Saudi consulate in Istanbul to obtain paperwork before marrying his Turkish fiancée. (YASIN AKGUL/AFP via Getty Images)</span></em></figcaption></figure>
</div>
</div>
</div>
<p>&nbsp;</p>
<p>Experts say the spyware has legitimate uses but is also a powerful tool for authoritarian governments. Mexico used Pegasus in its effort to track down El Chapo, and Saudi Arabia also used it to track journalist Jamal Khashoggi prior to orchestrating his murder, according to cyber defense expert Jason Blessing.</p>
<p>&nbsp;</p>
<hr />
<h1><img loading="lazy" decoding="async" class="alignnone size-full wp-image-6850" src="https://goodshepherdmedia.net/wp-content/uploads/2022/11/spying-on-americans.jpg" alt="" width="1899" height="852" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/11/spying-on-americans.jpg 1899w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/spying-on-americans-300x135.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/spying-on-americans-1024x459.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/spying-on-americans-768x345.jpg 768w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/spying-on-americans-1536x689.jpg 1536w" sizes="(max-width: 1899px) 100vw, 1899px" /></h1>
<h1 class="article_h1" style="text-align: center;">The Spy Factories: NSA’s <a href="https://goodshepherdmedia.net/x-keyscore-allows-the-nsa-and-allies-to-monitor-emails-web-browsing-internet-searches-and-social-media/" target="_blank" rel="noopener">XKeyscore</a> Isn’t the Only Program Tracking You</h1>
<div class="article_detail_text" style="text-align: center;">BY <a class="link-14" href="https://spyscape.com/article/is-the-xkeyscore-spy-program-revealed-by-snowden-still-a-privacy-problem" target="_blank" rel="noopener">SPYSCAPE</a></div>
<p>When whistleblower Edward Snowden revealed his NSA files in 2013, one sneaky program stood out: <a href="https://goodshepherdmedia.net/x-keyscore-allows-the-nsa-and-allies-to-monitor-emails-web-browsing-internet-searches-and-social-media/" target="_blank" rel="noopener">XKeyscore, a secret system</a> that spies can use to search and analyze nearly everything you do on the internet in real-time.</p>
<p><a href="https://goodshepherdmedia.net/x-keyscore-allows-the-nsa-and-allies-to-monitor-emails-web-browsing-internet-searches-and-social-media/" target="_blank" rel="noopener">XKeyscore</a> is still hoovering up your internet searches, passwords, user names, emails, and personal messages a decade later. In fact, it’s not the only tool governments used to spy on your personal data. Here are five ways the US, Britain, Israel, Canada, and others may be spying on you right now.</p>
<figure class="w-richtext-align-fullwidth w-richtext-figure-type-image"><img loading="lazy" decoding="async" class="size-full wp-image-6845 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d957c351af6ea563e3d_mkYifgHWZbvH3emUDDD_6RkG0uXOAhrKosowFYn28uTW7thE_uN24hGNkqZfqx3MsGCtyTwUiOCBMyKCKBkQkDfIOW8GI2gmiV72DEO_xvs6iMPZ4sm46AbbqyY9dBwA4635fa80.jpg" alt="" width="1158" height="685" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d957c351af6ea563e3d_mkYifgHWZbvH3emUDDD_6RkG0uXOAhrKosowFYn28uTW7thE_uN24hGNkqZfqx3MsGCtyTwUiOCBMyKCKBkQkDfIOW8GI2gmiV72DEO_xvs6iMPZ4sm46AbbqyY9dBwA4635fa80.jpg 1158w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d957c351af6ea563e3d_mkYifgHWZbvH3emUDDD_6RkG0uXOAhrKosowFYn28uTW7thE_uN24hGNkqZfqx3MsGCtyTwUiOCBMyKCKBkQkDfIOW8GI2gmiV72DEO_xvs6iMPZ4sm46AbbqyY9dBwA4635fa80-300x177.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d957c351af6ea563e3d_mkYifgHWZbvH3emUDDD_6RkG0uXOAhrKosowFYn28uTW7thE_uN24hGNkqZfqx3MsGCtyTwUiOCBMyKCKBkQkDfIOW8GI2gmiV72DEO_xvs6iMPZ4sm46AbbqyY9dBwA4635fa80-1024x606.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d957c351af6ea563e3d_mkYifgHWZbvH3emUDDD_6RkG0uXOAhrKosowFYn28uTW7thE_uN24hGNkqZfqx3MsGCtyTwUiOCBMyKCKBkQkDfIOW8GI2gmiV72DEO_xvs6iMPZ4sm46AbbqyY9dBwA4635fa80-768x454.jpg 768w" sizes="(max-width: 1158px) 100vw, 1158px" /></figure>
<h3><strong>CIA snooping on Americans</strong>&#x200d;</h3>
<p>The CIA is vacuuming up <a href="https://www.wyden.senate.gov/news/press-releases/wyden-and-heinrich-newly-declassified-documents-reveal-previously-secret-cia-bulk-collection-problems-with-cia-handling-of-americans-information" target="_blank" rel="noopener">data in bulk</a> so spies can sift through it, according to two members of the US Senate Intelligence Committee.</p>
<p>If the data collec­tion happens over­seas or falls into a statutory black hole, it comes under <a href="https://dpcld.defense.gov/Portals/49/Documents/Civil/eo-12333-2008.pdf" target="_blank" rel="noopener">Exec­ut­ive Order 12333</a> which means there’s little over­sight. “What stops the CIA from poring through the data look­ing for Amer­ic­ans’ inform­a­tion? Let’s be honest: noth­ing,” according to the <a href="https://www.brennancenter.org/our-work/analysis-opinion/how-cia-acting-outside-law-spy-americans" target="_blank" rel="noopener">Brennan Center for Justice</a>.</p>
<p>Senator Ron Wyden said he is also concerned the US Defense Intelligence Agency is buying consumer smartphone location data from a third-party broker and the Department of Homeland Security is helping to <a href="https://thehill.com/policy/technology/598809-major-government-surveillance-revelations-fail-to-make-a-big-splash" target="_blank" rel="noopener">compile money transfer records</a>.</p>
<p>&nbsp;</p>
<figure class="w-richtext-align-fullwidth w-richtext-figure-type-image"><img loading="lazy" decoding="async" class="size-full wp-image-6846 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d95599f7076472413f7_Vmoni7_ie_9PcDGrE1J4vH3sbN8XhviV38cuSAhpsV0QySP7D7uCfPQp02xeUsAvx8XYl2WQ8bLxfs9jdIgW_11Ayd_MsN44tXurN9Ntuhws6uC_TDTWYcESjfYrFx_adL-Bt-LN.jpg" alt="" width="1122" height="736" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d95599f7076472413f7_Vmoni7_ie_9PcDGrE1J4vH3sbN8XhviV38cuSAhpsV0QySP7D7uCfPQp02xeUsAvx8XYl2WQ8bLxfs9jdIgW_11Ayd_MsN44tXurN9Ntuhws6uC_TDTWYcESjfYrFx_adL-Bt-LN.jpg 1122w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d95599f7076472413f7_Vmoni7_ie_9PcDGrE1J4vH3sbN8XhviV38cuSAhpsV0QySP7D7uCfPQp02xeUsAvx8XYl2WQ8bLxfs9jdIgW_11Ayd_MsN44tXurN9Ntuhws6uC_TDTWYcESjfYrFx_adL-Bt-LN-300x197.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d95599f7076472413f7_Vmoni7_ie_9PcDGrE1J4vH3sbN8XhviV38cuSAhpsV0QySP7D7uCfPQp02xeUsAvx8XYl2WQ8bLxfs9jdIgW_11Ayd_MsN44tXurN9Ntuhws6uC_TDTWYcESjfYrFx_adL-Bt-LN-1024x672.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d95599f7076472413f7_Vmoni7_ie_9PcDGrE1J4vH3sbN8XhviV38cuSAhpsV0QySP7D7uCfPQp02xeUsAvx8XYl2WQ8bLxfs9jdIgW_11Ayd_MsN44tXurN9Ntuhws6uC_TDTWYcESjfYrFx_adL-Bt-LN-768x504.jpg 768w" sizes="(max-width: 1122px) 100vw, 1122px" /></figure>
<p>&nbsp;</p>
<h3><strong>Pegasus software</strong>&#x200d;</h3>
<p>The Israeli company NSO Group developed Pegasus spyware to target terrorists but governments have used it to track <a href="https://forbiddenstories.org/case/the-pegasus-project/" target="_blank" rel="noopener">at least 180 journalists</a>, political dissidents, activists, and heads of state including French President <a href="https://www.amnesty.org/en/latest/news/2021/07/world-leaders-potential-targets-of-nso-group-pegasus-spyware/" target="_blank" rel="noopener">Emmanuel Macron</a>.</p>
<p>More than 50,000 phone numbers targeted for surveillance by Pegasus’ customers were leaked to Amnesty International, revealing a massive global privacy breach. Once installed, the software operator can receive text messages, contact lists, and calendar events, and can turn on the phone’s camera and microphone to capture activity in the phone’s vicinity.</p>
<p>Who uses it? The FBI ‘tested’ Pegasus spyware but said they haven’t used it in investigations. Canada’s CitizenLab linked Pegasus to operations in 45 countries including Mexico, Bahrain, Kazakhstan, Morocco, Saudi Arabia, and the UAE. <a href="https://www.calcalistech.com/ctech/articles/0,7340,L-3928830,00.html" target="_blank" rel="noopener">Israeli police used the spyware</a> to scrutinize citizens&#8217; phones. The son of ex-Israeli PM Benjamin Netanyahu was one such target. Not all countries have access to Pegasus software. <a href="https://www.theguardian.com/world/2022/mar/23/israel-ukraine-pegasus-spyware-russia" target="_blank" rel="noopener">Israel reportedly blocked Ukraine from buying a license,</a> fearing Russia would be angry if Pegasus was sold to a regional foe.</p>
<p>&nbsp;</p>
<figure class="w-richtext-align-fullwidth w-richtext-figure-type-image"><img loading="lazy" decoding="async" class="size-full wp-image-6848 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d959440455190bbb947_kduvBiQeD4xLlBAzWBFIfXxIEHsuM9ceMibIy7ixXDrnEJ15t4VbwOvqz9Nl3Rl8VMuVcPgc3NX6Pm71HYv6TmuEWzov3DsEEc4_Xs-2Nla7WTztyvsvMaJla0VKlnOEZ35D5rcC.jpg" alt="" width="1600" height="795" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d959440455190bbb947_kduvBiQeD4xLlBAzWBFIfXxIEHsuM9ceMibIy7ixXDrnEJ15t4VbwOvqz9Nl3Rl8VMuVcPgc3NX6Pm71HYv6TmuEWzov3DsEEc4_Xs-2Nla7WTztyvsvMaJla0VKlnOEZ35D5rcC.jpg 1600w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d959440455190bbb947_kduvBiQeD4xLlBAzWBFIfXxIEHsuM9ceMibIy7ixXDrnEJ15t4VbwOvqz9Nl3Rl8VMuVcPgc3NX6Pm71HYv6TmuEWzov3DsEEc4_Xs-2Nla7WTztyvsvMaJla0VKlnOEZ35D5rcC-300x149.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d959440455190bbb947_kduvBiQeD4xLlBAzWBFIfXxIEHsuM9ceMibIy7ixXDrnEJ15t4VbwOvqz9Nl3Rl8VMuVcPgc3NX6Pm71HYv6TmuEWzov3DsEEc4_Xs-2Nla7WTztyvsvMaJla0VKlnOEZ35D5rcC-1024x509.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d959440455190bbb947_kduvBiQeD4xLlBAzWBFIfXxIEHsuM9ceMibIy7ixXDrnEJ15t4VbwOvqz9Nl3Rl8VMuVcPgc3NX6Pm71HYv6TmuEWzov3DsEEc4_Xs-2Nla7WTztyvsvMaJla0VKlnOEZ35D5rcC-768x382.jpg 768w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d959440455190bbb947_kduvBiQeD4xLlBAzWBFIfXxIEHsuM9ceMibIy7ixXDrnEJ15t4VbwOvqz9Nl3Rl8VMuVcPgc3NX6Pm71HYv6TmuEWzov3DsEEc4_Xs-2Nla7WTztyvsvMaJla0VKlnOEZ35D5rcC-1536x763.jpg 1536w" sizes="(max-width: 1600px) 100vw, 1600px" /></figure>
<h3><strong>Codename Tempora: Britain’s GCHQ cyberspies </strong>&#x200d;</h3>
<p>The <a href="https://www.bailii.org/cgi-bin/format.cgi?doc=/eu/cases/ECHR/2021/439.html&amp;query=(GCHQ.)" target="_blank" rel="noopener">European Court of Human Rights </a>ruled in 2021 that GCHQ spies were acting unlawfully when they intercepted online communications in bulk. Judges also criticized GCHQ’s regime for sharing sensitive digital intelligence with foreign governments.</p>
<p>The data included information from passports, travel records, financial data, telephone calls, emails, and open or covert sources.</p>
<p>The court case revealed that Britain’s spies had secretly collected bulk personal data since the late 1990s and gathered information on people &#8216;unlikely to be of intelligence or security interest&#8217;. UK lawyers argued that the information was needed for national security.</p>
<p>&nbsp;</p>
<figure class="w-richtext-align-fullwidth w-richtext-figure-type-image"><img loading="lazy" decoding="async" class="size-full wp-image-6849 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c424c9a5b73d5378c225f_Cyber-spies-3.jpg" alt="" width="1309" height="826" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c424c9a5b73d5378c225f_Cyber-spies-3.jpg 1309w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c424c9a5b73d5378c225f_Cyber-spies-3-300x189.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c424c9a5b73d5378c225f_Cyber-spies-3-1024x646.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c424c9a5b73d5378c225f_Cyber-spies-3-768x485.jpg 768w" sizes="(max-width: 1309px) 100vw, 1309px" /></figure>
<h3><strong>Vault 7: CIA hacking techniques</strong>&#x200d;</h3>
<p>In 2017, WikiLeaks published what it described as<a href="https://wikileaks.org/ciav7p1/" target="_blank" rel="noopener"> thousands of pages of internal CIA discussions</a> about Agency hacking techniques. CIA spies could apparently access Apple iPhones, Google Android devices, and other gadgets to capture text and voice messages before they were encrypted with software.</p>
<p>By the end of 2016, the CIA&#8217;s Center for Cyber Intelligence had more than 5,000 registered users and produced more than 1,000 hacking systems, trojans, viruses, and other ‘weaponized’ malware, creating, in effect, its own NSA with less accountability, according to WikiLeaks.</p>
<p>The House Intelligence committee was <a href="https://www.independent.co.uk/news/world/americas/us-politics/julian-assange-kidnap-cia-trump-b1942333.html" target="_blank" rel="noopener">‘looking into the report’</a> by <a href="https://uk.news.yahoo.com/kidnapping-assassination-and-a-london-shoot-out-inside-the-ci-as-secret-war-plans-against-wiki-leaks-090057786.html" target="_blank" rel="noopener"><em>Yahoo! News</em></a> in 2021 that claimed the CIA allegedly plotted revenge for the WikiLeaks revelations by targeting founder Julian Assange.</p>
<figure class="w-richtext-align-fullwidth w-richtext-figure-type-image"><img loading="lazy" decoding="async" class="wp-image-6847 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d952993e32845d8386c_D5xEuCQKDqtk3JHgnY7pFaVEotfS_iXv9GHL5RVt8RyUT0i0GvVkHzc3F_mypExHThWXg-Hpc__qyCLzan9-m2fjC_rg5tZCxh6WdmqX-uc-JDNq-hHQ-jiPJqkkhx6lL8cVedRv.jpg" alt="" width="989" height="444" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d952993e32845d8386c_D5xEuCQKDqtk3JHgnY7pFaVEotfS_iXv9GHL5RVt8RyUT0i0GvVkHzc3F_mypExHThWXg-Hpc__qyCLzan9-m2fjC_rg5tZCxh6WdmqX-uc-JDNq-hHQ-jiPJqkkhx6lL8cVedRv.jpg 646w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c3d952993e32845d8386c_D5xEuCQKDqtk3JHgnY7pFaVEotfS_iXv9GHL5RVt8RyUT0i0GvVkHzc3F_mypExHThWXg-Hpc__qyCLzan9-m2fjC_rg5tZCxh6WdmqX-uc-JDNq-hHQ-jiPJqkkhx6lL8cVedRv-300x135.jpg 300w" sizes="(max-width: 989px) 100vw, 989px" /></figure>
<h3><strong>CSIS: Canada’s spies creep forward</strong>&#x200d;</h3>
<p>Canada&#8217;s CSE &#8211; the signals intelligence group that collects data much like the NSA does in the US &#8211; received <a href="https://www.cbc.ca/news/politics/bill-c59-national-security-passed-1.5182948" target="_blank" rel="noopener">new powers in 2019</a> under a law designed to crack down on terrorists. Privacy advocates worry the law is an invitation for mass surveillance and see potential problems.</p>
<p>Critics have long complained about CSE which, in 2012, <a href="https://www.cbc.ca/news/politics/csec-used-airport-wi-fi-to-track-canadian-travellers-edward-snowden-documents-1.2517881" target="_blank" rel="noopener">spied on Canadians using public WiFi networks</a> in Canadian airports. The agency &#8211; and its watchdog &#8211; argued that they were only collecting metadata (for example, an IP or email address and phone number) rather than the content of messages.</p>
<p>“But we (and they) know that metadata can reveal tons of private information about a person and their life: where they have been, what they believe, who they talk to, etc,” according to Canada’s <a href="https://iclmg.ca/issues/bill-c-59-the-national-security-act-of-2017/bill-c-59s-mass-surveillance-and-cyber-powers/" target="_blank" rel="noopener">International Civil Liberties Monitoring Group</a>.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<ul>
<li><a href="https://www.cryptomuseum.com/intel/nsa/index.htm#inter" target="_blank" rel="noopener">NSA-backdoored equipment info found OFF this website</a></li>
<li><a href="https://goodshepherdmedia.net/u-s-government-catalogue-of-cellphone-surveillance-devices-used-by-the-military-and-by-cia-nsa-fbi-and-other-intelligence-agencies/" target="_blank" rel="noopener">U.S. Government Catalogue of Cellphone Surveillance Devices</a></li>
<li><a href="https://en.wikipedia.org/wiki/Backdoor_(computing)" target="_blank" rel="noopener">Backdoors on Wikipedia</a></li>
<li><a href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">National Security Agency</a></li>
<li><a href="https://goodshepherdmedia.net/cia-central-intelligence-agency/" target="_blank" rel="noopener">Central Intelligence Agency</a></li>
<li><a href="https://nsa.gov1.info/dni/index.html" target="_blank" rel="noopener">NSA EXTRACTED INFO</a></li>
<li><a href="https://www.cryptomuseum.com/" target="_blank" rel="noopener">CRYPTO MUSEUM</a></li>
<li><a href="https://goodshepherdmedia.net/edward-snowden-nsa-whistleblower/" target="_blank" rel="noopener">Edward Snowden</a></li>
<li><a href="https://goodshepherdmedia.net/can-cops-secretly-listen-to-my-phone-how-cops-can-secretly-track-your-phone/" target="_blank" rel="noopener">Stingray</a></li>
<li><a href="https://goodshepherdmedia.net/fbi-vows-not-to-use-pegasus-spyware-after-grilling-from-capitol-hill/" target="_blank" rel="noopener">Pegasus Spyware</a></li>
<li><a href="https://goodshepherdmedia.net/x-keyscore-allows-the-nsa-and-allies-to-monitor-emails-web-browsing-internet-searches-and-social-media/" target="_blank" rel="noopener">X-Keyscore</a></li>
</ul>
<p>&nbsp;</p>
<p><iframe title="NY Post columnist: Is the FBI unethically spying on people?" width="640" height="360" src="https://www.youtube.com/embed/slLQvXNmwNI?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><iframe title="Global Spyware Scandal: Exposing Pegasus Part One (full documentary) | FRONTLINE" width="640" height="360" src="https://www.youtube.com/embed/6ZVj1_SE4Mo?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><iframe title="Global Spyware Scandal: Exposing Pegasus Part Two (full documentary) | FRONTLINE" width="640" height="360" src="https://www.youtube.com/embed/xYMWTXIkANM?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p><iframe title="Exposed: Secret Government Surveillance Tools They DON&#039;T Want You to Know About!" width="640" height="360" src="https://www.youtube.com/embed/iRYji0Q2K30?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>X-Keyscore: Allows the NSA and Allies to Monitor Emails, Web Browsing, Internet Searches and Social Media</title>
		<link>https://goodshepherdmedia.net/x-keyscore-allows-the-nsa-and-allies-to-monitor-emails-web-browsing-internet-searches-and-social-media/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Fri, 24 Jan 2025 05:14:33 +0000</pubDate>
				<category><![CDATA[Corruption Over the Years]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[allies]]></category>
		<category><![CDATA[how to spy]]></category>
		<category><![CDATA[Internet Searches]]></category>
		<category><![CDATA[Monitor Emails]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Pegasus]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[spy]]></category>
		<category><![CDATA[spy gate]]></category>
		<category><![CDATA[spygate]]></category>
		<category><![CDATA[USA spy]]></category>
		<category><![CDATA[Web Browsing]]></category>
		<category><![CDATA[web spying]]></category>
		<category><![CDATA[world spy]]></category>
		<category><![CDATA[X-Keyscore]]></category>
		<category><![CDATA[XKeyscore]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=6808</guid>

					<description><![CDATA[XKeyscore: NSA tool collects &#8216;nearly everything a user does on the internet&#8217; written by Glenn Greenwald cited   XKeyscore gives &#8216;widest-reaching&#8217; collection of online data  NSA analysts require no prior authorization for searches  Sweeps up emails, social media activity and browsing history A top secret National Security Agency program allows analysts to search with no prior authorization through [&#8230;]]]></description>
										<content:encoded><![CDATA[<div class="dcr-1djovmt" data-gu-name="headline">
<div class="dcr-14emo0l">
<div class="dcr-1msbrj1">
<h1></h1>
<h1 class="dcr-y70mar" style="text-align: center;">XKeyscore: NSA tool collects &#8216;nearly everything a user does on the internet&#8217;</h1>
</div>
</div>
</div>
<div style="text-align: center;">written by <a href="https://www.theguardian.com/profile/glenn-greenwald" rel="author" data-link-name="auto tag link">Glenn Greenwald</a> <a href="https://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data" target="_blank" rel="noopener">cited </a></div>
<div></div>
<blockquote>
<div><span style="color: #ff0000;"> XKeyscore gives &#8216;widest-reaching&#8217; collection of online data  NSA analysts require no prior authorization for searches  Sweeps up emails, social media activity and browsing history</span></div>
</blockquote>
<div></div>
<div>
<p><iframe title="Exposing the NSA’s Mass Surveillance of Americans | Cyberwar" width="640" height="360" src="https://www.youtube.com/embed/tYVm62oEyWA?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
</div>
<div class="dcr-1yi1cnj" data-gu-name="standfirst">
<div class=" dcr-iuxtqj">
<div class="dcr-1yi1cnj" data-gu-name="standfirst">
<div class=" dcr-iuxtqj"></div>
</div>
<div class="dcr-6ufhd0" data-gu-name="media">
<div class="dcr-14emo0l">
<div class="dcr-ubxqwv">
<figure id="a6b7ed7c-8cd0-451d-8171-65a3e80a5649" class="dcr-142siv7">
<div class="dcr-1t8m8f2">
<figure id="attachment_6816" aria-describedby="caption-attachment-6816" style="width: 648px" class="wp-caption alignright"><img loading="lazy" decoding="async" class=" wp-image-6816" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/XKeyscore-map-010.webp" alt="One presentation claims the XKeyscore program covers 'nearly everything a typical user does on the internet'" width="648" height="389" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/XKeyscore-map-010.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/XKeyscore-map-010-300x180.webp 300w" sizes="(max-width: 648px) 100vw, 648px" /><figcaption id="caption-attachment-6816" class="wp-caption-text"><em><span style="color: #ff6600;">One presentation claims the XKeyscore program covers &#8216;nearly everything a typical user does on the internet&#8217;</span></em></figcaption></figure>
</div>
</figure>
</div>
</div>
</div>
<div class="dcr-kt8blz" data-gu-name="lines">
<div class="dcr-14emo0l"></div>
</div>
<aside class="dcr-1rbr3jc" data-gu-name="meta">
<div class="dcr-14emo0l">
<div class=" dcr-c7ke56">
<div class="dcr-rnfrqq">
<div class="dcr-9dgpdq" data-print-layout="hide">
<div class=" dcr-2zv6">
<div class="dcr-16dmhab">
<div class="meta-number">
<div class="css-pbkcyu" data-testid="long-comment-count" aria-hidden="true"></div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</aside>
<div class="dcr-ch7w1w" data-gu-name="body">
<div class="dcr-i7zira">
<div id="maincontent" class="dcr-1ncmr12">
<div class="article-body-commercial-selector article-body-viewer-selector dcr-1vqv39r">
<p class="dcr-h26idz">A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.</p>
<p class="dcr-h26idz">The <a href="https://www.theguardian.com/us-news/nsa" data-component="auto-linked-tag" data-link-name="in body link">NSA</a> boasts in training materials that the program, called XKeyscore, is its &#8220;widest-reaching&#8221; system for developing intelligence from the internet.</p>
<div id="sign-in-gate"></div>
<p class="dcr-h26idz">The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to <a href="https://www.theguardian.com/world/the-nsa-files" data-link-name="in body link">the Guardian&#8217;s earlier stories</a> on bulk collection of phone records and Fisa surveillance court oversight.</p>
<div class="ad-slot-container ad-slot-container--im">
<div id="dfp-ad--im" class="js-ad-slot ad-slot ad-slot-- ad-slot--im" data-link-name="ad slot im" data-name="im" aria-hidden="true" data-label="false" data-refresh="false">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_8__container__"></div>
</div>
</div>
<p class="dcr-h26idz">The files shed light on one of Snowden&#8217;s most controversial statements, made in his <a href="https://www.theguardian.com/world/video/2013/jun/09/nsa-whistleblower-edward-snowden-interview-video" data-link-name="in body link">first video interview published by the Guardian</a> on June 10.</p>
<p class="dcr-h26idz">&#8220;I, sitting at my desk,&#8221; said Snowden, could &#8220;wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email&#8221;.</p>
<p class="dcr-h26idz">US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden&#8217;s assertion: &#8220;He&#8217;s lying. It&#8217;s impossible for him to do what he was saying he could do.&#8221;</p>
<p class="dcr-h26idz">But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.</p>
<p>&nbsp;</p>
<div id="dfp-ad--carrot" class="js-ad-slot ad-slot ad-slot--carrot" data-link-name="ad slot carrot" data-name="carrot" aria-hidden="true" data-label="false" data-refresh="false">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_16__container__">
<blockquote>
<h2 class="jeg_post_title" style="text-align: center;"><span style="color: #0000ff;">XKeyScore – the NSA’s secret tool that collects and reveals ‘nearly everything a user does on the internet’</span></h2>
</blockquote>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="dcr-1yi1cnj" data-gu-name="standfirst">
<div class=" dcr-iuxtqj">
<div class="dcr-ch7w1w" data-gu-name="body">
<div class="dcr-i7zira">
<div id="maincontent" class="dcr-1ncmr12">
<div class="article-body-commercial-selector article-body-viewer-selector dcr-1vqv39r">
<div id="dfp-ad--carrot" class="js-ad-slot ad-slot ad-slot--carrot" data-link-name="ad slot carrot" data-name="carrot" aria-hidden="true" data-label="false" data-refresh="false">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_16__container__">
<blockquote>
<blockquote><p>&nbsp;</p></blockquote>
</blockquote>
<h1><img loading="lazy" decoding="async" class="size-full wp-image-6839 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/thumb-5.jpg" alt="" width="640" height="420" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/thumb-5.jpg 640w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/thumb-5-300x197.jpg 300w" sizes="(max-width: 640px) 100vw, 640px" /></h1>
</div>
</div>
<p class="dcr-h26idz">XKeyscore, the documents boast, is the NSA&#8217;s &#8220;widest reaching&#8221; system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers &#8220;nearly everything a typical user does on the internet&#8221;, including the content of emails, websites visited and searches, as well as their metadata.</p>
<p class="dcr-h26idz">Analysts can also use XKeyscore and other NSA systems to obtain ongoing &#8220;real-time&#8221; interception of an individual&#8217;s internet activity.</p>
<p class="dcr-h26idz">Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a &#8216;US person&#8217;, though no such warrant is required for intercepting the communications of Americans with foreign targets. But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.</p>
<p class="dcr-h26idz">One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst&#8217;s ability to query the databases at any time.</p>
<figure id="39187de4-7a62-46be-a900-2974c4f3e73b" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6817" aria-describedby="caption-attachment-6817" style="width: 460px" class="wp-caption alignright"><img loading="lazy" decoding="async" class="size-full wp-image-6817" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS1-001.webp" alt="Photograph: Guardian" width="460" height="347" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS1-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS1-001-300x226.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6817" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<p class="dcr-h26idz">The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a &#8220;selector&#8221; in NSA parlance) associated with the individual being targeted.</p>
<div class="ad-slot-container ">
<div id="dfp-ad--inline1" class="js-ad-slot ad-slot ad-slot--inline ad-slot--inline1" data-link-name="ad slot inline1" data-name="inline1" aria-hidden="true">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_9__container__"></div>
</div>
</div>
<p class="dcr-h26idz">Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.</p>
<p class="dcr-h26idz">One document notes that this is because &#8220;strong selection [search by email address] itself gives us only a very limited capability&#8221; because &#8220;a large amount of time spent on the web is performing actions that are anonymous.&#8221;</p>
<p class="dcr-h26idz">The NSA documents assert that by 2008, 300 terrorists had been captured using intelligence from XKeyscore.</p>
<p class="dcr-h26idz">Analysts are warned that searching the full database for content will yield too many results to sift through. Instead they are advised to use the metadata also stored in the databases to narrow down what to review.</p>
<p class="dcr-h26idz">A slide entitled &#8220;plug-ins&#8221; in a December 2012 document describes the various fields of information that can be searched. It includes &#8220;every email address seen in a session by both username and domain&#8221;, &#8220;every phone number seen in a session (eg address book entries or signature block)&#8221; and user activity – &#8220;the webmail and chat activity to include username, buddylist, machine specific cookies etc&#8221;.</p>
<h2 id="email-monitoring">Email monitoring</h2>
<div class="ad-slot-container ad-slot-container-2 offset-right ad-slot--offset-right ad-slot-container--offset-right">
<div id="dfp-ad--inline2" class="js-ad-slot ad-slot ad-slot--inline ad-slot--inline2" data-link-name="ad slot inline2" data-name="inline2" aria-hidden="true">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_10__container__"></div>
</div>
</div>
<p class="dcr-h26idz">In a second Guardian interview in June, Snowden elaborated on his statement about being able to read any individual&#8217;s email if he had their email address. He said the claim was based in part on the email search capabilities of XKeyscore, which Snowden says he was authorized to use while working as a Booz Allen contractor for the NSA.</p>
<p class="dcr-h26idz">One top-secret document describes how the program &#8220;searches within bodies of emails, webpages and documents&#8221;, including the &#8220;To, From, CC, BCC lines&#8221; and the &#8216;Contact Us&#8217; pages on websites&#8221;.</p>
<p class="dcr-h26idz">To search for emails, an analyst using XKS enters the individual&#8217;s email address into a simple online search form, along with the &#8220;justification&#8221; for the search and the time period for which the emails are sought.</p>
<figure id="6f7527ef-7d35-49c9-b75f-448055cdb0bb" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6818" aria-describedby="caption-attachment-6818" style="width: 460px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-6818" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS2-001.webp" alt="Photograph: Guardian" width="460" height="314" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS2-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS2-001-300x205.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6818" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<figure id="96e72c9e-88f5-4c5f-b2ea-daf2e6cbaadd" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<div class="mceTemp"></div>
<figure id="attachment_6819" aria-describedby="caption-attachment-6819" style="width: 460px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-6819" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS3edit2-001.webp" alt="Photograph: Guardian" width="460" height="345" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS3edit2-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS3edit2-001-300x225.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6819" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<div class="ad-slot-container ad-slot-container-3 offset-right ad-slot--offset-right ad-slot-container--offset-right">
<div id="dfp-ad--inline3" class="js-ad-slot ad-slot ad-slot--inline ad-slot--inline3" data-link-name="ad slot inline3" data-name="inline3" aria-hidden="true">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_11__container__"></div>
</div>
</div>
<p class="dcr-h26idz">The analyst then selects which of those returned emails they want to read by opening them in NSA reading software.</p>
<p class="dcr-h26idz">The system is similar to the way in which NSA analysts generally can intercept the communications of anyone they select, including, as one NSA document put it, &#8220;communications that transit the United States and communications that terminate in the United States&#8221;.</p>
<p class="dcr-h26idz">One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications. Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:</p>
<figure id="3b5403ae-d94a-417f-9823-9a6385cd0581" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6820" aria-describedby="caption-attachment-6820" style="width: 460px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-6820" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS4-001.webp" alt="Photograph: Guardian" width="460" height="353" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS4-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS4-001-300x230.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6820" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<h2 id="chats-browsing-history-and-other-internet-activity">Chats, browsing history and other internet activity</h2>
<p class="dcr-h26idz">Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.</p>
<p class="dcr-h26idz">An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.</p>
<figure id="f23d3d68-a7fa-4fee-a7d2-80557f73560c" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6815" aria-describedby="caption-attachment-6815" style="width: 460px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-6815" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS55edit-001.webp" alt="Photograph: Guardian" width="460" height="333" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS55edit-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS55edit-001-300x217.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6815" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<div class="ad-slot-container ad-slot-container-4 offset-right ad-slot--offset-right ad-slot-container--offset-right">
<div id="dfp-ad--inline4" class="js-ad-slot ad-slot ad-slot--inline ad-slot--inline4" data-link-name="ad slot inline4" data-name="inline4" aria-hidden="true">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_12__container__"></div>
</div>
</div>
<p class="dcr-h26idz">An analyst can monitor such Facebook chats by entering the Facebook user name and a date range into a simple search screen.</p>
<figure id="d930b8e7-5acf-4dda-93b2-35ec2ddeee63" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6821" aria-describedby="caption-attachment-6821" style="width: 460px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-6821" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS6-001.webp" alt="Photograph: Guardian" width="460" height="314" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS6-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS6-001-300x205.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6821" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<p class="dcr-h26idz">Analysts can search for internet browsing activities using a wide range of information, including search terms entered by the user or the websites viewed.</p>
<figure id="e140f8b1-b46b-439d-b01c-74dc6f9f3a55" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6822" aria-describedby="caption-attachment-6822" style="width: 460px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-6822" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS7-001.webp" alt="Photograph: Guardian" width="460" height="329" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS7-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS7-001-300x215.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6822" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<p class="dcr-h26idz">As one slide indicates, the ability to search HTTP activity by keyword permits the analyst access to what the NSA calls &#8220;nearly everything a typical user does on the internet&#8221;.</p>
<figure id="8d77ef1c-3621-40c0-bd0f-f2e05728c522" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6823" aria-describedby="caption-attachment-6823" style="width: 460px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-6823" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS8-001.webp" alt="Photograph: Guardian" width="460" height="324" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS8-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS8-001-300x211.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6823" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<div class="ad-slot-container ad-slot-container-5 offset-right ad-slot--offset-right ad-slot-container--offset-right">
<div id="dfp-ad--inline5" class="js-ad-slot ad-slot ad-slot--inline ad-slot--inline5" data-link-name="ad slot inline5" data-name="inline5" aria-hidden="true">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_13__container__"></div>
</div>
</div>
<p class="dcr-h26idz">The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.</p>
<figure id="00c1e536-a688-4f21-802d-4939523a6e05" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6811" aria-describedby="caption-attachment-6811" style="width: 460px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-6811" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS9-001.webp" alt="Photograph: Guardian" width="460" height="258" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS9-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS9-001-300x168.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6811" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<p class="dcr-h26idz">The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn &#8220;call events&#8221; collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.</p>
<p class="dcr-h26idz">William Binney, a former NSA mathematician, said last year that the agency had &#8220;assembled on the order of 20tn transactions about US citizens with other US citizens&#8221;, an estimate, he said, that &#8220;only was involving phone calls and emails&#8221;. A 2010 Washington Post article reported that &#8220;every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications.&#8221;</p>
<p class="dcr-h26idz">The XKeyscore system is continuously collecting so much internet data that it can be stored only for short periods of time. Content remains on the system for only three to five days, while metadata is stored for 30 days. One document explains: &#8220;At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours.&#8221;</p>
<p class="dcr-h26idz">To solve this problem, the NSA has created a multi-tiered system that allows analysts to store &#8220;interesting&#8221; content in other databases, such as one named Pinwale which can store material for up to five years.</p>
<p class="dcr-h26idz">It is the databases of XKeyscore, one document shows, that now contain the greatest amount of communications data collected by the NSA.</p>
<figure id="7e4f1ce3-2465-4b56-b5bf-56b8682a6ede" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6812" aria-describedby="caption-attachment-6812" style="width: 460px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-6812" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS10-001.webp" alt="Photograph: Guardian" width="460" height="325" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS10-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS10-001-300x212.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6812" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<div class="ad-slot-container ad-slot-container-6 offset-right ad-slot--offset-right ad-slot-container--offset-right">
<div id="dfp-ad--inline6" class="js-ad-slot ad-slot ad-slot--inline ad-slot--inline6" data-link-name="ad slot inline6" data-name="inline6" aria-hidden="true">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_14__container__"></div>
</div>
</div>
<p class="dcr-h26idz">In 2012, there were at least 41 billion total records collected and stored in XKeyscore for a single 30-day period.</p>
<figure id="c1a585ad-590e-41fa-ac56-44338f6f3b94" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6813" aria-describedby="caption-attachment-6813" style="width: 481px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class=" wp-image-6813" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS11-002.webp" alt="Photograph: Guardian" width="481" height="409" /><figcaption id="caption-attachment-6813" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<p class="dcr-h26idz"><strong>Legal v technical restrictions</strong></p>
<p class="dcr-h26idz">While the Fisa Amendments Act of 2008 requires an individualized warrant for the targeting of US persons, NSA analysts are permitted to intercept the communications of such individuals without a warrant if they are in contact with one of the NSA&#8217;s foreign targets.</p>
<p class="dcr-h26idz">The ACLU&#8217;s deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans&#8217; communications without individualized warrants.</p>
<p class="dcr-h26idz">&#8220;The government doesn&#8217;t need to &#8216;target&#8217; Americans in order to collect huge volumes of their communications,&#8221; said Jaffer. &#8220;The government inevitably sweeps up the communications of many Americans&#8221; when targeting foreign nationals for surveillance.</p>
<p class="dcr-h26idz">An example is provided by one XKeyscore document showing an NSA target in Tehran communicating with people in Frankfurt, Amsterdam and New York.</p>
<figure id="ed3b735f-ff29-417c-9753-dfc157d41ab8" class=" dcr-173mewl" data-spacefinder-role="inline" data-spacefinder-type="model.dotcomrendering.pageElements.ImageBlockElement">
<div class="dcr-1t8m8f2">
<figure id="attachment_6814" aria-describedby="caption-attachment-6814" style="width: 714px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class=" wp-image-6814" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS12-001.webp" alt="Photograph: Guardian" width="714" height="399" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS12-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS12-001-300x168.webp 300w" sizes="(max-width: 714px) 100vw, 714px" /><figcaption id="caption-attachment-6814" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
</figure>
<p class="dcr-h26idz">In recent years, the NSA has attempted to segregate exclusively domestic US communications in separate databases. But even NSA documents acknowledge that such efforts are imperfect, as even purely domestic communications can travel on foreign systems, and NSA tools are sometimes unable to identify the national origins of communications.</p>
<p class="dcr-h26idz">Moreover, all communications between Americans and someone on foreign soil are included in the same databases as foreign-to-foreign communications, making them readily searchable without warrants.</p>
<p class="dcr-h26idz">Some searches conducted by NSA analysts are periodically reviewed by their supervisors within the NSA. &#8220;It&#8217;s very rare to be questioned on our searches,&#8221; Snowden told the Guardian in June, &#8220;and even when we are, it&#8217;s usually along the lines of: &#8216;let&#8217;s bulk up the justification&#8217;.&#8221;</p>
<p class="dcr-h26idz">In a letter this week to senator Ron Wyden, director of national intelligence James Clapper acknowledged that NSA analysts have exceeded even legal limits as interpreted by the NSA in domestic surveillance.</p>
<p class="dcr-h26idz">Acknowledging what he called &#8220;a number of compliance problems&#8221;, Clapper attributed them to &#8220;human error&#8221; or &#8220;highly sophisticated technology issues&#8221; rather than &#8220;bad faith&#8221;.</p>
<p class="dcr-h26idz">However, Wyden said on the Senate floor on Tuesday: &#8220;These violations are more serious than those stated by the intelligence community, and are troubling.&#8221;</p>
<p class="dcr-h26idz">In a statement to the Guardian, the NSA said: &#8220;NSA&#8217;s activities are focused and specifically deployed against – and only against – legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests.</p>
<p class="dcr-h26idz">&#8220;XKeyscore is used as a part of NSA&#8217;s lawful foreign signals intelligence collection system.</p>
<p class="dcr-h26idz">&#8220;Allegations of widespread, unchecked analyst access to NSA collection data are simply not true. Access to XKeyscore, as well as all of NSA&#8217;s analytic tools, is limited to only those personnel who require access for their assigned tasks … In addition, there are multiple technical, manual and supervisory checks and balances within the system to prevent deliberate misuse from occurring.&#8221;</p>
<p class="dcr-h26idz">&#8220;Every search by an NSA analyst is fully auditable, to ensure that they are proper and within the law.</p>
<p class="dcr-h26idz">&#8220;These types of programs allow us to collect the information that enables us to perform our missions successfully – to defend the nation and to protect US and allied troops abroad.&#8221;</p>
</div>
</div>
</div>
</div>
</div>
</div>
<h1 data-testid="headline"></h1>
<hr />
<h1 style="text-align: center;" data-testid="headline"><span style="color: #ff0000;"><span style="color: #0000ff;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-6840" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/us-nsa-spying-germany.si_.jpg" alt="" width="690" height="388" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/us-nsa-spying-germany.si_.jpg 690w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/us-nsa-spying-germany.si_-300x169.jpg 300w" sizes="(max-width: 690px) 100vw, 690px" /></span></span></h1>
<h1 style="text-align: center;" data-testid="headline"><span style="color: #ff0000;"><span style="color: #0000ff;">X-</span>K<span style="color: #0000ff;">e</span>y<span style="color: #0000ff;">s</span>c<span style="color: #0000ff;">o</span>r<span style="color: #0000ff;">e<span style="color: #ff0000;">:</span></span></span><br />
<span style="color: #0000ff;">Allows the</span> <span style="color: #ff0000;">NSA</span> <span style="color: #0000ff;">and</span> <span style="color: #ff0000;">Allies</span> <span style="color: #0000ff;">to</span> <span style="color: #ff0000;">Monitor Emails</span><span style="color: #0000ff;">,<br />
</span> <span style="color: #ff0000;">Web Browsing</span><span style="color: #0000ff;">,</span> <span style="color: #ff0000;">Internet Searches</span> a<span style="color: #0000ff;">n</span>d <span style="color: #ff0000;">Social Media</span></h1>
<div class="Post-feature-subtitle-container" data-reactid="111">
<h2 class="Post-feature-subtitle" style="text-align: center;" data-reactid="112"><span style="color: #ff0000;">NSA’s Google</span> for the <span style="color: #0000ff;">World’s Private Communications</span></h2>
</div>
<h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">XKeyscore </span></h1>
<p><b>XKeyscore</b> (<b>XKEYSCORE</b> or <b>XKS</b>) is a secret computer system used by the United States <a title="National Security Agency" href="https://en.wikipedia.org/wiki/National_Security_Agency">National Security Agency</a> (NSA) for searching and analyzing global Internet data, which it collects in <a title="Real-time" href="https://en.wikipedia.org/wiki/Real-time">real time</a>. The NSA has shared XKeyscore with other intelligence agencies, including the <a title="Australian Signals Directorate" href="https://en.wikipedia.org/wiki/Australian_Signals_Directorate">Australian Signals Directorate</a>, Canada&#8217;s <a title="Communications Security Establishment" href="https://en.wikipedia.org/wiki/Communications_Security_Establishment">Communications Security Establishment</a>, New Zealand&#8217;s <a title="Government Communications Security Bureau" href="https://en.wikipedia.org/wiki/Government_Communications_Security_Bureau">Government Communications Security Bureau</a>, Britain&#8217;s <a class="mw-redirect" title="Government Communications Headquarters" href="https://en.wikipedia.org/wiki/Government_Communications_Headquarters">Government Communications Headquarters</a>, Japan&#8217;s <a title="Defense Intelligence Headquarters" href="https://en.wikipedia.org/wiki/Defense_Intelligence_Headquarters">Defense Intelligence Headquarters</a>, and Germany&#8217;s <a class="mw-redirect" title="Bundesnachrichtendienst" href="https://en.wikipedia.org/wiki/Bundesnachrichtendienst">Bundesnachrichtendienst</a>.<sup id="cite_ref-Snowden_Interview_Transcript_1-0" class="reference"><a href="https://en.wikipedia.org/wiki/XKeyscore#cite_note-Snowden_Interview_Transcript-1">[1]</a></sup></p>
<p>In July 2013, <a title="Edward Snowden" href="https://en.wikipedia.org/wiki/Edward_Snowden">Edward Snowden</a> publicly revealed the program&#8217;s purpose and use by the NSA in <i><a title="The Sydney Morning Herald" href="https://en.wikipedia.org/wiki/The_Sydney_Morning_Herald">The Sydney Morning Herald</a></i> and <i><a title="O Globo" href="https://en.wikipedia.org/wiki/O_Globo">O Globo</a></i> newspapers. The code name was already public knowledge because it was mentioned in earlier articles, and, like many other code names, it appears in job postings and online <a title="Résumé" href="https://en.wikipedia.org/wiki/R%C3%A9sum%C3%A9">résumés</a> of employees.<sup id="cite_ref-Guardian3_2-0" class="reference"><a href="https://en.wikipedia.org/wiki/XKeyscore#cite_note-Guardian3-2">[2]</a></sup><sup id="cite_ref-StrangeCreatures_3-0" class="reference"><a href="https://en.wikipedia.org/wiki/XKeyscore#cite_note-StrangeCreatures-3">[3]</a></sup></p>
<p>On July 3, 2014, German <a title="Public broadcasting" href="https://en.wikipedia.org/wiki/Public_broadcasting">public broadcaster</a> <a title="Norddeutscher Rundfunk" href="https://en.wikipedia.org/wiki/Norddeutscher_Rundfunk">Norddeutscher Rundfunk</a>, a member of <a title="ARD (broadcaster)" href="https://en.wikipedia.org/wiki/ARD_(broadcaster)">ARD</a>, published excerpts of XKeyscore&#8217;s source code.<sup id="cite_ref-ARD_4-0" class="reference"><a href="https://en.wikipedia.org/wiki/XKeyscore#cite_note-ARD-4">[4]</a></sup> A team of experts analyzed the source code.<sup id="cite_ref-NDR_5-0" class="reference"><a href="https://en.wikipedia.org/wiki/XKeyscore#cite_note-NDR-5">[5]</a></sup> <a href="https://en.wikipedia.org/wiki/XKeyscore" target="_blank" rel="noopener">cited</a></p>
<div>
<hr />
<h1 style="text-align: center;" data-testid="headline"><img loading="lazy" decoding="async" class=" wp-image-6832 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/12225549305_1850d9c45a_b.jpg" alt="" width="541" height="415" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/12225549305_1850d9c45a_b.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/12225549305_1850d9c45a_b-300x230.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/12225549305_1850d9c45a_b-768x590.jpg 768w" sizes="(max-width: 541px) 100vw, 541px" />X-Keyscore spy program tracks &#8216;nearly all&#8217; web use</h1>
</div>
<div>
<h5 style="text-align: center;">BY <a href="https://www.smh.com.au/technology/xkeyscore-spy-program-tracks-nearly-all-web-use-20130802-hv17w.html" target="_blank" rel="noopener"><span data-testid="byline">Philip Dorling</span></a></h5>
</div>
<div>Top-secret US intelligence documents leaked by whistleblower Edward Snowden have revealed details of a key signals intelligence program used by the Australian intelligence community to harvest internet and telecommunications traffic across the Asia-Pacific region.</div>
<div>The system known as X-Keyscore allows the US National Security Agency and international partners including Australia to monitor &#8221;nearly everything a typical user does on the internet&#8221;, according to the leaked documents published by Britain&#8217;s Guardian newspaper.</div>
<div>
<figure id="attachment_6809" aria-describedby="caption-attachment-6809" style="width: 431px" class="wp-caption alignright"><img loading="lazy" decoding="async" class=" wp-image-6809" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/c25ce7ebab9bf4296aa1be2a783b7eb495bb7d2a.webp" alt="X-Keyscore: Allows the NSA and allies to monitor emails, web browsing, internet searches and social media.CREDIT:MAYU KANAMORI/JESSICA HROMAS" width="431" height="243" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/c25ce7ebab9bf4296aa1be2a783b7eb495bb7d2a.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/c25ce7ebab9bf4296aa1be2a783b7eb495bb7d2a-300x169.webp 300w" sizes="(max-width: 431px) 100vw, 431px" /><figcaption id="caption-attachment-6809" class="wp-caption-text"><span style="color: #ff6600;"><em>X-Keyscore: Allows the NSA and allies to monitor emails, web browsing, internet searches and social media.CREDIT:MAYU KANAMORI/JESSICA HROMAS</em></span></figcaption></figure>
</div>
<div></div>
<div>According to classified intelligence training materials, X-Keyscore allows the NSA and its allied partners to comprehensively monitor the emails, web browsing, internet searches and social media use of targets.</div>
<div>This includes &#8221;real-time target activity [tipping]&#8221; and a &#8221;rolling buffer of three days of all unfiltered data&#8221; with the &#8221;full take&#8221; stored at collection facilities &#8211; enabling analysts to retrospectively access the communications of newly identified targets.</div>
<div>Significantly, all the secret documents are classified as available to personnel from <a href="http://www.smh.com.au/it-pro/security-it/five-eyes-spying-alliance-will-survive-edward-snowden-experts-20130718-hv0xw.html">&#8221;Five-eyes&#8221; intelligence partners</a>: the US, UK, Canada, Australia and New Zealand.</div>
<div>Australian intelligence sources recently confirmed to Fairfax Media that Australia&#8217;s electronic espionage agency, the Defence Signals Directorate, was a &#8221;full partner&#8221; in the program.</div>
<div>It is claimed that by 2008 more than 300 terrorists had been captured thanks to intelligence from X-Keyscore.</div>
<div>However, Australian intelligence sources emphasise the reach of the system for diplomatic, political and economic intelligence collection on &#8221;targets of interest across the whole Asia-Pacific&#8221; &#8211; including China, Indonesia, Malaysia, India, Sri Lanka and Pakistan.</div>
<div>Advertisement</div>
<div></div>
<div>Documents previously disclosed by Mr Snowden identified Australian signals intelligence facilities at Geraldton in Western Australia, Shoal Bay near Darwin, HMAS Harman near Canberra and the US-Australian Joint Defence Facility at Pine Gap near Alice Springs as contributors to the global collection of internet and telecoms traffic under the X-Keyscore program.</div>
<div><a href="http://www.canberratimes.com.au/it-pro/government-it/australia-gets-deluge-of-us-secret-data-prompting-a-new-data-facility-20130612-2o4kf.html">Fairfax recently reported the construction of a new data storage facility</a> at HMAS Harman to support the surge in data collection by Australian intelligence agencies.</div>
<div>Last week the US House of Representatives only narrowly voted down a proposal to defund the NSA&#8217;s ability to collect electronic information, including phone call records.</div>
<div>But President Barack Obama has been forced to <a href="http://www.smh.com.au/it-pro/security-it/us-declassifies-nsa-program-as-further-disclosure-emerges-20130801-hv177.html">declassify aspects of the surveillance programs</a>.</div>
<div>Democrat senator Dianne Feinstein &#8211; the chairwoman of the US Senate intelligence committee and a staunch supporter of the wide-ranging electronic surveillance &#8211; says she is looking into reforms including greater public reporting of phone interception and meta-data collection statistics</div>
<div>Australian diplomat cables show close consultation between US and Australian officials about Mr Snowden&#8217;s disclosures. However, most details have been redacted on the grounds they would reveal confidential discussions or &#8221;comment and analysis of any implications of Snowden&#8217;s breach for Australian communications systems&#8221;.</div>
<div>NSA director General Keith Alexander, who is also Commander of the United States Cyber Command, <a href="http://www.smh.com.au/it-pro/security-it/nsa-chief-defends-surveillance-at-black-hat-security-conference-20130801-hv174.html">defended the surveillance programs this week</a> at the annual Black Hat computer security conference in Las Vegas.</div>
<div></div>
<div>
<hr />
</div>
<div>
<hr />
</div>
<div>
<div data-reactid="192">
<div class="Post-feature-title-container" data-reactid="108">
<h1 class="Post-feature-title" style="text-align: center;" data-reactid="109">XKEYSCORE</h1>
</div>
<div class="Post-feature-subtitle-container" data-reactid="111">
<h2 class="Post-feature-subtitle" style="text-align: center;" data-reactid="112">NSA’s Google for the World’s Private Communications</h2>
<p><span class="disable-staff-detail" data-reactid="171">Morgan Marquis-Boire</span>, <a class="PostByline-link" href="https://theintercept.com/staff/glenn-greenwald/" rel="author" data-reactid="173"><span data-reactid="174">Glenn Greenwald</span></a>, <a class="PostByline-link" href="https://theintercept.com/staff/micah-lee/" rel="author" data-reactid="176"><span data-reactid="177">Micah Lee</span></a> cited <a href="https://theintercept.com/2015/07/01/nsas-google-worlds-private-communications/" target="_blank" rel="noopener">theintercept.com</a></p>
</div>
<p><u>ONE OF THE</u> National Security Agency’s most powerful tools of mass surveillance makes tracking someone’s Internet usage as easy as entering an email address, and provides no built-in technology to prevent abuse. Today, <em>The Intercept</em> is publishing 48 top-secret and other classified documents about XKEYSCORE dated up to 2013, which shed new light on the breadth, depth and functionality of this critical spy system — one of the largest releases yet of documents provided by NSA whistleblower Edward Snowden.</p>
<p>The NSA’s XKEYSCORE program, first <a href="http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data">revealed</a> by <em>The Guardian</em>, sweeps up countless people’s Internet searches, emails, documents, usernames and passwords, and other private communications. XKEYSCORE is fed a constant flow of Internet traffic from <a href="https://web.archive.org/web/20150123062050/https://www.eff.org/files/2014/06/23/report_on_the_nsas_access_to_tempora.pdf">fiber optic cables</a> that make up the backbone of the world’s communication network, among other sources, for processing. As of 2008, the surveillance system boasted approximately 150 field sites in the United States, Mexico, Brazil, United Kingdom, Spain, Russia, Nigeria, Somalia, Pakistan, Japan, Australia, as well as many other countries, consisting of over 700 servers.</p>
<p>These servers store “full-take data” at the collection sites — meaning that they captured all of the traffic collected — and, as of 2009, stored content for 3 to 5 days and metadata for 30 to 45 days. NSA documents indicate that tens of billions of records are stored in its database. “It is a fully distributed processing and query system that runs on machines around the world,” an NSA briefing on XKEYSCORE says. “At field sites, XKEYSCORE can run on multiple computers that gives it the ability to scale in both processing power and storage.”</p>
</div>
<div class="img-wrap align-center width-fixed" data-reactid="193">
<div data-reactid="194">
<figure id="attachment_6826" aria-describedby="caption-attachment-6826" style="width: 568px" class="wp-caption alignright"><img loading="lazy" decoding="async" class=" wp-image-6826" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-2.webp" alt="Illustration: Blue Delliquanti and David Axe for The Intercept" width="568" height="465" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-2.webp 1100w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-2-300x245.webp 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-2-1024x838.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-2-768x628.webp 768w" sizes="(max-width: 568px) 100vw, 568px" /><figcaption id="caption-attachment-6826" class="wp-caption-text"><em><span style="color: #ff6600;">Illustration: Blue Delliquanti and David Axe for The Intercept</span></em></figcaption></figure>
</div>
</div>
<div data-reactid="195">
<p>XKEYSCORE also collects and processes Internet traffic from Americans, though NSA analysts are taught to avoid querying the system in ways that might result in spying on U.S. data. Experts and privacy activists, however, have long doubted that such exclusions are effective in preventing large amounts of American data from being swept up. One document <em>The Intercept</em> is publishing today suggests that FISA warrants have authorized “full-take” collection of traffic from at least some U.S. web forums.</p>
<p>The system is not limited to collecting web traffic. The 2013 document, “VoIP Configuration and Forwarding Read Me,” details how to forward VoIP data from XKEYSCORE into NUCLEON, NSA’s repository for voice intercepts, facsimile, video and “pre-released transcription.” At the time, it supported more than 8,000 users globally and was made up of 75 servers absorbing 700,000 voice, fax, video and tag files per day.</p>
<p>The reach and potency of XKEYSCORE as a surveillance instrument is astonishing. The <a href="http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data"><em>Guardian</em> report</a> noted that NSA itself refers to the program as its “widest reaching” system. In February of this year, <em>The Intercept</em> <a href="https://firstlook.org/theintercept/2015/02/19/great-sim-heist/">reported</a> that NSA and GCHQ hacked into the internal network of Gemalto, the world’s largest provider of cell phone SIM cards, in order to steal millions of encryption keys used to protect the privacy of cell phone communication. XKEYSCORE played a vital role in the spies’ hacking by providing government hackers access to the email accounts of Gemalto employees.</p>
<p>Numerous key NSA partners, including Canada, New Zealand and the U.K., have access to the mass surveillance databases of XKEYSCORE. In March, the <em>New Zealand Herald</em>, in partnership with <em>The Intercept</em>, <a href="https://firstlook.org/theintercept/2015/03/22/new-zealand-gcsb-spying-wto-director-general/">revealed</a> that the New Zealand government used XKEYSCORE to spy on candidates for the position of World Trade Organization director general and also members of the <a href="https://firstlook.org/theintercept/2015/03/14/new-zealand-xkeyscore-solomon-islands-nsa-targets/">Solomon Islands government</a>.</p>
<p>These newly published documents demonstrate that collected communications not only include emails, chats and web-browsing traffic, but also pictures, documents, voice calls, webcam photos, web searches, advertising analytics traffic, social media traffic, botnet traffic, logged keystrokes, computer network exploitation (CNE) targeting, intercepted username and password pairs, file uploads to online services, Skype sessions and more.</p>
<h3>Bulk collection and population surveillance</h3>
<p>XKEYSCORE allows for incredibly broad surveillance of people based on perceived patterns of suspicious behavior. It is possible, for instance, to query the system to show the activities of people based on their location, nationality and websites visited. For instance, one slide displays the search “germansinpakistn,” showing an analyst querying XKEYSCORE for all <a href="https://www.documentcloud.org/documents/2116488-xks-targets-visiting-specific-websites.html#document/p1">individuals in Pakistan visiting specific German language message boards</a>.</p>
<p>As sites like Twitter and Facebook become increasingly significant in the world’s day-to-day communications (a Pew study <a href="http://www.pewinternet.org/fact-sheets/social-networking-fact-sheet/">shows</a> that 71 percent of online adults in the U.S. use Facebook), they become a critical source of surveillance data. Traffic from popular social media sites is described as “a great starting point” for tracking individuals, according to an XKEYSCORE <a href="https://www.documentcloud.org/documents/2116185-tracking-targets-on-online-social-networks.html#document/p19">presentation</a> titled “Tracking Targets on Online Social Networks.”</p>
<p>When intelligence agencies collect massive amounts of Internet traffic all over the world, they face the challenge of making sense of that data. The vast quantities collected make it difficult to connect the stored traffic to specific individuals.</p>
<p>Internet companies have also encountered this problem and have solved it by tracking their users with identifiers that are unique to each individual, often in the form of browser cookies. Cookies are small pieces of data that websites store in visitors’ browsers. They are used for a variety of purposes, including authenticating users (cookies make it possible to log in to websites), storing preferences, and uniquely tracking individuals even if they’re using the same IP address as many other people. Websites also embed code used by third-party services to collect analytics or host ads, which also use cookies to track users. According to <a href="https://www.documentcloud.org/documents/2115979-advanced-http-activity-analysis.html#document/p52">one slide</a>, “Almost all websites have cookies enabled.”</p>
<p>The NSA’s ability to piggyback off of private companies’ tracking of their own users is a vital instrument that allows the agency to trace the data it collects to individual users. It makes no difference if visitors switch to public Wi-Fi networks or connect to VPNs to change their IP addresses: the tracking cookie will follow them around as long as they are using the same web browser and fail to clear their cookies.</p>
</div>
<div class="img-wrap align-center width-fixed" data-reactid="196">
<div data-reactid="197">
<figure id="attachment_6827" aria-describedby="caption-attachment-6827" style="width: 532px" class="wp-caption alignleft"><img loading="lazy" decoding="async" class=" wp-image-6827" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-3.webp" alt="Illustration: Blue Delliquanti and David Axe for The Intercept" width="532" height="435" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-3.webp 1100w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-3-300x245.webp 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-3-1024x838.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-3-768x628.webp 768w" sizes="(max-width: 532px) 100vw, 532px" /><figcaption id="caption-attachment-6827" class="wp-caption-text"><em><span style="color: #ff6600;">Illustration: Blue Delliquanti and David Axe for The Intercept</span></em></figcaption></figure>
</div>
</div>
<div data-reactid="198">
<p>Apps that run on tablets and smartphones also use analytics services that uniquely track users. Almost every time a user sees an advertisement (in an app or in a web browser), the ad network is tracking users in the same way. A <a href="https://firstlook.org/theintercept/2015/01/26/secret-badass-spy-program/">secret GCHQ and CSE program called BADASS</a>, which is similar to XKEYSCORE but with a much narrower scope, mines as much valuable information from leaky smartphone apps as possible, including unique tracking identifiers that app developers use to track their own users. In May of this year, CBC, in partnership with <em>The Intercept</em>, <a href="https://firstlook.org/theintercept/2015/05/21/nsa-five-eyes-google-samsung-app-stores-spyware/">revealed</a> that XKEYSCORE was used to track smartphone connections to the app marketplaces run by Samsung and Google. Surveillance agency analysts also use other types of traffic data that gets scooped into XKEYSCORE to track people, such as <a href="http://arstechnica.com/business/2013/12/why-nsa-spied-on-inexplicably-unencrypted-windows-crash-reports/">Windows crash reports</a>.</p>
<p>In a statement to <em>The Intercept</em>, the NSA reiterated its position that such sweeping surveillance capabilities are needed to fight the War on Terror:</p>
<p>“The U.S. Government calls on its intelligence agencies to protect the United States, its citizens, and its allies from a wide array of serious threats. These threats include terrorist plots from al-Qaeda, ISIL, and others; the proliferation of weapons of mass destruction; foreign aggression against the United States and our allies; and international criminal organizations.”</p>
<p>Indeed, one of the specific examples of XKEYSCORE applications given in the documents is spying on Shaykh Atiyatallah, an al Qaeda senior leader and Osama bin Laden confidant. A few years before his death, Atiyatallah did what many people have often done: He googled himself. He searched his various aliases, an associate and the name of his book. As he did so, all of that information was captured by XKEYSCORE.</p>
<p>XKEYSCORE has, however, also been used to spy on non-terrorist targets. The April 18, 2013 issue of the internal NSA publication Special Source Operations Weekly <a href="https://firstlook.org/theintercept/document/2015/07/01/un-secretary-general-xks/">boasts</a> that analysts were successful in using XKEYSCORE to obtain U.N. Secretary General Ban Ki-moon’s talking points prior to a meeting with President Obama.</p>
</div>
<div class="img-wrap align-center width-fixed" data-reactid="199">
<div data-reactid="200">
<figure id="attachment_6828" aria-describedby="caption-attachment-6828" style="width: 649px" class="wp-caption alignright"><img loading="lazy" decoding="async" class=" wp-image-6828" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-4.webp" alt="Illustration: Blue Delliquanti and David Axe for The Intercept" width="649" height="531" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-4.webp 1100w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-4-300x245.webp 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-4-1024x838.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/int-ink-4-768x628.webp 768w" sizes="(max-width: 649px) 100vw, 649px" /><figcaption id="caption-attachment-6828" class="wp-caption-text"><em><span style="color: #ff6600;">Illustration: Blue Delliquanti and David Axe for The Intercept</span></em></figcaption></figure>
</div>
</div>
<div data-reactid="201">
<h3></h3>
<h3></h3>
<h3>XKEYSCORE for hacking: Easily collecting user names, passwords and much more</h3>
<p>XKEYSCORE plays a central role in how the U.S. government and its surveillance allies hack computer networks around the world. One top-secret 2009 NSA document describes how the system is used by the NSA to gather information for the Office of Tailored Access Operations, an NSA division responsible for Computer Network Exploitation (CNE) — i.e., targeted hacking.</p>
<p>Particularly in 2009, the hacking tactics enabled by XKEYSCORE would have yielded significant returns as use of encryption was less widespread than today. Jonathan Brossard, a security researcher and the CEO of Toucan Systems, told <em>The Intercept</em>: “Anyone could be trained to do this in less than one day: they simply enter the name of the server they want to hack into XKEYSCORE, type enter, and are presented login and password pairs to connect to this machine. Done. Finito.” <a href="https://firstlook.org/theintercept/2014/03/20/inside-nsa-secret-efforts-hunt-hack-system-administrators/">Previous reporting</a> by <em>The Intercept</em> revealed that systems administrators are a popular target of the NSA. “Who better to target than the person that already has the ‘keys to the kingdom?’” <span class="s1">read a 2012 post on an internal NSA discussion board.</span></p>
<p>This system enables analysts to access web mail servers with <a href="https://www.documentcloud.org/documents/2116255-using-xks-to-enable-tao.html#document/p35">remarkable ease</a>.</p>
<p>The same methods are used to steal the credentials — user names and passwords — of individual users of <a href="https://www.documentcloud.org/documents/2116268-web-forum-exploitation-using-xks.html#document/p2">message boards</a>.</p>
<p><a href="https://www.documentcloud.org/documents/2153970-osint-fusion-project.html#document/p6">Hacker forums</a> are also monitored for people selling or using exploits and other hacking tools. While the NSA is clearly monitoring to understand the capabilities developed by its adversaries, it is also monitoring locations where such capabilities can be purchased.</p>
<p>Other information gained via XKEYSCORE facilitates the remote exploitation of target computers. By extracting browser fingerprint and operating system versions from Internet traffic, the system allows analysts to quickly assess the <a href="https://www.documentcloud.org/documents/2116373-xks-intro.html#document/p24">exploitability of a target</a>. Brossard, the security researcher, said that “NSA has built an impressively complete set of automated hacking tools for their analysts to use.”</p>
<p>Given the breadth of information collected by XKEYSCORE, accessing and exploiting a target’s online activity is a matter of a few mouse clicks. Brossard explains: “The amount of work an analyst has to perform to actually break into remote computers over the Internet seems ridiculously reduced — we are talking minutes, if not seconds. Simple. As easy as typing a few words in Google.”</p>
<p>These facts bolster one of Snowden’s most controversial statements, made in his <a href="http://www.theguardian.com/world/video/2013/jun/09/nsa-whistleblower-edward-snowden-interview-video">first video interview published by <em>The Guardian</em></a> on June 9, 2013. “I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge to even the president, if I had a personal email.”</p>
<p>Indeed, training documents for XKEYSCORE repeatedly highlight how user-friendly the program is: with just a few clicks, any analyst with access to it can conduct sweeping searches simply by entering a person’s email address, telephone number, name or other identifying data. There is no indication in the documents reviewed that prior approval is needed for specific searches.</p>
<p>In addition to login credentials and other target intelligence, XKEYSCORE collects <a href="https://www.documentcloud.org/documents/2116255-using-xks-to-enable-tao.html#document/p5">router configuration information</a>, which it shares with Tailored Access Operations. The office is able to exploit routers and then feed the traffic traveling through those routers into their collection infrastructure. This allows the NSA to spy on traffic from otherwise out-of-reach networks. XKEYSCORE documents reference router configurations, and <a href="http://www.spiegel.de/media/media-35672.pdf">a document previously published by <em>Der Spiegel</em></a> shows that “active implants” can be used to “cop[y] traffic and direc[t]” it past a passive collector.</p>
<h3>XKEYSCORE for counterintelligence</h3>
<p>Beyond enabling the collection, categorization, and querying of metadata and content, XKEYSCORE has also been used to monitor the surveillance and hacking actions of foreign nation states and to gather the fruits of their hacking. <em>The Intercept</em> <a href="https://firstlook.org/theintercept/2015/02/04/demonize-prosecute-hackers-nsa-gchq-rely-intel-expertise/">previously reported</a> that NSA and its allies spy on hackers in order to collect what they collect.</p>
<p>Once the hacking tools and techniques of a foreign entity (for instance, <a href="https://www.documentcloud.org/documents/2116354-xks-for-counter-cne.html#document/p16">South Korea</a>) are identified, analysts can then extract the country’s espionage targets from XKEYSCORE, and gather information that the foreign power has managed to steal.</p>
<p>Monitoring of foreign state hackers could allow the NSA to gather techniques and tools used by foreign actors, including knowledge of zero-day exploits—software bugs that allow attackers to hack into systems, and that not even the software vendor knows about—and implants. Additionally, by monitoring vulnerability reports sent to vendors such as <a href="https://firstlook.org/theintercept/2015/06/22/nsa-gchq-targeted-kaspersky/">Kaspersky</a>, the agency could learn when exploits they were actively using need to be retired because they’ve been discovered by a third party.</p>
<h3>Seizure v. searching: Oversight, audit trail and the Fourth Amendment</h3>
<p>By the nature of how it sweeps up information, XKEYSCORE gathers communications of Americans, despite the Fourth Amendment protection against “unreasonable search and seizure” — including searching data without a warrant. The NSA says it does not target U.S. citizens’ communications without a warrant, but acknowledges that it “incidentally” collects and reads some of it without one, minimizing the information that is retained or shared.</p>
<p>But that interpretation of the law is dubious at best.</p>
<p>XKEYSCORE training documents say that the “burden is on user/auditor to comply with USSID-18 or other rules,” apparently including the British Human Rights Act (HRA), which protects the rights of U.K. citizens. U.S. Signals Intelligence Directive 18 (USSID 18) is the American directive that governs “U.S. person minimization.”</p>
<p>Kurt Opsahl, the Electronic Frontier Foundation’s general counsel, describes USSID 18 as “an attempt by the intelligence community to comply with the Fourth Amendment. But it doesn’t come from a court, it comes from the executive.”</p>
<p>If, for instance, an analyst searched XKEYSCORE for all iPhone users, this query would <a href="https://www.documentcloud.org/documents/2116130-intro-to-xks-appids-and-fingerprints.html#document/p41">violate USSID 18</a> due to the inevitable American iPhone users that would be grabbed without a warrant, as the NSA’s own training materials make clear.</p>
<p>Opsahl believes that analysts are not prevented by technical means from making queries that violate USSID 18. “The document discusses whether auditors will be happy or unhappy. This indicates that compliance will be achieved by after-the-fact auditing, not by preventing the search.”</p>
<p>Screenshots of the XKEYSCORE web-based user interface included in slides show that analysts see a prominent warning message: “This system is audited for USSID 18 and Human Rights Act compliance.” When analysts log in to the system, they see a more detailed message warning that “an audit trail has been established and will be searched” in response to HRA complaints, and as part of the USSID 18 and USSID 9 audit process.</p>
<p>Because the XKEYSCORE system does not appear to prevent analysts from making queries that would be in violation of these rules, Opsahl concludes that “there’s a tremendous amount of power being placed in the hands of analysts.” And while those analysts may be subject to audits, “at least in the short term they can still obtain information that they shouldn’t have.”</p>
<p>During a <a href="http://computefest.seas.harvard.edu/symposium">symposium</a> in January 2015 hosted at Harvard University, Edward Snowden, who spoke via video call, said that NSA analysts are “completely free from any meaningful oversight.” Speaking about the people who audit NSA systems like XKEYSCORE for USSID 18 compliance, he said, “The majority of the people who are doing the auditing are the friends of the analysts. They work in the same office. They’re not full-time auditors, they’re guys who have other duties assigned. There are a few traveling auditors who go around and look at the things that are out there, but really it’s not robust.”</p>
<p>In a statement to <em>The Intercept</em>, the NSA said:</p>
<p>“The National Security Agency’s foreign intelligence operations are 1) authorized by law; 2) subject to multiple layers of stringent internal and external oversight; and 3) conducted in a manner that is designed to protect privacy and civil liberties. As provided for by Presidential Policy Directive 28 (PPD-28), all persons, regardless of their nationality, have legitimate privacy interests in the handling of their personal information. NSA goes to great lengths to narrowly tailor and focus its signals intelligence operations on the collection of communications that are most likely to contain foreign intelligence or counterintelligence information.”</p>
</div>
</div>
<div></div>
<div></div>
<div></div>
<div>
<hr />
</div>
<div>
<h1>XKeyscore presentation from 2008 – read in full</h1>
<div id="stand-first" class="stand-first-alone" data-component="Document:standfirst_cta">Training materials for the XKeyscore program detail how analysts can use it and other systems to mine enormous agency databases and develop intelligence from the web</div>
</div>
<div></div>
<div></div>
<div><iframe src="https://beta.documentcloud.org/documents/743252-nsa-pdfs-redacted-ed?sidebar=0&amp;pdf=0" width="640" height="480"><span data-mce-type="bookmark" style="display: inline-block; width: 0px; overflow: hidden; line-height: 0;" class="mce_SELRES_start">﻿</span><span data-mce-type="bookmark" style="display: inline-block; width: 1000px; overflow: hidden; line-height: 0;" class="mce_SELRES_start"><span data-mce-type="bookmark" style="display: inline-block; width: 0px; overflow: hidden; line-height: 0;" class="mce_SELRES_start">﻿</span><span data-mce-type="bookmark" style="display: inline-block; width: 0px; overflow: hidden; line-height: 0;" class="mce_SELRES_start">﻿</span>﻿</span></iframe></div>
<div></div>
<div></div>
<div></div>
<div>
<hr />
</div>
<div></div>
<h1 style="text-align: center;">XKeyscore: NSA tool collects &#8216;nearly everything a user does on the internet&#8217;</h1>
<div style="text-align: center;">written by <a href="https://www.theguardian.com/profile/glenn-greenwald" rel="author" data-link-name="auto tag link">Glenn Greenwald</a> <a href="https://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data" target="_blank" rel="noopener">cited</a></div>
<ul>
<li><strong>XKeyscore gives &#8216;widest-reaching&#8217; collection of online data</strong></li>
<li><strong>NSA analysts require no prior authorization for searches</strong></li>
<li><strong>Sweeps up emails, social media activity and browsing history</strong></li>
</ul>
<div></div>
<div></div>
<div></div>
<div></div>
<div>
<figure id="attachment_6816" aria-describedby="caption-attachment-6816" style="width: 783px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class=" wp-image-6816" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/XKeyscore-map-010.webp" alt="One presentation claims the XKeyscore program covers 'nearly everything a typical user does on the internet'" width="783" height="470" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/XKeyscore-map-010.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/XKeyscore-map-010-300x180.webp 300w" sizes="(max-width: 783px) 100vw, 783px" /><figcaption id="caption-attachment-6816" class="wp-caption-text"><em><span style="color: #ff6600;">One presentation claims the XKeyscore program covers &#8216;nearly everything a typical user does on the internet&#8217;</span></em></figcaption></figure>
</div>
<div>
<div></div>
</div>
<div></div>
<div>A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.</div>
<div>The <a href="https://www.theguardian.com/us-news/nsa" data-component="auto-linked-tag" data-link-name="in body link">NSA</a> boasts in training materials that the program, called XKeyscore, is its &#8220;widest-reaching&#8221; system for developing intelligence from the internet.</div>
<div>The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to <a href="https://www.theguardian.com/world/the-nsa-files" data-link-name="in body link">the Guardian&#8217;s earlier stories</a> on bulk collection of phone records and Fisa surveillance court oversight.</div>
<div>The files shed light on one of Snowden&#8217;s most controversial statements, made in his <a href="https://www.theguardian.com/world/video/2013/jun/09/nsa-whistleblower-edward-snowden-interview-video" data-link-name="in body link">first video interview published by the Guardian</a> on June 10.</div>
<div>&#8220;I, sitting at my desk,&#8221; said Snowden, could &#8220;wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email&#8221;.</div>
<div>US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden&#8217;s assertion: &#8220;He&#8217;s lying. It&#8217;s impossible for him to do what he was saying he could do.&#8221;</div>
<div>But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.</div>
<div>XKeyscore, the documents boast, is the NSA&#8217;s &#8220;widest reaching&#8221; system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers &#8220;nearly everything a typical user does on the internet&#8221;, including the content of emails, websites visited and searches, as well as their metadata.</div>
<div>Analysts can also use XKeyscore and other NSA systems to obtain ongoing &#8220;real-time&#8221; interception of an individual&#8217;s internet activity.</div>
<div>Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a &#8216;US person&#8217;, though no such warrant is required for intercepting the communications of Americans with foreign targets. But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.</div>
<div>One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst&#8217;s ability to query the databases at any time.</div>
<div>
<figure id="attachment_6817" aria-describedby="caption-attachment-6817" style="width: 460px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-6817" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS1-001.webp" alt="Photograph: Guardian" width="460" height="347" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS1-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS1-001-300x226.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6817" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div></div>
<div>The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a &#8220;selector&#8221; in NSA parlance) associated with the individual being targeted.</div>
<div>Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.</div>
<div>One document notes that this is because &#8220;strong selection [search by email address] itself gives us only a very limited capability&#8221; because &#8220;a large amount of time spent on the web is performing actions that are anonymous.&#8221;</div>
<div>The NSA documents assert that by 2008, 300 terrorists had been captured using intelligence from XKeyscore.</div>
<div>Analysts are warned that searching the full database for content will yield too many results to sift through. Instead they are advised to use the metadata also stored in the databases to narrow down what to review.</div>
<div>A slide entitled &#8220;plug-ins&#8221; in a December 2012 document describes the various fields of information that can be searched. It includes &#8220;every email address seen in a session by both username and domain&#8221;, &#8220;every phone number seen in a session (eg address book entries or signature block)&#8221; and user activity – &#8220;the webmail and chat activity to include username, buddylist, machine specific cookies etc&#8221;.</div>
<div>Email monitoring</div>
<div>In a second Guardian interview in June, Snowden elaborated on his statement about being able to read any individual&#8217;s email if he had their email address. He said the claim was based in part on the email search capabilities of XKeyscore, which Snowden says he was authorized to use while working as a Booz Allen contractor for the NSA.</div>
<div>One top-secret document describes how the program &#8220;searches within bodies of emails, webpages and documents&#8221;, including the &#8220;To, From, CC, BCC lines&#8221; and the &#8216;Contact Us&#8217; pages on websites&#8221;.</div>
<div>To search for emails, an analyst using XKS enters the individual&#8217;s email address into a simple online search form, along with the &#8220;justification&#8221; for the search and the time period for which the emails are sought.</div>
<div></div>
<div>
<figure id="attachment_6818" aria-describedby="caption-attachment-6818" style="width: 519px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class=" wp-image-6818" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS2-001.webp" alt="Photograph: Guardian" width="519" height="354" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS2-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS2-001-300x205.webp 300w" sizes="(max-width: 519px) 100vw, 519px" /><figcaption id="caption-attachment-6818" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div></div>
<div>
<figure id="attachment_6819" aria-describedby="caption-attachment-6819" style="width: 460px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-6819" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS3edit2-001.webp" alt="Photograph: Guardian" width="460" height="345" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS3edit2-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS3edit2-001-300x225.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6819" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div>The analyst then selects which of those returned emails they want to read by opening them in NSA reading software.</div>
<div>The system is similar to the way in which NSA analysts generally can intercept the communications of anyone they select, including, as one NSA document put it, &#8220;communications that transit the United States and communications that terminate in the United States&#8221;.</div>
<div>One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications. Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:</div>
<div>
<figure id="attachment_6820" aria-describedby="caption-attachment-6820" style="width: 460px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-6820" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS4-001.webp" alt="Photograph: Guardian" width="460" height="353" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS4-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS4-001-300x230.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6820" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div></div>
<div>Chats, browsing history and other internet activity</div>
<div>Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.</div>
<div>An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.</div>
<div>
<figure id="attachment_6815" aria-describedby="caption-attachment-6815" style="width: 460px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-6815" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS55edit-001.webp" alt="Photograph: Guardian" width="460" height="333" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS55edit-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS55edit-001-300x217.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6815" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div></div>
<div>An analyst can monitor such Facebook chats by entering the Facebook user name and a date range into a simple search screen.</div>
<div>
<figure id="attachment_6821" aria-describedby="caption-attachment-6821" style="width: 460px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-6821" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS6-001.webp" alt="Photograph: Guardian" width="460" height="314" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS6-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS6-001-300x205.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6821" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div></div>
<div>Analysts can search for internet browsing activities using a wide range of information, including search terms entered by the user or the websites viewed.</div>
<div>
<figure id="attachment_6822" aria-describedby="caption-attachment-6822" style="width: 460px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-6822" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS7-001.webp" alt="Photograph: Guardian" width="460" height="329" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS7-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS7-001-300x215.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6822" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div></div>
<div>As one slide indicates, the ability to search HTTP activity by keyword permits the analyst access to what the NSA calls &#8220;nearly everything a typical user does on the internet&#8221;.</div>
<div>
<figure id="attachment_6823" aria-describedby="caption-attachment-6823" style="width: 460px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-6823" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS8-001.webp" alt="Photograph: Guardian" width="460" height="324" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS8-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS8-001-300x211.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6823" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div></div>
<div>The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.</div>
<div>
<figure id="attachment_6811" aria-describedby="caption-attachment-6811" style="width: 460px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-6811" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS9-001.webp" alt="Photograph: Guardian" width="460" height="258" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS9-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS9-001-300x168.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6811" class="wp-caption-text"><span style="color: #ff6600;"><em>Photograph: Guardian</em></span></figcaption></figure>
</div>
<div></div>
<div>The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn &#8220;call events&#8221; collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.</div>
<div>William Binney, a former NSA mathematician, said last year that the agency had &#8220;assembled on the order of 20tn transactions about US citizens with other US citizens&#8221;, an estimate, he said, that &#8220;only was involving phone calls and emails&#8221;. A 2010 Washington Post article reported that &#8220;every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications.&#8221;</div>
<div>The XKeyscore system is continuously collecting so much internet data that it can be stored only for short periods of time. Content remains on the system for only three to five days, while metadata is stored for 30 days. One document explains: &#8220;At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours.&#8221;</div>
<div>To solve this problem, the NSA has created a multi-tiered system that allows analysts to store &#8220;interesting&#8221; content in other databases, such as one named Pinwale which can store material for up to five years.</div>
<div>It is the databases of XKeyscore, one document shows, that now contain the greatest amount of communications data collected by the NSA.</div>
<div>
<figure id="attachment_6812" aria-describedby="caption-attachment-6812" style="width: 460px" class="wp-caption alignright"><img loading="lazy" decoding="async" class="size-full wp-image-6812" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS10-001.webp" alt="Photograph: Guardian" width="460" height="325" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS10-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS10-001-300x212.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6812" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div>In 2012, there were at least 41 billion total records collected and stored in XKeyscore for a single 30-day period.</div>
<div>
<figure id="attachment_6813" aria-describedby="caption-attachment-6813" style="width: 596px" class="wp-caption alignleft"><img loading="lazy" decoding="async" class=" wp-image-6813" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS11-002.webp" alt="Photograph: Guardian" width="596" height="507" /><figcaption id="caption-attachment-6813" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div></div>
<div><strong>Legal v technical restrictions</strong></div>
<div>While the Fisa Amendments Act of 2008 requires an individualized warrant for the targeting of US persons, NSA analysts are permitted to intercept the communications of such individuals without a warrant if they are in contact with one of the NSA&#8217;s foreign targets.</div>
<div>The ACLU&#8217;s deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans&#8217; communications without individualized warrants.</div>
<div>&#8220;The government doesn&#8217;t need to &#8216;target&#8217; Americans in order to collect huge volumes of their communications,&#8221; said Jaffer. &#8220;The government inevitably sweeps up the communications of many Americans&#8221; when targeting foreign nationals for surveillance.</div>
<div>An example is provided by one XKeyscore document showing an NSA target in Tehran communicating with people in Frankfurt, Amsterdam and New York.</div>
<div>
<figure id="attachment_6814" aria-describedby="caption-attachment-6814" style="width: 460px" class="wp-caption alignright"><img loading="lazy" decoding="async" class="size-full wp-image-6814" src="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS12-001.webp" alt="Photograph: Guardian" width="460" height="257" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS12-001.webp 460w, https://goodshepherdmedia.net/wp-content/uploads/2022/12/KS12-001-300x168.webp 300w" sizes="(max-width: 460px) 100vw, 460px" /><figcaption id="caption-attachment-6814" class="wp-caption-text"><em><span style="color: #ff6600;">Photograph: Guardian</span></em></figcaption></figure>
</div>
<div></div>
<div>In recent years, the NSA has attempted to segregate exclusively domestic US communications in separate databases. But even NSA documents acknowledge that such efforts are imperfect, as even purely domestic communications can travel on foreign systems, and NSA tools are sometimes unable to identify the national origins of communications.</div>
<div>Moreover, all communications between Americans and someone on foreign soil are included in the same databases as foreign-to-foreign communications, making them readily searchable without warrants.</div>
<div>Some searches conducted by NSA analysts are periodically reviewed by their supervisors within the NSA. &#8220;It&#8217;s very rare to be questioned on our searches,&#8221; Snowden told the Guardian in June, &#8220;and even when we are, it&#8217;s usually along the lines of: &#8216;let&#8217;s bulk up the justification&#8217;.&#8221;</div>
<div>In a letter this week to senator Ron Wyden, director of national intelligence James Clapper acknowledged that NSA analysts have exceeded even legal limits as interpreted by the NSA in domestic surveillance.</div>
<div>Acknowledging what he called &#8220;a number of compliance problems&#8221;, Clapper attributed them to &#8220;human error&#8221; or &#8220;highly sophisticated technology issues&#8221; rather than &#8220;bad faith&#8221;.</div>
<div>However, Wyden said on the Senate floor on Tuesday: &#8220;These violations are more serious than those stated by the intelligence community, and are troubling.&#8221;</div>
<div>In a statement to the Guardian, the NSA said: &#8220;NSA&#8217;s activities are focused and specifically deployed against – and only against – legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests.</div>
<div>&#8220;XKeyscore is used as a part of NSA&#8217;s lawful foreign signals intelligence collection system.</div>
<div>&#8220;Allegations of widespread, unchecked analyst access to NSA collection data are simply not true. Access to XKeyscore, as well as all of NSA&#8217;s analytic tools, is limited to only those personnel who require access for their assigned tasks … In addition, there are multiple technical, manual and supervisory checks and balances within the system to prevent deliberate misuse from occurring.&#8221;</div>
<div>&#8220;Every search by an NSA analyst is fully auditable, to ensure that they are proper and within the law.</div>
<div><iframe id="sp_message_iframe_690155" title="SP Consent Message" src="https://sourcepoint.theguardian.com/index.html?message_id=690155&amp;consentUUID=null&amp;requestUUID=fafa7c17-48b5-4fb8-8c26-3cc97bd5c5cc&amp;preload_message=true&amp;hasCsp=true&amp;version=v1" data-mce-fragment="1"></iframe></div>
<div></div>
<div></div>
<div></div>
<div>
<hr />
<h1 class="smart-header__hed smart-header__hed--size-2" style="text-align: center;">XKEYSCORE Spy Program Revealed by Snowden Still a Problem<img loading="lazy" decoding="async" class="alignnone size-full wp-image-6854" src="https://goodshepherdmedia.net/wp-content/uploads/2022/03/1625080118123-gettyimages-1185502935.webp" alt="" width="1000" height="562" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/03/1625080118123-gettyimages-1185502935.webp 1000w, https://goodshepherdmedia.net/wp-content/uploads/2022/03/1625080118123-gettyimages-1185502935-300x169.webp 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/03/1625080118123-gettyimages-1185502935-768x432.webp 768w" sizes="(max-width: 1000px) 100vw, 1000px" /></h1>
<p style="text-align: center;"><span class="contributor__meta__prefix">By </span><a href="https://www.vice.com/en/contributor/radhamely-de-leon">Radhamely De Leon</a> <a href="https://www.vice.com/en/article/88nmw4/xkeyscore-spy-program-revealed-by-snowden-is-still-a-problem-watchdog-says" target="_blank" rel="noopener">cited</a></p>
<blockquote>
<p style="text-align: center;"><span style="color: #ff0000;"><em>There are still significant privacy issues with an NSA spying program years after Snowden revealed its existence.</em></span></p>
<p>A government watchdog committee is facing criticism for failing to provide sufficient oversight over XKEYSCORE, an NSA surveillance program revealed by Edward Snowden in 2013.</p>
<p>The U.S. Privacy and Civil Liberties Oversight Board (PCLOB) conducted a classified investigation into XKEYSCORE, a highly classified program that the NSA uses to analyze enormous global troves of internet data and communications. That report was delivered late last year to the NSA, Congress, and other executive branch agencies along with recommendations from individual board members. One member of the board who conducted this investigation <a href="https://documents.pclob.gov/prod/Documents/Projects/4b4f65ff-0dba-444b-9c10-7e6b3fce40[%E2%80%A6]21.06.28.Member%20LeBlanc%2012333%20Unclass%20Statement.pdf" target="_blank" rel="noopener">publicly blasted the nature of the board&#8217;s investigation</a> this week, revealing the existence of the report and also blasting it.</p>
<p>“I had hoped that the former majority of the Board would have conducted a more thorough investigation of this highly-classified surveillance program that is unlikely to be scrutinized by another independent oversight authority in the near future,” Travis LeBlanc, a member of the PCLOB wrote, adding that he had &#8220;serious reservations&#8221; with the classified report.</p>
<p>According to a <a href="https://www.theguardian.com/world/interactive/2013/jul/31/nsa-xkeyscore-program-full-presentation" target="_blank" rel="noopener">2008 presentation acquired by </a><em><a href="https://www.theguardian.com/world/interactive/2013/jul/31/nsa-xkeyscore-program-full-presentation" target="_blank" rel="noopener">The Guardian</a></em>, <a href="https://www.vice.com/en/article/d77nvj/snowden-wasnt-lying-the-nsas-xkeyscore-program-can-spy-on-everything-you-do-online-1">XKEYSCORE</a> can collect data from all of its global servers, which at the time spanned 150 locations, using a single query. It can collect metadata from users and also use data from their internet usage to locate them.</p>
<p>LeBlanc writes that, among many things, the report failed to address any algorithmic biases that XKEYSCAPE may have or whether it had the correct compliance procedures in place.</p>
<p>According to LeBlanc, the board “refused” to follow up with any compliance reports that were deemed Questionable Intelligence Activities (QIA), which the Department of Defense defines as an action that resulted in the illegal surveillance or improper review of an individual’s communications. The amount of total QIA’s reported was redacted from the statement.</p>
<p>He also noted that he found it “concerning” that the NSA appeared to not have a written legal analysis until the board requested one in 2015 since these analyses are used to create compliance policies and procedures. The legal analysis that was provided also used decades-old cases to assert that XKEYSCAPE was being used in compliance with the Fourth Amendment.</p>
<p>According to LeBlanc, the board did not do much to investigate the system’s compliance program, which already does not require that analysts receive privacy and civil liberties and compliance training.</p>
<p>The board also failed to investigate the efficacy or cost of the program, which LeBlanc notes is one of the most “basic” parts of an oversight investigation. The 2008 presentation shows that the XKEYSCAPE already had 700 servers across the world but could be scaled even further just by adding more servers. If the NSA has continued to use XKEYSCAPE since then, there’s no telling how much the system has grown or how many people have been affected by its data collection.</p>
<p>“On these points and others, the former Board’s report unfortunately reads more like a book report summary of the XKEYSCORE program than an independent oversight analysis grappling with key concerns in this evolving technological legal landscape,” LeBlanc said in his statement.</p>
<p>LeBlanc urged them to declassify the statement for the sake of transparency as “the public is rightfully worried about secret surveillance programs,” he said.</p>
<p>According to LeBlanc, the board has made no effort to declassify the report.</p></blockquote>
</div>
<hr />
<div>
<blockquote>
<h1 class="jeg_post_title" style="text-align: center;">XKeyScore –</h1>
<h1 class="jeg_post_title" style="text-align: center;">the NSA’s secret tool that collects and reveals</h1>
<h1 class="jeg_post_title" style="text-align: center;">‘nearly everything a user does on the internet’</h1>
<p style="text-align: center;"><span class="meta_text">by</span> <a href="https://www.zmescience.com/author/tibipuiu/">Tibi Puiu</a> <a href="https://www.zmescience.com/research/discoveries/xkeyscore-the-nsas-secret-tool-mass-spying-02432/" target="_blank" rel="noopener">cited</a></p>
<div class="dcr-1yi1cnj" data-gu-name="standfirst">
<div class=" dcr-iuxtqj">
<div class="dcr-ch7w1w" data-gu-name="body">
<div class="dcr-i7zira">
<div id="maincontent" class="dcr-1ncmr12">
<div class="article-body-commercial-selector article-body-viewer-selector dcr-1vqv39r">
<div id="dfp-ad--carrot" class="js-ad-slot ad-slot ad-slot--carrot" data-link-name="ad slot carrot" data-name="carrot" aria-hidden="true" data-label="false" data-refresh="false">
<div id="google_ads_iframe_/59666047/theguardian.com/us-news/article/ng_16__container__">
<blockquote><p>The waves of controversy and outrage following former CIA and NSA technical officer <a href="http://www.boomerangbeat.com/what-is-the-nsa-controversy-and-what-did-edward-snowden-leak/">Edward Snowden’s leaks</a> of details that reveal the US and British governments had been secretly deploying mass<img loading="lazy" decoding="async" class="wp-image-6849 alignright" src="https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c424c9a5b73d5378c225f_Cyber-spies-3.jpg" alt="" width="555" height="350" srcset="https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c424c9a5b73d5378c225f_Cyber-spies-3.jpg 1309w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c424c9a5b73d5378c225f_Cyber-spies-3-300x189.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c424c9a5b73d5378c225f_Cyber-spies-3-1024x646.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2022/11/623c424c9a5b73d5378c225f_Cyber-spies-3-768x485.jpg 768w" sizes="(max-width: 555px) 100vw, 555px" /> surveillance programs on their citizens are far from over. Recently further details as to the extent and reach these programs possess have been uncovered, after a top secret National Security Agency program called <strong>XKeyScore</strong> was recently presented to the general public.</p>
<blockquote><p>“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.</p></blockquote>
<p>This statement made a lot of people at Washington unhappy, and unsurprising Snowden’s claim was quickly refuted by officials. On another note, Snowden – a whistle-blower and hero by one side, and a dangerous traitor from another – is <a href="http://www.policymic.com/articles/47673/snowden-nsa-leak-what-happens-to-edward-snowden-now">currently residing</a> in Moscow, Russia, after fleeing the US via Hong Kong.</p>
<p>Wouldn’t you know it, however, most recently training files for a secret software called XKeyScore have been leaked which show and demonstrate that any analyst has access to a user’s internet history (e-mails, phone number, browsing, chats, just about anything) WITHOUT the need for a warrant. US laws dictates that the NSA is required to obtain an individualized <a href="http://en.wikipedia.org/wiki/Foreign_Intelligence_Surveillance_Act">Fisa warrant</a> only if the target of their surveillance is a ‘US person’, however XKeyScore offers the technological capabilities (legal authority is blurry) for an analyst to perform any kind of digital surveillance on any user, US citizen or otherwise.These training files show how an analyst can easily access just about any digital history for a particular user through a simple point and click interface that can return valuable and relevant information to their queries. The request is not reviewed by a court or any NSA personnel before it is processed.XKeyScore has access to such a wealth of information that the analyst can retrieve relevant information simply by searching using one or a combination of the following: name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used. E-mail is of little interest, since much of the activity on the web is anonymous.The NSA documents assert that by 2008, 300 terrorists had been captured using intelligence from XKeyscore.The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies. As one slide indicates, the ability to search HTTP activity by keyword permits the analyst access to what the NSA calls “nearly everything a typical user does on the internet”.</p>
<p>It’s all very easy. For instance, Snowden, who was authorized to use XKeyScore, recalls that to search for emails, an analyst using XKS enters the individual’s email address into a simple online search form, along with the “justification” for the search and the time period for which the emails are sought.</p>
<p>What this means – and these latest insights come as a confirmation – is that the NSA and surrounding agencies are storing immense amounts of data. One NSA report from 2007 estimated that there were 850bn “call events” collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added ( emails, phone calls and other type of communications). William Binney, a former NSA mathematician, said last year that the agency had “assembled on the order of 20 trillion transactions about U.S. citizens with other U.S. citizens,” an estimate, he said, that “only was involving phone calls and emails.”</p>
<p>A few years ago, <a href="https://www.zmescience.com/research/inventions/ibm-is-building-the-largest-data-array-in-the-world-120-petabytes-of-storage/">I reported</a> on ZME Science on the matter that IBM was planning to build the largest data array in the world capable of storing 120 petabytes – 60 downloads of the entire internet or 10 times bigger than any other data center in the world at present date. The contractor is unknown, but it’s easy to guess who. ZME Science also reported how <a href="https://www.zmescience.com/other/every-six-hours-the-nsa-collects-data-the-size-of-the-library-of-congress-423434/">every six hours the NSA collects data the size of the Library of Congress</a>.</p>
<p>Still, even with these resources the NSA can’t store all your data for too long, considering the humongous amount of internet connections. Content remains on the system for only three to five days, while metadata is stored for 30 days. One document explains: “At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours.” In 2012, there were at least 41 billion total records collected and stored in XKeyscore for a single 30-day period.</p>
<p>In a statement to <a href="http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data">the Guardian, </a>the NSA said:</p>
<blockquote><p>“NSA’s activities are focused and specifically deployed against – and only against – legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests.”</p>
<p>“XKeyscore is used as a part of NSA’s lawful foreign signals intelligence collection system.</p>
<p>“Allegations of widespread, unchecked analyst access to NSA collection data are simply not true. Access to XKeyscore, as well as all of NSA’s analytic tools, is limited to only those personnel who require access for their assigned tasks … In addition, there are multiple technical, manual and supervisory checks and balances within the system to prevent deliberate misuse from occurring.”</p>
<p>“Every search by an NSA analyst is fully auditable, to ensure that they are proper and within the law.</p>
<p>“These types of programs allow us to collect the information that enables us to perform our missions successfully – to defend the nation and to protect US and allied troops abroad.”</p></blockquote>
</blockquote>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</blockquote>
</div>
<p>&nbsp;</p>
<ul>
<li><a href="https://www.cryptomuseum.com/intel/nsa/index.htm#inter" target="_blank" rel="noopener">NSA-backdoored equipment info found OFF this website</a></li>
<li><a href="https://goodshepherdmedia.net/u-s-government-catalogue-of-cellphone-surveillance-devices-used-by-the-military-and-by-cia-nsa-fbi-and-other-intelligence-agencies/" target="_blank" rel="noopener">U.S. Government Catalogue of Cellphone Surveillance Devices</a></li>
<li><a href="https://en.wikipedia.org/wiki/Backdoor_(computing)" target="_blank" rel="noopener">Backdoors on Wikipedia</a></li>
<li><a href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">National Security Agency</a></li>
<li><a href="https://goodshepherdmedia.net/cia-central-intelligence-agency/" target="_blank" rel="noopener">Central Intelligence Agency</a></li>
<li><a href="https://nsa.gov1.info/dni/index.html" target="_blank" rel="noopener">NSA EXTRACTED INFO</a></li>
<li><a href="https://www.cryptomuseum.com/" target="_blank" rel="noopener">CRYPTO MUSEUM</a></li>
<li><a href="https://goodshepherdmedia.net/edward-snowden-nsa-whistleblower/" target="_blank" rel="noopener">Edward Snowden</a></li>
<li><a href="https://goodshepherdmedia.net/can-cops-secretly-listen-to-my-phone-how-cops-can-secretly-track-your-phone/" target="_blank" rel="noopener">Stingray</a></li>
<li><a href="https://goodshepherdmedia.net/fbi-vows-not-to-use-pegasus-spyware-after-grilling-from-capitol-hill/" target="_blank" rel="noopener">Pegasus Spyware</a></li>
<li><a href="https://goodshepherdmedia.net/x-keyscore-allows-the-nsa-and-allies-to-monitor-emails-web-browsing-internet-searches-and-social-media/" target="_blank" rel="noopener">X-Keyscore</a></li>
</ul>
<hr />
<h3 style="text-align: center;">Check out our article on the NSA SPYING SOFTWARE for CELL PHONES called Pegasus &#8211; <a href="https://goodshepherdmedia.net/fbi-vows-not-to-use-pegasus-spyware-after-grilling-from-capitol-hill/" target="_blank" rel="noopener">Pegasus spyware: FBI vows not to use after grilling from Capitol Hill</a></h3>
<p>&nbsp;</p>
<p><iframe title="Exposed: Secret Government Surveillance Tools They DON&#039;T Want You to Know About!" width="640" height="360" src="https://www.youtube.com/embed/iRYji0Q2K30?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Check if Your Cellphone Is Infected With Pegasus Spyware</title>
		<link>https://goodshepherdmedia.net/how-to-check-if-your-cellphone-is-infected-with-pegasus-spyware/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Tue, 30 Jul 2024 20:54:24 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[4th Amendment]]></category>
		<category><![CDATA[Computer Hacks]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[Home Computing]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Software Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Tragic]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🎖️🪖Military Tech🤖]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[A Complete (Updating) List of Individuals Targeted With Pegasus Spyware]]></category>
		<category><![CDATA[A Complete List of Individuals Targeted With Pegasus Spyware]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[How to Check if Your Cellphone Is Infected With Pegasus Spyware]]></category>
		<category><![CDATA[HOW TO DETECT SPYWARE ON PHONE]]></category>
		<category><![CDATA[NSO GROUP]]></category>
		<category><![CDATA[Pegasus]]></category>
		<category><![CDATA[Pegasus Spyware]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[The NSO File]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=18275</guid>

					<description><![CDATA[They’re watching us: How to detect Pegasus and other spyware on your iOS device? The infamous Pegasus spyware created by Israeli firm NSO can turn any infected smartphone into a remote microphone or camera. Here’s how to stay safe and know if you’ve been hacked How does Pegasus and other spyware work discreetly to access [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="header__title title-h2 mb-24 mt-md-48 mt-lg-64 mt-xl-64">They’re watching us: How to detect Pegasus and other spyware on your iOS device?</h1>
<blockquote>
<h3><span style="color: #ff0000;"><em><strong>The infamous Pegasus spyware created by Israeli firm NSO can turn any infected smartphone into a remote microphone or camera. Here’s how to stay safe and know if you’ve been hacked</strong></em></span></h3>
</blockquote>
<div class="c-16 c-md-9">
<div class="header--blog-post">
<div class="header__wrapper">
<div class="header__post-info post-info">
<h2 class="header__text mb-xs-48 mb-64 mb-lg-96 mb-xl-96">How does Pegasus and other spyware work discreetly to access everything on your iOS device?</h2>
</div>
</div>
</div>
</div>
<p><img loading="lazy" decoding="async" class="size-large wp-image-18276 alignright" src="https://goodshepherdmedia.net/wp-content/uploads/2024/06/How-to-Check-if-Your-Cellphone-Is-Infected-With-Pegasus-Spyware-1024x595.webp" alt="" width="640" height="372" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/06/How-to-Check-if-Your-Cellphone-Is-Infected-With-Pegasus-Spyware-1024x595.webp 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/06/How-to-Check-if-Your-Cellphone-Is-Infected-With-Pegasus-Spyware-400x233.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/06/How-to-Check-if-Your-Cellphone-Is-Infected-With-Pegasus-Spyware-768x446.webp 768w, https://goodshepherdmedia.net/wp-content/uploads/2024/06/How-to-Check-if-Your-Cellphone-Is-Infected-With-Pegasus-Spyware.webp 1280w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<div class="blog-post-content__section--text">
<h2>Introduction</h2>
<p>In today’s digital age, mobile phones and devices have evolved from being exclusive to a few to becoming an absolute need for everyone, aiding us in both personal and professional pursuits. However, these devices, often considered personal, can compromise our privacy when accessed by nefarious cybercriminals.</p>
<p>Malicious mobile software has time and again been wielded as a sneaky weapon to compromise the sensitive information of targeted individuals. Cybercriminals build complex applications capable of operating on victims’ devices unbeknownst to them, concealing the threat and the intentions behind it. Despite the common belief among iOS users that their devices offer complete security, shielding them from such attacks, recent developments, such as the emergence of Pegasus spyware, have shattered this pretense.</p>
<p>The first iOS exploitation by Pegasus spyware was <a href="https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/">recorded</a> in August 2016, facilitated through spear-phishing attempts—text messages or emails that trick a target into clicking on a malicious link.</p>
<h2>What is Pegasus spyware?</h2>
<p>Developed by the <a href="https://www.nsogroup.com/">Israeli company NSO Group</a>, Pegasus spyware is malicious software designed to gather sensitive information from devices and users illicitly. Initially licensed by governments for targeted cyber espionage purposes, it is a sophisticated tool for remotely placing spyware on targeted devices to pry into and reveal information. Its ‘zero-click’ capability makes it particularly dangerous as it can infiltrate devices without any action required from the user.</p>
<p>Pegasus can gather a wide range of sensitive information from infected devices, including messages, audio logs, GPS location, device information, and more. It can also remotely activate the device’s camera and microphone, essentially turning the device into a powerful tool for illegal surveillance.</p>
<p>Over time, NSO Group has become more creative in its methods of unwarranted intrusions into devices.  The company, which was founded in 2010, claims itself to be a “leader” in <a href="https://www.documentcloud.org/documents/815991-1276-nso-group-brochure-pegasus.html">mobile and cellular cyber warfare</a>.</p>
<p>Pegasus is also capable of accessing data from both iOS and Android-powered devices. The fact that it can be deployed through convenient gateways such as SMS, WhatsApp, or iMessage makes it an effortless tool to trick users into installing the spyware without their knowledge. This poses a significant threat to the privacy and security of individuals and organizations targeted by such attacks.</p>
<h2>How does Pegasus spyware work?</h2>
<p>Pegasus is extremely efficient due to its strategic development to use zero-day vulnerabilities, code obfuscation, and encryption. NSO Group provides two methods for remotely installing spyware on a target’s device: a zero-click method and a one-click method. The one-click method includes sending the target a regular SMS text message containing a link to a malicious website. This website then exploits vulnerabilities in the target’s web browser, along with any additional exploits needed to implant the spyware.</p>
<p>Zero-click attacks do not require any action from device users to establish an unauthorized connection, as they exploit ‘zero-day’ vulnerabilities to gain entry into the system. Once the spyware is installed, Pegasus actively captures the intended data about the device. After installation, Pegasus needs to be constantly upgraded and managed to adapt to device settings and configurations. Additionally, it may be programmed to uninstall itself or self-destruct if exposed or if it no longer provides valuable information to the threat actor.</p>
<p>Now that we’ve studied what Pegasus is and the privacy concerns it raises for users, this blog will further focus on discussing precautionary and investigation measures. The suggested methodology can be leveraged to detect not just Pegasus spyware but also <a href="https://www.group-ib.com/blog/operation-triangulation/">Operation Triangulation</a>, <a href="https://www.itpro.com/security/spyware/370302/greek-intelligence-predator-spyware-wiretap-facebook-staffer">Predator spyware</a>, and more.</p>
<p>Let’s explore how to check iOS or iPadOS devices for signs of compromise when only an iTunes backup is available and obtaining a full file system dump isn’t a viable option.</p>
<p>In recent years, targeted attacks against iOS devices have made headlines regularly. Although the infections are not widespread and they hardly affect more than 100 devices per wave, such attacks still pose serious risks to Apple users. The risks have appeared as a result of iOS becoming an increasingly complex and open system, over the years, to enhance user experience. <b>A good example of this is the flawed design of the iMessage application, which wasn’t protected through the operating system’s sandbox mechanisms. </b></p>
<p>Apple failed to patch this flaw with a security feature called BlastDoorin iOS 14, instead implementing a Lockdown Mode mechanism that, for now, cybercriminals have not been able to bypass. <a href="https://github.com/blacktop/presentations/blob/main/0x41con_2023/PDF/AnatomyOfLockdownMode.pdf">Learn more about Lockdown Mode here</a>.</p>
<p>While BlastDoor provides a flexible solution through sandbox analysis, Lockdown Mode imposes limitations on iMessage functionality. Nonetheless, the vulnerabilities associated with ImageIO may prompt users to consider disabling iMessage permanently. Another major problem is that there are no mechanisms to examine an infected iOS device directly. Researchers have three options:</p>
<ol>
<li>Put the device in a safe and wait until an exploit is developed that can extract the full file system dump</li>
<li>Analyze the device’s network traffic (with certain limitations as not all viruses can transmit data via Wi-Fi)</li>
<li>Explore a backup copy of an iOS device, despite data extraction limitations</li>
</ol>
<p>The backup copy must be taken only with encryption (password protection) as data sets in encrypted and unencrypted copies differ. Here, our analysts focus on the third approach, as it is a pragmatic way to safely examine potential infections without directly interacting with the compromised device. This approach allows researchers to analyze the device’s data in a controlled environment, avoiding any risk of further compromising the device and losing valuable evidence that forms the ground for crucial investigation and analysis.</p>
<p>To conduct research effectively, the users will need either a Mac or Linux device. Linux virtual machines can also be used, but it is recommended that users avoid using Windows Subsystem for Linux as it has issues with forwarding USB ports.</p>
<p>In the analysis performed by Group-IB experts, we use an open-source tool called <a href="https://docs.mvt.re/en/latest/">Mobile Verification Toolkit (MVT)</a>, which is supported by a <a href="https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/">methodology report</a>.</p>
<p>Let’s start with installing dependencies:</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">sudo apt install python3 python3-pip libusb-1.0-0 sqlite3</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>Next, install a set of tools for creating and working with iTunes backups:</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">sudo apt install libimobiledevice-utils</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>Lastly, install MVT:</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">git clone https://github.com/mvt-project/mvt.git<br />
cd mvt<br />
pip3 install</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>Now, let’s begin with the analysis. To create a backup, perform the following:</p>
<ol>
<li>Connect the iOS device and verify the pairing process by entering your passcode.</li>
<li>Enter the following command:</li>
</ol>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">ideviceinfo</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>Users will receive a substantial output with information about the connected device, such as the iOS version and model type:</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">ProductName: iPhone OS<br />
ProductType: iPhone12.5<br />
ProductVersion: 17.2.1</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>After that, users can set a password for the device backup:</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">idevicebackup2 -i encryption on</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>Enter the password for the backup copy and confirm it by entering your phone’s passcode.</p>
<p>As mentioned, the above step is crucial to ensure the integrity of the data extracted from the device.</p>
<p>Create the encrypted copy:</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">idevicebackup2 backup &#8211;full /path/to/backup/</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>This process may take a while depending on the amount of space available on your device. Users will also need to enter the passcode again.</p>
<p>Once the backup is complete (as indicated by the<i> Backup Successful</i> message), the users will need to decrypt it.</p>
<p>To do so, use MVT:</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">mvt-ios decrypt-backup -p [password] -d /path/to/decrypted /path/to/backup</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>After being through with the process, users may have successfully decrypted the backup.</p>
<p>Now, let’s check for known indicators. Download the most recent IoCs (Indicators of Compromise):</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">mvt-ios download-iocs</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>We can also track IoCs relating to other spyware attacks from several sources, such as:</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">&#8220;NSO Group Pegasus Indicators of Compromise&#8221;<br />
&#8220;Predator Spyware Indicators of Compromise&#8221;<br />
&#8220;RCS Lab Spyware Indicators of Compromise&#8221;<br />
&#8220;Stalkerware Indicators of Compromise&#8221;<br />
&#8220;Surveillance Campaign linked to mercenary spyware company&#8221;<br />
&#8220;Quadream KingSpawn Indicators of Compromise&#8221;<br />
&#8220;Operation Triangulation Indicators of Compromise&#8221;<br />
&#8220;WyrmSpy and DragonEgg Indicators of Compromise&#8221;</div>
</div>
</div>
<div class="blog-post-content__section--text">
<ul>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded"><a href="https://github.com/AmnestyTech/investigations">Indicators from Amnesty International’s investigations</a></li>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded"><a href="https://github.com/mvt-project/mvt-indicators">Index and collection of MVT compatibile indicators of compromise</a></li>
</ul>
<p>The next step is to launch the scanning:</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">mvt-ios check-backup &#8211;output /path/to/output/ /path/to/decrypted/</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>The users will obtain the following <a href="https://docs.mvt.re/en/latest/ios/records/">set of JSON files for analysis</a>.</p>
<p>If any infections are detected, the users will receive a *_detected.json file with detections.</p>
<div id="attachment_31382" class="wp-caption alignnone">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18333" src="https://goodshepherdmedia.net/wp-content/uploads/2024/07/1-8.png" alt="" width="1600" height="399" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/07/1-8.png 1600w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/1-8-400x100.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/1-8-1024x255.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/1-8-768x192.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/1-8-1536x383.png 1536w" sizes="(max-width: 1600px) 100vw, 1600px" /></p>
<p id="caption-attachment-31382" class="wp-caption-text">Image 1: Result of MVT IOCs scan with four detections</p>
</div>
<div id="attachment_31383" class="wp-caption alignnone">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18334" src="https://goodshepherdmedia.net/wp-content/uploads/2024/07/2-7.png" alt="" width="1600" height="380" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/07/2-7.png 1600w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/2-7-400x95.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/2-7-1024x243.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/2-7-768x182.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/2-7-1536x365.png 1536w" sizes="(max-width: 1600px) 100vw, 1600px" /></p>
<p id="caption-attachment-31383" class="wp-caption-text">Image 2: The detected results are saved in separate files with “_detected” ending</p>
</div>
<p>If there are suspicions of spyware or malware without IOCs, but there are no detections, and a full file system dump isn’t feasible, users will need to work with the resources at hand. The most valuable files in the backup include:</p>
<p><em><b>Safari_history.json</b></em> – check for any suspicious redirects and websites.</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">&#8220;id&#8221;: 5,<br />
&#8220;url&#8221;: &#8220;http://yahoo.fr/&#8221;,<br />
&#8220;visit_id&#8221;: 7,<br />
&#8220;timestamp&#8221;: 726652004.790012,<br />
&#8220;isodate&#8221;: &#8220;2024-01-11 07:46:44.790012&#8221;,<br />
&#8220;redirect_source&#8221;: null,<br />
&#8220;redirect_destination&#8221;: 8,<br />
&#8220;safari_history_db&#8221;: &#8220;1a/1a0e7afc19d307da602ccdcece51af33afe92c53&#8221;</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p><em><b>Datausage.json </b></em>– check for suspicious processes.</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">&#8220;first_isodate&#8221;: &#8220;2023-11-21 15:39:34.001225&#8221;,<br />
&#8220;isodate&#8221;: &#8220;2023-12-14 03:05:02.321592&#8221;,<br />
&#8220;proc_name&#8221;: &#8220;mDNSResponder/com.apple.datausage.maps&#8221;,<br />
&#8220;bundle_id&#8221;: &#8220;com.apple.datausage.maps&#8221;,<br />
&#8220;proc_id&#8221;: 69,<br />
&#8220;wifi_in&#8221;: 0.0,<br />
&#8220;wifi_out&#8221;: 0.0,<br />
&#8220;wwan_in&#8221;: 3381.0,<br />
&#8220;wwan_out&#8221;: 8224.0,<br />
&#8220;live_id&#8221;: 130,<br />
&#8220;live_proc_id&#8221;: 69,<br />
&#8220;live_isodate&#8221;: &#8220;2023-12-14 02:45:10.343919&#8221;</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p><em><b>Os_analytics_ad_daily.json</b></em> – check for suspicious processes.</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">&#8220;package&#8221;: &#8220;storekitd&#8221;,<br />
&#8220;ts&#8221;: &#8220;2023-07-11 05:24:31.981691&#8221;,<br />
&#8220;wifi_in&#8221;: 400771.0,<br />
&#8220;wifi_out&#8221;: 52607.0,<br />
&#8220;wwan_in&#8221;: 0.0,<br />
&#8220;wwan_out&#8221;: 0.0</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>Keeping a backup copy of a control device is required to maintain a record of the current names of legitimate processes within a specific iOS version. This control device can be completely reset and reconfigured with the same iOS version. Although annual releases often introduce significant changes, new legitimate processes may still be added, even within a year, through major system updates.</p>
<p><em><b>Sms.json</b></em> – check for links, the content of these links, and domain information.</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">
<pre>        "ROWID": 97,
        "guid": "9CCE3479-D446-65BF-6D00-00FC30F105F1",
        "text": "",
        "replace": 0,
        "service_center": null,
        "handle_id": 1,
        "subject": null,
        "country": null,
        "attributedBody": "",
        "version": 10,
        "type": 0,
        "service": "SMS",
        "account": "P:+66********",
        "account_guid": "54EB51F8-A905-42D5-832E-D98E86E4F919",
        "error": 0,
        "date": 718245997147878016,
        "date_read": 720004865472528896,
        "date_delivered": 0,
        "is_delivered": 1,
        "is_finished": 1,
        "is_emote": 0,
        "is_from_me": 0,
        "is_empty": 0,
        "is_delayed": 0,
        "is_auto_reply": 0,
        "is_prepared": 0,
        "is_read": 1,
        "is_system_message": 0,
        "is_sent": 0,
        "has_dd_results": 1,
        "is_service_message": 0,
        "is_forward": 0,
        "was_downgraded": 0,
        "is_archive": 0,
        "cache_has_attachments": 0,
        "cache_roomnames": null,
        "was_data_detected": 1,
        "was_deduplicated": 0,
        "is_audio_message": 0,
        "is_played": 0,
        "date_played": 0,
        "item_type": 0,
        "other_handle": 0,
        "group_title": null,
        "group_action_type": 0,
        "share_status": 0,
        "share_direction": 0,
        "is_expirable": 0,
        "expire_state": 0,
        "message_action_type": 0,
        "message_source": 0,
        "associated_message_guid": null,
        "associated_message_type": 0,
        "balloon_bundle_id": null,
        "payload_data": null,
        "expressive_send_style_id": null,
        "associated_message_range_location": 0,
        "associated_message_range_length": 0,
        "time_expressive_send_played": 0,
        "message_summary_info": null,
        "ck_sync_state": 0,
        "ck_record_id": null,
        "ck_record_change_tag": null,
        "destination_caller_id": "+66926477437",
        "is_corrupt": 0,
        "reply_to_guid": "814A603F-4FEC-7442-0CBF-970C14217E1B",
        "sort_id": 0,
        "is_spam": 0,
        "has_unseen_mention": 0,
        "thread_originator_guid": null,
        "thread_originator_part": null,
        "syndication_ranges": null,
        "synced_syndication_ranges": null,
        "was_delivered_quietly": 0,
        "did_notify_recipient": 0,
        "date_retracted": 0,
        "date_edited": 0,
        "was_detonated": 0,
        "part_count": 1,
        "is_stewie": 0,
        "is_kt_verified": 0,
        "is_sos": 0,
        "is_critical": 0,
        "bia_reference_id": null,
        "fallback_hash": "s:mailto:ais|(null)(4)&lt;7AD4E8732BAF100ABBAF4FAE21CBC3AE05487253AC4F373B7D1470FDED6CFE91&gt;",
        "phone_number": "AIS",
        "isodate": "2023-10-06 00:46:37.000000",
        "isodate_read": "2023-10-26 09:21:05.000000",
        "direction": "received",
        "links": [
            "https://m.ais.co.th/J1Hpm91ix"
        ]
    },</pre>
</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p><em><b>Sms_attachments.json</b></em> – check for suspicious attachments.</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">
<pre>        "attachment_id": 4,
        "ROWID": 4,
        "guid": "97883E8C-99FA-40ED-8E78-36DAC89B2939",
        "created_date": 726724286,
        "start_date": "",
        "filename": "~/Library/SMS/Attachments/b8/08/97883E8C-99FA-40ED-8E78-36DAC89B2939/IMG_0005.HEIC",
        "uti": "public.heic",
        "mime_type": "image/heic",
        "transfer_state": 5,
        "is_outgoing": 1,
        "user_info": ",
        "transfer_name": "IMG_0005.HEIC",
        "total_bytes": 1614577,
        "is_sticker": 0,
        "sticker_user_info": null,
        "attribution_info": null,
        "hide_attachment": 0,
        "ck_sync_state": 0,
        "ck_server_change_token_blob": null,
        "ck_record_id": null,
        "original_guid": "97883E8C-99FA-40ED-8E78-36DAC89B2939",
        "is_commsafety_sensitive": 0,
        "service": "iMessage",
        "phone_number": "*",
        "isodate": "2024-01-12 03:51:26.000000",
        "direction": "sent",
        "has_user_info": true
    }</pre>
</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p><em><b>Webkit_session_resource_log.json </b></em>and<b> </b><em><b>webkit_resource_load_statistics.json</b></em> – check for suspicious domains.</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">
<pre>{
        "domain_id": 22,
        "registrable_domain": "sitecdn.com",
        "last_seen": 1704959295.0,
        "had_user_interaction": false,
        "last_seen_isodate": "2024-01-11 07:48:15.000000",
        "domain": "AppDomain-com.apple.mobilesafari",
        "path": "Library/WebKit/WebsiteData/ResourceLoadStatistics/observations.db"
    }</pre>
</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p><em><b>Tcc.json </b></em>– check which applications have been granted which permissions.</p>
</div>
<div class="blog-post-content__section">
<div class="code">
<div class="code__wrapper">
<pre>        "service": "kTCCServiceMotion",
        "client": "com.apple.Health",
        "client_type": "bundle_id",
        "auth_value": "allowed",
        "auth_reason_desc": "system_set",
        "last_modified": "2023-07-11 06:25:15.000000"</pre>
</div>
</div>
</div>
<div class="blog-post-content__section--text">
<p>To collect data about processes, users can use XCode Instruments.</p>
<p><b><i>Note: Developer mode must be enabled on the iOS device.</i></b></p>
<div id="attachment_31384" class="wp-caption alignnone">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18331" src="https://goodshepherdmedia.net/wp-content/uploads/2024/07/3.jpg.webp" alt="" width="787" height="482" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/07/3.jpg.webp 787w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/3.jpg-400x245.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/3.jpg-768x470.webp 768w" sizes="(max-width: 787px) 100vw, 787px" /></p>
<p id="caption-attachment-31384" class="wp-caption-text">Image 3: Showcasing XCode instruments profile selection</p>
</div>
<p>Process data collection:</p>
<div id="attachment_31381" class="wp-caption alignnone">
<figure id="attachment_18332" aria-describedby="caption-attachment-18332" style="width: 1600px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="size-full wp-image-18332" src="https://goodshepherdmedia.net/wp-content/uploads/2024/07/4.jpg" alt="" width="1600" height="791" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/07/4.jpg 1600w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/4-400x198.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/4-1024x506.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/4-768x380.jpg 768w, https://goodshepherdmedia.net/wp-content/uploads/2024/07/4-1536x759.jpg 1536w" sizes="(max-width: 1600px) 100vw, 1600px" /><figcaption id="caption-attachment-18332" class="wp-caption-text">Screenshot</figcaption></figure>
<p id="caption-attachment-31381" class="wp-caption-text">Image 4: Process list from iPhone</p>
</div>
<h2>Overcoming the iOS interception challenge</h2>
<h3>For the common public</h3>
<p>iOS security architecture typically prevents normal apps from performing unauthorized surveillance. However, a jailbroken device can bypass these security measures. Pegasus and other mobile malware may exploit remote jailbreak exploits to steer clear of detection by security mechanisms. This enables operators to install new software, extract data, and monitor and collect information from targeted devices.</p>
<p>Warning signs of an infection on the device include:</p>
<ul>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Slower device performance</li>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Spontaneous reboots or shutdowns</li>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Rapid battery drain</li>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Appearance of previously uninstalled applications</li>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Unexpected redirects to unfamiliar websites</li>
</ul>
<p>This reinstates the critical importance of maintaining up-to-date devices and prioritizing mobile security. Recommendations for end-users include:</p>
<ul>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Avoid clicking on suspicious links</li>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Review app permissions regularly</li>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Enable Lockdown mode for protection against spyware attacks</li>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Consider disabling iMessage and FaceTime for added security</li>
<li data-rocket-lazy-bg-a30c11c0-84a7-48a5-8145-f58c824a476c="loaded">Always install the updated version of the iOS</li>
</ul>
<h3>For businesses: Protect against Pegasus and other APT mobile malware</h3>
<p>Securing mobile devices, applications, and APIs is crucial, particularly when they handle financial transactions and store sensitive data. Organizations operating in critical sectors, government, and other industries are prime targets for cyberattacks such as espionage and more, especially high-level employees.</p>
<p>Researching iOS devices presents challenges due to the closed nature of the system. <a href="https://www.group-ib.com/products/threat-intelligence/">Group-IB Threat Intelligence</a>, however, helps organizations worldwide identify cyber threats in different environments, including iOS, with our recent discovery being <a href="https://www.group-ib.com/media-center/press-releases/golddigger-trojan-vietnam/"><strong>GoldPickaxe.iOS</strong></a> – the first iOS Trojan harvesting facial scans and using them to potentially gain unauthorized access to bank accounts. Group-IB Threat Intelligence provides a constant feed on new and previously conducted cyber attacks, the tactics, techniques, and behaviors of threat actors, and susceptibility of attacks based on your organization’s risk profile— giving a clear picture of how your devices can be exploited by vectors, to initiate timely and effective defense mechanisms.</p>
<p>If you suspect your iOS or Android device has been compromised by Pegasus or similar spyware, turn to our <a href="https://www.group-ib.com/contacts/">experts for immediate support</a>. To perform device analysis or set up additional security measures, organizations can also get in touch with <a href="https://www.group-ib.com/services/digital-forensics/">Group-IB’s Digital Forensics team</a> for assistance. <a href="https://www.group-ib.com/blog/pegasus-spyware/" target="_blank" rel="noopener">source</a></p>
</div>
<hr />
<h1 class="post__title">HOW TO DEFEND YOURSELF AGAINST THE POWERFUL NEW NSO SPYWARE ATTACKS DISCOVERED AROUND THE WORLD</h1>
<p>Even iPhones were vulnerable to the surveillance software, which appears to have been used against activists, journalists, and others.</p>
<p><u>AN INTERNATIONAL GROUP</u> of journalists this month <a href="https://www.theguardian.com/world/2021/jul/18/revealed-leak-uncovers-global-abuse-of-cyber-surveillance-weapon-nso-group-pegasus" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">detailed </a><a href="https://www.theguardian.com/world/2021/jul/18/revealed-leak-uncovers-global-abuse-of-cyber-surveillance-weapon-nso-group-pegasus" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">extensive</a> new <a href="https://www.theguardian.com/world/2021/jul/18/revealed-leak-uncovers-global-abuse-of-cyber-surveillance-weapon-nso-group-pegasus" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">evidence</a> that spyware made by Israeli company NSO Group was used against activists, business executives, journalists, and lawyers around the world. Even Apple’s iPhone, frequently lauded for its tight security, was found to be “<a href="https://www.washingtonpost.com/technology/2021/07/19/apple-iphone-nso" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">no match</a>” for the surveillance software, leading Johns Hopkins cryptographer Matthew Green to fret that the NSO revelations had led some hacking experts to descend into a posture of “<a href="https://blog.cryptographyengineering.com/2021/07/20/a-case-against-security-nihilism/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">security nihilism</a>.”</p>
<p>Security nihilism is the idea that digital attacks have grown so sophisticated that there’s nothing to be done to prevent them from happening or to blunt their impact. That sort of conclusion would be a mistake. For one thing, it plays into the hands of malicious hackers, who would love nothing more than for targets to stop trying to defend themselves. It’s also mistaken factually: You <i>can</i> defend yourself against NSO’s spyware — for example, by following operational security techniques like not clicking unknown links, practicing device compartmentalization (such as using separate devices for separate apps), and having a virtual private network, or VPN, on mobile devices. Such techniques are effective against any number of digital attacks and thus useful even if NSO Group turns out to be correct in its <a href="https://zetter.substack.com/p/the-nso-surveillance-list-what-it" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">claim that the purported evidence against the company is not valid</a>.</p>
<p>There may be no such thing as perfect security, as one classic adage in the field states, but that’s no excuse for passivity. Here, then, are practical steps you can take to reduce your “attack surface” and protect yourself against spyware like NSO’s.</p>
<h3>Pegasus Offers “Unlimited Access to Target’s Mobile Devices”</h3>
<p>The recent revelations concern a specific NSO spyware product known as Pegasus. They follow extensive prior studies of the company’s software from entities like <a href="https://citizenlab.ca/tag/nso-group/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">the Citizen Lab</a>, <a href="https://www.amnesty.org/en/latest/research/2019/10/Morocco-Human-Rights-Defenders-Targeted-with-NSO-Groups-Spyware/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">Amnesty International</a>, <a href="https://articulo19.org/wp-content/uploads/2017/06/Reporte-Gobierno-Espi%CC%81a-Final.pdf" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">Article 19, R3D, and SocialTIC</a>. Here’s what we know about Pegasus specifically.</p>
<p>The software’s capabilities were outlined in what appears to be a <a href="https://www.documentcloud.org/documents/4599753-NSO-Pegasus.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">promotional brochure</a> from NSO Group dating to <a href="https://wikileaks.org/hackingteam/emails/emailid/5391" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">2014</a> or earlier and made available when WikiLeaks published a <a href="https://wikileaks.org/hackingteam/emails/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">trove of emails</a> related to a different spyware firm, Italy’s Hacking Team. The brochure’s authenticity cannot be confirmed, and NSO has said it is not commenting further on Pegasus. But the document markets Pegasus aggressively, saying it provides “unlimited access to target’s mobile devices” and allows clients to “remotely and covertly collect information about your target’s relationships, location, phone calls, plans and activities — whenever and wherever they are.” The brochure also states the Pegasus can:</p>
<ul>
<li>Monitor voice and VoIP calls in real-time.</li>
<li>Siphon contacts, passwords, files, and encrypted content from the phone.</li>
<li>Operate as an “environmental wiretap,” listening through the microphone.</li>
<li>Monitor communications through apps like WhatsApp, Facebook, Skype, Blackberry Messenger, and Viber.</li>
<li>Track the phone’s location via GPS.</li>
</ul>
<p>For all the hype, Pegasus is, however, just a glorified version of an old type of malware known as a Remote Access Trojan, or RAT: a program that allows an unauthorized party full access over a target device. In other words, while Pegasus may be potent, the security community knows well how to defend against this type of threat.</p>
<p>Let’s look at the different ways Pegasus can potentially infect phones — its various “agent installation vectors,” in the brochure’s own vernacular — and how to defend against each one.</p>
<h3>Dodging Social Engineering Clickbait</h3>
<p>There are numerous examples in reports of Pegasus attacks of journalists and human rights defenders receiving <a href="https://citizenlab.ca/2020/01/stopping-the-press-new-york-times-journalist-targeted-by-saudi-linked-pegasus-spyware-operator/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">SMS</a> and <a href="https://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">WhatsApp</a> bait messages enjoining them to click malicious links. The links download spyware that lodges into devices through security holes in browsers and operating systems. This attack vector is called an Enhanced Social Engineer Message, or ESEM, in the leaked brochure. It states that “the chances that the target will click the link are totally dependent on the level of content credibility. The Pegasus solution provides a wide range of tools to compose a tailored and innocent message to lure the target to open the message.”</p>
<blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><p>“The chances that the target will click the link are totally dependent on the level of content credibility.”</p></blockquote>
<p>As the Committee to Protect Journalists has <a href="https://cpj.org/2019/11/cpj-safety-advisory-journalist-targets-of-pegasus/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">detailed</a>, ESEM bait messages linked to Pegasus fall into various categories. Some claim to be from established organizations like banks, embassies, news agencies, or parcel delivery services. Others relate to personal matters, like work or alleged evidence of infidelity, or claim that the targeted person is facing some immediate security risk.</p>
<p>Future ESEM attacks may use different types of bait messages, which is why it’s important to treat any correspondence that tries to convince you to perform a digital action with caution. Here are some examples of what that means in practice:</p>
<ul>
<li>If you receive a message with a link, particularly if it includes a sense of urgency (stating a package is about to arrive or that your credit card is going to be charged), avoid the impulse to immediately click on it.</li>
<li>If you trust the linked site, type out the link’s web address manually.</li>
<li>If going to a website you frequently visit, save that website in a bookmark folder and only access the site from the link in your folder.</li>
<li>If you decide you’re going to click a link rather than typing it out or visiting the site via bookmark, at least scrutinize the link to confirm that it is pointing to a website you are familiar with. And remember that it’s possible you will still be fooled: Some phishing links use similar-looking letters from a non-English character set, in what is known as a <a href="https://en.wikipedia.org/wiki/IDN_homograph_attack" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">homograph attack</a>. For example, a Cyrillic “О” might be used to mimic the usual Latin “O” we see in English.</li>
<li>If the link appears to be a shortened URL, use a URL expander service such as <a href="https://urlex.org/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">URL Expander</a> or <a href="https://www.expandurl.net/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">ExpandURL</a> to reveal the actual, long link it points to before clicking.</li>
<li>Before you click a link apparently sent by someone you know, confirm that the person really did send it; their account may have been hacked or their phone number spoofed. Confirm with them using a different communication channel from the one on which you received the message. For instance, if the link came via a text or email message, give the sender a call. This is known as out-of-band verification or authentication.</li>
<li>Practice device compartmentalization, using a secondary device without any sensitive information on it to open untrusted links. Keep in mind that if the secondary device is infected, it may still be used to monitor you via the microphone or camera, so keep it in a <a href="https://www.google.com/search?tbm=shop&amp;q=phone+faraday+bag" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">Faraday bag</a> when not in use — or at least away from where you have sensitive conversations (a good idea even if it’s in a Faraday bag).</li>
<li>Use nondefault browsers. According to a section titled “Installation Failure” in the leaked Pegasus brochure, installation may fail if the target is running an <a href="https://www.documentcloud.org/documents/4599753-NSO-Pegasus.html#document/p15/a437978" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">unsupported browser</a> and in particular a browser other than “the default browser of the device.” But the document is now several years old, and it is possible that Pegasus today supports all kinds of browsers.</li>
<li>If there is ever any doubt about a given link, the safest operational security measure is to avoid opening the link.</li>
</ul>
<h3>Thwarting Network Injection Attacks</h3>
<p>Another way Pegasus <a href="https://www.amnesty.org/en/latest/research/2019/10/Morocco-Human-Rights-Defenders-Targeted-with-NSO-Groups-Spyware/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">infected</a> devices in multiple <a href="https://www.amnesty.org/en/latest/research/2020/06/moroccan-journalist-targeted-with-network-injection-attacks-using-nso-groups-tools/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">cases</a> was by intercepting a phone’s network traffic using what’s known as a man-in-the-middle, or <a href="https://en.wikipedia.org/wiki/Man-in-the-middle_attack" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">MITM</a>, attack, in which Pegasus intercepted unencrypted network traffic, like HTTP web requests, and redirected it toward malicious payloads. Pulling this off entailed either tricking the phone into connecting to a rogue portable device which pretends to be a cell tower nearby or gaining access to the target’s cellular carrier (plausible if the target is in a repressive regime where the government provides telecommunication services). This attack worked even if the phone was in mobile data-only mode, and not connected to Wi-Fi.</p>
<p>When <a href="https://www.amnesty.org/en/latest/research/2019/10/Morocco-Human-Rights-Defenders-Targeted-with-NSO-Groups-Spyware/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">Maati Monjib</a>, the co-founder of the Freedom Now NGO and the Moroccan Association for Investigative Journalism, opened the iPhone Safari browser and typed yahoo.fr, Safari first tried going to http://yahoo.fr. Normally this would have redirected to https://fr.yahoo.com, an encrypted connection. But since Monjib’s connection was being intercepted, it instead redirected to a malicious third-party site which ultimately hacked his phone.</p>
<blockquote class="stylized pull-left" data-shortcode-type="pullquote" data-pull="left"><p>Typing just the website domain into a browser opens you to attacks, because your browser will attempt an unencrypted connection to the site.</p></blockquote>
<p>Typing just the website domain (such as yahoo.fr) into a browser address bar without specifying a protocol (such as https://) opens the possibility for MITM attacks, because your browser by default will attempt an unencrypted HTTP connection to the site. Usually, you reach the genuine site, which immediately redirects you to a safe HTTPS connection. But if someone is tracking to hack your device, that first HTTP connection is enough of an opening to hijack your connection.</p>
<p>Some websites protect against this using a complicated security feature known as <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">HTTP Strict Transport Security</a>, which prevents your browser from ever making an unencrypted request to them, but you can’t always count on this, even for some websites that implement it correctly.</p>
<p>Here are some things you can do to prevent these kinds of attacks:</p>
<ul>
<li>Always type out https:// when going to websites.</li>
<li>Bookmark secure (HTTPS) URLs for your favorite sites, and use those instead of typing the domain name directly.</li>
<li>Alternately, use a <a href="https://en.wikipedia.org/wiki/Virtual_private_network" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">VPN</a> on both your desktop and mobile devices. A VPN tunnels all connections securely to the VPN server, which then accesses websites on your behalf and relays them back to you. This means that an attacker monitoring your network will likely not be able to perform a successful MITM attack as your connection is encrypted to the VPN — even if you type a domain directly into your browser without the “https://” part.</li>
</ul>
<p>If you use a VPN, keep in mind that your VPN provider has the ability to spy on your internet traffic, so it’s important to pick a trustworthy one. Wirecutter publishes a regularly updated, thorough <a href="https://www.nytimes.com/wirecutter/reviews/best-vpn-service/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">comparison of VPN providers</a> based on their history of third-party security audits, their privacy and terms of use policies, the security of the VPN technology used, and other factors.</p>
<h3>Zero-Click Exploits</h3>
<p>Unlike infection attempts which require that the target perform some action like clicking a link or opening an attachment, zero-click exploits are so called because they require no interaction from the target. All that is required is for the targeted person to have a particular vulnerable app or operating system installed. Amnesty International’s <a href="https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">forensic report </a>on the recently revealed Pegasus evidence states that some infections were transmitted through zero-click attacks leveraging the Apple Music and iMessage apps.</p>
<blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><p>Your device should have the bare minimum of apps that you need.</p></blockquote>
<p>This is not the first time NSO Group’s tools have been linked to zero-click attacks. A 2017 <a href="https://cdn2.uvnimg.com/db/e1/9105935b4499804fd3feb1f7f933/martinelli-complaint.pdf" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">complaint</a> against Panama’s former President Ricardo Martinelli states that journalists, political figures, union activists, and civic association leaders were targeted with Pegasus and rogue push notifications delivered to their devices, while in 2019 WhatsApp and Facebook filed a <a href="https://context-cdn.washingtonpost.com/notes/prod/default/documents/bf5edf35-5672-49fa-aca1-edefadff683f/note/8ef25c0d-fee9-416a-b7f9-e0a4dedc66f2.pdf" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">complaint</a> claiming NSO Group developed malware capable of exploiting a zero-click vulnerability in WhatsApp.</p>
<p>As zero-click vulnerabilities by definition do not require any user interaction, they are the hardest to defend against. But users can reduce their chances of succumbing to these exploits by reducing what is known as their “attack surface” and by practicing device compartmentalization. Reducing your attack surface simply means minimizing the possible ways that your device may be infected. Device compartmentalization means spreading your data and apps across multiple devices.</p>
<p>Specifically, users can:</p>
<ul>
<li>Reduce the number of apps on your phone. The fewer unlocked doors your home has, the fewer opportunities a burglar has to enter; similarly, fewer apps means fewer virtual doors on your phone for an adversary to exploit. Your device should have the bare minimum apps that you need to perform day-to-day function. There are some apps you cannot remove, such as iMessage; in those cases you can often <a href="https://selfsolve.apple.com/deregister-imessage/" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">disable</a> them, though doing so will also make text messages no longer work on your iPhone.</li>
<li>Regularly audit your installed apps (and their permissions), and remove any that you no longer need. It is safer to remove a seldom-used app and download it again when you actually need it than to let it remain on your phone.</li>
<li>Regularly update both your phone’s operating system and individual apps, since updates close vulnerabilities, <a href="https://www.vice.com/en_us/article/v7gd9b/facebook-helped-fbi-hack-child-predator-buster-hernandez" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">sometimes even unintentionally</a>.</li>
<li>Compartmentalize your remaining apps. If a phone only has WhatsApp installed and is compromised, the hacker will get WhatsApp data, but not other sensitive information like email, calendar, photos, or <a href="https://theintercept.com/2017/05/01/cybersecurity-for-the-people-how-to-keep-your-chats-truly-private-with-signal/">Signal messages</a>.</li>
<li>Even a compartmentalized phone can still be used as a wiretap and a tracking device, so keep devices physically compartmentalized — that is, leave them in another room, ideally in a <a href="https://www.google.com/search?tbm=shop&amp;q=tamper+evident+bag" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">tamper bag</a>.</li>
</ul>
<h3>Physical Access</h3>
<p>A final way an attacker can infect your phone is by physically interacting with it. According to the brochure, “when physical access to the device is an option, the Pegasus agent can be manually injected and installed in less than five minutes” — though it is unclear if the phone needs to be unlocked or if attackers are able to infect even a PIN-protected phone.</p>
<p>There seem to be no known cases of physically launched Pegasus attacks, though such exploits may be difficult to spot and distinguish from online attacks. Here’s how you can mitigate them:</p>
<ul>
<li>Always maintain a line of sight to your devices. Losing sight of your devices opens the possibility of physical compromise. Obviously there is a difference between a customs agent taking your phone at the airport versus you leaving your laptop behind in a room in your residence when you go to the bathroom, but all involve some risk, and you will have to calibrate your own risk tolerance.</li>
<li>Put your device in a tamper bag when it needs to be left unattended, particularly in riskier locations like hotel rooms. This will not prevent the device from being manipulated but will at the least provide a ready alert that the device has been taken out of the bag and <i>might</i> have been tampered with, at which point the device should no longer be used.</li>
<li>Use burner phones and other compartmented devices when entering potentially hostile environments such as government buildings, including embassies and consulates, or when going through border checkpoints.</li>
</ul>
<p>Generally:</p>
<ul>
<li>Use Amnesty International’s <a href="https://mvt.readthedocs.io/en/latest/index.html" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">Mobile Verification Toolkit</a> if you suspect your phone is infected with Pegasus.</li>
<li>Regularly back up important files.</li>
<li>And finally, there’s no harm in regularly <a href="https://support.apple.com/guide/iphone/erase-iphone-iph7a2a9399b/ios" target="_blank" rel="noopener noreferrer" aria-describedby="targetBlankDescription">resetting</a> your phone.</li>
</ul>
<p>Although Pegasus is a sophisticated piece of spyware, there are tangible steps you can take to minimize the chance that your devices will be infected. There’s no foolproof method to eliminate your risk entirely, but there are definitely things you can do to lower that risk, and there’s certainly no need to resort to the defeatist view that we’re “no match” for Pegasus. <a href="https://theintercept.com/2021/07/27/pegasus-nso-spyware-security/" target="_blank" rel="noopener">source</a></p>
<hr />
<h1>How to Check if Your Cellphone Is Infected With Pegasus Spyware</h1>
<p class="rz ti ky tj tk tl">NSO Group’s Pegasus spyware can turn any infected smartphone into a remote microphone and camera, spying on its own owner while also offering the hacker – usually in the form of a state intelligence or law enforcement agency – full access to files, messages and, of course, the user’s location.</p>
<p class="rz ti ky tj tk tl"><a class="su sv sw sx iy ks sy sz ta tb tc td sc fj jl jm" href="https://www.haaretz.com/ty-tag/nso-0000017f-da35-d718-a5ff-fab5bc8e0000">Pegasus</a> is one of a number of proprietary tools sold as part of the hacker-for-hire industry – and one found at the very high-end of that dark market. Other companies offer less expensive services – for example, only providing geolocation services for its clients. So how can you protect yourself? And how can you check to see if your phone has been targeted in the past or is infected now?</p>
<p class="rz ti ky tj tk tl">Haaretz offers a simple, nontechnical explanation on how to check and stay safe&#8230;</p>
<p class="rz ti ky tj tk tl"><strong class="ey">The weakest link</strong></p>
<p class="rz ti ky tj tk tl">Most cellphone spyware operates in a similar fashion: a message is sent to a phone with a nefarious message. The message usually contains a link that will either download the malware onto your device directly, or refer it to a website that will prompt a download – all unbeknown to the phone’s owner.</p>
<p class="rz ti ky tj tk tl">There are other ways to get your phone to download something that don&#8217;t involve a message. However, from the moment of infection, most spyware tools follow a similar protocol: once installed, the spyware contacts what is called a “command-and-control” server, which provides it with instructions remotely.</p>
<p class="rz ti ky tj tk tl">“Let’s say the Israel Police are the ones who installed Pegasus on your smartphone and they want to know where you – or, more precisely, your phone – has been in the previous 24 hours. To get that information, instructions to obtain that data are sent to a C&amp;C server connected to the phone,” explains Dr. Gil David, a researcher and cybersecurity consultant.</p>
<div class="undefined hy">
<div class="FI_PH">The best way to stay safe, any cybersecurity expert will tell you, is to never – ever! – open any link sent to you, unless it&#8217;s a link you are expecting from someone you know and trust.</div>
</div>
<div class="undefined hy">
<div class="FI_PH">The reason is that, once infected, “the C&amp;C server communicates between the hacker and the spyware installed on your phone. Without it, the hacker has no way of relaying instructions to Pegasus, and Pegasus has no way to get information from the victim’s phone back to the hacker,” David writes in Haaretz Hebrew.</div>
</div>
<p class="rz ti ky tj tk tl">Many times, the links sent to you will appear innocent. It may look like a message from the Post Office or Amazon. But don’t be fooled: Through some simple social engineering and a process called “DNS spoofing,” even an official-looking URL may be a trap.</p>
<div class="undefined hy">
<div class="FI_PH"><strong class="ey" style="color: #ff0000;">Double zero</strong></div>
</div>
<p class="rz ti ky tj tk tl">Sadly, staying safe is not always possible.</p>
<p class="rz ti ky tj tk tl">What makes Pegasus so expensive is its ability to not just potentially infect any smartphone selected for targeting remotely, but to do so with a “zero click” infection. This means your phone can be infected without you even having to click on a link – for example, with the code instructing your phone to reach out to the server secretly encoded into a WhatsApp message or even in a file like a photo texted to you via iMessage.</p>
<p class="rz ti ky tj tk tl">These “zero click” attacks make use of what is called “zero-day” exploits: unknown loopholes in your phone’s defenses that allow these hidden bits of code to kick into action without the victim doing anything.</p>
<p class="rz ti ky tj tk tl">So, another good practice is to make sure your phone’s operating system is as updated as possible: As new exploits are discovered, they are quickly “patched” by the likes of Apple and Google.</p>
<p class="rz ti ky tj tk tl">According to digital forensics experts Amnesty International and Citizen Lab, Pegasus’ zero click infections have only been found on iPhones. “Most recently, a successful ‘zero-click’ attack has been observed exploiting multiple zero-days to attack a fully patched iPhone 12 running iOS 14.6 in July 2021,” Amnesty notes in its instructive report <a class="su sv sw sx iy ks sy sz ta tb tc td sc fj jl jm" href="https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/">&#8220;How to Catch NSO Group&#8217;s Pegasus.&#8221;</a></p>
<p class="rz ti ky tj tk tl">It seems Pegasus’ ability to infect iPhones was based on a previously unknown loophole in the iMessage service, and this too has subsequently been patched. However, other Israel firms, for instance QuadDream, reportedly have such abilities as well.</p>
<p class="rz ti ky tj tk tl">“From 2019, an increasing amount of vulnerabilities in iOS, especially iMessage and FaceTime, started getting patched thanks to their discoveries by vulnerability researchers, or to cybersecurity vendors reporting exploits discovered in-the-wild,” Amnesty writes – so make sure your phone is updated.</p>
<h2 class="rz ti ky tj tk tl"><span style="color: #ff0000;"><strong class="ey">Indicators of compromise</strong></span></h2>
<p class="rz ti ky tj tk tl">Groups like Amnesty and Citizen Lab find NSO’s spyware on phones using two different methods. Both involve searching for what is termed “indicators of compromise,” or IOCs.</p>
<p class="rz ti ky tj tk tl">Amnesty maintains a database of nefarious domains used by NSO’s clients. The list is constantly updating as more bogus URLs are found. Citizen Lab, meanwhile, also maintains a database of so-called vectors: messages sent to victims containing nefarious code or URLS. The two groups each maintain updated lists of Pegasus’ related processes that together permit attribution.</p>
<p class="rz ti ky tj tk tl">The only thing that has changed with Pegasus over the years is the way your phone is referred to the server, and the way the so-called payload is delivered.</p>
<p class="rz ti ky tj tk tl">“While SMS messages carrying malicious links were the tactic of choice for NSO Group’s customers between 2016 and 2018, in more recent years they appear to have become increasingly rare,” Amnesty wrote in its <a class="su sv sw sx iy ks sy sz ta tb tc td sc fj jl jm" href="https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/">July 2021 report</a>.</p>
<p class="rz ti ky tj tk tl">The newer trend, discovered in the case of Moroccan journalist <a class="su sv sw sx iy ks sy sz ta tb tc td sc fj jl jm" href="https://www.amnesty.org/en/latest/news/2020/06/nso-spyware-used-against-moroccan-journalist/">Omar Radi, who was infected with Pegasus in 2020</a>, is what is known as “packet injection.” This means that the download order is delivered not through a message but instead through your network, in the form of a hidden command “injected” into the phone through what Amnesty describes as “tactical devices, such as rogue cell towers, or through dedicated equipment placed at the mobile operator.</p>
<p class="rz ti ky tj tk tl">“The discovery of network injection attacks in Morocco signaled that the attackers’ tactics were indeed changing. Network injection is an effective and cost-efficient attack vector for domestic use especially in countries with leverage over mobile operators,” it explained.</p>
<p class="rz ti ky tj tk tl">As NSO’s clients are state agencies, they can easily make use of the mobile infrastructure to infect phones.</p>
<p class="rz ti ky tj tk tl">Therefore, and though such injection infections can also be forced upon you, other good practices include never using free Wi-Fi; never connecting to wireless networks you do not absolutely know are secure – as these networks can easily be hacked so they infect your phone and refer it to the snooping server. Not using so-called VPNs is also advisable for the same reason.</p>
<p class="rz ti ky tj tk tl">Chances are you have not been infected with Pegasus. However, if you have cause for concern and are scared you are or were infected, there are a few options:  Amnesty offers a useful, free and open source tool called the Mobile Verification Toolkit that can check a backup of your device or its logs for any IOC. The MVT will scan your iPhone’s logs for Pegasus-related processes or search your Android&#8217;s messages for nefarious links. The tool <a class="su sv sw sx iy ks sy sz ta tb tc td sc fj jl jm" href="https://github.com/mvt-project/mvt?fbclid=IwAR0JV7V9TcMh5Kbe5aKi9cnxqbv5IFyhgHpdT8aesFiwS5h5xSztlEoOg6k">can be downloaded here</a>. The bad news is that it requires some technical know-how and is currently devoid of a simple-to-use interface. To get it to work, you first need to make a specific type of backup of your phone, and then you need to download the program and run the code on your computer so it can scan the file you created. Running the program requires you to download Python. Luckily, the <a class="su sv sw sx iy ks sy sz ta tb tc td sc fj jl jm" href="https://web.archive.org/web/20210830112025/https://docs.mvt.re/en/latest/install.html">tool comes with very clear instructions</a>, and even those unskilled in code can make use of it with a bit of effort. Furthermore, it also allows you to conduct the test yourself. A similar product is <a class="su sv sw sx iy ks sy sz ta tb tc td sc fj jl jm" href="https://imazing.com/guides/detect-pegasus-and-other-spyware-on-iphone">iMazing</a>, a phone-backup platform that runs on your desktop and provides a MVT-like analysis of your device. It does not prevent infections but can check your phone for IOCs. If the best offense is defense, there’s also a growing cellphone security market. Cyberdefense firms like ZecOps offer organizations like the BBC and Fortune 2000 companies a platform that inspects phones for current infections or traces of historic attacks. ZecOps also provides this service pro bono for journalists involved in the <a class="su sv sw sx iy ks sy sz ta tb tc td sc fj jl jm" href="https://www.haaretz.com/israel-news/tech-news/2021-07-18/ty-article/.premium/nsos-pegasus-the-israeli-cyber-weapon-used-against-180-journalists/0000017f-dc8d-df62-a9ff-dcdfe86d0000">Pegasus Project</a>. Private users can also buy such services. For example, the Israeli-Indian security firm SafeHouse Technologies offers an app called “BodyGuard” that provides defenses for your phone, for a small price. It already has more than a million users, mostly in India. If you can’t get the Mobile Verification Toolkit to work and are reluctant to use an app, and you genuinely fear you have been targeted, you can also <a class="su sv sw sx iy ks sy sz ta tb tc td sc fj jl jm" href="mailto:omerbenj@protonmail.com?subject=Pegasus%20test%20request%20tip">drop us a tip here</a> and we at Haaretz will get you checked. <a href="https://www.haaretz.com/israel-news/tech-news/2022-02-09/ty-article/how-to-check-if-your-cellphone-is-infected-with-pegasus/0000017f-e5a4-df5f-a17f-fffe3ea20000" target="_blank" rel="noopener">source</a></p>
<hr />
<h1 class="post-title single-post-title entry-title">HOW TO DETECT PEGASUS SPYWARE</h1>
<p>As one of the leading commercial spyware programs, Pegasus has been used by a host of companies, governments, and other entities to collect sensitive data from individuals’ smartphones. If Pegasus is deployed on your smartphone, your sensitive data could be at risk.<span id="more-12891"></span></p>
<p>Read on to learn how to detect Pegasus spyware on your smartphone.</p>
<p>&nbsp;</p>
<h2><b>How to Detect Pegasus Spyware</b><b> on Your Smartphone</b></h2>
<p>The data privacy demands of today’s IT landscape call for robust mobile security, as more individuals rely on smartphone applications for essential day-to-day tasks.</p>
<p>Safeguarding your smartphone data from threats like Pegasus starts with knowing how to:</p>
<ul>
<li aria-level="1"><em>Scan for and detect Pegasus spyware on your smartphone</em></li>
<li aria-level="1"><em>Identify Pegasus spyware installed on your smartphone</em></li>
<li aria-level="1"><em>Remove Pegasus spyware from your Android or iPhone</em></li>
<li aria-level="1"><em>Prevent Pegasus spyware from compromising your smartphone data </em></li>
</ul>
<p>Dealing with advanced mobile security risks like Pegasus spyware is much easier with the help of a managed security services provider (MSSP), who can advise on how to detect pegasus spyware on iPhone or Android.</p>
<p>&nbsp;</p>
<h2><b>What is Pegasus Spyware?</b></h2>
<p>Developed by the NSO group in Israel, Pegasus is signature spyware that has been implicated in the secret surveillance of individuals worldwide. Pegasus spyware is considered dangerous because it allows an attacker to control a victim’s smartphone.</p>
<p>Using Pegasus spyware, a perpetrator can:</p>
<ul>
<li aria-level="1">Wiretap and listen to conversations</li>
<li aria-level="1">Access photos and videos</li>
<li aria-level="1">Control applications on a smartphone</li>
</ul>
<p>It is difficult and often impossible for antivirus solutions to detect Pegasus spyware because it exploits zero-day vulnerabilities, which are unknown to the developers of these solutions.</p>
<p>&nbsp;</p>
<h2><b>How to Detect Pegasus Spyware</b></h2>
<p>Over years of extensive research, Amnesty International has developed a methodology to detect Pegasus spyware on smartphones, providing it to the public as a resource on Github.</p>
<p>Using Amnesty International’s methodology, you can find a list of:</p>
<ul>
<li aria-level="1"><em>Domain names of Pegasus infrastructure</em></li>
<li aria-level="1"><em>Email addresses identified in previous attacks</em></li>
<li aria-level="1"><em>Process names associated with Pegasus</em></li>
</ul>
<p>Beyond the indicators of Pegasus compromise methodology, Amnesty International also released a Mobile Verification Toolkit (MVT) to help support users interested in detecting Pegasus spyware on their smartphones. With the help of Amnesty International’s spyware detection tools, you can learn how to detect pegasus spyware on Android or iPhone.</p>
<p>&nbsp;</p>
<h3><b>How to Detect Pegasus </b><b>Spyware </b><b>on iOS</b></h3>
<p>Here’s how to check for pegasus spyware on iOS devices such as iPhones:</p>
<ul>
<li aria-level="1">Create a backup of encrypted data on a device other than your smartphone</li>
<li aria-level="1">Once your smartphone is securely backed up, download the MVT tool onto your iPhone and follow Amnesty International’s instructions for detecting Pegasus.</li>
</ul>
<p>Whereas other apps can detect Pegasus on iOS, it’s best to follow Amnesty International’s instructions or work with a <strong>qualified MSSP</strong> to avoid running into any issues while detecting the spyware.</p>
<p>&nbsp;</p>
<h3><b>How to Detect Pegasus </b><b>Spyware </b><b>on Android</b></h3>
<p>Although the MVT mostly caters to iOS devices, it can still detect Pegasus on Android.</p>
<p>If you are wondering how to detect Pegasus spyware on Android with the MVT, the first places to start looking are potentially malicious text messages and APKs on your smartphone.</p>
<p>&nbsp;</p>
<h2><b>How Pegasus Works</b></h2>
<p>For most Pegasus infections, the spyware is installed remotely on victims’ smartphones. However, Pegasus can be installed physically, and, in some cases, it can use the victim’s smartphone for data storage prior to transmitting data to a remote server.</p>
<h3><b>Pegasus Remote Installation</b></h3>
<p>Pegasus spyware can be remotely installed on a smartphone via:</p>
<ul>
<li aria-level="1"><b>Zero-click attacks</b> – Zero-click exploits typically leverage applications such as Apple Music or iMessage to send requests to the victim’s smartphone. Here, the victim does not interact with the spyware and is clueless about the download of Pegasus spyware.</li>
<li aria-level="1"><b>Malicious text messages</b> –  A victim receives a text message containing an exploit link for a Pegasus spyware download. Clicking the link deploys spyware on the victim’s smartphone.</li>
<li aria-level="1"><b>Network injection attack</b> – While browsing the Internet, a victim is redirected from a clear-text HTTP website to a decoy of a legitimate business. Unknowingly, a victim may then provide access credentials or other sensitive information.</li>
</ul>
<p>In most cases, remote installation of Pegasus spyware on victims’ phones via zero-click attacks leverages zero-day vulnerabilities, of which the smartphone manufacturer may not be aware.</p>
<p>This makes Pegasus spyware very dangerous to its victims, who may not realize their sensitive data is being surveilled until it is too late.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-10971" src="https://blog.rsisecurity.com/wp-content/uploads/2021/12/planning-300x120.jpg" sizes="(max-width: 825px) 100vw, 825px" srcset="https://blog.rsisecurity.com/wp-content/uploads/2021/12/planning-300x120.jpg 300w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/planning-768x306.jpg 768w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/planning-1024x408.jpg 1024w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/planning-1170x466.jpg 1170w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/planning-585x233.jpg 585w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/planning.jpg 1277w" alt="planning" width="825" height="330" /></p>
<h3><b>Pegasus Physical Installation</b></h3>
<p>While it is uncommon, Pegasus can be installed by connecting a victim’s smartphone to another device such as a computer to deploy the spyware. However, this would involve the difficult task of accessing a victim’s smartphone without their knowledge.</p>
<p>&nbsp;</p>
<h3><b>Pegasus Data Management</b></h3>
<p>According to NSO, the spyware will transmit data from a victim’s smartphone to a server where the attacker can access the data. However, if Pegasus is unable to send data to a server, it will transmit the data to a “hidden and encrypted buffer” within the phone’s storage.</p>
<p>&nbsp;</p>
<h2><b>What Data Can Pegasus Access?</b></h2>
<p>Once deployed on a smartphone, Pegasus spyware can access a range of data, including:</p>
<ul>
<li aria-level="1">Text messages</li>
<li aria-level="1">Emails</li>
<li aria-level="1">Photos and videos</li>
<li aria-level="1">Personal contacts</li>
<li aria-level="1">Location</li>
<li aria-level="1">Audio messages and recordings</li>
</ul>
<p>Detecting Pegasus spyware on your smartphone is critical to minimizing the risks of your sensitive data being exposed by perpetrators.</p>
<p>&nbsp;</p>
<h3><b>Can Pegasus be Removed?</b></h3>
<p>You can remove Pegasus from your smartphone by attempting the following actions:</p>
<ul>
<li aria-level="1">Restarting your smartphone, to put a temporary stop to Pegasus</li>
<li aria-level="1">Resetting your smartphone to its factory settings, which <i>may</i> remove Pegasus</li>
<li aria-level="1">Updating your smartphone’s system software and apps to current versions</li>
<li aria-level="1">Removing any unknown device connections to social media platforms</li>
</ul>
<p>When removing Pegasus from your smartphone, it is always best to work with the MVT resource provided by Amnesty International. If Pegasus spyware removal becomes difficult, consider consulting an MSSP for help.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-10968" src="https://blog.rsisecurity.com/wp-content/uploads/2021/12/incident-300x117.jpg" sizes="(max-width: 818px) 100vw, 818px" srcset="https://blog.rsisecurity.com/wp-content/uploads/2021/12/incident-300x117.jpg 300w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/incident-768x300.jpg 768w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/incident-1024x400.jpg 1024w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/incident-1170x456.jpg 1170w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/incident-585x228.jpg 585w, https://blog.rsisecurity.com/wp-content/uploads/2021/12/incident.jpg 1279w" alt="incident" width="818" height="319" /></p>
<h2><b>What to Do if You Have Pegasus</b></h2>
<p>According to Reporters Without Borders (RSF), here’s what to do if you have Pegasus:</p>
<ul>
<li aria-level="1">Buy a new smartphone and stop using the one infected with Pegasus, ensuring the compromised smartphone is not close to you or your work environment.</li>
<li aria-level="1">Change passwords for all accounts on the new smartphone and remember to sign out of the accounts on the compromised one.</li>
</ul>
<p>If you have Pegasus, it is best to contact an experienced MSSP, who will point you to Pegasus spyware removal tools that will help remove Pegasus and keep your data safe.</p>
<p>&nbsp;</p>
<h2><b>Other Spyware like Pegasus</b></h2>
<p>Besides Pegasus, other types of spyware include:</p>
<ul>
<li aria-level="1">Trojans, which can steal a victim’s funds or credentials to make fraudulent purchases.</li>
<li aria-level="1">Stealware, which can intercept traffic from online shopping sites like those offering credits or rewards for purchases.</li>
</ul>
<p>With everyone using smartphones or tablets to store sensitive information like account passwords, securing these devices from spyware and other forms of malware is paramount.</p>
<p>In an organizational setting, it is critical for leadership to emphasize the importance of mobile security in defending sensitive data stored on smartphones from various types of spyware.</p>
<p>&nbsp;</p>
<h2><b>How to Protect From Pegasus and Other Spyware</b></h2>
<p>Protecting your organization from Pegasus and other spyware revolves around implementing mobile device security best practices such as:</p>
<ul>
<li aria-level="1">Encrypting any communication of sensitive data with industry-standard algorithms</li>
<li aria-level="1">Keeping up-to-date with the latest phishing and malware attempts</li>
<li aria-level="1">Updating your smartphone or mobile device with the latest security patches</li>
<li aria-level="1">Using strong passwords and multi-factor authentication on all mobile devices</li>
<li aria-level="1">Conducting routine penetration testing on mobile devices that contain sensitive data</li>
</ul>
<p>If you are wondering how to block Pegasus spyware, some of the mobile security best practices above can help. However, it’s best to implement them with the guidance of a leading MSSP. <a href="https://blog.rsisecurity.com/how-to-detect-pegasus-spyware/#:~:text=Although%20the%20MVT%20mostly%20caters,and%20APKs%20on%20your%20smartphone." target="_blank" rel="noopener">source</a></p>
<hr />
<h1 class="Page-headline">Journalists, lawyers and activists hacked with Pegasus spyware in Jordan, forensic probe finds</h1>
<div class="StoryPage-actions-wrapper">
<div class="Page-byline"></div>
</div>
<div class="RichTextStoryBody RichTextBody">
<p>de Pegasus spyware was used in Jordan to hack the cellphones of at least 30 people, including journalists, lawyers, human rights and political activists, the digital rights group Access Now said Thursday.</p>
<p>The hacking with <span class="LinkEnhancement">spyware</span> made by Israel’s <span class="LinkEnhancement">NSO Group</span> occurred from 2019 until last September, Access Now said in its report. It did not accuse Jordan’s government of the hacking.</p>
<p>One of the targets was Human Rights Watch’s deputy director for the region, Adam Coogle, who said in an interview that it was difficult to imagine who other than Jordan’s government would be interested in hacking those who were targeted.</p>
<p>The Jordanian government had no immediate comment on <span class="LinkEnhancement">Thursday’s report</span>.</p>
<p><span class="LinkEnhancement">In a 2022 report</span> detailing a much smaller group of Pegasus victims in Jordan, digital sleuths at the University of Toronto’s Citizen Lab identified two operators of the spyware it said may have been agents of the Jordanian government. A year earlier, <span class="LinkEnhancement">Axios reported</span> on negotiations between Jordan’s government and NSO Group.</p>
<p>“We believe this is just the tip of the iceberg when it comes to the use of Pegasus spyware in Jordan, and that the true number of victims is likely much higher,” Access Now said. Its Middle East and North Africa director, Marwa Fatafta, said at least 30 of 35 known targeted individuals were successfully hacked.</p>
<p>Citizen Lab <span class="LinkEnhancement"><a class="Link AnClick-LinkEnhancement" href="https://citizenlab.ca/2024/02/confirming-large-scale-pegasus-surveillance-of-jordan-based-civil-society" target="_blank" rel="noopener" data-gtm-enhancement-style="LinkEnhancementA">confirmed all but five of the infections</a></span>, with 21 victims asking to remain anonymous, citing the risk of reprisal. The rest were identified by Human Rights Watch, Amnesty International’s Security Lab, and the Organized Crime and Corruption Reporting Project.</p>
<p>NSO Group says it only sells to vetted intelligence and law enforcement agencies — and only for use against terrorists and serious criminals. But cybersecurity researchers who have tracked the spyware’s use in 45 countries have documented dozens of cases of politically motivated abuse of the spyware — from <span class="LinkEnhancement"><a class="Link AnClick-LinkEnhancement" href="https://apnews.com/article/mexico-pegasus-spyware-activists-press-freedom-army-76477e1d4e3e09250e20aa4896b1f9e1" target="_blank" rel="noopener" data-gtm-enhancement-style="LinkEnhancementA">Mexico</a></span> and <span class="LinkEnhancement"><a class="Link AnClick-LinkEnhancement" href="https://apnews.com/article/thailand-surveillance-nso-spyware-1081ac34cf80e15c048af8c2d1db0e33" target="_blank" rel="noopener" data-gtm-enhancement-style="LinkEnhancementA">Thailand</a></span> to <span class="LinkEnhancement"><a class="Link AnClick-LinkEnhancement" href="https://apnews.com/article/technology-business-software-spyware-jaroslaw-kaczynski-0c41a504e8fbdbb6b9b06f6869848a48" target="_blank" rel="noopener" data-gtm-enhancement-style="LinkEnhancementA">Poland</a></span> and <span class="LinkEnhancement"><a class="Link AnClick-LinkEnhancement" href="https://www.theguardian.com/world/2022/aug/19/british-judge-rules-dissident-ghanem-almasarir-can-sue-saudi-arabia-for-pegasus-hacking" target="_blank" rel="noopener" data-gtm-enhancement-style="LinkEnhancementA">Saudi Arabia.</a></span></p>
<p>An NSO Group spokesperson said the company would not confirm or deny its clients’ identities. NSO Group says it vets customers and investigates any report its spyware has been abused.</p>
<p>The U.S. government was unpersuaded and blacklisted the NSO Group in November 2021, when iPhone maker Apple Inc. sued it, calling its employees “amoral 21st century mercenaries who have created highly sophisticated cyber-surveillance machinery that invites routine and flagrant abuse.”</p>
<p>Those targeted in Jordan include Human Rights Watch’s senior researcher for Jordan and Syria, Hiba Zayadin. Both she and Coogle had received threat notifications from Apple on Aug. 29 that state-sponsored attackers had attempted to compromise their iPhones.</p>
<p>Coogle’s local, personal iPhone was successfully hacked in October 2022, he said, just two weeks after the human rights group <span class="LinkEnhancement"><a class="Link AnClick-LinkEnhancement" href="https://www.hrw.org/news/2022/09/18/jordan-government-crushes-civic-space" target="_blank" rel="noopener" data-gtm-enhancement-style="LinkEnhancementA">published a report</a></span> documenting the persecution and harassment of citizens organizing peaceful political dissent.</p>
<p>After that, Coogle activated <span class="LinkEnhancement"><a class="Link AnClick-LinkEnhancement" href="https://apnews.com/article/technology-hacking-apple-inc-spyware-ad4fb8df901b525d6fddc359670ce3a9" target="_blank" rel="noopener" data-gtm-enhancement-style="LinkEnhancementA">“Lockdown Mode,”</a></span> on the iPhone, which Apple recommends for users at high risk.</p>
<p>Human Rights Watch said <span class="LinkEnhancement"><a class="Link AnClick-LinkEnhancement" href="https://www.hrw.org/news/2024/02/01/spyware-targets-human-rights-watch-staff-jordan" target="_blank" rel="noopener" data-gtm-enhancement-style="LinkEnhancementA">in a statement</a></span> Thursday that it had contacted NSO Group about the attacks and specifically asked it to investigate the hack of Coogle’s device “but has received no substantive response to these inquiries.”</p>
<p>Jordanian human rights lawyer Hala Ahed — known for defending women’s and workers rights and prisoners of conscience — was also targeted at least twice by Pegasus, successfully in March 2021 then unsuccessfully in February 2023, Access Now said.</p>
<p>About half of those found to have been targeted by Pegasus in Jordan — 16 in all — were journalists or media workers, the report said.</p>
<p>One veteran Palestinian-American journalist and columnist, Dauod Kuttab, was hacked with Pegasus three times between February 2022 and September 2023.</p>
<p>Along the way, he said, he’s learned important lessons about not clicking on links in messages purporting to be from legitimate contacts, which is how one of the Pegasus hacks snared him.</p>
<p>Kuttab refused to speculate about who might have targeted him.</p>
<p>“I always assume that somebody is listening to my conversations,” he said, as getting surveilled “comes with the territory” when you are journalist in the Middle East.</p>
<p>But Kuttab does worry about his sources being compromised by hacks — and the violation of his privacy.</p>
<p>“Regardless of who did it, it’s not right to intervene into my personal, family privacy and my professional privacy.” <a href="https://apnews.com/article/jordan-hacking-pegasus-spyware-nso-group-99b0b1e4ee256e0b4df055f926349a43" target="_blank" rel="noopener">source</a></p>
</div>
<hr />
<h1 class="ao ap aq ar as at nx ny nz oa m" data-test="articleHeaderTitle">The NSO File: A Complete (Updating) List of Individuals Targeted With Pegasus Spyware</h1>
<p class="ob q r oc od oe of og oh oi oj ok ol om ac ae af ag" data-test="articleHeaderSubtitle">The Israeli-made Pegasus spyware is suspected of infecting over 450 phones targeted by clients of NSO, who range from Saudi Arabia to Mexican drug lords. Here’s a list of the confirmed Pegasus victims.</p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">The Israeli-made Pegasus spyware, sold by the cyberoffense firm NSO to state intelligence agencies around the world, has become infamous in recent years. Exploiting unknown loopholes in WhatsApp, iMessage and Android has allowed the group’s clients to potentially infect any smartphone and gain full access to it – in some cases without the owner even clicking or opening a file.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Digital forensics groups such as Amnesty International and the University of Toronto’s Citizen Lab have revealed numerous potential targets with traces of the spyware on their phones. Last summer, Project Pegasus – led by Paris-based NGO Forbidden Stories with the help of Amnesty’s Security Lab – organized an international consortium of journalists, including Haaretz and its sister publication TheMarker, to investigate thousands of additional potential targets selected for possible surveillance by <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/ty-tag/nso-0000017f-da35-d718-a5ff-fab5bc8e0000">NSO Group</a> clients worldwide.</p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">So far, targets have been found across the world: from India and Uganda to Mexico and the West Bank, with high-profile victims including U.S. officials and a New York Times journalist.</p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Now, for the first time, Haaretz has assembled a list of confirmed cases involving Pegasus spyware.</p>
<p data-test="articleHeaderSubtitle"><img loading="lazy" decoding="async" class="alignnone wp-image-18277" src="https://goodshepherdmedia.net/wp-content/uploads/2024/06/NSO-Group-Spyare-Pegasus.webp" alt="" width="681" height="681" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/06/NSO-Group-Spyare-Pegasus.webp 960w, https://goodshepherdmedia.net/wp-content/uploads/2024/06/NSO-Group-Spyare-Pegasus-400x400.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/06/NSO-Group-Spyare-Pegasus-150x150.webp 150w, https://goodshepherdmedia.net/wp-content/uploads/2024/06/NSO-Group-Spyare-Pegasus-768x768.webp 768w" sizes="(max-width: 681px) 100vw, 681px" /></p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Though there have been over 450 suspected hacking cases, this list, which was put together with the help of Amnesty’s Security Lab, includes only the cases in which infections were confirmed either by Amnesty or another digital forensics group like Citizen Lab (which also helped construct this list). It also includes a few instances where official bodies such as French intelligence agencies or private firms like Apple or WhatsApp have publicly confirmed attacks.</p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">The list does not include those suspected of being targeted – for example, Amazon’s Jeff Bezos, who was reportedly sent the spyware via a WhatsApp message from no less than <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/ty-tag/mohammed-bin-salman-0000017f-da25-d718-a5ff-faa5ec430000">Saudi Crown Prince Mohammed bin Salman</a>. Rather, it is those who have actually been found with Pegasus on their phones.</p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">The NSO Group, which refuses to confirm the identity of its clients and claims it has no knowledge of their targets, has denied most of these cases and says digital forensic analysis cannot fully identify its software.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<ul class="py ue r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv go gn gm vi vj vk vl" data-test="relatedArticles">
<li class="vn m a vo vp vq vr vs vt vu jn vv vw vx vy vz wa wb wc wd we wf wg"><a href="https://www.haaretz.com/israel-news/tech-news/2022-02-09/ty-article/how-to-check-if-your-cellphone-is-infected-with-pegasus/0000017f-e5a4-df5f-a17f-fffe3ea20000" data-test="articleLink"><span class="vq dm m mj wh wi wj wk wl wm wn wo wp wq wr ws ve wt vg wu bj ln wv ww wx">How to Check if Your Cellphone Is Infected With Pegasus Spyware</span></a></li>
<li class="vn m a vo vp vq vr vs vt vu jn vv vw vx vy vz wa wb wc wd we wf wg"><a href="https://www.haaretz.com/israel-news/2022-01-18/ty-article/police-used-nsos-pegasus-to-spy-on-israelis-without-court-order-report-says/0000017f-e3bc-d804-ad7f-f3fefd210000" data-test="articleLink"><span class="vq dm m mj wh wi wj wk wl wm wn wo wp wq wr ws ve wt vg wu bj ln wv ww wx">Police Use NSO&#8217;s Pegasus to Spy on Israelis Without Warrant, Report Says</span></a></li>
<li class="vn m a vo vp vq vr vs vt vu jn vv vw vx vy vz wa wb wc wd we wf wg"><a href="https://www.haaretz.com/middle-east-news/2022-01-17/ty-article/.premium/israeli-nso-spyware-found-on-phones-of-jordanian-bahraini-womens-rights-activists/0000017f-e17f-df7c-a5ff-e37f6bfe0000" data-test="articleLink"><span class="vq dm m mj wh wi wj wk wl wm wn wo wp wq wr ws ve wt vg wu bj ln wv ww wx">Israeli NSO Spyware Found on Phones of Jordanian, Bahraini Women’s Rights Activists</span></a></li>
</ul>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">The gap between the massive list of potential targets and those who were actually infected highlights how hard it is to confirm the presence of Pegasus spyware on phones. For instance, a private investigation commissioned by Bezos himself found that his phone had received a strange message from Crown Prince Mohammed, after which the tycoon’s device began sending out a lot of data. However, Bezos was reluctant to hand his phone over to anyone other than the handpicked investigators he had hired; they said it was very likely his phone had been infected.</p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Here is the list of most, if not all, known and confirmed Pegasus cases. They are sorted by the nationality of the victims or their country of residence when they were targeted.</p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">The list of confirmed cases is followed by an additional list of names of those who have been confirmed to have been targeted but whose actual infection has not been verified.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<div class="q r gl gm gn go gp gq gr gs gt gu gv fp fq fr fs ft fu fv ah fj fk fl fm fn fo gw gx gy gz ha hb ac ae af ag">
<figure class="} m ev f pt py">
<div class="eg m pu">
<p><button class="ei pv pw px py kh ew mj et eg pz qa qb bk qc qd" type="button"><span class="ea eb ec ed ee ef eg eh ei ej ek cz">Open gallery view</span></button></p>
<div class="qg wy m f qk"><img loading="lazy" decoding="async" class="hx bu ei hi f ql qm qn qo auw id aux auy" title="The NSO Group logo on one of its Israeli offices., Credit: AMIR COHEN/REUTERS" src="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=1280&amp;width=1920" sizes="(min-width: 80em) 602px,(min-width: 64em) 594px,(min-width: 48em) 564px,(min-width: 37.5em) 576px,calc(100vw - 24px)" srcset="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=1280&amp;width=1920 1920w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=960&amp;width=1440 1440w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=854&amp;width=1280 1280w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=685&amp;width=1028 1028w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=612&amp;width=918 918w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=484&amp;width=726 726w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=400&amp;width=600 600w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=283&amp;width=425 425w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b53f90000/e9/9f/1bf9f9b7b43a9dfae324e23168ea/49664937.jpg?precrop=2449,1633,x0,y0&amp;height=250&amp;width=375 375w" alt="The NSO Group logo on one of its Israeli offices." width="767" height="511" data-test="articleBodyImage" /></div>
</div>
<div class="qq qr db dm ie dn wz dp dq qs qt dv dw"><span class="qp">The NSO Group logo on one of its Israeli offices.</span><span class="ao pt rj dp dq qs qt">Credit: AMIR COHEN/REUTERS</span></div>
</figure>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">AZERBAIJAN</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Khadija Ismayilova</strong><br />
The Azerbaijani investigative journalist based in Baku was targeted repeatedly for over three years as part of government persecution as a result of her work, <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2021-07-18/ty-article/.premium/nsos-pegasus-the-israeli-cyber-weapon-used-against-180-journalists/0000017f-dc8d-df62-a9ff-dcdfe86d0000">the Project Pegasus investigation revealed</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<div class="q r gl gm gn go gp gq gr gs gt gu gv fp fq fr fs ft fu fv ah fj fk fl fm fn fo gw gx gy gz ha hb ac ae af ag"></div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Sevinc Vaqifqizi</strong><br />
Freelance Azerbaijanii journalist Vaqifqizi was found by Amnesty and Forbidden Stories to have had their phone infected with Pegasus in 2019 and 2020.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">BAHRAIN</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Moosa Abd-Ali</strong><br />
Moosa Abd-Ali is a Bahraini activist living in exile in London who was found to have been targeted in the past, with the Bahraini government hacking his personal computer in 2011. <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://citizenlab.ca/2021/08/bahrain-hacks-activists-with-nso-group-zero-click-iphone-exploits/">According to Citizen Lab</a>, Abd-Ali’s iPhone 8 appears to have been hacked with Pegasus at some point prior to September 2020.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Yusuf al-Jamri</strong><br />
A Bahraini blogger who says he was tortured by his government, Yusuf al-Jamri was granted asylum in the U.K. in 2018. According to Citizen Lab, Jamri’s iPhone 7 appears to have been hacked with Pegasus at some point prior to September 2019.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Seven rights activists</strong><br />
At least three members of the Bahrain Centre for Human Rights, another three from the nonprofit Waad and one from the group Al Wefaq were also infected, Citizen Lab found. At least another seven members of BCHR and the other groups were actually targeted, but their infection was not confirmed by Citizen Lab.</p>
<div class="undefined ev"></div>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">EL SALVADOR</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Carlos Martínez</strong><br />
A reporter for El Faro, he was one of over 35 journalists and members of civil society groups infected by the Pegasus spyware between July 2020 and November 2021.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Daniel Lizárraga</strong><br />
A Mexican journalist and the editor of El Faro, who was expelled from El Salvador. Citizen Lab found that his phne had been infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Nine El Faro journalists</strong><br />
The following journalists with El Faro were all found by Citizen Lab to have been infected by the Pegasus spyware: Gabriela Cáceres, Carlos Dada, Carlos Ernesto Martínez D’aubuisson, Julia Gavarrete (who had two phones hacked), Valeria Guzmán, Ana Beatriz Lazo, Rebeca Monge, Víctor Peña, Nelson Rauda.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">El Salvadorian journalists</strong><br />
Citizen Lab discovered that the following journalists were also infected with Pegasus: Efren Lemus, Gabriel Labrador, José Luis Sanz, María Luz Nóchez, Mauricio Ernesto Sandoval Soriano, Óscar Martínez, Roman Gressier, Roxana Lazo, Sergio Arauz, Beatriz Benitez, Ezequiel Barrera, Xenia Oliva, an unnamed journalist from Diario El Mundo, and Daniel Reyes.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Noah Bullock</strong><br />
The head of Cristosal, a human rights organization based in El Salvador, who was also found by Citizen Lab to have been infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ricardo Avelar</strong><br />
A journalist with El Diario de Hoy, Citizen Lab confirmed that his device had been infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Jose Marinero</strong><br />
An official with the activism group Fundación DTJ in El Salvador whose phone was found by Citizen Lab to have been infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Xenia Hernandez</strong><br />
Another official with the activism group Fundación DTJ in El Salvador whose phone was found by Citizen Lab to have been infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Oscar Luna</strong><br />
An activist with the digital rights group Revista Digital Disruptiva. Citizen Lab found that their phone had been infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Mariana Belloso</strong><br />
An independent journalist whose phone was found by Citizen Lab to have been infected by the Pegasus spyware.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Carmen Tatiana Marroquín</strong><br />
An economist and columnist whose phone was found by Citizen Lab to have been infected by the Pegasus spyware.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">FINLAND</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Finnish diplomats</strong><br />
An unknown number of Finnish diplomats stationed abroad were found to have been infected, the Finnish Foreign Ministry confirmed. Their identity was not disclosed, nor was the suspected operator.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">FRANCE</strong></mark></p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Bruno Delport</strong><br />
The phone of the director of Parisian radio station TSF Jazz was found by Citizen Lab to have been infected in 2019, just as he was applying for the presidency of Radio France.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Lénaïg Bredoux</strong><br />
The investigative journalist and general editor of Mediapart was confirmed to have been infected by Pegasus. The confirmation was made by France’s computer security agency following Project Pegasus. Bredoux was involved in a story about the head of Morocco’s intelligence agency, a known NSO client.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Edwy Plenel</strong><br />
The investigative journalist with Mediapart was confirmed to have been infected by Pegasus. The confirmation was made by France’s computer security agency following Project Pegasus.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Unnamed France 24 journalist</strong><br />
A senior journalist with France 24 was confirmed to have been infected by Pegasus in May 2019, September 2020 and January 2021. That was confirmed by France’s computer security agency after Project Pegasus.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Claude Mangin</strong><br />
French national whose husband, Naama Asfari, is jailed in Morocco for advocating for Western Saharan independence. As part of Project Pegasus, it was found that <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.washingtonpost.com/technology/2021/07/19/apple-iphone-nso/">at least two of her phones were infected</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Arnaud Montebourg</strong><br />
A former minister in the government of Manuel Valls, Montebourg was targeted in 2019, most likely by Morocco, an analysis by Amnesty found. Montebourg has given testimony to ANSSI and its investigation into NSO in France.<br />
<strong class="dm">Suspected operator:</strong> Morocco</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">HUNGARY</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Dániel Németh</strong><br />
A Hungarian photojournalist involved in covering President Viktor Orbán and the country’s elites, two of his phones were infected in 2021. Direkt36, working with Citizen Lab and Amnesty’s Security Lab, confirmed the infections.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Zoltán Páva</strong><br />
The former Hungarian politician, now the publisher of an opposition news website, was also infected by Pegasus in March and May 2021.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Adrien Beauduin</strong><br />
A gender studies student at Central European University in Hungary, Beauduin was confirmed to have had his phone infected after being arrested in a protest against Orbán’s policies.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Szabolcs Panyi</strong><br />
The journalist with Direkt36, which was a partner in the Pegasus Project, was infected a number of times in 2019. The confirmation was made by Amnesty as part of the global investigation.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">András Szabó</strong><br />
An investigative journalist with Direkt36, Szabó’s phone was infected a number of times in 2019. The confirmation was made by Amnesty as part of the global investigation.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Brigitta Csikász</strong><br />
A Hungarian journalist covering crime stories, Csikász’s phone was infected in 2019 – which <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2021-07-18/ty-article/.premium/nsos-pegasus-the-israeli-cyber-weapon-used-against-180-journalists/0000017f-dc8d-df62-a9ff-dcdfe86d0000">was confirmed by Direkt36 and Amnesty</a>.</p>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">INDIA</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Jagdeep Singh Randhawa</strong><br />
Human rights lawyer and activist from Punjab <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://thewire.in/tech/punjab-pegasus-project-lawyers-police-brutality-uapa-surveillance">had his phone hacked in July and August 2019</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Mangalam Kesavan Venu</strong><br />
Founding editor of The Wire – a nonprofit Indian investigative journalism outlet that was part of the Project Pegasus investigation – was found to have been infected with the spyware.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Paranjoy Guha Thakurta</strong><br />
Investigative journalist who was looking into how the Modi government used Facebook to spread disinformation; Amnesty confirmed his phone had been infected by NSO’s spyware as part of the Project Pegasus investigation.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Prashant Kishor</strong><br />
Political pollster working with a number of opposition parties in India, his phone was infected in 2018, Amnesty confirmed, months before an election – in what critics say was an attempt by Modi’s party to use the spyware to collect political information.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Rona Wilson</strong><br />
An activist focused on minorities and prisoners’ rights, digital forensics firm Arsenal Consulting found that his phone had been infected in July 2017 and April 2018. His phone number appeared in the Project Pegasus leaks.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Syed Abdul Rahman Geelani</strong><br />
Geelani (also known as SAR Geelani), a Delhi University professor serving time in India for ties to an outlawed Maoist group and prisoners’ rights activist, was found by Amnesty to have been infected between 2017 and 2019.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Sushant Singh</strong><br />
A journalist who covered defense issues for The Indian Express, and was investigating a massive deal between India and France, was found by Amnesty to have <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/2021-07-22/ty-article/.premium/indian-journalists-on-target-list-for-pegasus-spyware-are-furious-at-israel/0000017f-e690-d97e-a37f-f7f529950000">been infected as part of Project Pegasus</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">S.N.M. Abdi</strong><br />
Journalist for India’s Outlook had his phone infected by Pegasus in April 2019, May 2019, July 2019, October 2019 and December 2019, Amnesty <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://thewire.in/media/pegasus-project-spyware-indian-journalists">found as part of Project Pegasus</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Bela Bhatia</strong><br />
An Indian human rights lawyer whose phone was found to have been infected in 2019, and is one of five victims <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.nytimes.com/2019/11/09/technology/nso-group-spyware-india.html">who are part of WhatsApp suit against NSO</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Siddharth Varadarajan</strong><br />
An Indian investigative journalist who is the former editor of The Hindu and founding editor of The Wire, a Pegasus Project partner. He had his phone targeted with NSO-made spyware in April 2018. Forbidden Stories and Amnesty International’s Security Lab’s forensic analysis revealed he was successfully infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Unnamed legal officer</strong><br />
The legal officer was also confirmed to have been hacked with spyware <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2021-08-02/ty-article/.premium/in-first-israeli-spyware-found-on-u-k-phone-the-target-a-british-rights-lawyer/0000017f-dbc2-d856-a37f-ffc2dafe0000">following the Project Pegasus investigation</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ankit Grewal</strong><br />
The lawyer and so-called anti-caste activist was found to have been targeted in 2019 – one of a large group of victims named by WhatsApp in its suit against NSO.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm"><a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/2021-07-22/ty-article/.premium/indian-journalists-on-target-list-for-pegasus-spyware-are-furious-at-israel/0000017f-e690-d97e-a37f-f7f529950000">Read our full story on Pegasus in India</a></strong></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">ISRAEL</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Shai Babad</strong><br />
A former director general of the Finance Ministry who was also a politician and also served in a senior position in Israel’s public broadcaster. Israeli business daily Calcalist said his phone had been infected with Pegasus by the Israel Police. All of the Israeli cases listed below <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/2022-02-07/ty-article/israel-police-used-nsos-pegasus-spyware-against-top-govt-officials-journalists-and-activists/0000017f-e7ff-da9b-a1ff-efff62400000">are based on Calcalist reporting</a> that has yet to be confirmed or reviewed by Haaretz or international bodies.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Avi Berger</strong><br />
The former director general of the Communications Ministry and a witness in the ongoing Case 4000 trial against former Prime Minister Benjamin Netanyahu. Calcalist reported that Berger&#8217;s phone had been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Aviram Elad</strong><br />
The former editor of Walla, which allegedly provided Netanyahu with better coverage in a quid pro quo involving its parent company, the telecom giant Bezeq, in Case 4000. Calcalist said his phone was infected by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Iris Elovitch</strong><br />
The wife of Bezeq owner Shaul Elovitch; both are defendants in Case 4000. Her phone was infected with Pegasus by the Israel Police, Calcalist reported.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<div class="q r gl gm gn go gp gq gr gs gt gu gv fp fq fr fs ft fu fv ah fj fk fl fm fn fo gw gx gy gz ha hb ac ae af ag">
<figure class="} m ev f pt py">
<div class="eg m pu">
<div class="qg xn m f qk"><img loading="lazy" decoding="async" class="hx bu ei hi f ql qm qn qo auw id aux auy" title="Iris Elovitch looking at her iPhone in court with husband Shaul Elovitch last year. , Credit: Reuben Castro" src="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=1279&amp;width=1920" sizes="(min-width: 80em) 602px,(min-width: 64em) 594px,(min-width: 48em) 564px,(min-width: 37.5em) 576px,calc(100vw - 24px)" srcset="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=1279&amp;width=1920 1920w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=960&amp;width=1440 1440w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=853&amp;width=1280 1280w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=685&amp;width=1028 1028w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=612&amp;width=918 918w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=484&amp;width=726 726w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=400&amp;width=600 600w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=283&amp;width=425 425w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b55390000/94/28/1b67eabe072368c10c46d6bb2b15/3816799846.jpg?precrop=2200,1466,x0,y0&amp;height=250&amp;width=375 375w" alt="Iris Elovitch looking at her iPhone in court with husband Shaul Elovitch last year. " width="2200" height="1466" data-test="articleBodyImage" /></div>
</div>
<div class="qq qr db dm ie dn wz dp dq qs qt dv dw"><span class="qp">Iris Elovitch looking at her iPhone in court with husband Shaul Elovitch last year. </span><span class="ao pt rj dp dq qs qt">Credit: Reuben Castro</span></div>
</figure>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Keren Terner-Eyal</strong><br />
A former director general of the transportation and finance ministries, Terner-Eyal assumed the latter position after Babad left the role. Calcalist said her phone was infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Shlomo Filber</strong><br />
A former director general of the Communications Ministry, who was appointed by Netanyahu in 2015 and now serves as a key state&#8217;s witness in the Bezeq quid pro quo case. Filber was the first Israeli whose name was published by Calcalist as having been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Miriam Feirberg</strong><br />
The mayor of Netanya, who was suspected of corruption and investigated by the police until her case was closed in 2019. Calcalist said her phone had been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Stella Handler</strong><br />
The former CEO of Bezeq, was said by Calcalist to have been infected with Pegasus by the Israel Police. Handler is part of Case 4000.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Yair Katz</strong><br />
The chairman of the workers union at Israel Aerospace Industries and son of former Likud lawmaker Haim Katz was said by Calcalist to have been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Rami Levy</strong><br />
A prominent Israeli businessman famous for his low-cost supermarket chain who also owns a small telecom firm. Calcalist reported that his phone was infected with Pegasus by the Israel Police. He was investigated by the police in the past.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Topaz Luk</strong><br />
A former adviser to Netanyahu who is considered close to his son, Yair Netanyahu, and served a number of roles in past campaigns. He is also credited with key aspects of the then-prime minister’s media strategy. Calcalist said Luk’s phone had been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Dudu Mizrahi</strong><br />
The CEO of Bezeq, who took over the telecom company after Handler. Calcalist said his device was infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Avner Netanyahu</strong><br />
The youngest son of former Prime Minister Benjamin Netanyahu. Calcalist reported that Avner Netanyahu’s phone had been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Emi Palmor</strong><br />
A jurist and former director general of the Justice Ministry who currently serves on Facebook’s Advisory Board. Calcalist reported that his phone had been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Yaakov Peretz</strong><br />
The mayor of Kiryat Ata, who was suspected of corruption in 2019 and investigated by the police until the case was closed in 2020. Calcalist reported that his phone had been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Moti Sasson</strong><br />
The six-term mayor of the Tel Aviv suburb of Holon was another mayor whose phone was infected with Pegasus by the Israel Police, according to Calcalist.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ilan Yeshua</strong><br />
The CEO of the news website Walla, which allegedly provided Netanyahu with better coverage in a quid pro quo involving its parent company Bezeq. Yeshua is also part of Case 4000 and was infected with Pegasus by the Israel Police. Calcalist reported.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Jonatan Urich</strong><br />
A former adviser to Benjamin Netanyahu and considered close to his son, Yair. He served a number of roles in various electoral campaigns and is credited with key aspects in Netanyahu’s media strategy. Urich, whose phone was hacked by Israeli police as part of an investigation, was also said by Calcalist to have been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Walla journalists</strong><br />
As part of Case 4000, a number of journalists with the news site were said by Calcalist to have been infected with Pegasus by the Israel Police.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Protest leaders</strong><br />
The leaders of three protest movements were said by Calcalist to have been infected with Pegasus by the Israel Police. The protest movements targeted were: Israelis with disabilities; Israelis of Ethiopian descent; and heads of the anti-Netanyahu protests. The first were fighting for better rights, the second demonstrated against police violence and the third sought to oust Netanyahu.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Extreme settlers</strong><br />
A number of extreme settlers were said by Calcalist to have been infected with Pegasus by the Israel Police ahead of the evacuations of illegal outposts.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><em class="un"><strong class="dm"><a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/2022-02-07/ty-article/.premium/israel-polices-spyware-scandal-politicians-demand-commission-of-inquiry/0000017f-e7d8-df5f-a17f-ffde9b610000">Read our full story on Pegasus in Israel</a></strong></em></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">JORDAN</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Hala Ahed Deeb</strong><br />
Jordanian human rights lawyer, unionizer and feminist activist was found by Front Line Defenders <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/middle-east-news/2022-01-17/ty-article/.premium/israeli-nso-spyware-found-on-phones-of-jordanian-bahraini-womens-rights-activists/0000017f-e17f-df7c-a5ff-e37f6bfe0000">to have been infected with Pegasus since March 2021</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ahmed al-Neimat</strong><br />
A rights activist focused on workers rights and combating corruption. He works with a reform group called Hirak and has been targeted in the past, facing arrest for “insulting the king” and even a travel ban. <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.frontlinedefenders.org/en/statement-report/report-jordanian-human-rights-defenders-and-journalists-hacked-pegasus-spyware">Front Line Defenders</a> and <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://citizenlab.ca/2022/04/peace-through-pegasus-jordanian-human-rights-defenders-and-journalists-hacked-with-pegasus-spyware/">Citizen Lab found</a> his phone was hacked at the end of January 2021, likely through the FORCEDENTRY exploit, <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2022-04-05/ty-article/.premium/especially-remarkable-jordanian-activists-hacked-with-israeli-pegasus-spyware/00000180-5bb9-dee0-afd6-7bfdf16f0000">making him the earliest victim of that particular method</a>. His phone was likely hacked using the exploit’s zero-click capabilities.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Suhair Jaradat</strong><br />
A rights activist and journalist focused on women’s rights in Jordan and the Arab world who serves on the executive committee of the International Federation for Journalists. She was hacked six times between February and December 2021, through the FORCEDENTRY exploit in iPhones. The last hack took place after Apple had patched the breach, informed potential victims across the world and sued NSO. Jaradat did not update her phone and was thus still exposed.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Malik Abu Orabi</strong><br />
A rights lawyer who works with prominent Jordanian unions and was previously arrested by the state for his efforts. He was hacked at least 21 times between August 2019 and July 2021.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Anonymous journalist</strong><br />
A female journalist was also hacked, Front Line Defenders and Citizen Lab found. She requested to remain anonymous.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2022-04-05/ty-article/.premium/especially-remarkable-jordanian-activists-hacked-with-israeli-pegasus-spyware/00000180-5bb9-dee0-afd6-7bfdf16f0000"><strong class="dm">Read our full story on Pegasus in Jordan</strong></a></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">KAZAKHSTAN</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Aizat Abilseit, Dimash Alzhanov and Tamina Ospanova</strong><br />
Three members of the opposition group Wake Up, Kazakhstan whose phones were found by Amnesty’s Security Lab to have been infected by Pegasus in June 2021. Apple also warned them about the hack, which it attributed to a “state-sponsored attacker.”</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Darkhan Sharipov</strong><br />
The Kazakh activist’s phone was also found by Amnesty to have been infected by Pegasus in June 2021.<br />
<strong class="dm">Suspected operator:</strong> Kazakhstan</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm"><a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2022-01-09/ty-article/israeli-nso-spyware-found-on-kazakhstan-activists-phones/0000017f-e48a-d568-ad7f-f7eb86f30000">Read our full story on Pegasus in Kazakhstan</a></strong></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">LEBANON</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Lama Fakih</strong><br />
Human Rights Watch’s crisis and conflict director also heads the group’s Beirut office. She was targeted with Pegasus spyware at least five times between April and August 2021, HRW and Amnesty International’s Security Lab found.<br />
<strong class="dm">Suspected operator:</strong> Unknown</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm"><a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2022-01-26/ty-article/human-rights-watch-official-in-beirut-reportedly-targeted-by-israeli-nso-spyware/0000017f-db87-db5a-a57f-dbef14a50000">Read our full story</a></strong></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">MOROCCO</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Hicham Mansouri</strong><br />
Freelance investigative journalist and co-founder of the Moroccan Association of Investigative Journalists had his iPhone infected with Pegasus more than 20 times between February and April 2021, the Project Pegasus investigation revealed. Mansouri fled Morocco in 2016 and is now based in Paris.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Mahjoub Mleiha</strong><br />
Human rights activist from Western Sahara who is active in the Collective of Sahrawi Human Rights Defenders, now lives in Belgium, where he is also a citizen. Amnesty found that his phone had been infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Joseph Breham</strong><br />
A French lawyer who is involved in a lawsuit against Saudi Crown Prince Mohammed over claims of torture and inhumane treatment in Yemen. Amnesty confirmed that his phone had been infected with Pegasus using the same type of messages <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/middle-east-news/2018-04-10/ty-article/rights-group-files-lawsuit-against-saudi-prince-over-yemen/0000017f-dc26-df62-a9ff-dcf715ef0000">other alleged victims in Morocco also received</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Oubi Buchraya Bachir</strong><br />
Sahrawi diplomat who has served as its representative in a number of African countries. Amnesty confirmed as part of Project Pegasus that his phone was infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Maati Monjib</strong><br />
Founder of the Moroccan Association for Investigative Journalism and the NGO Freedom Now (dedicated to protecting the rights of journalists and writers), Amnesty found that <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.amnesty.org/en/latest/research/2019/10/morocco-human-rights-defenders-targeted-with-nso-groups-spyware/">his phone had been infected in 2019</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<div class="q r gl gm gn go gp gq gr gs gt gu gv fp fq fr fs ft fu fv ah fj fk fl fm fn fo gw gx gy gz ha hb ac ae af ag">
<figure class="} m ev f pt py">
<div class="eg m pu">
<p><button class="ei pv pw px py kh ew mj et eg pz qa qb bk qc qd" type="button"><span class="ea eb ec ed ee ef eg eh ei ej ek cz">Open gallery view</span></button></p>
<div class="qg xo m f qk"><img loading="lazy" decoding="async" class="hx bu ei hi f ql qm qn qo auw id aux auy" title="Shawan Jabarin, director of the al-Haq human rights group. One of the Palestinian NGO's workers' phones was infected by Pegasus., Credit: Majdi Mohammed/AP" src="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=1280&amp;width=1920" sizes="(min-width: 80em) 602px,(min-width: 64em) 594px,(min-width: 48em) 564px,(min-width: 37.5em) 576px,calc(100vw - 24px)" srcset="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=1280&amp;width=1920 1920w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=960&amp;width=1440 1440w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=853&amp;width=1280 1280w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=685&amp;width=1028 1028w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=612&amp;width=918 918w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=484&amp;width=726 726w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=400&amp;width=600 600w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=283&amp;width=425 425w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b56630000/2d/e7/660058a0b05823fd990dfcd65d6b/3505054613.jpg?precrop=2448,1632,x0,y0&amp;height=250&amp;width=375 375w" alt="Shawan Jabarin, director of the al-Haq human rights group. One of the Palestinian NGO's workers' phones was infected by Pegasus." width="2448" height="1632" data-test="articleBodyImage" /></div>
</div>
<div class="qq qr db dm ie dn wz dp dq qs qt dv dw"><span class="qp">Shawan Jabarin, director of the al-Haq human rights group. One of the Palestinian NGO&#8217;s workers&#8217; phones was infected by Pegasus.</span><span class="ao pt rj dp dq qs qt">Credit: Majdi Mohammed/AP</span></div>
</figure>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Omar Radi</strong><br />
An independent, award-winning Moroccan journalist whose phone was <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/2020-06-22/ty-article/.premium/israels-nso-helped-moroccan-govt-spy-on-journalist-amnesty-claims/0000017f-f4fb-d5bd-a17f-f6fb56ad0000">found by Amnesty to have been infected in 2019</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Aboubakr Jamaï</strong><br />
Jamaï is a journalist who has long inspired the ire of Morocco’s royal family. Citizen Lab together with <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.accessnow.org/nso-whatsapp-hacking-victims-stories/">Access Now found</a> his phone had been infected with Pegasus after materials on it were leaked online in an attempt to tarnish Jamaï and his associates.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Fouad Abdelmoumni</strong><br />
A Moroccan human rights and democracy activist who works with Human Rights Watch and Transparency International Morocco, Abdelmoumni’s phone was found to have been infected, most likely by the Moroccan intelligence services. Citizen Lab investigated the hacking after being commissioned by WhatsApp.<br />
<strong class="dm">Suspected operator:</strong> Morocco</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">PALESTINIAN TERRITORIES (WEST BANK)</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ghassan Halaika</strong><br />
Human rights activist working for Al-Haq, a Palestinian NGO blacklisted by Israel, whose phone was infected in July 2020. The confirmation was made by human rights organization Front Line Defenders.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ubai Aboudi</strong><br />
The phone of the director of the Bisan Center for Research and Development, a Palestinian NGO blacklisted by Israel, was infected in 2020 and confirmed by Front Line Defenders.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Salah Hammouri</strong><br />
Lawyer and researcher with the Addameer Prisoner Support and Human Rights Association, a Palestinian NGO blacklisted by Israel, whose phone was infected in 2020, according to Front Line Defenders.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Three unnamed activists</strong><br />
Phones of three activists working with Palestinian NGOs blacklisted by Israel were infected in 2020, and confirmed by Front Line Defenders.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Suspected operator in all six cases:</strong> Israel</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<div class="q r gl gm gn go gp gq gr gs gt gu gv fp fq fr fs ft fu fv ah fj fk fl fm fn fo gw gx gy gz ha hb ac ae af ag">
<figure class="} m ev f pt py">
<div class="eg m pu">
<p><button class="ei pv pw px py kh ew mj et eg pz qa qb bk qc qd" type="button"><span class="ea eb ec ed ee ef eg eh ei ej ek cz">Open gallery view</span></button></p>
<div class="qg xp m f qk"><img loading="lazy" decoding="async" class="hx bu ei hi f ql qm qn qo auw id aux auy" title="Polish prosecutor Ewa Wrzosek holding her phone outside her Warsaw office last month., Credit: Czarek Sokolowski/AP" src="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=1319&amp;width=1920" sizes="(min-width: 80em) 602px,(min-width: 64em) 594px,(min-width: 48em) 564px,(min-width: 37.5em) 576px,calc(100vw - 24px)" srcset="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=1319&amp;width=1920 1920w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=989&amp;width=1440 1440w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=880&amp;width=1280 1280w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=706&amp;width=1028 1028w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=631&amp;width=918 918w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=499&amp;width=726 726w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=412&amp;width=600 600w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=292&amp;width=425 425w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57260000/53/d2/6981af6a80c18fd096f7509901ad/4151779654.jpg?precrop=2362,1623,x0,y0&amp;height=258&amp;width=375 375w" alt="Polish prosecutor Ewa Wrzosek holding her phone outside her Warsaw office last month." width="2362" height="1623" data-test="articleBodyImage" /></div>
</div>
<div class="qq qr db dm ie dn wz dp dq qs qt dv dw"><span class="qp">Polish prosecutor Ewa Wrzosek holding her phone outside her Warsaw office last month.</span><span class="ao pt rj dp dq qs qt">Credit: Czarek Sokolowski/AP</span></div>
</figure>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm"><a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/2021-11-08/ty-article/.highlight/nso-spyware-used-against-palestinian-activists-in-blacklisted-ngos-report-says/0000017f-ded8-d3a5-af7f-fefe14b60000">Read our full story on Pegasus in the West Bank</a></strong></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">POLAND</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Krzysztof Brejza</strong><br />
Polish senator and member of the opposition party Civic Platform whose phone was confirmed to have been infected over 30 times in 2019. The confirmation was made by Citizen Lab and reported by AP.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Roman Giertych</strong><br />
A lawyer who has represented leaders of Brejza’s Civic Platform party in sensitive cases, and was confirmed to have been infected over 10 times in 2019. The confirmation was made by Citizen Lab.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ewa Wrzosek</strong><br />
The phone of the prosecutor and critic of the ruling Law and Justice party’s attempt to undermine Poland’s judiciary was confirmed to have been infected a number of times in 2019. The confirmation was made by Citizen Lab after she received a notification from Apple warning that her phone had been hacked.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Michal Kolodziejczak</strong><br />
The agrarian social movement leader was hacked several times in May 2019 ahead of a fall election in which Kolodziejczak was hoping to have his group, AGROunia, become a formal political party. Courts have so far blocked his efforts to form a political party.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Tomasz Szwejgiert</strong><br />
An author and collaborator with Polish secret services who found himself at odds with powerful figures was hacked while co-authoring a book about the head of Poland’s secret services, Mariusz Kaminski. He was hacked 21 times with Pegasus from late March to June 2019.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Suspected operator in all cases:</strong> Poland</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm"><a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2022-01-03/ty-article/.highlight/poland-reportedly-purchased-pegasus-spyware-after-netanyahu-meeting/0000017f-f7c6-d47e-a37f-fffe908b0000">Read our full story on Pegasus in Poland</a></strong></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">RWANDA</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Carine Kanimba</strong><br />
A U.S.-Belgian citizen, Kanimba is the daughter of Rwandan activist Paul Rusesabagina, who was arrested and forcibly returned to the country. Her father’s plight inspired the 2004 movie “Hotel Rwanda” and she was confirmed by Amnesty to have been hacked at the start of 2021.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<div class="q r gl gm gn go gp gq gr gs gt gu gv fp fq fr fs ft fu fv ah fj fk fl fm fn fo gw gx gy gz ha hb ac ae af ag">
<figure class="} m ev f pt py">
<div class="eg m pu">
<p><button class="ei pv pw px py kh ew mj et eg pz qa qb bk qc qd" type="button"><span class="ea eb ec ed ee ef eg eh ei ej ek cz">Open gallery view</span></button></p>
<div class="qg xq m f qk"><img loading="lazy" decoding="async" class="hx bu ei hi f ql qm qn qo auw id aux auy" title="Hatice Cengiz, fiancee of the murdered Saudi journalist Jamal Khashoggi, talking to the media last year., Credit: MURAD SEZER/REUTERS" src="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=1263&amp;width=1920" sizes="(min-width: 80em) 602px,(min-width: 64em) 594px,(min-width: 48em) 564px,(min-width: 37.5em) 576px,calc(100vw - 24px)" srcset="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=1263&amp;width=1920 1920w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=947&amp;width=1440 1440w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=842&amp;width=1280 1280w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=676&amp;width=1028 1028w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=604&amp;width=918 918w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=477&amp;width=726 726w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=395&amp;width=600 600w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=279&amp;width=425 425w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b57ae0000/c3/9f/f64a8798b7c385460d2976f6ef05/1080774000.jpg?precrop=2465,1621,x0,y0&amp;height=247&amp;width=375 375w" alt="Hatice Cengiz, fiancee of the murdered Saudi journalist Jamal Khashoggi, talking to the media last year." width="2465" height="1621" data-test="articleBodyImage" /></div>
</div>
<div class="qq qr db dm ie dn wz dp dq qs qt dv dw"><span class="qp">Hatice Cengiz, fiancee of the murdered Saudi journalist Jamal Khashoggi, talking to the media last year.</span><span class="ao pt rj dp dq qs qt">Credit: MURAD SEZER/REUTERS</span></div>
</figure>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Peter Verlinden</strong><br />
The Belgian journalist stationed in Africa has worked for the national Flemish broadcaster VTR. Belgian intelligence services and Amnesty found that his phone had been infected in September, October and November 2020.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Marie Bamutese</strong><br />
The phone of Peter Verlinden’s wife was also found to have been hacked. This was confirmed <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.theguardian.com/news/2021/jul/19/hotel-rwanda-activist-daughter-pegasus-surveillance">by Belgium&#8217;s General Intelligence and Security Service</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Placide Kayumba</strong><br />
A Rwandan activist and member of the opposition in exile, Kayumba was found to have been targeted as part of an investigation by Citizen Lab commissioned by WhatsApp into hacking of its clients.<br />
<strong class="dm">Suspected operator:</strong> Rwanda</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">SAUDI ARABIA</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Hatice Cengiz</strong><br />
The Turkish national was the fiancée of the late Washington Post columnist Jamal Khashoggi, and her phone was infected a few days after her partner was murdered at the Saudi Embassy in Istanbul in October 2018 – as revealed by Amnesty as part of Pegasus Project.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Omar Abdulaziz</strong><br />
A close friend of Khashoggi’s, Abdulaziz’s phone was infected with Pegasus in the months before the Saudi dissident’s murder in 2018, CItizen Lab found. Based in Canada, <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.theguardian.com/world/2021/jul/18/nso-spyware-used-to-target-family-of-jamal-khashoggi-leaked-data-shows-saudis-pegasus">he has filed a lawsuit against NSO in Israel</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Wadah Khanfar</strong><br />
Al Jazeera’s former director general and another close friend of Khashoggi, Amnesty found that his phone was infected as recently as July 2021.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ragip Soylu</strong><br />
A Turkish journalist who heads Middle East Eye’s bureau in Ankara. <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.middleeasteye.net/news/pegasus-israel-spyware-target-turkey-middle-east-eye-journalist">Amnesty confirmed that his phone was infected</a> several times between February and July 2021.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ben Hubbard</strong><br />
The phone of the New York Times journalist <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://citizenlab.ca/2021/10/breaking-news-new-york-times-journalist-ben-hubbard-pegasus/">was confirmed by Citizen Lab</a> to have been infected between June 2018 to June 2021 while he was based in Lebanon, reporting on Saudi Arabia and writing a book about Crown Prince Mohammed.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Suspected operator in all cases:</strong> Saudi Arabia</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm"><a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2021-07-18/ty-article/.premium/khashoggis-fiancee-son-targeted-by-nso-tech-investigation-reveals/0000017f-dc92-db5a-a57f-dcfa206c0000">Read our full story on Pegasus in Saudi Arabia</a></strong></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">TOGO</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<div class="q r gl gm gn go gp gq gr gs gt gu gv fp fq fr fs ft fu fv ah fj fk fl fm fn fo gw gx gy gz ha hb ac ae af ag">
<figure class="} m ev f pt py">
<div class="eg m pu">
<p><button class="ei pv pw px py kh ew mj et eg pz qa qb bk qc qd" type="button"><span class="ea eb ec ed ee ef eg eh ei ej ek cz">Open gallery view</span></button></p>
<div class="qg wy m f qk"><img loading="lazy" decoding="async" class="hx bu ei hi f ql qm qn qo auw id aux auy" title="Egyptian dissident Ayman Nour speaking in Istanbul in 2019. , Credit: Burhan Ozbilici/AP" src="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=1280&amp;width=1920" sizes="(min-width: 80em) 602px,(min-width: 64em) 594px,(min-width: 48em) 564px,(min-width: 37.5em) 576px,calc(100vw - 24px)" srcset="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=1280&amp;width=1920 1920w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=960&amp;width=1440 1440w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=854&amp;width=1280 1280w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=685&amp;width=1028 1028w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=612&amp;width=918 918w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=484&amp;width=726 726w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=400&amp;width=600 600w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=283&amp;width=425 425w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b583e0000/9c/b3/60a930e89c6a7995473a84df4a10/339729093.jpg?precrop=2449,1633,x0,y0&amp;height=250&amp;width=375 375w" alt="Egyptian dissident Ayman Nour speaking in Istanbul in 2019. " width="2449" height="1633" data-test="articleBodyImage" /></div>
</div>
<div class="qq qr db dm ie dn wz dp dq qs qt dv dw"><span class="qp">Egyptian dissident Ayman Nour speaking in Istanbul in 2019. </span><span class="ao pt rj dp dq qs qt">Credit: Burhan Ozbilici/AP</span></div>
</figure>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Father Pierre Marie-Chanel Affognon</strong><br />
A Catholic priest from Togo who is an anti-corruption activist fighting for constitutional and electoral reform in the West African country. An investigation by Citizen Lab commissioned by WhatsApp into the hacking of its clients found his phone was infected.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">UNITED ARAB EMIRATES</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Alaa al-Siddiq</strong><br />
Executive director of ALQST, a nonprofit advocating for human rights in the UAE and the Gulf region. Her phone was found to have been infected a number of times from 2015, when she was living in Qatar (where she had moved to flee persecution), and up until 2019, when she had relocated to Britain. She died in a car crash in 2021. Citizen Lab made the hacking confirmation.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Abdulaziz Alkhamis</strong><br />
The former editor of Al Arab, Alkhamis was hacked as part of a showcase NSO organized for the UAE. According to a lawsuit filed on behalf of Alkhamis, the UAE, which were already NSO clients from 2014, were offered an expensive upgrade of the Pegasus spyware. To show the new product’s value, <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/2018-08-31/ty-article/uae-used-israeli-spyware-to-track-qatari-royals/0000017f-f2b9-d5bd-a17f-f6bb091f0000">NSO emailed two audio recordings of Alkhamis to Emerati officials, the New York Times reported in 2018</a>.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ayman Nour</strong><br />
Egyptian dissident, 2005 Egyptian presidential candidate and opposition activist. Citizen Lab found his phone had been <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/2021-12-17/ty-article/two-israeli-spyware-firms-hacked-dissidents-phones-in-egypt-india/0000017f-ed9b-d639-af7f-eddf0b8f0000">infected by Pegasus, as well as an additional spyware</a> called Predator – which was developed by NSO competitor Cytrox.<br />
<strong class="dm">Suspected operator:</strong> UAE</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Rania Dridi</strong><br />
A journalist with Alaraby TV, she had her phone infected at least six times during 2020, as confirmed by Citizen Lab.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Tamer Almisshal</strong><br />
Investigative journalist for Al Jazeera in Arabic who has covered the Gulf region extensively, including the Khashoggi killing. His phone was infected in 2020, Citizen Lab confirmed.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Ebtisam al-Saegh</strong><br />
Bahraini human rights activist focused on women’s rights. Front Line Defenders found that <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/middle-east-news/2022-01-17/ty-article/.premium/israeli-nso-spyware-found-on-phones-of-jordanian-bahraini-womens-rights-activists/0000017f-e17f-df7c-a5ff-e37f6bfe0000">her phone was hacked at least eight times</a> between August and November 2019. Saegh had been arrested in Bahrain for her activism in the past and has faced persecution for her work.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">34 Al Jazeera staffers</strong><br />
The phones of 34 other journalists, producers, anchors and executives at Al Jazeera were confirmed to have been infected in 2020, Citizen Lab reported.<br />
<strong class="dm">Suspected operator:</strong> Saudi Arabia, Bahrain and/or the UAE</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<div class="q r gl xa xb go gp xc xd xe xf xg xh fp fq xi fs ft xj xk ah fj fk fl fm fn fo xl gw gx gy gz ha hb ac ae af ag">
<figure class="} m ev f pt py">
<div class="eg m pu">
<p><button class="ei pv pw px py kh ew mj et eg pz qa qb bk qc qd" type="button"><span class="ea eb ec ed ee ef eg eh ei ej ek cz">Open gallery view</span></button></p>
<div class="qg xo m f qk"><img loading="lazy" decoding="async" class="hx bu ei hi f ql qm qn qo auw id aux auy" title="Mexican President Andres Manuel Lopez Obrador speaking last July about being targeted by the previous administration of President Enrique Pena Nieto after it purchased Pegasus spyware from NSO., Credit: MEXICO'S PRESIDENCY / REUTERS" src="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b58e90000/c2/d2/b22012fdb5078280ec8f54f2ac74/1533837127.jpg?precrop=2448,1632,x0,y0&amp;height=1280&amp;width=1920" sizes="(min-width: 80em) 1232px,(min-width: 64em) 978px,(min-width: 48em) 660px,(min-width: 37.5em) 576px,calc(100vw - 24px)" srcset="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b58e90000/c2/d2/b22012fdb5078280ec8f54f2ac74/1533837127.jpg?precrop=2448,1632,x0,y0&amp;height=1280&amp;width=1920 1920w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b58e90000/c2/d2/b22012fdb5078280ec8f54f2ac74/1533837127.jpg?precrop=2448,1632,x0,y0&amp;height=960&amp;width=1440 1440w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b58e90000/c2/d2/b22012fdb5078280ec8f54f2ac74/1533837127.jpg?precrop=2448,1632,x0,y0&amp;height=853&amp;width=1280 1280w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b58e90000/c2/d2/b22012fdb5078280ec8f54f2ac74/1533837127.jpg?precrop=2448,1632,x0,y0&amp;height=685&amp;width=1028 1028w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b58e90000/c2/d2/b22012fdb5078280ec8f54f2ac74/1533837127.jpg?precrop=2448,1632,x0,y0&amp;height=512&amp;width=768 768w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b58e90000/c2/d2/b22012fdb5078280ec8f54f2ac74/1533837127.jpg?precrop=2448,1632,x0,y0&amp;height=400&amp;width=600 600w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b58e90000/c2/d2/b22012fdb5078280ec8f54f2ac74/1533837127.jpg?precrop=2448,1632,x0,y0&amp;height=283&amp;width=425 425w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b58e90000/c2/d2/b22012fdb5078280ec8f54f2ac74/1533837127.jpg?precrop=2448,1632,x0,y0&amp;height=250&amp;width=375 375w" alt="Mexican President Andres Manuel Lopez Obrador speaking last July about allegedly being targeted by the previous administration of President Enrique Pena Nieto after it purchased Pegasus spyware from NSO." width="2448" height="1632" data-test="articleBodyImage" /></div>
</div>
<div class="qq qr db dm ie dn wz dp dq qs qt dv dw"><span class="qp">Mexican President Andres Manuel Lopez Obrador speaking last July about being targeted by the previous administration of President Enrique Pena Nieto after it purchased Pegasus spyware from NSO.</span><span class="ao pt rj dp dq qs qt">Credit: MEXICO&#8217;S PRESIDENCY / REUTERS</span></div>
</figure>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">UNITED KINGDOM</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">David Haigh</strong><br />
The <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2021-08-02/ty-article/.premium/in-first-israeli-spyware-found-on-u-k-phone-the-target-a-british-rights-lawyer/0000017f-dbc2-d856-a37f-ffc2dafe0000">human rights lawyer and LGBTQ activist</a> who represented Princess Latifa of Dubai was the first British target confirmed to have been infected by Pegasus. He supplied Amnesty with his phone in the wake of Project Pegasus.</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">Anas Altikriti</strong><br />
Muslim anti-war activist based in the U.K. whose phone was confirmed to have been infected with Pegasus. His interfaith thinktank, the Cordoba Foundation, has been accused of maintaining ties with the Muslim Brotherhood and Hamas. <strong class="dm">Suspected operator:</strong> UAE</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><mark class="uz"><strong class="dm">UNITED STATES</strong></mark></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">11 unnamed U.S. officials</strong><br />
Eleven officials with the U.S. State Department in Uganda <a class="uo up uq ur lk us ut uu uv uw ux uy qb ix lx ly" href="https://www.haaretz.com/israel-news/tech-news/2021-12-05/ty-article/.premium/targeting-u-s-officials-could-mean-death-sentence-for-israeli-nso/0000017f-f7da-d2d5-a9ff-f7de3c070000">were confirmed to have been hacked with Pegasus</a>. The revelation led to a U.S. Department of Commerce decision last November to blacklist NSO.<br />
<strong class="dm">Suspected operator:</strong> Uganda or Rwanda</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv"><strong class="dm">LIST OF THOSE WHO HAVE ALSO BEEN TARGETED BY PEGASUS:</strong></p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Ahmed Mansoor (Emirati human rights activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Rafael Cabrera (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Dr. Simon Barquera (Mexican researcher)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Alejandro Calvillo (Mexican whistleblower)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Luis Encarnación (Mexican activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Karla Micheel Salas (Mexican human rights lawyer)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">David Peña (Mexican human rights lawyer)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Carmen Aristegui (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Emilio Aristegui (son of Carmen Aristegui)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Sebastián Barragán (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Carlos Loret de Mola (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Salvador Camarena (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Daniel Lizárraga (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Mario E. Patrón (Mexican human rights activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Stephanie Brewer (U.S. human rights activist working in Mexico)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Santiago Aguirre (Mexican human rights activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Juan Pardinas (Mexican anti-corruption activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Juan Pardinas’s wife</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Alexandra Zapata (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Azam Ahmed (Former New York Times bureau chief for Mexico)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<div class="q r gl gm gn go gp gq gr gs gt gu gv fp fq fr fs ft fu fv ah fj fk fl fm fn fo gw gx gy gz ha hb ac ae af ag">
<figure class="} m ev f pt py">
<div class="eg m pu">
<p><button class="ei pv pw px py kh ew mj et eg pz qa qb bk qc qd" type="button"><span class="ea eb ec ed ee ef eg eh ei ej ek cz">Open gallery view</span></button></p>
<div class="qg xo m f qk"><img loading="lazy" decoding="async" class="hx bu ei hi f ql qm qn qo auw id aux auy" title="Family members and supporters of 43 missing college students from Guerrero state. Mexico, carrying pictures of the disappeared, during an event in April 2016., Credit: AP Photo/Rebecca Blackwell" src="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=1280&amp;width=1920" sizes="(min-width: 80em) 602px,(min-width: 64em) 594px,(min-width: 48em) 564px,(min-width: 37.5em) 576px,calc(100vw - 24px)" srcset="https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=1280&amp;width=1920 1920w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=960&amp;width=1440 1440w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=853&amp;width=1280 1280w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=685&amp;width=1028 1028w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=612&amp;width=918 918w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=484&amp;width=726 726w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=400&amp;width=600 600w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=283&amp;width=425 425w,https://img.haarets.co.il/bs/0000017f-ed7a-d3be-ad7f-ff7b59930000/94/37/fa2bd5182a826c3c7d0f875f82bc/2137023998.jpg?precrop=2448,1632,x0,y0&amp;height=250&amp;width=375 375w" alt="Family members and supporters of 43 missing college students from Guerrero state. Mexico, carrying pictures of the disappeared, during an event in April 2016." width="2448" height="1632" data-test="articleBodyImage" /></div>
</div>
<div class="qq qr db dm ie dn wz dp dq qs qt dv dw"><span class="qp">Family members and supporters of 43 missing college students from Guerrero state. Mexico, carrying pictures of the disappeared, during an event in April 2016.</span><span class="ao pt rj dp dq qs qt">Credit: AP Photo/Rebecca Blackwell</span></div>
</figure>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Ricardo Anaya Cortés (Mexican lawyer/politician)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Sen. Roberto Gil Zuarth (Mexican senator)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Fernando Rodríguez Doval (Mexican politician)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Claudio X. González (Mexican anti-corruption activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">GIEI investigation (Mexican probe into mass disappearances)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Ghanem Almasarir (Saudi dissident)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Yahya Assiri (Saudi activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Unnamed Amnesty International employee</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Abdessadak El Bouchattaoui (Moroccan journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Griselda Triana (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Nihalsing Rathod (Indian human rights lawyer)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Priyanka Gandhi Vadra (General secretary, Indian National Congress)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Santosh Bhartiya (Indian journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Shubhranshu Choudhary (Indian peace activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Unnamed U.K. lawyer</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Shalini Gera (Indian lawyer)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Degree Prasad Chauhan (Indian human rights activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Anand Teltumbde (Indian activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Ashish Gupta (Indian activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Seema Azad (Indian activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Vivek Sundara (Indian activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Saroj Giri (Indian activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Sidhant Sibal (Indian journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Rajeev Sharma (Indian journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Rupali Jadhav (Indian activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Jagdish Meshram (Indian lawyer)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Alok Shukla (Indian activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Ajmal Khan (Indian research scholar)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Balla Ravindranath (Indian lawyer/activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Mandeep Singh (Indian activist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">P. Pavana (Indian, daughter of activist P. Varavara Rao)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Arunank (Indian law graduate)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Smita Sharma (Indian journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Hanan Elatr (wife of Jamal Khashoggi)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Jorge Carrasco (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Álvaro Delgado Gómez (Mexican journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Princess Latifa al Maktoum (daughter of the prime minister of the UAE)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Princess Haya bint Hussein (estranged wife of the prime minister of the UAE)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Juan Mayer (aerial photographer who recorded Princess Latifa’s skydives)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Lynda Bouchikhi (Princess Latifa’s officially sanctioned chaperone)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Sioned Taylor (friend of Princess Latifa)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Martin Smith (head of U.K. private security firm hired by Princess Haya)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Shimon Cohen (British PR expert)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Ross Smith (head of investigations at U.K. private security firm hired by Princess Haya)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">John Gosden (British horse trainer, friend of Princess Haya)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Aisha bint Hussein (half sister of Princess Haya)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Stuart Page (British private investigator)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">K.K. Sharma (former Indian Border Security Force chief)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Jagdish Maithani (Indian Border Security Force officer)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Jitendra Kumar Ojha (former Indian espionage officer)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Jitendra Kumar Ojha’s wife</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Col. Mukul Dev (former Indian army officer)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Rupesh Kumar Singh (Indian journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Rupesh Kumar Singh’s wife</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Devirupa Mitra (Indian diplomatic correspondent)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Vijaita Singh (Indian journalist)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Bishop Benoit Alowonou (Togolese clergyman)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Elliott Ohin (Togolese opposition figure)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Raymond Houndjo (Togolese opposition figure)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">Roger Torrent (Catalan parliamentary speaker)</p>
<div class="undefined ev">
<div class="FI_PH"></div>
</div>
<p class="py vd ve vf vg vh go gn gm vi vj vk vl r q vm fy fz gb gc gd ge ah fj fk fl fm fn fo fp fq fr fs ft fu fv gp gq gr gs gt gu gv">A Complete (Updating) List of Individuals Targeted With Pegasus Spyware Plus 1,400 other potential targets who WhatsApp believes were hacked.</p>
<p>&nbsp;</p>
<p><a href="https://www.haaretz.com/israel-news/tech-news/2022-04-05/ty-article-magazine/nso-pegasus-spyware-file-complete-list-of-individuals-targeted/0000017f-ed7a-d3be-ad7f-ff7b5a600000" target="_blank" rel="noopener">source</a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
