Journalist's phone hacked by new 'invisible' technique: All he had to do was visit one ... - 0 views
www.thestar.com/...t-one-website-any-website.html
Morocco journalist surveillance espionage rights Amnesty Israel media
shared by Ed Webb on 22 Jun 20
- No Cached
-
The white iPhone with chipped paint that Moroccan journalist Omar Radi used to stay in contact with his sources also allowed his government to spy on him.They could read every email, text and website visited; listen to every phone call and watch every video conference; download calendar entries, monitor GPS coordinates, and even turn on the camera and microphone to see and hear where the phone was at any moment.
-
Forensic evidence gathered by Amnesty International on Radi’s phone shows that it was infected by “network injection,” a fully automated method where an attacker intercepts a cellular signal when it makes a request to visit a website. In milliseconds, the web browser is diverted to a malicious site and spyware code is downloaded that allows remote access to everything on the phone. The browser then redirects to the intended website and the user is none the wiser.
-
“The Moroccan authorities are buying every possible and imaginable surveillance and espionage product. They want to know everything.”
- ...8 more annotations...
-
While Amnesty could not definitively state that the Moroccan authorities were behind the attack, the group was able to use forensic evidence to conclude this was very likely the case.
-
Radi is an investigative journalist who co-founded the local news site Le Desk, a partner with the Star in the International Consortium of Investigative Journalists. He specializes in the connections between politicians and business people as well as social movements and human rights. In other words, he’s a thorn in the government’s side and a prime target for surveillance, hacking and harassment.
-
The spyware they found — commonly known as “Pegasus” — can be traced back to the Israeli cyber surveillance company, NSO Group.
-
NSO Group, which was valued at $1 billion USD last year, sells surveillance software to governments and law enforcement agencies intended to combat terrorism. Over the last several years, however, reports from around the world have implicated NSO Group’s spyware in the targeting of journalists and human rights activists.
-
A recent report by The Citizen Lab at the University of Toronto’s Munk School identified 13 journalists, including a reporter for the New York Times, targeted by Pegasus software employed by the Mexican and Saudi Arabian governments.
-
what makes Radi’s case unique is that he was infected last September, only three days after the Israeli company issued a policy that vowed the company would cut off clients if they were found to misuse the surveillance technology to target journalists and human rights activists
-
Amnesty’s new report notes that the NSO server used to hack Monjib and El Bouchattaoui was shut down shortly after the previous report was made public. Shortly afterward, a new server that operated in the same manner was set up and used to hack Radi’s phone, the report said.
-
This month, an article on the Moroccan news website Chouftv reported that Radi was part of a group of journalists organizing a support campaign for an imprisoned colleague. Radi says the article contained details taken from conversations he had on the encrypted apps Signal and WhatsApp, and he suspects government intelligence officers leaked the information gleaned from his phone.“It’s a way of saying: ‘You are being watched,’ ” he said.Radi’s sources have grown more reluctant to talk as it has become evident that journalists’ phones are being tapped.