Skip to main content

Home/ Media in Middle East & North Africa/ Group items tagged hacking

Rss Feed Group items tagged

Ed Webb

Journalist's phone hacked by new 'invisible' technique: All he had to do was visit one ... - 0 views

  • The white iPhone with chipped paint that Moroccan journalist Omar Radi used to stay in contact with his sources also allowed his government to spy on him.They could read every email, text and website visited; listen to every phone call and watch every video conference; download calendar entries, monitor GPS coordinates, and even turn on the camera and microphone to see and hear where the phone was at any moment.
  • Forensic evidence gathered by Amnesty International on Radi’s phone shows that it was infected by “network injection,” a fully automated method where an attacker intercepts a cellular signal when it makes a request to visit a website. In milliseconds, the web browser is diverted to a malicious site and spyware code is downloaded that allows remote access to everything on the phone. The browser then redirects to the intended website and the user is none the wiser.
  • “The Moroccan authorities are buying every possible and imaginable surveillance and espionage product. They want to know everything.”
  • ...8 more annotations...
  • While Amnesty could not definitively state that the Moroccan authorities were behind the attack, the group was able to use forensic evidence to conclude this was very likely the case.
  • Radi is an investigative journalist who co-founded the local news site Le Desk, a partner with the Star in the International Consortium of Investigative Journalists. He specializes in the connections between politicians and business people as well as social movements and human rights. In other words, he’s a thorn in the government’s side and a prime target for surveillance, hacking and harassment.
  • The spyware they found — commonly known as “Pegasus” — can be traced back to the Israeli cyber surveillance company, NSO Group.
  • NSO Group, which was valued at $1 billion USD last year, sells surveillance software to governments and law enforcement agencies intended to combat terrorism. Over the last several years, however, reports from around the world have implicated NSO Group’s spyware in the targeting of journalists and human rights activists.
  • A recent report by The Citizen Lab at the University of Toronto’s Munk School identified 13 journalists, including a reporter for the New York Times, targeted by Pegasus software employed by the Mexican and Saudi Arabian governments.
  • what makes Radi’s case unique is that he was infected last September, only three days after the Israeli company issued a policy that vowed the company would cut off clients if they were found to misuse the surveillance technology to target journalists and human rights activists
  • Amnesty’s new report notes that the NSO server used to hack Monjib and El Bouchattaoui was shut down shortly after the previous report was made public. Shortly afterward, a new server that operated in the same manner was set up and used to hack Radi’s phone, the report said.
  • This month, an article on the Moroccan news website Chouftv reported that Radi was part of a group of journalists organizing a support campaign for an imprisoned colleague. Radi says the article contained details taken from conversations he had on the encrypted apps Signal and WhatsApp, and he suspects government intelligence officers leaked the information gleaned from his phone.“It’s a way of saying: ‘You are being watched,’ ” he said.Radi’s sources have grown more reluctant to talk as it has become evident that journalists’ phones are being tapped.
Ed Webb

U.S. Needs to Look Beyond Russia for Disinformation Culprits | Time - 0 views

  • Russian disinformation may come first to mind for interfering in U.S. politics, but some of the most damning evidence of efforts to influence the American public leads to Washington’s allies in the Middle East. Saudi Arabia and the United Arab Emirates are at the forefront of undermining democratic deliberation–from manipulating the impact of Donald Trump’s tweets, to tricking editors across the world into publishing propaganda.
  • The FBI in 2019 found evidence that employees at Twitter’s San Fransciso headquarters, groomed with bribes such as luxury watches, were co-ordinating with members of the Saudi royal family to obtain private information from Twitter users. In August 2022, a jury found one of these men guilty. Two others couldn’t be tried because they were in Saudi Arabia.
  • Cambridge Analytica’s parent company, SCL Social Limited, worked with the UAE to create a social media advertising campaign attacking Qatar, a Gulf rival that’s home of the largest U.S. military base in the region. Though better known its use of “soft power” through projects like Al Jazeera, Qatar has also been reported to use disinformation, as well as allegedly hacking the email of the Emirates’ powerful ambassador to Washington.
  • ...3 more annotations...
  • One of the most audacious deception operations appeared to be connected to the UAE. Between 2019 and 2021, op-eds that supported the foreign policy position of the UAE, Saudi, and the U.S. administration under Trump began appearing in numerous well-known U.S. outlets, such as Newsmax, The National Interest, The Post Millennial and the Washington Examiner. The catch: The journalists writing them did not actually exist.
  • the Emiratis worked with ex-NSA spies to hack the devices of U.S. citizens. And both Saudi Arabia and the UAE are among the biggest customers of NSO, the Israeli firm that sells the spyware Pegasus, which they have used to target dozens of activists, journalists and academics
  • In 2011, during the heady days of the Arab Spring, social media and digital technology was touted as the force that would help liberate the region from authoritarian rule and bring democracy. Now, authoritarian regimes in the Gulf, along with Western companies and expertise, are using digital technology and social media to try and hack democracy wherever they find it, including in the U.S. The effect is clearest, however, in the Middle East. With critics silenced through incarceration, surveillance, torture, or death, opposition voices are increasingly fearful of self-expression, meaning that the digital public sphere is simply a space to praise the regime or engage in banal platitudes.
Ed Webb

Iran state TV hacked with image of supreme leader in crosshairs - Al-Monitor: Independe... - 0 views

  • Hackers supporting Iran's wave of women-led protests interrupted a state TV news broadcast with an image of gun-sight crosshairs and flames over an image of supreme leader Ayatollah Ali Khamenei, in footage widely shared online on Sunday.
  • activists have spray-painted "Death to Khamenei" and "The Police are the Murderers of the People" on billboards in Tehran
  • Another 90 people were killed in Iran's far southeast, in unrest on September 30 sparked by the alleged rape of a teenage girl by a police chief in Sistan-Baluchestan province, said IHR, citing the UK-based Baluch Activists Campaign.
  • ...5 more annotations...
  • In the face of the violence and the online restrictions, protesters have adopted new tactics to spread their message of resistance in public spaces."We are not afraid anymore. We will fight," read one large banner placed on an overpass of Tehran's Modares highway, seen in images verified by AFP.
  • "Join us and rise up," read another message in the TV hack claimed by the group Edalat-e Ali (Ali's Justice).It also posted pictures of Amini and three other women killed in the crackdown that has claimed at least 95 lives according to Norway-based group Iran Human Rights.
  • Many on social media said it evoked images of Neda Agha Soltan, a young woman who became an enduring symbol of the Iranian opposition after she was shot dead at protests in 2009.
  • a man with a spray can is seen altering the wording of a government billboard on the same highway from "The police are the servants of the people" to "The police are the murderers of the people".
  • Iranian pop singer Shervin Hajipour -- who was arrested after his song "Baraye" went viral online and became a protest anthem -- appeared back in an Instagram video Sunday for the first time since his release.In a short message, the 25-year-old denied links to any "movement or organisation outside the country" and said his song was only meant to "express solidarity with the people".
Ed Webb

Tunisia's bitter cyberwar - Features - Al Jazeera English - 2 views

  • Most international news organisations have no presence in the country (and, some say, a lack of interest in the protests). Media posted online by Tunisian web activists has been some of the only material that has slipped through the blackout, even if their videos and photos haven't generated quite the same enthusiastic coverage by Western media as the Iranian protest movement did in 2009.
  • Several sources Al Jazeera spoke with said that web activists had been receiving anonymous phone calls, warning them to delete critical posts on their Facebook pages or face the consequences.
  • Sami Ben Gharbia, who monitors Tunisia's web censorship for Global Voices, said that Google and Facebook were in no way complicit in the sophisticated phishing technique. The initial signs that something was underway came on Saturday, he said, when the secure https protocol became unavailable in Tunisia. This forced web users to use the non-secure http protocol. The government's internet team then appears to have gone phishing for individuals' usernames and passwords on services including Gmail, Facebook, Yahoo and Hotmail. Web activists and journalists alerted others of the alleged hacking by the government via Twitter, which is not susceptible to the same types of operations. "The goal, amongst others, is to delete the Facebook pages which these people administer," a Tunisian internet professional, who has also been in contact with Anonymous, told Al Jazeera in an emailed interview. The same source, who asked to remain unidentified due to the potential consequences for speaking out, said that in communication with the international group, he had come up with a Greasemonkey script for fireFox internet browsers that deactivated the government's malicious code.
  • ...2 more annotations...
  • The Committee to Protect Journalists says there is clear proof that the phishing campaign is organised and co-ordinated by the Tunisian government, as did other sources that Al Jazeera spoke with.
  • In the siege against cyber dissidence, Twitter has been a bastion for activists. Because people can access Twitter via clients rather than going through the website itself, many Tunisians can still communicate online. The web-savvy use proxies to browse the other censored sites. Yet even if bloggers manage to maintain their blogging, the censorship deprives them of those readers who do not use proxies. The result is what Ben Gharbia described as the "killing" of the Tunisian blogosphere.  Ben Mhenni said that the government's biggest censorship of webpages en masse happened in April 2010, when more than 100 blogs were blocked, in addition to other websites. She said the hijackings that had taken place in the past week, however, marked the biggest government-organised hacking operation. Most of the pages that had been deleted in recent days were already censored. Amamy said the government's approach to the internet policy is invasive and all-controlling. "Here we don't really have internet, we have a national intranet," he said.
Ed Webb

Turkey Detains 32 as Hacking Suspects - NYTimes.com - 1 views

  • Turkey’s directorate of telecommunications, whose Web site was taken down on Thursday as part of a protest against what Anonymous says is government censorship of the Internet
  • Turkey, whose ruling AK Party won a national election on Sunday, plans to introduce a new Internet filtering system in August, under which users will have to sign up for one of four filters: domestic, family, children and standard
Ed Webb

An Uncertain Future for Jordanian Youth - POMED - 2 views

  • Jordan’s strategic relationships and regional importance continue to win it unmatched financial support from the international community. And as a result, the government has felt little urgency or pressure to undertake real reform or respond to the legitimate demands of its youth. With trust between the youth and the regime low and the perception of corruption high, however, remaining complacent carries grave risks for the country’s stability.
  • Even the Jordanian National Center for Human Rights, a semi-governmental organization, wrote in its own recent annual report that “the detention of individuals for what they express is continuing.” Alarmingly, a recent Citizen Lab and Front Line Defenders joint report confirmed that two operators, “likely agencies of the Jordanian government,” used the NSO Group’s Pegasus spyware to hack the phones of at least four Jordanians, including a human rights defender, a lawyer, and a journalist. 
  • the rate of suicide in Jordan has also increased over the past few years amid the dire economic conditions. In 2020, the rate was the highest in 10 years and 45 percent higher than the year before, with one suicide on average every other day. After university graduates threatened earlier this year to commit mass suicide over widespread unemployment, Jordan’s parliament passed legislation criminalizing suicide and attempts to commit suicide in a public place, doubling the fine if it is a mass suicide attempt.
  • ...8 more annotations...
  • There are more than 6.5 million internet and social media users in Jordan, the majority of whom are youth, out of a population of roughly 11 million. Jordanians are avid social media users, and over the years have used Facebook, WhatsApp, and other platforms to share news not broadcast on state-controlled channels, jokes targeting the regime, and rumors about the myriad political and corruption scandals circulating across the country on a regular basis
  • Cybercrimes Law No. 27/2015 is a popular regime tool used to control expression online. Article 11 regulates expression on online platforms such as Facebook, Twitter, and blogs. In April 2019, parliament introduced amendments to the law to criminalize the act of spreading “rumors” and “hate speech,” extending to the use of private messaging apps such as WhatsApp. The latest amendments define hate speech as “every writing and every speech or action intended to provoke sectarian or racial sedition, advocate for violence, or foster conflict between followers of different religions and various components of the nation.” And under the cybercrime law, Jordanians will face a criminal penalty if they are convicted of “sending or resending or disseminating information through the Internet or website or any information system that includes defamation, slander or libel against any person.” Between 2019 and 2020, the cases brought under the cybercrime law exceeded two thousand, more than double the number from the year before. In 2022, there have been more arrests under charges of “spreading false news,” including the detentions of several high-profile journalists.
  • “Economic optimism is scant, particularly among the youth,” the Arab Barometer found, adding that the economic crisis was “leading many to consider migration despite global travel restrictions.”
  • Loosely formed groups of youth activists, often described with the term hirak (“movement”), organize in various neighborhoods and towns across Jordan around shared issues. In 2019, a workshop looking at youth activism across the Middle East and North Africa found that youth activism does not adhere to formalized structures of organizing, such as political parties, professional associations, and civil society organizations.
  • we have seen youth movements in the past decade break the generations-old divisions of urban versus rural and West Bank versus East Bank
  • organizing around their shared frustrations over unchecked levels of corruption, perpetual over-education combined with underemployment, and restrictions on what they can write on social media or when they can gather.
  • the attitudes of ruling elites and public officials toward youth are dismissive
  • the many initiatives launched over the years have not ever been driven by local youth demands, but rather have been top-down, buzzword-filled projects, centralized within the newly created Ministry of Youth, with little to no popular support or participation
Ed Webb

Palestinians, Israelis face off on Facebook - Al-Monitor: the Pulse of the Middle East - 3 views

  • “Ever since the intifada broke out in Jerusalem, there has been an online virtual war between Palestinians and Israelis. Social networks are flooded with firsthand field news, while campaigns are launched on Twitter on a daily basis to put pressure on Israel and its supporters around the world.”
  • Raji al-Hams, a prominent presenter at Al-Aqsa TV, said his original Facebook page was closed down after it garnered 90,000 followers. He told Al-Monitor he received “a message Jan. 15 from the Facebook administration saying I had violated the website’s rules by posting [slogans] about the intifada along with pictures of armed Palestinians."
  • Israel has been urging dozens of Israeli Facebook users to submit reports to the Facebook administration claiming that Palestinian pages are inciting murder. These users mention the name of these pages in the reports and the Facebook administration shuts them down, as they contain posts inciting murder and violence, which violate Facebook’s conditions.
  • ...4 more annotations...
  • On Nov. 24, the Israeli Ministry of Foreign Affairs, Google, YouTube and some other social networks agreed to fight incitement posted on their pages.
  • Israel uses a number of measures to counter the postings, most notably by creating around 5,000 fake Facebook accounts, Quds Press reported Oct. 29. Those who operate these accounts are fluent in English and Arabic, and their mission is to hack into and shut down Palestinian pages by submitting reports to the Facebook administration. Israel also has arrested of a number of Palestinians during the past three months on charges of inciting to kill Israelis in their Facebook posts.
  • the Authority for Palestinian Prisoners' Affairs reported the Israeli army has detained 27 Palestinians on charges of incitement since October, due to their activities on social networks
  • there are Israeli pages in Hebrew that call Palestinians terrorists, among other bad names, but they are not being closed down
Ed Webb

Post-Revolt Tunisia Can Alter E-Mail With `Big Brother' Software - Bloomberg - 0 views

  • Ben Ali’s regime deployed the surveillance gear to demonstrate its power, Wagner says. Changing e-mails into nonsense, rather than luring dissidents into ambushes, created a pervasive unease, in which even spam could be perceived as the work of Ammar 404, he says.
  • “It leaves citizens in a persistent state of uncertainty about the security and integrity of their communications,” he says. Western suppliers used the country as a testing ground. Moez Chakchouk, the post-revolution head of the Tunisian Internet Agency, says he’s discovered that the monitoring industry gave discounts to the government-controlled agency, known by its French acronym ATI, to gain access. In interviews following Ben Ali’s ouster after 23 years in power, technicians, activists, executives and government officials described how they grappled with, and in some cases helped build, the repressive Wonderland.
  • Saadaoui, who has a master’s degree in computer science from Michigan State University, says he helped procure and set up the system that captured and changed e-mails. It uses a technique called deep-packet inspection, which peers into the content of communications and sends suspect e-mails to the Interior Ministry. During an hour-long interview in his office at the National Telecommunications Agency, he describes a monitoring room with metal bars on the windows and 20 desks, where staffers review the e-mails in an array of languages. “They were able to read why it was blocked and decided whether it should be re-routed to the network or deleted,” he says. “Or changed.”
  • ...4 more annotations...
  • The cyber-repression was made easier by the physical structure of Tunisia’s data flow, which runs through just a few choke points. In broad terms, the system has two distinct parts: one for intercepting phone-related traffic and one for the Internet, Saadaoui says.
  • In each of the three telecom rooms, which are about half the size of a tennis court, a handful of computers known as “boxes” straddle the data pipelines, Chakchouk says. Their function is to siphon off communications, mostly by searching for key words, according to Saadaoui. “You get all the traffic going through these boxes,” Saadaoui says. Once the system flagged a suspect e-mail, a fiber optic network under the streets of Tunis carried it from the telecom offices to the Interior Ministry’s operator room, Saadaoui says. Moez Ben Mahmoud Hassen, a spokesman for Tunisie Telecom, said the company “denies any possible relation with such practices.” He stressed that it follows the law and respects the confidentiality of communications. Asked about the company’s activities during Ben Ali’s government, he said it was a matter for the courts and declined to elaborate. Communications through mobile operator Orascom Telecom Tunisie, also known as Tunisiana, were not monitored, according to a statement released by company spokeswoman Fatma Ben Hadj Ali. The country’s other mobile operator, Orange Tunisia, didn’t respond to requests for comment.
  • By 2010, it became a contest as Tunisians increasingly employed encryption the packet inspection couldn’t crack. Communications on Facebook boomed, and the regime demanded better tools, Saadaoui says. The same European contractor that provided e-mail surveillance signed a deal to add monitoring of social networks, he says. It was too late. The supplier hadn’t yet delivered the solution when the “Facebook revolution” crested in January. The government’s last-ditch attempts to quell online organizing included hacking and password-stealing attacks by Ben Ali’s regime, outside the purview of the Internet agency, Saadaoui says. Slim Amamou, a blogger who was arrested during the uprising and briefly became a minister for youth and sport after the revolution, says the presidential palace and ruling party orchestrated the final cyber attacks.
  • Today, Chakchouk, the new head of Tunisia’s Internet authority says he’s working to dismantle Ammar 404, and turned off the mass filtering, he says. Now he’s locked in legal battles over court orders to block specific Web pages. On Saturday, May 7, he and his team pulled an all-nighter to set the filtering equipment to block a single Web page to comply with a military court’s demand related to a defamation complaint. The following Tuesday, still looking tired, Chakchouk says it took so long because they were figuring out how to replace the page with a message explaining the blockage -- rather than the customary Error 404. Since the revolution, Chakchouk has spoken at conferences around the world, decrying censorship. Yet he won’t say much about surveillance. For now, the packet inspection boxes are still on the network. “We tried to understand the equipment and we’re still doing that,” he says. “We’re waiting for the new government to decide what to do with it.”
Ed Webb

Disinformation flies in Syria's growing cyber war - Yahoo! News - 0 views

  • "Cyber attacks are the new reality of modern warfare," said Hayat Alvi, lecturer in Middle Eastern studies at the US Naval War College. "We can expect more... from all directions. In war, the greatest casualty is the truth. Each side will try to manipulate information to make their own side look like it is gaining while the other is losing."
  • In April, Saudi-based broadcaster Al Arabiya briefly lost control of one of its twitter accounts, which was then used to spread a string of stories suggesting a political crisis in Qatar. Tweets included claims that the Qatari prime minister had been sacked, his daughter arrested in London and that a coup orchestrated by the army chief was underway.
  • there seems little sign such incidents made a significant difference either on the ground in Syria or to the wider geopolitical picture
  • ...1 more annotation...
  • Some believe Assad may be getting technical support from his long-term allies in Tehran, who successfully crushed their own post-election protests that were in part organized over the Internet. China and Russia too are has amongst the world leaders in managing online political activism and dissent, with the latter at least also seen likely helping out in Syria.
Ed Webb

On Jordan's Cyber Crimes Law at The Black Iris of Jordan - 0 views

  • I was invited, along with a significant number of bloggers and online notables to attend one of several meetings with the minister of ICT, Marwan Jumah, who along with a legal aid, presented the law and, to his credit, tackled whatever questions, issues or concerns we had to offer. At the time, no one knew anything about the law so it was quite difficult to effectively argue the points, this is to say nothing of the absent legal background. However, to their credit, the concerns of those presented were taken in to consideration and proper amendments were even made to the memorandum accompanying the actual law before it was presented to the cabinet.
    • Ed Webb
       
      Quite striking that such consultation should take place.
  • This new cyber crime law is aimed at tackling specific issues related to online crimes, such as hacking, identity theft, financial transaction crimes, etc. And that’s all perfectly fine. The ICT ministry made the argument that this law was “urgent” enough to pass as a temporary law because of the number of cyber related crimes that are being presented before the judiciary every month. However, I am inclined to believe that given the fact that the Internet has been around for over 15 years in Jordan, it is unlikely that the government has just now noticed that crimes concerning its citizens are taking place online and there is a need for various protections.
  • The mere approval of the law made international headlines and will likely place Jordan firmly on the Internet Enemies list for the first time - putting out that beacon of hope we once took pride in throughout a region of highly regulated and censored Internet.
  • ...2 more annotations...
  • Laws are constructed to firmly place the citizen in either a constant state of fear through uncertainties, or in a bubble of complacency.
  • The equation may have been much simpler 10 or 20 years ago, when limiting free speech contributed to maintaining some political stability. But in this day and age I think the state has yet to recognize that these variables now sit in opposition to one another, and the limitations placed on media in the information age will undoubtedly create long term instability. The sooner this is recognized, the sooner we’ll be better off
Ed Webb

London, Egypt and the complex role of social media - The Washington Post - 1 views

  • Confronting these grievances by cutting off or hacking a communication technology, as one British lawmaker said should be done to Blackberry in London, fails to address the deep-rooted dissatisfaction that drove people to take to the streets. The Egypt case shows that when a regime cuts Internet, television, and mobile phone networks, protester numbers may actually increase.
  • Social media are part of a much larger matrix of tools and intentions that rally masses. That said, they are neither necessary nor sufficient to make a revolution possible. By fixating on technologies and the few youth that actively use them, we ignore a much more powerful narrative — the story of how synergies are created between classes to mobilize as a network without depending on social media. In Egypt, these networks may include family connections, neighborhoods, mosques, and historical institutions, such as the previously banned Muslim Brotherhood. New technologies hardly erode or overwhelm these classic models of communication and information sharing.
  • over-generalizing social media’s role could do more to harm our understanding of an uprising than help it
1 - 20 of 24 Next ›
Showing 20 items per page