Uuzaji wa taarifa za wanaharakati na wanahabari kwa Madikteta

Wildlifer

JF-Expert Member
May 12, 2021
1,881
5,183
Hii ni habari iliyochapwa kwenye website ya The Guardian, ikionyesha taarifa za watu mbalimbali zikiuzwa kwa serikali za kidikteta ili washughulikiwe.

===≠=====

Human rights activists, journalists and lawyers across the world have been targeted by authoritarian governments using hacking software sold by the Israeli surveillance company NSO Group, according to an investigation into a massive data leak.

The investigation by the Guardian and 16 other media organisations suggests widespread and continuing abuse of NSO’s hacking spyware, Pegasus, which the company insists is only intended for use against criminals and terrorists.

Pegasus is a malware that infects iPhones and Android devices to enable operators of the tool to extract messages, photos and emails, record calls and secretly activate microphones.

The leak contains a list of more than 50,000 phone numbers that, it is believed, have been identified as those of people of interest by clients of NSO since 2016.

Forbidden Stories, a Paris-based media nonprofit organisation, and Amnesty International initially had access to the leaked list and shared access with media partners as part of the Pegasus project, a reporting consortium.

The presence of a phone number in the data does not reveal whether a device was infected with Pegasus or subject to an attempted hack. However, the consortium believes the data is indicative of the potential targets NSO’s government clients identified in advance of possible surveillance attempts.

Quick Guide
What is in the Pegasus project data?

Forensics analysis of a small number of phones whose numbers appeared on the leaked list also showed more than half had traces of the Pegasus spyware.

The Guardian and its media partners will be revealing the identities of people whose number appeared on the list in the coming days. They include hundreds of business executives, religious figures, academics, NGO employees, union officials and government officials, including cabinet ministers, presidents and prime ministers.

The list also contains the numbers of close family members of one country’s ruler, suggesting the ruler may have instructed their intelligence agencies to explore the possibility of monitoring their own relatives.

The disclosures begin on Sunday, with the revelation that the numbers of more than 180 journalists are listed in the data, including reporters, editors and executives at the Financial Times, CNN, the New York Times, France 24, the Economist, Associated Press and Reuters.

The phone number of a freelance Mexican reporter, Cecilio Pineda Birto, was found in the list, apparently of interest to a Mexican client in the weeks leading up to his murder, when his killers were able to locate him at a car wash. His phone has never been found – so no forensic analysis has been possible to establish if it was infected.

NSO said that even if Pineda’s phone had been targeted, it did not mean data collected from his phone contributed in any way to his death, stressing governments could have discovered his location by other means. He was among at least 25 Mexican journalists apparently selected as candidates for surveillance over a two-year period.

Without forensic examination of mobile devices, it is impossible to say whether phones were subjected to an attempted or successful hack using Pegasus.

NSO has always maintained it does “does not operate the systems that it sells to vetted government customers, and does not have access to the data of its customers’ targets”.

In statements issued through its lawyers, NSO denied “false claims” made about the activities of its clients, but said that it would “continue to investigate all credible claims of misuse and take appropriate action”.

It said the list cannot be a list of numbers “targeted by governments using Pegasus”, and described the 50,000 figure as “exaggerated”.

The company sells only to military, law enforcement and intelligence agencies in 40 unnamed countries, and says it rigorously vets its customers’ human rights records before allowing them to use its spy tools.

The Israeli minister of defence closely regulates NSO, granting individual export licences before its surveillance technology can be sold to a new country.

Last month, NSO released a transparency report in which it claimed to have an industry-leading approach to human rights, and published excerpts from it contracts with customers stipulating they must only use its products for criminal and national security investigations.

There is nothing to suggest that NSO’s customers did not also use Pegasus in terrorism and crime investigations, and the consortium also found numbers in the data belonging to suspected criminals.

However the broad array of numbers in the list belonging to people who seemingly have no connection to criminality suggests some of NSO clients are breaching their contracts with the company, spying on pro-democracy activists and journalists investigating corruption, as well as political opponents and government critics.

That thesis is supported by forensic analysis on the phones of a small sample of journalists, human rights activists and lawyers whose numbers appeared on the leaked list.

The research, conducted by Amnesty’s Security Lab, a technical partner on the Pegasus project, found traces of Pegasus activity on 37 out of the 67 phones examined.

Q&A
What is the Pegasus project?

The analysis also uncovered some sequential correlations between the time and date a number was entered into the list and the onset of Pegasus activity on the device, which in some cases occurred just a few seconds later.

Amnesty shared its forensic work on four iPhones with Citizen Lab, a research group at the University of Toronto that specialises in studying Pegasus, which confirmed they showed signs of Pegasus infection. Citizen Lab also conducted a peer-review of Amnesty’s forensic methods, and found them to be sound.

The consortium’s analysis of the leaked data identified at least 10 governments believed to be NSO customers who were entering numbers into a system: Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India, and the United Arab Emirates (UAE).

Analysis of the data suggests the NSO client country that selected the most numbers – more than 15,000 – was Mexico, where multiple different government agencies are known to have bought Pegasus. Both Morocco and the UAE selected more than 10,000 numbers, the analysis suggested.

The phone numbers which were selected, possibly ahead of a surveillance attack, spanned more than 45 countries across four continents. There were more than 1,000 numbers in European countries that, the analysis indicated, were selected by NSO clients.

The presence of a number in the data does not mean there was an attempt to infect the phone. NSO says there were other possible purposes for numbers being recorded on the list.

Rwanda, Morocco, India and Hungary denied having used Pegasus to hack the phones of the individuals named in the list. The governments of Azerbaijan, Bahrain, Kazakhstan, Saudi Arabia, Mexico, the United Arab Emirates and Dubai did not respond to invitations to comment.

The Pegasus project is likely to spur debates over government surveillance in several countries suspected of using the technology. The investigation suggests the Hungarian government of Viktor Orbán appears to have deployed NSO’s technology as part of his so-called war on the media, targeting investigative journalists in the country as well as the close circle of one of Hungary’s few independent media executives.

The leaked data and forensic analyses also suggest NSO’s spy tool was used by Saudi Arabia and its close ally, UAE, to target the phones of close associates of the murdered Washington Post journalist Jamal Khashoggi in the months after his death. The Turkish prosecutor investigating his death was also a candidate for targeting, the data leak suggests.

Claudio Guarnieri, who runs Amnesty International’s Security Lab, said that once a phone was infected with Pegasus, a client of NSO could in effect take control of a phone, enabling them to extract a person’s messages, calls, photos and emails, secretly activate cameras or microphones, and read the contents of encrypted messaging apps such as WhatsApp, Telegram and Signal.

By accessing GPS and hardware sensors in the phone, he added, NSO’s clients could also secure a log of a person’s past movements and track their location in real time with pinpoint accuracy, for example by establishing the direction and speed a car was travelling in.

Viktor Orbán using NSO spyware in assault on media, data suggests
The latest advances in NSO’s technology enable it to penetrate phones with “zero-click” attacks, meaning a user does not even need to click on a malicious link for their phone to be infected.

Guarnieri has identified evidence NSO has been exploiting vulnerabilities associated with iMessage, which comes installed on all iPhones, and has been able to penetrate even the most up-to-date iPhone running the latest version of iOS. His team’s forensic analysis discovered successful and attempted Pegasus infections of phones as recently as this month.

Apple said: “Security researchers agree iPhone is the safest, most secure consumer mobile device on the market.”

NSO declined to give specific details about its customers and the people they target.

However, a source familiar with the matter said the average number of annual targets per customer was 112. The source said the company has 45 customers for its Pegasus spyware.
 
Ndugu tunakushukuru kwa ujumbe wako, unaweza kuwa na lengo zuri ukizingatia yanayoendelea katika taifa letu kwa sasa, ila kwakuwa haifai kumwamini yeyote ni vyema kukutilia shaka hata wewe, kwanini ujumbe wako uje leo, Bila shaka lengo ni kupandikiza hofu miongoni mwa wenye nia njema na taifa letu. Ila binafsi nakushukuru kwa kujali na ushirikiano wako.
 
Ndugu tunakushukuru kwa ujumbe wako, unaweza kuwa na lengo zuri ukizingatia yanayoendelea katika taifa letu kwa sasa, ila kwakuwa haifai kumwamini yeyote ni vyema kukutilia shaka hata wewe, kwanini ujumbe wako uje leo, Bila shaka lengo ni kupandikiza hofu miongoni mwa wenye nia njema na taifa letu. Ila binafsi nakushukuru kwa kujali na ushirikiano wako.
Hii hauhusiani kabisa na Tanzania, lakini jambo ambalo ni la hakika ni kuwa, Makampuni ya Simu ya Tanzania yanatoa taarifa kwa serikali.
 
Ila Unit 8200 ni hatari mno
So, what really makes Israel a superpower when it comes to cyber security? Let’s find out.

#1 Government facilitates cybersecurity expertise

Israel really boasts a thriving technology sector and the government plays a crucial role in sustaining this aspect. The government plays a major part in Israel’s rapidly growing cyber security industry. The Advanced Technologies Park in Israel’s city of Beer-Sheva is home to the nation’s cyber security philosophy that brings together a unique combination of theoretical and practical cross-pollination of private and public interests.

In order to achieve its objectives to make the country the major source of expertise and talent in cyber security, the Advanced Technologies Park has managed to attract multinational corporations like Oracle, Dell EMC, IBM, and Deutsche Telekom, with their research and development centers. Moreover, advanced research labs like the National Cyber Research Institute, the national emergency response, and the venture capital firms have taken a keen interest.

#2 Introduction of cybersecurity training in schools and universities

Israel respects its human capital and has invested loads into its people on their ambitions, skills, and expertise to make them technologically empowered. This is the primary aspect of any cyber defense platform. Through a plethora of private sector and government programs and investments, the drive of the Israeli nationals is channeled into particular academic pursuits. cyber security is given so much prominence in Israel that cyber security education starts in middle school in Israel. This makes Israel the only country in the world that teaches cyber security as an optional in high-school matriculation examinations. In addition to that, a lot of universities in Israel offer undergraduate specialization in internet security.

What’s more is the fact that Israel is the first country in history to offer a Ph.D. program in cyber security. In modern day Israel, there are six research centers dedicated to cyber security.

#3 The foresightedness

The Israeli government along with its think tank has collaborated to make the nation a superpower in cyber security. The Israeli Space Agency has teamed with the National Cyber Initiative task force and the National Council for Research and Development for creating an ecosystem that will alert the authorities with prior information on what to do when unpredictable internet threats arise. This foresightedness is what led to the nation’s growth and success in the field of cyber security.

#4 Leveraging Israeli Military as the startup incubator

Since the nation was formed in the year 1948, Israel’s primary focus was to develop advanced military capabilities. The country has invested a lot of its money and resources into developing a powerful military and defense organization.

With the advent of technology in cyber defense, the nation’s military, as well as cyber security defense, has grown significantly.

Since cyber security is going to be a prominent chapter of the future, it is important for nations to reinforce their cyber defenses to keep the country and its people safe. People in India who aspire to become cyber security specialists or want to pursue the field of internet security can now learn from the Israeli experts.
 
Hyo software mnavyoipamba utafikiri ndio nchi ya kwanza kuwa na hyo technology wakati black hackers wanasumbua wanapotaka kwahzo software.
 
Back
Top Bottom