Groups like ISIS communicate through Google, using Youtube video chat screens for passing messages. We found this years ago, someday the NSA might as well.
We believe Google is ISIS.
“NSO Group sells its products to governments who are known for outrageous human rights abuses, giving them the tools to track activists and critics. The attack on Amnesty International was the final straw,” Danna Ingelton, deputy director of Amnesty Tech, said in a statement on Monday. “It’s time to stop the use of NSO Group’s tools to infiltrate, intimidate and silence civil society.”
ALSO ON RT.COMPentagon says 120 civilians killed worldwide by US forces in 2018 – human rights orgs beg to differAmnesty, which was targeted along with several human rights lawyers by the WhatsApp exploit, is working with a group of Israeli citizens and a civil rights group on a legal action to force the Israeli Ministry of Defense to revoke NSO Group’s export license, claiming the company’s flagship product, called Pegasus, is dangerous and prone to abuse – and that NSO deliberately sells it to repressive governments.
After discovering the vulnerability last week, WhatsApp claims it worked “around the clock” to develop a patch to protect users from the exploit, finally releasing the fix on Monday. WhatsApp has also reported the issue to the US Department of Justice, which declined to comment to the Financial Times. The company is not yet aware of how many of its 1.5 billion users were affected by the exploit.
Attackers installed Pegasus on target users’ phones through WhatsApp’s call function, according to the company; users did not even have to answer the call to become infected. Pegasus can turn on a target’s microphone and camera at will, peruse emails and texts, and track location – all without the target’s knowledge.
While NSO claims Pegasus is intended for government usage – its website insists its mission is “developing technology to prevent and investigate terror and crime,” and the company claims it carefully vets customers – a number of activists and human rights campaigners in the Middle East have found themselves on the wrong end of Pegasus attacks. Amnesty International claims “at least 24 human rights defenders, journalists and parliamentarians in Mexico,” an employee, several Saudi activists, an Emirati human rights campaigner, and even (allegedly) Saudi dissident Jamal Khashoggi, whose killers reportedly used the software to track him, have been targeted using Pegasus.
ALSO ON RT.COM‘Beautiful Diverse Sensational’: Israel sets up fake Eurovision boycott page to counter BDS campaign“Under no circumstances would NSO be involved in the operating or identifying of targets of its technology, which is solely operated by intelligence and law enforcement agencies,” NSO said, adding that it would not have the ability to target an individual or organization.
Amnesty International is not the only organization pursuing legal action against NSO. Alaa Mahajne, a lawyer based in Jerusalem, is suing on behalf of Mexican and Saudi citizens targeted with the software. “It’s upsetting but not surprising that my team has been targeted with the very technology that we are raising concerns about in our lawsuits,” she said.
Reported 2 years ago in Israel:
One of the major advantages of the WhatsApp text, voice, photo and video messaging service is its end-to-end encryption of messages. The app, which is owned by Facebook, doesn’t necessarily offer the most highly protected service, but the feature is a major advantage for a messaging service that is the most widely used in the world. The encryption may protect messages from snooping from hackers or governments, but it became apparent this week that the way WhatsApp deals with website links sent on the app exposes information about users.
This weak spot was first disclosed this week by an anonymous software developer — who goes by the name mulander on Twitter — after he discovered something odd when he examined the operation of the server for his blog. It turns out that when someone types Web addresses in the app, WhatsApp sends the address to the desired website’s server letter-by-letter. This gives the user a faster preview of the requested page, but it also creates the security lapse. Facebook has not yet responded to Haaretz’s inquiry on the subject.