pegasus – Radio Free https://www.radiofree.org Independent Media for People, Not Profits. Tue, 03 Jun 2025 19:25:48 +0000 en-US hourly 1 https://www.radiofree.org/wp-content/uploads/2019/12/cropped-Radio-Free-Social-Icon-2-32x32.png pegasus – Radio Free https://www.radiofree.org 32 32 141331581 Alarming escalation in attacks on journalists amid political crisis in Serbia https://www.radiofree.org/2025/06/03/alarming-escalation-in-attacks-on-journalists-amid-political-crisis-in-serbia/ https://www.radiofree.org/2025/06/03/alarming-escalation-in-attacks-on-journalists-amid-political-crisis-in-serbia/#respond Tue, 03 Jun 2025 19:25:48 +0000 https://cpj.org/?p=484254 Berlin, June 3, 2025—What journalists called a “witch hunt” atmosphere against government critics in Serbia one year ago has since escalated into a rise in attacks and threats against the press, following a deadly railway station collapse in November 2024 that triggered a widespread anti-corruption movement.

Initial protests demanding accountability for the tragedy have turned into a widespread movement against corruption and President Aleksandar Vučić’s increasingly authoritarian rule, and as a result, journalists have faced a surge in physical attacks, threats, online harassment, smear campaigns, and even spyware — often driven by Vučić’s supporters, government officials, and pro-government media.

Since the beginning of November, the Independent Journalists Association of Serbia (IJAS) has recorded 23 physical assaults. There have been 18 assaults so far this year, already surpassing the 17 in all of 2024. The IJAS has tallied a total of 128 of various types of attacks and threats so far this year, suggesting the overall number may soon exceed last year’s 166 cases.

“In the political crisis Serbia is going through since November, we are witnessing a sort of open warfare against independent media,” Jelena L. Petković, a freelance journalist specializing in covering media safety in the Western Balkans, told CPJ. “2025 might turn out to be the worst year on record for journalist safety in the country.”

Petković said U.S. President Donald Trump’s reelection, the rise of populist leaders like Viktor Orbán in neighboring EU states, and the crisis the USAID funding freeze has caused for Serbia’s independent media have emboldened Vučić to intensify his pressure on the press — frequently accusing journalists and civil society groups of being foreign agents and traitors. She noted that none of the attacks on journalists since last November have led to prosecutions, underscoring a broader pattern of impunity.

“This surge of attacks on independent journalists who hold the power to account in Serbia reflects a broader attempt to silence critical reporting amid a deepening political crisis,” said Attila Mong, CPJ’s Europe representative. “Serbian authorities must end the impunity for these attacks, take urgent steps to protect journalists, and put a stop to the hostile climate that emboldens those who seek to intimidate journalists.”

CPJ emailed questions to the press office of the presidency and to the Serbian Ministry of the Interior, which oversees the police, but did not receive any replies.

Below is a breakdown of the most serious attacks since November 1, 2024, based on CPJ’s review of cases documented by local press freedom groups:

Physical attacks

CPJ’s review of 15 physical attacks, affecting at least 23 journalists, found that the incidents mostly occurred during protests and ranged from attempts to snatch journalists’ phones to assaults that caused injuries. Some attackers were politicians or public officials, and several journalists reported that police failed to protect them.

  • On May 17, 2025, an unidentified individual attempted to knock the phone of Južne Vesti journalist Tamara Radovanović from her hand while she was documenting a rally by the ruling Serbian Progressive Party (SNS) in the southern city of Niš. Instead of protecting her, police removed her from the scene to “reduce tension,” without taking action against her attacker, according to the journalist.

  • On May 16, while filming an SNS event attended by party officials in the eastern village of Makovište, N1 TV camera operator Marjan Vučetić was attacked from behind by unknown individuals, who struck his back and neck, causing light injuries. Others insulted him, calling him a “traitor” and “foreign mercenary.”

  • On April 12,  during an SNS rally in the capital Belgrade, pro-government supporters attacked a five-member KTV crew. Milorad Malešev, a technician, had three teeth knocked out, while others sustained scrapes and bruises. Police intervened only after camera operator Siniša Nikšić was assaulted, at which point they surrounded the journalists and told them to stop reporting, saying they couldn’t guarantee their safety.

  • On March 23, Saša Dragojlo, a journalist for the Balkan Investigative Reporting Network (BIRN), was beaten while covering a protest by a man later identified by Serbian media as a former boxer and SNS activist in Belgrade. Despite Dragojlo identifying himself as press and requesting help, police intervened only to prevent further escalation, but failed to take action against the attacker. 

  • On November 27, 2024, during a pro-government demonstration in Belgrade, supporters insulted an N1 news crew and attacked journalist Jelena Mirković, hitting her shoulder and knocking the microphone from her hand. Reporter Aleksandar Cvrkutić’s camera was also struck as he filmed the scene.

  • On November 22, Nova TV reporter Ana Marković was lightly injured when demonstrators struck her phone from her hand while she was reporting in Belgrade.

  • On November 6, while live streaming a municipal assembly session in the northerntown of Kovin, journalist Miloš Ljiljanić of Kovinske Info was physically attacked by an SNS councilor, who shoved him, tried to grab his phone, and twisted his arm.

  • On November 5, in the northern city of Novi Sad, a group of masked individuals insulted an N1 TV crew and struck cameraperson Nikola Popović’s hand, causing him to drop and damage his camera. They also assaulted Euronews camera operator Mirko Todorović, knocking him to the ground. Police at the scene did not intervene.

Police violence, obstruction, detention

  • On May 17, 2025, police in Niš detained Nikola Doderović, a correspondent for Australian radio broadcaster SBS, as well as a journalism student accompanying him, for over an hour during a pro-government rally. After demanding their IDs, officers questioned them about their presence and activities, which Doderović said was unnecessary and arbitrary. Local press freedom groups called the detention a “clear form of intimidation.”

  • On May 16, police in Novi Sad briefly detained freelance photojournalist Gavrilo Andrić for “identification,” even though his helmet was marked as “press.” Earlier, officers had beaten him along with some protesters while he was documenting a blockade of the court and prosecutor’s office.

  • On April 28, police pepper-sprayed and beat journalist Žarko Bogosavljević of Razglas News while he was covering a protest, despite his wearing a press vest.

  • On April 10, prosecutors in Belgrade detained Dejan Ilić, a columnist for news site Peščanik, for a day on criminal charges of “causing panic and disorder.” The charges stem from comments he made during a March 29 Nova TV talk show, where he discussed political alternatives for Serbia, including a transitional government.

  • On March 14, several journalist crews traveling from neighboring Croatia and Slovenia to cover anti-corruption protests in Belgrade were briefly detained at the border and denied entry, before being sent back.

  • On February 25, police raided the premises of the Center for Research, Transparency and Accountability, an NGO operating the fact-checking platform Istinomer, for 28 hours as part of a corruption probe tied to USAID funding — allegations that local press freedom groups have denounced as politically motivated.

  • On January 17, police forcibly removed five journalists — with N1 TV, Nova TV, Radio 021, and the daily newspaper Danas — from Novi Sad City Hall, preventing them from covering an opposition-led protest.

Surveillance, spyware

  • On March 27, BIRN reported that two of its journalists had been targeted with Pegasus spyware in February. The attempted “one-click” attack failed, as the journalists did not open the malicious link.

Other threats, smears

  • In April 2025, a 60-minute video, produced by a pro-government NGO, aired on six national channels and circulated on social media, portraying journalists from N1 TV, Nova TV, and other outlets of publishing house United Group as foreign agents, extremists, and enemies of the state allegedly operating illegally in Serbia.

  • In February and March 2025, National Assembly President Ana Brnabić accused N1, Nova S, and Danas of spreading hatred and lies. Facing critical questions, Vučić asked a reporter from investigative outlet KRiK how much money he had received from USAID and the National Endowment for Democracy. The president also blamed N1 TV and its Brussels correspondent Nikola Radišić of contributing to a “color revolution,” a reference to pro-democracy movements that have emerged in various Eastern European countries, which Vučić has portrayed as a Western attempt to undermine Serbia’s sovereignty. Radišić was excluded from a press conference in Brussels as well.

  • Since November 2024, journalists working for independent media outlets N1 TV, Nova TV, and online platform Magločistač, as well as press freedom advocates, have received threats of physical violence and death.


This content originally appeared on Committee to Protect Journalists and was authored by Attila Mong/CPJ Europe Representative.

]]>
https://www.radiofree.org/2025/06/03/alarming-escalation-in-attacks-on-journalists-amid-political-crisis-in-serbia/feed/ 0 536389
What’s Next for Battlefield America? https://www.radiofree.org/2024/06/05/whats-next-for-battlefield-america/ https://www.radiofree.org/2024/06/05/whats-next-for-battlefield-america/#respond Wed, 05 Jun 2024 14:10:51 +0000 https://dissidentvoice.org/?p=150850 I did not know Israel was capturing or recording my face. [But Israel has] been watching us for years from the sky with their drones. They have been watching us gardening and going to schools and kissing our wives. I feel like I have been watched for so long. — Mosab Abu Toha, Palestinian poet […]

The post What’s Next for Battlefield America? first appeared on Dissident Voice.]]>

I did not know Israel was capturing or recording my face. [But Israel has] been watching us for years from the sky with their drones. They have been watching us gardening and going to schools and kissing our wives. I feel like I have been watched for so long.
— Mosab Abu Toha, Palestinian poet

If you want a glimpse of the next stage of America’s transformation into a police state, look no further than how Israel—a long-time recipient of hundreds of billions of dollars in foreign aid from the U.S.—uses its high-tech military tactics, surveillance and weaponry to advance its authoritarian agenda.

Military checkpoints. Wall-to-wall mass surveillance. Predictive policing. Aerial surveillance that tracks your movements wherever you go and whatever you do. AI-powered facial recognition and biometric programs carried out with the knowledge or consent of those targeted by it. Cyber-intelligence. Detention centers. Brutal interrogation tactics. Weaponized drones. Combat robots.

We’ve already seen many of these military tactics and technologies deployed on American soil and used against the populace, especially along the border regions, a testament to the heavy influence Israel’s military-industrial complex has had on U.S. policing.

Indeed, Israel has become one of the largest developers and exporters of military weapons and technologies of oppression worldwide.

Journalist Antony Loewenstein has warned that Pegasus, one of Israel’s most invasive pieces of spyware, which allows any government or military intelligence or police department to spy on someone’s phone and get all the information from that phone, has become a favorite tool of oppressive regimes around the world. The FBI and NYPD have also been recipients of the surveillance technology which promises to turn any “target’s smartphone into an intelligence gold mine.”

Yet it’s not just military weapons that Israel is exporting. They’re also helping to transform local police agencies into extensions of the military.

According to The Intercept, thousands of American law enforcement officers frequently travel for training to Israel, “one of the few countries where policing and militarism are even more deeply intertwined than they are here,” as part of an ongoing exchange program that largely flies under the radar of public scrutiny.

A 2018 investigative report concluded that imported military techniques by way of these exchange programs that allow police to study in Israel have changed American policing for the worse. “Upon their return, U.S. law enforcement delegates implement practices learned from Israel’s use of invasive surveillance, blatant racial profiling, and repressive force against dissent,” the report states. “Rather than promoting security for all, these programs facilitate an exchange of methods in state violence and control that endanger us all.”

“At the very least,” notes journalist Matthew Petti, “visits to Israel have helped American police justify more snooping on citizens and stricter secrecy. Critics also assert that Israeli training encourages excessive force.”

Petti documents how the NYPD set up a permanent liaison office in Israel in the wake of 9/11, eventually implementing “one of the first post-9/11 counterterrorism programs that explicitly followed the Israeli model. In 2002, the NYPD tasked a secret ‘Demographics Unit’ with spying on Muslim-American communities. Dedicated ‘mosque crawlers’ infiltrated local Muslim congregations and attempted to bait worshippers with talk of violent revolution.”

That was merely the start of American police forces being trained in martial law by foreign nations under the guise of national security theater. It has all been downhill from there.

As Alex Vitale, a sociology professor who has studied the rise of global policing, explains, “The focus of this training is on riot suppression, counterinsurgency, and counterterrorism—all of which are essentially irrelevant or should be irrelevant to the vast majority of police departments. They shouldn’t be suppressing protest, they shouldn’t be engaging in counterinsurgency, and almost none of them face any real threat from terrorism.”

This ongoing transformation of the American homeland into a techno-battlefield tracks unnervingly with the dystopian cinematic visions of Steven Spielberg’s Minority Report and Neill Blomkamp’s Elysium, both of which are set 30 years from now, in the year 2054.

In Minority Report, police agencies harvest intelligence from widespread surveillance, behavior prediction technologies, data mining, precognitive technology, and neighborhood and family snitch programs in order to capture would-be criminals before they can do any damage.

While Blomkamp’s Elysium acts as a vehicle to raise concerns about immigration, access to healthcare, worker’s rights, and socioeconomic stratification, what was most striking was its eerie depiction of how the government will employ technologies such as drones, tasers and biometric scanners to track, target and control the populace, especially dissidents.

With Israel in the driver’s seat and Minority Report and Elysium on the horizon, it’s not so far-fetched to imagine how the American police state will use these emerging technologies to lock down the populace, root out dissidents, and ostensibly establish an “open-air prison” with disconcerting similarities to Israel’s technological occupation of present-day Palestine.

For those who insist that such things are celluloid fantasies with no connection to the present, we offer the following as a warning of the totalitarian future at our doorsteps.

Facial Recognition

Fiction: One of the most jarring scenes in Elysium occurs towards the beginning of the film, when the protagonist Max Da Costa waits to board a bus on his way to work. While standing in line, Max is approached by two large robotic police officers, who quickly scan Max’s biometrics, cross-check his data against government files, and identify him as a former convict in need of close inspection. They demand to search his bag, a request which Max resists, insisting that there is nothing for them to see. The robotic cops respond by manhandling Max, throwing him to the ground, and breaking his arm with a police baton. After determining that Max poses no threat, they leave him on the ground and continue their patrol. Likewise, in Minority Report, police use holographic data screens, city-wide surveillance cameras, dimensional maps and database feeds to monitor the movements of its citizens and preemptively target suspects for interrogation and containment.

Fact: We now find ourselves in the unenviable position of being monitored, managed, corralled and controlled by technologies that answer to government and corporate rulers. This is exactly how Palestinian poet and New Yorker contributor Mosab Abu Toha found himself, within minutes of passing through an Israeli military checkpoint in Gaza with his wife and children in tow, asked to step out line, only to be blindfolded, handcuffed, interrogated, then imprisoned in an Israeli detention center for two days, beaten and further interrogated. Toha was finally released in what Israeli soldiers chalked up to a “mistake,” yet there was no mistaking the AI-powered facial recognition technology that was used to pull him out of line, identify him, and label him (erroneously) as a person of interest.

Drones

Fiction: In another Elysium scene, Max is hunted by four drones while attempting to elude the authorities. The drones, equipped with x-ray cameras, biometric readers, scanners and weapons, are able to scan whole neighborhoods, identify individuals from a distance—even through buildings, report their findings back to police handlers, pursue a suspect, and target them with tasers and an array of lethal weapons.

Fact: Drones, some deceptively small and yet powerful enough to capture the facial expressions of people hundreds of feet below them, have ushered in a new age of surveillance. Not even those indoors, in the privacy of their homes, will be safe from these aerial spies, which can be equipped with technology capable of peering through walls. In addition to their surveillance capabilities, drones can also be equipped with automatic weapons, grenade launchers, tear gas, and tasers.

Biometric scanners and national IDs

Fiction: Throughout Elysium, citizens are identified, sorted and dealt with by way of various scanning devices that read their biometrics—irises, DNA, etc.—as well as their national ID numbers, imprinted by a laser into their skin. In this way, citizens are tracked, counted, and classified. Likewise, in Minority Report, tiny sensory-guided spider robots converge on a suspected would-be criminal, scan his biometric data and feed it into a central government database. The end result is that there is nowhere to run and nowhere to hide to escape the government’s all-seeing eyes.

Fact: Given the vast troves of data that various world governments, including Israel and the U.S., is collecting on its citizens and non-citizens alike, we are not far from a future where there is nowhere to run and nowhere to hide. In fact, between the facial recognition technology being handed out to law enforcement, license plate readers being installed on police cruisers, local police creating DNA databases by extracting DNA from non-criminals, including the victims of crimes, and police collecting more and more biometric data such as iris scans, we are approaching the end of anonymity. It won’t be long before police officers will be able to pull up a full biography on any given person instantaneously, including their family and medical history, bank accounts, and personal peccadilloes. It’s already moving in that direction in more authoritarian regimes.

Predictive Policing

Fiction: In Minority Report, John Anderton, Chief of the Department of Pre-Crime, finds himself identified as the next would-be criminal and targeted for preemptive measures by the very technology that he relies on for his predictive policing. Consequently, Anderton finds himself not only attempting to prove his innocence but forced to take drastic measures in order to avoid capture in a surveillance state that uses biometric data and sophisticated computer networks to track its citizens.

Fact: Precrime, which aims to prevent crimes before they happen, has justified the use of widespread surveillance, behavior prediction technologies, data mining, precognitive technology, and snitch programs. As political science professor Anwar Mhajne documents, Israel has used all of these tools in its military engagements with Palestine: deploying AI surveillance and predictive policing systems in Palestinian territories; utilizing facial recognition technology to monitor and regulate the movement of Palestinians; subjecting Palestinians to facial recognition scans at checkpoints, with a color-coded mechanism to dictate who should be allowed to proceed, subjected to further questioning, or detained.

Making the Leap from Fiction to Reality

When Aldous Huxley wrote Brave New World in 1931, he was convinced that there was “still plenty of time” before his dystopian vision became a nightmare reality. It wasn’t long, however, before he realized that his prophecies were coming true far sooner than he had imagined.

Israel’s military influence on the United States, its advances in technological weaponry, and its rigid demand for compliance are pushing us towards a world in chains.

Through its oppressive use of surveillance technology, Israel has erected the world’s first open-air prison, and in the process, has made itself a model for the United States.

What we cannot afford to overlook, however, is the extent to which the American Police State is taking its cues from Israel.

As I make clear in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, we may not be an occupied territory, but that does not make the electronic concentration camp being erected around us any less of a prison.

The post What’s Next for Battlefield America? first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by John W. Whitehead and Nisha Whitehead.

]]>
https://www.radiofree.org/2024/06/05/whats-next-for-battlefield-america/feed/ 0 478066
Report: Pegasus spyware targets exiled journalists from Russia, Latvia, Belarus https://www.radiofree.org/2024/05/30/report-pegasus-spyware-targets-exiled-journalists-from-russia-latvia-belarus/ https://www.radiofree.org/2024/05/30/report-pegasus-spyware-targets-exiled-journalists-from-russia-latvia-belarus/#respond Thu, 30 May 2024 12:13:44 +0000 https://cpj.org/?p=391710 New York, May 30, 2024—The Committee to Protect Journalists is deeply troubled by a Thursday report by rights group Access Now and research organization Citizen Lab alleging that Pegasus spyware was used to surveil at least five journalists.

The report, “Exiled, then spied on: Civil society in Latvia, Lithuania, and Poland targeted with Pegasus spyware,” identified at least seven people whose devices were targeted between 2020 and 2023 by Pegasus, a form of zero-click spyware produced by the Israeli company NSO Group.

“Today’s report raises major concerns about the use of spyware against journalists and shows once again that the press is among the main targets of Pegasus spyware,” said Gulnoza Said, CPJ’s Europe and Central Asia program coordinator. “Journalists should not be spied on, and these new attacks mean that governments urgently need to implement an immediate moratorium on the development, sale, and use of spyware technologies.”

The targets included four named journalists and one Lithuania-based exiled Russian journalist whose device was targeted in June 2023 around an event in Riga, Latvia, and who requested to remain anonymous. The report describes the following attacks on the four named journalists:

  • Latvia-based exiled Russian journalist Maria Epifanova’s device was infected in August 2020, “the earliest known use of Pegasus to target Russian civil society,” the report said. Epifanova is the CEO of independent news outlet Novaya Gazeta Europe, which Russian authorities outlawed as “undesirable” in June 2023. The report said the infection occurred when Epifanova was chief editor of Novaya Gazeta Baltija — which covers Latvia, Lithuania, and Estonia — and “shortly after she received accreditation to attend exiled Belarusian democratic opposition leader Sviatlana Tsikhanouskaya’s first press conference in Vilnius,” the capital of Lithuania.  

“Regardless of who is behind this attack, invasion in private life is unacceptable. I am now working with a lawyer to decide on the next steps and will do my best to bring more light onto my own case and cases of my colleagues,” Epifanova told CPJ.

  • Latvia-based exiled Israeli-Russian journalist Evgeniy Erlich’s device was infected in late November 2022 while on vacation in Austria, the report said. Erlich, an independent producer, has worked with various media outlets, including broadcaster Current Time TV and Votvot, an on-demand Russian-language streaming platform. Both outlets are affiliated with the U.S. Congress-funded broadcaster Radio Free Europe/Radio Liberty (RFE/RL).

Erlich told CPJ that “we will most likely never know” who ordered the attacks.

  • Latvian journalist Evgeniy Pavlov’s device was targeted in November 2022 and April 2023. Pavlov, a former correspondent with Novaya Gazeta Baltija and a freelance journalist for Current Time TV’s “Baltija” program, told CPJ that he was in Latvia at both times. Access Now was unable to confirm if the attempts were successful.

“If the intelligence services of any country can interfere with the activities of journalists in this way, it poses a very great threat to free and safe journalism. And to free speech in general,” Pavlov told CPJ.

“My phone was illegally tapped in Belarus, where I was persecuted for political reasons, prosecuted, and imprisoned by the KGB [Belarusian national security service],” Radina told CPJ. “I know that…my absolutely legal journalistic activity can be of interest only to Belarusian and Russian special services, and I am only afraid of the possible cooperation in this matter of the present operators, whoever they are, with the KGB or the FSB [Russian Federal Security Service].”

In an email response to CPJ, the vice president of global communications for NSO group, Gil Lainer, maintained that the organization complies with all laws and regulations, emphasizing that it only sells to vetted intelligence and law enforcement agencies, and to allies of Israel and the United States. Lainer added that NSO group investigates all credible claims of misuse, adding that a number of investigations resulted in the suspension or termination of accounts.

A 2022 CPJ special report noted that the development of high-tech “zero-click” spyware like Pegasus — the kind that takes over a phone without a user’s knowledge or interaction — poses an existential crisis for journalism and the future of press freedom around the world. The report included CPJ’s recommendations to protect journalists and their sources from the abuse of the technology and called for an immediate moratorium on exporting this technology to countries with poor human rights records.

CPJ has also joined other rights groups in calling for immediate action to stop spyware threatening press freedom.

In September 2023, an investigation released by Access Now and Citizen Lab revealed that the phone of Galina Timchenko, the head of independent Russian-language news website Meduza, who has lived in Latvia since 2014, was infected by Pegasus while she was in Germany in February 2023.

The next day, Epifanova, Pavlov, and Erlich said Apple had notified them that their phone could have been targeted by hacker attacks.


This content originally appeared on Committee to Protect Journalists and was authored by Arlene Getz/CPJ Editorial Director.

]]>
https://www.radiofree.org/2024/05/30/report-pegasus-spyware-targets-exiled-journalists-from-russia-latvia-belarus/feed/ 0 477187
Thailand: How online violence and Pegasus spyware is used to silence women, girls and LGBTI people https://www.radiofree.org/2024/05/02/thailand-how-online-violence-and-pegasus-spyware-is-used-to-silence-women-girls-and-lgbti-people-2/ https://www.radiofree.org/2024/05/02/thailand-how-online-violence-and-pegasus-spyware-is-used-to-silence-women-girls-and-lgbti-people-2/#respond Thu, 02 May 2024 13:38:37 +0000 http://www.radiofree.org/?guid=b4b62714ada03d2fc9db2182c184eacc
This content originally appeared on Amnesty International and was authored by Amnesty International.

]]>
https://www.radiofree.org/2024/05/02/thailand-how-online-violence-and-pegasus-spyware-is-used-to-silence-women-girls-and-lgbti-people-2/feed/ 0 472852
Thailand: How online violence and Pegasus spyware is used to silence women, girls and LGBTI people https://www.radiofree.org/2024/05/01/thailand-how-online-violence-and-pegasus-spyware-is-used-to-silence-women-girls-and-lgbti-people/ https://www.radiofree.org/2024/05/01/thailand-how-online-violence-and-pegasus-spyware-is-used-to-silence-women-girls-and-lgbti-people/#respond Wed, 01 May 2024 11:30:01 +0000 http://www.radiofree.org/?guid=69503f9e36d855e693e18d1735d2e455
This content originally appeared on Amnesty International and was authored by Amnesty International.

]]>
https://www.radiofree.org/2024/05/01/thailand-how-online-violence-and-pegasus-spyware-is-used-to-silence-women-girls-and-lgbti-people/feed/ 0 472489
CPJ calls for an investigation into the targeting of journalists with Pegasus spyware in Jordan https://www.radiofree.org/2024/02/01/cpj-calls-for-an-investigation-into-the-targeting-of-journalists-with-pegasus-spyware-in-jordan/ https://www.radiofree.org/2024/02/01/cpj-calls-for-an-investigation-into-the-targeting-of-journalists-with-pegasus-spyware-in-jordan/#respond Thu, 01 Feb 2024 17:14:16 +0000 https://cpj.org/?p=352034 Beirut, February 1, 2024 – The Committee to Protect Journalists is highly alarmed by the targeting of journalists with Pegasus spyware in Jordan and repeats its calls for an immediate moratorium on the sale, transfer, and use of such surveillance technologies, as well as a ban on spyware and its vendors that facilitate human rights abuses, and urges Jordanian authorities to investigate its use in the country. 

Between 2020 and 2023, at least 16 journalists and media workers in Jordan were targeted by Pegasus spyware, along with 19 other individuals, including activists, lawyers, and civil society members, according to a new joint investigation published on Thursday by rights group Access Now, University of Toronto-based research group Citizen Lab, and other partners. Four of the journalists named in the report, Hosam Gharaibeh, Rana Sabbagh, Lara Dihmis, and Daoud Kuttab, told CPJ in interviews that they believe they were targeted due to their journalistic work. The report does not name the source of the attacks.

Access Now’s report does not name the other 12 journalists and media workers, and CPJ was unable to immediately identify them. Previously, in 2022, CPJ called for an investigation into the use of Pegasus spyware on two Jordanian journalists, including Suhair Jaradat.

“The new revelations that journalists and media workers in Jordan have been targeted with Pegasus spyware underscores the need for an immediate moratorium on the use and sale of this technology, and a ban on vendors facilitating abuses,” said Sherif Mansour, CPJ’s Middle East and North Africa program coordinator, in Washington, D.C. “Journalists are not legitimate surveillance targets, and those responsible for these attacks should be held accountable.”

According to the report, phones belonging to Sabbagh and Dihmis, who cover the Middle East and North Africa as a senior editor and an investigative reporter, respectively, at the Organized Crime and Corruption Reporting Project (OCCRP), were targeted with Pegasus spyware.

“What bothered me most was the impact of the surveillance on my sources, and friends, and relatives,” said Sabbagh, who is also the co-founder of Arab Reporters for Investigative Journalism. “Because of the nature of OCCRP’s work, it is a principal target for surveillance agencies. They wish to keep crime and criminality hidden. We work to expose it. And with this type of work comes a very high price.”

Dihimis called the revelation “quite the violation,” adding that “as a journalist, it was a reminder of the importance of being cautious in terms of secure communication — to protect yourself but also your sources and colleagues. As a person, it spurred a lot of paranoia,” she added.

Kuttab, a Palestinian-American journalist based in Jordan and a 1996 recipient of CPJ’s International Press Freedom Award, was targeted by Pegasus spyware multiple times, according to the report.

On March 8, 2022, two weeks after the first incident, Kuttab was arrested when he arrived at Queen Alia International Airport outside of Jordan’s capital, Amman. He was detained under the Cybercrime Law for an article written in 2019 and was released a few hours later on bail, the report said.

The report detailed seven other attempts to infect Kuttabʼs mobile device with Pegasus, including a 2023 attempt in which the attacker impersonated a journalist from media outlet The Cradle asking questions about Jordanʼs cybercrime law while sending malicious links.

“I will not be intimidated, and I will not censor myself,” Kuttab told CPJ. “It is highly irritating to be spied on, but that also comes with the job nowadays. Whatever I know, I publish, but my only concern is my sources and their protection.”

Gharaibeh, director of Jordan’s Radio Husna, and the host of its morning talking show, was targeted successfully multiple times and there were also several failed attempts to infiltrate his phone, the report said.

When asked by CPJ about the apparent reason behind the recurrent attacks, Gharaibeh said that “it could be anything from monitoring the journalists and their sources to exploiting the journalists and silencing them.”

According to Access Now, the victims in the report were targeted using Pegasus with both zero-click attacks, in which spyware takes over a phone without the user’s knowledge, and attacks in which a user has to click a link. 

CPJ has documented the use of Pegasus to target journalists around the world in order to monitor their phones’ cameras, microphones, emails, texts, and calls. Journalists have been targeted with the software in Jordan, Morocco, the United Arab Emirates, and Saudi Arabia, among other countries.

CPJ emailed NSO Group for comment, but received no response. NSO Group says it only licenses its Pegasus spyware to government agencies investigating crime and terrorism.

CPJ offers guidance for journalists and newsrooms on spyware targeting and general digital safety.


This content originally appeared on Committee to Protect Journalists and was authored by Committee to Protect Journalists.

]]>
https://www.radiofree.org/2024/02/01/cpj-calls-for-an-investigation-into-the-targeting-of-journalists-with-pegasus-spyware-in-jordan/feed/ 0 456396
Pegasus spyware used to target Togolese journalists Loïc Lawson and Anani Sossou https://www.radiofree.org/2024/01/23/pegasus-spyware-used-to-target-togolese-journalists-loic-lawson-and-anani-sossou-2/ https://www.radiofree.org/2024/01/23/pegasus-spyware-used-to-target-togolese-journalists-loic-lawson-and-anani-sossou-2/#respond Tue, 23 Jan 2024 18:44:42 +0000 https://cpj.org/?p=349255 New York, January 23, 2024—The Committee to Protect Journalists is alarmed by findings that the phones of Togolese journalists Loïc Lawson and Anani Sossou were infected with Pegasus spyware in 2021, and repeats its calls for an immediate moratorium on the use of such surveillance technologies and for legal proceedings against the journalists to be dropped.

On Tuesday, press freedom group Reporters Without Borders published findings that phones belonging to Lawson and Sossou had been infected with Pegasus. Those findings were independently confirmed by Amnesty International, the report said.

Pegasus spyware, produced by the Israeli company NSO Group, can take over a phone without a user’s knowledge or interaction. CPJ has documented how this zero-click spyware poses an existential crisis for journalism and press freedom around the world.

Lawson is the publisher of the newspaper Flambeau des Démocrates, and Sossou is a freelancer who has reported for various outlets, including as a correspondent for the Belgian investigative website L-Post and a commentator for the Togolese satellite broadcaster New World TV. He also publishes commentary on Facebook. Both journalists currently face criminal prosecution for their work and told CPJ they were surprised to learn they had been targeted.

“The targeting of journalists Loïc Lawson and Anani Sossou with Pegasus spyware makes even more real the fear of surveillance felt by many journalists in Togo, the existential threat that spyware poses to press freedom, and the imperative for an immediate moratorium on the use and sale of this technology,” said Angela Quintal, CPJ’s Africa program coordinator. “Lawson and Sossou currently face criminal prosecution for their reporting and now have to grapple with the fact that they were targeted with some of the world’s most aggressive spyware. They should have never had to deal with either of these threats.”

In mid-November 2023, Togolese authorities arrested and charged Lawson and Sossou with disseminating false news and attacking the honor of a minister, before granting them provisional release on December 1. Sossou was also charged with inciting a revolt. Their arrest and prosecution relate to a complaint by Togo’s Minister of Urban Planning and Land Reform, Kodjo Sévon-Tépé Adédzé, over posts by the journalists on social media—which have since been deleted—about the alleged theft of a large sum of money from Adédzé’s home.

Lawson and Sossou appeared in court on January 3 and January 17, when their case was transferred to the court of appeal in Lomé, the capital, according to media reports. The next hearing date has not been set.

In 2021, the phone numbers of at least three other Togolese journalistsFerdinand Ayité, Luc Abaki, and Komlanvi Ketohou, who goes by Carlos—appeared on the Pegasus Project list of phone numbers allegedly selected for surveillance with Pegasus spyware, but the use of the spyware on those journalists’ phones was not confirmed. Ketohou told CPJ that the thought of his private activities in the hands of strangers was “torture,” and Ayité described the looming threat of surveillance as a “permanent fear.”

Citizen Lab, a University of Toronto-based research group, previously found other Togolese civil society members, including clergy, had been targeted with Pegasus in 2019. An unnamed Togolese activist was also targeted with a different spyware in late 2019 and early 2020, according to Amnesty International.

NSO Group, which produces and sells Pegasus spyware, previously told CPJ that it licenses Pegasus to investigate serious crime and terrorism. The company has said it investigates “all credible claims of misuse and take[s] appropriate action,” including shutting down a customer’s access.

CPJ’s calls to Yawa Kouigan, Togo’s minister of communication and media, as well as a spokesperson for the government, rang unanswered.

CPJ offers guidance for journalists and newsrooms on spyware targeting and general digital safety.


This content originally appeared on Committee to Protect Journalists and was authored by Committee to Protect Journalists.

]]>
https://www.radiofree.org/2024/01/23/pegasus-spyware-used-to-target-togolese-journalists-loic-lawson-and-anani-sossou-2/feed/ 0 454345
Pegasus spyware used to target Togolese journalists Loïc Lawson and Anani Sossou https://www.radiofree.org/2024/01/23/pegasus-spyware-used-to-target-togolese-journalists-loic-lawson-and-anani-sossou/ https://www.radiofree.org/2024/01/23/pegasus-spyware-used-to-target-togolese-journalists-loic-lawson-and-anani-sossou/#respond Tue, 23 Jan 2024 18:44:42 +0000 https://cpj.org/?p=349255 New York, January 23, 2024—The Committee to Protect Journalists is alarmed by findings that the phones of Togolese journalists Loïc Lawson and Anani Sossou were infected with Pegasus spyware in 2021, and repeats its calls for an immediate moratorium on the use of such surveillance technologies and for legal proceedings against the journalists to be dropped.

On Tuesday, press freedom group Reporters Without Borders published findings that phones belonging to Lawson and Sossou had been infected with Pegasus. Those findings were independently confirmed by Amnesty International, the report said.

Pegasus spyware, produced by the Israeli company NSO Group, can take over a phone without a user’s knowledge or interaction. CPJ has documented how this zero-click spyware poses an existential crisis for journalism and press freedom around the world.

Lawson is the publisher of the newspaper Flambeau des Démocrates, and Sossou is a freelancer who has reported for various outlets, including as a correspondent for the Belgian investigative website L-Post and a commentator for the Togolese satellite broadcaster New World TV. He also publishes commentary on Facebook. Both journalists currently face criminal prosecution for their work and told CPJ they were surprised to learn they had been targeted.

“The targeting of journalists Loïc Lawson and Anani Sossou with Pegasus spyware makes even more real the fear of surveillance felt by many journalists in Togo, the existential threat that spyware poses to press freedom, and the imperative for an immediate moratorium on the use and sale of this technology,” said Angela Quintal, CPJ’s Africa program coordinator. “Lawson and Sossou currently face criminal prosecution for their reporting and now have to grapple with the fact that they were targeted with some of the world’s most aggressive spyware. They should have never had to deal with either of these threats.”

In mid-November 2023, Togolese authorities arrested and charged Lawson and Sossou with disseminating false news and attacking the honor of a minister, before granting them provisional release on December 1. Sossou was also charged with inciting a revolt. Their arrest and prosecution relate to a complaint by Togo’s Minister of Urban Planning and Land Reform, Kodjo Sévon-Tépé Adédzé, over posts by the journalists on social media—which have since been deleted—about the alleged theft of a large sum of money from Adédzé’s home.

Lawson and Sossou appeared in court on January 3 and January 17, when their case was transferred to the court of appeal in Lomé, the capital, according to media reports. The next hearing date has not been set.

In 2021, the phone numbers of at least three other Togolese journalistsFerdinand Ayité, Luc Abaki, and Komlanvi Ketohou, who goes by Carlos—appeared on the Pegasus Project list of phone numbers allegedly selected for surveillance with Pegasus spyware, but the use of the spyware on those journalists’ phones was not confirmed. Ketohou told CPJ that the thought of his private activities in the hands of strangers was “torture,” and Ayité described the looming threat of surveillance as a “permanent fear.”

Citizen Lab, a University of Toronto-based research group, previously found other Togolese civil society members, including clergy, had been targeted with Pegasus in 2019. An unnamed Togolese activist was also targeted with a different spyware in late 2019 and early 2020, according to Amnesty International.

NSO Group, which produces and sells Pegasus spyware, previously told CPJ that it licenses Pegasus to investigate serious crime and terrorism. The company has said it investigates “all credible claims of misuse and take[s] appropriate action,” including shutting down a customer’s access.

CPJ’s calls to Yawa Kouigan, Togo’s minister of communication and media, as well as a spokesperson for the government, rang unanswered.

CPJ offers guidance for journalists and newsrooms on spyware targeting and general digital safety.


This content originally appeared on Committee to Protect Journalists and was authored by Committee to Protect Journalists.

]]>
https://www.radiofree.org/2024/01/23/pegasus-spyware-used-to-target-togolese-journalists-loic-lawson-and-anani-sossou/feed/ 0 454344
In Video From Gaza, Former CEO of Pegasus Spyware Firm Announces Millions for New Venture https://www.radiofree.org/2024/01/18/in-video-from-gaza-former-ceo-of-pegasus-spyware-firm-announces-millions-for-new-venture/ https://www.radiofree.org/2024/01/18/in-video-from-gaza-former-ceo-of-pegasus-spyware-firm-announces-millions-for-new-venture/#respond Thu, 18 Jan 2024 21:48:28 +0000 https://theintercept.com/?p=457770

It was an unusual place for a tech company to announce a successful $33 million round of venture capital fundraising. But, on November 7, former NSO Group CEO Shalev Hulio and two colleagues stood in the Gaza Strip, stared into a laptop’s built-in webcam, and did exactly that.

“We are here on the Gaza border,” said Hulio, the Israeli entrepreneur, on a little-noted YouTube video released by his new start-up, Dream Security. Hulio, a reservist who had been called up for duty, appeared in the video with a gun slung over his shoulder.

“It’s very emotional,” he said. “After all of us being here, some of us reserves, some of us helping the government in many other ways, I think that doing it here is a great message to the high-tech community and the people of Israel.”

Hulio, who stepped down from his role at NSO in August 2022, was sending a clear signal: He was back.

After a rocky few years, marred by revelations about the role of NSO’s spyware in human rights abuses and the company’s blacklisting by the U.S. government, Hulio and his team were using the moment — timed exactly one month after Hamas’s attack — to announce lofty ambitions for their new cybersecurity firm, Dream Security.

“Israeli high-tech is not only here to stay, but will grow better out of this,” said Michael Eisenberg, an Israeli American venture capitalist and Dream co-founder, in the promo video. “It’s going to deliver on time, wherever it’s needed, to whatever country or whatever company it’s needed at.”

Their new project is another cybersecurity company. Instead of phone hacking, though, Dream — an acronym for “Detect, Respond, and Management” — offers cyber protection for so-called critical infrastructure, such as energy installations.

Dream Security builds on the successful team NSO put together, with talent brought on board from the embattled spyware firm. At least a dozen of NSO’s top officials and staffers, along with an early investor in both NSO and Dream, followed Hulio to Dream since its founding last year.

Lawyers for Dream Security who responded to The Intercept’s request for comment said the companies were distinct entities. “The only connection between the two entities is Mr. Hulio and a small portion of talented employees who previously worked at NSO Group,” said Thomas Clare, a lawyer for Dream, in a letter. Liron Bruck, a spokesperson for NSO Group, told The Intercept, “The two companies are not involved in any way.”

“It’s worrying. It seems like a new way to whitewash NSO’s image and past record.”

Now, with so many NSO people gathered under a new banner, critics are concerned that their old firm’s scandals will be forgotten.

“It’s worrying,” said Natalia Krapiva, tech-legal counsel at Access Now, a digital rights advocacy group. “It seems like a new way to whitewash NSO’s image and past record.”

At the same time, NSO Group is also using Israel’s war effort to try and revamp its own reputation. After Pegasus, NSO’s phone hacking software, was exposed for its role in human rights abuses and the firm was blacklisted in the U.S., the company suffered years of financial troubles. In the new year, it seemed to be bouncing back, with Israeli media reporting on its expansion and reorganization.

Clare, Dream’s lawyer, stressed that Hulio was no longer affiliated with NSO. “Currently, Mr. Hulio holds no interest in NSO Group—not as an officer, employee, or stockholder,” Clare wrote to The Intercept. “Since Dream Security’s foundation in late 2022, he has exclusively led the company.”

With Hulio at its helm, Dream boasts an eclectic and influential leadership team with connections to various far-right figures in Israel, Europe, and the U.S. — and an ambitious plan to leverage their ties to dominate the cybersecurity sector.

SAPIR, ISRAEL - NOVEMBER 11:  A view of the entrance of the Israeli cyber company NSO Group branch in the Arava Desert on November 11, 2021 in Sapir, Israel. The company, which makes the spyware Pegasus, is being sued in the United States by WhatsApp, which alleges that NSO Group's spyware was used to hack 1,400 users of the popular messaging app. An US appeals court ruled this week that NSO Group is not protected under sovereign immunity laws.  (Photo by Amir Levy/Getty Images)

A view of the entrance of the Israeli cyber company NSO Group branch in the Arava Desert on Nov. 11, 2021, in Sapir, Israel.

Photo: Amir Levy/Getty Images

New Mission, Same Executives

Hulio has said that, with Dream, he moved from the “attack side to defense” — focusing on defending infrastructure, including gas and oil installations. A jargon-laden blurb for the company brags that it delivers surveillance to detect threats and an unspecified “power to respond fast.”

“Dream Security’s product is a defensive cybersecurity solution to protect critical infrastructure and state-level assets,” Clare said. “Dream Security is not involved in the creation, marketing, or sale of any spyware or other malware product.”

Clare said that Dream’s mission is “to enable decision-makers to act promptly and efficiently against any actual and potential cyber threats, such as malware attacks committed by states, terrorist organizations, and hacker groups, among others.”

Kathryn Humphrey, another Dream lawyer and an associate at Clare’s firm, said in one of a series of emails, “Dream Security is not involved with offensive cyber, nor does it have an intention of becoming involved with offensive cyber. Dream Security is developing the world’s best AI-based defensive cyber security platform, and that is its only mission.”

The Intercept found that 13 former NSO staffers now work at Dream Security — about a fifth of the new company.

The mission may be new, but Dream is staffed in part by NSO veterans. A recent report from the Israeli business press said Dream has 70 employees, 60 of them in Israel. The Intercept found that 13 former NSO staffers now work at Dream Security — about a fifth of the new company.

“Dream Security recruited the best talent to achieve its goal of becoming the globally leading AI-based cyber security company,” said Humphrey in a letter to The Intercept. “A small minority is top talent from NSO Group, including executives and other employees.”

In addition to Hulio himself, former top NSO officials permeate the upper echelons of Dream. From the heads of sales to human resources to their legal departments, at least seven former executives from NSO now hold positions at Dream in the same jobs. Five additional Dream employees — from security researchers to software engineers and marketing designers — formerly worked at NSO.

Dream’s lawyers told The Intercept that the “only overlap” between the companies were Hulio and former NSO employees, but other people tie NSO history and Dream’s present together. In one case, it was familial: Gil Dolev, one of Dream’s founders, is the brother of Shiri Dolev, who, according to NSO spokesperson Bruck, was NSO Group’s president until last year. (Shiri Dolev did not respond to a request for comment.)

The two companies also share at least one investor. Eddy Shalev, the first investor in NSO, told The Intercept he had put money into Dream. “I was an early investor in NSO,” Shalev said. “I am no longer involved with NSO. I did invest in Dream Security.”

Asked about Shalev’s investments in Dream and NSO, Humphrey said, “While Eddy Shalev is a valued investor, he is not a major investor—his investment is roughly 1% of the overall amount invested in Dream Security.”

Former Austrian Chancellor Sebastian Kurz, left, accompanied by his lawyer Walter Suppan, right, arrives at court on the first day of his trial in Vienna, Austria, Wednesday, Oct. 18, 2023. Kurz is charged with making false statements to a parliamentary inquiry into alleged corruption in his first government. (AP Photo/Heinz-Peter Bader)

Former Austrian Chancellor Sebastian Kurz arrives at court on the first day of his trial in Vienna on Oct. 18, 2023. Kurz is charged with making false statements to a parliamentary inquiry into alleged corruption in his first government.

Photo: Heinz-Peter Bader/AP

Austria’s Mini-Trump

From its inception, Dream Security’s strategy was based around an in-house connection to the international right. Former Austrian Chancellor Sebastian Kurz, dubbed “Austria’s mini-Trump,” is a Dream co-founder.

The former chancellor was forced to step down from the Austrian government in October 2021, facing corruption allegations and he remains on trial for related charges. 

Along the way, Kurz had made powerful friends. He reportedly has relationships with top officials around Europe and the U.S., including right-wing Hungarian Prime Minister Victor Orbán, and Jared Kushner, former President Donald Trump’s son-in-law and former top adviser. Last year, Kurz joined Kushner on the honorary advisory council to the Abraham Accords Peace Institute, a group set up to foster normalization between Israel and Gulf monarchies like the United Arab Emirates — the very authoritarians that used NSO’s Pegasus software to crack down on dissidents.

For all his connections to powerful politicians, experts said Kurz was never purely an ideologue. “Kurz is really a political professional,” said Laurenz Ennser-Jedenastik, a professor of Austrian politics at the University of Vienna. “He never struck anybody as extremely convicted of anything. I think his personal career and business were always the number one priority.”

“Kurz is really a political professional. … I think his personal career and business were always the number one priority.”

Once Kurz was out of government, he pivoted to the world of tech investment. He first met the cyber-spying titan Peter Thiel in 2017 and landed a job at one of the far-right billionaire’s firms, Thiel Capital, in 2021. Thiel, one of the largest donors to right-wing causes in the U.S., is deeply involved in the world of spy tech: His company Palantir, which allows for the sorting and exploitation of masses of data, helped empower and expand the U.S. government’s international spy machine.

When Dream’s creation was announced, Kurz’s connections to Thiel — and therefore Palantir — raised alarms. In the European Parliament, lawmakers in the Committee of Inquiry to investigate the use of Pegasus and equivalent surveillance spyware took note.

“The cooperation between Kurz and Hulio constitutes an indirect but alarming connection between the spyware industry and Peter Thiel and his firm Palantir,” said a committee report earlier this year. (Thiel is not involved with NSO or Dream, a person familiar with his business told The Intercept.)

In November, nearly 80 percent of the European Parliament voted to condemn the European Commission for not doing enough to tackle spyware abuse, including NSO’s Pegasus software, across member states.

Questions have cropped up about whether Dream will, like NSO before it, sell powerful cybersecurity tools to authoritarian governments who might use them for nefarious purposes.

Asked by the Israeli business publication Globes about where Dream would sell its wares, Kurz said, “This is a company that was founded in Israel and is currently looking to the European market.”

According to Globes, Kurz was brought on to open doors to European governments. Dream has said that its customers already include the cybersecurity authority of one major European country, though it has declined to say which.

Over time, Europe has become a strong market for commercial cybersecurity firms. Sophie in ’t Veld, a European parliamentarian from the Netherlands who led the charge on the Pegasus committee resolution, told The Intercept, “Europe is paradise for this kind of business.”

The Israeli Right

Dream’s right-wing network is nowhere more concentrated than in Israel itself. Venture capitalist Dovi Frances, a major Republican donor who led Dream’s recent $33 million fundraising round, is close to Israeli Prime Minister Benjamin Netanyahu. And Lior Atar, head of cyber security at the Israeli Ministry of Energy for six years, was directly plucked from his government role to join Dream earlier this year.

Dream officials’ entanglement with the Israeli right also extends to grassroots right-wing movements. Two investors and Hulio are involved in a ground-level organization considered to be Israel’s largest militia, HaShomer HaChadash, or “the new guardians.” A Zionist education nonprofit established in 2007, HaShomer HaChadash says it safeguards Israel’s agricultural lands, largely along the Gaza border. 

“I look forward to building Dream, against all odds, to become the world’s largest cybersecurity company. Mark my word: It fucking will be.”

Eisenberg, the Dream co-founder, chairs HaShomer HaChadash’s board. Hulio became a HaShomer HaChadash board member in May 2017 — a month before NSO Group was put up for sale for $1 billion — and has donated nearly $100,000 to the group. (Neither Dream nor HaShomer HaChadash responded to questions about whether Hulio remains on the board.) Another Dream investor, Noam Lanir, has also been vocal about his own contributions to the organization, according to Haaretz.

HaShomer HaChadash has a budget of approximately $33 million in 2022, of which over $5 million came from the government, according to documents filed with the Israeli Corporations Authority. The group is staffed in part by volunteers as well as active-duty personnel detailed from the Israeli military.

“They seem like a mainstream organization,” said Ran Cohen, chair of the Democratic Bloc, which monitors anti-democratic incitement in Israel. “But in reality, the origins of their agenda is rooted in the right wing. They have also been active in illegal outposts in the West Bank.”

For Dream, HaShomer HaChadash is but one node of its prolific links to the right at home and abroad. With those connections and the business chops that brought the world NSO Group, Dream — as the name itself suggests — has large ambitions. “I look forward to building Dream, against all odds, to become the world’s largest cybersecurity company,” Frances, the VC, said from the U.S. in the YouTube video announcing the successful fundraising drive. “Mark my word: It fucking will be.”

Join The Conversation


This content originally appeared on The Intercept and was authored by Georgia Gee.

]]>
https://www.radiofree.org/2024/01/18/in-video-from-gaza-former-ceo-of-pegasus-spyware-firm-announces-millions-for-new-venture/feed/ 0 453206
Azerbaijani anti-corruption journalists Ulvi Hasanli and Sevinj Vagifgizi detained for 4 months https://www.radiofree.org/2023/11/21/azerbaijani-anti-corruption-journalists-ulvi-hasanli-and-sevinj-vagifgizi-detained-for-4-months/ https://www.radiofree.org/2023/11/21/azerbaijani-anti-corruption-journalists-ulvi-hasanli-and-sevinj-vagifgizi-detained-for-4-months/#respond Tue, 21 Nov 2023 22:41:15 +0000 https://cpj.org/?p=336744 Stockholm, November 21, 2023—The Committee to Protect Journalists calls on Azerbaijani authorities to release Abzas Media director Ulvi Hasanli and chief editor Sevinj Vagifgizi and to disclose the whereabouts of Hasanli’s assistant, Mahammad Kekalov, who has been missing since Monday. 

A district court in the capital of Baku on Tuesday ordered that Hasanli and Vagifgizi remain in custody for four months on charges of conspiring to bring money into the country unlawfully, Abzas Media reported. If found guilty, they face up to eight years in prison under Article 206.3.2 of Azerbaijan’s criminal code.

Individuals in plainclothes who did not identify themselves took Kekalov from his home in Baku on Monday along with his laptop and cell phone, according to news reports and a source familiar with the case who spoke to CPJ on condition of anonymity, citing fear of reprisal. As of Tuesday evening, Kekalov’s whereabouts remained unknown.

“The remand terms handed to Ulvi Hasanli and Sevinj Vagifgizi only serve to underline authorities’ real goal, which is to silence Abzas Media’s bold anti-corruption reporting,” said CPJ Advocacy and Communications Director Gypsy Guillén Kaiser, in New York. “Azerbaijani authorities should release Vagifgizi and Hasanli immediately, provide information on Mahammad Kekalov’s whereabouts, and allow Abzas Media to continue its vital public interest reporting.”

Police arrested Hasanli on Monday, November 20, raided his apartment, and searched the Baku office of independent investigative website Abzas Media, where they said they found 40,000 Euros (US$43,770). Officers took a computer, cell phone, iWatch, and hard disk from the apartment and confiscated a microphone and hard disk from the office, Zibeyda Sadygova, the journalist’s lawyer, told CPJ.

Police arrested Vagifgizi at Baku airport at 1:30 a.m. on Tuesday as she returned from a work trip abroad and searched her home.

Hasanli and Vagifgizi have denied the charges, calling them retaliation for Abzas Media’s investigations into alleged corruption by relatives of Azerbaijan President Ilham Aliyev and state officials. Hasanli said he believes police planted the money in order to fabricate a case, according to a video posted by Abzas Media.

Abzas Media is one of a handful of independent outlets that remain in the country following a series of raids, arrests, and criminal investigations against independent media and press freedom groups since 2014.

In 2021, Vagifgizi was one of several Azerbaijani journalists whose phones were found to be compromised by Pegasus, spyware produced by the Israeli company NSO Group. Hasanli’s name was also on a leaked list of individuals targeted with Pegasus, according to the global investigative network Organized Crime and Corruption Reporting Project.

CPJ’s emails to the Baku Police Department and the Ministry of Internal Affairs did not receive any replies.


This content originally appeared on Committee to Protect Journalists and was authored by Committee to Protect Journalists.

]]>
https://www.radiofree.org/2023/11/21/azerbaijani-anti-corruption-journalists-ulvi-hasanli-and-sevinj-vagifgizi-detained-for-4-months/feed/ 0 440700
Morocco expels French journalists Quentin Müller and Thérèse Di Campo https://www.radiofree.org/2023/09/29/morocco-expels-french-journalists-quentin-muller-and-therese-di-campo/ https://www.radiofree.org/2023/09/29/morocco-expels-french-journalists-quentin-muller-and-therese-di-campo/#respond Fri, 29 Sep 2023 17:12:17 +0000 https://cpj.org/?p=318347 Around 3 a.m. on September 20, about 10 plainclothes police officers arrested French journalists Quentin Müller and Thérèse Di Campo in their hotel in Morocco’s largest city, Casablanca, and expelled them for their reporting on the rule of King Mohamed VI – a topic considered taboo in the country.

Müller, a staff reporter with the weekly French magazine Marianne, and Di Campo, a freelance photojournalist, had arrived in Morocco on September 15, a week after an earthquake killed at least 3,000 people. Moroccan authorities have been widely criticized for their slow response to the disaster.

Marianne said in a statement that the expulsion of the two journalists was politically motivated, and in response to the magazine’s February 16 issue on worsening tensions between France and Morocco.

Morocco recalled its ambassador to France in February, without sending a replacement, and Moroccan authorities denied media reports in 2021 that its intelligence service had a list of potential Pegasus surveillance spyware targets that included French President Emmanuel Macron.

Morocco’s government spokesperson, Mustapha Baitas, said in a September 21 press briefing that the journalists were expelled because they did not seek media accreditation.

CPJ’s emails to Morocco’s Ministry of Interior for comment did not receive any response. 

Three journalists were imprisoned in Morocco on December 1, 2022, when CPJ conducted its most recent annual prison census.


This content originally appeared on Committee to Protect Journalists and was authored by Committee to Protect Journalists.

]]>
https://www.radiofree.org/2023/09/29/morocco-expels-french-journalists-quentin-muller-and-therese-di-campo/feed/ 0 430856
Apple warns Latvia-based journalists about possible hacker attacks https://www.radiofree.org/2023/09/15/apple-warns-latvia-based-journalists-about-possible-hacker-attacks/ https://www.radiofree.org/2023/09/15/apple-warns-latvia-based-journalists-about-possible-hacker-attacks/#respond Fri, 15 Sep 2023 14:19:43 +0000 https://cpj.org/?p=315784 New York, September 15, 2023—The Committee to Protect Journalists on Friday issued an urgent call for authorities to investigate allegations that journalists working in Latvia were targeted by state-sponsored hackers.

CPJ’s call follows reports on Thursday—a day after the disclosure that the phone of exiled Russian journalist Galina Timchenko had been infected by Pegasus spyware—that three Latvia-based journalists said Apple had notified them that their phone could have been targeted by hacker attacks.

The three were named as Latvian journalist Evgeniy Pavlov and exiled Russian journalists Evgeniy Erlich and Maria Epifanova.

“The growing reports of possible hacker attacks against at least three independent journalists based in Latvia are all the more worrying given the recent revelation that exiled Russian journalist Galina Timchenko’s phone was infected with Pegasus spyware,” said Gulnoza Said, CPJ’s Europe and Central Asia program coordinator. “Latvian authorities must conduct a swift and transparent investigation into these allegations and ensure the digital and physical safety of journalists who are temporarily or permanently residing in their countries.”

On Wednesday, September 13, an investigation released by rights group Access Now and research organization Citizen Lab revealed that the phone of Timchenko, the head of independent Russian-language news website Meduza, who has lived in Latvia since 2014, was infected by Pegasus, a form of zero-click spyware produced by the Israeli company NSO Group, while she was in Germany in February. 

Apple had warned Timchenko in June that her device may have been targeted with state-sponsored spyware. The Access Now/Citizen Lab investigation reported that the attack could have come from Russia, one of its allies, or a European Union state.

Apple sent email and text alerts to Erlich’s iPhone while he was in Poland, traveling by car from Latvia to Germany on August 29, warning that “state-sponsored attackers” might be targeting his device, the journalist told CPJ via messaging app.

Erlich is the former chief editor of a regional program for Current Time TV, and an independent producer with Votvot, an on-demand Russian language streaming platform, who moved to Latvia in 2014. Current Time TV and Votvot are affiliated with the U.S. Congress-funded broadcaster Radio Free Europe/Radio Liberty (RFE/RL).

On August 29, Apple warned Epifanova, who moved to Latvia in 2016, that her iPhone may have been hacked by “state-sponsored hackers.” On September 3, the Telegram channel warned her that someone had logged into her account from a device in Egypt, Novaya Gazeta Europe reported.

Epifanova is the CEO of independent news outlet Novaya Gazeta Europe and publisher of Novaya Gazeta project Novaya Gazeta Baltija, which covers Latvia, Lithuania, and Estonia.

Novaya Gazeta Europe is a Latvia-based newspaper launched in April 2022 by journalists who previously worked at the independent Russian newspaper Novaya Gazeta. Russian authorities designated Novaya Gazeta Europe as an “undesirable” organization in June, banning the outlet from operating on Russian territory.

Also, on August 29, Apple emailed Latvian journalist Evgeniy Pavlov that his phone might have been hacked by “state-sponsored hackers.” 

Pavlov is a correspondent with Novaya Gazeta Baltija and reports for Current Time TV and the Russian-language Latvia-based web portal rus.nra.lv.

Epifanova and Pavlov were in Latvia when they received the warnings; they turned to Access Now on Thursday to have their devices checked for spyware infection, Ekaterina Glikman, deputy editor of Novaya Gazeta Europe, told CPJ via a messaging app. 

CPJ’s emails to the Latvian State Security Service and the German Federal Ministry of the Interior received no responses.


This content originally appeared on Committee to Protect Journalists and was authored by Committee to Protect Journalists.

]]>
https://www.radiofree.org/2023/09/15/apple-warns-latvia-based-journalists-about-possible-hacker-attacks/feed/ 0 427495
Investigation finds Russian journalist Galina Timchenko targeted by Pegasus spyware https://www.radiofree.org/2023/09/13/investigation-finds-russian-journalist-galina-timchenko-targeted-by-pegasus-spyware/ https://www.radiofree.org/2023/09/13/investigation-finds-russian-journalist-galina-timchenko-targeted-by-pegasus-spyware/#respond Wed, 13 Sep 2023 16:02:39 +0000 https://cpj.org/?p=314840 New York, September 13, 2023—The Committee to Protect Journalists said that it is deeply disturbed by the findings of an investigation released Wednesday by rights organizations that the phone of Galina Timchenko, head of the independent Russian news website Meduza, was infected by Pegasus surveillance spyware while she was in Germany earlier this year.

“CPJ is deeply disturbed by the disclosures that attackers used Pegasus spyware to infect the phone of exiled journalist Galina Timchenko, one of the world’s most prominent Russian media figures,” said Gulnoza Said, CPJ’s Europe and Central Asia program coordinator. “Journalists and their sources are not free and safe if they are spied on, and this attack on Timchenko underscores that governments must implement an immediate moratorium on the development, sale, and use of spyware technologies. The threat is simply too large to ignore.”

Timchenko’s phone was infected by Pegasus, a spyware produced by the Israeli company NSO Group, while she was in Berlin on or around February 10, 2023, according to a Meduza report and a joint-investigation by rights groups Access Now and research organization Citizen Lab. The investigation found that the infection took place shortly after Russia’s Prosecutor General designated Meduza as an “undesirable” organization –  a measure that banned the outlet from operating on Russian territory – and likely lasted several days or weeks.

According to the investigation, Apple had warned Timchenko and “other targets” in June that their devices may have been targeted with state-sponsored spyware. Meduza editor-in-chief Ivan Kolpakov told CPJ via messaging app that Apple’s warning prompted them to request that Access Now check Timchenko’s device.

According to Access Now, this is the first documented case of Pegasus surveillance of a Russian journalist; the investigation reported that the attack could have come from Russia, one of its allies, or an EU state may have been responsible for the attack.

The fact that some European government may have used Pegasus against Timchenko is “beyond our comprehension,’” Kolpakov said in a statement shared with CPJ. “As the developers claim, this software is used to fight terrorism — yet it is systematically used against the opposition and journalists.”

Meduza operates in exile, with most of its staff based in Berlin and the Latvian capital of Riga and covers various topics, including politics, social issues, culture, and the war in Ukraine. CPJ awarded Timchenko its 2022 Gwen Ifill Press Freedom Award.

“We often repeat to ourselves and our employees that Europe gives a feeling of complete security. But it is only a feeling – an illusion of security,” Kolpakov said in the statement.

Meduza journalist Elena Kostyuchenko recently reported that she may have been poisoned in Germany in October 2022.

Kolpakov said he hoped to be able to identify those responsible for the attack and obtain explanations from them as well as from the NSO Group.

NSO Group previously told CPJ that it licenses Pegasus to fight crime and terrorism, stating that it investigates “all credible claims of misuse and take[s] appropriate action,” including shutting down a customer’s access to the software.

A 2022 CPJ special report noted that the development of high-tech “zero-click” spyware like Pegasus– the kind that takes over a phone without a user’s knowledge or interaction – poses an existential crisis for journalism and the future of press freedom around the world. The report included CPJ’s recommendations to protect journalists and their sources from the abuse of the technology and called for an immediate moratorium on exporting this technology to countries with poor human rights records. CPJ has also joined other rights groups in calling for immediate action to stop spyware threatening press freedom.

CPJ emailed NSO Group and the German Federal Ministry of the Interior for comment on the Timchenko findings but did not immediately receive any replies.


This content originally appeared on Committee to Protect Journalists and was authored by Arlene Getz/CPJ Editorial Director.

]]>
https://www.radiofree.org/2023/09/13/investigation-finds-russian-journalist-galina-timchenko-targeted-by-pegasus-spyware/feed/ 0 426882
Israel’s arms and spyware: Used on Palestinians, sold to the world https://www.radiofree.org/2023/07/20/israels-arms-and-spyware-used-on-palestinians-sold-to-the-world/ https://www.radiofree.org/2023/07/20/israels-arms-and-spyware-used-on-palestinians-sold-to-the-world/#respond Thu, 20 Jul 2023 14:14:48 +0000 https://asiapacificreport.nz/?p=90928 Journalist and critic of Israeli apartheid Antony Loewenstein wrapped up his New Zealand tour with another damning address in Auckland last night but was optimistic about a swing in global grassroots sentiment with a stronger understanding of the plight of the reoressed 5 million Palestinians. He says that for more than a half century the occupation of the West Bank and Gaza has given the Israeli state invaluable military experience in “controlling” a population.   

By Antony Loewenstein

The Israeli defence industry inspires nations across the globe, many of which view themselves as under threat from external enemies.

The Taiwanese foreign minister, Joseph Wu, recently told the Israeli newspaper Haaretz that: “Every aspect of the Israeli fighting capability is amazing to the Taiwanese people and the Taiwanese government.”

Wu explained that he appreciated how Israel protected its own country because, “basically, we [Taiwan] have barely started. The fighting experiences of Israel are something we’re not quite sure about ourselves. We haven’t had any war in the last four or five decades, but Israel has that kind of experience”.

Wu also expressed interest in Israeli weapons, suggesting his country had considered their usefulness in any potential war with China.

“Israel has the Iron Dome,” he said, referring to Israel’s defence system against short-range missiles. “We should look at some of the technology that has been used by the Israelis in its defence. I’m not sure whether we can copy it, but I think we can look at it and learn from it.”

It isn’t just Taiwan imagining itself as akin to Israel. Ukrainian President Volodymyr Zelensky said in April 2022 that his vision for his nation was to mimic “the Jewish state“.

Two months after Russia’s illegal invasion of its territory, Zelensky, who is a long-time supporter of Israel, argued that “our people will be our great army. We cannot talk about ‘Switzerland of the future’ — probably, our state will be able to be like this a long time after. But we will definitely become a ‘big Israel’ with its own face.”

Zelensky went on to explain that what he meant was the need in the future to have “representatives of the armed forces or the national guard in all institutions, supermarkets, cinemas; there will be people with weapons.”

The Women's Bookshop's Carole Beu with author Antony Loewenstein
The Women’s Bookshop’s Carole Beu with author Antony Loewenstein at his book signing in Auckland last night. Image: David Robie/Asia Pacific Report

The Palestine laboratory
This admiration for Israel is both unsurprising and disturbing. The praise for Israel almost always completely ignores its occupation of Palestinian territory — one of the longest in modern times — and the ways in which this colonial project is implemented.

When Taiwan, Ukraine or any other country looks to Israel for innovation, it’s a highly selective gaze which completely disappears the more than five million Palestinians under Israeli military occupation in the West Bank, East Jerusalem and Gaza.

Palestine Laboratory book cover
The Palestine Laboratory . . . uncovers how Israel has used the occupied Palestinians as the ultimate guineapigs.

The appeal of the Palestine laboratory is endless. I’ve spent the last years researching this concept and its execution in Palestine and across the globe.

My new book, The Palestine Laboratory: How Israel Exports the Technology of Occupation Around the World, uncovers how Israel has used the occupied Palestinians as the ultimate guineapigs when developing tools of repression, from drones to spyware and facial recognition to biometric data, while maintaining an “enemy” population, the Palestinians, under control for more than half a century.

Israel has sold defence equipment to at least 130 countries and is now the 10th biggest arms exporter in the world. The US is still the dominant player in this space, accounting for 40 percent of the global weapons industry.

Washington used its failed wars in Iraq and Afghanistan as a testing ground for new weapons. During the current Russian invasion of Ukraine, the war has been a vital “beta test” for new weapons and sophisticated forms of surveillance and killing.

But Israel has a ready-made population of occupied Palestinians over which it has complete control. For more than five decades, Israeli intelligence authorities have built an NSA-level system of surveillance across the entire occupied Palestinian territories.

Nowhere is completely immune from listening, watching or following.

In the last decade, the most infamous example of Israeli repression tech is Pegasus, the phone hacking tool developed by the company NSO Group. Used and abused by dozens of nations around the world, Mexico is its most prolific adherent.

I spoke to dissidents, lawyers and human rights activists in Togo, Mexico, India and beyond whose lives were upended by this invasive, mostly silent tool.

Israeli state and spyware
However, missing from so much of the western media coverage, including outrage against NSO Group and its founders who were Israeli army veterans, is acknowledgement of the close ties between the firm and the Israeli state.

NSO is a private corporation in name only and is in fact an arm of Israel’s diplomacy, used by Prime Minister Benjamin Netanyahu and the Mossad to attract new friends in the international arena. Despite being blacklisted by the Biden administration in November 2021, the company still hopes to continue trading.

Unregulated Israeli spyware
Unregulated Israeli spyware . . . a global threat.

My research, along with that of other reporters, has shown a clear connection between the sale of Israeli cyberweapons and Israel’s attempts to neuter any potential backlash to its illegal occupation.

From Rwanda to Saudi Arabia and the United Arab Emirates to India, Israeli spyware and surveillance tech are used by countless democracies and dictatorships alike.

Beyond Pegasus, many other similar tools have been deployed by newer and lesser-known Israeli companies, though they’re just as destructive. The problem isn’t just Pegasus — it could close down tomorrow and the privacy-busting technology would transfer to any number of competitors — but the unquenchable desire by governments, police forces and intelligence services for the relatively inexpensive Israeli tech that powers it.

India is even looking for alternatives to NSO Group with a less controversial history.

The Palestine laboratory is so successful because nobody wants to seriously regulate the fruits of its labours.

Ideological alignment
The extent of Israeli collusion with 20th and 21st century repression is overwhelming.

Perhaps the most revealing was the deep relationship between apartheid South Africa and Israel. It wasn’t just about arms trading, but an ideological alignment between two states that truly believed that they were fighting for their very existence.

In 1976, Israeli Prime Minister Yitzhak Rabin invited South African Prime Minister John Vorster, a Nazi sympathiser during the Second World War, to visit Israel. His tour included a stop at Yad Vashem, the country’s Holocaust memorial in Jerusalem.

Israel's then-President Reuven Rivlin (R) welcomes his Philippine counterpart Rodrigo Duterte at the presidential compound in Jerusalem on 4 September 2018 (AFP)
Israel’s then President Reuven Rivlin (right) welcomes his Philippine counterpart Rodrigo Duterte at the presidential compound in Jerusalem on 4 September 2018. Image: MEE/AFP

When Vorster arrived in Israel, he was feted by Rabin at a state dinner. Rabin toasted “the ideals shared by Israel and South Africa: the hopes for justice and peaceful coexistence”. Both nations faced “foreign-inspired instability and recklessness”.

Israel and South Africa viewed themselves as under attack by foreign bodies committed to their destruction. A short time after Vorster’s visit, the South African government yearbook explained that both states were facing the same issue: “Israel and South Africa have one thing above all else in common: they are both situated in a predominantly hostile world inhabited by dark peoples.”

A love of ethnonationalism still fuels Israel today, along with a desire to export it. Some arms deals with nations, such as Bangladesh or the Philippines, are purely on military grounds and to make money.

Israel places barely any restrictions on what it sells, which pleases leaders who don’t want meddling in their actions. Pro-Israel lobbyists are increasingly working for repressive states, such as Bangladesh, to promote their supposed usefulness to the West.

Israel and the global far right
But Israel’s affinity with Hungary, India and the global far right, a group that traditionally hates Jews, speaks volumes about the inspirational nature of the modern Israeli state. As Haaretz journalist Noa Landau recently wrote, while explaining why Netanyahu’s government defended the latest arguably antisemitic comments by Elon Musk about George Soros:

A Palestinian flag at the Auckland venue for author Antony Loewenstein's address about his new book The Palestine Laboratory
A Palestinian flag at the Auckland venue for author Antony Loewenstein’s address about his new book The Palestine Laboratory last night. Image: David Robie/Asia Pacific Report

“The government’s mobilisation in the service of stoking antisemitism is not surprising. It is the fruit of a long and consistent process in which the Netanyahu government has been growing closer to extreme right-wing elements around the world, at the expense of Jewish communities it purports to represent.”

It’s worth pausing for a moment to reflect on this undeniable reality. Israel, which claims to represent global Jewry, is encouraging an alignment between itself and a hyper-nationalist, bigoted and racist populism, regardless of the long-term consequences for the safety and security of Jews around the world.

Israel has thrived as an ethnonationalist state for so long because the vast bulk of the world grants it impunity. European nations have been key supporters of Israel, willing to overlook its occupation and abuse of Palestinians.

According to newly declassified documents from the files of Israel’s Ministry of Foreign Affairs, between 1967 and 1990 it’s clear that West Germany was becoming more critical of Israel’s settlement project in Palestine, but the main concern was protecting its own financial interests in the region if a regional war broke out.

In a document written on 16 February 1975 to the deputy director of Israel’s Ministry of Foreign Affairs for Western Europe, Nissim Yaish, before Israel’s Foreign Minister Yigal Allon’s visit to West Germany, Yaish explained the thinking in his country’s diplomatic bureaucracy:

“There is unanimity that this time such a war will have a far-reaching impact on all its affairs internally and externally and that it could wreak a Holocaust on the German economy. Based on this attitude, West Germany is interested in rapid progress toward a [peace] agreement.”

Western silence
But there has rarely been any serious interest in pursuing peace, or holding Israel to account for its blatantly illegal actions, because the economic imperative is too strong. Even today, when another Nakba against Palestinians is becoming more possible to imagine, there’s largely silence from Western elites.

Germany has banned public recognition of the 1948 Nakba and criminalised any solidarity with the Palestinian people. Germany is also keen to buy an Israeli missile defence system, confirming its priorities.

This is why Israeli apartheid and the Palestine laboratory are so hard to stop; countless nations want a piece of Israeli repression tech to surveil their own unwanted populations or election meddling support in Latin America or Africa.

Without a push for accountability, economic boycotts and regulation or banning Israeli spyware — the EU is flirting with the idea — Israel can feel comfortable that its position as a global leader in offensive weapons is secure.

This article was first published in the Middle East Eye.


This content originally appeared on Asia Pacific Report and was authored by APR editor.

]]>
https://www.radiofree.org/2023/07/20/israels-arms-and-spyware-used-on-palestinians-sold-to-the-world/feed/ 0 413209
The Pegasus Effect https://www.radiofree.org/2023/06/01/the-pegasus-effect/ https://www.radiofree.org/2023/06/01/the-pegasus-effect/#respond Thu, 01 Jun 2023 12:40:35 +0000 https://dissidentvoice.org/?p=140728
In 2022, we partnered with Al-Haq, Bisan Center for Research and Development, and Mind the Gap consortium to visually depict effect of Israeli spyware and how technologies that uphold Israeli apartheid ripple outward to impact communities thousands of miles away from Palestine.

Join us as we put a spotlight on “the Pegasus Effect”––or how the captive Palestinian population has been used by the Israeli cyber industry as a laboratory for research and development, with global human rights consequences — at RightsCon, the leading summit on human rights in the digital age. The deadline to register for a virtual ticket is June 2.

SESSION DETAILS AND HOW TO JOIN:

When: Tuesday, Jun 6, 2023 at 6:00 pm Palestine/11:00 am ET 

Session Description:

The session examines the Pegasus spyware tool, a product of Israeli cyber company NSO group, and explores the implications of this Israeli surveillance industry on human rights.


This content originally appeared on Dissident Voice and was authored by Visualizing Palestine.

]]>https://www.radiofree.org/2023/06/01/the-pegasus-effect/feed/0 399986 At least 5 members of the press covering Armenia-Azerbaijan conflict targeted by Pegasus spyware: report https://www.radiofree.org/2023/05/25/at-least-5-members-of-the-press-covering-armenia-azerbaijan-conflict-targeted-by-pegasus-spyware-report/ https://www.radiofree.org/2023/05/25/at-least-5-members-of-the-press-covering-armenia-azerbaijan-conflict-targeted-by-pegasus-spyware-report/#respond Thu, 25 May 2023 12:32:38 +0000 https://cpj.org/?p=289508 Stockholm, May 25, 2023—In response to a report released Thursday by a group of rights organizations alleging that Pegasus spyware was used to surveil at least five Armenian members of the press who covered the country’s military conflict with Azerbaijan, the Committee to Protect Journalists issued the following statement:

“Today’s report is yet another deeply disturbing reminder of the immense danger posed by Pegasus and other spyware used to target journalists,” said Carlos Martinez de la Serna, CPJ’s program director, in New York. “Armenian and Azerbaijani authorities should allow transparent inquiries into the targeting of Armenian journalists with Pegasus, and NSO Group must offer a convincing response to the report’s findings and stop providing its technologies to states or other actors who target journalists.”

The report, “Hacking in a war zone: Pegasus spyware in the Azerbaijan-Armenia conflict,” identified at least 12 people whose devices were infected by Pegasus, spyware produced by the Israeli company NSO Group. Many of the infections clustered around the 2020 Nagorno-Karabakh war between Armenia and Azerbaijan and its subsequent escalations.

The report was published Thursday, May 25, by the rights groups Access Now, Amnesty International, and Citizen Lab, the Armenian digital emergencies group CyberHUB-AM, as well as independent mobile security researcher Ruben Muradyan.

The targets included Armenian human rights activists, academics, and state officials, two media representatives who requested to be kept anonymous, and three named journalists:

  • Karlen Aslanyan, a reporter with the U.S. Congress-funded broadcaster RFE/RL’s Armenian service, Radio Azatutyun
  • Astghik Bedevyan, a reporter with Radio Azatutyun
  • Samvel Farmanyan, co-founder of the now-defunct independent broadcaster ArmNews TV

The report says its authors found “substantial evidence” suggesting that Azerbaijan authorities purchased access to Pegasus, and that the targets would have been of intense interest to Azerbaijan. The targets were also critical of Armenia’s government, which is believed to have previously used another spyware product.

NSO Group previously told CPJ that it licenses Pegasus to fight crime and terrorism, stating that it investigates “all credible claims of misuse and take[s] appropriate action,” including shutting down a customer’s access to the software.

CPJ has documented the grave threat posed to journalists by spyware, and joined with other rights groups to issue recommendations to policymakers and companies to combat the use of spyware against the media, including by imposing bans on technology and vendors implicated in human rights abuses.

Azerbaijani journalists Sevinj Vagifgizi and Khadija Ismayilova were previously confirmed to have had their devices infected with Pegasus, while dozens of other prominent Azerbaijani journalists featured on a leaked list of potential Pegasus targets analyzed by the collaborative investigation Pegasus Project in 2021.

CPJ emailed NSO Group, the National Security Service and Ministry of Internal Affairs of Armenia, and the State Security Service and Ministry of Internal Affairs of Azerbaijan for comment, but did not immediately receive any replies.


This content originally appeared on Committee to Protect Journalists and was authored by Erik Crouch.

]]>
https://www.radiofree.org/2023/05/25/at-least-5-members-of-the-press-covering-armenia-azerbaijan-conflict-targeted-by-pegasus-spyware-report/feed/ 0 398217
At least 5 members of the press covering Armenia-Azerbaijan conflict targeted by Pegasus spyware: report https://www.radiofree.org/2023/05/25/at-least-5-members-of-the-press-covering-armenia-azerbaijan-conflict-targeted-by-pegasus-spyware-report/ https://www.radiofree.org/2023/05/25/at-least-5-members-of-the-press-covering-armenia-azerbaijan-conflict-targeted-by-pegasus-spyware-report/#respond Thu, 25 May 2023 12:32:38 +0000 https://cpj.org/?p=289508 Stockholm, May 25, 2023—In response to a report released Thursday by a group of rights organizations alleging that Pegasus spyware was used to surveil at least five Armenian members of the press who covered the country’s military conflict with Azerbaijan, the Committee to Protect Journalists issued the following statement:

“Today’s report is yet another deeply disturbing reminder of the immense danger posed by Pegasus and other spyware used to target journalists,” said Carlos Martinez de la Serna, CPJ’s program director, in New York. “Armenian and Azerbaijani authorities should allow transparent inquiries into the targeting of Armenian journalists with Pegasus, and NSO Group must offer a convincing response to the report’s findings and stop providing its technologies to states or other actors who target journalists.”

The report, “Hacking in a war zone: Pegasus spyware in the Azerbaijan-Armenia conflict,” identified at least 12 people whose devices were infected by Pegasus, spyware produced by the Israeli company NSO Group. Many of the infections clustered around the 2020 Nagorno-Karabakh war between Armenia and Azerbaijan and its subsequent escalations.

The report was published Thursday, May 25, by the rights groups Access Now, Amnesty International, and Citizen Lab, the Armenian digital emergencies group CyberHUB-AM, as well as independent mobile security researcher Ruben Muradyan.

The targets included Armenian human rights activists, academics, and state officials, two media representatives who requested to be kept anonymous, and three named journalists:

  • Karlen Aslanyan, a reporter with the U.S. Congress-funded broadcaster RFE/RL’s Armenian service, Radio Azatutyun
  • Astghik Bedevyan, a reporter with Radio Azatutyun
  • Samvel Farmanyan, co-founder of the now-defunct independent broadcaster ArmNews TV

The report says its authors found “substantial evidence” suggesting that Azerbaijan authorities purchased access to Pegasus, and that the targets would have been of intense interest to Azerbaijan. The targets were also critical of Armenia’s government, which is believed to have previously used another spyware product.

NSO Group previously told CPJ that it licenses Pegasus to fight crime and terrorism, stating that it investigates “all credible claims of misuse and take[s] appropriate action,” including shutting down a customer’s access to the software.

CPJ has documented the grave threat posed to journalists by spyware, and joined with other rights groups to issue recommendations to policymakers and companies to combat the use of spyware against the media, including by imposing bans on technology and vendors implicated in human rights abuses.

Azerbaijani journalists Sevinj Vagifgizi and Khadija Ismayilova were previously confirmed to have had their devices infected with Pegasus, while dozens of other prominent Azerbaijani journalists featured on a leaked list of potential Pegasus targets analyzed by the collaborative investigation Pegasus Project in 2021.

CPJ emailed NSO Group, the National Security Service and Ministry of Internal Affairs of Armenia, and the State Security Service and Ministry of Internal Affairs of Azerbaijan for comment, but did not immediately receive any replies.


This content originally appeared on Committee to Protect Journalists and was authored by Erik Crouch.

]]>
https://www.radiofree.org/2023/05/25/at-least-5-members-of-the-press-covering-armenia-azerbaijan-conflict-targeted-by-pegasus-spyware-report/feed/ 0 398216
Mexican President López Obrador repeatedly criticizes news outlets and press freedom group over spyware coverage https://www.radiofree.org/2023/05/11/mexican-president-lopez-obrador-repeatedly-criticizes-news-outlets-and-press-freedom-group-over-spyware-coverage/ https://www.radiofree.org/2023/05/11/mexican-president-lopez-obrador-repeatedly-criticizes-news-outlets-and-press-freedom-group-over-spyware-coverage/#respond Thu, 11 May 2023 21:20:59 +0000 https://cpj.org/?p=286664 Mexico City, May 11, 2023—Mexican President Andrés Manuel López Obrador must stop making baseless criticisms of local news outlets and the international free expression organization Article 19, the Committee to Protect Journalists said Thursday.

Since March, López Obrador has sharply criticized Article 19, national investigative magazine Proceso, privately owned online news outlets Animal Político and Aristegui Noticias, and Animal Político investigative reporter Nayeli Roldán over their coverage of the Mexican federal government’s alleged use of illegal spyware.

The president’s statements have led to online abuse and threats of violence against Article 19, the three outlets, and their reporters, according to Roldán, Animal Político’s editorial director Daniel Moreno, and Article 19’s regional director Leopoldo Maldonado, who all spoke to CPJ by phone. 

“Mexican President López Obrador’s recent attempts to discredit journalist Nayeli Roldán, three critical news outlets, and Article 19 are more proof that his administration prefers harassing journalists over solving the country’s catastrophic press freedom crisis,” said CPJ Mexico Representative Jan-Albert Hootsen. “López Obrador’s constant verbal attacks on reporters, which serve only as a distraction from the issues they report on, must stop before they lead to further violence against the press.”

Since he assumed office in 2018, López Obrador repeatedly stated that his government does not engage in illegal surveillance with spyware and denied that his administration uses such applications for anything other than national security.

However, a series of reports published in March 2023 provided evidence that the Mexican military used Pegasus, a spyware developed by the Israeli NSO group, to monitor conversations between human rights activist Raymundo Ramos and two journalists at the Mexico City newspaper El Universal since 2019.

In a March 10 press briefing, Roldán asked López Obrador about those allegations, to which he responded by saying Roldán was “always against his government.” When Roldán insisted the military must explain the legal basis for the spying, he accused her of “not being objective,” and called her “unprofessional” and part of the “tendentious, bribed media.”

During an April 28 press conference, the president told reporters that Roldán was paid in 2022 by the National Institute for Access to Information, a federal autonomous body that handles freedom of information requests and regulates the protection of personal data. López Obrador has been highly critical of the institute, which he claims is “useless,” “onerous, opaque, and unnecessarily expensive,” and opposes his administration and him personally, according to news reports.

During a May 2 press briefing, López Obrador accused Article 19 of being funded by the U.S. government to work “against his government,” therefore “violating our sovereignty” and called the organization “interventionist,” adding that he would send a diplomatic cable to the U.S. government “in protest.”  

Moreno, Roldán, and Maldonado told CPJ that the president’s remarks have led to many hateful comments on social media against them personally, as well as on websites and social media pages of Article 19, Proceso, Animal Político, and Aristegui Noticias. Roldán said she received “vicious” misogynistic comments, while Maldonado said he and his organization received many threats and statements echoing the president’s comments.

“I’ve been receiving lots of insults, an increasing number. I’d even call it stalking,” Roldán told CPJ, adding that the pressure has forced her to keep a lower profile on social media. “I can’t send out a single tweet without it receiving insults.” 

Moreno said the president’s comments have made him and his reporters feel less safe, leading some of his reporters to ask not to be named in bylines. 

“We try to respond to the president, who constantly lies about us and never rectifies false information. His daily press briefing is a far bigger platform than anything we could ever hope to have,” Moreno said. “We have seen an increase in the number of attacks and insults against us, including social media users openly asking who our family members are to accost them as well.”

CPJ contacted presidential spokesperson Jesús Ramírez Cuevas for comment via messaging app but did not receive any response.  

Mexico was the deadliest country in the Western Hemisphere for journalists in 2022. At least three reporters were murdered in direct connection to their work, and CPJ is investigating another 10 killings to determine the motive.


This content originally appeared on Committee to Protect Journalists and was authored by Committee to Protect Journalists.

]]>
https://www.radiofree.org/2023/05/11/mexican-president-lopez-obrador-repeatedly-criticizes-news-outlets-and-press-freedom-group-over-spyware-coverage/feed/ 0 394133
Journalists, Rights Groups Urge Ban on ‘Sinister’ Spyware Like Pegasus https://www.radiofree.org/2023/05/03/journalists-rights-groups-urge-ban-on-sinister-spyware-like-pegasus/ https://www.radiofree.org/2023/05/03/journalists-rights-groups-urge-ban-on-sinister-spyware-like-pegasus/#respond Wed, 03 May 2023 17:20:07 +0000 https://www.commondreams.org/news/journalists-ban-pegasus-spyware

Six dozen civil society groups, journalists, and experts marked World Press Freedom Day on Wednesday with a joint call for "all governments to implement an immediate moratorium on the export, sale, transfer, servicing, and use of digital surveillance technologies, as well as a ban on abusive commercial spyware technology and its vendors."

The use of spyware against media workers is "an alarming trend impacting freedom of the press and creating a wider chilling effect on civil society and civic space," the statement argues. "Privacy, source protection, and digital security are essential components of press freedom, allowing journalists to protect the confidentiality and integrity of their work and sources."

"As governments and other entities seek to suppress the press and silence dissent, we are seeing an exponential increase in the market for digital surveillance technologies, including spyware, that overrides these journalistic principles."

"As governments and other entities seek to suppress the press and silence dissent, we are seeing an exponential increase in the market for digital surveillance technologies, including spyware, that overrides these journalistic principles," the statement continues. Such tools "can infiltrate a target's phone, giving the attacker full access to emails, messages, contacts, and even the device's microphone and camera," rendering secure and encrypted platforms useless.

"From El Salvador to Mexico, from India to Azerbaijan, from Hungary to Morocco, to Ethiopia—the list goes on of countries where investigative journalists working to expose corruption, power abuses, or human rights violations, have been targeted by invasive spyware such as Pegasus," the statement adds, referencing spyware from the Israeli firm NSO Group that has been used to target reporters, dissidents, and world leaders.

The advocates of banning this type of surveilleance technology noted that there are at least 180 known cases of potentially targeted journalists across 21 countries. They pointed to multiple examples, including Hungary-based Andras Szabo and Szabolcs Panyi being targeted with Pegasus in 2019, and Raymond Mujuni and Canary Mugume facing the same spyware two years later in Uganda.

According to the statement:

Moroccan investigative journalist Omar al-Radi was targeted with Pegasus spyware between 2019 and 2021, and later sentenced to six years in prison on bogus rape and espionage charges. Meanwhile journalist Hicham Mansouri, who fled from Morocco to France in 2016 following state harassment and detention, was hacked by Pegasus at least 20 times between February and April 2021.

Perhaps the most infamous example of how spyware can facilitate and enable transnational repression and serious human rights violations, including enforced disappearance and extrajudicial killing, is the murder of Saudi journalist and dissident Jamal Khashoggi at the Consulate of the Kingdom of Saudi Arabia in Istanbul on October 2, 2018. Both prior to and after his death, Mr. Kashoggi's family members and acquaintances were targeted by Pegasus spyware.

"It is clear that the use of spyware and unlawful targeted surveillance violates the fundamental rights of freedom of expression and access to information, peaceful assembly and association, freedom of movement, and privacy," the statement asserts, demanding not only a ban but also accountability for developers and distributors of the technology, and boosted efforts to protect journalists.

The statement was launched at Secret Surveillance: Countering Spyware's Threats to Freedom of the Press and Expression, an event co-hosted by advocacy organizations including Access Now.

"Invasive and abusive commercial spyware that has been used to facilitate human rights abuses globally has no place in our world," declared Access Now surveillance campaigner Rand Hammoud. "Years worth of evidence by civil society has demonstrated that the companies selling these technologies should not be rewarded with governmental contracts that would continue enabling their abuses."

Natalia Krapiva, tech legal counsel at Access Now, agreed that "this sinister technology that has been misused and abused by governments around the world is not safe in any hands, and its use can never be justified."

"Discussions do not suffice," Krapiva added. "We expect action: Protect freedom of the press, stamp out the spyware threat."

The spyware statement came as other members of the media acknowledged World Press Freedom Day in various ways, including sounding the alarm about the impacts of artificial intelligence on fact-based journalism, demanding global safeguards for digital privacy, and calling out the U.S. government for continuing to seek the extradition of WikiLeaks founder Julian Assange.


This content originally appeared on Common Dreams and was authored by Jessica Corbett.

]]>
https://www.radiofree.org/2023/05/03/journalists-rights-groups-urge-ban-on-sinister-spyware-like-pegasus/feed/ 0 392257
CPJ joins call for Indian government to withdraw latest amendment to Information Technology Rules https://www.radiofree.org/2023/05/02/cpj-joins-call-for-indian-government-to-withdraw-latest-amendment-to-information-technology-rules/ https://www.radiofree.org/2023/05/02/cpj-joins-call-for-indian-government-to-withdraw-latest-amendment-to-information-technology-rules/#respond Tue, 02 May 2023 20:24:59 +0000 https://cpj.org/?p=284494 Ahead of World Press Freedom Day on Wednesday, May 3, the Committee to Protect Journalists joined 16 press freedom and human rights organizations in a Tuesday statement calling on the Indian government to review and withdraw the overbroad provisions of the Information Technology Rules, 2021, and to withdraw the latest amendment to the rules, announced on April 6.

The amendment authorizes the formulation of a central government fact-check unit empowered to order intermediaries, including social media companies and internet service providers, to take down “fake or false or misleading content.” Intermediaries risk liability in court if they fail to remove such content.

The statement expresses concern that the amendment, which was announced without adequate and meaningful consultation with journalists, press bodies, and civil society organizations, severely threatens press freedom and empowers the government to be the sole arbiter of truth on the internet.

The statement further notes that the surveillance of journalists continues with impunity and calls on the Indian government to meaningfully commit to protecting media freedom and ensuring that journalists can do their work freely and without fear of persecution.

Read the full statement here.

CPJ previously criticized the I.T. Rules, which expanded the government’s powers to censor online content. In January 2023, the Indian government cited the rules when ordering YouTube and Twitter to take down links to a BBC documentary investigating Prime Minister Narendra Modi’s alleged role in the 2002 riots in Gujarat.


This content originally appeared on Committee to Protect Journalists and was authored by Committee to Protect Journalists.

]]>
https://www.radiofree.org/2023/05/02/cpj-joins-call-for-indian-government-to-withdraw-latest-amendment-to-information-technology-rules/feed/ 0 391991
CPJ condemns Mexican military surveillance of activist’s communications with journalists https://www.radiofree.org/2023/03/07/cpj-condemns-mexican-military-surveillance-of-activists-communications-with-journalists/ https://www.radiofree.org/2023/03/07/cpj-condemns-mexican-military-surveillance-of-activists-communications-with-journalists/#respond Tue, 07 Mar 2023 20:22:07 +0000 https://cpj.org/?p=268131 Mexico City, March 7, 2023 – In response to multiple reports published Tuesday stating that Mexican authorities surveilled human rights activist Raymundo Ramos’ conversations with journalists, the Committee to Protect Journalists issued the following statement of condemnation:

“The revelations that Mexican authorities have continued to spy on activists, including their communications with reporters, is a shocking confirmation that President Andrés Manuel López Obrador’s promises to do away with illegal surveillance have not been realized,” said Jan-Albert Hootsen, CPJ’s Mexico representative. “The previous failure to hold officials engaged in spying to account all but guaranteed that little would change. Only a credible, swift, and transparent investigation into these abuses will show that the government is taking such actions seriously.”

Joint reporting published Tuesday, March 7, by The New York Times and the independent Mexican outlet Aristegui Noticias showed that military authorities used Pegasus surveillance software designed by the Israeli firm NSO Group to spy on Ramos.

According to that reporting, an intelligence unit with Mexico’s Defense Secretariat attacked Ramos’ phone on numerous occasions between 2019 and 2020, and listened in on conversations he had with journalists at the newspaper El Universal about alleged extrajudicial executions of civilians in the northern state of Tamaulipas. The documents also revealed that the secretariat accused Ramos of working for a criminal gang in the state.

López Obrador, who assumed office in 2018, pledged that his government would end surveillance and denied the continued use of Pegasus. Past investigations into the use of Pegasus have not led to the arrest of public officials allegedly responsible for the surveillance.


This content originally appeared on Committee to Protect Journalists and was authored by Erik Crouch.

]]>
https://www.radiofree.org/2023/03/07/cpj-condemns-mexican-military-surveillance-of-activists-communications-with-journalists/feed/ 0 377705
Pegasus Spyware Maker NSO Group Sued in U.S. Court by Central American Journalists https://www.radiofree.org/2022/12/06/pegasus-spyware-maker-nso-group-sued-in-u-s-court-by-central-american-journalists-2/ https://www.radiofree.org/2022/12/06/pegasus-spyware-maker-nso-group-sued-in-u-s-court-by-central-american-journalists-2/#respond Tue, 06 Dec 2022 14:54:28 +0000 http://www.radiofree.org/?guid=f15c583694a83151ae5ffbf03e4a35d4
This content originally appeared on Democracy Now! and was authored by Democracy Now!.

]]>
https://www.radiofree.org/2022/12/06/pegasus-spyware-maker-nso-group-sued-in-u-s-court-by-central-american-journalists-2/feed/ 0 355707
Pegasus Spyware Maker NSO Group Sued in U.S. Court by Central American Journalists https://www.radiofree.org/2022/12/06/pegasus-spyware-maker-nso-group-sued-in-u-s-court-by-central-american-journalists/ https://www.radiofree.org/2022/12/06/pegasus-spyware-maker-nso-group-sued-in-u-s-court-by-central-american-journalists/#respond Tue, 06 Dec 2022 13:35:36 +0000 http://www.radiofree.org/?guid=a703eb5363692907a0394bd35e3f75b6 Seg2 pegasus 3

A group of journalists working for the award-winning Central American independent news outlet El Faro have filed a lawsuit in U.S. court against NSO Group, the Israeli company that operates the Pegasus spyware used to monitor and track journalists, human rights activists and dissidents across the globe. The journalists of El Faro, which is based in El Salvador, allege that Pegasus software was used to infiltrate their iPhones and track their communications and movements. “We’re of course of the belief that it was the government of El Salvador who engaged in these attacks. This is weapons-grade software that is sold exclusively to governments,” says Roman Gressier, a French American staff reporter with El Faro English and one of 15 plaintiffs in the lawsuit. We also speak with Carrie DeCell, senior staff attorney at the Knight First Amendment Institute at Columbia University and the lead lawyer in the lawsuit, who says part of the goal is to force the courts to confirm who NSO Group’s client was. “That would send a signal to other government clients around the world that they can no longer rely on NSO Group’s assurances of secrecy when they … intimidate and persecute journalists, civil rights activists, human rights activists around the world,” says DeCell.


This content originally appeared on Democracy Now! and was authored by Democracy Now!.

]]>
https://www.radiofree.org/2022/12/06/pegasus-spyware-maker-nso-group-sued-in-u-s-court-by-central-american-journalists/feed/ 0 355698
In India’s hardest-hit newsroom, surveilled reporters fear for their families and future journalists https://www.radiofree.org/2022/10/13/in-indias-hardest-hit-newsroom-surveilled-reporters-fear-for-their-families-and-future-journalists/ https://www.radiofree.org/2022/10/13/in-indias-hardest-hit-newsroom-surveilled-reporters-fear-for-their-families-and-future-journalists/#respond Thu, 13 Oct 2022 09:00:00 +0000 https://cpj.org/?p=236243 M.K. Venu, a founding editor at India’s independent non-profit news site The Wire, says he has become used to having his phone tapped in the course of his career. But that didn’t diminish his shock last year when he learned that he, along with at least five others from The Wire, were among those listed as possible targets of surveillance by Pegasus, an intrusive form of spyware that enables the user to access all the content on a target’s phone and to secretly record calls and film using the device’s camera. 

“Earlier it was just one conversation they [authorities] would tap into,” Venu told CPJ in a phone interview. “They wouldn’t see what you would be doing in your bedroom or bathroom. The scale was stunning.”

The Indian journalists were among scores around the world who learned from the Pegasus Project in July 2021 that they, along with human rights activists, lawyers, and politicians, had been targeted for possible surveillance by Pegasus, the spyware made by Israel’s NSO Group. (The company denies any connection with the Project’s list and says that it only sells its product to vetted governments with the goal of preventing crime or terrorism.) 

The Pegasus Project found that the phones of two founding editors of The Wire – Venu and Siddharth Vardarajan – were confirmed by forensic analysis to have been infected with Pegasus. Four other journalists associated with the outlet – diplomatic editor Devirupa Mitra, and contributors Rohini Singh, Prem Shankar Jha, and Swati Chaturvedi – were listed as potential targets.

The Indian government denies that it has engaged in unauthorized surveillance, but has not commented directly on a January New York Times report that Prime Minister Narendra Modi agreed to buy Pegasus during a 2017 visit to Israel. The Indian government has not cooperated with an ongoing inquiry by an expert committee appointed by the country’s Supreme Court to investigate illegal use of spyware. In late August, the court revealed that the committee had found malware in five out of the 29 devices it examined, but could not confirm that it was Pegasus.

However, Indian journalists interviewed by CPJ had no doubt that it was the government behind any efforts to spy on them. “This government is obsessed with journalists who are not adhering to their cheerleading,” investigative reporter Chaturvedi told CPJ via messaging app. “My journalism has never been personal against anyone. I don’t understand why it is so personal to this government.” For Chaturvedi, the spying was an invasion of privacy “so heinous that how do you put it in words.” 

Read CPJ’s complete special report: When spyware turns phones into weapons

Overall, the Pegasus Project found that at least 40 journalists were among the 174 Indians named as potential targets of surveillance. With six associated with The Wire, the outlet was the country’s most targeted newsroom. The Wire has long been a thorn in the side of the ruling Bharatiya Janata Party (BJP) for its reporting on allegations of corruption by party officials, the party’s alleged promotion of sectarian violence, and its alleged use of technology to target government critics online. As a result, various BJP-led state governments, BJP officials, and their affiliates have targeted the website’s journalists with police investigations, defamation suits, online doxxing, and threats.

Indian home ministry and BJP spokespeople have not responded to CPJ’s email and text messages requesting comment. However after the last Supreme Court hearing, party spokesperson Gaurav Bhatia criticized the opposition for “trying to create an atmosphere of fear” in India. “They [Congress party] were trying to spread propaganda that citizens’ privacy has been invaded. The Supreme Court has made it clear that no conclusive evidence has been found to show the presence of Pegasus spyware in the 29 phones scanned,” he said.

Indian police detain an opposition party worker during a February 2022 Mumbai protest accusing the Modi government of using Pegasus spyware to monitor political opponents, journalists, and activists. (AP/Rafiq Maqbool)

As in so many other newsrooms around the world, the Pegasus Project revelations have prompted The Wire to introduce stricter security protocols, including the use of encrypted software, to protect its journalists as well as its sources.

Ajoy Ashirwad Mahaprashasta, political editor at The Wire, told CPJ in a phone interview that as part of the new procedures, “we would not talk [about sensitive stories] on the phone.” While working on the Pegasus project, the Wire newsroom was extra careful. “When we were meeting, we kept our phones in a separate room. We were also not using our general [office] computers,” he said.

Venu told CPJ that while regular editorial meetings at The Wire are held via video call, sensitive stories are discussed in person. “We take usual precautions like occasional reboot, keep phones away when we meet anyone. What else can we do?” he asks.

Chaturvedi told CPJ via messaging app that she quickly started using a new phone when she learned from local intelligence sources that she might have been under surveillance. As an investigative journalist, her immediate concern following the Pegasus Project disclosures was to avoid compromising her sources. “In Delhi, everyone I know who is in a position of power no longer talks on normal calls,” she said. “The paranoia is not just us who have been targeted with Pegasus.”

“Since the last five years, any important source I’m trying to talk to as a journalist will not speak to me on a normal regular call,” said Arfa Khanum Sherwani, who anchors a popular political show for The Wire and is known as a critic of Hindu right-wing politics. Sherwani told CPJ that her politician sources were the first ones who moved to communicate with her on encrypted messaging platforms even before the revelations as they “understood that something like this was at play.”

Rohini Singh similarly told CPJ that she doesn’t have any conversations related to her stories over the phone and leaves it behind when she meets people out reporting. “It is not about protecting myself. Ultimately it is going to be my story and my byline would be on it. I’m essentially protecting people who might be giving me information,” she said. 

Journalists also say they are concerned about the safety of their family members.

“After Pegasus, even though my name per se was not part of the whole thing, my friends and family members did not feel safe enough to call me or casually say something about the government. Because they feel that they are also being audiographed and videographed [filmed or recorded],” said Sherwani.

Chaturvedi told CPJ that her family has been “terrified” since the revelations. “Both my parents were in the government service. They can’t believe that this is the same country,” she said.

Venu and Sherwani both expressed concerns about how the atmosphere of fear could affect coverage by less-experienced journalists starting out in their careers. “The simple pleasure of doing journalism got affected. This may lead to self-censorship. When someone gets attacked badly, that journalist can start playing safe,” said Venu.

Said Sherwani: “For someone like me with a more established identity and career, I would be able to get people [to talk to me], but for younger journalists it will be much more difficult to contact politicians and speak to them. Whatever they say has to be on record, so you will see less and less source-based stories.”

Ashirwad agreed. “I’m very critical of this government, which is known. My stand now is I shall not say anything in private which I’m not comfortable saying in public,” he said.  


This content originally appeared on Committee to Protect Journalists and was authored by Kunal Majumder/CPJ India Representative.

]]>
https://www.radiofree.org/2022/10/13/in-indias-hardest-hit-newsroom-surveilled-reporters-fear-for-their-families-and-future-journalists/feed/ 0 341619
For Mexican journalists, President López Obrador’s pledge to curb spyware rings hollow https://www.radiofree.org/2022/10/13/for-mexican-journalists-president-lopez-obradors-pledge-to-curb-spyware-rings-hollow/ https://www.radiofree.org/2022/10/13/for-mexican-journalists-president-lopez-obradors-pledge-to-curb-spyware-rings-hollow/#respond Thu, 13 Oct 2022 09:00:00 +0000 https://cpj.org/?p=236248 “Practically nothing.” RíoDoce magazine editor Andrés Villarreal spoke with a sigh and a hint of resignation as he described what came of Mexico’s investigation into the attempted hacking of his cell phone. “The federal authorities never contacted me personally. They told us informally that it wasn’t them, but that’s it.”

Over five years have passed since Villarreal and Ismael Bojórquez, RíoDoce’s co-founder and editor-in-chief, received the suspicious text messages that experts said bore telltale signs of Pegasus, the now notorious surveillance software developed by Israeli firm NSO Group. Just this month, a joint investigation by three Mexican rights groups and the University of Toronto’s Citizen Lab found evidence of Pegasus infections on the devices of two Mexican journalists and a human rights defender between 2019 and 2021 – infiltration that occurred in spite of Mexican President Andrés Manuel López Obrador’s 2018 promise to end illegal surveillance. (López Obrador denied on October 4 that his administration had used Pegasus against journalists or political opponents, saying, “if they have evidence, let them present it.”)

The previous Mexican administration also denied using the technology on high-profile journalists, even after the Pegasus Project, a global consortium of investigative journalists and affiliated news outlets that investigated the use of the spyware, reported in 2021 that more than two dozen journalists in Mexico have been targeted with the spyware. Those named included award-winning investigative journalist Carmen Aristegui and Jorge Carrasco, the editor-in-chief of the country’s foremost hard-hitting investigative magazine Proceso. Yet although the surveillance caused considerable outrage, almost nothing has changed since 2017, according to Villarreal, who spoke to CPJ from Sinaloa’s capital, Culiacán.

Read CPJ’s complete special report: When spyware turns phones into weapons

In what CPJ has found to be by far the deadliest country for journalists in the Western Hemisphere, there remains no legal protection from intrusive surveillance, no recourse for its victims, and no repercussions for those in public office who facilitated the spying.  

López Obrador’s pledge to stop illegal surveillance was one of his first major undertakings after he took office in December 2018. Eleven months later, he assured Mexicans that the use of the Israeli spyware would be investigated. “From this moment I tell you that we’re not involved in this. It was decided here that no one will be persecuted,” he said.

But with just over two years left in office – Mexico’s constitution allows presidents to serve only a single six-year term – journalists, digital rights groups, and human rights defenders say little has come of the president’s promises. Not only has the investigation into the documented cases of illegal use of Pegasus shown no meaningful progress, the critics say, but also virtually nothing has been done to prevent authorities from continuing to spy. 

“Unfortunately, the regulatory situation and the authorities’ capacity to intercept communication have remained intact,” said Luis Fernando García of Red en Defensa de los Derechos Digitales (R3D), a Mexico City-based digital rights group that supports reporters targeted with Pegasus. “There’s very little transparency, very little publicly available information about the use of such technologies, which makes repetition a very real possibility.”

CPJ contacted the office of President López Obrador’s spokesperson for comment before publication of the October report about the most recent infections but did not receive a reply.

NSO says it only sells Pegasus to government and law enforcement agencies to combat terrorism or organized crime. But investigative journalists report that in countries like Mexico non-state actors, including criminal groups, can also get their hands on these tools even if they are not direct clients. This poses a major threat to journalists and their sources across the region, where CPJ research has found that organized crime groups are responsible for a significant percentage of threats and deadly violence targeting the press. At least one Mexican journalist who was killed for his work, Cecilio Pineda Birto, may have been singled out for surveillance the month before his death.

Villarreal and Bojorquez received the first Pegasus-infected text messages just two days after Javier Valdez Cárdenas, Riodoce co-founder and a 2011 recipient of CPJ’s International Press Freedom Award, was fatally shot on May 15, 2017, near the magazine’s offices in northern Sinaloa state. 

“Although it had all the hallmarks of Pegasus, it took us quite a while before we realized what was happening,” Villarreal recalled. “We were in a very vulnerable state after Javier’s death. It wasn’t until approximately a month later, after contact with press freedom groups, that we realized that it was Pegasus.”

Ismail Bojórquez, co-founder and director of Riodoce, speaks with editors Andrés Villarreal and Judith Valenzuela at their office in Culiacan, Sinaloa state, Mexico on June 30, 2017. Bojorquez and Villarreal had received spyware-infected messages on their phones. (AP Photo/Enric Marti)

A 2018 report by R3D, citing findings by Citizen Lab, stated that the likely source of Villarreal’s surveillance was the Agency of Criminal Investigation, a now-defunct arm of the federal attorney general’s office. Two autonomous federal regulators subsequently established that the attorney general’s office used Pegasus illegally and violated privacy laws.

However, an ongoing federal investigation initiated under the previous government of President Enrique Peña Nieto has not led to any arrests of public officials. In December 2021, Mexican authorities requested the extradition from Israel of the former head of the criminal investigation agency, Tomás Zerón, in connection with various investigations – reportedly including the Pegasus abuses – but that request has not yet been granted. (CPJ contacted the federal attorney general’s office for comment on the extradition, but did not receive a reply.)

Concerningly, according to Proceso, investigators of the federal state comptroller revealed in the audit of the federal budget in October 2021 that the López Obrador administration had paid more than 312 million pesos (US $16 million) to a Mexican businessman who had facilitated the acquisition of Pegasus in the past.

The López Obrador administration has not publicly responded to Proceso’s findings or the state comptroller’s report, but the president did say during his daily press briefing on August 3, 2021, that there ‘no longer existed a relationship’ with the developer of Pegasus. The president’s office had not responded to CPJ’s request for comment on the payment by the time of publication.

Experts at R3D and Citizen Lab said Pegasus traces on a journalist’s phone indicated they were hacked as recently as June 2021, just after they reported on alleged human rights abuses by the Mexican army for digital news outlet Animal Politico. The journalist was not named in reports of the incident.

“I don’t think anything has changed,” Villarreal said. “The risk continues to exist, but the government denied everything.”

R3D, together with a number of other civil society groups, has also pushed hard for new legislation to curb the use of surveillance technologies by lobbying directly to legislators and via platforms like the Open Government Alliance. So far, the result has been disappointing. Even though López Obrador and his party, the Movement of National Regeneration (Morena), hold absolute majorities in both chambers of federal congress and have repeatedly acknowledged the need to end illegal surveillance, there has been no meaningful push for new legislation on either the state or the federal level.

“There is indignation about surveillance, but my colleagues aren’t picking the issue up,” said Emilio Álvarez Icaza, an independent senator who has been outspoken about surveillance. “It’s an issue that at least the Senate does not seem to really care about.”

R3D’s García warns that Pegasus is just a part of the problem. R3D and other civil society groups say they have detected numerous other technologies that were acquired by state and federal authorities even after the scope of Pegasus’ use became clear.

“We’ve been able to detect the proliferation of systems that permit the intervention of telephones and there are publicly available documents that provide serious evidence that those systems have been used illegally,” García said. “The [attorney general’s office], for example, has acquired the capacity to conduct more than 100,000 searches of mobile phone data, but only gave clarity about 200 of them.”

“Even with regulation, the Mexican justice state has a tremendous problem of lack of transparency and accountability. The entire system seems to have been constructed to protect public officials,” said Ana Lorena Delgadillo, a lawyer and director of the Fundación para la Justicia, which provides legal support to Mexicans and Central Americans searching for ‘disappeared’ family members. “This is why I believe it’s important that cases of this nature are ultimately brought to the Supreme Court, but it’s hard to find people willing to litigate.”

Villarreal said he will not be one of those afraid to speak out. “Ultimately we’ve left our cases in the hands of civil society organizations,” he said. “Thing is, the spyware is just a new aspect of a problem that has always existed. The authorities have spied here, they will continue to do so. We have to adapt to the reality that we’ll never know the extent of what’s going on.”


This content originally appeared on Committee to Protect Journalists and was authored by Jan-Albert Hootsen, CPJ Mexico Correspondent.

]]>
https://www.radiofree.org/2022/10/13/for-mexican-journalists-president-lopez-obradors-pledge-to-curb-spyware-rings-hollow/feed/ 0 341590
In Morocco, journalists – and their families – still struggle to cope with spyware fears https://www.radiofree.org/2022/10/13/in-morocco-journalists-and-their-families-still-struggle-to-cope-with-spyware-fears/ https://www.radiofree.org/2022/10/13/in-morocco-journalists-and-their-families-still-struggle-to-cope-with-spyware-fears/#respond Thu, 13 Oct 2022 09:00:00 +0000 https://cpj.org/?p=236537 By CPJ MENA Staff

Last July, when the Pegasus Project investigation revealed that imprisoned Moroccan journalist Soulaiman Raissouni was selected for surveillance by Israeli-made Pegasus spyware, the journalist could only laugh. 

“I was so sure,” his wife Kholoud Mokhtari said Raissouni told her from prison. 

Raissouni is one of seven local journalists named by the Pegasus Project – an investigative consortium of media organizations – as a potential or confirmed target of Pegasus spyware. The news only validated what Moroccan’s journalist community had long suspected: that the state’s vast intelligence apparatus has been monitoring some journalists’ every move. 

Moroccan journalists were among the first worldwide to complain of the use of spyware against reporters, pointing to digital surveillance as early as 2015. In 2019 and 2020, Amnesty International announced the findings of forensic analyses confirming that Pegasus had been used on the phone of at least two Moroccan journalists, Omar Radi and Maati Monjib. Subsequent state action against some of the surveilled journalists underscored the ongoing threat to Morocco’s independent media – and reinforced CPJ’s conclusion that spyware attacks often are precursors to other press freedom violations. 

Both Raissouni and Radi are imprisoned in Morocco for what family and colleagues describe as trumped up sex crimes charges. Taoufik Bouachrine, another journalist whom the Pegasus Project said was targeted with the spyware, is imprisoned on similar charges. 

Read CPJ’s complete special report: When spyware turns phones into weapons

The Pegasus Project was unable to analyze the phones of all of those named as surveillance targets to confirm the infection and the Moroccan government has repeatedly denied ever using Pegasus. However, many of the three journalists’ private pictures, videos, texts, and phone calls, as well as those belonging to family members, were published in pro-government newspapers and sites like Chouf TV, Barlamane.com, Telexpresse, and then later used as evidence against the journalists in court.   

Bouachrine, former editor-in-chief of local independent newspaper Akhbar al-Youm, was arrested in February 2018, and is serving a 15-year prison sentence on numerous sexual assault and human trafficking charges. His wife, Asmae Moussaoui, told CPJ in a phone call in May 2022 that she believes she was surveilled, too. 

In April 2019, Moussaoui said she called a private Washington, D.C.-based communications firm to help her run ads in U.S. newspapers about Bouachrine’s case, hoping that the publicity might aid efforts to free her husband. The next day, Barlamane published a story alleging that Moussaoui paid tens of thousands of euros to the firm, using money the journalist allegedly earned through human trafficking activities. Human Rights Watch describes Barlamane as being “closely tied with security services.” 

Suspecting she was being monitored, Moussaoui turned to one of her husband’s lawyers, who suggested the pair “pull a prank” that would help them detect whether authorities were indeed spying on her. The lawyer “called me and proposed that we speak with Taoufik’s alleged victims to reconcile, which we did not really intend to do. The next day, tabloids published an article saying that our family is planning to bribe each victim with two million dirhams [about $182,000] so they drop the case. I became very sure [of the surveillance] then,” Moussaoui told CPJ.

Moroccan journalist and press freedom advocate Maati Monjib, co-founder of the Moroccan Association for Investigative Journalism (AMJI), had a similar experience. Monjib was arrested in December 2020 and sentenced to a year in prison the following month after he was convicted of endangering state security and money laundering fraud. The latter charge stems from AMJI’s work helping investigative journalists apply for grants, Monjib told CPJ in a phone call. 

“During one of our meetings at AMJI in 2015, I mentioned that we need to look for grants to support more journalists. The next day, one of the tabloids published a story claiming that Maati Monjib is giving 5,000 euros [$4,850] to every journalist who criticizes the general director of the national security. This is a proof that they were listening to our meeting,” said Monjib. 

The revelations have forced journalists and their family members to take precautions against surveillance – no easy task given the difficulty of detecting spyware infection without forensic help. “[Raissouni] told me to try to be safe, so I am trying my best,” Mokhtari, Raissouni’s wife, told CPJ. 

“Other than the usual precautions I take to protect my phone, I regularly update it and I never keep any personal pictures or important messages or emails on it,” she said. “I also buy a new phone every three months and destroy the old one, which has taken a financial toll on my family. But honestly you can’t escape it. The most tech-savvy person I know is our friend Omar Radi. He took all the necessary precautions against hacking, and they still managed to infect his devices.” 

Monjib brings his devices to tech experts almost daily to check for bugs and to clean them, he told CPJ, adding that he also never answers phone calls, only uses the encrypted Signal messaging app, and always speaks in code.

Aboubakr Jamai, a prominent Moroccan journalist and a 2003 CPJ International Press Freedom Award winner, was selected for surveillance with Pegasus in 2018 and 2019 — and confirmed as a target in 2019 — even though he has been living in France since 2007, according to the Pegasus Project. He believes that the Moroccan government is to blame for the spyware attacks, and that the surveillance has effectively ensured the end of independent journalism in the country, he told CPJ in a phone call. 

“For years now, there haven’t been any independent media or journalism associations,” said Jamai. What’s left now is a handful of individuals who have strong voices and choose to echo it using some news websites, but mainly social media platforms.” 

CPJ emailed the Moroccan Ministry of Interior in September for comment but did not receive any response. 

Still, Jamai – who gave no credence to the government’s earlier denials of Pegasus use – did see one positive result from the spyware disclosures. “It publicly exposed Morocco’s desperation and the extent to which it is willing to go to silence journalists,” he said. “Now the whole world knows that the Moroccan state is using Pegasus to spy on journalists.”


This content originally appeared on Committee to Protect Journalists and was authored by Madeline Earp.

]]>
https://www.radiofree.org/2022/10/13/in-morocco-journalists-and-their-families-still-struggle-to-cope-with-spyware-fears/feed/ 0 341568
Hungarian journalists targeted by spyware have little hope EU can help https://www.radiofree.org/2022/10/13/hungarian-journalists-targeted-by-spyware-have-little-hope-eu-can-help/ https://www.radiofree.org/2022/10/13/hungarian-journalists-targeted-by-spyware-have-little-hope-eu-can-help/#respond Thu, 13 Oct 2022 09:00:00 +0000 https://cpj.org/?p=236539 Szabolcs Panyi was not even remotely surprised when Amnesty International’s tech team confirmed in 2021 that his cell phone had been infiltrated by Pegasus spyware for much of 2019. Panyi, a journalist covering national security, high-level diplomacy, and corruption for Hungarian investigative outlet Direkt36, had already long factored into his everyday work that his communications with sources could be spied on. “I was feeling a mix of indignation, humiliation, pride and relief,” he told CPJ of his response to the Amnesty news.

Direkt36 journalist Szabolcs Panyi (Photo: Mira Marjanovic)

The indignation and humiliation were from seeing himself and other prominent journalists included on a list of convicted criminals and known mob figures considered to be threats to Hungary’s national security. The pride was because the Hungarian government, which routinely ignored his reporting questions, thought it was worth spending tens, if not hundreds, of thousands of dollars on his surveillance; the relief was the validation that his earlier suspicions about being spied on were not a sign of paranoia.

Other Hungarian journalists targeted for surveillance expressed similarly ambiguous emotions in interviews with CPJ. And all were skeptical that any future recommendations by the European Parliament’s committee of inquiry into Pegasus and other spyware, expected next year, would bring much relief in a country where independent media face an increasingly hostile press freedom climate under the government of right-wing Prime Minister Viktor Orbán.

Panyi, who continues to relentlessly investigate the surveillance scandal, is one of the few journalists still giving regular interviews to Hungarian and international media about his surveillance. Three other CPJ interviewees said that while they were making an exception in talking to the organization, they’d otherwise stopped making public statements on their experience because they did not want their Pegasus targeting to define their lives.

Read CPJ’s complete special report: When spyware turns phones into weapons

The three – crime reporter Brigitta Csikász, Zoltán Varga, owner of one of the country’s biggest independent news sites, 24.hu, and a reporter who asked not to be identified for fear that further publicity would negatively impact his career – were named as targets in July 2021, when Panyi broke the story for Direkt36 as part of its reporting for the Pegasus Project, an international investigation that found the phone numbers of more than 180 journalists on a global list of potential spyware targets. (The NSO Group, which makes Pegasus, denies any connection with the Project’s list and says that it only sells its product to vetted governments with the goal of preventing crime or terrorism.)

Along with Panyi, all the journalists recounted signs that they were under physical and digital surveillance before they were aware of Pegasus being used against them, and all said that their private and professional lives had changed since the scandal broke last year.

Csikász, who covers corruption, told CPJ in a phone interview that she had seen numerous signs that people might be watching her and was warned by friends for years that her phone might be monitored. “I did not get a heart attack, I was not at all traumatized,” she told CPJ in a phone interview about her reaction to the news that Pegasus was used to monitor the contents of her phone between early April and mid-November 2019.   

Csikász has even managed to find some humor in her situation. “My friends took it real easy, most of them just crack jokes and my family took it as a sign of prestige and importance. For them, it is as if I was awarded with a special journalism prize,” she said. She added that the publicity surrounding the disclosures had even prompted some sources to contact her because they heard about her in the news. “I was not, and I have not, become paranoid,” she told CPJ.

Still, Csikász, who currently works for daily tabloid newspaper Blikk and was reporting for the investigative outlet Átlátszó, remains concerned about the intrusion. “As a journalist, I respect my country’s laws and my profession’s ethical standards and I consider the possibility of being spied on as part of my job,” she said. However, she would like to know which of her numerous investigations were considered threats to national security.

Varga told CPJ in a video interview that he’d attracted government attention when he started investing in media in 2014. This scrutiny increased, especially when he made it clear around 2017 that he would not be willing to sell his assets in spite of quiet threats and warnings from businesspeople linked to the government. In recent years, he said, he had spotted people sitting in cars parked outside his house and apparent eavesdroppers sitting next to his table at restaurants. He recalled that his phone calls were often interrupted, he once heard a recording of a call played back from the start, and at one point German tech experts provided proof that his android phone had been hacked.

Panyi’s investigation found Varga’s Pegasus surveillance started around the time he invited six people to a dinner in his house in Budapest in June 2018, two months after Orbán won a third consecutive term as prime minister. All seven participants of the dinner were selected as potential candidates for surveillance and at least one of their phones showed evidence of infection under Amnesty’s forensic analysis.  

“I was only surprised that the regime used this type of high-level technology to spy on an otherwise innocent gathering of intellectuals,” Varga told CPJ in a video call. “It was far from being a coup, it was just a friendly gathering. We discussed the very high level of corruption in Hungary’s ruling elite and how to find ways to expose it. Using this kind of technology in such a situation for me just shows how much the government is afraid of its opponents,” he said.

The reporter who spoke on condition of anonymity was also surprised that the government would deploy such high-tech spyware against journalists. Although he’d seen indications of occasional physical surveillance, the Pegasus infiltration “came out of the blue and was a real shock to me,” he said in a phone interview. His “dark period” only eased when the fact of his surveillance was publicly reported. “Since then, I prefer not to speak about it and share my experiences with anyone but my friends,” he told CPJ.

Panyi said that the way he communicates with sources has now become much slower and more complicated. “Of course, I have much more difficulty meeting and communicating with sources, who are increasingly afraid of the trouble I might bring into their life,” he told CPJ in a phone interview. He uses various secure digital tools and applications, is mindful about what networks he connects to on his computer or mobile phone, regularly goes to meetings without his phone, and continues to take physical notes.

Varga says the spyware disclosures have harmed some of his business ventures. “The Pegasus scandal made it obvious for both my business and private contacts that it might be risky to talk to me and they might also get exposed, which people obviously try to avoid,” Varga told CPJ, adding that acquaintances now crack Pegasus “jokes” in most of his meetings. “As a result of this whole affair, I have much less phone calls, more walking meetings outside, without phones in the pocket,” he said.

Many companies, including advertising agencies and advertisers for his news site, seem to prefer to avoid doing business with him, and their loss is not offset by the small number of ad-buyers who now see the site as an important media voice, said Varga. “I have become kind of toxic for my environment,” he told CPJ. 

The reporter who preferred not to be named said that his phone now “stays outside” whenever he sees friends and family and he uses a special anti-tracking case when he attends professional meetings.

‘We say no to your observation!’ Participants walk in front of a poster showing Hungary’s Prime Minister Viktor Orbán during a July 26, 2021, protest in Budapest against the Hungarian government’s use of Pegasus spyware to monitor journalists, opposition leaders and activists. (Reuters/Marton Monus)

Hungary’s government acknowledged in November 2021 that it had bought Pegasus spyware, but says that its surveillance of journalists and political critics was carried out in accordance with Hungarian law.

A government spokesman said that journalists might have been monitored because some of their sources were under surveillance on suspicion of crimes or terrorist links, not because the journalists were the direct targets of the investigations.

In January, the Hungarian National Authority for Data Protection and Freedom of Information issued a 55-page report, which concluded that in all the cases they investigated, including those involving journalists, all legal criteria for the application of the spyware were met and the spyware was used to protect Hungary’s national interests.  

These responses have left the journalists who spoke to CPJ with little hope that anyone will be held accountable for the intrusion on their lives. Nor do they expect help from the institutions of the European Union, where officials themselves have been targeted by spyware as they grapple with mounting political pressure over how to hold member states accountable for any breaches of the rule of law.

As the European Parliament’s committee of inquiry looks at the mountain of evidence that surveillance spyware has been used in EU countries and against EU citizens, the EU Commission lacks the powers to hold member states to account, and has been forced to refer those seeking justice to their national courts.    

Surveilled journalists might eventually get EU relief if a new draft European Media Freedom Act, released on September 16, becomes law. The Act could give journalists a path to file a complaint to the EU’s Court of Justice if they or those close to them are subject to the unjustified use of spyware. However, the Act still has to be reviewed by EU institutions and member states and may not survive in its current form.  

Meanwhile, Panyi does not believe Hungary’s courts can provide any relief. “The laws regulating national security, including surveillance, are so broadly formulated that it is legal to wiretap and surveil anyone,” he told CPJ. Noting that there was no independent oversight of the surveillance process, he added that “legal” in these cases meant only that “everything has been properly documented, and the necessary stamps are where they should be.”

In June, Panyi saw his concerns confirmed when the Central Investigation Prosecutor’s Office announced it had terminated its own investigation into the allegations of illegal surveillance of journalists and opposition politicians, citing absence of a crime. “A broad investigation which included classified documents found no unauthorized and secretive collection of information or the unauthorized use of a concealed device,” said the investigators. 


Additional reporting by Tom Gibson in Brussels


This content originally appeared on Committee to Protect Journalists and was authored by Attila Mong/CPJ EU Correspondent.

]]>
https://www.radiofree.org/2022/10/13/hungarian-journalists-targeted-by-spyware-have-little-hope-eu-can-help/feed/ 0 341566
David Kaye: Here’s what world leaders must do about spyware https://www.radiofree.org/2022/10/13/david-kaye-heres-what-world-leaders-must-do-about-spyware/ https://www.radiofree.org/2022/10/13/david-kaye-heres-what-world-leaders-must-do-about-spyware/#respond Thu, 13 Oct 2022 09:00:00 +0000 https://cpj.org/?p=236603 In late June, the general counsel of NSO Group, the Israeli company responsible for the deeply intrusive spyware tool, Pegasus, appeared before a committee established by members of the European Parliament (MEPs). Called the PEGA Committee colloquially, the Parliament established it to investigate allegations that EU member states and others have used “Pegasus and equivalent spyware surveillance software.” This was to be PEGA’s first major news-making moment, a response to the very public scandals involving credible allegations of Pegasus use by Poland, Hungary and, most recently, Spain.

The hearing started unsurprisingly enough. Chaim Gelfand, the NSO Group lawyer, laid out the company line that Pegasus is designed for use against terrorists and other criminals. He promised that the company controlled its sales, developed human rights and whistleblowing policies, and took action against those governments that abused it. He wanted to “dispel certain rumors and misconceptions” about the technology that have circulated in “the press and public debate.” He made his case.

Then, surely from NSO Group’s perspective, it went downhill. MEP after MEP asked specific questions of NSO Group. For instance: if Pegasus is sold only to counter terrorism or serious crime, how did it come to be used in EU member states? How did it come to be used to eavesdrop on staffers at the European Commission, another public allegation? Can NSO provide examples of when it terminated contracts because a client misused Pegasus? Can NSO clarify what data it has on its clients’ uses of Pegasus? How does NSO Group know when the technology is “abused”? More personally: How come you spied on me?

MEPs were angry. Increasingly their questions became more intense, more personal, more laced with moral and legal outrage. And this tenor only deepened over the course of the hearing, as the NSO lawyer stumbled through his points and regularly resorted to the line that he could not speak to specific examples, cases or governments. Few, if any, seemed persuaded by the NSO Group claim that it has no insight into the day-to-day use of the spyware by the “end-user”. To the contrary, the PEGA hearing ended with one thing clear: NSO Group faces not only anger but the reality of an energized set of legislators.

More than a year after release of the Pegasus Project, the global reporting investigation that disclosed massive pools of potential targets for Pegasus surveillance, the momentum for action against spyware like Pegasus is gathering steam. 

Read CPJ’s complete special report: When spyware turns phones into weapons

In 2019, in my capacity as a U.N. Special Rapporteur, I issued a report to the United Nations Human Rights Council that surveyed the landscape of the private surveillance industry and the vast human rights abuses it facilitates, calling for a moratorium on the sale, transfer and use of such spyware. At the time, few picked up the call. But today, with extensive reporting of the use of spyware tools against journalists, opposition politicians, human rights defenders, the families of such persons, and others, the tide seems to be turning against Pegasus and spyware of its ilk.

The U.N. High Commissioner for Human Rights, several U.N. special rapporteurs, the leaders of major human rights organizations, and at least one state, Costa Rica, have joined the call for a moratorium. The Supreme Court of India is pursuing serious questions about the government’s use of Pegasus. The United States Department of Commerce placed NSO Group and another Israeli spyware firm on its list of restricted entities, forbidding the U.S. government from doing any business with them. Apple and Facebook’s parent company Meta have sued NSO Group for using their infrastructure to hack into individual phones.

All of these steps suggest not only momentum but the elements of a global process to constrain the industry. They need to be transformed into a long-term strategy to deal with the threats posed to human rights by intrusive, mercenary spyware. State-by-state responses, or high-profile corporate litigation, will generate pain for specific companies and begin to set out the normative standards that should apply to surveillance technologies. But in order to curb the industry as a whole, a global approach will be necessary. 

In principle, spyware with the characteristics of Pegasus – the capability to access one’s entire device and data connected to it, without discrimination, and without constraint – already violates basic standards of necessity and proportionality under international human rights law. On that ground alone, it’s time to begin speaking of not merely a moratorium but a ban of such intrusive technology, whether provided by private or public actors. No government should have such a tool, and no private company should be able to sell such a tool to governments or others.

In the land of reality, however, a ban will not take place immediately. Even if a coalition of human rights-friendly governments could get such negotiations toward a ban off the ground, it will take time.

Here is where bodies like the European Parliament and its PEGA Committee – and governments and parliamentarians around the world – can make an immediate difference. They should start to discuss a permanent ban while also entertaining other interim approaches: stricter global export controls to limit the spread of spyware technology; commitments by governments to ensure that their domestic law enables victims of spyware to bring suits against perpetrators, whether domestic or foreign; and broad agreement by third-party companies, such as device manufacturers, social media companies, security entities and others, to develop a process for notification of spyware breaches especially to users and to one another. 

Some of this would be hard to accomplish. It’s not as if the present moment, dominated as it is by tensions like Russian aggression against Ukraine, is conducive to international negotiations. Some steps could be achieved by governments that should be concerned about the spread of such technologies, already demonstrated by U.S. and European outrage. Either way, governments and activists can begin to lay the groundwork, defining the key terms, highlighting the fundamental illegality of spyware like Pegasus, taking steps in domestic law to ensure strict controls on export and use. 

There is precedent for such action in the global movement to ban landmines in the 1990s, which started with little hope of achieving a ban, focused instead on near-term controls. Ultimately human rights activists and like-minded governments were able to hammer out the Ottawa Convention to ban and destroy anti-personnel landmines in 1997. It is, at least, a process that activists and governments today could emulate and modify.

Human rights organizations and journalists have done the work to disclose the existence of a major threat to freedom of expression, privacy, and space for public participation. It is now the duty of governments to do something about it.


This content originally appeared on Committee to Protect Journalists and was authored by David Kaye.

]]>
https://www.radiofree.org/2022/10/13/david-kaye-heres-what-world-leaders-must-do-about-spyware/feed/ 0 341564
MEDIA ADVISORY: CPJ to publish comprehensive report on the threat to journalism posed by zero-click spyware https://www.radiofree.org/2022/10/12/media-advisory-cpj-to-publish-comprehensive-report-on-the-threat-to-journalism-posed-by-zero-click-spyware/ https://www.radiofree.org/2022/10/12/media-advisory-cpj-to-publish-comprehensive-report-on-the-threat-to-journalism-posed-by-zero-click-spyware/#respond Wed, 12 Oct 2022 19:23:40 +0000 https://cpj.org/?p=236740 New York — On Thursday, October 13 the Committee to Protect Journalists (CPJ) will publish a report on the global impact of malicious spyware on journalism. Coming one year after the Pegasus Papers first shed light on the scale and scope of how one company’s software was weaponized by government officials to target journalists, the new report, “Zero-Click Spyware: Enemy of the Press,” offers an in-depth examination of the existential threat that surveillance technologies pose to journalists, their sources — and to journalism on the whole.

The report includes a global overview of spyware and how it’s used against journalists, as well as four case studies from India, Mexico, Hungary, and Morocco. Each provides first-hand accounts from journalists, digital privacy advocates, and others who were themselves targeted by spyware. The report also includes an opinion column by David Kaye, a former U.N. Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, on what he recommends global leaders should do to stop the abuse of spyware. 

The final piece offers concrete policy recommendations from CPJ experts to governments, corporate entities, and international human rights organizations to combat the arbitrary or unlawful deployment of spyware.

The full report will be available on Thursday, October 13 at 5:00am ET at: https://cpj.org/spyware-press-freedom

If you would like to speak with a CPJ expert about the report or about spyware’s impact on journalism more broadly, please contact Adam Peck at cpj@westendstrategy.com or at +1 202-531-6408.


This content originally appeared on Committee to Protect Journalists and was authored by Committee to Protect Journalists.

]]>
https://www.radiofree.org/2022/10/12/media-advisory-cpj-to-publish-comprehensive-report-on-the-threat-to-journalism-posed-by-zero-click-spyware/feed/ 0 341198
At least 2 Mexican journalists targeted by Pegasus spyware since López Obrador took office https://www.radiofree.org/2022/10/03/at-least-2-mexican-journalists-targeted-by-pegasus-spyware-since-lopez-obrador-took-office/ https://www.radiofree.org/2022/10/03/at-least-2-mexican-journalists-targeted-by-pegasus-spyware-since-lopez-obrador-took-office/#respond Mon, 03 Oct 2022 19:55:06 +0000 https://cpj.org/?p=234027 Mexico City, October 3, 2022 – In response to a joint report published Sunday that found Pegasus spyware infected the devices of two Mexican journalists and a human rights defender between 2019 and 2021, the Committee to Protect Journalists issued the following statement:

“This new report definitively shows that Mexico’s President Andrés Manuel López Obrador can no longer hide behind blaming his predecessor for widespread use of Pegasus in Mexico,” said Jan-Albert Hootsen, CPJ’s Mexico representative. “Mexican authorities must immediately and transparently investigate the use of Pegasus and other spyware to target journalists during his administration, as well as push for more regulations to end the use of this technology against the press once and for all.”

The report was published by the Mexican digital rights organization R3D (Red en los Defensa de los Derechos Digitales) and rights and research groups Article 19 and SocialTIC. The University of Toronto’s Citizen Lab conducted a forensic analysis of the devices.

The device of an unnamed journalist from the online outlet Animal Político was infected in 2021, according to the report. Journalist Ricardo Raphael, a columnist for news magazine Proceso and newspaper Milenio Diario who was previously targeted in 2016 and 2017, was hacked with Pegasus at least three times in October and December 2019 and again in December 2020.

According to Citizen Lab, the more recent cases differ from previous use of Pegasus against Mexican journalists in several ways, including the use of zero-click attacks rather than malicious text messages designed to trick targets into clicking on links triggering an infection.

CPJ has documented how spyware is used to target journalists and those close to them worldwide, including repeated cases of Pegasus infections targeting journalists in Mexico, and has called for a moratorium on its trade pending better safeguards.

Israeli firm NSO Group says it only licenses its Pegasus spyware to government agencies investigating crime and terrorism. Mexican president López Obrador said in his daily press conferences earlier today that his government may address the revelations later this week.


This content originally appeared on Committee to Protect Journalists and was authored by Committee to Protect Journalists.

]]>
https://www.radiofree.org/2022/10/03/at-least-2-mexican-journalists-targeted-by-pegasus-spyware-since-lopez-obrador-took-office/feed/ 0 338193
Amit Malviya’s claim that the SC did not allege “non-cooperation” by the govt during Pegasus probe is misleading https://www.radiofree.org/2022/08/29/amit-malviyas-claim-that-the-sc-did-not-allege-non-cooperation-by-the-govt-during-pegasus-probe-is-misleading/ https://www.radiofree.org/2022/08/29/amit-malviyas-claim-that-the-sc-did-not-allege-non-cooperation-by-the-govt-during-pegasus-probe-is-misleading/#respond Mon, 29 Aug 2022 12:03:40 +0000 https://www.altnews.in/?p=126635 On August 25, Bhartiya Janata Party (BJP) leader and the in-charge of BJP’s National Information & Technology Department Amit Malviya tweeted, “Is having an IQ lower than Rahul Gandhi’s a...

The post Amit Malviya’s claim that the SC did not allege “non-cooperation” by the govt during Pegasus probe is misleading appeared first on Alt News.

]]>
On August 25, Bhartiya Janata Party (BJP) leader and the in-charge of BJP’s National Information & Technology Department Amit Malviya tweeted, “Is having an IQ lower than Rahul Gandhi’s a prerequisite for being in Congress? The SC hasn’t alleged non cooperation by central Govt in the Pegasus case. It has merely said the stand of the Govt has been the same before the committee as well as the Supreme Court. Read the order.” This tweet by Malviya garnered more than 900 likes and close to 300 retweets.

Malviya’s tweet was in reference to the tweet by the Indian National Congress about the hearing of the Pegasus case in the Supreme Court on Thursday, August 25, by a bench headed by outgoing Chief Justice of India NV Ramana, Justice Surya Kant and Justice Hima Kohli.

Amit Malviya claimed in his tweet that the court had merely said that the government’s stand continues to remain the same and it did not allege “non-cooperation” by the central government. The tweet by Malviya also takes a dig at Congress leader Rahul Gandhi. It is important to note that Amit Malyvia’s tweet does not explain what “stand” of the government was being referred to by the apex court.

Fact-check

On October 27, 2021, the Supreme Court formed a three-member expert committee to look into the alleged misuse of Israeli spyware Pegasus by the Union Government for targeted surveillance on selected opposition leaders, activists, journalists and others as reported first by The Wire as part of the Pegasus Project. The report claimed a digital forensic analysis conducted by Amnesty International’s Security Lab had allegedly found that the phones of dozens of people were either targeted or had been infected by Pegasus spyware, sold by Israel’s NSO Group.

The committee, monitored by former apex court judge R V Raveendran submitted its final report to the top court on August 2, 2022, in three parts — two parts by the technical committee and one by the retired judge overseeing the probe. On August 25, the three-judge bench heard the matter.

Alt News went through the Twitter thread by Live Law (@LiveLawIndia) and Bar&Bench (@barandbench), two digital news agencies that reported the hearing live on Twitter. These threads noted that while going through the report, the CJI read out parts of it and made the oral observation in the packed courtroom that the government had not cooperated with the investigation. He then told solicitor general Tushar Mehta that the Union government had taken the same stand in front of the investigation committee as it did in the apex court earlier, i.e., of non-cooperation with the probe. To this, the SG replied that he was not aware of it.

This oral observation made by the court was also widely reported by media outlets such as The Telegraph, Scroll, The Wire and The Indian Express.

Click to view slideshow.

What is Central Government’s ‘stand’?

Through the portal Indian Kanoon, Alt News got access to the order passed by the Supreme Court in October 2021 where the CJI-led bench had commented on the said ‘stand’ of the Union government. “However, despite the repeated assurances and opportunities given, ultimately the Respondent­Union of India has placed on record what they call a “limited affidavit”, which does not shed any light on their stand or provide any clarity as to the facts of the matter at hand. If the Respondent­Union of India had made their stand clear it would have been a different situation, and the burden on us would have been different. Such a course of action taken by the Respondent Union of India, especially in proceedings of the present nature which touches upon the fundamental rights of the citizens of the country, cannot be accepted,” it had said, adding, “They must justify the stand that they take before a Court. The mere invocation of national security by the State does not render the Court a mute spectator.”

To further understand the observation made by the court in its August 25 hearing, we reached out to two independent sources. Senior advocate Vrinda Grover, who was present in the courtroom during the hearing confirmed that the CJI had orally remarked that the government had not cooperated with the investigation. “CJI Ramana, in open court, read out only a part of the technical committee report. During the hearing the CJI orally remarked that it was noted in the report that the Government of India has not cooperated with the probe,” she told Alt News.

Manu Sebastian, the managing editor of Live Law who attended the proceedings virtually (Journalists only had virtual access to the hearing) and reported them live, too, confirmed that quoting the committee’s report, the CJI said the Union government had not cooperated with the committee.

“After reading out parts of the report filed by the SC-appointed committee, the CJI made some oral observations. For example, he said the committee had examined 29 phones, and malwares were found in five. Then he observed that the committee has said in its report that the Government of India has not cooperated with the probe,” Sebastian said.

It is important to note that the last line of Malviya’s tweet — ‘Read the Order’ — seems to suggest that the order throws some light on the government’s stand before the SC and the committee. The record of proceedings, uploaded on the SC website, however, does not mention anything along those lines. The order only says;

“1. Pursuant to order dated 27.10.2021, the Technical Committee and the Overseeing Judge have submitted their Reports in sealed covers. The same are taken on record. The sealed covers were opened in the Court and we read out some portions of the said Reports. Thereafter, the Reports were re-sealed and kept in the safe custody of the Secretary General of this Court, who shall make it available as and when required by the Court. 2. Heard learned Senior counsel appearing on behalf of the parties and Mr. Manohar Lal Sharma, the petitioner-in-person, as also learned Solicitor General appearing on behalf of the Union of India. 3. List these matters after four weeks for further hearing.”

In summary, Amit Malviya’s tweet regarding the oral observations made by the court during the Pegasus hearing is misleading and full of ambiguities. The CJI while reading a part of the technical committee’s report made an oral remark that it was noted in the report that the Government of India has not cooperated with the probe.

The post Amit Malviya’s claim that the SC did not allege “non-cooperation” by the govt during Pegasus probe is misleading appeared first on Alt News.


This content originally appeared on Alt News and was authored by Indradeep Bhattacharyya.

]]>
https://www.radiofree.org/2022/08/29/amit-malviyas-claim-that-the-sc-did-not-allege-non-cooperation-by-the-govt-during-pegasus-probe-is-misleading/feed/ 0 327347
CPJ joins letters urging U.S. government to hold NSO Group accountable on spyware https://www.radiofree.org/2022/08/25/cpj-joins-letters-urging-u-s-government-to-hold-nso-group-accountable-on-spyware/ https://www.radiofree.org/2022/08/25/cpj-joins-letters-urging-u-s-government-to-hold-nso-group-accountable-on-spyware/#respond Thu, 25 Aug 2022 15:43:58 +0000 https://cpj.org/?p=225638 The Committee to Protect Journalists joined human rights and press freedom organizations in separate actions in August urging the United States government to hold NSO Group accountable for providing Pegasus spyware to governments that have used the tool to secretly surveil journalists around the world.

In a joint letter to Acting Solicitor General Brian Fletcher on August 3, the groups argued that Israeli-owned NSO Group should not enjoy sovereign immunity. The letter concerns a lawsuit WhatsApp and its parent Facebook, now called Meta Platforms Inc., filed in October 2019 alleging NSO Group used WhatsApp’s servers to deliver Pegasus spyware to the devices of more than 1,400 users. NSO Group says it only licenses its Pegasus spyware to government agencies investigating crime and terrorism and claims that it should avoid accountability in U.S. courts because it acted as an agent of foreign governments under the doctrine of sovereign immunity.

In December 2020, CPJ joined an amicus brief to the U.S. Federal 9th Circuit Court urging the court to reject this argument. Following an appeal by NSO Group, in June 2022 the U.S. Supreme Court asked the solicitor general to file a brief regarding whether it should grant NSO Group’s petition for sovereign immunity.

As our letter argues, “The impact of such a finding would be that U.S. persons, including U.S.-based technology companies, on whose technologies civil society and regular users depend on across the world, and who are entitled to the protection of American laws, would be left without an effective remedy and unfettered violations of citizens’ right to privacy would be rampant.” You can read the full letter here.

In a second letter, sent Wednesday, August 23, to Secretary of Commerce Gina M. Raimondo, CPJ joined other groups in urging the Biden administration to keep NSO Group on the Entity List for Malicious Cyber Activities. The Entity List is a tool used by the Department of Commerce’s Bureau of Industry and Security to limit a designee’s access to U.S. exports. NSO was added to this list in November 2021, but reporting suggests both NSO and the Israeli government are lobbying to have the company removed. The joint letter details reporting about the use of Pegasus against journalists and activists since the original listing.

“The evidence of the use of Pegasus spyware against human rights defenders, journalists, opposition parties, and state officials by repressive regimes continues to mount, contrary to NSO Group’s claim that their spyware is used as a tool for investigating criminal activity and terrorism,” the letter states. You can read the full letter here.


This content originally appeared on Committee to Protect Journalists and was authored by Michael De Dora.

]]>
https://www.radiofree.org/2022/08/25/cpj-joins-letters-urging-u-s-government-to-hold-nso-group-accountable-on-spyware/feed/ 0 326433
‘Permanent fear’: Togolese journalists on their lives 1 year after Pegasus Project revelations https://www.radiofree.org/2022/07/18/permanent-fear-togolese-journalists-on-their-lives-1-year-after-pegasus-project-revelations/ https://www.radiofree.org/2022/07/18/permanent-fear-togolese-journalists-on-their-lives-1-year-after-pegasus-project-revelations/#respond Mon, 18 Jul 2022 17:33:59 +0000 https://cpj.org/?p=209953 One year after news broke about a list of over 50,000 phone numbers allegedly selected for surveillance with Pegasus spyware, journalists around the world continue to live and work with the fear that their phones can be used to track their conversations and penetrate all the personal and professional data stored on their devices.

The Pegasus Project, an investigation by Amnesty International and a consortium of media outlets coordinated by Forbidden Stories, revealed in July 2021 that at least 180 journalists were among those from over 50 countries who may have been targeted with the sophisticated surveillance software.

Three journalists from the West African country of Togo were included on the Pegasus Project list. They told CPJ at the time about how the revelations had caused “nightmarish nights” and damage to their personal as well as professional lives. Twelve months on, they say the prospect of being monitored still generates pervasive paranoia and hinders their communications with sources.

“Since I heard this news until today I can no longer easily communicate with my phone,” Ferdinand Ayité, director of L’Alternative newspaper, recently told CPJ about the implications of his phone number being listed. “There is a kind of permanent fear that forces me to change my means of communication.”

That fear is aggravated as Togolese authorities intensify their crackdown on independent press since the Pegasus Project revelations.

NSO Group, the Israeli company that sells the Pegasus spyware, has denied any connection to the Pegasus Project list and has said it only sells spyware to governments to fight terrorism and crime. However, research shows that journalists and those close to them have been targeted, along with activists and politicians, around the world.

Citizen Lab, a University of Toronto-based research group, found Togolese clergy had been selected for Pegasus surveillance in 2019. Similarly, Amnesty International reported that a Togolese human rights defender, who requested anonymity for security reasons, had been targeted with a different, Indian-made spyware in late 2019 and early 2020.

Ayité, like other journalists whose phones were reportedly listed for potential surveillance in countries ranging from Morocco to Mexico to India to Hungary, said the disclosures had affected their ability to work. “Sources treat us differently. Several people are reluctant to take our phone calls, and we are forced to proceed otherwise,” he said. “Personally, I no longer call certain sources…To this day I continue to think that my communications are always followed and listened to and this has a negative impact on the work.”

Ayité and two other journalists⁠—Komlanvi Ketohou and Luc Abaki⁠—whose contacts featured among the over 300 Togolese phone numbers on the Pegasus Project list, have not confirmed if their devices were ever infected with the spyware. But they told CPJ how the threat of surveillance shaped their broader concerns about freedom of expression in Togo. Spyware was just one of the reasons the Togolese Press Patronage (PPT), a local association of media owners, called 2021 the “darkest [year] of the democratic era in Togo in terms of press freedom.”

Days after he learned that his number had been listed, Ayité told CPJ he was not surprised and described himself as “a journalist on borrowed time.” Less than six months later, in early December 2021, police arrested Ayité and Fraternité newspaper director Joël Egah, and detained them for over 20 days on accusations of “contempt of authorities” and “propagation of falsehoods.” Ayité said authorities retained his passport until mid-June; Egah died of a heart attack in March.

In May, Ayité and his newspaper lost their appeal of a separate defamation case. The ruling they sought to reverse had ordered them each to pay 2 million West African francs (US $3,703) in damages over a June 2020 report accusing a local official of embezzlement. Ayité said he and his legal team were preparing to appeal again to Togo’s Supreme Court.

Ketohou, who also uses the first name Carlos, told CPJ that even a year after learning his number was listed, people still worried about being in contact with him.

“They have fear to speak with me,” Ketohou said. “Fear that what they say will be listened to by Togolese authorities.”

Even when people do agree to speak with him over the phone, Ketohou said they often request a video call to be able to see that it’s really him on the other end of the line. Ketohou recognized that this would not necessarily protect against spyware that can grant remote access to a phone’s microphone and camera, but people were looking for ways to build confidence in their communications with him.

Reached by phone on July 15, Togo communication minister Akodah Ayewouadan said the government had no connection with the NSO Group, “has not used that [Pegasus] spyware and we have not communicated on it.” Ayewouadan requested that he be sent questions in writing, but as of Monday, July 18, CPJ had not received any response to those written questions.

Months before learning his number was listed, Ketohou was arrested by Togolese police and detained for several days over a report published by his L’Indépendant Express newspaper alleging corruption by government ministers. That paper was barred from publishing following his release and he fled the country amid ongoing threats against him and his family, setting up the L’Express International news site in exile.

Living outside Togo, Ketohou told CPJ that he has remained worried about the transnational reach of the Togolese government. He said in recent months he had received video calls from numbers he did not know, which he refused to answer. Even without evidence to suggest the callers wished to harm him, Ketuhou said he feared they sought to confirm visually that it was his phone and to collect information about his location.

Luc Abaki, who works as a freelance reporter, told CPJ that while being listed in the Pegasus Project leak didn’t significantly change his private life, “certain people, especially close to power carefully avoid my calls, in particular telephone. This means that I no longer have access to certain information that is sometimes essential for the work that I do as a journalist.”

“I work conscientiously with the main objective of aiming for the common good,” Abaki said. “I always observe prudence.”


This content originally appeared on Committee to Protect Journalists and was authored by Jonathan Rozen/CPJ Africa Research Associate.

]]>
https://www.radiofree.org/2022/07/18/permanent-fear-togolese-journalists-on-their-lives-1-year-after-pegasus-project-revelations/feed/ 0 316179
Pegasus Spyware Maker NSO Is Conducting a Lobbying Campaign to Get Off U.S. Blacklist https://www.radiofree.org/2022/07/12/pegasus-spyware-maker-nso-is-conducting-a-lobbying-campaign-to-get-off-u-s-blacklist/ https://www.radiofree.org/2022/07/12/pegasus-spyware-maker-nso-is-conducting-a-lobbying-campaign-to-get-off-u-s-blacklist/#respond Tue, 12 Jul 2022 10:00:00 +0000 https://www.propublica.org/article/pegasus-spyware-nso-israel-blacklist-lobbying#1369228 by Uri Blau

This article is co-published with Shomrim. Shomrim is an Israel-based nonprofit and nonpartisan independent news organization.

ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published.

Israeli cybersecurity company NSO Group, the company behind the notorious Pegasus spyware, has been conducting a broad campaign in the United States to get off the U.S. government’s blacklist.

Pegasus is a hacking tool that could be used to vacuum up a phone’s contents remotely without the target having to fall into a phishing trap by clicking on a deceptive link. The spyware can even use the phone to remotely track and record its user.

The Biden administration added NSO to a Commerce Department list of restricted companies last November after a series of investigations revealed that Pegasus had been used by foreign governments against journalists and human rights activists. A forensic analysis from last July, for example, revealed that two people close to journalist Jamal Khashoggi were targeted by the spyware before and after his assassination in October 2018. Khashoggi, an exiled Saudi Arabian journalist and American resident, was murdered in Turkey by Saudi authorities. The NSO Group has said its technology “was not associated in any way with the heinous murder of Jamal Khashoggi.”

NSO has invested hundreds of thousands of dollars in the past year in payments to lobbyists, public relations companies and law firms in the U.S., in the hope of reversing the Biden administration’s November decision, according to public records filed under the Foreign Agent Registration Act and conversations with people familiar with the effort. These firms have approached members of the U.S. House and Senate, as well as various media outlets and think tanks across the U.S., on NSO’s behalf.

Companies on the Commerce Department’s blacklist, officially called the “Entity List,” are not completely prohibited from doing business in the U.S. However, they are subject to licensing and other trade restrictions, making it more difficult to conduct business in the country or with Americans. NSO’s business has reportedly suffered since the designation.

NSO is trying to get the matter raised during a meeting between U.S. President Joe Biden and Israeli Prime Minister Yair Lapid when the former visits Israel this week. In addition, NSO lobbyists unsuccessfully tried to set up a meeting between representatives of the company and U.S. National Security Adviser Jake Sullivan, but it did not take place.

Asked for comment, an NSO spokesperson declined to comment on the campaign but “thanked” Shomrim for publishing an article on its efforts, which he described as “supportive.”

The American military contractor L3Harris also held talks to try to purchase NSO, with backing from the Defense Department, according to The New York Times. L3Harris has abandoned the effort, the paper said.

Placement on the Entity List is a serious sanction but less significant than being placed on the Specially Designated Nationals list. In the past, companies have won removal from the Entity List after settling charges with the U.S. government and promising reforms.

NSO said at the time of the U.S. administration’s decision to add it to the list that it would work to have the move reversed. Public records show that the firm started recruiting various North American consultants even before it was blacklisted. In July last year, it hired the Pillsbury Winthrop Shaw Pittman law firm to advise it on tenders and various compliance requirements in the United States. The firm was initially hired for six months at a cost of about $75,000 per month. NSO continued to retain its services at least into the first half of 2022.

Pillsbury then hired strategic advisory group Chartwell for six months at a cost of $50,000 to $75,000 per month, according to public records. Chartwell met with representatives of the House Intelligence Committee, whose members called last year for more serious sanctions of NSO under the Magnitsky Act. The lobbying firm also approached, among others, Senators Mitt Romney, R-Utah, and Mike Rounds, R-S.D., as well as Reps. Tom Malinowski, D-N.J. and Mike Turner, R-Ohio. Romney, Rounds, Malinowsky and Turner did not respond to a request for comment. Chartwell has also reached out to various media outlets on behalf of NSO, and distributed material in which the company reiterated its assurances that it would investigate any misuse of its products.

In January 2022, the company hired the services of the Paul Hastings law firm for $10,000 a month. Hastings then had a call with Sen. Ron Wyden, D-Ore., on behalf of NSO. Moreover, less than four months ago, NSO signed an agreement with Washington, D.C.-based public relations and media consulting firm Bluelight Strategies, which has strong ties with the Democratic Party. The firm’s managing director, Aaron Keyak, went on unpaid leave to join Biden’s campaign staff in July 2020 and currently serves as the State Department’s deputy special envoy to combat and monitor antisemitism. NSO paid Bluelight $100,000 in February for two months of work, with an option to extend the contract for $50,000 a month.

The contract between the parties, signed by NSO founder Shalev Hulio and Bluelight President Steve Rabinowitz, also allows Bluelight to hire a subconsultant at a cost of up to $20,000 a month. “NSO’s tools provide limited and specifically targeted intelligence capabilities that have been repeatedly used for instance to help rescue scores of children from human trafficking as well as stopping numerous terrorist attacks,” wrote Brian E. Finch, a partner at Pillsbury, to Rep. Malinowsky earlier this year. “NSO’s Pegasus customers are solely law enforcement and intelligence agencies, and by far are mainly democratic allies of the U.S. and Israel in Western Europe,” he added.

NSO Group “worries about improper or otherwise abusive use of its tools against journalists, human rights advocates, and others,” wrote Finch. “NSO has strict protocols in place to avoid misuse of its products and to terminate access to such products in cases where misuse has been alleged.” The attorney wrote that “NSO stands ready and willing to work with the U.S. government to identify and develop global standards that reflect shared values — protecting citizens of the United States and safeguarding human rights and privacy concerns.”

In a different letter distributed by the firm this year, NSO states it has “developed a human rights governance compliance program,” saying it would conduct a review of all users to see whether they might use the technology used to “violate human rights.”

Pillsbury, Chartwell, Paul Hastings and Bluelight did not respond to a request for comment. The Department of Commerce did not respond to a request for comment.

NSO representatives have approached various people within the administration in order to get a clear understanding of what steps the company could and should take to be taken off the blacklist. They presented NSO’s “kill switch,” which allows the company to terminate contracts when their product is misused, and have warned that if NSO shuts down, Chinese and Russian companies will take its place. So far, the lobbying campaign has generated little response. NSO has not been told what it needs to do to remove itself from the list, according to the people familiar with the campaign.


This content originally appeared on Articles and Investigations - ProPublica and was authored by by Uri Blau.

]]>
https://www.radiofree.org/2022/07/12/pegasus-spyware-maker-nso-is-conducting-a-lobbying-campaign-to-get-off-u-s-blacklist/feed/ 0 314576
Rogues and Spyware: Pegasus Strikes Again https://www.radiofree.org/2022/05/17/rogues-and-spyware-pegasus-strikes-again/ https://www.radiofree.org/2022/05/17/rogues-and-spyware-pegasus-strikes-again/#respond Tue, 17 May 2022 08:55:55 +0000 https://www.counterpunch.org/?p=243500 Weapons, lacking sentience and moral orientation, are there to be used by all.  Once out, these creations can never be rebottled.  Effective spyware, that most malicious of surveillance tools, is one such creation, available to entities and governments of all stripes.  The targets are standard: dissidents, journalists, legislators, activists, even the odd jurist. Pegasus spyware, More

The post Rogues and Spyware: Pegasus Strikes Again appeared first on CounterPunch.org.


This content originally appeared on CounterPunch.org and was authored by Binoy Kampmark.

]]>
https://www.radiofree.org/2022/05/17/rogues-and-spyware-pegasus-strikes-again/feed/ 0 299356
Rogues and Spyware: Pegasus Strikes in Spain https://www.radiofree.org/2022/05/14/rogues-and-spyware-pegasus-strikes-in-spain/ https://www.radiofree.org/2022/05/14/rogues-and-spyware-pegasus-strikes-in-spain/#respond Sat, 14 May 2022 11:54:09 +0000 https://dissidentvoice.org/?p=129603 Weapons, lacking sentience and moral orientation, are there to be used by all.  Once out, these creations can never be rebottled.  Effective spyware, that most malicious of surveillance tools, is one such creation, available to entities and governments of all stripes.  The targets are standard: dissidents, journalists, legislators, activists, even the odd jurist. Pegasus spyware, […]

The post Rogues and Spyware: Pegasus Strikes in Spain first appeared on Dissident Voice.]]>
Weapons, lacking sentience and moral orientation, are there to be used by all.  Once out, these creations can never be rebottled.  Effective spyware, that most malicious of surveillance tools, is one such creation, available to entities and governments of all stripes.  The targets are standard: dissidents, journalists, legislators, activists, even the odd jurist.

Pegasus spyware, the fiendishly effective creation of Israel’s unscrupulous NSO Group, has become something of a regular in the news cycles on cyber security.  Created in 2010, it was the brainchild of three engineers who had cut their teeth working for the cyber outfit Unit 8200 of the Israeli Defence Forces: Niv Carmi, Shalev Hulio and Omri Lavie.

NSO found itself at the vanguard of an Israeli charm offensive, regularly hosting officials from Mossad at its headquarters in Herzliya in the company of delegations from African and Arab countries.  Cyber capabilities would be one way of getting into their good books.

The record of the company was such as to pique the interest of the US Department of Commerce, which announced last November that it would be adding NSO Group and another Israeli cyber company Candiru (now renamed Saito Tech) to its entity list “based on evidence that these entities developed and supplied spyware to foreign governments that used these tools to maliciously target government officials, journalists, businesspeople, activists, academics, and embassy workers.”

In July 2021, the Pegasus Project, an initiative of 17 media organisations and civil society groups, revealed that 50,000 phone numbers of interest to a number of governments had appeared on a list of hackable targets.  All had been targets of Pegasus.

The government clients of the NSO Group are extensive, spanning the authoritarian and liberal democratic spectrum.  Most notoriously, Pegasus has found its way into the surveillance armoury of the Kingdom of Saudi Arabia, which allegedly monitored calls made by the murdered Saudi journalist Jamal Khashoggi and a fellow dissident, Omar Abdulaziz.  In October 2018, Khashoggi, on orders of Saudi Arabia’s Crown Prince Mohammed bin Salman, was butchered on the grounds of the Saudi consulate in Istanbul by a hit squad. NSO subsequently became the subject of a legal suit, with lawyers for Abdulaziz arguing that the hacking of his phone “contributed in a significant manner to the decision to murder Mr Khashoggi.”

Spain’s Prime Minister Pedro Sánchez, Defence Minister Margarita Robles, Interior Minister Fernando Grande-Marlaska, and 18 Catalan separatists are the latest high-profile targets to feature in the Pegasus canon.  Sánchez’s phone was hacked twice in May 2021, with officials claiming that there was at least one data leak.  This was the result of, according to the government, an “illicit and external” operation, conducted by bodies with no state authorisation.

Ironically enough, Robles herself had defended the targeting of the 18 Catalan separatists, claiming that the surveillance was conducted with court approval.  “In this country,” she insisted at a press conference, “no-one is investigated for their political ideals.”

The backdrop of the entire scandal is even more sinister, with Citizen Lab revealing last month that over 60 Catalan legislators, jurists, Members of the European Parliament, journalists and family members were targeted by the Pegasus spyware between 2015 and 2020.  (Citizen Lab found that 63 individuals had been targeted or infected with Pegasus, with four others being the victims of the Candiru spyware.)  Confirmed targets include Elisenda Paluzie and Sònia Urpí Garcia, who both work for the Assemblea Nacional Catalana, an organisation that campaigns for the independence of Catalonia.

The phone of Catalan journalist Meritxell Bonet was also hacked in June 2019 during the final days of a Supreme Court case against her husband Jordi Cuixart.  Cuixart, former president of the Catalan association Òmnium Cultural, was charged and sentenced on grounds of sedition.

The investigation by Citizen Lab did not conclusively attribute “the operations to a specific entity, but strong circumstantial evidence suggests a nexus with Spanish authorities.”  Amnesty International Technology and Human Rights researcher Likhita Banerji put the case simply. “The Spanish government needs to come clean over whether or not it is a customer of NSO Group.  It must also conduct a thorough, independent investigation into the use of Pegasus spyware against the Catalans identified in this investigation.”

Heads were bound to roll, and the main casualty in this affair was the first woman to head Spain’s CNI intelligence agency, Paz Esteban.  Esteban’s defence of the Catalan hackings proved identical to that of Robles: they had been done with judicial and legal approval.  But she needed a scalp for an increasingly embarrassing situation and had no desire to have her reasons parroted back to her.  “You speak of dismissal,” she stated tersely, “I speak of substitution.”

While the implications for the Spanish government are distinctly smelly, one should not forget who the Victor Frankenstein here is.  NSO has had a few scrapes in Israel itself.  It survived a lawsuit by Amnesty International in 2020 to review its security export license.  But there is little danger of that company losing the support of Israel’s Ministry of Defence.  In Israel, cybersecurity continues to be the poster child of technological prowess, lucrative, opaque and distinctly unaccountable to parliamentarians and the courts.

The post Rogues and Spyware: Pegasus Strikes in Spain first appeared on Dissident Voice.


This content originally appeared on Dissident Voice and was authored by Binoy Kampmark.

]]>
https://www.radiofree.org/2022/05/14/rogues-and-spyware-pegasus-strikes-in-spain/feed/ 0 298870
CPJ joins call for Indian government to end attacks on the press https://www.radiofree.org/2022/05/03/cpj-joins-call-for-indian-government-to-end-attacks-on-the-press/ https://www.radiofree.org/2022/05/03/cpj-joins-call-for-indian-government-to-end-attacks-on-the-press/#respond Tue, 03 May 2022 13:35:08 +0000 https://cpj.org/?p=189777 On World Press Freedom Day, Tuesday, May 3, the Committee to Protect Journalists joined nine other press freedom and human rights organizations in a statement calling on the government of India, led by the Hindu right-wing Bharatiya Janata Party, to address the rapidly deteriorating state of press freedom throughout the country and in Indian-administered Jammu and Kashmir.

The statement calls on authorities to release all journalists detained for their work, including Fahad Shah, Sajad Gul, and Aasif Sultan, who were granted bail but then re-arrested this year under the Jammu and Kashmir Public Safety Act, a preventative detention law. The groups also expressed concern about the use of spurious terrorism and sedition charges against members of the press including journalist Siddique Kappan, who has been detained since October 2020.

The statement notes that journalists belonging to minority communities are particularly vulnerable to harassment and retaliation. In January, a demeaning fake auction app was taken offline after it listed at least 20 female Muslim journalists for “sale,” all of whom covered the BJP government’s policies affecting religious minorities.

The statement also expresses concern about the use of Pegasus spyware to monitor journalists’ digital communications. The Pegasus Project has identified more than 40 Indian journalists who appeared on a leaked list of potential targets for surveillance by the spyware, which is produced by the Israeli company NSO Group. In October 2021, the Supreme Court of India ordered a “thorough inquiry” on the government’s alleged use of Pegasus against journalists and others.

Read the statement here.


This content originally appeared on Committee to Protect Journalists and was authored by Erik Crouch.

]]>
https://www.radiofree.org/2022/05/03/cpj-joins-call-for-indian-government-to-end-attacks-on-the-press/feed/ 0 295612
At least 2 Jordanian journalists targeted by Pegasus spyware https://www.radiofree.org/2022/04/06/at-least-2-jordanian-journalists-targeted-by-pegasus-spyware/ https://www.radiofree.org/2022/04/06/at-least-2-jordanian-journalists-targeted-by-pegasus-spyware/#respond Wed, 06 Apr 2022 13:34:59 +0000 https://cpj.org/?p=182952 Beirut, April 6, 2022 – Jordanian authorities should conduct a swift and thorough investigation into allegations that two journalists were targeted with Pegasus spyware, the Committee to Protect Journalists said Wednesday.

Throughout 2021, Suhair Jaradat, a freelance columnist for media outlets including the London-based Arabic news website Today’s Opinion, was repeatedly targeted by the spyware, according to a joint report published on Tuesday, April 5, by the human rights group Front Line Defenders and digital rights group Citizen Lab, as well as Jaradat, who spoke to CPJ in a phone interview.

From February to December of that year, Jaradat’s phone was infected with Pegasus spyware on at least six separate occasions, according to the journalist and that report.

The report states that a second journalist, who also works as a human rights activist, had her phone infected by the spyware at least twice in 2021; the report does not name that journalist, and CPJ was unable to immediately identify them.

“Jordanian authorities must swiftly and transparently investigate the alleged surveillance of journalist Suhair Jaradat and a second unidentified journalist, and ensure those responsible are held to account,” said Sherif Mansour, CPJ’s Middle East and North Africa program coordinator. “Journalists must be able to work without fear that hackers will gain access to their sources or their private lives.”

Jaradat told CPJ that she discovered her phone had been infected in May 2021, and officers with the local Criminal Investigation Department’s cybercrime unit were able to remove the spyware from her device. At a cybersecurity conference in February 2022, she again found that her phone had been compromised, she said. The Front Line Defenders and Citizen Lab report said that a forensic examination of her phone showed that it had been infected with Pegasus six times from February to December of 2021.

The joint report said that researchers suspected two groups of hackers were behind the campaigns targeting Jaradat, that anonymous journalist, and human rights advocates in Jordan. One of those groups was focused entirely on Jordan, and the other also had activities in Iraq, Lebanon, and Saudi Arabia. Front Line Defenders and Citizen Lab wrote that both groups were “likely agencies of the Jordanian government.” CPJ was unable to immediately determine the origin of the spyware infections.

When CPJ contacted Jordanian Ministry of Information manager Dina Doud via messaging app for comment, she referred CPJ to a statement published by the country’s National Cyber Security Center, which denied any government involvement in the use of spyware against journalists, and said it would have been illegal for authorities to have been involved in such activities.

Jaradat noted, “In Jordan, authorities stated before that they don’t use this spyware, and that people inside the Royal Court were also attacked by it. Then who is behind this attack?”

Jaradat writes commentary about Jordanian politics, and is often critical of authorities. She has covered topics including sedition, the silencing of the country’s political opposition, and the recent arrests of political and union figures.

“I can’t think of a reason but my articles” for prompting the hack, Jaradat told CPJ. “I don’t know for sure, but I can analyze that the goal behind affecting my phone with a spyware is to reach my sources or the people I work with.”

She added that the hack could be “a way of pressuring me to stop writing.”

CPJ has documented the use of Pegasus, spyware software made by the Israeli company NSO Group, to target journalists around the world and monitor their phones’ cameras, microphones, emails, texts, and calls. Journalists have been targeted with the software in Morocco, the United Arab Emirates, and Saudi Arabia, among other countries.

CPJ emailed NSO Group for comment, but received no response. NSO Group says it only licenses its Pegasus spyware to government agencies investigating crime and terrorism.


This content originally appeared on Committee to Protect Journalists and was authored by Erik Crouch.

]]>
https://www.radiofree.org/2022/04/06/at-least-2-jordanian-journalists-targeted-by-pegasus-spyware/feed/ 0 288373
Israeli journalists call for spyware exemption after Israel denies illegal Pegasus use https://www.radiofree.org/2022/03/28/israeli-journalists-call-for-spyware-exemption-after-israel-denies-illegal-pegasus-use/ https://www.radiofree.org/2022/03/28/israeli-journalists-call-for-spyware-exemption-after-israel-denies-illegal-pegasus-use/#respond Mon, 28 Mar 2022 21:00:38 +0000 https://cpj.org/?p=180392 As Israel grapples with the aftermath of explosive allegations that police illegally spied on dozens of Israelis, the country’s journalists are calling to be exempt from possible future legislation to oversee surveillance of citizens through spyware.

Israel’s justice ministry last month denied a report by Israeli tech site Calcalist about the allegedly unlawful use of Pegasus spyware by Israeli police. An internal investigation determined that the claims, which newspapers including The New York Times could not replicate, were largely unfounded.

However, the furor over the Calcalist report, and the ministry’s acknowledgement that police had used spyware on a phone belonging to a key witness in the corruption trial of former Prime Minister Benjamin Netanyahu, has prompted fears among journalists that any overhaul of Israel’s surveillance laws could hamper their reporting.

“We want to protect our sources,” said Anat Saragusti, press freedom director at the Union of Journalists in Israel, which sent a letter to the attorney general with the group’s demand. “We want to protect freedom of information, and we want to protect our assets.” 

A February statement from the justice ministry noted that in 2018 police infiltrated a phone belonging to Shlomo Filber, a now former director general of the Communications Ministry who was under investigation at the time. He is now state’s witness in the Netanyahu trial. 

In order to monitor Filber’s phone, police obtained a wiretapping warrant – a particular detail that raised the eyebrows of legal experts in the country.

“It’s unclear what exactly is the legal basis for what [police] have done,” said Michael Birnhack, a privacy law professor at Tel Aviv University. 

Israel has no law authorizing “cyber-tools” like spyware for law enforcement purposes, according to the Israel Democracy Institute – and the wiretapping law cited to monitor Filber’s phone dates back to 1979.

The decades-old wiretap law, said Birnhack, is an ill-fit to authorize spyware given that the technology can do so much more than listen in on calls – it can suck up old data in the form of texts, photos, voice memos, and more, without the owner’s knowledge. 

“The technological options exceed regular search and they exceed wiretapping,” he said.  

With spyware there’s also a risk of “exposing excessive data” beyond the scope of a warrant, said Birnhack — something that happened in Filber’s case.

According to the justice ministry, police acquired extra information like Filber’s contact list, which they said was not passed on to investigators. (The ministry also said that the spyware infiltration did not yield anything relevant to the investigation.)

Even if journalists are exempted from legislation regulating spyware, police use of the technology has implications for the profession. Anat Ben-David, a professor of society and technology at Israel’s Open University, worries about a chilling effect on the press. 

“This is uncharted territory at the moment, but I will say this: just knowing that this is a possibility could lead to self-censorship and to changing journalistic norms and instilling fear.”

Ben-David questions whether the technology belongs in the hands of police at all, given its extreme prying capabilities. 

Pegasus, made by the NSO Group – an Israeli company now under U.S. trade embargo – allows the purchaser to access virtually everything stored on a cell phone and activate its microphone and camera without the owner’s knowledge.

CPJ has documented the use of Pegasus to spy on journalists around the world. Amnesty International and the University of Toronto’s CitizenLab said it was found on Palestinian activists’ phones, though Israel has denied it was behind the alleged hacks.

The justice ministry did not identify Pegasus as the spyware used on Filber’s phone, but a later statement made it clear that Israeli police do have the controversial technology. The police department, said the statement, did not use the “Pegasus software in its hands” to spy without a warrant on the people named in the Calcalist report.

NSO Group spokesperson Liron Bruck replied “no comment” when CPJ asked in an email if it provided Pegasus or other spyware to Israeli police or other authorities. An Israeli police spokesperson said in an email the department could not “confirm or deny” use of Pegasus.

Ben-David also worries that the impetus to legislate spyware is following a pattern in which Israel introduces new monitoring technology and later legalizes its use against citizens.

“Surveillance technologies are introduced through the back door, and after petitions to the Supreme Court they enter through the front door through legislation,” said Ben-David.  

She pointed to the security services’ tracking of cell phones to curb transmission of COVID-19. After repeated legal challenges from civil rights groups, the Israeli Knesset passed a law approving the tracking. In March 2021, Israel’s Supreme Court outlawed the practice for Israelis who cooperated with contact tracing efforts, though it was briefly reinstated by emergency order to counter the Omicron variant.

Journalists, however, had been exempted from the tracking since April 2020 after a petition from the Union of Journalists, the group that wants to make sure the press is excluded from spyware laws.

Israeli journalists do have some protections. A 1987 Supreme Court ruling said that journalists don’t have to reveal their sources unless a court deems it critical to prevent a crime or save a life.

But journalists can find their sources exposed through other means. Police obtained information about Filber’s calls with two Israeli broadcast journalists, Amit Segal of Channel 12 and Raviv Drucker of Channel 13, when it spied on Filber’s phone, according to Haaretz.

Segal told CPJ that he learned that his interviews were snooped on from the newspaper, while Drucker learned about his exposure in the course of his own reporting. A justice ministry spokesperson would not confirm or deny the Haaretz report in a phone call with CPJ.

It’s not clear if police used spyware or another type of monitoring technology to listen in on the calls with the journalists.

Regardless of the method used, Segal told CPJ it was “not very pleasant” to learn that police had accessed his interviews with Filber, especially since he reports critically on the police.

“They shouldn’t wiretap conversations with journalists,” said Segal, who added that police are not supposed to transcribe conversations between journalists and their sources. “It is not OK, but it is not the most severe attack on journalists the world has ever seen.” 

Drucker, for his part, called it a “breach of the journalistic relationship between a source and a journalist.” A private conversation with a source “is not something that should be exposed.”

Drucker added that he hopes lawmakers considering surveillance legislation “will take into account the interest of the free press and the free media and journalists’ ability to do their work.”

Now, Segal, Drucker, and the Israeli press corps at large, are watching to see if the government will heed their concerns.   


This content originally appeared on Committee to Protect Journalists and was authored by Naomi Zeveloff/CPJ Features Editor.

]]>
https://www.radiofree.org/2022/03/28/israeli-journalists-call-for-spyware-exemption-after-israel-denies-illegal-pegasus-use/feed/ 0 285860
CPJ calls on European Parliament to take global lead on ending spyware abuse https://www.radiofree.org/2022/03/08/cpj-calls-on-european-parliament-to-take-global-lead-on-ending-spyware-abuse/ https://www.radiofree.org/2022/03/08/cpj-calls-on-european-parliament-to-take-global-lead-on-ending-spyware-abuse/#respond Tue, 08 Mar 2022 15:52:41 +0000 https://cpj.org/?p=174148 Brussels, March 8, 2022 – The European Parliament should ensure that an upcoming investigation into Pegasus and other spyware fulfills its ambitious scope and vision, the Committee to Protect Journalists said Tuesday.

On Wednesday, members of the European Parliament are set to vote on establishing a committee to investigate how EU member states have used Pegasus spyware to monitor people, including journalists in Europe, as well as the international reach of intrusive spyware. That committee’s final report could include recommendations that would shape the EU’s approach on tackling surveillance for years to come.

“The Committee of Inquiry should leave no stone unturned in its investigation into the use of spyware, and it must do everything possible to hold EU member states and institutions, as well as international companies, to account for the surveillance of journalists,” said Tom Gibson, CPJ’s EU representative. “This is the EU’s opportunity to take an international lead on curbing the malicious use of spyware to surveil journalists.”

CPJ has reported extensively on the use of spyware to target journalists because of their work. Israel-based NSO Group, which produces Pegasus, has said it sells only to vetted governments and law enforcement agencies.

The committee’s investigation would take place as the EU also works to more closely monitor press freedom trends in member states through its rule of law mechanism, and to better oversee recent EU legislation on the export of dual-use surveillance technology that could be used to spy on journalists. 


This content originally appeared on Committee to Protect Journalists and was authored by Erik Crouch.

]]>
https://www.radiofree.org/2022/03/08/cpj-calls-on-european-parliament-to-take-global-lead-on-ending-spyware-abuse/feed/ 0 280037