I recall that NSO had an active "investigation" going against it by a 
multi-party coalition in the Knesset started last year during Q3. Maybe a brand 
name change or absorption into other black ops fronts? Yeah... probably.


Hacking Team Founder: ‘Hacking Team is Dead’

https://www.vice.com/en_us/article/n7wbnd/hacking-team-is-dead

The company's former CEO posted a bizarre obituary on LinkedIn saying the 
infamous surveillance firm is "definitely dead."

While Hacking Team has formally ceased to exist when it got acquired and 
rebranded in 2019, Vincenzetti’s post is the last nail in the coffin, and the 
final chapter in the company’s fall from grace. Hacking Team was founded in 
2003, and was among the very first companies to focus solely on developing 
software designed to hack and spy on computers, and later mobile phones.


Now, how many "mainstream" corporate outlets will deflect this?


BlueLeaks: Data from 200 US police departments & fusion centers published online

Activist group DDoSecrets published 296 GB of police data on Friday, June 19.

https://www.zdnet.com/article/blueleaks-data-from-200-us-police-departments-fusion-centers-published-online/


So naughty...

 - Al D. (Xander)

Co-Founder, Co-Managing Director

HIPPOGRIFF ☄ Computer Technology Protection Services

U.S. Mobile: 1-480.297.2528 | U.S. Toll Free: 1-866.273.4831

Online: www.hippogriff.IO | www.hippogriff.TECH
________________________________________
From: Yosem Companys [[email protected]]
Sent: Sunday, June 21, 2020 10:28 PM
To: LT
Subject: Journalist’s phone hacked by new ‘invisible’ technique: All he had to 
do was visit…

The white iPhone with chipped paint that Moroccan journalist Omar Radi used to 
stay in contact with his sources also allowed his government to spy on him.

They could read every email, text and website visited; listen to every phone 
call and watch every video conference; download calendar entries, monitor GPS 
coordinates, and even turn on the camera and microphone to see and hear where 
the phone was at any moment.

Yet Radi was trained in encryption and cyber security. He hadn’t clicked on any 
suspicious links and didn’t have any missed calls on WhatsApp — both 
well-documented ways a cell phone can be hacked.

Instead, a report published Monday by Amnesty International shows Radi was 
targeted by a new and frighteningly stealthy technique. All he had to do was 
visit one website. Any website.

Forensic evidence gathered by Amnesty International on Radi’s phone shows that 
it was infected by “network injection,” a fully automated method where an 
attacker intercepts a cellular signal when it makes a request to visit a 
website. In milliseconds, the web browser is diverted to a malicious site and 
spyware code is downloaded that allows remote access to everything on the 
phone. The browser then redirects to the intended website and the user is none 
the wiser.


While Amnesty could not definitively state that the Moroccan authorities were 
behind the attack, the group was able to use forensic evidence to conclude this 
was very likely the case.

The episode reveals not that authoritarian governments are actively listening 
to the calls, monitoring the web traffic and reading the emails of journalists 
and human rights activists — but that they can do so undetected.

“I kind of suspected (I was hacked),” said Radi on an encrypted video chat from 
Rabat. “The Moroccan authorities are buying every possible and imaginable 
surveillance and espionage product. They want to know everything.”

Radi is an investigative journalist who co-founded the local news site Le Desk, 
a partner with the Star in the International Consortium of Investigative 
Journalists. He specializes in the connections between politicians and business 
people as well as social movements and human rights. In other words, he’s a 
thorn in the government’s side and a prime target for surveillance, hacking and 
harassment.

https://www.thestar.com/news/canada/2020/06/21/journalists-phone-hacked-by-new-invisible-technique-all-he-had-to-do-was-visit-one-website-any-website.html

https://www.amnesty.org/en/latest/research/2020/06/moroccan-journalist-targeted-with-network-injection-attacks-using-nso-groups-tools/

-- 
Liberationtech is public & archives are searchable from any major commercial 
search engine. Violations of list guidelines will get you moderated: 
https://lists.ghserv.net/mailman/listinfo/lt. Unsubscribe, change to digest 
mode, or change password by emailing [email protected].

Reply via email to