Project Excavator Komatsu Bergetar Saat Memasang

Project Excavator Komatsu Bergetar Saat Memasang

Is this kind of surveillance legal?

This is a difficult question because of the number and nature of the jurisdictions involved. Generally, countries have the right to investigate criminal activity and monitor people they consider dangerous or criminal. In many cases, they can do this only after receiving a warrant or approval from a judge. But many of the countries that use NSO Group’s software score poorly on measures of rule of law and respect for human rights, making abuses possible even when the formalities are observed. The large number of politicians, journalists, activists, and academics on the leaked lists suggest that some countries were surveilling people for political or other illegitimate purposes.

There is also the issue of NSO Group’s exploitation of weaknesses in commercial software. Apple, Google, WhatsApp, and other tech firms whose software was compromised may have legitimate damage claims against NSO Group, and in fact WhatsApp has launched a high-profile lawsuit against the company.

What does “selected for targeting” mean? Were these people actually hacked?

A key part of the Pegasus Project is a list of over 50,000 phone numbers in nearly 50 countries, which is believed to be a list of numbers that have been “selected for targeting” by NSO clients.

This is a characterization that NSO Group has rejected. (See question 10 below for more on NSO Group’s response to the data, which can be read here in more detail.)

However, reporting by The Pegasus Project builds a case that the list indeed contains cell phone numbers selected by NSO Group clients for targeting with Pegasus. There is no evidence or suggestion that the company itself compiled or had any knowledge of these numbers.

The list does not include identifying information, but reporters were able to independently identify the owners of over 1,000 numbers. OCCRP focused on identifying numbers from Azerbaijan, Kazakhstan, and Rwanda.

In many of these cases, the phone numbers identified were consistent with persons of interest to governments, including both legitimate security threats like terrorists and hundreds of independent journalists, dissidents, and members of the political opposition.  Furthermore, some of these numbers appeared on the list during time periods corresponding to real world events — such as elections, arrests, or the release of compromising private information — in ways that suggest a correlation with the data.

Pegasus Project partners spoke with off-the-record industry insiders who corroborated key issues, found that court documents from WhatsApp’s suit against NSO Group contained some of the same numbers as on the leaked list, and confirmed other details that further corroborated the Pegasus Project’s understanding of the data.

The strongest indication that the list really does represent Pegasus targets came through forensic analysis.

Amnesty International's Security Lab examined data from 67 phones whose numbers were in the list. Thirty-seven phones showed traces of Pegasus activity: 23 phones were successfully infected, and 14 showed signs of attempted targeting. For the remaining 30 phones, the tests were inconclusive, in several cases because the phones had been replaced.

Fifteen of the phones in the data were Android devices. Unlike iPhones, Androids do not log the kinds of information required for Amnesty’s detective work. However, three Android phones showed signs of targeting, such as Pegasus-linked SMS messages.

In a subset of 27 analyzed phones, Amnesty International researchers found 84 separate traces of Pegasus activity that closely corresponded to the numbers’ appearance on the leaked list. In 59 of these cases, the Pegasus traces appeared within 20 minutes of selection. In 15 cases, the trace appeared within one minute of selection. This strongly suggests the list represents the selection of numbers for targeting by state actors.

There is still much we can’t prove about the list: how it was compiled, who compiled it, or how it was used. Just because a number was included does not necessarily mean it was compromised. The list may include phone numbers where an attempted infection was unsuccessful, or where no attempt was made.

Heads of state and government

According to an analysis by the German newspaper Die Zeit and others, the following incumbent and former heads of state and government have been targeted,[19][20] implying possible full access to their mobile phones' data:

Used against opposition journalists, opposition leaders and critics.

Used against opposition leaders, union ministers, journalists, administrators such as Election Commissioner and heads of the Central Bureau of Investigation (CBI) and minority leaders.

Used against anti-corruption journalists, opposition leaders and a judge.

Used against opposition, Western Sahara–friendly journalists in Morocco and France, and more than 6,000 Algerian politicians, high-ranking military officials, heads of intelligence, civil servants, diplomats and activists.[21]

In July 2017, Prime Minister Beata Szydło agreed with Benjamin Netanyahu to buy Pegasus licenses.[44] Michał Woś, deputy minister of justice, requested a parliamentary committee to divert funds from a ministry-run fund to "combat crime."[45][46] Once approved, the Central Anticorruption Bureau (CBA) purchased the licenses for PLN 33.4 million.[47] The transaction with NSO Group was camouflaged with unrelated invoices.[45][48] The contract for 40 licenses to be used over three years was mediated by Matic, a company established by former Militia and Security Service associates.[49] The spyware was first deployed in November 2017.[47]

In 2018, Citizen Lab suspected that an operator codenamed "ORZELBIALY" (Polish for "white eagle," a reference for the coat of arms of Poland) was spreading Pegasus through mobile network operators.[50] In 2020, Rzeczpospolita reported that the bulk of evidence in a corruption case against former Civic Platform politician Sławomir Nowak was obtained using Pegasus. The CBA denied ever buying the license, still the government assured it had court permission.[51]

In December 2021, Citizen Lab announced to have found multiple hacks into phones of prominent opposition figures during the 2019 parliamentary elections that the right-wing populist party Law and Justice (PiS) of Jarosław Kaczyński won by a slim margin, which lead to a further erosion of judicial independence and press freedom.[52] As of January 25, 2022, the reported victims include:

On February 7, 2022, the Supreme Audit Office (NIK) revealed that between 2020 and 2021, 544 of its employees' devices were under surveillance in over 7,300 attacks. According to NIK experts, three of the phones could be infected with Pegasus.[58]

On January 17, 2024, the Polish Parliament established a commission of inquiry into operational and exploratory activities involving Pegasus. The scope of the commission's work will cover the period from November 16, 2015 to November 20, 2023.[59]

Used against an opposition journalist and a women's rights activist since 2018.

Used against human rights activists, local leaders and local nobility and Sheikh Maktoum family members. With more than 10,000 people of interest linked to Dubai, it was one of the most extensive uses of Pegasus.[65][66] The targets were mainly from the UAE and Qatar, but also included people from Egypt, Lebanon, Iraq, Yemen, and Saudi Arabia.[65] In 2020,[67] the NSO Pegasus license was stripped from Dubai due to human rights concerns[68] and spying on Sheikh Maktoum family members.[67]

NSO Group did not deny the presence of its spyware, responding to the report by stating they rigorously vetted its customers' human rights records before allowing them to use its spy tools.[1] It says military-grade Pegasus is only supposed to be used to prevent serious crime and terrorism. NSO stated its purchasing client governments are bidden by a signed contract and licence, agreeing to terms of uses, and contractually limited to legitimate criminal or terrorist targets.[68] Once sold, NSO Group says it does not know nor can see how its client governments use its spyware.[68]

NSO Group stated: "NSO does not operate the systems that it sells to vetted government customers, and does not have access to the data of its customers' targets. NSO does not operate its technology, does not collect, nor possesses, nor has any access to any kind of data of its customers. Due to contractual and national security considerations, NSO cannot confirm or deny the identity of our government customers, as well as the identity of customers of which we have shut down systems."[74]

The CEO of NSO Group categorically claimed that the list in question is unrelated to them, the source of the allegations can not be verified as a reliable one. "This is an attempt to build something based on a crazy lack of information... There is something fundamentally wrong with this investigation."[75] The owner of the company that developed the Pegasus spyware categorically refutes all allegations, stating that the list of the phone numbers in question has nothing to do with the Pegasus spyware.[75] NSO denied "false claims" about its clients' activities, but said it would "continue to investigate all credible claims of misuse and take appropriate action".[1]

Journalists around the world have expressed outrage at the use of anti-criminality tools against non-criminals, journalists, opposition representatives, and other civilians. Edward Snowden has called for governments to impose a global moratorium on the international spyware trade in order to avoid ubiquitous violation of privacy and associated abuses.[76]

Haaretz argued such invasive monitoring technology is the weapon of choice for autocratic governments, allowing continuous monitoring of opponents, preventing protests from the beginning before they are organised, and discouraging sources to share information with journalists.[77] This technology should, therefore, be shared only with countries with independent and solid rule of law.[77]

The Committee to Protect Journalists called for a critical reform of the surveillance software industry and market.[78]

The International Press Institute, an international press freedom network, denounced the abuse of spying on journalists, calling formal investigations and accountability.[79]

Tamer Almisshal, an investigative journalist for Al Jazeera Arabic, said, "[The hacking of the Al Jazeera staffers' and journalists' phones is] a crime against journalism. Based on this spyware, journalists have been arrested, disappeared, or even killed. Khashoggi is just one example".[80]

In a statement, the National Association of Hungarian Journalists [hu] said they were "shocked" by the revelations and also stated: "If this is the case, it is unacceptable, outrageous and illegal, full information must be disclosed to the public immediately".[81]

In a tweet, the Press Club of India (PCI) issued a statement:

This is the first time in the history of this country that all pillars of our democracy — judiciary, Parliamentarians, media, executives & ministers — have been spied upon. This is unprecedented and the PCI condemns unequivocally. The snooping has been done for ulterior motives. What is disturbing is that a foreign agency, which has nothing to do with the national interest of the country, was engaged to spy on its citizens. This breeds distrust and will invite anarchy. The Govt should come out clean on this front and clarify.[82]

Similarly, the Editor's Guild of India also released a statement directed against the alleged spying made by the Indian government, saying:

This act of snooping essentially conveys that journalism and political dissent are now equated with 'terror'. How can a constitutional democracy survive if governments do not make an effort to protect freedom of speech and allows surveillance with such impunity?

It asked for a Supreme Court monitored enquiry into the matter, and further demanded that the inquiry committee should include people of impeccable credibility from different walks of life—including journalists and civil society—so that it can independently investigate the facts around the extent and intent of snooping using the services of Pegasus.[83][84]

Amazon's cloud computing subsidiary AWS stated they had terminated "relevant infrastructure and accounts" linked to NSO Group, following an investigation by Amnesty International that discovered Amazon CloudFront was being used to infect targets with the Pegasus malware.[85]

The CEO of WhatsApp, Will Cathcart, called for a global moratorium on the use of unaccountable surveillance technology and defended the use of end-to-end encryption following the reports.[86][87]

In a statement released, Algeria's public prosecutor has ordered an investigation into the reports that the country may have been a target of the Pegasus spyware.[88]

After the revelations of the Pegasus Project investigation, in which it was revealed that the French president Emmanuel Macron was targeted,[20] France launched an investigation into the matter.[89] In the aftermath of these revelations, Macron changed his telephone number and replaced his phone. Furthermore, he ordered an overhaul in security procedures.[90]

Macron reportedly contacted Israel's prime minister Naftali Bennett to discuss Israel's internal investigation and express concern that his data appeared on the list of potential targets and urged Bennett to conduct an inquiry.[91]

French intelligence (ANSSI) confirmed that Pegasus spyware had been found on the phones of three journalists, including a journalist of France 24, in what was the first time an independent and official authority corroborated the findings of the investigation.[92]

A statement from the office of Viktor Orbán in Hungary stated that they were not aware of any alleged data collection.[93] On 22 July, the Prosecution Service of Hungary announced that it would open an investigation to determine whether there was an illegal data collection.[94][95]

On November 4, 2021, Lajos Kósa, Member of Parliament and Vice President of Fidesz, member of the Parliamentary Defence and Law Enforcement Committee, admitted that the Ministry of Interior had purchased and used the Pegasus software.[96]

The government has not denied the usage of Pegasus spyware in their response so far.[97][98] The government has also denied the request for investigation or an independent Supreme Court inquiry by the opposition into the matter.[99][100][101]

The official response of the Government of India to The Washington Post stated that "[t]he allegations regarding government surveillance on specific people has no concrete basis or truth associated with it whatsoever" and that such news reports were an attempt to "malign the Indian democracy and its institutions". They further stated that each case of interception, monitoring and decryption is approved by the Union Home Secretary and that there exists an oversight mechanism in the form of a review committee headed by the Union Cabinet Secretary and that any such interceptions have been done under the due process of law.[93]

The former IT minister of India Ravi Shankar Prasad asked, "If more than 45 nations are using Pegasus as NSO has said, why is only India being targeted?"[102]

The Indian IT Minister Ashwini Vaishnaw in a statement in parliament stated that the reports were "highly sensational" and that they had "no factual basis". He further stated that NSO themselves had rubbished the claims. He stated that the existence of numbers in a list was not sufficient evidence to indicate that the spyware was used and said that the report itself stated the same and without the physical examination of the phone such claims cannot be corroborated.[103]

The Minister of Home and Internal Security Amit Shah in a statement on his blog insinuated that this was an attempt to disrupt the monsoon session of the parliament and that the opposition parties were "jumping on a bandwagon" and were trying to "derail anything progressive that comes up in Parliament". He stated that the report was an attempt to "derail India's development trajectory through their conspiracies".[97][104]

Replying to allegations from the opposition, Minister of State in Ministry of Home Affairs Ajay Kumar Mishra said that there is no reason for a probe and the people who made the allegations are "political failures".[27]

The Israeli government denied having access to the information gathered by NSO's clients.[105]

In the aftermath of the revelations by the investigations of the Pegasus Project, the head of the Israeli parliament's Foreign Affairs and Defence Committee announced a commission to investigate the allegations of misuse of Pegasus for surveillance and hacking.[106]

In December 2021, the Israeli Defense Ministry imposed new restrictions on the export of cyber warfare tools as a result of the scandals involving NSO.[107]

In the revelations made by the investigation, it came to light that the Kazakhstan's former Prime Minister, Bakhytzhan Sagintayev, could have been targeted.[20] Furthermore, it has been reported that Kassym-Jomart Tokayev, the president of Kazakhstan, was also targeted.[108]

However, top officials have claimed that these reports and allegations of the president being spied on were "without evidence". Furthermore, the deputy head of Kazakhstan's presidential administration Dauren Abaev said the list of targets was "rather intriguing information without any evidence".[108]

In a statement, the Moroccan government denied claims of using Pegasus and dismissed them as "unfounded and false allegations, as it has done with previous similar allegations by Amnesty International".[93] In an interview given to Jeune Afrique, foreign minister Nasser Bourita stated it was "important to shed light on the facts, far from controversy and slander", and claimed that certain figures within the Pegasus consortium "serve agendas well known for their primary hostility towards Morocco and are ulcerated by its successes under the leadership of His Majesty King Mohammed VI."[109] The then-Moroccan ambassador to France, Chakib Benmoussa, also denied reports that his country's authorities had spied on French President Emmanuel Macron.[110]

Morocco later sued Amnesty International and Forbidden Stories for defamation, with lawyer Olivier Baratelli [fr], acting on behalf of the government, saying that the Moroccan state "wants all possible light cast on these false allegations", and that it "does not intend to let the multiple lies and fake news spread these past few days go unpunished".[111] It also issued defamation citations against Le Monde, Mediapart and Radio France on 28 July 2021, and filed an injunction request against the German newspaper Süddeutsche Zeitung on 2 August.[112]

The Prime Minister of Pakistan, Imran Khan, whose name was revealed to be in the list,[20] has called on the United Nations for an investigation on the Indian use of Pegasus.[113][114]

Rwanda, through a statement by Vincent Biruta, Minister of Foreign Affairs and International Cooperation, denied using Pegasus and claimed that "false accusations" of the country using Pegasus were "part of an ongoing campaign to cause tensions between Rwanda and other countries, and to promote disinformation about Rwanda domestically and internationally."[93]

Saudi Arabia's official Saudi Press Agency has denied all allegations of its use of Pegasus spyware on journalists and human rights activists as "baseless". The allegations were dismissed as "untrue".[115][116]

A statement released by the UAE's foreign minister stated that the allegations of use of the Pegasus spyware by the UAE on journalists and individuals were "categorically false" and that such allegations had no evidentiary basis and they denied all allegations.[88][116] This despite ample material evidences of UAE dissidents being targeted.

In India the Indian National Congress accused Prime Minister Narendra Modi of "treason" and compromising national security following the release of the reports and called for the removal of Minister of Home and Internal Security Amit Shah and an investigation of the role of Prime Minister Narendra Modi into the affair.[117][118]

The Indian IT minister made a statement that similar claims were made in the past regarding Pegasus for WhatsApp which had no factual basis and was even denied by the Supreme Court of India.[119] However, many of the statements made by the Indian IT minister were verified by the Internet Freedom Foundation and were not found to be accurate.[120]

West Bengal Chief Minister Mamata Banerjee alleged that the central government intends to "turn India into a surveillance state" where "democracy is in danger".[121][122] On July 26, 2021, The West Bengal Chief Minister announced a commission of inquiry into the alleged surveillance of phones using Pegasus. Retired Supreme Court judge Justice Madan B Lokur, and former Chief Justice of Calcutta High Court, Justice (retd) Jyotirmay Bhattacharya, have been appointed as members of the commission.[123]

In India, some news articles were released making claims that Amnesty never claimed that the leaked phone numbers were of NSO's Pegasus spyware list.[124] However, these reports were later proven to be false, and Amnesty issued a statement stating that it categorically stands by the findings of the investigation and that the data is irrefutably linked to potential targets of Pegasus.[125]

The European Parliament awarded the 2021 Daphne Caruana Galizia journalism prize to the Pegasus Project.[126]

What’s new here? What does the Pegasus Project add to what’s known about NSO Group?

Years of reporting by investigative journalists and digital rights advocates has led to the identification of many victims of NSO Group’s software on an ad hoc basis. But those cases depended on the targets coming forward themselves after receiving a suspicious message or otherwise having reason to think their phones were breached.

The Pegasus Project approached the topic from the other direction, identifying potential victims from a leaked list of numbers believed to be selected as targets by NSO Group’s clients.

This allowed reporters not only to identify many new victims, but also to leverage the list as a basis for examining the accuracy of long-held contentions that Pegasus is systematically used to target journalists, activists, and other non-criminal figures. The reporting found widespread additional evidence that this is the case, painting the most complete picture to date of what Pegasus does around the world.

What is The Pegasus Project, and how did it come about?

The Pegasus Project is a collaborative investigation into NSO Group, an Israeli “cyber intelligence” company that sells sophisticated spyware to governments around the world.

NSO Group insists that its mobile phone surveillance software, called Pegasus, is meant to help its clients combat crime and terrorism. But it has also been used to spy on journalists, activists, opposition politicians, and dissidents.

After years of criticism, the secretive company has recently become more communicative, publicizing its commitment to human rights and even publishing a “Transparency and Responsibility Report” in June 2021.

But the spyware intrusions haven’t stopped. That’s why more than 80 journalists, representing 17 media organizations around the world, have come together to produce this investigation.

It began when journalism nonprofit Forbidden Stories and human rights group Amnesty International gained access to a set of more than 50,000 leaked phone numbers believed to be a list of targets of NSO Group’s phone hacking software. As the coordinator of the project, Forbidden Stories then invited OCCRP, the Washington Post, the Guardian, and 13 other partners to help investigate.

In the course of the project, we identified hundreds of individuals who owned these phones. Sixty-seven of them were subject to forensic analysis to determine whether they had been infected, and 37 showed signs of Pegasus activity. This reporting, supplemented by additional databases, internal documents, interviews, court documents, and other sources, formed the basis of the Pegasus Project, an unprecedented effort to understand who has been targeted by the users of NSO Group’s software — and what happens to them next.

Government investigations

On 20 July 2021, it was reported that French prosecutors would investigate allegations that Moroccan intelligence services used Pegasus to spy on French journalists.[127]

France's national agency for information systems security (ANSSI) identified digital traces of Pegasus on three journalists' phones and relayed its findings to the Paris public prosecutor's office, which is overseeing the investigation into possible hacking.[92]

Investigative methodology

The leaked list of targeted phone numbers provides an indication of being a "person of interest" and a first indication of possible hacking, to be confirmed via direct forensic examination of the phone. According to Amnesty, "The Citizen Lab at the University of Toronto independently peer-reviewed a draft of their forensic methodology outlined in Forensic Methodology Report: How to catch NSO Group's Pegasus.[10][3] Amnesty also published various tools or data from this investigation, including a Mobile Verification Toolkit (MVT)[3] and a GitHub repository listing indicators of NSO/Pegasus compromised devices.[3][11] Some emerging unverified online services claim to be able to assess an infection by Pegasus, but their usage is discouraged as possible scams themselves.[12] Amnesty and Forbidden Stories received numerous queries for checking devices but were not able to satisfy the demand for assistance.[12]

The investigation suggested that Pegasus continued to be widely used by authoritarian governments to spy on human rights activists, journalists and lawyers worldwide, although NSO claims that it is only intended for use against criminals and terrorists.[1][13]

A French journalist noted that "in a matter of cyber-surveillance, we observe that abuse is de facto the rule".[14] Forbidden Stories argues the Pegasus software and its usages de facto constitute a global weapon to silence journalists.[15]

Forensic Architecture and the Pegasus Project lead a data analysis and built a data visualisation plotting attempt hacking of dissidents together with real-life intimidations, threats or violence. They have argued that Pegasus has become a key tool for states to repress their own people.[16]

Targets include known criminals as well as human rights defenders, political opponents, lawyers, diplomats, heads of state and nearly 200 journalists from 24 countries.[17] The Guardian mentioned 38 journalists in Morocco, 48 journalists in Azerbaijan, 12 journalists in the United Arab Emirates and 38 journalists in India as having been targeted.[18] Some of the targets whose names have been revealed are listed below; the list is non-exhaustive.

How do we know it was NSO Group?

The process of identifying Pegasus infections begins with one fortunate fact: Years ago, NSO Group was not as careful at hiding its traces as it is today.

In setting up a Pegasus attack against Ahmed Mansoor, a dissident from the United Arab Emirates who was hacked in 2016, NSO Group left several references to the name “Pegasus” in the malware that infected his phone. The network infrastructure used to conduct the attacks also left a trail that led researchers back to NSO Group servers.

Researchers say that NSO Group’s software has become more clever at hiding its traces in recent years, including intentionally altering system files to hide evidence of infection.

However, when Amnesty International carried out forensic audits of dozens of phones belonging to people whose numbers appeared on the newly leaked lists, they identified uniquely configured web servers that matched the ones identified in 2016.

Also connected to the same Pegasus network infrastructure are iOS “processes” — small programs not necessarily visible to the user — that appeared on infected phones and did not match any legitimate code released by Apple.

“There’s a sequence that shows a website was being visited, an application crashed, some files were modified, and all of these processes executed in a matter of seconds or even milliseconds,” said Claudio Guarnieri, head of Amnesty International’s Security Lab. These processes, he said, were the same ones found in previously known Pegasus infections.

One process called “BH” or “BridgeHead,” identified after an analysis of Mansoor’s phone in 2016, kept appearing throughout the more recently analyzed phones as well. It appears to be a key component of the Pegasus toolkit.

“There's no doubt in my mind that what we're looking at is Pegasus,” Guarnieri said. “The characteristics are very distinct and all of the traces that we see confirm each other, essentially. There are no contradictory forensic traces that we have seen.”

Along with this project, Amnesty International is publishing the full technical analysis that allowed their researchers to reach these conclusions. It was independently reviewed by Citizen Lab, a research center at the University of Toronto that has years of experience investigating NSO Group. The Citizen Lab researchers concurred with Amnesty International’s analysis.

What does it mean to get infected by Pegasus?

Many people targeted by Pegasus have reported receiving text messages attempting to trick them into clicking on an accompanying link. The experience can be frightening and extremely invasive, even before any infection occurs.

Carmen Aristegui, a Mexican investigative journalist, received dozens of messages impersonating the U.S. Embassy in Mexico, her colleagues, and even her bank and phone company.

“Carmen my daughter has been missing for 5 days, we are desperate, I would be grateful if you help me by sharing her photo,” read one message, accompanied by a malicious link.

Aristegui’s son, then a minor, also received such texts, including a “warning” that his social media account had been compromised. “Friend, there is a pseudo account on fb and twitter identical to yours check it out so you can report it,” it read.

Such “phishing attempts,” as they are widely known, have become so commonplace that many people have learned to be on their guard.

But the Pegasus software has gradually become more sophisticated, with the most recent versions able to gain entry to a target’s mobile phone without requiring them to click on a link, or take any action at all.

Once installed, Pegasus can extract data, conversations, contacts, and call logs from the victim’s phone. It can even switch on microphones and cameras to silently record live audio and video.

For a fuller explanation of what Pegasus can do, read OCCRP’s explainer.

What was NSO Group’s response to the data presented by the Pegasus Project?

NSO Group has denied that the list of 50,000 phone numbers could be a list of targeted persons.

A law firm retained by the company wrote that it looked more like a public list of “HLR” or “Home Location Register” data. HLR data is essentially a database kept by mobile phone companies that allow a real time query of a subscriber’s information. It includes information such as whether a phone is in a network, whether it is active, whether it is roaming, and other basic information.

Karsten Nohl, the chief scientist for Security Research Labs in Berlin, said that HLR lookups have long been used in surveillance of mobile phones because they indicate whether the phone is on, and thus available for hacking.

Moreover, a source with knowledge of NSO Group’s software said that HRL lookups are integrated into the Pegasus system.

Amnesty International’s forensic analysis, explained in question 2 above, also shows that in many cases the targeting was swiftly followed by an infection, often within minutes. This is consistent with a system that had an integrated HLR lookup. Cases when infection did not follow could correspond to HLR lookups that showed the phone was not available at the time.

In sum, NSO Group could be correct that the 50,000 numbers represent HLR data — and this would not contradict journalists’ findings that the same data could represent the selection of targets for infection with Pegasus.

NSO’s full response is here.

Fitur MOD dalam game Buss Simulator Indonesia ini biasa dikenal oleh pemain dengan sebutan “MOD BUSSID”.

Untuk menggunakannya pemain harus mempunyai sebuah file dengan ekstensi .bussidmod atau .bussidvehicle.

Lalu file tersebut ditaruh ke dalam folder BUSSID > Mods.

Setelah itu kendaraan dari MOD tersebut akan muncul di Garasi dan siap untuk kamu mainkan dalam mode Ngelayap ataupun Narik.

Untuk download MOD BUSSID biasanya pemain mencarinya melalui YouTube, Google ataupun Grup-Grup Facebook tertentu.

Nah pada kesempatan kali ini, saya akan membagikan MOD Excavator Tambang yang pastinya keren dan asik banget untuk dimainkan tentunya.

Perlu kamu ketahui juga, kalo di aplikasi mod ini kamu bisa menemukan banyak sekali MOD BUSSID yang keren dan mewah untuk di download dengan mudah tanpa safelink, ektrak dan password.

Kamu bisa menemukan banyak mod truk luar negeri di aplikasi ini.

fitur di aplikasi ini antara lain:

1. Truck Mitsubishi Fuso Bak Pasir

2. Truck Fuso Dump Muatan Batu

3. Truck Hino 500 Angkut Pipa

4. Truck Hino 500NG Angkut Buldozer

5. Truck Canter Muatan Kayu

6. Hino Pasir dan Topi

7. Hino Lohan Purwo Logistic Cvt WSP Excavator

8. Isuzu NKR Towing Angkut Beko

9. Excavator JCB With LED

10. Download MOD BUSSID Crane With Steering

11. Dump Truck Caterpillar

Download sekarang juga aplikasi mod Excavator Tambang, Dump Truck untuk game mod Bussid

Pasang dan mainkan gamenya!

Akses Daftar dan Login Masuk Ke Situs Slot Gacor PGBET Mudah Dan Anti Blokir Kami memahami kesulitan Anda dalam mencari alamat resmi dan terbaru situs PGBET, terkadang pemain sulit untuk mendaftar dan login masuk ke akun bermain mereka. Tidak perlu bingung karena di situs PGBET ini kami memberikan solusi efektif dan akurat, kami merekomendasikan untuk bookmark atau mengingat alamat resmi situs PGBET di PGBET.LINKPGBET Alternatif

Journalism investigatigation

The Pegasus Project is an international investigative journalism initiative that revealed governments' espionage on journalists, opposition politicians, activists, business people and others using the private Pegasus spyware developed by the Israeli technology and cyber-arms company NSO Group. Pegasus is ostensibly marketed for surveillance of "serious crimes and terrorism". In 2020, a target list of 50,000 phone numbers leaked to Forbidden Stories, and an analysis revealed the list contained the numbers of leading opposition politicians, human rights activists, journalists, lawyers and other political dissidents.[1]

A small number of phones that were inspected by Amnesty International's cybersecurity team revealed forensic evidence of the Pegasus spyware, a zero-click Trojan virus developed by NSO Group.[1] This malware provides the attacker full access to the targeted smartphone, its data, images, photographs and conversations as well as camera, microphone and geolocation. This information was passed along to 17 media organisations under "The Pegasus Project" umbrella name. Reports started to be published by member organisations on 18 July 2021, revealing notable non-criminal targets and analysing the practice as a threat to freedom of the press, freedom of speech, dissidents and democratic opposition. On 20 July, 14 heads of state were revealed as former targets of Pegasus malware.[2] Various parties called for further investigation of the abuses and a limitation on trading such repressive malware, among them the newsrooms involved, the Committee to Protect Journalists, the International Press Institute, and Edward Snowden.

The Pegasus spyware was developed by the Israeli cyberarms company NSO Group. It can be covertly installed on mobile phones (and other devices) running most[3] versions of iOS and Android. The spyware is named after the mythical winged horse Pegasus—it is a Trojan horse that can be sent "flying through the air" to infect phones.[4] Usages of the Pegasus spyware have been monitored for years. Amnesty has argued that the digital invasion is correlated with real-life consequences for spied targets, via psychological or physical damages.[5]

The NSO Group exports are overseen by the Israeli Ministry of Defense's Defense Exports Control Agency (DECA).[6]

In 2020, a list of over 50,000 phone numbers believed to belong to individuals identified as "people of interest" by clients of the Israeli cyberarms firm NSO Group was leaked to Amnesty International and Forbidden Stories, a media nonprofit organisation based in Paris, France. This information was passed along to 17 media organisations under the umbrella name "The Pegasus Project". Over several months, over 80 journalists from The Guardian (United Kingdom), Le Monde and Radio France (France), Die Zeit, Süddeutsche Zeitung, WDR and NDR (Germany), The Washington Post and Frontline (United States),[7] Haaretz (Israel), Aristegui Noticias and Proceso (Mexico), Knack and Le Soir (Belgium), The Wire (India), Daraj (Syria),[8] Direkt36 (Hungary),[9] and OCCRP investigated the spying abuses.