
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>israeli spyware &#8211; The Milli Chronicle</title>
	<atom:link href="https://www.millichronicle.com/tag/israeli-spyware/feed" rel="self" type="application/rss+xml" />
	<link>https://www.millichronicle.com</link>
	<description>Factual Version of a Story</description>
	<lastBuildDate>Thu, 30 Apr 2020 07:23:19 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://media.millichronicle.com/2018/11/12122950/logo-m-01-150x150.png</url>
	<title>israeli spyware &#8211; The Milli Chronicle</title>
	<link>https://www.millichronicle.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Special Report: Cyber-intel firms pitch governments on spy tools to trace coronavirus</title>
		<link>https://www.millichronicle.com/2020/04/special-report-cyber-intel-firms-pitch-governments-on-spy-tools-to-trace-coronavirus.html</link>
		
		<dc:creator><![CDATA[Millichronicle]]></dc:creator>
		<pubDate>Thu, 30 Apr 2020 07:10:10 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Coronavirus]]></category>
		<category><![CDATA[covid 19]]></category>
		<category><![CDATA[israel]]></category>
		<category><![CDATA[israeli spyware]]></category>
		<guid isPermaLink="false">https://millichronicle.com/?p=9891</guid>

					<description><![CDATA[Washington (Reuters) &#8211; When law enforcement agencies want to gather evidence locked inside an iPhone, they often turn to hacking]]></description>
										<content:encoded><![CDATA[
<p><strong>Washington (Reuters) &#8211;</strong> When law enforcement agencies want to gather evidence locked inside an iPhone, they often turn to hacking software from the Israeli firm Cellebrite. By manually plugging the software into a suspect’s phone, police can break in and determine where the person has gone and whom he or she has met.<br><br>Now, as governments fight the spread of COVID-19, Cellebrite is pitching the same capability to help authorities learn who a coronavirus sufferer may have infected. When someone tests positive, authorities can siphon up the patient’s location data and contacts, making it easy to “quarantine the right people,” according to a Cellebrite email pitch to the Delhi police force this month.<br><br>This would usually be done with consent, the email said. But in legally justified cases, such as when a patient violates a law against public gatherings, police could use the tools to break into a confiscated device, Cellebrite advised. “We do not need the phone passcode to collect the data,” the salesman wrote to a senior officer in an April 22 email reviewed by Reuters.<br><br>A Cellebrite spokeswoman said the salesman was offering the same tools the company has long sold to help police enforce the law. The company is also offering a version of its product line for use by healthcare workers to trace the spread of the virus that causes COVID-19, but the tools can only be used with patient consent and can’t hack phones, she said.<br><br>Cellebrite’s marketing overtures are part of a wave of efforts by at least eight surveillance and cyber-intelligence companies attempting to sell repurposed spy and law enforcement tools to track the virus and enforce quarantines, according to interviews with executives and non-public company promotional materials reviewed by Reuters.<br><br>The executives declined to specify which countries have purchased their surveillance products, citing confidentiality agreements with governments. But executives at four of the companies said they are piloting or in the process of installing products to counter coronavirus in more than a dozen countries in Latin America, Europe and Asia. A Delhi police spokesman said the force wasn’t using Cellebrite for coronavirus containment. Reuters is not aware of any purchases by the U.S. government.<br><br>So far, Israel is the only country known to be testing a mass surveillance system pitched by the companies, asking NSO Group, one of the industry’s biggest players, to help build its platform. But the rollout of NSO’s surveillance project with the Israeli Ministry of Defense is on hold pending legal challenges related to privacy issues, an NSO executive said. A spokesman for Israeli Defense Minister Naftali Bennett said NSO was involved in the project but did not provide further details.<br><br>Surveillance-tech companies have flourished in recent years as law enforcement and spy agencies around the world have sought new methods for countering adversaries who now often communicate through encrypted mobile apps. The firms argue that their experience helping governments track shadowy networks of militants makes them uniquely qualified to uncover the silent spread of a novel disease.<br><br>“I really believe this industry is doing more good than bad,” said Tal Dilian, a former Israeli intelligence officer and now a co-chief executive officer of Cyprus-based Intellexa, a cyber-surveillance firm that works with intelligence agencies in Southeast Asia and Europe. “Now is a good time to show that to the world.”<br><br>Yet some technologists remain skeptical that spying tools reliant on phone location data can be used to effectively combat a virus.<br><br>“It’s not precise enough, that’s the point. It’s not nearly going to get you down to whether you’re next to a certain person or not,” said Michael Veale, a lecturer in digital rights and regulation at University College London.<br><br>While the methods for location tracking and accuracy vary, surveillance companies say they can narrow down a person’s coordinates to within three feet, depending on conditions.<br><br><strong>Privacy Rights Vs. Health Concerns</strong></p>



<p>Privacy issues loom. Civil liberties advocates fear that virus tracking efforts could open the door to the kind of ubiquitous government surveillance efforts they have fought for decades. Some are alarmed by the potential role of spyware firms, arguing their involvement could undermine the public trust governments need to restrain the spread of the virus.<br><br>“This public health crisis needs a public health solution &#8211; not the interjection of for-profit surveillance companies looking to exploit this crisis,” said Edin Omanovic, advocacy director for the UK-based civil liberties group Privacy International.<br><br>Claudio Guarnieri, a technologist with the human rights organization Amnesty International, said any new surveillance powers embraced by states to combat the virus should be met with “high scrutiny.”<br><br>“New systems of control, from location tracking to contact tracing, all raise different concerns on necessity and proportionality,” said Guarnieri.<br><br>Cellebrite, for one, said it requires “agencies that use our solutions to uphold the standards of international human rights law.”<br><br>Government officials have sought to address such concerns by pointing to the unprecedented nature of the crisis. COVID-19, the respiratory disease caused by the new coronavirus, has so far infected more than 3 million people worldwide, killing over 210,000.<br><br>In South Africa, for example, after the government last month announced it would use telecom data to track the movements of citizens infected with COVID-19, a communications minister acknowledged concerns about loss of privacy.<br><br>“We do respect that everyone has a right to privacy, but in a situation like this our individual rights do not supersede the country’s rights,” Stella Ndabeni-Abrahams, the communications minister, said at a press conference for South Africa’s COVID-19 command council this month.<br><br>The South African Health Ministry declined to comment on details of the program and whether it had contracted with any of the intelligence firms.<br><br>A number of countries are developing and deploying COVID-19 contact-tracing apps that do not rely on location data. Instead, these apps, already in use in Singapore, India and Colombia, tap the smartphone connectivity technology Bluetooth to sense and record when other devices are nearby. When someone tests positive for coronavirus, typically, everyone that person made contact with is notified.<br><br>Christophe Fraser, an epidemiologist at Oxford University’s Big Data Institute, said this approach, if implemented properly, could save lives and shorten lockdowns. “The idea is to try and maximize social distancing practices of those at risk of infection and minimize the impact on all the other people,” he said.<br><br>This app-based approach to contact tracing is considered, by its advocates, as more privacy friendly because people voluntarily download the app and sensitive personal data are visible only to health authorities. This method of containing the disease is the focus of a rare collaboration between Apple Inc and Alphabet Inc’s Google to quickly deploy the Bluetooth-based technology for use in the United States and elsewhere. But the approach relies on widespread adoption of the apps, and its accuracy remains unproven.<br><br>Apple says its plan is designed to “help amplify the efforts of the public health authorities” and that “many factors will help flatten [infection] curves — no one believes this is the only one.” A Google spokesman referred to a prior statement, which said “each user will have to make an explicit choice to turn on the technology.”<br><br>By contrast, deploying a mass surveillance platform like Intellexa’s means everyone would be under collection right away; no one needs to opt in, nor could anyone opt out. Such a setup can be done remotely in a matter of weeks, said an executive at NSO Group, which is also offering its wares to fight the coronavirus.<br><br><strong>Public Health Spy Tech</strong></p>



<p>The surging spyware business is estimated by research firm MarketsandMarkets to be worth $3.6 billion this year.<br><br>But the industry has been dogged by legal and ethical concerns. Human rights groups have accused some companies of helping undemocratic governments target dissidents and activists. The companies say they help governments prevent terrorism and capture criminals.<br><br>Last year, for example, Facebook’s WhatsApp unit accused NSO Group of helping governments hack 1,400 targets that included activists, journalists, diplomats and state officials. NSO denies the allegations, saying it only provides the technology to government agencies under strict controls and is not involved in operations.<br><br>Intellexa’s Dilian fled Cyprus last year after an arrest warrant was issued for him, on accusations that he used a surveillance van to illegally intercept communications in the country. Dilian denies the allegations, returned to Cyprus last month and said he is cooperating with authorities. A Cypriot police spokesman told Reuters the investigation is active.<br><br>Now, industry executives, investors and analysts say the coronavirus crisis offers intelligence firms the possibility of billions of dollars in business, while burnishing their reputations.<br><br>India is among the courted countries. In April, New York-based Verint Systems asked Indian officials to pay $5 million for a year’s subscription to a host of services designed to track and surveil people with coronavirus. Those included a cellphone tower geolocation platform and a program to monitor social media activity, according to documents seen by Reuters and a person with knowledge of the negotiations. No sale has yet been agreed in India, the source said.<br><br>A Verint spokesman declined to answer questions, instead referring to an April 16 press release which said unspecified products were being used by an unnamed country to help respond to COVID-19. India’s Ministry of Interior said it had not purchased a system from Verint.<br><br>NSO Group and Intellexa are also both pitching COVID-19 tracking platforms to countries across Asia, Latin America and Europe. Their technology could allow a government to track the movement of nearly every person in the country who carries a cellphone, sucking up a continuous trove of location data. Installed within telecom providers, the technology functions through the analysis of call records, said NSO and Intellexa executives.<br><br>When a person tests positive, the systems would allow authorities to input the result, tracking those who made contact with the patient in the past few weeks. Those exposed would receive a text message encouraging them to get tested or self-isolate. NSO said the system’s administrators would not see the identity of individuals.<br><br>Revelations in 2013 that the U.S. National Security Agency had collected this kind of mobile phone data about Americans to track national security threats created a storm of controversy and fueled new restrictions on surveillance.<br><br>Suzanne Spaulding, a former U.S. intelligence community lawyer and senior Homeland Security official, described this potential COVID-19 tracking approach as “among the most privacy-invasive.” That’s because it “envisions all of the data about everyone’s movements, not just infected individuals and their known contacts, going to the government.”<br><br>South Korea, Pakistan, Ecuador and South Africa have all indicated in public statements they were rolling out contact tracing systems using telecom data to track infected citizens, though the details haven’t been released.<br><br>South Korean officials say any loss of privacy from surveillance must be weighed against the disastrous economic consequences caused from a long-term shutdown.<br><br>“It is also a restriction of freedom when you ban free movement of people in crisis,” Jung Seung-soo, a deputy director at the Ministry of Land, Infrastructure and Transport, told Reuters. The country is not using outside surveillance vendors, the official said.<br><br>Intellexa is in the process of installing its system in two Western European countries, Dilian said. He declined to name them.<br><br>In an interview with Reuters, NSO employees responsible for the product said the company is piloting the approach in 10 countries in Asia, the Middle East and Latin America, but declined to name them.<br><br>Three other Israeli companies, Rayzone Group, Cobwebs Technologies and Patternz, are offering countries coronavirus tracking capabilities. These largely rely on location data gathered from mobile advertising platforms, according to company promotional documents reviewed by Reuters and people familiar with the companies.<br><br>Rayzone Group declined to comment. Requests for comment to Patternz went unanswered. Omri Timianker, president and co-founder of Cobwebs Technologies, said his company is working with five governments to help track the spread of the virus, but declined to identify them.<br><br>While some experts say advertising data isn’t precise enough to combat the spread of COVID-19, the documents reviewed by Reuters suggest the three firms are marketing technology which they contend can ingest and process advertising data into a form that’s useful for narrowly tracking individuals.<br><br>Intellexa’s Dilian said his company’s platform will cost between $9 million and $16 million for countries with large populations. He believes COVID-19 tracking will be just the beginning. Once the pandemic ends, he hopes countries that invested in his mass surveillance tool will adapt it for espionage and security. “We want to enable them to upgrade,” he said.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>India asks Whatsapp about Israeli Spyware targeting Journalists and Activists, But what we should ask?—TheWire Analysis</title>
		<link>https://www.millichronicle.com/2019/10/india-asks-whatsapp-about-israeli-spyware-targeting-journalists-and-activists-but-what-we-should-ask-thewire-analysis.html</link>
		
		<dc:creator><![CDATA[Millichronicle]]></dc:creator>
		<pubDate>Thu, 31 Oct 2019 17:29:45 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[human rights activists]]></category>
		<category><![CDATA[indian journalists]]></category>
		<category><![CDATA[israeli spyware]]></category>
		<category><![CDATA[the wire]]></category>
		<guid isPermaLink="false">https://millichronicle.com/?p=4722</guid>

					<description><![CDATA[WhatsApp said it was suing NSO Group over helping unnamed entities hack into phones of roughly 1,400 users. The Narendra]]></description>
										<content:encoded><![CDATA[
<blockquote class="wp-block-quote"><p>WhatsApp said it was suing NSO Group over helping unnamed entities hack into phones of roughly 1,400 users. </p></blockquote>



<p>The Narendra Modi government on Thursday sought a detailed response from WhatsApp over the issue of an Israeli spyware allegedly being used to target Indian journalists and human rights activists through its platform.</p>



<p>WhatsApp has been asked to submit a reply by November 4.</p>



<p>The IT ministry has written to WhatsApp seeking its response on the matter, a senior government official told news agency PTI.</p>



<p>A separate statement from the Ministry of Home Affairs said that media reports that have attempted to malign the government as being responsible for the breach are “completely misleading”. It also added that the Centre would take action against any intermediary for breach of privacy, in an indirect jab at WhatsApp.</p>



<p>On Thursday, Facebook-owned WhatsApp said Indian journalists and human rights activists were among those globally spied upon by unnamed entities using spyware made by an Israel surveillance firm called the NSO Group. </p>



<p>The Wire’s own reportage indicates that at least 10 lawyers and activists have been potentially affected.</p>



<p>Earlier this week, WhatsApp said it was suing NSO Group over helping unnamed entities hack into phones of roughly 1,400 users. These users span across four continents and included diplomats, political dissidents, journalists and senior government officials.</p>



<p>Is the Narendra Modi government’s response correct? What other aspects of this controversy should we consider? The Wire breaks it down.</p>



<p><strong>Who used it to spy on Indian activists, lawyers and journalists?</strong></p>



<p>This is a tricky question. WhatsApp’s lawsuit lashes out at both the NSO Group and its clients, which allegedly include government agencies around the world as well as private customers.</p>



<p>“Defendants’ clients include, but are not limited to, government agencies in the Kingdom of Bahrain, the United Arab Emirates, and Mexico as well as private entities,” the company’s lawsuit notes.</p>



<p>On its part, the NSO Group’s defence has consistently revolved around two claims. First, that the company doesn’t use its own snooping technology to target any subject. And two, that it sells its software to only government agencies; i.e, it does not have any private customers.</p>



<p>Who, then, would be using Israeli spyware to spy on Indian targets? Bear in mind that a significant chunk of the potential victims appear to be activists or lawyers associated with the Bhima Koregaon controversy.</p>



<p>The Narendra Modi government has tip-toed around this issue quite carefully: both the MHA and IT minister’s statements merely say that the Centre operates strictly as per the provisions of the law and follows established protocols of interception.</p>



<p>“Govt agencies have a well established protocol for interception, which includes sanction and supervision from highly ranked officials in central &amp; state governments, for clear stated reasons in national interest,” IT minister Ravi Shankar Prasad has said.</p>



<blockquote class="twitter-tweet"><p lang="en" dir="ltr">Government of India is concerned at the breach of privacy of citizens of India on the messaging platform Whatsapp. We have asked Whatsapp to explain the kind of breach and what it is doing to safeguard the privacy of millions of Indian citizens. 1/4 <a href="https://t.co/YI9Fg1fWro">pic.twitter.com/YI9Fg1fWro</a></p>&mdash; Ravi Shankar Prasad (@rsprasad) <a href="https://twitter.com/rsprasad/status/1189867398662213632?ref_src=twsrc%5Etfw">October 31, 2019</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>



<p>The price of the NSO Group’s software isn’t cheap: Fast Company reported last year that the company charges its customers $650,000 (Rs 4.61 crore at current exchange rate) to hack 10 devices, in addition to an installation fee of $500,000 (Rs 3.55 crore).</p>



<p>Therefore, the first big question is who used the spyware to target Indian activists, journalists and lawyers? Merely asking for WhatsApp for information it has already disclosed publicly will not get the Indian government anywhere.</p>



<p>The government’s first course of action should be to declare that it is not a client of the NSO Group, which shouldn’t be a problem considering it says follows the law, and then order a probe into the matter.</p>



<p><strong>Was the Pegasus spyware successful in its mission?</strong></p>



<p>The NSO Group’s flagship product is called ‘Pegasus’ and is a form of spyware. The second most important question here is what kind of data was taken or snooped upon from the roughly two-dozen Indians who were targeted. We are in the dark here, primarily because WhatsApp hasn’t disclosed a whole lot of information.</p>



<p>In its message to the potentially affected, WhatsApp has been vague. It merely says that there is a possibility that “this phone number was impacted” and advises users to update the WhatsApp application.</p>



<p>If the affected updated their app quickly, it’s possible that only a  limited amount of data was impacted. Conversely, if this wasn’t done, then it’s likely that the spyware could have had a severely harmful effect.</p>



<p>The most curious actor in this entire sequence of events is a research organisation called ‘The Citizen Lab’, which works out of the University of Toronto. This lab has worked with WhatsApp to not only examine the effects of Pegasus, but also appears to have gone one step further and reached out to help potential victims across the world.</p>



<p>According to The Wire’s reportage, Citizen Lab has reportedly made a series of allegations in its conversations with those affected in India. These include claims that a massive amount of data could have been impacted by the attack and that it was likely carried out by the Indian government.</p>



<p>Are Citizen Lab’s claims endorsed by WhatsApp? This could take us down an interesting rabbit-hole, because it’s possible that both WhatsApp and Citizen Lab have more information on who exactly was using the NSO Group’s spyware in India. Or at least enough information to help an investigation come to a conclusion. </p>



<p>Is it in WhatsApp’s best interest to disclose this information though, considering it has business interests in India?</p>



<p><strong>What should concerned Indian citizens be doing?</strong></p>



<p>As the Internet Freedom Foundation has noted, there is no existing Indian law that allow the installation of spyware or hacking mobile devices.</p>



<p>Hacking of computer resources, including mobile phones and apps, as noted, is a criminal offence under the Information Technology Act, 2000.</p>



<p>This controversy therefore shows there is an urgent need for surveillance reform that protects Indians against the use of malware, spyware and the creation of vulnerabilities in technologies which offer privacy protection by design. </p>



<p>“We call on the Government to stand by democratic commitments and reject the use of spyware in their pursuit of social objectives of policing and security. Legislative measures must be introduced in Parliament to uphold the 9 judge bench decision of the Supreme Court of India recognising privacy as a fundamental right. The use of legal or technical means to access data and intercept communications in India must be authorised only in emergency situations, under judicial control and oversight, and with other protections to safeguard our citizens,” the IFF has noted.</p>



<p>India’s political parties across the spectrum should push for these legal safeguards, a process that can be kick-started if enough people ask for them.</p>



<p><em>Article first published on <a href="https://thewire.in/rights/pegasus-whatsapp-spyware-india">The Wire.</a></em></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
