Skip to main content

tv   Al Jazeera World The Spy In Your Phone  Al Jazeera  January 11, 2021 4:00am-5:01am +03

4:00 am
in the last home in the fight steeped on the phone this is not only a land conflict but a conflict of narrative brazil the age of both in our role whose truth is that anyway on al-jazeera. hello i'm a very unfunny get into how the top stories on al-jazeera the u.s. house speaker nancy pelosi says that she'll go ahead with impeachment proceedings against donald trump unless he's removed 1st from office the 25th amendment allows vice president mike pence of the cabinet to oust donald trump if he's unfit to carry out his juice he's if they fail to do so but mostly says that congress will move forward with impeachment proceedings on charges of inciting riots as mike hanna reports from washington. the speaker of the house is now sent a letter to lawmakers saying that on monday in the house a motion will be introduced calling on the press and vice president pence to invoke
4:01 am
the 25th amendment to convene his cabinet to get a 2 thirds majority and decide that the president is incapable of maintaining office she is hoping for unanimous consent in which case there is no vote however the speaker says that if there is no unanimous consent in the house on the following day tuesday a vote will be held the request will be sent to the vice president to invoke the 25th amendment immediately if he refuses to do so says the speaker of the house then impeachment proceedings will get underway in the house so certainly this is all moving very quickly as we expected democratic lawmakers talking over the weekend making very clear that they want to go ahead with impeachment proceedings in the next few hours however some in congress are insistent that a far better move would be for the president to follow richard nixon and resign before being impeached and subject to a senate trial republican senator pat toomey is
4:02 am
a one among those calling for the president to go i think the best way for our country charges for the president to resign and go away as soon as possible. i acknowledge that may not be likely but i think that would be best does not look as though here is the will or the consensus to exercise the 25th amendment option and i don't think there's time to do an impeachment there's 10 days left before the president leaves anyway i think the best thing would be a resignation at least 25 domestic terrorism cases have been opened against people involved in wednesday's violence at the capitol that's according to the army secretary ryan mccarthy 5 people died when trump supporters storm storms congress attempting to overturn the outcome of election. the u.k.'s chief medical officer has issued a dire warning about the capacity of hospitals to treat the rising number of seriously ill covert 9000 patients chris which he says that the national health
4:03 am
service is facing its most dangerous situation yes he says that hospitals could become overwhelmed with emergency patients being a turn the way of 3 weeks' time if people ignore the containment measures they leave 55000 new infections were reported on sunday more than 40000 people have now died in germany from covert 19 chancellor angela merkel is warning that the coming weeks will be the hardest phase of the pandemic she says the numbers have yet to reflect the full impact of gatherings held over the holiday season a bombing in afghanistan's capital has killed 3 people including the spokesman for the country's public protection force attacks on journalists politicians and rights activists have increased despite peace talks between the government of the taliban no group has claimed responsibility. and i mean we were not allowed to get close to the site that the vehicle was burning far far to the fire i don't know how many
4:04 am
people killed but it was a powerful explosion at least 6 rangers have been killed in an ambush in a national park in eastern democratic republic of congo it happened in the wrong that national park a unesco world heritage site famous for its mountain gorillas armed groups have been fighting over its mineral deposits for more than a decade and bahrain says that it will reopen its airspace with castro on monday it comes off the gulf arab leaders signed a declaration to end a 3 and a half year dispute between qatar and saudi arabia the u.a.e. bahrain and egypt the 4 countries imposed a blockade on castle 2017 accusing it of funding terrorism which doha as always tonight others the headlines more you see here on. al-jazeera world next.
4:05 am
in mid 2020 and mobile phone belonging to al jazeera arabic was hijacked. over the next few months working with an organization called citizen lab the team from al-jazeera unpicked an extraordinary story of some of the most advanced spy ware in the world and how it's used not least on al-jazeera is journalists.
4:06 am
with the click of a button you can bring down nations to their news. very rapidly if you so bizarre and if you're willing to take the risk because every system can be. israel manufacturers pegasus some of the most advanced spyware in the world it 1st came to attention in 2060 since that various governments have bought the spyware for their own use questions today are how does pegasus work who is using it and who are its victims. well there's very little and yet the tell us hind paces by where the code malicious code that was used that's very very difficult to find out more about i thought was a lot of the far left mr li in live in a kennel model for him because of how do you feel if we go to vermont and they make any use of and have them all to walk in and doesn't some of although have they only
4:07 am
and know your thought of them in a book author of the soul of the law you forget they're here that's on the man at the photo. al jazeera arabic investigative reporter tom out on this one followed a complicated technical process to track this infamous spyware over many months he had one of his own phones monitored constantly with the help of citizen law and international research laboratory based in canada that specializes in days of surveillance. a. citizen law who's the 1st to expose the existence of israel as pegasus spyware in 2016 they disclose details of what they called an exploit infrastructure connected to a phone belonging to an activist from the united arab emirates. the infiltration the hack led to the arrest of ahmed months who remains imprisoned to this day.
4:08 am
the new hacking technique was called 0 day exploit and pegasus was the spyware used to infiltrate months whose phone bill maher site from citizen law has worked for several years to expose pegasus. so what happened in 2016 started with this man had one store the activist in the u.a.e. and he noticed some suspicious messages on his phone that he was getting via s.m.s. he thought they were weird because they came from unknown numbers and they were promising information about human rights so he forwarded them to me it said as a mom we had known each other for a while i got a burner phone not obviously my and my real phone burner phone and clicked on the links and while i was doing this i was recording the internet traffic and recording the activity on the phone and what was installed when i clicked the link was a very sophisticated spyware payload and the interesting question was who who could
4:09 am
be behind this who might have programmed the spyware who might have sold it who might be using it and. the process to figure that out is called attribution so what we did in the report is we noticed that when you clicked on the link a 2nd time it wouldn't cause the infection it was only limited to the 1st click and the 2nd quake would send you to a d. quite website to try and make it look innocuous or banal so we clicked on it a 2nd time we got redirected to google but it wasn't just any redirect to google it was a very specific piece of code that someone had sat down and written on their computer so we figured well maybe this is part of this spyware somehow and if we can scan the internet we can find other servers that have the same weird redirect to google so this is exactly what we did we use the popular open source z. map program we scan the internet and found 149 other servers and this is where it
4:10 am
gets interesting because this 2nd redirect to google was also 'd returned by 3 servers n.s.o. q a dot com q a into q a dot com and mail one dot n.s.o. group dot com and the name here and also group we found in a brochure in the israeli government's website they had a brochure for this company n.s.o. group which is based in israel and sells a product called pegasus which is spyware for mobile phones in the case of pegasus citizen that did very good work and was very you know very lucidly able to say that pegasus had been written by in a sobering but it's actually stream we rare that we're able to get that sort of concrete attribute in and say this malware was written by this company. the n.s.o. group is a technology company based in had in israel founded in 2010 it employs over 500
4:11 am
cyber security experts pegasus spyware is viewed as its most important product. israel is one of the most sophisticated cyber actors in the world and i think that a lot of this is because the israeli army is training. people to do this sort of often. acting or you know in their military service a lot i mean. how do you. come into left within the. way as you've done the a list of what i'll ask it again is a lot of up on the levee the cup to hold the shuttle the more talk about. it was all of the with a call on the list likely are an essay. which is called unity $200.00 it's pretty
4:12 am
big we allow them to create companies. and lead in order for the companies to develop they need to make what do they need to make. money. they need to make money. tama delmas how spoke to william binney who for over 30 years worked with the u.s. national security agency a former cryptographer and later a whistleblower benny was the n.s.a.'s technical leader of intelligence benny has a high level understanding of the agency's data collection systems what that means is any i phone or any phone in the world 1st connecting to the network when you want to use it you're immediately known worldwide. i mean all the switches have you and they capture your ip and all and your phone and mac numbers and all that that's how they bill you so that also is the known by the network and the implants computer network exploitation implants they have around the world over this was in
4:13 am
2004 or 2010 somewhere in that range they had over 50000 implants and all these switches servers and networks worldwide i mean that means they own the entire network so that if you your phone comes on the air then they can they can know who you are and where you are. in citizen lab exposed n.s.o. and it's pegasus spyware in 2016 it attracted worldwide controversy n.s.o. claims its mission is to develop technology for government agencies to quote detect and prevent terrorism and crime however the nature of its targets the individuals whose phones have been hacked raises questions about these claims. when pages this was released a few years ago it was mainly targeted on human rights activists journalists and
4:14 am
politicians and targeted people maybe of people with high wealth but it's never green going to be used on the public if you were to target everyone in math net i don't think that would be as important to the people behind it they don't want to see my data they don't see your data they are going out to specific people. the danger of such spyware is its ability to infiltrate every piece of private information and hack the targeted device through the most used applications. in 2019 what's owned by facebook accused n.s.o. of hacking the popular communications tool. this raised fear amongst the huge numbers of global users of forte's and he specially at a time when some targeted victims appear to meet with dreadful consequences. it is the last of me darvill visit
4:15 am
a phone mystery in the muslim. bellaver so did. a 4 lovely dog they love dark horse i have to have my war mail the best of the muscle of the many stars. visual data on a mixed economy there's a lot. you hold. the way it will not. be called to a law. a law. so if you know you do think that you are someone who's an important target you're likely to face scrutiny by some government in the middle east or elsewhere and he were are a journalist and activist or a member of civil society i'd recommend that yes please do get in touch with with citizens or other researchers who work in the space in the car i.
4:16 am
wanted to know how difficult it was to monitor a phone suspected of being hacked and here i mean. basically it involves installing an app on the phone which allows us to inspect the internet traffic and we do this for some period of time depending on what the user would like we can do it for a short time we can do it for a long time to try and identify suspicious patterns or evidence that the phone might be hacked. while working as an investigative journalist. threats and other suspicious messages through different ops. the threats increased over the months ramping up as he worked on more sensitive regional subjects he decided to install a tracking happen his work phone developed by citizens to trace possible hacking.
4:17 am
the conventional way to hack a smartphone is to send a suspicious message to the targeted phone that includes a short text and a link when the user clicks on the link software takes control of the phone and thus makes the device accept any command sent through the link. the device is then automatically connected to a server used by the hikers and that is how the spyware gets installed on the phone the user doesn't see the spyware on their phone which is already be hacked the hackers can then control the device and all that's functions. the main challenge for spyware is to find a vulnerability in the targeted phone particularly as modern smartphone security protection techniques have developed significantly pegasus managed to advance this capability considerably to be able to penetrate fairly kinds of smartphone once the
4:18 am
infection happened the malware itself did the same stuff that we see a lot of malware do which is spy on phone calls spy on text messages and whatsapp messages and any other encrypted messages are sending and turn on your microphone and turn on your camera what made it especially sophisticated was that they were willing to use. random new exploits for i phones to infect their victims and some of these exploits could cost upwards of a $1000000.00. each supplier of pegasus spyware to its clients costs millions of dollars and it can only be. used for a limited period of time that means targeting a large number of smartphones for long periods of time costs hundreds of millions of dollars this extremely expensive cost raises questions who can afford this spyware who are n.s.o. group's main clients. on its website n.s.o.
4:19 am
group says its spyware is quote used exclusively by government intelligence as officially requested by the governments themselves does this mean that pegasus cannot be purchased by other parties when people leave the israeli military sarath they have all this very specialized very highly sought after well paid knowledge and so they take it to private companies such as and as a group. and then they sell it to countries that are known to violate human rights. because you know even though they are you know perhaps very intelligent about computer security they really haven't thought so much about the human rights implications of what they're doing or maybe they don't care biggest source of all uppity more hell it. likely will finish name call mr. hawes and medina old. get on the go go.
4:20 am
they are the more hell it is a lot of them sell it as they. did. all day me of all the old. because of the bell ben they're all admitting old. while working on this investigation tom and on his house so many signs of hacking attempts on his phone the one he had fitted out to track any infiltrations after 7 months on the 19th of july 2020 he received a phone call from citizen law informing him that the phone had been hacked. the hacking happened a few days after he had aired an investigative documentary about an indian tycoon which disclosed controversial leaked documents about the tycoons links to the
4:21 am
u.a.e. and his flight from that country. had used the same phone to communicate with officials and individuals in the u.a.e. in order to give them the right to reply to the allegations in the film. so the 1st thing that we saw on your phone was on july 19th between about 1033 and 11 28 am g.m.t. there were a very high number of connections to apple servers now usually your phone would just communicate with. one apple server for i cloud for your backups for your contacts sinking the information but in this case in less than an hour we saw your phone communicate with 18 different apple servers and this was very unusual you don't usually see this on phones so that was the 1st clue that something suspicious was going on and immediately after this communication stopped we saw your phone reach out to this website regular hours dot net in other words your phone connected
4:22 am
to this website and this web site stands out because we know from our research at citizen lab that regular hours dot net this website is linked to n.s.a. groups pegasus spyware so we saw your phone reaching out to this and also pegasus spyware server which led us to suspect and then later conclude that your phone was infected so what we can see from the recording of your internet traffic so let's go to this point in time here 1129 where the phone communicates with the pegasus server and we can look beforehand to see what was going on immediately before that and the only thing that we see is this communication with i cloud with apple servers we don't see any evidence that you pressed on a link or clicked on anything or went to any website so what we think happened is that these communications with the apple servers delivered the initial exploit to have to your phone in other words you didn't click on anything your phone was
4:23 am
automatically hacked a so-called 0 click like we said 0 click exploit delivered through apple servers this is a very expensive exploit yes this is if you think about the sophistication of exploits to break into phones this is as good as it gets. 0 click means hacking without clicking on any links pegasus does not require any action by the user or a click on any suspicious links the user receives a call from an unknown. caller through the internet and the phone gets hacked even without answering the phone call after that pegasus spyware is installed on the targeted phone taking full control of the device. was definitely the most sophisticated attack i've seen in the last few years is a fact it was able to be installed on a target device without the target you can click the arrow click attack this is
4:24 am
incredibly impressive and like it's a very very thing to do that so sophisticated but as the threat is difficult for us to really know much more about it is something of this magnitude they want to be conducted to still such data this is a bit of a worry we have a little rock. tamada in this hall wanted to know if this 0 click process enabled complete access to all the applications and content on his files. allergy has as far as we know they can access everything on the phone we saw from looking at the log files on your phone that they were able to access the media framework so they were able to turn on the microphone turn on the camera if they wanted to and listen in to meetings or conversations going on around your device they were also able to tap into the teaching on the phone this is where your passwords for e-mail
4:25 am
accounts social media may be stored. the fact the citizen lab was tracking thomas phone helped him take precautionary measures to prevent sensitive information being accessed the most important thing was for him to discover the moment the hacking took place and who else was affect it. well we found working together with al jazeera as i t. team is that your case was not the only one there were at least $36.00 other cases inside al-jazeera of phones that were communicating with servers that we linked to n.s.o. groups pegasus spyware in other words there were many different people at al-jazeera who were hacked and targeted not just you. all miss holland the team from citizen lab i'm the lies the data connected to the hacking technology which targeted these devices the hack appeared to be part of an organized campaign
4:26 am
targeting simple taney asli the mobile phones of dozens of al jazeera journalists in order to spy on them. according to citizen labs technical reports israel's pegasus spyware was used to infiltrate these phones so by looking at the links and the accounts the hacking of the phones was carried out mainly in the u.a.e. and saudi arabia the 2 countries most used this advanced israeli technology in the region. but what we saw with the infections inside al-jazeera is that about half of them were from this operator that we call monica it's a code name that we give these operators when we referred to them inside citizen lab and this operator is spying mostly in saudi arabia and qatar but not very many other countries so this tells us well if they're spying mostly in saudi
4:27 am
arabia maybe it is in fact the saudi arabian government and the other half were from this other operator that we call sneaky kestrel inside citizen lab and this operator seems to be mostly targeting inside the united arab emirates and qatar so this tells us that the government in this case may be the united arab emirates government in other words 2 different governments it was. it's like we're behind this campaign. deals to purchase pegasus spy ware are no longer a secret many reports claim that saudi arabia and the u.a.e. have spent hundreds of millions of u.s. dollars to buy pegasus from israel such deals seem to be reinforced after the recent u.s. brokered so-called normalization deal between the u.a.e. and israel.
4:28 am
after unprecedented scenes of violence and chaos on capitol hill joe biden and harris will be sworn into office but with a bitterly obstructive for the president and a continuing pandemic just how different will the traditional celebrations need to be special coverage of the u.s. presidential inauguration announces in. madagascar. a breathtaking tropical paradise. where its former protectors. are now its undergirds. we follow their journey as they put their lives on the line to live. risking gets all medical. on al-jazeera. they coming home and in search of work to provide
4:29 am
a better life for the families they've left behind. but though they may but is vital to least food industry they risk exploitation by corporations and organized crime. trapped in a system with little hope of escape people in power investigates easily 6 legs on al-jazeera. moved out of his parents' house after he got mad he says he found more space living in this case after a run of eating it last year it's now his home along with his wife daughter and health but there's really governments at the cables be constructed without them permits and issue that the militia wouldn't last was our interview with cut short as he hears that the israeli army has arrived in the village with a bulldozer residents say soldiers gave them one minute to go home it took the found me months to build their brick house and dust in an hour to see it get
4:30 am
demolished. hello again everyone so we're going to here in doha the top stories on al-jazeera the u.s. house speaker nancy pelosi says she'll go ahead with impeachment proceedings against donald trump unless he's removed from office 1st the 25th amendment allows vice president mike pence to declare donald trump unfit to carry out his duties oust him from office if they fail to do so close he says that congress will move forward with impeachment proceedings on charges of inciting riots or spike can a reports now from washington speak of the house is now sent a letter to lawmakers saying that on monday in the house a motion will be introduced calling on president president pence to invoke the 25th
4:31 am
amendment to convene his cabinet to get a 2 thirds majority and decide that president trump is incapable of maintaining office she is hoping for unanimous consent in which case there is no vote however the speaker says that if there is no unanimous consent in the house on the following day tuesday a vote will be held the request will be sent to the vice president to invoke the 25th amendment immediately if he refuses to do so since the speaker of the house then impeachment proceedings will get underway in the house at least 25 domestic terrorism cases been opened following the insurrection of the u.s. capitol on wednesday according to army secretary ryan mccarthy 5 people died when trump supporters stormed the building attempting to overturn the results of the selection of the most senior democratic senator chuck schumer has warned that there could be further violence particularly around joe biden's inauguration. as the
4:32 am
u.k. accelerates its vaccination program its chief medical officer should have dire warning about the capacity of hospitals to treat the rising number of seriously ill covert 19 patients chris which he says the national health service is facing its most dangerous situation yet he says that hospitals could become overwhelmed at emergency patients turned away in 3 weeks time if people ignore the containment measures bahrain says it will reopen its airspace with castro on monday if it comes after gulf arab leaders signed a declaration to end a 3 and a half year dispute between qatar and saudi arabia the u.a.e. bahrain and egypt the 4 countries that imposed a blockade on castle in 27. there's the headlines now let's get you back to our jazeera world.
4:33 am
in nov 2020 al-jazeera arabic contacted a top israeli cyber security official to find out more about data and cyber cooperation between israel and the u.a.e. . the official refused to speak on camera but said he had just returned from an official business trip to the u.a.e. designed to promote high profile official coordination between the 2 countries according to lead to reports it's really a morality cyber cooperation developed significantly iran this time. the arrangement seemed to be that full security coordination between the 2 countries allowed an exchange of information while the u.a.e. invested millions of u.s. dollars in the israeli spy where the benefits were allegedly governed by rules set by the israeli intelligence services.
4:34 am
in double call names of lee. a shot of. me and him and yes. now that made her seem a lizard gumley cut them. some bullshit. to. a level sold 8 or 9 or limbaugh or limited enough to hold both all gum she. did not like. the uk and like them yes issue wish they did mission was inches owing to me by offering lube car. dark matter is an emirate a company that is seen as the main player in the u.a.e. cybersecurity market. dark matter is
4:35 am
a very interesting case since this company based in the united arab emirates and they do a sort of both defense as well as off and there was this great reporting from both foreign policy as well as reuters which looked into their office of operations meaning hacking so what what these reports were able to establish is that there was this group of n.s.a. former n.s.a. and former cia intelligence officials from the united states that went to go work for the u.a.e. government under the auspices of this company dark matter. and just a follow on to that and it clear dark matter was not employing former n.s.a. officials to spy on americans because that would obviously be a federal crime yet the united states and we don't do that and it's not within already our mission and i would like sort of to stress this point is to enable societies and economies to sort of pursue their agenda of smart and save physical so if it would be contrary to our mission and you can categorically say that dark
4:36 am
matter doesn't spy on you a citizens we don't do that that's not within our capabilities so that if we don't do this work they're lying they're lying it's the only thing that had been in a massive data for them i designed these were mathematical programs we had no upper limit on their capacity to handle data not. there was no no problem trillions quadrillions of data doesn't matter we had no mathematical limit that i could see. the american investigative website the intercept published a report in a top or 2060 based on the experiences of an italian cyber security researcher approached by dark matter the report claimed that dark matter had discussed plans to hack any device it wanted to in the u.a.e. at the press of a button the report also cited a number of dark matter employees who were former u.s. and s.a.e.
4:37 am
and intelligence officials the employees said they were asked to carry out offensive operations under the banner of protecting u.s. easy national security dark matter dismissed the researchers allegations saying it preferred quote talking reality not fantasy time out on this home at the office of the report jenna mclachlan who has investigated the work of dark matter extensively . around 2015 the u.a.e. and its company essentially linked pretty closely to its own defense defense services dark matter wanted to get some of those employees into their own roof so they could do a lot more things more freely because some of those u.s. contractors were restricted by u.s. laws they were drawn by massive salaries promises of staying in beautiful places poolesville was yachts even sometimes so once some of these employees
4:38 am
arrived in dark matter they were sort of asked questions about how to use the skills and offensive manner in order to do that. they would also have to see the corners as would be held by by that contractor in the skip but the approval for the clearance would come from and this if it was against him and so on so the day agencies would approve it so that implies that everything that they're doing with these contractors is approved by the. dark matter and we're covering the whole. lot of people around the world. and you know we're. going to who are. on the scene. within the last few years i returned to abu dhabi for
4:39 am
a defense conference and i got the chance to speak to some of my sources and others that i've met sense and they told me that all the negative attention on dark matter from my reporting and subsequent reporting from reuters and others really drew a lot of attention that the royal family was not interested and as a result of that members of the royal family extremely high ranking. officials sort of went to dark matter and said you need to change the names of this remove it get it out of here be a lot more and just create i think from my perspective ok having a contractor a u.s. contractor working for a foreign government means they are now an agent of the foreign government. know the u.s. agents who are and having them come from a place like n.s.a. where they're dealing with classified activities and then going over and assisting in a classified that similar classified activities in another country means there are
4:40 am
foreign spies now they're not u.s. citizens in the couple months after i felt published my 1st story in between publishing my 2nd foreign policy magazine i was contacted by a sort of mysterious source who offered documents that i was never able to verify who had been telling me that within the company they had already been debating whether or not to hack me but i mean years later the intercept after i had left confirms that the intercept was a target of the government according to a number of reports don't try to hijack the intercept website. a report published by the intercept in june 29th teen said the dog might have brought x. national security agency hackers and other us intelligence and military veterans to compromise the computers of political dissidents at home and abroad including american citizens. according to the
4:41 am
intercept dark matter headquarters is located in this building in abu dhabi. they had a problem analyzing data on u.s. citizens from another country as a u.s. citizen so that that is illegal. under title 18 laws governing you know classified material and classified activities later on citizen lab demonstrated that dark matter was the main operator of the israeli pegasus spyware in the u.a.e. besides its american staffers dark matter also employed x. israeli officers in branches in the u.a.e. cyprus and singapore the company is reported to have paid millions of dollars for their services both al-jazeera arabic and al-jazeera english contacted dogmatic and offered them the opportunity to respond to all the allegations made in the film they declined to comment to either request a similar deal
4:42 am
a shower valve in the delafield top of. moscow or gloat mode at this year's world it's normally the t.v. . 6 in the system seem but on certain you'll select even vs from stuff vs me stuff almost always see him on the show but all nas ought nagin and they're good. they're good the all you. really good. team but all we certainly do see that. israel is a hub if not in the world and certainly in the region for this sort of cyber technology and i think you know one of the things that we're going to see more and more countries like the u.a.e. that have these big ambitions in cyberspace are going to try and replicate that sort of talent pipeline in their countries it's very scary especially when the targets are journalists civil society dissidents these sorts of people being spied
4:43 am
on by foreign governments or their own government in some cases it's really shocking and i think it's an abuse of the spyware the reason that the governments are interested in spying on them is for intelligence purposes to figure out what they're up to what they might do next and if they can figure out what someone's doing what they're about to do then they can put a little bit of pressure on people and try and influence and shape the way that events unfold. or they contacted many alleged victims of these spyware they declined to appear in the film for fear of their and their family's safety. is a london based journalist working with a lot of the t.v. her phone was hacked by pegasus spyware between october 29th and july 2020.
4:44 am
1 i want. one of my heavy. costed out caves that they want out. says you are many it's a torn ligament couldn't sit still not paying the button and no bottom is just as big a serious. i'm about to duck like a mouthful of men. who are going to win the fight i've been in and huffy about sophism a lot of them. if i may look at i went in and said oh and when i lift. some . i lift. more out of model should then.
4:45 am
in what i think. there's lots of journalists that get targeted and hacked but far fewer of them are willing to come forward and tell their stories so i think that you know if you were to look at some of the top media organizations in the world maybe you'd find other other instances of people getting hacked or targeted you know we had a case of course back in 2018 where the beirut bureau chief for the new york times ben hubbard received a text message linked to pegasus spyware on his phone. on the a little what i think there are so the question is with this advanced technology how can people ensure their devices are safe from hacking with paying for it for example. it would have been very hard to find out that your phone had been hacked the best thing you can do is keep your phone up to date if you have it always install the updates when your phone says it's time to update. if you get
4:46 am
a text message with a link that you're not expecting don't click on that link if you get an e-mail with only or a fire earlier than expected don't click on that link don't open that file if you do have something. very sensitive to talk about the best thing to do is to do your phone at home and go on a walk all phones. have police he's on them and if they're known they will get patched by apple and android and so on but there are going to be on abilities on those devices that are unknown yet and therefore any device is or will have a weakness that can be exploited i am sure there are organizations all over the world looking for those unability to exploit in the future no doubt it will happen again it's just a case of when. electronic frontier foundation the f.x. is a u.s. based organization whose goal is to technically and legally defend journalists and
4:47 am
civil society activists who face cyber crimes committed by governments the f.s.f. has documented a rise in the number of pegasus associated cyber crimes against journalists and activists working on sensitive cases. we fight against the government abuse of surveillance battlers and uses that are inconsistent with human rights standards and that was using mexico to try to get like comment but he stayed here which is some very famous investing at the least in the country and we have seen on some that you some in this passes in mexico are targeting activists who are fighting corruption and who are fighting for instance and camping at the cafe against corporations for the use of of sugar are so we have these also against many other jordan at least who are doing just their work in my work we have studied similar. mobile phone hacks against journalists
4:48 am
in. kazakhstan and human rights defenders in opposition politicians and other than civilians in lebanon and on the border of lebanon and syria being spied upon by their various governments. in israel lawyer. represents a number of phone hacking victims who have decided to file lawsuits against the israeli n.s.a. group. on easter meant to kony a bigger source. yet him on probably the more and probably the world that improbable incident where you are hardly saw the. field since a young man and i dida there and then i had him at the. head they were there.
4:49 am
for sale in a had a cotton. for what i'll call the yard. and all the what the meal heavier surely. only a colonial came in and a teacher took the. minister. and with diet american says he led me to feel having a shocker who are not the coming of the month we had of. you had to learn to have what i could be other opposite another that way. helena selenium. wanted to know why the legal liability towards victims of hacking lies with the manufacturer or the purchaser of the spyware. bunnies are saying that they only. sell these 2 governments and that they only sell it to investigate federal research organized crime. bad and they don't
4:50 am
governments who don't respect human rights but that's not true you know and that goes down it's lead out under international law it's inconsistent you know we're being here also with a constitution we may need a gun treaty we have in the last i personally know about dozens of events that the terrorist attacks were intercepted only due to the availability of such. intelligence capability name can see of. a just. as there are. commercial thought. that suffer you more that on their model didn't see as a year in. the subtotal war are there and then a look at hand have you had the eye with their own latino myth in the home a bad man your corn and their corn. in 2020 an israeli court banned the media from publishing any details about these cases in the
4:51 am
interests of protecting israel's national security. al-jazeera arabic contacted the n.s.o. group requesting an interview with senior management to give them the right to reply to allegations made against the company in this film the company sent a short reply declining the interview request al-jazeera english contacted the n.s.o. group to give them the right to reply to allegations made against the company in this film they did not respond with colcannon in this really should have got in this or this only or they had a will how well or put what they feel the economy or the biggest was. doing it in the most warm awful call way is that of the good i was at the development is likely to be tele couldn't fall could comment to be having a shot of the winner. housefull almost all the court wall folk at the moment it's only a method of it was of a different. amnesty international also to legal action against taxes
4:52 am
they accused party this time was the israeli defense ministry itself being the official body that approves and authorizes the selling of spyware. disappointed we will have to see what the court decides with the ruling on the case itself we hope that the court will decide the way it should and revoke and secure the license. and israeli court dismissed the case amnesty international said quote a mountain of evidence was ignored and called the court. to the defense minister's impunity to human rights violations miley actually said the court's decision was obviously disappointment it was a it was a very strong judgment the didn't take into consideration the evidence that we put forward or the legal arguments that we thought were important and while we're
4:53 am
disappointed in the judgment we still think it was a very important case in the growing evidence misuse of technology or the misuse of it as those technologies by our clients and we hope that by bringing this case and supporting this case we're bringing to attention the very serious issues and potential human rights impacts for technologies like n.s.a. was pegasus and others that are being used with impunity around the world by repressive governments and governments who have a terrible human rights record. all because. only. more amnesty. don't give a damn about islam but them. becoming. more devout. or.
4:54 am
the whole. al-jazeera english contacted the governments of israel kingdom of saudi arabia and the united arab emirates and offered them the opportunity to respond to all the allegations made in the film they did not respond i actually would also like to know a little bit more about what happened in the rejection i think there's a few different things at play here one is that it's very difficult to know the relationship between the ministry of defense and i so there seems to be a lot of crossover at high level staff in the ministry of defense and israel is the is the ministry that approves exports and basically our case was saying either the ministry of defense is not giving export licenses in line with international human rights standards or they are giving exports in line with international human rights
4:55 am
standards but they have a they have a company and in their jurisdiction who is acting outside of the legal export license because we've been for tom and others whose phones have been hacked the question is what recourse if any do they have. this sort of evidence does show that your phone was hacked and shows that there was a connection to n.s.o. group if you wanted to bring a legal action i will say that there are other targets that have been the legal process in israel in cyprus and most recently in the u.k. . a lot of the laws in this in this. begin. by. i am because she has
4:56 am
a lot of the law. left gabby is now down. and down as far as a lot of them may. be and many of them all in my old b. album with a lot of money. they hustle the milkers the be colored glasses that are saving me to her loss and hon are there some comical wilma feelings that your guilt over. our smartphones have become an inevitable necessity of modern life however we have also turned into a window through which security services can access our private information they can become a weapon used by unscrupulous governments to spy on us with little legal or more deterrence. there is still much to be uncovered in this secretive world of hacking and advanced spyware for tamada massage this investigation into his own
4:57 am
forms hacking has been both revealing and alarming. she was a society hostess in beirut in the 1940 s. she was in touch with a lot of people from the lebanese the recrossing in order to make this work her code name was the pair and she spied for mossad in lebanon to perform. what she was doing it was something brave as a woman al-jazeera well tell us a story of shula coing. the beirut spy.
4:58 am
we've got some very heavy rain moving in across southern parts of the u.s. at the moment this massive cloud making its way through on the northern flank of that system we could well see some snow as well with a high pressure here was traveling in a clockwise direction around high pressure in the northern hemisphere side the cold adding in all the way down the temperatures do start to recover as we go on into monday 07 all right in texas heavy rain moving through louisiana mississippi alabama pushing over towards georgia over towards the carolinas it will continue to track its way through was clear dry weather coming back in behind us we go on through what shoes day good enough they temperatures do still struggle to get into double figures up to a specific northwest that we got more snow coming in western parts of canada will
4:59 am
see some heavy snow fall over the rockies sent that mountain snow there in idaho because some wet weather there just around oregon northern parts of california as we go on into the middle part of this week somewhat weather to just around the yucatan peninsula thickening cap will bring some heavy bursts of right into were the yucatan just around beliefs and what's the weather across a good parts of central america aracely some heavy showers all the way down towards nicaragua and costa rica but for the fine and dry. she's 70 years old she's a hard worker she's cool and i guess that is the best friend. to make their dreams come true. do you find. china's little rock star.
5:00 am
on al-jazeera. removed donald trump or we will house speaker nancy pelosi plans a resolution urging his dismissal failing which democrats would push to impeach the u.s. president. hello everyone for this is a lie from also coming up such operations resume and. to try to retrieve the black boxes of the plane that crashed with 62 people on board we'll have a live update. convict todd curtis nationalist politicians.


info Stream Only

Uploaded by TV Archive on