Pegasus gives new meaning to being hacked.
Imagine your phone charging on your nightstand and suddenly it’s on, the mic and camera active, and you have no idea. Think about someone being able to read your emails, even those that are encrypted. Maybe it happens during a private business meeting, a doctors appointment, or even during government business.
Imagine, someone have access to such an intrusion into the private lives of just anyone, anytime, anywhere.
Imagine no more. Here it is. The vid explains it all.
VIDEO -Here’s the highlights- What is in the Pegasus project data? What is in the data leak? The data leak is a list of more than 50,000 phone numbers that, since 2016, are believed to have been selected as those of people of interest by government clients of NSO Group, which sells surveillance software. The data also contains the time and date that numbers were selected, or entered on to a system. Forbidden Stories, a Paris-based nonprofit journalism organisation, and Amnesty International initially had access to the list and shared access with 16 media organisations including the Guardian. More than 80 journalists have worked together over several months as part of the Pegasus project. Amnesty’s Security Lab, a technical partner on the project, did the forensic analyses. What does NSO Group say? “You can read NSO Group’s full statement here. The company has always said it does not have access to the data of its customers’ targets. Through its lawyers, NSO said the consortium had made “incorrect assumptions” about which clients use the company’s technology. It said the 50,000 number was “exaggerated” and the list could not be a list of numbers “targeted by governments using Pegasus”. The lawyers said NSO had reason to believe the list accessed by the consortium “is not a list of numbers targeted by governments using Pegasus, but instead, may be part of a larger list of numbers that might have been used by NSO Group customers for other purposes”. After further questions, the lawyers said the consortium was basing its findings “on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers’ targets of Pegasus or any other NSO products … we still do not see any correlation of these lists to anything related to use of NSO Group technologies”. What is HLR lookup data? The term HLR, or home location register, refers to a database that is essential to operating mobile phone networks. Such registers keep records on the networks of phone users and their general locations, along with other identifying information that is used routinely in routing calls and texts. Telecoms and surveillance experts say HLR data can sometimes be used in the early phase of a surveillance attempt, when identifying whether it is possible to connect to a phone. The consortium understands NSO clients have the capability through an interface on the Pegasus system to conduct HLR lookup inquiries. It is unclear whether Pegasus operators are required to conduct HRL lookup inquiries via its interface to use its software; an NSO source stressed its clients may have different reasons – unrelated to Pegasus – for conducting HLR lookups via an NSO system.
See the full article at The Guardian Authors David Pegg and Sam Cutler Sun 18 Jul 2021 12.00 EDT
Support the Guardian
Get ready for it. Whether you follow this type of thing or not, even mainstream media will carry this story.
Can’t wait to see who is on that list.
Let the panic ensue.
Like this: Like Loading...