EU finds signs of Israeli spyware use on top official phones: Letter

28 Jul 2022

Source: Agencies

By Al Mayadeen English 

EU Justice Commissioner Didier Reynders stated in a letter dated July 25 that Apple alerted him in November 2021 of possible hacking of his smartphone by the Israeli Pegasus software.

Israeli cyber firm NSO Group’s exhibition stand at an Israeli security expo in “Tel Aviv” (Reuters)

The European Commission, the EU executive’s arm in Brussels, has discovered indications that the phones of some of its top officials have been targeted with spy software designed by Israeli surveillance firm NSO Group.

EU Justice Commissioner Didier Reynders stated in a letter dated July 25 to Dutch MEP Sophie in’t Veld that Apple alerted him in November 2021 of possible hacking of his smartphone by the Israeli Pegasus software.

Pegasus is Israeli spyware that targeted prominent and influential figures all around the globe, including politicians and journalists.

The Israeli NSO Group-developed spyware leaks stated that there are more than 50,000 records of phone numbers that NSO clients selected for surveillance since 2016.

An internal investigation did not “confirm that Pegasus had succeeded in infecting the devices, personal or professional,” of him or other EU employees as per Reynders’ letter.

But “several device checks led to the discovery of indicators of compromise”, the letter said, stressing that “it is impossible to attribute these clues to a specific perpetrator with certainty.”

The letter did not provide further details on the outcome of the Commission’s investigation, which is still ongoing, citing security concerns.

It is worth noting that in ‘t Veld is part of an EU Parliament investigation into Pegasus, which is looking into allegations of Pegasus spyware used by EU governments, including HungaryPoland, and Spain.

After a scandal involving the use of Pegasus to hack top politicians’ mobile phones, Spain’s Prime Minister, Pedro Sanchez, vowed last month to tighten oversight of the country’s secret services.

The scandal broke in April, when Citizen Lab, a Canadian cybersecurity watchdog, revealed that the phones of more than 60 people associated with the Catalan separatist movement had been tapped with Pegasus spyware.

Reynders stated that the commission had sent requests for additional information on Pegasus usage to Hungary, Poland, and Spain.

Almost a year now, the world continues to react to the Pegasus spyware scandal as press reports continue to reveal how it aimed to target powerful and prominent figures, including politicians, journalists, and activists.

Read More

Why Israel is reluctant to give the UAE help against the Houthis

Israeli sources tell MEE that giving air defence systems to Abu Dhabi might compromise Israel’s technological edge – and even anger Washington

Published date: 9 February 2022

By Yossi Melman

Following the recent missile and drone attacks by Yemen’s Houthi movement on Abu Dhabi, the United Arab Emirates’ rulers have turned to Israel for military assistance.

The most recent drone attack occurred during last week’s state visit of Israeli President Isaac Herzog.

It wasn’t the first Houthi threat to Israel. In the past, the Iran-aligned Houthis have threatened to launch their missiles against Eilat, the southern Israel port city located 1,500km from Yemen.

In response, Israel two years ago increased its state of alert in the Eilat region and has occasionally deployed Iron Dome batteries there based on intelligence warnings. Simultaneously, Mossad and military intelligence stepped up their monitoring of Yemen and information-gathering there.

Recently, a high-ranking Israeli delegation consisting of defence ministry officials, Mossad operatives and executives of Israeli arms manufacturers visited the United Arab Emirates.

Emirati officials are especially interested in Israeli-made air defences, such as the Iron Dome, David’s Sling and Arrow, as well as their radar systems.

Until now, all Emirati and Saudi anti-missiles systems are US-made, such as the Patriot batteries.

Israeli sources told Middle East Eye that they are considering the UAE request, but added a caveat, arguing that it is a serious matter that must be dealt with using caution.

Israel will have to balance between its desire to sell weapons around the globe – it was officially announced this week that it granted military export licenses to 139 countries – and the need to protect its homemade sensitive equipment.

Technological edge

The Israeli dilemma is how to maintain its own technological edge while selling systems to strategic partners. In the past, it was reported that Saudi Arabia is also interested in Iron Dome systems.

So far, Israel has sold partial components for Iron Dome, such as radars and ground control, to Singapore and Azerbaijan, but not the intercepting missiles, manufactured by state-owned company Rafael. Washington purchased two Iron Dome systems to evaluate their effectiveness.

The Israeli dilemma is how to maintain its own technological edge while selling systems to strategic partners

Israel claims that during its wars in Gaza, Iron Dome has shown a 92 percent interception rate when downing Hamas’s missiles. In the past, South Korea has also expressed interest in the system, which is capable of intercepting rockets that have a range of around 80km.

However, there is also one more obstacle in the way of Israel delivering air defences to the Gulf, one that is perhaps even stronger: the United States.

The US perceives the region as its sphere of interest. It has a military presence and bases in Qatar, Bahrain and the UAE.

Washington sells them weapons of all sorts, from F-35 fighter jets, drones and intelligence tech, to naval equipment and anti-aircraft batteries.

American security and military corporations would not like seeing Israeli competition entering what they consider as their backyard.

Secret cooperation

For years, the Mossad facilitated secret ties between Israel, the UAE, Bahrain and Saudi Arabia, which has resulted in close intelligence-sharing cooperation against Iran, as well as sales of intelligence equipment such as the infamous Pegasus spyware.

Israeli firms such as Logic, owned by Mati Kochavi, secretly operated for years in the UAE. Kochavi employed ex-Mossad and Shin Bet officials, as well former experts from Israel Aerospace Industries.

After Kochavi fell out of Abu Dhabi’s ruling Nahyan family’s graces, he was replaced by David Meidan, a former Mossad operative, as the mediator between Israel and the UAE.

All of these clandestine deals and contacts were approved and encouraged by the Israeli defence ministry.

UAE: Dubai Expo 2020 workers claim forced labour practices
Read More »

Since open normalisation began with the signing of the Abraham Accords in 2020, Israel has been able to open full diplomatic and commercial ties with the UAE, Bahrain and later Morocco, as well as enhance its intelligence relations.

Cooperation no longer needed to be kept a secret.

Last week, Israeli Defence Minister Benny Gantz visited Bahrain, met with its rulers and signed with his counterpart a memorandum of understanding for security cooperation – the first agreed with an Arab country.

Only the special relations between Israel and Saudi Arabia remain secretive.

Despite the encouragement and lobbying by Donald Trump and his administration, Riyadh refused to take the public plunge.

Yet Israeli security and diplomatic sources told MEE that they have great expectations that once Crown Prince Mohammed bin Salman sits on the throne, after his old and ailing father King Salman dies, the kingdom will most probably bring the relations into the open.

In the meantime, Saudi Arabia and the other Gulf states will continue and even accelerate their security collaboration with Israel and purchase more arms.

PAPSN: AU Ignores Foundational Values By Upholding Apartheid Israel’s Observer Status

February 7, 2022

African Union summit in Addis Ababa. (Photo: via AfCFTA Secretariat Official Twitter Page)

[Editor’s Note: The Pan African Palestine Solidarity Network (PAPSN) issued the following statement regarding the African Union (AU) Summit on Sunday and the way that Israel’s ‘observer status’ was handled by AU leaders and new chair, Macky Sall.

Though initially, the AU had decided to suspend Israel’s observer status, which was granted by AU Commission Chair Moussa Faki in July 2021, the new Chair has reportedly ended deliberation with the understanding that Israel’s status is to remain in effect until a new AU Commission produces a final verdict.]

PAPSN Statement, February 7:

The Pan African Palestine Solidarity Network (PAPSN) is extremely disappointed that, on Sunday, the African Union (AU) Heads of State Summit ignored its responsibility to uphold the values enshrined in the AU Constitutive Act and the African Charter on Human and Peoples’ and Rights: to fight against apartheid, racism, colonialism and Zionism. 

PAPSN has campaigned against the accreditation of apartheid Israel, an outrageous and unilateral decision by Moussa Faki Mahamet, AU Commission Chair, in July 2021, and we welcomed the news on Sunday morning that a closed meeting of the Summit had unanimously agreed to appoint a committee to investigate the granting of observer status to the apartheid state of Israel. The committee includes three presidents who have opposed Israel’s accreditation – Algeria, South Africa and Nigeria; three who support it – DRC, Rwanda and Cameroon; and the president of Senegal in his capacity as Chair of the AU. The meeting also agreed that until the committee makes its final recommendations, the decision to accredit Israel would be suspended. This was a principled and sensible decision, and helped avoid a split in the AU. 

However, in the course of the day, Israel and its supporters lobbied hard, certainly promising more military, surveillance and intelligence assistance to certain African leaders. As a result, AU member states supporting Israel insisted, in the afternoon, that the issue of the suspension of the July decision be reopened for debate, betraying the AU spirit of consensual decision-making. PAPSN commends the delegations, such as those of South Africa, Algeria, Namibia, Nigeria and many others, which argued strongly that the earlier decision should stand, and that Israel’s accreditation should be suspended.  However, a number of states argued that Israel’s observer status should remain valid. Shamelessly, some politicians even used the AFCON final that was to take place a few hours later, to curtail discussion and cut short the meeting. Shockingly, the AU Chairperson, Senegal’s President Macky Sall, suddenly ended the meeting with a declaration that Moussa Faki’s decision to accredit an apartheid state was upheld, pending the deliberations of the committee. 

President  Sall repeatedly stated that the AU should not be divided by a “foreign issue”. This is an insult to the people of Africa and the AU’s predecessor, the OAU, who fought for decades to rid our continent of apartheid, colonialism and settler-colonialism. Nor can Zionism be regarded as a “foreign issue” when the African Charter on Human and Peoples’ Rights explicitly makes fighting Zionism an AU responsibility.  

What the meeting made clear is that there are governments and peoples on the continent that refuse to accept an apartheid state having observer, or any other status, in the AU. Most southern African countries, as well as Algeria, Nigeria, and Tunisia, argued strongly against Israel’s supporters, insisting that the AU abides by its commitments and remains consistent with its various policy pronouncements on Palestine.

The committee formed Sunday morning gives us some hope that the values of the AU may yet be upheld and that the AU can redeem itself. President Sall, the incoming AU Chair, showed that he was not willing to cause a damaging split in the AU by putting the matter to a vote, thus disappointing apartheid Israel, which failed to defeat the principled countries standing in opposition.

Regrettably, though, Sall is also not yet willing to act consistently with AU resolutions on Palestine. Now, as Chair of the committee, he has an opportunity to uphold the values that have guided Senegal since Senghor, and to implement the will of the Senegalese people, who stand firmly against apartheid and stand with the Palestinian people. 

PAPSN calls on Sall and others on the committee to consider that there is no coincidence between the re-emergence of military coups and the increase in Israeli arms, spyware and mercenaries in our continent. In the last decade, Israeli military exports to Africa have increased by 309%. Last year, we discovered that Israeli Pegasus spyware was used by authoritarian regimes in Africa against their own citizens and even against other heads of state. If African leaders are serious about peace and security, they cannot allow apartheid Israel to have any status whatsoever in the AU. As long as Israel is allowed free reign in Africa, we cannot expect it to be free of coups and instability. Israel is a threat to peace in Africa!

PAPSN calls on the seven presidents on the committee to abide by the principles and values of the AU Constitutive Act, the African Charter and numerous resolutions on Palestine taken since the formation of the AU. Our Heads of State have a responsibility to uphold the values, principles and human rights laid out in AU foundational and definitional documents. AU member states have a principled, political and legal obligation to oppose settler colonialism, apartheid; Israel’s extractive plundering of African resources and expansion of military and surveillance capabilities on our continent; to fight against Zionism; and to support the liberation of the Palestinian people. 

(PAPSN, The Palestine Chronicle)

MBS called Netanyahu to renew KSA’s NSO Pegasus spyware license: NYT

Jan 28 2022

Source: NYT

By Al Mayadeen Net

After the license for the NSO Pegasus Israeli-made spyware expired, Saudi crown prince Mohammad bin Salman offered to grant Israeli jets access through KSA’s skies in exchange for the renewal.

The NYT article said that Pegasus was first sold to the kingdom in 2017 for a $55 million installation fee

According to The New York Times (NYT), Saudi Arabia’s Crown Prince Mohammad bin Salman called former Israeli Prime Minister Benjamin Netanyahu directly to request a renewal of the kingdom’s expired license for NSO Group’s Pegasus spyware in exchange for opening its airspace to Israeli flights.

The Israeli Security Ministry refused to renew Riyadh’s license for the program after it expired, citing “Saudi Arabia’s abuse of NSO’s spyware,” presumably referring to the case of Jamal Khashoggi, a Saudi journalist who was reportedly spied using Pegasus in the lead up to his assassination in 2018.

NSO was unable to supply Saudi Arabia with routine software maintenance due to the lack of an Israeli export license, the report said, adding that its systems were crashing. NYT reported that numerous calls between the crown prince’s aides, NSO executives, the Mossad, and the Israeli Security Ministry had failed to address the matter.

According to Israeli sources familiar with the call, the crown prince then made an urgent direct phone call to Netanyahu, requesting that the license be renewed. This call occurred before the normalization agreements between the Israeli occupation, UAE and Bahrain were signed in 2020.

For the first time ever, Israeli jets heading eastward on their route to the Gulf were allowed to use Saudi airspace as part of the arrangements.

According to the source, Netanyahu, who was uninformed of the license problems until his conversation with the crown prince, promptly instructed the Israeli Security Ministry to remedy the matter.

The same night, a ministry official called NSO’s operations office and requested that the Saudi systems be turned back on. According to the NYT, the company’s compliance officer on duty turned down the request and required a signed license.

The official told the NSO employee that orders came directly from Netanyahu. He then consented to accept an email from the government, and Pegasus spyware was up and running in Saudi Arabia again soon after.

According to the report, a Security Ministry courier handed a stamped and sealed permit to NSO headquarters the next morning.

The NYT article said that Pegasus was first sold to the kingdom in 2017 for a $55 million installation fee under the supervision of Prince Mohammad bin Salman.

Only a small group of top security officials, all reporting directly to Netanyahu, took part in the talks with the Saudis, all while taking “extreme measures of secrecy,” according to one of the Israelis involved in the issue.

According to the report, keeping the Saudis happy was vital for Netanyahu.

NSO Pegasus spyware

Israeli PEGASUS Spying on Journalists, Activists Worldwide

Bahrain, Poland, UAE, South America, Hungary, Lebanon, and in many other locations, tens of thousands of activists, journalists, and politicians were listed as potential targets of the NSO Pegasus spyware.

According to an investigation led by The Washington Post and 16 media partners, military-grade spyware leased by the Israeli firm NSO Group to governments was used in attempted and successful hacks of 37 smartphones belonging to journalists, human rights activists, business executives, and the two women closest to the murdered Saudi journalist Jamal Khashoggi.

The US Commerce Department blacklisted Israeli firm NSO Group and Candiru in November for providing their spyware to foreign governments that used the tools to “maliciously target” journalists, embassy workers, activists, diplomats, and heads of state. Facebook and Apple have sued the company after the spyware was discovered on devices belonging to dissidents and journalists.

A UAE Agency Put Pegasus Spyware on Phone of Jamal Khashoggi’s Wife Months before His Murder: Washington Post

December 21, 2021

Emirates flight attendant Hanan Elatr surrendered her two Android cellphones, laptop and passwords when security agents surrounded her at the Dubai airport. They drove her, blindfolded and in handcuffs, to an interrogation cell on the edge of the city, she said. There, she was questioned all night and into the morning about her fiance, Saudi journalist Jamal Khashoggi.

The next day, at 10:14 a.m. on April 22, 2018, while her devices were still in official custody, someone opened the Chrome browser on one of the Androids. They tapped in the address of a website “https://myfiles[.]photos/1gGrRcCMO”, on the phone’s keyboard, fumbling over the tiny keys, making two typos, and then pressed “go,” according to a new forensic analysis by cybersecurity expert Bill Marczak of Citizen Lab. The process took 72 seconds. The website sent the phone a powerful spyware package, known as Pegasus, according to the new analysis. Over the next 40 seconds, the phone sent 27 status reports from its web browser to the website’s server, updating the progress it was making installing the spyware.

The spyware had been developed by an Israeli firm, NSO Group, for what it says is use against “terrorists and criminals”. The website was configured by NSO for a United Arab Emirates customer, said Marczak, whose research group is based at the University of Toronto and devoted to uncovering cyberespionage.

The new analysis provides the first indication that a UAE government agency placed the military-grade spyware on a phone used by someone in Khashoggi’s inner circle in the months before his murder.

“We found the smoking gun on her phone,” said Marczak, who examined Elatr’s two Androids at The Washington Post’s and her request. Emirati authorities returned them to her several days after her release.

Marczak said he could see the Android trying to install Pegasus, but he could not determine whether the spyware had successfully infected the phone, which would enable Pegasus to steal its contents and turn on its microphone. But he said the UAE operator did not type the website address in a second time, which would ordinarily be expected in the event of a failed first attempt.

Elatr’s phone was confiscated just after she and Khashoggi had gotten engaged and were in a long-distance relationship. Because both traveled frequently, with Elatr based in Dubai and Khashoggi in Washington, they often discussed travel and meeting plans in the United States and abroad using apps on their phones, according to Elatr and her phone records.

Marczak discovered the https://myfiles%5B.%5Dphotos address in 2017 while researching the presence of Pegasus spyware on global networks. By scanning the Internet, Citizen Lab was able to identify a network of computers and more than a thousand Web addresses used to deliver Pegasus spyware to the phones of targets in 45 countries, according to group’s landmark “Hide and Seek” report. The methodology has been used by other cyber-researchers to identify Pegasus hacks worldwide.

The researchers found a particular set of web addresses, including https://myfiles%5B.%5Dphotos, associated with Pegasus targets primarily in the UAE.

Working with an international journalism consortium led by the Paris-based nonprofit Forbidden Stories, The Post reported in July that an unknown operator employing Pegasus sent five SMS text messages over an 18-day period in November 2017 and a sixth one on April 15, 2018, according to an analysis by Amnesty International’s Security Lab of Elatr’s Androids. The research could not determine if the texts resulted in Pegasus being installed inside the phone.

Marczak’s research advances the understanding of what happened to Elatr’s phone by identifying a UAE agency operator in the process of trying to install Pegasus on the device while she was in UAE custody. He also found forensic data indicating her Android was also trying to install Pegasus.

Following The Post’s report in July, NSO Group chief executive Shalev Hulio said a thorough check of the firm’s client records showed none had used Pegasus to attack the phones of Khashoggi or Elatr before a Saudi hit team murdered him in Istanbul on Oct. 2, 2018.

After The Post’s most recent reporting, NSO’s attorney, Thomas Clare, said, “NSO Group conducted a review which determined that Pegasus was not used to listen to, monitor, track, or collect information about Ms. Elatr. The Post’s continued efforts to falsely connect NSO Group to the heinous murder of Mr. Khashoggi are baffling.”

The international investigation found that authoritarian governments have used Pegasus against journalists, human rights defenders, diplomats, lawyers and pro-democracy opposition leaders. New revelations continue to roll out. France found traces of the spyware on the phones of five ministers. The U.S. State Department announced that indications of Pegasus were found on the phones of 11 employees in Uganda. After initial denials,Hungary admitted it used the spyware.

The UAE, a federation of monarchies in the Persian Gulf, has been one of NSO’s most notorious clients. It has used Pegasus against anti-regime activists, journalists and even a royal princess attempting to escape her father, the international media investigation and others have found. In October, a British court revealed that NSO Group ended its contract with the UAE because Dubai’s ruler had used it to hack the phones of his ex-wife and her lawyer, a member of Britain’s House of Lords.

The UAE continues to deny all allegations against it. The UAE Embassy in Washington did not respond to multiple requests for comment. In the past, the UAE has denied allegations that it used Pegasus against human rights activists and other civil society figures.

The UAE is a longtime ally of Saudi Arabia. In 2013, the two countries signed a mutual security agreement promising cooperation on intelligence and law enforcement matters. The UAE has spied on Saudi dissidents abroad and sent them to Riyadh, according to human rights groups and a recent lawsuit filed in federal court in Portland, Ore., on behalf of an imprisoned Saudi human rights activist.

Three years ago, Hanan Elatr was a globe-trotting supervisor for the Emirates airlines. She was married to a pro-democracy icon and earning a salary that allowed her to support her mother and siblings. Today, she said, she fears for her life.

“Every day when I see the daylight, I don’t know why I’m still alive, because I’m the second victim after Jamal in this tragedy,” she said in a recent interview, tearing up. “I lost my life … I used to provide for my family and now I can’t even find my own food.”

His new fiancee, Hatice Cengiz, was waiting for him outside the Saudi consulate in Istanbul. He had gone there to obtain a document necessary to marry her. Instead, he was murdered with the approval of Saudi leader Mohammad bin Salman, U.S. intelligence agencies later concluded.

Cengiz, whom Le Monde later dubbed the “unofficial heiress of Jamal Khashoggi,” became an effective spokeswoman in front of the crowd of television cameras that gathered outside the consulate.

SourceThe Washington Post

Israeli spyware Pegasus involved in framing Indian activist

20 Dec 2021

Net Source: Agencies + Al Mayadeen Net

By Al Mayadeen

Rona Wilson’s case, a currently jailed Indian activist, shows how far-reaching and devastating the Israeli spyware’s effect could be

Israeli spyware Pegasus involved in framing Indian activist

As we near the end of 2021, the Israeli NSO Group does not seem interested in remaining away from scandalous affairs, as new evidence points out to their malicious spyware Pegasus as an instrumental tool in possibly framing Indian activist Rona Wilson.

A recent forensic analysis of the activist’s phone, conducted by Amnesty International, revealed that it was infected with NSO’s Pegasus between July 2017 and March 2018, merely three months ahead of his arrest.

Rona Wilson is a renowned activist who advocates for the rights of indigenous communities and low-caste citizens and is a vocal critic of India’s PM Narendra Modi’s policies. Alongside a group of lawyers, writers, and artists, Wilson has been detained since 2018 on terror-related charges, chiefly among them is “plotting to assassinate” Modi.

The evidence used to incriminate the group was planted on laptops used by the activists, as revealed by research conducted by Arsenal Consulting, a digital forensic science firm.

Furthermore, the investigation led by Amnesty found that Wilson’s phone was targeted with 15 malicious messages with links to install Pegasus with the aim of compromising the device. 

“This case adds to the evidences revealed during the Pegasus Project about unlawful surveillance against human rights defenders in India using NSO Group’s products,” said Etienne Maynie, a technologist at Amnesty International’s Security Lab.

Jailed Indian activist Rona Wilson

The activist’s phone number was previously found among some 50,000 phone numbers in the list of targets for the software, which was published earlier this year. The phones in question were forensically examined by Amnesty International’s Security Lab.

Wilson’s case shows how far-reaching and devastating the Israeli spyware’s effect could be, as it is being handled by some of the world’s most notorious and censorious governments to crack on rights activists and dissidents. Modi’s Hindu nationalist government is a prime example,  

The spyware is being bought directly from NSO and was used by 44 different countries aside from India, which targeted tens of thousands of individuals using Pegasus. 

The Indian government refused to deny or confirm its usage of the Israeli spyware, citing “national security” as a pretext.

India’s Supreme Court ordered in October an independent investigation into the possible government’s use of Pegasus on political opposition figures, with the chief justice describing the implications as “Orwellian”.

NSO’s role in aiding countries known to engage in citizen surveillance first surfaced in an investigation led by The Washington Post and 16 media partners.

Pegasus was instrumental in targeting hundreds and thousands of dissidents and journalists

The military-grade spyware leased by the Israeli firm to governments was used in attempted and successful hacks of 37 smartphones belonging to journalists, human rights activists, business executives, and the two women closest to the murdered Saudi journalist Jamal Khashoggi.

Following these scrutinous revelations, the US decided to blacklist NSO, saying in a statement via the US Commerce Department: “Pegasus enabled foreign governments to conduct translational repression, which is the practice of authoritarian governments targeting dissidents, journalists, and activists outside of their sovereign borders to silence dissent.” 

Read more: Pegasus, “Israel’s” Trojan Horse

Snowden’s award-winning director: Pegasus extremely violent, invasive

December 11, 2021

Famous director Laura Poitras’ latest documentary criticizes Israeli-manufactured spyware firm NSO and its surveillance software Pegasus.

Film director Laura Poitras, known for her documentary about US whistleblower Edward Snowden and Oscar-winning Citizenfour, delved into the surveillance topic to focus on private Israeli spyware firm NSO’s Pegasus program.

Poitras’ most recent work, Terror Contagion, is among the documentaries awaited to be shortlisted for the Oscar awards.

NSO Group’s Pegasus was exposed as having been used by oppressive regimes to spy on journalists, human rights activists, dissidents, and even heads of state. 

According to an investigation led by The Washington Post and 16 media partners, Pegasus is military-grade spyware leased by the Israeli firm to governments who used it in attempted and successful hacks of 37 smartphones belonging to journalists, human rights activists, and business executives.

“It’s classified as a cyber weapon. This is how extremely violent and invasive this technology is,” Poitras told Deadline.

“NSO Group, this Israeli company, sells to other countries, often countries that have a very bad history or track record of human rights,” she added.

The Israeli manufactured software was allegedly used by the Saudi regime to assassinate Saudi Journalist Jamal Khashoggi in 2018 with the approval of Crown Prince Mohammad bin Salman.

Information has shown that Omar Abdulaziz, Khashoggi’s friend, had his phone hacked in order to spy on the journalist. 

In Poitras’ documentary, Shourideh Malavi, a researcher with Forensic Architecture firm points out that Khashoggi’s “assassination was empowered with Israeli software.”

The award-winning director explained that when dealing with such software, “You don’t have to click on anything malicious. All they have to do is call you and you’re infected.”

“The infection allows them to obtain everything that’s on your phone, to activate your camera and your microphone. So, there’s no way to fend against it,” Poitras expressed.

She also noted that the software “can pretend to be you.”

“It can send messages as if it’s coming from you… or an email ‘from you’ that actually is coming through whoever the attacker is.”

Criticizing NSO, the director said such companies have “no sense of accountability… Now we have these cyber weapon mercenaries, NSO Group and others, that are selling these incredibly invasive, dangerous tools to regimes all over the world.”

Apple sued spyware maker NSO for targeting the users of its devices, saying the Israeli firm, at the center of the Pegasus surveillance scandal, needs to be held to account.

iOS devices of almost 10 US State Department employees were subjected to an attack by spyware developed by the Israeli NSO Group. Sources familiar with the matter told Reuters the assailant was unknown.

The sources told the agency the hacks took place over the last several months, and their targets were either based in Uganda or focused on matters concerning Kampala.

For its part, the United States placed NSO Group on its list of restricted companies.

As a victim herself, Poitras believes that surveillance is “a form of violence” that could damage many people, especially if it’s a journalist or a lawyer working with sources and clients.

“Anything you write, anything you do on your phone, anything you do over your computers, you just have to assume that it’s not private and it really impacts your life.”

From Pegasus to Blue Wolf: How Israel’s ‘Surveillance’ Experiment in Palestine Went Global

November 18th, 2021

A view of the entrance of the Israeli cyber company NSO Group branch in the Arava Desert on November 11, 2021 in Sapir, Israel. [Amir Levy/Getty Images]
A view of the entrance of the Israeli cyber company NSO Group branch in the Arava Desert on November 11, 2021 in Sapir, Israel. [Amir Levy/Getty Images]

By Ramzy Baroud


Israel tech Feature photo
Until recently, Israel has been spared due criticism, not only for its unlawful spying methods on the Palestinians but also for being the originator of many of the technologies which are now being heavily criticized by human rights groups worldwide.

The revelation, a few years ago, that the US National Security Agency (NSA) has been conducting mass surveillance on millions of Americans has reignited the conversation on governments’ misconduct and their violation of human rights and privacy laws.

Until recently, however, Israel has been spared due criticism, not only for its unlawful spying methods on the Palestinians but also for being the originator of many of the technologies which are now being heavily criticized by human rights groups worldwide.

Even at the height of various controversies involving government surveillance in 2013, Israel remained on the margins, despite the fact that Tel Aviv, more than any other government in the world, uses racial profiling, mass surveillance and numerous spying techniques to sustain its military occupation of Palestine.

In Gaza, two million Palestinians are living under an Israeli blockade. They are surrounded by walls, electric fences, underground barriers, navy ships and multitudes of snipers. From above, the tannaana, the Arabic slang word Palestinians have for unmanned drone, watches and records everything. At times, these armed drones are used to blow up anything deemed suspicious from an Israeli ‘security’ perspective. Moreover, every Palestinian wishing to leave or return to Gaza—with only a few who are allowed such privilege—is subjected to the most stringent ‘security’ measures, involving various government intelligences and endless military checks. This applies as much to a Palestinian toddler as it does to a terminally-ill woman.

In the West Bank, Israel’s security ‘experiment’ takes on many other manifestations. While the Israeli objective is to entrap people in Gaza, its aim is to control the everyday life of Palestinians in the West Bank and East Jerusalem. Aside from the 1,660 kilometer-long Apartheid Wall in the West Bank, there are many other walls, fences, trenches and various types of barriers that are aimed at fragmenting Palestinian communities in the West Bank. These isolated communities are only connected through an elaborate system of Israeli military checkpoints, many of which are permanent and many more are erected or dismantled depending on the ‘security’ objectives on any given day.

Much of the surveillance occurs daily at these Israeli checkpoints. While Israel uses the convenient term ‘security’ to justify its practices against Palestinians, actual security has very little to do with what takes place at these checkpoints. Many Palestinians have died, many mothers have given birth or lost their newborns while waiting for Israeli security clearance. It is a daily torment, and Palestinians are subjected to it because they are the unwitting participants of a very profitable Israeli experiment.

Luckily, the news of Israel’s undemocratic practices is becoming increasingly known. On November 8, The Washington Post revealed an Israeli mass surveillance operation, which uses ‘Blue Wolf’ technology to create a massive database of all Palestinians.

This additional measure gives soldiers the chance to, using their own cameras, take pictures of as many Palestinians as possible and match “them to a database of images so extensive that one former soldier described it as the army’s secret ‘Facebook for Palestinians.’”

We know very little about this new ‘Facebook for Palestinians’, aside from what has been revealed in the news. However, we know that Israeli soldiers compete to take as many photos of Palestinian faces as possible, as those with the highest number of photos could potentially receive certain rewards, the nature of which remains unclear.

While the ‘Blue Wolf’ story is receiving some attention in international media, it offers nothing new for Palestinians. To be a Palestinian living under occupation is to carry multiple permits and magnetic cards, to pass various clearances, to have your photo taken regularly, to have your movement monitored, to be ready to answer any question about your friends, your family, co-workers and acquaintances. When that is impractical, because, say, you live under siege in Gaza, then the work is entrusted to unmanned drones scanning sky, earth and sea.

The reason that ‘Blue Wolf’ is receiving some traction in the media is that Israel has been recently implicated in one of the world’s greatest espionage operations.

Pegasus is a type of malware that spies on iPhones and Android devices, to extract photos, messages, emails and record calls. Tens of thousands of people around the world, many of whom are prominent activists, journalists, officials, business leaders and alike, have fallen victim to this operation. Unsurprisingly, Pegasus is produced by the Israeli technology firm, the NSO Group, whose products are heavily involved in the monitoring of and spying on Palestinians, as confirmed by the Dublin-based Front Line Defenders, and as reported in the New York Times on November 8.

Sadly, the Israeli unlawful and undemocratic practices became a subject of international condemnation when the victims were high-ranking personalities, the likes of French President Emmanuel Macron and others. When Palestinians were on the other end of Israeli spying, surveillance and racial profiling, the story seemed unworthy of reporting.

Worse, for many years, Israel has promoted its sinister ‘security technology’ to the rest of the world as ‘field-proven’, meaning that they have been used against occupied Palestinians. Not only did such a declaration raise a few eyebrows, the tried and tested brand allowed Israel to become the world’s eighth-largest arms exporter. Israeli security exports are now utilized in many parts of the world. They can be found at North American and European airports, at the Mexico-US border, in the hands of various world’s intelligences, at European Union territorial waters—largely to intercept war refugees and asylum seekers.

Covering up Israel’s unlawful and inhuman practices against the Palestinians has proven a liability on the very people who justified Israeli actions in the name of security, including Washington. On November 3, the Joe Biden Administration decided to blacklist the Israeli NSO Group for acting “contrary to the national security or foreign policy interests of the United States.” This is a proper measure, of course, but it fails to address the ongoing Israeli violations against the Palestinian people.

The truth is, for as long as Israel maintains its military occupation of Palestine, and as long as the Israeli military continues to see Palestinians as subjects in a mass ‘security experiment’, the Middle East—in fact, the entire world—will continue to pay the price.

Nothing Normal About Normalization

October 5, 2021

Bahrain anti-normalization protest
Bahraini demonstrators protest against normalization with the Zionist entity in Bahraini capital, Manama last week.

Ragheb Malli*

Israeli NSO’s Pegasus spyware hits headlines yet again, however this time, used by Bahrain to spy on human rights activists. According to the Canadian Citizen Lab Institute, the victims included 9 human rights activists from 3 different organizations; 2 of which have voluntarily exiled in England. Other than the more blatant issue of normalization with ‘Israel’, the joint endeavor in capturing human rights activists sets a prime example of the brutality and oppression that was not needed in the already repressive state in which human rights activists live in Bahrain.

The three movements targeted were Al-Wefaq, the Bahrain Centre for Human Rights (BCHR) and Waad, some of which are often labelled as ‘terrorist organizations’. The attacks occurred between June 2020 and February 2021. The Canadian Citizen’s Lab revealed that the Israeli NSO’s Pegasus Spyware has developed a ‘no-click’ hacking system which is revolutionary, since in the typical espionage circumstances, a link is sent to the victim’s phone, under the guise of a genuine link, in this case – a DHL message to the victims’ iPhones. Contrary to iPhone’s claim that their security is solid, the Pegasus spyware were seemingly able to bypass their strongest security feature ‘BlastDoor’.

Israeli NSO claims no responsibility, as expected, demanding the release of evidence the Canadian Citizen Lab claim to hold – as it has done previously at every accusation stop, including the 2019 WhatsApp lawsuit against them that is still presently ongoing.

It must be said that amidst all these so-called new headlines, there really is nothing new about it at all. Bahrain has been investing in spyware and espionage techniques since 2010; and although normalization with Israel only occurred last year, truth dictates that relations between the two preceded, as NSO cyber programs were purchased by Bahrain since 2017.

As normalization with ‘Israel’ spreads in the Middle East, control of the rebelling population has become even more of a priority. Pegasus, ‘the most powerful piece of spyware ever developed,’ as the Guardian described it, is crucial in controlling and repressing any powerful uprisings and rebellion; which is why it expectedly will grow and intensify as time goes by. Nevertheless, although Pegasus is evolving rapidly, it being Israeli is far more cause for concern. A concern that, unfortunately has begun to infiltrate the Middle East officially for all to see and being labelled as normal helping aid. It is not normal. It will never be normal.

*Ragheb Malli is a researcher for the Gulf Institute of Democracy and Human Rights and also a London-based social media activist for human rights. is not responsible for the content of this article. All opinions expressed are solely those of the author.

Source: Al-Manar English Website

The ‘Pegasus’ Saga: All iPhone Devises Were Exploited by Israeli Spy Tech Firm, Report Indicates

September 13, 2021

Israeli malware Pegasus has been used to spy on journalists, activists. (Photo: via Wikimedia Commons)

The digital rights group CitizenLab has discovered a vulnerability that allowed Israeli spyware company NSO Group to implant its Pegasus malware onto virtually every iPhone, Mac, and Apple Watch device.

CitizenLab revealed the vulnerability on Monday, a week after discovering it by analyzing the phone of a Saudi activist that had been infected with the malware. The discovery was announced to the public shortly after Apple rolled out an update to patch the vulnerability.

The vulnerability allowed the NSO Group’s clients to send malicious files disguised as .gif files to a target’s phone, which would then exploit “an integer overflow vulnerability in Apple’s image rendering library” and leave the phone open to the installation of NSO Group’s now-infamous ‘Pegasus’ malware.

The exploit is what’s known as a ‘zero-click’ vulnerability, meaning that the target user would not have to click a suspicious link or file to allow the malware onto their device.

While most Apple devices were vulnerable, according to the researchers, not all of those afflicted by the spyware were breached in this way. Instead, NSO Group sold the use of its malware to clients around the world, who used the tool to spy on the phones of rival politicians, journalists, activists, and business leaders.

News of the malware’s existence was first broken earlier this summer by Amnesty International and Forbidden Stories, a French investigative outlet, and reported by a collection of partner news outlets. Among those accused of using the Israeli malware are the governments of Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India, and the United Arab Emirates (UAE).

A leaked list suggested that as many as 52,000 names were marked as possible targets for surveillance by NSO Group’s customers, and roughly a tenth of these targets were reportedly surveilled. Pegasus granted users access to calls, messages, photos and files, and allowed them to secretly turn on the target phones’ cameras and microphones.

CitizenLab pinned the latest exploit on NSO Group after discovering a so-called ‘digital artifact’ left behind that matched calling cards left by the company’s other exploits, and similarly-named processes in its code.

The NSO Group has not commented on CitizenLab’s latest research, which comes just one day before Apple’s anticipated unveiling of the iPhone 13 ahead of its launch later this month.

(, PC, Social Media)

هُيام «الضعفاء» بالنموذج الإسرائيليّ

الجمعة 30 تموز 2021

وليد شرارة

Visual search query image
لا تقيم إسرائيل اعتباراً فعلياً للدول الأعضاء في «نادي معجبيها»، مثل فرنسا (أ ف ب )

تأتي زيارة وزير الأمن الصهيوني، بيني غانتس، واجتماعه مع نظيرته الفرنسية فلورانس بارلي، ضمن مساعي حكومة الاحتلال إلى احتواء التداعيات السلبية لفضيحة برنامج «بيغاسوس» الذي أنتجته شركة «إن إس أو» الإسرائيلية، والذي استُخدم من قِبَل المغرب للتجسّس على هاتف الرئيس الفرنسي إيمانويل ماكرون، ورئيس وزرائه السابق إدوارد فيليب، و15 وزيراً ونائباً ومسؤولاً سياسيّاً. البيان الصادر عن وزارة الدفاع الفرنسية بعد الاجتماع، يشي برغبة في تجاوز التداعيات السلبية المذكورة، إذ يشدّد على ضرورة تقديم إسرائيل «التوضيحات التي تطلبها فرنسا، والأساسية بالنسبة إلى الثقة والاحترام المتبادل بين البلدين»، وإطلاع المسؤولين في هذا البلد «على مدى معرفة الحكومة الإسرائيلية بأنشطة زبائن إن إس أو». الارتباط العضوي بين الشركة المشار إليها والأجهزة الأمنية والعسكرية الصهيونية، لم يكن خافياً على العديد من الخبراء والصحافيين الفرنسيين، في السنوات الماضية، أي قبل «الفضيحة» الأخيرة. فهذا لوي إمبير في «لوموند»، يشير في مقالة بعنوان «برنامج بيغاسوس: مجموعة إن إس أو في قلب القوة الناعمة الإسرائيلية»، إلى أن «الشركة المنتِجة للبرنامج والحكومة الإسرائيلية تعملان يداً بيد لبناء تحالفات جديدة، وخدمة مصالحهما على المستوى الدولي». لم تكن الأجهزة الأمنية الفرنسية غافلة عن هذه الحقيقة، وطلب «توضيحات» من قِبَل رسميين فرنسيين يعكس حرصاً على الحفاظ على التعاون المتعاظم في الميادين التكنولوجية والأمنية مع الكيان الصهيوني، باعتباره مصدر إلهام في كيفية خوض «الحروب الجديدة»، الموجّهة أساساً ضدّ السكان والحركات الشعبية، نتيجة لخبراته المتراكمة في هذا المضمار في فلسطين المحتلّة ولبنان. هو «نموذج» يُحتذى بنظر قطاعات وازنة من النُّخب السياسية الفرنسية والغربية، وكذلك بالنسبة إلى زبائنه التقليديين من أنظمة فاسدة ومستبدّة في جنوب العالم، ومنه العالم العربي. لكن، وفي مقابل هذا الحرص على العلاقات مع «الدولة – النموذج»، فإن اللافت هو أن الأخيرة لا تقيم اعتباراً فعلياً للدول الأعضاء في «نادي معجبيها»، باستثناء الولايات المتحدة وروسيا والصين، كونها دولاً قادرة على ردّ الصاع صاعين في حال تجرّأت إسرائيل على استخدام منتجاتها التكنولوجية للتجسّس عليها.

حبٌّ من طرفٍ واحد

قيام إسرائيل ببيع برنامج «بيغاسوس» للمغرب لكي يستخدمه الأخير للتجسّس على المسؤولين الفرنسيين، يُعدّ تطوّراً يستحقّ التأمّل فيه، لأنه يكشف تحوّلاً في طبيعة التحالفات التي تنسجها تل أبيب وفي نظرتها الفعلية لِمَن تعتبرهم حلفاء من «الدرجة الثانية». محاولات إسرائيل للتجسّس حتى على أهمّ حلفائها، ليس بالأمر الجديد. جميعنا يذكر قضيّة الأميركي جوناثان بولارد الذي اعتُقل سنة 1985 بتهمة التجسّس على بلاده لحسابها. الجديد هو بيعها برامج تجسّس لدول أخرى تعمل على تطوير علاقاتها معها، كالمغرب مثلاً، دون التأكُّد من عدم استخدامها ضدّ حلفاء آخرين، كفرنسا مثلاً. يعزو فردريك مورو، الخبير الفرنسي في شؤون الدفاع، في مقابلة مع «لوموند»، عدم اكتراث إسرائيل لردّ الفعل الفرنسي أو الأوروبي تجاهها، إلى قناعتها بأنه سيكون في غاية الضعف. ولا شكّ في أن هذا الرأي يتضمّن الكثير من الوجاهة لأن التحوّلات البنيوية، السياسية والاجتماعية، التي شهدها الكيان الصهيوني في العقود الماضية، وطغيان التيارات الفاشية القومية والدينية على المشهد السياسي فيه، كان لها أيضاً أثر كبير على الفهم السائد للوضع الدولي وللتحالفات. العالم من منظور هذه القوى، بات غائباً أكثر من أيّ حقبة سابقة، وموازين القوى الفجّة هي التي تحكم تعامل أطرافه بعضها مع بعض، صراعاً وتقاطعاً وتحالفاً. إسرائيل لا تحترم إلّا الأقوياء، وهم في حالتنا الولايات المتحدة وروسيا والصين، وتتجنّب استفزازهم. أمّا الآخرون، فهي تتعاطى معهم، وكما أظهرت «الفضيحة»، وفقاً لأولوياتها الظرفيّة.

لم تَعُد قوّة إسرائيل «الناعمة» تستند إلى ادّعاءاتها بكونها «واحة ديمقراطية» في محيط من البرابرة

وما فعلته مع فرنسا، لن تتردّد في تكراره في المستقبل مع دول كالمغرب والإمارات والسعودية إذا اقتضت مصالحها المتغيّرة ذلك. لا تحالفات ثابتة، أو على الأقلّ تجنّباً للتأزيم، إلّا مع الأقوياء. هي لم تراعِ الاندفاعة الفرنسية غير المسبوقة حيالها في السنوات الماضية، والتي فصّلها الباحث والصحافي الفرنسي، جان ستيرن، في سلسلة مقالات على موقع «شرق 21» عن اللوبي الإسرائيلي في بلاده. فشركة «إلبيت» الإسرائيلية تساهم في إنتاج نظام «العقرب»، وهو في قلب استراتيجية القوات البرية الفرنسية في العقود القادمة، و»يسمح بتطوير قيادة رقمية واحدة تعتمد على وصلة مشتركة تسمح للجنود المنتشرين في الميدان وكذلك للأدوات العسكرية الجديدة، مثل الطائرات من دون طيار والروبوتات، بأن تكون متّصلة في وقت واحد لتستبق بالتالي ردود فعل العدو». أمّا الشركات الفرنسية العاملة في حقل التكنولوجيا الرقمية، فـ»جميعها تريد الموساد عندها»، بحسب العنوان الحرفي لإحدى مقالاته في السلسلة المشار إليها آنفاً، والتي يتحدّث فيها عن مدى إعجاب الشركات الخاصّة وصناعات الدفاع الفرنسية، بإنجازاته في المجالات التكنولوجية، خاصّة برنامج «بيغاسوس». وهذه المقالة نُشرت في 26 نيسان الماضي، أي قبل «الفضيحة»، ما يضعنا أمام هُيام من طرف واحد يقابله عدم اكتراث، إن لم يكن ازدراء من الطرف الآخر.

جاذبية نموذج السيطرة والتنكيل والقتل

لم تَعُد قوّة إسرائيل «الناعمة»، أي جاذبيتها، تستند إلى ادّعاءاتها بكونها «واحة ديمقراطية» في محيط من البرابرة و/أو الأنظمة المستبدة. فقدت هذه السردية الحدود الدنيا من الصدقيّة على نطاق الكوكب. جاذبيتها اليوم تستند إلى خبراتها ومعارفها في ميدان القوّة الخشنة، والتي اكتسبتها من خلال حربها المستمرّة على الشعب الفلسطيني وشعوب المنطقة وقواها المقاومة. وحتى كاتب صهيوني «معتدل» كيوفال هراري يعترف بذلك في مقالة كتبها بعنوان: «سنستطيع قرصنة البشر قريباً»، يعتبر فيها أن «الضفة المحتلّة هي حقل تجارب بالنسبة إلى الإسرائيليين حول كيفية بناء ديكتاتورية رقميّة. كيف نستطيع التحكُّم بـ2,5 مليون من السكان عبر استخدام الذكاء الاصطناعي والبيغ داتا والطائرات المسيّرة والكاميرات؟ إسرائيل رائدة في مجال الرقابة والسيطرة: تقوم باختبارات ميدانية، ومن ثم تصدّرها نحو بقية العالم». وعلى الغالب، فإن هذه الخبرات وما تتيحه من قدرات أمنية وعسكرية وتكنولوجية، لأطراف تعتبر الشعوب أو قطاعات معتبرة منها، مصدراً رئيساً للتهديد، هي بين أبرز الاعتبارات التي تُفسّر هيامها بالنموذج الإسرائيلي.

Meet Toka, the Most Dangerous Israeli Spyware Firm You’ve Never Heard Of

By Whitney Webb


The mainstream media’s myopic focus on Israel’s Pegasus spyware and the threats it poses means that other companies, like Toka, go uninvestigated,  even when their products present an even greater potential for abuse and illegal surveillance.

LONDON – This past Sunday, an investigation into the global abuse of spyware developed by veterans of Israeli intelligence Unit 8200 gained widespread attention, as it was revealed that the software – sold to democratic and authoritarian governments alike – had been used to illegally spy on an estimated 50,000 individuals. Among those who had their communications and devices spied on by the software, known as Pegasus, were journalists, human rights activists, business executives, academics and prominent political leaders. Among those targeted political leaders, per reports, were the current leaders of France, Pakistan, South Africa, Egypt, Morocco and Iraq.

The abuse of Pegasus software in this very way has been known for several years, though these latest revelations appear to have gained such traction in the mainstream owing to the high number of civilians who have reportedly been surveilled through its use. The continuation of the now-years-long scandal surrounding the abuse of Pegasus has also brought considerable controversy and notoriety to the Israeli company that developed it, the NSO Group.

While the NSO Group has become infamous, other Israeli companies with even deeper ties to Israel’s intelligence apparatus have been selling software that not only provides the exact same services to governments and intelligence agencies but purports to go even farther.

Originally founded by former Israeli Prime Minister and Jeffrey Epstein associate Ehud Barak, one of these companies’ wares are being used by countries around the world, including in developing countries with the direct facilitation of global financial institutions like the Inter-American Development Bank (IDB) and the World Bank. In addition, the software is only made available to governments that are “trusted” by Israel’s government, which “works closely” with the company.

Despite the fact that this firm has been around since 2018 and was covered in detail by this author for MintPress News in January 2020, no mainstream outlet – including those that have extensively covered the NSO Group – has bothered to examine the implications of this story.

Worse than Pegasus

Toka was launched in 2018 with the explicit purpose of selling a “tailored ecosystem of cyber capabilities and software products for governmental, law enforcement, and security agencies.” According to a profile of the company published in Forbes shortly after it launched, Toka advertised itself as “a one-stop hacking shop for governments that require extra capability to fight terrorists and other threats to national security in the digital domain.”

Toka launched with plans to “provide spy tools for whatever device its clients require,” including not only smartphones but a “special focus on the so-called Internet of Things (IoT).” Per the company, this includes devices like Amazon Echo, Google Nest-connected home products, as well as connected fridges, thermostats and alarms. Exploits in these products discovered by Toka, the company said at the time, would not be disclosed to vendors, meaning those flaws would continue to remain vulnerable to any hacker, whether a client of Toka or not.

Today, Toka’s software suite claims to offer its customers in law enforcement, government and intelligence the ability to obtain “targeted intelligence” and to conduct “forensic investigations” as well as “covert operations.” In addition, Toka offers governments its “Cyber Designers” service, which provides “agencies with the full-spectrum strategies, customized projects and technologies needed to keep critical infrastructure, the digital landscape and government institutions secure and durable.”

Given that NSO’s Pegasus targets only smartphones, Toka’s hacking suite – which, like Pegasus, is also classified as a “lawful intercept” product – is capable of targeting any device connected to the internet, including but not limited to smartphones. In addition, its target clientele are the same as those of Pegasus, providing an easy opportunity for governments to gain access to even more surveillance capabilities than Pegasus offers, but without risking notoriety in the media, since Toka has long avoided the limelight.

Toka IoT
A slide from an April 20, 2021 presentation given by Toka’s VP of Global Sales, Michael Anderson

In addition, while Toka professes that its products are only used by “trusted” governments and agencies to combat “terrorism” and maintain order and public safety, the sales pitch for the NSO Group’s Pegasus is remarkably similar, and that sales pitch has not stopped its software from being used to target dissidents, politicians and journalists. It also allows many of the same groups who are Toka clients, like intelligence agencies, to use these tools for the purpose of obtaining blackmail. The use of blackmail by Israeli security agencies against civilian Palestinians to attempt to weaken Palestinian society and for political persecution is well-documented.

Toka has been described by market analysts as an “offensive security” company, though the company’s leadership rejects this characterization. Company co-founder and current CEO Yaron Rosen asserted that, as opposed to purely offensive, the company’s operations are “something in the middle,” which he classifies as bridging cyber defense and offensive cyber activities — e.g., hacking.

The company’s activities are concerning in light of the fact that Toka has been directly partnered with Israel’s Ministry of Defense and other Israeli intelligence and security agencies since its founding. The company “works closely” with these government agencies, according to an Israeli Ministry of Defense website. This collaboration, per Toka, is meant to “enhance” their products. Toka’s direct IDF links are in contrast to the NSO Group, a company that does not maintain overt ties with the Israeli security state.

Toka’s direct collaboration with Israel’s government is also made clear through its claim that it sells its products and offers its services only to “trusted” governments, law enforcement agencies and intelligence agencies. Toka’s Rosen has stated that Russia, China, and “other enemy countries” would never be customers of the company. In other words, only countries aligned with Israeli policy goals, particularly in occupied Palestine, are permitted to be customers and gain access to its trove of powerful hacking tools. This is consistent with Israeli government efforts to leverage Israel’s hi-tech sector as a means of countering the Boycott, Divest and Sanctions (BDS) movement globally.

Yaron Rosen
A profile photo of former Chief of Cyber Staff for the IDF and Toka co-founder, Yaron Rosen. Credit | Spy Legends

Further evidence that Toka is part of this Israeli government effort to seed foreign governments with technology products deeply tied to Israel’s military and intelligence services is the fact that one of the main investors in Toka is Dell Technologies Capital, which is an extension of the well-known tech company Dell. Dell was founded by Michael Dell, a well-known pro-Israel partisan who has donated millions of dollars to the Friends of the IDF and is one of the top supporters of the so-called “anti-BDS” bills that prevent publicly employed individuals or public institutions in several U.S. states from supporting non-violent boycotts of Israel, even on humanitarian grounds. As MintPress previously noted, the fact that a major producer of consumer electronic goods is heavily investing in a company that markets the hacking of that very technology should be a red flag.

The government’s initial admitted use of the hi-tech sector to counter the BDS movement coincided with the launch of a new Israeli military and intelligence agency policy in 2012, whereby “cyber-related and intelligence projects that were previously carried out in-house in the Israeli military and Israel’s main intelligence arms are transferred to companies that, in some cases, were built for this exact purpose.”

One of the reasons this was reportedly launched was to retain members of Unit 8200 engaged in military work who were moving to jobs in the country’s high-paying tech sector. Through this new policy that has worked to essentially merge much of the private tech sector with Israel’s national security state, some Unit 8200 and other intelligence veterans continue their work for the state but benefit from a private sector salary. The end result is that an unknown – and likely very high – number of Israeli tech companies are led by veterans of the Israeli military and Israeli intelligence agencies and serve, for all intents and purposes, as front companies. A closer examination of Toka strongly suggests that it is one such front company.

Toka — born out of Israel’s national security state

The company was co-founded by Ehud Barak, Alon Kantor, Kfir Waldman and retired IDF Brigadier General Yaron Rosen. Rosen, the firm’s founding CEO and now co-CEO, is the former Chief of the IDF’s cyber staff, where he was “the lead architect of all [IDF] cyber activities,” including those executed by Israeli military intelligence Unit 8200. Alon Kantor is the former Vice President of Business Development for Check Point Software, a software and hardware company founded by Unit 8200 veterans. Kfir Waldman is the former CEO of Go Arc and a former Director of Engineering at technology giant Cisco. Cisco is a leader in the field of Internet of Things devices and IoT cybersecurity, while Go Arc focuses on applications for mobile devices. As previously mentioned, Toka hacks not only mobile devices but also has a “special focus” on hacking IoT devices.

Toka IoT
A slide from an April 20, 2021 presentation given by Toka’s VP of Global Sales, Michael Anderson

In addition to having served as prime minister of Israel, Toka co-founder Ehud Barak previously served as head of Israeli military intelligence directorate Aman, as well as several other prominent posts in the IDF, before eventually leading the Israeli military as minister of defense. While minister of defense, he led Operation Cast Lead against the blockaded Gaza Strip in 2009, which resulted in the deaths of over 1,000 Palestinians and saw Israel illegally use chemical weapons against civilians.

Toka is the first start-up created by Barak. However, Barak had previously chaired and invested in Carbyne911, a controversial Israeli emergency services start-up that has expanded around the world and has become particularly entrenched in the United States. Carbyne’s success has been despite the Jeffrey Epstein scandal, given that the intelligence-linked pedophile and sex trafficker had invested heavily in the company at Barak’s behest. Barak’s close relationship with Epstein, including overnight visits to Epstein’s now-notorious island and apartment complexes that housed trafficked women and underage girls, has been extensively documented.

Barak stepped away from Toka in April of last year, likely as the result of the controversy over his Epstein links, which also saw Barak withdraw from his chairmanship of Carbyne in the wake of Epstein’s death. Considerable evidence has pointed to Epstein having been an intelligence asset of Israeli military intelligence who accrued blackmail on powerful individuals for the benefit of Israel’s national security state and other intelligence agencies, as well as for personal gain.

Another notable Toka executive is Nir Peleg, the company’s Vice President for Strategic Projects. Peleg is the former head of the Research and Development Division at Israel’s National Cyber Directorate, where he led national cybersecurity projects as well as government initiatives and collaborations with international partners and Israeli cybersecurity innovative companies. Prior to this, Peleg claims to have served for more than 20 years in leading positions at the IDF’s “elite technology unit,” though he does specify exactly which unit this was. His LinkedIn profile lists him as having been head of the IDF’s entire Technology Department from 2008 to 2011.

While at Israel’s National Cyber Directorate, Peleg worked closely with Tal Goldstein, now the head of strategy for the World Economic Forum’s Partnership against Cybercrime (WEF-PAC), whose members include government agencies of the U.S., Israel and the U.K., along with some of the world’s most powerful companies in technology and finance. The goal of this effort is to establish a global entity that is capable of controlling the flow of information, data, and money on the internet. Notably, Toka CEO Yaron Rosen recently called for essentially this exact organization to be established when he stated that the international community needed to urgently create the “cyber” equivalent of the World Health Organization to combat the so-called “cyber pandemic.”

Claims that a “cyber pandemic” is imminent have been frequent from individuals tied to the WEF-PAC, including CEO of Checkpoint Software Gil Shwed. Checkpoint is a member of WEF-PAC and two of its former vice presidents, Michael Anderson and Alon Kantor, are now Vice President for Global Sales and co-CEO of Toka, respectively.

Tal Goldstein
The Wolrd Economic Forum does little to hide its partnership with former Israeli intelligence officials

Toka’s Chief Technology Officer, and the chief architect of its hacking suite, is Moty Zaltsman, who is the only chief executive of the company not listed on the firm’s website. Per his LinkedIn, Zaltsman was the Chief Technology Officer for then-Israeli Prime Minister Benjamin Netanyahu. Last January, when Toka was covered by MintPress News, his profile stated that he had developed “offensive technologies” for Israel’s head of state, but Zaltsman has since removed this claim. The last Toka executive of note is Michael Volfman, the company’s Vice President of Research and Development. Volfman was previously a cyber research and development leader at an unspecified “leading technology unit” of the IDF.

Also worth mentioning are Toka’s main investors, particularly Entrèe Capital, which is managed by Aviad Eyal and Ran Achituv. Achituv, who manages Entrée’s investment in Toka and sits on Toka’s board of directors, was the founder of the IDF’s satellite-based signals intelligence unit and also a former senior vice president at both Amdocs and Comverse Infosys. Both Amdocs and Comverse courted scandal in the late 1990s and early 2000s for their role in a massive Israeli government-backed espionage operation that targeted U.S. federal agencies during that period.

Despite this scandal and others in the company’s past, Comverse subsidiary Verint was subsequently contracted by the U.S. National Security Agency (NSA) to bug the telecommunications network of Verizon shortly after their previous espionage scandal was covered by mainstream media. The contract was part of Operation Stellar Winds and was approved by then-NSA Director Keith Alexander, who has since been an outspoken advocate of closer Israeli-American government cooperation in cybersecurity.

In addition to Entrèe Capital, Andreessen Horowitz is another of Toka’s main investors. The venture capital firm co-founded by Silicon Valley titan Marc Andreessen is currently advised by former Secretary of the Treasury Larry Summers, a close friend of the infamous pedophile Jeffery Epstein. Early investors in Toka that are no longer listed on the firm’s website include Launch Capital, which is deeply tied to the Pritzker family — one of the wealthiest families in the U.S., with close ties to the Clintons and Obamas as well as the U.S.’ pro-Israel lobby — and Ray Rothrock, a venture capitalist who spent nearly three decades at VenRock, the Rockefeller family venture capital fund.

In light of the aforementioned policy of Israel’s government to use private tech companies as fronts, the combination of Toka’s direct Israeli government ties, the nature of its products and services, and the numerous, significant connections of its leaders and investors to both Israeli military intelligence and past Israeli espionage scandals strongly suggests that Toka is one such front.

If this is the case, there is reason to believe that, when Toka clients hack and gain access to a device, elements of the Israeli state could also gain access. This concern is born out of the fact that Israeli intelligence has engaged in this exact type of behavior before as part of the PROMIS software scandal, whereby Israeli “superspy” Robert Maxwell sold bugged software to the U.S. government, including highly sensitive locations involved in classified nuclear weapons research. When that software, known as PROMIS, was installed on U.S. government computers, Israeli intelligence gained access to those same systems and devices.

The U.S. government was not the only target of this operation, however, as the bugged PROMIS software was placed on the networks of several intelligence agencies around the world as well as powerful corporations and several large banks. Israeli intelligence gained access to all of their systems until the compromised nature of the software was made public. However, Israel’s government was not held accountable by the U.S. government or the international community for its far-reaching espionage program, a program directly facilitated by technology-focused front companies. The similarities between the products marketed and clients targeted by Maxwell during the PROMIS scandal and currently by Toka are considerable.

World Bank, IDB aid Toka in targeting Palestine’s allies

While the ties between Toka and Israel’s national security state are clear as day, what is also significant and unsettling about this company is how its entry into developing and developed countries alike is being facilitated by global financial institutions, specifically the World Bank and the Inter-American Development Bank. Notably, these are the only deals with governments that Toka advertises on its website, as the others are not made public.

Several projects funded by one or another of these two institutions have seen Toka become the “cyber designer” of national cybersecurity strategies for Nigeria and Chile since last year. Significantly, both countries’ populations show strong support for Palestine and the BDS movement. In addition, Toka garnered a World Bank-funded contract with the government of Moldova, an ally of Israel, last September.

The World Bank selected Toka in February of last year to “enhance Nigeria’s cyber development,” which includes developing “national frameworks, technical capabilities and enhancement of skills.” Through the World Bank contract, Toka has now become intimately involved with both the public and private sectors of Nigeria that it relates to the country’s “cyber ecosystem.” The World Bank’s decision to choose Toka is likely the result of a partnership forged in 2019 by the state of Israel with the global financial institution “to boost cybersecurity in the developing world,” with a focus on Africa and Asia.

Nigeria Toka
Toka executives pose with Nigerian officials in 2020. Photo | Israel Defense

“Designing and building sustainable and robust national cyber strategy and cyber resilience is a critical enabler to fulfilling the objectives of Nigeria’s national cybersecurity policy and strategic framework,” Toka CEO Yaron Rosen said in a press release regarding the contract.

Given Toka’s aforementioned use of its technology for only “trusted” governments, it is notable that Nigeria has been a strong ally of Palestine for most of the past decade, save for one abstention at a crucial UN vote in 2014. In addition to the government, numerous student groups, human rights organizations, and Islamic organizations in the country are outspoken in their support for Palestine. With Toka’s efforts to offer its products only to countries who align themselves with “friendly” countries, their now intimate involvement with Nigeria’s cyber development could soon have consequences for a government that has tended to support the Palestinian cause. This is even more likely given Toka CEO Rosen’s statements at an April 2021 event hosted by Israel’s Ministry of Economy, where he emphasized the role of cyber in developing countries specifically in terms of their national defense and economic strategy.

Three months after the deal was struck with Nigeria through the World Bank, the Inter-American Development Bank (IDB) selected Toka to advise the government of Chile on “next steps for the country’s national cybersecurity readiness and operational capacity building.” As part of the project, “Toka will assess the current cybersecurity gaps and challenges in Chile and support the IDB project implementation by recommending specific cybersecurity readiness improvements,” per a press release. Toka claims it will help “establish Chile as a cybersecurity leader in South America.” Regarding the deal, Toka’s Rosen stated that he was “thankful” that the IDB had “provided us with this opportunity to work with the Government of Chile.”

Israel signed consequential agreements for cooperation with the IDB in 2015, before further deepening those ties in 2019 by partnering with the IDB to invest $250 million from Israeli institutions in Latin America specifically.

Toka executives are pictured with Chilean officials during a 2020 meeting in Santiago

Like Nigeria, Chile has a strong connection with Palestine and is often a target of Israeli government influence efforts. Though the current far-right government of Sebastián Piñera has grown close to Israel, Chile is home to the largest Palestinian exile community in the world outside of the Middle East. As a result, Chile has one of the strongest BDS movements in the Americas, with cities declaring a non-violent boycott of Israel until the Piñera administration stepped in to claim that such boycotts can only be implemented at the federal level. Palestinian Chileans have strong influence on Chilean politics, with a recent, popular presidential candidate, Daniel Jadue, being the son of Palestinian immigrants to Chile. Earlier this year, in June, Chile’s congress drafted a bill to boycott goods, services and products from illegal Israeli settlements.

While Toka frames both of these projects as aimed at helping the cyber readiness and economies of the countries it now services, Israeli media has painted a different picture. For instance, Haaretz wrote that Israel’s partnerships with development banks, specifically those made in 2019 that resulted in these Toka contracts, were planned by an inter-ministerial committee set up by then-Prime Minister Benjamin Netanyahu “to realize the potential of international development to strengthen the Israeli economy, improve Israel’s political standing and strengthen its international role.” One source, quoted by Haaretz as being close to this undertaking, stated that “development banks are a way to help advance Israel’s interests and agenda in the developing world, including Latin America. But it’s not philanthropy.”

Given these statements, and Toka’s own modus operandi as a company and its background, it seems highly likely that the reason both Nigeria and Chile were chosen as the first of Toka’s development banks contracts was aimed at advancing the Israeli government’s agenda in those specific countries, one that seeks to counter and mitigate the vocal support for Palestine among those countries’ inhabitants.

The spyware problem goes far beyond NSO Group

The NSO Group and its Pegasus software is clearly a major scandal that deserves scrutiny. However, the treatment of the incident by the media has largely absolved the Israeli government of any role in that affair, despite the fact that the NSO Group’s sales of Pegasus to foreign governments has been approved and defended by Israel’s government. This, of course, means that Israel’s government has obvious responsibility in the whole scandal as well.

In addition, the myopic focus on the NSO Group when it comes to mainstream media reporting on Israeli private spyware and the threats it poses means that other companies, like Toka, go uninvestigated, even if their products present an even greater potential for abuse and illegal surveillance than those currently marketed and sold by the NSO Group.

Given the longstanding history of Israeli intelligence’s use of technology firms for international surveillance and espionage, as well as its admitted policy of using tech companies as fronts to combat BDS and ensure Israel’s “cyber dominance,” the investigation into Israeli spyware cannot stop just with NSO Group. However, not stopping there risks directly challenging the Israeli state, particularly in Toka’s case, and this is something that mainstream media outlets tend to avoid. This is due to a mix of factors, but the fact that NSO’s Pegasus has been used to spy on journalists so extensively certainly doesn’t help the matter.

Yet, Israel’s weaponization of its tech industry, and the global use of its spyware offerings by governments and security agencies around the world, must be addressed, especially because it has been explicitly weaponized to prevent non-violent boycotts of Israel’s occupation of Palestine, including those solely based on humanitarian grounds or out of respect for international laws that Israel routinely breaks. Allowing a government to engage in this activity on a global scale to stifle criticism of flagrantly illegal policies and war crimes cannot continue and this should be the case for any government, not just Israel.

If the outlets eagerly reporting on the latest Pegasus revelations are truly concerned with the abuse of spyware by governments and intelligence agencies around the world, they should also give attention to Toka, as it is actively arming these same institutions with weapons far worse than any NSO Group product.

Pegasus is Just the Tip of the Israeli Cyber Spying Iceberg, with Whitney Webb

July 23rd, 2021

By Mnar Adley


Visual search query image
Investigative journalist Whitney Webb joins MIntCast to discuss Pegasus, Toka, and the global Israeli cyberspying network.

Edward Snowden has called it “the story of the year.” An Israeli spying company has been caught selling software to authoritarian regimes that have used it to surveil more than 50,000 people worldwide.

That company is NSO, founded in 2010 by former members of Unit 8200, the Israeli military’s notorious intelligence squad. Their product is called Pegasus, and it was sold to military, law enforcement, and intelligence agencies in 40 countries, among them some of the world’s worst human rights abusing governments.

On this “MintCast,” investigative journalist Whitney Webb joins Mnar Adley today to discuss Pegasus, Toka, and the global Israeli cyberspying network. Whitney Webb is a writer and researcher for the outlets Unlimited Hangout and The Last American Vagabond. She principally covers intelligence, technology, surveillance, and civil liberties. Between 2017 and 2020, she was also a senior investigative reporter for MintPress. Her latest article, “Meet Toka, the Most Dangerous Israeli Spyware Firm You’ve Never Heard Of,” was published by MintPress earlier this week.

Pegasus is able to attack the cellphones of targeted individuals without them realizing it, monitoring and recording their calls, texts and accessing other information stored on their devices. Dozens of human rights activists, nearly 200 journalists, several Arab royals, and more than 600 politicians are known to have had their communications spied on and compromised. Among those include French President Emmanuel Macron, Pakistani prime minister Imran Khan and president of Iraq, Barham Salih.

Close associates of the Washington Post journalist Jamal Khashoggi were also attacked and compromised just before his murder by Saudi operatives in 2018, strongly indicating that the information gleaned through Pegasus was crucial in this endeavor. NSO vehemently denied that their product was used in his assassination. Yet it also put out a statement insisting that it had no access to what its clients did with the software — two seemingly contradictory assertions.

The Pegasus story has made major waves in India, too, where it was revealed Prime Minister Narendra Modi had used it to spy on his political opponents in the run-up to the 2019 elections. The Indian Congress Party has accused the prime minister of committing treason. Also disclosed was that the government hacked the phone of a woman who accused the Chief Justice of India of raping her, a revelation undermining the entire justice system and the concept of a fair trial.

Yet a new MintPress News investigation asserts that Pegasus is merely the tip of the Israeli cyber spying iceberg and that another piece of software, Toka, is far more dangerous and outrageous. Toka markets itself as “a one-stop hacking shop for governments that require extra capability to fight terrorists and other threats to national security in the digital domain.” The company’s software is designed to infiltrate any device connected to the internet, not just smartphones.

Toka is a product of the Israeli national security state, having been co-founded by former prime minister, Ehud Barak, and was also designed by members of Unit 8200, leading Webb to suggest that it is a front for the Israeli government.

MBS Requests Spying on Ghassan Ben Jeddou, Several Figures

19 Jul 2021

By Al Mayadeen

Source: Le Monde

With Israeli spyware Pegasus exposed, Le Monde reveals that Saudi Crown Prince Mohammed bin Salman requested spying on several politicians and journalists in Lebanon: Who are they?

Visual search query image
Saudi Crown Prince Mohammed bin Salman

The French daily Le Monde revealed Monday that Saudi Crown Prince Mohammed bin Salman asked to spy on several Lebanese journalists and politicians, including President Michel Aoun, through Israeli NSO’s spyware Pegasus.

Le Monde added in an investigation published today that several Lebanese political and media figures were victims of a spying attack on Saudi Arabia and the UAE’s behalf between 2018-2019.

Figures included former Prime Minister Saad Hariri, president of the Free Patriotic Movement Gebran Bassil, General Director of the Lebanese General Directorate of General Security Abbas Ibrahim.

The newspaper highlighted that bin Salman also asked Pegasus to spy “on Hezbollah MPs Hassan Fadlallah, and  Ali Fayyad, in addition to the head of Hezbollah’s liaison and coordination unit Wafiq Safa.”

The Saudi Crown Prince also requested to spy on Banque du Liban Governor Riad Salameh and former Minister of Finance Ali Hassan Khalil.

Le Monde also indicated that “Saudi Arabia and the UAE requested spying on two journalists: Ghassan Ben Jeddou and Ibrahim Al Amine.”

According to the newspaper, Pegasus is able to steal content from phones, including WhatsApp and Signal messages.

The Israeli NSO group is the developer of this spyware.

Today, several governments, organizations, media outlets, and unions condemned worldwide spyware attacks carried out through Israeli Pegasus spyware, which targeted activists, journalists, and politicians.

In January 2020, The Washington Post reported, in an extensive investigation, that the UAE and Saudi Arabia were spying on journalists and activists in London and Qatar, through the Israeli Pegasus spyware.

لماذا يتجسّس ابن سلمان و”إسرائيل” على غسّان بن جدو؟

21 تموز 2021

المصدر: الميادين نت

قاسم عز الدين

عصابة ذئاب الليل في الشركات الخاصة للاستخبارات الغربية تدخل إلى غرف النوم التي تستهويها، لكن هوس ابن سلمان وابن زايد و”إسرائيل” الذي مسّ شبكة صيد واسعة خصّ الإعلام والصحافيين الأحرار.

Visual search query image
لا ريب في أن اللائحة المسرّبة حالياً هي مجرّد عيّنة أولية عن مئات الأسماء في لبنان.

بقدرة قادر، تكشف مؤسسة “فوربيدن ستوريز” المغمورة في فرنسا، على لسان مديرتها لوران ريشار (الاسم الفرنسي يوحي باسم مذكّر)، عن تجسّس إسرائيلي على هواتف موالية ومعادية، من بينها هواتف 180 إعلامياً في أكثر من 50 دولة، لمصلحة ابن سلمان وابن زايد وغيرهما.

التسريبات التي عرضت بعضها صحيفة “لوموند” الفرنسية ونقلها الإعلام في لبنان، تذكر أسماء سياسيين ومسؤولين عديدين. ومن بين الإعلاميين، تخصّ غسان بن جدو وإبراهيم الأمين.

إعلام المقاومة الإنسانية الأممية

لا ريب في أن اللائحة المسرّبة حالياً هي مجرّد عيّنة أولية عن مئات الأسماء في لبنان، وربما أكثر. وقد تشمل كل الصحافيين وكل إعلاميي المقاومة ورافضي الغطرسة الأميركية والغربية والاحتلال الإسرائيلي والعدوان السعودي – الإماراتي على اليمن وفلسطين.

ثلاثي محور الحرب، الإسرائيلي – السعودي – الإماراتي، يجنّد في معركة التجسّس الأمنية (إضافة إلى عملاء الاستخبارات والأجهزة الأمنية) أكثر من ألف عميل في شركة “إن إس أو” منذ العام 2016، بينهم حوالى 200 صحافي.

ربما تستوقف بعضهم في تقاريرهم الاستخبارية، جريدة “الأخبار” بخطابها الداعم للمقاومة في بيئة اليسار العربي، وقناة “الميادين” التي شبّت عن التقوقع المحلي والإقليمي إلى مهنية إعلامية تمتد باتجاه مقاومة عالم الجنوب الأرحب. مهندس هذا المسار وربّان السفينة بشعار “مع الإنسان في كل مكان”، يُقلق الأجهزة الأمنية الإسرائيلية في المقام الأوّل، والتي تُطلق أيديها الاستخبارات الأميركية والغربية في أميركا اللاتينية وأفريقيا السمراء، فتسرح وتمرح بسردية الخرافات الأسطورية بين الناس الطيّبين.

ولعلّ أكثر ما يحبط التضليل والتلاعب بالعقول، المقاربة التي تعمل عليها “الميادين” بمهنية إعلامية ملتزمة في الخبر والتغطية والحوار وقراءة الأحداث والبرامج… لتقديم رواية تاريخية وثقافية إنسانية عقلانية.

شريكا “إسرائيل” في تحالف الحرب، ابن سلمان وابن زايد، المصابان بعصاب الرهاب المرضي، تقلقهما “الميادين” بتوجّهها فوق الاصطفافات البينية والاحتراب الداخلي، من أجل تحصين الجامع الوطني والقومي المشترك الذي ينمو على تبديده ابن سلمان وابن زايد في نفخ أوار حرب داحس والغبراء العرقية والمذهبية.

ثبات “الميادين” بعزيمة وأناة الصبر الاستراتيجي لإرساء مدرسة الحقيقة في الإعلام المهني الملتزم، يقضّ مضاجع العصاب النرجسي في الرياض وأبو ظبي، والذي توهّم لوهلة، تحت مظلّة ترامب ونتنياهو، أنه صار شاهين.

توسّع “الميادين” فاقم مأزقهم وكشف عن أياديهم الملطّخة بدماء الأطفال والأبرياء في اليمن وفلسطين، بمخاطبة قلوب العالم وعقولهم بلغة الضمير الإنساني ولسان اللغة العربية والإسبانية والإنكليزية الذي يخترق قبَب التوحّش الفولاذية.

عصابة ذئاب الليل تشوبها تباينات افتراس الضحايا

كيف استطاعت مؤسسة لوران ريشار الصغيرة في عالم الاستقصاء الإداري الكشف عن لائحة مستهدفين بالبرنامج الإسرائيلي “بيغاسوس” منذ العام 2016؟ ولماذا تحرّك على الأثر النائب العام الفرنسي ومنظمة “هيومن رايس ووتش” وتحالف 17 مؤسسة إعلامية من المرجح أن تتضاعف أعدادها؟

على الأرجح أنَّ جهات حكومية فرنسية وأميركية في وكالات الاستخبارات تشعر بوصول الموس إلى لحاها، إذ تتخطى شركة “إن إس أو” الإسرائيلية الخطوط العامة المتفق عليها بين الإدارات الغربية والشركات الخاصة التابعة لها.

يبدو أنَّ “إن إس أو” طفحت في اتفاقياتها مع ابن سلمان وابن زايد وغيرهما (المغرب مثلاً) عن الجامع المشترَك في ما يسمى “مكافحة الإرهاب”، والذي ترسم توجهاته الإدارات السياسية، وتوكل خطوطه العريضة إلى وكالات الاستخبارات والشركات الخاصة، ومن بينها “إن إس أو” الإسرائيلية.

كل وكالات الاستخبارات الحكومية الغربية باتت تعتمد منذ عقدين على خصخصة الدولة والأمن (بلاك ووتر) والاستخبارات أيضاً، بحسب النموذج الأميركي. شركات المعلوماتية والاستخبارية الخاصة التي تعمل لمصلحة شركات الاستثمار المتعددة الجنسية، تعمل كذلك مع وكالات الاستخبارات الحكومية بدعم من الإدارات الحكومية، وتبزّها أحياناً بالكفاءة والخبرة التقنية.

شركة “ويست بريدج”، الذراع الأميركية لشركة “إن إس أو”، فلحت مع “سي آي إي” في البيت الأبيض والكونغرس بدعم من ترامب وكوشنر، وتشاركت مع شركة الأسهم الأميركية الخاصة “فرانسيسكو بارتزز مانجمنت”. اتهمت سويسرا استخبارات “سي آي إي” واستخبارات ألمانيا “بي إن دي”، بالاستيلاء على شركة “كريبتو إي جي” السويسرية وشركة “أومنيسك” الأخرى. 

لم تظهر الاختلافات الكثيرة على السّطح، على الرغم من الدلائل والفضائح الأسبوعية، فحلّها الأخوي يجري داخل العائلة الواحدة، لكنّ اتهام الشركة الإسرائيلية باحتمال اختراق هاتف ماكرون وحكومته السابقة والحالية، يدق باب الخطر، وكذلك اتهام “ويتي ويب” باختراق “لوكهيد مارتن” وعدد من الأجهزة العسكرية الأمنية الأميركية لمصلحة “إسرائيل”، بالتعاون مع عملاء سابقين أميركيين وإسرائيليين.

من غير المحتمل أن تصل الحكومات الأميركية والغربية إلى معاقبة “إسرائيل” أو محمد بن سلمان ومحمد بن زايد في العائلة الواحدة، وليس بالضرورة أن تكون التسريبات في لبنان والمنطقة العربية موجّهة ضد “إسرائيل” والسعودية وأبو ظبي، فالدول الغربية معنية بالموافقة على عمليات الموساد “لحفظ أمن إسرائيل”.

قد تكون بعض أهداف التسريب تخويف بعض السياسيين وإسكات صوت بعض الإعلاميين. في كلِّ الأحوال، لم يحرّك غسان بن جدو دافع عرَضي طارئ لهندسة مدرسة “الميادين” الإعلامية، ولن يدفعه إنذار أو تلويح بتهديد إلى تغيير قيْد أنملة عما هو عليه، منتمياً إلى مبادئ وقناعات جُبل عليها مع الحليب وشبّ في تجربة الحياة، لكن عصابة ذئاب الليل تهاجم فريستها في العتمة الكالحة. وقد تخيفها شمعة نور أو نبرة صوت لا يرتعش من أشباح الظلام.

فيديوات متعلقة

مقالات متعلقة

Pegasus Project: Why I was targeted by Israeli spyware

The building housing the Israeli NSO Group is pictured in 2016 in Herzliya (AFP)
Visual search query image
Madawi al-RasheedMadawi al-Rasheed is visiting professor at the Middle East Institute of the London School of Economics. You can follow her on Twitter: @MadawiDr

20 July 2021 09:34 UTC

Madawi al-Rasheed

My work to expose the crimes of the Saudi regime led to a hacking attempt on my phone. Today, I am overwhelmed by feelings of vulnerability and intrusion

The Orwellian prediction finally came true. I knew it was only a matter of time before the Saudi regime tried to hack my phone, using Pegasus software manufactured by the private Israeli security company NSO Group.

This development highlights the consolidation of a new axis of evil: IsraelSaudi Arabia and the UAE have become a chorus of malicious powers aiming to stifle activism and the quest for democracy in the region. Israel provides knowledge; the others provide funds.

I have spent more than half my life writing, researching and teaching. You wouldn’t expect me to be hacked. But such professional activities are a crime in Saudi Arabia

The privatisation of the Israeli security apparatus, and the mushrooming of private companies founded by ex-defence and ex-Mossad agents, is a threat not only to Palestinians in Israel, Gaza and the occupied West Bank, but also to all Gulf citizens, with Israeli spyware sold to dictatorships across the Arab world.

In return, Israel gains access to the inner intelligence circles and deep states of the Gulf – enabling it to hold them hostage for a long time to come. Israel supports Gulf autocracies, thinking that this guarantees its own security forever. But Israel is wrong.

Normalisation with Israel is not only immoral because of the Palestinian plight; it is also an existential threat to all Gulf nationals seeking political reform in their own countries. The so-called “only democracy in the Middle East” has so entrenched its apartheid system that no propaganda can salvage it, and strong public objections to Arab regimes’ normalisation with Israel will only intensify in the months and years ahead.

Saga of surveillance

The UAE plays a key role in the saga of surveillance by Israeli private companies. Saudi Crown Prince Mohammed bin Salman has fallen under the spell of Mohammed bin Zayed, his UAE counterpart. Forget the “tallest buildingbusiest airport and ministries of tolerance and happiness” – which are at the core of UAE propaganda – and remember that bin Zayed is bin Salman’s mentor.

The two are united by their hatred of democracy, political diversity, freedom of speech and human rights. Both are now key to an axis of evil overseen by malicious Israeli technology, whose alleged raison d’etre is to help governments catch criminals and terrorists. Yet, it is being used against peaceful activists.

Pegasus: How it hacks phones and spies for NSO clients


Forbidden Stories, a Paris-based NGO specialising in defending journalists and human rights activists, obtained more than 50,000 telephone numbers targeted globally by Israeli malware on behalf of NSO clients, mainly governments. They alerted various media outlets, and with the support of Amnesty International, launched the Pegasus Project.Pegasus: Khashoggi contacts among ‘thousands targeted by Israeli spyware

The findings showed that in April 2019, there was an attempt to hack my phone, but it was unsuccessful. While this is a relief, I am overwhelmed by feelings of vulnerability and intrusion.

To obtain evidence from the Pegasus Project, I had to submit the contents of my phone – in which my private and professional life was stored – to their technology team.

I sat in front of a computer screen for three hours, watching my virtual life travel to the Amnesty International lab, where a search for malware was conducted. I received evidence of the failed April hacking attempt the same day.

Controlling the narrative

As a British citizen of Saudi origin, I have spent more than half my life writing, researching and teaching. You wouldn’t expect me to be hacked. But such professional activities are a crime in Saudi Arabia, where the regime is determined to control the narrative about the past, present and future.

My crime is that I punctured this narrative, using academic research skills and access to Saudis whose voices remain muted. All my research has focused on giving a voice to the voiceless, which inevitably involves interviewing Saudis inside and outside the country. My debunking of official Saudi lies bothers the regime, which has spared no opportunity to tarnish my reputation, accusing me of being an agent of western governments, Turkey, Iran, Qatar, and previously Libya and Iraq.

Saudi government agents murdered Jamal Khashoggi in Istanbul in October 2018 (AFP)
Saudi government agents murdered Jamal Khashoggi in Istanbul in October 2018 (AFP)

In the 1990s, the regime targeted me with direct threats of violence – but with the advent of the internet, such threats have become virtual, propagated by regime agents. Hacking my phone is only the latest episode.

In 2014, my Twitter account was hacked in search of sensational scandals, and possibly clandestine plots with other Saudi exiles. The hackers must have been disappointed not to find any of this, but they did expose my private conversation with Sheikh Awad al-Qarni, a key Islamist figure who sent me greetings and asked me not to augment my criticism of the Islamist movement’s silence when prominent Saudi human rights leaders were detained.

Regime spies launched a campaign to discredit Qarni for sending a direct message to an unveiled woman, such as myself. Qarni has been in prison for several years.

Lives in danger

I never had anything to hide, as everything I knew was documented and published in books and articles. I had no secrets, but this was not the point. I cherished my privacy and loathed the Saudi intrusion into my life. I also worried about those who communicate with me from within the country, as their lives could be in danger.

Among the charges against Mohammed al-Otaibi, a human right activist, was storing my books and articles on his computer. He is still in prison. It is my responsibility to protect those who confide in me and want their voices to be heard.

While the April 2019 assault on my device was unsuccessful, I am sure there will be other attempts in the future

The murder of Jamal Khashoggi in October 2018 coincided with greater Saudi surveillance of exiles in Britain, Canada and elsewhere. The shock over the gruesome details of chopping up a peaceful journalist was compounded by fears of hacking. This was the first time exiles had heard of NSO helping the Saudis to hack the phone of a young exile based in Canada, Omar al-Zahrani, who had communicated with Khashoggi about establishing a media platform to debunk Saudi propaganda.

The financial cost of securing my phone was colossal, but it was worth it. While the April 2019 assault on my device was unsuccessful, I am sure there will be other attempts in the future.

Back in 2019, I was involved in discussions with other exiles in three countries about forming a political party, which could explain the attempt to infiltrate my phone at that time. The regime wanted more details about who would sponsor such a project – and who the culprits were. The project materialised on 23 September 2020,  the day the kingdom celebrates its national day, as a small group of activists, including myself, announced the establishment of the Saudi National Assembly (NAAS). Yahya Asiri, the general secretary, was hacked, and his name appears in the Pegasus files. 

Standing against oppression

I moved from academia to political activism because the Saudi regime committed heinous crimes, and the lives of exiles, including my own, were in danger. The Saudi regime targeted me when I was an academic, and again after I became an activist. Such attacks will surely continue in the months and years ahead.

In April 2019, I was also writing a book on state-society  relations. The villain was none other than bin Salman, who has detained hundreds of Saudis and precipitated the flight of scores more.

I was baffled by western media depictions of the prince as a modern reformer, while Saudi prisons were bulging with innocent prisoners of conscience, women were campaigning against discrimination, and a young diaspora was coming together around the globe. My book, The Son King, was definitely a faux pas.

How Israeli spy tech reaches deep into our lives

In 2019, a new virtual Saudi opposition-in-exile was beginning to be formed, standing against oppression and dictatorship. NAAS relies on social media to connect and exchange ideas, making it extremely vulnerable, as the murder of Khashoggi and the hacking of activists’ phones has demonstrated. In the wake of the Pegasus Project revelations, NAAS will surely revert to old methods of mobilisation, meetings and activism.

Thanks to Israeli malware, UAE complicity and Saudi intrusions, exiles will have to search for secure methods to share information and to mobilise. As many have taken refuge in the US, Canada, Britain and across Europe, these states have a responsibility to protect them from Saudi surveillance. Otherwise, there is a real risk the Khashoggi saga could be repeated.

Diplomacy must be activated to stop the axis of evil from spreading more fear, apprehension and possibly murder – and if that doesn’t work, sanctions should be pursued, at the very least in Britain, where two of the founders of NAAS reside.

The views expressed in this article belong to the author and do not necessarily reflect the editorial policy of Middle East Eye.

Read more

MBS Used ‘Israeli’ Spyware Pegasus to Spy on Lebanese, Hezbollah Officials – Report


MBS Used ‘Israeli’ Spyware Pegasus to Spy on Lebanese, Hezbollah Officials - Report

By Staff, Agencies

An ‘Israeli’ software company is revealed to have helped Saudi Crown Prince Mohammad bin Salman [MBS] take over the smart phones of high-ranking Lebanese authorities, senior figures of Hezbollah resistance movement as well as journalists, and spy on their communications.

According to the report published by the French daily newspaper Le Monde, Saudi Arabia’s de facto ruler used the NSO Group’s cell phone-hacking software, Pegasus, to conduct cyber-espionage on Lebanon’s President Michel Aoun, former prime minister Saad Hariri, former foreign minister and leader of the Free Patriotic Movement Gebran Bassil, and Chief of the Directorate of General Security Major General Abbas Ibrahim.

The report added the ‘Israeli’ spyware was abused on behalf of Saudi Arabia and the United Arab Emirates between 2018 and 2019 to spy on some Lebanese political officials and journalists.

Le Monde said the Saudi crown prince also called for espionage on Lebanese lawmakers representing Hezbollah Hassan Fadlallah and Ali Fayyad, governor of Lebanon’s central bank Riad Salameh and former finance minister Ali Hassan Khalil.

The report added that the Riyadh and Abu Dhabi regimes had demanded that two renowned Lebanese journalists, director of Beirut-based al-Mayadeen television news network Ghassan bin Jiddo, and correspondent and political analyst for al-Akhbar Arabic language newspaper Ibrahim al-Amin, be kept under close watch.

Similarly, the United Arab Emirates has apparently deployed digital spyware enabling surveillance of top leaders of Yemen’s popular Ansarullah resistance movement and officials from the administration of former Yemeni president Abd Rabbuh Mansur Hadi.

The Arabic-language al-Khabar al-Yemeni news website reported that Ansarullah’s leader Abdul-Malik al-Houthi and Chairman of the Yemeni Supreme Revolutionary Committee Mohammed Ali al-Houthi were among senior Yemeni officials targeted by the UAE.

According to the report, Hadi was also on the list of targets.

One of the most prominent targets was Ahmed Obeid bin Daghr, the former Yemeni prime minister in Hadi’s government. He was under surveillance since April 2016 until the end of 2018.

Being a highly invasive tool, Pegasus is said to be able to turn on the victim’s cell phone camera and microphone and access data on it, meaning that it can effectively turn the phone into a pocket spy.

The ‘Israeli’ firm NSO has been in the headlines since 2016 when experts said it was helping spy on an activist in the UAE.

The University of Toronto’s Citizen Lab, through a study, has found a link between the NSO technology and political surveillance in Mexico, the UAE and Saudi Arabia.

Victims of the hacking spree included diplomats, political dissidents, journalists and top government officials.

%d bloggers like this: