Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- BBC News Sinhala
- Home Home
- Sri Lanka Sri Lanka
- The world is the world
- Sports games
- More
- Did a spy come into your pocket?
- 11 July 2019
- Share this Share this on Facebook Share this on Twitter Share this on Whatsapp
- Image copyright GETTY IMAGES Concept image of a man waking up with a big data cloud covering his head - teal background
- Image caption Who enters your data?
- (Paul Kenyon and Joe Kent - File on 4)
- For many in the world, their smartphone is a window into the world. But what if the same is a window into your personal life?
- Have you ever thought that a spy has penetrated your pocket?
- Imagine if a hacker installed a spyware that could access everything on your smartphone (including encrypted messages) and operate its microphone and camera.
- However, this is far from being the case. We have been able to look for convincing evidence that software is used to track the work of journalists, activists and lawyers around the world.
- But who does this, and for what? What can we do with spyware in our pockets ?
- Powerful software known as a weapon
- Image copyright GETTY IMAGES Black background on a mobile camera lens.
- Image caption The telephone camera is like an eye - it sees everything in front of it
- Mike Murray is a cyber security expert at Lookout in San Francisco, USA. The company supports governments, businesses and consumers in keeping their phones and their data safe.
- Murray explains how the most sophisticated spyware ever made: a powerful weapon, called a weapon, must be sold under strict conditions.
- "The software operator can track you using your GPS facility," says Mike.
- "They can operate your phone's microphone and camera at any time and record everything that happens around you. You can steal access to every social media app on your phone . Your pictures, phone numbers, calendar information, It can steal every document, such as email, "he said.
- "In short, it turns your phone into a listening device and steals everything in it."
- Although spying software has been around for a long time, with this new tool we are entering a completely new world.
- The software usually does not interfere with encrypted data transfer, but it relies on the phone to take all of its functionality. It is so technologically advanced it is almost impossible to identify.
- Capturing the Mexican drug dealer
- Image copyright GETTY IMAGES Joaquin Guzman Loera, also known as "El Chapo" is Transported to Maximum Security Prison of El Altiplano in Mexico City, Mexico on January 08, 2016.
- Image caption Message encoding was enough to prevent drug dealer "El Chapo" from being arrested and arrested
- El Chapo, a Mexican, is the owner of a multi-billion dollar drug trafficking empire.
- With the help and security of his vast network, which remained hidden for six months after his escape from prison. He used only coded phones for communication. They were believed to be difficult to invade.
- But Mexican authorities purchased this highly specialized spy software, inserting it into the phones of El Chapo's close associates and directing him to his hiding place.
- The capture of El Chapo demonstrates that this kind of software is an invaluable weapon in the fight against terrorism and organized crime.
- But what can prevent the buyers of this weapon from hitting anyone it chooses?
- Is anyone in danger of being hacked by a government?
- British blogger who has become a target
- Image copyright GETTY IMAGES Photograph depicts a security exploit in a string of binary code
- Image caption Do you know anyone who is behind an email?
- Rory Donaghy is a blogger who has established an active team and website on the Middle East.
- He reported that the UAE was abusing human rights by showing that it was against the law to treat migrant workers - from tourists to tourists.
- Hundreds of people read his writings. And the headlines he used were no different than the sparkling ones that appear in the daily news.
- I. The Middle East (Middle East Eye) If the website is a strange thing to happen with the joined service. We got strange emails that included links from unknown people .
- One such dubious email was sent by Rory to a research group called Citizen Lab at the University of Toronto . The group is investigating the use of the digital spy mission against journalists and human rights activists.
- They confirm that the recipient is prompted to download the links in the email and the sender will be informed of what type of antivirus protection he has and the software cannot detect it. It is a true sign of sophistication.
- Rory's pursuit appears to be a cyber-espionage company based in Abu Dhabi, which is working for the UAE to chase the government's surveillance teams, which the government believes are extremists and a threat to national security.
- This short-lived blogger even adopted the nickname "Giro" for the British, who were watching his family as well as his behavior.
- A target civil rights activist
- Image copyright GETTY IMAGES Chalk Drawing From A Blackboard With A Smartphone Cyber Threat From Icons And Handwashing
- Ahmad Mansour, an award-winning civilian activist, has been a target for years of espionage in the UAE.
- He also referred Citizen Labs to a dubious document in 2016.
- The research team looked at the link in the message using an iPhone phone that did not contain any data . They saw how the smart phone was being invaded remotely and how to extract data from it.
- The iPhone is considered one of the safest phones on the market, but it is also one of the most advanced software ever seen. It had found a weakness in the apple system.
- As a result, Apple had to send updated software to all its phones worldwide.
- It is unclear what information Mansour's cell phone had collected, but he was later arrested and jailed for ten years. For now, he is in solitary confinement.
- Responding to these concerns, the Embassy of London in the United Arab Emirates said that its security agencies are in compliance with international standards and the law of their country. But, like the rest of the world, it did not say anything about intelligence matters.
- A targeted journalist
- Image copyright GETTY IMAGES Concept image of a cyber crime hacker using a mobile phone, breaching it's security breach and stealing data
- In October 2018, journalist Jamal Kashogi visited the Saudi embassy in Turkey and did not return. He was killed by representatives of the Saudi administration.
- A friend of the journalist, Omar Abdul Aziz, said his phone was hacked by the Saudi government.
- Omar believes that the hacking later played a big role in killing his friend. They have been in frequent contact and have had many conversations about politics as well as projects that have taken place together.
- The Saudi government has long been involved in these conversations as well as any documents exchanged between the two.
- The Saudi government's response to this is that there is no evidence that Saudi Arabia is behind mobile phone-targeted misconduct software.
- Hack home near a
- Image copyright GETTY IMAGES A smartphone holding a hand - the person is using WhatsApp
- Image caption Zero click technology can be the easiest way to access software on your mobile phone
- In May 2019, the security breach of the WhatsApp network, which is used by many to communicate with friends and family daily, was reported to be at its peak.
- If you thought it was meant for someone to listen to WhatsApp conversations, think again.
- That app was just the entry point into the phone's software. As soon as it opens, the attacker can unlock spyware on it.
- There is no need for the recipient to click on any link. The phone is accessed by immediately disconnecting a call. This is called zero click technology.
- WhatsApp promptly redone its 1.5 billion users, but nobody knew who was behind the hack. WhatsApp was the target this year. Which of the following could be targeted? Who could be like that?
- Hit back to
- Image copyright GETTY IMAGES Concept image - Big brother electronic eye, technologies for global surveillance, security of computer systems and networks
- Who is responsible for the image caption ?
- This type of spying software requires a special license for the type of security contractors have. It is marketed solely on the need to stop serious crime.
- But Citizen Labs, which is believed to be abusing it by client governments, has compiled a file.
- Are software developers responsible for this abuse?
- Unlike firearms, the creators of these spyware software remain active after they are sold.
- The Israeli company, NSO Group, is at the forefront of the market for such legal restraints. The company has been in operation for nearly a decade and generates hundreds of millions of dollars a year.
- Abdul Aziz's lawyer has taken the company to court for hacking into his client's phone. This is a very special occasion. It also helps to determine what role the software companies play once their software is released.
- The request for an interview was dismissed by the NSO. But in a statement it said its technology has saved lives, while providing technology to licensed government agencies involved in serious criminal investigation and prevention.
- The lawyer also received suspicious WhatsApp calls.
- How long can this spy software be detected ?
- Image copyright GETTY IMAGES Close-up of a woman's hands, holding a smartphone - she's wearing a yellow top and tapping on her phone's screen
- Image caption A text message from an unknown person? Do not click any link in it
- The ultimate goal of the legal blockchain industry is to produce spyware that is 100% unrecognizable.
- If they arrive, no one will have the opportunity to complain about the misuse. For no one knows about it. We all have to rely on software developers to operate them legally or not.
- It sounds like something of a James Bond movie, but the real results are in the new world.
- The threat is real. This is something we should all remember for the future.
- line
- This is based on the BBC radio program File on 4.
- line
- More details related to this news
- Sixteen-year-old Australian teenager 'secretly' into Apple computer network
- 20 August 2018
- Samsung mobile phone: Case against 'fake advertising'
- 07 July 2019
- Copyright © 2019 BBC The BBC is not responsible for the content of external sites.
Advertisement
Add Comment
Please, Sign In to add comment