Monday, July 19, 2021

Modi Government Planted Spyware in Pakistani Prime Minister Imran Khan's Smartphone

Pakistani Prime Minister Imran Khan has been the target of the Modi government's cyber attacks, according to a recently released Project Pegasus report.  The Indian government has neither confirmed nor denied the report.  The focus of the report is the use of the Israeli-made spyware by about  a dozen governments to target politicians, journalists and activists. The users of the Pegasus software include governments of  Bahrain, Morocco, Saudi Arabia, India, Mexico, Hungary, Azerbaijan, Togo and Rwanda.    

This is not the first time that Pakistan has figured prominently as India's favorite target for cyber hacks. Last year, a report in The Sunday Guardian of India said: "Mobile phones of around 30 Pakistani government servants, who include serving army generals, officials attached with the ISI and senior bureaucrats, were hacked into by using Pegasus spying software during April and May 2019". 

In addition to the use of spyware, the Indian government has been engaged in a massive, long-running disinformation campaign targeting Pakistan. EU Disinfo Lab, an NGO that specializes in disinformation campaigns, has found that India is carrying out a massive 15-year-long disinformation campaign to hurt Pakistan. The key objective of the Indian campaign as reported in "Indian Chronicles" is as follows: "The creation of fake media in Brussels, Geneva and across the world and/or the repackaging and dissemination via ANI and obscure local media networks – at least in 97 countries – to multiply the repetition of online negative content about countries in conflict with India, in particular Pakistan".  After the disclosure of India's anti-Pakistan propaganda campaign, Washington-based US analyst Michael Kugelman tweeted: "The scale and duration of the EU/UN-centered Indian disinformation campaign exposed by @DisinfoEU is staggering. Imagine how the world would be reacting if this were, say, a Russian or Chinese operation".  

Pegasus Spyware Explained. Source: The Guardian 


Pegasus is spying software made by NSO Group, an Israeli company whose exports are regulated and controlled by the Israeli government. It uses several different messaging apps to plant itself in mobile phones. Last year, Apple issued a warning to its customers of a "zero-click" version of the Pegasus software. It does not require the phone user to click on any links or messages for the spyware to take control of the device. Once installed, it can read and export any information or extract any file from SMS messages, address books, call history, calendars, emails and internet browsing histories.   

The Israeli spyware will likely inspire other software developers elsewhere to copy and improve it, contributing to a proliferation of such hacking and spying tools around the world. The governments and officials who use it to target others will eventually become targets themselves, unless the nations of the world agree to some norms of internationally accepted cyber behavior. It's high time to think about it. 


21 comments:

Ahmad Malik said...

Our security apparatus is extremely week technologically

Riaz Haq said...

Ahmad Malik: "Our security apparatus is extremely week technologically"

True. But it's easier to launch #cyber attacks than to defend against them. Last year, the #US government suffered a massive #SolarWinds #cyberattack and didn't even detect it until #Fireeye, a company founded by a #Pakistani-#American, alerted them.

https://www.riazhaq.com/2020/12/fireeye-founded-by-pakistani-american.html

Ahmed said...


Dear Sir

Isrealis are way ahead in science and technology, I was watching a news on tv channel in which it said that Isreal is ranked no.1 in "Cyber Security" and also in "Smart Car" technology, Isreal is ranked no.1

Thanks

SAMIR SARDANA said...

THIS IS A ISRAELI TOOL TO OBTAIN LEVERAGE WITH WORLD GOVERNMENTS AND BLACKMAIL POLITICIANS AND KEY OPINION MAKERS.

SOMEWHERE THERE IS A SERVER WHICH HAS ALL THE DATA AND THAT SERVER CAN BE ACCESSED BY MOSSAD AND CIA !

Y IS THE WORLD SURPRISED ? THE JOB OF THE STATE ,IS TO MANIPULATE AND NAVIGATE THE MINDS OF ITS POPULATION.THIS REQUIRES DATA - WHICH COMES FROM PEGASUS ! ANALYTICS OF THAT DATA = INFORMATION.

THIS LEADS TO MIND CONTROL AND NAVIGATION STRATEGIES ,BEING CONCEIVED AND EXECUTED BY THE STATE,USING TECHNOLOGICAL AND OTHER TOOLS !

Imran Khan was also a PEGASUS Target ! Inspite of ISI ?

People of this world are in deep slumber !

Y is online gambling not banned ?
Y is online porn not banned ?
Y is online gaming for kids not banned ?
What is the purpose of the 1000s of Apps , developed only for the handphone market ?
Y are all search engines free ?
Y is all Social Media free ?
Y do states tolerate websites which preach racism,hate and conspiracy theories

It is simple no brainer !

It is to SPY on people ! Even a TV set with or w/o a Dish, is used to video record and audio record.This is a open secret for decades ! Advertisements are a revenue model, for the private entities of the above,but each of the platforms as above,can be taken over ANY TIME, by PEGASUS and many other softwares.

WHEN THE ABOVE PROPOSITIONS WERE DEVELOPED 10-50 YEARS BEFORE , THEY WERE STRUCTURED TO BE SPIED UPON ! THE AIM IS TO GET THE HUMANS (LIKE BEES) TO THE VARIED HIVES,AND THEN NAVIGATE THE BEES,TO THOUGHT AND ACTION.THE THEORY IS THAT,IT IS BETTER THAt THE BEES MAKE HONEY AND MONEY,AND NOT WAR OR REVOLUTION ! WNHEN THE BEES GO ASTRAY (MASS SHOOTING OR TERROR),IT IS DUE TO THE MIND CONTROL AND PROVOCATION BY THE HIVE MAKER (CIA/MOSSAD).THE BEE IS KILLED BY THE HIVE MAKER TO SEND A MESSAGE ALL BEES (HUMANS) TO FALL IN LINE AND STAY IN LINE !

Once Pegasus is on 1 smart phone, with 1 App,then like the COVID virus,it will jump to all the persons called by that person,with a smart phone, and who has the same, or any other app.

SOLUTION - Use simple Nokia 2100 , and if required,remove the SIM when not in use.dindooo hindoo

IF A POLITCIAN DOES NOT KNOW OF THE ABOVE, AND SURFS THE WEB,FROM A SMART PHONE, AND WATCHES PORN AND GAMBLES ONLINE, FROM A SMART PHONE - THEN THEY DESERVE DOOM !

Riaz Haq said...

Secured messaging app being developed for govt officials: #Pakistan #IT minister. 'Beep Pakistan’ app is undergoing in-house trial, will be launched within few months. It will be mandatory to use the app for official purpose. #Pegasus #ImranKhan #Spyware https://www.thenews.com.pk/latest/866845-secured-messaging-app-developed-for-govt-officials-aminul-haq


Federal Minister for Information Technology and Telecommunications Syed Aminul Haq on Tuesday said that his ministry has developed "a secured and seamless" messaging app for the government officials.

In a statement Tuesday, Aminul Haq said that his ministry has developed a digital messaging app named 'Beep Pakistan' for a secured official communication in the country.

He maintained that the app will initially provide a secured chat and audio call facilities, adding that video call facility will also be available on the app soon.

The minister said that the app is aimed at providing government officials a safe communication platform.

According to the Ministry of IT and Telecom, ‘Beep Pakistan’ app was undergoing in-house trial, adding that the app will be launched within few months. It will be mandatory for all the government employees to use the app for official purpose.

It is pertinent to mention here that India had targeted a phone which was earlier in Prime Minister Imran Khan's use through an Israeli firm's malware, a global investigation had revealed, igniting fears of widespread privacy and rights abuses.


As reported by an independent Israeli publication Haaretz, several Pakistani officials, Kashmiri freedom fighters, Indian Congress leader Rahul Gandhi, and even an Indian supreme court judge had been targeted, the publication said.

Sources had informed Geo News that India tried to tap the Federal Cabinet members' calls and messages through the spyware, prompting Pakistan to develop new software for its federal ministers.

Following the development, a high-level meeting of the civil and military leadership had been called which would decide a future course of action against India's spying attempt.


SAMIR SARDANA said...

Beep Pakistan will also be penetrated by Mossad and CIA.

ISI has to 1st develop a smart phone,to be used BY MANDATE,only by senior Govtt staff - and these phones will make and get calls,from the same phone types ONLY.The only exceptions being calls by senior staff of FOREIGN STATES,on an EMERGENCY MODE.

Then those phones need to have NO OTHER APP,besides Beep.It should be a crime for a Govtt staffer,to make official calls on any other phone.

The BEEP Servers have to be IN PAKISTAN,under state control.

The PM of Pakistan should not SURF the web.even on the STATE PHONE.There is no need,as it can be done from a secure desktop.The team of the PM should surf the web for news of interest,convert the page to JPEG,put it on the local and secure INTRANET,and the PM can ONLY READ IT !

That is the only secure way !

COMING TO CHAIWALA ! INDIA AND ISRAEL ARE 1 ! Y ONLY IMRAN KHAN ? ALL THE GOVTT MINISTERS, MILITARY STAFF of PAKISTAN, ARE PRIME TARGETS ! ALL THAT RAW HAS TO DO,IS TO GET THE CELL PHONE NUMBER OF THESE PEOPLE AND THEIR "VULNERABLES",ID.EST., KIDS,WIVES,MISTRESSES, SECRETARIES ....

THESE NUMBERS ARE SENT TO MOSSAD - WHO SENDS IT TO NSO - WHO THEN PLAN AND EXECUTE THE HACK, FROM VARIOUS LOCATIONS,IN THE WORLD ! THE PLANNING AND EXECUTION IS SCATTRED ACROSS THE WORLD - SO THAT NO LEGAL REMEDY IS PRACTICAL,VIABLE OR POSSIBLE.

Y ARE PEOPLE SHOCKED BY CHAIWALA ?

These Hindoo heathens, just killed a 85 year NATIONAL SECURITY THREAT,STAN SWAMY - who had Parkinson's ! He was classifed as a terrorist ! The man was denied bail and medical aid ! He was a Jesuit Preacher with the tribals ! He had to seek daily court sanction for medical treatment !

The NIA and the Indian Courts denied him a straw to drink water (as he had Parkinson's),so that he could suffer and crave for water !

This is the status of the worthless Indian Police,legal system,Constitution and Judiciary !

Such a nation is capable of anything ! dindooohindoo

SAMIR SARDANA said...

THE COMBO IS THE CRACK !

BEEP PER SE,IS NOT ENOUGH !

IT IS BEEP + MIP (MADE IN PAKISTAN) SMART PHONE !

THE MIP SMART PHONE IS KEY ! LET US ASSUME THAT IMRAN KHAN USES A SECURE PHONE,WITH NO APP AND NO WEB HOOK UP,AND NO INTRANET !

BUT ....

HE HAS KIDS,CLOSE RELATIVES,SECRETARIES ....

THEY TRAVEL BY AIR !

WHEN THEY CHECK IN - THEY PUT THEIR PHONES AND LAPTOP,ON THE TRAY,FOR X-RAY ! JUST 1 LAYER OF BREACH ! dindooohindoo

IT TAKES LESS THAN 1 SECOND,TO PLANT A TRACKING BUG ON A E-DEVICE,FOR LOCATION ! FOR LOCATION,IN ANY CASE, IT IS EASIER TO PLANT A BUG ON THE BODY OR CLOTHES OF A PERSON.

IT WILL TAKE ONLY A FEW SECONDS,TO PLANT A BUG IN THE OS OF THE PHONE, OR AN APP ON THE PHONE !

THEN THE STORY WILL BE OVER !

SOLUTION = MIP SINGLE USE SMART PHONES,WHICH ARE SEALED,AND CANNOT BE OPENED OR REPAIRED AND WITH NO PORTS - EXCEPT 1 CHARGING POINT.IF THERE IS A PROBLEM - THEN THE PHONE HAS TO BE DESTROYED.THE DATA WILL BE ON THE SERVERS,IN ANY CASE.

Riaz Haq said...

Hours after his sudden firing by #Modi & #Shah, #India's Central Bureau of Investigation (#CBI) Chief Alok Verma, his family and 2 other senior CBI officials were targeted for surveillance with #Pegasus #spyware made by #Israel's #NSOGroup https://thewire.in/government/pegasus-project-chronology-samajhiye-hours-after-midnight-coup-cbi-chiefs-phones-entered-surveillance-zone via @thewire_in

The midnight coup in the CBI came barely two days after Verma ordered the filing of a criminal case against Asthana, then special director in the Bureau, accusing him of corruption.

Given Asthana’s proximity to Modi, the case, registered on October 21, 2018 – which ironically depended on (lawful) phone intercepts and apparently yielded a lot of sensitive material – sent alarm bells ringing at the highest levels of the government. Two days later, Asthana filed a complaint against Verma with the Central Vigilance Commission.



----------

‘Chronology Samajhiye’: Hours After Midnight Coup, CBI Chief Alok Verma Entered Surveillance Zone
Leaked list contains numbers of Alok Verma and family, and of Rakesh Asthana, against whom the CBI had filed a case, triggering alarm bells at the highest levels of Modi government

Hours after Prime Minister Narendra Modi acted to oust Alok Verma from his post as head of the Central Bureau of Investigation at midnight on October 23, 2018, an unidentified Indian agency known to be a user of Pegasus spyware made a note of three telephone numbers registered in his name.

For India’s top law enforcement official, this was a remarkable reversal of fortune.

Until his peremptory termination despite having three months of tenure to go, Verma had enjoyed the authority to order the surveillance of suspects – under norms prescribed by law.

But unknown to him at the time, the blow the Modi government delivered that night was accompanied by a second sucker punch: someone with the keys to India’s hush-hush spyware deployment system received authorisation to add Verma’s numbers to an extensive list of persons of interest selected for surveillance, The Wire has established.

The Wire investigated several hundred India numbers from a leaked database comprising 50,000 numbers believed to be linked to potential targets of Pegasus. Forbidden Stories, a French media non-profit, accessed and shared the database with a consortium of 15 other international media partners.

Along with Verma, the personal telephone numbers of his wife, daughter and son-in-law would eventually get placed on the list too, making it a total of 8 numbers from this one family.

Also added to the list of numbers at the same time as Verma were two other senior CBI officials, Rakesh Asthana and A.K. Sharma.

Both men were added on to the database about an hour after their former boss. Asthana was also removed from the CBI on the night of October 23, 2018; he is currently head of the Border Security Force (BSF). Sharma was divested that night of the crucial charge he held – head of the policy division – but remained in the CBI till January 2019, when he was transferred out. He retired from government earlier this year.

The numbers of Asthana, Sharma, Verma and his family members figure in the leaked database for a short period. By the second week of February, 2019, by which time Verma had finally retired from government service, this entire cluster of persons ceased being of interest to the government agency which had added them to the list.

NSO insists the leaked database has nothing to do with the company or with Pegasus. Verma was unwilling to participate in this story, so forensics on the telephones linked to him – the only way of conclusively establishing whether they were targeted or infected with Pegasus – could not be carried out.

Riaz Haq said...

#Pakistan seeks #UN probe of #India's use of #Pegasus spyware, made & licensed by #Israeli company #NSO. It's been used in attempted and successful hacks of 37 smartphones belonging to #ImranKhan, #Indian journos, govt officials & human rights activists. https://reut.rs/3zrsyaF

Pakistan called on the United Nations on Friday to investigate whether India used Israeli-made Pegasus spyware to spy on public figures including Prime Minister Imran Khan.

The Pakistani leader’s phone number was on a list of what an investigation by a group of 17 international media organisations and Amnesty International said were potential surveillance targets for countries that bought the spyware.

Pakistan’s foreign office issued a statement accusing India of “state-sponsored, continuing and widespread surveillance and spying operations in clear breach of global norms of responsible state behaviour.”

“In view of the gravity of these reports, we call on the relevant UN bodies to thoroughly investigate the matter, bring the facts to light, and hold the Indian perpetrators to account,” it said.

India’s foreign ministry did not immediately respond to a request for comment on the statement.

The Indian government has already faced calls by domestic political opponents to investigate allegations of spying on officials including the main opposition leader, Rahul Gandhi.

Delhi has not responded to the allegations.

The investigation published by the media organisations on Sunday said spyware made and licensed by Israeli company NSO had been used in attempted and successful hacks of 37 smartphones belonging to journalists, government officials and human rights activists.

NSO has said its product was intended only for use by vetted government intelligence and law enforcement agencies to fight terrorism and crime.


Arch-rivals and neighbours, Pakistan and India have fought two of their three wars over the disputed Himalayan region of Kashmir, which both claim in full.

The statement by Pakistan’s foreign office said Delhi had long been using such tactics in Indian-administered Kashmir, an accusation to which India did not immediately respond.

“We are closely following these revelations and will bring the Indian abuses to the attention of appropriate global platforms,” the statement said.

Riaz Haq said...

Netflix's Playbook for Tyrants Has a Real-World Mimic in #India. In fact, modern India has one advantage the Netflix six did not. I’m speaking of #spyware technology of the winged-horse variety. #Modi #Pegasus #BJP #hindutvaterror https://thewire.in/politics/netflix-how-to-become-a-tryant via @thewire_in

by Karan Thapar

I don’t watch many Netflix programmes but a series recommended by my cousin Mala Singh has struck me like a bolt of lightning. Called How to Become a Tyrant, it presents what it calls “a playbook for absolute power”. Much of it is tongue-in-cheek, yet it’s based on the actual tactics and strategies used by Adolf Hitler, Josef Stalin, Mao Zedong, Muammar Gaddafi, Kim Il-sung, Idi Amin and Saddam Hussein. So if you take it seriously, it tells you what you must do if you aspire to be India’s tanashah. And the remarkable thing is it feels uncannily like the country we’re living in and the politics we’re subjected to. Read on and see if you agree.

First, if you want to be a dictator, you need to be a particular type of person. For a start, you must be or, at least, present yourself as, one of the people. Hitler was a corporal, Mussolini the son of a blacksmith. As the commentary puts it: “A man who shares your dreams can fulfil them.” So a chaiwala will do very nicely.

The would-be dictator must also believe in himself. The series claims “a megalomaniacal belief in your abilities convinces others of them”. So whether it’s the mystical power of taalis and thalis or the claim a single act of demonetisation can eliminate corruption, if you are convinced of it then you can be sure an awful lot of others will also agree.

However, our putative dictator needs one further character quality: the gift of speech or, actually, the more important capacity to attract attention. Hitler’s pencil-brush moustache was his defining feature. It was unmistakably him. But a flowing white beard might do as well. Hitler, we’re told, was a natural-born adman. The Swastika, it’s claimed, was the most striking symbol ever created. If that’s true, the performance we first saw at Madison Square Gardens and the penchant for clever alliteration, acronyms and rhymes is clearly an enormous asset.

Now, if these are the qualities that can define a potential tyrant, there are a few others he needs to attract a firm and loyal following. First, the promise that he can create a better world for everyone. It’s not necessary to succeed – few tyrants have – but the promise must remain evergreen and the belief you’re steadily getting closer to delivery must be unquestioned. After all, you won’t become a tyrant if you’re associated with ‘burre din’.

But this promise on its own is not enough. Our tyrant-in-the-making must also be seen as the only man who can fulfil it. He must, therefore, be acknowledged not just as the fount of all wisdom but also the fount of all virtue. So he needs to whip up a cult of personality. With the right number of bhakts, that’s quite easily done.

In normal times this should be enough to corral the flock behind the shepherd but, sometimes, even sheep can go astray. So it’s a good idea to create an enemy to keep them in line. Hitler found one in the Jews, Idi Amin in Ugandan-Asians and Gaddafi in Italian-Libyans. Our minorities could neatly fit this purpose. The Muslims, for example, at 14% of the population, are large enough to be falsely painted as a threat yet small enough to be easily kept in their place.


Every now and then, an external enemy also helps. Saddam Hussein chose Iran, Kim Il-sung South Korea, Hitler France and Germany, and Stalin most of the rest of the world. Little Pakistan next door would be perfect for us. The problem is the support it gets from China. If the enemy you choose is stronger than you, things could unravel pretty quickly. Still, if you can strike at Balakot and the only price you pay is a MiG-21, the audience at home will keep smiling.

Finally, tyrants need to be prepared for the worst.

Riaz Haq said...

Indian Journalist Swati Caturvedi: #Israel is helping #Modi undermine #India's democracy. Why Israel must shut down sales of #Pegasus #spyware, and why authoritarian cowards troll and intimidate - but they won't silence me. #BJP #Hindutva #Islamophobia https://www.haaretz.com/israel-news/.premium-i-was-targeted-by-nso-israel-is-helping-modi-undermine-india-s-democracy-1.10028100

India loves to describe herself as the world’s largest democracy, and Israel as the only democracy in the Middle East. Yet opaque officials and executives in both countries have come together in a dark dance against democracy.

Indian journalists, top political leaders, judges and civil servants sworn to protect our constitution were subjected to an intrusive surveillance campaign, a "hijacking" of our phones, by military grade surveillance spyware sold by the Israeli company NSO.

Riaz Haq said...

Abhay Aggarwal 3rd degree connection3rd
Media Monitoring, Public Relations, Digital Marketing, Content, Infographics, Video, Web and Mobile Apps Development
Toronto, Ontario, Canada Contact info

Press Monitor

https://www.linkedin.com/in/abhay-aggarwal/?originalSubdomain=ca


Press Monitor is India's leading media monitoring service.

Press Monitor services are used by President of India, Prime Minister of India, all the ministries of the Indian government, all Indian embassies worldwide, statutory bodies, regulatory bodies, public sector undertakings, multinational companies and Indian enterprises.

---------


Abhay Aggarwal
Media Monitoring, Public Relations, Digital Marketing, Content, Infographics, Video, Web and Mobile Apps Development

More

Message

Abhay Aggarwal
Abhay Aggarwal 3rd degree connection3rd
Media Monitoring, Public Relations, Digital Marketing, Content, Infographics, Video, Web and Mobile Apps Development
Toronto, Ontario, Canada Contact info

Press Monitor
500+ connections

Message

More
About
Nearly 24 years experience in dealing with senior executives and business leaders. Two decades experience involving application of mind and discretion.

Strong understanding of business issues at national and international level. Daily interaction with news over 24 years.

Ability to lead complex projects from concept to fully operational status. Have handled projects in the UK, India and working closely with the government of Seychelles.

Goal-oriented individual with strong leadership capabilities. Managing team of 60 people with very little staff turnover. Many employees have stayed for more than 10 years.

Ability to do business in an international environment cutting across geographies, ethnic backgrounds, and languages.

Specialties: Business representation in the UK, News Aggregation Services, Web-based application development

-------------


Abhay Aggarwal
Media Monitoring, Public Relations, Digital Marketing, Content, Infographics, Video, Web and Mobile Apps Development

More

Message

Abhay Aggarwal
Abhay Aggarwal 3rd degree connection3rd
Media Monitoring, Public Relations, Digital Marketing, Content, Infographics, Video, Web and Mobile Apps Development
Toronto, Ontario, Canada Contact info

Press Monitor
500+ connections

--
Nearly 24 years experience in dealing with senior executives and business leaders. Two decades experience involving application of mind and discretion.

Strong understanding of business issues at national and international level. Daily interaction with news over 24 years.

Ability to lead complex projects from concept to fully operational status. Have handled projects in the UK, India and working closely with the government of Seychelles.

Goal-oriented individual with strong leadership capabilities. Managing team of 60 people with very little staff turnover. Many employees have stayed for more than 10 years.

Ability to do business in an international environment cutting across geographies, ethnic backgrounds, and languages.

Specialties: Business representation in the UK, News Aggregation Services, Web-based application development


Riaz Haq said...

The Pegasus #spyware revelations cast doubt on the health of #Indian #democracy under #Modi. The inclusion of prominent critics on a list of hacking targets embarrasses the government. #BJP #Hindutva #Fascist https://www.economist.com/asia/2021/07/31/the-pegasus-revelations-cast-doubt-on-the-health-of-indian-democracy



In ancient Hindu lore a winged horse emerges from the milky churn of primeval oceans to become the trusted mount of Indra, king of the heavens. A later tradition says it was instead Mahabali, lord of the demons, who rode the fabulous stallion. Both versions picture a creature strikingly like Pegasus, the flying horse of Greek myth, except that the Indian model is fancier. It sports not one but seven heads.

Contemporary India’s most powerful men could have used those extra heads. Relying on Pegasus—not the mythical horse but a very modern brand of electronic spyware—they seem to have ridden recklessly into danger. A global investigation by a clutch of newspapers and ngos, triggered by the leak of some 50,000 phone numbers in ten countries, casts the government of Narendra Modi in an ugly light as a presumed client of Pegasus’s Israeli creator, the nso Group.

Riaz Haq said...

#Twitter locks account of #India's largest opposition party. Rohan Gupta, the head of #socialmedia for #Congress, alleged that Twitter had taken the step at the direction of the ruling #BJP. #Modi #Hindutva #Islamophobia_in_india https://tcrn.ch/3iBzY5E via @techcrunch

Indian National Congress wrote about the Twitter episode on Facebook Thursday.

“When our leaders were put in jails, we were not scared then why would we be afraid of closing our Twitter accounts now. We are Congress, this is the message of the people, we will fight, we will keep fighting. If it is a crime to raise our voice to get justice for the rape victim girl, then we will do this crime a hundred times. Jai Hind… Satyamev Jayate,” it said.

Rohan Gupta, the head of social media for Congress, alleged that Twitter had taken the step at the direction of the ruling Bharatiya Janata Party, adding that the firm had also suspended profiles of several of the party’s senior leaders.

In a statement, a Twitter spokesperson said the company’s rules are enforced judiciously and impartially for everyone on their service.

“We have taken proactive action on several hundred Tweets that posted an image that violated our Rules, and may continue to do so in line with our range of enforcement options. Certain types of private information carry higher risks than others, and our aim is always to protect individuals’ privacy and safety. We strongly encourage everyone on the service to familiarise themselves with the Twitter Rules and report anything they believe is in violation,” the spokesperson added.

The locking of the Indian National Congress’ account has prompted some new criticism for the American firm. “We strongly condemn the blocking of the accounts of the Indian National Congress and senior leaders of the Congress party,” tweeted Derek O’ Brien, from the All India Trinamool Congress party.

Riaz Haq said...

A small #US #software maker accuses #China’s #Huawei in a lawsuit of forcing it to build a ‘back door’ into a sensitive surveillance project in #Pakistan . Huawei denies the claim.


https://www.wsj.com/articles/huawei-accused-in-suit-of-installing-data-back-door-in-pakistan-project-11628947988?st=fdedtsl17enzx5z&reflink=article_email_share


A long-running dispute between Huawei Technologies Co. and a small U.S.-based contractor has escalated to U.S. federal court, with the contractor alleging Huawei stole its technology and pressured it to build a “back door” into a sensitive law-enforcement project in Pakistan.

The contractor, Buena Park, Calif.-based Business Efficiency Solutions LLC, or BES, says in a lawsuit filed Wednesday in California district court that Huawei required it to set up a system in China that gives Huawei access to sensitive information about citizens and government officials from a safe-cities surveillance project in Pakistan’s second-largest city of Lahore.

Muhammad Kamran Khan, chief operating officer of the Punjab Safe Cities Authority, which oversees the Lahore project, said the authority has begun looking into BES’s allegations.

“Our team is examining the accusations and sought an explanation from Huawei,” Mr. Khan said in an interview. “We have also put a data security check on Huawei after this issue.”

“So far, there has been no evidence of any data stealing by Huawei,” he said.

A Huawei spokeswoman said the company doesn’t comment on ongoing legal cases. But she added, “Huawei respects the intellectual property of others, and there is no evidence Huawei ever implanted any back door in our products.”

In comments to The Wall Street Journal last September, Huawei acknowledged setting up a separate version of the Lahore system in China, but said it was only a test version that was “physically isolated from the customer’s live network.” This made it “impossible for Huawei to extract data from the customer’s live network.”

Pakistan’s foreign ministry didn’t respond to requests for comment.

U.S. officials have long alleged Huawei gear could enable Chinese espionage in the countries that install it. Huawei has repeatedly said its gear is safe and that it would never spy on behalf of any government.

The allegations in the suit stem from a long-running legal dispute between the companies. Huawei hired BES to provide software and other services to help it win the rights to build Lahore’s safe-city project in 2016. It eventually beat out Western competitors including Motorola Solutions and Nokia Corp. with its bid of $150 million, according to the suit, in which BES is represented by lawyers from Akin Gump Strauss Hauer & Feld LLP.

The relationship soured, and Huawei sued BES in Pakistan, where BES also sued Huawei. Those proceedings are ongoing. BES is no longer operational and has no revenue.

Riaz Haq said...

A small #US #software maker accuses #China’s #Huawei in a lawsuit of forcing it to build a ‘back door’ into a sensitive surveillance project in #Pakistan . Huawei denies the claim.


https://www.wsj.com/articles/huawei-accused-in-suit-of-installing-data-back-door-in-pakistan-project-11628947988?st=fdedtsl17enzx5z&reflink=article_email_share


Huawei is a leader in safe-cities projects—citywide surveillance systems marketed to governments as crime-fighting tools that often make use of facial-recognition cameras and other high-tech capabilities. The projects have drawn scrutiny from some governments and rights groups, who say they are used to export China’s surveillance practices. Huawei says its projects improve public safety and says it has built safe-cities systems in hundreds of cities around the world.

Pakistan has signed more agreements for Huawei safe-city projects than any other country, according to research by the Center for Strategic and International Studies.

BES’s lawsuit says that Huawei’s alleged back door was located in a database that consolidated sensitive information—including national ID card records, foreigner registrations, tax records and criminal records—for law enforcement. The system is called the Data Exchange System, or DES, according to the lawsuit.

BES says in the suit that after it installed the DES in Lahore, Huawei demanded in 2017 that it install a duplicate DES in the eastern Chinese city of Suzhou that would give Huawei direct access to the data being gathered in Pakistan.

Before building the Suzhou system, BES says in the suit it asked Huawei to obtain approval from Pakistani authorities.

“We want to insure that PPIC3 has no objection in transfer of this technology outside of PPIC3 for security reasons,” Mr. Nawaz wrote in an email to Huawei officials attached to the lawsuit. “Please get an approval from PPIC3, in writing, prior to us performing this function.”

PPIC3 is the acronym for the Pakistani command center that oversees the Lahore project.

According to the lawsuit, Huawei initially said it wasn’t necessary to get approval for what it called a test and threatened to withhold payments and terminate its agreements with BES if the contractor didn’t build the system.

Later, the lawsuit says, Huawei told BES it had indeed received Pakistani approval, and BES went ahead with the installation in Suzhou.

Mr. Nawaz said in an interview that Huawei refused to show evidence of Pakistani approval and that BES installed the alleged back door under duress. The lawsuit alleges that “Huawei-China uses the proprietary DES system as a back door from China into Lahore to gain access, manipulate, and extract sensitive data important to Pakistan’s national security.”


Adrian Nish, the London-based head of threat intelligence at BAE Systems Applied Intelligence, a unit of BAE Systems PLC, said it isn’t uncommon for a vendor to build a duplicate version of a system in-house for testing while it is under development, but such duplicates shouldn’t be connected to the actual system.

“Those two systems should not talk to each other,” he said.

Riaz Haq said...

How the NSA bugged Cisco's routers

https://www.infoworld.com/article/2608141/snowden--the-nsa-planted-backdoors-in-cisco-products.html

Much has been made of industrial espionage by China, and the U.S. government has repeatedly warned businesses not to trust technologies purchased from that country. Maybe the Chinese and other governments are the ones that should be issuing warnings.

"The NSA routinely receives -- or intercepts -- routers, servers, and other computer network devices being exported from the U.S. before they are delivered to the international customers," Greenwald writes. "The agency then implants backdoor surveillance tools, repackages the devices with a factory seal, and sends them on. The NSA thus gains access to entire networks and all their users."

Routers, switches, and servers made by Cisco are booby-trapped with surveillance equipment that intercepts traffic handled by those devices and copies it to the NSA's network, the book states. Greenwald notes that there is no evidence that Cisco or other companies were aware of the program.

"We've stated previously that Cisco does not work with any government to weaken our products for exploitation," a Cisco spokesman told the Wall Street Journal. "We would, of course, be deeply concerned with anything that could damage the integrity of our products or our customers' networks."

Apart from any concerns you might have about privacy, this kind of publicity is very bad for U.S. business. Why would you buy a product that handles sensitive corporate or government data if you thought the device was bugged?

Riaz Haq said...

Close the N.S.A.’s Back Doors

https://www.nytimes.com/2013/09/22/opinion/sunday/close-the-nsas-back-doors.html

In 2006, a federal agency, the National Institute of Standards and Technology, helped build an international encryption system to help countries and industries fend off computer hacking and theft. Unbeknown to the many users of the system, a different government arm, the National Security Agency, secretly inserted a “back door” into the system that allowed federal spies to crack open any data that was encoded using its technology.

Documents leaked by Edward Snowden, the former N.S.A. contractor, make clear that the agency has never met an encryption system that it has not tried to penetrate. And it frequently tries to take the easy way out. Because modern cryptography can be so hard to break, even using the brute force of the agency’s powerful supercomputers, the agency prefers to collaborate with big software companies and cipher authors, getting hidden access built right into their systems.

The New York Times, The Guardian and ProPublica recently reported that the agency now has access to the codes that protect commerce and banking systems, trade secrets and medical records, and everyone’s e-mail and Internet chat messages, including virtual private networks. In some cases, the agency pressured companies to give it access; as The Guardian reported earlier this year, Microsoft provided access to Hotmail, Outlook.com, SkyDrive and Skype. According to some of the Snowden documents given to Der Spiegel, the N.S.A. also has access to the encryption protecting data on iPhones, Android and BlackBerry phones.

These back doors and special access routes are a terrible idea, another example of the intelligence community’s overreach. Companies and individuals are increasingly putting their most confidential data on cloud storage services, and need to rely on assurances their data will be secure. Knowing that encryption has been deliberately weakened will undermine confidence in these systems and interfere with commerce.

The back doors also strip away the expectations of privacy that individuals, businesses and governments have in ordinary communications. If back doors are built into systems by the N.S.A., who is to say that other countries’ spy agencies — or hackers, pirates and terrorists — won’t discover and exploit them?

The government can get a warrant and break into the communications or data of any individual or company suspected of breaking the law. But crippling everyone’s ability to use encryption is going too far, just as the N.S.A. has exceeded its boundaries in collecting everyone’s phone records rather than limiting its focus to actual suspects.

Representative Rush Holt, Democrat of New Jersey, has introduced a bill that would, among other provisions, bar the government from requiring software makers to insert built-in ways to bypass encryption. It deserves full Congressional support. In the meantime, several Internet companies, including Google and Facebook, are building encryption systems that will be much more difficult for the N.S.A. to penetrate, forced to assure their customers that they are not a secret partner with the dark side of their own government.

Riaz Haq said...

Big #Tech Thought It Had A Billion Users In The Bag. Long viewed as the world’s biggest market for “the next billion users,” #India is fast becoming #SiliconValley’s biggest headache under #Modi's #Hindutva rule. #BJP #SocialMedia https://www.buzzfeednews.com/article/pranavdixit/big-tech-thought-it-had-a-billion-users-in-the-bag-now-its via @PranavDixit

When he tweeted a screenshot of the email to his more than 200,000 followers, he wrote “Hail the Modi government!” in Hindi, and almost immediately, the Indian internet exploded. The move to silence him was seen by many as yet another step by India’s increasingly authoritarian government to clamp down on dissent.

For months, the country’s ruling Bharatiya Janata Party, led by Modi, a nationalist autocrat accused of reshaping India’s secular ethos into a Hindu state, had been hard at work trying to quell an upswell of criticism on social media after a deadly second wave of the pandemic killed thousands and protests from millions of farmers against new agricultural laws rocked the nation. But it wasn’t until the last week of May that things came to a head.

From May 26, India’s government armed itself with policies that empowered it to crack down on virtually all major digital platforms  —  social media companies like Twitter, Facebook, YouTube, and Instagram, messaging apps like WhatsApp, streaming services like Netflix and Amazon Prime, and news websites.

Among the new rules, which were first proposed in February, was one that requires social media platforms and streaming services to hire additional staff to address “grievances” filed by Indians offended by certain content and to employ full-time officers to liaise with law enforcement agencies around the clock. Others required news websites to submit monthly compliance reports and to agree to moderate or remove stories, podcasts, and videos flagged by a government committee. Another mandates that in certain circumstances messaging apps like WhatsApp must allow the government to track who texted whom, effectively breaking encryption.

The immediate consequences for not complying with these rules can be severe  —  companies can be slapped with heavy fines, local staffers can be jailed. And the broader consequences could be worse: losing protection from being held liable for content that people post, which could open companies up to all kinds of lawsuits.

If a streaming platform doesn’t respond or give an explanation that satisfies the complainant, they can appeal to the federal government, which can ultimately compel the platform to censor, edit, or take down the content in question.

It’s a sea change for Silicon Valley.

Years ago, seeing a quick path to exponential growth in India’s millions, the US tech industry rushed in, hired thousands of people, poured in billions of dollars, and became inextricably intertwined with the story of a modern, ascendant nation. But as muscular nationalism coursed ever faster through India’s veins, criticism of the powerful became increasingly difficult. Journalists were jailed, activists imprisoned, and the internet, dominated almost entirely by American social media platforms and streaming companies and one of the last remaining spaces for dissent, is now in the crosshairs.

Tech companies thought they had a billion users in the bag. But the new rules mean they might be forced to make a choice between standing up for democratic values and the rights of their users, and continuing to operate in a market crucial to growth and market dominance.

“The new rules were a jolt,” Mishi Choudhary, a technology and policy lawyer based in New York, told BuzzFeed News.

“Suddenly, they turned a wide open internet into one of the most intrusively regulated states and took it in an undemocratic direction.”

Riaz Haq said...

The Battle for the World’s Most Powerful Cyberweapon

https://www.nytimes.com/2022/01/28/magazine/nso-group-israel-spyware.html

In July 2017, Narendra Modi, who won office on a platform of Hindu nationalism, became the first Indian prime minister to visit Israel. For decades, India had maintained a policy of what it called “commitment to the Palestinian cause,” and relations with Israel were frosty. The Modi visit, however, was notably cordial, complete with a carefully staged moment of him and Prime Minister Netanyahu walking together barefoot on a local beach. They had reason for the warm feelings. Their countries had agreed on the sale of a package of sophisticated weapons and intelligence gear worth roughly $2 billion — with Pegasus and a missile system as the centerpieces. Months later, Netanyahu made a rare state visit to India. And in June 2019, India voted in support of Israel at the U.N.’s Economic and Social Council to deny observer status to a Palestinian human rights organization, a first for the nation.

Riaz Haq said...

India Bought Pegasus as Part of Larger $2 Billion Deal with Israel in 2017, Claims 'NYT' Report
The media report notes that Pegasus was the 'centrepiece' of a 2017 deal between India and Israel.


https://thewire.in/tech/india-bought-pegasus-israel-nyt-report



New Delhi: India bought controversial spyware tool Pegasus in 2017 as part of a larger arms deal with Israel, according to a new report published by The New York Times.

Access to the spyware, which is classified as military-grade software and produced by the NSO Group, was reportedly part of a “package of sophisticated weapons and intelligence gear worth roughly $2 billion” between India and Israel.

NYT’s report, which examines how Israel reaped diplomatic gains around the world from NSO’s Pegasus spyware, details how the US’s Federal Bureau of Investigation bought a version of Pegasus. It also sheds new light on how the software ended up being sold to Poland, India and Hungary.

“The combination of Israel’s search for influence and NSO’s drive for profits has also led to the powerful spying tool ending up in the hands of a new generation of nationalist leaders worldwide. Though the Israeli government’s oversight was meant to prevent the powerful spyware from being used in repressive ways, Pegasus has been sold to Poland, Hungary and India, despite those countries’ questionable records on human rights,” the report noted.

According to the NYT report, India’s access to Pegasus was sealed in 2017. The story claims that “Pegasus and a missile system” were the “centrepieces” of a broader defence package worth $2 billion.



“In July 2017, Narendra Modi, who won office on a platform of Hindu nationalism, became the first Indian prime minister to visit Israel…The Modi visit, however, was notably cordial, complete with a carefully staged moment of him and Prime Minister Netanyahu walking together barefoot on a local beach. They had reason for the warm feelings,” the report notes.

“Their countries had agreed on the sale of a package of sophisticated weapons and intelligence gear worth roughly $2 billion – with Pegasus and a missile system as the centerpieces. Months later, Netanyahu made a rare state visit to India.”



The report provides no further details on the specifics of the deal – or insight into which government department or agency procured it on behalf of the Indian government – but in April 2017, it was widely reported that New Delhi had signed a $2 billion (nearly Rs 12,880 crore) contract with Israel Aerospace Industries for supply of air defence missiles to the Indian Army.

In July 2021, a consortium of international media organisations including The Wire reported on the usage of Pegasus in countries across the world. In India, over 10 cases of Pegasus infection were found through forensic analysis conducted by Amnesty International’s Security Lab.



In 2019, messaging application WhatsApp sued the NSO Group over what it termed as an illegal breach of its software. At the time, the Facebook-owned firm confirmed that it had detected Pegasus targeting on the phones of several Indian activists and journalists.

The Indian government has been largely evasive in its replies with regard to whether it has purchased Pegasus or used it. In August 2021, the defence ministry clearly statedit had no business transaction with the NSO Group, leading to speculation as to whether an agency under the home affairs ministry was a customer.