{"id":189430,"date":"2021-07-26T12:00:46","date_gmt":"2021-07-26T11:00:46","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=189430"},"modified":"2021-07-21T06:23:36","modified_gmt":"2021-07-21T05:23:36","slug":"the-pegasus-spyware-story-is-a-reminder-of-why-were-so-attracted-to-conspiracy-theories-these-days","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2021\/07\/the-pegasus-spyware-story-is-a-reminder-of-why-were-so-attracted-to-conspiracy-theories-these-days\/","title":{"rendered":"The Pegasus Spyware Story Is a Reminder of Why We&#8217;re So Attracted to Conspiracy Theories These Days"},"content":{"rendered":"<div class=\"content-dek standard-dek\">\n<blockquote><p><em>As a new report demonstrates, we are all relying on technologies that very few of us truly understand.<\/em><\/p><\/blockquote>\n<div id=\"attachment_189431\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2021\/07\/spyware-1626702411.jpeg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-189431\" class=\"wp-image-189431 size-medium\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2021\/07\/spyware-1626702411-300x200.jpeg\" alt=\"\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2021\/07\/spyware-1626702411-300x200.jpeg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2021\/07\/spyware-1626702411-768x512.jpeg 768w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2021\/07\/spyware-1626702411.jpeg 980w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-189431\" class=\"wp-caption-text\">Michael Bocchieri Getty Images<\/p><\/div>\n<div class=\"content-lede-image standard-lede-image\">\n<div class=\"content-lede-image-wrap custom-lede-crop-mobile-only aspect-ratio-freeform\"><picture class=\"\"><source srcset=\"https:\/\/hips.hearstapps.com\/hmg-prod.s3.amazonaws.com\/images\/spyware-1626702411.jpeg?crop=1.00xw:1.00xh;0,0&amp;resize=980:*\" media=\"(min-width: 61.25rem)\" data-srcset=\"https:\/\/hips.hearstapps.com\/hmg-prod.s3.amazonaws.com\/images\/spyware-1626702411.jpeg?crop=1.00xw:1.00xh;0,0&amp;resize=980:*\" \/><source srcset=\"https:\/\/hips.hearstapps.com\/hmg-prod.s3.amazonaws.com\/images\/spyware-1626702411.jpeg?crop=1.00xw:1.00xh;0,0&amp;resize=768:*\" media=\"(min-width: 48rem)\" data-srcset=\"https:\/\/hips.hearstapps.com\/hmg-prod.s3.amazonaws.com\/images\/spyware-1626702411.jpeg?crop=1.00xw:1.00xh;0,0&amp;resize=768:*\" \/><source srcset=\"https:\/\/hips.hearstapps.com\/hmg-prod.s3.amazonaws.com\/images\/spyware-1626702411.jpeg?crop=1.00xw:1.00xh;0,0&amp;resize=640:*\" media=\"(min-width: 40.625rem)\" data-srcset=\"https:\/\/hips.hearstapps.com\/hmg-prod.s3.amazonaws.com\/images\/spyware-1626702411.jpeg?crop=1.00xw:1.00xh;0,0&amp;resize=640:*\" \/><source srcset=\"https:\/\/hips.hearstapps.com\/hmg-prod.s3.amazonaws.com\/images\/spyware-1626702411.jpeg?crop=0.668xw:1.00xh;0.167xw,0&amp;resize=640:*\" media=\"(min-width: 30rem)\" data-srcset=\"https:\/\/hips.hearstapps.com\/hmg-prod.s3.amazonaws.com\/images\/spyware-1626702411.jpeg?crop=0.668xw:1.00xh;0.167xw,0&amp;resize=640:*\" \/><source srcset=\"https:\/\/hips.hearstapps.com\/hmg-prod.s3.amazonaws.com\/images\/spyware-1626702411.jpeg?crop=0.668xw:1.00xh;0.167xw,0&amp;resize=640:*\" media=\"(min-width: 20rem)\" data-srcset=\"https:\/\/hips.hearstapps.com\/hmg-prod.s3.amazonaws.com\/images\/spyware-1626702411.jpeg?crop=0.668xw:1.00xh;0.167xw,0&amp;resize=640:*\" \/><\/picture><\/div>\n<\/div>\n<div class=\"article-body-content standard-body-content\">\n<p class=\"body-dropcap\"><em>19 Jul 2021 &#8211;<\/em> This story is so wide and sweeping<u>,<\/u> not to mention dangerous and generally fcked in the head, that it\u2019s hard to find a hand-hold on it. It has its hooks into so many issues, large and small, that its true boundaries are beyond our ability to see them. From the <em><a href=\"https:\/\/www.washingtonpost.com\/investigations\/interactive\/2021\/nso-spyware-pegasus-cellphones\/\" class=\"body-link\"  target=\"_blank\" rel=\"noopener\" data-vars-ga-outbound-link=\"https:\/\/www.washingtonpost.com\/investigations\/interactive\/2021\/nso-spyware-pegasus-cellphones\/\">Washington Post<\/a>, <\/em>and 16 of its partners:<\/p>\n<blockquote class=\"body-blockquote\"><p>The phones appeared on a list of more than 50,000 numbers that are concentrated in countries known to engage in surveillance of their citizens and also known to have been clients of the Israeli firm, NSO Group, a worldwide leader in the growing and largely unregulated private spyware industry, the investigation found. The list does not identify who put the numbers on it, or why, and it is unknown how many of the phones were targeted or surveilled. But forensic analysis of the 37 smartphones shows that many display a tight correlation between time stamps associated with a number on the list and the initiation of surveillance, in some cases as brief as a few seconds.<\/p><\/blockquote>\n<blockquote class=\"body-blockquote\"><p>The numbers on the list are unattributed, but reporters were able to identify more than 1,000 people spanning more than 50 countries through research and interviews on four continents: several Arab royal family members, at least 65 business executives, 85 human rights activists, 189 journalists, and more than 600 politicians and government officials \u2014 including cabinet ministers, diplomats, and military and security officers. The numbers of several heads of state and prime ministers also appeared on the list.<\/p><\/blockquote>\n<p class=\"body-text\">Can we stop being children and wondering why so many people are so attracted to conspiracy theories now? Can we stop pretending to be wandering innocents in our brave new world? We are all relying on technologies that very few of us truly understand. This leads to a utilitarian life that doesn\u2019t concern itself with ramifications. How many people with cellphones truly understand how they work? Most of us are as ignorant of what he technology is capable of as an Aztec would be. Reading this story is to slam into those ramifications headlong and blind.<\/p>\n<blockquote class=\"body-blockquote\"><p>Beyond the personal intrusions made possible by smartphone surveillance, the widespread use of spyware has emerged as a leading threat to democracies worldwide, critics say. Journalists under surveillance cannot safely gather sensitive news without endangering themselves and their sources. Opposition politicians cannot plot their campaign strategies without those in power anticipating their moves. Human rights workers cannot work with vulnerable people \u2014 some of whom are victims of their own governments \u2014 without exposing them to renewed abuse.<\/p><\/blockquote>\n<blockquote class=\"body-blockquote\"><p>For example, Amnesty\u2019s forensics found evidence that <a href=\"https:\/\/urldefense.com\/v3\/__https:\/www.washingtonpost.com\/investigations\/interactive\/2021\/jamal-khashoggi-wife-fiancee-cellphone-hack\/__;!!Ivohdkk!yA0rMpqDHVrSdxdTN4QsxVhwjCFeW_1JM-UxLIXVPnK4HcbrEsMvbcYBTLff0mj1%24\" class=\"body-link\"  target=\"_blank\" rel=\"noopener\" data-vars-ga-outbound-link=\"https:\/\/urldefense.com\/v3\/__https:\/www.washingtonpost.com\/investigations\/interactive\/2021\/jamal-khashoggi-wife-fiancee-cellphone-hack\/__;!!Ivohdkk!yA0rMpqDHVrSdxdTN4QsxVhwjCFeW_1JM-UxLIXVPnK4HcbrEsMvbcYBTLff0mj1$\">Pegasus was targeted at the two women closest to Saudi columnist Khashoggi<\/a>, who wrote for The Post\u2019s Opinions section. The phone of his fiancee, Hatice Cengiz, was successfully infected during the days after his murder in Turkey on Oct. 2, 2018, according to a forensic analysis by Amnesty\u2019s Security Lab. Also on the list were the numbers of two Turkish officials involved in investigating his dismemberment by a Saudi hit team. Khashoggi also had a wife, Hanan Elatr, whose phone was targeted by someone using Pegasus in the months before his killing. Amnesty was unable to determine whether the hack was successful.<\/p><\/blockquote>\n<p class=\"body-text\">NSO Group, the Israeli firm that developed the Pegasus spyware, is borrowing a corporate strategy with which the gun manufacturers have made us sadly familiar\u2014namely, <em>Hey, we only make the stuff. We can\u2019t be responsible for how many people get shot\u2026er\u2026spied upon. Which is not to say anyone is, and your data is very flawed and have you met our 900 lawyers? Your grandchildren will be taking depositions on this one.<\/em><\/p>\n<blockquote class=\"body-blockquote\"><p>In response to detailed questions from the consortium before publication, <a href=\"https:\/\/urldefense.com\/v3\/__https:\/www.washingtonpost.com\/investigations\/2021\/07\/18\/nso-group-response-pegasus-project\/__;!!Ivohdkk!yA0rMpqDHVrSdxdTN4QsxVhwjCFeW_1JM-UxLIXVPnK4HcbrEsMvbcYBTB1xIePt%24\" class=\"body-link\"  target=\"_blank\" rel=\"noopener\" data-vars-ga-outbound-link=\"https:\/\/urldefense.com\/v3\/__https:\/www.washingtonpost.com\/investigations\/2021\/07\/18\/nso-group-response-pegasus-project\/__;!!Ivohdkk!yA0rMpqDHVrSdxdTN4QsxVhwjCFeW_1JM-UxLIXVPnK4HcbrEsMvbcYBTB1xIePt$\">NSO said in a statement<\/a> that it did not operate the spyware it licensed to clients and did not have regular access to the data they gather. The company also said its technologies have helped prevent attacks and bombings and broken up rings that trafficked in drugs, sex and children. \u201cSimply put, NSO Group is on a life-saving mission, and the company will faithfully execute this mission undeterred, despite any and all continued attempts to discredit it on false grounds,\u201d NSO said. \u201cYour sources have supplied you with information that has no factual basis, as evidenced by the lack of supporting documentation for many of the claims.\u201d<\/p><\/blockquote>\n<blockquote class=\"body-blockquote\"><p>The company denied that its technology was used against Khashoggi, or his relatives or associates.<\/p><\/blockquote>\n<p class=\"body-text\">Let\u2019s hear from some satisfied customers.<\/p>\n<blockquote class=\"body-blockquote\"><p>Hungarian Prime Minister Viktor Orban\u2019s office said any surveillance carried out by that nation is done in accordance with the law. \u201cIn Hungary, state bodies authorized to use covert instruments are regularly monitored by governmental and non-governmental institutions,\u201d the office said. \u201cHave you asked the same questions of the governments of the United States of America, the United Kingdom, Germany or France?\u201d<\/p><\/blockquote>\n<p class=\"body-text\">And, also:<\/p>\n<blockquote class=\"body-blockquote\"><p>Moroccan authorities responded: \u201cIt should be recalled that the unfounded allegations previously published by Amnesty International and conveyed by Forbidden Stories have already been the subject of an official response from the Moroccan authorities, who have categorically rejected these allegations.\u201d<\/p><\/blockquote>\n<blockquote class=\"body-blockquote\"><p>Vincent Biruta, Rwanda\u2019s foreign affairs minister, also denied the use of Pegasus. \u201cRwanda does not use this software system, as previously confirmed in November 2019, and does not possess this technical capability in any form,\u201d Biruta said. \u201cThese false accusations are part of an ongoing campaign to cause tensions between Rwanda and other countries, and to sow disinformation about Rwanda domestically and internationally.\u201d<\/p><\/blockquote>\n<p class=\"body-text\">That\u2019s some fancy footwork right there, but it\u2019s nothing compared to the terpsichorean magic coming from NSO\u2019s lawyers while discussing the murder at a carwash of a Mexican journalist, a crime which has raised suspicion that the Pegasus software was used in tracking him down.<\/p>\n<blockquote class=\"body-blockquote\"><p>\u201cEven if Forbidden Stories were correct that an NSO Group client in Mexico targeted the journalist\u2019s phone number in February 2017, that does not mean that the NSO Group client or data collected by NSO Group software were in any way connected to the journalist\u2019s murder the following month,\u201d Clare, NSO\u2019s lawyer, wrote in his letter to Forbidden Stories. \u201cCorrelation does not equal causation, and the gunmen who murdered the journalist could have learned of his location at a public carwash through any number of means not related to NSO Group, its technologies, or its clients.\u201d<\/p><\/blockquote>\n<p class=\"body-text\">There\u2019s no going back on the technology, but there is an adherence to first principles that can be used to mitigate its ramifications in our daily lives. But that requires that, as citizens of a self-governing republic, we understand the extent of the threat, and we reacquaint ourselves with the tools provided us at the country\u2019s founding, and use them as best we can to establish boundaries for the technology in our lives and in our politics. Old tools can still be effective against new technologies. Take a hammer to your cellphone, if you don\u2019t believe me.<\/p>\n<p>_________________________________________<\/p>\n<p style=\"padding-left: 40px;\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2021\/07\/Charles-P-Pierce.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-189432 size-full\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2021\/07\/Charles-P-Pierce-e1626844826954.jpg\" alt=\"\" width=\"100\" height=\"100\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p style=\"padding-left: 40px;\"><em>Charles P Pierce is the author of four books, most recently <\/em>Idiot America<em>, and has been a working journalist since 1976. He lives near Boston with his wife but no longer his three children.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><a target=\"_blank\" href=\"https:\/\/www.esquire.com\/news-politics\/politics\/a37065398\/private-spyware-israeli-firm\/\" >Go to Original &#8211; esquire.com<\/a><\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>19 Jul 2021 &#8211; As a new report demonstrates, we are all relying on technologies that very few of us truly understand.<\/p>\n","protected":false},"author":4,"featured_media":189432,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[197],"tags":[910,1082,958,2607,1017,125,88,378,234,2608,2606,1220,1277,1109,911],"class_list":["post-189430","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-special-feature","tag-big-brother","tag-cellphones","tag-control","tag-forbidden-stories","tag-freedom-of-information","tag-freedom-of-the-press","tag-israel","tag-journalism","tag-media","tag-nso","tag-pegasus-project","tag-privacy","tag-privacy-rights","tag-spying","tag-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/189430","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=189430"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/189430\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media\/189432"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=189430"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=189430"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=189430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}