{"id":16805,"date":"2023-08-22T17:11:03","date_gmt":"2023-08-22T17:11:03","guid":{"rendered":"https:\/\/cybercrime.rs\/?p=16805"},"modified":"2023-09-21T10:35:59","modified_gmt":"2023-09-21T10:35:59","slug":"what-is-the-nso-group-and-how-did-they-destroy-peoples-lives","status":"publish","type":"post","link":"https:\/\/cybercrime.rs\/en\/2023\/08\/22\/what-is-the-nso-group-and-how-did-they-destroy-peoples-lives\/","title":{"rendered":"What is the NSO group and how did they destroy people\u2019s lives?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"16805\" class=\"elementor elementor-16805\">\n\t\t\t\t\t\t\t\t\t<section class=\"has_ae_slider elementor-section elementor-top-section elementor-element elementor-element-79ad40db elementor-section-boxed elementor-section-height-default elementor-section-height-default ae-bg-gallery-type-default\" data-id=\"79ad40db\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2152f537 ae-bg-gallery-type-default\" data-id=\"2152f537\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4011d8a elementor-widget elementor-widget-spacer\" data-id=\"4011d8a\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.7.8 - 02-10-2022 *\/\n.elementor-column .elementor-spacer-inner{height:var(--spacer-size)}.e-container{--container-widget-width:100%}.e-container>.elementor-widget-spacer{width:var(--container-widget-width,var(--spacer-size));-ms-flex-item-align:stretch;align-self:stretch;-ms-flex-negative:0;flex-shrink:0}.e-container>.elementor-widget-spacer>.elementor-widget-container,.e-container>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer{height:100%}.e-container>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner{height:var(--container-widget-height,var(--spacer-size))}<\/style>\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d8e74ea elementor-widget elementor-widget-author-box\" data-id=\"d8e74ea\" data-element_type=\"widget\" data-widget_type=\"author-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<link rel=\"stylesheet\" href=\"https:\/\/cybercrime.rs\/wp-content\/plugins\/elementor-pro\/assets\/css\/widget-theme-elements.min.css\">\t\t<div class=\"elementor-author-box\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/antonio-gabor29\/\" target=\"_blank\" class=\"elementor-author-box__avatar\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cybercrime.rs\/wp-content\/uploads\/2023\/06\/antonio-195x300.png\" alt=\"Antonio Gabor\">\n\t\t\t\t<\/a>\n\t\t\t\n\t\t\t<div class=\"elementor-author-box__text\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/antonio-gabor29\/\" target=\"_blank\">\n\t\t\t\t\t\t<h4 class=\"elementor-author-box__name\">\n\t\t\t\t\t\t\tAntonio Gabor\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-author-box__bio\">\n\t\t\t\t\t\t<p>Certified Ethical Hacker and Network Security Engineer<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a83b828 elementor-widget elementor-widget-spacer\" data-id=\"a83b828\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd203fa elementor-widget elementor-widget-image\" data-id=\"dd203fa\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.7.8 - 02-10-2022 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/cybercrime.rs\/wp-content\/uploads\/2023\/08\/1-1024x576.jpg\" class=\"attachment-large size-large\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1666698 elementor-widget elementor-widget-text-editor\" data-id=\"1666698\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.7.8 - 02-10-2022 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>Photo: Unsplash.com<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-70be433 elementor-widget elementor-widget-spacer\" data-id=\"70be433\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ea7c7c elementor-widget elementor-widget-text-editor\" data-id=\"7ea7c7c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>In the dark, shadowy realm where technology and espionage converge, one name stands out like a harbinger of clandestine power: NSO Group. This enigmatic entity has earned a notorious reputation as the purveyor of the infamous Pegasus spyware\u2014a digital weapon so surreptitious and formidable that it makes the world of espionage quiver with trepidation. Like a stealthy phantom lurking in the virtual ether, Pegasus has infiltrated the lives of unsuspecting individuals and commandeered the very essence of privacy. As we delve into the murky depths of this cyber saga, the tale of NSO Group and its enigmatic spyware unfolds, revealing a high-stakes game of cat and mouse that sends shivers down the spines of both targets and spectators alike. Brace yourselves for an unsettling journey into the heart of digital darkness.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>If you do a quick Google NSO group will surely seem like a reputable organization worthy of its worldwide recognition.<br \/>NSO comes as an Israeli cybersecurity intelligence firm that is the most well-known for its proprietary spyware solution called Pegasus. If you didn\u2019t know before now you do.<br \/><br \/>According to its website, NSO creates technology that helps government agencies to prevent and investigate terrorism and to save lives around the world. That is their most prominent statement when you visit their website.<br \/><br \/>You must wonder how spyware helps government agencies. Well, it is an easy guess!<br \/>They spy on you.<br \/><br \/>If you are to believe Wikipedia this same software, pardon me, spyware is used to target human rights activists and journalists in numerous countries and is indirectly related to the murder of Saudi dissident Jamal Khashoggi by the Saudi government.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>You would agree in saying that is one fierce statement. Let us do some fact-checking before we make any quick judgments.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>If you head to Citizen Lab which is an independent research group, at any time you can find numerous research articles related to Pegasus and NSO group.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>From targeting pro-democratic Movements in Thailand to UK government officials infected with the bug, there is an overwhelming number of information related to the same.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>Nearly 200 Journalists from all corners of the Earth have compiled recommendations for fellow journalists who might be victims of high-performance surveillance software as it is called.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>They claim that NSO group has, as a known client, the following countries:<\/p>\n<!-- \/wp:paragraph --><!-- wp:list -->\n<ul><!-- wp:list-item -->\n<li>Mexico<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>India<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Morocco<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Togo<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Rwanda<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Indonesia<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Saudi Arabia<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>United Arab Emirates<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Kazakhstan<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Azerbaijan<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Hungary<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list --><!-- wp:paragraph -->\n<p>Kindly allow me a slight digression, In December 2020 Serbian Security Service or BIA has been linked to the use of controversial software that can locate every phone in the country in a matter of seconds called Circles. As it happens to be Circles is a part of NSO Group according to <a href=\"https:\/\/balkaninsight.com\/2020\/12\/04\/serbian-security-service-named-among-users-of-israeli-surveillance-software\/\"><span style=\"color: #ead181;\">BalkanInsight<\/span><\/a>. Surprise, Surprise\u2026<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>The technology behind Circles relies on a legacy suite of protocols called Signaling System 7 which was Developed in 1975 for the exchange of information and routing of phone calls between different telecommunication providers.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>Now back to Pegasus and the dangers of it.<br \/>I must admit that the article title is a bit of clickbait but please let me defend my stand.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>Bill Marczak plays a crucial role in exposing the NSO group selling the software for malicious purposes, revealing that they found evidence of Pegasus spyware on a mobile device belonging to Jamal Khashoggi\u2019s inner circle. Washington Post reports it was Jamals&#8217; fianc\u00e9e who had the spyware installed on her smartphone.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ffe365c elementor-widget elementor-widget-spacer\" data-id=\"ffe365c\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9c3b9bf elementor-widget elementor-widget-image\" data-id=\"9c3b9bf\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"679\" src=\"https:\/\/cybercrime.rs\/wp-content\/uploads\/2023\/08\/2-1024x679.png\" class=\"attachment-large size-large\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ee4905 elementor-widget elementor-widget-text-editor\" data-id=\"0ee4905\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Hanan Elatr, the widow of murdered Saudi journalist Jamal Khashoggi, during an interview this month. (Jon Gerberg\/The Washington Post)<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-887c73a elementor-widget elementor-widget-spacer\" data-id=\"887c73a\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84133ad elementor-widget elementor-widget-text-editor\" data-id=\"84133ad\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Hanan Elatr was an Emirates flight attendant at the time. Hanan was captured by UAE operators and all her mobile devices were taken away for a short period. Then she went on to be questioned about Jamal and released before his assassination in Istanbul, Turkey on the 2nd October of 2018.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-374f7be elementor-widget elementor-widget-spacer\" data-id=\"374f7be\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-240bd3c elementor-widget elementor-widget-image\" data-id=\"240bd3c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"663\" height=\"417\" src=\"https:\/\/cybercrime.rs\/wp-content\/uploads\/2023\/08\/3.png\" class=\"attachment-large size-large\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-178d1cf elementor-widget elementor-widget-spacer\" data-id=\"178d1cf\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e924f3 elementor-widget elementor-widget-text-editor\" data-id=\"7e924f3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>72 seconds that would destroy a family forever.<\/p>\n<p>It pains me to believe that technology can be used for such heinous crimes.<\/p>\n<p>After the said event numerous investigations took place and massive lawsuits that would take on a war between Tech Giants such as WhatsApp (2019) and Apple (2021) and the NSO group.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b689c8e elementor-widget elementor-widget-spacer\" data-id=\"b689c8e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-906c503 elementor-widget elementor-widget-heading\" data-id=\"906c503\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.7.8 - 02-10-2022 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">What-is-pegasus-spyware-and-how-does-it-hack-phones <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3169e5d elementor-widget elementor-widget-spacer\" data-id=\"3169e5d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9bc0d30 elementor-widget elementor-widget-text-editor\" data-id=\"9bc0d30\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Above is the title of the article posted by The Guardian in 2021.<\/p>\n<p>It claims that Pegasus can infect target mobile devices by exploiting Zero Click attacks!<br \/>Yes, you\u2019ve heard it right, these days you don\u2019t even need to click, it just infects you straight away. This is done in such a way that you don\u2019t even know it&#8217;s there, spying on you 24\/7. It copies messages, harvests your photos and data, and can even record phone calls.<br \/>Well, surely your antivirus would pick it up?!<\/p>\n<p>Unfortunately, traditional antiviruses would not detect the presence of spyware as it lurks in the temporary memory of the device, however, there is a bit of light at the end of the tunnel as they say.<\/p>\n<p>Amnesty International has developed a methodology to detect Pegasus spyware on smartphones and is providing its resources on the GitHub<span style=\"color: #ead181;\"> <a style=\"color: #ead181;\" href=\"https:\/\/github.com\/mvt-project\/mvt\">page<\/a><\/span>.<\/p>\n<p>Using their Mobile Verification Toolkit (MVT) you can learn how to detect this pesky spyware.<\/p>\n<p>So, if you do happen to be infected, there are a couple of things that can be done according to <span style=\"color: #ead181;\"><a style=\"color: #ead181;\" href=\"https:\/\/blog.rsisecurity.com\/how-to-detect-pegasus-spyware\/\">RSI<\/a>.<\/span><\/p>\n<ol>\n<li>Try restarting your smartphone, as this would put a temporary stop to Pegasus.<\/li>\n<li>Reset the smartphone to factory settings, which MAY remove the spyware.<\/li>\n<li>Update the smartphone system software and applications to the most current version.<\/li>\n<li>Remove any unknown device connections to social media platforms.<\/li>\n<\/ol>\n<p>\u00a0<\/p>\n<p>To contrast the above solution, Reporters Without Borders (RSF) are going as far as suggesting getting rid of the infected device altogether.<\/p>\n<p>Buying a new smartphone might be sometimes your only option. If you are being targeted, buy cheap burner phones and change them often, as this might save your life.<\/p>\n<p>In August of 2022, there was a leak and finally, we could see some actual proof of the NSO command centre and its graphical user Interface:<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-721ace9 elementor-widget elementor-widget-spacer\" data-id=\"721ace9\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab2ebec elementor-widget elementor-widget-image\" data-id=\"ab2ebec\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"609\" src=\"https:\/\/cybercrime.rs\/wp-content\/uploads\/2023\/08\/4-1024x609.png\" class=\"attachment-large size-large\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-beee3d1 elementor-widget elementor-widget-text-editor\" data-id=\"beee3d1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Source: <a href=\"https:\/\/www.haaretz.com\/israel-news\/2022-08-05\/ty-article\/.premium\/israel-polices-version-of-pegasus-spyware-revealed\/00000182-6911-d2f5-a3e6-ed1db74e0000\">haaretz.com<\/a><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2e1d08 elementor-widget elementor-widget-spacer\" data-id=\"d2e1d08\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36ccf69 elementor-widget elementor-widget-text-editor\" data-id=\"36ccf69\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>From the above article you can observe that Pegasus possess a full-fledged suite of functionality, from recorded phone calls, messages, camera grabs and others that were allegedly used in Israel and to whom the oversight of NSO group does not apply as they have a prototype solution that is the most permissive and open-ended version of Pegasus at the time.\u00a0<\/p>\n<p>This is supposedly an outdated version of the user interface; however, you can get the sense of how powerful this can be in the wrong hands.<\/p>\n<p>Israeli Police used the opportunity to defend its position that the software is used only in accordance with their law and to prevent and solve serious crimes.<\/p>\n<p>To quote them:<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36b2e4d elementor-blockquote--skin-border elementor-blockquote--button-color-official elementor-widget elementor-widget-blockquote\" data-id=\"36b2e4d\" data-element_type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor-pro - v3.7.7 - 20-09-2022 *\/\n@charset \"UTF-8\";.entry-content blockquote.elementor-blockquote:not(.alignright):not(.alignleft),.entry-summary blockquote.elementor-blockquote{margin-right:0;margin-left:0}.elementor-widget-blockquote blockquote{margin:0;padding:0;outline:0;font-size:100%;vertical-align:baseline;background:transparent;quotes:none;border:0;font-style:normal;color:#55595c}.elementor-widget-blockquote blockquote:after,.elementor-widget-blockquote blockquote:before,.elementor-widget-blockquote blockquote cite:after,.elementor-widget-blockquote blockquote cite:before,.elementor-widget-blockquote blockquote footer:after,.elementor-widget-blockquote blockquote footer:before{content:\"\";content:none}.elementor-blockquote{-webkit-transition:.3s;-o-transition:.3s;transition:.3s}.elementor-blockquote__author,.elementor-blockquote__content{margin-bottom:0;font-style:normal}.elementor-blockquote__author{font-weight:700}.elementor-blockquote footer{margin-top:12px;display:-webkit-box;display:-ms-flexbox;display:flex;-webkit-box-pack:justify;-ms-flex-pack:justify;justify-content:space-between}.elementor-blockquote__tweet-button{display:-webkit-box;display:-ms-flexbox;display:flex;-webkit-transition:.3s;-o-transition:.3s;transition:.3s;color:#1da1f2;-ms-flex-item-align:end;align-self:flex-end;line-height:1;position:relative;width:-webkit-max-content;width:-moz-max-content;width:max-content}.elementor-blockquote__tweet-button:hover{color:#0967a0}.elementor-blockquote__tweet-button span{font-weight:600}.elementor-blockquote__tweet-button i,.elementor-blockquote__tweet-button span{vertical-align:middle}.elementor-blockquote__tweet-button i+span,.elementor-blockquote__tweet-button svg+span{margin-left:.5em}.elementor-blockquote__tweet-button svg{fill:#1da1f2;height:1em;width:1em}.elementor-blockquote__tweet-label{white-space:pre-wrap}.elementor-blockquote--button-skin-bubble .elementor-blockquote__tweet-button,.elementor-blockquote--button-skin-classic .elementor-blockquote__tweet-button{padding:.7em 1.2em;border-radius:100em;background-color:#1da1f2;color:#fff;font-size:15px}.elementor-blockquote--button-skin-bubble .elementor-blockquote__tweet-button:hover,.elementor-blockquote--button-skin-classic .elementor-blockquote__tweet-button:hover{background-color:#0967a0;color:#fff}.elementor-blockquote--button-skin-bubble .elementor-blockquote__tweet-button:hover:before,.elementor-blockquote--button-skin-classic .elementor-blockquote__tweet-button:hover:before{border-right-color:#0967a0}.elementor-blockquote--button-skin-bubble .elementor-blockquote__tweet-button svg,.elementor-blockquote--button-skin-classic .elementor-blockquote__tweet-button svg{fill:#fff;height:1em;width:1em}.elementor-blockquote--button-skin-bubble.elementor-blockquote--button-view-icon .elementor-blockquote__tweet-button,.elementor-blockquote--button-skin-classic.elementor-blockquote--button-view-icon .elementor-blockquote__tweet-button{padding:0;width:2em;height:2em}.elementor-blockquote--button-skin-bubble.elementor-blockquote--button-view-icon .elementor-blockquote__tweet-button i,.elementor-blockquote--button-skin-classic.elementor-blockquote--button-view-icon .elementor-blockquote__tweet-button i{position:absolute;left:50%;top:50%;-webkit-transform:translate(-50%,-50%);-ms-transform:translate(-50%,-50%);transform:translate(-50%,-50%)}.elementor-blockquote--button-skin-bubble .elementor-blockquote__tweet-button:before{content:\"\";border:.5em solid transparent;border-right-color:#1da1f2;position:absolute;left:-.8em;top:50%;-webkit-transform:translateY(-50%) scaleY(.65);-ms-transform:translateY(-50%) scaleY(.65);transform:translateY(-50%) scaleY(.65);-webkit-transition:.3s;-o-transition:.3s;transition:.3s}.elementor-blockquote--button-skin-bubble.elementor-blockquote--align-left .elementor-blockquote__tweet-button:before{right:auto;left:-.8em;border-right-color:#1da1f2;border-left-color:transparent}.elementor-blockquote--button-skin-bubble.elementor-blockquote--align-left .elementor-blockquote__tweet-button:hover:before{border-right-color:#0967a0}.elementor-blockquote--button-skin-bubble.elementor-blockquote--align-right .elementor-blockquote__tweet-button:before{left:auto;right:-.8em;border-right-color:transparent;border-left-color:#1da1f2}.elementor-blockquote--button-skin-bubble.elementor-blockquote--align-right .elementor-blockquote__tweet-button:hover:before{border-left-color:#0967a0}.elementor-blockquote--skin-boxed .elementor-blockquote{background-color:#e6e9ec;padding:30px}.elementor-blockquote--skin-border .elementor-blockquote{border-color:#e6e9ec;border-left:7px #e6e9ec;border-style:solid;padding-left:20px}.elementor-blockquote--skin-quotation .elementor-blockquote:before{content:\"\u201c\";font-size:100px;color:#e6e9ec;font-family:Times New Roman,Times,serif;font-weight:900;line-height:1;display:block;height:.6em}.elementor-blockquote--skin-quotation .elementor-blockquote__content{margin-top:15px}.elementor-blockquote--align-left .elementor-blockquote__content{text-align:left}.elementor-blockquote--align-left .elementor-blockquote footer{-webkit-box-orient:horizontal;-webkit-box-direction:normal;-ms-flex-direction:row;flex-direction:row}.elementor-blockquote--align-right .elementor-blockquote__content{text-align:right}.elementor-blockquote--align-right .elementor-blockquote footer{-webkit-box-orient:horizontal;-webkit-box-direction:reverse;-ms-flex-direction:row-reverse;flex-direction:row-reverse}.elementor-blockquote--align-center .elementor-blockquote{text-align:center}.elementor-blockquote--align-center .elementor-blockquote__author,.elementor-blockquote--align-center .elementor-blockquote footer{display:block}.elementor-blockquote--align-center .elementor-blockquote__tweet-button{margin-right:auto;margin-left:auto}<\/style>\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\t\u201cThe grave damage caused by reports of this sort has harmed and is still harming severely the ability of the police to act against grave crimes, prevent violations of the law, thwart them and bring the transgressors to court. To this end and to minimize insofar as possible the damage in these tools, the court has ordered immunity of the methods and the means. The gaps that emerge in the report will be addressed fully by a team the Police Commissioner has ordered to be established, headed by the deputy head of the Investigation and Intelligence Branch for the purpose of implementing the recommendations of the report. Moreover, the team is acting to carry out the required adjustments for the restoration of the use of the technological capabilities for combatting crime and terror, in parallel to the required equipping with additional technological tools for the benefit of the security of Israeli citizens.\u201d\t\t\t<\/p>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7ad400 elementor-widget elementor-widget-spacer\" data-id=\"b7ad400\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-975b666 elementor-widget elementor-widget-text-editor\" data-id=\"975b666\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Restoration of the use of technological capabilities. Wonder what that means\u2026<\/p>\n<p>I will now take a deep breath and allow you some space and time to draw your conclusions.<\/p>\n<p>\u00a0<\/p>\n<p>As always,<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f182d5c elementor-widget elementor-widget-spacer\" data-id=\"f182d5c\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b00597a elementor-blockquote--skin-border elementor-blockquote--button-color-official elementor-widget elementor-widget-blockquote\" data-id=\"b00597a\" data-element_type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\tStay vigilant and stay safe!\t\t\t<\/p>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>In the dark, shadowy realm where technology and espionage converge, one name stands out like a harbinger of clandestine power: NSO Group<\/p>","protected":false},"author":1,"featured_media":9975,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"site-sidebar-layout":"default","site-content-layout":"default","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":""},"categories":[36],"tags":[],"class_list":["post-16805","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/posts\/16805","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/comments?post=16805"}],"version-history":[{"count":12,"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/posts\/16805\/revisions"}],"predecessor-version":[{"id":17172,"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/posts\/16805\/revisions\/17172"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/media\/9975"}],"wp:attachment":[{"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/media?parent=16805"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/categories?post=16805"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/tags?post=16805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}