Skip to main content

tv   [untitled]    June 17, 2021 4:00am-4:31am +03

4:00 am
o l g 0. great, well, i investigating the use and abuse of power across the globe for now to sierra. ah, robinson and joe had the top stories on al jazeera, the us president, and his russian counterpart flooded me pushing of how their 1st face to face talks . and joe biden took office. they agreed to resume talks and arms control and cybersecurity. they also promise to return on baset as to each other's capital is after they were withdrawn earlier this year, but disagreements on human rights and ukraine remain. i told president, put my agenda is not against russia, or anyone else. it's for the american people. i made it clear that we will not
4:01 am
tolerate attempts to violate our democratic sovereignty or to stabilize our democratic elections and we would respond. the bottom line is i told president putting that we need to have some basic rules of the road that we can all abide by the national fisher price. there has been no hospitality on the contrary, our meeting to placing a constructive spirit. indeed, we have varied assessment on a number of issues, but both sides express the intention to understand each other. and the common grounds. talks were quite constructed. hong kong police have arrested 5 executives of the apple daily newspaper and an early morning raid. among them is the editor in chief of the pro democracy tabloid. hong kong media says they've been detained under the national security law imposed on the territory by china. it's the 2nd time the newspapers being targeted. last august. police arrested its founder, jimmy media mobile jimmy life is since been sentenced to 20 months in jail. the 1st
4:02 am
crew to be sent to china is news space stations due to take off in about 20 minutes time. these a live pictures from jake conn, launch center, where the rock is set to take off. the chance to 12 mission is going to take the 3 men for a 3 month stay in the floating land. 11 more emissions are plant over the next year and a half to complete the station, which is coach and gong, one translation of that is having the palace where katrina hughes, joining us live now from beijing. one of the astronauts hoping to achieve well, they'll be performing a variety of tasks up there, a lot of maintenance. they're performing, some space walks, some time scientific experiments. this is the 1st time the astronauts will be sent to this particular space station and they'll be living aboard the chen, her, which is a cold model, which is itself only sent up in april. now that space is not very big. it's about 15 meters long by 4 meters in diameter, and they'll be up there for about 3 months. but in the long term,
4:03 am
it's hoped that astronauts will spend up to 6 months in that space station. now this is significant for china. it's quite a groundbreaking event the 1st time that john has said astronauts into space for 5 years. it's the longest time that china will have a space mission. continuing that the last time it was only about 30 days. so 3 months is quite significant. and this is, as you mentioned, just the 3rd of 11 separate missions that will be required to complete this space station, which is expected to be done by 2022. so a lot of anticipation here. and also this is really being seen as a huge national achievement in china, especially ahead of the communist parties. 100 year anniversary coming up at the beginning of july. so it's very important that everything goes smoothly during the launch. katrina, thanks very much as about just over 1000 minutes to that. take off a car bomb inside of colombia military base has injured it's 36 people. 3 of them critically, the defense. madison says the country's largest armed group,
4:04 am
the national liberation army is likely to be behind the attack and the times in the border with venezuela. several criminal groups have been fighting over drug traffic in the u. s. will soon have a new federal holiday commemorating the end of slavery in the nation. congress has voted to make june teams or june 19th national holiday. it marks when the last enslaved african americans learned that were free will delay. fans has eased several covered 19 restrictions after a drop in the infection rate. there is no longer mandatory to wear masks, doors and a nightly curfew. that's been in place for 8 months. will also be lifted from sunday. all the half of funds is i don't population of received at least one vaccine dose. those are the headlines. the news continues here on odyssey the after all, just the world. goodbye. ah
4:05 am
ah . the in mid 2020 a mobile phone belonging to odyssey or arabic, was hacked over the next few months, working with an organization called the citizen lab. the team for mosier unpicked an extraordinary story of some of the most advanced spyware in the world. and how it's used, not least on al jazeera journalists,
4:06 am
ah, with a click of a button. you can bring down nations to their news very rapidly if you so desire. and if you're willing to take them, because every system can be a israel manufacturers pegasus. some of the most advanced spyware in the world. it 1st came to attention in 2016. since then, various governments have bought the spyware for their own use. questions today are, how does pegasus work? who is using it, and who it's victims? well, there's very little in the actual details behind the pegasus spyware. the code, the malicious code that was used, that's very, very difficult to find out more about thought was a defer leslie in living again,
4:07 am
i'm out of food because of these home without having to live a month. and then i can use another mobile, i can answer them from the mobile, how they only know about her been cut off and cut the cell for the 30 here on the amendment. i've had these, how long does your arabic investigative report time out on? this followed a complicated technical process to track this infamous spyware. over many months, he had one of his own phones monitored constantly with the help of citizen lad, an international research laboratory based in canada, that specializes in data surveillance. the citizen la was the 1st to expose the existence of israel's pegasus spyware. in 2016, they disclose details of what they called on exploit infrastructure. connected to a phone belonging to an activist from the united arab emirates. the infiltration,
4:08 am
the hack, led to the arrest of a madman saw remains in prison to this day. the new hacking technique was called as 0 day exploits, and pegasus was, the spyware used to infiltrate months whose phone bill must act from citizen lab, has worked for several years to expose pegasus. so what happened in 2016 started with this man. madeline sort the activist in the u. e. and he noticed some suspicious messages on his phone that he was getting the same as he thought they were weird because they came from unknown numbers and they were promising information about human rights. so he forwarded them to me at citizen lab. we had known each other for a while. i got a burner phone, not obviously my, my real phone burner phone and clicked on the links. and while i was doing this, i was recording the internet traffic and recording the activity on the phone and
4:09 am
what was installed. when i clicked the link was a very sophisticated, spyware payload. and the interesting question was, but who could be behind us? who might have programmed the spyware who might have sold it, who might be using it, and the process to figure that out is called attribution. so what we did in the report is we noticed that when you clicked on the link a 2nd time, it wouldn't cause the infection is only limited to the 1st click. and the 2nd click would send you to a decoy website to try and make it look innocuous or benign. so we clicked on the 2nd time we got redirected to google, but it wasn't just any redirect to google. it was a very specific piece of code that someone had sat down and written on their computer. so we figured, well, maybe this is part of this spyware somehow. and if we can scan the internet, we can find other servers that had the same weird redirect to google. so this is
4:10 am
exactly what we did. we use the popular open source v map program. we scan the internet and found 149 other servers, and this is where it gets interesting because this 2nd redirect to google was also returned by 3 servers. and s o q a dot com q a n q a dot com, and mail one dot and s o group dot com and the name here and a so group we found in a brochure in these really government's website. they had a brochure for this company, and a so group, which is based in israel and sells a product called pegasus, which is spyware, for mobile phones. in the case of pegasus citizen lab did very good work and was very, very inclusively able to say that pegasus had been written by and over. but it's actually stream we rare that we're able to get that sort of concrete attribution and say this malware was written by this company. the n s o group is
4:11 am
a technology company based in hatch. leah in israel founded in 2010. it employs over 500 cybersecurity experts, pegasus spyware, is viewed as its most important product use. israel is one of the most sophisticated cyber actors in the world. and i think that a lot of this is because the israeli army is training people to do this sort of offensive, packing for you know, in their military service. more of them allow me and if he how he should get home, how do you men wish that someone telephone within the huff a way the way is is done the list of what all alaska eligibility. yeah. element command will be the captain. well, hold or head, he should get more about lira harbor was all at the thought was a little slightly
4:12 am
r n a say, which is called unit a 200. it's pretty big. we allow them to create companies. and we, in order for the companies to develop, they need to make what they need to make money. they need to make money. thomas on this house spoke to william benny, who for over 30 years, worked with a u. s. national security agency, a former cryptography, and later whistle block benny was the n s a technical leader of intelligence. benny has a high level understanding of the agencies data collection systems. what that means is, any i phone or any phone in the world, 1st connecting to the network, when you want to use it immediately known worldwide. i mean, all the switches have you and capture your ip and all, and your phone and mac numbers and all that. that's how they bill you. so that also
4:13 am
is the known by the network and the implants, computer network exploitation implants, they have around the world over this was in 2004 or 2010, somewhere in that range. they had over 50000 implants and all these switches, servers and networks worldwide. i mean that means they own the entire network. so that if you, your phone comes on the air, then they can, they can know who you are and where you are. when you citizen loud, exposed to n. s. so, and it's pegasus spyware. in 2016, it attracted worldwide control oversee and as so, claims its mission is to develop technology for government agencies to quote, detect and prevent terrorism and crime. however, the nature of its targets, the individuals whose phones happy packed, raises questions about these claims. when pegasus was released
4:14 am
a few years ago, it was mainly targeted on human rights activists, journalists, and politicians, and targeted people maybe of people with high wealth. but it's never really going to be used on the, on joe public. if you were to target everyone in a math net. i don't think that would be as important to the people behind it. they don't want to see my day today. that was your day today. going off to specific people in the danger of such by ram is its ability to infiltrate every piece of private information and hacked a targeted device to the most used applications. in 2019 whatsapp owned by facebook accused. and so of hacking the popular communications tool. this waste fear amongst the huge numbers of global users in fort sab, especially at a time when some targeted victims appeared to meet with dreadful consequences. it
4:15 am
came, she left a la softly darville visit phone. mister mostly alyssa lane with the bell over. so did the switch be a couple of us for lovely dogs. they love dark mo, mo, cortez my will mail the bizarre go muscle. all of them he saw, i saw, nor was there something makes me quite up on me. she never mexico visual to be the one i mix economy. there's a lot nozzles can hold on the layer a qu away. it will ny she a do. i will be called to mr la la la v. oh my god do when they alarm. so if you do think that you are someone who is an important target, you're likely to face scrutiny by some government in the middle east or elsewhere. and you are a journalist, an activist, or a member of civil society. i'd recommend that yes,
4:16 am
please do get in touch with with citizen lab or other researchers who work in this space in the art about german mission. i wanted to know how difficult it was to monitor phone suspected of being hacked. and here how many a santa basically involves installing an app on the phone, which allows us to inspect the internet traffic. and we do this for some period of time, depending on what the user would like. we can do it for a short time. we can do it for a long time and try and identify suspicious patterns or evidence that the phone might be hacked me. ah, while working as an investigative journalist almost housed with swipes and other suspicious messages through different apps, ah, the threats increased over the months ramping up as he worked on more sensitive regional subjects, he decided to install a tracking up on his work phone, developed by citizen lab to trace possible hacking
4:17 am
the conventional way to hack a smartphone is to send a suspicious message to the targeted form that includes a short text and a leg. when the user clicks on the link, software takes control of the phone and thus makes the device accept any commands sent through the link. the device is then automatically connected to a server used by the hackers, and that is how the spyware gets installed on the phone. the user doesn't see the spyware on their phone, which is already being hacked. the hackers can then control the device and all its functions. the main challenge for spyware is to find a vulnerability in the targeted phone, particularly as modern smartphone security protection techniques have developed significantly. pegasus managed to advance this capability considerably to be able
4:18 am
to penetrate various kinds of smartphone. once the infection happens, the malware itself did the same stuff that we see a lot of malware do, which is a spy on phone calls, spy on text messages and what's messages and any other encrypted messages you're sending and turn on your microphone and turn on your camera, what made it especially sophisticated was that they were willing to use brand new exploits for i phones to infect their victims and some of these exploits could cost upwards of a $1000000.00. ah, each supplier package, the spyware, to its clients, cost millions of dollars, and it can only used for a limited period of time. that means targeting a large number of smartphones for long periods of time, cost hundreds of millions of dollars. this extremely expensive cost raises questions. who can afford this spyware?
4:19 am
who are n s o groups, main clients, on its website, and as a group says it, spyware is quote, used exclusively by government intelligence, as efficiently requested by the governance themselves. does this mean that pegasus cannot be purchased by other parties? when people leave the israeli military service, they have all this very specialized, very highly sought after well paid knowledge. and so they take it to private companies such as an ogre, right? and then they, they sell it to countries that are known to violate human rights. because, you know, even though they are perhaps very intelligent about computer security, they clearly haven't thought so much about the human rights implications of what they're doing or maybe they don't care. thank us all up or teach it ito and you
4:20 am
more than likely english. mean more mish double. she'll be the haunches may denote air of a 100 as they get on the go go. mom on the lawyer, they are the mortality zillow, telling them a lot of l. i'm how the lexical law comes with the law of a deep, wildly hold amiable yacht and the mom or the columbia of bell. ben or mid, you know, bo lome, working on this investigation time on this house, so many signs of hacking attempts on his phone. the one he had fitted out to track any infiltration. after 7 months on the 19th of july 2020, i have received a phone call from citizen last informing him that the phone had been hacked. the hacking happened a few days after he had entered an investigative documentary about an indian tie.
4:21 am
truth, which disclosed controversial leaked documents about the ty coons linked to the us eat, and his flight from the country are miss hall. had used the same phone to communicate with officials and individuals in the u. e. in order to give them the right to reply to the allegations and the film. so the 1st thing that we saw on your phone was on july 19th between about 1033 and 11, 28 am gmc. there were a very high number of connections to apple servers. now usually your phone will just communicate one apple server for icloud, for your backups, for your contact syncing the information. but in this case, in less than an hour, we saw your phone communicate with 18 different apple servers and this was very unusual. you don't usually see those on phones. so that was the 1st clue that something suspicious was going on. and immediately after this communication stopped,
4:22 am
we saw your phone reach out to this website regular hours dot net. in other words, your phone connected to this website. and this website stands out, because we know from our research, a citizen lab that regular ours dot net, this website is linked to in a, so group pegasus spyware. so we saw your phone reaching out to this. and if so, packets of spyware server, which let us to suspect, and then later conclude that your phone was infected. so what we can see from the recording of your internet traffic. so let's go to this point in time here, 1129, where the phone communicates with the package the server. and we can look beforehand to see what was going on immediately before that. and the only thing that we see is this communication with i cloud with apple servers. we don't see any evidence that you pressed on a link or clicked on anything or went to any website. so what we think happened is
4:23 am
that these communications with the apple servers delivered the initial exploit to have your phone. in other words, you didn't click on anything. your phone was automatically hacked, a so called 0 click, like we said 0 click exploits delivered through apple servers. this is a very expensive export. yes, this is if you think about the sophistication of exports to break into phones. this is as good as it gets 0 click means hacking, without clicking on any links. pegasus does not require any action by the user or a click on any suspicious links. the user receives a call from an unknown caller through the internet, and the phone gets hacked, even without answering the phone call. after that pegasus spyware is installed on the targeted phone. taking full control of the device was definitely the most sophisticated attack i've seen in the last few years. the fact it was able to be
4:24 am
installed on a target device without the target, even clicking on anything. so 0 click attack. this is incredibly impressive. i want you to a very rarely seen to better do that. it so sophisticated. but as it is rare, is difficult for us to really know much more about it. and something of this method she was able to be conducted to still such data is a bit of a worry. she had that struck 0 cliff tom. i don't miss hahn wanted to know if this 0 click process enabled, complete access to all the applications and content on his folder within the island you had as far as we know, they can access everything on the phone. we saw from looking at the log files on your phone that they were able to access the media framework so they were able to turn on the microphone turn on the camera if they wanted to,
4:25 am
and listen into meetings or conversations going on around your device. they were also able to tap into the key chain on the front, and this is where your passwords for email accounts. social media maybe stored the fact that citizen lab was tracking thomas phone helped him take precautionary measures to prevent sensitive information being accessed. the most important thing was for him to discover the moment of the hacking to place and who else was affected. we found working together with l just here as i t team is that your case was not the only one. there were at least 36 other cases inside ultra 0, a phones that we're communicating with servers that we linked to an s o groups, packets of spyware. in other words, there were many different people at odyssey or who were hacked and target is not just you. i'll miss holland, the team from citizen lab, analyze the data connected to the hacking technology which targeted these devices.
4:26 am
the hack appeared to be part of an organized campaigns targeting symbol, teeniest me, the mobile phones of dozens of ologist, a journalist in order to spy on them. ah, according to citizen labs technical report, israel's packers, a spyware, was used to infiltrate these phones by looking at the links and the accounts, the hacking of the phones was carried out, mainly in the e and saudi arabia. the 2 countries that most use this advance is rarely technology in the region for what we saw with the infection inside l just 0. is that about half of them were from this operator that we call monarchy. if the code name that we give these operators when we refer to them inside citizen lab. and this operator is spying mostly in saudi arabia and cutter,
4:27 am
but not very many other countries. so this tells us, well, if they're spying mostly in saudi arabia, maybe it is, in fact the saudi arabian government and the other half were from this other operator that we call smithy castro inside citizen left. and this operator seems to be mostly targeting inside the united arab emirates and car. so this tells us that the government, in this case may be the united arab emirates government, in other words, to different governments. it, like we're behind this campaign, ah, deals to purchase pegasus spyware on no longer a secret. many reports claim the saudi arabia and the u. a. e. have spent hundreds of millions of us dollars to buy packages from israel. such deals seemed to be reinforced after the recent us brokers so called normalization deal between the us
4:28 am
and israel ah, the demand for low price is accelerating at high speed. that's absolutely great by 2030, the industry will expand by an additional 60 percent. i'll just take a detailed look at the disposal of our committee. oh, or the date exposing the hidden human and environmental costs. why was a company give free what she's never been there? no doubt it had boss fashions or knowledge of a city defined by military occupations. there's never been an arab state, he with the capital of jerusalem. everyone is welcome. but the default sexual that meant and they could only project. that's what we refuse. was one of the founders of the settlement with this and the story of juice and to the eyes of its own
4:29 am
people, segregation, occupations discrimination, injustice. this is tied in 21st century jerusalem, a rock and a hard place analogy. 0 me each and every one of us have got a responsibility to change our patients for the better the more we could do this and any of us could increase just a little bit that would be worth doing. anybody had any idea that it would become a magnet, always incredibly recipe for women to get 50 percent representation in the constituent assembly here and getting this pick up to collect the segregate, to say the reason this is extremely important. service that they provide the city we need to take america to try to bring people together and trying to deal with
4:30 am
people who left behind me. ah no madison and don't have the top stories on august 0. us president and his russian counterpart of letting me put in of how the 1st face to face talk since joe biden, to coffers me, agreed to resume talks on arms control and cybersecurity. they also promise to return on busters to each other's capital. as after they were withdrawn earlier this year, but disagreements on human rights and ukraine remain. i told president food, my agenda is not against russia or anyone else. it's for.

25 Views

info Stream Only

Uploaded by TV Archive on