Skip to main content

tv   [untitled]    June 19, 2021 11:00pm-11:31pm +03

11:00 pm
was my last let us love one. love doesn't close to once and makes your heart happier. my heart happy. he doesn't bring any loss for the new symbol. let us practice this. ah, hello, i'm barbara sarah london. these are the top stories on al jazeera, the hardline candidate abraham racy, has been declared the winner of iran's presidential election. a widely anticipated result after other strong contenders were barred from running racy one. nearly 62 percent of the vote, but turn out was low. with less than 50 percent of eligible voters actually go into the polls. this was largely attributed to a lack of enthusiasm for the election and the pandemic. or if he takes office in
11:01 pm
august and promises to work closely with the former leader has some supposed to show credit for us. and i'd like to offer my gratitude to the very dear honorable and vigilant people. i thank the almighty god for the dear people's trust in the serving seminary student. i hope i can respond well to the people's confidence votes unkindness. during my turn as vague as laura from tehran, where he says, there are questions as to the legitimacy of rice sees election. well, it depends, he talk to, if you talk to his supporters, well, they'll say this was an election. people had a choice to vote or not to vote, and those that voted the majority of those 62 percent voted for right. in fact, he increased his vote from the last time he stood back in 2017 against president has under honie did back then he got just shy of 16000000. this time he got just shy of 18000000, while to significant is of those votes that were in invalid votes. now back in
11:02 pm
2017, they were 1200000 this time it was 3 times higher, 3700000, and it's understood that many people actually voted, spoke their balance. but there are questions around this election. and right the legitimacy of this election, that's because many prominent moderates and reforms are disqualified, and we're not allowed to stent and many believe that the stablish moment of those political forces behind the brain, right? we're trying to make, he's run for presidency as easy as possible. one of those that was not allowed to stand was former president damage and then he came out and said that he wouldn't be voting for anybody or backing any candidate. and another candidate to the reform is candidate from back in 2009 mid hussein who sub he's been at home rest and has voted in previous elections. he said that he would boycott it because it was an engineered election. but again, it depends on who you speak to here,
11:03 pm
but those supporters of brain where you have been out on the street, we've been monitoring that they've been celebrating as far as they've concerned. he's one of the election and he is the next legitimate president of iran. meanwhile, amnesty international is renewing calls for the president to like to be investigated for crimes against humanity. when he was serving as a deputy prosecutor more than 30 years ago. they want an inquiry into the role that racy played in the executions of about 5000 political prisoners in 1988 human rights. the human rights group says he was part of a so called death committee, one of 4 judges who oversaw the secret that sentences in jails near terror on iran has never acknowledged a mass executions and racy has never publicly addressed allegations about his role . the current of our, especially in brazil, has passed at 500000 protesters. there are demanding the impeachment of present
11:04 pm
enjoyable scenario. over his handling of the pandemic, thousands of marched on the streets of reader janetta and fell. paolo demanding more vaccines. both sonata was fined last week for not wearing a mask at a rally. and the bola outbreak that started in southeast beginning in february, has been declared over 16 people were infected. 12 of them died during the outbreak in guinea that 2nd largest city, the health ministry vaccinated 11000 people to try to contain the virus. the recent coo and molly is likely to be top of the agenda is west african leaders made for a summit in governance capital across member nations of the economic community of west african states, known as eco, was taking part valley was suspended from the group 3 weeks ago following the crew, al jazeera world is next bye bye. mm.
11:05 pm
mm. ah ah, in mid 2020, a mobile phone belonging to odyssey or arabic, was hacked over the next few months, working with an organization called the citizen lab. the team for mosier unpacked an extraordinary story, or some of the most advanced spyware in the world. and how it's used, not least on jazz ears, journalists,
11:06 pm
ah, with a click of a button. you can bring down nations to their news very rapidly. if you so desire, and if you're willing to take them, because every system can be a israel manufacturers pegasus, some of the most advanced spyware in the world. it 1st came to attention in 2016. since that various governments have bought the spyware for their own use. questions today are, how does pegasus work? who is using it? and who is victims? well, there's very little in the actual details behind the pegasus spyware. the code, the malicious code that was used, that's very, very difficult to find out more about. that was a list for lee and living again,
11:07 pm
i'm out of food because of this month and the backend he was, i'm had a mobile, i can answer them on the mobile, how they are in new york about her being cut off and cut the solidarity for the 30 here on the amendment and had these holes with odyssey or arabic investigative report, a time that followed a complicated technical process to track this infamous spyware. over many months, he had one of his own phones monitored constantly with the help of citizen land, an international research laboratory based in canada, that specializes in data surveillance. the citizen la was the 1st to expose the existence of israel's pegasus spyware. in 2016, they disclose details of what they called on exploit infrastructure. connected to a phone belonging to an activist from the united arab emirates. the infiltration,
11:08 pm
the hack, led to the rest of the madman saw remains in prison to this day. the new hacking technique was called a 0 day exploits. and pegasus was, the spyware used to infiltrate months whose phone bill most acts from citizen lab, has worked for several years to expose pegasus. so what happened in 2016 started with vis. man madeline, sort the activist in the u. e. and he noticed some suspicious messages on his phone that he was getting the s m s. he thought they were weird because they came from unknown numbers and they were promising information about human rights. so he forwarded them to me at citizen lab. we had known each other for a while. i got a burner phone, not obviously my, my real phone burner phone and clicked on the links. and while i was doing this, i was recording the internet traffic and recording the activity on the phone and
11:09 pm
what was installed. when i clicked the link was a very sophisticated, spyware payload. and the interesting question was, well, who could be behind us? who might have programmed the spyware who might have sold it, who might be using it? and the process to figure that out is called attribution. so what we did in the report is we noticed that when you clicked on the link a 2nd time, it wouldn't cause the infection. it was only limited to the 1st click and the 2nd click would send you to a decoy website to try and make it look innocuous or benign. so we clicked on the 2nd time we got redirected to google, but it wasn't just any redirect to google. it was a very specific piece of code that someone had sat down and written on their computer. so we figured, well, maybe this is part of this spyware somehow. and if we can scan the internet, we can find other servers that had the same weird redirect to google. so this is
11:10 pm
exactly what we did. we use the popular open source v math program. we scan the internet and found 149 other servers, and this is where it gets interesting because this 2nd redirect to google was also . busy returned by 3 servers and s o q a dot com q a n q a dot com and mail one dot and s o group dot com and the name here and i so group we found in a brochure in these really government's website. they had a brochure for this company, and a so group, which is based in israel and sells a product called pegasus, which is spyware, for mobile phones. in the case of pegasus citizen lab did very good work and was very, very conclusively able to say that pegasus had been written by and over. but it's actually stream li, rare that we're able to get that sort of concrete attribution and say this malware was written by this company. the n s o group is
11:11 pm
a technology company based in hatch layer in israel founded in 2010. it employs over 500 cybersecurity experts, pegasus spyware, is viewed as its most important product use. israel is one of the most sophisticated cyber actors in the world. and i think that a lot of this is because the israeli army is training people to do this sort of offensive, packing for you know, in their military service. more of them allow me in the if he how he should go home, how do you men wish that someone left within the huff a way the way it done? the list is what alaska eligibility. yeah. a lot of them on the live. you cut them well, hold on. i had a, i shouldn't get more talk about leia or harbor was all at the thought was
11:12 pm
a little slightly r n. a say we just called unit a 200. it's pretty basic. we allow them to grade companies. and we, and order for the companies to develop, they need to make what they need to make money. they need to make money. thomas almost house spoke to william benny, who for over 30 years, worked with the us national security agency, a former cryptography, and later whistleblower. com and benny was the n s. a technical leader of intelligence. many has a high level understanding of the agencies data collection systems. what that means is, any i phone or any phone in the world, 1st connecting to the network, when you want to use it, you're immediately known worldwide. i mean, all the switches have you and capture your ip and all, and your phone and mac numbers and all that. that's how they bill you. so that also
11:13 pm
is the known by the network and the implants, computer network exploitation implants, they have around the world over this was in 2004 or 2010, somewhere in that range. they had over 50000 implants and all these switches, servers and networks worldwide. i mean that means they own the entire network. so that if you, your phone comes on the air, then they can, they can know who you are and where you are. when you citizen loud, exposed to n. s. so, and it's peggy of spyware. in 2016, it attracted worldwide control, oversee and so claims its mission is to develop technology for government agencies to quote, detect and prevent terrorism and crime. however, the nature of its targets, the individuals whose phones have been hacked, raises questions about these claims. when pegasus was released
11:14 pm
a few years ago, it was mainly targeted on human rights activists, journalists, and politicians, and targeted people maybe of people with high wealth. but it's never really going to be used on the, on joe public. if you were to target everyone in math. net, i don't think that would be as important to the people behind it. they didn't want to see my day today. that was your day today, going off to specific people in the danger of such by ram is its ability to infiltrate every piece of private information and hacked a targeted device to the most used applications in 2019 whatsapp owned by facebook accused and so of hacking the popular communications to this waste fear, amongst the huge numbers of global users, and for sab, especially at a time when some targeted victims appeared to meet with dreadful consequences. it
11:15 pm
is all came she left a law softly darville visit phone. mister mosley, alyssa lane, or the bell over so did the little house fuji, a couple of us for lovely dogs. they love dark mode shirt. mon cortez, my will mail the bustle gamma while of dummy stars i saw nor was there. so it's not gonna make the quite up on me issue. michelle is mexico visual to be the one i mix economy. there's a lot at the nozzle can hold on the layer a qu away. it will ny she a do. i will be called to mr. la la la ray. oh my god do when they alarm. so if you do think that you are someone who is an important target, you're likely to face scrutiny by some government in the middle east or elsewhere. and you are a journalist, an activist, or a member of civil society. i'd recommend that yes, please do get in touch with,
11:16 pm
with citizen lab or other researchers who work in this space or any other matter. and michelle wanted to know how difficult it was to monitor the phone, suspected of being hacked and hear how many a santa basically involves installing an app on the phone, which allows us to inspect the internet traffic. and we do this for some period of time depending on what the user would like. we can do it for a short time. we can do it for a long time and try and identify suspicious patterns or evidence that the phone might be hacked. me while working as an investigative journalist almost housed with swipes and other suspicious messages to different apps. ah, the threats increased over the months ramping up. as he worked on more sensitive region of subjects, he decided to install a tracking up on his work phone, developed by citizen lab to trace possible hacking
11:17 pm
the conventional way to hack a smartphone is to send a suspicious message to the targeted form that includes a short text and a leg. when the user clicks on the link, software takes control of the phone and thus makes the device accept any commands sent through the link. the device is then automatically connected to a server used by the hackers, and that is how the spyware gets installed on the phone. the user doesn't see the spyware on their phone, which is already been hacked. the hackers can then control the device and all its functions. the main challenge for spyware is to find a vulnerability in the targeted phone, particularly as modern smartphone security protection techniques have developed significantly,
11:18 pm
package as managed to advance this capability considerably. to be able to penetrate the various kinds of smartphone. once the infection happens, the malware itself did the same stuff that we see a lot of malware do, which is a spy on phone calls, spy on text messages and what's messages and any other encrypted messages you're sending and turn on your microphone and turn on your camera, what made it especially sophisticated was that they were willing to use brand new exploits for i phones to infect their victims and some of these exploits could cost upwards of a $1000000.00. ah, each supplier package, the spyware, to its clients, cost millions of dollars, and it can only used for a limited period of time. that means targeting a large number of smartphones for long periods of time, cost hundreds of millions of dollars. this extremely expensive cost raises questions. who can afford this spyware?
11:19 pm
who are n s o groups, main clients, on its website, and as a group says, it's spyware is quote, used exclusively by government intelligence, as efficiently requested by the governor themselves. does this mean that pegasus cannot be purchased by other parties? when people leave the israeli military service, they have all this very specialized, very highly sought after well paid knowledge. and so they take it to private companies such as an ogre, right? and then they, they sell it to countries that are known to violate human rights. because, you know, even though they are perhaps very intelligent about computer security, they clearly haven't thought so much about the human rights implications of what they're doing or maybe they don't care. thank us all up or teach it ito and that
11:20 pm
you more than likely english means more mish double. she'll be the haunches. medina, sort of a whole bunch of the get on the got go me mom on the lawyer. they are, the more hell it is a lot on them. so a lot of l. i'm how the lexical law got the same, love a deed, him a how wildly whole day mil, yell it, and they're all don't of laying the columbia of bell them, or mid bo alarm for working on this investigation. time on this house, so many signs of hacking attempts on his phone, the one he had fitted out to track any infiltration. after 7 months, the 19th of july 2020, he received a phone call from citizen lab, informing him that the phone had been hacked. the hacking happened a few days after he had erred an investigative documentary about an indian tie.
11:21 pm
truth which disclosed controversial leaked documents about the tie. coons linked to the us eat and his flight from the country are miss hall. had used the same form to communicate with officials and individuals in the u. e. in order to give them the right to reply to the allegations and the film. so the 1st thing that we saw on your phone was on july 19th between about 103311288. m g m chief. there were a very high number of connections to apple servers. now usually your phone will just communicate with one apple server for icloud, for your backups, for your contact thinking the information. but in this case, in less than an hour, we saw your phone communicate with 18 different apple servers. and this was very unusual. you don't usually see this on phones, so that was the 1st clue that something suspicious was going on. and immediately
11:22 pm
after this communication stopped, we saw your phone reach out to this website regular, ours dot net. in other words, your phone connected to this website. and this website stands out, because we know from our research, a citizen lab that regular ours dot net, this website is linked to in a, so group pegasus spyware. so we saw your phone reaching out to this. and if so, pegasus spyware server, which let us to suspect, and then later conclude that your phone was infected. so what we can see from the recording of your internet traffic. so let's go to this point in time here, 1129, where the phone communicates with the packets a server. and we can look beforehand to see what was going on immediately before that. and the only thing that we see is this communication with icloud, with apple servers. we don't see any evidence that you pressed on a link or clicked on anything or went to any website. so what we think happened is that these communications with the apple servers delivered the initial exploit to
11:23 pm
have your phone. in other words, you didn't click on anything. your phone was automatically hacked, a so called 0 click, like we said, your click exploits delivered through apple servers. this is a very expensive export. yes, this is if you think about the sophistication of exports to break into phones. this is as good as it gets 0 click means hacking, without clicking on any links. pegasus does not require any action by the user or a click on any suspicious links. the user receives a call from an unknown caller through the internet, and the phone gets hacked, even without answering the phone call. after that pegasus spyware is installed on the targeted phone. taking full control of the device is definitely the most sophisticated attack i've seen in the last few years,
11:24 pm
but fact it was able to be installed on a target device without the target increasing or anything. so 0 click attack. this is incredibly impressive. and i could say very rarely saying it's better to do that . it so sophisticated. but as it is rare, it's difficult for us to really know much more about it. and something of this method she was able to be conducted to still such data is a bit of a worry. she had stood up 0 cliff thomas and miss han wanted to know if this 0 click process enabled, complete access to all the applications and content on his full, tough with invalid island. you had as far as we know, they can access everything on the phone. we saw from looking at the log files on your phone that they were able to access the media framework so they were able to turn on the microphone turn on the camera if they wanted to,
11:25 pm
and listen into meetings or conversations going on around your device. they were also able to tap into the key chain on the phone. this is where your passwords for email accounts. social media maybe stored the fact the citizen lab was tracking thomas phone, helped him take precautionary measures to prevent sensitive information being accessed. the most important thing was for him to discover the moment at the hacking to place and who else was affected. we found working together with l just here as i t team is that your case was not the only one. there were at least $36.00 other cases inside ultra 0, a phones that we're communicating with servers that we linked to. and so groups, pegasus spyware. in other words, there were many different people at odyssey or who were hacked and target is not just you. i'll miss holland, the team from citizen lab, analyze the data connected to the hacking technology which targeted these devices.
11:26 pm
the hack appeared to be part of an organized campaigns targeting symbol teeniest, the mobile phones of dozens of ologist era journalists in order to spy on them. ah, according to citizen labs technical report, israel's packers, a spyware, was used to infiltrate these phones by looking at the links and the accounts, the hacking of the phones was carried out, mainly in the e and saudi arabia. the 2 countries that most use this advance is rarely technology in the region for what we saw with the infections inside l just 0 is that about half of them were from this operator that we call monarchy. if a code name that we give these operators when we refer to them inside citizen lab, and this operator is spying mostly in saudi arabia and cutter,
11:27 pm
but not very many other countries. so this tells us, well, if there spying mostly in saudi arabia, maybe it is, in fact the saudi arabian government and the other half were from this other operator that we call smithy castro inside citizen left. and this operator seems to be mostly targeting inside the united arab emirates and color. so this tells us that the government, in this case may be the united arab emirates government. in other words, 2 different governments. it, like we're behind this campaign, ah, deals to purchase pegasus spyware on no longer a secret. many reports claim that saudi arabia and the u. a. e, have spent hundreds of millions of us dollars to buy packages from israel. such deals seemed to be reinforced after the recent us brokers so called normalization
11:28 pm
deal between the us and israel ah for some a robot is a mechanical or even that self driving train the apple. but androids today can be over the humanoid. robots, like me, will be everywhere. options 0 documentaries. next the lead on the weird and wonderful world of robot that learn. think for you and even trust. i feel like i'm alive, but i know i am a machine origins of this nation. coming soon on, al jazeera, 300 years of danish come, and i, and international interest in the 8th grade. a younger generation emerging determined, and nephew has me with me to wrap that i need to be on faith as
11:29 pm
jude and politician as they tackle a job, issues with that powerful to fight for greenland. a witness documentary on al serra, when the news breaks and the story bill, when people need to be heard nigeria with a woman press, it would be great. and the story needs to be told algebra, her teens on the ground to bring you more award winning documentary and life needs . the discussion here in iran is moving away from the presidential election to questioning the system. there's really no way that they can think serious economy is collapsing on an online storm today, or it's crazy at the heavy rain is knocked out of the communications. these n g o, the connecting a temporary satellite network. hold on guys help is coming. connection is established. now they can talk to each other over radio or even i p. luckily,
11:30 pm
we were ready for the gym. i was programmed ready space to deliver your vision. oh hello and barbara sarah london. as these are the top stories on al jazeera, the hard line candidate abraham racy, has been declared the winner of iran's presidential election. a widely anticipated result after other strong contenders were barred from running racy one. nearly 62 percent of the vote but turn out was low with less than 50 percent of eligible people actually voting. this was largely attributed to a lack of enthusiasm for the election and the panoramic very she takes office in august and promises to work closely with a former leader has some who honey fossa,
11:31 pm
fisher credit for us. and i'd like to offer my gratitude to the very dear, honorable and vigilant.

13 Views

info Stream Only

Uploaded by TV Archive on