tv [untitled] June 21, 2021 4:00am-4:31am +03
4:00 am
some line on i was just there on me, the al jazeera, which is a whole i me painted. i'll be here and how you top stories on al jazeera armine as can take a prime minister, has claim victory and sundays snap election. dates are still being can see the results show passion young the ruling party is in the leads his main rival, the former president, robert casara unblock, says it will not recognize those results. 10 i was just under 50 percent passion. yup. called the snap parliamentary election in april following last year's defeats
4:01 am
in the war with as the by john roy challenge has more now from the capital european . he's claims that have a block. his party has a convincing majority, although he acknowledge not all the vote to be counted yet. and yes, the official does have he does put him out significantly in front to the moment. what these are the result suggest is that many of those undecided voters in the end have broken for passion, the em but minutes. this is a big but with 10 out of here than 50 percent, less than 50 percent. that also suggests that there are a good number of armenians and for whatever reason is it, this is because of the war or that the tone of the campaigning or the candidates themselves have decided to sit this election out. if these results are confirmed in the final tally, i suggest that the official mechanisms for settling a close contest won't be necessary. now those mechanisms are coalition negotiations
4:02 am
and if those fail a 2nd round of voting, so if it's not close, that won't be used. but it doesn't mean that this election isn't being contested, and rebecca, cherry and party has already come out basically saying that it believes that there are been voting irregularity, significant voting irregularities in this election. and they won't accept any results until i have analyze what those irregularities all. there are warnings of possible power costs across several iranian cities after it's only nuclear power plant went into an emergency shut down the head of the state. energy company says the bushie, a plant may not be operational for up to 4 days as the 1st time to iran has reported an emergency. that's kind. there had been warnings in the past that the plant could stop functioning if iran couldn't buy equipment from russia. because of us banking sanctions have at all, it has been announced in the news and you might have heard to the nuclear share of
4:03 am
power has been subject to an emergency shut down, which will last for 3 to 4 days. it was shut down yesterday. when you lose a 1000 megawatts of your plans capacity, the likelihood of blackouts will rise ations to revive the iran nuclear deal will resume after 10 days, both iran and the u. s. a. despite progress differences do remain libby as national unity government has announced the partial reopening of a road that links the east and the west of the country. it was one of the conditions of a cease fire agreement signed between warring sites in october, forces loyal to the warlord tale for half say they went consulted and yet to approve the decision. but the prime minister in fists portions of the road are open . brazil has become the 2nd country after the us to record more than half a 1000000 corona virus. deaths demonstrators in rio de janeiro placed roses on cooper on a beach. in memory of the victims. hospitals are struggling with a devastating 3rd wave of the pandemic. the president,
4:04 am
liable to nato still continues to play down the seriousness of covered 19 putting pressure on states to resist lock downs. exit both in france against the far right has performed worse than expected in sundays regional elections. the president and manual macro centrist party also pulled poorly, but it appears the center right, has made gains. it comes off to a record, low voter turnout, the 1st round of regional elections, an adviser to the jail, hong kong media tycoon jimmy lie has filled the reuters news agency, the pro democracy newspaper. the apple daily will be forced to shut in a matter of days. they said it's because the company has no access to funds after it's were frozen. the apple daily news room was recently rated by the police. 2 of its executives were also charged under the national security law up next out of your world news in 25 minutes. i'll see at the.
4:05 am
4:06 am
not least on algiers journalists, ah, with a click of a button. you can bring down nations to their news very rapidly if you so desire. and if you're willing to take them, because every system can be a israel manufacturers pegasus. some of the most advanced spyware in the world. it 1st came to attention in 2016. since then, various governments have bought the spyware for their own use. questions today are, how does pegasus work? who is using it, and who it's victims? well, there's very little in the actual details behind the pegasus spyware. the code, the malicious code that was used, that's very, very difficult to find out more about thought was a leslie and living again,
4:07 am
i'm out of food because of the live of money and the backend he was, i've had a walk in elders and some mobile have a, on the in know, you're out for me and i will cut off and cut the solidarity for the 3rd test on the amendment. i've had these holes now does your arabic investigative report a time that followed a complicated technical process to track this infamous spyware. over many months, he had one of his own phones monitored constantly with the help of citizen land, an international research laboratory based in canada, that specializes in data surveillance. the citizen la was the 1st to expose the existence of israel's pegasus spyware. in 2016, they disclose details of what they called on exploit infrastructure connected to a phone belonging to an activist from the united arab emirates. the infiltration,
4:08 am
the hack, led to the arrest of madmen saw remains in prison to this day. the new hacking technique was called a 0 day exploits, and pegasus was, the spyware used to infiltrate months whose phone bill muscle from citizen lab has worked for several years to expose pegasus. so what happened in 2016 started with this man, madeline sword, the activist in the u. e. and he noticed some suspicious messages on his phone and that he was getting the s m s. he thought they were weird because they came from unknown numbers and they were promising information about human rights. so he forwarded them to me at citizen lab. we had known each other for a while. i got a burner phone, not obviously my, my real phone, a burner phone and clicked on the links. and while i was doing this, i was recording the internet traffic and recording the activity on the phone and
4:09 am
what was installed. when i clicked the link was a very sophisticated, spyware payload. and the interesting question was, well, who could be behind us? who might have programmed the spyware who might have sold it, who might be using it? and the process to figure that out is called attribution. so what we did in the report is we noticed that when you clicked on the link a 2nd time, it wouldn't cause the infection. it was only limited to the 1st click and the 2nd click would send you to a decoy website to try and make it look innocuous or benign. so we clicked on the 2nd time we got redirected to google, but it wasn't just any redirect to google. it was a very specific piece of code that someone had sat down and written on their computer. so we figured, well, maybe this is part of this spyware somehow. and if we can scan the internet, we can find other servers that had the same weird redirect to google. so this is
4:10 am
exactly what we did. we use the popular open source v map program. we scan the internet and found 149 other servers, and this is where it gets interesting because this 2nd redirect to google was also . busy returned by 3 servers and s o q a dot com q a n q a dot com and mail one dot and s o group dot com and the name here. and so group we found in a brochure in these really government's website. they had a brochure for this company, and so group, which is based in israel and sells a product called pegasus, which is spyware, for mobile phones. in the case of pegasus citizen lab did very good work and was very, very conclusively able to say that pegasus had been written by and over it. but it's actually stream li, rare that we're able to get that sort of concrete attribution and say this malware was written by this company. the n s o group is
4:11 am
a technology company based in hatch layer in israel founded in 2010. it employs over 500 cybersecurity experts, package, the spyware is viewed as its most important product use. israel is one of the most sophisticated cyber actors in the world. and i think that a lot of this is because the israeli army is training people to do this sort of offensive, packing for you know, in their military service. most of them allow me in the if he, how he should go home, how do you men wish that someone telephone within the huff a way the way is done? the list is what alaska is failure. alarm will be the customer. well, hold on her. should it gets more about leo harbor was off at the thought was
4:12 am
a little slightly r n a say, which is called unit a 200. it's pretty big. we allow them to create companies. and we, and order for the companies to develop. they need to make what they need to make money. they need to make money. thomas almost house spoke to william benny, who for over 30 years, worked with the u. s. national security agency, a former cryptography, and later whistleblower benny was the n s. a technical leader of intelligence. benny has a high level understanding of the agencies data collection systems. what that means is, any i phone or any phone in the world, 1st connecting to the network, when you want to use it, you're immediately known worldwide. i mean, all the switches have you and capture your ip and all, and your phone and mac numbers and all that. that's how they bill you. so that also
4:13 am
is the known by the network and the implants, computer network exploitation implants, they have around the world over this was in 2004 or 2010, somewhere in that range. they had over 50000 implants and all these switch servers and networks worldwide. i mean that means they own the entire network. so that if you, your phone comes on the air, then they can, they can know who you are and where you are. when you citizen loud, exposed to n. s. so, and it's peggy of spyware. in 2016, it attracted worldwide control, oversee and so claims its mission is to develop technology for government agencies to quote, detect and prevent terrorism and crime. however, the nature of its targets, the individuals whose phones happy packed, raises questions about these claims. when pegasus was released
4:14 am
a few years ago, it was mainly targeted on human rights activists, journalists, and politicians, and targeted people maybe of people with high wealth. but it's never really going to be used on the, on joe public if you were to target everyone in mass net, i don't think that would be as important to the people behind it. they didn't want to see my day today. that was your day today going off to specific people in the danger of such spy. ram is its ability to infiltrate every piece of private information and hacked a targeted device to the most used applications. in 2019 whatsapp owned by facebook accused and so of hacking the popular communications to this waste fear amongst the huge numbers of global users for sab, especially at a time when some targeted victims appeared to meet with dreadful consequences.
4:15 am
she left a la softly darville visit for mister mosley listened lane with the bell. so did the little house, fuji, a quarter of a swirl of my dog, the dog, my uncle, share mon cortez? my will mail the bustle gamma. so all of them he saw, i saw, nor was there. so it's not gonna make the call up on me issue. michelle is mexico visual to be the one i mix economy. there's a lot at the nozzle can hold on the layer a qu away. it will ny she a do i will be called to mr. la la la ray. oh my god do when they alarm. so if you do think that you are someone who is an important target, you're likely to face scrutiny by some government in the middle east. or elsewhere, and you are a journalist, an activist, or a member of civil society. i'd recommend that. yes. please do get in touch with,
4:16 am
with citizen lab or other researchers who work in this space or any other matter. and michelle wanted to know how difficult it was to monitor the phone, suspected or being hacked and hear how many a santa basically it involves installing an app on the phone, which allows us to inspect the internet traffic. and we do this for some period of time depending on what the user would like. we can do it for a short time. we can do it for a long time and try and identify suspicious patterns or evidence that the phone might be hacked. me while working as an investigative journalist, almost how was he swipes and other suspicious messages to different apps? ah, the threats increased over the months ramping up as he worked on more sensitive region of subjects, he decided to install a tracking up on his work phone, developed by citizen lab to trace possible hacking
4:17 am
the conventional way to hack a smartphone is to send a suspicious message to the targeted form that includes a short text and a leg. when the user clicks on the link, software takes control of the phone and thus makes the device accept any commands sent through the link. the device is then automatically connected to a server used by the hackers, and that is how the spyware gets installed on the phone. the user doesn't see the spyware on their phone, which is already being hacked. the hackers can then control the device and all its functions. the main challenge for spyware is to find a vulnerability in the targeted phone, particularly as modern smartphone security protection techniques have developed significantly,
4:18 am
package as managed to advance this capability considerably. to be able to penetrate the various kinds of smartphone. once the infection happens, the malware itself did the same stuff that we see a lot of malware do, which is a spy on phone calls, spy on text messages and what's messages and any other encrypted messages you're sending and turn on your microphone and turn on your camera, what made it especially sophisticated was that they were willing to use brand new exploits for i phones to infect their victims and some of these exploits could cost upwards of a $1000000.00. ah, each supplier package, the spyware, to its clients, cost millions of dollars, and it can only used for a limited period of time. that means targeting a large number of smartphones for long periods of time, cost hundreds of millions of dollars. this extremely expensive cost raises questions. who can afford this spyware?
4:19 am
who are n s o groups, main clients, on its website, and as a group says it, spyware is quote, used exclusively by government intelligence, as efficiently requested by the governor themselves. does this mean that pegasus cannot be purchased by other parties? when people leave the israeli military service, they have all this very specialized, very highly sought after well paid knowledge. and so they take it to private companies such as an s o group, right. and then they, they sell it to countries that are known to violate human rights. because, you know, even though they are perhaps very intelligent about computer security. they clearly haven't thought so much about the human rights implications of what they're doing. or maybe they don't care. take us all up or teach it, eat,
4:20 am
doing that you more likely go english means more mish ought to be the haunch medina note or a 100 years ago only got me mom on the lawyer. they are the mortality zillow, 1000 themselves of a l. i'm how electrical machinery love us. i did him a harley whole day, me a little yard and the holly or the columbia of bell band may or may not be working on this investigation. comedy miss. how so many signs of hacking attempts on his phone. the one he had fitted out to track any infiltration. after 7 months on the 19th of july 2020, he received a phone call from citizen lab informing him that the phone had been hacked. the hacking happened a few days after he had entered an investigative documentary about an indian tie.
4:21 am
cooper which disclosed controversial leaked documents about the tie. coons linked to the you eat and his flight from the country are miss hall. had used the same phone to communicate with officials and individuals in the u. e. in order to give them the right to reply to the allegations and the film. so the 1st thing that we saw on your phone was on july 19th between about 1033 and 11, 28 am gmc, there were a very high number of connections to apple servers. now usually your phone will just communicate one apple server for icloud, for your backups, for your contact thinking the information. but in this case, in less than an hour, we saw your phone communicate with 18 different apple servers. and this was very unusual. you don't usually see this on phones, so that was the 1st clue that something suspicious was going on. and immediately
4:22 am
after this communication stopped, we saw your phone reach out to this website regular hours dot net. and what's your phone connected to this website? and this website stands out, because we know from our research, a citizen lab that regular ours dot net, this website is linked to in a, so group pegasus spyware. so we saw your phone reaching out to this. and so pegasus spyware server, which led us to suspect, and then later conclude that your phone was infected. so what we can see from the recording of your internet traffic. so let's go to this point in time here, 1129, where the phone communicates with the packets a server. and we can look beforehand to see what was going on immediately before that. and the only thing that we see is this communication with icloud, with apple servers. we don't see any evidence that you pressed on a link or clicked on anything or went to any website. so what we think happened is that these communications with the apple servers delivered the initial exploits to
4:23 am
have your phone. in other words, you didn't click on anything. your phone was automatically hacked, a so called 0 click, like we said 0 click exploits delivered through apple servers. this is a very expensive export. yes, this is if you think about the sophistication of exports to break into phones, this is as good as it gets 0 click means hacking, without clicking on any links. pegasus does not require any action by the user or a click on any suspicious links. the user receives a call from an unknown caller through the internet, and the phone gets hacked, even without answering the phone call. after that pegasus spyware is installed on the targeted phone, taking full control of the device. it's definitely the most sophisticated attack i've seen in the last few years. the fact it was able to be installed on
4:24 am
a target device without the target, even clicking on anything. so 0 click attack. this is incredibly impressive. and i could say very rarely saying to me to do that, it so sophisticated. but as it is rare, it is difficult for us to really know much more about it is something of this method she was able to be conducted to still such data is a bit of a worry she had that struck 0 cliff tom. i don't know how i wanted to know if there's 0 click process enabled, complete access to all the applications and content on his folder. within milan island, you had as far as we know, they can access everything on the phone. we saw from looking at the log files on your phone that they were able to access the media framework so they were able to turn on the microphone turn on the camera if they wanted to,
4:25 am
and listen into meetings or conversations going on around your device. they were also able to tap into the key chain on the phone. this is where your passwords for email accounts. social media maybe stored the fact the citizen lab was tracking thomas phone, helped him take precautionary measures to prevent sensitive information being accessed. the most important thing was for him to discover the moment the hacking took place and who else was affected. we found working together with l just here as i t team is that your case was not the only one. there were at least 36 other cases inside, all just a phones that we're communicating with servers that we linked to and s o groups pegasus spyware. in other words, there were many different people at odyssey or who were hacked and target is not just you. i'll miss holland, the team from citizen lab, analyze the data connected to the hacking technology which targeted these devices.
4:26 am
the hack appeared to be part of an organized campaigns targeting symbol teeniest, the mobile phones of dozens of ologist era journalists in order to spy on them. ah, according to citizen labs technical report, israel's pegasus spyware, was used to infiltrate these phones by looking at the links and the accounts, the hacking of the phones was carried out, mainly in the e and saudi arabia. the 2 countries that most use, this advanced is rarely technology in the region for what we saw, the infections inside elgin 0 is that about half of them were from this operator that we call monarchy. if the code name that we give these operators when we refer to them inside citizen lab, and this operator is spying mostly in saudi arabia and cutter,
4:27 am
but not very many other countries. so this tells us, well, if there spying mostly in saudi arabia, maybe it is, in fact the saudi arabian government and the other half were from this other operator that we call smithy castro inside citizen left. and this operator seems to be mostly targeting inside the united arab emirates and color. so this tells us that the government, in this case may be the united arab emirates government, in other words, to different governments. it, like we're behind this campaign, ah, deals to purchase pegasus spyware on no longer a secret. many reports claim that saudi arabia and the u. a. e, have spent hundreds of millions of us dollars to buy packages from israel. such deals seemed to be reinforced after the recent us brokers so called normalization
4:28 am
deal between the us. and israel ah, go from one is a home will top was what rooms were made. it turned into a nightmare of a rest in torture by johnson footballing legend, eric kent introduces cloud. your temporary, one of the special few stood up for their beliefs. whatever that cost. football rebels on al jazeera, the 300 years of danish come. and i think an international interest in the i didn't refill to grade a younger generation, emerging, determined, and nephew to meet him. and he'd be on faith as
4:29 am
jude and a politician as they tackle a child issues with that powerful fight for greenland. a witness documentary on al jazeera, a city defined by military occupation. there's never been an arab state. he with the capital of jerusalem. everyone is welcome, but the default sexual that meant and they could only project. that's what it feels . a was one of the founders of a settlement with this and the story of jerusalem through the eyes of its own people, segregation, occupation discrimination, injustice. this is upper side in the front. the 1st century drew for them a rock and a hard place analogy 0. the latest news as it breaks, a significant number of the 32 attacks carried out in the quarter of 2021 happened in nigeria, 740 and walk as with detailed coverage. president biden respond policy is to buying close allies and partners. and then with the united position deal with problems
4:30 am
from around the world. the government says they are aiming for 70 percent of the population by the end of the year. ah again, peter, i'll be here and how you top stories on al jazeera armine as can't take a prime minister has claimed victory in sunday snap parliamentary elections. his main rival, the former president robert co sharianda blog, says it will not recognize the results from european re challenge, explains what these initial results indicate. what does this mean about voting patton's and armenia? the last polls opinion polls that were done before election day put.
14 Views
Uploaded by TV Archive on
![](http://athena.archive.org/0.gif?kind=track_js&track_js_case=control&cache_bust=2044367135)