{"id":4801,"date":"2016-08-26T10:57:24","date_gmt":"2016-08-26T15:57:24","guid":{"rendered":"http:\/\/huewhite.com\/umb\/?p=4801"},"modified":"2016-08-26T10:57:24","modified_gmt":"2016-08-26T15:57:24","slug":"trident","status":"publish","type":"post","link":"https:\/\/huewhite.com\/umb\/2016\/08\/26\/trident\/","title":{"rendered":"Trident"},"content":{"rendered":"<p><em><strong>Lookout Blog<\/strong><\/em> is dedicated to tracking spyware and the vulnerabilities they use to accomplish their tasks. A <a href=\"https:\/\/blog.lookout.com\/blog\/2016\/08\/25\/trident-pegasus\/\" target=\"_blank\">recent posting<\/a> details how governments may use spyware against those who threaten the power-base:<\/p>\n<blockquote><p>Ahmed Mansoor is an internationally recognized human rights defender and a <a href=\"https:\/\/www.amnesty.org\/en\/latest\/news\/2015\/10\/ahmed-mansoor-selected-as-the-2015-laureate-martin-ennals-award-for-human-rights-defenders\/\">Martin Ennals Award Laureate<\/a> (sometimes referred to as a \u201c<a href=\"http:\/\/www.lemonde.fr\/asie-pacifique\/article\/2008\/11\/24\/le-combat-de-mutabar-tadjibaeva-survivante-des-geoles-de-tachkent_1122352_3216.html\">Nobel prize for human rights<\/a>\u201d), based in the United Arab Emirates (UAE). On August 10th and 11th, he received text messages promising \u201csecrets\u201d about detainees tortured in UAE jails if he clicked on an included link. Instead of clicking, Mansoor sent the messages to Citizen Lab researchers. Recognizing the links as belonging to an exploit infrastructure connected to NSO group, Citizen Lab collaborated with Lookout to determine that the links led to a chain of zero-day exploits that would have jailbroken Mansoor\u2019s iPhone and installed sophisticated malware.<\/p>\n<p>This marks the third time Mansoor has been targeted with \u201clawful intercept\u201d malware. <a href=\"https:\/\/citizenlab.org\/2012\/10\/backdoors-are-forever-hacking-team-and-the-targeting-of-dissent\/\">Previous Citizen Lab research<\/a> found that in 2011 he was targeted with FinFisher spyware, and in 2012 with Hacking Team spyware. The use of such expensive tools against Mansoor shows the lengths that governments are willing to go to target activists.<\/p>\n<p>Citizen Lab also found evidence that state-sponsored actors used NSO\u2019s exploit infrastructure against a Mexican journalist who reported on corruption by Mexico\u2019s head of state, and an unknown target or targets in Kenya.<\/p>\n<p>The NSO group used fake domains, impersonating sites such as the International Committee for the Red Cross, the U.K. government\u2019s visa application processing website, and a wide range of news organizations and major technology companies. This nods toward the targeted nature of this software.<\/p><\/blockquote>\n<p>It&#8217;s interesting &#8211; and depressing &#8211; to note how a government operates at one level of civilization, while a journalist might be argued is unique to another level of civilization. The more barbarian government operates against its own citizen\/journalist using the most modern of tools in order to preserve its power.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Lookout Blog is dedicated to tracking spyware and the vulnerabilities they use to accomplish their tasks. A recent posting details how governments may use spyware against those who threaten the power-base: Ahmed Mansoor is an internationally recognized human rights defender and a Martin Ennals Award Laureate (sometimes referred to as \u2026 <a class=\"continue-reading-link\" href=\"https:\/\/huewhite.com\/umb\/2016\/08\/26\/trident\/\"> Continue reading <span class=\"meta-nav\">&rarr; <\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4801","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts\/4801","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/comments?post=4801"}],"version-history":[{"count":1,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts\/4801\/revisions"}],"predecessor-version":[{"id":4802,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts\/4801\/revisions\/4802"}],"wp:attachment":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/media?parent=4801"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/categories?post=4801"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/tags?post=4801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}