

SUBSCRIBE TO OUR FREE NEWSLETTER
Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox.
5
#000000
#FFFFFF
To donate by check, phone, or other method, see our More Ways to Give page.


Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox.

An Amnesty International staffer received an anonymous message in Arabic that said in part, "Can you please cover [the protest] for your brothers detained in Saudi Arabia in front of the Saudi embassy in Washington. My brother is detained in Ramadan and I am on a scholarship here so please do not link me to this." (Photo: Amnesty International)
An investigation published Wednesday by the London-based Amnesty International revealed that one of the group's staffers was "targeted by a sophisticated surveillance campaign, in what the organization suspects was a deliberate attempt to spy on its staff by a government hostile to its work," using a tool developed by the Israeli cyber intelligence firm NSO Group.
"The message sent to us seems to be part of a much broader surveillance campaign, which we suspect is being used to spy on human rights activists worldwide and prevent their vital work."
--Joshua Franco, Amnesty International
In early June--while Amnesty was campaigning for the release of six women's rights activists jailed in Saudi Arabia--a staff member received an anonymous message in Arabic on the smartphone application WhatsApp from someone who claimed their brother was detained in Saudi Arabia and requested that the group "cover" a protest in front of the Saudi embassy in Washington, D.C.
Through its investigation, Amnesty discovered that if the staffer had clicked a link included in the message, they would have unknowingly installed NSO Group's "extraordinarily invasive" Pegasus program on their smartphone.
As Joshua Franco, Amnesty International's head of technology and human rights, explained, "a smartphone infected with Pegasus is essentially controlled by the attacker--it can relay phone calls, photos, messages, and more directly to the operator."
"NSO Group is known to only sell its spyware to governments. We therefore believe that this was a deliberate attempt to infiltrate Amnesty International by a government hostile to our human rights work," Franco said. "This chilling attack on Amnesty International highlights the grave risk posed to activists around the world by this kind of surveillance technology."
Amnesty also found that another Saudi Arabia rights activist had received a similar message, and subsequent investigations "revealed that the domain link in the message belongs to a large infrastructure of more than 600 suspicious websites which had been previously connected to NSO Group." The group expressed concern that this apparent scheme "could be used to bait and spy on activists in countries including Kenya, Democratic Republic of Congo, and Hungary, in addition to the Gulf."
"The message sent to us seems to be part of a much broader surveillance campaign, which we suspect is being used to spy on human rights activists worldwide and prevent their vital work," Franco warned. "We are working with human rights activists to help them protect themselves against similar cowardly attacks, and ensure that abusive governments cannot use technology to silence them."
In a statement to Amnesty, NSO Group said the company "develops cyber technology to allow government agencies to identify and disrupt terrorist and criminal plots. Our product is intended to be used exclusively for the investigation and prevention of crime and terrorism. Any use of our technology that is counter to that purpose is a violation of our policies, legal contracts, and the values that we stand for as a company."
Dear Common Dreams reader, It’s been nearly 30 years since I co-founded Common Dreams with my late wife, Lina Newhouser. We had the radical notion that journalism should serve the public good, not corporate profits. It was clear to us from the outset what it would take to build such a project. No paid advertisements. No corporate sponsors. No millionaire publisher telling us what to think or do. Many people said we wouldn't last a year, but we proved those doubters wrong. Together with a tremendous team of journalists and dedicated staff, we built an independent media outlet free from the constraints of profits and corporate control. Our mission has always been simple: To inform. To inspire. To ignite change for the common good. Building Common Dreams was not easy. Our survival was never guaranteed. When you take on the most powerful forces—Wall Street greed, fossil fuel industry destruction, Big Tech lobbyists, and uber-rich oligarchs who have spent billions upon billions rigging the economy and democracy in their favor—the only bulwark you have is supporters who believe in your work. But here’s the urgent message from me today. It's never been this bad out there. And it's never been this hard to keep us going. At the very moment Common Dreams is most needed, the threats we face are intensifying. We need your support now more than ever. We don't accept corporate advertising and never will. We don't have a paywall because we don't think people should be blocked from critical news based on their ability to pay. Everything we do is funded by the donations of readers like you. When everyone does the little they can afford, we are strong. But if that support retreats or dries up, so do we. Will you donate now to make sure Common Dreams not only survives but thrives? —Craig Brown, Co-founder |
An investigation published Wednesday by the London-based Amnesty International revealed that one of the group's staffers was "targeted by a sophisticated surveillance campaign, in what the organization suspects was a deliberate attempt to spy on its staff by a government hostile to its work," using a tool developed by the Israeli cyber intelligence firm NSO Group.
"The message sent to us seems to be part of a much broader surveillance campaign, which we suspect is being used to spy on human rights activists worldwide and prevent their vital work."
--Joshua Franco, Amnesty International
In early June--while Amnesty was campaigning for the release of six women's rights activists jailed in Saudi Arabia--a staff member received an anonymous message in Arabic on the smartphone application WhatsApp from someone who claimed their brother was detained in Saudi Arabia and requested that the group "cover" a protest in front of the Saudi embassy in Washington, D.C.
Through its investigation, Amnesty discovered that if the staffer had clicked a link included in the message, they would have unknowingly installed NSO Group's "extraordinarily invasive" Pegasus program on their smartphone.
As Joshua Franco, Amnesty International's head of technology and human rights, explained, "a smartphone infected with Pegasus is essentially controlled by the attacker--it can relay phone calls, photos, messages, and more directly to the operator."
"NSO Group is known to only sell its spyware to governments. We therefore believe that this was a deliberate attempt to infiltrate Amnesty International by a government hostile to our human rights work," Franco said. "This chilling attack on Amnesty International highlights the grave risk posed to activists around the world by this kind of surveillance technology."
Amnesty also found that another Saudi Arabia rights activist had received a similar message, and subsequent investigations "revealed that the domain link in the message belongs to a large infrastructure of more than 600 suspicious websites which had been previously connected to NSO Group." The group expressed concern that this apparent scheme "could be used to bait and spy on activists in countries including Kenya, Democratic Republic of Congo, and Hungary, in addition to the Gulf."
"The message sent to us seems to be part of a much broader surveillance campaign, which we suspect is being used to spy on human rights activists worldwide and prevent their vital work," Franco warned. "We are working with human rights activists to help them protect themselves against similar cowardly attacks, and ensure that abusive governments cannot use technology to silence them."
In a statement to Amnesty, NSO Group said the company "develops cyber technology to allow government agencies to identify and disrupt terrorist and criminal plots. Our product is intended to be used exclusively for the investigation and prevention of crime and terrorism. Any use of our technology that is counter to that purpose is a violation of our policies, legal contracts, and the values that we stand for as a company."
An investigation published Wednesday by the London-based Amnesty International revealed that one of the group's staffers was "targeted by a sophisticated surveillance campaign, in what the organization suspects was a deliberate attempt to spy on its staff by a government hostile to its work," using a tool developed by the Israeli cyber intelligence firm NSO Group.
"The message sent to us seems to be part of a much broader surveillance campaign, which we suspect is being used to spy on human rights activists worldwide and prevent their vital work."
--Joshua Franco, Amnesty International
In early June--while Amnesty was campaigning for the release of six women's rights activists jailed in Saudi Arabia--a staff member received an anonymous message in Arabic on the smartphone application WhatsApp from someone who claimed their brother was detained in Saudi Arabia and requested that the group "cover" a protest in front of the Saudi embassy in Washington, D.C.
Through its investigation, Amnesty discovered that if the staffer had clicked a link included in the message, they would have unknowingly installed NSO Group's "extraordinarily invasive" Pegasus program on their smartphone.
As Joshua Franco, Amnesty International's head of technology and human rights, explained, "a smartphone infected with Pegasus is essentially controlled by the attacker--it can relay phone calls, photos, messages, and more directly to the operator."
"NSO Group is known to only sell its spyware to governments. We therefore believe that this was a deliberate attempt to infiltrate Amnesty International by a government hostile to our human rights work," Franco said. "This chilling attack on Amnesty International highlights the grave risk posed to activists around the world by this kind of surveillance technology."
Amnesty also found that another Saudi Arabia rights activist had received a similar message, and subsequent investigations "revealed that the domain link in the message belongs to a large infrastructure of more than 600 suspicious websites which had been previously connected to NSO Group." The group expressed concern that this apparent scheme "could be used to bait and spy on activists in countries including Kenya, Democratic Republic of Congo, and Hungary, in addition to the Gulf."
"The message sent to us seems to be part of a much broader surveillance campaign, which we suspect is being used to spy on human rights activists worldwide and prevent their vital work," Franco warned. "We are working with human rights activists to help them protect themselves against similar cowardly attacks, and ensure that abusive governments cannot use technology to silence them."
In a statement to Amnesty, NSO Group said the company "develops cyber technology to allow government agencies to identify and disrupt terrorist and criminal plots. Our product is intended to be used exclusively for the investigation and prevention of crime and terrorism. Any use of our technology that is counter to that purpose is a violation of our policies, legal contracts, and the values that we stand for as a company."