No products in the cart.

News

New York Times: How Spy Tech Firms Let Governments See Everything on a Smartphone

Oath Keepers salutes Patrick Wood of Technocracy News for fetching this one.


 

Above image courtesy of The New York Times / Getty Images.  Caption: There are dozens of digital spying companies that can track everything a target does on a smartphone. Credit Spencer Platt/Getty Images


 

How Spy Tech Firms Let Governments See Everything on a Smartphone

SAN FRANCISCO — Want to invisibly spy on 10 iPhone owners without their knowledge? Gather their every keystroke, sound, message and location? That will cost you $650,000, plus a $500,000 setup fee with an Israeli outfit called the NSO Group. You can spy on more people if you would like — just check out the company’s price list.

The NSO Group is one of a number of companies that sell surveillance tools that can capture all the activity on a smartphone, like a user’s location and personal contacts. These tools can even turn the phone into a secret recording device.

Since its founding six years ago, the NSO Group has kept a low profile. But last month, security researchers caught its spyware trying to gain access to the iPhone of a human rights activist in the United Arab Emirates. They also discovered a second target, a Mexican journalist who wrote about corruption in the Mexican government.

Now, internal NSO Group emails, contracts and commercial proposals obtained by The New York Times offer insight into how companies in this secretive digital surveillance industry operate. The emails and documents were provided by two people who have had dealings with the NSO Group but would not be named for fear of reprisals.

The company is one of dozens of digital spying outfits that track everything a target does on a smartphone. They aggressively market their services to governments and law enforcement agencies around the world. The industry argues that this spying is necessary to track terrorists, kidnappers and drug lords. The NSO Group’s corporate mission statement is “Make the world a safe place.”

(Snip)

Read whole article at The New York Times:  http://www.nytimes.com/2016/09/03/technology/nso-group-how-spy-tech-firms-let-governments-see-everything-on-a-smartphone.html?_r=2

 

0

Elias Alias

Editor in Chief for Oath Keepers; Unemployed poet; Lover of Nature and Nature's beauty. Slave to all cats. Reading interests include study of hidden history, classical literature. Concerned Constitutional American. Honorably discharged USMC Viet Nam Veteran. Founder, TheMentalMilitia.Net

Oath Keepers Merchandise

5 comments

  1. Please Note: There is a related, and chilling, article in the embedded link in the article above which reads thus —

    “Caught its spyware trying to gain access”

    I recommend reading that one too. Thank you,
    Salute!
    Elias Alias, editor

  2. Relinquish your dependence on technology. Problem solved. Otherwise don’t complain, nor go on about the constitution because that document doesn’t protect jack s@#t.

  3. They are the developer of Pegasus, a spyware installable on iOS devices that allows for reading messages, emails, passwords and address lists as well as eavesdropping on phone calls, making and transmitting audio recordings and tracking the location on a compromised device. Pegasus list of surveilled programs includes Gmail, Facebook, Skype, WhatsApp, Facetime, Apple Calendar, WeChat, Viber, Message and Telegram. If you want privacy, then you know where not to tread.

  4. just want to bring to everyone’s attention to the forthcoming 2 day symposium to be held sept. 10-11, 2016 in New York on ” 911 “….I just read about it at http://www.paulcraigroberts.org He titled it, “A conference to clear the mind of the 911 brainwashing”….look at the right sidebar to see the title and link to his article on this symposium. He gives the outline of the speakers for this 2 day program…looks like it will get everyone “up to speed” on what is being done…progress made, etc.Hope some oathkeepers can attend and report back…

Comments are closed.