Artwork

Content provided by Boris Goryachev and Медуза / Meduza. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Boris Goryachev and Медуза / Meduza or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.
Player FM - Aplicație Podcast
Treceți offline cu aplicația Player FM !

The Pegasus spyware attack on Meduza

48:48
 
Distribuie
 

Manage episode 377102134 series 2576702
Content provided by Boris Goryachev and Медуза / Meduza. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Boris Goryachev and Медуза / Meduza or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.

On June 23, 2023, hours before Yevgeny Prigozhin would shock the world by staging a mutiny against the Russian military, Meduza co-founder and CEO Galina Timchenko learned that her iPhone had been infected months earlier with “Pegasus.” The spyware’s Israeli designers market the product as a crimefighting super-tool against “terrorists, criminals, and pedophiles,” but states around the world have abused Pegasus to track critics and political adversaries who sometimes end up arrested or even murdered. Access to Pegasus isn’t cheap: Researchers believe the service costs tens of millions of dollars, meaning that somebody — some government agency out there — paid maybe a million bucks to hijack Timchenko’s smartphone. Why would somebody do that? How would somebody do that? And who could have done it?

For answers, The Naked Pravda turned to two experts: Natalia Krapiva, tech-legal counsel for Access Now, a nonprofit organization committed to “defending and extending” the digital civil rights of people worldwide, and John Scott-Railton, a senior researcher at Citizen Lab, an interdisciplinary laboratory at the University of Toronto that investigates digital espionage against civil society.

Timestamps for this episode:

  • (3:39) Galina Timchenko’s hacked iPhone is the first confirmed case of a Pegasus infection against a Russian journalist
  • (6:16) NSO Group’s different contract tiers for Pegasus users
  • (9:59) How aware is NSO Group of Pegasus’s rampant misuse?
  • (12:29) Why hasn’t Europe done more to restrict the use of such spyware?
  • (15:50) Russian allies using Pegasus
  • (17:58) E.U. members using Pegasus
  • (21:37) Training required to use Pegasus and the spyware’s technical side
  • (27:38) The forensics needed to detect a Pegasus infection
  • (35:46) Is Pegasus built more to find criminals or members of civil society?
  • (40:10) Imagining a global moratorium on military-grade spyware
  • (43:22) “A German solution”
  • (45:14) Where the West goes from here

Как поддержать нашу редакцию — даже если вы в России и вам очень страшно

  continue reading

170 episoade

Artwork

The Pegasus spyware attack on Meduza

The Naked Pravda

452 subscribers

published

iconDistribuie
 
Manage episode 377102134 series 2576702
Content provided by Boris Goryachev and Медуза / Meduza. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Boris Goryachev and Медуза / Meduza or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.

On June 23, 2023, hours before Yevgeny Prigozhin would shock the world by staging a mutiny against the Russian military, Meduza co-founder and CEO Galina Timchenko learned that her iPhone had been infected months earlier with “Pegasus.” The spyware’s Israeli designers market the product as a crimefighting super-tool against “terrorists, criminals, and pedophiles,” but states around the world have abused Pegasus to track critics and political adversaries who sometimes end up arrested or even murdered. Access to Pegasus isn’t cheap: Researchers believe the service costs tens of millions of dollars, meaning that somebody — some government agency out there — paid maybe a million bucks to hijack Timchenko’s smartphone. Why would somebody do that? How would somebody do that? And who could have done it?

For answers, The Naked Pravda turned to two experts: Natalia Krapiva, tech-legal counsel for Access Now, a nonprofit organization committed to “defending and extending” the digital civil rights of people worldwide, and John Scott-Railton, a senior researcher at Citizen Lab, an interdisciplinary laboratory at the University of Toronto that investigates digital espionage against civil society.

Timestamps for this episode:

  • (3:39) Galina Timchenko’s hacked iPhone is the first confirmed case of a Pegasus infection against a Russian journalist
  • (6:16) NSO Group’s different contract tiers for Pegasus users
  • (9:59) How aware is NSO Group of Pegasus’s rampant misuse?
  • (12:29) Why hasn’t Europe done more to restrict the use of such spyware?
  • (15:50) Russian allies using Pegasus
  • (17:58) E.U. members using Pegasus
  • (21:37) Training required to use Pegasus and the spyware’s technical side
  • (27:38) The forensics needed to detect a Pegasus infection
  • (35:46) Is Pegasus built more to find criminals or members of civil society?
  • (40:10) Imagining a global moratorium on military-grade spyware
  • (43:22) “A German solution”
  • (45:14) Where the West goes from here

Как поддержать нашу редакцию — даже если вы в России и вам очень страшно

  continue reading

170 episoade

Все серии

×
 
Loading …

Bun venit la Player FM!

Player FM scanează web-ul pentru podcast-uri de înaltă calitate pentru a vă putea bucura acum. Este cea mai bună aplicație pentru podcast și funcționează pe Android, iPhone și pe web. Înscrieți-vă pentru a sincroniza abonamentele pe toate dispozitivele.

 

Ghid rapid de referință