www.computerweekly.com
Open in
urlscan Pro
2606:4700::6812:1ec0
Public Scan
Submitted URL: https://e.zmp.techtarget.com/click?Ec3RlcGhlbi5lZHdhcmRzQHNlY3UubHU/CeyJtaWQiOiIxNzA3MzkxNjYyMDM3MzJlN2RjNmQ5ZGE4IiwiY3QiOiJ0...
Effective URL: https://www.computerweekly.com/news/366569276/Dozens-of-surveillance-companies-are-supplying-spyware-to-governments-says-Google...
Submission: On October 14 via api from LU — Scanned from DE
Effective URL: https://www.computerweekly.com/news/366569276/Dozens-of-surveillance-companies-are-supplying-spyware-to-governments-says-Google...
Submission: On October 14 via api from LU — Scanned from DE
Form analysis
1 forms found in the DOMPOST https://www.computerweekly.com/search
<form action="https://www.computerweekly.com/search" method="post" class="header-search">
<label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label>
<input class="header-search-input" id="header-search-input" type="text" placeholder="Search Computer Weekly">
<button aria-label="Search" class="header-search-submit"><i class="icon" data-icon="g"></i></button>
<ul class="ui-autocomplete ui-front ui-menu ui-widget ui-widget-content ui-corner-all" id="ui-id-1" tabindex="0" style="display: none;"></ul>
</form>
Text Content
3 Trending Now Computer Weekly – 12 March 2024: From grassroots to Wembley – how tech supports English footballDownload NowView All3 X 3Hello, these 3 documents have been trending and as a member they are free to you. * Computer Weekly – 12 March 2024: From grassroots to Wembley – how tech supports English footballDownload Now * AWS vs Azure vs Google: 5 key benefits each for cloud file storageDownload Now * Computer Weekly – 9 July 2024: How data drives decisions at BAE SystemsDownload Now Search the TechTarget Network Join CW+ Login Register Cookies * News * In Depth * Blogs * Opinion * Videos * Photo Stories * Premium Content * Webinars * Download 2024 IT salary survey RSS * IT Management * IT leadership & CW500 * IT architecture * IT efficiency * Governance * Innovation * Legislation & regulation * Operations & support * Project management * Strategy * Supplier management * Business issues * Sponsored Communities * Industry Sectors * Healthcare IT * Charity IT * Business services IT * Financial services IT * Government & public sector IT * Leisure & hospitality IT * Manufacturing IT * Media & entertainment IT * Retail IT * SME IT * Telecoms & internet * Transport & travel IT * Utilities IT * IT suppliers * Technology Topics Datacentre View All * Clustering for high availability and HPC * Containers * Converged infrastructure * Datacentre backup power and power distribution * Datacentre capacity planning * Datacentre cooling infrastructure * Disaster recovery/security * Green IT * Performance, monitoring and optimisation * Systems management * DevOps * IaaS * Server and Operating Systems * PaaS * Virtualisation * SaaS * Desktop virtualisation platforms Enterprise software View All * AI and automation * Blockchain * Business applications * Business intelligence * Cloud applications * Collaboration * CRM * Database * ERP * Financial applications * HR software * Middleware * Microservices * Windows * Mobile * Open source * Operating systems * SOA * Software development * Software licensing * Virtualisation * Web software IT in Europe and Middle East View All * IT in France * IT in the Nordics * IT in Benelux * IT in Germany * IT in Italy * IT in Poland * IT in Russia * IT in Spain * IT in the Middle East * IT in Turkey Information Management View All * Big data * Business intelligence and analytics * BPM * Content management * Database management * Quality/governance * Data warehousing * MDM/Integration IT in Asia-Pacific View All * IT in ASEAN * IT in Australia & New Zealand * IT in India Internet View All * Cloud * E-commerce * Internet infrastructure * Social media * Web development IT skills View All * Diversity in IT * Training * Jobs * Management skills * Technical skills Hardware View All * Chips & processors * Printers * Storage * Data centre * Mobile * Networking * PC * Servers IT security View All * Antivirus * Secure Coding and Application Programming * Continuity * Cloud security * Data Breach Incident Management and Recovery * Endpoint and NAC Protection * Cybercrime * IAM * Risk management * Network Security Management * Data protection * Compliance Regulation and Standard Requirements * Security policy and user awareness * Web Application Security IT services View All * Cloud * Consultancy * Outsourcing * Hosting * Offshore * Startups Mobile View All * Laptop * Mobile software * Mobile networking * Smartphone * Tablet Networking View All * Datacentre networking * Internet of Things * Mobile * Network hardware * Network monitoring and analysis * Network routing and switching * Network security strategy * Network software * Software-defined networking * Telecoms networks and broadband communications * Unified communications * VoIP * WAN performance and optimisation * Wireless Storage View All * AI and storage * Cloud storage * Containers and storage * Data management * Backup * Compliance and storage * Disaster recovery * Flash and SSDs * Hyper-convergence * Object storage * Disk systems * Software-defined storage * Storage switches * Storage management * Storage performance * Tape storage * Virtualisation and storage Please select a category * Datacentre * Enterprise software * IT in Europe and Middle East * Information Management * IT in Asia-Pacific * Internet * IT skills * Hardware * IT security * IT services * Mobile * Networking * Storage * Follow: * * * * ComputerWeekly.com.br * ComputerWeekly.de * ComputerWeekly.es * LeMagIT.fr * MicroScope.co.uk * Home * Regulatory compliance and standard requirements News DOZENS OF SURVEILLANCE COMPANIES ARE SUPPLYING SPYWARE TO GOVERNMENTS, SAYS GOOGLE GOOGLE’S THREAT ANALYSIS GROUP HAS IDENTIFIED 40 COMPANIES INVOLVED IN SELLING AND SUPPLYING SECURITY EXPLOITS AND SPYWARE SERVICES TO GOVERNMENTS * Share this item with your network: * * * * * * * * * * * * By * Bill Goodwin, Computer Weekly Published: 07 Feb 2024 18:20 Dozens of surveillance companies are providing spyware technology used by governments around the world to spy on the mobile phones of journalists, human rights defenders, dissidents and political opponents. Google’s Threat Analysis Group (TAG) has identified and is actively tracking up to 40 companies involved in selling security exploits and surveillance capabilities to governments with poor human rights records. The trade extends beyond well-known spyware companies, such as Israel’s NSO Group, Italy’s Cy4Gate and Intellexa in Greece, and includes an extended supply chain of smaller companies that provide surveillance capabilities. Google’s publication of the report coincided with a joint French and UK initiative, known as the Pall Mall Process, agreed at an international conference at Lancaster House in London, which aspires to introduce safeguards for the use of commercial spyware. According to Google, private sector companies – known as commercial surveillance vendors (CSVs) – rather than government intelligence and law enforcement agencies, are responsible for the majority of the most sophisticated hacking and surveillance tools detected by Google’s TAG. Out of 25 zero-day vulnerabilities – non-public security weaknesses that can allow spyware to access private data on phones or laptops – identified by Google’s researchers last year, it found 20 were being exploited by surveillance suppliers. Google is currently tracking 40 companies involved in supplying commercial surveillance services to government, though it acknowledges it is impossible to identify or count all organisations involved in the trade. CHILLING IMPACT ON DEMOCRACY AND ELECTIONS The ability of governments to buy electronic spying services off the shelf shifts the risks of surveillance away from governments to the CSVs themselves and increases the likelihood that spyware will be deployed against high-risk individuals. The report, which tells the personal stories of campaigners and activists who have been targeted by government-sponsored spyware, finds the trade in spyware has had a chilling effect on free speech and poses a threat to free and fair elections. Last year, for example, the TAG found that surveillance tools provided by Intellexa, a Greek alliance of commercial surveillance suppliers, had exploited elections and political candidates to trap targets in Indonesia and Madagascar. The company’s Predator spyware was also used in Egypt to target opposition politicians. Government demands for spyware have led to lucrative contracts for companies and individuals that make up the supply chains for commercial surveillance vendors, previously leaked documents quoted by Google have shown. A document published on a cyber crime forum, for example, revealed that Intellexa offered Nova implants to a government client to infect 10 Android or iOS phones simultaneously in the host country for €8m. For a further €1.2m, clients could opt to infect phones from five additional countries outside the host country. READ MORE ABOUT SPYWARE * Polish election questioned after Pegasus spyware used to smear opposition, investigation finds. * UK and France push for international agreement on spyware. * NSO Group faces court action after Pegasus spyware used against targets in UK. * UK sale of surveillance equipment to Macedonia raises questions over export licence policy. Most customers pay to regularly re-infect their target phones with spyware to avoid the risk of it being detected by remaining on the phone. But Intellexa also offered the option of installing persistent infections, which remain on the phone once it is shut down, for further large payments. Other CSVs have worked with internet service providers to convince users to install fake apps to gain access to customers’ data. One campaign identified by TAG in 2021 found that victims in Italy and Kazakhstan were sent SMS messages encouraging them to download fake Vodafone apps that gave the attackers access to the content of their mobile phones. CAT AND MOUSE GAMES Google and other security researchers have disrupted the business models of commercial surveillance vendors by discovering, disclosing and patching security vulnerabilities used by spyware providers. In April 2023, for example, Google disrupted Intellexa’s operations for 40 days after it released patches to fix zero-day vulnerabilities used by its spyware exploit. Although Intellexa developed a replacement zero-day exploit, that survived for just a week before Google fixed the vulnerability. Apple released a patch known as BlastDoor in its iOS 14 operating system update to make it more difficult for attackers to develop zero-click exploits against its iMessage text message service. Israeli spyware group NSO found a way around the protection by delivering payloads as PDF files disguised as graphics files. Apple addressed the problem in later updates. CSVs have continued in business despite efforts to curb their activities by governments and technology companies that have taken direct legal action against them. The NSO Group, for example, continues to operate despite sanctions from the US government and lawsuits from Meta and Apple. Google argues that further action is needed to curb the spread of commercial surveillance technologies and urges the US government to lead a diplomatic effort with countries where commercial surveillance vendors operate, and with those governments that use their service. 27 COUNTRIES BACK PALL MALL PROCESS Google, along with Meta, Microsoft and BAE Systems Digital Intelligence, are among a disparate group of 14 companies to support the Pall Mall Process, a UK and French initiative to develop safeguards and guidelines for the use of commercial surveillance services. The Pall Mall Process, agreed during a two-day conference on 6 February 2023, which was attended by 27 countries, calls for governments and private sector organisations involved in surveillance to be held accountable if their activities are not compatible with human rights law. The document states that surveillance capabilities should be used with “precision” to mitigate “unintended, illegal or irresponsible consequences”. Governments and industry suppliers should carry out due diligence assessments to ensure surveillance technology is used legally and responsibly, according to the Pall Mall document, and its use should be lawful, necessary and proportionate. The supply of surveillance capabilities, it argues, should be conducted transparently so that users and suppliers understand the supply chains involved in providing commercial surveillance and spyware. DIGITAL RIGHTS GROUPS EXCLUDED Notably absent from the supporters were a number of countries alleged to have deployed commercial spyware, including Spain, Mexico, Serbia, Egypt and Jordan. Israel, the home to NSO Group and other spyware developers, also did not attend the conference. Digital rights groups, including Amnesty International, Big Brother Watch, and others that have campaigned against and researched spyware, also did not feature among the list of attendees. Visiting professor and privacy specialist Ian Brown commented on X: “This process is really missing out on a huge section of stakeholders: the digital rights groups who’ve been working closely on this issue for over a decade.” France is due to hold a follow-up conference in 2024. SUPPORTERS OF THE PALL MALL PROCESS ON COMMERCIAL SPYWARE Countries Industry Academia and others * African Union * Australia * Belgium * Canada * Czechia * Denmark * Estonia * Finland * France * Germany * Greece * Gulf Cooperation Council * Italy * Japan * Malaysia * New Zealand * Norway * Poland * Republic of Cyprus * Republic of Ireland * Republic of Korea * Romania * Singapore * Sweden * Switzerland * UK * USA * BAE Systems Digital Intelligence * ESET * European Cyber Conflict Research Incubator CIC * Google * HackerOne * Luta Security * Margin Research * MDSec * Meta * Microsoft * NCC Group * NextJenSecurity * Sekoia.io * YesWeHack * Alejandro Pisanty * Allison Pytlak, Stimson Center * Atlantic Council * CyberPeace Institute * Gefona Digital Foundation * GEODE (French Institute of Geopolitics, University Paris 8) * ICT4Peace * Professor Nnenna Ifeanyi-Ajufo, Leeds Beckett University * Paris Peace Forum * Royal Holloway, University of London * Royal United Services Institute * Shadowserver Foundation READ MORE ON REGULATORY COMPLIANCE AND STANDARD REQUIREMENTS * RUSSIA'S APT29 USING SPYWARE EXPLOITS IN NEW CAMPAIGNS By: Alexander Culafi * U.S. CRACKS DOWN ON COMMERCIAL SPYWARE WITH VISA RESTRICTIONS By: Alexander Culafi * SPYWARE VENDORS BEHIND 75% OF ZERO-DAYS TARGETING GOOGLE By: Alexander Culafi * UK’S MCPARTLAND CYBER REVIEW TO PROBE TRUST IN TECHNOLOGY By: Alex Scroxton Latest News * AWS expands datacentre hardware recycling programme to Dublin * Half of UK tech workers planning to leave role, finds Harvey Nash * European Commission commits €865m funding for 5G, fibre networks * View All News Download Computer Weekly * In The Current Issue: * Government digital transformation will be challenged by the new era of austerity * AI disempowers logistics workers while intensifying their work Download Current Issue Latest Blog Posts * Civo details FlexCore plug-&-play private (public-ish) cloud – Open Source Insider * What to expect from UiPath Forward & TechEd 2024 – CW Developer Network * View All Blogs Related Content * UK’s McPartland Cyber Review to probe trust in ... – ComputerWeekly.com * UK and France push for international agreement on ... – ComputerWeekly.com * Google: Spyware vendors are driving zero-day ... – Security Latest TechTarget resources * CIO * Security * Networking * Data Center * Data Management CIO * For Sharp HealthCare, cloud technology comes with autonomy Sharp HealthCare's cloud strategy spans public, private and SaaS platforms to reduce vendor dependency and emphasizes knowledge ... * DOJ focuses on AI in search, weighs Google breakup While the DOJ assesses remedies for Google's illegal control over online search, it's also heavily focused on AI and the future. * Key technical debt reduction strategies Suboptimal software fixes cost time and money as well as strain departments throughout the organization. Here's how to develop ... Security * Zero-day flaw behind Rackspace breach still a mystery More than two weeks after threat actors exploited a zero-day vulnerability in a third-party utility to breach Rackspace, the ... * FTC orders Marriott to pay $52M and enhance security practices The Federal Trade Commission says an investigation revealed that poor security practices led to three data breaches at Marriott ... * OpenAI details how threat actors are abusing ChatGPT While threat actors are using generative AI tools like ChatGPT to run election influence operations and develop malware, OpenAI ... Networking * What AI capabilities do network tools need? AI networking tools have many beneficial capabilities. When evaluating AI tools, engineers should prioritize the specific ... * The future of Wi-Fi 7 adoption in enterprises Wi-Fi 7 promises faster speeds and better performance, but complexities in deployment and limited device compatibility have ... * The push to make network engineering cool again What does it mean to make networking cool again? To most network engineers, it means building awareness about networking and ... Data Center * Data center providers design for severe weather surge Data center providers are investing in resilient infrastructure and redundant power to prevent extreme weather-related outages ... * Dell expands AI Factory with new AMD servers Dell adds to its AI Factory, extending its services and hardware to cover new AMD-based servers in its push to provide ways to ... * HCL vs. JSON: Configuration language uses, pros and cons HCL and JSON are similar configuration languages. These languages are meant for specific IaC scenarios, so companies should ... Data Management * 9 metadata management standards examples that guide success Organizations looking to implement metadata management can choose from existing standards that support archiving, sciences, ... * Snowflake the engine for fintech firm's AI transformation Specialist TS Imagine is using the data platform vendor's Cortex capabilities to extract value from unstructured data and become ... * Alation launches AI governance suite to meet rising need With interest in generative AI increasing, the vendor's new suite aims to help enterprises both mitigate risks as well as ... * About Us * Editorial Ethics Policy * Meet The Editors * Contact Us * Our Use of Cookies * Advertisers * Business Partners * Media Kit * Corporate Site * Contributors * Reprints * Answers * E-Products * Events * In Depth * Guides * Opinions * Quizzes * Photo Stories * Tips * Tutorials * Videos * Computer Weekly Topics All Rights Reserved, Copyright 2000 - 2024, TechTarget Privacy Policy Cookie Preferences Cookie Preferences Do Not Sell or Share My Personal Information Close