foreignpolicy.com Open in urlscan Pro
192.0.66.136  Public Scan

URL: https://foreignpolicy.com/2018/10/19/the-kingdoms-hackers-and-bots-saudi-dissident-khashoggi/
Submission: On September 09 via manual from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET /

<form role="search" method="get" id="searchform-mobile" class="searchform" action="/">
  <label class="hide" for="searchfield-mobile">Search</label>
  <input class="search" type="search" name="s" id="searchfield-mobile">
  <input type="submit" value="search-submit" style="display:none">
</form>

GET /

<form role="search" method="get" id="searchform-desktop" class="searchform" action="/">
  <label class="hide" for="searchfield-desktop">Search</label>
  <input class="search" type="search" name="s" id="searchfield-desktop">
  <input type="submit" value="search-submit" style="display:none">
</form>

Text Content

Foreign Policy Magazine
 * Sign In
 * Subscribe Subscribe Upgrade to Insider Upgrade to Insider

 * Latest
 * News
 * Analysis
 * Podcasts
 * The Magazine
 * Channels
   * Economics
   * Security
   * Shadow Government
   * Her Power
     Close
 * Newsletters
 * Events

Your FP Insider Access:

 * Power Maps
 * FP Live
 * Special Reports

Search


LATEST


TALK OF A NUCLEAR DETERRENT IN SOUTH KOREA

North Korea’s resumed activity at Yongbyon has reawakened calls for Seoul to go
nuclear.

Report | Morten Soendergaard Larsen


WESTERN POWERS WARY OF IRAN’S NUCLEAR COMMITMENT

Iran’s president said he’s open to “goal-oriented negotiations,” but the West
fears stalling tactics.

Morning Brief | Colm Quinn


CONGRESS PRESSES WHITE HOUSE TO TAKE CONTROL OF PACIFIC ISLAND TALKS

China is building military bases all over the Pacific. U.S. access is hung up
over decades-old nuclear tests.

Report | Jack Detsch, Zinya Salfiti


THE STRATEGIC LOGIC OF A FOREVER WAR

The United States should have ignored sunk costs in Afghanistan and maintained a
light military footprint.

Argument | Leo Blanken, Stephen Rodriguez
See All Stories
 * FP Events
 * FP Studios
 * FP Analytics
 * FP PeaceGames

 * Subscription Services
 * Reprint Permissions
 * Writer’s Guidelines
 * Work at FP

 * FP Guides – Graduate Education
 * FP For Education
 * FP Archive
 * Buy Back Issues

 * Meet the Staff
 * Advertising/Partnerships
 * Contact Us
 * Privacy Policy

 * Sign In
 * Subscribe Subscribe Upgrade to Insider Upgrade

Search
Toggle display of website navigation

Report: The Kingdom’s Hackers and Bots The Kingdom’s Hackers and Bots...

SHARE:



REPORT


THE KINGDOM’S HACKERS AND BOTS


SAUDI ARABIA IS USING CUTTING-EDGE TECHNOLOGY TO TRACK DISSIDENTS AND STIFLE
DISSENT.

By Elias Groll
A security official waits in front of the door of the Saudi Arabian consulate in
Istanbul on Oct. 17. (Ozan Kose/AFP/Getty Images)
October 19, 2018, 7:00 PM

In June of this year, Saudi dissident Omar Abdulaziz, who lives in exile in
Canada, received a text message purporting to be from the courier company DHL. A
package he had ordered would be delivered in a few days, it said. If he wished
to track the delivery he could tap a link.

Abdulaziz didn’t think much about the message, but a research group determined
later that clicking the link would have installed a powerful Israeli-made
surveillance tool that would have allowed its operator to listen in on
Abdulaziz’s phone calls, read his text messages, and turn on the phone’s camera
and microphone.

In a report earlier this month, the group, Toronto-based Citizen Lab, concluded
“with high confidence” that Abdulaziz’s phone had been infected with the
surveillance tool. It pointed to Saudi Arabia as the likely culprit.



In June of this year, Saudi dissident Omar Abdulaziz, who lives in exile in
Canada, received a text message purporting to be from the courier company DHL. A
package he had ordered would be delivered in a few days, it said. If he wished
to track the delivery he could tap a link.

Abdulaziz didn’t think much about the message, but a research group determined
later that clicking the link would have installed a powerful Israeli-made
surveillance tool that would have allowed its operator to listen in on
Abdulaziz’s phone calls, read his text messages, and turn on the phone’s camera
and microphone.

In a report earlier this month, the group, Toronto-based Citizen Lab, concluded
“with high confidence” that Abdulaziz’s phone had been infected with the
surveillance tool. It pointed to Saudi Arabia as the likely culprit.

Abdulaziz is a pro-democracy activist with a large Twitter following. He
collaborated with Saudi journalist Jamal Khashoggi on a range of projects until
earlier this month, when Khashoggi disappeared into the Saudi consulate in
Istanbul—apparently killed by Saudi officials.

You can support Foreign Policy by becoming a subscriber.

Subscribe Today

Following Khashoggi’s disappearance—Saudi officials confirmed on Friday that he
was killed in the consulate but said his death stemmed from a fight—the bugging
operation against Abdulaziz has taken on new significance. It highlights the way
Saudi Arabia is using high-tech tools to silence dissidents far from its
shores—and stifle dissent.



According to experts who study Riyadh’s use of digital surveillance and
propaganda, Saudi Arabia has deployed both spyware against critics of the regime
and Twitter bots as part of its effort to maintain its grip on power, monitor
dissident voices, and control its domestic public sphere.

One of the Saudis apparently knowledgeable in the use of surveillance software,
Maher Abdulaziz Mutreb, has been described as an official close to Crown Prince
Mohammed bin Salman. Mutreb also appears to have played a role in Khashoggi’s
death, according to evidence compiled by Turkish authorities. He was spotted
entering the Saudi consulate in Istanbul shortly before Khashoggi. According to
emails published by WikiLeaks in 2015, Mutreb and other Saudi officials were due
to receive training in the use of spyware similar to what the Israeli firm NSO
markets from the Italian company Hacking Team.

Abdulaziz appeared on Riyadh’s radar during the Arab Spring uprisings. He
created a YouTube show that satirized Saudi Arabia’s leadership. And with the
benefit of hindsight, Abdulaziz said it is obvious to him he was being spied on.
Earlier this year, he said, Saudi officials traveled to Montreal and tried to
persuade him to return to his home country, offering money and employment. When
Abdulaziz refused, authorities in Saudi Arabia detained his brother repeatedly.

“He was telling me, ‘Please, stop what you are doing! Please shut down your
activities! They know everything about you!’” Abdulaziz said in an interview,
referring to his conversation with his brother.

The surveillance of Abdulaziz was first revealed on Oct. 1 by Citizen Lab, a
collective of hackers and academics housed at the University of Toronto that
exposes state-backed digital espionage campaigns. The spyware that likely
infected Abdulaziz’s phone was made by NSO and is dubbed Pegasus. Though it is
impossible to determine conclusively that Saudi authorities were behind the
campaign, the evidence points to Riyadh.

Read More

As sophisticated spyware has proliferated around the globe, Saudi Arabia has
emerged as one of its biggest users. Among other known cases, Saudi Arabia is
believed to have used NSO software to target a Saudi dissident living in London
and an Amnesty International staffer.  

Bill Marczak, a senior research fellow at Citizen Lab, said Saudi Arabia has
deployed Pegasus in a large number of countries, including Bahrain, Canada,
Egypt, France, Iraq, Jordan, Lebanon, Morocco, Qatar, Saudi Arabia, Turkey, and
the United Kingdom.

“It is possible that the Saudis were using it pretty recklessly,” he said.



Riyadh has also deployed a sizable bot army to control the online narrative and
drown out criticism of the regime.

Its bots have ensured that Arabic pro-regime hashtags—such as
#UnfollowEnemiesOfTheNation, #MessageOfLoveForMohammedBinSalman, and
#CampaignToCloseDownTheChannelOfDiscord, a reference to television network Al
Jazeera—dominate the Saudi trending lists, according to Marc Owen Jones, a
lecturer at University of Exeter who studies Middle Eastern propaganda.

On Thursday, Twitter took down a bot network that was promoting pro-Saudi
talking points.

According to data collected by Jones, some 70 to 80 percent of Arabic-language
tweets containing the word “Saudi” in the past four months were posted by bots.

Bot activity is often accompanied by harassment, and Saudi activists working
online frequently find themselves under attack by pro-regime accounts.

This flood of messages makes it difficult for dissident voices to break through.
“There are so many people who are sick of Twitter in the Middle East and the
Gulf, because it has become a bit of a wasteland,” Jones said. “Not just because
security services are on it, but because it’s so much spam, so many bots.”

Saudi activists have dubbed these bot accounts “the fly army.” Before
Khashoggi’s death, he and Abdulaziz discussed creating a counterpoint to the
regime’s propaganda machine—a network of pro-democracy activists who would post
and amplify one another’s messages about Saudi political issues.

“We are going to talk about the dissidents, the political prisoners, freedom of
speech, human rights. We are going to make people aware of what’s really
happening,” Abdulaziz said.



He and Khashoggi had a name for the nascent force—the bee army.



 Twitter: @EliasGroll
Tags: Cyber Security & Hacking, Saudi Arabia
Latest


TALK OF A NUCLEAR DETERRENT IN SOUTH KOREA

September 9, 2021, 11:50 AM


WESTERN POWERS WARY OF IRAN’S NUCLEAR COMMITMENT

September 9, 2021, 4:47 AM


CONGRESS PRESSES WHITE HOUSE TO TAKE CONTROL OF PACIFIC ISLAND TALKS

September 8, 2021, 5:06 PM


BRITAIN’S ROLE IN THE AFGHAN DEBACLE

September 8, 2021, 4:40 PM


THE STRATEGIC LOGIC OF A FOREVER WAR

September 8, 2021, 4:14 PM
See All Stories

Trending

 1. 1
    How the U.S. Got 9/11 Wrong
 2. 2
    Did 9/11 Change the United States?
 3. 3
    Are Indo-Russian Ties the Next Casualty of Great-Power Shifts?
 4. 4
    Why China Is Cracking Down on Video Games
 5. 5
    Congress Presses White House to Take Control of Pacific Island Talks





MORE FROM FOREIGN POLICY


CHINA AND THE TALIBAN BEGIN THEIR ROMANCE

Beijing has its eyes set on using Afghanistan as a strategic corridor once U.S.
troops are out of the way.


THE TALIBAN ARE BREAKING BAD

Meth is even more profitable than heroin—and is turbocharging the insurgency.


BELARUS’S UNLIKELY NEW LEADER

Sviatlana Tsikhanouskaya didn’t set out to challenge a brutal dictatorship.


WHAT THE TALIBAN TAKEOVER MEANS FOR INDIA

Kabul’s swift collapse leaves New Delhi with significant security concerns.


TRENDING


 1. HOW THE U.S. GOT 9/11 WRONG
    
    Analysis | Michael Hirsh


 2. DID 9/11 CHANGE THE UNITED STATES?
    
    Analysis | FP Contributors


 3. ARE INDO-RUSSIAN TIES THE NEXT CASUALTY OF GREAT-POWER SHIFTS?
    
    Analysis | C. Raja Mohan


 4. WHY CHINA IS CRACKING DOWN ON VIDEO GAMES
    
    China Brief | James Palmer


 5. CONGRESS PRESSES WHITE HOUSE TO TAKE CONTROL OF PACIFIC ISLAND TALKS
    
    Report | Jack Detsch, Zinya Salfiti

Latest


TALK OF A NUCLEAR DETERRENT IN SOUTH KOREA

September 9, 2021, 11:50 AM


WESTERN POWERS WARY OF IRAN’S NUCLEAR COMMITMENT

September 9, 2021, 4:47 AM


CONGRESS PRESSES WHITE HOUSE TO TAKE CONTROL OF PACIFIC ISLAND TALKS

September 8, 2021, 5:06 PM


BRITAIN’S ROLE IN THE AFGHAN DEBACLE

September 8, 2021, 4:40 PM


THE STRATEGIC LOGIC OF A FOREVER WAR

September 8, 2021, 4:14 PM
See All Stories

Sign up for Morning Brief


FOREIGN POLICY’S FLAGSHIP DAILY NEWSLETTER WITH WHAT’S COMING UP AROUND THE
WORLD TODAY FROM FOREIGN POLICY’S NEWSLETTER WRITER COLM QUINN.


Enter your email Sign Up
✓ Signed Up Unsubscribe

By signing up, I agree to the Privacy Policy and Terms of Use and to
occasionally receive special offers from Foreign Policy.





By using this website, you agree to our use of cookies. This use includes
personalization of content and ads, and traffic analytics. Review our Privacy
Policy for more information.

 * FP Events
 * FP Studios
 * FP Analytics
 * FP PeaceGames

 * Subscription Services
 * Reprint Permissions
 * Writer’s Guidelines
 * Work at FP

 * FP Guides – Graduate Education
 * FP For Education
 * FP Archive
 * Buy Back Issues

 * Meet the Staff
 * Advertising/Partnerships
 * Contact Us
 * Privacy Policy

Powered by WordPress VIP
© 2021, The Slate Group