Consider this: your mobile phone is sending a steady stream of private information and location coordinates to an unknown entity that has included your name on a list of targets to be monitored.
Your computer allows those with a set of sophisticated, expensive spyware tools to access your digital life, from saved photos and chat messages to watching and listening to you using your device’s camera and microphone. This massive breach of privacy is virtually undetectable and untraceable.
Now imagine such tools in the hands of the state’s security apparatus.
In a recent report, Privacy International (PI), an organization focused on privacy intrusions, asserted that the government had obtained such surveillance tools from multiple sources, including Ericsson, Alcatel, Huawei, SS8 and Utimaco. There is increasing concern that local Law Enforcement Agencies (LEAs) and intelligence agencies have the ability to intrude into a range of devices to capture data, encrypted or otherwise.
One software that enables such high-level spying is Remote Control System (RCS) — a ‘cyber security’ solution developed by Hacking Team (HT), an Italian IT company notorious for its spy tools that have been sold to countries as far and wide as Sudan, Bahrain, Saudi Arabia, India, Mexico and Russia.
RCS primarily works through the installation of malware, a malicious programme that is remotely transmitted to a device and then used to transfer private data through an internet connection.
Aside from allowing access to photos, emails, chat conversations, social media accounts and passwords, the software can tap phone and Skype calls, take photographs using the infected device’s camera and switch on a device’s microphone – all without the user’s knowledge, and without affecting a device’s battery life.
HT boastfully claims to equip law enforcement agencies solely to “fight crime hidden in the new encrypted digital world”. It repeatedly asserts its RCS hacking software is lawful, and “critical to the work of preventing and investigating crime and terrorism…we serve over 50 clients in more than 30 countries; we have been the first movers and leaders since 2004.”
It was perhaps this notoriety and success that led to HT itself being hacked in July by an anonymous hacker who released 400GB of the company’s data online, of which one million emails have been compiled into a public archive by Wikileaks.
In an attempt at damage control, HT published a message from CEO & Founder David Vincenzetti who admitted there was a security breach, adding that, “the attack on our company was a reckless and vicious crime.”
With HT acknowledging the data leak, the controversial surveillance company’s detailed liaison with global customers has been laid bare - and among the emails are over 1,000 exchanges with a set of actors who claim to be Pakistani contractors representing various state institutions.
Against the backdrop of Privacy International’s report detailing Pakistan’s desire to build a mass surveillance system, these emails reinforce the idea that some elements within Pakistan have purchased, or are in the process of acquiring intrusive hacking tools such as RCS using the names of top LEAs and intelligence agencies.
The email exchanges run from 2011, where HT staff discuss doing business with Pakistan, in which it sees an “exceptional customer”, up to May 2015 where a contractor claims he has received demands from local agencies for surveillance equipment that can be integrated into unmanned air vehicles (drones) and land vehicles.
With many email chains ending abruptly or switching over to phone calls and private meetings online or abroad, the status of RCS being actively used inside Pakistan is currently unknown.
In the examination of emails that follows, the years long exchanges between Pakistan's contractors and HT reveals how the business of surveillance operates, and the dangers it poses.
Leaked email exchanges between Hacking Team (HT) and Pakistani contractors vying for their controversial Remote Control System (RCS) surveillance tool provide insight into how the business of cyber security operates behind closed doors.
The story, which begins in 2011, is one of intrigue and troubling intentions on the part of both buyer and seller.
January 21: HT Sales Manager Marco Bettini sends an email forward to Key Account Manager Mostapha Maanna with the subject: Visiting you in Islamabad.
The original email chain is dated back to 2009, its contents being a lengthy exchange between one Zeeshan Zakaria who says he represents Lahore-based Zakimpex. He is talking to members of HT, including Mostapha Maanna and CEO and Founder David Vincenzetti.
The conversation begins with Mostapha demanding to know the agency Zeeshan claims to represent in Pakistan. He adds:
“By the way, I already know the name of this company’s customer."
Hoping to secure a deal and take a cut as the middleman, Zeeshan says his customer is the National Police Bureau. He provides a list of names with designations, including one DIG and multiple SSPs, to get HT’s attention.
Mostapha thanks him for the “clear answer”, and recommends Zeeshan and his customer attend the Intelligence Support Systems (ISS) conference — a global gathering focused on security, law enforcement and intelligence — in Dubai. He says HT will arrange for a demo of RCS hacking capabilities there. David chimes in with a promise to show the customer “a private demonstration of our mobile eavesdropping modules”.
Zeeshan tries to persuade HT to visit Pakistan, but David is clear on the subject: “To my understanding we had decided not to meet in Pakistan (too dangerous) but to meet in Dubai instead.” There is a flurry of emails covering logistics for the Dubai visit, which ends abruptly when Zeeshan names two technical assistance officers of the Federal Ministry of Interior as his travel companions.
It is unclear whether the meeting takes place.
Why this old email chain is forwarded on January 21, 2011 becomes clear as the year progresses — HT is now actively interested in entering the Pakistan market.
February 2: HT CEO David forwards a Financial Times article to his sales staff. The headline reads, “Pakistan court refuses to free US official”. The report outlines the politics behind the case of Raymond Davis, a US official accused of running over two Pakistanis in Lahore.
David notes [in Italian] that the case shows how:
“Pakistanis are very hostile towards Americans and the West in general. This complicates our eventual trip to the country.”
He asks his sales staff to respond to Pakistani customers with “meet at our office” or in “neutral territory such as Dubai”.
Two weeks later, a single email that appears to be part of a longer conversation emerges. HT is back in touch with Zeeshan, who alleges that the FIA has requested him to arrange a demo of RCS. He provides specific dates and times as the “big boss will be available during these dates”.
May 4: Osama bin Laden has been shot and killed two days ago in a covert US operation. David emails his sales staff [in Italian] outlining how Pakistan is a “divided country, highly religious” and stuck in a tussle with “rival India” while also involved with the US in the war in Afghanistan.
He goes on to make a veiled reference:
“He receives $4 billion from the US each year for civilian aid and arms. This could be an exceptional customer”.
It is clear HT actively wants to pursue clients in Pakistan. Mostapha is instructed to reach out to INTECH Solutions — HT’s German partner — for an update. A response follows shortly after: “Hello David , We talked to our German partner. He’ll go to Pakistan to conduct demos and meet with clients.”
Klaus Weigmann, the Managing Director of INTECH Solutions responds with bad news. Their contact in Pakistan has advised against any German visiting Pakistan at this time. Klaus says he cannot risk sending his technicians until the contact says the situation is clear with “no risk to our lives”. The email chain ends; it is unclear whether INTECH Solutions staff visits Pakistan.
June 9: A second contractor identifying himself as Javed Ahmed, Chairman of Karachi-based Miran International appears close to sealing a deal for CID Sindh Police, as a critical Non Disclosure Agreement (NDA) is signed by all parties.
Aiming to reel HT in, he mentions the CID is being funded by the UK government. He also asks HT to stay quiet about pricing until it is approved by them.
Miran International has been in touch with HT since January, promising they should be able to sell RCS to the “Intelligence Bureau [IB] Islamabad Armed Forces [ISI ,AFI,NI and MI] Provincial Intelligence Agencies [CID AND CIA ].”
In a further attempt to build close ties, Javed reveals that a representative of Gamma Group — the developers of Finfisher, another spyware surveillance system — had visited Pakistan to meet a top intelligence agency. He claims that no local deal went through because of price issues and “Gamma were not giving the keys and equipment on trial basis”.
He adds that the quoted cost for purchasing FinMobile was $700,000 and this was “way out of budget”. For the first time, HT provides the cost for a basic RCS package:
“For an ‘entry’ level =10 targets + 1 platform, the price to Miran is about 240K euros. We have a lot of additional ‘powerful tools’ as IPA, RMI, exploit portal ecc the price is more or less 40K for each tool.”
It is not clear whether the CID or other agencies cited by Javed eventually purchased RCS.
August 5: Miran International continues to build its case as HT’s local partner. “Brother, they [local agency] do not have any money of their own. They are receiving donations from UK Embassy and USA Embassy. Through these donations they are buying equipment and technology. And most of the things are being purchased from me, claims Ali Ahmed, the CEO of Miran International.
“Please give your most fair and reasonable price. I will also add fair margin. Then they will take your proposal to the donor country.” He is also forthcoming about whom he represents: the Crime Investigation Department (CID).
November 21: HT has an internal discussion based around Research In Motion agreeing to help the Indian government carry out surveillance of BlackBerry services.
David comes up with a way to pitch to India, outstripping RIM’s solution:
“RCS offers a possibility more than any other system of passive interception, including the capture of data that typically does not travel over the network… and the possibility to “follow” an Indian target when they go abroad (e.g. Pakistan).”
HT Senior Security Engineer Fabrizio Cornelli replies with the need to test RCS “So India could follow a target traveling in Pakistan” with a stable connection between phone and hub.
November 22: Just a day after a discussion on how to pitch RCS to India through tracking abilities inside Pakistan, HT replies to a new contractor from ‘rival Pakistan’, outlining its hacking software’s capabilities to access “Skype (VoIP, chat), MSN (VoIP, chat), Keystrokes (all Unicode languages), files, screenshots, microphone eavesdropped data, camera snapshots, etc.”
March 14: Ali Ahmed contacts HT for a customer who is interested in purchasing the RCS and “Remote Mobile Intrusion” toolsets. The quoted price, however, is on the “high side” and the email chain ends.
May 25: An HT internal email exchange reveals that the first part of a payment by an unidentified customer has come through, while the second part has been delayed because “Basar had to go to Pakistan. He told me to have a little patience.”
Other emails identify the individual as Syed Basar Shueb, the CEO of Pal Group, a UAE-based company that presents its involvement in multiple mega-ventures including ‘Time Square’ which was reported by the Khaleej Times to be a $1.4 billion real estate project in Lahore — a joint venture with Defense Housing Authority.
October 4: The sales manager at a Dubai-based software firm Vytas Celiesius says a Pakistani customer is looking to purchase HT’s mobile intrusion software but has multiple queries regarding its capabilities.
Mostapha responds to the queries, outlining the software’s ability to work on the latest iOS and Android platforms; the ability to remotely install trojans using SMS, WAP push, emails; the need to have the user install the application, otherwise resort to physical infection; the vital need for an internet connection to transfer data.
October 31: HT consultant Bern Fiedler makes an unusual finding that he shares with HT.
“On Pakistan, I do not know whom you are dealing with but Director General Technical of ISI is not aware of any discussions or presentations neither procurement of products from Hacking Team. He confirmed to me that they are in a need of the products and are open to other vendors as well.”
February 25: Yet another contractor, Anwar S. Malik, who identifies himself as Director Business Development of Islamabad-based Hajvairy Technologies, reaches out to HT. He says his company is a registered supplier to the “Ministry of Defense and law enforcement organisations for almost 30 years”.
In a first for any of the local contractors, Anwar flies to Milan to meet HT at its office. An NDA is signed by all parties but the customer is not named.
March 14: Mostapha tells Vytas that HT has begun working on selling RCS to the Pakistan Air Force (PAF) and the Pakistan Navy through a local partner. He tell his German partner that he is assessing whether the opportunities are serious. Vytas responds saying the PAF has already purchased FinFisher from Gamma. Instead, he says his company representatives met with the ISI at ISS in Dubai to discuss mobile intrusion equipment, which was “a high priority”. He adds:
“[ISI] would like to have mobile as well as PC intrusion equipment with a big number of target SW licenses, e.g. 500 or 1000."
It is unclear what takes place next, as a final email from Mostapha says an offer will be sent over shortly.
June 10: An individual identifying himself as a former PTA chairman reaches out to David directly. After clarifying that the PTA does not “get involved with tracking or eavesdropping of data as we do not have the constitutional mandate”, he asks the HT CEO to address a few key questions:
“What if extortionists...use prepaid cell phones which have been purchased by the street-side through an unregistered vendor, does not carry correct antecedents of the owner, may have been used by someone innocent previously...or have been obtained from a cell phone company instantly. CDRs show no previous calls made except to just one person whom they threaten. Many of these are not notorious notorious but doing this as an alternative to poor economic conditions, no education, unbalance in society, political backing etc.”
“My question is, can such people be tracked down for relief to say 99%(+) of the other respectable citizens without considerable investment in networks… Another problem is spoofing sender ID through software and SMS service providers available outside the country through Web-to-SMS etc.”
HT Operations Manager Daniele Milan responds on David’s behalf. He says it would be almost impossible to track phones in the scenario described without significant investment in interception/geo-location equipment, as well as educating victims of blackmailing on how to react. He mentions that this can only be done by covering the networks of all telecom operators, who would have to have such equipment in place.
“Cooperation from telecom companies can greatly simplify the tasks of LEAs. This is exactly the scenario where our solution, Remote Control System, fits in perfectly: for tactical usage against a few selected targets of major relevance, who use modern technology to communicate and pull the strings of their criminal plans,” Daniele says. The email chain ends.
September 18: Bernd Fiedler contacts HT and says Pakistan activities have been halted as, “We are currently awaiting the promotion of the new DGT of ISI, any action with the current one will be a waste of time as he will be out of the job soon. I expect that we can start moving forward somewhen end of October beginning of November”.
October 30: Miran International’s representative provides HT with the names of four high profile officials of the Sindh Police who will be traveling to attend Millipol Paris 2013 — an annual, worldwide exhibition of internal state security. Mostapha asks whether invitations are needed for the entire delegation. The Miran representative says entry passes have already been arranged.
January 23: Miran International keeps pushing for a partnership, with Javed asking what happened “after our very positive meeting at Millipol. I was very optimistic after we met that finally the management of your company will send you to Pakistan to introduce your technology to potential end-users. Is there any hope or shall I stop fantasising.” There is no response from HT.
July 21: A deal appears to be reaching fruition thanks to months long efforts by Zeeshan Zakaria who now says he is part of Lahore-based Defence Solutions & Systems
Zeeshan aims to sell RCS to the “army and another intelligence customer”.
NDAs are signed and exchanged for a customer interested in IP intrusion techniques and intrusion through WIFI, along with solutions to hack into Skype, Tango, Viber and WhatsApp. Zeeshan and the HT representatives seem relaxed, almost jovial in their exchanges.
January to March: The new year brings a sudden rush of local contractors vying to become partners for HT’s surveillance software. One identifies himself as Ali Zubair, Director Strategic Planning of Islamabad-based United International Technologies (UIT). He promises sales will be for powerful end-users.
Another man, Adil Khan, who claims to be Vice President Sales and Marketing of Islamabad-based Teletrade International says he will land HT important customers — the very same as those cited by UIT. Yet another representative of Miran International chimes in with an, “inquiry from one of the premier Intelligence Agencies in Pakistan for infecting of GSM handsets.”
Edward Tufail of Italy-based Commercial Consultations claims to represent Karachi-based Vision Security, yet another company interested in a partnership. David terms this both “suspicious, and a waste of time”.
May 4: MI Fareed who claims to be President, Intertech Tradelinks, a Canada based company “currently in Dubai”, says he has received demands from Pakistani LEAs and intelligence agencies for the purchase of surveillance equipment.
He says the equipment would be used “to reduce crime levels, to protect from terrorism threats and to identify new incoming security danger as well as for similar uses in the commercial and social sector of Pakistan. He adds that:
"[Pakistan is] a front-line ally of the USA/allied forces in their war against terrorism in this region, as well as an active participant supporting Saudi Arabia in their continuing conflict in Yemen.”
He adds another “special purpose” requirement that no other contractor has requested: equipment and technologies for integration into “unmanned vehicles” i.e. air (drones) and land. Whether this request ever moved from an NDA to an actual purchase is unknown.
This is the final Pakistan-related email from the WikiLeaks HT archive.
Can the right to privacy be compromised in the name of a security crisis?
Should intelligence agencies be trusted not to misuse powerful surveillance tools?
“In the modern context it is necessary to have effective surveillance equipment, particularly with our deteriorating security situation,” argues defence analyst and security expert Ikram Sehgal, “But what happens is that intelligence agencies justify the use of these tools in the name of counterterrorism and countering criminal activity, while a majority of the operations end up being dedicated to surveillance of common, private citizens, or used for political pursuits etc.”
Sehgal says tools like RCS are problematic when there is a lack of checks and balances in place. “When you have a body which does not answer to anyone or at least does not answer to all authorities that it theoretically should be answering to, then that’s going to cause problems,” he adds.
A former director general of the Intelligence Bureau who requested anonymity agrees that software like RCS “are absolutely necessary tools given the complexities that now prevail in intelligence gathering and security.” He adds that “intelligence agencies do not have many other sources to turn to, and while human intelligence has always been there, it cannot be as efficient as these software and tools.”
Legislation to regulate the activities of intelligence agencies is key the former DG says, but it would still not be enough. “The best way to ensure that surveillance software is not misused is to appoint the right people to do the job. Because even if you have regulatory laws in place, if implementation is lax those laws would be of no use to anyone. If you have the right person at the helm, they would do the right thing no matter what laws may or may not be in place,” he says.
Former DG FIA Tariq Khosa voices similar views. “The government is working on a cybercrime law so it can bring these operations within its ambit,” he says.
He suggests the formation of a cybercrime task force which answers directly to the government. He stresses the need for a parliamentary committee on intelligence affairs that carries out necessary oversight. “The proceedings of this committee may be in-camera if necessary but its effective presence is critical in a democratic setup”.
Digital rights experts in Pakistan see good reason to be concerned about spying software like RCS.
"There is next to no public or government oversight of our agencies. The software and hardware that is being purchased by them has in the past been used by regimes to spy on citizens. As such, we have powerful intelligence agencies that are rarely investigated or even castigated in public for fears of being under surveillance for doing so.
What is needed is judicial oversight, public debate and legislation that binds security agencies to the Constitution."
Nighat Daad – Director, Digital Rights Foundation
"The first step in addressing this situation is disclosure. Not through leaked documents, but in an official capacity by relevant institutions. The danger with such technology though, is that some of it can be so invasive that oversight is impossible. Once it gets into someone’s hands, privacy will be an elusive, distant reality.
On a global level, the debate as far as the sale of communications surveillance equipment goes, hinges on what is ethical for companies to make and sell. Around the world, governments and security agencies had taken excessive steps in the name of security and terrorism. We see all of that being rolled back now. The door on bulk data collection, blanket surveillance, overbroad and discretionary powers is shutting globally. It’s slow and gradual, but it is happening. We should be cognisant of that and not repeat the mistakes of others."
Farieha Aziz – Director, Bolo Bhi
"The intention of the state is evident. A China-like Internet governance model is becoming a reality in the name of sovereignty, and national security.
There is great concern regarding this, especially the targeting of human rights defenders and journalists. Our fears are now being verified on a daily basis, and the threat is as real as it gets. Civil society needs to unite to take on these undemocratic and dangerous decisions by state institutions.
Shahzad Ahmad – Director, Bytes for All
Hacking Team conducts webinar for RAW; CABSEC is already a customer of HT Israeli partner
Elements of the Indian state have been in steady talks with Hacking Team (HT) till June this year to obtain spying software for internal as well as cross border surveillance. In the trove of emails, the Italian firm implicates the desire of India’s intelligence agency and government to obtain spying tools, also indicating the Cabinet Secretariat’s satisfaction with a demo of the controversial RCS surveillance software.
From the Wikileaks HT archive, an email dated May 14, 2015 was sent by one Deepak Patel representing Evincesis Info Solutions, who said he was aware of “government establishment” demands.
“[Need is] to acquire tools and services which can help them stay ahead of law bending elements [sic] specially when the Indian soil is under constant threat from cross border attacks,” he explained to HT, assuring them he works closely with agencies on “various levels”.
An email exchange in February 2014 reveals that HT staff conducted a webinar demonstrating their hacking tools to the Research and Analysis Wing (RAW), National Investigation Agency (NIA), Intelligence Bureau (IB) and the National Tech Research Organization (NTRO).
Further examination of leaked emails sent from India in 2015 reveal that HT was actively trying to hire an Indian field officer, and was also in advanced stages of finalising a visit to Hyderabad for a demonstration to law enforcement agencies. An email request dated June 12, 2015 was made by a Prabhakar Kasu of Ortus Consulting, who proposed cellular interception hardware solutions to the South Indian state.
Kasu asked for an estimate on costs for 24 and 50 mobile licenses so he could share it with his client — the Andhra Pradesh police intelligence — to try and convince them to use it. He said he wished to know the price for mobile hacking only “given their current urgent priority”.
A figure of $1 million was given to Kasu, who later prepared visa documents and hotel options for the HT staff. The visit was set for early July and HT staff confirmed their travel dates and flights.
An indication of what the Indian authorities were looking for can be gleaned from an email sent by Amit Kumar of company Vis Exec. He listed the needs of an ‘end user’ that included penetration of Skype, Whatsapp, email, call data records, IP addresses, locations, posts, images, email and contact lists.
While the Indian government agencies did not directly approach HT, the contractors who reached out to the Italian firm appeared to have worked closely with them.
In one startling 2011 exchange, HT staff discussed a new opportunity in India through their Israeli partner NICE Systems. The customer interested in purchasing RCS was the Cabinet Secretariat (CABSEC).
When asked to explain what CABSEC was, HT employee Marco Bettini was told it was an intelligence organisation directly under the Prime Minister office. “They are already [sic] a customer of us (for other solutions…).”
Later in 2012, NICE writes to HT after a meeting with CABSEC in Delhi where RCS was demonstrated. “The customer was happy with the solution capabilities… we would like you [HT] to prepare a proposal that we will hand to our contacts at CABSEC”.
Additionally in 2013, Rohit Bhambri who identified himself as Director India Operations of NICE Systems, said his customer was keen for a solution that focused on mobile phone devices. In internal emails, HT said Bhambri’s client was CABSEC, “but for the moment we are not supposed to know that”.
India, however, remains unclear about the procurement of such software.
Talking to NDTV, UPA’s Home Minister P Chidambaram said he could not recall the Intelligence Bureau or the National Investigation Agency (NIA) acquiring the sort of technology discussed in the emails. “Nothing of this nature came to me,” he said.
Comments (84) Closed
So that's why our COAS is in Italy ?
As an Indian, I am deeply ashamed of my country and being called Indian
The article do not specify weather this is about ethical hacking or not? Every country/company has a ethical hacking team to ensure 1) Their systems are secure and 2) to keep an eye on employees/contractors or third parties. Suppose if an organisation/individual hacks systems for his/her personal gain it is unethical hacking and against the law.
@Factual Unethical of course .. Brazen intrusion of privacy...
All the parties seems to be fake. Looks like axact was not alone in the world of cheats.
What is the point of this article? Intelligence agencies of India also has this software.
I don't think this can ever be controlled unless we change the way we communicate. Go see your friends, talk to your family and don't just do things for facebook!
@tamil there are many many insurgencies going on in India although the media is not showing them. now if every event is blamed on Pakistan a time will come when indian people will start raising question on how is it possible and the Indian government great excuse" pakistan did it" will be rejected. so they must be thinking to have the capabilities to get the actual people rather than blaming pakistan every time
Why is Pakistan's LEA and intelligence relying on these foreign private companies to buy toys like these? I don't understand. They have the talent and minds all over the World to build better, more effective, and sophisticated surveillance systems.
Computers and cell phones these days are coming pre installed with such spy software the pilot program of which was initiated in India as early as 1999 due to lax consumer protection laws.
i am pretty sure my 25 rupees pirated anti virus cd from rainbow center can defend me againt all viruses,spyware, malware.
The Intelligence agencies must exercise a great restraint when buying these equipment or software. It is very easy for opposite forces to use the same software spying on you instead. Israel is known for playing double game by selling the spying tools and using same tools to spy on their customers. ISI is a great target right now. Indians are not fool. The drone that was crashed or shot down in Pakistan was a possible bait. It possibly had a Geo tracking (location) with built-in surveillance equipment in the bait (captured) equipment. US done that in Iranian case two years ago.
To me there is no harm in it ... NSA did it and are still doing it ..... why cant we ....
Just looks like a routine arms and intelligence equipment purchase deal process must have been going on for years.
@tamil please migrate.These kind of things happen to check terror elements and criminal squads.They are not tapping your phone.Understand the logic before commenting nonsense!
What goes behind the doors, a common citizen of Pakistani would never know as he is just put into the struggle of his living cost,No Gas, Electricity and No water, so they keep doing what ever they like and ordinary Pakistani is just worried to survive..Shame
I think it's safe to assume our intelligence agencies sent HT on a wild goose chase knowing that India wanted to track targets in Pakistan. I think it's also safe to assume, we have a sophisticated smartphone tracking system in place already. Also, I think Pakistani intelligence agencies would much rather get a home grown system than rely on an Italian company. Who knows who they're sharing the data with for a higher premium?
Though I am talking big, we need something big like the "great firewall of China". This firewall restricts access to internet users. That`s how they can be saved from spying. Something like Pakistan intranet could be an option where limited internet access through extremely secured channel is allowed. In this world to stop someone from spying you need to avoid mainly internet, location based services and even mobiles completely otherwise you are doomed.
Nice one, Every one should read it , and be cautious and preventive , if today's tech has advantages it also has disadvantages, the technologies mentioned above are 5 years old , now even more complex spyware and some local hackers are making their own spywares.
You don't like your privacy to be invaded then STOP posting your stuff on social network. Simple... People post everything on social media and then talk about privacy issues. Hypocrites.
I bet that 50% of the cost of purchasing this software would go towards bribing the officials in India.
@Factual be precise in using ethical and recognized hacking.
@tamil without proof and evidence don't trust on anybody's statement.
Snowden leaks point towards heavy NSA bugging of Indians, their political parties particularly BJP and SHIV SENA and their installations/Embassies and Consulates worldwide and instances of their double crossing Americans.
My, my ... what a tangled web we weave in order to stay a few steps ahead of the arch enemy ..
Yet even with so much intrusive spy technology, millions of dollars spent on such tools, our govt. still is not in the preventive mode to prevent and capture those who wish us harm. Wonder if any of this spyware even works or are Pak agencies and military being led on a wild goose chase??
As far as the leaks are concerned, this is a good article.
However, please dont be fooled. We NEED this software to tackle terrorism. The agencies who use this are not your usual police/thana walas who can misuse this. This software is being used by people with the right clearance levels and legit requirements.
There will always be a need for such software and such OEMs and their representatives in Pakistan/Dubai, etc.
In Pakistan, things have been happening since 2006-2007 and yet we are just hearing about this now. Simply because cyber-laws do not exist and when they do surface, they get shot down by "so-called" activists. These right groups are in fact the ones causing the most damage to the cyber security arena of Pakistan.
Remember, not all such technology is available for sale in Pakistan. We must use whatever is available to ensure we have the required capabilities to counter all enemies (internal and/or external)
Somehow, this article misses the name of Inbox Technologies
When the South Koreans sold the nuclear and missile technology to India in 1980s the centrifuges and rockets were laced by North Koreans with spyware software that constantly transmitted the data which was intercepted by Pakistan.
RCS then became victim to its own technology when it was hacked and all details about its operations went global.
Taste of its own medicine and yes Pakistan was on its list of Client. Australia too but the went only as far a demo and had to retract cause hacking of RCS became a news.
@tamil why?
Dawn is the best newspaper. Period.
People who are so "Concerned" with their "Privacy" live in fool's world. Services like Google, Gmail, Yahoo, Hotmail, Outlook, Facebook, Twitter, Cloud services, iOS, Macs, windows, etc, are collecting your private data all the time. Has any one of you read the agreements before using the above mentioned services? Please do yourself a favor and read them before you sign-up for them. In today's world nothing is private. You keep posting your family pictures, contacts and personal stuff on Facebook, backing up all your personal data on cloud services and third party servers and expect it to be private? That's hilarious. Just live with it and don't be concerned if you are innocent.
So what? Why cant we have that?
We should not forget that we are at a war-like situation with extremists from FATA to Karachi and Balochistan. Our security apparatus must have these capabilities to prevent incidents like Army Public School Peshawar, Safoora carnage in Karachi and so many massacres of innocent Hazaras in Quetta.
They are not interested in the private lives of those who are not involved in any terrorist activities.
@tamil tamil.are good.people, lot of Tamil are good ppl and upset and sick north elite discrimination against siuthspecially Tamil.
@tamil You will again be ashamed when something bad(terrorist attack) will happen. Then you would be ashamed that why Govt. cannot prevent these type of attack, I ask you how can govt. do it without checking on concerned people?
Nowadays people post the picture of their Dinner on Face Book then complain about privacy.
If you got nothing to hide need not worry, I better be safe then sorry.
Of course this information are going to be used both ways but their is always a price to be paid for security.
I read somewhere the Locks are the most useless things it cannot stop thives and genuine people won't enter your promises without your permission same with Anti spy software I guess
Thought this report would shed light on some NEW information... We all have wiki leaks. Every country does this. Boring.
I don't see any difference between India and Pakistan when it comes to the Government of the country. Both are pathetically just the same !!
Put citizens privacy at one side but if the company share your information with your enemy then.... Be careful and try to build your own system.
There is no such thing called privacy once you connect that pc to the internet.
Dont afraid of these tools and LEAs unless you are not doing something wrong. These tools will be used for better purpose to a greater proportion then otherwise. As Pakistan is passing through a crucial time we should accept this as bitter pill. when we will be in peace we will have lot of time to think about privacy and like other stuff.
I'm using B1VPN for Android and it's FREE and safe. It works very well.
Hackers gonna Hack !
Most LEA's around the globe use such technologies including USA and UK. There is nothing new in LEA's desire to acquire such tools to combat crimes and terrorism. As far as privacy concern, if you not doing anything wrong than there shouldn't be any fear. We are living in changed era ... I am willing to give up my privacy in return to live with peace and in one piece
Every system has a backdoor, its going to hurt the agencies more than the people.
@wiserneighbour Well said
Waste of money and energy from both country on tax payer money .
take photographs using the infected device’s camera and switch on a device’s microphone – all without the user’s knowledge, and without affecting a device’s battery life.
@tamil whole world is open for you. You can find best place of your choice
Did anyone watch enemy of the state??
@surendra Thanks I am now a Pakistani Citizen.
This is an age of information warfare where personal communication at any level can be used against each other. What about the National Security Agency (NSA) of USA? The Americans legally allow going for spying by these unethical manners of using personal communication. NSA had never felt reluctant to have espionage of world top leaders no matters “Friends of America.” Whatever is happening now, US actually initiated to hack personal data of many residents of this globe. The fault is that we have only one option to live in this globe no other place to save ourselves from this. It’s a tug of war amongst states where common people are victimized.
@tamil You are.
there is a danger when you purchase this foreign software, that they and their friends are then able to also access communications in Pakistan/india. Short term there is a certainly an argument to improve domestic security and investigate properly the terrorism and criminality, but longer term putting these things in the hands of the ISI and army will only embolden them in their challenge with the elected governments.
Its better that the elected government has control of such intelligence gathering mutually controlled and shared with ISI and LEA's. Longer term we must develop our own software and methods so that foreigners are unable to listen in on us.
@surendra why should he move from india? its just as much his as yours! guys like you think the land is your fathers property to do with as you please. When you country does something wrong not everything can be excused in the name of national interests. You are immature and unable to understand human beings.
better not take personal pictures you can't share.... because they can be hacked... and also don't disclose any secret information about u or family...
@Zohaib people.do.steal, terrorize, loot, pollute then.it eam.ask them to stop.living what kind of a logic is that,if criminals are successful in stopping you in your work, I guess they are on the road to success, we need to counter those that us why all over the world nation made laws to prevent the troublemakers to achieve their negative instead of asking the public to stop using the tech altogether.
India and Pakistan keep scratching their backs..... people who advocate for privacy lives in fools paradise. they use social media on internet and still beleive that they are not being watched.. LOL every country has the right to ensure its security.... so let them do their job..
despite availability of such equipment incidents like Gurdaspur could not be prevented. Tax money of innocent citizens is being wasted and the authorities are getting richer after receiving kickbacks in such covert deals.
Startling revelations that compel me to think and approve life in the past (20th century). In that era, global life was so calm and peaceful as a whole. However, with the surfacing of such spyware tools, which guarantees security and stability works the other way rather and i.e. death and destruction. It means these powerful surveillance tools does not make our world a safer but conspicuously a dangerous place.
This article can be a good plot for a suspense movie!!!!!
we live in a world where the conscience is dead, there are no morals left, the preachers of human rights are the biggest violators of these very rights, national interests and priorities collide with those of other countries, there are no enemies and no friends and the conceit, deceit and cunning behaviors are the rules of the day. money can buy everything, and in this situation, the security apparatus is totally correct to use overt and covert methods to safeguard the interests of the country, even with the implicit consent of civil and armed institutions. staying behind implies death; you shall have to survive and rise above others. come what may.
so what is the point of the article, hacking and spying is a part of modern warfare, It's good to be on hunt rather than being a victim, the world has already become as cruel as it can get. I would rather suggest Indian Techies to develop this hacking technology indigenously as software development our forte and any bought hacking software can have hidden code that could also spy on the buyer
Actually still we are not independent by the west. Stil & wil govern by them.
NADRA in Pakistan & AADHAR CARD bio matric project in India facilitated by the Same co. called as safran (morpho).
The western cos. runs by their intelligence agencies obtain privacy datas & movements of the citizens of both the countries & they r strategise to fullfill their agendas to continue arm race & weapon business in sub continent.
The public of both the countries are 'Lachaar' infront of their democrat governments.
No good future for the citizens of both the countries.
Excellent investigative journalism!
India is doing what it should do, you should be one step ahead of your enemy.
@Hindutavi Rakshas Good tactics to divide north and south but won't work because south indians are very smart people. Most of the noble laureates in science ftom India or Indian origin are from the south.
NSA has been using such notorious software for so long. Even they have even breached international law and interfered in the matters of other states. One should not link it with Pakistan only. It is already under practice of global community.
I am a Targeted Individual in Pakistan. My crime is i exposed corruption as a writer . Anyone here ever heard of Remote Nueral Monitering?The EMF waves game which is used to murder journalists ,torture whistle blowers and Yes it is now happening in Pakistan. We are no where near NSA in any way. NSA is getting too close to challenging God in human Monarch Mind Control research. Lets see who is wiped off next from face of Earth by God? Spy but remember the biggest spy in universe is God Almighty.
@Genius_Boy , Nothing of that sort brother. Do you know, all your emails are forwarded to a remote server? All means all, without any exception. All your phone calls are recorded. No exception. And there is more. There is no Chinese firewall.Our normal, clean living is our guarantee to peaceful life.
@Candid , even if one does not upload on cloud service, all data is transmitted to a remote server. All emails with attachments are transmitted. Solution is live an open, normal and above board life.
@tamil Why? They're doing what every Intelligence Agency in the world does -- attempt to prevent a crime from happening. That's a very different task than policing, which usually involves catching criminals after a crime has been committed.
Preventing attacks requires knowledge of intentions. That requires information. It's naive to think that any Intel agency in the world is doing any less in preventing attacks against the state.
@ZEESHAN I lived all my life in india..and worked and travelled across the cities in india..I never came through any insurgency..Please share your pakistani school education with us so that we can fight these unknown insurgencies??
@Nathan and i am sure that they can get my cell phone data only when they contact with the cellular company and have check on my number because i own 200 wala cell phone :D jis me hardly 100 messages bhi nahi atay. Old is Gold
FBI should go after these hackers from outside America. I got calls at least thrice saying they are from Microsoft, and want to fix my computer, and I told them not to worry about. One guy from distant land, called me once to say, he can see my computer screen. Looks like these people do not have better things to do in life.
privacy of citizens is being trampled .. but where to protest when the international hegemon itself is indulged in surveillance
surveillance tools illegal with LEAs and legal with news paper , tv channels and media groups and even with political parties. thats what makes sense.
This is extremely alarming, There is a difference between US and Pakistan, The history tells us the US intel use the data to protect its homeland from terrorists while in Pak the data is only used for blackmailing politicians and tycoons.
@Jammu and Kashmir I am but a humble Tamil, fighting for the free speech of my own homeland. That is why I understand the voice of others, whether here, there or anywhere. And I stand up to fascism which ever guise it comes under.
Anyone wish to understand this article and the saga behind it should watch youtube video comprehensively, without that you just keep guessing.
The Handbook of Human Ownership https://www.youtube.com/watch?v=k67_imEHTPE
Imagine if these tools falls in the hands of criminal elements and mafias.....
Agencies should workout all such means to protect their countrymen. We must be clear that our Privacy is already at stake when we are on Internet and Wikileaks is an example itself.
Perhaps even before this comment has been finished, some one, some people, some company, some group has already started work on a better version for spying, hacking, cheating, copying, tracking, all the rest. The unfortunate issue really is that the best brains and best minds will be lured into this profession as remunerations will increase, as in previous era's nuclear scientist and others were paid by governments to be one step ahead of other countries. Now this technology of cyber war fare, tracking, cheating, is taking over. Soon there will be "talks" like the one Iran has had with the West on how to keep this new technology, know how, skill, knowledge, within limits. read those in power, they will decide.
@Tahir, these tools are already available on internet. Period.