This article is from the source 'rtcom' and was first published or seen on . It last changed over 40 days ago and won't be checked again for changes.

You can find the current article at its original source at https://www.rt.com/news/534171-germany-police-pegasus-spyware/

The article has changed 2 times. There is an RSS feed of changes available.

Version 0 Version 1
German police secretly procured & USED controversial Israeli Pegasus smartphone spyware – media German police secretly procured & USED controversial Israeli Pegasus smartphone spyware – media
(about 1 month later)
German police bought and used controversial Pegasus spyware sold by the Israeli NSO group in 2019, it has been revealed. The program has allegedly been used for high-profile spying by multiple governments.German police bought and used controversial Pegasus spyware sold by the Israeli NSO group in 2019, it has been revealed. The program has allegedly been used for high-profile spying by multiple governments.
The explosive revelation was made by Germany’s Die Zeit newspaper on Tuesday and was later confirmed by AFP, citing parliament sources.The explosive revelation was made by Germany’s Die Zeit newspaper on Tuesday and was later confirmed by AFP, citing parliament sources.
According to Die Zeit, the Federal Criminal Police Office (BKA) opted to procure the highly-controversial software after domestic efforts to develop a home-grown program to monitor suspects’ phones flopped. The homegrown software, known only as ‘Trojan,’ has been in the works for years. While said to be functional in principle, it has never actually been used, the paper said.According to Die Zeit, the Federal Criminal Police Office (BKA) opted to procure the highly-controversial software after domestic efforts to develop a home-grown program to monitor suspects’ phones flopped. The homegrown software, known only as ‘Trojan,’ has been in the works for years. While said to be functional in principle, it has never actually been used, the paper said.
Instead, the agency turned to outsourcing, getting in contact with the Israeli-based cyber-security company NSO Group, known for its Pegasus spyware. The firm maintains it works only with government entities worldwide.Instead, the agency turned to outsourcing, getting in contact with the Israeli-based cyber-security company NSO Group, known for its Pegasus spyware. The firm maintains it works only with government entities worldwide.
First discovered back in August 2016, the program made headlines earlier this year after a collective of 17 media organizations reported that it had been used on over 50,000 high-profile targets by multiple governments. The target list included politicians, journalists and government officials from different countries, with the revelation sparking several international scandals.First discovered back in August 2016, the program made headlines earlier this year after a collective of 17 media organizations reported that it had been used on over 50,000 high-profile targets by multiple governments. The target list included politicians, journalists and government officials from different countries, with the revelation sparking several international scandals.
Die Zeit said German authorities were in contact with the Pegasus developer since at least 2017, when a company delegation reportedly showcased the program to the BKA in Wiesbaden.Die Zeit said German authorities were in contact with the Pegasus developer since at least 2017, when a company delegation reportedly showcased the program to the BKA in Wiesbaden.
The software boasts significantly wider functionality and spying powers than potentially allowed under German laws. NSO Group is said to have developed a watered-down version of Pegasus specifically for the BKA.The software boasts significantly wider functionality and spying powers than potentially allowed under German laws. NSO Group is said to have developed a watered-down version of Pegasus specifically for the BKA.
The procurement process, kept secret, began back in 2019, with the BKA acquiring its version of Pegasus in 2020.The procurement process, kept secret, began back in 2019, with the BKA acquiring its version of Pegasus in 2020.
According to a separate report by Die Zeit, the BKA Vice President Martina Link also admitted to using the program, during closed-door hearings in the Bundestag interior committee on Tuesday. The BKA apparently told the committee that the program has been used in a “mid-single-digit number” of operations, some of them ongoing.According to a separate report by Die Zeit, the BKA Vice President Martina Link also admitted to using the program, during closed-door hearings in the Bundestag interior committee on Tuesday. The BKA apparently told the committee that the program has been used in a “mid-single-digit number” of operations, some of them ongoing.
According to German laws, spying through smartphones and other electronic devices can be conducted only on individuals whose activities constitute an imminent danger, such as terrorism or organized crime. The matter is further complicated by a provision that even the dangerous suspects have a right to have a “core area of private life” protected.According to German laws, spying through smartphones and other electronic devices can be conducted only on individuals whose activities constitute an imminent danger, such as terrorism or organized crime. The matter is further complicated by a provision that even the dangerous suspects have a right to have a “core area of private life” protected.
While such restrictions made the original Pegasus – which gains full access to data, cameras and microphones on an infected smartphone – unfit for use in Germany, the watered-down BKA version circumvented the restrictions, with illegal data supposedly not collected. Still, the data is believed to go through the NSO Group’s servers before actually getting to the BKA. While the agency insisted the data goes only in “hashed” (in non-readable) form, legislators expressed concerns over the opacity of the process.While such restrictions made the original Pegasus – which gains full access to data, cameras and microphones on an infected smartphone – unfit for use in Germany, the watered-down BKA version circumvented the restrictions, with illegal data supposedly not collected. Still, the data is believed to go through the NSO Group’s servers before actually getting to the BKA. While the agency insisted the data goes only in “hashed” (in non-readable) form, legislators expressed concerns over the opacity of the process.
“This is an outsourcing of state powers of intervention, here an intervention in the area of fundamental rights is being outsourced,” digital policy spokesman for the FDP parliamentary group, Manuel Hoferlin, said as quoted by Die Zeit.“This is an outsourcing of state powers of intervention, here an intervention in the area of fundamental rights is being outsourced,” digital policy spokesman for the FDP parliamentary group, Manuel Hoferlin, said as quoted by Die Zeit.
Contracting of the NSO effectively resembled “hiring a bounty hunter” and hoping they would “break into the homes of suspects” in a legal fashion, the official added.Contracting of the NSO effectively resembled “hiring a bounty hunter” and hoping they would “break into the homes of suspects” in a legal fashion, the official added.
Think your friends would be interested? Share this story!Think your friends would be interested? Share this story!
Dear readers and commenters,
We have implemented a new engine for our comment section. We hope the transition goes smoothly for all of you. Unfortunately, the comments made before the change have been lost due to a technical problem. We are working on restoring them, and hoping to see you fill up the comment section with new ones. You should still be able to log in to comment using your social-media profiles, but if you signed up under an RT profile before, you are invited to create a new profile with the new commenting system.
Sorry for the inconvenience, and looking forward to your future comments,
RT Team.