• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

How Spy Tech Firms Let Governments See Everything on a Smartphone

September 4, 2016 by Shain R. Amzovski 5 Comments

This article is interesting because it shows how Cyber-Security firms, or Spy-Tech firms are using their technology and marketing their products to governments around the world.  This particular Spy-Tech company mentioned in the article, NSO, is based out of Israel.  Israel is the second-largest exporter in the world of cyber-security products, next to the United States.  NSO, has developed spying software that can see all of the activity on a target’s iPhone.  NSO argues spying is important to prevent terrorist attacks, and the firm’s motto is to “Make the World a Safe Place.”  With a price of $650,000, plus a $500,000 set-up fee to track 10 iPhone devices, the company’s software is not-exactly for the “everyday user.”  NSO’s software has been more in-demand in recent years because companies such as Facebook, Apple, and Google are making it harder for governments to access their data because they are using more-strict encryption.  NSO has developed a tracking software called Pegasus, which Apple recently released a security-update to patch all of it’s devices.  Do you believe this software is ethical, and should the government really need to know everything a person is doing on their phones in order to keep people safe? There has been recent cases in the United States, such as the San Bernardino shootings in California, where the government was unable to unlock the shooter’s iPhone.  Apple stuck to its guns, and did not provide the U.S. government with technology capable of unlocking the device.  The U.S. government had to resort to a third-party Spy-Tech firm to unlock the device.

 

http://www.nytimes.com/2016/09/03/technology/nso-group-how-spy-tech-firms-let-governments-see-everything-on-a-smartphone.html?_r=0

Filed Under: Uncategorized Tagged With:

Reader Interactions

Comments

  1. Wade Mackey says

    September 5, 2016 at 11:56 pm

    I was hoping someone would post one of these articles. The question I would like all of you to consider is where do you draw the line. Some level of surveillance is necessary, but at some point it goes to far. This is a conversation that still needs to take place in our society..

    Log in to Reply
  2. Mengqi He says

    September 6, 2016 at 3:59 am

    This is an interesting article, Shain. Obviously, what NSO did should not be considered as ethical hacking. The NSO maintained access to the target, used covert channels, exfiltrated data from target’s phone, and also covered its hacking tracks. It went to far beyond ethical hacking. However, I think it is necessary for a country to have certain level of surveillance over the entire network in the country to protect its people from potential terrorism activities, as long as information of persons under surveillance will not be published. What I worry about is that the hacking method and techniques used by NSO now will be developed and be able to be used to attack everyone, like you and me, someday in the future. Since people make increasingly transactions through mobile phones and increasingly rely on mobile phones, mobile phone security is becoming extremely important to everyone.

    Log in to Reply
  3. Ahmed A. Alkaysi says

    September 6, 2016 at 10:15 am

    There should be Government surveillance conducted to an extent. The Government shouldn’t have the ability to use any of these tools willy nilly. It worries me that these private companies are selling their tools to countries around the world. This has become a profitable industry spurring even more competition. We will eventually see these tools get used by the wrong hands. Although NSO claims to have a “strict internal vetting processing” to determine their customers, what stops them from selling to other organizations in the future if the price is right?

    Log in to Reply
    • Shain R. Amzovski says

      September 6, 2016 at 10:24 am

      Ahmed, I agree. Where do we draw the line with this subject? If there is proof that this software has foiled numerous terrorist plots, then I am okay with the surveillance. If there is no evidence that this software has made a difference in stopping attacks, then it just violates our freedom and privacy. I believe this software also violates the 4th Amendment of the Constitution for unreasonable search and seizures. No warrant is needed, and the user has no knowledge that any personal data is being captured from their device. After 9/11, with laws passed, such as the PATRIOT Act, this subject has been iffy, and there is not really a clear line on what is okay, and what is not.

      Log in to Reply
  4. Ioannis S. Haviaras says

    September 6, 2016 at 10:21 am

    Shain,

    Great article. Unfortunately in the age we live in people use technology not only to make their lives more convenient but also to make criminal lives more convenient. With an organization like this available now it might shed a light on just how vulnerable our most personal devices are.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in