How is something like this even possible?

Microsoft MSFTBRO
Mar 30 18 Comments

comments

Want to comment? LOG IN or SIGN UP
TOP 18 Comments
  • Amazon sprung
    Yeah there is tech that is supposed to be available only to the police that fakes being a cellphone tower to acquire your signal and record your traffic. It's all unencrypted, though because it frequency hops it takes some sophisticated tech to intercept.

    I guess Saudis targeted him by deploying it illegally in the area where he was.
    Mar 30 4
    • I definitely wouldn’t guess this is how they did it
      Mar 31
    • Amazon sprung
      Well, it's the most plausible way. It's something they can do covertly and the Saudi state certainly has the tech. Illegal to do it in the US but these are the guys who killed Kashoggi so I'm sure they don't care.

      It's possible they got them some other way but it gets more far fetched. Like they have hacked the mobile network itself, or installed spyware on his phone. But that's harder to pull off.

      If you have that intercept tech and you're willing to break the law it's easy. Police departments do it all the time, of course with a warrant.
      Mar 31
    • So they would intercept all his traffic and also decrypt it? What if the data they want was sent and received before they started monitoring?
      Mar 31
    • Amazon sprung
      SMS is not encrypted it's transmitted in plain text. No need to decrypt.

      They would only have whatever texts were sent while his phone (or her phone) was connected to their fake tower, which could be frequently if they were actively targeting him and following him around with it, or set up one next to his home and office.
      Mar 31
  • eBay / Eng meowwwoem
    If you don’t understand how this is done I recommend you spend some time researching information security related to your code. Developers who don’t understand security are a big reason why people find ways to hack into your systems that you build.
    Mar 31 2
    • Microsoft MSFTBRO
      OP
      lol relax. thanks for the non helpful generic answer anyways.
      Mar 31
    • eBay / Eng meowwwoem
      More info Sec less leetcode :)
      Mar 31
  • Clover Health / Eng doenfh
    The difficulty of obtaining this technology doesn't compare to the ease of social engineering.
    Mar 31 4
    • Amazon sprung
      If you read the article you would see that they engaged in the social engineering after they had the texts, and did the social engineering to avoid having to acknowledge the illegal way they first got them
      Mar 31
    • Clover Health / Eng doenfh
      I did read the article, a second time after you replied. I see no mention of social engineering. Maybe we are discussing two different articles.
      Mar 31
    • Amazon sprung
      I mean they identified the brother and paid him
      Mar 31
    • Microsoft MSFTBRO
      OP
      Sounds like social engineering. After doing some search, basically if the Saudis used Pegasus it means Bezos or his gf clicked on a link and it gave root access to Saudis.

      Holy shit IOS.
      Mar 31
  • Amazon sprung
    Jamal Khashoggi, murdered on the orders of the Saudi Crown Prince, was a Washington Post reporter. Bezos is the owner of the Washington Post.

    This is why:

    https://www.washingtonpost.com/news/global-opinions/wp/2018/10/06/read-jamal-khashoggis-columns-for-the-washington-post/

    The cases are connected.
    Mar 31 0
  • Oscar 🐨koala
    Wow. One of the most terrifying states is having a war with the richest man in the world... what have he done?
    Mar 30 2
    • Google Mmkaay
      Saudis love Trump and hated Obama for a single reason: Iran. They probably hated on Bezos because he didn’t fancy Trump
      Mar 30
    • Oscar 🐨koala
      Probably! Now he gotta be careful of posioning.
      Mar 30

Join verified employees in our anonymous social network! Download the app!

close