this post was submitted on 16 Oct 2024
-1 points (48.9% liked)

Technology

59589 readers
2972 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] XTL@sopuli.xyz 5 points 1 month ago (1 children)

It's almost as if people don't like posts with zero content besides some clickbait link.

[–] merde@sh.itjust.works 9 points 1 month ago* (last edited 1 month ago)

if it helps:

Since the start of the war in October 2023, Israel has been using AI tools to conduct its massive bombing campaign in Gaza. The Israeli military’s “directorate of targets” relies on soldiers with decoding, cyber and research capabilities to produce targets on a large scale. Pegasus is used to locate and collect data on individuals. This data is then fed to automated targeting platforms like Where’s Daddy, Gospel and Lavender, which utilize facial recognition, geolocating and cloud computing to generate targets at rapid rates. The spyware can also record and manipulate actions to manufacture fake digital evidence to retroactively justify the execution of civilians.

With the application of these new technologies, Gaza remains Israel’s premier testing ground for advances in the automation of war. These advances can then be marketed and exported on a global scale.

From Pegasus to Gaza

Pegasus is the most malicious spyware on the market.

Unlike other types of malware, which work by deceiving people into clicking a link that then infects their device, Pegasus has a zero-click capacity. The technology can be installed remotely without any interaction from the user, making it nearly impossible to detect. Attackers can take control of a phone’s camera and microphone, effectively transforming it into a live tracking and recording device; they can extract all data, including messages, emails, photos, recordings, browsing histories, calendars and locations; and they can use Pegasus to plant falsified and incriminating evidence on a target’s mobile device. Pegasus can spread like a virus through communication networks.

Citizen Lab, a Canadian digital watchdog organization based at the University of Toronto, began publishing damning and revealing reports about Pegasus in 2016. In 2019, two Israeli spies posing as investors requested meetings with Citizen Lab’s research team in Toronto. Senior researcher John Scott-Railton suspected their request was a ruse to gather information about the Lab’s investigative work and methodology. He took a lunch meeting with a man who described himself as a wealthy Parisian named Michel Lambert. During their conversation the investor pressed for information about the Lab’s reports on NSO Group. As they were eating dessert, a reporter and a photographer from the Associated Press, who had been tipped off about the set-up by Scott-Railton, approached the table. The visitor scrambled to flee the restaurant, taking along two other spies who had been recording the lunch meeting. Lambert was later exposed to be Aharon Almog-Assoulin, a retired Israeli security official.

The Forbidden Stories Consortium, a Paris-based international network of journalists dedicated to protecting reporters, discovered that over 50,000 people had been targeted by government customers of NSO Group.

In 2020, thanks to a massive data leak, the scale of Pegasus’s use became clear. The Forbidden Stories Consortium, a Paris-based international network of journalists dedicated to protecting reporters, discovered that over 50,000 people had been targeted by government customers of NSO Group. The targets included journalists, human rights defenders, academics, diplomats, union leaders, politicians and several heads of state. In the wake of the leak and working in coordination with Amnesty International’s Security Lab and Citizen Lab, Forbidden Stories met with victims to conduct forensic analyses of their devices. The Pegasus Project is their investigation into cyber-spying with the aim of countering high-tech threats to journalists and human rights defenders.

rest of the article is on the not so clickbait linked page 👆