NSO Group

back to index

description: an Israeli technology firm known for its Pegasus spyware used to surveil smartphones

17 results

pages: 350 words: 115,802

Pegasus: How a Spy in Your Pocket Threatens the End of Privacy, Dignity, and Democracy
by Laurent Richard and Sandrine Rigaud
Published 17 Jan 2023

Our partners had gotten a very different message from NSO, or rather from the company’s hired lawyer in Washington, DC. “Our firm is defamation counsel to NSO Group,” was the opener. “It is evident that Forbidden Stories has already formulated (and intends to publish on its own platform) a false, preconceived, and highly damaging narrative regarding NSO Group—and that it intends to do so regardless of the actual facts.… We are putting OCCRP on formal notice that Forbidden Stories will publish defamatory falsehoods about NSO Group in its series of articles and that, should OCCRP elect to publish or republish any portion of those articles, OCCRP runs a substantial risk of publishing defamatory falsehoods.”

That’s how Claudio and Donncha caught them out. They found those domain names in the new infrastructure, and that told them who was running the system. This was NSO Group. This was Pegasus. “Each Pegasus Installation server or Command-and-Control (C&C) server hosted a web server on port 443 with a unique domain and TLS certificate,” they would write. “These edge servers would then proxy connections through a chain of servers, referred to by NSO Group as the ‘Pegasus Anonymizing Transmission Network.’” The search for new Pegasus domains matching the fingerprint also led Claudio and Donncha to a second victim.

When I opened the file, I skimmed through the short section containing the Pegasus-generated process names that Citizen Lab had recognized in each of the three new analyses and went straight to the money paragraph: “We conclude with high confidence,” it read, that all three iPhones “were successfully infected with NSO Group’s Pegasus spyware during the dates mentioned. Our high confidence conclusion stems from the fact that we have never seen the above process names used in a benign context, and we have only ever seen the above process names used in high-confidence cases of infection with NSO Group’s Pegasus spyware.” I posted my synopsis of the first stage of the peer review on the secure site that each of the partners could access, along with a pdf of the report Citizen Lab had forwarded, and I anticipated the collective sigh of relief from Pegasus Project collaborators all over the world.

Reset
by Ronald J. Deibert
Published 14 Aug 2020

“A New Age of Warfare: How Internet Mercenaries Do Battle for Authoritarian Governments,” New York Times. Retrieved from https://www.nytimes.com/2019/03/21/us/politics/government-hackers-nso-darkmatter.html NSO Group first came onto our radar in August 2016: Marczak B. and Scott-Railton, J. (August 2016). “The Million Dollar Dissident: NSO Group’s iPhone Zero-Days used against a UAE Human Rights Defender,” Citizen Lab Research Report No. 78, University of Toronto. Retrieved from https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/ “Zero days” — or “open doors that the vendor does not know it should lock”: Lindsay, Restrained by design; Greenberg, A. (2012, March 23).

Perhaps the most notorious of the spyware companies we have been tracking is widely considered to be among the most sophisticated: Israel-based NSO Group, also known as Q Technologies, a company closely aligned with the Israeli Ministry of Defence. (Far from taming abuses connected to the spyware market, Israel’s Ministry of Defence routinely grants export licences for NSO’s sales, as well as those of other Israel-based surveillance companies.) NSO Group first came onto our radar in August 2016, when award-winning UAE-based human rights activist Ahmed Mansoor received two text messages on his iPhone, purporting to show evidence of torture in UAE prisons.214 As a human rights defender, Ahmed might have been tempted to click on those links.

As an activist, he engages in a multitude of conversations, some that he might reasonably assume are either private or secure, many through his desktop computer, others through his mobile device. The “intellectual property” of a spyware company like NSO Group consists of methods for taking advantage of these multiple networked connections, and finding and exploiting weak points in the constantly mutating and highly insecure digital infrastructure on which people like Omar depend. Surveillance companies employ thousands of well-paid, highly trained engineers to constantly scour operating systems, software, applications, hardware, platforms, routers, and networks for insecurities (in the case of NSO Group, many of them are veterans of Israel’s sophisticated Unit 8200 signals intelligence group).

pages: 651 words: 186,130

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
by Nicole Perlroth
Published 9 Feb 2021

CHAPTER 13: GUNS FOR HIRE For a contemporary account of Francisco Partner’s private equity investment in NSO Group, see Orr Hirschauge, “Overseas Buyers Snap Up Two More Israeli Cyber Security Firms,” Haaretz, March 19, 2014. For the FBI’s first public statement on its “going dark” problem, see Valerie Caproni, General Counsel, FBI, Testimony Before the House Judiciary Committee, Subcommittee on Crime, Terrorism, and Homeland Security, February 17, 2011. This later became NSO Group’s marketing pitch. For details on NSO Group’s pricing, see my 2016 account in the New York Times, “Phone Spying Is Made Easy. Choose a Plan,” September 3, 2016.

The leaks showed NSO charged clients $500,000 to hack just five BlackBerry phone users, or $300,000 for five Symbian users on top of that set-up fee. The company also charged an annual 17-percent maintenance fee. Hacking Team’s anxieties over NSO Group’s “over the air stealth installation” feature can be read in Hacking Team’s leaked emails available on WikiLeaks: wikileaks.org/hackingteam/emails/emailid/6619. I first learned of NSO Group’s relationship with Mexican government agencies from the leaks my source provided in 2016. Partnering with Azam Ahmed in Mexico, we were able to detail the Mexican consumer rights activists, doctors, journalists, international lawyers, and those targets’ families in our June 2017 exposés: Nicole Perlroth, “Invasive Spyware’s Odd Targets: Mexican Advocates of Soda Tax,” New York Times, February 12, 2017; Ahmed and Perlroth, “Spyware Meant to Foil Crime Is Trained on Mexico’s Critics,” New York Times, June 19, 2017; and Ahmed and Perlroth, “Using Texts as Lures, Government Spyware Targets Mexican Journalists and Their Families,” New York Times, Jun 19, 2017.

To date, these inquiries have gone nowhere. NSO Group’s relationship with Finland has never been documented. To better understand why Finland would be interested in its spy tools, see Simon Tidsall, “Finland Warns of New Cold War over Failure to Grasp Situation in Russia,” Guardian, November 5, 2014, and Eli Lake’s interview with Finnish president Sauli Niinistö: “Finland’s Plan to Prevent Russian Aggression,” Bloomberg, June 12, 2019. Bill Marczak and John Scott-Railton, together with researchers at Lookout, were the first to publish research on NSO Group’s spyware in the UAE, and on Ahmed Mansoor specifically.

pages: 390 words: 115,303

Catch and Kill: Lies, Spies, and a Conspiracy to Protect Predators
by Ronan Farrow
Published 14 Oct 2019

Citizen Lab, which tracks state-backed efforts to hack and surveil journalists, had recently reported that NSO Group’s Pegasus software compromised an iPhone belonging to a friend of the journalist Jamal Khashoggi, not long before Saudi operatives cut Khashoggi to pieces with a bone saw. The investigation had prompted sharp criticism of NSO Group, which denied that its software was used to target Khashoggi but also refused to answer questions about whether the software had been sold to the Saudi government. Lambert wanted to know about Citizen Lab’s work on NSO Group. He asked whether there was any “racist element” to the focus on an Israeli group.

This name was real: the agent was Aharon Almog-Assouline, a retired Israeli security official later reported to have been involved in a string of Black Cube operations. Black Cube and NSO Group would later deny any connection to the operation against Citizen Lab. But in many of the meetings Ostrovskiy had described to me over the preceding months, Almog-Assouline had been there, appearing to target figures who criticized NSO Group and argued that its software was being used to hunt journalists. Black Cube was furious about the botched operation. The agency ordered that everyone with knowledge of the matter be polygraphed immediately.

But Sleeper rebuffed my every plea for identifying information, to get on an encrypted call, to meet in person. “I can understand your editors’ concern although I’m afraid to reveal my identity. Every online method can be monitored these days… its hard for me to trust it wont come back at me,” Sleeper wrote. “I’m sure you know NSO so I’m not interested in taking unnecessary risks.” NSO Group was an Israeli cyber intelligence firm, famed for its Pegasus software, which could take control of a cell phone and strip-mine it for data. It had been used to target dissidents and journalists around the world. But Sleeper kept sending information from the encrypted email address, and it always checked out.

pages: 448 words: 117,325

Click Here to Kill Everybody: Security and Survival in a Hyper-Connected World
by Bruce Schneier
Published 3 Sep 2018

Chuck Seegert (8 Oct 2014), “Hackers develop DIY remote-monitoring for diabetes,” Med Device Online, http://www.meddeviceonline.com/doc/hackers-develop-diy-remote-monitoring-for-diabetes-0001. 64had used it to spy on journalists: John Scott-Railton et al. (19 Jun 2017), “Reckless exploit: Mexican journalists, lawyers, and a child targeted with NSO spyware,” Citizen Lab, https://citizenlab.ca/2017/06/reckless-exploit-mexico-nso. 64dissidents, political opponents: John Scott-Railton et al. (29 Jun 2017), “Reckless redux: Senior Mexican legislators and politicians targeted with NSO spyware,” Citizen Lab, https://citizenlab.ca/2017/06/more-mexican-nso-targets. 64international investigators: John Scott-Railton et al. (10 Jul 2017), “Reckless III: Investigation into Mexican mass disappearance targeted with NSO spyware,” Citizen Lab, https://citizenlab.ca/2017/07/mexico-disappearances-nso. 64lawyers: John Scott-Railton et al. (2 Aug 2017), “Reckless IV: Lawyers for murdered Mexican women’s families targeted with NSO spyware,” Citizen Lab, https://citizenlab.ca/2017/08/lawyers-murdered-women-nso-group. 64anti-corruption groups: John Scott-Railton et al. (30 Aug 2017), “Reckless V: Director of Mexican anti-corruption group targeted with NSO group’s spyware,” Citizen Lab, https://citizenlab.ca/2017/08/nso-spyware-mexico-corruption. 64and people who supported a tax on soft drinks: John Scott-Railton et al. (11 Feb 2017), “Bitter sweet: Supporters of Mexico’s soda tax targeted with NSO exploit links,” Citizen Lab, https://citizenlab.ca/2017/02/bittersweet-nso-mexico-spyware. 64The products of FinFisher: Bill Marczak et al. (15 Oct 2015), “Pay no attention to the server behind the proxy: Mapping FinFisher’s continuing proliferation,” Citizen Lab, https://citizenlab.ca/2015/10/mapping-finfishers-continuing-proliferation. 65And it does—through bribery: Glenn Greenwald (2014), No Place to Hide: Edward Snowden, the NSA, and the U.S.

GOVERNMENTS ALSO USE THE INTERNET FOR SURVEILLANCE AND CONTROL Governments want to surveil and control us for their own purposes, and they use the same insecure systems that corporations have given us to do it. In 2017, the University of Toronto’s research center Citizen Lab reported on the Mexican government’s surveillance of what it considered political threats. The country had purchased surveillance software—spyware—from the cyberweapons manufacturer NSO Group, and had used it to spy on journalists, dissidents, political opponents, international investigators, lawyers, anti-corruption groups, and people who supported a tax on soft drinks. Many other countries use Internet spyware to surveil their residents. The products of FinFisher, another commercial spyware company, were found in 2015 to be used by Bosnia, Egypt, Indonesia, Jordan, Kazakhstan, Lebanon, Malaysia, Mongolia, Morocco, Nigeria, Oman, Paraguay, Saudi Arabia, Serbia, Slovenia, South Africa, Turkey, and Venezuela.

Most countries don’t have either the budget or the expertise to develop this caliber of surveillance and hacking tools. Instead, they buy surveillance and hacking tools from cyberweapons manufacturers. These are companies like FinFisher’s seller Gamma Group (Germany and the UK), HackingTeam (Italy), VASTech (South Africa), Cyberbit (Israel), and NSO Group (also Israel). They sell to countries like the ones I listed in the beginning of this section, allowing them to hack into computers, phones, and other devices. They even have a conference, called ISS World and nicknamed the “Wiretappers’ Ball,” and they explicitly market their products to repressive regimes for this purpose.

pages: 898 words: 236,779

Digital Empires: The Global Battle to Regulate Technology
by Anu Bradford
Published 25 Sep 2023

(Aug. 17, 2020), https://www.csis.org/blogs/new-perspectives-asia/covid-19-proving-boon-digital-authoritarianism. 152.Feldstein, supra note 23, at 1–2. 153.Ronen Bergman & Mark Mazzetti, The Battle for the World’s Most Powerful Cyberweapon, N.Y. Times Mag., https://www.nytimes.com/2022/01/28/magazine/nso-group-israel-spyware.html. 154.Id. 155.David E. Sanger et al., U.S. Blacklists Israeli Firm NSO Group Over Spyware, N.Y. Times (Nov. 3, 2021), https://www.nytimes.com/2021/11/03/business/nso-group-spyware-blacklist.html. 156.Feldstein, supra note 23, at 13–14. 157.Liza Lin & Josh Chin, U.S. Tech Companies Prop Up China’s Vast Surveillance Network, Wall St. J. (Nov. 26, 2019), https://www.wsj.com/articles/u-s-tech-companies-prop-up-chinas-vast-surveillance-network-11574786846. 158.Pop et al., supra note 73. 159.Kynge et al., supra note 3. 160.Assessing China’s Digital Silk Road Initiative, Council on Foreign Rel., https://www.cfr.org/china-digital-silk-road/. 161.Greene & Triolo, supra note 13. 162.Erie & Streinz, supra note 1, at 5. 163.See Parkinson et al., supra note 27. 164.Id. 165.Daniel Cave, The African Union Headquarters Hack & Australia’s 5G Network, Australian Strategic Policy Inst.: The Strategist (July 13, 2018), https://www.aspistrategist.org.au/the-african-union-headquarters-hack-and-australias-5g-network/. 166.Abhishek G.

Surveillance technologies supplied by US firms, such as IBM, Palantir, and Cisco, can be found in 32 countries. An Israeli company called NSO Group has developed spyware called “Pegasus,” which has been described as the “World’s Most Powerful Cyberweapon,” and which the company has sold to governments around the world.153 Reports have subsequently surfaced documenting widespread abuse of the spyware by democratic and authoritarian countries alike.154 NSO Group also became a target of US sanctions in 2021 after it was discovered that the company supplied its Pegasus spyware to foreign governments that used it to target political activists, politicians, business leaders, and journalists.155 It is also not the case that Chinese tech companies are supplying AI surveillance technologies to other authoritarian states, while tech companies from liberal democracies are servicing liberal democracies.156 Chinese companies are active in democracies and autocracies alike, and similarly, companies based in liberal democracies are supplying technologies to markets with dismal human right records.

French Intelligence Legislation. 223.Naomi O’Leary, Graham Dwyer Case: EU States Join Ireland in Challenge to Data Law, The Irish Times (Sep. 13, 2021), https://www.irishtimes.com/news/crime-and-law/graham-dwyer-case-eu-states-join-ireland-in-challenge-to-data-law-1.4673050. 224.See European Parliament Press Release, Pegasus: MEPs Grilled NSO Group Representatives About Spyware Abuse Allegations (June 20, 2022), https://www.europarl.europa.eu/news/en/press-room/20220620IPR33414/pegasus-meps-grilled-nso-group-representatives-about-spyware-abuse-allegations; see Antoaneta Roussi, EU and Greece Veer Toward Standoff Over Wiretapping Scandal, Politico (Aug. 29, 2022), https://www.politico.eu/article/eu-and-greece-near-standoff-over-phone-tapping-scandal/. 225.See Charles Martinet & Romain Bosc, Europe Uses Spyware on Its Own Citizens, Ctr. for Eur.

pages: 447 words: 111,991

Exponential: How Accelerating Technology Is Leaving Us Behind and What to Do About It
by Azeem Azhar
Published 6 Sep 2021

Cunningham, ‘Preparing the Cyber Battlefield: Assessing a Novel Escalation Risk in a Sino-American Crisis’, Texas National Security Review, October 2020 <http://tnsr.org/2020/10/preparing-the-cyber-battlefield-assessing-a-novel-escalation-risk-in-a-sino-american-crisis/> [accessed 23 April 2021]. 71 Jens Stoltenberg, ‘Nato Will Defend Itself’, Prospect Magazine, 27 August 2019 <https://www.prospectmagazine.co.uk/world/nato-will-defend-itself-summit-jens-stoltenberg-cyber-security> [accessed 12 March 2020].” 72 ‘CyberPeace Institute Calls for Accountability of Intrusion as a Service’, CyperPeace Institute, 10 January 2021 <https://cyberpeaceinstitute.org/news/cyberpeace-institute-calls-for-accountability-of-intrusion-as-a-service>. 73 ‘Western Firms Should Not Sell Spyware to Tyrants’, The Economist, 12 December 2019 <https://www.economist.com/leaders/2019/12/12/western-firms-should-not-sell-spyware-to-tyrants> [accessed 26 April 2021]. 74 Bill Marczak et al., ‘The Great IPwn: Journalists Hacked with Suspected NSO Group IMessage “Zero-Click” Exploit’, The Citizen Lab, 20 December 2020 <https://citizenlab.ca/2020/12/the-great-ipwn-journalists-hacked-with-suspected-nso-group-imessage-zero-click-exploit/> [accessed 26 April 2021]. 75 Vincen Boulanin, Limits on Autonomy in Weapons Systems (SIPRI, 2020) <https://www.sipri.org/sites/default/files/2020-06/2006_limits_of_autonomy.pdf>. CHAPTER 8: EXPONENTIAL CITIZENS 1 ‘Dear Mark Zuckerberg.

We might start by taking on hacking. In 2021, the CyberPeace Institute called for preventative action against commercially available hacking software – memorably termed ‘intrusion as a service’.72 Here too, a key goal would be to ban private companies from developing malicious software. Take the NSO Group, a private firm which develops software purportedly used as spyware by malicious actors.73 Their blockbuster product is Pegasus, which allegedly targets individuals’ phones and then takes them over. So far, dozens of journalists and activists around the world allege that Pegasus has been used to spy on them.74 Looking to the future, we need to develop a legal framework to govern the use of autonomous weapons.

Abu Dhabi, UAE, 250 Acemoglu, Daron, 139 Acorn Computers, 16, 21 Ada Lovelace Institute, 8 additive manufacturing, 43–4, 46, 48, 88, 166, 169, 175–9 Adidas, 176 advertising, 94, 112–13, 116, 117, 227–8 AdWords, 227 aeroponics, 171 Afghanistan, 38, 205 Africa, 177–8, 182–3 Aftenposten, 216 Age of Spiritual Machines, The (Kurzweil), 77 agglomeration, 181 Air Jordan sneakers, 102 Airbnb, 102, 188 aircraft, 49–50 Alexandria, Egypt, 180 AlexNet, 33 Algeciras, HMM 61 Alibaba, 48, 102, 108, 111, 122 Alipay, 111 Allen, Robert, 80 Alphabet, 65, 113–14, 131, 163 aluminium, 170 Amazon, 65, 67–8, 94, 104, 108, 112, 122, 135–6 Alexa, 25, 117 automation, 135–6, 137, 139, 154 collective bargaining and, 163 Covid-19 pandemic (2020–21), 135–6 drone sales, 206 Ecobee and, 117 Go stores, 136 Kiva Systems acquisition (2012), 136 management, 154 Mechanical Turk, 142–3, 144, 145 monopoly, 115, 117, 122 Prime, 136, 154 R&D, 67–8, 113 Ami Pro, 99 Amiga, 16 Anarkali, Lahore, 102 anchoring bias, 74 Android, 85, 94, 117, 120 Angola, 186 Ant Brain, 111 Ant Financial, 111–12 antitrust laws, 114, 119–20 Apache HTTP Server, 242 Appelbaum, Binyamin, 63 Apple, 47, 62, 65, 85, 94, 104, 108, 112, 122 App Store, 105, 112, 115 chip production, 113 Covid-19 pandemic (2019–21), 222–3 data collection, 228 iOS, 85 iPhone, 47, 62, 85, 94, 105 media subscription, 112 watches, 112 APT33 hacker group, 198 Aral, Sinan, 238 Aramco, 108, 198 Armenia, 206–7 Arthur, William Brian, 110, 123 artificial intelligence, 4, 8, 31–4, 54, 88, 113, 249 academic brain drain, 118 automation, 125–42 data and, 31–2, 142 data network effect, 106–7 drone technology and, 208, 214 education and, 88 employment and, 126–7 healthcare and, 88, 103 job interviews and, 153 regulation of, 187, 188 arXiv, 59 Asana, 151 Asian Development Bank, 193 Aslam, Yaseen, 148 Assembly Bill 5 (California, 2019), 148 asymmetric conflict, 206 AT&T, 76, 100 Atari, 16 attack surfaces, 192–3, 196, 209, 210 Aurora, 141 Australia, 102, 197 automation, 125–42 autonomous weapons, 208, 214 Azerbaijan, 173, 206–7 Ballmer, Steve, 85 Bangladesh, 175 banking, 122, 237 Barcelona, Catalonia, 188 Barlow, John Perry, 184 Barrons, Richard, 195, 211 Bartlett, Albert, 73 batteries, 40, 51, 53–4, 250, 251 Battle of the Overpass (1937), 162 Bayraktar TB2 drone, 206 Bee Gees, 72 Bekar, Clifford, 45 Bell Labs, 18 Bell Telephone Company, 100 Benioff, Marc, 108–9 Bentham, Jeremy, 152 Berlin Wall, fall of (1989), 4 Bermuda, 119 Berners-Lee, Timothy, 55, 100, 160, 239 Bessen, James, 46 Bezos, Jeffrey, 135–6 BGI, 41 Biden, Joseph, 225 Bing, 107 biological weapons, 207, 213 biology, 10, 39, 40–42, 44, 46 genome sequencing, 40–41, 90, 229, 234, 245–7, 250, 252 synthetic biology, 42, 46, 69, 174, 245, 250 biopolymers, 42 bits, 18 Black Death (1346–53), 12 BlackBerry, 120 Blair, Tony, 81 Bletchley Park, Buckinghamshire, 22 blitzscaling, 110 Blockbuster, 138 BMW, 177 Boeing, 51, 236 Bol.com, 103 Bollywood, 181 Boole, George, 18 Bork, Robert, 114–15, 117, 119 Bosworth, Andrew, 233 Boyer, Pascal, 75 Boyle, James, 234 BP, 92, 158 brain, 77 Braudel, Fernand, 75 Brave, 242 Brazil, 202 Bremmer, Ian, 187 Bretton Woods Conference (1944), 87 Brexit (2016–20), 6, 168 British Broadcasting Corporation (BBC), 87, 129, 191 Brookings Institution, 130 BT, 123 Bulgaria, 145 Bundy, Willard Legrand, 149 Busan, South Korea, 56 business, 82, 92–124 diminishing returns to scale, 93, 108 economic dynamism and, 117 economies of scale, 50, 92 growth, 110–13 increasing returns to scale, 108–10 intangible economy, 104–7, 118, 156, 175, 180 linear value chains, 101 market share, 93–6, 111 monopolies, 10, 71, 94, 95, 114–24 network effect, 96–101 platform model, 101–3, 219 re-localisation, 11, 166–79, 187, 252, 255 state-sized companies, 11, 67 superstar companies, 10, 94–6 supply chains, 61–2, 166–7, 169, 175, 187, 252, 255 taxation of, 96, 118–19 Butler, Nick, 179 ByteDance, 28 C40 initiative, 189 Cambridge University, 127, 188 cancer, 57–8, 127 Capitol building storming (2021), 225 car industry, 93 carbon emissions, 35, 90, 251 Carlaw, Kenneth, 45 Carnegie, Andrew, 112 Carnegie Mellon University, 131 Catholic Church, 83, 88 censorship, 216–17, 224–6, 236 Central Intelligence Agency (CIA), 194 Cerebras, 34 cervical smears, 57–8 chemical weapons, 207, 213 Chen, Brian, 228 chewing gum, 78 Chicago Pile-1 reactor, 64 Chile, 170 China automation in, 127, 137 brainwave reading in, 152 Covid-19 pandemic (2019–21), 245 drone technology in, 207 Great Firewall, 186, 201 Greater Bay Area, 182 horizontal expansion in, 111–12 manufacturing in, 176 misinformation campaigns, 203 raw materials, demand for, 178 Singles’ Day, 48 social credit systems, 230 superstar companies in, 95 US, relations with, 166 chips, 19–22, 28–9, 48–9, 52, 113, 251 Christchurch massacre (2019), 236 Christensen, Clayton, 24 CIPD, 153 cities, 11, 75, 169, 179–84, 188, 255 Clegg, Nick, 225–6, 235 climate change, 90, 169, 187, 189, 251, 252 cloud computing, 85, 112 Cloudflare, 200 cluster bombs, 213 CNN, 185, 190 coal, 40, 65, 172 Coase, Ronald, 92 Coca-Cola, 93 code is law, 220–22, 235 cold fusion, 113–14 Cold War (1947–91), 194, 212, 213 collective bargaining, 147, 149, 154, 156, 162–5 Colombia, 145 colonialism, 167 Columbus, Christopher, 4 combination, 53–7 Comical Ali, 201 commons, 234–5, 241–3, 256 companies, see business comparative advantage, 170 complex systems, 2 compounding, 22–3, 28 CompuServe, 100 computing, 4, 10, 15–36, 44, 46, 249 artificial intelligence, 4, 8, 31–4, 54, 88 cloud computing, 85, 112 internet, 47–8, 55, 65, 84 Law of Accelerating Returns, 30–31, 33, 35 machining, 43 Moore’s Law, see Moore’s Law quantum computing, 35 transistors, 18–22, 28–9, 48–9, 52 conflict, 87, 189, 190–215 attack surfaces, 192–3, 196, 209, 210 cyberattacks, 11, 114, 140, 181, 187, 190–200, 209–14, 256 de-escalation, 212–13 drone technology, 11, 192, 204–9, 214, 256 institutional change and, 87 misinformation, 11, 191, 192, 200–204, 209, 212, 217, 225 new wars, 194 non-proliferation, 213–14 re-localisation and, 189, 193, 194, 209 consent of the networked, 223 Costco, 67 Coursera, 58 Covid-19 pandemic (2019–21), 12–13, 59, 78–9, 131, 245–9 automation and, 127, 135, 136 cities and, 183 contact-tracing apps, 222–3 gig economy and, 146 lockdowns, 12, 152, 176, 183, 246 manufacturing and, 176 misinformation and, 202–4, 247–8 preprint servers and, 60 recession (2020–21), 178 remote working and, 146, 151, 153 supply chains and, 169, 246 vaccines, 12, 202, 211, 245–7 workplace cultures and, 151, 152 cranks, 54 credit ratings, 162, 229 critical thinking skills, 212 Croatia, 145 Crocker, David, 55 crowdsourcing, 143–4 Cuba, 203 Cuban missile crisis (1962), 99, 212 cultural lag, 85 cyberattacks, 11, 114, 140, 181, 187, 190–200, 209–14, 256 CyberPeace Institute, 214 Daniel, Simon, 173–4 Dar es Salaam, Tanzania, 183 Darktrace, 197 data, 8, 11, 71, 217–19, 226–31, 235, 237–42, 256 AI and, 8, 32, 33, 58, 106 compensation for, 239 commons, 242 cyberattacks and, 196 doppelgängers, 219, 226, 228, 239 interoperability and, 237–9 network effects, 106–7, 111 protection laws, 186, 226 rights, 240 Daugherty, Paul, 141 DDT (dichlorodiphenyltrichloroe thane), 253 death benefits, 151 Dediu, Horace, 24, 30 deep learning, 32–4, 54, 58, 127 deforestation, 251 dehumanisation, 71, 154, 158 deindustrialisation, 168 Deliveroo, 154, 163 Delphi, 100 dematerialised techniques, 166, 175 Denmark, 58, 160, 199–200, 257 Deutsche Bank, 130 Diamandis, Peter, 5 Dickens, Charles, 80 digital cameras, 83–4 Digital Geneva Convention, 211 Digital Markets Act (EU, 2020), 122 digital minilateralism, 188 Digital Nations group, 188 Digital Services Act (EU, 2020), 123 diminishing returns, 93, 108 disinformation, see misinformation DoorDash, 147, 148, 248 dot-com bubble (1995–2000), 8, 108, 150 Double Irish tax loophole, 119 DoubleClick, 117 drone technology, 11, 192, 204–9, 214, 256 Dubai, UAE, 43 Duke University, 234 dystopia, 208, 230, 253 Eagan, Nicole, 197 eBay, 98, 121 Ecobee, 120 economies of scale, 50, 92 Economist, The, 8, 65, 119, 183, 239 economists, 63 Edelman, 3 education artificial intelligence and, 88 media literacy, 211–12 Egypt, 145, 186 Elance, 144 electric cars, 51, 69, 75, 173–4, 177, 250 electricity, 26, 45, 46, 54, 157, 249–50 see also energy Electronic Frontier Foundation, 184 email, 6, 55 embodied institutions, 82 employment, 10, 71, 125–65 automation, 125–42 collective bargaining, 147, 149, 154, 156, 162–5 dehumanisation and, 71, 154, 158 flexicurity, 160–61, 257 gig economy, 10, 71, 142–9, 153, 162, 164, 239, 252, 255 income inequality, 155–8, 161, 168 lump of labour fallacy, 139 management, 149–54, 158–9 protections, 85–6, 147–9 reskilling, 159–60 universal basic income (UBI), 160, 189 Enclosure, 234–5, 241 energy, 11, 37–8, 39–40, 44, 46, 172–4, 250 cold fusion, 113–14 fossil fuels, 40, 159, 172, 250 gravitational potential, 53 solar power, 37–8, 53, 65, 77, 82, 90, 171, 172, 173, 249, 250, 251 storage, 40, 53, 114, 173–4, 250, 251 wind power, 39–40, 52 Energy Vault, 53–4, 173 Engels, Friedrich, 81 Engels’ pause, 80, 81 environmental movement, 73 Epic Games, 116 estate agents, 100 Estonia, 188, 190–91, 200, 211 Etzion Airbase, Sinai Peninsula, 195 European Commission, 116, 122, 123 European Space Agency, 56 European Union, 6, 82, 147, 186, 226 Excel, 99 exogeny, 2 exponential gap, 9, 10, 67–91, 70, 89, 253 cyber security and, 193 institutions and, 9, 10, 79–88, 90 mathematical understanding and, 71–5 predictions and, 75–9 price declines and, 68–9 superstar companies and, 10, 94–124 exponential growth bias, 73 Exponential View, 8–9 externalities, 97 extremism, 232–4 ExxonMobil, 65, 92 Facebook, 27, 28, 65, 94, 104, 108, 122, 216–17, 218, 219, 221–2, 223 advertising business, 94, 228 censorship on, 216–17, 224–6, 236 collective bargaining and, 164 data collection on, 228, 239–40 extremism and, 233–4 Instagram acquisition (2012), 117, 120 integrity teams, 234 interoperability, 237–8 Kenosha unrest shooting (2020), 224 misinformation on, 201, 225 network effect and, 98, 223 Oculus acquisition (2014), 117 pay at, 156–7 Phan photo controversy (2016), 216–17, 224, 225 platform model, 101 polarisation and, 233 relationship status on, 221–2 Rohingya ethnic cleansing (2018), 224, 225 US presidential election (2016), 217 WhatsApp acquisition (2014), 117 facial recognition, 152, 208 Factory Act (UK, 1833), 81 Fairchild Semiconductor, 19, 21 fake news, 201–4 family dinners, 86 farming, 170–72, 251 Farrar, James, 148 fax machines, 97 Federal Aviation Administration (US), 236 feedback loops, 3, 13 fertilizers, 35, 90 5G, 203 Financial Conduct Authority, 122 Financial Times, 183 Finland, 160, 211–12 Fitbit, 158 Fiverr, 144 flashing of headlights, 83 flexicurity, 160, 257 flints, 42 flywheels, 54 Ford, 54, 92, 162 Ford, Gerald, 114 Ford, Henry, 54, 162 Ford, Martin, 125 Fortnite, 116 fossil fuels, 40, 159, 172 France, 100, 138, 139, 147, 163 free-market economics, 63–4 freelance work, 10, 71, 142–9 Frey, Carl, 129, 134, 141 Friedman, Milton, 63–4, 241 Friedman, Thomas, 167 FriendFeed, 238 Friendster, 26 Fudan University, 245 fund management, 132 Galilei, Galileo, 83 gaming, 86 Gates, Bill, 17, 25, 84 gender, 6 General Agreement on Tariffs and Trade, 87 General Data Protection Regulation (GDPR), 226 General Electric, 52 General Motors, 92, 125, 130 general purpose technologies, 10, 45–8 generative adversarial networks (GANs), 58 Geneva Conventions, 193, 199, 209 Genghis Khan, 44 GEnie, 100 genome sequencing, 40–41, 90, 229, 234, 245–7, 250, 252 Germany, 75, 134, 147 Giddens, Anthony, 82 gig economy, 10, 71, 142–9, 153, 162, 164, 239, 252, 255 Gilbreth, Lillian, 150 Ginsparg, Paul, 59 GitHub, 58, 60 GlaxoSmithKline, 229–30 global financial crisis (2007–9), 168 Global Hawk drones, 206 global positioning systems (GPS), 197 globalisation, 11, 62, 64, 156, 166, 167–71, 177, 179, 187, 193 internet and, 185 conflict and, 189, 193, 194 Glocer, Thomas, 56 Go (game), 132 GOAT, 102 Gojek, 103 Golden Triangle, 170 Goldman Sachs, 151 Goodfellow, Ian, 58 Google, 5, 35, 36, 94, 98, 104, 108, 115, 122 advertising business, 94, 112–13, 116, 117, 227 Android, 85, 94, 117, 120 chip production, 113 Covid-19 pandemic (2019–21), 222–3 data network effect, 106–7 death benefits, 151 Double Irish tax loophole, 119 Maps, 113 quantum computing, 35 R&D, 114, 118 vertical integration, 112–13, 116 X, 114 YouTube acquisition (2006), 112, 117 Gopher, 59, 100 GPT-3, 33 Graeber, David, 133–4 Grand Bazaar, Istanbul, 102 Graphcore, 34, 35 graphics chips, 34 Grateful Dead, The, 184 gravitational potential energy, 53 gravity bombs, 195 Greater Bay Area, China, 182 Greenberg, Andy, 199 Gross, Bill, 53 Grove, Andrew, 17 GRU (Glavnoje Razvedyvatel’noje Upravlenije), 199 Guangzhou, Guangdong, 182 Guardian, 8, 125, 154, 226, 227 Guiyang, Guizhou, 166 H1N1 virus, 75 Habermas, Jürgen, 218 Hard Times (Dickens), 80 Hardin, Garrett, 241 Harop drones, 207–8 Harpy drones, 207–8 Harvard University, 150, 218, 220, 221, 253 healthcare artificial intelligence and, 57–8, 88, 103 data and, 230, 239, 250–51 wearable devices and, 158, 251 Helsinki, Finland, 160 Herlev Hospital, Denmark, 58 Hinton, Geoffrey, 32, 126–7 HIPA Act (US, 1996), 230 Hitachi, 152 Hobbes, Thomas, 210 Hoffman, Josh, 174 Hoffman, Reid, 110, 111 Holmes, Edward, 245 homophily, 231–4 Hong Kong, 182 horizontal expansion, 111–12, 218 Houston Islam protests (2016), 203 Houthis, 206 Howe, Jeff, 143 Hsinchu, Taiwan, 181 Hughes, Chris, 217 Hull, Charles, 43 Human + Machine (Daugherty), 141 human brain, 77 human genome, 40–41, 90, 229, 234, 250 human resources, 150 Hussein, Saddam, 195 Hyaline, 174 hydroponics, 171 hyperinflation, 75 IBM, 17, 21, 47, 98 IDC, 219 Ideal-X, 61 Ikea, 144 Illumina, 41 Ilves, Toomas Hendrik, 190 ImageNet, 32 immigration, 139, 168, 183–4 Impossible Foods, 69 Improv, 99 income inequality, 155–8, 161, 168 India, 103, 145, 181, 186, 224, 253, 254 Indonesia, 103 Industrial Revolution (1760–1840), 79–81, 157, 235 informational networks, 59–60 ING, 178 innovation, 14, 117 Innovator’s Dilemma, The (Christensen), 24 Instagram, 84, 117, 120, 121, 237 institutions, 9, 10, 79–88, 90–91 path dependence, 86–7 punctuated equilibrium, 87–8 intangible economy, 104–7, 118, 156, 175, 180 integrated circuits, 19 Intel, 16–17, 19, 163 intellectual property law, 82 Intermediate-Range Nuclear Forces Treaty (1987), 237 International Alliance of App-Based Transport Workers, 164 International Court of Justice, 224 International Criminal Court, 208 International Energy Agency, 77, 82 International Labour Organization, 131 International Monetary Fund (IMF), 87, 167, 187 international organisations, 82 International Organization for Standardization, 55, 61 International Rescue Committee, 184 International Telecommunication Union, 55 internet, 7, 47–8, 55, 65, 72, 75, 84–5, 88, 115, 184–6 code is law, 220–22, 235 data and, 11, 32, 71 informational networks, 59–60 localisation, 185–6 lockdowns and, 12 network effect, 100–101 online shopping, 48, 61, 62, 75, 94, 102, 135 platform model and, 102 public sphere and, 223 standardisation, 55 Wi-Fi, 151 interoperability, 55, 120–22, 237–9, 241, 243, 256–7 iPhone, 47, 62, 85, 94, 115, 175 Iran, 186, 196, 198, 203, 206 Iraq, 195–6, 201, 209 Ireland, 57–8, 119 Islamic State, 194, 233 Israel, 37, 188, 195–6, 198, 206, 207–8 Istanbul, Turkey, 102 Jacobs, Jane, 182 Japan, 37, 152, 171, 174 Jasanoff, Sheila, 253 JD.com, 137 Jena, Rajesh, 127 Jio, 103 job interviews, 153, 156 John Paul II, Pope, 83 Johnson, Boris, 79 Jumia, 103 just in time supply chains, 61–2 Kahneman, Daniel, 74 KakaoTalk, 27 Kaldor, Mary, 194 Kapor, Mitchell, 99 Karunaratne, Sid, 140–41, 151 Kenosha unrest shooting (2020), 224 Keynes, John Maynard, 126, 158 Khan, Lina, 119 Khartoum, Sudan, 183 Kim Jong-un, 198 King’s College London, 179 Kiva Systems, 136 Kobo360, 145 Kodak, 83–4, 88 Kranzberg, Melvin, 254 Krizhevsky, Alex, 32–3, 34 Kubursi, Atif, 178 Kurdistan Workers’ Party, 206 Kurzweil, Ray, 29–31, 33, 35, 77 Lagos, Nigeria, 182 Lahore, Pakistan, 102 landmines, 213 Law of Accelerating Returns, 30–31, 33, 35 Laws of Motion, 20 learning by doing, 48, 53 Leggatt, George, 148 Lemonade, 56 Lessig, Larry, 220–21 Leviathan (Hobbes), 210 Li Fei-Fei, 32 life expectancy, 25, 26 light bulbs, 44, 157 Lime, 27 Limits to Growth, The (Meadows et al.), 73 linear value chains, 101 LinkedIn, 26, 110, 121, 237, 238 Linkos Group, 197 Linux OS, 242 Lipsey, Richard, 45 lithium-ion batteries, 40, 51 lithium, 170 localism, 11, 166–90, 252, 255 log files, 227 logarithmic scales, 20 logic gates, 18 logistic curve, 25, 30, 51, 52, 69–70 London, England, 180, 181, 183 London Underground, 133–4 looms, 157 Lordstown Strike (1972), 125 Lotus Development Corporation, 99 Luddites, 125, 253 Lufa Farms, 171–2 Luminate, 240 lump of labour fallacy, 139 Lusaka, Zambia, 15 Lyft, 146, 148 machine learning, 31–4, 54, 58, 88, 127, 129, 143 MacKinnon, Rebecca, 223 Maersk, 197, 199, 211 malaria, 253 Malaysia Airlines Flight 17 shootdown (2014), 199 Malta, 114 Malthus, Thomas, 72–3 malware, 197 Man with the Golden Gun, The (1974 film), 37 manufacturing, 10, 39, 42–4, 46, 166–7, 175–9 additive, 43–4, 46, 48, 88, 166, 169, 175–9 automation and, 130 re-localisation, 175–9 subtractive, 42–3 market saturation, 25–8, 51, 52 market share, 93–6, 111 Marshall, Alfred, 97 Massachusetts Institute of Technology, 18, 147, 202, 238 Mastercard, 98 May, Theresa, 183 Mayors for a Guaranteed Income, 189 McCarthy, John, 31 McKinsey, 76, 94 McMaster University, 178 measles, 246 Mechanical Turk, 142–3, 144, 145 media literacy, 211–12 meningitis, 246 Mexico, 202 microorganisms, 42, 46, 69 Microsoft, 16–17, 65, 84–5, 88, 98–9, 100, 105, 108, 122, 221 Bing, 107 cloud computing, 85 data collection, 228 Excel, 99 internet and, 84–5, 100 network effect and, 99 Office software, 98–9, 110, 152 Windows, 85, 98–9 Workplace Productivity scores, 152 Mill, John Stuart, 193 miniaturisation, 34–5 minimum wage, 147, 161 misinformation, 11, 191, 192, 200–204, 209, 212, 217, 225, 247–8 mobile phones, 76, 121 see also smartphones; telecom companies Moderna, 245, 247 Moixa, 174 Mondelez, 197, 211 Mongol Empire (1206–1368), 44 monopolies, 10, 71, 94, 95, 114–24, 218, 255 Monopoly (board game), 82 Montreal, Quebec, 171 mood detection systems, 152 Moore, Gordon, 19, 48 Moore’s Law, 19–22, 26, 28–9, 31, 34, 63, 64, 74 artificial intelligence and, 32, 33–4 Kodak and, 83 price and, 41–2, 51, 68–9 as social fact, 29, 49 superstar companies and, 95 time, relationship with, 48–9 Moravec, Hans, 131 Moravec’s paradox, 131–2 Motorola, 76 Mount Mercy College, Cork, 57 Mozilla Firefox, 242 Mumbai, India, 181 mumps, 246 muskets, 54–5 MySpace, 26–7 Nadella, Satya, 85 Nagorno-Karabakh War (2020), 206–7 napalm, 216 NASA (National Aeronautics and Space Administration), 56 Natanz nuclear site, Iran, 196 National Health Service (NHS), 87 nationalism, 168, 186 NATO (North Atlantic Treaty Organization), 191, 213 Netflix, 104, 107, 109, 136, 137, 138, 139, 151, 248 Netherlands, 103 Netscape Communicator, 6 networks, 58–62 network effects, 96–101, 106, 110, 121, 223 neural networks, 32–4 neutral, technology as, 5, 220–21, 254 new wars, 194 New York City, New York, 180, 183 New York Times, 3, 125, 190, 228 New Zealand, 188, 236 Newton, Isaac, 20 Nigeria, 103, 145, 182, 254 Niinistö, Sauli, 212 Nike, 102 nitrogen fertilizers, 35 Nixon, Richard, 25, 114 Nobel Prize, 64, 74, 241 Nokia, 120 non-state actors, 194, 213 North Korea, 198 North Macedonia, 200–201 Norway, 173, 216 NotPetya malware, 197, 199–200, 211, 213 Novell, 98 Noyce, Robert, 19 NSO Group, 214 nuclear weapons, 193, 195–6, 212, 237 Nuremberg Trials (1945–6), 208 O’Reilly, Tim, 107 O’Sullivan, Laura, 57–8, 60 Obama, Barack, 205, 214, 225 Ocado, 137 Ocasio-Cortez, Alexandria, 239 Oculus, 117 oDesk, 144 Ofcom, 8 Ofoto, 84 Ogburn, William, 85 oil industry, 172, 250 Houthi drone attacks (2019), 206 OAPEC crisis (1973–4), 37, 258 Shamoon attack (2012), 198 Standard Oil breakup (1911), 93–4 Olduvai, Tanzania, 42 online shopping, 48, 61, 62, 75, 94, 102, 135 open-source software, 242 Openreach, 123 Operation Opera (1981), 195–6, 209 opium, 38 Orange, 121 Organisation for Economic Co-operation and Development (OECD), 119, 167 Osborne Computer Corporation, 16 Osborne, Michael, 129 Osirak nuclear reactor, Iraq, 195–6, 209 Ostrom, Elinor, 241 Oxford University, 129, 134, 203, 226 pace of change, 3 pagers, 87 Pakistan, 145, 205 palladium, 170 PalmPilot, 173 panopticon, 152 Paris, France, 181, 183 path dependence, 86 PayPal, 98, 110 PC clones, 17 PeerIndex, 8, 201, 237 Pegasus, 214 PeoplePerHour, 144 PepsiCo, 93 Perez, Carlota, 46–7 pernicious polarization, 232 perpetual motion, 95, 106, 107, 182 Petersen, Michael Bang, 75 Phan Thi Kim Phuc, 216–17, 224, 225 pharmaceutical industry, 6, 93, 250 phase transitions, 4 Philippines, 186, 203 Phillips Exeter Academy, 150 phishing scams, 211 Phoenix, Arizona, 134 photolithography, 19 Pigou, Arthur Cecil, 97 Piketty, Thomas, 160 Ping An Good Doctor, 103, 250 Pix Moving, 166, 169, 175 PKK (Partîya Karkerên Kurdistanê), 206 Planet Labs, 69 platforms, 101–3, 219 PlayStation, 86 plough, 157 Polanyi, Michael, 133 polarisation, 231–4 polio, 246 population, 72–3 Portify, 162 Postel, Jon, 55 Postings, Robert, 233 Predator drones, 205, 206 preprints, 59–60 price gouging, 93 price of technology, 22, 68–9 computing, 68–9, 191, 249 cyber-weapons, 191–2 drones, 192 genome sequencing, 41–2, 252 renewable energy, 39–40, 250 printing press, 45 public sphere, 218, 221, 223 Pulitzer Prize, 216 punctuated equilibrium, 87–8 al-Qaeda, 205, 210–11 Qatar, 198 quantum computing, 35 quantum physics, 29 quarantines, 12, 152, 176, 183, 246 R&D (research and development), 67–8, 113, 118 racial bias, 231 racism, 225, 231, 234 radicalisation pathways, 233 radiologists, 126 Raford, Noah, 43 Raz, Ze’ev, 195, 209 RB, 197 re-localisation, 11, 166–90, 253, 255 conflict and, 189, 193, 194, 209 Reagan, Ronald, 64, 163 religion, 6, 82, 83 resilience, 257 reskilling, 159–60 responsibility gap, 209 Restrepo, Pascual, 139 Reuters, 8, 56, 132 revolutions, 87 Ricardo, David, 169–70, 177 rights, 240–41 Rise of the Robots, The (Ford), 125 Rittenhouse, Kyle, 224 Roche, 67 Rockefeller, John, 93 Rohingyas, 224 Rome, ancient, 180 Rose, Carol, 243 Rotterdam, Netherlands, 56 Rule of Law, 82 running shoes, 102, 175–6 Russell, Stuart, 31, 118 Russian Federation, 122 disinformation campaigns, 203 Estonia cyberattacks (2007), 190–91, 200 Finland, relations with, 212 Nagorno-Karabakh War (2020), 206 nuclear weapons, 237 Ukraine cyberattacks (2017), 197, 199–200 US election interference (2016), 217 Yandex, 122 S-curve, 25, 30, 51, 52, 69–70 al-Sahhaf, Muhammad Saeed, 201 Salesforce, 108–9 Saliba, Samer, 184 salt, 114 Samsung, 93, 228 San Francisco, California, 181 Sandel, Michael, 218 Sanders, Bernard, 163 Sandworm, 197, 199–200, 211 Santander, 95 Sasson, Steve, 83 satellites, 56–7, 69 Saturday Night Fever (1977 soundtrack), 72 Saudi Arabia, 108, 178, 198, 203, 206 Schmidt, Eric, 5 Schwarz Gruppe, 67 Second Machine Age, The (Brynjolfsson and McAfee), 129 self-driving vehicles, 78, 134–5, 141 semiconductors, 18–22, 28–9, 48–9, 52, 113, 251 September 11 attacks (2001), 205, 210–11 Shamoon virus, 198 Shanghai, China, 56 Shannon, Claude, 18 Sharp, 16 Shenzhen, Guangdong, 182 shipping containers, 61–2, 63 shopping, 48, 61, 62, 75, 94, 102, 135 Siemens, 196 silicon chips, see chips Silicon Valley, 5, 7, 15, 24, 65, 110, 129, 223 Sinai Peninsula, 195 Sinclair ZX81, 15, 17, 21, 36 Singapore, 56 Singles’ Day, 48 Singularity University, 5 SixDegrees, 26 Skydio R1 drone, 208 smartphones, 22, 26, 46, 47–8, 65, 86, 88, 105, 111, 222 Smith, Adam, 169–70 sneakers, 102, 175–6 Snow, Charles Percy, 7 social credit systems, 230 social media, 26–8 censorship on, 216–17, 224–6, 236 collective bargaining and, 164 data collection on, 228 interoperability, 121, 237–8 market saturation, 25–8 misinformation on, 192, 201–4, 217, 247–8 network effect, 98, 223 polarisation and, 231–4 software as a service, 109 solar power, 37–8, 53, 65, 77, 82, 90, 171, 172, 173, 249, 250, 251 SolarWinds, 200 Solberg, Erna, 216 South Africa, 170 South Korea, 188, 198, 202 Southey, Robert, 80 sovereignty, 185, 199, 214 Soviet Union (1922–91), 185, 190, 194, 212 Spain, 170, 188 Spanish flu pandemic (1918–20), 75 Speedfactory, Ansbach, 176 Spire, 69 Spotify, 69 Sputnik 1 orbit (1957), 64, 83 stagflation, 63 Standard and Poor, 104 Standard Oil, 93–4 standardisation, 54–7, 61, 62 Stanford University, 32, 58 Star Wars franchise, 99 state-sized companies, 11, 67 see also superstar companies states, 82 stirrups, 44 Stockholm International Peace Research Institute, 208 Stockton, California, 160 strategic snowflakes, 211 stress tests, 237 Stuxnet, 196, 214 Sudan, 183 superstar companies, 10, 11, 67, 94–124, 218–26, 252, 255 blitzscaling, 110 collective bargaining and, 163 horizontal expansion, 111–12, 218 increasing returns to scale, 108–10 innovation and, 117–18 intangible economy, 104–7, 118, 156 interoperability and, 120–22, 237–9 monopolies, 114–24, 218 network effect, 96–101, 121 platform model, 101–3, 219 taxation of, 118–19 vertical expansion, 112–13 workplace cultures, 151 supply chains, 61–2, 166–7, 169, 175, 187, 252 surveillance, 152–3, 158 Surviving AI (Chace), 129 Sutskever, Ilya, 32 synthetic biology, 42, 46, 69, 174, 245, 250 Syria, 186 Taiwan, 181, 212 Talkspace, 144 Tallinn, Estonia, 190 Tang, Audrey, 212 Tanzania, 42, 183 TaskRabbit, 144 Tasmania, Australia, 197 taxation, 10, 63, 96, 118–19 gig economy and, 146 superstar companies and, 118–19 Taylor, Frederick Winslow, 150, 152, 153, 154 Tel Aviv, Israel, 181 telecom companies, 122–3 Tencent, 65, 104, 108, 122 territorial sovereignty, 185, 199, 214 Tesco, 67, 93 Tesla, 69, 78, 113 Thailand, 176, 203 Thatcher, Margaret, 64, 163 Thelen, Kathleen, 87 Thiel, Peter, 110–11 3D printing, see additive manufacturing TikTok, 28, 69, 159–60, 219 Tisné, Martin, 240 Tomahawk missiles, 207 Toyota, 95 trade networks, 61–2, 166–7, 169, 175 trade unions, see collective bargaining Trading Places (1983 film), 132 Tragedy of the Commons, The (Hardin), 241 transistors, 18–22, 28–9, 48–9, 52, 113, 251 transparency, 236 Treaty of Westphalia (1648), 199 TRS-80, 16 Trump, Donald, 79, 119, 166, 201, 225, 237 Tufekci, Zeynep, 233 Turing, Alan, 18, 22 Turkey, 102, 176, 186, 198, 202, 206, 231 Tversky, Amos, 74 23andMe, 229–30 Twilio, 151 Twitch, 225 Twitter, 65, 201, 202, 219, 223, 225, 237 two cultures, 7, 8 Uber, 69, 94, 102, 103, 106, 142, 144, 145 Assembly Bill 5 (California, 2019), 148 engineering jobs, 156 London ban (2019), 183, 188 London protest (2016), 153 pay at, 147, 156 satisfaction levels at, 146 Uber BV v Aslam (2021), 148 UiPath, 130 Ukraine, 197, 199 Unilever, 153 Union of Concerned Scientists, 56 unions, see collective bargaining United Arab Emirates, 43, 198, 250 United Autoworkers Union, 162 United Kingdom BBC, 87 Biobank, 242 Brexit (2016–20), 6, 168 collective bargaining in, 163 Covid-19 epidemic (2020–21), 79, 203 DDT in, 253 digital minilateralism, 188 drone technology in, 207 flashing of headlights in, 83 Golden Triangle, 170 Google and, 116 Industrial Revolution (1760–1840), 79–81 Luddite rebellion (1811–16), 125, 253 misinformation in, 203, 204 National Cyber Force, 200 NHS, 87 self-employment in, 148 telecom companies in, 123 Thatcher government (1979–90), 64, 163 United Nations, 87, 88, 188 United States antitrust law in, 114 automation in, 127 Battle of the Overpass (1937), 162 Capitol building storming (2021), 225 China, relations with, 166 Cold War (1947–91), 194, 212, 213 collective bargaining in, 163 Covid-19 epidemic (2020–21), 79, 202–4 Cyber Command, 200, 210 DDT in, 253 drone technology in, 205, 214 economists in, 63 HIPA Act (1996), 230 Kenosha unrest shooting (2020), 224 Lordstown Strike (1972), 125 manufacturing in, 130 misinformation in, 202–4 mobile phones in, 76 nuclear weapons, 237 Obama administration (2009–17), 205, 214 polarisation in, 232 presidential election (2016), 199, 201, 217 presidential election (2020), 202–3 Reagan administration (1981–9), 64, 163 self-employment in, 148 September 11 attacks (2001), 205, 210–11 shipping containers in, 61 shopping in, 48 solar energy research, 37 Standard Oil breakup (1911), 93–4 taxation in, 63, 119 Trump administration (2017–21), 79, 119, 166, 168, 201, 225, 237 Vietnam War (1955–75), 216 War on Terror (2001–), 205 universal basic income (UBI), 160, 189 universal service obligation, 122 University of Cambridge, 127, 188 University of Chicago, 63 University of Colorado, 73 University of Delaware, 55 University of Oxford, 129, 134, 203, 226 University of Southern California, 55 unwritten rules, 82 Uppsala Conflict Data Program, 194 UpWork, 145–6 USB (Universal Serial Bus), 51 Ut, Nick, 216 utility providers, 122–3 vaccines, 12, 202, 211, 245–7 Vail, Theodore, 100 value-free, technology as, 5, 220–21, 254 Veles, North Macedonia, 200–201 Véliz, Carissa, 226 Venezuela, 75 venture capitalists, 117 vertical expansion, 112–13, 116 vertical farms, 171–2, 251 video games, 86 Vietnam, 61, 175, 216 Virological, 245 Visa, 98 VisiCalc, 99 Vodafone, 121 Vogels, Werner, 68 Wag!

Mbs: The Rise to Power of Mohammed Bin Salman
by Ben Hubbard
Published 10 Mar 2020

At least four others were targeted around the same time: two prominent Saudi dissidents in London, a researcher for Amnesty International, and a Saudi activist in Canada named Omar Abdulaziz. Technology researchers with a group called “Citizen Lab” at the University of Toronto concluded that hackers linked to Saudi Arabia had launched the attacks with software from NSO Group, an Israeli company. Some of the targets had fallen into the trap, including Abdulaziz, who had recently struck up a friendship with Khashoggi. (A spokesperson for NSO Group said the company did not comment on specific cases but that its product was “not a tool to target journalists for doing their job or to silence critics.”) Abdulaziz was in his late twenties and had moved to Canada years before on a Saudi government scholarship.

researcher for Amnesty International: “Amnesty International staff targeted with malicious spyware,” Amnesty International, Aug. 1, 2018, and author interview, Yahya Assiri, July 2019. struck up a friendship with Khashoggi: “The Kingdom Came to Canada,” Citizen Lab, Oct. 1, 2018. “doing their job or to silence critics”: Author correspondence, NSO Group spokesperson, Aug. 2019. The company said its technology has helped governments save “an untold number of lives” by helping prevent terrorist attacks, stop drug and sex trafficking, and rescue kidnapped children. It says it investigates reports of misuse and responds appropriately, including by shutting down its clients’ ability to use its products.

pages: 1,380 words: 190,710

Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems
by Heather Adkins , Betsy Beyer , Paul Blankinship , Ana Oprea , Piotr Lewandowski and Adam Stubblefield
Published 29 Mar 2020

Policing domestic activity Governments may also break into systems to police domestic activity. In a recent example, NSO Group, a cybersecurity contractor, sold software to various governments that allowed private surveillance of communications between people without their knowledge (through the remote monitoring of mobile phone calls). Reportedly, this software was intended to surveil terrorists and criminals—relatively noncontroversial targets. Unfortunately, some of NSO Group’s government customers have also used the software to listen in on journalists and activists, in some cases leading to harassment, arrest, and even possibly death.3 The ethics of governments using these capabilities against their own people is a hotly debated topic, especially in countries without strong legal frameworks and proper oversight.

Both are good resources for anyone designing secure and reliable systems, as their findings are still relevant today. 2 As an example of how complicated this space can be, not all attackers in such conflicts are part of an organized military. For example, Dutch attackers reportedly compromised the US military during the Persian Gulf War (1991) and offered stolen information to the Iraqi government. 3 NSO Group’s activities have been researched and documented by The CitizenLab, a research and policy laboratory based at the Munk School of Global Affairs & Public Policy, University of Toronto. For an example, see https://oreil.ly/IqDN_. 4 There is some debate about who coined this term and what it means, but it became widely used after 1996 when it was adopted by Hacktivismo, a group associated with the Cult of the Dead Cow (cDc). 5 Anonymous is a moniker that a wide variety of people use for hacktivist (and other) activities.

Liberia, Criminal Actors libFuzzer, How Fuzz Engines Work linters, Automated Code Inspection Tools LLVM Clang, How Fuzz Engines Work load balancing, Defendable Architecture load shedding, Load shedding location separation, Location Separation-Isolation of confidentialityaligning physical and logical architecture, Aligning physical and logical architecture isolation of confidentiality, Isolation of confidentiality isolation of trust, Isolation of trust location-based trust, Isolation of trust Lockheed Martin, Intelligence gathering loggingattackers' bypassing of, Small Functional APIs budget for, Budget for Logging collecting appropriate/useful logs, Collect Appropriate and Useful Logs-Budget for Logging designing for immutability, Design Your Logging to Be Immutable determining which security logs to retain, Determine Which Security Logs to Retain-Network-based logging and detection intersection of security and reliability, Investigating Systems and Logging logs as attack target, Reliability Versus Security: Design Considerations privacy issues, Take Privacy into Consideration reliability issues, Reliability Lonestar, Criminal Actors lost causes, value of, Pick Your Battles low-dependency service, Low-dependency components-Low-dependency components M malicious actions, recovery from, Malicious Actions malware reports, Threat Intelligence MASVN (minimum acceptable security version numbers), Minimum Acceptable Security Version Numbers-Minimum Acceptable Security Version Numbers mean time to detection (MTTD), Monitoring and Alerting mean time to repair (MTTR), Monitoring and Alerting meetings, in crisis management situations, Meetings Mehta, Neel, Example: Growing Scope—Heartbleed memory corruption, checksums and, Distinguish horses from zebras memory-safe languages, Use memory-safe languages mental modelsidempotency and, Pay attention to idempotent operations understandability and, Mental Models microservicesdesigning for change with, Use Microservices-Example: Google’s frontend design Google's frontend design, Example: Google’s frontend design Google-internal framework, Example: Microservices and the Google Web Application Framework rate-limiting mechanism as, Design to Go as Quickly as Possible (Guarded by Policy) role separation, Role Separation military, cyber warfare and, Military purposes Miller, Matt, Use memory-safe languages minimum acceptable security version numbers (MASVN), Minimum Acceptable Security Version Numbers-Minimum Acceptable Security Version Numbers Mission Control program, Build Empathy mission, of IR team, Establish a Team Charter mistakes, threat modeling and, Threat modeling insider risk MIT (Massachusetts Institute of Technology), Attacker Profiles mitigation doc, Scoping the Recovery mitigation strategies, advanced (see advanced mitigation strategies) MITRE, Tactics, Techniques, and Procedures morale issuesIC's responsibility for, Morale on incident response teams, Establish a Team Charter motivations, of attacker, Attacker Motivations MTTD (mean time to detection), Monitoring and Alerting MTTR (mean time to repair), Monitoring and Alerting multi-party authorization (MPA), Multi-Party Authorization (MPA)code review as, Require Code Reviews reliability and, Investing in a Widely Used Authorization Framework resilience and, Resilience unilateral insider risk protection, Three-Factor Authorization (3FA) multicomponent failure testing, Multicomponent testing multilevel nesting, Avoid Multilevel Nesting mutation testing, When to Write Unit Tests N NASA, Culture of Inevitably nation-state actors, protecting systems from, Protecting your systems from nation-state actors(see also governments) Netflix, Fuzz Testing network intrusion detection systems (NIDSs), Network-based logging and detection nonfunctional requirements, Nonfunctional Requirements nontechnical risks, Costs and nontechnical risks North Korea, Attacker Motivations notes, keeping during recovery, Recovery Logistics, Postmortems NotPetya ransomware, Risk Assessment Considerations NSA, Risk Assessment Considerations NSO Group, Policing domestic activity O observability, improving, Improve observability OIDC (OpenID Connect), Identities, Example: Identity model for the Google production system OL (operations lead), Establishing Your Incident Team one-time passwords (OTPs), Example: Strong second-factor authentication using FIDO security keys-Example: Strong second-factor authentication using FIDO security keys one-time programmable (OTP) devices, Rolling back firmware and other hardware-centric constraints OODA (observe, orient, decide, act) loop, Parallelizing the Incident open source componentsfor Google custom CA, Securing Third-Party and Open Source Components third-party insider threats, Third-party insiders OpenID Connect (OIDC), Identities, Example: Identity model for the Google production system OpenSSHconfiguration distribution via, POSIX API via OpenSSH custom OpenSSH ForceCommand, Custom OpenSSH ForceCommand OpenSSL library, Evolution, Example: Growing Scope—Heartbleed operating parameters, IR team, Define Operating Parameters for Engaging the IR Team operating system logs, Operating system logs Operation Aurora, Protecting your systems from nation-state actors, After the Recovery operational overload, Set aside time for debugging and investigations, Know what’s normal for your system operational security (OpSec)crisis management, Operational Security-Operational Security hypothetical crisis management example, Communications and Operational Security trading good OpSec for the greater good, Trading Good OpSec for the Greater Good operations lead (OL), Establishing Your Incident Team OSS-Fuzz, Example: ClusterFuzz and OSSFuzz OTP (one-time programmable) devices, Rolling back firmware and other hardware-centric constraints OTPs (one-time passwords), Example: Strong second-factor authentication using FIDO security keys-Example: Strong second-factor authentication using FIDO security keys overcommunication, Example: Increasing HTTPS usage, Misunderstandings, Overcommunicate and Be Transparent overprovisioning, Defender’s Strategy P panic rooms, Graceful Failure and Breakglass Mechanisms parallelizing an incident, Parallelizing the Incident Park Jin Hyok, Attacker Motivations partial restores, Persistent data passwords, On Passwords and Power Drills patch, defined, Short-Term Change: Zero-Day Vulnerability payment processing system design (case study), Example: Payment Processing-Security riskssecurity/reliability considerations, Security and reliability considerations third-party service provider for sensitive data, Using a third-party service provider to handle sensitive data-Security risks Peach Fuzzer, How Fuzz Engines Work penetration testers, Vulnerability Researchers, Special Teams: Blue and Red Teams permissions, Classifying Access Based on Risk persistent data, Persistent data personally identifiable information (PII), Security and reliability considerations Petya ransomware, Risk Assessment Considerations phishing attackcredential rotation and, Credential and Secret Rotation recovery from, Large-Scale Phishing Attack-Large-Scale Phishing Attack two-factor authentication to address risk of, Example: Strong second-factor authentication using FIDO security keys phone bridges, Communications physical location, Location Separation-Isolation of confidentiality PII (personally identifiable information), Security and reliability considerations pivot points, The Investigative Process playbooks, IR team, Create Detailed Playbooks poisoned regions, Dynamic Program Analysis police (see law enforcement agencies) policiesavoiding automated unsupervised changes, A foothold for humans creating unambiguous, Create Unambiguous Policies POSIX API, Small Functional APIs, POSIX API via OpenSSH postmortems, Postmortems-Postmortems, Building a Culture of Security and Reliability, Culture of Inevitably post_install command, Host management prestaging (disaster planning), Prestaging Systems and People Before an Incident-Processes and Proceduresconfiguring systems, Configuring Systems processes and procedures, Processes and Procedures training, Training pre_rm command, Host management priority models, IR teams and, Establish Severity and Priority Models privacy, logging and, Take Privacy into Consideration productionintersection of security and reliability, From Design to Production safe proxies in production environments, Safe Proxies in Production Environments-Safe Proxies in Production Environments single system testing/fault injection, Single system testing/fault injection testing response in production environments, Testing Response in Production Environments productivityincreasing, Increase Productivity and Usability-Increase Productivity and Usability least privilege and, Impact on User Productivity profile, attacker, Attacker Profiles program analysisdynamic, Dynamic Program Analysis-Dynamic Program Analysis static, Static Program Analysis-Formal Methods(see also static analysis) Project Shield, Defendable Architecture provenancebinary, Binary Provenance-What to put in binary provenance, Data Sanitization data sanitization and, Data Sanitization ensuring unambiguous provenance, Ensure Unambiguous Provenance provenance-based deployment policies, Provenance-Based Deployment Policies-Implementing policy decisions proxies, Proxiesbenefits of, Safe Proxies in Production Environments downsides of, Safe Proxies in Production Environments safe (see safe proxies (case study)) pseudonymization, Take Privacy into Consideration publicly trusted certificate authority (CA), Case Study: Designing, Implementing, and Maintaining a Publicly Trusted CA-Conclusion Purple Team, Evaluating Responses, Special Teams: Blue and Red Teams Pwn2Own, Speed Matters Pwnium, Speed Matters Q quality-of-service (QoS) controls, Graceful Degradation quarantine (isolation)assets, Isolating Assets (Quarantine)-Isolating Assets (Quarantine) compartments and, Controlling the Blast Radius R random errors, recovery from, Random Errors ransomware attacks, Criminal ActorsPetya, Risk Assessment Considerations responses based on culture, Triaging the Incident Rapid (software release tool at Google), System Rebuilds and Software Upgrades rate-limiting mechanism, Design to Go as Quickly as Possible (Guarded by Policy) readability, Rollout Strategy recovery, Recovery and Aftermath-Credential and Secret Rotation, Examples-Targeted Attack Requiring Complex Recoveryaftermath of, After the Recovery-Postmortems attacker's response to, How will your attacker respond to your recovery effort?

pages: 302 words: 85,877

Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World
by Joseph Menn
Published 3 Jun 2019

Despite such claims, researchers often found repressive regimes deploying wares from companies like UK- and Germany-based Gamma Group and Italian firm Hacking Team against human rights advocates, journalists, and minority-party politicians. Much later, a devastating series of four front-page reports in the New York Times, driven by Citizen Lab findings, documented Israeli company NSO Group’s Pegasus spyware being used against Mexican journalists, politicians, and others in Mexico, including officials investigating mass disappearances and even anti-obesity campaigners. Mexico’s president ordered an investigation that the FBI concluded was a sham. Time and time again, the lab’s independent academic structure gave it a way to write about what others could not.

See Tucker, Chris 9/11 attacks, 113–114, 116–117, 119, 133, 187 Ninja Strike Force (NSF), 6, 62–63, 81, 116–117, 121, 129–130, 177, 193–196 Noisebridge, 155 No Logo: Taking Aim at the Brand Bullies (Klein), 96 nonprofits, 102, 130, 132, 152, 164, 182, 188 Noonan, Timothy (Matlock), 195–196 NORAD, 58 NPR, 67 NSO Group, 133 Obama, Barack (administration), 104, 168, 204 Obscure Images. See Leonard, Paul O’Donnell, Adam (Javaman), 104–105, 141, 152, 156–157, 193 political fundraising by, 1–2, 4–6, 201–202 Olson, Parmy, 145, 149 Omega. See Kubecka, Misha Onion Router. See Tor OpenCola, 127 OpenNet Initiative, 132 open-source projects, 108, 113, 123, 127 operating systems, 63, 92 software, 26, 46, 78, 98, 163 Operation Tunisia, 149–150 Oracle, 74, 122 O’Rourke, Robert “Beto” (Psychedelic Warlord), 5–7, 15–17, 92–93, 141, 188–192, 196, 201–207 Osband, Robert (Cheshire Catalyst), 19, 55 Oxblood Ruffin.

pages: 295 words: 84,843

There's a War Going on but No One Can See It
by Huib Modderkolk
Published 1 Sep 2021

Characteristically, the Netherlands’ solution is one of compromise between the governing parties, under which intelligence agencies won’t be allowed to buy exploits from contractors who also sell weapons to dubious regimes. But how do we define ‘dubious’? One of the most notable suppliers, the Israeli NSO Group, sells spyware to the United Arab Emirates (UAE), a country that heavily suppresses freedom of speech. Does that qualify as dubious? What if the Emir of the UAE wiretaps journalists and dissidents using this Israeli software, as has actually happened? Does that cross the line? The law to enlarge cybersecurity therefore also curbs a free internet.

Index Abdeslam, Salah, here ABN Amro, here, here, here Aboutaleb, Ahmed, here advanced persistent threats (APTs), here, here Afghanistan, here, here, here, here AIVD, here, here, here, here, here, here, here, here, here, here, here, here, here, here, here, here agency culture, here and author’s sources, here, here bugging of Iranian ambassador, here and DigiNotar, here, here digital capabilities, here, here, here, here and Gemalto, here and Huawei, here and Iran nuclear plant, here, here Joint Sigint Cyber Unit, here, here, here and Kaspersky Labs, here, here, here number of employees, here relations with Americans, here, here, here, here and Ronald Prins, here and Russian cyber espionage, here, here, here, here, here, here, here AJA (Iranian army), here Akerboom, Erik, here, here, here, here, here Alexander, Keith, here, here Alfa Group, here Al-Qaeda, here al-Shabaab, here, here Amdocs, here Amsterdam Internet Exchange (AMS-IX), here, here, here, here Android OS, here Anonymous (hacker group), here Apeldoorn hospital attack, here APM Terminals, here, here Appen, here, here, here Arab Spring, here Armada Sweep, here ASML, here, here Assange, Julian, here, here backdoors, here, here Bais, Erik, here, here bakabt.com, here Belgacom, here, here, here, here, here, here Belgian Ministry of Foreign Affairs, here Bellens, Didier, here Bertholee, Rob, here, here, here, here, here Biden, Joe, here Biesbrouck, Ralph, here Bijleveld, Ank, here bin Laden, Osama, here Bindt, Pieter, here, here, here Bits of Freedom, here BlackBerry messages, here, here Blok, Eelco, here Bloomberg, here, here, here BND, here Bogachev, Evgeniy (‘Umbro’), here, here, here Boon, Floor, here Bosch van Rosenthal, Eelco, here, here, here, here, here, here Bouman, Gerard, here Boxer armoured fighting vehicles, here Bromet, Frans, here, here Brussels bombings, here, here Bryan, Inge, here Bureau of Investigative Journalism, here Bush, George W., here, here ‘Business Club’, here BVD, here CareerBuilder.com, here Catal separatist movement, here Cellebrite, here certificate authorities (CAs), here Chaos Computer Club, here Chernobyl site, here, here child pornography, here, here Chinese cyber espionage, here, here, here, here, here, here, here Chinese Unit 61398, here, here CIA, here, here, here, here, here, here, here, here, here, here, here, here, here, here and Kaspersky Labs, here, here, here, here Cisco, here, here, here Clapper, James, here Clearview AI, here Clinton, Bill, here, here Clinton, Hillary, here, here, here CNN, here, here, here, here, here Combasca, here, here, here Common, here computer network exploitation (CNE), here, here Comverse, here Concord, here Cools, Ivo, here Covid-19 vaccines, here Cozy Bear, here, here, here, here, here, here, here, here, here, here, here Cyber Intelligence, here de Boer, Hans, here de Bos, Tony, here, here De Croo, Alexander, here De Groene Amsterdammer, here de Jong, Erik, here, here De Standaard, here De Telegraaf, here de Volkskrant, here, here, here, here, here, here, here, here, here de Vries, René, here deep packet inspection, here DEF CON, here Delft University of Technology, here Deloitte, here, here Denk party (Netherlands), here Der Spiegel, here, here, here Derix, Steven, here, here Di Rupio, Elio, here, here Die Hard, here, here DigiNotar, here, here, here, here, here, here, here, here, here, here digital certificates, here DIGIWS146 workstation, here, here distributed denial-of-service (DDoS) attacks, here, here, here Donner, Piet Hein, here, here, here Dorfman, Zach, here DPG Media, here Drake, Thomas, here drone strikes, and civilian casualties, here ‘Droppy’, here DuckDuckGo, here Durbin, Richard, here Dutch Bar Association, here Dutch Criminal Intelligence Unit (CIE), here Dutch Cyber Security Council, here, here Dutch elections, here Dutch House of Representatives, here, here, here, here Dutch Independent Post and Telecommunications Authority, here Dutch Investigatory Powers Commission (TIB), here Dutch Ministry of Foreign Affairs, here, here Dutch Ministry of General Affairs, viii, here Dutch National High Tech Crime Unit, here, here, here, here, here, here, here Dutch National Coordinator for Security and Counterterrorism (NCTV), here, here Dutch National Crime Squad, here Dutch National Crisis Centre, here, here Dutch National Cyber Security Centre (NCSC), here, here, here, here Dutch National Forensic Research Agency, here Dutch National Police Internal Investigation Department, here Dutch National Police Services Agency, here Dutch Safety Board, here Dutch surveillance law and referendum, here, here, here Dutch Tax and Customs Administration, here, here, here ‘Dwaan’, here, here, here Eastern Scheldt Storm Surge Barrier, here Ecatel, here, here Effting, Maud, here El Chapo (Joaquín Guzmán Loera), here Elbit Systems, here Elderenbosch, Onno, here encryption, here, here Ericsson, here EU Copyright Directive, here European Commission, here, here European Medicines Agency (EMA), here European Parliament, here, here, here European Space Agency, here Europol, here EvoSwitch, here Evraz, here exploits, here, here, here Fabrika Trollei, here facial recognition, here Fancy Bear, here, here, here, here, here FBI, here, here, here, here, here, here, here, here, here, here, here, here, here and Mexican drug cartel, here and Russian cyber espionage, here, here, here firewalls, here Five Eyes, here Fox-IT, here, here, here, here, here, here, here, here, here, here and Belgacom, here, here and DigiNotar, here, here, here, here Fridman, Mikhail, here FSB, here, here, here, here, here, here, here Gaddafi, Muammar, here, here Gallagher, Ryan, here, here, here Gamma Group, here Gemalto, here German CERT, here Glimmerglass, here Godane, Ahmed Abdi, here, here Google Maps, here, here GovCERT, here, here, here, here, here Government Communications Headquarters (GCHQ), here, here, here and Belgacom, here, here, here and Gemalto, here number of employees, here Grapperhaus, Ferdinand, here Greenberg, Andy, here Greenwald, Glenn, here, here, here Groenewegen, Frank, here, here GRU, here, here, here Gubarev, Aleksej, here, here, here Gurey, Nuur Osman, here hacking tools, online sales of, here Harvard Belfer Center, here Hayden, Michael, here Hennis, Jeanine, here, here, here, here Hentenaar, Joris, here Hermitage Museum, here Hijzen, Constant, here HNLMS Rotterdam, here Hoekstra, Pete, here HostExploit, here Howard, Philip, here HP Data Protector, here, here, here Huawei, here, here Hurricane Sandy, here iColumbo, here ICQ, here IMEI numbers, here in ’t Veld, Sophie, here ING, here Intellect Service, here Intercept, The, here, here, here Interfax press agency, here International Atomic Energy Agency (IAEA), here iPhones, here Iran, here, here, here, here, here, here, here, here, here, here, here, here, here, here, here, here, here, here Iranian Revolutionary Guard (IRG), here Islamic State, here, here Israel, here, here, here, here, here, here, here, here, here, here, here Jochem, Aart, here, here, here, here Joint Strige Fighter programme, here Juniper, here Kaspersky, Eugene, here Kapersky Labs, here, here, here, here, here, here KGB, here Khabarovsk conference, here Khan, Abdul Qadeer, here Kim Jong-un, here King Servers, here, here Klijnsma, Yonathan, here, here KPN, here, here, here, here, here, here, here, here, here, here, here Kreling, Tom, here, here, here, here, here, here Leaseweb, here, here, here, here, here, here Ledgett, Richard, here Lewinsky, Monica, here Lockheed Martin, here LulzSec, here McCord, Mary, here McFaul, Michael, here machine translation, here McLaughlin, Jenna, here Maersk, here, here Malaysian Airlines flight MH17, here, here, here, here Mali, here, here Mandiant, here, here, here Marriott hotels, here Mastercard, here Máxima, Queen, here M.E.Doc, here, here Meeus, Jan, here, here Merck, here Merkel, Angela, here MI5, here, here, here Mikhailov, Sergei, here, here, here Millennium bug, here MIND CTI, here MIVD, vii, here, here, here, here, here, here, here, here, here, here, here, here agency culture, here and Belgacom, here digital capabilities, here, here, here and Farsi translators, here Joint Sigint Cyber Unit, here, here relations with Americans, here, here, here, here and Russian cyber espionage, here, here Somali surveillance, here, here Mohammad Ali, Omar, here, here, here, here Mondelez, here Montenegro coup attempt, here Morozov, Evgeny, here Mossad, here, here, here, here, here MSD, here MV BBC China, here, here MyHeritage, here MySQL, here N., here, here, here Naomi, here NASA, here, here, here Natanz, here, here, here National Health Service (NHS), here, here National Security Agency (NSA), here, here, here, here, here, here, here, here, here, here, here and Belgacom, here, here, here and Farsi translators, here ‘fishing with dynamite’, here and Gemalto, here and ‘Greek Watergate’, here hardware modifications, here number of employees, here relations with Netherlands, here, here, here Snowden files, here, here, here, here, here, here, here and SolarWinds attack, here and Somalia surveillance, here, here Tailored Access Operations, here NATO, here, here, here NCC Group, here ndsmovies.com, here New York City truck attack, here New York Times, here, here, here NICE Systems, here Nijmegen Queen’s Day festival, here Nixon, Richard, here North Korea, here, here, here, here, here, here, here, here Northwave, here Norwegian University of Science and Technology (NTNU), here NotPetya virus, here, here, here Novaja Gazeta, here NRC Handelsblad, here, here, here, here, here, here, here, here, here NSO Group, here Obama, Barack, here, here, here, here Ocean’s Eleven, here, here OHM2013, here Operation Moonlight Maze, here Operation Olympic Games, here Opstelten, Ivo, here OPTA, here Organisation for the Prohibition of Chemical Weapons (OPCW), here Oxford Internet Institute, here P10 filtering system, here Paauw, Frank, here Pakistan, here, here, here, here, here Pals, Ludo, here Paris bombings, here Paulissen, Wilbert, here PayPal, here, here, here Penn, Sean, here Pentagon, here, here Pérez Dolset, Javier, here Perlroth, Nicole, here Petri, Hans, here ‘Phed’, here phishing emails, here Plasterk, Ronald, here, here, here, here, here Pluijmers, René, here Poitras, Laura, here Politico, here PornHub, here Poroshenko Petro, here Port of Rotterdam, here, here, here, here, here Premier League, here Preneel, Bart, here PricewaterhouseCoopers, here Prigozhin, Yevgeny, here, here Prins, Ronald, here, here, here, here, here, here, here, here, here privacy, here, here, here, here, here Project Victor, here Proximus, here Public Prosecution Service Rotterdam, here Putin, Vladimir, here, here, here, here, here, here Q-Park, here Raiu, Costin, here Rajoy, Mariano, here Regin virus, here, here, here, here Regional Internet Registry for Europe, here Remarque, Philippe, here Renault, here Replay, here Rheinmetall, here, here, here Rid, Thomas, here Robbe, Edwin, here, here Robbe, José, here, here, here, here Robbe, Ruud, here, here Robin, here, here, here Rosneft, here RSA Conference, here Russia Today, here Russian–Dutch relations, here Russian Internet Research Agency (IRA), here Russian Unit 74455, here, here, here Rutte, Mark, vii, here, here, here ‘Sabu’, here Salisbury poisonings, here satellite communications, here, here, here Saudi Arabia, here, here Schiphol Airport, here, here, here, here, here Schneier, Bruce, here Schook, Dick, here SCM, here September 11 attacks, here ShimRatReporter, here Shymkiv, Dmytro, here SIGINT, here SIGINT Development Conference, here, here Signal, here Sinaloa Cartel, here Singapore Press Holdings, here Skripal, Sergei, here Smith, Brad, here SNAP, here Snowden, Edward, here, here, here, here, here, here, here, here, here, here, here, here, here Sochi Winter Olympics, here, here SolarWinds, here, here Somalia, here Sony PlayStation network, here speech transcription software, here Spetsnaz, here SPÖ Social Democratic Party (Austria), here SSL certificates, here Standaert, Geert, here Starr, Barbara, here Startpage.com, here Stasi, here Steman, Jochem, here, here Stone, Chris, here Stoyanov, Ruslan, here STRAP system, here Stuxnet virus, here, here, here, here, here, here, here submarines, here surveillance software, Israeli, here SVR, here, here, here Symbolon project, here Tails OS, here, here Tamene, Yared, here telecommunications billing, here Thomas, Gordon, here Tiger telephones, here TNT Express, here Triton virus, here Trouw, here TrueCrypt, here Trump, Donald, here, here, here, here, here, here, here Turkey, here, here, here, here Turksema, Hans, here TV5 Monde, here Tweakers website, here U., Etienne, here UCN, here Uijlenbroek, Jaap, here UK Home Office, here UK National Crime Agency, here Ukraine, here, here, here, here, here, here, here, here, here, here and annexation of Crimea, here, here, here, here, here, here ultracentrifuges, here, here United Arab Emirates, here United Nations, here University of Tromsø, here University of Twente, here US Democratic Party, here, here, here, here, here, here US Department of Defense, here, here US Department of Homeland Security, here, here US Joint Chiefs of Staff, here, here US presidential elections, here, here, here, here, here, here US State Department, here, here Utrecht child support services, here V., Johan, here van Bergen, Jurre, here van de Beek, Martijn, here van der Heijden, A.

pages: 319 words: 89,192

Spooked: The Trump Dossier, Black Cube, and the Rise of Private Spies
by Barry Meier
Published 17 May 2021

Another investigation looked at how the Mexican government was spying on its political opponents. As part of its mission, Citizen Lab also tracked a hidden industry that produced advanced malware capable of infecting the cellphones of unsuspecting users and monitoring their conversations, emails, texts, and physical location. One kingpin of that dark domain was NSO Group, an Israeli company that produced a spyware program known commonly as Pegasus. The government of Saudi Arabia had used Pegasus to infect the phones of its critics, including friends of Jamal Khashoggi, the opinion writer for The Washington Post who was murdered and dismembered by Saudi agents inside the country’s embassy in Istanbul.

See also Steele, Christopher Miami Herald, 243 Microsoft track changes, 248 Millian, Sergei, 146–148, 152, 160, 210–211, 212, 262, 266–267 Mintz Group, 12 Mirtchev, Alexander, 24–28, 29 misdirection technique, 51–52 Missing Man (Meier), 285 Miss Universe Pageant, in Moscow, 122, 134 Mitchell, Andrea, 207 Mogilevich, Semion, 57 Moore, Rob anti-asbestos movement infiltration by, 38, 50–54 asbestos case fallout, 170–174 background, 33–38 career trajectory, 35, 37–38, 164–165, 170–174 health issues, 165 as possible whistleblower, 163–170 pretexting talent of, 34, 35–36 Morgenthau, Robert, 29 Moscow, John, 24, 83, 89, 113, 114, 122–123 Moscow Ritz-Carlton hotel, 2, 142–143, 186, 220, 267 Moscow Trump Tower, 133–134, 235 Mosk, Matthew, 149 Mossack Fonseca, 298 Mossad, 107 Motherboard (news website), 199 Mother Jones magazine, 66–68, 154–155, 183, 191 MSNBC, 192, 211–212, 241–242 Mueller, Robert, III, 211, 234–235, 244, 253 Mueller report, 234–236, 240, 242, 243 Mukasey, Michael, 123 Murdoch, Rupert, 17–18, 29, 73, 198, 213 Myers, Steven Lee, 157, 158 Nardello & Company, 12 Navigant Consulting, 12 Nazarbayev, Nursultan, 23–24, 25 NBC News, 207, 219 Nekrasov, Andrei, 121 Nello (restaurant), 119, 123–124, 247 Nelson, Jimmy, 260 New Matilda (publication), 173 The New Republic, 117 News Corporation, 17–18 Newseum, 121–122, 124–125 The News of the World, 73, 198 New York City, 77, 114, 119, 122 The New Yorker magazine, 7, 39, 111, 144, 160, 191, 204, 217, 241, 253 New York magazine, 42, 131–132, 235–236 The New York Times anonymous sources policy, 277 Black Cube deal and, 111–112 on Black Cube operatives, 204 Danchenko interview with, 270 Firtash interview with, 108 Fusion GPS and, 132, 144 on Hewlett-Packard, 44–45 on Kroll, 40 op-ed pieces by Simpson and Fritsch, 215 on “pinging” story, 156–158, 253 Simpson interview with, 69 on Steele dossier, 190, 191, 220, 235–236, 243 Nigeria, 43, 164–165 Novirex Sales, 179–180 NSO Group, 195–196, 202 Nunes, Devin, 214, 233 Obama, Barack, 2, 18, 66–68, 103, 108, 142, 158 Occidental College, 87–88 Ohr, Bruce, 139–140, 153, 154, 182, 213, 254 oligarchs. See also Kazakh Trio; specific oligarchs as Black Cube clients, 107 cyber-spying and, 198 Hollingsworth’s database on, 72 as K2 Intelligence clients, 49–50 newspaper founded by, 73–74 self-due diligence reviews and, 47–48 Trump Organization’s partnerships with, 133–134 1MDB scandal, 176–177 online profile management, 104–106 open records regulations and requests, 96–99, 130–132 open-source information, 134 Operation Hellenic, 26–28, 198 oppo (political opposition research), 63–69, 129–136, 181–183.

pages: 619 words: 177,548

Power and Progress: Our Thousand-Year Struggle Over Technology and Prosperity
by Daron Acemoglu and Simon Johnson
Published 15 May 2023

In 2020 a list of about fifty thousand phone numbers was leaked to Forbidden Stories, an international organization striving to publish stories from and about journalists under repression around the globe. The numbers belonged to opposition politicians, human rights activists, journalists, and dissidents who were reportedly being hacked using the Pegasus spyware developed by the Israeli tech company NSO Group (named after the first names of its founders, Niv Karmi, Shalev Hulio, and Omri Lavie). (NSO denies any wrongdoing, saying that the software is provided only to “vetted government customers” and that these customers decide how to use it.) Pegasus is a “zero-click” software, meaning that it can be installed on mobile phones remotely and without requiring a user to click on any links—in other words, it can be installed without the user’s knowledge or consent.

The experimental study of the implications of the Great Firewall, and more context on its implications, is presented in Chen and Yang (2019). “What Orwell feared…” is from Postman (1985, xxi). “[U]nder a scientific…” is from Huxley (1958, 37). From Prometheus to Pegasus. On VK (VKontakte)’s spread and role in protests, see Enikolopov, Makarin, and Petrova (2020). On the NSO Group, see Bergman and Mazzetti (2022). The Pegasus story has been confirmed in widespread reporting by media sources that include the Washington Post, National Public Radio, the New York Times, the Guardian, and Foreign Policy: www.washingtonpost.com/investigations/interactive/2021/nso-spyware-pegasus-cellphones; www.washingtonpost.com/world/2021/07/19/india-nso-pegasus; www.npr.org/2021/02/25/971215788/biden-administra tion-poised-to-release-report-on-killing-of-jamal-khashoggi; www.nytimes.com/2021/07/17/world/middleeast/israel-saudi-khashoggi-hacking-nso.html; www.theguardian.com/world/2021/jul/18/nso-spyware-used-to-target-family-of-jamal-khashoggi-leaked-data-shows-saudis-pegasus; and https://foreignpolicy.com/2021/07/21/india-israel-nso-pegasus-spyware-hack-modi-bjp-democracy-watergate.

For the Saudi claims about a “rogue operation,” see www.reuters.com/article/us-saudi-khashoggi/saudi-arabia-calls-khashoggi-killing-grave-mistake-says-prince-not-aware-idUSKCN1MV0HI. The NSO response to Forbidden Stories appeared here: www.the guardian.com/news/2021/jul/18/response-from-nso-and-governments, beginning with “NSO Group firmly denies false claims made in your report.” NSO specifically rejected any involvement in the killing of Khashoggi: “As NSO has previously stated, our technology was not associated in any way with the heinous murder of Jamal Khashoggi.” More broadly, NSO sums up its policy regarding how its technology is used this way: NSO “does not operate the systems that it sells to vetted government customers, and does not have access to the data of its customers’ targets[,] yet [its customers] are obligated to provide us with such information under investigations.

pages: 483 words: 129,263

Fear Is Just a Word: A Missing Daughter, a Violent Cartel, and a Mother's Quest for Vengeance
by Azam Ahmed
Published 26 Sep 2023

‘El Pata de Queso.’ ” GO TO NOTE REFERENCE IN TEXT illegally using Israeli spyware Azam Ahmed and Nicole Perlroth, “ ‘Somos los nuevos enemigos del Estado’: el espionaje a activistas y periodistas en México,” New York Times, June 18, 2017, https://www.nytimes.com/​es/​2017/​06/​19/​espanol/​america-latina/​mexico-pegasus-nso-group-espionaje.html. GO TO NOTE REFERENCE IN TEXT inside the General Hospital in Ciudad Victoria Idelfonso Ortiz and Brandon Darby, “Exclusive—Mexican Border State Government Ignored Intel on Fugitive Cartel Leader’s Locations for Years,” Breitbart, November 16, 2017, https://www.breitbart.com/​border/​2017/​11/​16/​exclusive-mexican-border-state-government-ignored-intel-fugitive-cartel-leaders-location-years/; Aristegui Noticias “Cae ‘El Pata de Queso,’ cabecilla de los Zetas, por masacre en San Fernando (Video),” November 15, 2017, https://aristeguinoticias.com/​1511/​kiosko/​cae-el-pata-de-queso-cabecilla-de-los-zetas-por-masacre-en-san-fernando-video/.

Just Gone,” New York Times, November 20, 2017, https://www.nytimes.com/​2017/​11/​20/​world/​americas/​mexico-drug-war-dead.html. Ahmed, Azam, and Nicole Perlroth, “ ‘Somos los nuevos enemigos del Estado’: el espionaje a activistas y periodistas en México,” New York Times, June 18, 2017, https://www.nytimes.com/​es/​2017/​06/​19/​espanol/​america-latina/​mexico-pegasus-nso-group-espionaje.html. Ahmed, Azam, and Paulina Villegas, “López Obrador gana la presidencia de México con una victoria aplastante,” New York Times, July 1, 2018, https://www.nytimes.com/​es/​2018/​07/​02/​espanol/​america-latina/​eleccion-2018-amlo-lopez-obrador.html. Alejandro, Florencia, et al., “Competitiveness of sorghum production in northern Tamaulipas, Mexico,” Revista Mexicana de Ciencias Agrícolas, vol. 11, no. 1, March 2, 2021, https://www.scielo.org.mx/​scielo.php?

pages: 569 words: 156,139

Amazon Unbound: Jeff Bezos and the Invention of a Global Empire
by Brad Stone
Published 10 May 2021

The eventual report by Anthony Ferrante, a longtime colleague of de Becker’s and the former director for cyber incident response for the U.S. National Security Council, concluded that the promotional video about broadband prices that MBS had sent Bezos the previous year likely contained a copy of Pegasus, a piece of nearly invisible malware created by an Israeli company called NSO Group. Once the program was activated, Ferrante found, the volume of data leaving Bezos’s smartphone increased by about 3,000 percent. Some prominent cybersecurity experts questioned Ferrante’s conclusions amid an absence of more concrete forensic evidence. The massive “exfiltration of data” from the phone that Ferrante documented also happened to coincide with Bezos’s exchange of text messages and personal videos with Lauren Sanchez.

Maisel, The, 13, 157, 287 Mary’s Place, 290–91 Masters, Kim, 154–55 Matthews, Dave, 325 Mattis, Jim, 359 MBS, see Mohammed bin Salman, Prince McBath, Lucy, 371 McCurdy, Robert, 1, 2, 4 McGowan, Rose, 155 McKenna, Judith, 90 McKinsey & Company, 141, 169 McMillon, Doug, 88, 90, 91 Medioni, Gerard, 58 Medium, 110, 340–41, 353 Mehta, Apoorva, 192 Melchiorre, Anthony, 331, 337–39 Meng, JT, 199, 202, 259 Met Gala, 180–81 #MeToo, 153, 155, 156 MercadoLibre, 80, 82, 85 Mercedes-Benz, 241, 381 Merkel, Angela, 132 Metro AG, 190 Mexico, 13, 80, 231 Amazon in, 80–85, 95, 144 Walmart in, 80–82, 85 Meyerson, Rob, 265, 267, 276, 277, 281 Miami Palmetto Senior High School, 266 Microsoft, 67, 71, 88, 94–95, 103, 107, 167, 233, 263, 290, 381 antitrust issues and, 363, 378 cloud computing and, 96, 102 JEDI contract and, 360–62 Midler, Bette, 154 Milk Stork, 114 minimum viable product (MVP), 48 minimum wage, 355, 356, 400 MIPCOM, 330 Miranda, Lin-Manuel, 1 Modi, Narendra, 79, 87, 88, 89, 92, 93, 384 Mohamed, Bashir, 397 Mohammed bin Salman (MBS), Prince, 17, 321, 342–45, 347 moon, 266, 268, 271, 279, 283 Moonves, Les, 157 Moore, Julianne, 152, 154 Moret, Stephen, 308 Morning Call, 220–21 Morris, Wendell, 373–74 Mountz, Mick, 222–23 MoviePass, 152 Mozart in the Jungle, 143, 145 Mullally, Megan, 135 Mulligan, John, 231 Murthy, Narayana, 77, 79 music sales, 9 Musk, Elon, 73, 236, 264–65, 268–72, 274, 278–80, 282–83, 293–94, 299, 315, 404 Musk, Justine, 269 Myntra, 78, 87 NAACP Environmental and Climate Justice Program, 404 Nadella, Satya, 362 Nadler, Jerry, 377 NASA, 96, 98, 266, 267, 272 Nashville, Tenn., 299, 301, 302, 306, 313 National Enquirer, 17, 319, 328–42, 344 National Equality Award, 297 National Portrait Gallery, 1–3, 382 National Press Club, 3 National Rifle Association, 301 National Security Council, 344 NDN Collective, 403 Netflix, 13, 98, 137–40, 142, 143, 145, 158, 401 Neuberger Berman, 185–86, 210 New America, 353 Newell Brands, 255 New Glenn rocket, 264, 272, 274, 277–79 New Kingdom, The, 345 New Shepard rocket, 264, 267, 269–71, 273, 274, 276, 278, 280, 283, 288, 310, 327 New York City advertising employees in, 250–51 Amazon offices in, 316 Long Island City as HQ2 location, 16, 301, 302, 305–16, 318, 319, 333 New Yorker, 155, 324, 328 New Yorker Presents, The, 144 New York Post, 309, 334, 341 New York Times, 54, 122, 126, 154, 314 exposé on Amazon’s working environment in, 95, 109–11, 113–14, 119, 295, 352 Niekerk, David, 110–13, 219, 221, 230, 312 Nielsen, 203 Nike, 180 9/11 terrorist attacks, 117 Nisqually earthquake, 7 Nordstrom, 253 Northrop Grumman, 279, 280 NSO Group, 344 Nuance, 27, 37 Obama, Barack, 132 administration of, 110, 270, 297, 311, 368 Obama, Michelle, 1, 132 Ocasio-Cortez, Alexandria, 16, 307, 308, 310 Oceanco, 347–48 O’Dell, Trip, 239 Office of the U.S. Trade Representative, 183 Olsavsky, Brian, 246 Omidyar, Pierre, 122 O’Neill, Gerard K., 281 OnePlus, 77 Onetto, Marc, 166, 218–21, 224, 225 OneWeb, 279 Oracle, 97–99, 173, 360, 361 Oscars, 137, 322 OSHA, 224 Osowski, Lukasz, 28 Outcast Agency, 324 Overstock, 373 paddle boards, 170, 374–75 Paramount Pictures, 158 Paris climate accords, 2, 381 Parkland shooting, 301 Paull, Michael, 146 Pecker, David, 328, 331–32, 334, 337–39, 341, 342, 345 Pegasus, 344 Pelosi, Nancy, 1 Penner, Greg, 90 People’s Production Company, 142 Pérez Sagaón, Abril, 85–86 Perry, Katy, 325 Perticucci, Roy, 392 Peterson, Matt, 97 phatic speech, 34–35 philanthropy, 15, 16, 244, 288, 290, 402–4 Bezos Day 1 Fund, 49, 324, 406 Bezos Earth Fund, 402–4, 406 Blue Origin and, 269, 281–82 of MacKenzie Scott, 323–24, 346, 402–3 Piacentini, Diego, 71, 73, 77, 79, 80, 83, 100, 104 Pichai, Sundar, 359, 369 Pitt, Brad, 325 Plugable Technologies, 176, 375–76 Pluimer, Larry, 181 Poitier, Sidney, 141 Politico, 124 Poovalingam, Vinoth, 76 PopSockets, 367–68 Porter, Brad, 399 Portrait of a Nation Prize, 1–2 Prakash, Shailesh, 123, 129–30 Prasad, Rohit, 35–38, 42, 47, 52 presidential candidates in 2020 election, 351, 353–55, 364 Price, Frank, 140–41 Price, Roy, 136, 137, 140–57 Prione Business Services, 77 Prisoner (Rezaian), 131 privacy, 23, 51–52 ProPublica, 237, 240 Procter & Gamble, 202, 246, 251 Project Kuiper, 404 Puerini, Gianna, 55–57, 59, 62, 64–66, 68 Purohit, Jagdish Raj, 92 Quidsi, 9–10, 193, 209, 222 Quinn, Sally, 133 Rabbit, 195, 238–39 Raghavan, Bali, 56, 58, 62 Rakuten Intelligence, 240–41 Ramji, Shiven, 251 Rashid, Taimur, 99 Ratner, Brett, 337 Rawlings, Mike, 300, 308 Raytheon, 280 Reagan, Ronald, 124 Reddit, 52 Refn, Nicolas Winding, 152 Reid, Toni, 45, 46, 51 Reliance Industries, 93, 384 research and development (R&D) expenses, 67 Reuters, 77, 210 Reveal, 224 Rezaian, Jason, 131–32 RFID chips, 57, 225 Rhimes, Shonda, 154 Riggs, Conrad, 145 Ring, 319, 367 Rivian Automotive, 4 Robb, Walter, 185 Robertson, James, 330, 332, 333 robotics, 55, 56, 213, 222–24, 388, 389 Rodriguez, Alex, 325 Rogers, Ty, 120 Rolle, Nina, 30, 289 Rolls-Royce, 280 Romanoffs, The, 152 Ronen, Assaf, 258 Rosa, Mike, 299 Rose, Charlie, 54 Rosenstein, Barry, 186 RosettiStarr, 360 Rosseter, Megan, 207–8 Roth, Mike, 216–17, 225, 229–31, 233 Rubinstein, David, 350 Ruffin, Scott, 233 Rupp, Chris, 104–7, 112 Russell, David O., 152 Russia, 272 Ryan, Fred, 124–25, 131, 133, 343 Safeway, 186, 192, 196 St.

pages: 339 words: 103,546

Blood and Oil: Mohammed Bin Salman's Ruthless Quest for Global Power
by Bradley Hope and Justin Scheck
Published 14 Sep 2020

Those filed against the nation of Qatar were dismissed because of sovereign immunity, but those against companies allegedly working for Qatar were allowed to proceed as of early 2020. Each hack appeared to incite the other side to hack back harder. The UAE deployed a major listening operation, aided in part by software from an Israeli company called NSO Group Technologies. Based in Herzliya, its team of computer engineers and former government hackers had built a system called Pegasus that could compromise smartphones. It only sold the system to governments that it deemed would use it for acceptable purposes and required Israeli government permission for each sale.

pages: 389 words: 111,372

Raising Lazarus: Hope, Justice, and the Future of America’s Overdose Crisis
by Beth Macy
Published 15 Aug 2022

Meanwhile Richard Sackler’s side of the family had compiled the many reporting errors committed on a website called Judgeforyourselves.info. One of their lawyers, Tom Clare, pointed me to the website in an e-mail, as he warned me to avoid making “any errors or false statements about my clients and the opioid crisis generally in your upcoming [Hulu] series.” Clare’s summer was a busy one. In July, he defended the Israeli firm NSO Group after its Pegasus spyware was exposed in the Washington Post as a democracy-threatening tool widely used to surveil the smartphones of reporters, activists, and government officials. “Elegantly nasty,” one critic described it. Clare’s defense of NSO was ironic, considering that Richard Sackler and other Purdue executives had once patented a “Self-Destructing Document and Email Messaging System,” their own wonky and ultimately useless attempt at ass-covering.