0% found this document useful (0 votes)
211 views37 pages

Summary of Pegasus

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
211 views37 pages

Summary of Pegasus

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 37

SUMMARY

SUMMARY

Of

PEGASUS
How a Spy in Your Pocket
Threatens the End of Privacy,
Dignity, and Democracy

By

LAURENT RICHARD, SANDRINE

RIGAUD and RACHEL

MADDOW(Introduction)

BOLD SUMMARIES

1
SUMMARY

2
SUMMARY

All rights reserved. No part of this

publication should be reprinted or

transmitted through electronic or

mechanical means without prior permission

by the Author, except for citations by critical

users.

Copyright © BOLD-SUMMARIES 2023

3
SUMMARY

TABLE OF CONTENTS

ABOUT THE AUTHORS

BOOK REVIEW

ABOUT THE BOOK

PROLOGUE

ABSTRACT

BOOK SUMMARY

EPILOGUE

4
SUMMARY

TO READERS

This is a summary of (Laurent Richard

and Sandrine Rigaud's book

(Pegasus: How a Spy in Your Pocket

Threatens the End of Privacy,

Dignity, and Democracy). This is not

meant to take the place of the main book;

rather, it is designed to provide you with

essential information on the contents of

the book.

5
SUMMARY

ABOUT THE AUTHORS

Laurent Richard, a Paris-based, multi-


award-winning documentary

filmmaker, was named the 2018

European Journalist of the Year at the

Prix Europa in Berlin. Forbidden

Stories, a network of investigative

journalists dedicated to completing the

unfinished business of killed journalists

6
SUMMARY

so that it is not buried alongside them,

was founded by him.

For over twenty years, Laurent Richard

has produced significant stories for

television. He is the author of

numerous studies revealing the

excesses of the financial sector,

Mossad's clandestine activities, and the

deception of the CIA and Mossad in the

7
SUMMARY

tobacco industry.

The prestigious European Press Prize,

two George Polk Awards, and the RSF

Impact Prize for the Pegasus Project,

which was published in 2021, are just a

few of the accolades that Forbidden

Stories has received since it was

created.

Journalist Sandrine Rigaud, a French

investigative reporter. She has been the

8
SUMMARY

editor of Forbidden Stories since 2019 and

was in charge of the Pegasus Project, which

received recognition, as well as the Cartel

Project, an international investigation into

the assassinations of Mexican journalists.

Prior to working on Forbidden Stories, she

made lengthy documentaries for French

television. Bangladesh, Lebanon,

Uzbekistan, Tanzania, and Qatar are among

the places she has reported from.

9
SUMMARY

10
SUMMARY

BOOK REVIEW

Pegasus is a startling and pressing

book about intrusive cyber surveillance

software that is so sneaky and potent

that it may take control of your cell

phone without your awareness. Richard

and Rigaud explain how authoritarian

regimes can utilize Pegasus software to

spy on dissidents, human rights

campaigners, journalists, and pretty

11
SUMMARY

much anyone with a mobile phone.

Pegasus is paced like a thriller and depicts a

materialized dystopia where oppressive

regimes buy digital bolt-cutters to hack into

the phones of their opponents and

detractors. But it also illustrates how

investigative journalists may reveal an

armaments market that targets civic society

in the twenty-first century.

12
SUMMARY

ABOUT THE BOOK

The most efficient and sought-after cyber-

surveillance system available is usually

recognized as Pegasus. The NSO Group, a

private company with its headquarters in

Israel and which developed the technology,

is not reticent to boast that it can foil

terrorists and criminals. In 2019, the co-

founder of NSO stated, "Hundreds of our

colleagues saved the lives of thousands of

people in Europe." This bold claim might be

13
SUMMARY

accurate, at least in part, but it is not the

complete picture.

The Pegasus system of NSO has not just

been used to apprehend criminals.

Additionally, it has been used to spy on

hundreds, if not thousands, of innocent

people around the world, including

journalists, heads of state, diplomats, human

rights activists, and political opponents.

This spyware is both sneaky and intrusive,

with the ability to infect a private cell phone

14
SUMMARY

without the owner's knowledge and to carry

out its tasks silently, in the background, and

essentially undetectably. Pegasus can collect

all movies, images, emails, texts, and

passwords—encrypted or not—and monitor

a person's daily movements in real time. It

can even take complete control of the

device's microphones and cameras. This

information can be stolen, kept on remote

servers, and then used to blackmail, bully,

and threaten the victims into silence. Its

15
SUMMARY

entire scope is still unknown. According to

Edward Snowden, "if they've found a way to

hack one iPhone, they've found a means to

hack all iPhones."

Pegasus takes readers inside the months-

long global investigation that was sparked by

a single spectacular data leak, as well as how

an international group of journalists and

editors discovered that cyber intrusion and

cyber surveillance are occurring on an

astoundingly large scale and with

16
SUMMARY

exponentially increasing frequency all over

the world.

Pegasus illuminates the lives that have been

completely upended by this unprecedented

threat and reveals the disturbing new ways

authoritarian regimes are undermining the

rights to privacy, freedom of the press, and

freedom of speech. Pegasus is well-

researched and masterfully written.

17
SUMMARY

PROLOGUE

Laurent created the company and

currently holds the roles of executive

director and editor-in-chief. In July

2021, 17 worldwide media outlets

conducted an investigation under their

direction that exposed how various

nations frequently used the Pegasus

malware to monitor journalists, human

rights activists, political dissidents, and

18
SUMMARY

others. They collaborated with the

Security Lab of Amnesty International.

The events leading up to and

throughout this inquiry are described in

their most recent book. Sandrine and

Laurent talked about how they

structured this international project,

the challenges they faced with

operational security, and the outcomes

of their work.

19
SUMMARY

The book looks at a variety of situations

involving cybersecurity, or a lack thereof. By

breaking into phones, the hostile NSO

hackers who are after journalists and

powerful individuals first compromise "the

ark."

20
SUMMARY

ABSTRACT

A troubling examination of intrusive

spyware that struck journalists and

politicians instead of the intended

target of criminals.

The Israeli business NSO Group

developed Pegasus in 2013, and it made

a fortune selling it to nations that have

little interest in deploying it to combat

the "terrorists, criminals, and

21
SUMMARY

pedophiles" it was designed to target.

According to French journalists Richard

and Rigaud, Pegasus was created after

Apple refused to give law enforcement

agencies a back door into its phones,

claiming that "the black hats were sure

to get them, too, and might

subsequently cause harm to innocent

people." Governments have utilized

Pegasus to target journalists and

activists who disagree with their


22
SUMMARY

policies. The authors claim that the

Saudis used Pegasus to track down the

murdered journalist Jamal Khashoggi.

Despite the lack of evidence of an

infection, they continue, "traces of

evidence in the Android phone

belonging to Khashoggi's wife, Hanan,

suggested she had been targeted by

Pegasus spyware before his murder."

Along with others, political opponents

of the regimes in India, Hungary, and


23
SUMMARY

Morocco were also targeted, frequently

before being put behind bars.

Additionally, journalists from Mexico

and Azerbaijan were singled out. In

order to disseminate the work of

electronic forensics to identify the

targets in that leaked database, Richard

and Rigaud enlisted a sizable number of

collaborators, including the Guardian

and the Washington Post, and

coordinated a series of stories that


24
SUMMARY

illustrated how Pegasus was distributed

via security flaws in the phones. When

it was just an Apple version of SMS, the

latter website claims that "iMessage was

incredibly secure, but it became

significantly less secure after the

program allowed iPhones to download

video, GIFs, and games." Although the

security of Apple and Android phones

has since increased, black hats are

typically one step ahead.


25
SUMMARY

BOOK SUMMARY

When asked which talent they would


most wish to possess, the majority of

people say invisibility. We desire the

ability to surreptitiously eavesdrop on

others because of our fundamental

desire for knowledge without

consequence.

The invention of the mobile phone, and


26
SUMMARY

subsequently the smartphone, gave

governments access to the capability of

covert monitoring for the comparatively

small sum of money (several millions of

pounds) needed to license intrusive

software that would discreetly monitor

the phone. The most popular one (that

we are aware of) is known as Pegasus

and was created by an Israeli company

known as NSO.

27
SUMMARY

Pegasus first emerged as an

unidentified SMS message. If the

recipient clicked on it, the phone would

get infected. Because text messages may

transmit viruses on their own, later

iterations didn't even call for this kind

of contact. As a result, the phone served

as a gateway for the law enforcement,

enabling them to access any file,

discreetly turn on the camera or

microphone, and listen to any call.


28
The infection persisted till the phone

was restarted. The controllers would

then become aware and send another

infectious message.

Any superpower has the same inherent

problem as Pegasus: it's too easy and

attractive to resist using it improperly.

NSO and particularly its chief

executive, have publicly claimed that

sales of the software can only be used


SUMMARY

to target criminals. Also, NSO is

aware that using American phone

numbers will only irritate the biggest

beast. However, many authoritarian

countries and those on the brink of

authoritarianism see telling the truth as

a crime and attack both journalists and

lawyers as a result.

NSO suggests that it is unable to

identify the targets. In the opening

30
SUMMARY

scene of Pegasus, journalists Laurent

Richard and Sandrine Rigaud from the

French investigative news outlet

Forbidden Stories obtain a list of

50,000 phone numbers from all over

the world along with a mysterious

series of dates and times. They discover

that the times, dates, and numbers

correspond to the attempted or

successful infection times on mobile

phones used in various countries. The


31
SUMMARY

date of the revelation is intriguing as it

relates to a case heard in London in

2021 where it was discovered that

Pegasus was used to spy on a British

lawyer, Baroness Shackleton, and her

client, Princess Haya, who was seeking

a divorce from Dubai ruler Sheikh

Mohammed bin Rashid al-Maktoum.

The researchers created an app that

can assess whether you have been

32
SUMMARY

infected in a cunning attempt to reverse

the monitoring society.

33
SUMMARY

EPILOGUE

The main theme of the book is how


the pair organizes media partners, such

as the Guardian, in order to

demonstrate how pervasive this abuse

is. They first put together a team that

can identify who has been attacked. A

former hacker from the LulzSec group,

which for a few crazy months in 2011

made headlines around the world for,

34
SUMMARY

among other things, leaking the names

of 73,000 X Factor US contestants, and

an app called Truecaller, which once

installed on a phone will upload your

contacts' names and numbers to create

a global "identity list," play key roles in

the book. On infected phones, he

discovers Pegasus' minute remnants.

Overall, it's a celebration of the use of

35
SUMMARY

hacking and journalism to expose evil

people. The team's efforts also included

the creation of an app that allowed

users to check if they had been infected

by Pegasus. It's a clever attempt to turn

the monitoring society on its head.

36
SUMMARY

This is an important story for those who

"want to prevent the Orwellian future" of

cyber surveillance.

37

You might also like