PogoWasRight.org

Menu
  • About
  • Privacy
Menu

Undercover agents target cybersecurity watchdog CItizen Lab for exposing details in Jamal Khashoggi’s case

Posted on January 27, 2019 by pogowasright.org

Raphael Satter of AP reports:

The researchers who reported that Israeli software was used to spy on Washington Post journalist Jamal Khashoggi’s inner circle before his gruesome death are being targeted in turn by international undercover operatives, The Associated Press has found.

Twice in the past two months, men masquerading as socially conscious investors have lured members of the Citizen Lab internet watchdog group to meetings at luxury hotels to quiz them for hours about their work exposing Israeli surveillance and the details of their personal lives. In both cases, the researchers believe they were secretly recorded.

Citizen Lab Director Ron Deibert described the stunts as “a new low.”

Read more on Seattle Times.

The following is the full statement from Citizen Lab in response to the revelation that they were being targeted:

Over the last month, two Citizen Lab staff members were contacted by two separate individuals in what appears to be an attempt to compromise our work. Each of the contacts purported to show an interest in the staff members’ personal, non-Citizen Lab related interests, and presented themselves as serious and professional. In each case, the interactions turned to Citizen Lab’s research on commercial spyware, and specifically our research on NSO Group. We have no evidence NSO Group itself is responsible for the outreach.

The first contact occurred as a series of approaches to Citizen Lab staff member Bahr Abdul Razzak, both electronically and in person. Fortunately, Mr. Abdul Razzak, sensed something was awry and notified his colleagues at Citizen Lab. After a preliminary investigation, it became clear to us that the representations being made to Mr. Abdul Razzak were false, and manufactured for the specific purpose of targeting him directly and deceiving him. We concluded that this was part of a malicious effort intended to gather information about the Citizen Lab and our staff.

During our ensuing investigation, a second, separate outreach using different cover identities targeted Citizen Lab senior researcher John Scott-Railton. We allowed the deceptive approach to play out, and the operatives to propose an in-person meeting. This meeting took place in New York on January 24, 2019 — and was recorded.

During our investigation, we worked closely with the Associated Press. Associated Press journalists observed the meeting from afar, and then intervened at the signal of Mr. Scott-Railton and questioned the person about his true employer and fictitious company. The full details are available in Associated Press’ report, here.

This failed operation against two Citizen Lab researchers is a new low. Citizen Lab research is public, and the evidence that we use to draw our conclusions is public as well. We have always welcomed debate and dialogue about our work, but we condemn these sinister, underhanded activities in the strongest possible terms. Such a deceitful attack on an academic group like the Citizen Lab is an attack on academic freedom everywhere.

This episode should serve as an important lesson for all groups who, like Citizen Lab, work in areas that expose wrongdoing through evidence-based research. Risks are not always easy to calculate and can come in many unpredictable forms. This attempt — by whatever organization was responsible for this operation — used an indirect approach involving human intelligence gathering and nefarious means. The tactics bear a striking resemblance to the type of intelligence gathering undertaken by private security firms, such as those reported on here and here.

At Citizen Lab, we take all security risks seriously. I want to congratulate the two researchers for being alert and taking immediate appropriate action in response. Citizen Lab is fully cooperating with authorities in the relevant jurisdictions. Read the Associated Press article here.

Category: BreachesFeatured NewsGovtNon-U.S.Surveillance

Post navigation

← States Earn Low Grades on Student-Data Privacy Protections From New Report Card
Parents denied access to their children’s medical records by law – or in some cases, just policy →

Now more than ever

Search

Contact Me

Email: info@pogowasright.org

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

Categories

Recent Posts

  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results
  • Missouri Clinic Must Give State AG Minor Trans Care Information

RSS Recent Posts on DataBreaches.net

  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
©2025 PogoWasRight.org. All rights reserved.
Menu
  • About
  • Privacy