back

Catching NSO Group's Pegasus spyware

If you suspend your transcription on amara.org, please add a timestamp below to indicate how far you progressed! This will help others to resume your work!

Please do not press “publish” on amara.org to save your progress, use “save draft” instead. Only press “publish” when you're done with quality control.

Video duration
00:45:03
Language
English
Abstract
NSO Group has continued to make headlines for all the wrong reasons. This talk will provide a behind-the-scenes look at how Amnesty International's Security Lab tracked NSO Group spyware over years and developed innovative forensic tools and techniques to detect the supposedly "undetectable" Pegasus spyware on infected devices.

These tools were ultimately used to identify traces of Pegasus spyware on the devices of numerous activists and journalists around the world.

The talk will demonstrate the open-source mobile forensic tool MVT, developed by Amnesty International during this investigation, which can be used to check mobile devices for signs of Pegasus and other sophisticated mobile spyware threats.

No description available.

Talk ID
rc3-nowhere-410
Event:
rc3-2021
Day
2
Room
c-base
Start
11:30 a.m.
Duration
00:30:00
Track
None
Type of
Remote
Speaker
Donncha Ó Cearbhaill
Talk Slug & media link
rc3-2021-cbase-410-catching-nso-group-s-pegasus-spyware

Talk & Speaker speed statistics

Very rough underestimation:
163.2 wpm
923.7 spm
100.0% Checking done100.0%
0.0% Syncing done0.0%
0.0% Transcribing done0.0%
0.0% Nothing done yet0.0%
  
100.0% Checking done100.0%
0.0% Nothing done yet0.0%
  

Work on this video on Amara!

Talk & Speaker speed statistics with word clouds

Whole talk:
163.2 wpm
923.7 spm