Agencia Española de Protección de Datos AEPD
La Asociación para la Prevención y Estudio de Delitos, Abusos y Negligencias en Informática y Comunicaciones Avanzadas APEDANICA, como mejor proceda DENUNCIA estos HECHOS:
1º businessinsider.com ha publicado lo que puede verse en
posteriormente se ha conocido que 11 millones de españoles han sido afectados siendo especialmente relevante lo publicado en
Escándalo Facebook: filtran datos de 533 millones de usuarios, 11 millones españoles
En contacto con expertos internacionales hemos podido conocer un sistema para verificar si un número de móvil se ha visto afectado en América, pero los usuarios españoles no pueden consultar en el sistema https://leaks.titan.co/fb/ y en todo caso, merecen explicaciones tanto de Facebook como de las autoridades que no se han pronunciado.
Los perjuicios y los riesgos pueden ser muy grandes. Véase el enlace
Todo lo que un ciberdelincuente puede hacer con datos robados de Facebook: "Da miedo el nivel al que permite segmentar" La filtración masiva de información personal de 533 millones de usuarios de Facebook permitirá realizar ataques de ingeniería social mucho más dirigidos, avisan los expertos
2º APEDANICA ha denunciado, desde 2011, hechos muy graves en Facebook y WhatsApp y la AEPD siempre nos ha dirigido a la autoridad irlandesa sin que nunca recibiéramos respuesta alguna. La última está publicada en http://www.miguelgallardo.es/helen-dixon/
Sin embargo, no se ha recibido respuesta alguna de la autoridad irlandesa en un asunto tan grave y trascendental en España.
3º No es admisible que la AEPD eluda su alta responsabilidad ante los hechos de los que Faceboook es responsable archivando las denuncias de APEDANICA en el expediente E/06068/2019 como puede verse en
Teniendo en cuenta el carácter transfronterizo de la reclamación y dado que WHATSAPP IRELAND LIMITED tiene su establecimiento principal o único en Irlanda, corresponde a la autoridad de protección de datos de ese Estado actuar como autoridad de control principal, a tenor de lo dispuesto en el artículo 56.1 del RGPD. Por ello, de conformidad con el artículo 66 de la Ley Orgánica 3/2018, de 5 de diciembre, de Protección de Datos Personales y garantía de los derechos digitales, la Directora de la Agencia Española de Protección de Datos ACUERDA:
PRIMERO: Remitir la reclamación presentada por APEDANICA (ASOCIACIÓN PARA LA PREVENCIÓN Y ESTUDIO DE DELITOS, ABUSOS Y NEGLIGENCIAS EN INFORMÁTICA Y COMUNICACIONES AVANZADAS) a la autoridad de control de Irlanda, a fin de que por la misma se le dé el curso oportuno.
SEGUNDO: Proceder al archivo provisional del procedimiento
Por lo expuesto, SOLICITAMOS que teniendo por presentada esta denuncia con la documentación adjunta en PDF de 34 páginas, se inicie un procedimiento sancionador contra Facebook y contra quien resulte más responsable de los hechos denunciados, en el que se nos tenga por personados como denunciantes perjudicados, y que las autoridades de protección de datos y fiscalías, si hubiera algún indicio racional de delitos, en especial, del 197 del Código Penal, se coordinen eficazmente para que los usuarios españoles de productos y servicios de Facebook reciban pronto información precisa, con todos los detalles y referencias verificables sobre los hechos aquí denunciados, así como sobre los del expediente con Ref.: E/06068/2019 requiriendo todos los informes disponibles a cuantas autoridades españolas, o de otros países, sea procedente, a la mayor brevedad posible, todo ello sin perjuicio ni renuncia a cualquier otro derecho o acción que podamos ejercer.
Solicitamos también que este escrito y toda la documentación adjunta se traslade eficazmente y a la mayor brevedad por la AEPD a
Helen Dixon, Data Protection Commissioner in Ireland
Address: Data Protection Commission 21 Fitzwilliam Square South Dublin 2 D02 RD28 Ireland
y que le requiera pronta respuesta a lo enviado y publicado en inglés
informándonos de qué correo electrónico mejor que
puede servir en el futuro para comunicarnos considerando la relevancia y trascendencia de lo que aquí se denuncia y lo que se adjunta.
Helen Dixon, Data Protection Commissioner in Ireland
Address: Data Protection Commission 21 Fitzwilliam Square South Dublin 2 D02 RD28 Ireland
Spanish non-for-profit organization Asociación para la Prevención y Estudio de Delitos, Abusos y Negligencias en Informática y Comunicaciones Avanzadas APEDANICA, claimed on 19.5.2019 to Agencia Española de Protección de Datos AEPD about Pegasus spyware of NSO Group as you can see at www.cita.es/whatsapp-espionaje.pdf
AEPD replied (more than 1 year after our claim) that the only European Data Protection Authority investigating Pegasus of NSO Group is the Irish one and forwarded the documents of APEDANICA as was said in a letter signed by Mar España Martí (“Teniendo en cuenta el carácter transfronterizo de la reclamación y dado que WHATSAPP IRELAND LIMITED tiene su establecimiento principal o único en Irlanda, corresponde a la autoridad de protección de datos de ese Estado actuar como autoridad de control principal, a tenor de lo dispuesto en el artículo 56.1 del RGPD”) that we publish at www.cita.es/whatsapp-aepd-irlanda.pdf
De Omni Re Scibili ("of all things that can be known") from APEDANICA we ask you here for the identification of any procedure opened at Data Protection Commission about NSO Group products and the name of the Irish official that can inform about as much as possible. We shall be pleased to share our most relevant documents regarding WHATSAPP INC. and FACEBOOK, INC., both Delaware corporations in the Plaintiff, vs. NSO GROUP TECHNOLOGIES LIMITED and Q CYBER TECHNOLOGIES LIMITED, beyond what has already been published at
Source: Spain is Customer of NSO Group The Guardian and El Pais reported NSO Group's malware was used to target prominent politicians in Spain. Now a former employee says that Spain has been an NSO Group customer. By Lorenzo Franceschi-Bicchierai and Joseph Cox Jul 14 2020, 7:01pm The cellphones of several politicians in Spain, including that of the president of one of the countries’ autonomous regional parliaments, were targeted with spyware made by NSO Group, an Israeli company that sells surveillance and hacking tools to governments around the world, according to The Guardian and El Pais . Motherboard confirmed the specifics with security researchers who investigated the attempted hack and a Facebook employee who has knowledge of the case. A former NSO employee has told Motherboard that the Spanish government has been an NSO customer since 2015. "We were actually very proud of them as a customer," the former employee said. "Finally a European state." Motherboard granted the source anonymity to protect them from retaliation from the company. We cannot confirm whether these specific attempted hacks were directed by the Spanish government, though one of the politicians targeted believes the Spanish government is behind the attack. Do you work at NSO Group, did you used to, or do you know anything else about the company? On Monday, the media outlets revealed that someone tried to hack the cellphone of Roger Torrent, the President of the Parliament of Catalonia, using a flaw in WhatsApp, which was discovered last year. Torrent is the president of the Parliament of Catalonia, which governs Barcelona and the surrounding region that has recently attempted to become independent from Spain. Carles Puigdemont, a member of the European Parliament and the former president of Catalonia, condemned the hacking attempt, and implied that the Spanish government targeted Torrenthim. If that's the case, this would be the first known case of a European government using this type of technology against politicians inside Europe. "Spain has been using authoritarian methods for a while. I myself had a tracking device on my car which is being investigated by the Belgian authorities,” Puigdemont told Motherboard in an email. “The EU cannot wait anymore to act, we have new proofs every day that the rule of law in Spain is totally wrecked." "It is not the first time that accusations of spying on political opponents emerge in Spain. In 2009 there was a spying scandal within the center-right Popular Party. In 2012, Catalan lawmakers have accused the Spanish government of espionage,” Mathias Vermeulen, a former aide for a member of the European Parliament who focused on surveillance tech issues, told Motherboard. “But using extraordinary tools like Pegasus against democratically elected politicians is a first in Europe and should be immediately investigated." "Finally aEuropean state." Citizen Lab, a research group that has investigated government spyware for a decade, said it could not definitively confirm who actually deployed the NSO spyware. “Although we can positively verify that Mr. Torrent’s phone was targeted by NSO’s spyware, we are unable to determine by whom,” said Ronald Deibert, the director of the Citizen Lab. A Facebook employee confirmed to Motherboard that Torrent was targeted with NSO spyware on WhatsApp. The employee spoke on condition of anonymity because they were not authorized to talk to the press. ADVERTISEMENT “This is a case where we would infer the customer is Spain but I don't have hard evidence,” said a security researcher who has investigated previous cases of hacks done with NSO spyware. The researcher asked to remain anonymous because he wasn’t allowed to speak to the press. 9/9/2020 Source: Spain is Customer of NSO Group. NSO Employee AbusedPhone HackingTech toTarget a Love Interest BY JOSEPH COX The former NSO employee said Spain had access to a 0-click version of NSO's Pegasus product. Pegasus is the suite of tools that lets customers remotely break into and surveill phones. Beyond domestic use, the former employee added that the Spanish customer had a number of different territories unlocked for deploying Pegasus in, including France, Malta, and Mexico. NSO prices its Pegasus product based on how many countries or areas the client is able to hack phones in. The client also bought products from Circles, another surveillance company related to NSO, the former employee said. Circles focuses on products that exploit the SS7 network and protocol, and which can be used to track the location of phones. The former employee added that the sale related to a central intelligence agency of Spain. The CNI, or National Intelligence Centre, is Spain’s intelligence agency. Two NSO executives and a company spokesperson declined to comment on whether the Spanish government was one of their customers. In a statement sent to reporters, NSO said that “Due to the confidentiality constraints, we cannot confirm or deny which such authorities use our Technology.” "We were actually very proud of them as a customer." “We are appreciative that this matter has been brought to our attention. In line with our Human Rights Policy we take our responsibilities seriously and if warranted, will initiate an investigation,” the statement read. “We will cooperate with any competent authority investigation if initiated, in parallel to our internal procedures.” The CNI used to be a customer of Hacking Team, the infamous Italian spyware company that dominated the market in the 2000s. In fact, according to former employees of Hacking Team as well as leaked documents published after the company was hacked in 2015, the CNI became Hacking Team’s first customer outside of Italy after the terrorist attack in Madrid on March 11, 2004. The CNI and the Spanish government did not respond to a request for comment. The Spanish prime minister’s office told the Guardian that “the government has no evidence that the speaker of the Catalan parliament, Roger Torrent, the former MP Anna Gabriel and the activist Jordi Domingo have been the targets of hacking via their mobiles." "Furthermore, we must state that any operation involving a mobile phone is always conducted in accordance with the relevant judicial authorisation." Update: This piece has been updated to include more information from the former NSO Group employee. Subscribe to our cybersecurity podcast, CYBER. TAGGED: EUROPE, SPAIN, HACKING, HACKERS, CATALONIA, PEGASUS, NSO, WORLDNEWS, WORLD PRIVACY 9/9/2020
M. H. Sr. Roger Torrent i Ramió President del Parlament de Catalunya por carta abierta en
La Asociación para la Prevención y Estudio de Delitos, Abusos y Negligencias en Informática y Comunicaciones Avanzadas APEDANICA, está investigando todo cuanto pueda conocerse y sea relevante para el enjuiciamiento del espionaje de teléfonos móviles. Se adjunta lo ya enviado a Facebook-Whatsapp sobre PEGASUS-NSO en el correo que puede verse en www.cita.es/whatsapp-pegasus
APEDANICA recopila y se opone a las resoluciones administrativas y judiciales que afecten a la seguridad jurídica y pide interdicción de la arbitrariedad en favor de todo tipo de perjudicados, no solamente en el caso de que sus propios teléfonos hayan sido ilegalmente intervenidos, sino también porque alguna vez se hayan comunicado con un espiado que quiera ejercer derechos como víctima de espionaje secundario. Es decir, que nos preocupa quien haya mantenido algún contacto con un teléfono en el que se haya instalado un software como PEGASUS o FLEXISPY Mobile Spy Spy Phone o se clonase con CELLEBRITE o en cualquier otra intrusión inadmisible e indemnizable. APEDANICA y yo estamos a la disposición de los afectados, tanto en el caso de los 1.400 espiados, directamente o no, por NSO o sus clientes, como en los de los productos con funcionalidad similar, y también nos ofrecemos como peritos en estas tecnologías para todos los que alguna vez hayan establecido algún tipo de comunicación con cualquiera de los espiados.
APEDANICA, con máximo respeto hacia todos sus derechos y libertad, le pide una muy especial consideración no solamente hacia la dignidad de su cargo y a la de todos y cada uno de los ciudadanos que le votaron, sino también para todos aquellos que alguna vez, o muchas veces, se comunicaron con usted por el teléfono que presuntamente fue intervenido ilegalmente, y agradeceremos todo cuanto pueda ser compartido con nosotros, al menos, en lo más doctrinal. Mi tesis, en
con todo cuanto pudiera estar a mi alcance desde que la defendí en 2015, incluyendo varios dictámenes periciales, en lo que no perjudique a terceros, y cuanto se adjunta, está a su entera disposición, rogando su más pronto acuse de recibo para estas 19 páginas en PDF.
Mark Zuckerberg at Facebook (WhatsApp)
Attn. COOLEY LLP TRAVIS LEBLANC JOSEPH D. MORNIN DANIEL J. GROOMS
From Madrid, Spain, Asociación para la Prevención y Estudio de Delitos, Abusos y Negligencias en Informática y Comunicaciones Avanzadas APEDANICA, is seriously interested in any issue regarding WHATSAPP INC. and FACEBOOK, INC., both Delaware corporations in the Plaintiff, vs. NSO GROUP TECHNOLOGIES LIMITED and Q CYBER TECHNOLOGIES LIMITED, beyond the document that has already been published at
Between in and around April 2019 and May 2019, Defendants used WhatsApp servers, located in the United States and elsewhere, to send malware to approximately 1,400 mobile phones and devices (“Target Devices”). Defendants’ malware was designed to infect the Target Devices for the purpose of conducting surveillance of specific WhatsApp users (“Target Users”). Unable to break WhatsApp’s end-to-end encryption, Defendants developed their malware in order to access messages and other communications after they were decrypted on Target Devices. Defendants’ actions were not authorized by Plaintiffs and were in violation of WhatsApp’s Terms of Service. In May 2019, Plaintiffs detected and stopped Defendants’ unauthorized access and abuse of the WhatsApp Service and computers.
Plaintiffs request judgment against Defendants as follows: 1. That the Court enter judgment against Defendants that Defendants have: a. Violated the Computer Fraud and Abuse Act, in violation of 18 U.S.C. § 1030; b. Violated the California Comprehensive Computer Data Access and Fraud Act, in violation California Penal Code § 502; c. Breached their contracts with WhatsApp in violation of California law; d. Wrongfully trespassed on Plaintiffs’ property in violation of California law.
APEDANICA is considering some European and Latin America legal complaints and/or plaintiffs against PEGASUS spyware so we shall appreciate any updated information about that plaintiff or any other one concerning WhatsApp malware or spyware. Victims of PEGASUS in any European country can ask to the President of the Council of European Prosecutors (CCPE) who publicly said: “The rule of law and the proper functioning of democracies depend on independent and efficient legal systems that ensure access to justice for all. Only an independent and impartial judicial system can provide the basis for the fair and just resolution of legal disputes. Proper performance of the distinct but complementary roles of judges and prosecutors is a necessary guarantee for the fair, impartial and effective administration of justice. Judges and public prosecutors must both therefore enjoy independence in respect of their functions since both of them ensure, at all stages of the proceedings, that individual rights and freedoms are guaranteed, public order is protected and equality before the law is fully respected”.
Please do not hesitate to contact me for further information about our approaches to PEGASUS problems, risks and damages considering this document with 18 pages at www.miguelgallardo.es/whatsapp-pegasus.pdf
PEGASUS and NSO Group cellular spying
From Madrid, Spain, Asociación para la Prevención y Estudio de Delitos, Abusos y Negligencias en Informática y Comunicaciones Avanzadas APEDANICA, is expert witnessing for Courts of Law on Pegasus, a spyware for governments improving commercial products like FLEXISPY Mobile Spy Spy Phone that can be installed on devices running some versions of iOS, Apple's mobile operating system, as well on devices running Android. It was developed by the Israeli cyberarms firm, NSO Group. Secret services are very aware of this kind of spyware risks and illegal advantages for Government surveillance activities. If no judge explicitly allow previously each time it is used for a forensic purpose there is serious criminal case no matter who and how used it.
APEDANICA is looking for documented cases no un un of PEGASUS, FLEXISPY Mobile Spy Spy Phone as well as CELLEBRITE systems. For instance, Catalan parliamentary speaker’s cellphone was targeted with PEGASUS. Citizen Lab states that 130 activists have been unjustified victims of the NSO program since 2016. A messaging app account belonging to the Crown Prince of Saudi, Mohammed bin Salman, was used to deploy digital spyware on the phone of Jeff Bezos, who is also CEO of Amazon, “in an effort to influence, if not silence” the newspaper’s reporting on the Kingdom.
APEDANICA is very pleased to receive and impart information regarding spyware with special attention to already spied victims following Universal Declaration of Human Rights article 19 “Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers”. We include anything not legally forbidden to be published related with agencies like:
National Security Agency NSA Главное Разведывательное Управление in Russian Federation State Security Service General Intelligence and Security Service, military intelligence ADIV/SGRS Coordination Unit for the Threat Assessment OCAD/OCAM in Belgium Nachrichtendienst des Bundes NDB in Switzerland Ministry of State Security MSS in China Reconnaissance General Bureau in North Korea Directorate of Military Intelligence DRM in France Algemene Inlichtingen- en Veiligheidsdienst AIVD in The Netherlands Bundesnachrichtendienst BND in Germany Εθνική Υπηρεσία Πληροφοριών ΕΥΠ in Greece Greiningardeild Varnarmálastofnunar Íslands GVMSÍ in Iceland Directorate General of GST Intelligence DGGI in India Ministry of Intelligence VAJA in Iran Inter-Services Intelligence ISI in Pakistan General Intelligence Presidency (GIP) – رئاسة الاستخبارات العامة in Saudi Arabia Federal Security Service FSB Федеральная служба безопасности and Main Intelligence Directorate GRU or Centro Nacional de Inteligencia CNI in Spain
RELEVANT REFERENCES FOR APEDANICA APPROACH
Independent UN rights experts call for ‘immediate investigation’ into alleged Bezos phone hack by Saudi Arabia David Kaye (left), Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression and Agnes Callamard, Special Rapporteur on extrajudicial, summary or arbitrary executions.UN Photo/Rick Bajornas/Loey Filipe David Kaye (left), Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression and Agnes Callamard, Special Rapporteur on extrajudicial, summary or arbitrary executions. 22 January 2020 Human Rights Independent UN rights experts said on Wednesday they were “gravely concerned” over allegations that in 2018, a messaging app account belonging to the Crown Prince of Saudi Arabia was used to hack into The Washington Post owner’s mobile phone, calling for an “immediate investigation” by authorities in the United States. The two Special Rapporteurs - who do not speak on behalf of the UN overall, and operate in an independent investigative capacity - said in a statement that they had recently received information suggesting that a WhatsApp account belonging to Crown Prince Mohammed bin Salman was used to deploy digital spyware on the phone of Jeff Bezos, who is also CEO of Amazon, “in an effort to influence, if not silence” the newspaper’s reporting on the Kingdom. “The allegations reinforce other reporting pointing to a pattern of targeted surveillance of perceived opponents and those of broader strategic importance to the Saudi authorities, including nationals and non-nationals”, said Agnes Callamard, UN Special Rapporteur on summary executions and extrajudicial killings, and David Kaye, UN Special Rapporteur on freedom of expression. “These allegations are relevant as well to ongoing evaluation of claims about the Crown Prince’s involvement in the 2018 murder of Saudi and Washington Post journalist, Jamal Khashoggi”. They spelled out that the alleged hacking of Mr. Bezos’ phone, and those of others, if proven, would be in contravention of fundamental international human rights standards, and demands an “immediate investigation” by US and other relevant authorities, “including investigation of the continuous, multi-year, direct and personal involvement of the Crown Prince in efforts to target perceived opponents”. Better controls needed The reported surveillance of Mr. Bezos, allegedly through software developed and marketed by a private company was “transferred to a Government without judicial control of its use”, said the experts. If true, they maintained it was “a concrete example of the harms that result from the unconstrained marketing, sale and use of spyware”. To protect against its abuse, surveillance through digital means must be “subjected to the most rigorous control”, according to the independent experts, including by judicial authorities and national and international export controls. Moreover, they argued that “it underscores the pressing need for a moratorium on the global sale and transfer of private surveillance technology”. “The circumstances and timing of the hacking and surveillance of Bezos also strengthen support for further investigation by US and other relevant authorities of the allegations that the Crown Prince ordered, incited, or, at a minimum, was aware of planning for but failed to stop the mission that fatally targeted Mr. Khashoggi in Istanbul”, the UN experts stated. ‘Clandestine’ online campaign While the Kingdom was supposed to be investigating Mr. Khashoggi’s murder and prosecuting those responsible, the Rapporteurs said, “it was clandestinely waging a massive online campaign against Mr. Bezos.” A 2019 forensic analysis of his iPhone assessed with “medium to high confidence”, that it was infiltrated on 1 May 2018 through a video sent from Mohammed bin Salman’s WhatsApp account. According to the analysis, the Crown Prince and Mr. Bezos exchanged numbers the month before the alleged hack. The forensic analysis found that within hours of receiving the video from the Crown Prince’s account, “an unprecedented exfiltration of data” from the iPhone began. After an initial spike, the unauthorized transfer of data continued undetected for months. The information we have received suggests...an effort to influence, if not silence, The Washington Post's reporting on Saudi Arabia -- UN Experts The analysis also assessed that the intrusion was likely undertaken through a prominent spyware that was identified in other Saudi surveillance cases, the experts said. They added that the allegations were reinforced by separate evidence of Saudi Arabia targeting dissidents and perceived opponents. The Saudi Arabian Embassy in Washington, said on Tuesday night that any suggestion the Kingdom was behind the hacking of Mr. Bezos’ phone, “are absurd”. Other reported cases The Special Rapporteurs noted that the claims regarding Mr. Bezos’ hacked phone are also consistent with the widely reported role of the Crown Prince in allegedly leading a campaign against dissidents and political opponents. They recalled that the iPhone infiltration occurred from May to June in 2018, when the phones of Jamal Khashoggi’s associates, Yahya Assiri and Omar Abdulaziz, were also hacked, allegedly using malware called Pegasus. In May 2018, Jamal Khashoggi was a prominent columnist for The Washington Post, writing stories that raised concerns about the Crown Prince’s rule. That October, government officials murdered him in the Saudi consulate in Istanbul, Turkey. The newspaper subsequently began covering extensively the disappearance and murder investigation and expanded its reporting on a number of related aspects of the Crown Prince’s rule in Saudi Arabia. Breaking it down According to the forensic analysis, after Mr. Bezos’ mobile was hacked, the Crown Prince sent him WhatsApp messages in November 2018 and February 2019, “in which he allegedly revealed private and confidential information about the billionaire publisher’s personal life that was not available from public sources”, said the experts. “During the same period, Mr. Bezos was widely targeted in Saudi social media as an alleged adversary of the Kingdom. This was part of a massive, clandestine online campaign against Mr. Bezos and Amazon, apparently targeting him principally as the owner of The Washington Post.” Ms. Callamard and Mr. Kaye “expect to continue investigating the murder of Mr. Khashoggi and the growing role of surveillance in permitting the unaccountable use of spyware to intimidate journalists, human rights defenders and owners of media outlets”, concluded the statement released by the UN human rights office, OHCHR. Independent experts’ role Special Rapporteurs and independent experts are appointed by the Geneva-based UN Human Rights Council to examine and report back on a specific human rights theme or a country situation. The positions are honorary and the experts are not UN staff, nor are they paid for their work.
ISRAEL AND OCCUPIED PALESTINIAN TERRITORIES HUMAN RIGHTS DEFENDERS AND ACTIVISTS SHARE Facebook Twitter Israel: Court rejects bid to revoke notorious spyware firm NSO Group’s export licence 12 July 2020, 17:41 UTC Today's disgraceful ruling is a cruel blow to people put at risk around the world by NSO Group selling its products to notorious human rights abusers. Danna Ingleton, acting Co-Director of Amnesty Tech A Tel Aviv District Court today rejected an attempt, supported by Amnesty International, which sought to force Israel’s Ministry of Defence (MOD) to revoke the security export license of spyware company NSO Group. Danna Ingleton, acting Co-Director of Amnesty Tech, said: “Today’s disgraceful ruling is a cruel blow to people put at risk around the world by NSO Group selling its products to notorious human rights abusers. At a moment when NSO and the Israeli MOD should be held accountable for their practices, it is appalling that the court has failed to do so. “NSO Group continues to profit from human rights abuses with impunity. The ruling of the court flies in the face of the mountains of evidence of NSO Group’s spyware being used to target human rights defenders from Saudi Arabia to Mexico, including the basis of this case - the targeting of one of our own Amnesty employees. We will continue to do all we can to stop NSO Group’s spyware being used to commit human rights abuses. “Until there is transparency around NSO’s business practices and guarantees that the Israeli MoD process of granting export licenses is set according to international standards and practices, the company’s products will continue to aid in the persecution of activists and the repression of human rights.” Background The legal action - brought by members and supporters of Amnesty International Israel and others- comes after evidence has emerged showing how NSO spyware technologies, most notably Pegasus, have been used to target an Amnesty International employee as well as numerous journalists and activists, including in Morocco, Saudi Arabia, Mexico and the UAE. The legal case is supported by Amnesty as part of a joint project with New York University School of Law’s Bernstein Institute for Human Rights and the Global Justice Clinic.
Catalan parliamentary speaker’s cellphone was targeted with a spy program only available to governments A Canadian cybersecurity institute that investigated a fault in WhatsApp discovered that Roger Torrent’s handset was attacked in 2019 together with a hundred other figures from civil society around the world Catalan parliamentary speaker Roger Torrent. Catalan parliamentary speaker Roger Torrent.TONI ALBIR / EFE JOAQUÍN GIL Madrid - 14 JUL 2020 - 09:30 CEST The cellphone used by the speaker in the Catalan regional parliament, Roger Torrent, was targeted with Pegasus, a spy program developed by an Israeli company named NSO, and which can only be purchased by governments and security forces and used to target crime and terrorism. Torrent’s phone was attacked using Pegasus in 2019, according to a joint investigation by EL PAÍS and The Guardian. The intrusion into the handset of the pro-Catalan independence politician, who belongs to the Catalan Republican Left (ERC) party, was possible due to a security fault in the WhatsApp messaging service that, between April and May 2019, could be used to install the NSO spy program in at least 1,400 cellphones across the world. The method for the attack was a missed video call, according to WhatsApp. When you find a Pegasus target, you find the fingerprints of a government CITIZEN LAB RESEARCHER JOHN SCOTT-RAILTON Pegasus took advantage of this weakness to attack Torrent’s phone, according to Citizen Lab, a cybersecurity group from the Munk School of Global Affairs and Public Policy at the University of Toronto, which exclusively investigated the fault in the messaging application in 2019. WhatsApp supplied Citizen Lab with the numbers that had been targeted by the Israeli cyberespionage program, among which was that of Torrent, according to these researchers, who publicly revealed the existence of Pegasus. EL PAÍS and The Guardian have had access to a certificate emitted by Citizen Lab that validates the fact that the speaker’s phone was attacked with the NSO spyware. “The investigation identified that the number belongs to Mr Roger Torrent,” the analysis states. The document explains that the attackers resorted to a missed WhatsApp call “that did not require a response” to target the politician’s phone, and it contains “ample evidence that could establish that Torrent was monitored.” Torrent’s phone figures on a list of a hundred or so cases across the world that were compiled by Citizen Lab of “representatives of civil society” who were indiscriminately attacked via the WhatsApp vulnerability, according to the Canadian institution. Citizen Lab states that 130 activists have been unjustified victims of the NSO program since 2016. Pegasus permits conversations to be listened to, messages read, access to the phone’s memory, screenshots to be taken, browsing history to be tracked and for remote access of the device’s microphone and camera. This opens the door for the program to listen to the ambient sound in a room if a phone has been infected. The system even allows for encrypted messages and voice calls to be recorded, according to the Canadian experts. In 2018, Pegasus was being used in 45 countries, targeting activists in Bahrain, Kazakhstan, Saudi Arabia, the United Arab Emirates and Mexico The researchers connected the mysterious disappearance of WhatsApp messages from Torrent’s cellphone in 2019 with an indication that the phone “could have been manipulated by a third party and infected.” And while they cannot identify who ordered the attack, they point out that the Israeli firm that created Pegasus “exclusively sells its products to governments.” This fact is confirmed by NSO on its website, where it presents its services as solutions for the armed forces and the police to combat crime. While Torrent’s cellphone was targeted by Pegasus, in 2019, the parliamentary speaker took part in dozens of political meetings and also appeared as a witness in Spain’s Supreme Court during the trial of the politicians and civil leaders who were involved in the 2017 independence drive in the Catalonia region, which saw an illegal referendum on secession from Spain held in October of that year. Among the sentences handed down by the court, Carme Forcadell, Torrent’s predecessor as speaker in the regional parliament, was given 11-and-a-half years in jail for the offense of sedition. In May 2019, when he was being targeted with Pegasus, Torrent took part in a meeting in Strasbourg with the Council of Europe Commissioner for Human Rights, Dunja Mijatvic. “I noticed strange things,” Torrent explains. “WhatsApp messages and chat histories would be deleted. It didn’t happen to the people around me.” The politician also says that he received “strange” SMS messages in 2019. Torrent says that he sees the hand of the “Spanish state” behind the Pegasus attack. “The government has no evidence that the speaker of the Catalan parliament, Roger Torrent [...] [has] been the targets of hacking via their mobiles,” says a spokesperson from the Spanish government, who points out that any monitoring of communications requires a court order. A spokesperson from the CNI, Spain’s intelligence services, says that the organization acts “in full accordance with the legal system, and with absolute respect for the applicable laws.” The same spokesperson adds that the actions of the secret service are supervised by a magistrate from the Supreme Court. EL PAÍS and The Guardian have unsuccessfully tried to obtain the versions of the Civil Guard, the National Police and the Interior Ministry as to what happened. Citizen Lab recognizes the difficulty of proving the reach of the cyber attack on Torrent’s cellphone, given that, as it indicates, the NSO programs “have an erasing system on the devices.” “When you find a Pegasus target, you find the fingerprints of a government,” says the researcher from this group, John Scott-Railton. We can confirm that Torrent’s telephone was targeted. However, additional investigation would be necessary to confirm that the phone was hacked CITIZEN LAB RESEARCHER JOHN SCOTT-RAILTON According to the expert, “we can confirm that [Torrent’s] telephone was targeted. However, additional investigation would be necessary to confirm that the phone was hacked. At this time we have no reason to believe that it wasn’t.” After being informed about the issue by this newspaper, Torrent’s team got in touch last Thursday with Scott-Railton. “They gave us the cellphone of the parliamentary speaker without us having asked for it and they said that it was among those attacked by Pegasus,” a spokesperson for the politician explains. “Was the infection successful? [Citizen Lab researcher John] Scott-Railton believes so because Torrent’s WhatsApp messages in 2019 were erased, which is one of the effects of Pegasus.” Controlled by the London-based fund Novalpina Capital, NSO says that it has a policy for the investigation of the improper use of its systems. NSO has refused to clarify if Spain is among its clients. “Due to confidentiality agreements, we cannot confirm which authorities use our technology,” the company replied via email. The firm has said that it will begin an investigation “if it is proved” that its products were used improperly in Spain. The Israeli company has distanced itself in the United States’ courts from the improper use of its spy program. The firm attributes this responsibility to its clients, the governments who acquire its products. “If anyone installed Pegasus on any alleged ‘target devices’ it was not [the] defendants [NSO Group]. It would have been an agency of a sovereign government,” the company stated as a defense in a lawsuit that it is involved in with WhatsApp. The messaging application reported NSO in October of last year for using its platform to infect the cellphones of activists and diplomats around the world with Pegasus. There is no evidence that Spain’s security forces are clients of NSO. The National Police and the CNI did hire their main competitor, Hacking Team from Italy, until at least 2015. This emerged after 400 gigabytes of internal emails from this company were stolen from its servers after they themselves were hacked. In 2018, Pegasus was being used in 45 countries, according to Citizen Lab, targeting activists in Bahrain, Kazakhstan, Saudi Arabia, the United Arab Emirates and Mexico. The cellphones of 25 Mexican politicians, activists and reporters, including the journalists Carmen de Arístegui (Arístegui Noticias), Andrés Villareal and Ismael Bojórquez (Río Doce) and Carlos Loret de Mola (Televisa) were targeted in 2019. As were three members of the organization Mexicans Against Corruption and Impunity, while the leaders of the National Action Party (PAN) Ricardo Anaya and Fernando Rodríguez Noval were also monitored. Omar Radi, a 33-year-old Moroccan journalist, also saw his phone infected by Pegasus after he criticized a judge. OTHER VICTIMS OF PEGASUS As well as Catalan speaker Roger Torrent, Pegasus also targeted the cellphone of Anna Gabriel, a former deputy in the Catalan parliament for the anti-capitalist CUP party, and her lawyer, Olivier Peter. Gabriel fled Spain in 2018 and traveled to Switzerland to avoid testifying before Spanish Supreme Court Judge Pablo Llarena over allegations of rebellion, misappropriation of public funds and sedition in connection to her role in the 2017 Catalan breakaway bid. “[Gabriel] received a WhatsApp notification that told her that her cellphone could have been hacked,” explained Peter, alluding to a vulnerability the messaging service suffered between April and May in 2019, which was later fixed. “If the hack is confirmed and we have more information, action will be taken,” he added. Jordi Domingo, a staff member of the Tarragona provincial government, was another victim of Pegasus, according to the investigation from EL PAÍS and The Guardian. “That’s right. The investigator from Citizen Lab, John Scott, called me last October to tell me that my cellphone was hacked before 2019,” said Domingo, who is also a member of the Asamblea Nacional Catalana (ANC) and the separatist Catalan European Democratic Party (PdeCAT). Domingo suggested two reasons for why he may have been targeted. “The first is that it was all a mistake. I have the same name as a well-known separatist lawyer. And the second [is] because I asked Barcelona city hall in 2018 for authorization on behalf of the Observatory against Catalanphobia to hold a demonstration. That very day, the police union Jusapol, held a march.” According to Domingo, he was not subject to any legal investigation during the time his cellphone was hacked by Pegasus. When asked if he would report the incident, he replied: “Who would I report? I don’t know who spied on me.” A spokesperson from the Spanish government said that there was “no evidence” that Gabriel and Domingo had been spied on. English version by Simon Hunter.
Second Catalan politician says phone was targeted by spyware Ernest Maragall revelation set to boost calls for inquiry into possible domestic espionage Stephanie Kirchgaessner, Sam Jones in Madrid and Jennifer Rankin in Brussels Tue 14 Jul 2020 19.02 BSTLast modified on Tue 14 Jul 2020 20.45 BST Shares 130 Ernest Maragall Ernest Maragall said researchers working with WhatsApp told him his phone was targeted in 2019. Photograph: Europa Press News/Getty Images A second prominent member of Catalan’s pro-independence movement has revealed he was warned that his mobile phone was targeted using spyware. The development is likely to bolster calls for an investigation into the possible use of hacking technology by Spanish authorities. Ernest Maragall, an MP in the regional parliament and a former member of the European parliament who also served as Catalan foreign minister, told the Guardian and El País that he was alerted by researchers working with WhatsApp that his phone had been targeted last year. A joint investigation by the newspapers revealed on Monday that Roger Torrent, the speaker of the Catalan parliament, was also targeted in 2019, according to researchers at Citizen Lab at the University of Toronto, who have collaborated with WhatsApp. Advertisement “It is terrible,” Maragall said. “This is not a surprise. It is just a part of the techniques, of the reality we are living in every day. We are in a situation where judicial actions, policies, security forces, prosecutors, everybody ... is against our movement, our peaceful and democratic movement as citizens here in Catalonia.” Torrent and Maragall – as well as two other pro-independence activists – were alerted that they were targeted in April-May 2019, when spyware used by government clients around the world exploited a previous vulnerability in WhatsApp software. The spyware, made by Israel’s NSO Group, allows the operator of the hacking tool to access an individual’s phone, including emails, calls and text messages. NSO Group has said it has no knowledge or control over how its clients use the spyware. Current and former leaders of Catalonia’s pro-independence government have called for an inquiry into what one researcher at Citizen Lab called a “possible case of domestic political espionage” in Europe. Torrent called the reports “extraordinarily serious”, adding: “We cannot normalise spying on political dissidence.” He said that if the Spanish government knew of the facts in the case “then it would have been complicit in a crime”. If it did not, he said, “it would be a very worrying symptom of political negligence and unawareness of illegal practices”. Gabriel Rufián, the spokesman in the national parliament for the Catalan Republican Left party, called on Spain’s interior minister, Fernando Grande-Marlaska, to “provide explanations over the alleged spying and invasion of privacy against Catalan political leaders by government organisations”. The revelations also resonated in the European parliament, where one of the most senior allies of Pedro Sánchez, the Spanish prime minister, called for an investigation into the targeting of Torrent’s phone. Juan Fernando López Aguilar, a Spanish Socialist MEP who chairs the European parliament’s civil liberties committee said: “Any indication that there might have been an intrusion in the confidentiality of data of European citizens – be it high officials, representatives, or private citizens for that matter – should be thoroughly investigated.” In Spain, he said, such investigations are a matter for the public prosecutor. He added that there was “no ground whatsoever to point out the responsibility of any national agency or government [in connection] to that information we have just read of”. The Spanish government said it was a legal, rather than political matter, and suggested that Torrent report his concerns to the judicial authorities. “The government has no evidence that the speaker of the Catalan parliament has been the victim of a hack or theft involving his mobile,” the government’s spokeswoman, María Jesús Montero, told reporters on Tuesday afternoon. “When questions of this nature arise, the procedure is well known: you inform the relevant judicial authorities about the hack or tapping, or the theft from a device, and they can then investigate whether it has happened and under what circumstances. Any mobile phone tapping always requires preliminary judicial authorisation. This isn’t something for the government.” In a statement, Spain’s interior ministry said: “Neither the interior ministry, nor the national police, nor the Guardia Civil have ever had any relationship with the company that developed this program, and, as such, have never contracted its services.” It added that the actions of state security forces were always conducted “with the utmost respect for the law”. Spain’s National Intelligence Centre (CNI) said in a statement that it acted “in full accordance with the legal system, and with absolute respect for the applicable laws” and that its work was overseen by Spain’s supreme court. It did not respond to specific questions about the alleged use of “Pegasus” spyware sold by NSO Group. WhatsApp has said that a total of 1,400 users were targeted in the 2019 attack, which is now the subject of a lawsuit by the messaging app against NSO Group. The California company has claimed that 100 members of civil society – including journalists in India, human rights activists in Morocco, diplomats and senior government officials – are alleged to have been affected. NSO Group has denied it has any role in operating its hacking software and has said it has no knowledge of who its government clients target. The company said it operated under “industry-leading governance policies” and that it could not confirm or deny which authorities used its technology because of confidentiality constraints. The company has been critical of Citizen Lab, which has closely researched the use of NSO Group’s spyware, and said researchers had failed to “competently address the challenges faced by law enforcement agencies” who need to intercept encrypted communications. NSO Group has said it sells its spyware solely for governments to track terrorists and criminals. López Aguilar, who worked on the European parliament’s response to 2013 revelations that the US National Security Agency had hacked the telephone records of millions of people, said all EU member states were bound to follow European law on data privacy, including the General Data Protection Regulation. “Any member states that might have some breach of that European law should be accountable for it, but those reports first of all have to be fully verified. Protection of rights and privacy are of the essence for the consistency of Europe.”
NSO Group points finger at state clients in WhatsApp spying case This article is more than 3 months old In court filing, Israeli spyware company says it does not operate technology it provides Stephanie Kirchgaessner in Washington @skirchy Email Tue 7 Apr 2020 18.13 BSTLast modified on Tue 7 Apr 2020 22.14 BST Shares 73 The offices of NSO group, in Herzliya, near Tel Aviv. WhatsApp has accused the company of hacking 1,400 of its users The offices of NSO group, in Herzliya, near Tel Aviv. WhatsApp has accused the company of hacking 1,400 of its users. Photograph: Jack Guez/AFP via Getty Images An Israeli spyware company that has been accused by WhatsApp of hacking 1,400 of its users, including journalists, human rights activists, and diplomatic officials, has blamed its government clients for the alleged abuses, according to court documents. NSO Group – whose technology is reported to have been used against dozens of targets including Pakistani intelligence officials, Indian journalists and exiled Rwandan political activists – also claimed in legal documents that the lawsuit brought against the company by WhatsApp threatened to infringe on its clients’ “national security and foreign policy concerns”. WhatsApp sues Israeli firm, accusing it of hacking activists' phones Read more NSO Group has never disclosed a full list of its government clients, but research by Citizen Lab, which tracks the use of spyware, has claimed that current and former clients include Saudi Arabia, Bahrain, Kazakhstan, Morocco, Mexico and the United Arab Emirates. WhatsApp, the popular messaging app, filed a lawsuit against NSO Group in October, alleging that the cyberweapons company was behind a series of highly sophisticated attacks that it claimed violated US law in an “unmistakeable pattern of abuse”. Among the alleged victims of the hack, which was discovered last April and continued for two weeks until the app’s vulnerability was fixed, were 100 human rights activists, lawyers, journalists and academics who were later notified of the alleged intrusion by WhatsApp. Advertisement In its first substantive legal filing in the case, filed last week, NSO hit back at WhatsApp and its parent company, Facebook, which it said were seen by governments as “safe spaces for terrorists and other criminals” who – without NSO’s services – could operate “without fear of detection by law enforcement”. NSO Group also argued that WhatsApp had “conflated” NSO Group’s actions with the actions of NSO’s “sovereign customers”. While NSO Group licenses its signature spying technology, Pegasus, to government law enforcement and intelligence agencies and assists with “training, setup, and installation”, it said it did not operate the technology. “Government customers do that, making all decisions about how to use the technology,” NSO said in its legal filing. “If anyone installed Pegasus on any alleged “target devices” it was not [the] defendants [NSO Group]. It would have been an agency of a sovereign government.” NSO Group claimed that to challenge such conduct, WhatsApp would have to declare the “sovereign acts” of those governments to be illegal. “For that reason,” the company said in the filing, “permitting this litigation to proceed would infringe critical national security and foreign policy concerns of sovereign governments”. The company also highlighted the role it claimed the Israeli government played in its review of NSO Group’s business. The Israeli ministry of defence, NSO Group said, could have access to information about NSO Group’s customers and “their intended use of Pegasus technology”. In a statement, WhatsApp said NSO Group was attempting to “avoid responsibility” and questioned the accuracy of some of the company’s claims, including an allegation in the legal filing that Facebook had wanted to procure some of NSO Group’s technology in 2017. In a sworn statement filed to the court, Shalev Hulio, an NSO Group co-founder, said that NSO had been approached by two Facebook representatives in October 2017 and asked about the right to “certain capabilities of Pegasus”, which the representatives had suggested could be used to help monitor users on Apple devices. NSO Group declined to comment to the Guardian’s questions about the alleged meeting between Facebook and NSO, and said it would not reveal the identity of the individuals. WhatsApp said the description of the discussions were an “inaccurate representation”. It declined to provide further comment.
Licensed under the Creative Commons BY-SA 4.0 (Attribution-ShareAlike licence). Electronic
version first published in 2018 by the Citizen Lab … This work can be accessed through
https://citizenlab.ca/2018/09/hide- and-seek-tracking-nso-groups-pegasus-spyware-to-operations …
J Sarah Sam - 2020 - Taylor & Francis
… “HIDE AND SEEK: Tracking NSO Group's Pegasus Spyware to operations in 45 countries.”
… Table 1. NSO Group Pegasus Exploit Domains Used in this Operation Page 11. 11 … In
September 2018, prior to the publication of another Citizen Lab report on NSO Group's
Pegasus spyware, NSO Group reiterated that it “develops products …
E Zureik - Middle East Critique, 2020 - Taylor & Francis
… individual privacy. However, after extensive investigation into the NSO's mode of
operation in Mexico, a report concluded there was no evidence that the use of Pegasus
and other NSO products resulted in positive outcomes.
Some references of APEDANICA
Palestinian BDS National Committee BNC
From Madrid, Spain, Asociación para la Prevención y Estudio de Delitos, Abusos y Negligencias en Informática y Comunicaciones Avanzadas APEDANICA, is investigating AnyVision Israel based company and we have seen published this AnyVision | BDS Movement
The Palestinian BDS National Committee (BNC) calls for boycotting AnyVision, Israel’s facial recognition technology firm, due to its irrefutable complicity in Israel’s occupation and repression of Palestinians.
August 30, 2019 By: Palestinian BDS National Committee (BNC)
Considering complaints filled by APEDANICA, Spanish privacy authority AEPD investigates AnyVision business and technologies for Mercadona. We shall appreciate any relevant information useful not only for Spain, but also for the European Union. We suggest to read next document
Parliamentary questions O-000018/2020 Question for oral answer to the Commission Rule 136 Manon Aubry, Anne-Sophie Pelletier, Philippe Lamberts, Manuel Bompard, Leila Chaibi, Clara Ponsatí Obiols, Mick Wallace, Idoia Villanueva Ruiz, Konstantinos Arvanitis, Cornelia Ernst, Emmanuel Maurel, David Cormand, Younous Omarjee, Alexandra Geese, Saskia Bricmont, Viktor Uspaskich, Patrick Breyer, Rosa D'Amato, Markéta Gregorová, Aurore Lalucq, Helmut Scholz, Isabella Adinolfi, Marie Toussaint, Henrike Hahn, Martina Michels, Niyazi Kizilyürek, Fabio Massimo Castaldo, Hilde Vautmans, Pierre Larrouturou, Yannick Jadot, Raphaël Glucksmann, Paul Tang, Nora Mebarek, Stelios Kouloglou, Miguel Urbán Crespo, Alexis Georgoulis, Malin Björk, Petra De Sutter, Ernest Urtasun, Anna Cavazzini, Özlem Demirel, Petros Kokkalis, José Gusmão, Marc Botenga, Maite Pagazaurtundúa, Eugenia Rodríguez Palop, Marisa Matias, Helmut Geuking, Benoît Biteau, Gwendoline Delbos-Corfield, Claude Gruffat, Michèle Rivasi, Caroline Roose Subject: Facial recognition and identification in publicly accessible spaces 1. In the context of the preparation of the White Paper on Artificial Intelligence and the Strategy for Europe – Fit for the Digital Age, does the Commission consider the deployment of facial recognition and/or facial identification systems in publicly accessible spaces by Member States to be inconsistent with Article 9(1) and 9(2)(g) of the General Data Protection Regulation (GDPR) – since it does not meet the requirement of being ‘necessary for reasons of substantial public interest’ – and Articles 4(1), 8(1) and 10 of the Law Enforcement Directive? 2. Does the Commission identify risks of violations of fundamental rights posed by the deployment of facial recognition and/or facial identification systems in publicly accessible spaces by Member States? 3. If so, is the Commission, as guardian of the treaties, considering banning such practices and/or launching infringement procedures against Member States? Submitted: 01/03/2020
APEDANICA shall be pleased to cooperate with anybody interested in that European Parliamentary question and the next 9 pages in Spanish.
Nancy Pelosi Speaker of the House of Representatives
Dear Madam, Asociación para la Prevención y Estudio de Delitos, Abusos y Negligencias en Informática y Comunicaciones Avanzadas APEDANICA from Madrid, Spain, is concerned regarding evidences on CORONAVIRUS COVID-19 pandemic responsibility at the World Health Organisation WHO as well as the United States Intelligence best sources. “President Donald J. Trump Is Demanding Accountability From the World Health Organization” as we can read at
something widely approved by Europe and Spanish speaking countries.
However, we would like to ask for the same accountability from all public organisations and officials working in any country, including intelligence services of US (Central Intelligence Agency CIA) and Spain (Centro Nacional de Inteligencia CNI), serving in China, or in Italy. Future serious investigations of public responsibility will require most relevant data and metadata, now in computers and international communications in order to evidence who firstly knew what was done with epidemiology sensitive information. Intelligence must be useful for Health authorities, but not for illegal business opportunities, from officials to speculators.
In Spain and Spanish speaking countries APEDANICA has already recommended to preserve every shred of evidence and documents from public servers in China and Italy, as well as stock market records. We suggest to focus Justice and political attention on data or metadata from US Embassy in China to White House since 2019 until current date.
Any official source in China can be relevant for the best intelligence on what was occuring, who knew it, and what was done with data and metadata sensitive information before and after the pandemic was declared by World Health Organisation WHO. Very few authorities can access the computer documents, emails and smartphones data and metadata. We will be obliged if the US Speaker of the House of Representatives could find the best procedure to obtain and preserve the evidence that President Donald Trump supposedly knew, and when he was aware of the real pandemic risk, as well as any illegal business profit made from privileged information, including any stock market illegal speculation. With a view to assist with enquiries we attach 40 pages in this PDF, asking for your acknowledgement of receipt soon.
Attorney General Freedom of Information Act FOIA
Spanish non-for-profit Asociación para la Prevención y Estudio de Delitos, Abusos y Negligencias en Informática y Comunicaciones Avanzadas APEDANICA (founded in 1992) asks for information on any plaintiff or relevant data or references for expert witnessing and forensic purposes. For instance, right now we are looking for documents about CORONAVIRUS COVID-19 related plaintiffs, in any country or any language, as well as any record, in any Attorney General official files, that can be useful in any Court of Law. We have read this: “On my watch, we will not tolerate schemes or frauds designed to turn large profits by exploiting people's health concerns” said New York Attorney General James at https://www.blackstarnews.com/ny-watch/news/new-york-attorney-general-james-price-gouging-during-coronavirus-crisis
So, considering Freedom of Information Act 1982 (FOI Act) and any other US Law useful for our request to the Attorney General, we ask for:
1º Any record in any file related with CORONAVIRUS COVID-19
2º Any record related with Google and Health data protection and risks, as well as any technology big company with access to Health metadata like “Project Nightingale”, if the attorney general is already aware of.
3º Any record that could be related with schemes or frauds designed to turn large profits by exploiting people´s health concerns
APEDANICA shall be pleased to be useful for any official or investigator and we shall do our best to share our concerns and relevant information with experts from all over the World. In order to explain our approach to CORONAVIRUS COVID-19 and “Project Nightingale” we attach some documents already known by World Health Organization WHO representatives and epidemiology experts in several countries, while we work by WhatsApp Groups with many people that share our interest and Philosophy beyond our official records and files request. Please help us to be useful and do not hesitate to contact me to help you to find the records, because we are sure that attorneys and judges need them too.
18 ago. 2010 - “We are dedicating a lot of our time to finding a solution so that users ... Spanish association of Internet users, whose acronym is Apedanica, …
17 ago. 2010 - It is in response to a complaint by a privacy watchdog called Apedanica. The Google representative has been summoned to explain what data ...
Unknown: Street View cars have gathered data from at least some locations, but ... as Internet Giant Calls Incidents "Accident", Gabriella Hold, Prague Post, May 26, ... In the complaint, APEDANICA president Miguel Gallardo rejects Google's …
[PDF] Запровадження міжнародних правових засада та іноземного досвіду у діяльності атикорупційної прокуратури
ЄВ Вандін - Право. ua, 2016 - irbis-nbuv.gov.ua
… 10. Asociación para la Prevención y Estudios de Delitos, Abusos y Negligencias
en Informática y Comunicaciones Avanzadas (APEDANICA) [Електронний ресурс].–
Ре- жим доступу: http://www.cita.es/apedanica/ 11. United …
APEDANICA now ask for FCC attention to some very dangerous and maybe criminal ... Hiperenlaces en www.cita.es/flexispy y www.miguelgallardo.es/flexispy.pdf ... kind of espionage under Freedom of Information Act (FOIA) as soon as possible. This complaint can be forwarded to any authority in any country and we keep ...
19 nov. 2018 - Complaint against Twitter Inc. SPOOFING in English and Spanish ... APEDANICA asks to FCC, under FOIA , any and all information about.
Helen Dixon, Data Protection Commissioner in Ireland
Address: Data Protection Commission 21 Fitzwilliam Square South Dublin 2 D02 RD28 Ireland
THIS DOCUMENT MUST BE KNOWN, AT LEAST, BY
Tel. +43 1 52152 2550
Member: Dr Andrea JELINEK, Director
Autorité de la protection des données - Gegevensbeschermingsautoriteit (APD-GBA)
Rue de la Presse 35 – Drukpersstraat 35
1000 Bruxelles - Brussel
Tel. +32 2 274 48 00
Fax +32 2 274 48 35
Member: Mr David Stevens, President
Commission for Personal Data Protection
2, Prof. Tsvetan Lazarov blvd.
Tel. + 359 2 915 3580
Fax +359 2 915 3525
Member: Mr Ventsislav KARADJOV, Chairman of the Commission for Personal Data Protection
Croatian Personal Data Protection Agency
Selska Cesta 136
Tel. +385 1 4609 000
Fax +385 1 4609 099
Member: Mr Zdravko Vukić, Director
Commissioner for Personal Data Protection
1 Iasonos Street,
P.O. Box 23378, CY-1682 Nicosia
Tel. +357 22 818 456
Fax +357 22 304 565
Member: Ms Irene LOIZIDOU NIKOLAIDOU, Commissioner for Personal Data Protection
Office for Personal Data Protection
Pplk. Sochora 27
170 00 Prague 7
Tel. +420 234 665 111
Fax +420 234 665 444
Member: Ms Ivana JANŮ, President
Carl Jacobsens Vej 35
Tel. +45 33 1932 00
Fax +45 33 19 32 18
Member: Ms Cristina Angela GULISANO, Director
Estonian Data Protection Inspectorate (Andmekaitse Inspektsioon)
Tel. +372 6828 712
Member: Ms Pille Lehis, Director General
European Data Protection Supervisor
Rue Wiertz 60
Office: Rue Montoyer 30, 6th floor
Tel. +32 2 283 19 00
Fax +32 2 283 19 50
Member: Mr Wojciech Wiewiórowski, European Data Protection Supervisor
Office of the Data Protection Ombudsman
P.O. Box 800
Tel. +358 29 56 66700
Fax +358 29 56 66735
Member: Mr Reijo AARNIO, Ombudsman
Commission Nationale de l'Informatique et des Libertés - CNIL
3 Place de Fontenoy
TSA 80715 – 75334 Paris, Cedex 07
Tel. +33 1 53 73 22 22
Fax +33 1 53 73 22 00
Member: Ms Marie-Laure DENIS, President of CNIL
Der Bundesbeauftragte für den Datenschutz und die Informationsfreiheit
Graurheindorfer Straße 153
Tel.: +49 228 997799 0
Fax: +49 228 997799 5550
Member and joint representative: Mr Prof. Ulrich KELBER, The Federal Commissioner for Data Protection and Freedom of Information
The competence for complaints is split among different data protection supervisory authorities in Germany.
Competent authorities can be identified according to the list provided under www.bfdi.bund.de/anschriften.
Hellenic Data Protection Authority
Kifisias Av. 1-3, PC 11523
Tel. +30 210 6475 600
Fax +30 210 6475 628
Member: Mr Konstantinos Menoudakos, President of the Hellenic Data Protection Authority
Hungarian National Authority for Data Protection and Freedom of Information
Szilágyi Erzsébet fasor 22/C
Tel. +36 1 3911 400
Member: Dr Attila PÉTERFALVI, President of the National Authority for Data Protection and Freedom of Information
Data Protection Commission
21 Fitzwilliam Square
Tel. +353 76 110 4800
Member: Ms Helen DIXON, Data Protection Commissioner
Garante per la protezione dei dati personali
Piazza Venezia, 11
Tel. +39 06 69677 1
Fax +39 06 69677 785
Member: Mr Antonello SORO, President of Garante per la protezione dei dati personali
Data State Inspectorate
Blaumana str. 11/13-15
Tel. +371 6722 3131
Fax +371 6722 3556
Member: Ms Jekaterina Macuka, Director of Data State Inspectorate
State Data Protection Inspectorate
L. Sapiegos str. 17
Tel. +370 5 271 2804 / +370 5 279 1445
Fax +370 5 261 9494
Member: Mr Raimondas Andrijauskas, Director of the State Data Protection Inspectorate
Commission Nationale pour la Protection des Données
15, Boulevard du Jazz
Tel. +352 2610 60 1
Fax +352 2610 60 6099
Member: Ms Tine A. LARSEN, President of the Commission Nationale pour la Protection des Données
Office of the Information and Data Protection Commissioner
Second Floor, Airways House
High Street, Sliema SLM 1549
Tel. +356 2328 7100
Fax +356 2328 7198
Member: Mr Saviour CACHIA, Information and Data Protection Commissioner
P.O. Box 93374
2509 AJ Den Haag/The Hague
Tel. +31 70 888 8500
Fax +31 70 888 8501
Member: Mr Aleid WOLFSEN, Chairman of the Autoriteit Persoonsgegevens
Urząd Ochrony Danych Osobowych (Personal Data Protection Office)
ul. Stawki 2
Tel. +48 22 531 03 00
Fax +48 22 531 03 01
Member: Mr Jan NOWAK, President of the Personal Data Protection Office
Comissão Nacional de Protecção de Dados - CNPD
Av. D. Carlos I, 134, 1º
Tel. +351 21 392 84 00
Fax +351 21 397 68 32
Member: Ms Filipa CALVÃO, President, Comissão Nacional de Protecção de Dados
The National Supervisory Authority for Personal Data Processing
B-dul Magheru 28-30
Sector 1, BUCUREŞTI
Tel. +40 31 805 9211
Fax +40 31 805 9602
Member: Ms Ancuţa Gianina OPRE, President of the National Supervisory Authority for Personal Data Processing
Office for Personal Data Protection of the Slovak Republic
820 07 Bratislava 27
Tel.: + 421 2 32 31 32 14
Fax: + 421 2 32 31 32 34
Information Commissioner of the Republic of Slovenia
Tel. +386 1 230 9730
Fax +386 1 230 9778
Member: Ms Mojca PRELESNIK, Information Commissioner of the Republic of Slovenia
Agencia Española de Protección de Datos (AEPD)
C/Jorge Juan, 6
Tel. +34 91 266 3517
Fax +34 91 455 5699
Member : Ms María del Mar España Martí, Director of the Spanish Data Protection Agency
104 20 Stockholm
Tel. +46 8 657 6100
Fax +46 8 652 8652
Member: Ms Lena Lindgren Schelin, Director General of the Data Inspection Board
In accordance with the European Economic Area (EEA) agreement, as from 20 July 2018, the EEA countries, Iceland, Lichtenstein, Norway, became members of the Board without voting right and without the right to be elected as chair and vice-chair, for GDPR related matters (see the EEA fact sheet)
Tel: +354 510 9600
Ms Helga Þórisdóttir, Commissioner
Data Protection Authority, Principality of Liechtenstein
Principality of Liechtenstein
Tel. +423 236 6090
Member: Dr Marie-Louise Gächter, Commissioner
Tel +47 22 39 69 00
Member: Mr Bjørn Erik THON, Director-General
Helen Dixon, Data Protection Commissioner in Ireland
Address: Data Protection Commission 21 Fitzwilliam Square South Dublin 2 D02 RD28 Ireland