Amnesty International published a manual to identify whether a mobile device is infected with the Pegasus spy app, used to investigate and fight terrorism. The action brought together 80 journalists from 17 media groups from ten countries and was coordinated by Forbidden Stories with support from Amnesty International’s Safety Laboratory.
Several forensic analyzes were carried out on the telephones of journalists and human rights defenders around the world. Investigators have discovered traces left on iOS and Android phones after the program’s attacks.
+ AI calls for a freeze on the use of cybersurveillance technologies after Pegasus case
+ Biden appoints technology critic to head antitrust unit
With the information collected, Amnesty developed the open source Mobile Verification Toolkit (MVT) to help information security technicians detect threats.
To identify the presence of spyware on iOS you need to follow the steps below. The process requires technical knowledge and preferably requires the help of an Information Technology specialist.
– Download the MVT program
– Install Xcode available from the App Store
– Get Python 3 and install the Homebrew package with the command “ruby -e “$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install)”
– Install libimobiledevice with command “brew install –HEAD libimobiledevice”
– Connect the device via USB and execute the command “ideviceinfo”
– Copy the backup file and paste in another folder
– Decrypt the backup file
– Check the log files extracted by MVT
+ Learn about the effectiveness of each vaccine against Covid-19