Search
AI-powered search, human-powered content.
scroll to top arrow or icon

{{ subpage.title }}

Why privacy is priceless
Why privacy is priceless | Global Stage | GZERO Media

Why privacy is priceless

If someone were to get a few pictures off your phone without your permission, what's the big deal, right? Don't be so blasé, says human rights attorney David Haigh, who was prominently targeted with the powerful Pegasus spyware in 2021.

"If someone breaches your private life, that is a gateway to very, very serious breaches of other human rights, like your right to life and right to all sorts of other things," he said. "That's why I think a lot of governments and public sector don't take things as seriously as they should."

Right now, he says, dictators can buy your privacy, "and with it, your life."

Read moreShow less
How cyberattacks hurt people in war zones
How cyberattack immiserate people in war zones | Global Stage | GZERO Media

How cyberattacks hurt people in war zones

They may not be bombs or tanks, but hacks and cyberattacks can still make life miserable for people caught in the crosshairs of conflicts. By targeting key infrastructure and humanitarian organizations, warring governments can deny crucial services to civilians on the other side of no-man's-land.

And just like with conventional weapons, there can be collateral damage, said Stéphane Duguin, CEO of the Cyber Peace Institute. "We have 53 countries in the world targeted by these attacks across 23 sectors of critical infrastructure or essential services," he said. "At the end of the day, you end up having civilians who cannot benefit from essential services because of what has been escalated into another part of the world."

Read moreShow less
Why snooping in your private life is big business
Why snooping in your private life is big business | Caught in the Digital Crosshairs | GZERO Media

Why snooping in your private life is big business

Kaja Ciglic, senior director of digital diplomacy at Microsoft, said, "cybersecurity is the defining challenge of our time" amid a spike in misinformation campaigns thanks to wars in Ukraine and Gaza, growing interest from governments in building cyberweapons, and plain old profit-motivated thieves.

"We are seeing private sector enterprises that, effectively, are selling services, products that allow their customers to break into, whether it's a personal account, whether it's into an organization's account," she said. "The cyber mercenary market that is also emerging is also a very strong concern for Microsoft."

Read moreShow less
How rogue states use cyberattacks to undermine stability
How rogue states use cyberattacks to undermine stability | Global Stage | GZERO Media

How rogue states use cyberattacks to undermine stability

Cyberattacks are about a lot more than just money these days. Both unscrupulous governments and extremist groups are increasingly using hacking to advance political aims, says Kaja Ciglic, senior director of digital diplomacy at Microsoft.

When the International Committee for the Red Cross or International Court of Justice experiences cyberattacks, she said, "These are all organizations that are trying to defend peace and stability, they're trying to advocate for all of our human rights." The fact that unscrupulous governments are spending taxpayer money to purchase tools that interrupt their work, she noted, is worth taking a stand against.

Read moreShow less
The devastating impact of cyberattacks and how to protect against them
The devastating impact of cyberattacks and how to protect against them | Global Stage | GZERO Media

The devastating impact of cyberattacks and how to protect against them

Imagine one day you found out someone had hacked your phone. What would that mean for your life? With the right software, the bad guys might be able to get into your bank account, surveil your messages, or even steal your fingerprints and facial scans.

That's what happened to human rights attorney David Haigh, who became the first-known British victim of the powerful Pegasus spyware in 2021 while trying to help women of Emirati and Jordanian royalty escape alleged abuse. He learned that his phone was under surveillance – so his communications and the information stored on the device were compromised.

Two years on, he still lives in fear for the privacy of his loved ones and clients. "The police have done nothing,” he says. “There's no support from the government. There's no real information.”

Read moreShow less

Podcast: Cyber mercenaries and the global surveillance-for-hire market

Transcript

Listen: The use of mercenaries is nothing new in kinetic warfare, but they are becoming a growing threat in cyberspace as well. The weapon of choice for cyber mercenaries is malicious spyware that undermines otherwise benign technologies and can be sold for profit. Luckily, awareness about this threat is also growing, and increasing global coordination efforts are being put forth to combat this dangerous trend.

In episode 2, season 2 of Patching the System, we're focusing on the international system of bringing peace and security online. In this episode, we look at what governments and private enterprises are doing to combat the growth of the cyber mercenary industry.

Read moreShow less
Hacked by Pegasus spyware: The human rights lawyer trying to free a princess
The Human Rights lawyer hacked by Pegasus spyware - Caught in the Digital Crosshairs | GZERO Media

Hacked by Pegasus spyware: The human rights lawyer trying to free a princess

In April 2021, David Haigh, a human rights lawyer who'd been fighting to free Dubai’s detained Princess Latifa, received a shocking notification from investigators at The Guardian and Amnesty International: his phone was likely infected with Pegasus spyware. Forensic analysis confirmed that Haigh was the first confirmed British citizen to be hacked by Pegasus, a military-grade spyware created by Israel’s NSO Group that’s licensed to governments all over the world and used for covert surveillance.

Read moreShow less

Podcast: Cyber Mercenaries and the digital “wild west"

Transcript

Listen: The concept of mercenaries, hired soldiers and specialists working privately to fight a nation’s battles, is nearly as old as war itself.

In our fourth episode of “Patching the System,” we’re discussing the threat cyber mercenaries pose to individuals, governments, and the private sector. We’ll examine how spyware used to track criminal and terrorist activity around the world has been abused by bad actors in cyber space who are hacking and spying activists, journalists, and even government officials. And we’ll talk about what’s being done to stop it.

Read moreShow less

Subscribe to our free newsletter, GZERO Daily

Latest