Connect with us

Hi, what are you looking for?

Mohammed-bin-Rashid-Al-Maktoum
Mohammed-bin-Rashid-Al-Maktoum
Mohammed-bin-Rashid-Al-Maktoum

International

Sheikh Mohammed Al Maktoum his ex-wife’s phone hacked

Sheikh Mohammed Al Maktoum, interfered with British justice by ordering the hacking of his ex-wife, Princess Haya of Jordan’s phone.

Advertisement. Scroll to continue reading.

According to the court, her attorneys’ phones, Baroness Fiona Shackleton QC and Nick Manners were also targeted throughout their divorce custody dispute.

Sheikh Mohammed Al Maktoum has denied knowing anything about the hacking.

Advertisement. Scroll to continue reading.

Serial breaches

The hacking described in the judgements as.

“repeated violations of (UK) domestic criminal law,” “violation of basic common law and ECHR rights,”.

Advertisement. Scroll to continue reading.

“interference with the process of this court and the mother’s access to justice,” and “abuse of power” by a head of government.

The president of the High Court’s Family Division determined that “The mother’s (Princess Haya’s) phone, two of her lawyers’ phones.

Advertisement. Scroll to continue reading.

phones had all been successfully or unsuccessfully infiltrated by surveillance software.

The court determined that the monitoring was conducted “by servants or agents of the father (Sheikh Mohammed), the Emirate of Dubai, or the [United Arab Emirates], and that the surveillance happened with the direct or implicit authorization of the father.”

Advertisement. Scroll to continue reading.
Mohammed bin Rashid Al Maktoum ex-wife
Mohammed bin Rashid Al Maktoum ex-wife

Difficult to Find

The magnitude of the attack is alarming in terms of the data that the hackers had access to.

NSO’s Pegasus software, sometimes known as “spyware,” can monitor the individual’s phone location, read SMS messages, emails, and messages in other applications, eavesdrop on phone calls, and access their contact list, passwords, calendar dates, and photos. In other words, it grants the hacker total access to all of the data on their target’s phone.

It also enables the hacker to activate the target’s phone without their awareness, record their activities, and even take pictures and screenshots.

Advertisement. Scroll to continue reading.
Click to comment

Leave a Reply

Your email address will not be published.

You May Also Like

News

Tmz Baltimore Tzz TMZ Baltimore Twitter Full Video Explained Virus Reddit!Here we share with you the latest news, that the Twitter video “Tmz Baltimore”...

Science and Technology

Two non-executive directors of Huawei UK have resigned due to the company’s position regarding the Ukrainian conflict. The BBC understands that Sir Andrew Cahn...

Sports

Afghanistan Cricket Board (ACB) to carry on its activities as usual, sources told Geo News Thursday.According to the sources, Afghanistan Cricket Board ACB has...

News

Viral leaked videos, the referee Diana Di Meo victim of revenge porn: “I denounce the video with my head held high,” Says Diana Diana...

News

“@Mariaramirez96 goes viral frog video” shared an original frog video. A live frog emerges from a South African woman’s v****a. On Twitter, who is...

Business

The Crypto Boom SYDNEY, Nov 8 (Reuters) – On Monday. Bitcoin surged near its all-time high. While ether set a new high as cryptocurrencies...

News

Mr Beast, a Famous YouTuber, has made news after his obscene video leaked on social media. Mr. Beast’s video is leaked on Twitter and...

Reviews

In the event that you’ve known about any digital currency trade, it’s likely Coinbase. Bitcoin early adopters have been purchasing and exchanging coins on...

Advertisement