Magazine

Saudi Government Accused by Bezos’s Security Consultant of Hacking Amazon’s C.E.O.’s Phone

Posted on the 31 March 2019 by Harsh Sharma @harshsharma9619

The security consultant of Jeff Bezos has accused the government of Saudi Arab of gaining unauthorized access to the chief executive’s phone of Amazon. The security consultant further stated that such an act on the part of the Saudi Arab government was carried out with the motive of haring the richest man in the world.

As stated by Gavin de Becker, the security chief of Mr. Jeff Bezos, the Saudi Arab government wants to inflict some harm of the Amazon chief as he owns the Washing Post. The Washing Post has reported in a very truculent manner, the murder of Jamal Khashoggi who was one of the columnists of Washing post and was killed the previous year in Turkey. Jamal Khashoggi was critical of Saudi leaders because of which he was killed on the order of the Saudi Crown prince, Mohammed bin Salman.

Saudi Government accused by Bezos’s Security Consultant of Hacking Amazon’s C.E.O.’s phone
Image Credits – https://www.newyorker.com

The security chief of Jeff Bezos further stated that he had come across certain facts about the Saudis and the role played by them to inflict a certain level of harm to Jeff Bezos. The security chief also made it clear that their investigators and several experts with high confidence have concluded that the Saudis had gained unauthorized access to Jeff Bezos’s phone with the aim of capturing certain personal information that could be used against Jeff Bezos.

However, the accusations of the security chief of Jeff Bezos on the Saudis of causing harm to the Amazon Chief has been vague in certain ways as he does not reveal any direct evidence of his accusations.

He even stated that he would refrain himself from speaking on this issue in public. Mr. Becker also had said that his investigation in the matter even included an interview with cybersecurity experts and personnel personally known to the Saudi prince. But he did not reveal the methods that have been used to gain access to Mr. Bezos’s personal information.


Back to Featured Articles on Logo Paperblog