Andrew Pam
Israel tried to frustrate US lawsuit over Pegasus spyware, leak suggests
The Israeli government took extraordinary measures to frustrate a high-stakes US lawsuit that threatened to reveal closely guarded secrets about one of the world’s most notorious hacking tools, leaked files suggest.

Israeli officials seized documents about Pegasus spyware from its manufacturer, NSO Group, in an effort to prevent the company from being able to comply with demands made by WhatsApp in a US court to hand over information about the invasive technology.

Documents suggest the seizures were part of an unusual legal manoeuvre created by Israel to block the disclosure of information about Pegasus, which the government believed would cause “serious diplomatic and security damage” to the country.

Pegasus allows NSO clients to infect smartphones with hidden software that can extract messages and photos, record calls and secretly activate microphones. NSO’s clients have included both authoritarian regimes and democratic countries and the technology has been linked to human rights abuses around the world.

Since late 2019, NSO has been battling a lawsuit in the US brought by WhatsApp, which has alleged the Israeli company used a vulnerability in the messaging service to target more than 1,400 of its users in 20 countries over a two-week period. NSO has denied the allegations.

The removal of files and computers from NSO’s offices in July 2020 – until now hidden from the public by a strict gag order issued by an Israeli court – casts new light on the close ties between Israel and NSO and the overlapping interests of the privately owned surveillance company and the country’s security establishment.

The July 2020 seizures were made after Israeli officials and the company appear to have discussed how to respond to WhatsApp’s requests for NSO to disclose internal files about its spyware, raising questions about whether they coordinated to conceal certain information from US legal proceedings.
CCC Updates hat dies geteilt

This website uses cookies to recognize revisiting and logged in users. You accept the usage of these cookies by continue browsing this website.