Pegasus Project Report and Pegasus Spyware snooping of journalists and political leaders phone is the biggest debate going around today. While those, whose names have been revealed say that it is intrusion to the privacy and there should be a thorough investigation, governments says that there is nothing snoopy about it, as the reports the Pegasus Project Report of snooping does not reveal any motive.
The Israeli firm NSO says it sells Pegasus spyware only to “vetted” governments. So either the Indian government has been illegally spying on its own citizens or another govt is doing it, also a terrible breach. Either way, the GOI needs to answer. Vague,unsigned denials won’t do. Government says it is nothing beyond report as it does not have any forensic value or validate the intent or motive.
Pegasus – What is the big picture really?
PegasusRow: India Ahead’s contributing editor Smita Sharma’s name also figures in the list of people who were under surveillance.@Smita_Sharma says this should worry every citizen. If the govt didn’t authorised this, are govt agencies
Through exchanges with @FbdnStories learnt one of the phone was snooping target in 2018-2019 when the journalist was with The Tribune. She wrote in her twitter though my phone remained uncompromised. Snooping may be an old political tool, but it never was or Is right. Cannot be legitimised in a democracy. My remarks Down pointing backhand index#Pegasus according to another twitter user.
Human rights activists, journalists and lawyers across the world have been targeted by authoritarian governments using hacking software sold by the Israeli surveillance company NSO Group, according to an investigation into a massive data leak.
The investigation by 17 media organisations including the wire suggests widespread and continuing abuse of NSO’s hacking spyware, Pegasus, which the company insists is only intended for use against criminals and terrorists.
What is Pegasus Malware?
Pegasus is a malware that infects iPhones and Android devices to enable operators of the tool to extract messages, photos and emails, record calls and secretly activate microphones.
The leak contains a list of more than 50,000 phone numbers that, it is believed, have been identified as those of people of interest by clients of NSO since 2016.
Viktor Orbán’s deployed a new weapon in its war on the media in Hungary, this according to forensic analysis of several mobile devices, used some of the world’s most invasive spyware against investigative journalists and the circle of one of the country’s last remaining independent media owners.
The Pegasus project, a collaborative investigation run by the French nonprofit journalism organisation Forbidden Stories, has reviewed leaked records that suggest a wide range of people in Hungary were selected as potential targets before a possible hacking attempt with the sophisticated Pegasus spyware, sold by the Israeli company NSO Group. In a number of cases, forensic analysis confirmed devices had been infected with Pegasus.
Who is Forbidden Stories?
Forbidden Stories, a Paris-based nonprofit media organisation, and Amnesty International initially had access to the leaked list and shared access with media partners as part of the Pegasus project, a reporting consortium.
Pegasus Project Leaks
The Pegasus Project disclosures began on Sunday, revealing the numbers of more than 180 journalists listed in the data, including reporters, editors and executives at the Financial Times, CNN, the New York Times, France 24, the Economist, Associated Press and Reuters. There were also 30 journalists and leaders from India in the list.
According to Edward Snowden Hungary gave the most incriminating response I’ve ever seen to a request for comment on the #Pegasus surveillance scandal. I mean, whenever I’m “not aware” of whether I did something or not, I demand to know if foreign spies tipped you off about it. He wrote this in his twitter.
According to past stories on such leaks Authorization for surveillance were also mounted on Subhas Chandra Bose’s home. This started 2 months after Independence — and “carried on with good results”. It probably means that the intelligence gathered must have been liked by our former masters in London.
“Most recently, a successful “zero-click” attack has been observed exploiting multiple zero-days to attack a fully patched iPhone 12 running iOS 14.6 in July 2021.”