
Demonstrators who took part in protests against former Prime Minister Benjamin Netanyahu--like these seen at an August 1, 2020 rally and march in Jerusalem--were reportedly targeted by Israeli police with NSO's Pegasus spyware. (Photo: Amir Levy/Getty Images)
Israeli Police Used Pegasus Spyware Against Own Citizens: Report
"Give authorities secret, unaccountable hacking powers, and abuse is only a matter of time."
Digital privacy advocates were alarmed but not surprised Tuesday by a report alleging that police in Israel used NSO's Pegasus spyware against Israeli citizens, including opponents of former right-wing Prime Minister Benjamin Netanyahu.
"When it comes to [Netanyahu] and NSO's business model, is any of this surprising?"
According to Calcalist, the special operations cyber unit of Israel's police remotely planted the private company's spyware on phones belonging to political activists, mayors, former government employees, and others, "taking over their devices and having the ability to listen to all their calls and read all their messages."
The reporting indicates that the extrajudicial surveillance occurred without court supervision, and police did not request search or bugging warrants for the targeted individuals--who were suspected of no crimes.
"After all the other surveillance scandals have been exposed, the chickens come home to roost," tweeted Israeli-American journalist Mairav Zonszein. "Not surprising. What will be is if justice is served."
Those scandals include repeated revelations that NSO's spyware was surreptitiously installed on the devices of dissidents, human rights defenders, journalists, and others around the world--especially in other Middle Eastern nations--as well as reporting last month that Pegasus was used by an unknown party or parties to hack the iPhones of nearly a dozen U.S. State Department officials.
NSO, an Israeli company, says Pegasus is solely intended for crime and terrorism prevention.
"However," reports Calcalist, "NSO's spyware was also used by police for phishing purposes: attempts to phish for information in an intelligence target's phone without knowing in advance that the target committed any crime. Pegasus was installed in a cellphone of a person close to a senior politician in order to try and find evidence relating to a corruption investigation."
Roee Neuman, a spokesperson for the Black Flags, a former protest movement that staged weekly anti-Netanyahu demonstrations, demanded Tuesday that Israeli Minister of Public Security Omer Bar-Lev "immediately" release the names of people the police targeted with Pegasus.
"This is not the time for silence," he tweeted. "Now is the time for action."
John Scott-Railton, a senior researcher at the University of Toronto-based Citizen Lab who has been following Pegasus for six years, tweeted in response to the new report: "Let me tell you, this is depressingly familiar. Give authorities secret, unaccountable hacking powers, and abuse is only a matter of time."
Eric Goldstein, Human Rights Watch's deputy director for the Middle East and North Africa, asked, "When it comes to [Netanyahu] and NSO's business model, is any of this surprising?"
Responding to the widespread outrage in Israel over the new revelations, Israeli journalist and +972 executive director Haggai Matar tweeted that criticism of such surveillance must also "extend to all intrusive and oppressive tools used against Palestinians."
Urgent. It's never been this bad.
Dear Common Dreams reader, It’s been nearly 30 years since I co-founded Common Dreams with my late wife, Lina Newhouser. We had the radical notion that journalism should serve the public good, not corporate profits. It was clear to us from the outset what it would take to build such a project. No paid advertisements. No corporate sponsors. No millionaire publisher telling us what to think or do. Many people said we wouldn't last a year, but we proved those doubters wrong. Together with a tremendous team of journalists and dedicated staff, we built an independent media outlet free from the constraints of profits and corporate control. Our mission from the outset was simple. To inform. To inspire. To ignite change for the common good. Building Common Dreams was not easy. Our survival was never guaranteed. When you take on the most powerful forces—Wall Street greed, fossil fuel industry destruction, Big Tech lobbyists, and uber-rich oligarchs who have spent billions upon billions rigging the economy and democracy in their favor—the only bulwark you have is supporters who believe in your work. But here’s the urgent message from me today. It’s never been this bad out there. And it’s never been this hard to keep us going. At the very moment Common Dreams is most needed and doing some of its best and most important work, the threats we face are intensifying. Right now, with just two days to go in our Spring Campaign, we're falling short of our make-or-break goal. When everyone does the little they can afford, we are strong. But if that support retreats or dries up, so do we. Can you make a gift right now to make sure Common Dreams not only survives but thrives? There is no backup plan or rainy day fund. There is only you. —Craig Brown, Co-founder |
Digital privacy advocates were alarmed but not surprised Tuesday by a report alleging that police in Israel used NSO's Pegasus spyware against Israeli citizens, including opponents of former right-wing Prime Minister Benjamin Netanyahu.
"When it comes to [Netanyahu] and NSO's business model, is any of this surprising?"
According to Calcalist, the special operations cyber unit of Israel's police remotely planted the private company's spyware on phones belonging to political activists, mayors, former government employees, and others, "taking over their devices and having the ability to listen to all their calls and read all their messages."
The reporting indicates that the extrajudicial surveillance occurred without court supervision, and police did not request search or bugging warrants for the targeted individuals--who were suspected of no crimes.
"After all the other surveillance scandals have been exposed, the chickens come home to roost," tweeted Israeli-American journalist Mairav Zonszein. "Not surprising. What will be is if justice is served."
Those scandals include repeated revelations that NSO's spyware was surreptitiously installed on the devices of dissidents, human rights defenders, journalists, and others around the world--especially in other Middle Eastern nations--as well as reporting last month that Pegasus was used by an unknown party or parties to hack the iPhones of nearly a dozen U.S. State Department officials.
NSO, an Israeli company, says Pegasus is solely intended for crime and terrorism prevention.
"However," reports Calcalist, "NSO's spyware was also used by police for phishing purposes: attempts to phish for information in an intelligence target's phone without knowing in advance that the target committed any crime. Pegasus was installed in a cellphone of a person close to a senior politician in order to try and find evidence relating to a corruption investigation."
Roee Neuman, a spokesperson for the Black Flags, a former protest movement that staged weekly anti-Netanyahu demonstrations, demanded Tuesday that Israeli Minister of Public Security Omer Bar-Lev "immediately" release the names of people the police targeted with Pegasus.
"This is not the time for silence," he tweeted. "Now is the time for action."
John Scott-Railton, a senior researcher at the University of Toronto-based Citizen Lab who has been following Pegasus for six years, tweeted in response to the new report: "Let me tell you, this is depressingly familiar. Give authorities secret, unaccountable hacking powers, and abuse is only a matter of time."
Eric Goldstein, Human Rights Watch's deputy director for the Middle East and North Africa, asked, "When it comes to [Netanyahu] and NSO's business model, is any of this surprising?"
Responding to the widespread outrage in Israel over the new revelations, Israeli journalist and +972 executive director Haggai Matar tweeted that criticism of such surveillance must also "extend to all intrusive and oppressive tools used against Palestinians."
Digital privacy advocates were alarmed but not surprised Tuesday by a report alleging that police in Israel used NSO's Pegasus spyware against Israeli citizens, including opponents of former right-wing Prime Minister Benjamin Netanyahu.
"When it comes to [Netanyahu] and NSO's business model, is any of this surprising?"
According to Calcalist, the special operations cyber unit of Israel's police remotely planted the private company's spyware on phones belonging to political activists, mayors, former government employees, and others, "taking over their devices and having the ability to listen to all their calls and read all their messages."
The reporting indicates that the extrajudicial surveillance occurred without court supervision, and police did not request search or bugging warrants for the targeted individuals--who were suspected of no crimes.
"After all the other surveillance scandals have been exposed, the chickens come home to roost," tweeted Israeli-American journalist Mairav Zonszein. "Not surprising. What will be is if justice is served."
Those scandals include repeated revelations that NSO's spyware was surreptitiously installed on the devices of dissidents, human rights defenders, journalists, and others around the world--especially in other Middle Eastern nations--as well as reporting last month that Pegasus was used by an unknown party or parties to hack the iPhones of nearly a dozen U.S. State Department officials.
NSO, an Israeli company, says Pegasus is solely intended for crime and terrorism prevention.
"However," reports Calcalist, "NSO's spyware was also used by police for phishing purposes: attempts to phish for information in an intelligence target's phone without knowing in advance that the target committed any crime. Pegasus was installed in a cellphone of a person close to a senior politician in order to try and find evidence relating to a corruption investigation."
Roee Neuman, a spokesperson for the Black Flags, a former protest movement that staged weekly anti-Netanyahu demonstrations, demanded Tuesday that Israeli Minister of Public Security Omer Bar-Lev "immediately" release the names of people the police targeted with Pegasus.
"This is not the time for silence," he tweeted. "Now is the time for action."
John Scott-Railton, a senior researcher at the University of Toronto-based Citizen Lab who has been following Pegasus for six years, tweeted in response to the new report: "Let me tell you, this is depressingly familiar. Give authorities secret, unaccountable hacking powers, and abuse is only a matter of time."
Eric Goldstein, Human Rights Watch's deputy director for the Middle East and North Africa, asked, "When it comes to [Netanyahu] and NSO's business model, is any of this surprising?"
Responding to the widespread outrage in Israel over the new revelations, Israeli journalist and +972 executive director Haggai Matar tweeted that criticism of such surveillance must also "extend to all intrusive and oppressive tools used against Palestinians."

