NSO Group Technologies (NSO standing for Niv, Shalev and Omri, the names of the company's founders) is an Israeli technology firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click surveillance of smartphones.[2] It was founded in 2010 by Niv Karmi, Omri Lavie, and Shalev Hulio.[3][4][5] It is based in Herzliya, near Tel Aviv, Israel. It employed almost 500 people as of 2017.[1][6][7]

NSO Group Technologies Ltd.
TypePrivate
IndustryTechnology
Founded2010; 12 years ago (2010)
Founders
  • Omri Lavie
  • Shalev Hulio
  • Niv Karmi

(Left the company one month after its inception)

Headquarters,
Israel
Key people
Shalev Hulio (CEO)[1]
ProductsPegasus
Revenue243,000,000 United States dollar (2020) Edit this on Wikidata
99,000,000 United States dollar (2020) Edit this on Wikidata
Owner
  • Novalpina Capital
  • Omri Lavie
  • Shalev Hulio
Number of employees
750 (2021) Edit this on Wikidata
Websitensogroup.com

NSO deals with government clients only.[8] NSO claims that it provides authorized governments with technology that helps them combat terror and crime.[9][10] Pegasus spyware is classified as a weapon by Israel and any export of the technology must be approved by the government.[11]

According to several reports, NSO Group spyware has been used to target human rights activists and journalists in various countries,[12][13][14] was used for state espionage against Pakistan,[15] for warrantless domestic surveillance of Israeli citizens by Israeli police,[16] and played a role in the murder of Saudi dissident Jamal Khashoggi by agents of the Saudi government.[17]

In 2019, instant messaging company WhatsApp and its parent company Meta Platforms (then known as Facebook) sued NSO under the United States Computer Fraud and Abuse Act (CFAA).[9][10] In 2021, Apple filed a lawsuit against NSO in the U.S.,[18] and the US included NSO Group in its Entity List for acting against U.S. national security and foreign policy interests, effectively banning U.S. companies from supplying NSO.[19]

Corporate profile

Overview

NSO Group is a subsidiary of the Q Cyber Technologies group of companies.[10] Q Cyber Technologies is the name the NSO Group uses in Israel, OSY Technologies in Luxembourg, and in North America it has a subsidiary formerly known as Westbridge. It has operated through other companies around the world.[20]

Founding

NSO Group was founded in 2010 by Niv Karmi, Omri Lavie, and Shalev Hulio.[3][4][5] Hulio and Lavie were school friends who went into the technology start-up sector during the mid-2000s. The pair founded a company - CommuniTake - which offered a tool that let cellphone tech support workers access the costumers' devices (but necessitating that the costumer grant permission to enable access). After a European intelligence agency expressed interest in the product, the pair realised they could instead develop a tool that could gain access to phones without user authorisation, and market it to security and intelligence agencies. Karmi, who served in military intelligence and the Mossad, was brought on board to help market the tool with the help of his contacts. The first iteration of NSO's Pegasus spyware was finalised in 2011.[8]

Operations

NSO Group has come to employ over 700 personnel globally. Almost all of NSO's research team is made up of former Israeli military intelligence personnel, most of them having served in Israel's Military Intelligence Directorate, and many of these in its Unit 8200. The company's most valuable staff are graduates of the military intelligence's highly selective advanced cyberweapons training programs. NSO seeks to uncover a surfeit of zero-day exploits in target devices to ensure smooth continuous access even as some of the security vulnerabilities exploited by NSO are inevitably discovered and patched, with labs in the company's Herzliya headquarters featuring racks stacked with phones being tested against new exploits.[8]

Relationship with the Israeli state

Pegasus spyware is classified as a military export by Israel and its sale is controlled by the government.[11] According to The New York Times, "Israel’s government has long seen Pegasus as a critical tool for its foreign policy."[21] Israel has used the sale of NSO products as a diplomatic bargaining chip to advance its foreign policy interests as well as limiting its sale to[8][21] or its use against certain states to maintain good relations with certain states.[8]

Israel, wary of angering the U.S. in the wake of the Snowden revelations, required NSO to prevent Pegasus from targeting American phone numbers. Israel has used Pegasus to advance its interests in the region, with Pegasus playing a role in negotiating the Abraham Accords. A New York Times investigation highlighted several instances in which the sale of Pegasus to a particular government coincided with that government's increased support of Israel.[8] The Israeli government also blocked the sale of Pegasus to Estonia and Ukraine for fear that Israel's relations with Russia would be damaged if the spyware was used against Russia. After a senior Russian official approached the Israeli security agencies and informed them that Russia had learned of Estonia's attempts to obtain Pegasus, the Israeli Ministry of Defense decided to disallow Estonia from using Pegasus against any Russian phone numbers following a heated debate on the issue among Israeli officials.[21]

Corporate history

The company's start-up funding came from a group of investors headed by Eddy Shalev, a partner in venture capital fund Genesis Partners which invested a total of $1.8 million for a 30% stake.[22][3]

In 2013, NSO's annual revenues were around US$40 million.[3][23]

In 2014, the U.S.-based private equity firm Francisco Partners bought the company for $130 million.[24]

In 2014, the surveillance firm Circles (which produces is a phone geolocation tool) was acquired by Francisco Parterns for $130 million, and thus became a corporate affiliate of NSO's.[25]

In 2015 Francisco was seeking to sell the company for up to $1 billion.[23]

Annual revenues were around $150 million in 2015.[3][23]

In June 2017, the company was put up for sale for more than $1 billion by Francisco Partners (roughly ten times what Francisco originally paid to acquire it in 2014).[6] At the time it was put up for sale, NSO had almost 500 employees (up from around 50 in 2014).[6]

On February 14, 2019, Francisco Partners sold a majority (60%) stake of NSO back to co-founders Shalev Hulio and Omri Lavie, who were supported in the purchase by European private equity fund Novalpina Capital.[26] Hulio and Lavie invested $100 million, with Novalpina acquiring the remaining portion of the majority stake, thus valuing the company at approximately $1 billion.[27] The day after the acquisition, Novalpina attempted to address the concerns raised by Citizen Lab with a letter, stating their belief that NSO operates with sufficient integrity and caution.[28]

Foreign offices and export controls

In late 2020, Vice Media published an article in which it reported that NSO group had closed the Cyprus-based offices of Circles, the company it had acquired in 2014. The article, based on interviews with two former employees, described the integration between the two companies as "awful" and stated that NSO would rely on Circles' Bulgarian office instead. According to Vice, this came just over a year after an activist group known as Access Now wrote to authorities in both Cyprus and Bulgaria, asking them to further scrutinise NSO exports.[29] Access now had stated that they had received denials from both the Bulgarian and Cypriot authorities, with both countries stating that they had not provided export licenses to the NSO group.[30] Despite this, an article written by The Guardian during the 2021 Pegasus scandal quoted NSO Group as saying that it had been "regulated by the export control regimes of Israel, Cyprus and Bulgaria".[31] NSO's own "Transparency and Responsibility Report 2021", published about a month before the scandal, makes the same statement, adding that those were the three countries through which NSO exported its products.[32] Circles' Bulgarian office, in particular, was stated to have been founded as a "bogus phone company" in 2015 by Citizen Lab citing IntelligenceOnline, a part of Indigo Publications.[33] This report was reprinted by the Bulgarian investigation publication Bivol in December 2020, which appended it with public registry documents which indicated that the company's Bulgarian office had grown to employ up to 150 people and had received two loans worth about 275 million American dollars in 2017 from two offshore companies and a Swiss bank registered in the Cayman Islands.[34]

History

In 2012, the Federal government of Mexico announced the signing of a $20 million contract with NSO.[3] It was later revealed by a New York Times investigation that NSO's product was used to target journalists and human rights activists in the country.[35]

NSO pitched its spyware to the Drug Enforcement Administration (DEA), which declined to purchase it due to its high cost.[36]

In 2015, the company sold surveillance technology to the government of Panama. The contract later became the subject of a Panamanian anti-corruption investigation following its disclosure in a leak of confidential information from Italian firm Hacking Team.[37]

In August 2016, NSO (through its U.S. subsidiary Westbridge) pitched its U.S. version of Pegasus to the San Diego Police Department (SDPD) In the marketing material, Westbridge emphasized that the company is U.S. based and majority owned by a U.S. parent company. A SDPD Sergeant responded to the sales pitch with "sounds awesome". The SDPD declined to purchase the spyware as it was too expensive.[38]

Around 2016, NSO reportedly sold Pegasus software to Ghana.[39]

In June 2018, an Israeli court indicted a former employee of NSO for allegedly stealing a copy of Pegasus and attempting to sell it online for $50 million worth of cryptocurrency.[40]

In August 2018, the human rights group Amnesty International accused NSO of helping Saudi Arabia spy on a member of the organization's staff.[41]

In April 2019, NSO froze its deals with Saudi Arabia over a scandal alleging NSO software's role in tracking murdered journalist Jamal Khashoggi in the months before his death.[42]

In May 2019, messaging service WhatsApp alleged that a spyware injection exploit targeting its calling feature was developed by NSO.[43][44] WhatsApp stated that the exploit targeted 1,400 users in 20 countries, including "at least 100 human-rights defenders, journalists and other members of civil society".[45][46][47] NSO denied involvement in selecting or targeting victims, but did not explicitly deny creating the exploit.[44] In response to the alleged cyberattack, WhatsApp sued NSO.[48]

In June 2019, NSO began setting up a test facility in New Jersey for the FBI which had procured NSO's services, and began testing a version of Pegasus developed for U.S. government agencies to be used on U.S. phones. After two years of deliberations in the FBI and Department of Justice, the FBI decided not to deploy the tools for domestic use in the summer of 2021, with the New Jersey facility laying dormant as of early 2022. The DEA, Secret Service, and United States Africa Command had also held discussions with NSO which however did not proceed beyond that stage.[8]

In April 2020, Motherboard reported about an incident that occurred several years prior in which an NSO employee used a client's Pegasus tool to spy on a love interest (a female personal acquaintance) during a work trip to the UAE. The employee broke into the client's office outside of office hours to use the tool, prompted an alert and an investigation by the client. The employee was detained by authorities, and fired by NSO, Motherboard's sources said. Sources also told Motherboard that NSO leadership held a meeting to prevent similar incidents in the future, and subsequently adopted more rigorous screening of employees that interact with clients.[49]

In July 2020, Motherboard reported that the US branch of NSO was pitching its brand of Pegasus to the US Secret Service during 2018.[50]

In November 2021, the United States added the NSO Group to its Entity List, for acting "contrary to the foreign policy and national security interests of the US" and it effectively bans the sale of hardware and software to the company.[19] The listing deprived NSO of U.S. technology on which NSO relies, imperiling its operations.[8]

In December 2021, 86 human rights organisations sent a joint letter calling on the EU to impose global sanctions against NSO Group and seek to "prohibit the sale, transfer, export and import of the Israeli company’s surveillance technology" due to the risks NSO's technology poses for human rights globally.[51]

In January 2022, Calcalist published an investigatory piece detailing the widespread unlawful use of Pegasus by the Israeli Police.[52] Although the Israeli Police formally denied this, some senior police officials have hinted that the claims were true.[53] On February 1, the police admitted that there was, in fact, misuse of the software.[54]

On February 7, a second Calcalist report revealed that the warrantless surveillance was very widespread, including that of politicians and government officials, heads of corporations, journalists, activists, and even Avner Netanyahu [he], the son of then-Prime Minister, Benjamin Netanyahu.[55] After outcry and calls for a state commission of inquiry, including from the current police commissioner himself, the Minister of Public Security (the minister responsible for the police), Omer Bar-Lev, announced that he will be forming a commission of inquiry, to be chaired by a retired judge, and whose powers will basically be indistinguishable from a state commission.[56]

Products and services

Pegasus

NSO Groups offers the smartphone spyware tool Pegasus to government clients for the exclusive intended purpose of combating crime and terrorism.[49] The first version of Pegasus was finalised in 2011.[8] Pegasus spyware is classified as a weapon by Israel and any export of the technology must be approved by the government.[11] The Israeli Ministry of Defense licenses the export of Pegasus to foreign governments, but not to private entities.[57]

Pegasus is compatible with iPhone and Android devices. It can be deployed remotely. Once deployed, it allows the client to access the target phone's data and sensors, including: location data, texts, emails, social media messages, files, camera, and microphone. The client-facing side of the tool is user friendly, and all that may be required (depending upon the case) of the client to begin deployment of Pegasus is to enter the target's phone number into the tool.[49]

Phantom

Phantom is a phone hacking product marketed by Westbridge, the United States branch of NSO Group. According to a former NSO employee, "Phantom" is the brand name for the Pegasus in the U.S., but that the two tools are otherwise identical.[50] Israel required NSO Group to program Pegasus so as not to be able to target US phone numbers. NSO then launched Phantom for the U.S. market for use on U.S. targets, receiving permission from Israel to develop it as a specialty tool for exclusive use by U.S. governmental agencies.[8]

Circles

In 2014, the surveillance firm Circles was acquired by Francisco Partners, becoming a corporate affiliate of NSO Group. Circles' product is a phone geolocation tool.[25] The firm has two systems. One operates by connecting to the purchasing country's local telecommunications companies’ infrastructure. The other separate system, known as the “Circles Cloud”, is capable of interconnecting with telecommunications companies across the globe.[58][59]

In December 2020, the Citizen Lab reported that Supreme Council on National Security (SCNS) of the United Arab Emirates was set to receive both these systems. In a lawsuit filed against the NSO group in Israel, email exchanges revealed links between Circles and several customers in the United Arab Emirates. Documents also revealed that Circles sent targets’ locations and phone records to the UAE SCNS. Aside from Israel and the UAE, the report named the governments of Australia, Belgium, Botswana, Chile, Denmark, Ecuador, El Salvador, Estonia, Equatorial Guinea, Guatemala, Honduras, Indonesia, Kenya, Malaysia, Mexico, Morocco, Nigeria, Peru, Serbia, Vietnam, Zambia, and Zimbabwe as likely customers of Circles surveillance technology.[58][59]

In September 2021, Forensic News published shipping records showing that in 2020 Circles supplied equipment to Uzbekistan's State Security Service (SGB).[60]

Criticism and controversies

Use of undercover private investigators to pursue critics

In October 2018, Associated Press reported that two Citizen Lab researchers were being pursued by undercover operatives with false identities. The undercover agents had been inquiring about their work involving NSO Group, and also appeared to be trying to goad the researchers into making anti-Semitic or otherwise damaging remarks. After growing suspicious, one researcher contacted AP reporters. Together, they managed to arrange a sting during a meeting with a suspected undercover operative at a hotel luncheon with AP journalists secretly awaiting nearby; after the journalists approached the operative to question him, the operative fled, bumping into chairs and circling the room as he tried to get away. There also appeared to be two additional undercover operatives in the room. The operative that met the researcher appeared to be filming the researcher with a hidden camera during the meeting, and one of the operatives standing nearby appeared to be recording the meeting as well. The operative was later identified as a former Israeli security official. Responding to the AP report, NSO denied any involvement. It was later also uncovered that the identified undercover agent had previously worked on a case linked to the Israeli private intelligence agency Black Cube; NSO Group subsequently denied contracting Black Cube, and Black Cube denied involvement as well.[61]

In February 2019, Associated Press reported that at least four more individuals - three lawyers involved in lawsuits against NSO Group for alleged sales of NSO spyware to governments with poor human rights records, and one journalist who had been covering said litigation - were being pursued by undercover operatives for their work on NSO. Undercover agents again tried to goad the individuals into making racist or anti-Israel remarks. Two of the individuals were surreptitiously recorded by the undercover operatives. Channel 12, an Israeli television channel, obtained and aired the secret recordings made by the undercover operatives shortly before the AP published the revelations.[62] Channel 12 claimed the two individuals were attempting to smear NSO Group on behalf of Qatar.[63] Channel 12 also confirmed that Black Cube undercover investigators were involved.[63][62]

In 2020, Reuters reported that The Times of Israel, The Jerusalem Post, Algemeiner, and Arutz Sheva published op-eds critical of Mazen Masri, who in late 2018 helped launch a lawsuit against NSO in Israel on behalf of alleged Mexican victims, but the op-eds were from a faked freelance journalist. The newspapers had checked the faked journalist's brief online profiles, but had not otherwise confirmed his identity; Reuters could not find evidence the person by the name given existed. One of the articles claimed Masri and his wife were "known terrorist sympathizers". Two of the newspapers removed the articles, and the others removed libelous elements.[64]

WhatsApp lawsuit

In May 2019, messaging service WhatsApp alleged that a spyware injection exploit targeting its calling feature was developed by NSO.[43][44] Victims were exposed to the spyware payload even if they did not answer the call.[65] WhatsApp told the Financial Times that "the attack has all the hallmarks of a private company known to work with governments to deliver spyware that reportedly takes over the functions of mobile phone operating systems."[66] NSO denied involvement in selecting or targeting victims, but did not explicitly deny creating the exploit.[44] In response to the alleged cyberattack, WhatsApp sued NSO under the CFAA and other US laws in a San Francisco court on October 29.[48] WhatsApp stated that the exploit targeted 1,400 users in 20 countries, including "at least 100 human-rights defenders, journalists and other members of civil society".[45][46][47] WhatsApp alerted the 1,400 targeted users. In at least one case, the surveillance was authorized by a judge.[67]

NSO employees had complained to WhatsApp about improved security, according to the court filings by WhatsApp and its parent company Facebook:[68]

On or about May 13, 2019, Facebook publicly announced that it had investigated and identified a vulnerability involving the WhatsApp Service (CVE-2019-3568). WhatsApp and Facebook closed the vulnerability, contacted law enforcement, and advised users to update the WhatsApp app. Defendants subsequently complained that WhatsApp had closed the vulnerability. Specifically, NSO Employee 1 stated, "You just closed our biggest remote for cellular ... It's on the news all over the world."

In April 2020, NSO group blamed its government clients for the hacking of 1,400 WhatsApp users, including journalists and human rights activists. However, the firm did not disclose the names of the clients which, as Citizen Lab stated, include authorities in Saudi Arabia, UAE, Bahrain, Kazakhstan, Morocco, and Mexico.[69] In court filings WhatsApp alleged that its investigation showed that the hacks originated from NSO Group servers rather than its clients'. WhatsApp said "NSO used a network of computers to monitor and update Pegasus after it was implanted on users' devices. These NSO-controlled computers served as the nerve centre through which NSO controlled its customers' operation and use of Pegasus." WhatsApp said that NSO gained "unauthorised access" to WhatsApp servers by reverse-engineering the WhatsApp app to be able to evade security features. NSO responded "NSO Group does not operate the Pegasus software for its clients".[70]

Apple lawsuit

In November 2021, Apple Inc. filed a complaint against NSO Group and its parent company Q Cyber Technologies in the United States District Court for the Northern District of California in relation to the FORCEDENTRY exploit used to deploy the Pegasus spyware package, requesting injunctive relief, compensatory damages, punitive damages, and disgorgement of profits.[18][71][72] The "zero-click" exploit was discovered by the Canadian Citizen Lab after Saudi activist Loujain al-Hathloul's iPhone was hacked. Technical information uncovered by Bill Marczak's team at the lab allowed Apple to warn thousands of its users, including U.S. State Department employees in Uganda. Researchers also discovered that spyware from QuaDream, another Israeli vendor, took advantage of the same vulnerability in iPhones.[73]

See also

References

  1. ^ a b Franceschi-Bicchierai, Lorenzo; Cox, Joseph (August 25, 2016). "Meet NSO Group, The New Big Player In The Government Spyware Business". VICE Magazine. Retrieved August 25, 2016.
  2. ^ Timberg, Craig; Albergotti, Reed; Guéguen, Elodie (July 19, 2021). "Despite the hype, Apple security no match for NSO spyware - International investigation finds 23 Apple devices that were successfully hacked". The Washington Post. Retrieved July 19, 2021.
  3. ^ a b c d e f Hirschauge, Orr; Orpaz, Inbal (February 17, 2014). "U.S. Fund to Buy NSO and Its Smartphone-snooping Software". Retrieved August 26, 2016.
  4. ^ a b Coppola, Gabrielle (September 29, 2014). "Israeli Entrepreneurs Play Both Sides of the Cyber Wars". Bloomberg News. Retrieved August 25, 2016.
  5. ^ a b Nicole Perlroth (February 11, 2017). "Spyware's Odd Targets: Backers of Mexico's Soda Tax". The New York Times. Retrieved February 13, 2017.
  6. ^ a b c Oneill, Patrick Howard (June 12, 2017). "Israeli hacking company NSO Group is on sale for more than $1 billion". Cyberscoop. Retrieved June 18, 2017.
  7. ^ Lee, Dave (August 26, 2016). "Who are the hackers who cracked the iPhone?". BBC News. Retrieved August 26, 2016.
  8. ^ a b c d e f g h i j Bergman, Ronen; Mazzetti, Mark (January 28, 2021). "The Battle for the World's Most Powerful Cyberweapon". The New York Times. ISSN 0362-4331. Archived from the original on January 31, 2021. Retrieved January 31, 2021.
  9. ^ a b Fox-Brewster, Thomas (August 25, 2016). "Everything We Know About NSO Group: The Professional Spies Who Hacked iPhones With A Single Text". Forbes. Retrieved August 25, 2016.
  10. ^ a b c Schaffer, Aaron (January 10, 2020). "Israeli spyware company accused of hacking activists hires lobby firm". Al-Monitor. Retrieved July 20, 2021.
  11. ^ a b c Priest, Dana (June 6, 2021). "Spyware technology found on phone of Moroccan journalist, report says". Washington Post. Retrieved July 20, 2021.
  12. ^ "Activists and journalists in Mexico complain of government spying". Reuters. June 20, 2017. Retrieved June 20, 2017.
  13. ^ Franceschi-Bicchierai, Lorenzo (August 25, 2016). "Government Hackers Caught Using Unprecedented iPhone Spy Tool". VICE Magazine. Retrieved August 25, 2016.
  14. ^ "Who is spying on Indians? WhatsApp, Pegasus spyware maker, the government are caught in a blame game". Reuters. December 13, 2019. Retrieved January 3, 2020.
  15. ^ "Israeli spyware allegedly used to target Pakistani officials' phones". Reuters. December 19, 2019. Retrieved January 3, 2020.
  16. ^ Ganon, Tomer (January 18, 2022). "Israel police uses NSO's Pegasus to spy on citizens". CTECH - www.calcalistech.com. Retrieved February 1, 2022.
  17. ^ Falconer, Rebecca (March 24, 2019). "Israeli firm won't say if it sold Saudis spyware linked to Khashoggi killing". Axios. Retrieved November 9, 2019.
  18. ^ a b Kirchgaessner, Stephanie (November 23, 2021). "Apple sues Israeli spyware firm NSO Group for surveillance of users". The Guardian. Retrieved November 23, 2021.
  19. ^ a b "US Blacklists Israeli Spyware Company NSO Group". Daily News Brief. November 3, 2021. Retrieved November 3, 2021.
  20. ^ Patrick Howell O'Neill (August 19, 2020). "The man who built a spyware empire says it's time to come out of the shadows". MIT Technology Review. Retrieved July 20, 2021.
  21. ^ a b c Bergman, Ronen; Mazzetti, Mark (March 23, 2022). "Israel, Fearing Russian Reaction, Blocked Spyware for Ukraine and Estonia". The New York Times. ISSN 0362-4331. Retrieved April 13, 2022.
  22. ^ Fischer, Yisrael; Levi, Ruti (August 29, 2016). "The Israelis Behind History's 'Most Sophisticated Tracker Program' That Wormed Into Apple". Retrieved September 1, 2016.
  23. ^ a b c Stone, Mike; Roumeliotis, Greg (November 2, 2015). "Secretive cyber warfare firm NSO Group explores sale: sources". Reuters. Retrieved August 26, 2016.
  24. ^ Yadron, Danny (August 1, 2014). "Can This Israeli Startup Hack Your Phone?". The Wall Street Journal. Retrieved August 25, 2016.
  25. ^ a b "This Surveillance Tool Can Find You With Just Your Telephone Number — Did These 25 Countries Buy It?". Forbes. Retrieved December 1, 2020.
  26. ^ Ziv, Amitai (February 14, 2019). "Israeli Cyberattack Firm NSO Bought Back by Founders at $1b Company Value". Haaretz. Retrieved July 20, 2019.
  27. ^ "Novalpina Capital and founders buy NSO at $1b co value". Globes (in Hebrew). February 14, 2019. Retrieved June 6, 2019.
  28. ^ "Novalpina Capital buys spyware co. NSO Group & commits to helping it become more transparent | Business & Human Rights Resource Centre". business-humanrights.org. Retrieved June 6, 2019.
  29. ^ "NSO Group Closes Cyprus Office of Spy Firm". www.vice.com. Retrieved July 19, 2021.
  30. ^ Krahulcova, Lucie (September 12, 2019). "Is NSO Group's infamous Pegasus spyware being traded through the EU?". Access Now. Retrieved July 19, 2021.
  31. ^ "Edward Snowden calls for spyware trade ban amid Pegasus revelations". The Guardian. July 19, 2021. Retrieved July 19, 2021.
  32. ^ "Transparency and Responsibility Report 2021" (PDF). NSO Group. June 30, 2021.
  33. ^ "Running in Circles: Uncovering the Clients of Cyberespionage Firm Circles". The Citizen Lab. December 1, 2020. Retrieved July 19, 2021.
  34. ^ Биволъ, Екип (December 12, 2020). "Citizen Lab: Кръгов маратон с държавни клиенти на фирма за кибершпионаж". Bivol.bg (in Bulgarian). Retrieved July 19, 2021.
  35. ^ Ahmed, Azam; Perlroth, Nicole (June 19, 2017). "Using Texts as Lures, Government Spyware Targets Mexican Journalists and Their Families (Published 2017)". The New York Times. ISSN 0362-4331. Retrieved October 28, 2020.
  36. ^ "The DEA Didn't Buy Malware From Israel's Controversial NSO Group Because It Was Too Expensive". www.vice.com. Retrieved February 1, 2022.
  37. ^ Rodriguez, Rolando B.; Diaz, Juan Manuel (August 7, 2015). "Abren sumario en caso Hacking Team". La Prensa (Panama City). Retrieved August 25, 2016.
  38. ^ "NSO Group Pitched Phone Hacking Tech to American Police". www.vice.com. Retrieved February 1, 2022.
  39. ^ Raising Concerns Over Press Freedom, Israel's NSO Reportedly Sold Ghana Surveillance Tech
  40. ^ Steinberg, Joseph (July 9, 2018). "Rogue CyberSecurity Company Employee Tried To Sell Powerful, Stolen iPhone Malware For $50-Million". Retrieved July 10, 2018.
  41. ^ "Amnesty International Among Targets of NSO-powered Campaign". Amnesty International. August 2018. Retrieved August 1, 2018.
  42. ^ "Israeli spy tech firm linked to Khashoggi murder said to freeze Saudi deals". The Times of Israel. Retrieved July 20, 2019.
  43. ^ a b "WhatsApp voice calls used to inject Israeli spyware on phones". Financial Times. May 13, 2019. Retrieved June 6, 2019.
  44. ^ a b c d Newman, Lily Hay (May 14, 2019). "How Hackers Broke WhatsApp With Just a Phone Call". Wired. ISSN 1059-1028. Retrieved June 6, 2019.
  45. ^ a b Satter, Raphael; Culliford, Elizabeth (October 30, 2019). "WhatsApp sues Israel's NSO for allegedly helping spies hack phones around the world". Reuters. Retrieved October 30, 2019.
  46. ^ a b Bajak, Frank (October 29, 2019). "Facebook sues Israeli company over WhatsApp spyware". Associated Press. Retrieved October 30, 2019.
  47. ^ a b Cathcart, Will. "Why WhatsApp is pushing back on NSO Group hacking". The Washington Post. Retrieved October 30, 2019.
  48. ^ a b "WhatsApp sues Israeli firm NSO over cyberespionage". Agence France-Presse. January 16, 2012. Retrieved October 30, 2019.
  49. ^ a b c "NSO Employee Abused Phone Hacking Tech to Target a Love Interest". www.vice.com. Retrieved January 30, 2022.
  50. ^ a b "NSO Group Pitched Its Spyware to the Secret Service". www.vice.com. Retrieved January 30, 2022.
  51. ^ "Rights groups urge EU to ban NSO over clients' use of Pegasus spyware". The Guardian. December 3, 2021. Retrieved January 30, 2022.
  52. ^ "NSO at the service of the Israeli police: breaking into the phones of citizens without supervision or oversight" (Hebrew). Calcalist, January 18, 2022.
  53. ^ "What does the Israeli Police really say when it denies the Calcalist investigation?" (Hebrew). Calcalist, January 20, 2022.
  54. ^ "The police zig-zags on the NSO affair: 'evidence was discovered that changes things'" (Hebrew). Ynet. February 1, 2022.
  55. ^ "Ministry heads, Netanyahu associates, activists said targeted by police with spyware." The Times of Israel, February 7, 2022.
  56. ^ "Police minister establishes commission to probe explosive NSO spying claims." The Times of Israel, February 7, 2022.
  57. ^ "יש לנו מאזין על הקו". Calcalist. October 18, 2012. Retrieved January 3, 2020.
  58. ^ a b "Running in Circles: Uncovering the Clients of Cyberespionage Firm Circles". The Citizen Lab. December 2020. Retrieved December 1, 2020.
  59. ^ a b Kirkpatrick, David D.; Ahmed, Azam (August 31, 2018). "Hacking a Prince, an Emir and a Journalist to Impress a Client". The New York Times. Retrieved August 31, 2020.
  60. ^ Stedman, Scott (September 3, 2021). "NSO Group Affiliate Circles Sold Equipment to Uzbekistan 'Secret Police'". Forensic News. Retrieved September 4, 2021.
  61. ^ Bergman, Ronen; Shane, Scott (January 28, 2019). "The Case of the Bumbling Spy: A Watchdog Group Gets Him on Camera". The New York Times. ISSN 0362-4331. Retrieved February 1, 2022.
  62. ^ a b "AP Exclusive: Undercover spy exposed in NYC was 1 of many". AP NEWS. April 20, 2021. Retrieved February 1, 2022.
  63. ^ a b "N12 - כך קטר הכפישה חברת סייבר ישראלית". N12. February 9, 2019. Retrieved February 1, 2022.
  64. ^ Satter, Raphael (July 15, 2020). "Deepfake used to attack activist couple shows new disinformation frontier". Reuters. Retrieved May 15, 2022.
  65. ^ Newman, Lily Hay. "How Hackers Broke WhatsApp With Just a Phone Call". Wired. ISSN 1059-1028. Retrieved October 30, 2019.
  66. ^ Doffman, Zak. "WhatsApp Has Exposed Phones To Israeli Spyware -- Update Your Apps Now". Forbes. Retrieved June 6, 2019.
  67. ^ "Police Tracked a Terror Suspect—Until His Phone Went Dark After a Facebook Warning". Wall Street Journal. January 2, 2020. Retrieved January 3, 2020.
  68. ^ Leblanc, Travis; Mornin, Joseph; Grooms, Daniel (October 29, 2019). "Facebook Inc. v. NSO Group Technologies Limited (3:19-cv-07123)" (PDF). Retrieved October 29, 2019.
  69. ^ Stephanie Kirchgaessner (April 7, 2020). "NSO Group points finger at state clients in WhatsApp spying case". The Guardian.
  70. ^ Stephanie Kirchgaessner (April 29, 2020). "WhatsApp: Israeli firm 'deeply involved' in hacking our users". The Guardian.
  71. ^ "Apple sues NSO Group to curb the abuse of state-sponsored spyware". Apple Newsroom. November 23, 2021. Retrieved November 23, 2021.
  72. ^ "APPLE INC., v. NSO GROUP TECHNOLOGIES LIMITED, and Q CYBER TECHNOLOGIES LIMITED" (PDF). Retrieved November 23, 2021.
  73. ^ Schectman, Joel; Bing, Christopher (February 17, 2022). "How a Saudi woman's iPhone revealed hacking around the world". Reuters.

External links