NSO Group has denied any wrongdoing and maintains that its products are to be used “in a legal manner and according to court orders and the local law of each country.” This justification is problematic, given the presence of local laws that infringe on international human rights standards and the lack of judicial oversight, transparency, and accountability in governmental surveillance, which could result in abuses of power. A sample of the victims was independently analyzed by Amnesty International’s Security Lab which confirms the methodology used to determine Pegasus infections.The report describes the results of an ensuing collaborative investigation by the Citizen Lab, and Thai NGOs iLaw, and DigitalReach.Following the notification, multiple recipients made contact with civil society groups, including the Citizen Lab. The ongoing investigation was triggered by notifications sent by Apple to Thai civil society members in November 2021.The observed infections took place between October 2020 and November 2021.We forensically confirmed that at least 30 individuals were infected with NSO Group’s Pegasus spyware.We discovered an extensive espionage campaign targeting Thai pro-democracy protesters, and activists calling for reforms to the monarchy.Yet another basic human rights violation, courtesy of NSO Group: Citizen Lab has the details: NSO Group’s Pegasus Spyware Used against Thailand Pro-Democracy Activists and Leaders
0 Comments
Leave a Reply. |