This report was collaboratively written by researchers from computer science, political science, criminology, law, and journalism studies. As befits their expertise, the report is divided into several parts, with each focusing on specific aspects of the consumer spyware ecosystem, which includes: technical elements associated stalkerware applications, stalkerware companies’ marketing activities and public policies, and these companies’ compliance with Canadian federal commercial privacy legislation.
Given Novalpina Capital’s recent acquisition of NSO Group and the obvious human rights concerns raised by NSO Group’s business practices, Citizen Lab’s Ronald Deibert seeks a response from the South Yorkshire Pensions Authority regarding how its investment in Novalpina is consistent with the Authority’s Policy and what measures were taken by the Authority to inform and educate pension fund contributors and members regarding NSO Group.
Dubbed Endless Mayfly, the operators spoofed legitimate news outlets and disseminated fake stories through social media accounts. Once the articles had gained traction, they were deleted and the links were redirected to the domain being impersonated. This “ephemeral disinformation” technique provided the veneer of legitimacy while obscuring the origins of the fake narratives.
A recently discovered security vulnerability on WhatsApp, currently used by over 1.5 billion people worldwide, has been found to have been exploited by NSO Group developed spyware.
Spyware developer NSO Group is usually quick to dismiss the evidence that its customers have abused its Pegasus mobile phone spyware. This pattern of denials was repeated in a recent 60 Minutes investigation, which gives a rare look into NSO Group’s management.
A recent New York Times article investigates how authoritarian states target citizens and dissidents with sophisticated spyware, developed within a secretive, multi-billion dollar industry.
The window of a murdered Mexican journalist was targeted with Pegasus, a spyware product which can secretly access the contents of a phone and turn on its camera and microphone.
He provided oral comments to the committee which were, substantially, a truncated version of the brief he submitted. His oral comments are available to download, and what follows in this post is the actual brief which was submitted.