Open Letter to Blackstone Group: Human Rights Concerns and Risks with Potential NSO Acquisition
Covers possible due diligence failures at NSO Group, misuse by several customers, and an ongoing investigation by the Mexican Government.
Covers possible due diligence failures at NSO Group, misuse by several customers, and an ongoing investigation by the Mexican Government.
The international investigation into the 2014 Iguala Mass Disappearance was targeted with infection attempts using spyware developed by the NSO group.
NSO Group’s Pegasus spyware and exploit framework were used in infection attempts against Mexican senators and senior politicians in June and July 2016.
Director Ron Deibert was profiled in the Mozilla Foundation’s StoryEngine, which curates stories about Internet leaders and advocates, and gave an interview outlining the Citizen Lab’s work.
This report describes an espionage operation using government-exclusive spyware to target Mexican government food scientists and two public health advocates.
In this report, we confirm the use of the services of Canadian company Netsweeper, Inc. to censor access to the Internet in the Kingdom of Bahrain.
This report describes how a government targeted an internationally recognized human rights defender, Ahmed Mansoor, with the Trident, a chain of zero-day exploits designed to infect his iPhone with sophisticated commercial spyware.
A Canadian Internet filtering company, Netsweeper, is blocking Internet content during armed conflict in Yemen following the dictates of the rebel group, the Houthis, according to a new report from the University of Toronto’s Citizen Lab.
This report provides a detailed, mixed methods analysis of Information controls related to the Yemen armed conflict, with research commencing at the end of 2014 and continuing through October 20, 2015. The research confirms that Internet filtering products sold by the Canadian company Netsweeper have been installed on and are presently in operation in the state-owned and operated ISP YemenNet, the most utilized ISP in the country.
This post describes the results of Internet scanning we recently conducted to identify the users of FinFisher, a sophisticated and user-friendly spyware suite sold exclusively to governments. We devise a method for querying FinFisher’s “anonymizing proxies” to unmask the true location of the spyware’s master servers. Since the master servers are installed on the premises of FinFisher customers, tracing the servers allows us to identify which governments are likely using FinFisher. In some cases, we can trace the servers to specific entities inside a government by correlating our scan results with publicly available sources.