from the is-it-too-late-to-rebrand-as-'International-Pariah' dept
NSO Group’s terrible 2021 is flowing seamlessly into an equally terrible 2022. The leak of a list of alleged targets for its malware — a list that included journalists, activists, government critics, political officials, and religious leaders — led to an outpouring of discoveries linking the company to abusive deployments of malware by a number of questionable governments.
NSO is currently being sued by two US companies over its malware. Facebook and WhatsApp claim NSO committed terms of service violations by sending malware via the messaging service. Apple claimed the same thing, pointing to the targeting of iPhones owned by users infected with NSO spyware.
Both companies are notifying users who appear to have been targeted by this malware. All over the world, people are reporting they’ve been targeted, often due to investigations performed by Canada’s Citizen Lab and Amnesty International.
Governments are getting into the act as well. The Israeli government — which once helped NSO broker deals with nearby authoritarians — is investigating the company. It has also drastically slashed the number of foreign governments it can sell to. Other governments around the world are engaging in their own investigations following reports of residents (or their elected representatives) having been hit with malware payloads created by NSO.
NSO-related phone infections are now part of a federal case in India. The nation’s top court has created a committee to look into allegations Indian citizens have been targeted by NSO’s Pegasus spyware.
The Supreme Court-appointed Technical Committee looking into the usage of Pegasus against Indian citizens has issued a public notice asking those who believe they have been targeted using the spyware to come forward and say whether they would be willing to let their device be examined by the committee.
The public notice, published in newspapers across the country on 2 January, requests “any citizen of India who has reasonable cause to suspect that her/his mobile has been compromised due to specific usage of NSO grow Israel’s Pegasus software (sic)” to contact the committee.
Those who suspect they’ve been targeted will turn their phones over to the technical committee for examination. They’ll receive an image file of the contents of their phone after relinquishing their phones and receive their device back after it has been forensically examined.
This response was prompted by a lawsuit brought against the Indian government for spying on its own citizens using NSO malware. The court also wants the government to answer a few questions as it moves this litigation forward. It wants to know how the malware was used (interception, eavesdropping, etc.), which government entities have access to Pegasus, and whether or not it has been used to target Indian citizens.
Some of those answers will likely be answered by the examination of submitted phones. The others may never receive direct answers — not if the government chooses to invoke national security mantras rather than discuss its purchase and use of NSO spyware in open court.
So far, the government has chosen to say nothing about alleged targeting of its own constituents, which hasn’t made the Supreme Court very happy.
The bench headed by Chief Justice of India NV Ramana criticised the Union government for its refusal to clarify whether it had purchased and used the spyware, and said it had to accept the prima facie case of the petitioners, including victims of Pegasus hacking, and examine their allegations.
The government will be forced to respond. Forensic examinations will uncover malware infections and perhaps even the source of those infections. Refusing to respond to questions now just means answering harder questions later. And it’s just more of the same for NSO Group, which is now primarily known for being the enabler of government corruption and oppression.