Will Cathcart claims government officials around the world among 1,400 WhatsApp users targeted in 2019
Senior government officials around the world – including individuals in high national security positions who are “allies of the US” – were targeted by governments with NSO Group spyware in a 2019 attack against 1,400 WhatsApp users, according to the messaging app’s chief executive.
Will Cathcart disclosed the new details about individuals who were targeted in the attack after revelations this week by the Pegasus project, a collaboration of 17 media organisations which investigated NSO, the Israeli company that sells its powerful surveillance software to government clients around the world.
What is in the data leak?Continue reading...
Guardian editor-in-chief Katharine Viner reflects on our recent investigation into NSO Group, which sells hacking spyware used by governments around the world, and explains why journalism like this is so vital
When the Guardian’s head of investigations, Paul Lewis, first told me about a huge data leak suggesting authoritarian regimes were possibly using smartphone hacking software to target activists, politicians and journalists, perhaps the worst part is that I wasn’t particularly surprised.Continue reading...
The Pegasus project has raised new concerns about the Israeli firm, which is a world leader in the niche surveillance market
In 2019, when NSO Group was facing intense scrutiny, new investors in the Israeli surveillance company were on a PR offensive to reassure human rights groups.
In an exchange of public letters in 2019, they told Amnesty International and other activists that they would do “whatever is necessary” to ensure NSO’s weapons-grade software would only be used to fight crime and terrorism.
What is in the data leak?
The Pegasus project is a collaborative journalistic investigation into the NSO Group and its clients. The company sells surveillance technology to governments worldwide. Its flagship product is Pegasus, spying software – or spyware – that targets iPhones and Android devices. Once a phone is infected, a Pegasus operator can secretly extract chats, photos, emails and location data, or activate microphones and cameras without a user knowing.
Show your support for the Guardian’s fearless investigative journalism today so we can keep chasing the truthContinue reading...
Computer equipment and electronic devices seized in connection with images of minister kissing aide
Two residential properties in the south of England have been raided by data protection officers, as part of their investigation into who leaked CCTV footage of Matt Hancock kissing an aide in his office.
The Information Commissioner’s Office (ICO) said it had seized computer equipment and electronic devices as part of the operation on Thursday morning, amid an ongoing investigation into alleged breaches of the Data Protection Act.Continue reading...