Pegasus Spyware – Digital Surveillance, Power, and Global Controversy
What is verified, what is alleged, and what the evidence actually shows
Pegasus is one of the most controversial surveillance technologies of the 21st century. Developed by the Israeli company NSO Group, it has been described by cybersecurity researchers as one of the most advanced commercial spyware tools ever discovered. While NSO Group states that Pegasus is sold exclusively to government clients for combating terrorism and serious crime, multiple independent investigations have documented its use against journalists, activists, lawyers, and political figures.
This article presents a fact-checked and evidence-based overview of Pegasus, separating verified findings from allegations.
What Is Pegasus?
Pegasus is a sophisticated spyware platform developed by NSO Group, an Israeli cyber-intelligence company founded in 2010. According to NSO Group, the software is licensed only to vetted government agencies and is subject to export approval by Israel’s Ministry of Defense.
Pegasus is designed to infect smartphones running both iOS (Apple) and Android operating systems. Once installed, it can extract data and monitor device activity at a very deep system level.
Sources: NSO Group public statements; Israeli Ministry of Defense export regulations; cybersecurity research reports.
Zero-Click Exploits and Infection Methods
One of Pegasus’s most significant technical features is its use of “zero-click” exploits. A zero-click attack allows infection without the user clicking on a malicious link or downloading a suspicious file.
In 2019, WhatsApp revealed that attackers exploited a vulnerability in its voice calling function to target approximately 1,400 users globally. WhatsApp later filed a lawsuit against NSO Group in U.S. federal court, alleging that Pegasus was responsible for the attack.
Subsequent research by Amnesty International’s Security Lab and Citizen Lab (University of Toronto) documented additional exploit chains, including those targeting Apple’s iMessage service. Apple later patched these vulnerabilities through security updates.
It is important to note that zero-click exploits rely on previously unknown software vulnerabilities (often called “zero-day” vulnerabilities). Technology companies regularly issue security updates to close such gaps once discovered.
Sources: WhatsApp v. NSO Group court filings (2019); Amnesty International Security Lab forensic reports; Citizen Lab investigations; Apple security advisories.
What Pegasus Can Do (Verified Capabilities)
Independent forensic investigations have confirmed that Pegasus, once successfully installed, can:
Access messages, emails, photos, and contacts
Extract data from encrypted messaging apps such as WhatsApp and Signal (by accessing data directly on the device)
Record phone calls
Activate the microphone and camera
Track GPS location
Retrieve stored passwords and authentication data
Because Pegasus operates with high-level system privileges, it can bypass many traditional security barriers once inside the device.
Sources: Amnesty International Security Lab forensic analysis; Citizen Lab technical reports.
The Pegasus Project (2021 Investigation)
In 2021, a global investigative collaboration known as The Pegasus Project was coordinated by Forbidden Stories and Amnesty International. The investigation involved multiple international media organizations.
Journalists obtained access to a leaked list containing over 50,000 phone numbers believed to be selected by clients of NSO Group for potential surveillance interest.
Important clarification:
The presence of a number on the list does not automatically prove that the device was infected. However, forensic analysis conducted on a subset of phones showed confirmed Pegasus infections in several cases.
Among the individuals identified as potential targets were:
Journalists from major international media outlets
Human rights defenders
Lawyers
Political opposition figures
Government officials
Reports indicated that French President Emmanuel Macron’s phone number appeared on the list of potential targets. However, no public forensic confirmation established that his device was successfully infected.
Sources: The Pegasus Project reporting (Forbidden Stories and partner media); Amnesty International forensic analysis (2021).
Legal Actions Against NSO Group
WhatsApp Lawsuit (2019)
WhatsApp filed a lawsuit in U.S. federal court alleging that NSO Group violated U.S. law by targeting users through its platform. The case is ongoing and has resulted in significant legal scrutiny of NSO’s operations.
Apple Lawsuit (2021)
Apple filed a separate lawsuit against NSO Group in 2021, seeking to prevent NSO from using Apple services and devices to target users. Apple also introduced a security feature called Lockdown Mode in iOS 16, specifically designed to protect high-risk individuals from sophisticated spyware attacks.
U.S. Government Blacklisting (2021)
In November 2021, the United States Department of Commerce added NSO Group to its “Entity List.” This designation restricts the company’s access to certain U.S. technologies and components. The U.S. government cited activities contrary to U.S. national security and foreign policy interests.
Sources: U.S. Department of Commerce Entity List notice (2021); Apple legal filings (2021); U.S. federal court records.
Diplomatic and Political Controversies
Multiple investigative reports have suggested that Pegasus licenses were sold to governments in the Middle East, Europe, Asia, and Latin America. Some reporting has alleged that spyware exports were linked to diplomatic relationships.
However, it is important to emphasize:
There is no officially confirmed evidence proving that Pegasus sales were formally included as part of diplomatic agreements. Most such claims are based on investigative reporting rather than government confirmation.
In Israel, domestic controversy emerged in 2022 after media reports alleged that Israeli police had used Pegasus in ways that exceeded legal authorization. An official review process was initiated following those reports.
Sources: International investigative journalism reports (2021–2022); Israeli government review statements.
Can Ordinary Users Protect Themselves?
There is no guaranteed method to prevent a state-level targeted attack. However, cybersecurity experts recommend the following risk-reduction measures:
Keep devices updated with the latest operating system patches
Install apps only from official app stores
Enable advanced security features such as Apple’s Lockdown Mode (iOS 16 and later)
Use secure communication practices
Consult digital security experts if targeted
Amnesty International developed the Mobile Verification Toolkit (MVT), an open-source forensic tool that allows specialists to analyze device backups for indicators of Pegasus infection. It is primarily intended for technical experts and human rights defenders.
Sources: Amnesty International Security Lab documentation; Apple iOS 16 security documentation.
The Broader Surveillance Industry
Pegasus is part of a growing commercial spyware industry that sells surveillance capabilities to government agencies. Market estimates for the global surveillance technology sector vary widely and depend on methodology. While figures in the billions of dollars are frequently cited in industry analyses, there is no single universally verified global valuation specific only to spyware.
Experts describe this trend as the commercialization of advanced cyber-espionage tools, once limited primarily to major intelligence agencies.
Sources: Industry market research reports; cybersecurity policy analyses.
Conclusion
Pegasus represents a major turning point in the global debate over privacy, security, and state power. Verified investigations show that it has been used beyond traditional counterterrorism contexts, raising serious ethical and legal concerns.
At the same time, governments argue that such tools are necessary to combat organized crime and terrorism.
The Pegasus case illustrates a central dilemma of the digital age: how to balance national security with individual rights. As legal battles continue and regulatory frameworks evolve, Pegasus remains a symbol of both technological capability and democratic vulnerability.
If you want to understand digital surveillance more deeply and also strengthen your personal security, here are three highly recommended books and one essential security gadget:
1. This Is How They Tell Me the World Ends – by Nicole Perlroth
This book explores the secret global market for zero-day exploits and cyber weapons. It explains how governments and private companies trade software vulnerabilities, making it highly relevant to topics like Pegasus spyware.
2. Sandworm – by Andy Greenberg
A gripping investigation into state-sponsored cyber warfare, including real-world hacking operations that reshaped global security discussions.
3. The Art of Invisibility – by Kevin Mitnick
Written by a former hacker, this practical guide teaches how individuals can protect themselves from digital tracking, data theft, and online surveillance.
Security Gadget: YubiKey 5 NFC – by Yubico
A hardware-based two-factor authentication (2FA) device that protects your online accounts from unauthorized access. Even if someone steals your password, they cannot log in without this physical key.
If you choose to purchase any of the books or security gadgets through the links provided above, I may earn a small commission at no additional cost to you. This commission helps support my research, writing, and the continued creation of in-depth content on cybersecurity, privacy, and global affairs.
Your support is greatly appreciated and helps keep this platform independent and informative.


Comments
Post a Comment