States use mercenary spyware technology, such as NSO Group’s Pegasus, Paragon’s Graphite, and Cytrox’s Predator, to remotely and clandestinely infect the smartphones of members of civil society and gain complete access to the targeted device’s data. While such invasive and powerful technology has been the focus of some limited government action to curb proliferation, the global spyware industry continues to thrive. Purportedly developed as a means of fighting crime and terrorism, spyware is sold to governments around the world, many of which have long histories of political repression and human rights abuses. Operating largely in secret and with little oversight, governments use mercenary spyware to target and gather information on human rights defenders, journalists, dissidents, and other members of civil society in violation of international human rights law. In addition to an absence of a global consensus on how to prevent such violations, there is a lack of accountability in the development, sale, and deployment of this technology and, most notably, a failure on the part of states or spyware companies to remedy these human rights violations. In the absence of any meaningful mechanism for remedy or reparation, this article investigates how members of civil society (in particular, journalists and human rights defenders) targeted by spyware have attempted to seek a remedy. First, the article describes the broader context in which mercenary spyware is used, focusing on the deleterious impacts it has on human rights when deployed by government institutions. Second, it surveys some of the different mechanisms that spyware targets have pursued to seek some kind of remedy for such violations. This includes civil litigation by spyware targets against perpetrating states and spyware companies, civil litigation led by companies whose services are exploited to deliver spyware (such as Apple and WhatsApp) against spyware companies, legislative reform efforts, and government-led commissions of inquiry. This article analyzes gaps and challenges that remain in obtaining a remedy for spyware targets. The paper concludes by suggesting areas for reform such that members of civil society may exercise more agency in the fight against spyware and may access meaningful remedies.
RESIDENT.NGO has helped uncover a malware attack targeted at a Belarus-based journalist by the Belarusian secret service (KGB). This document serves as a short synopsis of the case, offering safety recommendations and indicators of compromise (IoCs).
Reporters Without Borders (RSF)’s Digital Security Lab (DSL), working with the Eastern European organisation RESIDENT.NGO, has uncovered a previously unknown spyware tool used by the State Security Committee (KGB) of Belarus to target, among others, journalists and media workers. RSF assesses that this exposure is a serious setback for the KGB’s operations, not least because the software appears to have been in use for several years.
The “Intellexa Leaks”, a new investigation published jointly by Inside Story, Haaretz and WAV Research Collective, presents troubling revelations about the surveillance company Intellexa and its signature product Predator, a form of highly invasive spyware that has been linked to human rights abuses in multiple countries.
Hollywood producer Robert Simonds takes controlling stake, appoints former Trump official David Friedman
Francesco Gaetano Caltagirone received a WhatsApp message on January 31, along with 90 other users around the world. Since the end of 2024, he has been at the center of a major banking operation involving the government. He is the first name involved outside the circle of activists and journalists