
Sign up to save your podcasts
Or


Geneva, Switzerland
In the shadow of public law and international norms, a silent war is being waged. It does not involve bombs or armies but code, signals, and silence. At the heart of this covert battlefield lies Pegasus, a military-grade spyware suite developed by the Israeli cyber-intelligence firm NSO Group. Since its emergence in the early 2010s, Pegasus has quietly become one of the most powerful surveillance tools in the world. Marketed to governments as a counterterrorism and law enforcement solution, it has instead become a tool of political repression, digital intrusion, and psychological destabilization.
Pegasus does not need its target to click a link. It can silently infiltrate a smartphone through zero-click exploits, which require no action by the user. The spyware installs itself through missed calls, push notifications, or background system vulnerabilities. Once inside, it turns a device into a live surveillance hub. It captures calls, texts, encrypted messages, emails, photos, location data, and even microphone and camera feeds in real time. The victim does not know it is there. There are no warnings. Once active, Pegasus changes the entire landscape of digital threat.
Despite global outcry and its inclusion on the U.S. Entity List in 2021, Pegasus remains active. It has been used against:
* Journalists (including individuals within Jamal Khashoggi’s inner circle)
* Human rights defenders
* Opposition politicians
* Whistleblowers, including victims like the very audience this article was written for
It has been linked to regimes in Saudi Arabia, Hungary, India, Mexico, Morocco, Rwanda, and others. These governments have used Pegasus to intimidate, monitor, and silence dissent. This is not an isolated misuse. Pegasus is not a rogue tool. It is part of a recurring pattern, embedded within a larger system of global suppression. Surveillance has been outsourced. Legal oversight has collapsed. Human rights are being reframed as national security threats.
This series is not just a technical breakdown of Pegasus. It is an interrogation of institutional power, a primer for investigators, and a source of clarity for victims. It exists to:
* Map out how Pegasus operates
* Show how it intersects with global covert harassment networks
* Expose the contractors, governments, and intermediaries who enable it
* Offer practical defense strategies for those under digital siege
* Demand international accountability for its use
Pegasus is not just a software product. It is a warning sign of what happens when militarized surveillance technology is deployed without oversight or ethical constraint. The systems meant to protect civil liberties are failing. This series is written to confront that failure, decode the architecture behind it, and push for the accountability that has so far been denied.
In Section 2 of the Pegasus series, we dig into what makes this spyware so dangerous. From zero click exploits to full device takeover, Pegasus doesn’t just spy. It dominates. This next piece breaks down how it works, the global scale of its deployment, and the devastating reach of its surveillance powers. Countries, corporations, and contractors have used it far beyond its stated intent. This isn’t just about data. It is about control. Stay tuned.
By Dispatches from inside the FireGeneva, Switzerland
In the shadow of public law and international norms, a silent war is being waged. It does not involve bombs or armies but code, signals, and silence. At the heart of this covert battlefield lies Pegasus, a military-grade spyware suite developed by the Israeli cyber-intelligence firm NSO Group. Since its emergence in the early 2010s, Pegasus has quietly become one of the most powerful surveillance tools in the world. Marketed to governments as a counterterrorism and law enforcement solution, it has instead become a tool of political repression, digital intrusion, and psychological destabilization.
Pegasus does not need its target to click a link. It can silently infiltrate a smartphone through zero-click exploits, which require no action by the user. The spyware installs itself through missed calls, push notifications, or background system vulnerabilities. Once inside, it turns a device into a live surveillance hub. It captures calls, texts, encrypted messages, emails, photos, location data, and even microphone and camera feeds in real time. The victim does not know it is there. There are no warnings. Once active, Pegasus changes the entire landscape of digital threat.
Despite global outcry and its inclusion on the U.S. Entity List in 2021, Pegasus remains active. It has been used against:
* Journalists (including individuals within Jamal Khashoggi’s inner circle)
* Human rights defenders
* Opposition politicians
* Whistleblowers, including victims like the very audience this article was written for
It has been linked to regimes in Saudi Arabia, Hungary, India, Mexico, Morocco, Rwanda, and others. These governments have used Pegasus to intimidate, monitor, and silence dissent. This is not an isolated misuse. Pegasus is not a rogue tool. It is part of a recurring pattern, embedded within a larger system of global suppression. Surveillance has been outsourced. Legal oversight has collapsed. Human rights are being reframed as national security threats.
This series is not just a technical breakdown of Pegasus. It is an interrogation of institutional power, a primer for investigators, and a source of clarity for victims. It exists to:
* Map out how Pegasus operates
* Show how it intersects with global covert harassment networks
* Expose the contractors, governments, and intermediaries who enable it
* Offer practical defense strategies for those under digital siege
* Demand international accountability for its use
Pegasus is not just a software product. It is a warning sign of what happens when militarized surveillance technology is deployed without oversight or ethical constraint. The systems meant to protect civil liberties are failing. This series is written to confront that failure, decode the architecture behind it, and push for the accountability that has so far been denied.
In Section 2 of the Pegasus series, we dig into what makes this spyware so dangerous. From zero click exploits to full device takeover, Pegasus doesn’t just spy. It dominates. This next piece breaks down how it works, the global scale of its deployment, and the devastating reach of its surveillance powers. Countries, corporations, and contractors have used it far beyond its stated intent. This isn’t just about data. It is about control. Stay tuned.