
Sign up to save your podcasts
Or


Geneva, Switzerland
Pegasus is not ordinary spyware. It is a military grade digital weapon engineered for covert access, long-term persistence, and total information dominance over a target’s mobile device. Unlike consumer grade spyware or conventional government surveillance tools, Pegasus operates with a level of sophistication designed for intelligence and warfare. It is capable of penetrating a smartphone through zero click and zero day exploits, often without any interaction or indication to the user.
A zero click exploit allows Pegasus to silently infiltrate a device through missed calls, push notifications, or hidden messages sent via common applications such as iMessage or WhatsApp. The user does not need to tap a link, open an attachment, or take any action at all. A zero day exploit refers to a previously unknown vulnerability in software that has not yet been patched. These vulnerabilities are highly valuable and often traded for millions of dollars. NSO Group has leveraged these vulnerabilities to deliver Pegasus with precision.
Once installed, Pegasus gains total control of the infected device. It can monitor and record calls, extract messages from encrypted apps like Signal or WhatsApp, access files and photos, track real-time GPS location, and remotely activate the phone’s microphone and camera. This turns the device into an always on surveillance tool, even when locked, idle, or appearing to be powered down.
Unlike traditional intelligence operations that require human surveillance or physical contact, Pegasus allows remote, scalable, and deniable monitoring. It requires no physical proximity to the target and leaves minimal forensic traces. This makes it extremely difficult to detect and even harder to attribute. These capabilities have made Pegasus attractive not only to state intelligence agencies but also to law enforcement and private intelligence contractors.
According to investigations by Amnesty International and the Citizen Lab, Pegasus has been deployed in more than 45 countries. Confirmed and suspected clients include governments in Saudi Arabia, India, Mexico, Morocco, Rwanda, and Hungary. Targets have included journalists, opposition politicians, human rights advocates, election monitors, lawyers, and whistleblowers. In several documented cases, Pegasus was deployed ahead of major political events such as elections, protests, or high-profile leaks. It has been used to intimidate, monitor, or neutralize individuals who posed a threat to powerful interests.
Pegasus is not just a surveillance tool. It plays a central role in a broader strategy of hybrid repression. This includes digital monitoring, legal harassment, psychological operations, smear campaigns, and in some cases, coordinated physical targeting. The tool has been used to preempt the release of information, sabotage legal strategies, compromise internal activist communications, and fracture trust within civil society networks.
NSO Group maintains that it sells Pegasus only to vetted government clients for counterterrorism and criminal investigations. However, the evidence shows a repeated pattern of abuse. The export of Pegasus is regulated by Israel’s Ministry of Defense, but this oversight has failed to prevent misuse. Reports suggest that when NSO comes under scrutiny, it often rebrands or operates through shell companies to continue selling to questionable clients. There is little transparency regarding who buys Pegasus, under what terms, and with what safeguards.
This is not a story about one rogue company. Pegasus is part of a global surveillance market that treats cyberweapons as commercial products. These tools are sold through classified bidding processes, diplomatic channels, and private security partnerships that evade meaningful regulation. Pegasus exemplifies how governments and private firms bypass both domestic laws and international norms in order to surveil and suppress their critics.
The implications are severe. Pegasus enables governments and proxy actors to erase legal boundaries by reaching across borders into the private lives of civilians. It has given rise to a class of digital mercenaries: private contractors operating under the protection of state power and shielded from accountability. It undermines journalism, compromises attorney-client privilege, and threatens the integrity of democratic processes.
Pegasus also has strategic value beyond surveillance. It disrupts organizing, neutralizes legal defense teams, and disorients political opposition. In modern asymmetric warfare, information and perception are as decisive as kinetic force (physical or military action). Pegasus provides a way to dominate information environments preemptively. It is used to suppress opposition before they speak rather than punish them after.
This is why Pegasus remains in active use despite lawsuits, blacklistings, and international condemnation. Its architecture has been studied, copied, and redeployed by other firms, creating a competitive global marketplace for spyware. The threat has evolved beyond NSO Group.
The next section will examine the broader ecosystem that supports this technology. It will explore the private security firms, legal loopholes, and cross-border data-sharing frameworks that sustain a global suppression architecture. Understanding Pegasus is only one step. To confront it, we must expose the system that allows it to thrive.
By Dispatches from inside the FireGeneva, Switzerland
Pegasus is not ordinary spyware. It is a military grade digital weapon engineered for covert access, long-term persistence, and total information dominance over a target’s mobile device. Unlike consumer grade spyware or conventional government surveillance tools, Pegasus operates with a level of sophistication designed for intelligence and warfare. It is capable of penetrating a smartphone through zero click and zero day exploits, often without any interaction or indication to the user.
A zero click exploit allows Pegasus to silently infiltrate a device through missed calls, push notifications, or hidden messages sent via common applications such as iMessage or WhatsApp. The user does not need to tap a link, open an attachment, or take any action at all. A zero day exploit refers to a previously unknown vulnerability in software that has not yet been patched. These vulnerabilities are highly valuable and often traded for millions of dollars. NSO Group has leveraged these vulnerabilities to deliver Pegasus with precision.
Once installed, Pegasus gains total control of the infected device. It can monitor and record calls, extract messages from encrypted apps like Signal or WhatsApp, access files and photos, track real-time GPS location, and remotely activate the phone’s microphone and camera. This turns the device into an always on surveillance tool, even when locked, idle, or appearing to be powered down.
Unlike traditional intelligence operations that require human surveillance or physical contact, Pegasus allows remote, scalable, and deniable monitoring. It requires no physical proximity to the target and leaves minimal forensic traces. This makes it extremely difficult to detect and even harder to attribute. These capabilities have made Pegasus attractive not only to state intelligence agencies but also to law enforcement and private intelligence contractors.
According to investigations by Amnesty International and the Citizen Lab, Pegasus has been deployed in more than 45 countries. Confirmed and suspected clients include governments in Saudi Arabia, India, Mexico, Morocco, Rwanda, and Hungary. Targets have included journalists, opposition politicians, human rights advocates, election monitors, lawyers, and whistleblowers. In several documented cases, Pegasus was deployed ahead of major political events such as elections, protests, or high-profile leaks. It has been used to intimidate, monitor, or neutralize individuals who posed a threat to powerful interests.
Pegasus is not just a surveillance tool. It plays a central role in a broader strategy of hybrid repression. This includes digital monitoring, legal harassment, psychological operations, smear campaigns, and in some cases, coordinated physical targeting. The tool has been used to preempt the release of information, sabotage legal strategies, compromise internal activist communications, and fracture trust within civil society networks.
NSO Group maintains that it sells Pegasus only to vetted government clients for counterterrorism and criminal investigations. However, the evidence shows a repeated pattern of abuse. The export of Pegasus is regulated by Israel’s Ministry of Defense, but this oversight has failed to prevent misuse. Reports suggest that when NSO comes under scrutiny, it often rebrands or operates through shell companies to continue selling to questionable clients. There is little transparency regarding who buys Pegasus, under what terms, and with what safeguards.
This is not a story about one rogue company. Pegasus is part of a global surveillance market that treats cyberweapons as commercial products. These tools are sold through classified bidding processes, diplomatic channels, and private security partnerships that evade meaningful regulation. Pegasus exemplifies how governments and private firms bypass both domestic laws and international norms in order to surveil and suppress their critics.
The implications are severe. Pegasus enables governments and proxy actors to erase legal boundaries by reaching across borders into the private lives of civilians. It has given rise to a class of digital mercenaries: private contractors operating under the protection of state power and shielded from accountability. It undermines journalism, compromises attorney-client privilege, and threatens the integrity of democratic processes.
Pegasus also has strategic value beyond surveillance. It disrupts organizing, neutralizes legal defense teams, and disorients political opposition. In modern asymmetric warfare, information and perception are as decisive as kinetic force (physical or military action). Pegasus provides a way to dominate information environments preemptively. It is used to suppress opposition before they speak rather than punish them after.
This is why Pegasus remains in active use despite lawsuits, blacklistings, and international condemnation. Its architecture has been studied, copied, and redeployed by other firms, creating a competitive global marketplace for spyware. The threat has evolved beyond NSO Group.
The next section will examine the broader ecosystem that supports this technology. It will explore the private security firms, legal loopholes, and cross-border data-sharing frameworks that sustain a global suppression architecture. Understanding Pegasus is only one step. To confront it, we must expose the system that allows it to thrive.