• Research
  • Emissary
  • About
  • Experts
Carnegie Global logoCarnegie lettermark logo
Democracy
  • Donate
{
  "authors": [
    "Steve Feldstein"
  ],
  "type": "commentary",
  "centerAffiliationAll": "",
  "centers": [
    "Carnegie Endowment for International Peace"
  ],
  "collections": [
    "Tech and Democracy"
  ],
  "englishNewsletterAll": "",
  "nonEnglishNewsletterAll": "",
  "primaryCenter": "Carnegie Endowment for International Peace",
  "programAffiliation": "",
  "programs": [
    "Democracy, Conflict, and Governance"
  ],
  "projects": [
    "Digital Democracy Network"
  ],
  "regions": [],
  "topics": [
    "Political Reform",
    "Technology"
  ]
}

Source: Getty

Commentary

Governments Are Using Spyware on Citizens. Can They Be Stopped?

An Israeli company has sold military-grade surveillance spyware to governments that are using it to spy on private citizens. What can the United States do about the explosion of such snooping?

Link Copied
By Steve Feldstein
Published on Jul 21, 2021
Program mobile hero image

Program

Democracy, Conflict, and Governance

The Democracy, Conflict, and Governance Program is a leading source of independent policy research, writing, and outreach on global democracy, conflict, and governance. It analyzes and seeks to improve international efforts to reduce democratic backsliding, mitigate conflict and violence, overcome political polarization, promote gender equality, and advance pro-democratic uses of new technologies.

Learn More
Digital Democracy Network

Project

Digital Democracy Network

Carnegie’s Digital Democracy Network is a diverse group of leading thinkers and activists engaged in work on technology and politics. The network is dedicated to generating original analysis and enabling cross-regional knowledge-sharing to fill critical research and policy gaps.

Learn More

The Washington Post has started running an investigative series, called the Pegasus Project, that describes the expanded use of digital surveillance by governments worldwide. The reports expose how powerful software provided by the Israeli firm NSO Group has been used by states to hack into citizens’ smartphones, track their communications, and acquire incriminating information, sometimes as a prelude to assassination.

This is not a new story—for those of us who follow these issues closely, the proliferation of spyware has been an ongoing problem for years. But the Pegasus Project helps us better understand just how prevalent these practices are. Approximately 50,000 phone numbers appear on a surveillance hacking list containing business executives, human rights activists, journalists, politicians, and government officials. These individuals come from at least fifty countries.

While NSO Group insists that its products are primarily used by law enforcement for legitimate crime-fighting purposes, the information revealed by the newspaper’s investigation shows that NSO Group’s technology frequently targets individuals who have little to do with crime or terrorism. It has become clear that the human rights costs of NSO Group’s spyware far outweigh national security considerations.

Three Lessons for Policymakers

What can we make of these developments and what steps should policymakers take in response?

First, the proliferation of spyware is a widespread problem that democracies have manifestly failed to take seriously. The repercussions from supplying powerful surveillance tools to authoritarian governments are high—citizen security has been compromised, activists have been jailed, and journalists have been killed because of this spyware. Yet, Israel and other democratic countries, including the United States, have not only turned a blind eye to spyware use but have also tacitly supported these sales by approving export licenses. When it comes to the private surveillance industry, NSO Group’s transactions represent the tip of the iceberg. As I’ve written in my book, The Rise of Digital Repression, and documented in a publicly available global spyware database, at least sixty-five governments worldwide, from Chile to Vietnam, have acquired commercial spyware surveillance tools (for a few examples, see table 1). Relevant companies, such as Cellebrite, FinFisher, Blue Coat, Hacking Team, CyberPoint, L3 Technologies, Verint, and NSO Group, are headquartered in the most democratic countries in the world, including the United States, Italy, France, Germany, and Israel.

CountryRegime TypeCommercial Spyware Vendor(s)Description
HungaryEAHacking Team, Black Cube, NSO Group/PegasusBlack Cube involvement in a campaign to discredit nongovernmental organizations ahead of Hungary’s April election; more than 300 phone numbers for journalists, lawyers, business executives, and activists found on the Pegasus spying list
IndiaEDNSO Group/PegasusSpyware targeting hundreds of journalists, activists, opposition politicians, government officials, and business executives
IranEABlue CoatNumerous high-profile incidents of surveillance and targeted malware attacks
MexicoEDHacking Team, NSO Group/Pegasus, FinFisher, NSO Group/CirclesMalware to track civil society, opposition, groups, and journalists
MoroccoCAHacking Team, NSO Group/Pegasus, FinFisher, Decision Group, NSO Group/CirclesAbusive use of spyware to target civil society
RwandaEANSO Group/PegasusSecurity officials authorized to tap online communications; Pegasus software targeting Rwandan dissidents at the behest of the government
Saudi ArabiaCAHacking Team, NSO Group/Pegasus, FinFisherExtensive documented abuse of spyware to target political opponents and civil society
SpainLDNSO GroupCatalan politicians targeted by government
ThailandCAHacking Team, Blue Coat, NSO Group/CirclesTargeted surveillance against civil society and regime opponents
TurkeyEAHacking Team, FinFisher, NSO GroupExtensive spyware links; most forms of telecommunication tapped and intercepted
Source: Steven Feldstein, “Commercial Spyware Global Inventory,” version 2, Mendeley Data, December 22, 2020, DOI: 10.17632/csvhpkt8tm.2, https://data.mendeley.com/datasets/csvhpkt8tm/2.

Note: The regime types listed here refer to close autocracy (CA), electoral autocracy (EA), electoral democracy (ED), and liberal democracy (LD).

Second, the Pegasus Project illustrates the high cost of doing business with authoritarian leaders. By turning a blind eye to the effects of spyware produced in democratic nations and sold to autocrats, the United States and its allies have undermined the cause of human rights worldwide. Some experts argue that under U.S. President Joe Biden, the United States has erred in pushing a foreign policy doctrine that “unnecessarily divides the world into good guys and bad guys” and that Biden should refrain from drawing a “bright line between dictators and democrats.” But the Pegasus Project tells us that new technology is amplifying the costs of doing business with autocrats. While the United States must be realistic about cooperating with authoritarian regimes on certain issues, this does not mean that U.S. decisionmakers should refrain from emphasizing human rights issues in these relationships. If we have learned one thing from the stumbles of former president Donald Trump’s administration, it is that when the United States dispenses with supporting democratic values, authoritarians take it as a signal that they can act with greater impunity. The result is emboldened bad behavior and diminished U.S. credibility and influence. The NSO Group spyware story reinforces just how nasty the world can be—particularly the degree to which autocrats will adopt unsavory measures to consolidate their power.

Third, the Pegasus Project illustrates a foreign policy misconception: that China is largely responsible for exporting authoritarian technology to bad actors. While China bears substantial responsibility for modeling to other states how digital technology can be used to control their citizens, and while Chinese companies have supplied a considerable share of exports to abusive regimes, Chinese firms are far from the only ones providing repressive tools to autocrats. They face stiff competition from companies based in democracies. Recent examples include the Canadian company Sandvine, which provided censorship technology to Belarus and Egypt; the French firm Nexa Technologies, which sold internet surveillance equipment to Libya and Egypt; and the U.S.-based company Oracle, which provided surveillance products in China. Western companies have a long track record of selling powerful tools to bad governments.

What Can Be Done?

As David Kaye and Marietje Schaake smartly suggest, a first step to stem the tide of spyware technology would be for democracies to implement an immediate moratorium on the sale or transfer of private surveillance equipment until accountable rules are drawn up and agreed upon. Given the scale of harms, there appears to be little justification to continue permitting such sales without undertaking a wholesale review and establishing basic human rights safeguards.

Coming out of such a review, the United States should consider adopting a binding and enforceable export controls regime to stop the spread of dangerous surveillance tools to bad actors. The Wassenaar Arrangement, a group of forty-two advanced economies that coordinates export restrictions for conventional arms and dual-use technology, could be one place to bolster limitations. In 2013, the group added surveillance software to its list of technologies necessitating further controls—but because the arrangement is nonbinding and “lacks an enforcement mechanism,” it has been ineffectual in constraining surveillance abuses. The bottom line is that certain countries have shown such an egregious pattern of harm that there is little justification for permitting future sales. In those situations, the United States, joined by other democratic countries—especially Israel—should enact permanent restrictions of surveillance products.

Short of formal export controls, there are other creative ways to mitigate spyware harms. The UN Guiding Principles on Business and Human Rights, for example, is a useful multistakeholder template for corporate accountability requiring human rights due diligence, regular reviews, and remediation measures (although like the Wassenaar Arrangement, corporate adherence is voluntary). Another option, as Kaye and Schaake mention, would be for private surveillance companies to agree to a binding code of conduct, similar to the framework adopted by the private security contractors (a series of high-profile scandals compelled security companies to voluntarily put in place a code of conduct lest they face serious restrictions by fed-up governments).

Making Tough Calls

Democracies should use the growing public outrage against surveillance spyware as an opportunity to build a global norm against the technology’s use. Biden’s upcoming Summit for Democracy represents an excellent opportunity to convince participating countries, including the United States, to commit to not deploying or exporting spyware except under narrow, exceptional, and proportional circumstances. This would mean that anticipated participants in the summit—such as Indonesia, Mexico, South Africa, and Spain—will have to make tough calls about whether they are willing to reform their practices.

At its root, the NSO Group exposé presents democracies with a basic choice: Should they continue tolerating abusive surveillance practices that put innumerable lives at risk? Or should they crack down on powerful tools that are incompatible with fundamental democratic values and principles?

Steve Feldstein
Senior Fellow, Democracy, Conflict, and Governance Program
Steve Feldstein
Political ReformTechnology

Carnegie does not take institutional positions on public policy issues; the views represented herein are those of the author(s) and do not necessarily reflect the views of Carnegie, its staff, or its trustees.

More Work from Carnegie Endowment for International Peace

  • Commentary
    The PSLV Setback: Restoring India’s Workhorse

    On January 12, 2026, India's "workhorse," the Polar Satellite Launch Vehicle, experienced a consecutive mission failure for the first time in its history. This commentary explores the implications of this incident on India’s space sector and how India can effectively address issues stemming from the incident.

      Tejas Bharadwaj

  • Commentary
    Carnegie Politika
    How Yulia Tymoshenko Returned to the Center of Ukrainian Politics Yet Again

    The story of a has-been politician apparently caught red-handed is intersecting with the larger forces at work in the Ukrainian parliament.

      Konstantin Skorkin

  • Commentary
    Carnegie Politika
    Russia’s Cyberfraud Epidemic Is Now a Political Issue

    For years, the Russian government has promoted “sovereign” digital services as an alternative to Western ones and introduced more and more online restrictions “for security purposes.” In practice, these homegrown solutions leave people vulnerable to data leaks and fraud.

      Maria Kolomychenko

  • Aerial View of Tower Bridge and the City of London at Sunrise
    Commentary
    Soft Power: A Strategy for UK Success? Written Evidence for the UK Parliament

    Soft power represents a critical dimension of international influence that complements traditional hard power capabilities; both are essential to national competitiveness. 

      Kayla Blomquist, Scott Singer, Sam Hogg

  • Commentary
    AI Adoption Journey for Population Scale

    Connecting real-world AI use cases across sectors such as health, education, agriculture, and livelihoods can help policymakers, innovators, and institutions align around a shared goal. This article looks at a framework ensuring that AI works for everyone.

      Shalini Kapoor, Tanvi Lall

Get more news and analysis from
Carnegie Endowment for International Peace
Carnegie global logo, stacked
1779 Massachusetts Avenue NWWashington, DC, 20036-2103Phone: 202 483 7600Fax: 202 483 1840
  • Research
  • Emissary
  • About
  • Experts
  • Donate
  • Programs
  • Events
  • Blogs
  • Podcasts
  • Contact
  • Annual Reports
  • Careers
  • Privacy
  • For Media
  • Government Resources
Get more news and analysis from
Carnegie Endowment for International Peace
© 2026 Carnegie Endowment for International Peace. All rights reserved.