Steve Feldstein, Dara Massicot
{
"authors": [
"Steve Feldstein"
],
"type": "commentary",
"centerAffiliationAll": "dc",
"centers": [
"Carnegie Endowment for International Peace"
],
"collections": [
"Tech and Democracy"
],
"englishNewsletterAll": "democracy",
"nonEnglishNewsletterAll": "",
"primaryCenter": "Carnegie Endowment for International Peace",
"programAffiliation": "DCG",
"programs": [
"Democracy, Conflict, and Governance"
],
"projects": [
"Digital Democracy Network"
],
"regions": [],
"topics": [
"Political Reform",
"Technology"
]
}Source: Getty
Governments Are Using Spyware on Citizens. Can They Be Stopped?
An Israeli company has sold military-grade surveillance spyware to governments that are using it to spy on private citizens. What can the United States do about the explosion of such snooping?
The Washington Post has started running an investigative series, called the Pegasus Project, that describes the expanded use of digital surveillance by governments worldwide. The reports expose how powerful software provided by the Israeli firm NSO Group has been used by states to hack into citizens’ smartphones, track their communications, and acquire incriminating information, sometimes as a prelude to assassination.
This is not a new story—for those of us who follow these issues closely, the proliferation of spyware has been an ongoing problem for years. But the Pegasus Project helps us better understand just how prevalent these practices are. Approximately 50,000 phone numbers appear on a surveillance hacking list containing business executives, human rights activists, journalists, politicians, and government officials. These individuals come from at least fifty countries.
While NSO Group insists that its products are primarily used by law enforcement for legitimate crime-fighting purposes, the information revealed by the newspaper’s investigation shows that NSO Group’s technology frequently targets individuals who have little to do with crime or terrorism. It has become clear that the human rights costs of NSO Group’s spyware far outweigh national security considerations.
Three Lessons for Policymakers
What can we make of these developments and what steps should policymakers take in response?
First, the proliferation of spyware is a widespread problem that democracies have manifestly failed to take seriously. The repercussions from supplying powerful surveillance tools to authoritarian governments are high—citizen security has been compromised, activists have been jailed, and journalists have been killed because of this spyware. Yet, Israel and other democratic countries, including the United States, have not only turned a blind eye to spyware use but have also tacitly supported these sales by approving export licenses. When it comes to the private surveillance industry, NSO Group’s transactions represent the tip of the iceberg. As I’ve written in my book, The Rise of Digital Repression, and documented in a publicly available global spyware database, at least sixty-five governments worldwide, from Chile to Vietnam, have acquired commercial spyware surveillance tools (for a few examples, see table 1). Relevant companies, such as Cellebrite, FinFisher, Blue Coat, Hacking Team, CyberPoint, L3 Technologies, Verint, and NSO Group, are headquartered in the most democratic countries in the world, including the United States, Italy, France, Germany, and Israel.
| Country | Regime Type | Commercial Spyware Vendor(s) | Description |
| Hungary | EA | Hacking Team, Black Cube, NSO Group/Pegasus | Black Cube involvement in a campaign to discredit nongovernmental organizations ahead of Hungary’s April election; more than 300 phone numbers for journalists, lawyers, business executives, and activists found on the Pegasus spying list |
| India | ED | NSO Group/Pegasus | Spyware targeting hundreds of journalists, activists, opposition politicians, government officials, and business executives |
| Iran | EA | Blue Coat | Numerous high-profile incidents of surveillance and targeted malware attacks |
| Mexico | ED | Hacking Team, NSO Group/Pegasus, FinFisher, NSO Group/Circles | Malware to track civil society, opposition, groups, and journalists |
| Morocco | CA | Hacking Team, NSO Group/Pegasus, FinFisher, Decision Group, NSO Group/Circles | Abusive use of spyware to target civil society |
| Rwanda | EA | NSO Group/Pegasus | Security officials authorized to tap online communications; Pegasus software targeting Rwandan dissidents at the behest of the government |
| Saudi Arabia | CA | Hacking Team, NSO Group/Pegasus, FinFisher | Extensive documented abuse of spyware to target political opponents and civil society |
| Spain | LD | NSO Group | Catalan politicians targeted by government |
| Thailand | CA | Hacking Team, Blue Coat, NSO Group/Circles | Targeted surveillance against civil society and regime opponents |
| Turkey | EA | Hacking Team, FinFisher, NSO Group | Extensive spyware links; most forms of telecommunication tapped and intercepted |
| Source: Steven Feldstein, “Commercial Spyware Global Inventory,” version 2, Mendeley Data, December 22, 2020, DOI: 10.17632/csvhpkt8tm.2, https://data.mendeley.com/datasets/csvhpkt8tm/2. Note: The regime types listed here refer to close autocracy (CA), electoral autocracy (EA), electoral democracy (ED), and liberal democracy (LD). | |||
Second, the Pegasus Project illustrates the high cost of doing business with authoritarian leaders. By turning a blind eye to the effects of spyware produced in democratic nations and sold to autocrats, the United States and its allies have undermined the cause of human rights worldwide. Some experts argue that under U.S. President Joe Biden, the United States has erred in pushing a foreign policy doctrine that “unnecessarily divides the world into good guys and bad guys” and that Biden should refrain from drawing a “bright line between dictators and democrats.” But the Pegasus Project tells us that new technology is amplifying the costs of doing business with autocrats. While the United States must be realistic about cooperating with authoritarian regimes on certain issues, this does not mean that U.S. decisionmakers should refrain from emphasizing human rights issues in these relationships. If we have learned one thing from the stumbles of former president Donald Trump’s administration, it is that when the United States dispenses with supporting democratic values, authoritarians take it as a signal that they can act with greater impunity. The result is emboldened bad behavior and diminished U.S. credibility and influence. The NSO Group spyware story reinforces just how nasty the world can be—particularly the degree to which autocrats will adopt unsavory measures to consolidate their power.
Third, the Pegasus Project illustrates a foreign policy misconception: that China is largely responsible for exporting authoritarian technology to bad actors. While China bears substantial responsibility for modeling to other states how digital technology can be used to control their citizens, and while Chinese companies have supplied a considerable share of exports to abusive regimes, Chinese firms are far from the only ones providing repressive tools to autocrats. They face stiff competition from companies based in democracies. Recent examples include the Canadian company Sandvine, which provided censorship technology to Belarus and Egypt; the French firm Nexa Technologies, which sold internet surveillance equipment to Libya and Egypt; and the U.S.-based company Oracle, which provided surveillance products in China. Western companies have a long track record of selling powerful tools to bad governments.
What Can Be Done?
As David Kaye and Marietje Schaake smartly suggest, a first step to stem the tide of spyware technology would be for democracies to implement an immediate moratorium on the sale or transfer of private surveillance equipment until accountable rules are drawn up and agreed upon. Given the scale of harms, there appears to be little justification to continue permitting such sales without undertaking a wholesale review and establishing basic human rights safeguards.
Coming out of such a review, the United States should consider adopting a binding and enforceable export controls regime to stop the spread of dangerous surveillance tools to bad actors. The Wassenaar Arrangement, a group of forty-two advanced economies that coordinates export restrictions for conventional arms and dual-use technology, could be one place to bolster limitations. In 2013, the group added surveillance software to its list of technologies necessitating further controls—but because the arrangement is nonbinding and “lacks an enforcement mechanism,” it has been ineffectual in constraining surveillance abuses. The bottom line is that certain countries have shown such an egregious pattern of harm that there is little justification for permitting future sales. In those situations, the United States, joined by other democratic countries—especially Israel—should enact permanent restrictions of surveillance products.
Short of formal export controls, there are other creative ways to mitigate spyware harms. The UN Guiding Principles on Business and Human Rights, for example, is a useful multistakeholder template for corporate accountability requiring human rights due diligence, regular reviews, and remediation measures (although like the Wassenaar Arrangement, corporate adherence is voluntary). Another option, as Kaye and Schaake mention, would be for private surveillance companies to agree to a binding code of conduct, similar to the framework adopted by the private security contractors (a series of high-profile scandals compelled security companies to voluntarily put in place a code of conduct lest they face serious restrictions by fed-up governments).
Making Tough Calls
Democracies should use the growing public outrage against surveillance spyware as an opportunity to build a global norm against the technology’s use. Biden’s upcoming Summit for Democracy represents an excellent opportunity to convince participating countries, including the United States, to commit to not deploying or exporting spyware except under narrow, exceptional, and proportional circumstances. This would mean that anticipated participants in the summit—such as Indonesia, Mexico, South Africa, and Spain—will have to make tough calls about whether they are willing to reform their practices.
At its root, the NSO Group exposé presents democracies with a basic choice: Should they continue tolerating abusive surveillance practices that put innumerable lives at risk? Or should they crack down on powerful tools that are incompatible with fundamental democratic values and principles?
About the Author
Senior Fellow, Democracy, Conflict, and Governance Program
Steve Feldstein is a senior fellow at the Carnegie Endowment for International Peace in the Democracy, Conflict, and Governance Program. His research focuses on technology, national security, the global context for democracy, and U.S. foreign policy.
- What We Know About Drone Use in the Iran WarQ&A
- Are All Wars Now Drone Wars?Q&A
Jon Bateman, Steve Feldstein
Recent Work
Carnegie India does not take institutional positions on public policy issues; the views represented herein are those of the author(s) and do not necessarily reflect the views of Carnegie, its staff, or its trustees.
More Work from Carnegie India
- India Signs the Pax Silica—A Counter to Pax Sinica?Commentary
On the last day of the India AI Impact Summit, India signed Pax Silica, a U.S.-led declaration seemingly focused on semiconductors. While India’s accession to the same was not entirely unforeseen, becoming a signatory nation this quickly was not on the cards either.
Konark Bhandari
- The PSLV Setback: Restoring India’s WorkhorseCommentary
On January 12, 2026, India's "workhorse," the Polar Satellite Launch Vehicle, experienced a consecutive mission failure for the first time in its history. This commentary explores the implications of this incident on India’s space sector and how India can effectively address issues stemming from the incident.
Tejas Bharadwaj
- AI Adoption Journey for Population ScaleCommentary
Connecting real-world AI use cases across sectors such as health, education, agriculture, and livelihoods can help policymakers, innovators, and institutions align around a shared goal. This article looks at a framework ensuring that AI works for everyone.
Shalini Kapoor, Tanvi Lall
- The State of Digital Transformation in Pacific Island CountriesArticle
Pacific Island Countries are at a pivotal moment in their digital journeys. Across the region, there is growing recognition of digital transformation as a key driver of economic growth, resilience, and global connectivity.
Shruti Mittal, Adarsh Ranjan
- Revisiting the Usage of Refurbished Equipment in India’s Semiconductor EcosystemArticle
This article looks at the progress of the Semiconductor Laboratory fab modernization plan based on publicly available documents, and potential learnings for future upgrades to government-owned fabs and India’s larger semiconductor ecosystem, especially regarding the use of refurbished equipment.
Shruti Mittal, Konark Bhandari