Pegasus in India: All You Want to Know India News – Times of India

New Delhi: forbidden stories, a website and Amnesty International had access to the leak of 50,000 phone numbers NSO Clients selected for monitoring. NSO makes Pegasus software. You want to know about Pegasus controversy with reference to India.
> Was the investigation targeted against India?
A. The investigation was conducted by 17 media agencies around the world and covered 45 countries.
Q. What has been the response of the Government of India?
a. The report’s publisher says it cannot say whether the numbers in the published list were under surveillance.
The company whose technology was allegedly used has vehemently denied these claims. And our country has time-tested procedures well-established to ensure that unauthorized surveillance does not take place, said IT Minister Ashwini Vaishnav. Parliament.
Q. What did the Indian government say on surveillance?
a. In India, there is a well-established procedure through which the lawful interception of electronic communications for the purpose of national security, in particular on the occurrence of any public emergency or in the interest of public safety, is carried out by agencies at the Center and in the States. . Requests for these lawful interception of electronic communications are made in accordance with the relevant regulations under the provisions of section 5(2) and section 69 of the Indian Telegraph Act, 1885. information technology act, 2000.
> How many journalists were under surveillance?
A. 180 including the largest media platforms worldwide, 49 of which are Indian.
Q. In which countries have been found using Pegasus against journalists, activists and opposition leaders?
a. The countries named in the report are: Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, the United Arab Emirates (UAE) and India.
Why . Who were all the potential targets in India?
A. 49 Indian journalists, 3 opposition leaders, 2 ministers, a sitting SC judge were targeted. Traders were also targeted.
> How sure is the espionage?
a. Amnesty International’s Security Lab, in partnership with Forbidden Stories, conducted forensic analysis on the phones of more than a dozen of these journalists and uncovered successful infections on 67 phones in total.
He was later reviewed by a Canadian tech company specializing in Pegasus. The infection has been confirmed in both.
NSO, which owns the technology, has said: ‘NSO Group believes that the claims that have been provided to you are based on a misleading interpretation of data leaked from basic information, such as HLR lookup services, that may have anything to do with the list of targets for customers of Pegasus or any other NSO products -Do not give.
Such services are openly available to anyone, anywhere, and anytime, and are commonly used by government agencies as well as private companies around the world. It is also beyond dispute that the data has nothing to do with surveillance or NSO, so there cannot be any factual basis to suggest that the use of data equates to surveillance in any way.’
Q. Is it possible to spy and what are the procedures?
a. Each case of interception or surveillance is approved by the competent authority. These powers are also available to the Competent Authority in the State Governments as per the IT (Process and Security for Interception, Monitoring and Decryption of Information) Rules, 2009.
There is an established oversight mechanism in the form of a review committee headed by central cabinet Secretary. In the case of State Governments, such matters are reviewed by a committee headed by the Chief Secretary concerned. The law also provides for an adjudication process for those adversely affected by any incident.
The process therefore ensures that any information intercepted or monitored is done in accordance with due process of law. The Government of India said that the infrastructure and institutions have stood the test of time.
Q. Has the Indian government accepted that espionage was taking place?
a. The Government of India said that it clearly emerges that there is no substance behind this sensationalism. The report itself clarified that the presence of a number does not amount to snooping. It quoted the report as saying, “The presence of a phone number in the data does not suggest whether a device was infected with Pegasus or was subject to hacking attempts.”
Without subjecting a call to this technical analysis, it is not possible to tell conclusively whether this attack was witnessed or successfully compromised.


Leave a Reply