Thailand’s government is accused of using spyware to surveil protesters
Researchers at University of Toronto’s Citizen Lab published
a report that accused the government of Thailand of targeting activists and
dissidents with smartphone spyware Pegasus, developed by Israeli firm NSO.
According to the report,
the Thai government is suspected of using Pegasus to infect activists’
smartphones between 2020 and 2021. The use of the spyware appeared to have
stopped in November 2021 when Apple started sending notifications to users that
their phone might have been infected.
Successful infection of a smartphone with Pegasus gives the
attacker full access to the phone including the microphone, camera, location,
calls, and photos. In simpler terms, the spyware turns the phone into a
listening device.
Citizen Lab’s report, which was peer-reviewed by Amnesty
International’s security lab, disputes the Thai government’s claim that reports
of it using spyware to target activists were “untrue.” The research concluded
that “the attackers targeted selected individuals with Pegasus in order to
gather particular information rather than using it for mass surveillance
against dissidents in general.”
Those targeted by the spyware, according to the report,
include members of civil society organization iLaw, which worked with Citizen
Lab. The organization said that the attackers were probably seeking
“behind-the-scenes information” about its activities, like those running their
arrested leaders’ social media accounts.
“We have known for long that the Thai state is inclined to
conduct illegitimate surveillance operations on its own citizen, but [this
investigation] has shown how desperate the Thai state really is when it comes
to controlling the rise of youths who have a different ideal image of the
country,” said Yingcheep Atchanont, iLaw’s program manager.
The Citizen Lab report also said that at least four members
of youth movement United Front of Thammasat and Demonstration were arrested,
including one member who has been charged with 10 lèse-majesté offenses (it is
illegal to insult Thailand’s royal family).
The evidence collected by Citizen Lab was not sufficient to
point to a specific NSO user. However, there were “numerous elements” that
provided circumstantial evidence that at least one Thai government official was
behind the spyware infections. For instance, evidence suggested that the attacker
had a “sophisticated understanding” of little known facts about activism in
Thailand, considering some of those targeted provided financial backing to
activists. Additionally, the attacks coincided with political events in the
country.
“There is longstanding evidence showing Pegasus presence in
Thailand, indicating that the government would likely have had access to
Pegasus during the period in question,” the report said.
Senior researcher at Citizen Lab John Scott-Railton said the
NSO promotes authoritarianism by selling Pegasus to repressive regimes.
“Enough is enough, NSO must be held accountable. Government
regulators have the tools, it’s time for them to hit the brakes on this
out-of-control company,” Scott-Railton said.
A spokesperson for the Israeli firm said: “Politically
motivated organizations continue to make unverifiable claims against NSO hoping
they will result in an outright ban on all cyber intelligence technologies,
despite their well-documented successes saving lives.”
Comments
Post a Comment