-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathIR-T9.annotated_task_level_noun_phrases.json
1 lines (1 loc) · 167 KB
/
IR-T9.annotated_task_level_noun_phrases.json
1
{"reason":{"judgment":"","sentences":"...It is unclear whether Pegasus operators are required to conduct HRL lookup inquiries via its interface to use its software; an NSO source stressed its clients may have different reasons \u2013 unrelated to Pegasus \u2013 for conducting HLR lookups via an NSO system....\n...NSO Group has good reason to believe that claims that you have been provided with, are based on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers\u2019 targets of Pegasus or any other NSO products....\n...It is important to note that government agencies have a well-established protocol for interception, which includes sanction and supervision from highly ranked officials in central and state governments, for clear stated reasons only in national interest....\n...The lawyers said NSO had reason to believe the list accessed by the consortium \u201Cis not a list of numbers targeted by governments using Pegasus, but instead, may be part of a larger list of numbers that might have been used by NSO Group customers for other purposes\u201D....\n...Amnesty International, which said last year that one of its staffers was targeted by NSO spyware, is demanding Israel suspend NSO's export license for exactly that reason...."},"The consortium":{"judgment":"P","sentences":"...The consortium\u2019s \u201CPegasus Project\u201D reporting bolsters accusations that not just autocratic regimes but democratic governments, including India and Mexico, have used NSO Group\u2019s Pegasus spyware for political ends....\n...The consortium understands NSO clients have the capability through an interface on the Pegasus system to conduct HLR lookup inquiries....\n...The consortium\u2019s findings build on extensive work by cybersecurity researchers, primarily from the University of Toronto-based watchdog Citizen Lab....\n...The consortium believes the data indicates the potential targets NSO\u2019s government clients identified in advance of possible surveillance...."},"mobile phones":{"judgment":"","sentences":"...However, forensic examinations of a small sample of mobile phones with numbers on the list found tight correlations between the time and date of a number in the data and the start of Pegasus activity \u2013 in some cases as little as a few seconds....\n...Researchers have found several examples of NSO Group tools using so-called zero click exploits that infect targeted mobile phones without any user interaction...."},"any correlation":{"judgment":"","sentences":"...After further questions, the lawyers said the consortium was basing its findings on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies ....\n...After further questions, the lawyers said the consortium was basing its findings \u201Con misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies\u201D...."},"Hatice Cengiz":{"judgment":"P","sentences":"...A team of Saudi agents killed Khashoggi inside the Saudi consulate in Istanbul during his visit there to pick up documents he needed to get married to his fiancee, Hatice Cengiz, who later became an outspoken advocate for accountability over his murder....\n...Amnesty also reported that its forensic researchers had determined that NSO Group\u2019s flagship Pegasus spyware was successfully installed on the phone of Washington Post journalist Jamal Khashoggi\u2019s fiancee, Hatice Cengiz, just four days after he was killed in the Saudi Consulate in Istanbul in 2018....\n...Amnesty also reported that its forensic researchers had determined that NSO Group\u2019s flagship Pegasus spyware was successfully installed on the phone of Washington Post journalist Jamal Khashoggi\u2019s fiancee, Hatice Cengiz, just four days after he was killed in the Saudi Consulate in Istanbul in 2018...\n...Jamal Khashoggi\u2019s fiancee, Hatice Cengiz...."},"Kazakhstan":{"judgment":"E","sentences":"...By closely examining the pattern of targeting by individual clients in the leaked data, media partners were able to identify 10 governments believed to be responsible for selecting the targets: Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India, and the United Arab Emirates....\n...Also on the lists were phones in countries including France, Hungary, India, Azerbaijan, Kazakhstan and Pakistan....\n...The governments of the United Arab Emirates, Dubai, Saudi Arabia, Azerbaijan, Bahrain, Kazakhstan and Mexico did not respond to requests for comment...."},"Pegasus infection":{"judgment":"P","sentences":"...Amnesty shared backup copies of four iPhones with Citizen Lab, a research group at the University of Toronto that specialises in studying Pegasus, which confirmed that they showed signs of Pegasus infection....\n...AP\u2019s director of media relations, Lauren Easton, said the company is \u201Cdeeply troubled to learn that two AP journalists, along with journalists from many news organizations\u201D are on the list of the 1,000 potential targets for Pegasus infection....\n...The Guardian, another consortium member, reported that Amnesty had found traces of Pegasus infections on the cellphones of 15 journalists who let their phones be examined after discovering their number was in the leaked data....\n...Amnesty shared \u201Cbackup copies\u201D of four iPhones with Citizen Lab, a research group at the University of Toronto that specialises in studying Pegasus, which confirmed that they showed signs of Pegasus infection...."},"advance":{"judgment":"","sentences":"...The consortium believes the data indicates the potential targets NSO\u2019s government clients identified in advance of possible surveillance...."},"Citizen Lab":{"judgment":"P","sentences":"...Amnesty shared backup copies of four iPhones with Citizen Lab, a research group at the University of Toronto that specialises in studying Pegasus, which confirmed that they showed signs of Pegasus infection....\n...Citizen Lab says NSO's technologies have been used by some 45 countries, including Mexico, Bahrain, Morocco, Saudi Arabia and the U.A.E. The Financial Times, citing an unnamed NSO investor, reports that half of the group's revenues come from the Middle East, but that it has contracts with 21 EU countries, as well....\n...John Scott-Railton, a senior researcher at Citizen Lab, says it's not known publicly if Canada has ever been a customer....\n...Citizen Lab also conducted a peer review of Amnesty\u2019s forensic methods, and found them to be sound....\n...Citizen Lab has also found evidence of all 10 being clients of NSO...."},"surveillance software":{"judgment":"E","sentences":"...The data leak is a list of more than 50,000 phone numbers that, since 2016, are believed to have been selected as those of people of interest by government clients of NSO Group, which sells surveillance software...."},"a Paris-based nonprofit journalism organisation":{"judgment":"P","sentences":"...Forbidden Stories, a Paris-based nonprofit journalism organisation, and Amnesty International initially had access to the list and shared access with 16 media organisations including the Guardian....\n...Forbidden Stories, a Paris-based nonprofit journalism organisation, and Amnesty International had access to a leak of more than 50,000 phone numbers selected as targets by clients of NSO since 2016...."},"its lawyers":{"judgment":"","sentences":"...Through its lawyers, NSO said the consortium had made \u201Cincorrect assumptions\u201D about which clients use the company\u2019s technology....\n...Through its lawyers, NSO said the consortium had made incorrect assumptions about which clients use the company\u2019s technology...."},"its findings":{"judgment":"","sentences":"...After further questions, the lawyers said the consortium was basing its findings on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies ....\n...After further questions, the lawyers said the consortium was basing its findings \u201Con misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies\u201D...."},"hackers":{"judgment":"P","sentences":"...Without naming the company, WhatsApp described the hackers as \"a private company that has been known to work with governments to deliver spyware.\"...\n...\"This type of exploit wouldn't be available to the criminal-based type of hackers,\" Mitnick said, \"because they simply can't afford to buy these cyberweapons.\"...\n...In the case of journalists, that lets hackers spy on reporters\u2019 communications with sources...."},"the wake":{"judgment":"B","sentences":"...In the wake of the brutal murder of the journalist Jamal Khashoggi, the NSO Group emphatically denied that its government clients had used its hacking malware to target the journalist or his family....\n...In the wake of the brutal murder of the journalist Jamal Khashoggi, the NSO Group emphatically denied that its government clients had used its hacking malware to target the journalist or his family ...\n...Khashoggi associates who were targeted for possible surveillance after his death, according to the leak, include Abdullah Khashoggi, the journalist\u2019s son; Azzam Tamimi, a Palestinian-British activist and friend, and Madawi Al-Rasheed, a London-based scholar who co-created an opposition party of expatriate Saudis in the wake of the murder...."},"NSO Group customers":{"judgment":"","sentences":"...The lawyers said NSO had reason to believe the list accessed by the consortium \u201Cis not a list of numbers targeted by governments using Pegasus, but instead, may be part of a larger list of numbers that might have been used by NSO Group customers for other purposes\u201D....\n...The lawyers said NSO had reason to believe the list accessed by the consortium is not a list of numbers targeted by governments using Pegasus, but instead, may be part of a larger list of numbers that might have been used by NSO Group customers for other purposes ...."},"assassins":{"judgment":"","sentences":"...It was six months after Khashoggi, a Washington Post columnist, was killed in Turkey by assassins dispatched by Saudi Arabia, a client of NSO....\n...Saudi Arabia dispatched assassins ....\n...It was six months after Khashoggi, a Washington Post columnist, was killed in Turkey by assassins dispatched by Saudi Arabia, a client of NSO...\n...assassins killed the journalist ...."},"the Middle East":{"judgment":"","sentences":"...In the Middle East, the victims have mostly been journalists and dissidents, allegedly targeted by the Saudi and United Arab Emirates governments....\n...Citizen Lab says NSO's technologies have been used by some 45 countries, including Mexico, Bahrain, Morocco, Saudi Arabia and the U.A.E. The Financial Times, citing an unnamed NSO investor, reports that half of the group's revenues come from the Middle East, but that it has contracts with 21 EU countries, as well....\n...NSO Group\u2019s spyware has been implicated in targeted surveillance chiefly in the Middle East and Mexico....\n...The most numbers on the list, 15,000, were for Mexican phones, with a large share in the Middle East...."},"you":{"judgment":"B","sentences":"...Was there any intelligence service to help you formulate the questions?...\n...NSO Group has good reason to believe that claims that you have been provided with, are based on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers\u2019 targets of Pegasus or any other NSO products....\n...\u201CStop what you\u2019re doing and read this,\u201D Snowden tweeted Sunday, referencing the consortium\u2019s findings....\n...We can confirm that our technology was not used to listen, monitor, track, or collect information regarding him or his family members mentioned in your inquiry.\u201D...\n...We remind you that the unfounded allegations already published by Amnesty International and relayed by Forbidden Stories have already been the subject of an official response by the Moroccan authorities, who categorically denied such allegations...."},"Pegasus activity":{"judgment":"P","sentences":"...However, forensic examinations of a small sample of mobile phones with numbers on the list found tight correlations between the time and date of a number in the data and the start of Pegasus activity \u2013 in some cases as little as a few seconds...."},"HLR lookup data":{"judgment":"","sentences":"...What is HLR lookup data?..."},"the data":{"judgment":"","sentences":"...The presence in the data of a very small number of landlines and US numbers, which NSO says are technically impossible to access with its tools, reveals some targets were selected by NSO clients even though they could not be infected with Pegasus....\n...The company has always said it does not have access to the data of its customers\u2019 targets....\n...Access to the data was then shared with the Guardian and 16 other news organisations, including the Washington Post, Le Monde, Die Zeit and Süddeutsche Zeitung....\n...Other Khashoggi-connected names linked to in the data were Yahya Assiri, a UK-based Saudi activist who documents human rights violations in Saudi Arabia and was in close contact with Khashoggi before his death, and Yasin Aktay, a friend of Khashoggi and a top aide to the Turkish president, Recep Tayyip Erdoğan....\n...While the data is organised into clusters, indicative of individual NSO clients, it does not say which NSO client was responsible for selecting any given number...."},"leaked data":{"judgment":"P","sentences":"...NSO Group has good reason to believe that claims that you have been provided with, are based on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers\u2019 targets of Pegasus or any other NSO products....\n...After further questions, the lawyers said the consortium was basing its findings on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies ....\n...By closely examining the pattern of targeting by individual clients in the leaked data, media partners were able to identify 10 governments believed to be responsible for selecting the targets: Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India, and the United Arab Emirates....\n...After further questions, the lawyers said the consortium was basing its findings \u201Con misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies\u201D....\n...The Guardian, another consortium member, reported that Amnesty had found traces of Pegasus infections on the cellphones of 15 journalists who let their phones be examined after discovering their number was in the leaked data...."},"the Saudi Consulate":{"judgment":"","sentences":"...Amnesty also reported that its forensic researchers had determined that NSO Group\u2019s flagship Pegasus spyware was successfully installed on the phone of Washington Post journalist Jamal Khashoggi\u2019s fiancee, Hatice Cengiz, just four days after he was killed in the Saudi Consulate in Istanbul in 2018....\n...Amnesty also reported that its forensic researchers had determined that NSO Group\u2019s flagship Pegasus spyware was successfully installed on the phone of Washington Post journalist Jamal Khashoggi\u2019s fiancee, Hatice Cengiz, just four days after he was killed in the Saudi Consulate in Istanbul in 2018..."},"the journalist":{"judgment":"","sentences":"...Even if Forbidden Stories were correct that an NSO Group client in Mexico targeted the journalist\u2019s phone number in February 2017, that does not mean that the NSO Group client, or data collected by NSO Group software, were in any way connected to the journalist\u2019s murder the following month....\n...its government clients target the journalist his family ....\n...In the wake of the brutal murder of the journalist Jamal Khashoggi, the NSO Group emphatically denied that its government clients had used its hacking malware to target the journalist or his family....\n...In the wake of the brutal murder of the journalist Jamal Khashoggi, the NSO Group emphatically denied that its government clients had used its hacking malware to target the journalist or his family ...\n...In an interview, Aktay said he had already been alerted by Turkish intelligence officials that his phone had been hacked after Khashoggi\u2019s death because the Saudis were still trying to create a \u201Cmap\u201D of the journalist\u2019s connections...."},"countries":{"judgment":"","sentences":"...It has said that it sells only to responsible countries after diligent vetting, and with Israeli government approval....\n...NSO claims to sell its tools to 60 clients in 40 countries, but refuses to identify them....\n...From a list of more than 50,000 cellphone numbers obtained by the Paris-based journalism non-profit Forbidden Stories and the human rights group Amnesty International and shared with 16 news organizations, journalists were able to identify more than 1,000 individuals in 50 countries who were allegedly selected by NSO clients for potential surveillance....\n...The Israeli company was sued the previous year in Israel and Cyprus, both countries from which it exports products....\n...Citizen Lab says NSO's technologies have been used by some 45 countries, including Mexico, Bahrain, Morocco, Saudi Arabia and the U.A.E. The Financial Times, citing an unnamed NSO investor, reports that half of the group's revenues come from the Middle East, but that it has contracts with 21 EU countries, as well...."},"the smartphone\u2019s microphones":{"judgment":"","sentences":"...Pegasus infiltrates phones to vacuum up personal and location data and surreptitiously control the smartphone\u2019s microphones and cameras....\n...Pegasus infiltrates phones to vacuum up personal and location data and surreptitiously controls the smartphone\u2019s microphones and cameras...."},"misuse":{"judgment":"","sentences":"...NSO has not commented on the claims but promised to investigate all \u201Ccredible allegations of misuse\u201D....\n...This includes shutting down of a customers\u2019 system, something NSO has proven its ability and willingness to do, due to confirmed misuse, has done multiple times in the past, and will not hesitate to do again if a situation warrants....\n...NSO Group will continue to investigate all credible claims of misuse and take appropriate action based on the results of these investigations....\n...\"We abhor any form of misuse of any form of surveillance technology by any government, agency or individual, and we particularly condemn without hesitation any such misuse directed at people who are vulnerable simply as a consequence of their commitment to report on, speak out for or defend human rights,\" said Stephen Peel, founding partner of Novalpina...."},"Bahrain":{"judgment":"","sentences":"...Citizen Lab says NSO's technologies have been used by some 45 countries, including Mexico, Bahrain, Morocco, Saudi Arabia and the U.A.E. The Financial Times, citing an unnamed NSO investor, reports that half of the group's revenues come from the Middle East, but that it has contracts with 21 EU countries, as well....\n...By closely examining the pattern of targeting by individual clients in the leaked data, media partners were able to identify 10 governments believed to be responsible for selecting the targets: Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India, and the United Arab Emirates....\n...The governments of the United Arab Emirates, Dubai, Saudi Arabia, Azerbaijan, Bahrain, Kazakhstan and Mexico did not respond to requests for comment...."},"the Israeli surveillance firm":{"judgment":"P","sentences":"...the chief executive of the Israeli surveillance firm told the US TV news programme 60 Minutes ....\n...We had nothing to do with this horrible murder, Shalev Hulio, the chief executive of the Israeli surveillance firm, told the US TV news programme 60 Minutes in March 2019...\n...the Israeli surveillance firm denied ....\n...the chief executive of the Israeli surveillance firm tell the US TV news programme 60 Minutes ....\n...We had nothing to do with this horrible murder,\u201D Shalev Hulio, the chief executive of the Israeli surveillance firm, told the US TV news programme 60 Minutes in March 2019...."},"the use":{"judgment":"","sentences":"...Facebook has sued NSO Group over the use of a somewhat similar exploit that allegedly intruded via its globally popular encrypted WhatsApp messaging app....\n...In the past, similar claims were made regarding the use of Pegasus on WhatsApp by Indian state....\n...Government of India\u2019s response to a right to information application about the use of Pegasus has been prominently reported by media and is in itself sufficient to counter any malicious claims about the alleged association between the government of India and Pegasus...."},"interpretation":{"judgment":"","sentences":"...NSO Group has good reason to believe that claims that you have been provided with, are based on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers\u2019 targets of Pegasus or any other NSO products....\n...After further questions, the lawyers said the consortium was basing its findings on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies ....\n...After further questions, the lawyers said the consortium was basing its findings \u201Con misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies\u201D...."},"your inquiry":{"judgment":"","sentences":"...We can confirm that our technology was not used to listen, monitor, track, or collect information regarding him or his family members mentioned in your inquiry.\u201D...\n...We can confirm that our technology was not used to listen, monitor, track, or collect information regarding him or his family members mentioned in your inquiry...."},"shared access":{"judgment":"","sentences":"...Forbidden Stories, a Paris-based nonprofit journalism organisation, and Amnesty International initially had access to the list and shared access with 16 media organisations including the Guardian...."},"NSO Group technologies":{"judgment":"","sentences":"...After further questions, the lawyers said the consortium was basing its findings on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies ....\n...After further questions, the lawyers said the consortium was basing its findings \u201Con misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies\u201D...."},"an NSO system":{"judgment":"","sentences":"...It is unclear whether Pegasus operators are required to conduct HRL lookup inquiries via its interface to use its software; an NSO source stressed its clients may have different reasons \u2013 unrelated to Pegasus \u2013 for conducting HLR lookups via an NSO system...."},"the University":{"judgment":"","sentences":"...Amnesty shared backup copies of four iPhones with Citizen Lab, a research group at the University of Toronto that specialises in studying Pegasus, which confirmed that they showed signs of Pegasus infection....\n...The consortium\u2019s findings build on extensive work by cybersecurity researchers, primarily from the University of Toronto-based watchdog Citizen Lab....\n...But the University of Toronto's Citizen Lab, through its research, has determined that its software basically can gain access to private or confidential information \u2014 an individual's smartphone, for example \u2014 and through it, see and hear all of its communications....\n...Amnesty shared \u201Cbackup copies\u201D of four iPhones with Citizen Lab, a research group at the University of Toronto that specialises in studying Pegasus, which confirmed that they showed signs of Pegasus infection...."},"its hacking malware":{"judgment":"E","sentences":"...In the wake of the brutal murder of the journalist Jamal Khashoggi, the NSO Group emphatically denied that its government clients had used its hacking malware to target the journalist or his family....\n...In the wake of the brutal murder of the journalist Jamal Khashoggi, the NSO Group emphatically denied that its government clients had used its hacking malware to target the journalist or his family ..."},"the consortium":{"judgment":"","sentences":"...\u201CStop what you\u2019re doing and read this,\u201D Snowden tweeted Sunday, referencing the consortium\u2019s findings....\n...Through its lawyers, NSO said the consortium had made \u201Cincorrect assumptions\u201D about which clients use the company\u2019s technology....\n...Through its lawyers, NSO said the consortium had made incorrect assumptions about which clients use the company\u2019s technology....\n...After further questions, the lawyers said the consortium was basing its findings on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies ....\n...After further questions, the lawyers said the consortium was basing its findings \u201Con misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies\u201D...."},"June":{"judgment":"","sentences":"...Further attempts to hack her phone followed in June 2019, although they did not appear to be successful....\n...The Moroccan authorities have, since 22 June 2020, been awaiting material evidence from Amnesty International, which has been incapable of proving any relationship whatsoever between Morocco and the aforementioned Israeli company...."},"organized crime operations":{"judgment":"P","sentences":"...Based in Israel, it says it develops technologies that governments and law enforcement agencies can use to track and intercept terror activity, break up organized crime operations, and even search for missing persons....\n...law enforcement agencies governments break up organized crime operations ....\n...NSO Group describes itself as a cybertechnologies company Based in Israel, it says it develops technologies that governments and law enforcement agencies can use to track and intercept terror activity, break up organized crime operations, and even search for missing persons..."},"access":{"judgment":"","sentences":"...The presence in the data of a very small number of landlines and US numbers, which NSO says are technically impossible to access with its tools, reveals some targets were selected by NSO clients even though they could not be infected with Pegasus....\n...NSO Group has good reason to believe that claims that you have been provided with, are based on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers\u2019 targets of Pegasus or any other NSO products....\n...NSO does not operate its technology, does not collect, nor possesses, nor has any access to any kind of data of its customers....\n...The company has always said it does not have access to the data of its customers\u2019 targets....\n...After further questions, the lawyers said the consortium was basing its findings on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies ...."},"Novalpina":{"judgment":"P","sentences":"...Novalpina Capital said in a statement early Wednesday that NSO's technology \"is designed in such a way that it can only be deployed by an intelligence or law enforcement agency to whom the technology is sold under licence....\n...Since 2019, the U.K. private equity firm Novalpina Capital has controlled a majority stake in NSO Group....\n...Novalpina took a majority of NSO shares, and NSO\u2019s Israeli founders hold a minority stake....\n...The company was taken over earlier this year by Novalpina Capital, a London-based private equity firm co-founded by Peel\u2019s husband, Stephen....\n...\"We abhor any form of misuse of any form of surveillance technology by any government, agency or individual, and we particularly condemn without hesitation any such misuse directed at people who are vulnerable simply as a consequence of their commitment to report on, speak out for or defend human rights,\" said Stephen Peel, founding partner of Novalpina...."},"the project":{"judgment":"","sentences":"...Amnesty\u2019s Security Lab, a technical partner on the project, did the forensic analyses...."},"a client":{"judgment":"","sentences":"...It was six months after Khashoggi, a Washington Post columnist, was killed in Turkey by assassins dispatched by Saudi Arabia, a client of NSO....\n...It was six months after Khashoggi, a Washington Post columnist, was killed in Turkey by assassins dispatched by Saudi Arabia, a client of NSO..."},"the lawyers":{"judgment":"","sentences":"...After further questions, the lawyers said the consortium was basing its findings on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies ....\n...After further questions, the lawyers said the consortium was basing its findings \u201Con misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies\u201D...."},"March":{"judgment":"","sentences":"...We had nothing to do with this horrible murder, Shalev Hulio, the chief executive of the Israeli surveillance firm, told the US TV news programme 60 Minutes in March 2019...\n...We had nothing to do with this horrible murder,\u201D Shalev Hulio, the chief executive of the Israeli surveillance firm, told the US TV news programme 60 Minutes in March 2019...."},"Three Android phones":{"judgment":"","sentences":"...Three Android phones showed signs of targeting, such as Pegasus-linked SMS messages...."},"journalists":{"judgment":"","sentences":"...The journalists work for organizations including The Associated Press, Reuters, CNN, The Wall Street Journal, Le Monde and The Financial Times....\n...Two Hungarian investigative journalists, Andras Szabo and Szabolcs Panyi,...\n...AP\u2019s director of media relations, Lauren Easton, said the company is \u201Cdeeply troubled to learn that two AP journalists, along with journalists from many news organizations\u201D are on the list of the 1,000 potential targets for Pegasus infection....\n...An investigation by a global media consortium based on leaked targeting data provides further evidence that military-grade malware from Israel-based NSO Group, the world\u2019s most infamous hacker-for-hire outfit, is being used to spy on journalists, human rights activists and political dissidents....\n...\u201CThe number of journalists identified as targets vividly illustrates how Pegasus is used as a tool to intimidate critical media...."},"the 50,000 number":{"judgment":"","sentences":"...It said the 50,000 number was exaggerated and the list could not be a list of numbers targeted by governments using Pegasus ....\n...It said the 50,000 number was \u201Cexaggerated\u201D and the list could not be a list of numbers \u201Ctargeted by governments using Pegasus\u201D...."},"the cellphones":{"judgment":"","sentences":"...Also this month, security researchers disclosed that Pegasus spyware was detected on the cellphones of six Palestinian human rights activists....\n...The Guardian, another consortium member, reported that Amnesty had found traces of Pegasus infections on the cellphones of 15 journalists who let their phones be examined after discovering their number was in the leaked data...."},"routing":{"judgment":"","sentences":"...Such registers keep records on the networks of phone users and their general locations, along with other identifying information that is used routinely in routing calls and texts...."},"iPhones":{"judgment":"","sentences":"...Amnesty shared backup copies of four iPhones with Citizen Lab, a research group at the University of Toronto that specialises in studying Pegasus, which confirmed that they showed signs of Pegasus infection....\n...However, unlike iPhones, phones that use Android do not log the kinds of information required for Amnesty\u2019s detective work....\n...Its flagship product is Pegasus, spying software \u2013 or spyware \u2013 that targets iPhones and Android devices....\n...Amnesty shared \u201Cbackup copies\u201D of four iPhones with Citizen Lab, a research group at the University of Toronto that specialises in studying Pegasus, which confirmed that they showed signs of Pegasus infection...."},"67 smartphones":{"judgment":"","sentences":"...Amnesty examined 67 smartphones where attacks were suspected...."},"the Pegasus project data":{"judgment":"","sentences":"...Quick Guide What is in the Pegasus project data?..."},"security researchers":{"judgment":"","sentences":"...Also this month, security researchers disclosed that Pegasus spyware was detected on the cellphones of six Palestinian human rights activists....\n...\"And what happens is security researchers find these flaws and they're able to develop what they call exploit code to take advantage of these flaws and do exactly what was done in this case.\"...\n...The consortium\u2019s findings build on extensive work by cybersecurity researchers, primarily from the University of Toronto-based watchdog Citizen Lab...."},"customers":{"judgment":"","sentences":"...NSO Group has good reason to believe that claims that you have been provided with, are based on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers\u2019 targets of Pegasus or any other NSO products....\n...NSO does not operate its technology, does not collect, nor possesses, nor has any access to any kind of data of its customers....\n...The company has always said it does not have access to the data of its customers\u2019 targets....\n...This includes shutting down of a customers\u2019 system, something NSO has proven its ability and willingness to do, due to confirmed misuse, has done multiple times in the past, and will not hesitate to do again if a situation warrants....\n...After further questions, the lawyers said the consortium was basing its findings on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies ...."},"individual NSO clients":{"judgment":"","sentences":"...While the data is organised into clusters, indicative of individual NSO clients, it does not say which NSO client was responsible for selecting any given number...."},"the US TV news programme":{"judgment":"","sentences":"...the chief executive of the Israeli surveillance firm told the US TV news programme 60 Minutes ....\n...We had nothing to do with this horrible murder, Shalev Hulio, the chief executive of the Israeli surveillance firm, told the US TV news programme 60 Minutes in March 2019...\n...the chief executive of the Israeli surveillance firm tell the US TV news programme 60 Minutes ....\n...We had nothing to do with this horrible murder,\u201D Shalev Hulio, the chief executive of the Israeli surveillance firm, told the US TV news programme 60 Minutes in March 2019...."},"several cases":{"judgment":"","sentences":"...For the remaining 30, the tests were inconclusive, in several cases because the handsets had been replaced...."},"tight correlations":{"judgment":"","sentences":"...However, forensic examinations of a small sample of mobile phones with numbers on the list found tight correlations between the time and date of a number in the data and the start of Pegasus activity \u2013 in some cases as little as a few seconds...."},"The data leak":{"judgment":"","sentences":"...The data leak is a list of more than 50,000 phone numbers that, since 2016, are believed to have been selected as those of people of interest by government clients of NSO Group, which sells surveillance software...."},"Pegasus":{"judgment":"","sentences":"...A forensic examination of Elatr\u2019s Android phone found that she was sent four text messages that contained malicious links connected to Pegasus....\n...Quick Guide What is in the Pegasus project data?...\n...The presence in the data of a very small number of landlines and US numbers, which NSO says are technically impossible to access with its tools, reveals some targets were selected by NSO clients even though they could not be infected with Pegasus....\n...It said the 50,000 number was exaggerated and the list could not be a list of numbers targeted by governments using Pegasus ....\n...Also this month, security researchers disclosed that Pegasus spyware was detected on the cellphones of six Palestinian human rights activists...."},"the leak":{"judgment":"","sentences":"...What does the leak indicate?...\n...By closely examining the pattern of targeting by individual clients in the leaked data, media partners were able to identify 10 governments believed to be responsible for selecting the targets: Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India, and the United Arab Emirates....\n...Access to the leak was shared with the Guardian and other media by Forbidden Stories, a nonprofit organisation, as part of a collaborative investigation called the Pegasus project....\n...Khashoggi associates who were targeted for possible surveillance after his death, according to the leak, include Abdullah Khashoggi, the journalist\u2019s son; Azzam Tamimi, a Palestinian-British activist and friend, and Madawi Al-Rasheed, a London-based scholar who co-created an opposition party of expatriate Saudis in the wake of the murder....\n...Its members, who include Le Monde and Sueddeutsche Zeitung of Germany, are promising a series of stories based on the leak...."},"potential surveillance":{"judgment":"","sentences":"...From a list of more than 50,000 cellphone numbers obtained by the Paris-based journalism non-profit Forbidden Stories and the human rights group Amnesty International and shared with 16 news organizations, journalists were able to identify more than 1,000 individuals in 50 countries who were allegedly selected by NSO clients for potential surveillance....\n...The investigation points to an apparent attempt by Saudi Arabia and its close ally the United Arab Emirates to leverage NSO\u2019s spy technology after Khashoggi\u2019s death to monitor his associates and the Turkish murder investigation, even going so far as to select the phone of Istanbul\u2019s chief prosecutor for potential surveillance...."},"Azerbaijan":{"judgment":"","sentences":"...By closely examining the pattern of targeting by individual clients in the leaked data, media partners were able to identify 10 governments believed to be responsible for selecting the targets: Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India, and the United Arab Emirates....\n...Also on the lists were phones in countries including France, Hungary, India, Azerbaijan, Kazakhstan and Pakistan....\n...The governments of the United Arab Emirates, Dubai, Saudi Arabia, Azerbaijan, Bahrain, Kazakhstan and Mexico did not respond to requests for comment...."},"a technical partner":{"judgment":"","sentences":"...Amnesty\u2019s Security Lab, a technical partner on the project, did the forensic analyses....\n...Examination of phones was done by Amnesty International\u2019s Security Lab, a technical partner on the Pegasus project...."},"Jamal Khashoggi":{"judgment":"P","sentences":"...In a statement, NSO said: \u201COur technology was not associated in any way with the heinous murder of Jamal Khashoggi....\n...In the wake of the brutal murder of the journalist Jamal Khashoggi, the NSO Group emphatically denied that its government clients had used its hacking malware to target the journalist or his family....\n...In the wake of the brutal murder of the journalist Jamal Khashoggi, the NSO Group emphatically denied that its government clients had used its hacking malware to target the journalist or his family ...\n...Lawsuits against NSO allege the technology was used to target dissidents and their associates, including a friend of the Washington Post journalist Jamal Khashoggi, who was murdered in the Saudi consulate in Istanbul last year....\n...Amnesty also reported that its forensic researchers had determined that NSO Group\u2019s flagship Pegasus spyware was successfully installed on the phone of Washington Post journalist Jamal Khashoggi\u2019s fiancee, Hatice Cengiz, just four days after he was killed in the Saudi Consulate in Istanbul in 2018...."},"texts":{"judgment":"","sentences":"...Such registers keep records on the networks of phone users and their general locations, along with other identifying information that is used routinely in routing calls and texts...."},"HLR Lookup services":{"judgment":"","sentences":"...NSO Group has good reason to believe that claims that you have been provided with, are based on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers\u2019 targets of Pegasus or any other NSO products....\n...After further questions, the lawyers said the consortium was basing its findings on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies ....\n...After further questions, the lawyers said the consortium was basing its findings \u201Con misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies\u201D...."},"accessible and overt basic information":{"judgment":"","sentences":"...NSO Group has good reason to believe that claims that you have been provided with, are based on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers\u2019 targets of Pegasus or any other NSO products....\n...After further questions, the lawyers said the consortium was basing its findings on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies ....\n...After further questions, the lawyers said the consortium was basing its findings \u201Con misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies\u201D...."},"information":{"judgment":"","sentences":"...NSO Group has good reason to believe that claims that you have been provided with, are based on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers\u2019 targets of Pegasus or any other NSO products....\n...The procedure therefore ensures that any interception, monitoring or decryption of any information through any computer resource is done as per due process of law....\n...We can confirm that our technology was not used to listen, monitor, track, or collect information regarding him or his family members mentioned in your inquiry.\u201D...\n...However, unlike iPhones, phones that use Android do not log the kinds of information required for Amnesty\u2019s detective work....\n...After further questions, the lawyers said the consortium was basing its findings on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies ...."},"a Washington Post columnist":{"judgment":"","sentences":"...It was six months after Khashoggi, a Washington Post columnist, was killed in Turkey by assassins dispatched by Saudi Arabia, a client of NSO....\n...It was six months after Khashoggi, a Washington Post columnist, was killed in Turkey by assassins dispatched by Saudi Arabia, a client of NSO..."},"Israel":{"judgment":"","sentences":"...NSO Group does not disclose its clients and says it sells its technology to Israeli-approved governments to help them target terrorists and break up pedophile rings and sex- and drug-trafficking rings....\n...And when the Ministry of Defence in Israel allows this to happen, it endangers millions of people around the world.\"...\n...NSO is the subject of multiple ongoing lawsuits and has been criticised by human rights groups, including Amnesty International, which has asked Israel\u2019s ministry of defence to revoke the company\u2019s export licences....\n...An investigation by a global media consortium based on leaked targeting data provides further evidence that military-grade malware from Israel-based NSO Group, the world\u2019s most infamous hacker-for-hire outfit, is being used to spy on journalists, human rights activists and political dissidents....\n...It has said that it sells only to responsible countries after diligent vetting, and with Israeli government approval...."},"your feedback":{"judgment":"B","sentences":"...Thank you for your feedback...."},"home location register":{"judgment":"","sentences":"...The term HLR, or home location register, refers to a database that is essential to operating mobile phone networks...."},"terror activity":{"judgment":"","sentences":"...Based in Israel, it says it develops technologies that governments and law enforcement agencies can use to track and intercept terror activity, break up organized crime operations, and even search for missing persons....\n...NSO Group describes itself as a cybertechnologies company Based in Israel, it says it develops technologies that governments and law enforcement agencies can use to track and intercept terror activity, break up organized crime operations, and even search for missing persons..."},"evidence":{"judgment":"","sentences":"...An investigation by a global media consortium based on leaked targeting data provides further evidence that military-grade malware from Israel-based NSO Group, the world\u2019s most infamous hacker-for-hire outfit, is being used to spy on journalists, human rights activists and political dissidents....\n...Analysis of Rasheed\u2019s phone found evidence of an attempted hack in April 2019, but there was no evidence the spyware was successfully installed....\n...While the investigation mostly points to Khashoggi\u2019s close associates being targeted in the months after the murder, it also identified evidence suggesting that an NSO client targeted the phone of his wife, Hanan Elatr, several months before his death, between November 2017 and April 2018....\n...Critics call those claims dishonest \u2014 and have provided evidence that NSO directly manages the high-tech spying....\n...Citizen Lab has also found evidence of all 10 being clients of NSO...."},"numbers":{"judgment":"","sentences":"...Which NSO clients were selecting numbers?...\n...The presence in the data of a very small number of landlines and US numbers, which NSO says are technically impossible to access with its tools, reveals some targets were selected by NSO clients even though they could not be infected with Pegasus....\n...It said the 50,000 number was exaggerated and the list could not be a list of numbers targeted by governments using Pegasus ....\n...It said the 50,000 number was \u201Cexaggerated\u201D and the list could not be a list of numbers \u201Ctargeted by governments using Pegasus\u201D....\n...From a list of more than 50,000 cellphone numbers obtained by the Paris-based journalism non-profit Forbidden Stories and the human rights group Amnesty International and shared with 16 news organizations, journalists were able to identify more than 1,000 individuals in 50 countries who were allegedly selected by NSO clients for potential surveillance...."},"Such registers":{"judgment":"","sentences":"...Such registers keep records on the networks of phone users and their general locations, along with other identifying information that is used routinely in routing calls and texts...."},"Novalpina Capital":{"judgment":"","sentences":"...Novalpina Capital said in a statement early Wednesday that NSO's technology \"is designed in such a way that it can only be deployed by an intelligence or law enforcement agency to whom the technology is sold under licence....\n...Since 2019, the U.K. private equity firm Novalpina Capital has controlled a majority stake in NSO Group....\n...The company was taken over earlier this year by Novalpina Capital, a London-based private equity firm co-founded by Peel\u2019s husband, Stephen....\n...The company is backed by Novalpina Capital, a private equity firm based in London...."},"individuals":{"judgment":"","sentences":"...From a list of more than 50,000 cellphone numbers obtained by the Paris-based journalism non-profit Forbidden Stories and the human rights group Amnesty International and shared with 16 news organizations, journalists were able to identify more than 1,000 individuals in 50 countries who were allegedly selected by NSO clients for potential surveillance....\n...Human rights groups, activists, and surveillance experts have accused NSO of licensing its powerful Pegasus software to countries, including Saudi Arabia, that have used it to target individuals, hack into their phones, and monitor their communications....\n...In furtherance of this commitment, it has also introduced the personal data protection bill 2019 and the information technology (intermediary guidelines and digital media ethics code) rules 2021, to protect the personal data of individuals and to empower users of social media platforms...."},"the company\u2019s technology":{"judgment":"","sentences":"...Through its lawyers, NSO said the consortium had made \u201Cincorrect assumptions\u201D about which clients use the company\u2019s technology....\n...Through its lawyers, NSO said the consortium had made incorrect assumptions about which clients use the company\u2019s technology...."},"the company":{"judgment":"","sentences":"...Through its lawyers, NSO said the consortium had made \u201Cincorrect assumptions\u201D about which clients use the company\u2019s technology....\n...AP\u2019s director of media relations, Lauren Easton, said the company is \u201Cdeeply troubled to learn that two AP journalists, along with journalists from many news organizations\u201D are on the list of the 1,000 potential targets for Pegasus infection....\n...The Financial Times identified the company as NSO Group....\n...NSO is the subject of multiple ongoing lawsuits and has been criticised by human rights groups, including Amnesty International, which has asked Israel\u2019s ministry of defence to revoke the company\u2019s export licences....\n...Simply put, NSO Group is on a life-saving mission, and the company will faithfully execute this mission undeterred, despite any and all continued attempts to discredit it on false grounds...."},"this horrible murder":{"judgment":"","sentences":"...We had nothing to do with this horrible murder, Shalev Hulio, the chief executive of the Israeli surveillance firm, told the US TV news programme 60 Minutes in March 2019...\n...We had nothing to do with this horrible murder,\u201D Shalev Hulio, the chief executive of the Israeli surveillance firm, told the US TV news programme 60 Minutes in March 2019...."},"Washington Post journalist Jamal Khashoggi\u2019s fiancee":{"judgment":"","sentences":"...Amnesty also reported that its forensic researchers had determined that NSO Group\u2019s flagship Pegasus spyware was successfully installed on the phone of Washington Post journalist Jamal Khashoggi\u2019s fiancee, Hatice Cengiz, just four days after he was killed in the Saudi Consulate in Istanbul in 2018....\n...Amnesty also reported that its forensic researchers had determined that NSO Group\u2019s flagship Pegasus spyware was successfully installed on the phone of Washington Post journalist Jamal Khashoggi\u2019s fiancee, Hatice Cengiz, just four days after he was killed in the Saudi Consulate in Istanbul in 2018...\n...installed Washington Post journalist Jamal Khashoggi\u2019s fiancee ...."},"four iPhones":{"judgment":"","sentences":"...Amnesty shared backup copies of four iPhones with Citizen Lab, a research group at the University of Toronto that specialises in studying Pegasus, which confirmed that they showed signs of Pegasus infection....\n...Amnesty shared \u201Cbackup copies\u201D of four iPhones with Citizen Lab, a research group at the University of Toronto that specialises in studying Pegasus, which confirmed that they showed signs of Pegasus infection...."},"attacks":{"judgment":"","sentences":"...Amnesty examined 67 smartphones where attacks were suspected....\n...NSO boasts on its website that its technology \"has helped governments save thousands of lives, prevent terrorist attacks, break up major crimes, and make the world a safer place.\"...\n...The fact is NSO Group\u2019s technologies have helped prevent terror attacks, gun violence, car explosions and suicide bombings...."},"the capability":{"judgment":"","sentences":"...The consortium understands NSO clients have the capability through an interface on the Pegasus system to conduct HLR lookup inquiries...."},"a number":{"judgment":"","sentences":"...However, forensic examinations of a small sample of mobile phones with numbers on the list found tight correlations between the time and date of a number in the data and the start of Pegasus activity \u2013 in some cases as little as a few seconds....\n...While the data is an indication of intent, the presence of a number in the data does not reveal whether there was an attempt to infect the phone with spyware such as Pegasus, the company\u2019s signature surveillance tool, or whether any attempt succeeded...."},"HRL lookup inquiries":{"judgment":"","sentences":"...It is unclear whether Pegasus operators are required to conduct HRL lookup inquiries via its interface to use its software; an NSO source stressed its clients may have different reasons \u2013 unrelated to Pegasus \u2013 for conducting HLR lookups via an NSO system...."},"forensic examinations":{"judgment":"","sentences":"...However, forensic examinations of a small sample of mobile phones with numbers on the list found tight correlations between the time and date of a number in the data and the start of Pegasus activity \u2013 in some cases as little as a few seconds...."},"a very small number":{"judgment":"","sentences":"...The presence in the data of a very small number of landlines and US numbers, which NSO says are technically impossible to access with its tools, reveals some targets were selected by NSO clients even though they could not be infected with Pegasus....\n...The presence in the data of a very small number of landlines and US numbers, which NSO says are \u201Ctechnically impossible\u201D to access with its tools, reveals some targets were selected by NSO clients even though they could not be infected with Pegasus...."},"a $1bn":{"judgment":"","sentences":"...Yana Peel, the chief executive of the Serpentine Galleries and a self-proclaimed champion of free speech, co-owns NSO Group, a $1bn £790m...\n...Yana Peel, the chief executive of the Serpentine Galleries and a self-proclaimed champion of free speech, co-owns NSO Group, a $1bn (£790m) Israeli tech firm, according to corporate records in the US and Luxembourg...."},"a friend":{"judgment":"","sentences":"...Other Khashoggi-connected names linked to in the data were Yahya Assiri, a UK-based Saudi activist who documents human rights violations in Saudi Arabia and was in close contact with Khashoggi before his death, and Yasin Aktay, a friend of Khashoggi and a top aide to the Turkish president, Recep Tayyip Erdoğan....\n...Lawsuits against NSO allege the technology was used to target dissidents and their associates, including a friend of the Washington Post journalist Jamal Khashoggi, who was murdered in the Saudi consulate in Istanbul last year....\n...\u201CI was just a friend of his.\u201D..."},"the case":{"judgment":"","sentences":"...In the case you have, how long did it take for them to reply and how did they respond?...\n...In the case of journalists, that lets hackers spy on reporters\u2019 communications with sources...."},"technologies":{"judgment":"","sentences":"...State-sponsored actors like the NSO Group spend millions of dollars on sophisticated surveillance technologies without effective accountability....\n...NSO Group describes itself as a cybertechnologies company....\n...The technologies are also being used every day to break up paedophilia, sex- and drug-trafficking rings, locate missing and kidnapped children, locate survivors trapped under collapsed buildings, and protect airspace against disruptive penetration by dangerous drones....\n...Citizen Lab says NSO's technologies have been used by some 45 countries, including Mexico, Bahrain, Morocco, Saudi Arabia and the U.A.E. The Financial Times, citing an unnamed NSO investor, reports that half of the group's revenues come from the Middle East, but that it has contracts with 21 EU countries, as well....\n...Based in Israel, it says it develops technologies that governments and law enforcement agencies can use to track and intercept terror activity, break up organized crime operations, and even search for missing persons...."},"its customers\u2019 targets":{"judgment":"","sentences":"...The company has always said it does not have access to the data of its customers\u2019 targets....\n...NSO does not operate the systems that it sells to vetted government customers, and does not have access to the data of its customers\u2019 targets...."},"inquiries":{"judgment":"","sentences":"...It is unclear whether Pegasus operators are required to conduct HRL lookup inquiries via its interface to use its software; an NSO source stressed its clients may have different reasons \u2013 unrelated to Pegasus \u2013 for conducting HLR lookups via an NSO system....\n...Public Safety and Emergency Preparedness Canada did not respond to inquiries about whether Ottawa has bought technology from NSO....\n...The consortium understands NSO clients have the capability through an interface on the Pegasus system to conduct HLR lookup inquiries....\n...Government responses to inquiries from the Pegasus project..."},"the phone":{"judgment":"","sentences":"...The hacker would then use that missed call to slide a piece of malware onto the phone....\n...WhatsApp has admitted this vulnerability involved a missed call coming to the phone through the app....\n...The material appears to show officials in the United Arab Emirates discussing whether to hack into the phones of senior figures in Saudi Arabia and Qatar, including members of the Qatari royal family....\n...While the investigation mostly points to Khashoggi\u2019s close associates being targeted in the months after the murder, it also identified evidence suggesting that an NSO client targeted the phone of his wife, Hanan Elatr, several months before his death, between November 2017 and April 2018....\n...Amnesty also reported that its forensic researchers had determined that NSO Group\u2019s flagship Pegasus spyware was successfully installed on the phone of Washington Post journalist Jamal Khashoggi\u2019s fiancee, Hatice Cengiz, just four days after he was killed in the Saudi Consulate in Istanbul in 2018...."},"WhatsApp":{"judgment":"","sentences":"...WhatsApp has admitted this vulnerability involved a missed call coming to the phone through the app....\n...This week, WhatsApp began urging its 1.5 billion or so users to update their apps to get the latest security patch....\n...WhatsApp says the actual number of people who were affected by this attack amounted to maybe a couple dozen....\n...Facebook has sued NSO Group over the use of a somewhat similar exploit that allegedly intruded via its globally popular encrypted WhatsApp messaging app....\n...How do I update my WhatsApp app?..."},"an interface":{"judgment":"","sentences":"...The consortium understands NSO clients have the capability through an interface on the Pegasus system to conduct HLR lookup inquiries...."},"phone users":{"judgment":"","sentences":"...Such registers keep records on the networks of phone users and their general locations, along with other identifying information that is used routinely in routing calls and texts...."},"the targets":{"judgment":"","sentences":"...By closely examining the pattern of targeting by individual clients in the leaked data, media partners were able to identify 10 governments believed to be responsible for selecting the targets: Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India, and the United Arab Emirates...."},"HLR lookup inquiries":{"judgment":"","sentences":"...The consortium understands NSO clients have the capability through an interface on the Pegasus system to conduct HLR lookup inquiries...."},"any given number":{"judgment":"","sentences":"...While the data is organised into clusters, indicative of individual NSO clients, it does not say which NSO client was responsible for selecting any given number...."},"hire":{"judgment":"","sentences":"...An investigation by a global media consortium based on leaked targeting data provides further evidence that military-grade malware from Israel-based NSO Group, the world\u2019s most infamous hacker-for-hire outfit, is being used to spy on journalists, human rights activists and political dissidents....\n...RICHMOND, Va. (AP) \u2014 Tech giant Apple announced Tuesday it is suing Israel\u2019s NSO Group, seeking to block the world\u2019s most infamous hacker-for-hire company from breaking into Apple's products, like the iPhone...."},"our technology":{"judgment":"","sentences":"...We can confirm that our technology was not used to listen, monitor, track, or collect information regarding him or his family members mentioned in your inquiry.\u201D...\n...We can confirm that our technology was not used to listen, monitor, track, or collect information regarding him or his family members mentioned in your inquiry....\n...As NSO has previously stated, our technology was not associated in any way with the heinous murder of Jamal Khashoggi...."},"records":{"judgment":"","sentences":"...Such registers keep records on the networks of phone users and their general locations, along with other identifying information that is used routinely in routing calls and texts....\n...The phone analysis discoveries and leaked phone records suggest that Saudi Arabia and its allies used NSO\u2019s spyware in the aftermath of the murder to monitor the campaign for justice led by friends and associates of Khashoggi, while also showing an intent to spy on the official Turkish inquiry into his murder....\n...Israeli tech firm, according to corporate records in the US and Luxembourg...\n...Yana Peel, the chief executive of the Serpentine Galleries and a self-proclaimed champion of free speech, co-owns NSO Group, a $1bn (£790m) Israeli tech firm, according to corporate records in the US and Luxembourg...."},"their phones":{"judgment":"","sentences":"...Human rights groups, activists, and surveillance experts have accused NSO of licensing its powerful Pegasus software to countries, including Saudi Arabia, that have used it to target individuals, hack into their phones, and monitor their communications....\n...No forensics were able to be carried out on their phones....\n...Without forensic examination of their phones, it is not possible to know whether these targets were infiltrated or successfully hacked using Pegasus....\n...The Guardian, another consortium member, reported that Amnesty had found traces of Pegasus infections on the cellphones of 15 journalists who let their phones be examined after discovering their number was in the leaked data...."},"a larger list":{"judgment":"","sentences":"...The lawyers said NSO had reason to believe the list accessed by the consortium \u201Cis not a list of numbers targeted by governments using Pegasus, but instead, may be part of a larger list of numbers that might have been used by NSO Group customers for other purposes\u201D....\n...The lawyers said NSO had reason to believe the list accessed by the consortium is not a list of numbers targeted by governments using Pegasus, but instead, may be part of a larger list of numbers that might have been used by NSO Group customers for other purposes ...."},"a research group":{"judgment":"","sentences":"...Amnesty shared backup copies of four iPhones with Citizen Lab, a research group at the University of Toronto that specialises in studying Pegasus, which confirmed that they showed signs of Pegasus infection....\n...Amnesty shared \u201Cbackup copies\u201D of four iPhones with Citizen Lab, a research group at the University of Toronto that specialises in studying Pegasus, which confirmed that they showed signs of Pegasus infection...."},"anything":{"judgment":"","sentences":"...After further questions, the lawyers said the consortium was basing its findings on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies ....\n...After further questions, the lawyers said the consortium was basing its findings \u201Con misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies\u201D...."},"the potential targets":{"judgment":"","sentences":"...The consortium believes the data indicates the potential targets NSO\u2019s government clients identified in advance of possible surveillance...."},"signs":{"judgment":"","sentences":"...Amnesty shared backup copies of four iPhones with Citizen Lab, a research group at the University of Toronto that specialises in studying Pegasus, which confirmed that they showed signs of Pegasus infection....\n...Of those, 23 were successfully infected and 14 showed signs of attempted penetration....\n...Three Android phones showed signs of targeting, such as Pegasus-linked SMS messages....\n...Amnesty shared \u201Cbackup copies\u201D of four iPhones with Citizen Lab, a research group at the University of Toronto that specialises in studying Pegasus, which confirmed that they showed signs of Pegasus infection...."},"40 countries":{"judgment":"","sentences":"...NSO claims to sell its tools to 60 clients in 40 countries, but refuses to identify them...."},"interest":{"judgment":"","sentences":"...Facebook Twitter Pinterest People view an Emma Kunz exhibition at the Serpentine Gallery earlier this year....\n...leak those of people of interest ....\n...It is important to note that government agencies have a well-established protocol for interception, which includes sanction and supervision from highly ranked officials in central and state governments, for clear stated reasons only in national interest....\n...The data leak is a list of more than 50,000 phone numbers that, since 2016, are believed to have been selected as those of people of interest by government clients of NSO Group, which sells surveillance software....\n...In India there is a well established procedure through which lawful interception of electronic communication is carried out in order for the purpose of national security, particularly on the occurrence of any public emergency or in the interest of public safety, by agencies at the centre and states...."},"activists":{"judgment":"E","sentences":"...Also this month, security researchers disclosed that Pegasus spyware was detected on the cellphones of six Palestinian human rights activists....\n...Among more than two dozen previously documented Mexican targets are proponents of a soda tax, opposition politicians, human rights activists investigating a mass disappearance and the widow of a slain journalist....\n...An investigation by a global media consortium based on leaked targeting data provides further evidence that military-grade malware from Israel-based NSO Group, the world\u2019s most infamous hacker-for-hire outfit, is being used to spy on journalists, human rights activists and political dissidents....\n...They include 189 journalists, more than 600 politicians and government officials, at least 65 business executives, 85 human rights activists and several heads of state, according to The Washington Post, a consortium member....\n...Human rights groups, activists, and surveillance experts have accused NSO of licensing its powerful Pegasus software to countries, including Saudi Arabia, that have used it to target individuals, hack into their phones, and monitor their communications...."},"surveillance":{"judgment":"P","sentences":"...State-sponsored actors like the NSO Group spend millions of dollars on sophisticated surveillance technologies without effective accountability....\n...The company sells surveillance technology to governments worldwide....\n...The allegations regarding government surveillance on specific people has no concrete basis or truth associated with it whatsoever....\n...\u201CIt was needless,\u201D Aktay said of the surveillance....\n...From a list of more than 50,000 cellphone numbers obtained by the Paris-based journalism non-profit Forbidden Stories and the human rights group Amnesty International and shared with 16 news organizations, journalists were able to identify more than 1,000 individuals in 50 countries who were allegedly selected by NSO clients for potential surveillance...."},"the Pegasus system":{"judgment":"P","sentences":"...The consortium understands NSO clients have the capability through an interface on the Pegasus system to conduct HLR lookup inquiries...."},"its tools":{"judgment":"","sentences":"...The presence in the data of a very small number of landlines and US numbers, which NSO says are technically impossible to access with its tools, reveals some targets were selected by NSO clients even though they could not be infected with Pegasus....\n...NSO claims to sell its tools to 60 clients in 40 countries, but refuses to identify them....\n...The presence in the data of a very small number of landlines and US numbers, which NSO says are \u201Ctechnically impossible\u201D to access with its tools, reveals some targets were selected by NSO clients even though they could not be infected with Pegasus...."},"a phone":{"judgment":"","sentences":"...Telecoms and surveillance experts say HLR data can sometimes be used in the early phase of a surveillance attempt, when identifying whether it is possible to connect to a phone....\n...The client appears to have used NSO\u2019s spyware, Pegasus, which can transform a phone into a surveillance device, with microphones and cameras activated without a user knowing....\n...Once a phone is infected, a Pegasus operator can secretly extract chats, photos, emails and location data, or activate microphones and cameras without a user knowing....\n...While a phone number\u2019s presence in the data does not mean an attempt was made to hack a device, the consortium said it believed the data indicated potential targets of NSO\u2019s government clients...."},"clusters":{"judgment":"","sentences":"...While the data is organised into clusters, indicative of individual NSO clients, it does not say which NSO client was responsible for selecting any given number...."},"November":{"judgment":"","sentences":"...While the investigation mostly points to Khashoggi\u2019s close associates being targeted in the months after the murder, it also identified evidence suggesting that an NSO client targeted the phone of his wife, Hanan Elatr, several months before his death, between November 2017 and April 2018....\n...Rwanda does not use this software system, as previously confirmed in November 2019, and does not possess this technical capability in any form...."},"the forensic analyses":{"judgment":"","sentences":"...Amnesty\u2019s Security Lab, a technical partner on the project, did the forensic analyses...."},"the data leak":{"judgment":"","sentences":"...Show What is in the data leak?..."},"Amnesty":{"judgment":"","sentences":"...It is about controlling public narrative, resisting scrutiny, and suppressing any dissenting voice,\u201D Amnesty quoted its secretary-general, Agnes Callamard, as saying....\n...Amnesty shared backup copies of four iPhones with Citizen Lab, a research group at the University of Toronto that specialises in studying Pegasus, which confirmed that they showed signs of Pegasus infection....\n...Amnesty\u2019s intervention followed a separate allegation that Pegasus was used in an attempted attack onthe mobile phone of a staff member....\n...However, unlike iPhones, phones that use Android do not log the kinds of information required for Amnesty\u2019s detective work....\n...NSO is the subject of multiple ongoing lawsuits and has been criticised by human rights groups, including Amnesty International, which has asked Israel\u2019s ministry of defence to revoke the company\u2019s export licences...."},"Amnesty International":{"judgment":"","sentences":"...NSO is the subject of multiple ongoing lawsuits and has been criticised by human rights groups, including Amnesty International, which has asked Israel\u2019s ministry of defence to revoke the company\u2019s export licences....\n...Agnès Callamard, the secretary general of Amnesty International, which is a partner in the Pegasus project, said new discoveries about Khashoggi-related targets indicated an attempt by Saudi Arabia and others to gather intelligence on the fallout from the killing....\n...We remind you that the unfounded allegations already published by Amnesty International and relayed by Forbidden Stories have already been the subject of an official response by the Moroccan authorities, who categorically denied such allegations....\n...From a list of more than 50,000 cellphone numbers obtained by the Paris-based journalism non-profit Forbidden Stories and the human rights group Amnesty International and shared with 16 news organizations, journalists were able to identify more than 1,000 individuals in 50 countries who were allegedly selected by NSO clients for potential surveillance....\n...\"These softwares that NSO is marketing as tools to prevent terror and crime, are used against human rights defenders and lawyers and doctors and members of Parliament,\" Chen Brill-Egri of Amnesty International Israel told Reuters...."},"technology":{"judgment":"","sentences":"...Novalpina Capital said in a statement early Wednesday that NSO's technology \"is designed in such a way that it can only be deployed by an intelligence or law enforcement agency to whom the technology is sold under licence....\n...The company sells surveillance technology to governments worldwide....\n...NSO does not operate its technology, does not collect, nor possesses, nor has any access to any kind of data of its customers....\n...It claims its software has helped save thousands of lives and denies its technology was in any way associated with Khashoggi\u2019s murder....\n...NSO Group does not disclose its clients and says it sells its technology to Israeli-approved governments to help them target terrorists and break up pedophile rings and sex- and drug-trafficking rings...."},"mobile phone networks":{"judgment":"","sentences":"...The term HLR, or home location register, refers to a database that is essential to operating mobile phone networks...."},"different reasons":{"judgment":"","sentences":"...It is unclear whether Pegasus operators are required to conduct HRL lookup inquiries via its interface to use its software; an NSO source stressed its clients may have different reasons \u2013 unrelated to Pegasus \u2013 for conducting HLR lookups via an NSO system...."},"any attempt":{"judgment":"","sentences":"...While the data is an indication of intent, the presence of a number in the data does not reveal whether there was an attempt to infect the phone with spyware such as Pegasus, the company\u2019s signature surveillance tool, or whether any attempt succeeded...."},"HLR lookups":{"judgment":"","sentences":"...It is unclear whether Pegasus operators are required to conduct HRL lookup inquiries via its interface to use its software; an NSO source stressed its clients may have different reasons \u2013 unrelated to Pegasus \u2013 for conducting HLR lookups via an NSO system...."},"Pegasus spyware":{"judgment":"P","sentences":"...Also this month, security researchers disclosed that Pegasus spyware was detected on the cellphones of six Palestinian human rights activists....\n...The consortium\u2019s \u201CPegasus Project\u201D reporting bolsters accusations that not just autocratic regimes but democratic governments, including India and Mexico, have used NSO Group\u2019s Pegasus spyware for political ends....\n...And Mexican prosecutors recently announced they have arrested a businessman on charges he used the Pegasus spyware to spy on a journalist....\n...Amnesty also reported that its forensic researchers had determined that NSO Group\u2019s flagship Pegasus spyware was successfully installed on the phone of Washington Post journalist Jamal Khashoggi\u2019s fiancee, Hatice Cengiz, just four days after he was killed in the Saudi Consulate in Istanbul in 2018....\n...Amnesty also reported that its forensic researchers had determined that NSO Group\u2019s flagship Pegasus spyware was successfully installed on the phone of Washington Post journalist Jamal Khashoggi\u2019s fiancee, Hatice Cengiz, just four days after he was killed in the Saudi Consulate in Istanbul in 2018..."},"the brutal murder":{"judgment":"","sentences":"...In the wake of the brutal murder of the journalist Jamal Khashoggi, the NSO Group emphatically denied that its government clients had used its hacking malware to target the journalist or his family....\n...In the wake of the brutal murder of the journalist Jamal Khashoggi, the NSO Group emphatically denied that its government clients had used its hacking malware to target the journalist or his family ..."},"other purposes":{"judgment":"","sentences":"...The lawyers said NSO had reason to believe the list accessed by the consortium \u201Cis not a list of numbers targeted by governments using Pegasus, but instead, may be part of a larger list of numbers that might have been used by NSO Group customers for other purposes\u201D....\n...The lawyers said NSO had reason to believe the list accessed by the consortium is not a list of numbers targeted by governments using Pegasus, but instead, may be part of a larger list of numbers that might have been used by NSO Group customers for other purposes ...."},"the story":{"judgment":"","sentences":"...\u201CThis leak is going to be the story of the year.\u201D...\n...However, the questionnaire sent to the government of India indicates that the story being crafted is one that is not only bereft of facts but also founded in pre-conceived conclusions...."},"the kinds":{"judgment":"","sentences":"...However, unlike iPhones, phones that use Android do not log the kinds of information required for Amnesty\u2019s detective work...."},"media partners":{"judgment":"","sentences":"...By closely examining the pattern of targeting by individual clients in the leaked data, media partners were able to identify 10 governments believed to be responsible for selecting the targets: Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India, and the United Arab Emirates...."},"further questions":{"judgment":"","sentences":"...After further questions, the lawyers said the consortium was basing its findings on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies ....\n...After further questions, the lawyers said the consortium was basing its findings \u201Con misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies\u201D...."},"comment":{"judgment":"","sentences":"...The company did not immediately return a request for comment on Tuesday....\n...NSO has not commented on the claims but promised to investigate all \u201Ccredible allegations of misuse\u201D....\n...The governments of the United Arab Emirates, Dubai, Saudi Arabia, Azerbaijan, Bahrain, Kazakhstan and Mexico did not respond to requests for comment...."},"an attempt":{"judgment":"","sentences":"...Amnesty\u2019s intervention followed a separate allegation that Pegasus was used in an attempted attack onthe mobile phone of a staff member....\n...Agnès Callamard, the secretary general of Amnesty International, which is a partner in the Pegasus project, said new discoveries about Khashoggi-related targets indicated an attempt by Saudi Arabia and others to gather intelligence on the fallout from the killing....\n...Analysis of Rasheed\u2019s phone found evidence of an attempted hack in April 2019, but there was no evidence the spyware was successfully installed....\n...While the data is an indication of intent, the presence of a number in the data does not reveal whether there was an attempt to infect the phone with spyware such as Pegasus, the company\u2019s signature surveillance tool, or whether any attempt succeeded....\n...While a phone number\u2019s presence in the data does not mean an attempt was made to hack a device, the consortium said it believed the data indicated potential targets of NSO\u2019s government clients...."},"a system":{"judgment":"","sentences":"...The data also contains the time and date that numbers were selected, or entered on to a system...."},"Khashoggi":{"judgment":"G","sentences":"...It was six months after Khashoggi, a Washington Post columnist, was killed in Turkey by assassins dispatched by Saudi Arabia, a client of NSO....\n...The company had previously been implicated in other spying activities on Khashoggi....\n...It claims its software has helped save thousands of lives and denies its technology was in any way associated with Khashoggi\u2019s murder....\n...In a statement, NSO said: \u201COur technology was not associated in any way with the heinous murder of Jamal Khashoggi....\n...In the wake of the brutal murder of the journalist Jamal Khashoggi, the NSO Group emphatically denied that its government clients had used its hacking malware to target the journalist or his family...."},"a cybertechnologies company":{"judgment":"G","sentences":"...NSO Group describes itself as a cybertechnologies company....\n...NSO Group describes itself as a cybertechnologies company Based in Israel, it says it develops technologies that governments and law enforcement agencies can use to track and intercept terror activity, break up organized crime operations, and even search for missing persons..."},"the time":{"judgment":"","sentences":"...The data also contains the time and date that numbers were selected, or entered on to a system....\n...However, forensic examinations of a small sample of mobile phones with numbers on the list found tight correlations between the time and date of a number in the data and the start of Pegasus activity \u2013 in some cases as little as a few seconds...."},"The company":{"judgment":"","sentences":"...The company did not immediately return a request for comment on Tuesday....\n...The company had previously been implicated in other spying activities on Khashoggi....\n...The company sells surveillance technology to governments worldwide....\n...The company has always said it does not have access to the data of its customers\u2019 targets....\n...The company was taken over earlier this year by Novalpina Capital, a London-based private equity firm co-founded by Peel\u2019s husband, Stephen...."},"Stephen Peel":{"judgment":"","sentences":"...Stephen Peel resigned from the board o according ....\n...\"We abhor any form of misuse of any form of surveillance technology by any government, agency or individual, and we particularly condemn without hesitation any such misuse directed at people who are vulnerable simply as a consequence of their commitment to report on, speak out for or defend human rights,\" said Stephen Peel, founding partner of Novalpina...."},"governments":{"judgment":"","sentences":"...In case of state governments, such cases are reviewed by a committee headed by the chief secretary concerned....\n...It said the 50,000 number was exaggerated and the list could not be a list of numbers targeted by governments using Pegasus ....\n...It said the 50,000 number was \u201Cexaggerated\u201D and the list could not be a list of numbers \u201Ctargeted by governments using Pegasus\u201D....\n...The company sells surveillance technology to governments worldwide....\n...NSO Group does not disclose its clients and says it sells its technology to Israeli-approved governments to help them target terrorists and break up pedophile rings and sex- and drug-trafficking rings...."},"none":{"judgment":"","sentences":"...Fifteen of the phones were Android devices, none of which showed evidence of successful infection...."},"any way":{"judgment":"","sentences":"...It claims its software has helped save thousands of lives and denies its technology was in any way associated with Khashoggi\u2019s murder....\n...Even if Forbidden Stories were correct that an NSO Group client in Mexico targeted the journalist\u2019s phone number in February 2017, that does not mean that the NSO Group client, or data collected by NSO Group software, were in any way connected to the journalist\u2019s murder the following month....\n...In a statement, NSO said: \u201COur technology was not associated in any way with the heinous murder of Jamal Khashoggi....\n...As NSO has previously stated, our technology was not associated in any way with the heinous murder of Jamal Khashoggi...."},"landlines":{"judgment":"","sentences":"...The presence in the data of a very small number of landlines and US numbers, which NSO says are technically impossible to access with its tools, reveals some targets were selected by NSO clients even though they could not be infected with Pegasus....\n...The presence in the data of a very small number of landlines and US numbers, which NSO says are \u201Ctechnically impossible\u201D to access with its tools, reveals some targets were selected by NSO clients even though they could not be infected with Pegasus...."},"Amnesty\u2019s detective work":{"judgment":"","sentences":"...However, unlike iPhones, phones that use Android do not log the kinds of information required for Amnesty\u2019s detective work...."},"Morocco":{"judgment":"","sentences":"...Citizen Lab says NSO's technologies have been used by some 45 countries, including Mexico, Bahrain, Morocco, Saudi Arabia and the U.A.E. The Financial Times, citing an unnamed NSO investor, reports that half of the group's revenues come from the Middle East, but that it has contracts with 21 EU countries, as well....\n...By closely examining the pattern of targeting by individual clients in the leaked data, media partners were able to identify 10 governments believed to be responsible for selecting the targets: Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India, and the United Arab Emirates....\n...Morocco...\n...The Moroccan authorities have, since 22 June 2020, been awaiting material evidence from Amnesty International, which has been incapable of proving any relationship whatsoever between Morocco and the aforementioned Israeli company...."},"more than 50,000 phone numbers":{"judgment":"","sentences":"...Forbidden Stories, a Paris-based nonprofit journalism organisation, and Amnesty International had access to a leak of more than 50,000 phone numbers selected as targets by clients of NSO since 2016....\n...The data leak is a list of more than 50,000 phone numbers that, since 2016, are believed to have been selected as those of people of interest by government clients of NSO Group, which sells surveillance software...."},"the Guardian":{"judgment":"","sentences":"...Access to the data was then shared with the Guardian and 16 other news organisations, including the Washington Post, Le Monde, Die Zeit and Süddeutsche Zeitung....\n...were among journalists on the list whose phones were successfully infected with Pegasus, the Guardian reported....\n...A leading human rights campaigner and head of a prestigious London art gallery is the co-owner of an Israeli cyberweapons company whose software has allegedly been used by authoritarian regimes to spy on dissidents, the Guardian can reveal....\n...Access to the leak was shared with the Guardian and other media by Forbidden Stories, a nonprofit organisation, as part of a collaborative investigation called the Pegasus project....\n...Forbidden Stories, a Paris-based nonprofit journalism organisation, and Amnesty International initially had access to the list and shared access with 16 media organisations including the Guardian...."},"any user interaction":{"judgment":"","sentences":"...NSO Group\u2019s methods to infect its victims have grown so sophisticated that researchers say it can now do so without any user interaction, the so-called \u201Czero-click\u201D option....\n...Researchers have found several examples of NSO Group tools using so-called zero click exploits that infect targeted mobile phones without any user interaction...."},"the presence":{"judgment":"","sentences":"...While the data is an indication of intent, the presence of a number in the data does not reveal whether there was an attempt to infect the phone with spyware such as Pegasus, the company\u2019s signature surveillance tool, or whether any attempt succeeded...."},"Istanbul":{"judgment":"","sentences":"...Lawsuits against NSO allege the technology was used to target dissidents and their associates, including a friend of the Washington Post journalist Jamal Khashoggi, who was murdered in the Saudi consulate in Istanbul last year....\n...A team of Saudi agents killed Khashoggi inside the Saudi consulate in Istanbul during his visit there to pick up documents he needed to get married to his fiancee, Hatice Cengiz, who later became an outspoken advocate for accountability over his murder....\n...Amnesty also reported that its forensic researchers had determined that NSO Group\u2019s flagship Pegasus spyware was successfully installed on the phone of Washington Post journalist Jamal Khashoggi\u2019s fiancee, Hatice Cengiz, just four days after he was killed in the Saudi Consulate in Istanbul in 2018....\n...Amnesty also reported that its forensic researchers had determined that NSO Group\u2019s flagship Pegasus spyware was successfully installed on the phone of Washington Post journalist Jamal Khashoggi\u2019s fiancee, Hatice Cengiz, just four days after he was killed in the Saudi Consulate in Istanbul in 2018...\n...The phone number of İrfan Fidan, the Istanbul chief prosecutor who later formally charged 20 Saudi nationals over the killing, also appeared in the list of numbers of possible candidates for surveillance by NSO Group clients...."},"Telecoms":{"judgment":"","sentences":"...Telecoms and surveillance experts say HLR data can sometimes be used in the early phase of a surveillance attempt, when identifying whether it is possible to connect to a phone...."},"the handsets":{"judgment":"","sentences":"...For the remaining 30, the tests were inconclusive, in several cases because the handsets had been replaced...."},"the Pegasus project":{"judgment":"P","sentences":"...Quick Guide What is in the Pegasus project data?...\n...Agnès Callamard, the secretary general of Amnesty International, which is a partner in the Pegasus project, said new discoveries about Khashoggi-related targets indicated an attempt by Saudi Arabia and others to gather intelligence on the fallout from the killing....\n...More than 80 journalists have worked together over several months as part of the Pegasus project....\n...Q&A What is the Pegasus project?...\n...Access to the leak was shared with the Guardian and other media by Forbidden Stories, a nonprofit organisation, as part of a collaborative investigation called the Pegasus project...."},"free speech":{"judgment":"","sentences":"...Yana Peel, the chief executive of the Serpentine Galleries and a self-proclaimed champion of free speech, co-owns NSO Group, a $1bn £790m...\n...The commitment to free speech as a fundamental right is the cornerstone of India\u2019s democratic system....\n...Yana Peel, the chief executive of the Serpentine Galleries and a self-proclaimed champion of free speech, co-owns NSO Group, a $1bn (£790m) Israeli tech firm, according to corporate records in the US and Luxembourg...."},"NSO clients":{"judgment":"P","sentences":"...Which NSO clients were selecting numbers?...\n...The presence in the data of a very small number of landlines and US numbers, which NSO says are technically impossible to access with its tools, reveals some targets were selected by NSO clients even though they could not be infected with Pegasus....\n...From a list of more than 50,000 cellphone numbers obtained by the Paris-based journalism non-profit Forbidden Stories and the human rights group Amnesty International and shared with 16 news organizations, journalists were able to identify more than 1,000 individuals in 50 countries who were allegedly selected by NSO clients for potential surveillance....\n...While the data is organised into clusters, indicative of individual NSO clients, it does not say which NSO client was responsible for selecting any given number....\n...The consortium understands NSO clients have the capability through an interface on the Pegasus system to conduct HLR lookup inquiries...."},"lives":{"judgment":"","sentences":"...It claims its software has helped save thousands of lives and denies its technology was in any way associated with Khashoggi\u2019s murder....\n...NSO boasts on its website that its technology \"has helped governments save thousands of lives, prevent terrorist attacks, break up major crimes, and make the world a safer place.\"..."},"researchers":{"judgment":"","sentences":"...Also this month, security researchers disclosed that Pegasus spyware was detected on the cellphones of six Palestinian human rights activists....\n...\"And what happens is security researchers find these flaws and they're able to develop what they call exploit code to take advantage of these flaws and do exactly what was done in this case.\"...\n...NSO Group\u2019s methods to infect its victims have grown so sophisticated that researchers say it can now do so without any user interaction, the so-called \u201Czero-click\u201D option....\n...Amnesty also reported that its forensic researchers had determined that NSO Group\u2019s flagship Pegasus spyware was successfully installed on the phone of Washington Post journalist Jamal Khashoggi\u2019s fiancee, Hatice Cengiz, just four days after he was killed in the Saudi Consulate in Istanbul in 2018....\n...Amnesty also reported that its forensic researchers had determined that NSO Group\u2019s flagship Pegasus spyware was successfully installed on the phone of Washington Post journalist Jamal Khashoggi\u2019s fiancee, Hatice Cengiz, just four days after he was killed in the Saudi Consulate in Istanbul in 2018..."},"its technology":{"judgment":"","sentences":"...NSO does not operate its technology, does not collect, nor possesses, nor has any access to any kind of data of its customers....\n...It claims its software has helped save thousands of lives and denies its technology was in any way associated with Khashoggi\u2019s murder....\n...NSO Group does not disclose its clients and says it sells its technology to Israeli-approved governments to help them target terrorists and break up pedophile rings and sex- and drug-trafficking rings....\n...What does its technology do?...\n...\"NSO would not or could not use its technology in its own right to target any person or organization,\" it said in a statement Tuesday...."},"nothing":{"judgment":"","sentences":"...We had nothing to do with this horrible murder, Shalev Hulio, the chief executive of the Israeli surveillance firm, told the US TV news programme 60 Minutes in March 2019...\n...We had nothing to do with this horrible murder,\u201D Shalev Hulio, the chief executive of the Israeli surveillance firm, told the US TV news programme 60 Minutes in March 2019....\n...It is also beyond dispute that the data has many legitimate and entirely proper uses having nothing to do with surveillance or with NSO, so there can be no factual basis to suggest that a use of the data somehow equates to surveillance...."},"no bearing":{"judgment":"","sentences":"...NSO Group has good reason to believe that claims that you have been provided with, are based on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers\u2019 targets of Pegasus or any other NSO products....\n...After further questions, the lawyers said the consortium was basing its findings on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies ....\n...After further questions, the lawyers said the consortium was basing its findings \u201Con misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies\u201D...."},"NSO":{"judgment":"","sentences":"...State-sponsored actors like the NSO Group spend millions of dollars on sophisticated surveillance technologies without effective accountability....\n...Which NSO clients were selecting numbers?...\n...Forbidden Stories repeatedly imputes human rights abuses \u2013 including alleged murder and torture \u2013 to NSO Group based on alleged conduct by NSO Group\u2019s clients and unsupported logical leaps....\n...Who are NSO's clients?...\n...The presence in the data of a very small number of landlines and US numbers, which NSO says are technically impossible to access with its tools, reveals some targets were selected by NSO clients even though they could not be infected with Pegasus...."},"India":{"judgment":"","sentences":"...The requests for these lawful interception of electronic communication are made as per relevant rules under the provisions of section 5(2) of Indian Telegraph Act, 1885 and section 69 of the Information Technology (Amendment) Act, 2000....\n...The consortium\u2019s \u201CPegasus Project\u201D reporting bolsters accusations that not just autocratic regimes but democratic governments, including India and Mexico, have used NSO Group\u2019s Pegasus spyware for political ends....\n...This news report, thus, also appears to be a similar fishing expedition, based on conjectures and exaggerations to malign the Indian democracy and its institutions....\n...By closely examining the pattern of targeting by individual clients in the leaked data, media partners were able to identify 10 governments believed to be responsible for selecting the targets: Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India, and the United Arab Emirates....\n...In the past, similar claims were made regarding the use of Pegasus on WhatsApp by Indian state...."},"HLR data":{"judgment":"","sentences":"...Telecoms and surveillance experts say HLR data can sometimes be used in the early phase of a surveillance attempt, when identifying whether it is possible to connect to a phone...."},"the list":{"judgment":"","sentences":"...It said the 50,000 number was exaggerated and the list could not be a list of numbers targeted by governments using Pegasus ....\n...It said the 50,000 number was \u201Cexaggerated\u201D and the list could not be a list of numbers \u201Ctargeted by governments using Pegasus\u201D....\n...NSO Group has good reason to believe that claims that you have been provided with, are based on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers\u2019 targets of Pegasus or any other NSO products....\n...The Times said Hubbard and its former Mexico City bureau chief, Azam Ahmed, were on the list....\n...Her phone number was on the list, the Post reported...."},"itself":{"judgment":"","sentences":"...NSO Group describes itself as a cybertechnologies company....\n...Government of India\u2019s response to a right to information application about the use of Pegasus has been prominently reported by media and is in itself sufficient to counter any malicious claims about the alleged association between the government of India and Pegasus....\n...NSO Group describes itself as a cybertechnologies company Based in Israel, it says it develops technologies that governments and law enforcement agencies can use to track and intercept terror activity, break up organized crime operations, and even search for missing persons..."},"Turkey":{"judgment":"","sentences":"...It was six months after Khashoggi, a Washington Post columnist, was killed in Turkey by assassins dispatched by Saudi Arabia, a client of NSO....\n...It was six months after Khashoggi, a Washington Post columnist, was killed in Turkey by assassins dispatched by Saudi Arabia, a client of NSO...\n...\u201CThey saw Turkey as the heart of what they needed to control.\u201D..."},"the subject":{"judgment":"","sentences":"...NSO is the subject of multiple ongoing lawsuits and has been criticised by human rights groups, including Amnesty International, which has asked Israel\u2019s ministry of defence to revoke the company\u2019s export licences....\n...We remind you that the unfounded allegations already published by Amnesty International and relayed by Forbidden Stories have already been the subject of an official response by the Moroccan authorities, who categorically denied such allegations...."},"Toronto":{"judgment":"","sentences":"...Amnesty shared backup copies of four iPhones with Citizen Lab, a research group at the University of Toronto that specialises in studying Pegasus, which confirmed that they showed signs of Pegasus infection....\n...The consortium\u2019s findings build on extensive work by cybersecurity researchers, primarily from the University of Toronto-based watchdog Citizen Lab....\n...But the University of Toronto's Citizen Lab, through its research, has determined that its software basically can gain access to private or confidential information \u2014 an individual's smartphone, for example \u2014 and through it, see and hear all of its communications....\n...Amnesty shared \u201Cbackup copies\u201D of four iPhones with Citizen Lab, a research group at the University of Toronto that specialises in studying Pegasus, which confirmed that they showed signs of Pegasus infection...."},"Germany":{"judgment":"","sentences":"...Have you asked the same questions of the governments of the United States of America, the United Kingdom, Germany or France?...\n...Its members, who include Le Monde and Sueddeutsche Zeitung of Germany, are promising a series of stories based on the leak...."},"clients":{"judgment":"","sentences":"...Which NSO clients were selecting numbers?...\n...Forbidden Stories repeatedly imputes human rights abuses \u2013 including alleged murder and torture \u2013 to NSO Group based on alleged conduct by NSO Group\u2019s clients and unsupported logical leaps....\n...Who are NSO's clients?...\n...The presence in the data of a very small number of landlines and US numbers, which NSO says are technically impossible to access with its tools, reveals some targets were selected by NSO clients even though they could not be infected with Pegasus....\n...It is unclear whether Pegasus operators are required to conduct HRL lookup inquiries via its interface to use its software; an NSO source stressed its clients may have different reasons \u2013 unrelated to Pegasus \u2013 for conducting HLR lookups via an NSO system...."},"a surveillance attempt":{"judgment":"","sentences":"...Telecoms and surveillance experts say HLR data can sometimes be used in the early phase of a surveillance attempt, when identifying whether it is possible to connect to a phone...."},"NSO Group":{"judgment":"","sentences":"...State-sponsored actors like the NSO Group spend millions of dollars on sophisticated surveillance technologies without effective accountability....\n...Forbidden Stories repeatedly imputes human rights abuses \u2013 including alleged murder and torture \u2013 to NSO Group based on alleged conduct by NSO Group\u2019s clients and unsupported logical leaps....\n...NSO Group has good reason to believe that claims that you have been provided with, are based on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers\u2019 targets of Pegasus or any other NSO products....\n...NSO Group describes itself as a cybertechnologies company....\n...You can read NSO Group\u2019s full statement here...."},"a self-proclaimed champion":{"judgment":"","sentences":"...Yana Peel, the chief executive of the Serpentine Galleries and a self-proclaimed champion of free speech, co-owns NSO Group, a $1bn £790m...\n...Yana Peel, the chief executive of the Serpentine Galleries and a self-proclaimed champion of free speech, co-owns NSO Group, a $1bn (£790m) Israeli tech firm, according to corporate records in the US and Luxembourg...."},"The presence":{"judgment":"","sentences":"...The presence in the data of a very small number of landlines and US numbers, which NSO says are technically impossible to access with its tools, reveals some targets were selected by NSO clients even though they could not be infected with Pegasus....\n...The presence in the data of a very small number of landlines and US numbers, which NSO says are \u201Ctechnically impossible\u201D to access with its tools, reveals some targets were selected by NSO clients even though they could not be infected with Pegasus...."},"targets":{"judgment":"","sentences":"...The presence in the data of a very small number of landlines and US numbers, which NSO says are technically impossible to access with its tools, reveals some targets were selected by NSO clients even though they could not be infected with Pegasus....\n...NSO Group has good reason to believe that claims that you have been provided with, are based on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers\u2019 targets of Pegasus or any other NSO products....\n...Among more than two dozen previously documented Mexican targets are proponents of a soda tax, opposition politicians, human rights activists investigating a mass disappearance and the widow of a slain journalist....\n...The company has always said it does not have access to the data of its customers\u2019 targets....\n...AP\u2019s director of media relations, Lauren Easton, said the company is \u201Cdeeply troubled to learn that two AP journalists, along with journalists from many news organizations\u201D are on the list of the 1,000 potential targets for Pegasus infection...."},"surveillance experts":{"judgment":"E","sentences":"...Human rights groups, activists, and surveillance experts have accused NSO of licensing its powerful Pegasus software to countries, including Saudi Arabia, that have used it to target individuals, hack into their phones, and monitor their communications....\n...Telecoms and surveillance experts say HLR data can sometimes be used in the early phase of a surveillance attempt, when identifying whether it is possible to connect to a phone...."},"cameras":{"judgment":"","sentences":"...Pegasus infiltrates phones to vacuum up personal and location data and surreptitiously control the smartphone\u2019s microphones and cameras....\n...Pegasus infiltrates phones to vacuum up personal and location data and surreptitiously controls the smartphone\u2019s microphones and cameras....\n...The client appears to have used NSO\u2019s spyware, Pegasus, which can transform a phone into a surveillance device, with microphones and cameras activated without a user knowing....\n...Once a phone is infected, a Pegasus operator can secretly extract chats, photos, emails and location data, or activate microphones and cameras without a user knowing...."},"a database":{"judgment":"","sentences":"...The term HLR, or home location register, refers to a database that is essential to operating mobile phone networks...."},"an NSO source":{"judgment":"","sentences":"...It is unclear whether Pegasus operators are required to conduct HRL lookup inquiries via its interface to use its software; an NSO source stressed its clients may have different reasons \u2013 unrelated to Pegasus \u2013 for conducting HLR lookups via an NSO system...."},"individual clients":{"judgment":"","sentences":"...By closely examining the pattern of targeting by individual clients in the leaked data, media partners were able to identify 10 governments believed to be responsible for selecting the targets: Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India, and the United Arab Emirates...."},"The lawyers":{"judgment":"","sentences":"...The lawyers said NSO had reason to believe the list accessed by the consortium \u201Cis not a list of numbers targeted by governments using Pegasus, but instead, may be part of a larger list of numbers that might have been used by NSO Group customers for other purposes\u201D....\n...The lawyers said NSO had reason to believe the list accessed by the consortium is not a list of numbers targeted by governments using Pegasus, but instead, may be part of a larger list of numbers that might have been used by NSO Group customers for other purposes ...."},"spyware":{"judgment":"","sentences":"...The Facebook-owned company \u2014 which touts its \"simple, secure\" messaging \u2014 said it discovered spyware had been installed remotely on \"dozens\" of smart phones through the app....\n...Also this month, security researchers disclosed that Pegasus spyware was detected on the cellphones of six Palestinian human rights activists....\n...The consortium\u2019s \u201CPegasus Project\u201D reporting bolsters accusations that not just autocratic regimes but democratic governments, including India and Mexico, have used NSO Group\u2019s Pegasus spyware for political ends....\n...And Mexican prosecutors recently announced they have arrested a businessman on charges he used the Pegasus spyware to spy on a journalist....\n...Analysis of Rasheed\u2019s phone found evidence of an attempted hack in April 2019, but there was no evidence the spyware was successfully installed...."},"the technology":{"judgment":"","sentences":"...Novalpina Capital said in a statement early Wednesday that NSO's technology \"is designed in such a way that it can only be deployed by an intelligence or law enforcement agency to whom the technology is sold under licence....\n...Lawsuits against NSO allege the technology was used to target dissidents and their associates, including a friend of the Washington Post journalist Jamal Khashoggi, who was murdered in the Saudi consulate in Istanbul last year...."},"crime":{"judgment":"","sentences":"...NSO Group has broadly denied wrongdoing and said its products have been used by governments to prevent terrorism and crime....\n...Based in Israel, it says it develops technologies that governments and law enforcement agencies can use to track and intercept terror activity, break up organized crime operations, and even search for missing persons....\n...NSO boasts on its website that its technology \"has helped governments save thousands of lives, prevent terrorist attacks, break up major crimes, and make the world a safer place.\"...\n...law enforcement agencies governments break up organized crime operations ....\n...\"These softwares that NSO is marketing as tools to prevent terror and crime, are used against human rights defenders and lawyers and doctors and members of Parliament,\" Chen Brill-Egri of Amnesty International Israel told Reuters...."},"dissidents":{"judgment":"","sentences":"...An investigation by a global media consortium based on leaked targeting data provides further evidence that military-grade malware from Israel-based NSO Group, the world\u2019s most infamous hacker-for-hire outfit, is being used to spy on journalists, human rights activists and political dissidents....\n...In the Middle East, the victims have mostly been journalists and dissidents, allegedly targeted by the Saudi and United Arab Emirates governments....\n...She added that she was concerned his conversations with fellow dissidents might have been monitored through her phone....\n...Lawsuits against NSO allege the technology was used to target dissidents and their associates, including a friend of the Washington Post journalist Jamal Khashoggi, who was murdered in the Saudi consulate in Istanbul last year....\n...A leading human rights campaigner and head of a prestigious London art gallery is the co-owner of an Israeli cyberweapons company whose software has allegedly been used by authoritarian regimes to spy on dissidents, the Guardian can reveal...."},"60 clients":{"judgment":"","sentences":"...NSO claims to sell its tools to 60 clients in 40 countries, but refuses to identify them...."},"Android devices":{"judgment":"","sentences":"...Its flagship product is Pegasus, spying software \u2013 or spyware \u2013 that targets iPhones and Android devices....\n...Fifteen of the phones were Android devices, none of which showed evidence of successful infection...."},"NSO client":{"judgment":"E","sentences":"...Which NSO clients were selecting numbers?...\n...The presence in the data of a very small number of landlines and US numbers, which NSO says are technically impossible to access with its tools, reveals some targets were selected by NSO clients even though they could not be infected with Pegasus....\n...From a list of more than 50,000 cellphone numbers obtained by the Paris-based journalism non-profit Forbidden Stories and the human rights group Amnesty International and shared with 16 news organizations, journalists were able to identify more than 1,000 individuals in 50 countries who were allegedly selected by NSO clients for potential surveillance....\n...While the investigation mostly points to Khashoggi\u2019s close associates being targeted in the months after the murder, it also identified evidence suggesting that an NSO client targeted the phone of his wife, Hanan Elatr, several months before his death, between November 2017 and April 2018....\n...While the data is organised into clusters, indicative of individual NSO clients, it does not say which NSO client was responsible for selecting any given number...."},"The term":{"judgment":"","sentences":"...The term HLR, or home location register, refers to a database that is essential to operating mobile phone networks...."},"some targets":{"judgment":"","sentences":"...The presence in the data of a very small number of landlines and US numbers, which NSO says are technically impossible to access with its tools, reveals some targets were selected by NSO clients even though they could not be infected with Pegasus....\n...The presence in the data of a very small number of landlines and US numbers, which NSO says are \u201Ctechnically impossible\u201D to access with its tools, reveals some targets were selected by NSO clients even though they could not be infected with Pegasus...."},"law enforcement agencies":{"judgment":"E","sentences":"...NSO Group develops law enforcement agencies governments ....\n...Based in Israel, it says it develops technologies that governments and law enforcement agencies can use to track and intercept terror activity, break up organized crime operations, and even search for missing persons....\n...law enforcement agencies governments track ....\n...law enforcement agencies governments break up organized crime operations ....\n...law enforcement agencies governments intercept ...."},"the NSO Group":{"judgment":"E","sentences":"...State-sponsored actors like the NSO Group spend millions of dollars on sophisticated surveillance technologies without effective accountability....\n...Even if Forbidden Stories were correct that an NSO Group client in Mexico targeted the journalist\u2019s phone number in February 2017, that does not mean that the NSO Group client, or data collected by NSO Group software, were in any way connected to the journalist\u2019s murder the following month....\n...In the wake of the brutal murder of the journalist Jamal Khashoggi, the NSO Group emphatically denied that its government clients had used its hacking malware to target the journalist or his family....\n...In the wake of the brutal murder of the journalist Jamal Khashoggi, the NSO Group emphatically denied that its government clients had used its hacking malware to target the journalist or his family ...\n...Show The Pegasus project is a collaborative journalistic investigation into the NSO Group and its clients...."},"16 media organisations":{"judgment":"","sentences":"...Forbidden Stories, a Paris-based nonprofit journalism organisation, and Amnesty International initially had access to the list and shared access with 16 media organisations including the Guardian...."},"its government clients":{"judgment":"","sentences":"...its government clients target the journalist his family ....\n...In the wake of the brutal murder of the journalist Jamal Khashoggi, the NSO Group emphatically denied that its government clients had used its hacking malware to target the journalist or his family....\n...In the wake of the brutal murder of the journalist Jamal Khashoggi, the NSO Group emphatically denied that its government clients had used its hacking malware to target the journalist or his family ..."},"one case":{"judgment":"","sentences":"...In one case, a person in Khashoggi\u2019s inner circle was hacked four days after his murder, according to peer-reviewed forensic analysis of her device....\n...In one case highlighted by the Guardian, Mexican reporter Cecilio Pineda Birto was assassinated in 2017 a few weeks after his cell phone number appeared on the leaked list...."},"the United Arab Emirates":{"judgment":"","sentences":"...The material appears to show officials in the United Arab Emirates discussing whether to hack into the phones of senior figures in Saudi Arabia and Qatar, including members of the Qatari royal family....\n...By closely examining the pattern of targeting by individual clients in the leaked data, media partners were able to identify 10 governments believed to be responsible for selecting the targets: Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India, and the United Arab Emirates....\n...The investigation points to an apparent attempt by Saudi Arabia and its close ally the United Arab Emirates to leverage NSO\u2019s spy technology after Khashoggi\u2019s death to monitor his associates and the Turkish murder investigation, even going so far as to select the phone of Istanbul\u2019s chief prosecutor for potential surveillance....\n...The analysis indicated the targeting came from the United Arab Emirates, a Saudi ally....\n...The governments of the United Arab Emirates, Dubai, Saudi Arabia, Azerbaijan, Bahrain, Kazakhstan and Mexico did not respond to requests for comment...."},"attempted penetration":{"judgment":"","sentences":"...Of those, 23 were successfully infected and 14 showed signs of attempted penetration...."},"the company\u2019s spyware":{"judgment":"","sentences":"...The plaintiffs include Al-Jazeera journalists, as well as other Qatari, Mexican and Saudi journalists and activists who say the company\u2019s spyware was used to hack them....\n...Now a joint investigation by the Guardian and other media, based on leaked data and forensic analysis of phones, has uncovered new evidence that the company\u2019s spyware was used to try and monitor people close to Khashoggi both before and after his death...."},"Amnesty\u2019s Security Lab":{"judgment":"","sentences":"...Amnesty\u2019s Security Lab, a technical partner on the project, did the forensic analyses...."},"date":{"judgment":"","sentences":"...\u201CThe number of journalists identified as targets vividly illustrates how Pegasus is used as a tool to intimidate critical media....\n...This week, WhatsApp began urging its 1.5 billion or so users to update their apps to get the latest security patch....\n...The data also contains the time and date that numbers were selected, or entered on to a system....\n...However, forensic examinations of a small sample of mobile phones with numbers on the list found tight correlations between the time and date of a number in the data and the start of Pegasus activity \u2013 in some cases as little as a few seconds....\n...How do I update my WhatsApp app?..."},"federal court":{"judgment":"","sentences":"...In 2019, WhatsApp and its parent company Facebook sued NSO Group in U.S. federal court in San Francisco, accusing it of exploiting a flaw in the popular encrypted messaging service to target \u2014 with missed calls alone \u2014 some 1,400 users....\n...Apple said in a complaint filed in federal court in California that NSO Group employees are amoral 21st century mercenaries who have created highly sophisticated cyber-surveillance machinery that invites routine and flagrant abuse...."},"the spyware":{"judgment":"","sentences":"...Analysis of Rasheed\u2019s phone found evidence of an attempted hack in April 2019, but there was no evidence the spyware was successfully installed....\n...She said the AP was investigating to try to determine if its two staffers\u2019 devices were compromised by the spyware...."},"the start":{"judgment":"","sentences":"...However, forensic examinations of a small sample of mobile phones with numbers on the list found tight correlations between the time and date of a number in the data and the start of Pegasus activity \u2013 in some cases as little as a few seconds...."},"Shalev Hulio":{"judgment":"","sentences":"...We had nothing to do with this horrible murder, Shalev Hulio, the chief executive of the Israeli surveillance firm, told the US TV news programme 60 Minutes in March 2019...\n...We had nothing to do with this horrible murder,\u201D Shalev Hulio, the chief executive of the Israeli surveillance firm, told the US TV news programme 60 Minutes in March 2019...."},"a list":{"judgment":"","sentences":"...It said the 50,000 number was exaggerated and the list could not be a list of numbers targeted by governments using Pegasus ....\n...It said the 50,000 number was \u201Cexaggerated\u201D and the list could not be a list of numbers \u201Ctargeted by governments using Pegasus\u201D....\n...From a list of more than 50,000 cellphone numbers obtained by the Paris-based journalism non-profit Forbidden Stories and the human rights group Amnesty International and shared with 16 news organizations, journalists were able to identify more than 1,000 individuals in 50 countries who were allegedly selected by NSO clients for potential surveillance....\n...The lawyers said NSO had reason to believe the list accessed by the consortium \u201Cis not a list of numbers targeted by governments using Pegasus, but instead, may be part of a larger list of numbers that might have been used by NSO Group customers for other purposes\u201D....\n...NSO Group denied in an emailed response to AP questions that it has ever maintained \u201Ca list of potential, past or existing targets.\u201D..."},"the Serpentine Galleries":{"judgment":"","sentences":"...Yana Peel, the chief executive of the Serpentine Galleries and a self-proclaimed champion of free speech, co-owns NSO Group, a $1bn £790m...\n...Yana Peel, the chief executive of the Serpentine Galleries and a self-proclaimed champion of free speech, co-owns NSO Group, a $1bn (£790m) Israeli tech firm, according to corporate records in the US and Luxembourg...."},"use":{"judgment":"","sentences":"...Forbidden Stories repeatedly imputes human rights abuses \u2013 including alleged murder and torture \u2013 to NSO Group based on alleged conduct by NSO Group\u2019s clients and unsupported logical leaps....\n...It is unclear whether Pegasus operators are required to conduct HRL lookup inquiries via its interface to use its software; an NSO source stressed its clients may have different reasons \u2013 unrelated to Pegasus \u2013 for conducting HLR lookups via an NSO system....\n...The hacker would then use that missed call to slide a piece of malware onto the phone....\n...Amnesty\u2019s intervention followed a separate allegation that Pegasus was used in an attempted attack onthe mobile phone of a staff member....\n...NSO has not commented on the claims but promised to investigate all \u201Ccredible allegations of misuse\u201D...."},"these lists":{"judgment":"","sentences":"...After further questions, the lawyers said the consortium was basing its findings on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies ....\n...After further questions, the lawyers said the consortium was basing its findings \u201Con misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies\u201D...."},"some cases":{"judgment":"","sentences":"...However, forensic examinations of a small sample of mobile phones with numbers on the list found tight correlations between the time and date of a number in the data and the start of Pegasus activity \u2013 in some cases as little as a few seconds...."},"the world":{"judgment":"","sentences":"...And when the Ministry of Defence in Israel allows this to happen, it endangers millions of people around the world.\"...\n...An investigation by a global media consortium based on leaked targeting data provides further evidence that military-grade malware from Israel-based NSO Group, the world\u2019s most infamous hacker-for-hire outfit, is being used to spy on journalists, human rights activists and political dissidents....\n...NSO boasts on its website that its technology \"has helped governments save thousands of lives, prevent terrorist attacks, break up major crimes, and make the world a safer place.\"...\n...RICHMOND, Va. (AP) \u2014 Tech giant Apple announced Tuesday it is suing Israel\u2019s NSO Group, seeking to block the world\u2019s most infamous hacker-for-hire company from breaking into Apple's products, like the iPhone....\n...Security researchers have found Pegasus being used around the world to break into the phones of human rights activists, journalists and even members of the Catholic clergy...."},"good reason":{"judgment":"","sentences":"...NSO Group has good reason to believe that claims that you have been provided with, are based on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers\u2019 targets of Pegasus or any other NSO products....\n...But its behavior has drawn the most attention, and critics say that is with good reason...."},"Israeli tech firm":{"judgment":"","sentences":"...Israeli tech firm, according to corporate records in the US and Luxembourg...\n...Yana Peel, the chief executive of the Serpentine Galleries and a self-proclaimed champion of free speech, co-owns NSO Group, a $1bn (£790m) Israeli tech firm, according to corporate records in the US and Luxembourg...."},"the pattern":{"judgment":"","sentences":"...By closely examining the pattern of targeting by individual clients in the leaked data, media partners were able to identify 10 governments believed to be responsible for selecting the targets: Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India, and the United Arab Emirates...."},"its forensic researchers":{"judgment":"","sentences":"...Amnesty also reported that its forensic researchers had determined that NSO Group\u2019s flagship Pegasus spyware was successfully installed on the phone of Washington Post journalist Jamal Khashoggi\u2019s fiancee, Hatice Cengiz, just four days after he was killed in the Saudi Consulate in Istanbul in 2018....\n...Amnesty also reported that its forensic researchers had determined that NSO Group\u2019s flagship Pegasus spyware was successfully installed on the phone of Washington Post journalist Jamal Khashoggi\u2019s fiancee, Hatice Cengiz, just four days after he was killed in the Saudi Consulate in Istanbul in 2018..."},"members":{"judgment":"","sentences":"...We can confirm that our technology was not used to listen, monitor, track, or collect information regarding him or his family members mentioned in your inquiry.\u201D...\n...The material appears to show officials in the United Arab Emirates discussing whether to hack into the phones of senior figures in Saudi Arabia and Qatar, including members of the Qatari royal family....\n...We can confirm that our technology was not used to listen, monitor, track, or collect information regarding him or his family members mentioned in your inquiry....\n...\"These softwares that NSO is marketing as tools to prevent terror and crime, are used against human rights defenders and lawyers and doctors and members of Parliament,\" Chen Brill-Egri of Amnesty International Israel told Reuters....\n...Pegasus break into members of the Catholic clergy journalists human rights activists ...."},"a small sample":{"judgment":"","sentences":"...However, forensic examinations of a small sample of mobile phones with numbers on the list found tight correlations between the time and date of a number in the data and the start of Pegasus activity \u2013 in some cases as little as a few seconds...."},"the heinous murder":{"judgment":"","sentences":"...In a statement, NSO said: \u201COur technology was not associated in any way with the heinous murder of Jamal Khashoggi....\n...As NSO has previously stated, our technology was not associated in any way with the heinous murder of Jamal Khashoggi...."},"backup copies":{"judgment":"","sentences":"...Amnesty shared backup copies of four iPhones with Citizen Lab, a research group at the University of Toronto that specialises in studying Pegasus, which confirmed that they showed signs of Pegasus infection....\n...Amnesty shared \u201Cbackup copies\u201D of four iPhones with Citizen Lab, a research group at the University of Toronto that specialises in studying Pegasus, which confirmed that they showed signs of Pegasus infection...."},"Le Monde":{"judgment":"","sentences":"...The journalists work for organizations including The Associated Press, Reuters, CNN, The Wall Street Journal, Le Monde and The Financial Times....\n...Access to the data was then shared with the Guardian and 16 other news organisations, including the Washington Post, Le Monde, Die Zeit and Süddeutsche Zeitung....\n...Its members, who include Le Monde and Sueddeutsche Zeitung of Germany, are promising a series of stories based on the leak...."},"Facebook":{"judgment":"","sentences":"...The Facebook-owned company \u2014 which touts its \"simple, secure\" messaging \u2014 said it discovered spyware had been installed remotely on \"dozens\" of smart phones through the app....\n...Facebook Twitter Pinterest People view an Emma Kunz exhibition at the Serpentine Gallery earlier this year....\n...Facebook has sued NSO Group over the use of a somewhat similar exploit that allegedly intruded via its globally popular encrypted WhatsApp messaging app....\n...In 2019, WhatsApp and its parent company Facebook sued NSO Group in U.S. federal court in San Francisco, accusing it of exploiting a flaw in the popular encrypted messaging service to target \u2014 with missed calls alone \u2014 some 1,400 users....\n...It's the latest blow to the hacking firm, which was recently blacklisted by the U.S. Commerce Department and is currently being sued by social media giant Facebook...."},"government agencies":{"judgment":"","sentences":"...It is important to note that government agencies have a well-established protocol for interception, which includes sanction and supervision from highly ranked officials in central and state governments, for clear stated reasons only in national interest....\n...India\u2019s minister of electronics and IT has also spoken in detail, including in the parliament, that there has been no unauthorised interception by government agencies....\n...The company reiterated its claims that it only sells to \u201Cvetted government agencies\u201D for use against terrorists and major criminals and that it has no visibility into its customers\u2019 data...."},"missing persons":{"judgment":"","sentences":"...Based in Israel, it says it develops technologies that governments and law enforcement agencies can use to track and intercept terror activity, break up organized crime operations, and even search for missing persons....\n...law enforcement agencies governments search missing persons ....\n...NSO Group describes itself as a cybertechnologies company Based in Israel, it says it develops technologies that governments and law enforcement agencies can use to track and intercept terror activity, break up organized crime operations, and even search for missing persons..."},"Hungary":{"judgment":"","sentences":"...By closely examining the pattern of targeting by individual clients in the leaked data, media partners were able to identify 10 governments believed to be responsible for selecting the targets: Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India, and the United Arab Emirates....\n...In Hungary, state bodies authorised to use covert instruments are regularly monitored by governmental and non-governmental institutions....\n...Hungary is a democratic state governed by the rule of law, and as such, when it comes to any individual it has always acted and continues to act in accordance with the law in force....\n...Also on the lists were phones in countries including France, Hungary, India, Azerbaijan, Kazakhstan and Pakistan....\n...Hungary..."},"their general locations":{"judgment":"","sentences":"...Such registers keep records on the networks of phone users and their general locations, along with other identifying information that is used routinely in routing calls and texts...."},"a peer review":{"judgment":"","sentences":"...Citizen Lab also conducted a peer review of Amnesty\u2019s forensic methods, and found them to be sound...."},"Amnesty\u2019s forensic methods":{"judgment":"","sentences":"...Citizen Lab also conducted a peer review of Amnesty\u2019s forensic methods, and found them to be sound...."},"cybersecurity":{"judgment":"","sentences":"...Eva Galperin, director of cybersecurity at the Electronic Frontier Foundation and a strident critic, tweeted: \u201CIf this report was printed, it would not be worth the paper it was printed on.\u201D...\n...The consortium\u2019s findings build on extensive work by cybersecurity researchers, primarily from the University of Toronto-based watchdog Citizen Lab....\n...For any future inquires related to cybersecurity, please contact the National Cyber Security Authority (NCSA)....\n...The Biden administration announced this month that NSO Group and another Israeli cybersecurity firm called Candiru were being added to the entity list, which limits their access to U.S. components and technology by requiring government permission for exports...."},"Android":{"judgment":"","sentences":"...A forensic examination of Elatr\u2019s Android phone found that she was sent four text messages that contained malicious links connected to Pegasus....\n...However, unlike iPhones, phones that use Android do not log the kinds of information required for Amnesty\u2019s detective work....\n...The hack affected both Apple and Android users....\n...Three Android phones showed signs of targeting, such as Pegasus-linked SMS messages....\n...Its flagship product is Pegasus, spying software \u2013 or spyware \u2013 that targets iPhones and Android devices...."},"The data":{"judgment":"","sentences":"...The data also contains the time and date that numbers were selected, or entered on to a system....\n...The data leak is a list of more than 50,000 phone numbers that, since 2016, are believed to have been selected as those of people of interest by government clients of NSO Group, which sells surveillance software...."},"uncorroborated theories":{"judgment":"","sentences":"...NSO Group firmly denies false claims made in your report, many of which are uncorroborated theories that raise serious doubts about the reliability of your sources, as well as the basis of your story....\n...In a separate statement, it called the Forbidden Stories report \u201Cfull of wrong assumptions and uncorroborated theories.\u201D..."},"US numbers":{"judgment":"","sentences":"...The presence in the data of a very small number of landlines and US numbers, which NSO says are technically impossible to access with its tools, reveals some targets were selected by NSO clients even though they could not be infected with Pegasus....\n...We also stand by our previous statements that our products, sold to vetted foreign governments, cannot be used to conduct cybersurveillance within the United States, and no foreign customer has ever been granted technology that would enable them to access phones with US numbers....\n...The presence in the data of a very small number of landlines and US numbers, which NSO says are \u201Ctechnically impossible\u201D to access with its tools, reveals some targets were selected by NSO clients even though they could not be infected with Pegasus...."},"corporate records":{"judgment":"","sentences":"...Israeli tech firm, according to corporate records in the US and Luxembourg...\n...Yana Peel, the chief executive of the Serpentine Galleries and a self-proclaimed champion of free speech, co-owns NSO Group, a $1bn (£790m) Israeli tech firm, according to corporate records in the US and Luxembourg...."},"its software":{"judgment":"","sentences":"...It is unclear whether Pegasus operators are required to conduct HRL lookup inquiries via its interface to use its software; an NSO source stressed its clients may have different reasons \u2013 unrelated to Pegasus \u2013 for conducting HLR lookups via an NSO system....\n...It claims its software has helped save thousands of lives and denies its technology was in any way associated with Khashoggi\u2019s murder....\n...But the University of Toronto's Citizen Lab, through its research, has determined that its software basically can gain access to private or confidential information \u2014 an individual's smartphone, for example \u2014 and through it, see and hear all of its communications...."},"several months":{"judgment":"","sentences":"...More than 80 journalists have worked collaboratively over several months on the investigation, which was coordinated by Forbidden Stories....\n...More than 80 journalists have worked together over several months as part of the Pegasus project....\n...While the investigation mostly points to Khashoggi\u2019s close associates being targeted in the months after the murder, it also identified evidence suggesting that an NSO client targeted the phone of his wife, Hanan Elatr, several months before his death, between November 2017 and April 2018...."},"the customers' targets":{"judgment":"","sentences":"...After further questions, the lawyers said the consortium was basing its findings on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies ....\n...After further questions, the lawyers said the consortium was basing its findings \u201Con misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies\u201D...."},"the leaked data":{"judgment":"","sentences":"...By closely examining the pattern of targeting by individual clients in the leaked data, media partners were able to identify 10 governments believed to be responsible for selecting the targets: Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India, and the United Arab Emirates....\n...The Guardian, another consortium member, reported that Amnesty had found traces of Pegasus infections on the cellphones of 15 journalists who let their phones be examined after discovering their number was in the leaked data...."},"successful infection":{"judgment":"","sentences":"...Fifteen of the phones were Android devices, none of which showed evidence of successful infection...."},"10 governments":{"judgment":"","sentences":"...By closely examining the pattern of targeting by individual clients in the leaked data, media partners were able to identify 10 governments believed to be responsible for selecting the targets: Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India, and the United Arab Emirates...."},"the company\u2019s signature surveillance tool":{"judgment":"","sentences":"...While the data is an indication of intent, the presence of a number in the data does not reveal whether there was an attempt to infect the phone with spyware such as Pegasus, the company\u2019s signature surveillance tool, or whether any attempt succeeded...."},"NSO Group\u2019s full statement":{"judgment":"","sentences":"...You can read NSO Group\u2019s full statement here...."},"phones":{"judgment":"","sentences":"...The Facebook-owned company \u2014 which touts its \"simple, secure\" messaging \u2014 said it discovered spyware had been installed remotely on \"dozens\" of smart phones through the app....\n...Also this month, security researchers disclosed that Pegasus spyware was detected on the cellphones of six Palestinian human rights activists....\n...However, unlike iPhones, phones that use Android do not log the kinds of information required for Amnesty\u2019s detective work....\n...were among journalists on the list whose phones were successfully infected with Pegasus, the Guardian reported....\n...Amnesty examined 67 smartphones where attacks were suspected...."},"the Saudi consulate":{"judgment":"","sentences":"...Lawsuits against NSO allege the technology was used to target dissidents and their associates, including a friend of the Washington Post journalist Jamal Khashoggi, who was murdered in the Saudi consulate in Istanbul last year....\n...A team of Saudi agents killed Khashoggi inside the Saudi consulate in Istanbul during his visit there to pick up documents he needed to get married to his fiancee, Hatice Cengiz, who later became an outspoken advocate for accountability over his murder....\n...Khashoggi was killed and dismembered at the Saudi consulate in Istanbul in October 2018...."},"his family members":{"judgment":"","sentences":"...We can confirm that our technology was not used to listen, monitor, track, or collect information regarding him or his family members mentioned in your inquiry.\u201D...\n...We can confirm that our technology was not used to listen, monitor, track, or collect information regarding him or his family members mentioned in your inquiry...."},"the tests":{"judgment":"","sentences":"...For the remaining 30, the tests were inconclusive, in several cases because the handsets had been replaced...."},"government clients":{"judgment":"","sentences":"...its government clients target the journalist his family ....\n...In the wake of the brutal murder of the journalist Jamal Khashoggi, the NSO Group emphatically denied that its government clients had used its hacking malware to target the journalist or his family....\n...In the wake of the brutal murder of the journalist Jamal Khashoggi, the NSO Group emphatically denied that its government clients had used its hacking malware to target the journalist or his family ...\n...While a phone number\u2019s presence in the data does not mean an attempt was made to hack a device, the consortium said it believed the data indicated potential targets of NSO\u2019s government clients....\n...The consortium believes the data indicates the potential targets NSO\u2019s government clients identified in advance of possible surveillance...."},"HLR":{"judgment":"","sentences":"...What is HLR lookup data?...\n...It is unclear whether Pegasus operators are required to conduct HRL lookup inquiries via its interface to use its software; an NSO source stressed its clients may have different reasons \u2013 unrelated to Pegasus \u2013 for conducting HLR lookups via an NSO system....\n...NSO Group has good reason to believe that claims that you have been provided with, are based on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers\u2019 targets of Pegasus or any other NSO products....\n...The term HLR, or home location register, refers to a database that is essential to operating mobile phone networks....\n...After further questions, the lawyers said the consortium was basing its findings on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers' targets of Pegasus or any other NSO products ... we still do not see any correlation of these lists to anything related to use of NSO Group technologies ...."},"Saudi Arabia":{"judgment":"","sentences":"...Data analysis suggested that Saudi Arabia was behind her hacking....\n...It was six months after Khashoggi, a Washington Post columnist, was killed in Turkey by assassins dispatched by Saudi Arabia, a client of NSO....\n...Agnès Callamard, the secretary general of Amnesty International, which is a partner in the Pegasus project, said new discoveries about Khashoggi-related targets indicated an attempt by Saudi Arabia and others to gather intelligence on the fallout from the killing....\n...Saudi Arabia dispatched assassins ....\n...The material appears to show officials in the United Arab Emirates discussing whether to hack into the phones of senior figures in Saudi Arabia and Qatar, including members of the Qatari royal family...."},"targeting":{"judgment":"","sentences":"...An investigation by a global media consortium based on leaked targeting data provides further evidence that military-grade malware from Israel-based NSO Group, the world\u2019s most infamous hacker-for-hire outfit, is being used to spy on journalists, human rights activists and political dissidents....\n...By closely examining the pattern of targeting by individual clients in the leaked data, media partners were able to identify 10 governments believed to be responsible for selecting the targets: Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India, and the United Arab Emirates....\n...Three Android phones showed signs of targeting, such as Pegasus-linked SMS messages....\n...The analysis indicated the targeting came from the United Arab Emirates, a Saudi ally....\n...\u201CThe targeting indicates a clear intention to know what the prosecutor and a few other high political actors were doing,\u201D she said...."},"its clients":{"judgment":"","sentences":"...It is unclear whether Pegasus operators are required to conduct HRL lookup inquiries via its interface to use its software; an NSO source stressed its clients may have different reasons \u2013 unrelated to Pegasus \u2013 for conducting HLR lookups via an NSO system....\n...NSO Group does not disclose its clients and says it sells its technology to Israeli-approved governments to help them target terrorists and break up pedophile rings and sex- and drug-trafficking rings....\n...Show The Pegasus project is a collaborative journalistic investigation into the NSO Group and its clients....\n...Correlation does not equal causation, and the gunmen who murdered the journalist could have learned of his location at a public carwash through any number of means not related to NSO Group, its technologies, or its clients...."},"any form":{"judgment":"","sentences":"...\"We abhor any form of misuse of any form of surveillance technology by any government, agency or individual, and we particularly condemn without hesitation any such misuse directed at people who are vulnerable simply as a consequence of their commitment to report on, speak out for or defend human rights,\" said Stephen Peel, founding partner of Novalpina....\n...Rwanda does not use this software system, as previously confirmed in November 2019, and does not possess this technical capability in any form...."},"human rights activists":{"judgment":"","sentences":"...Also this month, security researchers disclosed that Pegasus spyware was detected on the cellphones of six Palestinian human rights activists....\n...Among more than two dozen previously documented Mexican targets are proponents of a soda tax, opposition politicians, human rights activists investigating a mass disappearance and the widow of a slain journalist....\n...An investigation by a global media consortium based on leaked targeting data provides further evidence that military-grade malware from Israel-based NSO Group, the world\u2019s most infamous hacker-for-hire outfit, is being used to spy on journalists, human rights activists and political dissidents....\n...They include 189 journalists, more than 600 politicians and government officials, at least 65 business executives, 85 human rights activists and several heads of state, according to The Washington Post, a consortium member....\n...Pegasus break into members of the Catholic clergy journalists human rights activists ...."},"an indication":{"judgment":"","sentences":"...While the data is an indication of intent, the presence of a number in the data does not reveal whether there was an attempt to infect the phone with spyware such as Pegasus, the company\u2019s signature surveillance tool, or whether any attempt succeeded...."},"the chief executive":{"judgment":"","sentences":"...the chief executive of the Israeli surveillance firm told the US TV news programme 60 Minutes ....\n...We had nothing to do with this horrible murder, Shalev Hulio, the chief executive of the Israeli surveillance firm, told the US TV news programme 60 Minutes in March 2019...\n...the chief executive of the Israeli surveillance firm tell the US TV news programme 60 Minutes ....\n...We had nothing to do with this horrible murder,\u201D Shalev Hulio, the chief executive of the Israeli surveillance firm, told the US TV news programme 60 Minutes in March 2019....\n...Yana Peel, the chief executive of the Serpentine Galleries and a self-proclaimed champion of free speech, co-owns NSO Group, a $1bn £790m..."},"Yana Peel":{"judgment":"","sentences":"...Yana Peel, the chief executive of the Serpentine Galleries and a self-proclaimed champion of free speech, co-owns NSO Group, a $1bn £790m...\n...Yana Peel, the chief executive of the Serpentine Galleries and a self-proclaimed champion of free speech, co-owns NSO Group, a $1bn (£790m) Israeli tech firm, according to corporate records in the US and Luxembourg...."},"Forbidden Stories":{"judgment":"","sentences":"...Forbidden Stories repeatedly imputes human rights abuses \u2013 including alleged murder and torture \u2013 to NSO Group based on alleged conduct by NSO Group\u2019s clients and unsupported logical leaps....\n...Even if Forbidden Stories were correct that an NSO Group client in Mexico targeted the journalist\u2019s phone number in February 2017, that does not mean that the NSO Group client, or data collected by NSO Group software, were in any way connected to the journalist\u2019s murder the following month....\n...More than 80 journalists have worked collaboratively over several months on the investigation, which was coordinated by Forbidden Stories....\n...We remind you that the unfounded allegations already published by Amnesty International and relayed by Forbidden Stories have already been the subject of an official response by the Moroccan authorities, who categorically denied such allegations....\n...From a list of more than 50,000 cellphone numbers obtained by the Paris-based journalism non-profit Forbidden Stories and the human rights group Amnesty International and shared with 16 news organizations, journalists were able to identify more than 1,000 individuals in 50 countries who were allegedly selected by NSO clients for potential surveillance...."},"France":{"judgment":"","sentences":"...Have you asked the same questions of the governments of the United States of America, the United Kingdom, Germany or France?...\n...Also on the lists were phones in countries including France, Hungary, India, Azerbaijan, Kazakhstan and Pakistan...."},"NSO\u2019s government clients":{"judgment":"","sentences":"...While a phone number\u2019s presence in the data does not mean an attempt was made to hack a device, the consortium said it believed the data indicated potential targets of NSO\u2019s government clients....\n...The consortium believes the data indicates the potential targets NSO\u2019s government clients identified in advance of possible surveillance...."},"his family":{"judgment":"","sentences":"...its government clients target the journalist his family ....\n...We can confirm that our technology was not used to listen, monitor, track, or collect information regarding him or his family members mentioned in your inquiry.\u201D...\n...In the wake of the brutal murder of the journalist Jamal Khashoggi, the NSO Group emphatically denied that its government clients had used its hacking malware to target the journalist or his family....\n...In the wake of the brutal murder of the journalist Jamal Khashoggi, the NSO Group emphatically denied that its government clients had used its hacking malware to target the journalist or his family ...\n...We can confirm that our technology was not used to listen, monitor, track, or collect information regarding him or his family members mentioned in your inquiry...."},"its interface":{"judgment":"","sentences":"...It is unclear whether Pegasus operators are required to conduct HRL lookup inquiries via its interface to use its software; an NSO source stressed its clients may have different reasons \u2013 unrelated to Pegasus \u2013 for conducting HLR lookups via an NSO system...."},"February":{"judgment":"","sentences":"...Even if Forbidden Stories were correct that an NSO Group client in Mexico targeted the journalist\u2019s phone number in February 2017, that does not mean that the NSO Group client, or data collected by NSO Group software, were in any way connected to the journalist\u2019s murder the following month....\n...However, Peel, who has declared the Serpentine a \u201Csafe space for unsafe ideas\u201D and served as a judge for international freedom-of-expression awards, defended her stake in NSO, which she has held since February...."},"other spying activities":{"judgment":"","sentences":"...The company had previously been implicated in other spying activities on Khashoggi....\n...The company had previously been implicated in other spying activities on Khashoggi..."},"NSO Group\u2019s flagship Pegasus spyware":{"judgment":"","sentences":"...Amnesty also reported that its forensic researchers had determined that NSO Group\u2019s flagship Pegasus spyware was successfully installed on the phone of Washington Post journalist Jamal Khashoggi\u2019s fiancee, Hatice Cengiz, just four days after he was killed in the Saudi Consulate in Istanbul in 2018....\n...Amnesty also reported that its forensic researchers had determined that NSO Group\u2019s flagship Pegasus spyware was successfully installed on the phone of Washington Post journalist Jamal Khashoggi\u2019s fiancee, Hatice Cengiz, just four days after he was killed in the Saudi Consulate in Istanbul in 2018..."},"The Associated Press":{"judgment":"","sentences":"...The journalists work for organizations including The Associated Press, Reuters, CNN, The Wall Street Journal, Le Monde and The Financial Times....\n...A spokesperson for WhatsApp later told The Associated Press: \"We're certainly not refuting any of the [news] coverage you've seen.\"..."},"Rwanda":{"judgment":"","sentences":"...By closely examining the pattern of targeting by individual clients in the leaked data, media partners were able to identify 10 governments believed to be responsible for selecting the targets: Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India, and the United Arab Emirates....\n...Rwanda does not use this software system, as previously confirmed in November 2019, and does not possess this technical capability in any form....\n...Rwanda...\n...These false accusations are part of an ongoing campaign to cause tensions between Rwanda and other countries, and to sow disinformation about Rwanda domestically and internationally...."},"personal and location data":{"judgment":"","sentences":"...Pegasus infiltrates phones to vacuum up personal and location data and surreptitiously control the smartphone\u2019s microphones and cameras....\n...Pegasus infiltrates phones to vacuum up personal and location data and surreptitiously controls the smartphone\u2019s microphones and cameras...."},"the phones":{"judgment":"","sentences":"...The material appears to show officials in the United Arab Emirates discussing whether to hack into the phones of senior figures in Saudi Arabia and Qatar, including members of the Qatari royal family....\n...Security researchers have found Pegasus being used around the world to break into the phones of human rights activists, journalists and even members of the Catholic clergy....\n...Fifteen of the phones were Android devices, none of which showed evidence of successful infection...."},"the networks":{"judgment":"","sentences":"...Such registers keep records on the networks of phone users and their general locations, along with other identifying information that is used routinely in routing calls and texts...."},"More than 80 journalists":{"judgment":"","sentences":"...More than 80 journalists have worked collaboratively over several months on the investigation, which was coordinated by Forbidden Stories....\n...More than 80 journalists have worked together over several months as part of the Pegasus project...."},"a few seconds":{"judgment":"","sentences":"...However, forensic examinations of a small sample of mobile phones with numbers on the list found tight correlations between the time and date of a number in the data and the start of Pegasus activity \u2013 in some cases as little as a few seconds...."},"intent":{"judgment":"","sentences":"...The phone analysis discoveries and leaked phone records suggest that Saudi Arabia and its allies used NSO\u2019s spyware in the aftermath of the murder to monitor the campaign for justice led by friends and associates of Khashoggi, while also showing an intent to spy on the official Turkish inquiry into his murder....\n...While the data is an indication of intent, the presence of a number in the data does not reveal whether there was an attempt to infect the phone with spyware such as Pegasus, the company\u2019s signature surveillance tool, or whether any attempt succeeded....\n...\u201CThe targeting indicates a clear intention to know what the prosecutor and a few other high political actors were doing,\u201D she said...."},"forensic analysis":{"judgment":"","sentences":"...In one case, a person in Khashoggi\u2019s inner circle was hacked four days after his murder, according to peer-reviewed forensic analysis of her device....\n...What did forensic analysis reveal?...\n...Now a joint investigation by the Guardian and other media, based on leaked data and forensic analysis of phones, has uncovered new evidence that the company\u2019s spyware was used to try and monitor people close to Khashoggi both before and after his death...."},"Pegasus-linked SMS messages":{"judgment":"","sentences":"...Three Android phones showed signs of targeting, such as Pegasus-linked SMS messages...."},"the early phase":{"judgment":"","sentences":"...Telecoms and surveillance experts say HLR data can sometimes be used in the early phase of a surveillance attempt, when identifying whether it is possible to connect to a phone...."},"Pegasus operators":{"judgment":"","sentences":"...It is unclear whether Pegasus operators are required to conduct HRL lookup inquiries via its interface to use its software; an NSO source stressed its clients may have different reasons \u2013 unrelated to Pegasus \u2013 for conducting HLR lookups via an NSO system...."},"Mexico":{"judgment":"","sentences":"...The Times said Hubbard and its former Mexico City bureau chief, Azam Ahmed, were on the list....\n...Even if Forbidden Stories were correct that an NSO Group client in Mexico targeted the journalist\u2019s phone number in February 2017, that does not mean that the NSO Group client, or data collected by NSO Group software, were in any way connected to the journalist\u2019s murder the following month....\n...The consortium\u2019s \u201CPegasus Project\u201D reporting bolsters accusations that not just autocratic regimes but democratic governments, including India and Mexico, have used NSO Group\u2019s Pegasus spyware for political ends....\n...Citizen Lab says NSO's technologies have been used by some 45 countries, including Mexico, Bahrain, Morocco, Saudi Arabia and the U.A.E. The Financial Times, citing an unnamed NSO investor, reports that half of the group's revenues come from the Middle East, but that it has contracts with 21 EU countries, as well....\n...NSO Group\u2019s spyware has been implicated in targeted surveillance chiefly in the Middle East and Mexico...."},"a statement":{"judgment":"","sentences":"...Novalpina Capital said in a statement early Wednesday that NSO's technology \"is designed in such a way that it can only be deployed by an intelligence or law enforcement agency to whom the technology is sold under licence....\n...In a statement, NSO said: \u201COur technology was not associated in any way with the heinous murder of Jamal Khashoggi....\n...\"NSO would not or could not use its technology in its own right to target any person or organization,\" it said in a statement Tuesday...."},"surveillance technology":{"judgment":"","sentences":"...The company sells surveillance technology to governments worldwide....\n...\"We abhor any form of misuse of any form of surveillance technology by any government, agency or individual, and we particularly condemn without hesitation any such misuse directed at people who are vulnerable simply as a consequence of their commitment to report on, speak out for or defend human rights,\" said Stephen Peel, founding partner of Novalpina...."},"You":{"judgment":"","sentences":"...You can find out here....\n...You can read NSO Group\u2019s full statement here...."}}