מצלמות עוקבות אחרי אזרחים
Photo: Shutterstock
Former Police Commissioner Kobi Shabtai and NSO offices

Police used NSO malware to track activist's secret use of gay dating app

Calcalist expose reveals source from police's special operation unit who was in charge of tapping activist's phone with Pegasus, called individual 'danger to democracy'; said info on his use of Grindr while married 'serves as leverage' in investigation

Tomer Ganon, Calcalist |
Published: 01.20.22, 12:13
The Israeli police used the NSO Group spyware to monitor social activist's secret use of a gay dating app, with the data classified as "leverage for investigation," according to a report released Thursday.
  • Follow Ynetnews on Facebook and Twitter

  • The financial daily Calcalist, Ynet's sister outlet, on Tuesday released a two-part exposé into the law enforcement organization's dealings, which revealed the police's SIGINT unit has been allegedly employing the controversial Pegasus malware to spy on civilians.
    3 View gallery
    Former Police Commissioner Kobi Shabtai and NSO offices
    Former Police Commissioner Kobi Shabtai and NSO offices
    Former Police Commissioner Kobi Shabtai and NSO offices
    (Photo: AFP, Elad Gershgorn)
    The second part of that report, released on Thursday, revealed the process of spying on one particular activist, who to this day doesn't know he was being monitored.
    An official from Israel Police Special Forces Unit, who was in charge of targeting the activist, said the command's decision to monitor the individual using Pegasus was taken out of concern he might commit "aggravated public order violations". He also mentioned, ironically, that the activist is a "danger to democracy."
    The police officer then provided the investigators the activist's phone number, and a short time after that, the person's phone was remotely tapped with NSO's malware. From that moment on, all the data on the phone was available for the investigators, they could see everything he does, go through his emails, listen to all of his conversations, and so on. While one police investigator monitored everything in real-time, another went through the phone's history.
    3 View gallery
    מצלמות עוקבות אחרי אזרחים
    מצלמות עוקבות אחרי אזרחים
    (Photo: Shutterstock)
    The tracking of the activist's phone allowed the investigators to find out he is using a male dating services app called "Grindr". This information was added to his case file, which read: "he is meeting men, apparently, while being married, it is leverage for investigation, prepare confidentiality, and a wiretap warrant."
    While the Israel Police denied allegations it made use of the Pegasus malware without legal supervision, the targeting of the activist appears to show the exact opposite. Not only did police target his without any judicial justification, in order to hide the move, the law enforcement retroactively requested a wiretap to make it appear legal.
    However, the use of Pegasus to monitor civilians was done at the intelligence-gathering stage - before an undercover investigation was opened - even though the police can ask for a wiretap court order only if it has enough information to launch an investigation.
    Furthermore, after the police's cyber unit read the activist's chat with other men in the dating app, the investigators gave the information about his meeting places with other men to the tracking unit so they could follow him.
    3 View gallery
    מעקב ממוחשב
    מעקב ממוחשב
    (Photo: Shutterstock)
    The Israel Police said in a statement: "The events described are unknown to the police and it seems that there is an interest in subtracting details that won't allow for an in-depth examination. The more details we receive about this, he better we can examine the case thoroughly. We emphasize that there is no basis for any claims made in the publication, all police activity in this field is legal, based on court orders and meticulous work practices. It is a shame there is an attempt to undermine police activity without any basis."
    The Justice Ministry said in a statement: "We're not familiar with the case. Procedures for wiretapping communication between computers are approved by the attorney general's office and the deputy attorney general. Furthermore, there are no special procedures for any company or software."
    Talkbacks for this article 0