New Delhi: Forbidden Stories, Website and Amnesty International have access to 50,000 phone numbers from NSO clients selected for supervision.
NSO makes Pegasus software.
What you want to know about Pegasus’s controversy in the Indian context.
Q.
Does the investigation targeted against India? A.
Investigation is carried out by 17 media institutions worldwide and covering 45 countries.
Q.
What is the Indonesian Government’s response? A.
Reports issuers state that it cannot be said if the numbers in the list published are under supervision.
The company whose technology is thought to have been used has denied this claim directly.
And the time tested process in our country is established to ensure that unauthorized supervision does not occur, IT Minister Ashwini Vaishnaw said in parliament.
Q.
What does the government say about supervision? A.
In India, there are established procedures where legal interception of electronic communication is carried out for national security purposes, especially in general emergencies or for the benefit of public safety, by institutions in the central and countries.
This legitimate demand for commercial electronics is made according to the relevant rules under the provisions of Part 5 (2) of the Indian Telegraph Act, 1885 and Section 69 of Information Technology, 2000.
Q.
How many journalists are under supervision? A.
180 Worldwide includes the largest media platform, where 49 is India.
Q.
Which countries are found using Pegasus on journalists, activists and opposition leaders? A.
Countries mentioned in the report are: Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, United Arab Emirates (UAE) and India.
Q.
Who is all the potential targeted in India? A.
49 Indian journalists, 3 opposition leaders, 2 ministers, just a SC judge sitting into a target.
Business people are also targeted.
Q.
How confident will peek? A.
Amnesty International Security Lab, in partnership with illegal stories, carried out forensic analysis on cellphones more than a dozen of these journalists � and 67 telephone in total ï½ revealed their successful infection was then reviewed by Canadian technology.
Companies that specialize in Pegasus.
Both confirmed the infection.
NSO, a company that has technology has said: ‘NSO Group believes that it claims that you have been given, based on interpretation that misleads leaking data from basic information, such as HLR search services, which do not have bearings on the list of target customers Pegasus or other NSO products.
Such services are available openly to anyone, anywhere, and anytime, and are usually used by government institutions and by private companies throughout the world.
It also does not deny that the data has nothing to do with supervision or by NSO, so there is no factual basis to show that data usage is somehow the same as supervision.
‘Q.
Is it possible to lurk and what the procedure? A.
Each case of interception or monitoring is approved by the competent authority.
These strengths are also available for competent authorities in the state government in accordance with it (procedures and protection for information, monitoring and description of information) Rules, 2009.
There is an established supervision mechanism in the form of the review committee led by Union.
Cabinet Secretary.
In the case of the state government, such cases are reviewed by the committee led by the chief secretary related.
This law also provides an adjudication process for those who are negatively affected by any incident.
Therefore the procedure ensures that any interception or monitoring of any information is carried out in accordance with the legal process.
The framework and institution have survived the test of time, the Indonesian government said.
Q.
Does the Indonesian Government accept that there is snooping? A.
The Indonesian government said it clearly appeared that there was no substance behind this sensationalism.
The report itself clarified that there was no number of reconnaissance.
Quote the report, “The presence of a telephone number in the data does not disclose whether the device is infected with Pegasus or subject to hacking.
Without submitting a telephone to this technical analysis, it is impossible to convincingly states whether it witnessed the attack or successfully compromised ‘.