Police officer who was in charge of targeting a political activist, who demonstrated against Netanyhu, stated that the decision to monitor the guy with NSO’s malware Pegasus was “out of worry that he would commit aggravated public order breaches.” and that the activist is a “threat to democracy.”
The police investigators got access to all of the data on the activist phone. They could read his emails, listen to his phone calls, and see chats through the phone’s history.
The search rais that he is a user of the male dating service “Grindr.” This information was included in his case file, which stated: “he is evidently seeing men while married as leverage for an inquiry, preparing confidentiality, and obtaining a wiretap warrant.”
Additionally, after reading his chats with other men on the dating app, the investigators supplied the tracking unit details about his meeting locations with other men so they could follow him.
Despite the fact that the police can seek a wiretap court order only if they have sufficient information to initiate an inquiry, the use of Pegasus to monitor people occurred during the intelligence collection early stage. Prior to the initiation of an undercover investigation.
Not only did the police target him without a legal basis, but they also retrospectively obtained a wiretap to make the move appear lawful.
“The circumstances reported are unknown to the police, and it appears as though there is an interest in omitting details that would preclude an in-depth study,” the Israel Police stated in a statement.
“The more information we obtain regarding this, the more completely we can evaluate the case. To emphasize, there is no basis for any of the assertions made in the publication; all police action in this field is legal and is conducted in accordance with strict work practices and court directives. It’s unfortunate that an attempt is being made to undermine police activities without justification.”
“We are not familiar with the case,” the Justice Ministry stated in a statement. The attorney general’s office and the deputy attorney general establish procedures for eavesdropping computer communications. Additionally, there are no special methods for every particular company or piece of software.