For over a decade, the architects of commercial government spyware have consistently asserted that their sophisticated surveillance technologies are exclusively designed for targeting serious criminals and terrorists, and only under strictly limited circumstances. This defense, however, increasingly clashes with a mounting body of evidence drawn from hundreds of documented instances of spyware abuse across the globe. These cases reveal a disturbing reality: the actual deployment of these tools frequently deviates from their stated purpose, ensnaring individuals far removed from the realm of high-stakes national security threats.
A Pervasive Threat Beyond Borders
The proliferation of these invasive technologies has painted a stark picture of their misuse, extending far beyond the initial assurances provided by their creators. Journalists, human rights activists, political opposition figures, and even legal professionals have repeatedly found themselves in the crosshairs, not only in autocratic regimes but also, surprisingly, within established democratic nations. The latest confirmed incident, involving a political consultant working for left-wing politicians in Italy, underscores this alarming trend, revealing him as a recent victim of Paragon spyware within the country. This particular case highlights that spyware attacks are no longer confined to "rare" or "limited" occurrences against a select few; instead, they are becoming a widespread and accessible instrument of surveillance.
Eva Galperin, director of cybersecurity at the Electronic Frontier Foundation, a prominent organization that has extensively researched spyware, observes a fundamental misconception surrounding the targeting criteria for government surveillance tools. "I think that there is some misunderstanding at the heart of stories about who gets targeted by this kind of government spyware, which is that if you are targeted, you are Public Enemy Number One," Galperin explained. This perception, she argues, obscures the true scope of abuse. "In reality, because targeting is so easy, we have seen governments use surveillance malware to spy on a broad range of people, including relatively minor political opponents, activists, and journalists," she added, emphasizing how the ease of deployment lowers the bar for who becomes a target.
The Business Model Behind Surveillance
Several inherent characteristics of the commercial spyware market contribute to the observed frequency of abuse. At its core, the business model adopted by many surveillance vendors, such as NSO Group, Paragon, and others, often incentivizes broader deployment rather than strict limitation. Typically, an intelligence or law enforcement agency pays a substantial upfront fee to acquire the core technology. This initial payment is often structured around the number of concurrent targets the purchasing government can monitor at any given moment. Subsequent, lower fees cover software updates and technical support, but the initial capacity directly correlates with the acquisition cost: more targets equate to a higher price tag.
Historical data, including previously leaked documents from the now-defunct surveillance firm Hacking Team, illustrate this model. These records show that some government and police customers were able to monitor anywhere from a handful of individuals to an unlimited number of devices simultaneously. While some democratic nations tended to opt for more restricted target capacities, it was not uncommon for countries with dubious human rights records to acquire licenses permitting an exceptionally high volume of concurrent spyware targets. Granting such expansive targeting capabilities to governments with a demonstrated appetite for intrusive surveillance almost inevitably guaranteed that these tools would be deployed against a far wider demographic than just criminals and terrorists. This economic structure inherently creates a perverse incentive for governments to maximize their investment by expanding their surveillance activities.
A Brief History of Digital Espionage
The journey to today’s sophisticated commercial spyware market has a rich, albeit concerning, history. Early forms of digital surveillance, primarily developed by state intelligence agencies, relied on bespoke tools and often required physical access or social engineering to install. However, the early 2010s marked a significant turning point with the emergence of a vibrant commercial market. Companies like Hacking Team, and later NSO Group with its infamous Pegasus spyware, began to democratize state-level surveillance capabilities.
These firms specialized in discovering "zero-day" exploits – vulnerabilities in software unknown to the vendor – and packaging them into user-friendly surveillance platforms. The ability to silently infiltrate smartphones and computers, often without any interaction from the target (known as "zero-click" exploits), revolutionized digital espionage. This commercialization lowered the barrier to entry for governments worldwide, enabling even smaller nations to acquire capabilities previously reserved for major powers. This shift transformed surveillance from a highly specialized state-run operation into an off-the-shelf product, readily available to any government with sufficient funds and a willingness to operate in a legal gray area.
Over the years, numerous instances have exposed the scope of this global surveillance industry. Morocco, the United Arab Emirates (on multiple occasions), and Saudi Arabia (several times) have been implicated in targeting journalists and activists using these tools. Security researcher Runa Sandvik, who specializes in assisting journalists and activists at high risk of digital attack, maintains an extensive and continually updated public list detailing cases of spyware abuse worldwide, providing a stark testament to the pervasive nature of the problem.
Ease of Use and the "Abuse Temptation"
Beyond the economic incentives, the technical design of modern commercial spyware plays a critical role in facilitating its misuse. Systems like NSO’s Pegasus or Paragon’s Graphite are engineered for extreme ease of use. In practical terms, these platforms often function as intuitive consoles where police or government officials merely input a phone number or email address, and the complex process of infiltration and data exfiltration unfolds automatically in the background. This simplification removes technical hurdles, making advanced surveillance accessible even to operators with limited cybersecurity expertise.
John Scott-Railton, a senior researcher at The Citizen Lab, an academic research institution that has investigated spyware companies and their abuses for over a decade, points to a "huge abuse temptation" inherent in such powerful and user-friendly tools. This temptation is amplified by the general lack of transparency and accountability surrounding their deployment. Governments, perceiving little risk of repercussion, feel emboldened to deploy this exceptionally invasive technology against a broad spectrum of perceived opponents, from prominent critics to "relatively small fish," as Galperin notes. The chilling effect this creates on free speech, assembly, and political opposition is profound, eroding the foundational principles of open societies.
Social, Cultural, and Democratic Fallout
The widespread misuse of commercial government spyware carries significant social, cultural, and democratic repercussions. For journalists, the threat of surveillance can compromise sources, expose sensitive investigations, and ultimately stifle independent reporting crucial for public accountability. Activists face similar risks, with their organizing efforts, communications, and personal safety jeopardized, leading to self-censorship and a chilling effect on legitimate dissent. Political opponents find their strategies and personal lives exposed, creating an unfair and undemocratic playing field.
Culturally, the knowledge that such pervasive surveillance is possible can foster an environment of distrust in digital communications and, by extension, in institutions that are supposed to protect privacy and civil liberties. It normalizes the idea of constant monitoring, gradually eroding the expectation of privacy that underpins personal autonomy and freedom. Democratically, the ability of governments to secretly monitor and potentially manipulate political discourse poses a direct threat to fair elections and the integrity of the democratic process itself, as warned by Scott-Railton. When dissent can be so easily silenced or preempted through digital means, the very mechanisms of checks and balances are undermined.
The Battle for Accountability
Despite the grim landscape, there are emerging signs of a nascent push for accountability. Some spyware vendors have publicly claimed to take action against misuse. Paragon, for instance, controversially announced it had cut ties with the Italian government earlier this year, citing the authorities’ alleged refusal to cooperate in investigations into abuses involving its spyware. Similarly, NSO Group revealed in court documents that it had disconnected 10 government customers in recent years due to abuses of its Pegasus spyware, though it notably declined to name the implicated countries. The lack of transparency surrounding these disconnections raises questions about the true extent and effectiveness of such measures, particularly given numerous documented cases of abuse in countries like Mexico and Saudi Arabia, which remain unaddressed by NSO.
On the customer side, some nations have initiated their own probes. Greece and Poland, for example, have launched investigations into alleged spyware abuses within their borders, signaling a growing recognition of the domestic impact of these tools. Internationally, the United States, under the Biden administration, has taken concrete steps by imposing sanctions on several spyware makers, including NSO Group, Cytrox, and Intellexa, along with their executives. These sanctions place the companies on economic blocklists, restricting their access to U.S. technology and financial systems in an effort to curb their operations. Beyond sanctions, a diplomatic initiative, known as the "Pall Mall Process" and spearheaded by the U.K. and France, seeks to establish international norms and guidelines to rein in the commercial spyware market through multilateral cooperation.
Challenges and the Path Forward
However, it remains to be seen whether these fragmented efforts will genuinely curb or limit a global, multibillion-dollar market. The fundamental challenge lies in the supply-and-demand dynamic: a seemingly endless appetite from governments for sophisticated surveillance tools is readily met by companies more than willing to supply them. The opaque nature of national security interests often provides a convenient shield for these transactions, making international regulation incredibly difficult.
The continuous cat-and-mouse game between exploit developers and cybersecurity defenders means that even as vulnerabilities are patched, new ones are discovered, perpetuating the cycle. Addressing this pervasive threat requires a multi-pronged approach: stronger domestic legal frameworks that mandate transparency and judicial oversight for surveillance tool procurement and deployment, robust international cooperation to establish clear ethical guidelines and enforcement mechanisms, and sustained pressure on both vendors and purchasing governments. Ultimately, the struggle to contain commercial government spyware is a critical battle for the future of digital rights, privacy, and the integrity of democratic societies worldwide.





