SlideShare a Scribd company logo
1 of 6
Download to read offline
The SC is asked to
investigate the Pegasus
allegations by senior
journalists
Veteran journalists N Ram and Sashi
Kumar have moved the Supreme Court in
search of an independent probe by means
of its sitting or retired judge into the reports
of alleged snooping by way of authorities
groups on eminent citizens, politicians and
scribes via the use of Israeli spyware
Pegasus.
The petition, in all likelihood to return up for
hearing inside following couple of days,
sought to investigate if the unlawful
hacking into the telephones using the
Pegasus spyware represented an strive by
means of groups and enterprises to muzzle
and kick back the exercising of loose
speech and expression of dissent in India.
It also sought a direction to the Centre to
disclose if the authorities or any of its
businesses acquired license for Pegasus
spyware and used it, both immediately or
indirectly, to behavior surveillance in any
way.
The petitioners claimed that research
concerning several main courses around
the sector has discovered that extra than
142 Indians, along with journalists, legal
professionals, government ministers,
competition politicians, constitutional
functionaries and civil society activists,
were recognized as potential goals for
surveillance using Pegasus software.
It climaxed that the forensic evaluation of
several cell telephones belonging to
individuals targeted for surveillance by the
Security Lab of Amnesty International have
confirmed Pegasus-prompted protection
breaches.
The centered surveillance the use of army-
grade spyware is an unacceptable violation
of the proper to privateness which has
been held to be a essential proper beneath
Articles 14 (equality before the law), 19
(freedom of speech and expression) and
21 (protection of existence and personal
liberty) via the Supreme Court, it delivered.
It said the centered hacking of telephones
belonging to journalists, medical doctors,
legal professionals, civil society activists,
government ministers and opposition
politicians significantly compromises the
effective exercise of the fundamental right
to free speech and expression underneath
Article 19(1)(a) of the Constitution.
It has an obvious chilling effect on
expression by using threatening invasion
into the most core and personal
components of a person's existence, it
claimed.
It claimed that the hack occasioned via the
Pegasus spyware constituted a criminal
offence punishable under interalia Section
sixty six (computer associated offences),
66B (punishment for dishonestly receiving
stolen laptop useful resource or
communique tool), 66E (punishment for
violation of privacy) and 66F (punishment
for cyberterrorism) of the IT Act, punishable
with imprisonment and/or satisfactory.
The attack prima facie constitutes an act of
cyber-terrorism that has several grave
political and protection ramifications,
mainly thinking about that the devices of
presidency ministers, senior political
figures and constitutional functionaries
which can also incorporate sensitive data
were centered, it introduced.
Earlier, a petition changed into filed via a
legal professional before the apex court
docket in search of a court docket-
monitored probe by a Special Investigation
Team (SIT) into the snooping row.

More Related Content

What's hot

What's hot (16)

NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniquesNSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
 
Internet in news
Internet in newsInternet in news
Internet in news
 
RSTREET17
RSTREET17RSTREET17
RSTREET17
 
Article research one edward snowdon
Article research one edward snowdonArticle research one edward snowdon
Article research one edward snowdon
 
Top contact tracing mobile apps for covid 19 in 2020
Top contact tracing mobile apps for covid 19 in 2020Top contact tracing mobile apps for covid 19 in 2020
Top contact tracing mobile apps for covid 19 in 2020
 
How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!
 
News bytes-July 2013
News bytes-July 2013News bytes-July 2013
News bytes-July 2013
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers
 
"Latest Android threats and their techniques" - Lukas Štefanko
"Latest Android threats and their techniques" - Lukas Štefanko "Latest Android threats and their techniques" - Lukas Štefanko
"Latest Android threats and their techniques" - Lukas Štefanko
 
RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013
 
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
Black Hat 2014 - Wait! Wait! Don't Pwn Me!Black Hat 2014 - Wait! Wait! Don't Pwn Me!
Black Hat 2014 - Wait! Wait! Don't Pwn Me!
 
Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Symantec Website Security Threats: March 2014 update.
Symantec Website Security Threats: March 2014 update.Symantec Website Security Threats: March 2014 update.
Symantec Website Security Threats: March 2014 update.
 
PhishingBox Presents 'What is Phishing' 2017
PhishingBox Presents 'What is Phishing' 2017PhishingBox Presents 'What is Phishing' 2017
PhishingBox Presents 'What is Phishing' 2017
 

Similar to The sc is asked to investigate the pegasus allegations by senior journalists

بحث حول قانون الارهاب En
بحث حول قانون الارهاب En   بحث حول قانون الارهاب En
بحث حول قانون الارهاب En
التنسيقية المصرية للحقوق والحريات
 
Civil Liberties.New Intelligence.FinalPaper
Civil Liberties.New Intelligence.FinalPaperCivil Liberties.New Intelligence.FinalPaper
Civil Liberties.New Intelligence.FinalPaper
Paul Dickson
 
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxAccessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
nettletondevon
 
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
AJHSSR Journal
 
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
RESEARCH  - STUDIES IN CONSTITUTIONAL LAWRESEARCH  - STUDIES IN CONSTITUTIONAL LAW
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
Chirine Haddad ?
 
Dba forbidden-knowledge-stingray-july-2014
Dba forbidden-knowledge-stingray-july-2014Dba forbidden-knowledge-stingray-july-2014
Dba forbidden-knowledge-stingray-july-2014
DeepDude
 
Role of right to information act 2005 in the human development
Role of right to information act 2005 in the human developmentRole of right to information act 2005 in the human development
Role of right to information act 2005 in the human development
Alexander Decker
 

Similar to The sc is asked to investigate the pegasus allegations by senior journalists (20)

Un may 28, 2019
Un may 28, 2019Un may 28, 2019
Un may 28, 2019
 
Wired-feature
Wired-featureWired-feature
Wired-feature
 
Digital freedoms in international law
Digital freedoms in international lawDigital freedoms in international law
Digital freedoms in international law
 
Here is the full text of the judgement on 66 a of IT act
Here is the full text of the judgement on 66 a of IT actHere is the full text of the judgement on 66 a of IT act
Here is the full text of the judgement on 66 a of IT act
 
Mde1569832017 english
Mde1569832017 englishMde1569832017 english
Mde1569832017 english
 
Hass & Associates Online Reviews
Hass & Associates Online ReviewsHass & Associates Online Reviews
Hass & Associates Online Reviews
 
20211027 sc order in pegasus case
20211027 sc order in pegasus case20211027 sc order in pegasus case
20211027 sc order in pegasus case
 
Pegasus Spyware Presentation.pptx
Pegasus Spyware Presentation.pptxPegasus Spyware Presentation.pptx
Pegasus Spyware Presentation.pptx
 
بحث حول قانون الارهاب En
بحث حول قانون الارهاب En   بحث حول قانون الارهاب En
بحث حول قانون الارهاب En
 
Civil Liberties.New Intelligence.FinalPaper
Civil Liberties.New Intelligence.FinalPaperCivil Liberties.New Intelligence.FinalPaper
Civil Liberties.New Intelligence.FinalPaper
 
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxAccessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
 
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
 
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
RESEARCH  - STUDIES IN CONSTITUTIONAL LAWRESEARCH  - STUDIES IN CONSTITUTIONAL LAW
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
 
Dba forbidden-knowledge-stingray-july-2014
Dba forbidden-knowledge-stingray-july-2014Dba forbidden-knowledge-stingray-july-2014
Dba forbidden-knowledge-stingray-july-2014
 
Digital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshDigital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in Bangladesh
 
Legal Framework of Online Media: A Perspective for Online Journalists, Online...
Legal Framework of Online Media: A Perspective for Online Journalists, Online...Legal Framework of Online Media: A Perspective for Online Journalists, Online...
Legal Framework of Online Media: A Perspective for Online Journalists, Online...
 
11.0006www.iiste.org call for paper.[41-47]role of right to information act 2...
11.0006www.iiste.org call for paper.[41-47]role of right to information act 2...11.0006www.iiste.org call for paper.[41-47]role of right to information act 2...
11.0006www.iiste.org call for paper.[41-47]role of right to information act 2...
 
Role of right to information act 2005 in the human development
Role of right to information act 2005 in the human developmentRole of right to information act 2005 in the human development
Role of right to information act 2005 in the human development
 
Laws on mass media
Laws on mass mediaLaws on mass media
Laws on mass media
 
Security technology and democratic legitimacy
Security technology and democratic legitimacySecurity technology and democratic legitimacy
Security technology and democratic legitimacy
 

More from aditi agarwal

More from aditi agarwal (20)

Caffeine; Does it really work for weight loss!.pdf
Caffeine; Does it really work for weight loss!.pdfCaffeine; Does it really work for weight loss!.pdf
Caffeine; Does it really work for weight loss!.pdf
 
A Detailed Guide to the Atkins Diet.pdf
A Detailed Guide to the Atkins Diet.pdfA Detailed Guide to the Atkins Diet.pdf
A Detailed Guide to the Atkins Diet.pdf
 
The Alkaline Diet – A Complete Guide.pdf
The Alkaline Diet – A Complete Guide.pdfThe Alkaline Diet – A Complete Guide.pdf
The Alkaline Diet – A Complete Guide.pdf
 
What is Epigenetics!.pdf
What is Epigenetics!.pdfWhat is Epigenetics!.pdf
What is Epigenetics!.pdf
 
Biohacking; Everything you need to know.pdf
Biohacking; Everything you need to know.pdfBiohacking; Everything you need to know.pdf
Biohacking; Everything you need to know.pdf
 
Best Workouts for Pregnant Women.pdf
Best Workouts for Pregnant Women.pdfBest Workouts for Pregnant Women.pdf
Best Workouts for Pregnant Women.pdf
 
Safed Musli – Health benefits & risks.pdf
Safed Musli – Health benefits & risks.pdfSafed Musli – Health benefits & risks.pdf
Safed Musli – Health benefits & risks.pdf
 
Pyruvate for weight loss – Does it work!.pdf
Pyruvate for weight loss – Does it work!.pdfPyruvate for weight loss – Does it work!.pdf
Pyruvate for weight loss – Does it work!.pdf
 
What is Collagen Type II..pdf
What is Collagen Type II..pdfWhat is Collagen Type II..pdf
What is Collagen Type II..pdf
 
What is Cola Nut Bean!.pdf
What is Cola Nut Bean!.pdfWhat is Cola Nut Bean!.pdf
What is Cola Nut Bean!.pdf
 
Best workouts to strengthen your legs.pdf
Best workouts to strengthen your legs.pdfBest workouts to strengthen your legs.pdf
Best workouts to strengthen your legs.pdf
 
Best workouts to strengthen your back.pdf
Best workouts to strengthen your back.pdfBest workouts to strengthen your back.pdf
Best workouts to strengthen your back.pdf
 
12 Benefits of Vietnamese Coriander.pdf
12 Benefits of Vietnamese Coriander.pdf12 Benefits of Vietnamese Coriander.pdf
12 Benefits of Vietnamese Coriander.pdf
 
15 Benefits of Tulsi (Holy Basil).pdf
15 Benefits of Tulsi (Holy Basil).pdf15 Benefits of Tulsi (Holy Basil).pdf
15 Benefits of Tulsi (Holy Basil).pdf
 
Best Exercises To Reduce Belly Fat.pdf
Best Exercises To Reduce Belly Fat.pdfBest Exercises To Reduce Belly Fat.pdf
Best Exercises To Reduce Belly Fat.pdf
 
Kejriwal, CM inaugurate luxury bus service from Punjab to Delhi's IGI airport...
Kejriwal, CM inaugurate luxury bus service from Punjab to Delhi's IGI airport...Kejriwal, CM inaugurate luxury bus service from Punjab to Delhi's IGI airport...
Kejriwal, CM inaugurate luxury bus service from Punjab to Delhi's IGI airport...
 
Meta-owned Instagram stories suffer a bug, leaving several users in the lurch...
Meta-owned Instagram stories suffer a bug, leaving several users in the lurch...Meta-owned Instagram stories suffer a bug, leaving several users in the lurch...
Meta-owned Instagram stories suffer a bug, leaving several users in the lurch...
 
VHP; Bajrang Dal to protest nationwide against violence over Prophet row.pdf
VHP; Bajrang Dal to protest nationwide against violence over Prophet row.pdfVHP; Bajrang Dal to protest nationwide against violence over Prophet row.pdf
VHP; Bajrang Dal to protest nationwide against violence over Prophet row.pdf
 
President Kovind attends the Lokarpana of the ISKCON temple in Bengaluru.pdf
President Kovind attends the Lokarpana of the ISKCON temple in Bengaluru.pdfPresident Kovind attends the Lokarpana of the ISKCON temple in Bengaluru.pdf
President Kovind attends the Lokarpana of the ISKCON temple in Bengaluru.pdf
 
The CERT-IN flags multiple vulnerabilities in Android OS that could lead to d...
The CERT-IN flags multiple vulnerabilities in Android OS that could lead to d...The CERT-IN flags multiple vulnerabilities in Android OS that could lead to d...
The CERT-IN flags multiple vulnerabilities in Android OS that could lead to d...
 

Recently uploaded

Recently uploaded (8)

KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
 
11052024_First India Newspaper Jaipur.pdf
11052024_First India Newspaper Jaipur.pdf11052024_First India Newspaper Jaipur.pdf
11052024_First India Newspaper Jaipur.pdf
 
12052024_First India Newspaper Jaipur.pdf
12052024_First India Newspaper Jaipur.pdf12052024_First India Newspaper Jaipur.pdf
12052024_First India Newspaper Jaipur.pdf
 
10052024_First India Newspaper Jaipur.pdf
10052024_First India Newspaper Jaipur.pdf10052024_First India Newspaper Jaipur.pdf
10052024_First India Newspaper Jaipur.pdf
 
Textile Waste In India/managing-textile-waste-in-India
Textile Waste In India/managing-textile-waste-in-IndiaTextile Waste In India/managing-textile-waste-in-India
Textile Waste In India/managing-textile-waste-in-India
 
declarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdfdeclarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdf
 
Income Tax Regime Dilemma – New VS. Old pdf
Income Tax Regime Dilemma – New VS. Old pdfIncome Tax Regime Dilemma – New VS. Old pdf
Income Tax Regime Dilemma – New VS. Old pdf
 
Politician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full DetailsPolitician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full Details
 

The sc is asked to investigate the pegasus allegations by senior journalists

  • 1. The SC is asked to investigate the Pegasus allegations by senior journalists
  • 2. Veteran journalists N Ram and Sashi Kumar have moved the Supreme Court in search of an independent probe by means of its sitting or retired judge into the reports of alleged snooping by way of authorities groups on eminent citizens, politicians and scribes via the use of Israeli spyware Pegasus. The petition, in all likelihood to return up for hearing inside following couple of days, sought to investigate if the unlawful hacking into the telephones using the Pegasus spyware represented an strive by means of groups and enterprises to muzzle and kick back the exercising of loose speech and expression of dissent in India. It also sought a direction to the Centre to disclose if the authorities or any of its businesses acquired license for Pegasus
  • 3. spyware and used it, both immediately or indirectly, to behavior surveillance in any way. The petitioners claimed that research concerning several main courses around the sector has discovered that extra than 142 Indians, along with journalists, legal professionals, government ministers, competition politicians, constitutional functionaries and civil society activists, were recognized as potential goals for surveillance using Pegasus software. It climaxed that the forensic evaluation of several cell telephones belonging to individuals targeted for surveillance by the Security Lab of Amnesty International have confirmed Pegasus-prompted protection breaches.
  • 4. The centered surveillance the use of army- grade spyware is an unacceptable violation of the proper to privateness which has been held to be a essential proper beneath Articles 14 (equality before the law), 19 (freedom of speech and expression) and 21 (protection of existence and personal liberty) via the Supreme Court, it delivered. It said the centered hacking of telephones belonging to journalists, medical doctors, legal professionals, civil society activists, government ministers and opposition politicians significantly compromises the effective exercise of the fundamental right to free speech and expression underneath Article 19(1)(a) of the Constitution. It has an obvious chilling effect on expression by using threatening invasion into the most core and personal
  • 5. components of a person's existence, it claimed. It claimed that the hack occasioned via the Pegasus spyware constituted a criminal offence punishable under interalia Section sixty six (computer associated offences), 66B (punishment for dishonestly receiving stolen laptop useful resource or communique tool), 66E (punishment for violation of privacy) and 66F (punishment for cyberterrorism) of the IT Act, punishable with imprisonment and/or satisfactory. The attack prima facie constitutes an act of cyber-terrorism that has several grave political and protection ramifications, mainly thinking about that the devices of presidency ministers, senior political figures and constitutional functionaries which can also incorporate sensitive data were centered, it introduced.
  • 6. Earlier, a petition changed into filed via a legal professional before the apex court docket in search of a court docket- monitored probe by a Special Investigation Team (SIT) into the snooping row.