Skip to content

This database tracks details about victims of NSO Group’s Pegasus spyware, based on reporting by Amnesty International, Citizen Lab, Forbidden Stories, and others.

Notifications You must be signed in to change notification settings

GranittHQ/data-pegasus-victims

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

41 Commits
 
 
 
 

Repository files navigation

Pegasus Victim Database

This database tracks details about victims of NSO Group’s Pegasus spyware. Each entry represents either an individual or small group of people, such as a team of lawyers. For that reason, you won't find single entries for the "1,400 mobile phones and devices" targeted through WhatsApp or "15,000 individuals" selected for surveillance in Mexico. The goal is to make each entry as comprehensive as possible by collecting and sorting published reports. The database is updated regularly as more information becomes available.

How to view the data

To view the data, you can:

  • Click on the .csv file above to view the data right here on GitHub
  • Download a .zip file by clicking the green Code-button, then view it using Microsoft Excel
  • Download a .zip file by clicking the green Code-button, then import the .csv into Google Sheets

Schema

Each entry contains information about one victim. An entry may contain information about a small group of people, such as a team of lawyers, until we have enough details to break it down further.

Field Description Example
name Name of the victim Sarah Walker
code_name Code name assigned to the victim USJRN1
role Victim's role at the time Journalist
affiliation Victim's affiliation at the time El Faro
occurred The year the attack occurred 2018
disclosed When the attack was disclosed 2021-10-24
disclosed_by Who the attack was disclosed by Citizen Lab
forensics_by Who did the analysis/forensics Lookout
pegasus_project If the victim was named by the Pegasus Project True
tech_notified Tech company which notified the victim Apple
device_type Type of device iPhone
attack_result If the attack was attempted or successful Successful
lockdown_bypass If the attack bypassed Apple's Lockdown Mode False
attack_vector How the spyware was delivered SMS
exploit_name CVE or name of the exploit used KISMET
first_activity Date of first spyware activity 2018-06-02
last_activity Date of last spyware activity 2018-07-22
operator Country operating the spyware Mexico
sources List of sources amnesty.org

The Pegasus Project

The Pegasus Project was a large-scale investigation into the use of NSO's Pegasus spyware, coordinated by Forbidden Stories with technical support from Amnesty International. At the center of the investigation was a leaked list of 50,000 phone numbers said to have been selected for surveillance by NSO's customers since 2016. Forbidden Stories and Amnesty International shared the data with 15 media partners, including the Guardian and the Washington Post. Due to the sheer number of potential victims disclosed by the investigation, this database may contain some discrepancies and duplicate entries.

How to contribute

We welcome assistance in making the data as complete as possible. Please reach out with any questions, feedback, updated or missing information, corrections, or requests for new fields. You can open an issue in this repository, or email runa@granitt.io.

Licensing

The data is published under an Attribution-NonCommercial-ShareAlike 4.0 International CC BY-NC-SA 4.0 license.

About Granitt

Granitt was founded by Runa Sandvik with the goal of securing journalists and at-risk people around the world. To learn more about our work, see this TechCrunch interview from July 2022.?

About

This database tracks details about victims of NSO Group’s Pegasus spyware, based on reporting by Amnesty International, Citizen Lab, Forbidden Stories, and others.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published