Abirami. R, LLB, Kalinga University, Raipur, Chhattisgarh
Dr Arbind Kumar Choudhary, Assistant Professor, Department of Pharmacology, Government Erode Medical College and Hospital, Perundurai, Erode, Tamil Nadu
ABSTRACT
The emergence of Pegasus spyware has brought significant concerns regarding surveillance, privacy, and cybersecurity, particularly in India. Developed by the NSO Group, Pegasus is an advanced surveillance tool capable of infiltrating mobile devices through zero-click exploits, enabling unauthorized access to sensitive data and communications. This article explores the global and Indian contexts of Pegasus, highlighting notable cases and controversies. In India, the spyware has reportedly targeted journalists, activists, and politicians, raising serious ethical and legal questions. The controversy has spotlighted the misuse of surveillance technology, the erosion of civil liberties, and the ensuing trust deficit in governmental institutions.
A comprehensive analysis of Pegasus's working procedure is provided, detailing its exploitation methods, installation, command and control communications, data exfiltration, and self-destruction mechanisms. The article also outlines preventive measures to mitigate the risks posed by such sophisticated spyware, including strengthening cybersecurity laws, implementing strong encryption, and ensuring regular software updates.
Moreover, the article examines the provisions in the Indian legal system designed to combat cybercrimes, emphasizing the need for robust legal frameworks, transparent oversight, and international cooperation. The Pegasus spyware controversy underscores the delicate balance between national security and individual rights, calling for vigilance, accountability, and continuous efforts to safeguard fundamental rights in an increasingly digital world. This study aims to contribute to the ongoing discourse on privacy, surveillance, and cybersecurity, advocating for ethical and responsible use of technology.
Keywords: Pegasus Spyware; Cybersecurity; Surveillance Technology; Privacy Erosion; Zero-click Exploits; Digital Privacy; Civil Liberties; Government Accountability; Data Exfiltration; Command and Control (C2) Servers; Indian Legal System
Comments