Global Freedom of Expression

The Kingdom Came to Canada: How Saudi-Linked Digital Espionage Reached Canadian Soil

Key Details

  • Region
    Middle East and North Africa

This report was originally published by the Citizen Lab and is republished here with permission and thanks.

In this report, Citizen Lab describes how Canadian permanent resident and Saudi dissident Omar Abdulaziz was targeted with a fake package delivery notification. This assesment was made with a high degree of confidence that Abdulaziz’s phone was infected with NSO’s Pegasus spyware, attributed to a Pegasus operator linked to Saudi Arabia. Pegasus, designed by Israeli “Cyber Warfare” vendor NSO Group and sold to governments, enables the operator to access a victim’s “personal files, chats, photos, and emails” and has been used extensively to monitor civil society. Using their investigative tactics detailed in the Hide and Seek report, Citizen Lab determined that the same group responsible for targeting Saudi dissidents and human rights activists in 2018 had also infected the mobile phone belonging to a resident of Quebec. Based on his location, movement patterns, his interest to Saudi Arabia, and the presence of an SMS message with a link to an NSO Group exploit domain, Citizen Lab concluded that the phone monitored by Saudi-affiliated Pegasus was likely the one belonging to Abdulaziz.

Read the full report here.

Authors

Ron Deibert

Director, The Citizen Lab

Bill Marczak

Senior Research Fellow, Citizen Lab

John Scott-Railton

Senior Researcher, The Citizen Lab

Bahr Abdul Razzak

Researcher, The Citizen Lab

Adam Senft

Researcher, The Citizen Lab

Comments