Explosive Report : US-Funded Israeli Spyware Illegally Targets Journalists in Italy, Says Citizen Lab

More from Author

Ruta Deshpande, Deftech Analyst
Ruta Deshpande, Deftech Analyst
Ruta Deshpande is a seasoned Defense Technology Analyst with a strong focus on cutting-edge military innovations and strategic defense systems. With a deep-rooted interest in geopolitics and international relations, she brings nuanced insights into the intersection of technology, diplomacy, and global security. Ruta has reported extensively on defense modernization, space militarization, and evolving Indo-Pacific dynamics. As a journalist, she has contributed sharp, well-researched pieces to Deftechtimes, a reputed defense and strategy publication. Her analytical writing reflects a strong grasp of global military doctrines and regional conflict zones. Ruta has a particular interest in the Arctic race, cyber warfare capabilities, and unmanned combat systems. She is known for breaking down complex defense narratives into accessible, compelling stories. Her background includes collaborations with think tanks and participation in strategic dialogue forums.

Spyware made by an Israeli company with support from the United States was recently found on the phones of several journalists in Europe. According to a respected research group called Citizen Lab, at least three well-known journalists were affected. Two of them are editors at an investigative news website in Italy.

Spyware is a type of software that secretly gets into devices like smartphones and can read messages, listen to calls, and even track the user’s location—without the person knowing. This spyware was not installed by hackers or criminals, but by a company that sells its tools to governments.

Citizen Lab, a digital watchdog group based at the University of Toronto, found strong forensic proof that this spyware was used in Italy. The researchers said the spyware attacks were highly sophisticated and clearly targeted. These findings have led to serious concerns across Europe.

Behind the Screen: How Serbia Uses Spyware to Silence Critics

The names of the journalists have not been made public for safety reasons. But the attacks are believed to be politically motivated because the journalists had been critical of the Italian government, especially Prime Minister Giorgia Meloni.

Citizen Lab Uncovers Spyware Operation

Citizen Lab first discovered the signs of the spyware while examining suspicious activity on the phones of civil society members. This included journalists and human rights activists. The spyware was found to have infected the phones through text messages and hidden links. Once clicked, these links allowed full access to the phones without the user’s knowledge.

The spyware came from a private Israeli company that reportedly has links to the U.S. government. This company is known to sell surveillance tools to governments around the world, often claiming that the technology is for fighting crime and terrorism.

But the forensic evidence collected by Citizen Lab shows that, in this case, the spyware was used to target journalists doing their jobs. The infection of their phones raises serious questions about press freedom and digital safety in Europe.

According to Citizen Lab, the spyware used in this case is similar to what is known as “zero-click” spyware. This type of spyware doesn’t require the phone user to do anything—no need to click a link or open a file. It can silently break into phones and start watching and recording everything.

This is not the first time spyware has been used on journalists. Over the last few years, similar tools have been found on the phones of reporters in Mexico, India, Hungary, and other countries. But this new case hits closer to home for Europe, especially since it involves a country in the European Union.

Italy Under Pressure as EU Responds

The discovery has caused a stir across Europe. Many people are now asking whether the Italian government had any role in the spying. Critics say it is alarming that such powerful tools could be used against journalists in a democratic country.

China Says ‘We Build, We Don’t Hack’ in Fierce Denial of Dutch Tech Spying Charges

The European Commission, which is the executive body of the European Union, responded strongly. In a statement, it said, “Any attempts to illegally access data of citizens, including journalists and political opponents, is unacceptable, if confirmed.” The Commission also said it would take action to ensure EU laws are followed properly.

Prime Minister Meloni’s office has not given a comment about the incident. However, a senior member of her Cabinet has said that Italy always follows the law and denies that the government spied illegally on anyone.

Still, many questions remain. How was this surveillance tool sold? Who approved its use? And why were journalists—who are not criminals—being watched? These are the issues that researchers and legal experts across Europe are now trying to answer.

Meanwhile, the journalists affected by the digital intrusion continue to work under pressure. Even though their privacy was invaded, they have not stopped reporting or publishing.

The spyware scandal highlights how commercial surveillance tools can be misused. Even in countries where there are strong laws and free media, these tools can fall into the wrong hands.

As of now, investigations are ongoing, and pressure is growing for more transparency from both the Italian government and the spyware company involved. The story is still developing, but the facts uncovered so far have already sent shockwaves across Europe’s political and media circles.

- Advertisement -

Trending on Deftechtimes