Yazılar

Hikvision to appeal Canadian court ruling upholding shutdown order

Chinese surveillance camera maker Hikvision said Tuesday it will challenge a Canadian Federal Court decision that upheld Ottawa’s order for the company to cease operations in Canada on national security grounds.

The court dismissed Hikvision’s bid to overturn the June shutdown order, siding with the Canadian government’s argument that the firm’s activities could pose security risks.

A Hikvision spokesperson rejected the claim, saying: “We remain steadfast in our position that our products and technology do not pose a national security threat, and there is no evidence that indicates they have ever presented such a risk to Canada.” The company has notified Ottawa of its intent to pursue arbitration under a 2014 bilateral investment treaty.

Hikvision’s Canadian unit employs 66 staff and sells products through local distributors. While the shutdown order blocks direct operations, it does not explicitly ban the sale of Hikvision products in Canada.

The dispute unfolds against the backdrop of worsening Canada–China relations. Ottawa recently imposed a 100% tariff on Chinese EVs and a 25% tariff on Chinese steel and aluminum, while Beijing retaliated with 75.8% duties on Canadian canola seed imports pending an anti-dumping probe.

The Hikvision case could become another flashpoint in an already fraught trade and diplomatic relationship.

Meta Wins $168 Million in Landmark Case Against NSO Group Over WhatsApp Spyware Abuse

Meta Platforms has secured a significant legal victory, winning a $168 million verdict against Israeli spyware company NSO Group in a long-running lawsuit over the unauthorized use of WhatsApp servers to deploy spyware on users’ devices. The ruling marks the first major courtroom win against a surveillance firm for the deployment of illegal spyware.

A California jury awarded Meta $444,719 in compensatory damages and $167.3 million in punitive damages, capping a six-year legal battle that began with a 2019 lawsuit. In December, a federal judge had already ruled that NSO unlawfully exploited a WhatsApp vulnerability to implant surveillance software.

Meta hailed the outcome as a step forward for privacy and security”, adding that the verdict sets a precedent in holding spyware developers accountable.

A Rare Glimpse Into the Spyware Industry

The trial revealed rare insights into NSO’s operations:

  • Between 2018 and 2020, NSO charged governments $7 million to hack up to 15 devices simultaneously.

  • Cross-border hacking features cost an additional $1–2 million.

  • NSO maintained a 140-person research team with a $50 million budget, some of which was used to exploit smartphone security flaws.

  • Court testimony confirmed customers included Uzbekistan, Saudi Arabia, and Mexico.

Despite NSO’s claim that its software is intended to fight terrorism and crime, human rights advocates, such as Natalia Krapiva of Access Now, labeled the firm a poster child for surveillance abuses.” She called the ruling a signal to the spyware industry: There will be consequences if you act carelessly or brazenly.”

Continued Secrecy and Legal Resistance

NSO has indicated plans to appeal the verdict, saying it would pursue all legal remedies. Much of the case remained shrouded in secrecy, with Judge Phyllis Hamilton criticizing the firm for withholding evidence and ignoring court orders. The Israeli government even intervened, seizing documents to prevent their disclosure in U.S. courts.

This case, which reached as far as the U.S. Supreme Court, has been closely watched by privacy advocates, surveillance industry players, and governments worldwide, as it underscores both the legal vulnerability of spyware firms and the growing demand for greater accountability in cyber surveillance practices.

Meta’s Lawsuit Against NSO Unveils Rare Details of Global Spyware Industry

Meta’s $168 million court victory against Israeli spyware maker NSO Group has not only concluded a protracted six-year legal battle but also offered an unprecedented look into the shadowy world of cyberespionage, where elite surveillance tools come with multimillion-dollar price tags and state-level buyers.

A California federal jury found NSO guilty of unlawfully hacking WhatsApp servers to target users on behalf of foreign intelligence agencies, awarding Meta both compensatory and punitive damages. The lawsuit, first filed in 2019, became a landmark case for digital privacy advocates and a rare legal showdown against a prominent spyware firm.

Top-Tier Spyware Comes at a High Cost

Testimony revealed that NSO charged European clients about $7 million for access to its spyware platform capable of hacking up to 15 devices simultaneously. For additional capabilities—like hacking phones outside of a client’s national borderscustomers paid up to $2 million more, according to Sarit Bizinsky Gil, NSO’s VP of global business operations.

Meta’s attorney Antonio Perez called the software highly sophisticated” and “extremely expensive,” underscoring the elite and dangerous nature of such tools.

Thousands of Devices Compromised

Between 2018 and 2020, NSO broke into thousands of devices, according to Tamir Gazneli, the company’s VP of R&D. He downplayed the term “spyware,” insisting the tools were used for “intelligence gathering,” not spying on people. In a tense exchange, Perez asked, You don’t consider the targets people, Mr. Gazneli?”a question that revealed how NSO distances itself from the ethical weight of its clients’ actions.

U.S. Agencies Paid Millions

Court records showed that the CIA and FBI collectively paid NSO $7.6 million. While prior media reports suggested U.S. involvement, this trial provided the first official financial confirmation, including a CIA-backed spyware purchase for Djibouti and FBI testing efforts.

NSO Continued Hacking During Litigation

Meta alleged that NSO continued to target WhatsApp servers even after the lawsuit was filed, saying the firm poses a significant threat of ongoing and prospective harm.” Meta is now seeking a permanent injunction to block NSO from accessing its platforms.

This case has not only highlighted the legal vulnerabilities of spyware vendors but also peeled back layers of secrecy surrounding government surveillance contracts, client relationships, and the massive scale of digital intrusions involved.