Technology companies founded by former Israeli intelligence operatives use spyware to hack the private messages of the world’s leaders, and with it they influence Western politicians to stand behind Israel.
Note from LifeSiteNews co-founder Steve Jalsevac:
This article may seem overly technical to some readers. Its value, however, lies in showing how followers of the hostile WEF agenda, the New World Order and the UN 2030 Agenda know everything on your smartphone via software developed by the Israeli military.
This includes the fact that in many countries political, economic and social leaders are spied on—and often blackmailed—with the same technology. This software also played a key role in Israel’s targeted killings of alleged Palestinian civilians and journalists in Gaza and the West Bank.
The consequence: If citizens and states do not take consistent action against the spyware systems tied to Israeli connections, privacy will be in grave danger.
So why do so many Western leaders support Israel? The answer lies on their phones. In light of the scandals surrounding the Israeli government, it is hardly a secret why a state sometimes called a “genocidal regime” still enjoys broad support from the West.
Reports from the UK, Europe and the United States show that companies founded by former Israeli intelligence agents use spyware to access and pressure private messages and data of leading politicians critical of Israel.
Spyware Used Against EU and U.S. Governments
- April 30: Representative Mike Waltz was photographed using an Israeli-made app to hack and leak his private Signal messages shortly after his removal from a national-security team.
- May 14: Spanish Prime Minister Pedro Sánchez, when asked about canceling an Israeli arms deal, declared, “We do not do business with a genocidal state.” That same day, Italian Prime Minister Giorgia Meloni condemned the humanitarian situation in Gaza as “increasingly dramatic and unjustified,” caused by Israel’s blockade and attacks.
What connects Spain and Italy? Both have been targeted by documented uses of Israeli spyware against journalists and politicians.
In response to Sánchez’s criticism, Israel’s ambassador issued a thinly veiled threat: “My government has not yet responded to the Pegasus revelations,” Foreign Minister Dan Poraz told El Español—hinting Israel has gathered compromising material on Western leaders.
The Broader Surveillance Ecosystem
Investigative journalist Glenn Greenwald has documented the alarming reach of platforms like Palantir and other surveillance tools developed by “Zionist” tech firms. A TechCrunch report shows that by 2013 Palantir already counted at least a dozen U.S. agencies among its clients—including the CIA, NSA, FBI, CDC, Air Force and Marine Corps. Greenwald—who is himself Jewish—explains these systems have been used to target political opponents.
Example: Spanish courts, together with French authorities, reopened an investigation into alleged Pegasus hacks of Prime Minister Sánchez’s phone. Cabinet members and even President Emmanuel Macron have been affected.
WhatsApp and Apple vs. Spyware
- In 2019 WhatsApp and Apple sued NSO Group over its “Pegasus” spyware, which exploited security flaws to secretly access user data.
- Candiru’s “Devil’s Tongue” tool even read encrypted Signal chats and was spread via Chrome, according to Microsoft.
- A March 2025 CitizenLab report found Western governments used these hacking tools in Mexico, Saudi Arabia, the U.S. and EU countries.
- The U.S. Drug Enforcement Administration (DEA) reportedly deployed Israeli Paragon’s “Graphite” to tap phone calls and WhatsApp data. John Railton of CitizenLab told Congress in 2022 that programs like Pegasus and Graphite turn any phone into a surveillance device—camera, microphone and data access included—without user interaction.
After U.S. sanctions on NSO, the Biden administration attempted to buy the company, but an American security-linked investment firm ultimately succeeded. Paragon’s Graphite is a new Pegasus variant, granting access to emails, photos, Facebook, WhatsApp, live audio and video.
Paragon—The New Face of Digital Power
Founded in 2019 by Ehud Barak and former Unit 8200 commander Ehud Schneorson, Paragon has recruited numerous NSO engineers. Forbes notes Paragon lacks even a website, yet conducts billion-dollar operations with governments worldwide.
Pegasus in Europe: Ministers Under Constant Watch
- In 2022 Spanish and French officials were proven targets of NSO spyware.
- WhatsApp CEO Will Cathcart revealed NSO stealth-installed Pegasus via a video-call exploit—without the user needing to answer.
- In December 2024 NSO was ordered to pay Meta $167 million after user data was found on NSO’s servers.
- Apple’s suit over iPhone vulnerabilities was dropped in 2024 after Israel allegedly seized key evidence.
The Reality of Privacy Erasure
The power of this software lies not only in surveillance but in blackmail. Journalists, ministers, politicians—no one is safe. Silence can be forced. After revelations about journalist surveillance, Italy’s intelligence service terminated its Paragon contract in 2025. Attempts to spin this as “transparency” were seen as thinly veiled threats.
In June it was announced Paragon was sold to an American firm. In Israel the deal is condemned as a security betrayal. Michael Eisenberg, a security-linked venture capitalist, warns: “These tools belong to the State of Israel—if they fall into the wrong hands, they can be used against us.” The Israeli prime minister gave a one-hour briefing on Paragon, cautioning against publicizing its methods.
Digital Infiltration at the Highest Levels
This scandal shows Israel’s spy tech is used not only against terrorism but to manipulate governments. Journalists, diplomats and politicians are compromised while public discourse is steered. Now that Paragon is anchored in U.S. security circles, click-free surveillance is set to become the “new normal” in Western governance.
According to British writer Colin Munro, systematic spying on UK prime ministers explains their unwavering loyalty to Israel.
Translated and edited by: Joe Albert