A significant international coalition, encompassing several nations, including the United States, the United Kingdom, and France, alongside major tech companies such as Google, Microsoft, and Meta, has formalized an agreement aimed at combating the misuse of commercial spyware for human rights violations. This initiative, known as the Pall Mall Process, aspires to impose regulations on the use of invasive cyber tools. It intends to offer a framework with guiding principles for governments, industries, and civil societies concerning the development, purchasing, and employment of such surveillance technologies.

The coalition’s declaration highlights that the “uncontrolled dissemination” of spyware can lead to “unintentional escalation in cyberspace,” which threatens cyber stability, human rights, national security, and overall digital safety. The U.K. government elaborated that malicious applications of these tools can lead to extensive invasions of privacy. For instance, attackers can exploit victim devices using so-called ‘zero-click’ spyware—tools that require no interaction from users to execute intrusive functions like accessing calls, taking photos, or remotely activating cameras and microphones. According to the National Cyber Security Centre, it is estimated that thousands of individuals worldwide fall victim to these spyware campaigns annually.

Deputy Prime Minister Oliver Dowden emphasized at the U.K.-France Cyber Proliferation Conference that as the market for these commercial tools expands, so does the frequency and severity of cyber attacks that compromise devices and digital systems. These incidents result in financially damaging consequences while complicating defense strategies for public institutions. Notably absent from the countries participating in this initiative was Israel, which is known for hosting multiple commercial surveillance firms such as NSO Group and Candiru.

Interestingly, countries like Hungary, Mexico, Spain, and Thailand, previously implicated in spyware abuses, did not endorse the pledge. This multi-stakeholder initiative coincides with recent actions by the U.S. Department of State to impose visa restrictions on individuals connected to the unethical use of such surveillance technologies. Google underscored that the prevailing lack of accountability had allowed the spyware market to flourish unchecked. The company highlighted that restricting these vendors’ operations in the U.S. may significantly alter the incentives driving their expansion.

Spyware like Chrysaor and Pegasus is typically marketed to government customers for legitimate use in law enforcement and counterterrorism operations. However, these tools have been frequently misappropriated by authoritarian regimes to target journalists, activists, and other civil society members. Such cyber intrusions leverage a variety of tactics, including initial access through exploit chains, persistence methods using backdoors, and privilege escalation to obtain sensitive information stealthily.

Despite ongoing efforts to mitigate the spyware ecosystem, the landscape resembles a game of whack-a-mole, as new players continue to emerge, offering similar tools. Commercial surveillance vendors invest substantially in developing new exploit chains, adapting to security patches implemented by tech giants like Apple and Google. An extensive report released by Google’s Threat Analysis Group tracked around 40 commercial spyware firms supplying products to governments, linked to numerous zero-day exploits across various platforms, reinforcing the urgent need for effective regulatory measures.

The report also detailed specific zero-day vulnerabilities exploited by state-sponsored actors, including recent instances where flaws were used to infect iOS devices with spyware. Google’s TAG identified an array of zero-day vulnerabilities in both iOS and Google Chrome that were associated with distinct spyware vendors over time. Recognizing that state-sponsored espionage efforts are increasingly sophisticated, Google’s statement highlighted the continuous development of tailored surveillance tools that are becoming more accessible.

The landscape of commercial spyware not only poses immediate threats to targeted individuals—often labeled as high-risk users—but also raises broader societal concerns regarding privacy and security. As the demand persists, it fuels an industry that remains poised to exploit vulnerable populations. The challenge remains substantial for law enforcement and cybersecurity professionals tasked with dismantling these intricate networks of surveillance operations.