Reports that Israel-made Pegasus spyware has been used to monitor activists, journalists and politicians around the world highlight the diplomatic risks of nurturing and exporting “oppressive technology”, experts warned on July 19.

Private Israeli firm NSO Group has denied media reports its Pegasus software is linked to the mass surveillance of journalists and rights defenders, and insisted that all sales of its technology are approved by Israel’s defence ministry.

Founded in 2010 and based in Herzliya, north of Tel Aviv, NSO says it develops tools that allow governments to pursue criminals who might evade authorities through encrypted communications.

But the Washington Post, the Guardian, Le Monde and other news outlets that collaborated on an investigation reported on a leaked list of up to 50,000 phone numbers believed to have been identified as people of interest by clients of NSO since 2016, not all of whom were hacked.

NSO spokesman Oded Hershkovitz told Israel’s Army Radio the list of phone numbers was “not connected” to NSO, but rather to other companies and open-source software. “We didn’t receive until today a bit of evidence that on this list someone indeed was attacked by the Pegasus system.”

The software enables phones to be infiltrated and tracked, with the microphone and camera activated remotely to monitor the user.

Israeli experts recalled the country’s long history of using the export of cutting-edge weaponry to foster diplomatic relations, but warned that burgeoning sales of advanced surveillance systems could cause more harm than benefit.

“Israeli weapons exports helped the country forge all kind of ties,” said Yoel Guzansky from the Institute for National Security Studies in Tel Aviv, citing quiet ties in the Middle East, Africa and Asia built through the weapons trade.

“Sometimes the damage is bigger than the benefit,” Guzansky told AFP. “Israel might be seen as someone who helps autocratic regimes suppress civil society.”

Jonathan Klinger, an Israeli cyber law attorney and privacy specialist, agreed, charging that “Israel is an incubator for oppressive technology”.

But he said “a big problem” is that NSO’s reported exports do not amount to a crime under Israeli law.

Klinger criticised what he called an “unfortunate business model”, helped by Israel’s readiness to test new surveillance systems on Palestinians in the occupied West Bank, Gaza and annexed east Jerusalem.

But the market is substantial, he added, because “there’s a limited number of liberal democracies, and there’s more dictatorships worldwide”.

NSO’s Hershkovitz told Army Radio the firm is a “Zionist company that operates only from Israel”, and only with approval from the defence ministry.

Last month, NSO said it considers the “past human rights performance and governance standards” of its clients.

Contracts require customers to “respect human rights”, including “rights to privacy and freedom of expression”, NSO said.

As a result, NSO had blacklisted 55 countries and rejected more than $300 million in potential “opportunities”.

The leaked list of potential hacking targets was obtained by rights group Amnesty International and Forbidden Stories, a Paris-based media non-profit organisation.

Israel’s defence ministry said it did not have access to information gathered by NSO’s clients.

Israel “approves the export of cyber products exclusively to governmental entities, for lawful use, and only for the purpose of preventing and investigating crime and counter terrorism”, it said.

NSO does not reveal which governments buy its products, but the reported list of targeted phone numbers was clustered in 10 countries including Azerbaijan, Bahrain, Morocco, Saudi Arabia and the UAE.