Known for its investigative reporting, El Faro has been referred to as “a breakthrough digital newspaper blazing an independent and ethical trail in Central America.”
So when reporters at the Salvadoran news outlet noticed their cellphones acting strange all of a sudden—batteries draining, unexplained overheating—they had a weird feeling that someone was accessing their messages. They sent one reporter’s phone to Citizen Lab, a watchdog group, and the analysis found something shocking: It was infected with Pegasus, a military-grade surveillance software that can copy messages, harvest photos and even control the phone’s camera and microphone.
jQuery(document).ready(function(){prx("https:\/\/play.prx.org\/e?ge=prx_149_679a41b1-a105-4f0a-aad5-a0cd40f5bda0&uf=http%3A%2F%2Ffeeds.revealradio.org%2Frevealpodcast", "prx-1", "embed")});Subscribe to Mother Jones podcasts on Apple Podcasts or your favorite podcast app.
“Okay, I’m the target right now,” reporter Julia Gavarrete recalled. “But the thing was, it’s obvious that it’s not only me.”
The watchdog checked more journalists’ phones, and it quickly became clear that El Faro was under a massive surveillance campaign. But who was behind it?
In this episode, Reveal partners with the Shoot the Messenger podcast to investigate one of the biggest Pegasus hacks ever uncovered.
This is an update of an episode that originally aired in September 2023.