• FinFisher's wide use by governments facing political resistance was reported in March 2011 after Egyptian protesters raided
State Security Investigations Service and found letters from Gamma International UK Ltd., confirming that SSI had been using a trial version for five months. • A similar report in August 2012 concerned e-mails received by Bahraini activists and passed on (via a
Bloomberg News reporter) to University of Toronto computer researchers
Bill Marczak and
Morgan Marquis-Boire in May 2012. Analysis of the e-mails revealed code (FinSpy) designed to install spyware on the recipient's computer. A spokesman for Gamma claims no software was sold to Bahrain and that the software detected by the researchers was not a legitimate copy but perhaps a stolen, reverse-engineered or modified demonstration copy. In August 2014
Bahrain Watch claimed that the leak of FinFisher data contained evidence suggesting that the Bahraini government was using the software to spy on opposition figures, highlighting communications between Gamma International support staff and a customer in Bahrain, and identifying a number of human rights lawyers, politicians, activists and journalists who had apparently been targeted. • According to a document dated 7 December 2012 from the Federal Ministry of the Interior to members of the Finance Committee of the German Parliament, the German "Bundesnachrichtendienst", the Federal Surveillance Agency, have licensed FinFisher/FinSpy, even though its legality in Germany is uncertain. • In 2014, an America citizen sued the Ethiopian government for installing and using FinSpy to record a vast array of activities conducted by users of the machine, all whilst in America. Traces of the spyware inadvertently left on his computer show that information – including recordings of dozens of Skype phone calls – was surreptitiously sent to a secret control server located in Ethiopia and controlled by the Ethiopian government. FinSpy was downloaded on the plaintiff's computer when he opened an email with a Microsoft Word document attached. The attachment contained hidden malware that infected his computer. In March 2017, the
United States Court of Appeals for the District of Columbia Circuit found that the Ethiopian government's conduct was protected from liability by the
Foreign Sovereign Immunities Act. • In 2015, FinFisher was reported to have been in use since 2012 for the 'Fungua Macho' surveillance programme of
Uganda's
President Museveni, spying upon the Ugandan opposition party, the
Forum for Democratic Change. • In 2015 it is reported that FinFisher executives sold, illegally, the system to Turkey to enable their security services to spy on government opposition parties. Four former executives were charged in 2023 in
Munich with failure to apply for an export licence for the $5.4 million contract. ==Reporters Without Borders==