Privacy-Invading Systems and How to Avoid Them: Difference between revisions
Created page with "There are a frightening number of systems that are being used by entities to oppress people. Here are some known systems, what they do, and how you can avoid them. =Mobile Device Interception= ==Stringray== The Stingray is a cell-site simulator (IMSI catcher) that spoofs mobile network towers to intercept your mobile device traffic. =Mobile Device Access= ==Cellebrite (UFED)== =Mobile Device "Forensic" Tools== ==Grayshift (GrayKey)== ==Graphite== Spyware used by gove..." |
No edit summary |
||
| Line 1: | Line 1: | ||
= Surveillance and Digital Monitoring Systems = | |||
This page documents publicly known surveillance, device access, data extraction, monitoring, and analytics systems used by governments, police, intelligence services, and corporations. It also includes general notes on detection, likely indicators, and high-level defensive practices. | |||
Many of these products are marketed for law enforcement, intelligence, enterprise administration, or “public safety.” In practice, they have repeatedly raised major civil-liberties and privacy concerns, especially when used in secret, without meaningful oversight, or against journalists, dissidents, immigrants, protesters, and political opponents. | |||
= | == Scope and Caveats == | ||
This page is an overview, not an exhaustive catalogue. Some systems have extensive public documentation, while others are documented mainly through investigative journalism, court records, procurement records, leaked materials, or technical analysis by groups like Citizen Lab, Amnesty International, EFF, ACLU, and major news organizations. | |||
The fact that a product appears here does ''not'' mean every use is unlawful, nor does it mean all publicly alleged capabilities are always available in every deployment. Some vendors deliberately keep technical details secret, and some governments hide or mischaracterize how these tools are used. | |||
---- | |||
= | = Threat Model: How These Systems Fit Together = | ||
Modern surveillance usually operates as a pipeline rather than a single tool. Understanding the layers makes it easier to understand where risk comes from and where defensive measures help. | |||
= | {| class="wikitable" | ||
! Layer | |||
! Description | |||
! Example systems | |||
|- | |||
| Device exploitation | |||
| Direct compromise of a phone or computer | |||
| Pegasus, Graphite, FinSpy | |||
|- | |||
| Device access / extraction | |||
| Physical or forensic access to a seized device | |||
| Cellebrite UFED, GrayKey | |||
|- | |||
| Interception / location | |||
| Locating or identifying devices via network impersonation or network data | |||
| Stingray / cell-site simulators | |||
|- | |||
| Aggregation | |||
| Pulling many data sources together into one place | |||
| Telecom logs, law-enforcement databases, brokered data | |||
|- | |||
| Analysis / targeting | |||
| Correlating people, devices, places, events, and patterns | |||
| Gotham, Foundry, AIP | |||
|- | |||
| Operational action | |||
| Enforcement, deportation, arrests, raids, targeting, watchlisting, or battlefield use | |||
| Police, intelligence, border agencies, military units | |||
|} | |||
A key point is that some of the most controversial platforms do ''not'' break into phones directly; instead, they ingest and analyze data gathered by other tools or agencies.<ref>[https://www.palantir.com/platforms/ Palantir platforms]</ref><ref>[https://www.palantir.com/platforms/gotham/ Palantir Gotham]</ref> | |||
---- | |||
= | = Detection and Indicators = | ||
This section covers general signs that a device, account, or movement pattern may be under surveillance. In many cases, especially with high-end spyware, there may be ''no obvious visible indicator at all''.<ref>[https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/ Amnesty International Pegasus forensic methodology]</ref><ref>[https://citizenlab.ca/research/first-forensic-confirmation-of-paragons-ios-mercenary-spyware-finds-journalists-targeted/ Citizen Lab: first forensic confirmation of Paragon spyware]</ref> | |||
== General Device Indicators == | |||
A compromised or monitored device may show: | |||
* unusual battery drain | |||
* unexplained heat when idle | |||
* abnormal crashes or reboots | |||
* unexpected network usage | |||
* new profiles, certificates, or management agents | |||
* strange permission prompts or security warnings | |||
* missing or altered messages, settings, or call logs | |||
These are weak indicators on their own. Normal software bugs and bad apps can cause similar symptoms. Sophisticated spyware may leave almost no user-visible signs.<ref>[https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/ Amnesty International Pegasus forensic methodology]</ref> | |||
=Companies= | == Indicators of Mobile Device Management / Administrative Control == | ||
==Palantir Technologies== | A phone may be under administrative control if you see: | ||
* a device management profile | |||
* work container / managed app warnings | |||
* restrictions on installing apps or changing settings | |||
* remote wipe or compliance notices | |||
* enterprise certificates or “managed by organization” messages | |||
On iPhone and iPad, check settings related to device management profiles. On Android, check device admin apps, work profiles, and enterprise enrollment state.<ref>[https://learn.microsoft.com/en-us/intune/privacy/ Microsoft Intune privacy and personal data]</ref> | |||
== Indicators of Forensic Access After Seizure == | |||
After a device has been seized or handled out of your control, warning signs can include: | |||
* changed lock settings | |||
* newly trusted computers or accessories | |||
* modified biometric enrollment | |||
* unexplained recent unlocks | |||
* logs or timestamps inconsistent with your own use | |||
* unusual files or configuration changes after return | |||
Forensic extraction often leaves fewer obvious indicators than malware, especially if the device was unlocked or physically controlled by authorities. | |||
== Indicators of Cell-Site Simulator / IMSI Catcher Use == | |||
Reliable end-user detection is difficult. Possible signals sometimes discussed by researchers and defenders include: | |||
* sudden downgrade to weaker network modes | |||
* unstable cellular service in a specific area | |||
* unusual baseband / network behavior | |||
* repeated attach / detach events | |||
* suspicious concentration of police or surveillance vehicles during protests or targeted operations | |||
These are not definitive. Consumer devices generally do not expose enough radio-layer detail for dependable confirmation.<ref>[https://www.eff.org/pages/cell-site-simulatorsimsi-catchers EFF: Cell-site simulators / IMSI catchers]</ref><ref>[https://www.aclu.org/issues/privacy-technology/surveillance-technologies/stingray-tracking-devices ACLU: Stingray tracking devices]</ref> | |||
== Indicators of Camera / Vehicle Tracking Networks == | |||
You may be in a dense ALPR / camera surveillance area if you see: | |||
* fixed roadside camera clusters at entrances, exits, intersections, apartment complexes, retail lots, and neighborhood choke points | |||
* private “safety” camera branding | |||
* police integration with neighborhood or private camera systems | |||
* public records or council documents showing ALPR deployment | |||
These systems often create retrospective travel histories, even when they are not continuously watched in real time.<ref>[https://www.eff.org/pages/automated-license-plate-readers-alpr EFF: Automated license plate readers]</ref><ref>[https://www.aclu.org/news/privacy-technology/flock-ceo-goes-ballistic ACLU on Flock Safety and mass driver surveillance]</ref> | |||
== What To Do If You Suspect Surveillance == | |||
If compromise is plausible: | |||
* stop assuming the device is trustworthy | |||
* move sensitive conversations to a different device that has not been exposed | |||
* preserve evidence before wiping or changing too much | |||
* document dates, detentions, border crossings, suspicious messages, and unusual behavior | |||
* seek professional forensic help if the stakes are high | |||
* consider that your contacts may also be targeted | |||
For high-risk users such as activists, journalists, lawyers, researchers, and political organizers, the safest assumption is often that a suspected device should not be trusted until properly examined.<ref>[https://citizenlab.ca/ Citizen Lab]</ref><ref>[https://ssd.eff.org/ Surveillance Self-Defense | EFF]</ref> | |||
---- | |||
= Mobile Device Interception = | |||
This category covers systems that identify, locate, or interact with mobile devices over the air, usually by imitating network infrastructure or exploiting the phone’s trust in the cellular network. | |||
== Cell-Site Simulators (IMSI Catchers) == | |||
Cell-site simulators impersonate legitimate cell towers so nearby phones connect to them. This can expose device identifiers and help locate a target device. Public reporting and civil-liberties litigation have shown these tools have been used by federal, state, and local agencies in the United States and elsewhere.<ref>[https://www.eff.org/pages/cell-site-simulatorsimsi-catchers EFF: Cell-site simulators / IMSI catchers]</ref><ref>[https://epic.org/documents/epic-v-fbi-stingray-cell-site-simulator/ EPIC: Stingray / cell-site simulator records]</ref> | |||
=== Stingray === | |||
StingRay is the best-known brand name for a class of cell-site simulators. The name is often used generically for similar devices. | |||
* Vendor: | |||
* [[Harris Corporation]] / [[L3Harris Technologies]] | |||
* Country of origin: | |||
* United States | |||
* Type: | |||
* IMSI catcher / cell-site simulator | |||
* General description: | |||
* A surveillance device that impersonates a cellular tower so nearby phones connect to it, revealing device identifiers and assisting in location tracking.<ref>[https://www.eff.org/pages/cell-site-simulatorsimsi-catchers EFF: Cell-site simulators / IMSI catchers]</ref><ref>[https://www.cato.org/policy-analysis/stingray-new-frontier-police-surveillance Cato: Stingray: A New Frontier in Police Surveillance]</ref> | |||
* Capabilities: | |||
* identifies nearby devices via IMSI/IMEI | |||
* assists in locating a device | |||
* can affect all phones in range, not only the target | |||
* Publicly reported government users: | |||
* FBI | |||
* DEA | |||
* CBP / ICE | |||
* numerous state and local police agencies in the United States | |||
* reported use by agencies in Canada and the United Kingdom as well<ref>[https://epic.org/documents/epic-v-fbi-stingray-cell-site-simulator/ EPIC: FBI use of cell-site simulators]</ref><ref>[https://www.aclu.org/cases?issue=stingray-tracking-devices ACLU stingray cases]</ref><ref>[https://www.eff.org/deeplinks/2016/04/eff-and-aclu-expose-governments-secret-stingray-use-wisconsin-case EFF on secret stingray use in Wisconsin case]</ref> | |||
* Notable privacy / abuse stories: | |||
* a federal judge in New York suppressed evidence after DEA used a stingray without a warrant<ref>[https://www.reuters.com/article/technology/in-first-us-judge-throws-out-cell-phone-stingray-evidence-idUSKCN0ZS2VG/ Reuters: judge throws out stingray evidence]</ref> | |||
* ACLU and EFF litigation exposed secret stingray use that had not been disclosed to the court or defendant<ref>[https://www.eff.org/deeplinks/2016/04/eff-and-aclu-expose-governments-secret-stingray-use-wisconsin-case EFF on secret stingray use]</ref> | |||
* Avoidance / mitigation: | |||
* assume cellular metadata is exposed to the network operator and potentially to surveillance tools | |||
* prefer end-to-end encrypted apps for content confidentiality | |||
* disable radios when not needed | |||
* avoid carrying a primary phone to highly sensitive meetings if exposure would be severe | |||
* understand that reliable consumer-side detection is difficult | |||
---- | |||
= Mobile Device Access = | |||
This category covers tools used after a device has been seized, borrowed, detained, confiscated, or otherwise physically controlled by another party. | |||
== Cellebrite (UFED) == | |||
Cellebrite’s UFED line is one of the best-known mobile device extraction tool families used in digital forensics. The company markets its tools to law enforcement and public-sector investigators, and public reporting has repeatedly tied its products to controversial extractions involving activists, protesters, and journalists.<ref>[https://cellebrite.com/en/ufed/ Cellebrite UFED]</ref><ref>[https://www.reuters.com/world/georgia-purchase-israeli-data-extraction-tech-amid-street-protest-crackdown-2025-02-27/ Reuters: Georgia and Cellebrite procurement]</ref> | |||
* Vendor: | |||
* [[Cellebrite]] | |||
* Country of origin: | |||
* Israel<ref>[https://www.reuters.com/world/georgia-purchase-israeli-data-extraction-tech-amid-street-protest-crackdown-2025-02-27/ Reuters: Israeli technology firm Cellebrite]</ref> | |||
* Type: | |||
* mobile device extraction / digital forensics | |||
* General description: | |||
* Commercial forensic platform used to extract and analyze data from phones and other digital devices.<ref>[https://cellebrite.com/en/ufed/ Cellebrite UFED]</ref> | |||
* Capabilities: | |||
* logical and physical extraction, depending on device and condition | |||
* recovery of messages, contacts, app data, files, and other records | |||
* analysis and review of extracted device data | |||
* Publicly reported government users: | |||
* FBI and other U.S. federal agencies | |||
* police and security agencies in Serbia | |||
* authorities in Georgia | |||
* authorities in Jordan | |||
* many other law-enforcement customers globally<ref>[https://www.reuters.com/technology/encrypted-chat-app-signal-reveals-flaws-cellebrite-equipment-2021-04-21/ Reuters on Cellebrite equipment]</ref><ref>[https://www.reuters.com/world/georgia-purchase-israeli-data-extraction-tech-amid-street-protest-crackdown-2025-02-27/ Reuters: Georgia procurement]</ref><ref>[https://www.reuters.com/technology/cybersecurity/serbia-used-israeli-firms-tech-enable-spy-campaign-amnesty-says-2024-12-16/ Reuters: Serbia and Cellebrite]</ref><ref>[https://www.theguardian.com/world/2026/jan/22/jordan-israeli-spyware-gaza-activists Guardian: Jordan and Cellebrite]</ref> | |||
* Notable privacy / abuse stories: | |||
* Amnesty and Reuters reported Serbian authorities used Cellebrite tools during detentions tied to surveillance of activists and journalists<ref>[https://www.reuters.com/technology/cybersecurity/serbia-used-israeli-firms-tech-enable-spy-campaign-amnesty-says-2024-12-16/ Reuters: Serbia used Israeli firm's tech]</ref> | |||
* Reuters reported Georgia renewed contracts for Cellebrite tools amid protest crackdowns<ref>[https://www.reuters.com/world/georgia-purchase-israeli-data-extraction-tech-amid-street-protest-crackdown-2025-02-27/ Reuters: Georgia procurement]</ref> | |||
* Citizen Lab / Guardian reporting tied Cellebrite tools to phone extractions of pro-Gaza activists in Jordan<ref>[https://www.theguardian.com/world/2026/jan/22/jordan-israeli-spyware-gaza-activists Guardian: Jordan used Israeli phone-cracking tool]</ref> | |||
* Avoidance / mitigation: | |||
* use a long alphanumeric passcode | |||
* disable biometric unlock when coercion risk is high | |||
* power down devices before border crossings, detention risk, or seizure risk | |||
* keep full-disk encryption enabled | |||
* do not surrender your primary device unlocked if you can lawfully avoid it | |||
* separate high-risk communications from your everyday phone | |||
---- | |||
= Mobile Device "Forensic" Tools = | |||
This category covers specialized systems aimed at bypassing device protections and extracting data from phones, often after physical seizure. | |||
== Grayshift (GrayKey) == | |||
GrayKey is a mobile-device access and extraction system used by law-enforcement and government customers. Public reporting and vendor materials indicate wide deployment across multiple countries, though details of current capabilities vary by device model and software version.<ref>[https://www.grayshift.com/ Grayshift]</ref><ref>[https://en.wikipedia.org/wiki/Grayshift Wikipedia: Grayshift]</ref> | |||
* Vendor: | |||
* [[Grayshift]] | |||
* Country of origin: | |||
* United States<ref>[https://en.wikipedia.org/wiki/Grayshift Wikipedia: Grayshift]</ref> | |||
* Type: | |||
* phone unlocking / forensic access tool | |||
* General description: | |||
* Commercial device used to attempt access to locked smartphones and support forensic extraction workflows. | |||
* Capabilities: | |||
* attempts to unlock supported devices | |||
* extracts or helps acquire device data | |||
* integrates into forensic workflows | |||
* Publicly reported government users: | |||
* FBI | |||
* local police in the United States | |||
* police and government defense agencies in multiple countries including the United Kingdom, France, Germany, Sweden, Spain, and Italy according to public reporting on the company’s own claims<ref>[https://en.wikipedia.org/wiki/Grayshift Wikipedia: Grayshift]</ref> | |||
* Notable privacy / abuse stories: | |||
* sustained secrecy around agency use and public-records fights over GrayKey procurement and deployment<ref>[https://www.techdirt.com/2021/08/17/redaction-failure-shows-grayshift-is-swearing-cops-to-secrecy-about-phone-cracking-tech/ Techdirt on GrayKey secrecy]</ref> | |||
* continuing controversy around government access to phones that users believe are strongly protected | |||
* Avoidance / mitigation: | |||
* use a long passphrase rather than a short PIN | |||
* keep the device updated | |||
* configure USB restricted mode or equivalent protections | |||
* power down the device if seizure risk is imminent | |||
* treat any device returned after custody as potentially exposed | |||
== Graphite == | |||
Graphite is a commercial spyware product made by Paragon Solutions. Public technical reporting expanded significantly in 2025, when WhatsApp and Citizen Lab publicly described attacks and forensic findings involving Paragon’s spyware against journalists and civil-society targets.<ref>[https://www.reuters.com/technology/cybersecurity/metas-whatsapp-says-israeli-spyware-company-paragon-targeted-scores-users-2025-01-31/ Reuters: WhatsApp says Paragon targeted users]</ref><ref>[https://citizenlab.ca/research/first-forensic-confirmation-of-paragons-ios-mercenary-spyware-finds-journalists-targeted/ Citizen Lab: first forensic confirmation of Paragon spyware]</ref> | |||
* Vendor: | |||
* [[Paragon Solutions]] | |||
* Country of origin: | |||
* Israel<ref>[https://www.reuters.com/technology/cybersecurity/metas-whatsapp-says-israeli-spyware-company-paragon-targeted-scores-users-2025-01-31/ Reuters: Israeli spyware company Paragon]</ref><ref>[https://www.reuters.com/markets/deals/israeli-spyware-firm-paragon-acquired-by-us-investment-group-report-says-2024-12-16/ Reuters: Paragon acquired by U.S. investment group]</ref> | |||
* Type: | |||
* mercenary spyware / targeted surveillance platform | |||
* General description: | |||
* Commercial spyware reportedly sold to government customers for covert access to mobile devices and data in encrypted apps.<ref>[https://citizenlab.ca/research/a-first-look-at-paragons-proliferating-spyware-operations/ Citizen Lab: first look at Paragon operations]</ref> | |||
* Capabilities: | |||
* covert device surveillance | |||
* access to data on targeted phones | |||
* reported access to encrypted-app data once the device is compromised | |||
* Publicly reported government users: | |||
* Italy acknowledged use of Paragon systems in a political scandal context | |||
* Citizen Lab reported links to deployments associated with multiple democratic-state customers and identified infrastructure / cases in several countries<ref>[https://www.reuters.com/sustainability/society-equity/italy-has-ended-spyware-contract-with-paragon-parliamentary-document-shows-2025-06-09/ Reuters: Italy and Paragon part ways]</ref><ref>[https://citizenlab.ca/research/a-first-look-at-paragons-proliferating-spyware-operations/ Citizen Lab: Paragon operations]</ref> | |||
* Notable privacy / abuse stories: | |||
* WhatsApp said Paragon targeted scores of users including journalists and civil-society members<ref>[https://www.reuters.com/technology/cybersecurity/metas-whatsapp-says-israeli-spyware-company-paragon-targeted-scores-users-2025-01-31/ Reuters: WhatsApp and Paragon]</ref> | |||
* Italy’s Paragon relationship became a major public scandal after allegations of phones of critics and activists being hacked<ref>[https://www.reuters.com/sustainability/society-equity/italy-has-ended-spyware-contract-with-paragon-parliamentary-document-shows-2025-06-09/ Reuters: Italy ended contract with Paragon]</ref> | |||
* Citizen Lab published the first forensic confirmation of Paragon’s iOS spyware targeting journalists<ref>[https://citizenlab.ca/research/first-forensic-confirmation-of-paragons-ios-mercenary-spyware-finds-journalists-targeted/ Citizen Lab forensic confirmation]</ref> | |||
* Avoidance / mitigation: | |||
* keep iOS / Android fully updated | |||
* reduce attack surface by disabling unnecessary services and apps | |||
* be highly cautious with unsolicited files, group invites, and messages | |||
* for high-risk users, consider hardened platforms and rapid incident response plans | |||
* understand that sophisticated zero-click spyware may leave little visible evidence | |||
---- | |||
= Commercial Spyware = | |||
This section covers mercenary spyware sold by private vendors to government clients. These products are among the most dangerous classes of digital surveillance because they can turn a target’s own device into the surveillance platform. | |||
== NSO Group (Pegasus) == | |||
Pegasus is one of the most widely documented commercial spyware systems in the world. Public reporting, lawsuits, and research by Amnesty, Citizen Lab, Reuters, and the Pegasus Project have linked it to surveillance of journalists, activists, lawyers, political opposition, diplomats, and government officials in many countries.<ref>[https://www.reuters.com/world/pegasus-spyware-scandal-years-questions-no-answers-mexico-victims-2021-08-09/ Reuters: Pegasus scandal]</ref><ref>[https://www.amnesty.org/en/latest/press-release/2021/07/the-pegasus-project/ Amnesty: Pegasus Project]</ref><ref>[https://www.reuters.com/technology/cybersecurity/us-judge-finds-israels-nso-group-liable-hacking-whatsapp-lawsuit-2024-12-21/ Reuters: NSO liable in WhatsApp case]</ref> | |||
* Vendor: | |||
* [[NSO Group]] | |||
* Country of origin: | |||
* Israel<ref>[https://www.reuters.com/technology/cybersecurity/us-judge-finds-israels-nso-group-liable-hacking-whatsapp-lawsuit-2024-12-21/ Reuters: Israel's NSO Group]</ref> | |||
* Type: | |||
* advanced mobile spyware | |||
* General description: | |||
* Covert spyware platform used to compromise phones and gain access to communications, files, sensors, and location data. | |||
* Capabilities: | |||
* full or near-full device compromise on supported targets | |||
* access to messages, microphone, camera, photos, files, and location | |||
* zero-click exploitation in some operations | |||
* Publicly reported government users: | |||
* public reporting has linked likely clients or deployments to countries including Mexico, Saudi Arabia, Hungary, India, Spain, Poland, El Salvador, and others<ref>[https://www.theguardian.com/world/2021/jul/18/revealed-leak-uncovers-global-abuse-of-cyber-surveillance-weapon-nso-group-pegasus Guardian: Pegasus Project investigation]</ref><ref>[https://www.reuters.com/world/americas/mexico-probes-whether-pegasus-spyware-purchases-were-legal-2022-10-17/ Reuters: Mexico Pegasus purchases]</ref><ref>[https://www.reuters.com/technology/spain-closes-pegasus-spyware-probe-again-saying-israel-has-not-responded-2026-01-22/ Reuters: Spain Pegasus probe]</ref> | |||
* Notable privacy / abuse stories: | |||
* Pegasus Project reporting on widespread targeting of journalists, activists, and political figures<ref>[https://www.amnesty.org/en/latest/press-release/2021/07/the-pegasus-project/ Amnesty: Pegasus Project]</ref><ref>[https://www.theguardian.com/world/2021/jul/18/revealed-leak-uncovers-global-abuse-of-cyber-surveillance-weapon-nso-group-pegasus Guardian: leaked global abuse investigation]</ref> | |||
* Reuters on Mexico’s long-running Pegasus scandal<ref>[https://www.reuters.com/world/pegasus-spyware-scandal-years-questions-no-answers-mexico-victims-2021-08-09/ Reuters: Mexico victims]</ref> | |||
* Amnesty / Citizen Lab / Reuters on Pegasus found on phones of Palestinian rights workers<ref>[https://www.reuters.com/world/amnesty-says-nsos-pegasus-used-hack-phones-palestinian-rights-workers-2021-11-08/ Reuters: Palestinian rights workers]</ref> | |||
* U.S. court findings against NSO in the WhatsApp hacking case<ref>[https://www.reuters.com/technology/cybersecurity/us-judge-finds-israels-nso-group-liable-hacking-whatsapp-lawsuit-2024-12-21/ Reuters: NSO liable]</ref> | |||
* Avoidance / mitigation: | |||
* apply updates immediately | |||
* use hardened modes such as Lockdown Mode where available | |||
* reduce dependency on a single always-carried phone | |||
* keep a separate low-risk device for routine life if your threat model is serious | |||
* if you are high-risk, plan for forensic review rather than relying on visible signs | |||
== FinFisher (FinSpy) == | |||
FinSpy is a long-running commercial spyware suite whose deployments have been tracked by Citizen Lab, Amnesty, EFF, and others. It has repeatedly appeared in contexts involving authoritarian abuse and surveillance of dissidents.<ref>[https://www.amnesty.org/en/latest/research/2020/09/german-made-finspy-spyware-found-in-egypt-and-mac-and-linux-versions-revealed/ Amnesty: German-made FinSpy in Egypt]</ref><ref>[https://citizenlab.ca/research/mapping-finfishers-continuing-proliferation/ Citizen Lab: Mapping FinFisher proliferation]</ref> | |||
* Vendor: | |||
* [[FinFisher GmbH]] / historically associated with Gamma International branding in earlier reporting | |||
* Country of origin: | |||
* Germany / United Kingdom in historical reporting depending on the corporate entity referenced<ref>[https://www.amnesty.org/en/latest/research/2020/09/german-made-finspy-spyware-found-in-egypt-and-mac-and-linux-versions-revealed/ Amnesty: Munich-based FinFisher GmbH]</ref><ref>[https://citizenlab.ca/research/from-bahrain-with-love-finfishers-spy-kit-exposed/ Citizen Lab: Gamma International / FinFisher]</ref> | |||
* Type: | |||
* spyware / remote surveillance malware suite | |||
* General description: | |||
* Commercial malware suite used by governments for remote surveillance of computers and phones. | |||
* Capabilities: | |||
* remote monitoring | |||
* data exfiltration | |||
* surveillance of communications and activity | |||
* Publicly reported government users: | |||
* Bahrain | |||
* Ethiopia | |||
* United Arab Emirates | |||
* Egypt | |||
* Turkey | |||
* other governments identified through technical and legal reporting<ref>[https://www.amnesty.org/en/latest/research/2020/09/german-made-finspy-spyware-found-in-egypt-and-mac-and-linux-versions-revealed/ Amnesty: FinSpy in Egypt and other countries]</ref><ref>[https://citizenlab.ca/research/mapping-finfishers-continuing-proliferation/ Citizen Lab: FinFisher proliferation]</ref><ref>[https://www.reuters.com/article/world/german-firm-investigated-after-report-of-sending-spyware-to-turkey-idUSKCN1VQ1C9/ Reuters: spyware to Turkey]</ref> | |||
* Notable privacy / abuse stories: | |||
* Citizen Lab’s exposure of FinSpy targeting Bahraini dissidents<ref>[https://citizenlab.ca/research/from-bahrain-with-love-finfishers-spy-kit-exposed/ Citizen Lab: Bahrain with Love]</ref> | |||
* Amnesty on German-made FinSpy found in Egypt, including versions for Mac and Linux<ref>[https://www.amnesty.org/en/latest/research/2020/09/german-made-finspy-spyware-found-in-egypt-and-mac-and-linux-versions-revealed/ Amnesty: FinSpy in Egypt]</ref> | |||
* Reuters on investigations into alleged exports to Turkey<ref>[https://www.reuters.com/article/world/german-firm-investigated-after-report-of-sending-spyware-to-turkey-idUSKCN1VQ1C9/ Reuters: investigated over Turkey]</ref> | |||
* Avoidance / mitigation: | |||
* keep systems minimal | |||
* install software only from trusted sources | |||
* use compartmentalized systems for sensitive work | |||
* preserve suspicious files and messages for forensic analysis | |||
* treat politically timed phishing or attachments as high risk | |||
---- | |||
= Enterprise / Consumer Monitoring Software = | |||
This category includes administrative and monitoring platforms that are often deployed with organizational consent. They are not necessarily covert spyware, but they can still enable invasive control and surveillance over managed devices. | |||
== Mobile Device Management (MDM platforms) == | |||
MDM platforms let an organization enforce policy, deploy apps, restrict functionality, wipe devices remotely, and monitor compliance state. In a work or school setting, these tools can legitimately manage endpoints, but they can also create a level of institutional control many users do not fully understand.<ref>[https://learn.microsoft.com/en-us/intune/privacy/ Microsoft Intune privacy and personal data]</ref> | |||
* General description: | |||
* Centralized management and control platforms for phones, tablets, and computers. | |||
* Common capabilities: | |||
* policy enforcement | |||
* remote wipe | |||
* app deployment | |||
* compliance checks | |||
* restrictions on user actions | |||
* Publicly reported government / public-sector users: | |||
* widely used across public-sector and enterprise environments; exact deployments vary by country and organization | |||
* Known privacy concerns: | |||
* users often do not understand the distinction between managed and unmanaged data | |||
* a managed personal device can expose more administrative control than expected | |||
* Avoidance / mitigation: | |||
* do not enroll a personal device in organizational management unless you fully accept that control | |||
* use separate work and personal devices | |||
* audit management profiles regularly | |||
* remove management enrollment when you leave the organization | |||
== Microsoft Intune == | |||
Intune is one of the best-known MDM / endpoint management platforms. It is primarily an administrative control platform, not a secret hacking tool, so privacy concerns here are mostly about organizational oversight, policy enforcement, and the power to inspect or control managed devices rather than covert intrusion.<ref>[https://learn.microsoft.com/en-us/intune/privacy/ Microsoft Intune privacy and personal data]</ref> | |||
* Vendor: | |||
* [[Microsoft]] | |||
* Country of origin: | |||
* United States | |||
* Type: | |||
* mobile device management / endpoint management | |||
* General description: | |||
* Cloud-based platform for managing and securing organizational devices, apps, and access. | |||
* Publicly reported government / public-sector users: | |||
* broadly used by government and enterprise customers; public-sector adoption is common but varies widely | |||
* Notable privacy / abuse stories: | |||
* no single comparably famous covert-surveillance scandal was identified in this review | |||
* the main concern is administrative overreach, employee monitoring, and excessive organizational control rather than clandestine exploitation | |||
* Avoidance / mitigation: | |||
* avoid using Intune-managed devices for truly private personal life | |||
* read device-management prompts carefully | |||
* assume employer-managed devices are not private | |||
---- | |||
= Network and Bulk Data Analysis Platforms = | |||
These platforms generally do not hack phones themselves. Instead, they fuse, search, correlate, and operationalize data gathered from many other systems. | |||
== Gotham (Palantir Technologies) == | |||
Gotham is Palantir’s best-known government-facing platform. It is used for integrating datasets and building link-analysis and operational views across people, devices, places, events, and cases.<ref>[https://www.palantir.com/platforms/gotham/ Palantir Gotham]</ref> | |||
* Vendor: | |||
* [[Palantir Technologies]] | |||
* Country of origin: | |||
* United States | |||
* Type: | |||
* data fusion / intelligence analysis platform | |||
* General description: | |||
* Platform for combining many datasets and performing link analysis, geospatial analysis, investigative correlation, and operational planning.<ref>[https://www.palantir.com/platforms/gotham/ Palantir Gotham]</ref> | |||
* Publicly reported government users: | |||
* ICE | |||
* other U.S. federal defense and intelligence customers | |||
* law-enforcement and military customers in the United States and allied countries<ref>[https://www.palantir.com/ Palantir home]</ref><ref>[https://www.aclu.org/news/privacy-technology/palantir-deportation-roundup ACLU on Palantir and ICE]</ref> | |||
* Notable privacy / abuse stories: | |||
* longstanding criticism over Palantir’s role in ICE immigration enforcement and deportation operations<ref>[https://www.aclu.org/news/privacy-technology/palantir-deportation-roundup ACLU: ELITE and immigration enforcement]</ref> | |||
* reporting and criticism over police and intelligence surveillance applications<ref>[https://www.theguardian.com/world/2013/feb/07/palantir-big-data-gchq-nsa Guardian on Palantir and surveillance]</ref> | |||
* Avoidance / mitigation: | |||
* reduce the amount of data you feed into third-party services | |||
* minimize account sprawl and cross-linkable identity trails | |||
* prefer providers that collect less and share less | |||
* assume data disclosed to one system may later be fused with other records | |||
== Foundry (Palantir Technologies) == | |||
Foundry is Palantir’s enterprise data platform and is increasingly part of the same broader ecosystem of data integration and decision support. | |||
* Vendor: | |||
* [[Palantir Technologies]] | |||
* Country of origin: | |||
* United States | |||
* Type: | |||
* enterprise data integration and analytics platform | |||
* General description: | |||
* Platform for ingesting, modeling, transforming, and operationalizing large organizational datasets.<ref>[https://www.palantir.com/platforms/foundry/ Palantir Foundry]</ref> | |||
* Publicly reported government users: | |||
* Palantir sells broadly into government and commercial sectors<ref>[https://www.palantir.com/ Palantir home]</ref> | |||
* Notable privacy / abuse stories: | |||
* privacy concerns here usually relate to integration of large datasets into operational decision systems rather than direct hacking | |||
* Avoidance / mitigation: | |||
* reduce voluntary data disclosure and avoid unnecessary centralized data collection | |||
== Apollo (Palantir Technologies) == | |||
Apollo is Palantir’s deployment and orchestration platform. | |||
* Vendor: | |||
* [[Palantir Technologies]] | |||
* Country of origin: | |||
* United States | |||
* Type: | |||
* deployment / infrastructure control platform | |||
* General description: | |||
* Platform used to deploy and manage Palantir software across cloud, on-premises, and sensitive environments.<ref>[https://www.palantir.com/platforms/ Palantir platforms]</ref> | |||
* Publicly reported government users: | |||
* deployed as part of Palantir’s broader government stack | |||
* Notable privacy / abuse stories: | |||
* controversy is generally derivative of the larger Palantir ecosystem rather than Apollo alone | |||
* Avoidance / mitigation: | |||
* this is not a personal-device threat in the same way spyware is; the relevant defense is limiting data aggregation and institutional overreach upstream | |||
== AIP (Palantir Technologies) == | |||
AIP is Palantir’s artificial-intelligence platform layered onto its broader data stack. | |||
* Vendor: | |||
* [[Palantir Technologies]] | |||
* Country of origin: | |||
* United States | |||
* Type: | |||
* AI / LLM operational platform | |||
* General description: | |||
* Platform for connecting AI systems to operational data and workflows.<ref>[https://www.palantir.com/platforms/aip/ Palantir AIP]</ref> | |||
* Publicly reported government users: | |||
* U.S. defense and intelligence related integrations have been publicly promoted, including collaboration with Microsoft for government cloud environments<ref>[https://www.barrons.com/articles/palantir-microsoft-stock-ai-cloud-azure-079a3311 Barron's on Palantir and Microsoft government cloud AI]</ref> | |||
* Notable privacy / abuse stories: | |||
* the main concern is scaled automated decision support over sensitive datasets | |||
* Avoidance / mitigation: | |||
* resist unnecessary centralized profiling and automated triage systems where possible | |||
== Metropolis (Palantir Technologies) == | |||
Metropolis was an older Palantir finance-oriented platform and is largely superseded in current product discussions. | |||
* Vendor: | |||
* [[Palantir Technologies]] | |||
* Country of origin: | |||
* United States | |||
* Type: | |||
* legacy analytics platform | |||
* General description: | |||
* Older Palantir platform associated with financial-data analysis and related investigative workflows. | |||
* Publicly reported government users: | |||
* not a primary current focus in public reporting | |||
* Notable privacy / abuse stories: | |||
* not a major current standalone privacy story compared with Gotham or broader Palantir deployments | |||
* Avoidance / mitigation: | |||
* same general Palantir-oriented mitigation applies: reduce data centralization and linkability | |||
---- | |||
= Surveillance = | |||
This section covers camera and sensor systems that watch public or semi-public spaces and build persistent records of movement. | |||
== CCTV / Flock Cameras == | |||
Camera networks, especially those tied to automated license plate recognition (ALPR), can create large searchable movement histories. These systems are increasingly networked across municipalities, private neighborhoods, apartment complexes, retailers, schools, and police systems.<ref>[https://www.eff.org/pages/automated-license-plate-readers-alpr EFF: ALPR]</ref><ref>[https://www.aclu.org/news/privacy-technology/flock-ceo-goes-ballistic ACLU on Flock Safety]</ref> | |||
=== Flock Safety === | |||
Flock Safety is one of the most visible ALPR / camera-network vendors in the United States. The core privacy concern is not just the camera itself, but the searchable, shareable data network around it.<ref>[https://www.eff.org/deeplinks/2025/12/effs-investigations-expose-flock-safetys-surveillance-abuses-2025-review EFF on Flock investigations]</ref> | |||
* Vendor: | |||
* [[Flock Safety]] | |||
* Country of origin: | |||
* United States | |||
* Type: | |||
* ALPR / camera surveillance network | |||
* General description: | |||
* Networked camera platform used by police and private entities to capture and search vehicle and movement data. | |||
* Publicly reported government users: | |||
* numerous local police departments in the United States | |||
* concerns about federal access or downstream access by immigration-related agencies have featured heavily in recent reporting<ref>[https://www.aclu.org/news/privacy-technology/flock-massachusetts-and-updates ACLU on Flock data sharing]</ref><ref>[https://www.sfchronicle.com/bayarea/article/mountain-view-police-flock-license-plate-readers-21330156.php San Francisco Chronicle: Mountain View turns off Flock readers]</ref> | |||
* Notable privacy / abuse stories: | |||
* Mountain View police shut down Flock readers after alleging unauthorized federal access<ref>[https://www.sfchronicle.com/bayarea/article/mountain-view-police-flock-license-plate-readers-21330156.php SF Chronicle: unauthorized federal use]</ref> | |||
* ACLU and EFF have repeatedly documented Flock-related concerns around mass driver surveillance, data sharing, and activist / immigrant tracking concerns<ref>[https://www.aclu.org/news/privacy-technology/flock-ceo-goes-ballistic ACLU on mass driver surveillance]</ref><ref>[https://www.aclu.org/news/privacy-technology/flock-pushback ACLU on anti-immigrant use concerns]</ref><ref>[https://www.eff.org/deeplinks/2025/12/effs-investigations-expose-flock-safetys-surveillance-abuses-2025-review EFF on Flock abuses]</ref> | |||
* Avoidance / mitigation: | |||
* do not assume driving is anonymous | |||
* avoid building predictable travel routines when privacy matters | |||
* remember that public-space avoidance is limited and often impractical | |||
* use the smallest possible identity footprint in travel-related services | |||
---- | |||
= Operating Systems = | |||
Operating systems matter because they define how much control the user actually has over the hardware, software, trust chain, telemetry, and repairability of the device. Closed platforms can be strongly secured against some threats while still denying the owner meaningful control. | |||
== Mainstream Closed Platforms == | |||
These platforms dominate the consumer market, but they are not ideal choices if your priorities are transparency, auditability, local control, and resistance to centralized vendor power. | |||
=== iOS === | |||
iOS is a tightly controlled Apple platform with strong sandboxing and code-signing, but limited owner control over the device and software stack.<ref>[https://support.apple.com/guide/security/welcome/web Apple Platform Security]</ref> | |||
=== Android === | |||
Android is more open in theory than iOS, but most consumer deployments are still heavily mediated by Google, OEMs, carriers, locked bootloaders, and proprietary components.<ref>[https://source.android.com/security Android security]</ref> | |||
=== Microsoft Windows === | |||
Windows remains dominant on desktop systems, but from a privacy and autonomy perspective it is not an ideal platform for users who want auditable, owner-controlled systems. | |||
== Recommendation == | |||
If your priority is autonomy, transparency, and minimizing dependence on centralized proprietary control, it is reasonable to avoid these platforms where possible and use open-source systems instead. | |||
== Better Open Alternatives == | |||
Open-source alternatives vary by use case and threat model. | |||
* General Linux distributions: | |||
* Debian | |||
* Arch Linux | |||
* Fedora | |||
* other well-maintained Linux systems | |||
* Security- or privacy-focused systems: | |||
* [[Tails (operating system)|Tails]] for amnesic, anonymity-oriented sessions<ref>[https://tails.net/ Tails]</ref> | |||
* [[Qubes OS]] for compartmentalization and strong separation between activities<ref>[https://www.qubes-os.org/ Qubes OS]</ref> | |||
* [[GrapheneOS]] for a hardened Android-based mobile platform on supported Pixel devices<ref>[https://grapheneos.org/ GrapheneOS]</ref> | |||
== Avoidance / mitigation == | |||
No operating system is magic. Still, these steps generally help: | |||
* use open-source systems where practical | |||
* keep the system lean | |||
* avoid unnecessary proprietary services | |||
* separate identities and tasks across devices or compartments | |||
* prefer reproducible, auditable software where available | |||
---- | |||
= Companies = | |||
This section lists the companies behind the systems above. In most cases, the company is not merely a neutral manufacturer: its business model, customer base, and sales practices shape how the underlying technology is used. | |||
== Palantir Technologies == | |||
Palantir Technologies is a U.S. software company focused on large-scale data integration, operational analytics, and decision-support platforms for government and commercial customers.<ref>[https://www.palantir.com/ Palantir]</ref> | |||
* Country of origin: | |||
* United States | |||
* Main products: | |||
* Gotham | |||
* Foundry | |||
* Apollo | |||
* AIP | |||
* Metropolis (legacy) | |||
* General concern: | |||
* enabling governments and institutions to fuse large datasets into actionable targeting, enforcement, or operational systems | |||
== Cellebrite == | |||
Cellebrite is an Israeli digital-forensics company known for phone extraction and investigative analysis products used by law enforcement and other government customers.<ref>[https://cellebrite.com/en/ufed/ Cellebrite UFED]</ref> | |||
* Country of origin: | |||
* Israel | |||
* Main products: | |||
* UFED and related extraction / analysis tools | |||
* General concern: | |||
* making it easier for states to extract and operationalize intimate data from seized devices | |||
== Grayshift == | |||
Grayshift is a U.S. mobile-device forensics company known primarily for GrayKey.<ref>[https://www.grayshift.com/ Grayshift]</ref> | |||
* Country of origin: | |||
* United States | |||
* Main products: | |||
* GrayKey | |||
* General concern: | |||
* eroding the practical security assumptions people have about locked phones | |||
== Paragon Solutions == | |||
Paragon Solutions is an Israeli spyware vendor whose Graphite product became a major public controversy after reporting from WhatsApp, Reuters, and Citizen Lab in 2025.<ref>[https://www.reuters.com/technology/cybersecurity/metas-whatsapp-says-israeli-spyware-company-paragon-targeted-scores-users-2025-01-31/ Reuters: Paragon targeted WhatsApp users]</ref> | |||
* Country of origin: | |||
* Israel | |||
* Main products: | |||
* Graphite | |||
* General concern: | |||
* covert compromise of phones by government clients, including attacks on civil society | |||
== NSO Group == | |||
NSO Group is an Israeli spyware company best known for Pegasus and for the global scandals surrounding its government clients.<ref>[https://www.reuters.com/technology/cybersecurity/us-judge-finds-israels-nso-group-liable-hacking-whatsapp-lawsuit-2024-12-21/ Reuters: NSO liable]</ref> | |||
* Country of origin: | |||
* Israel | |||
* Main products: | |||
* Pegasus | |||
* General concern: | |||
* repeated documented use of mercenary spyware against journalists, activists, and political targets | |||
== FinFisher GmbH / related FinFisher entities == | |||
FinFisher is associated with commercial spyware long tied to authoritarian surveillance and human-rights abuses.<ref>[https://www.amnesty.org/en/latest/research/2020/09/german-made-finspy-spyware-found-in-egypt-and-mac-and-linux-versions-revealed/ Amnesty: FinSpy]</ref> | |||
* Country of origin: | |||
* Germany, with historical reporting also referencing UK-linked Gamma entities | |||
* Main products: | |||
* FinSpy / FinFisher suite | |||
* General concern: | |||
* export and deployment of spyware to abusive state actors | |||
== Microsoft == | |||
Microsoft is a U.S. technology company whose Intune platform is included here because organizational control over endpoints can become invasive even when framed as routine administration. | |||
* Country of origin: | |||
* United States | |||
* Main products relevant here: | |||
* Intune | |||
* General concern: | |||
* institutional control, monitoring, and policy enforcement over managed devices | |||
== L3Harris Technologies / Harris Corporation == | |||
Harris, now part of L3Harris, is the U.S. defense contractor most closely associated with the StingRay name. | |||
* Country of origin: | |||
* United States | |||
* Main products relevant here: | |||
* StingRay and related cell-site simulator family | |||
* General concern: | |||
* dragnet-style device identification and location tracking of phones in an area | |||
== Flock Safety == | |||
Flock Safety is a U.S. camera-network and ALPR company whose systems have become a flashpoint in debates over mass movement tracking. | |||
* Country of origin: | |||
* United States | |||
* Main products relevant here: | |||
* ALPR / camera networks | |||
* General concern: | |||
* large searchable databases of public movement and retroactive location histories | |||
---- | |||
= See Also = | |||
Related subjects that help place these systems in a broader context. | |||
* [[Mass surveillance]] | |||
* [[Digital forensics]] | |||
* [[Lawful interception]] | |||
* [[Zero-day exploit]] | |||
* [[Automated license plate recognition]] | |||
* [[Mobile device management]] | |||
* [[Link analysis]] | |||
* [[Data broker]] | |||
---- | |||
= References = | |||
This page relies heavily on reporting and research from the following organizations, among others: | |||
* Electronic Frontier Foundation – https://www.eff.org | |||
* ACLU – https://www.aclu.org | |||
* Citizen Lab – https://citizenlab.ca | |||
* Amnesty International – https://www.amnesty.org | |||
* Reuters – https://www.reuters.com | |||
* The Guardian – https://www.theguardian.com | |||
Revision as of 15:26, 21 April 2026
Surveillance and Digital Monitoring Systems
This page documents publicly known surveillance, device access, data extraction, monitoring, and analytics systems used by governments, police, intelligence services, and corporations. It also includes general notes on detection, likely indicators, and high-level defensive practices.
Many of these products are marketed for law enforcement, intelligence, enterprise administration, or “public safety.” In practice, they have repeatedly raised major civil-liberties and privacy concerns, especially when used in secret, without meaningful oversight, or against journalists, dissidents, immigrants, protesters, and political opponents.
Scope and Caveats
This page is an overview, not an exhaustive catalogue. Some systems have extensive public documentation, while others are documented mainly through investigative journalism, court records, procurement records, leaked materials, or technical analysis by groups like Citizen Lab, Amnesty International, EFF, ACLU, and major news organizations.
The fact that a product appears here does not mean every use is unlawful, nor does it mean all publicly alleged capabilities are always available in every deployment. Some vendors deliberately keep technical details secret, and some governments hide or mischaracterize how these tools are used.
Threat Model: How These Systems Fit Together
Modern surveillance usually operates as a pipeline rather than a single tool. Understanding the layers makes it easier to understand where risk comes from and where defensive measures help.
| Layer | Description | Example systems |
|---|---|---|
| Device exploitation | Direct compromise of a phone or computer | Pegasus, Graphite, FinSpy |
| Device access / extraction | Physical or forensic access to a seized device | Cellebrite UFED, GrayKey |
| Interception / location | Locating or identifying devices via network impersonation or network data | Stingray / cell-site simulators |
| Aggregation | Pulling many data sources together into one place | Telecom logs, law-enforcement databases, brokered data |
| Analysis / targeting | Correlating people, devices, places, events, and patterns | Gotham, Foundry, AIP |
| Operational action | Enforcement, deportation, arrests, raids, targeting, watchlisting, or battlefield use | Police, intelligence, border agencies, military units |
A key point is that some of the most controversial platforms do not break into phones directly; instead, they ingest and analyze data gathered by other tools or agencies.[1][2]
Detection and Indicators
This section covers general signs that a device, account, or movement pattern may be under surveillance. In many cases, especially with high-end spyware, there may be no obvious visible indicator at all.[3][4]
General Device Indicators
A compromised or monitored device may show:
- unusual battery drain
- unexplained heat when idle
- abnormal crashes or reboots
- unexpected network usage
- new profiles, certificates, or management agents
- strange permission prompts or security warnings
- missing or altered messages, settings, or call logs
These are weak indicators on their own. Normal software bugs and bad apps can cause similar symptoms. Sophisticated spyware may leave almost no user-visible signs.[5]
Indicators of Mobile Device Management / Administrative Control
A phone may be under administrative control if you see:
- a device management profile
- work container / managed app warnings
- restrictions on installing apps or changing settings
- remote wipe or compliance notices
- enterprise certificates or “managed by organization” messages
On iPhone and iPad, check settings related to device management profiles. On Android, check device admin apps, work profiles, and enterprise enrollment state.[6]
Indicators of Forensic Access After Seizure
After a device has been seized or handled out of your control, warning signs can include:
- changed lock settings
- newly trusted computers or accessories
- modified biometric enrollment
- unexplained recent unlocks
- logs or timestamps inconsistent with your own use
- unusual files or configuration changes after return
Forensic extraction often leaves fewer obvious indicators than malware, especially if the device was unlocked or physically controlled by authorities.
Indicators of Cell-Site Simulator / IMSI Catcher Use
Reliable end-user detection is difficult. Possible signals sometimes discussed by researchers and defenders include:
- sudden downgrade to weaker network modes
- unstable cellular service in a specific area
- unusual baseband / network behavior
- repeated attach / detach events
- suspicious concentration of police or surveillance vehicles during protests or targeted operations
These are not definitive. Consumer devices generally do not expose enough radio-layer detail for dependable confirmation.[7][8]
Indicators of Camera / Vehicle Tracking Networks
You may be in a dense ALPR / camera surveillance area if you see:
- fixed roadside camera clusters at entrances, exits, intersections, apartment complexes, retail lots, and neighborhood choke points
- private “safety” camera branding
- police integration with neighborhood or private camera systems
- public records or council documents showing ALPR deployment
These systems often create retrospective travel histories, even when they are not continuously watched in real time.[9][10]
What To Do If You Suspect Surveillance
If compromise is plausible:
- stop assuming the device is trustworthy
- move sensitive conversations to a different device that has not been exposed
- preserve evidence before wiping or changing too much
- document dates, detentions, border crossings, suspicious messages, and unusual behavior
- seek professional forensic help if the stakes are high
- consider that your contacts may also be targeted
For high-risk users such as activists, journalists, lawyers, researchers, and political organizers, the safest assumption is often that a suspected device should not be trusted until properly examined.[11][12]
Mobile Device Interception
This category covers systems that identify, locate, or interact with mobile devices over the air, usually by imitating network infrastructure or exploiting the phone’s trust in the cellular network.
Cell-Site Simulators (IMSI Catchers)
Cell-site simulators impersonate legitimate cell towers so nearby phones connect to them. This can expose device identifiers and help locate a target device. Public reporting and civil-liberties litigation have shown these tools have been used by federal, state, and local agencies in the United States and elsewhere.[13][14]
Stingray
StingRay is the best-known brand name for a class of cell-site simulators. The name is often used generically for similar devices.
- Vendor:
* Harris Corporation / L3Harris Technologies
- Country of origin:
* United States
- Type:
* IMSI catcher / cell-site simulator
- General description:
* A surveillance device that impersonates a cellular tower so nearby phones connect to it, revealing device identifiers and assisting in location tracking.[15][16]
- Capabilities:
* identifies nearby devices via IMSI/IMEI * assists in locating a device * can affect all phones in range, not only the target
- Publicly reported government users:
* FBI * DEA * CBP / ICE * numerous state and local police agencies in the United States * reported use by agencies in Canada and the United Kingdom as well[17][18][19]
- Notable privacy / abuse stories:
* a federal judge in New York suppressed evidence after DEA used a stingray without a warrant[20] * ACLU and EFF litigation exposed secret stingray use that had not been disclosed to the court or defendant[21]
- Avoidance / mitigation:
* assume cellular metadata is exposed to the network operator and potentially to surveillance tools * prefer end-to-end encrypted apps for content confidentiality * disable radios when not needed * avoid carrying a primary phone to highly sensitive meetings if exposure would be severe * understand that reliable consumer-side detection is difficult
Mobile Device Access
This category covers tools used after a device has been seized, borrowed, detained, confiscated, or otherwise physically controlled by another party.
Cellebrite (UFED)
Cellebrite’s UFED line is one of the best-known mobile device extraction tool families used in digital forensics. The company markets its tools to law enforcement and public-sector investigators, and public reporting has repeatedly tied its products to controversial extractions involving activists, protesters, and journalists.[22][23]
- Vendor:
* Cellebrite
- Country of origin:
* Israel[24]
- Type:
* mobile device extraction / digital forensics
- General description:
* Commercial forensic platform used to extract and analyze data from phones and other digital devices.[25]
- Capabilities:
* logical and physical extraction, depending on device and condition * recovery of messages, contacts, app data, files, and other records * analysis and review of extracted device data
- Publicly reported government users:
* FBI and other U.S. federal agencies * police and security agencies in Serbia * authorities in Georgia * authorities in Jordan * many other law-enforcement customers globally[26][27][28][29]
- Notable privacy / abuse stories:
* Amnesty and Reuters reported Serbian authorities used Cellebrite tools during detentions tied to surveillance of activists and journalists[30] * Reuters reported Georgia renewed contracts for Cellebrite tools amid protest crackdowns[31] * Citizen Lab / Guardian reporting tied Cellebrite tools to phone extractions of pro-Gaza activists in Jordan[32]
- Avoidance / mitigation:
* use a long alphanumeric passcode * disable biometric unlock when coercion risk is high * power down devices before border crossings, detention risk, or seizure risk * keep full-disk encryption enabled * do not surrender your primary device unlocked if you can lawfully avoid it * separate high-risk communications from your everyday phone
Mobile Device "Forensic" Tools
This category covers specialized systems aimed at bypassing device protections and extracting data from phones, often after physical seizure.
Grayshift (GrayKey)
GrayKey is a mobile-device access and extraction system used by law-enforcement and government customers. Public reporting and vendor materials indicate wide deployment across multiple countries, though details of current capabilities vary by device model and software version.[33][34]
- Vendor:
* Grayshift
- Country of origin:
* United States[35]
- Type:
* phone unlocking / forensic access tool
- General description:
* Commercial device used to attempt access to locked smartphones and support forensic extraction workflows.
- Capabilities:
* attempts to unlock supported devices * extracts or helps acquire device data * integrates into forensic workflows
- Publicly reported government users:
* FBI * local police in the United States * police and government defense agencies in multiple countries including the United Kingdom, France, Germany, Sweden, Spain, and Italy according to public reporting on the company’s own claims[36]
- Notable privacy / abuse stories:
* sustained secrecy around agency use and public-records fights over GrayKey procurement and deployment[37] * continuing controversy around government access to phones that users believe are strongly protected
- Avoidance / mitigation:
* use a long passphrase rather than a short PIN * keep the device updated * configure USB restricted mode or equivalent protections * power down the device if seizure risk is imminent * treat any device returned after custody as potentially exposed
Graphite
Graphite is a commercial spyware product made by Paragon Solutions. Public technical reporting expanded significantly in 2025, when WhatsApp and Citizen Lab publicly described attacks and forensic findings involving Paragon’s spyware against journalists and civil-society targets.[38][39]
- Vendor:
* Paragon Solutions
- Country of origin:
* Israel[40][41]
- Type:
* mercenary spyware / targeted surveillance platform
- General description:
* Commercial spyware reportedly sold to government customers for covert access to mobile devices and data in encrypted apps.[42]
- Capabilities:
* covert device surveillance * access to data on targeted phones * reported access to encrypted-app data once the device is compromised
- Publicly reported government users:
* Italy acknowledged use of Paragon systems in a political scandal context * Citizen Lab reported links to deployments associated with multiple democratic-state customers and identified infrastructure / cases in several countries[43][44]
- Notable privacy / abuse stories:
* WhatsApp said Paragon targeted scores of users including journalists and civil-society members[45] * Italy’s Paragon relationship became a major public scandal after allegations of phones of critics and activists being hacked[46] * Citizen Lab published the first forensic confirmation of Paragon’s iOS spyware targeting journalists[47]
- Avoidance / mitigation:
* keep iOS / Android fully updated * reduce attack surface by disabling unnecessary services and apps * be highly cautious with unsolicited files, group invites, and messages * for high-risk users, consider hardened platforms and rapid incident response plans * understand that sophisticated zero-click spyware may leave little visible evidence
Commercial Spyware
This section covers mercenary spyware sold by private vendors to government clients. These products are among the most dangerous classes of digital surveillance because they can turn a target’s own device into the surveillance platform.
NSO Group (Pegasus)
Pegasus is one of the most widely documented commercial spyware systems in the world. Public reporting, lawsuits, and research by Amnesty, Citizen Lab, Reuters, and the Pegasus Project have linked it to surveillance of journalists, activists, lawyers, political opposition, diplomats, and government officials in many countries.[48][49][50]
- Vendor:
* NSO Group
- Country of origin:
* Israel[51]
- Type:
* advanced mobile spyware
- General description:
* Covert spyware platform used to compromise phones and gain access to communications, files, sensors, and location data.
- Capabilities:
* full or near-full device compromise on supported targets * access to messages, microphone, camera, photos, files, and location * zero-click exploitation in some operations
- Publicly reported government users:
* public reporting has linked likely clients or deployments to countries including Mexico, Saudi Arabia, Hungary, India, Spain, Poland, El Salvador, and others[52][53][54]
- Notable privacy / abuse stories:
* Pegasus Project reporting on widespread targeting of journalists, activists, and political figures[55][56] * Reuters on Mexico’s long-running Pegasus scandal[57] * Amnesty / Citizen Lab / Reuters on Pegasus found on phones of Palestinian rights workers[58] * U.S. court findings against NSO in the WhatsApp hacking case[59]
- Avoidance / mitigation:
* apply updates immediately * use hardened modes such as Lockdown Mode where available * reduce dependency on a single always-carried phone * keep a separate low-risk device for routine life if your threat model is serious * if you are high-risk, plan for forensic review rather than relying on visible signs
FinFisher (FinSpy)
FinSpy is a long-running commercial spyware suite whose deployments have been tracked by Citizen Lab, Amnesty, EFF, and others. It has repeatedly appeared in contexts involving authoritarian abuse and surveillance of dissidents.[60][61]
- Vendor:
* FinFisher GmbH / historically associated with Gamma International branding in earlier reporting
- Country of origin:
* Germany / United Kingdom in historical reporting depending on the corporate entity referenced[62][63]
- Type:
* spyware / remote surveillance malware suite
- General description:
* Commercial malware suite used by governments for remote surveillance of computers and phones.
- Capabilities:
* remote monitoring * data exfiltration * surveillance of communications and activity
- Publicly reported government users:
* Bahrain * Ethiopia * United Arab Emirates * Egypt * Turkey * other governments identified through technical and legal reporting[64][65][66]
- Notable privacy / abuse stories:
* Citizen Lab’s exposure of FinSpy targeting Bahraini dissidents[67] * Amnesty on German-made FinSpy found in Egypt, including versions for Mac and Linux[68] * Reuters on investigations into alleged exports to Turkey[69]
- Avoidance / mitigation:
* keep systems minimal * install software only from trusted sources * use compartmentalized systems for sensitive work * preserve suspicious files and messages for forensic analysis * treat politically timed phishing or attachments as high risk
Enterprise / Consumer Monitoring Software
This category includes administrative and monitoring platforms that are often deployed with organizational consent. They are not necessarily covert spyware, but they can still enable invasive control and surveillance over managed devices.
Mobile Device Management (MDM platforms)
MDM platforms let an organization enforce policy, deploy apps, restrict functionality, wipe devices remotely, and monitor compliance state. In a work or school setting, these tools can legitimately manage endpoints, but they can also create a level of institutional control many users do not fully understand.[70]
- General description:
* Centralized management and control platforms for phones, tablets, and computers.
- Common capabilities:
* policy enforcement * remote wipe * app deployment * compliance checks * restrictions on user actions
- Publicly reported government / public-sector users:
* widely used across public-sector and enterprise environments; exact deployments vary by country and organization
- Known privacy concerns:
* users often do not understand the distinction between managed and unmanaged data * a managed personal device can expose more administrative control than expected
- Avoidance / mitigation:
* do not enroll a personal device in organizational management unless you fully accept that control * use separate work and personal devices * audit management profiles regularly * remove management enrollment when you leave the organization
Microsoft Intune
Intune is one of the best-known MDM / endpoint management platforms. It is primarily an administrative control platform, not a secret hacking tool, so privacy concerns here are mostly about organizational oversight, policy enforcement, and the power to inspect or control managed devices rather than covert intrusion.[71]
- Vendor:
* Microsoft
- Country of origin:
* United States
- Type:
* mobile device management / endpoint management
- General description:
* Cloud-based platform for managing and securing organizational devices, apps, and access.
- Publicly reported government / public-sector users:
* broadly used by government and enterprise customers; public-sector adoption is common but varies widely
- Notable privacy / abuse stories:
* no single comparably famous covert-surveillance scandal was identified in this review * the main concern is administrative overreach, employee monitoring, and excessive organizational control rather than clandestine exploitation
- Avoidance / mitigation:
* avoid using Intune-managed devices for truly private personal life * read device-management prompts carefully * assume employer-managed devices are not private
Network and Bulk Data Analysis Platforms
These platforms generally do not hack phones themselves. Instead, they fuse, search, correlate, and operationalize data gathered from many other systems.
Gotham (Palantir Technologies)
Gotham is Palantir’s best-known government-facing platform. It is used for integrating datasets and building link-analysis and operational views across people, devices, places, events, and cases.[72]
- Vendor:
* Palantir Technologies
- Country of origin:
* United States
- Type:
* data fusion / intelligence analysis platform
- General description:
* Platform for combining many datasets and performing link analysis, geospatial analysis, investigative correlation, and operational planning.[73]
- Publicly reported government users:
* ICE * other U.S. federal defense and intelligence customers * law-enforcement and military customers in the United States and allied countries[74][75]
- Notable privacy / abuse stories:
* longstanding criticism over Palantir’s role in ICE immigration enforcement and deportation operations[76] * reporting and criticism over police and intelligence surveillance applications[77]
- Avoidance / mitigation:
* reduce the amount of data you feed into third-party services * minimize account sprawl and cross-linkable identity trails * prefer providers that collect less and share less * assume data disclosed to one system may later be fused with other records
Foundry (Palantir Technologies)
Foundry is Palantir’s enterprise data platform and is increasingly part of the same broader ecosystem of data integration and decision support.
- Vendor:
* Palantir Technologies
- Country of origin:
* United States
- Type:
* enterprise data integration and analytics platform
- General description:
* Platform for ingesting, modeling, transforming, and operationalizing large organizational datasets.[78]
- Publicly reported government users:
* Palantir sells broadly into government and commercial sectors[79]
- Notable privacy / abuse stories:
* privacy concerns here usually relate to integration of large datasets into operational decision systems rather than direct hacking
- Avoidance / mitigation:
* reduce voluntary data disclosure and avoid unnecessary centralized data collection
Apollo (Palantir Technologies)
Apollo is Palantir’s deployment and orchestration platform.
- Vendor:
* Palantir Technologies
- Country of origin:
* United States
- Type:
* deployment / infrastructure control platform
- General description:
* Platform used to deploy and manage Palantir software across cloud, on-premises, and sensitive environments.[80]
- Publicly reported government users:
* deployed as part of Palantir’s broader government stack
- Notable privacy / abuse stories:
* controversy is generally derivative of the larger Palantir ecosystem rather than Apollo alone
- Avoidance / mitigation:
* this is not a personal-device threat in the same way spyware is; the relevant defense is limiting data aggregation and institutional overreach upstream
AIP (Palantir Technologies)
AIP is Palantir’s artificial-intelligence platform layered onto its broader data stack.
- Vendor:
* Palantir Technologies
- Country of origin:
* United States
- Type:
* AI / LLM operational platform
- General description:
* Platform for connecting AI systems to operational data and workflows.[81]
- Publicly reported government users:
* U.S. defense and intelligence related integrations have been publicly promoted, including collaboration with Microsoft for government cloud environments[82]
- Notable privacy / abuse stories:
* the main concern is scaled automated decision support over sensitive datasets
- Avoidance / mitigation:
* resist unnecessary centralized profiling and automated triage systems where possible
Metropolis (Palantir Technologies)
Metropolis was an older Palantir finance-oriented platform and is largely superseded in current product discussions.
- Vendor:
* Palantir Technologies
- Country of origin:
* United States
- Type:
* legacy analytics platform
- General description:
* Older Palantir platform associated with financial-data analysis and related investigative workflows.
- Publicly reported government users:
* not a primary current focus in public reporting
- Notable privacy / abuse stories:
* not a major current standalone privacy story compared with Gotham or broader Palantir deployments
- Avoidance / mitigation:
* same general Palantir-oriented mitigation applies: reduce data centralization and linkability
Surveillance
This section covers camera and sensor systems that watch public or semi-public spaces and build persistent records of movement.
CCTV / Flock Cameras
Camera networks, especially those tied to automated license plate recognition (ALPR), can create large searchable movement histories. These systems are increasingly networked across municipalities, private neighborhoods, apartment complexes, retailers, schools, and police systems.[83][84]
Flock Safety
Flock Safety is one of the most visible ALPR / camera-network vendors in the United States. The core privacy concern is not just the camera itself, but the searchable, shareable data network around it.[85]
- Vendor:
* Flock Safety
- Country of origin:
* United States
- Type:
* ALPR / camera surveillance network
- General description:
* Networked camera platform used by police and private entities to capture and search vehicle and movement data.
- Publicly reported government users:
* numerous local police departments in the United States * concerns about federal access or downstream access by immigration-related agencies have featured heavily in recent reporting[86][87]
- Notable privacy / abuse stories:
* Mountain View police shut down Flock readers after alleging unauthorized federal access[88] * ACLU and EFF have repeatedly documented Flock-related concerns around mass driver surveillance, data sharing, and activist / immigrant tracking concerns[89][90][91]
- Avoidance / mitigation:
* do not assume driving is anonymous * avoid building predictable travel routines when privacy matters * remember that public-space avoidance is limited and often impractical * use the smallest possible identity footprint in travel-related services
Operating Systems
Operating systems matter because they define how much control the user actually has over the hardware, software, trust chain, telemetry, and repairability of the device. Closed platforms can be strongly secured against some threats while still denying the owner meaningful control.
Mainstream Closed Platforms
These platforms dominate the consumer market, but they are not ideal choices if your priorities are transparency, auditability, local control, and resistance to centralized vendor power.
iOS
iOS is a tightly controlled Apple platform with strong sandboxing and code-signing, but limited owner control over the device and software stack.[92]
Android
Android is more open in theory than iOS, but most consumer deployments are still heavily mediated by Google, OEMs, carriers, locked bootloaders, and proprietary components.[93]
Microsoft Windows
Windows remains dominant on desktop systems, but from a privacy and autonomy perspective it is not an ideal platform for users who want auditable, owner-controlled systems.
Recommendation
If your priority is autonomy, transparency, and minimizing dependence on centralized proprietary control, it is reasonable to avoid these platforms where possible and use open-source systems instead.
Better Open Alternatives
Open-source alternatives vary by use case and threat model.
- General Linux distributions:
* Debian * Arch Linux * Fedora * other well-maintained Linux systems
- Security- or privacy-focused systems:
* Tails for amnesic, anonymity-oriented sessions[94] * Qubes OS for compartmentalization and strong separation between activities[95] * GrapheneOS for a hardened Android-based mobile platform on supported Pixel devices[96]
Avoidance / mitigation
No operating system is magic. Still, these steps generally help:
- use open-source systems where practical
- keep the system lean
- avoid unnecessary proprietary services
- separate identities and tasks across devices or compartments
- prefer reproducible, auditable software where available
Companies
This section lists the companies behind the systems above. In most cases, the company is not merely a neutral manufacturer: its business model, customer base, and sales practices shape how the underlying technology is used.
Palantir Technologies
Palantir Technologies is a U.S. software company focused on large-scale data integration, operational analytics, and decision-support platforms for government and commercial customers.[97]
- Country of origin:
* United States
- Main products:
* Gotham * Foundry * Apollo * AIP * Metropolis (legacy)
- General concern:
* enabling governments and institutions to fuse large datasets into actionable targeting, enforcement, or operational systems
Cellebrite
Cellebrite is an Israeli digital-forensics company known for phone extraction and investigative analysis products used by law enforcement and other government customers.[98]
- Country of origin:
* Israel
- Main products:
* UFED and related extraction / analysis tools
- General concern:
* making it easier for states to extract and operationalize intimate data from seized devices
Grayshift
Grayshift is a U.S. mobile-device forensics company known primarily for GrayKey.[99]
- Country of origin:
* United States
- Main products:
* GrayKey
- General concern:
* eroding the practical security assumptions people have about locked phones
Paragon Solutions
Paragon Solutions is an Israeli spyware vendor whose Graphite product became a major public controversy after reporting from WhatsApp, Reuters, and Citizen Lab in 2025.[100]
- Country of origin:
* Israel
- Main products:
* Graphite
- General concern:
* covert compromise of phones by government clients, including attacks on civil society
NSO Group
NSO Group is an Israeli spyware company best known for Pegasus and for the global scandals surrounding its government clients.[101]
- Country of origin:
* Israel
- Main products:
* Pegasus
- General concern:
* repeated documented use of mercenary spyware against journalists, activists, and political targets
FinFisher GmbH / related FinFisher entities
FinFisher is associated with commercial spyware long tied to authoritarian surveillance and human-rights abuses.[102]
- Country of origin:
* Germany, with historical reporting also referencing UK-linked Gamma entities
- Main products:
* FinSpy / FinFisher suite
- General concern:
* export and deployment of spyware to abusive state actors
Microsoft
Microsoft is a U.S. technology company whose Intune platform is included here because organizational control over endpoints can become invasive even when framed as routine administration.
- Country of origin:
* United States
- Main products relevant here:
* Intune
- General concern:
* institutional control, monitoring, and policy enforcement over managed devices
L3Harris Technologies / Harris Corporation
Harris, now part of L3Harris, is the U.S. defense contractor most closely associated with the StingRay name.
- Country of origin:
* United States
- Main products relevant here:
* StingRay and related cell-site simulator family
- General concern:
* dragnet-style device identification and location tracking of phones in an area
Flock Safety
Flock Safety is a U.S. camera-network and ALPR company whose systems have become a flashpoint in debates over mass movement tracking.
- Country of origin:
* United States
- Main products relevant here:
* ALPR / camera networks
- General concern:
* large searchable databases of public movement and retroactive location histories
See Also
Related subjects that help place these systems in a broader context.
- Mass surveillance
- Digital forensics
- Lawful interception
- Zero-day exploit
- Automated license plate recognition
- Mobile device management
- Link analysis
- Data broker
References
This page relies heavily on reporting and research from the following organizations, among others:
- Electronic Frontier Foundation – https://www.eff.org
- ACLU – https://www.aclu.org
- Citizen Lab – https://citizenlab.ca
- Amnesty International – https://www.amnesty.org
- Reuters – https://www.reuters.com
- The Guardian – https://www.theguardian.com
- ↑ Palantir platforms
- ↑ Palantir Gotham
- ↑ Amnesty International Pegasus forensic methodology
- ↑ Citizen Lab: first forensic confirmation of Paragon spyware
- ↑ Amnesty International Pegasus forensic methodology
- ↑ Microsoft Intune privacy and personal data
- ↑ EFF: Cell-site simulators / IMSI catchers
- ↑ ACLU: Stingray tracking devices
- ↑ EFF: Automated license plate readers
- ↑ ACLU on Flock Safety and mass driver surveillance
- ↑ Citizen Lab
- ↑ Surveillance Self-Defense | EFF
- ↑ EFF: Cell-site simulators / IMSI catchers
- ↑ EPIC: Stingray / cell-site simulator records
- ↑ EFF: Cell-site simulators / IMSI catchers
- ↑ Cato: Stingray: A New Frontier in Police Surveillance
- ↑ EPIC: FBI use of cell-site simulators
- ↑ ACLU stingray cases
- ↑ EFF on secret stingray use in Wisconsin case
- ↑ Reuters: judge throws out stingray evidence
- ↑ EFF on secret stingray use
- ↑ Cellebrite UFED
- ↑ Reuters: Georgia and Cellebrite procurement
- ↑ Reuters: Israeli technology firm Cellebrite
- ↑ Cellebrite UFED
- ↑ Reuters on Cellebrite equipment
- ↑ Reuters: Georgia procurement
- ↑ Reuters: Serbia and Cellebrite
- ↑ Guardian: Jordan and Cellebrite
- ↑ Reuters: Serbia used Israeli firm's tech
- ↑ Reuters: Georgia procurement
- ↑ Guardian: Jordan used Israeli phone-cracking tool
- ↑ Grayshift
- ↑ Wikipedia: Grayshift
- ↑ Wikipedia: Grayshift
- ↑ Wikipedia: Grayshift
- ↑ Techdirt on GrayKey secrecy
- ↑ Reuters: WhatsApp says Paragon targeted users
- ↑ Citizen Lab: first forensic confirmation of Paragon spyware
- ↑ Reuters: Israeli spyware company Paragon
- ↑ Reuters: Paragon acquired by U.S. investment group
- ↑ Citizen Lab: first look at Paragon operations
- ↑ Reuters: Italy and Paragon part ways
- ↑ Citizen Lab: Paragon operations
- ↑ Reuters: WhatsApp and Paragon
- ↑ Reuters: Italy ended contract with Paragon
- ↑ Citizen Lab forensic confirmation
- ↑ Reuters: Pegasus scandal
- ↑ Amnesty: Pegasus Project
- ↑ Reuters: NSO liable in WhatsApp case
- ↑ Reuters: Israel's NSO Group
- ↑ Guardian: Pegasus Project investigation
- ↑ Reuters: Mexico Pegasus purchases
- ↑ Reuters: Spain Pegasus probe
- ↑ Amnesty: Pegasus Project
- ↑ Guardian: leaked global abuse investigation
- ↑ Reuters: Mexico victims
- ↑ Reuters: Palestinian rights workers
- ↑ Reuters: NSO liable
- ↑ Amnesty: German-made FinSpy in Egypt
- ↑ Citizen Lab: Mapping FinFisher proliferation
- ↑ Amnesty: Munich-based FinFisher GmbH
- ↑ Citizen Lab: Gamma International / FinFisher
- ↑ Amnesty: FinSpy in Egypt and other countries
- ↑ Citizen Lab: FinFisher proliferation
- ↑ Reuters: spyware to Turkey
- ↑ Citizen Lab: Bahrain with Love
- ↑ Amnesty: FinSpy in Egypt
- ↑ Reuters: investigated over Turkey
- ↑ Microsoft Intune privacy and personal data
- ↑ Microsoft Intune privacy and personal data
- ↑ Palantir Gotham
- ↑ Palantir Gotham
- ↑ Palantir home
- ↑ ACLU on Palantir and ICE
- ↑ ACLU: ELITE and immigration enforcement
- ↑ Guardian on Palantir and surveillance
- ↑ Palantir Foundry
- ↑ Palantir home
- ↑ Palantir platforms
- ↑ Palantir AIP
- ↑ Barron's on Palantir and Microsoft government cloud AI
- ↑ EFF: ALPR
- ↑ ACLU on Flock Safety
- ↑ EFF on Flock investigations
- ↑ ACLU on Flock data sharing
- ↑ San Francisco Chronicle: Mountain View turns off Flock readers
- ↑ SF Chronicle: unauthorized federal use
- ↑ ACLU on mass driver surveillance
- ↑ ACLU on anti-immigrant use concerns
- ↑ EFF on Flock abuses
- ↑ Apple Platform Security
- ↑ Android security
- ↑ Tails
- ↑ Qubes OS
- ↑ GrapheneOS
- ↑ Palantir
- ↑ Cellebrite UFED
- ↑ Grayshift
- ↑ Reuters: Paragon targeted WhatsApp users
- ↑ Reuters: NSO liable
- ↑ Amnesty: FinSpy