Privacy-Invading Systems and How to Avoid Them

From Jeremy Bryan Smith
Revision as of 15:26, 21 April 2026 by Jeremy (talk | contribs)
Jump to navigation Jump to search

Surveillance and Digital Monitoring Systems

This page documents publicly known surveillance, device access, data extraction, monitoring, and analytics systems used by governments, police, intelligence services, and corporations. It also includes general notes on detection, likely indicators, and high-level defensive practices.

Many of these products are marketed for law enforcement, intelligence, enterprise administration, or “public safety.” In practice, they have repeatedly raised major civil-liberties and privacy concerns, especially when used in secret, without meaningful oversight, or against journalists, dissidents, immigrants, protesters, and political opponents.

Scope and Caveats

This page is an overview, not an exhaustive catalogue. Some systems have extensive public documentation, while others are documented mainly through investigative journalism, court records, procurement records, leaked materials, or technical analysis by groups like Citizen Lab, Amnesty International, EFF, ACLU, and major news organizations.

The fact that a product appears here does not mean every use is unlawful, nor does it mean all publicly alleged capabilities are always available in every deployment. Some vendors deliberately keep technical details secret, and some governments hide or mischaracterize how these tools are used.


Threat Model: How These Systems Fit Together

Modern surveillance usually operates as a pipeline rather than a single tool. Understanding the layers makes it easier to understand where risk comes from and where defensive measures help.

Layer Description Example systems
Device exploitation Direct compromise of a phone or computer Pegasus, Graphite, FinSpy
Device access / extraction Physical or forensic access to a seized device Cellebrite UFED, GrayKey
Interception / location Locating or identifying devices via network impersonation or network data Stingray / cell-site simulators
Aggregation Pulling many data sources together into one place Telecom logs, law-enforcement databases, brokered data
Analysis / targeting Correlating people, devices, places, events, and patterns Gotham, Foundry, AIP
Operational action Enforcement, deportation, arrests, raids, targeting, watchlisting, or battlefield use Police, intelligence, border agencies, military units

A key point is that some of the most controversial platforms do not break into phones directly; instead, they ingest and analyze data gathered by other tools or agencies.[1][2]


Detection and Indicators

This section covers general signs that a device, account, or movement pattern may be under surveillance. In many cases, especially with high-end spyware, there may be no obvious visible indicator at all.[3][4]

General Device Indicators

A compromised or monitored device may show:

  • unusual battery drain
  • unexplained heat when idle
  • abnormal crashes or reboots
  • unexpected network usage
  • new profiles, certificates, or management agents
  • strange permission prompts or security warnings
  • missing or altered messages, settings, or call logs

These are weak indicators on their own. Normal software bugs and bad apps can cause similar symptoms. Sophisticated spyware may leave almost no user-visible signs.[5]

Indicators of Mobile Device Management / Administrative Control

A phone may be under administrative control if you see:

  • a device management profile
  • work container / managed app warnings
  • restrictions on installing apps or changing settings
  • remote wipe or compliance notices
  • enterprise certificates or “managed by organization” messages

On iPhone and iPad, check settings related to device management profiles. On Android, check device admin apps, work profiles, and enterprise enrollment state.[6]

Indicators of Forensic Access After Seizure

After a device has been seized or handled out of your control, warning signs can include:

  • changed lock settings
  • newly trusted computers or accessories
  • modified biometric enrollment
  • unexplained recent unlocks
  • logs or timestamps inconsistent with your own use
  • unusual files or configuration changes after return

Forensic extraction often leaves fewer obvious indicators than malware, especially if the device was unlocked or physically controlled by authorities.

Indicators of Cell-Site Simulator / IMSI Catcher Use

Reliable end-user detection is difficult. Possible signals sometimes discussed by researchers and defenders include:

  • sudden downgrade to weaker network modes
  • unstable cellular service in a specific area
  • unusual baseband / network behavior
  • repeated attach / detach events
  • suspicious concentration of police or surveillance vehicles during protests or targeted operations

These are not definitive. Consumer devices generally do not expose enough radio-layer detail for dependable confirmation.[7][8]

Indicators of Camera / Vehicle Tracking Networks

You may be in a dense ALPR / camera surveillance area if you see:

  • fixed roadside camera clusters at entrances, exits, intersections, apartment complexes, retail lots, and neighborhood choke points
  • private “safety” camera branding
  • police integration with neighborhood or private camera systems
  • public records or council documents showing ALPR deployment

These systems often create retrospective travel histories, even when they are not continuously watched in real time.[9][10]

What To Do If You Suspect Surveillance

If compromise is plausible:

  • stop assuming the device is trustworthy
  • move sensitive conversations to a different device that has not been exposed
  • preserve evidence before wiping or changing too much
  • document dates, detentions, border crossings, suspicious messages, and unusual behavior
  • seek professional forensic help if the stakes are high
  • consider that your contacts may also be targeted

For high-risk users such as activists, journalists, lawyers, researchers, and political organizers, the safest assumption is often that a suspected device should not be trusted until properly examined.[11][12]


Mobile Device Interception

This category covers systems that identify, locate, or interact with mobile devices over the air, usually by imitating network infrastructure or exploiting the phone’s trust in the cellular network.

Cell-Site Simulators (IMSI Catchers)

Cell-site simulators impersonate legitimate cell towers so nearby phones connect to them. This can expose device identifiers and help locate a target device. Public reporting and civil-liberties litigation have shown these tools have been used by federal, state, and local agencies in the United States and elsewhere.[13][14]

Stingray

StingRay is the best-known brand name for a class of cell-site simulators. The name is often used generically for similar devices.

  • Vendor:
* Harris Corporation / L3Harris Technologies
  • Country of origin:
* United States
  • Type:
* IMSI catcher / cell-site simulator
  • General description:
* A surveillance device that impersonates a cellular tower so nearby phones connect to it, revealing device identifiers and assisting in location tracking.[15][16]
  • Capabilities:
* identifies nearby devices via IMSI/IMEI
* assists in locating a device
* can affect all phones in range, not only the target
  • Publicly reported government users:
* FBI
* DEA
* CBP / ICE
* numerous state and local police agencies in the United States
* reported use by agencies in Canada and the United Kingdom as well[17][18][19]
  • Notable privacy / abuse stories:
* a federal judge in New York suppressed evidence after DEA used a stingray without a warrant[20]
* ACLU and EFF litigation exposed secret stingray use that had not been disclosed to the court or defendant[21]
  • Avoidance / mitigation:
* assume cellular metadata is exposed to the network operator and potentially to surveillance tools
* prefer end-to-end encrypted apps for content confidentiality
* disable radios when not needed
* avoid carrying a primary phone to highly sensitive meetings if exposure would be severe
* understand that reliable consumer-side detection is difficult

Mobile Device Access

This category covers tools used after a device has been seized, borrowed, detained, confiscated, or otherwise physically controlled by another party.

Cellebrite (UFED)

Cellebrite’s UFED line is one of the best-known mobile device extraction tool families used in digital forensics. The company markets its tools to law enforcement and public-sector investigators, and public reporting has repeatedly tied its products to controversial extractions involving activists, protesters, and journalists.[22][23]

  • Vendor:
* Cellebrite
  • Country of origin:
* Israel[24]
  • Type:
* mobile device extraction / digital forensics
  • General description:
* Commercial forensic platform used to extract and analyze data from phones and other digital devices.[25]
  • Capabilities:
* logical and physical extraction, depending on device and condition
* recovery of messages, contacts, app data, files, and other records
* analysis and review of extracted device data
  • Publicly reported government users:
* FBI and other U.S. federal agencies
* police and security agencies in Serbia
* authorities in Georgia
* authorities in Jordan
* many other law-enforcement customers globally[26][27][28][29]
  • Notable privacy / abuse stories:
* Amnesty and Reuters reported Serbian authorities used Cellebrite tools during detentions tied to surveillance of activists and journalists[30]
* Reuters reported Georgia renewed contracts for Cellebrite tools amid protest crackdowns[31]
* Citizen Lab / Guardian reporting tied Cellebrite tools to phone extractions of pro-Gaza activists in Jordan[32]
  • Avoidance / mitigation:
* use a long alphanumeric passcode
* disable biometric unlock when coercion risk is high
* power down devices before border crossings, detention risk, or seizure risk
* keep full-disk encryption enabled
* do not surrender your primary device unlocked if you can lawfully avoid it
* separate high-risk communications from your everyday phone

Mobile Device "Forensic" Tools

This category covers specialized systems aimed at bypassing device protections and extracting data from phones, often after physical seizure.

Grayshift (GrayKey)

GrayKey is a mobile-device access and extraction system used by law-enforcement and government customers. Public reporting and vendor materials indicate wide deployment across multiple countries, though details of current capabilities vary by device model and software version.[33][34]

  • Vendor:
* Grayshift
  • Country of origin:
* United States[35]
  • Type:
* phone unlocking / forensic access tool
  • General description:
* Commercial device used to attempt access to locked smartphones and support forensic extraction workflows.
  • Capabilities:
* attempts to unlock supported devices
* extracts or helps acquire device data
* integrates into forensic workflows
  • Publicly reported government users:
* FBI
* local police in the United States
* police and government defense agencies in multiple countries including the United Kingdom, France, Germany, Sweden, Spain, and Italy according to public reporting on the company’s own claims[36]
  • Notable privacy / abuse stories:
* sustained secrecy around agency use and public-records fights over GrayKey procurement and deployment[37]
* continuing controversy around government access to phones that users believe are strongly protected
  • Avoidance / mitigation:
* use a long passphrase rather than a short PIN
* keep the device updated
* configure USB restricted mode or equivalent protections
* power down the device if seizure risk is imminent
* treat any device returned after custody as potentially exposed

Graphite

Graphite is a commercial spyware product made by Paragon Solutions. Public technical reporting expanded significantly in 2025, when WhatsApp and Citizen Lab publicly described attacks and forensic findings involving Paragon’s spyware against journalists and civil-society targets.[38][39]

  • Vendor:
* Paragon Solutions
  • Country of origin:
* Israel[40][41]
  • Type:
* mercenary spyware / targeted surveillance platform
  • General description:
* Commercial spyware reportedly sold to government customers for covert access to mobile devices and data in encrypted apps.[42]
  • Capabilities:
* covert device surveillance
* access to data on targeted phones
* reported access to encrypted-app data once the device is compromised
  • Publicly reported government users:
* Italy acknowledged use of Paragon systems in a political scandal context
* Citizen Lab reported links to deployments associated with multiple democratic-state customers and identified infrastructure / cases in several countries[43][44]
  • Notable privacy / abuse stories:
* WhatsApp said Paragon targeted scores of users including journalists and civil-society members[45]
* Italy’s Paragon relationship became a major public scandal after allegations of phones of critics and activists being hacked[46]
* Citizen Lab published the first forensic confirmation of Paragon’s iOS spyware targeting journalists[47]
  • Avoidance / mitigation:
* keep iOS / Android fully updated
* reduce attack surface by disabling unnecessary services and apps
* be highly cautious with unsolicited files, group invites, and messages
* for high-risk users, consider hardened platforms and rapid incident response plans
* understand that sophisticated zero-click spyware may leave little visible evidence

Commercial Spyware

This section covers mercenary spyware sold by private vendors to government clients. These products are among the most dangerous classes of digital surveillance because they can turn a target’s own device into the surveillance platform.

NSO Group (Pegasus)

Pegasus is one of the most widely documented commercial spyware systems in the world. Public reporting, lawsuits, and research by Amnesty, Citizen Lab, Reuters, and the Pegasus Project have linked it to surveillance of journalists, activists, lawyers, political opposition, diplomats, and government officials in many countries.[48][49][50]

  • Vendor:
* NSO Group
  • Country of origin:
* Israel[51]
  • Type:
* advanced mobile spyware
  • General description:
* Covert spyware platform used to compromise phones and gain access to communications, files, sensors, and location data.
  • Capabilities:
* full or near-full device compromise on supported targets
* access to messages, microphone, camera, photos, files, and location
* zero-click exploitation in some operations
  • Publicly reported government users:
* public reporting has linked likely clients or deployments to countries including Mexico, Saudi Arabia, Hungary, India, Spain, Poland, El Salvador, and others[52][53][54]
  • Notable privacy / abuse stories:
* Pegasus Project reporting on widespread targeting of journalists, activists, and political figures[55][56]
* Reuters on Mexico’s long-running Pegasus scandal[57]
* Amnesty / Citizen Lab / Reuters on Pegasus found on phones of Palestinian rights workers[58]
* U.S. court findings against NSO in the WhatsApp hacking case[59]
  • Avoidance / mitigation:
* apply updates immediately
* use hardened modes such as Lockdown Mode where available
* reduce dependency on a single always-carried phone
* keep a separate low-risk device for routine life if your threat model is serious
* if you are high-risk, plan for forensic review rather than relying on visible signs

FinFisher (FinSpy)

FinSpy is a long-running commercial spyware suite whose deployments have been tracked by Citizen Lab, Amnesty, EFF, and others. It has repeatedly appeared in contexts involving authoritarian abuse and surveillance of dissidents.[60][61]

  • Vendor:
* FinFisher GmbH / historically associated with Gamma International branding in earlier reporting
  • Country of origin:
* Germany / United Kingdom in historical reporting depending on the corporate entity referenced[62][63]
  • Type:
* spyware / remote surveillance malware suite
  • General description:
* Commercial malware suite used by governments for remote surveillance of computers and phones.
  • Capabilities:
* remote monitoring
* data exfiltration
* surveillance of communications and activity
  • Publicly reported government users:
* Bahrain
* Ethiopia
* United Arab Emirates
* Egypt
* Turkey
* other governments identified through technical and legal reporting[64][65][66]
  • Notable privacy / abuse stories:
* Citizen Lab’s exposure of FinSpy targeting Bahraini dissidents[67]
* Amnesty on German-made FinSpy found in Egypt, including versions for Mac and Linux[68]
* Reuters on investigations into alleged exports to Turkey[69]
  • Avoidance / mitigation:
* keep systems minimal
* install software only from trusted sources
* use compartmentalized systems for sensitive work
* preserve suspicious files and messages for forensic analysis
* treat politically timed phishing or attachments as high risk

Enterprise / Consumer Monitoring Software

This category includes administrative and monitoring platforms that are often deployed with organizational consent. They are not necessarily covert spyware, but they can still enable invasive control and surveillance over managed devices.

Mobile Device Management (MDM platforms)

MDM platforms let an organization enforce policy, deploy apps, restrict functionality, wipe devices remotely, and monitor compliance state. In a work or school setting, these tools can legitimately manage endpoints, but they can also create a level of institutional control many users do not fully understand.[70]

  • General description:
* Centralized management and control platforms for phones, tablets, and computers.
  • Common capabilities:
* policy enforcement
* remote wipe
* app deployment
* compliance checks
* restrictions on user actions
  • Publicly reported government / public-sector users:
* widely used across public-sector and enterprise environments; exact deployments vary by country and organization
  • Known privacy concerns:
* users often do not understand the distinction between managed and unmanaged data
* a managed personal device can expose more administrative control than expected
  • Avoidance / mitigation:
* do not enroll a personal device in organizational management unless you fully accept that control
* use separate work and personal devices
* audit management profiles regularly
* remove management enrollment when you leave the organization

Microsoft Intune

Intune is one of the best-known MDM / endpoint management platforms. It is primarily an administrative control platform, not a secret hacking tool, so privacy concerns here are mostly about organizational oversight, policy enforcement, and the power to inspect or control managed devices rather than covert intrusion.[71]

  • Vendor:
* Microsoft
  • Country of origin:
* United States
  • Type:
* mobile device management / endpoint management
  • General description:
* Cloud-based platform for managing and securing organizational devices, apps, and access.
  • Publicly reported government / public-sector users:
* broadly used by government and enterprise customers; public-sector adoption is common but varies widely
  • Notable privacy / abuse stories:
* no single comparably famous covert-surveillance scandal was identified in this review
* the main concern is administrative overreach, employee monitoring, and excessive organizational control rather than clandestine exploitation
  • Avoidance / mitigation:
* avoid using Intune-managed devices for truly private personal life
* read device-management prompts carefully
* assume employer-managed devices are not private

Network and Bulk Data Analysis Platforms

These platforms generally do not hack phones themselves. Instead, they fuse, search, correlate, and operationalize data gathered from many other systems.

Gotham (Palantir Technologies)

Gotham is Palantir’s best-known government-facing platform. It is used for integrating datasets and building link-analysis and operational views across people, devices, places, events, and cases.[72]

  • Vendor:
* Palantir Technologies
  • Country of origin:
* United States
  • Type:
* data fusion / intelligence analysis platform
  • General description:
* Platform for combining many datasets and performing link analysis, geospatial analysis, investigative correlation, and operational planning.[73]
  • Publicly reported government users:
* ICE
* other U.S. federal defense and intelligence customers
* law-enforcement and military customers in the United States and allied countries[74][75]
  • Notable privacy / abuse stories:
* longstanding criticism over Palantir’s role in ICE immigration enforcement and deportation operations[76]
* reporting and criticism over police and intelligence surveillance applications[77]
  • Avoidance / mitigation:
* reduce the amount of data you feed into third-party services
* minimize account sprawl and cross-linkable identity trails
* prefer providers that collect less and share less
* assume data disclosed to one system may later be fused with other records

Foundry (Palantir Technologies)

Foundry is Palantir’s enterprise data platform and is increasingly part of the same broader ecosystem of data integration and decision support.

  • Vendor:
* Palantir Technologies
  • Country of origin:
* United States
  • Type:
* enterprise data integration and analytics platform
  • General description:
* Platform for ingesting, modeling, transforming, and operationalizing large organizational datasets.[78]
  • Publicly reported government users:
* Palantir sells broadly into government and commercial sectors[79]
  • Notable privacy / abuse stories:
* privacy concerns here usually relate to integration of large datasets into operational decision systems rather than direct hacking
  • Avoidance / mitigation:
* reduce voluntary data disclosure and avoid unnecessary centralized data collection

Apollo (Palantir Technologies)

Apollo is Palantir’s deployment and orchestration platform.

  • Vendor:
* Palantir Technologies
  • Country of origin:
* United States
  • Type:
* deployment / infrastructure control platform
  • General description:
* Platform used to deploy and manage Palantir software across cloud, on-premises, and sensitive environments.[80]
  • Publicly reported government users:
* deployed as part of Palantir’s broader government stack
  • Notable privacy / abuse stories:
* controversy is generally derivative of the larger Palantir ecosystem rather than Apollo alone
  • Avoidance / mitigation:
* this is not a personal-device threat in the same way spyware is; the relevant defense is limiting data aggregation and institutional overreach upstream

AIP (Palantir Technologies)

AIP is Palantir’s artificial-intelligence platform layered onto its broader data stack.

  • Vendor:
* Palantir Technologies
  • Country of origin:
* United States
  • Type:
* AI / LLM operational platform
  • General description:
* Platform for connecting AI systems to operational data and workflows.[81]
  • Publicly reported government users:
* U.S. defense and intelligence related integrations have been publicly promoted, including collaboration with Microsoft for government cloud environments[82]
  • Notable privacy / abuse stories:
* the main concern is scaled automated decision support over sensitive datasets
  • Avoidance / mitigation:
* resist unnecessary centralized profiling and automated triage systems where possible

Metropolis (Palantir Technologies)

Metropolis was an older Palantir finance-oriented platform and is largely superseded in current product discussions.

  • Vendor:
* Palantir Technologies
  • Country of origin:
* United States
  • Type:
* legacy analytics platform
  • General description:
* Older Palantir platform associated with financial-data analysis and related investigative workflows.
  • Publicly reported government users:
* not a primary current focus in public reporting
  • Notable privacy / abuse stories:
* not a major current standalone privacy story compared with Gotham or broader Palantir deployments
  • Avoidance / mitigation:
* same general Palantir-oriented mitigation applies: reduce data centralization and linkability

Surveillance

This section covers camera and sensor systems that watch public or semi-public spaces and build persistent records of movement.

CCTV / Flock Cameras

Camera networks, especially those tied to automated license plate recognition (ALPR), can create large searchable movement histories. These systems are increasingly networked across municipalities, private neighborhoods, apartment complexes, retailers, schools, and police systems.[83][84]

Flock Safety

Flock Safety is one of the most visible ALPR / camera-network vendors in the United States. The core privacy concern is not just the camera itself, but the searchable, shareable data network around it.[85]

  • Vendor:
* Flock Safety
  • Country of origin:
* United States
  • Type:
* ALPR / camera surveillance network
  • General description:
* Networked camera platform used by police and private entities to capture and search vehicle and movement data.
  • Publicly reported government users:
* numerous local police departments in the United States
* concerns about federal access or downstream access by immigration-related agencies have featured heavily in recent reporting[86][87]
  • Notable privacy / abuse stories:
* Mountain View police shut down Flock readers after alleging unauthorized federal access[88]
* ACLU and EFF have repeatedly documented Flock-related concerns around mass driver surveillance, data sharing, and activist / immigrant tracking concerns[89][90][91]
  • Avoidance / mitigation:
* do not assume driving is anonymous
* avoid building predictable travel routines when privacy matters
* remember that public-space avoidance is limited and often impractical
* use the smallest possible identity footprint in travel-related services

Operating Systems

Operating systems matter because they define how much control the user actually has over the hardware, software, trust chain, telemetry, and repairability of the device. Closed platforms can be strongly secured against some threats while still denying the owner meaningful control.

Mainstream Closed Platforms

These platforms dominate the consumer market, but they are not ideal choices if your priorities are transparency, auditability, local control, and resistance to centralized vendor power.

iOS

iOS is a tightly controlled Apple platform with strong sandboxing and code-signing, but limited owner control over the device and software stack.[92]

Android

Android is more open in theory than iOS, but most consumer deployments are still heavily mediated by Google, OEMs, carriers, locked bootloaders, and proprietary components.[93]

Microsoft Windows

Windows remains dominant on desktop systems, but from a privacy and autonomy perspective it is not an ideal platform for users who want auditable, owner-controlled systems.

Recommendation

If your priority is autonomy, transparency, and minimizing dependence on centralized proprietary control, it is reasonable to avoid these platforms where possible and use open-source systems instead.

Better Open Alternatives

Open-source alternatives vary by use case and threat model.

  • General Linux distributions:
* Debian
* Arch Linux
* Fedora
* other well-maintained Linux systems
  • Security- or privacy-focused systems:
* Tails for amnesic, anonymity-oriented sessions[94]
* Qubes OS for compartmentalization and strong separation between activities[95]
* GrapheneOS for a hardened Android-based mobile platform on supported Pixel devices[96]

Avoidance / mitigation

No operating system is magic. Still, these steps generally help:

  • use open-source systems where practical
  • keep the system lean
  • avoid unnecessary proprietary services
  • separate identities and tasks across devices or compartments
  • prefer reproducible, auditable software where available

Companies

This section lists the companies behind the systems above. In most cases, the company is not merely a neutral manufacturer: its business model, customer base, and sales practices shape how the underlying technology is used.

Palantir Technologies

Palantir Technologies is a U.S. software company focused on large-scale data integration, operational analytics, and decision-support platforms for government and commercial customers.[97]

  • Country of origin:
* United States
  • Main products:
* Gotham
* Foundry
* Apollo
* AIP
* Metropolis (legacy)
  • General concern:
* enabling governments and institutions to fuse large datasets into actionable targeting, enforcement, or operational systems

Cellebrite

Cellebrite is an Israeli digital-forensics company known for phone extraction and investigative analysis products used by law enforcement and other government customers.[98]

  • Country of origin:
* Israel
  • Main products:
* UFED and related extraction / analysis tools
  • General concern:
* making it easier for states to extract and operationalize intimate data from seized devices

Grayshift

Grayshift is a U.S. mobile-device forensics company known primarily for GrayKey.[99]

  • Country of origin:
* United States
  • Main products:
* GrayKey
  • General concern:
* eroding the practical security assumptions people have about locked phones

Paragon Solutions

Paragon Solutions is an Israeli spyware vendor whose Graphite product became a major public controversy after reporting from WhatsApp, Reuters, and Citizen Lab in 2025.[100]

  • Country of origin:
* Israel
  • Main products:
* Graphite
  • General concern:
* covert compromise of phones by government clients, including attacks on civil society

NSO Group

NSO Group is an Israeli spyware company best known for Pegasus and for the global scandals surrounding its government clients.[101]

  • Country of origin:
* Israel
  • Main products:
* Pegasus
  • General concern:
* repeated documented use of mercenary spyware against journalists, activists, and political targets

FinFisher is associated with commercial spyware long tied to authoritarian surveillance and human-rights abuses.[102]

  • Country of origin:
* Germany, with historical reporting also referencing UK-linked Gamma entities
  • Main products:
* FinSpy / FinFisher suite
  • General concern:
* export and deployment of spyware to abusive state actors

Microsoft

Microsoft is a U.S. technology company whose Intune platform is included here because organizational control over endpoints can become invasive even when framed as routine administration.

  • Country of origin:
* United States
  • Main products relevant here:
* Intune
  • General concern:
* institutional control, monitoring, and policy enforcement over managed devices

L3Harris Technologies / Harris Corporation

Harris, now part of L3Harris, is the U.S. defense contractor most closely associated with the StingRay name.

  • Country of origin:
* United States
  • Main products relevant here:
* StingRay and related cell-site simulator family
  • General concern:
* dragnet-style device identification and location tracking of phones in an area

Flock Safety

Flock Safety is a U.S. camera-network and ALPR company whose systems have become a flashpoint in debates over mass movement tracking.

  • Country of origin:
* United States
  • Main products relevant here:
* ALPR / camera networks
  • General concern:
* large searchable databases of public movement and retroactive location histories

See Also

Related subjects that help place these systems in a broader context.


References

This page relies heavily on reporting and research from the following organizations, among others:

  1. Palantir platforms
  2. Palantir Gotham
  3. Amnesty International Pegasus forensic methodology
  4. Citizen Lab: first forensic confirmation of Paragon spyware
  5. Amnesty International Pegasus forensic methodology
  6. Microsoft Intune privacy and personal data
  7. EFF: Cell-site simulators / IMSI catchers
  8. ACLU: Stingray tracking devices
  9. EFF: Automated license plate readers
  10. ACLU on Flock Safety and mass driver surveillance
  11. Citizen Lab
  12. Surveillance Self-Defense | EFF
  13. EFF: Cell-site simulators / IMSI catchers
  14. EPIC: Stingray / cell-site simulator records
  15. EFF: Cell-site simulators / IMSI catchers
  16. Cato: Stingray: A New Frontier in Police Surveillance
  17. EPIC: FBI use of cell-site simulators
  18. ACLU stingray cases
  19. EFF on secret stingray use in Wisconsin case
  20. Reuters: judge throws out stingray evidence
  21. EFF on secret stingray use
  22. Cellebrite UFED
  23. Reuters: Georgia and Cellebrite procurement
  24. Reuters: Israeli technology firm Cellebrite
  25. Cellebrite UFED
  26. Reuters on Cellebrite equipment
  27. Reuters: Georgia procurement
  28. Reuters: Serbia and Cellebrite
  29. Guardian: Jordan and Cellebrite
  30. Reuters: Serbia used Israeli firm's tech
  31. Reuters: Georgia procurement
  32. Guardian: Jordan used Israeli phone-cracking tool
  33. Grayshift
  34. Wikipedia: Grayshift
  35. Wikipedia: Grayshift
  36. Wikipedia: Grayshift
  37. Techdirt on GrayKey secrecy
  38. Reuters: WhatsApp says Paragon targeted users
  39. Citizen Lab: first forensic confirmation of Paragon spyware
  40. Reuters: Israeli spyware company Paragon
  41. Reuters: Paragon acquired by U.S. investment group
  42. Citizen Lab: first look at Paragon operations
  43. Reuters: Italy and Paragon part ways
  44. Citizen Lab: Paragon operations
  45. Reuters: WhatsApp and Paragon
  46. Reuters: Italy ended contract with Paragon
  47. Citizen Lab forensic confirmation
  48. Reuters: Pegasus scandal
  49. Amnesty: Pegasus Project
  50. Reuters: NSO liable in WhatsApp case
  51. Reuters: Israel's NSO Group
  52. Guardian: Pegasus Project investigation
  53. Reuters: Mexico Pegasus purchases
  54. Reuters: Spain Pegasus probe
  55. Amnesty: Pegasus Project
  56. Guardian: leaked global abuse investigation
  57. Reuters: Mexico victims
  58. Reuters: Palestinian rights workers
  59. Reuters: NSO liable
  60. Amnesty: German-made FinSpy in Egypt
  61. Citizen Lab: Mapping FinFisher proliferation
  62. Amnesty: Munich-based FinFisher GmbH
  63. Citizen Lab: Gamma International / FinFisher
  64. Amnesty: FinSpy in Egypt and other countries
  65. Citizen Lab: FinFisher proliferation
  66. Reuters: spyware to Turkey
  67. Citizen Lab: Bahrain with Love
  68. Amnesty: FinSpy in Egypt
  69. Reuters: investigated over Turkey
  70. Microsoft Intune privacy and personal data
  71. Microsoft Intune privacy and personal data
  72. Palantir Gotham
  73. Palantir Gotham
  74. Palantir home
  75. ACLU on Palantir and ICE
  76. ACLU: ELITE and immigration enforcement
  77. Guardian on Palantir and surveillance
  78. Palantir Foundry
  79. Palantir home
  80. Palantir platforms
  81. Palantir AIP
  82. Barron's on Palantir and Microsoft government cloud AI
  83. EFF: ALPR
  84. ACLU on Flock Safety
  85. EFF on Flock investigations
  86. ACLU on Flock data sharing
  87. San Francisco Chronicle: Mountain View turns off Flock readers
  88. SF Chronicle: unauthorized federal use
  89. ACLU on mass driver surveillance
  90. ACLU on anti-immigrant use concerns
  91. EFF on Flock abuses
  92. Apple Platform Security
  93. Android security
  94. Tails
  95. Qubes OS
  96. GrapheneOS
  97. Palantir
  98. Cellebrite UFED
  99. Grayshift
  100. Reuters: Paragon targeted WhatsApp users
  101. Reuters: NSO liable
  102. Amnesty: FinSpy