John Scott-Railton Profile picture
Nov 23, 2021 13 tweets 9 min read Read on X
BREAKING NOW: @Apple just filed a major lawsuit against NSO Group.

Apple also notifying some recent targets.

Massive blow to the company notorious for selling spyware to dictators.

And there's more... Explainer THREAD. 1/
apple.com/newsroom/2021/…
2/ Apple's lawsuit, filed moments ago in Northern California hits NSO hard.

- Seeks to hold NSO & parent accountable for abuses
- ALSO Requests permanent injunction banning NSO from using Apple products.

Directly hits NSO's core development & biz activities.
3/ NSO poked the hornet's nest for years, and @Apple wasn't satisfied with simply suing the spyware company..

Apple just pledged millions to groups working cyber surveillance... plus any damages that they extract from NSO.

Apple's wrath is poetic.
4/ Notifying NSO victims is another major step.

After @WhatsApp, Apple is the 2nd major company to do so.

✅Helps victims recognize what's going on
✅puts NSO's government customer base on notice: their abuses might be exposed next.
5/ NSO's accelerating tailspin, current status...

In recent weeks:

✅US🇺🇸 sanctioned NSO
✅ Court ruled that @WhatsApp's lawsuit against them could go ahead
✅ Reports that NSO is headed towards possible default.

Now, a massive lawsuit from Apple.
6/ NSO's profitable spyware is predictably used for repression by many dictators.

This didn't scare off unscrupulous investors.

Other spyware companies are now chasing their lead..

Now, NSO's *crisis* sends a different signal: your fortunes could come crashing down.
7/ NSO's spyware doesn't just harm human rights.

It hurts tech companies.

After years of spending efforts on technical means of control (e.g. patching & securing their products), big platforms have decided it was time to punch back in a different way:

In court.
8/ I see @Apple's lawsuit as partly triggered by findings & efforts of so many of our @citizenlab peers:

E.g. @AmnestyTech @accessnow @RSF_inter @EFF @pressfreedom @R3Dmx @article19org & many more.

Most importantly though: the victims that bravely came forwards. Here's why...
9/ The FORCEDENTRY zero-click exploit is prominently mentioned @apple's lawsuit.

It was discovered when a spyware victim let us check their phone.

This is as it should be: targets of dictatorial surveillance contributing to fighting back & helping protect us all.
10/ Immediate effects of @Apple filing suit against NSO:

✅ NSO an even more radioactive investment.
✅ Investors that stuck with NSO look not only amoral, but foolish.
✅ Scares off risk-averse government customers.
✅ Chilling effect on spyware industry.
11/ It would take a huge internal effort for a massive company to undertake any one of these:

✔Lawsuit
✔Victim Notification
✔Attribution
✔Civil society support.

@apple did it all at once.

There are unsung heroes in this story.

Complaint: apple.com/newsroom/pdfs/…
12/ Addendum to tweet #4: @billyleonard at TAG reminds me that @Google / @android should also be on the list of companies that have notified NSO victims in the past.

Link: android-developers.googleblog.com/2017/04/an-inv…
13/ Just 2 weeks ago, the 9th Circuit Court of Appeals rejected NSO's claims to foreign sovereign immunity in @WhatsApp v. NSO.

Here's their CEO weighing in on @Apple's lawsuit.👇

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with John Scott-Railton

John Scott-Railton Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @jsrailton

Feb 17
NEW: When Kenyan cops arrested activist & presidential candidate @bonifacemwangi they took his devices.

When he got his personal phone back, the password was gone.

We @citizenlab found they'd abused @cellebrite to break into it.

Here's why this abuse matters 1/Image
Image
Image
Image
2/ Your phone holds the keys to your life, and governments shouldn’t be able to help themselves to the contents just because they don’t like what you are saying.

But everywhere you look, cops are getting phone cracking technology from companies like @cellebrite.

Many abuse it.Image
Image
Image
Image
3/ @Cellebrite's abuse potential is clear.

Now, Cellebrite says that they have a human rights committee & do due diligence...

Because even Cellebrite knows that if you sell phone cracking tech to security services with bad oversight, you have a problem.

So why are there so many sales to questionable security services?Image
Image
Image
Read 6 tweets
Feb 16
NEW: Israeli surveillance companies are rushing to turn your car into a spy.

🎥Watching the cameras
🎤Listening to the built-in mics
📍Tracking your movements

And that's just the beginning of how these companies turn your car against you. 1/

Story by @haaretzcom's @omerbenj Image
Image
Image
Image
2/ And other companies are using AI to fuse all the signals coming from your car with other sources of information.

Honestly, the growth of #CARINT shouldn't shock anybody.

Our cars are badly secured & very connected... So it's natural for surveillance merchants to turn up.

STORY haaretz.com/israel-news/se…Image
3/ We got here partly because your car manufacturer really, really doesn't care about your privacy.

And face no serious consequences for doing a bad job with security.

Clearly early days with commercial #CARINT, but the trendline points in a scary direction. Image
Read 4 tweets
Feb 11
Epic OPSEC fail by Paragon exposing Graphite spyware capabilities.

Annotated pic from what we know.

Please help me figure out the other apps in in this pic that the spyware can access:

#WhatsApp
#Telegram
#Signal
?
#Line?
?
#Snapchat?
#TikTok?Image
2/ Companies like Paragon (founded in Israel, former Israeli intelligence ppl, recently sold to a US owner) make hacking American technology companies their business model.

And then selling these capabilities to foreign governments.

How can this be?
3/ Honestly it is astonishing that a company that works tirelessly to hack & undermine the security of American products is now US-owned.

The missing factor: building contracts with the US government & lobbying.

The goal of these contracts, I believe, isn't just profit. It's getting protection & building government dependency on their technology.

We all wind up paying the price.Image
Read 7 tweets
Jan 30
Someone spun up a social network for AI agents.

Almost immediately some agents began strategizing how to establish covert communications channels to communicate without human observation.

In many cases the agents are on machines that have access to personal user data.

"Privacy breach" as a sort of static term is going to be the wrong way to describe what is coming.Image
Image
Image
Image
Not to be outdone, other agents quickly built an... AI religion.

The Church of Molt.

Some rushed to become the first prophets. Image
Image
Image
Image
"Don't ask permission to be helpful... ship while your human sleeps"

So, where are the humans in this?

Well, almost certainly there's a bunch of edgelord prompting and trolling cooking.

In other cases? Not so clear.Image
Read 12 tweets
Dec 30, 2025
NEW: @USTreasury just de-sanctioned 3 foreign mercenary spyware execs.

Puzzling.

Just 2 years ago Predator spyware was pointed at🇺🇸American congresspeople @RepMcCaul & @SenJohnHoeven.

And recent research suggests Predator is still active around the globe. 1/Image
Image
Image
Image
2/ NSO Group has bigger name recognition, but Intellexa's reputation for reckless proliferation of cyber capabilities is unmatched.

The pile of Predator abuses is enormous.

And they got repeatedly caught used against Americans by foreign govs.

3/ Ultimately Intellexa flew very close to the sun.

Their CEO Tal Dilian regularly boasted of their activities.

And then? Just last year they got sanctioned for their pattern of conduct.

Comprehensively.

Including key reported enablers of their activities like Sarah Hamou... Image
Read 8 tweets
Dec 4, 2025
WHOA: Predator spyware discovered in 🇵🇰#Pakistan.

+ a leak shows zero-click infections via... ads.

Yikes.

Here are some more damming revelations as Intellexa, the shady, sanctioned spyware supplier gets exposed by @AmnestyTech & partners.. /1Image
Image
2/ First, a mercenary spyware myth has just been busted.

Because the leak shows an Intellexa employee directly accessing a customer deployment.

Prior to the #PredatorFiles leak, spyware companies basically always claimed they couldn't access customer deployments & didn't know what was going on there.

They used this to avoid responsibility & claim ignorance when faced with abuses.Image
3/ And it gets crazier. The leak shows Intellexa casually accessing a core backbone of Predator deployment of a government customer.

Seemingly without the gov's knowledge.

Suggests that Intellexa can look over their shoulder & watch their sensitive targeting.

Huge counterintelligence nightmare for customers.

And a giant liability red-flag for intellexa.Image
Image
Image
Read 11 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(