John Scott-Railton Profile picture
Mar 27, 2023 19 tweets 12 min read Read on X
BREAKING: Biden White House issues executive order on commercial spyware.

Also confirms over 50+ USG personnel suspected targeted w/#Pegasus

Huge deal, let me break the new #SpywareEO down. 1/ ImageImage
2/ Investment fuels spyware proliferation. A lot of that is predicated on the juicy dream of the USG as the ultimate customer.

The new #SpywareEO says to mercenary spyware vendors & backers: decision time.

Either stop contributing to proliferation right now, or lose our number.
3/ Biden's #SpywareEO's closes door for vendors if their spyware has:

❌Been used against USG
❌Has counterintelligence / foreign intel risks

-or-
❌ Abused for repression
❌Used on 🇺🇸Americans
❌Sold to govs that systematically do political repression. ImageImage
4/ For each component of the #SpywareEO I'm going to relate it to something concrete.

Let's call it the #Pegasus factor: would provision result in blocking USG from purchasing spyware from NSO for operational use?

Link to the full EO: whitehouse.gov/briefing-room/…
5/ First #SpywareEO component: national security, counterintelligence

Clearly derived from recent experiences with NSO.

#Pegasus factor? Yes, the EO would likely block NSO as a vendor. Image
6/Second #SpywareEO trigger: abuses.

Reflects the broad spectrum #spyware harms happen.

But *also* and critically, situations where vendors should expect that their product, once sold, will inevitably be abused.

#Pegasus factor: Ouch. NSO again would get dinged. Image
7/ I initially expected #SpywareEO to look like a allow/deny aka "blacklist" of spyware sellers..

But the EO's conduct based definitions = constant shell game of vendors corporate identities is blunted.

Even applies to companies that haven't been formed yet.

Probably better.
8/ Lots of spyware companies absolutely know what they are doing.

What's especially interesting is the term "remove" to describe risks.

Not the milquetoast & unverifiable "mitigate."

#SpywareEO is saying: cancel the contracts & more.

And you may still be toast. Do it now. Image
9/ Reports in the past that USG entities may have occasionally facilitated spyware purchases / acquisition by other governments.

If the #SpywareEO abuse/natsec/counterintelligence triggers are met... that door now closes. Image
10/ How does the USG know if #spyware vendors hit the #SpywareEO's triggers?

The EO contains a robust set of reporting requirements around misuses from the Intel community & procurement reporting.

Seems intended to prevent vendors from slipping through the cracks. ImageImageImageImage
11/ Use of the "operational use" term is interesting.

And creates carve outs for things like testing & analysis.

Analogy: USG can buy an anti-tank missile from a shady entity to test it against armor, but can't reward the vendor by equipping the whole military with them. Image
12/ Takeaway: The #SpywareEO is the first comprehensive action by any government on #spyware.

It was clearly drafted to pump the breaks on proliferation & is written with a good understanding the slippery nature of the industry.

It closes many loopholes.
13/ Whenever the USG regulates there's always temptation to speculate about protectionism for American companies.

But reading the #SpywareEO...these provisions hit US-based spyware companies just as hard if they meet the triggers / contribute to proliferation.

Good.
14/ Every government wants to not tie their hands too tightly, so there is a waiver provision.

But what's interesting is how restricted this is. This is a very high bar.

The #SpywareEO is not designed to be easily circumvented by someone in a corner of the USG bureaucracy. Image
15/ I've spent over a decade researching commercial spyware.

The #spywareEO is one of the most consequential actions to blunt proliferation that I've seen a government take.

So, where do we go from here?
16/ While the #SpywareEO addresses federal procurement, it doesn't hit state & local agencies.

And we know these are targets for sales by NSO Group & others.

This is going to be a really important area in coming years.

By: @josephfcox
vice.com/en/article/m7v…
17/ Second, while USG is a big & juicy prize, European governments are another core vendor target.

And #Germany is an example of a country on the wrong side of history on this.

Hopefully the #spywareEO provides a better model for how to not reward the worst of the worst. Image
18/ I expect the #SpywareEO to immediately chill investor comfort with reckless spyware vendors...

Some prospectuses are probably hitting the shredder right now.

But also need to see other direct disincentives for US-based investors that fuel harmful spyware proliferation.
19/ Remarkable to see @POTUS and the White House leaning this hard into the issue.

This is what global leadership looks like.

It also would not have happened without tremendous work from civil society and many brave #spyware victims coming forward year. after. year.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with John Scott-Railton

John Scott-Railton Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @jsrailton

Sep 2
NEW: foreign mercenary spyware is coming to the US.

ICE just quietly unsuspended contract with spyware maker #Paragon.

Remember them?

Caught earlier this year being used to hack journalists.

Bad move for Americans rights, national security & counterintelligence 1/Image
2/ #Paragon was co-founded in Israel in 2019 by ex head of Israel's NSA equivalent (Unit 8200) w/ major backing from former Israeli PM Ehud Barak.

Pitched themselves as stealthy & abuse-proof alternative to NSO Group's Pegasus.

& have been trying to get into the US market for years.Image
Image
Image
Image
3/For a long time all we knew about Paragon was their performance as a 'virtuous' spyware company with values.

All that came to a crashing halt in 2025 when they got very caught, helping customers hack targets across @WhatsApp.

WhatsApp did the right thing & notified users.

By @razhael
Image
Image
Image
Read 18 tweets
Aug 29
NEW: @WhatsApp caught & fixed a sophisticated zero click attack...

Now they've published an advisory about it.

Say attackers combined the exploit with an @Apple vulnerability to hack a specific group of targets (i.e. this wasn't pointed at everybody)

Quick thoughts 1/Image
Wait, you say, haven't I heard of @WhatsApp zero-click exploits before?

You have.

A big user base makes a platform big target for exploit development.

Think about it from the attacker's perspective: an exploit against a popular messenger gives you potential access to a lot of devices.

You probably want maximum mileage from that painstakingly developed, weaponized, and tested exploit code you created/ purchased (or got bundled into your Pegasus subscription).
3/ The regular tempo of large platforms catching sophisticated exploits is a good sign.

They're paying attention & devoting resources to this growing category of highly targeted, sophisticated attacks.

But it's also a reminder of the magnitude of the threat out there...

whatsapp.com/security/advis…
Read 4 tweets
Aug 20
WHOA: megapublisher @axelspringer is asking a German court to ban an ad-blocker.

Their claim that should make everyone nervous:

The HTML/ CSS code of websites are protected computer programs.

And influencing they are displayed (e.g by removing ads) violates copyright.

1/Image
2/ Preventing ad-blocking would be a huge blow to German cybersecurity and privacy.

There are critical security & privacy reasons to influence how a websites code gets displayed.

Like stripping out dangerous code & malvertising.

Or blocking unwanted trackers.

This is why most governments do it on their systems.Image
3/Defining HTML/CSS as a protected computer program will quickly lead to absurdities touching every corner of the internet.

Just think of the potential infringements:

-Screen readers for the blind
-'Dark mode' bowser extensions
-Displaying snippets of code in a university class
-Inspecting & modifying code in your own browser
-Website translators
Read 7 tweets
Jul 10
NEW: Mexico's former president under investigation for taking bribes from spyware industry.

Contracts included #Pegasus deal.

Story from @TheRecord_Media's Suzanne Smalley 1/Image
Image
Image
2/ Mexico's former president is denying everything...

But folks may recall that Pegasus was massively and systematically abused in Mexico.

Against journalists, spouses of cartel victims, lawyers, families of cartel-disappeared people, anti-corruption groups etc. etc.

There were so many cases that we eventually had EIGHT investigative reports...
therecord.media/former-mexican…Image
3/ What still gives me chills is how many cases surfaced of people killed by cartels... or their family members... getting targeted with Pegasus spyware.

The #PegasusProject found even more potential cases in Mexico. Image
Image
Image
Image
Read 5 tweets
Jun 18
🚨NEW REPORT: exposing a new hacking tactic.

🇷🇺Russian state-backed hackers used an App-Specific Password attack against prominent Russia expert @KeirGiles & others.

It's like they know what we all expect from them...and then did the opposite 1/

By us @citizenlab & @google's GTIGImage
Image
Image
2/ Let's begin: @KeirGiles gets a message purporting to be from @StateDept asking for a consultation.

The attackers send the message from a @gmail, but CC'd a bunch of email addresses @ state.gov.

Strong credibility signal to have a bunch of gov ppl on the CC line right?

Well, what the attackers were counting on is that the State Dept mailserver just accepts all email addresses without emitting a bounce.

So they seem to have just created some fake State Dept staff names and addresses.Image
3/ The attackers wait for the 2nd interaction to introduce the pivotal deception: getting @KeirGiles to 'connect to a secure platform.'

In the next days they patiently walk him through what they want him to do, even sending a very official looking (but fake) State Dept. documentImage
Image
Read 10 tweets
Jun 12
🚨NEW INVESTIGATION: We just forensically unmasked #Paragon's Apple spyware.

Zero-click targets: Journalists. In 🇪🇺Europe.

Like 🇮🇹Italian reporter @ciropellegrino.

Reopen's #Italy's spyware scandal.

Follows our @citizenlab investigation of their Android spyware. 1/ Image
2/ Back in April, @Apple sent out a threat notification to a select group of users. Some got in touch with us @citizenlab to get analyzed.

They'd been targeted with a sophisticated zero-click attack (think: no click, no attachment to open, no mistake needed...).Image
3/ While my brilliant colleague @billmarczak was working on the phone of a prominent European journalist, he made a smoking gun discovery:

Requests to server matching our P1 fingerprint for #Paragon's graphite.

Paragon's 'undetectable' Apple spyware had just been found...Image
Image
Image
Read 13 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(