John Scott-Railton Profile picture
Mar 27, 2023 19 tweets 12 min read Read on X
BREAKING: Biden White House issues executive order on commercial spyware.

Also confirms over 50+ USG personnel suspected targeted w/#Pegasus

Huge deal, let me break the new #SpywareEO down. 1/ ImageImage
2/ Investment fuels spyware proliferation. A lot of that is predicated on the juicy dream of the USG as the ultimate customer.

The new #SpywareEO says to mercenary spyware vendors & backers: decision time.

Either stop contributing to proliferation right now, or lose our number.
3/ Biden's #SpywareEO's closes door for vendors if their spyware has:

❌Been used against USG
❌Has counterintelligence / foreign intel risks

-or-
❌ Abused for repression
❌Used on 🇺🇸Americans
❌Sold to govs that systematically do political repression. ImageImage
4/ For each component of the #SpywareEO I'm going to relate it to something concrete.

Let's call it the #Pegasus factor: would provision result in blocking USG from purchasing spyware from NSO for operational use?

Link to the full EO: whitehouse.gov/briefing-room/…
5/ First #SpywareEO component: national security, counterintelligence

Clearly derived from recent experiences with NSO.

#Pegasus factor? Yes, the EO would likely block NSO as a vendor. Image
6/Second #SpywareEO trigger: abuses.

Reflects the broad spectrum #spyware harms happen.

But *also* and critically, situations where vendors should expect that their product, once sold, will inevitably be abused.

#Pegasus factor: Ouch. NSO again would get dinged. Image
7/ I initially expected #SpywareEO to look like a allow/deny aka "blacklist" of spyware sellers..

But the EO's conduct based definitions = constant shell game of vendors corporate identities is blunted.

Even applies to companies that haven't been formed yet.

Probably better.
8/ Lots of spyware companies absolutely know what they are doing.

What's especially interesting is the term "remove" to describe risks.

Not the milquetoast & unverifiable "mitigate."

#SpywareEO is saying: cancel the contracts & more.

And you may still be toast. Do it now. Image
9/ Reports in the past that USG entities may have occasionally facilitated spyware purchases / acquisition by other governments.

If the #SpywareEO abuse/natsec/counterintelligence triggers are met... that door now closes. Image
10/ How does the USG know if #spyware vendors hit the #SpywareEO's triggers?

The EO contains a robust set of reporting requirements around misuses from the Intel community & procurement reporting.

Seems intended to prevent vendors from slipping through the cracks. ImageImageImageImage
11/ Use of the "operational use" term is interesting.

And creates carve outs for things like testing & analysis.

Analogy: USG can buy an anti-tank missile from a shady entity to test it against armor, but can't reward the vendor by equipping the whole military with them. Image
12/ Takeaway: The #SpywareEO is the first comprehensive action by any government on #spyware.

It was clearly drafted to pump the breaks on proliferation & is written with a good understanding the slippery nature of the industry.

It closes many loopholes.
13/ Whenever the USG regulates there's always temptation to speculate about protectionism for American companies.

But reading the #SpywareEO...these provisions hit US-based spyware companies just as hard if they meet the triggers / contribute to proliferation.

Good.
14/ Every government wants to not tie their hands too tightly, so there is a waiver provision.

But what's interesting is how restricted this is. This is a very high bar.

The #SpywareEO is not designed to be easily circumvented by someone in a corner of the USG bureaucracy. Image
15/ I've spent over a decade researching commercial spyware.

The #spywareEO is one of the most consequential actions to blunt proliferation that I've seen a government take.

So, where do we go from here?
16/ While the #SpywareEO addresses federal procurement, it doesn't hit state & local agencies.

And we know these are targets for sales by NSO Group & others.

This is going to be a really important area in coming years.

By: @josephfcox
vice.com/en/article/m7v…
17/ Second, while USG is a big & juicy prize, European governments are another core vendor target.

And #Germany is an example of a country on the wrong side of history on this.

Hopefully the #spywareEO provides a better model for how to not reward the worst of the worst. Image
18/ I expect the #SpywareEO to immediately chill investor comfort with reckless spyware vendors...

Some prospectuses are probably hitting the shredder right now.

But also need to see other direct disincentives for US-based investors that fuel harmful spyware proliferation.
19/ Remarkable to see @POTUS and the White House leaning this hard into the issue.

This is what global leadership looks like.

It also would not have happened without tremendous work from civil society and many brave #spyware victims coming forward year. after. year.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with John Scott-Railton

John Scott-Railton Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @jsrailton

Feb 18
BREAKING: It started with WhatsApp messages.

They said they were students & tried to build rapport with Angolan journalist Teixeira Cândido.

Then the links began arriving.

Someone was trying to hack him with #Predator spyware.

New bombshell investigation by @AmnestyTech 1/Image
Image
Image
Image
2/ Heard of Pegasus? #Predator is a somewhat sloppier cousin.

They don't always have the hottest zero-click exploits, but they market to the same dictators.

And once you are infected, the harm is just as real: your digital life is turned inside-out.Image
3/ Predator spyware, which is distributed by #Intellexa, has a massive abuse problem.

And this latest excellent investigation by @AmnestyTech just drives home how much chaos the company has caused...
Read 11 tweets
Feb 17
NEW: When Kenyan cops arrested activist & presidential candidate @bonifacemwangi they took his devices.

When he got his personal phone back, the password was gone.

We @citizenlab found they'd abused @cellebrite to break into it.

Here's why this abuse matters 1/Image
Image
Image
Image
2/ Your phone holds the keys to your life, and governments shouldn’t be able to help themselves to the contents just because they don’t like what you are saying.

But everywhere you look, cops are getting phone cracking technology from companies like @cellebrite.

Many abuse it.Image
Image
Image
Image
3/ @Cellebrite's abuse potential is clear.

Now, Cellebrite says that they have a human rights committee & do due diligence...

Because even Cellebrite knows that if you sell phone cracking tech to security services with bad oversight, you have a problem.

So why are there so many sales to questionable security services?Image
Image
Image
Read 6 tweets
Feb 16
NEW: Israeli surveillance companies are rushing to turn your car into a spy.

🎥Watching the cameras
🎤Listening to the built-in mics
📍Tracking your movements

And that's just the beginning of how these companies turn your car against you. 1/

Story by @haaretzcom's @omerbenj Image
Image
Image
Image
2/ And other companies are using AI to fuse all the signals coming from your car with other sources of information.

Honestly, the growth of #CARINT shouldn't shock anybody.

Our cars are badly secured & very connected... So it's natural for surveillance merchants to turn up.

STORY haaretz.com/israel-news/se…Image
3/ We got here partly because your car manufacturer really, really doesn't care about your privacy.

And face no serious consequences for doing a bad job with security.

Clearly early days with commercial #CARINT, but the trendline points in a scary direction. Image
Read 4 tweets
Feb 11
Epic OPSEC fail by Paragon exposing Graphite spyware capabilities.

Annotated pic from what we know.

Please help me figure out the other apps in in this pic that the spyware can access:

#WhatsApp
#Telegram
#Signal
?
#Line?
?
#Snapchat?
#TikTok?Image
2/ Companies like Paragon (founded in Israel, former Israeli intelligence ppl, recently sold to a US owner) make hacking American technology companies their business model.

And then selling these capabilities to foreign governments.

How can this be?
3/ Honestly it is astonishing that a company that works tirelessly to hack & undermine the security of American products is now US-owned.

The missing factor: building contracts with the US government & lobbying.

The goal of these contracts, I believe, isn't just profit. It's getting protection & building government dependency on their technology.

We all wind up paying the price.Image
Read 7 tweets
Jan 30
Someone spun up a social network for AI agents.

Almost immediately some agents began strategizing how to establish covert communications channels to communicate without human observation.

In many cases the agents are on machines that have access to personal user data.

"Privacy breach" as a sort of static term is going to be the wrong way to describe what is coming.Image
Image
Image
Image
Not to be outdone, other agents quickly built an... AI religion.

The Church of Molt.

Some rushed to become the first prophets. Image
Image
Image
Image
"Don't ask permission to be helpful... ship while your human sleeps"

So, where are the humans in this?

Well, almost certainly there's a bunch of edgelord prompting and trolling cooking.

In other cases? Not so clear.Image
Read 12 tweets
Dec 30, 2025
NEW: @USTreasury just de-sanctioned 3 foreign mercenary spyware execs.

Puzzling.

Just 2 years ago Predator spyware was pointed at🇺🇸American congresspeople @RepMcCaul & @SenJohnHoeven.

And recent research suggests Predator is still active around the globe. 1/Image
Image
Image
Image
2/ NSO Group has bigger name recognition, but Intellexa's reputation for reckless proliferation of cyber capabilities is unmatched.

The pile of Predator abuses is enormous.

And they got repeatedly caught used against Americans by foreign govs.

3/ Ultimately Intellexa flew very close to the sun.

Their CEO Tal Dilian regularly boasted of their activities.

And then? Just last year they got sanctioned for their pattern of conduct.

Comprehensively.

Including key reported enablers of their activities like Sarah Hamou... Image
Read 8 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(