Stay up to date with notifications from The Independent

Notifications can be managed in browser preferences.

US imposes sanctions on firm behind tool used to spy on journalists

Officials say Intellexa Consortium’s products have been used for mass surveillance campaigns around the world

David Klepper
Tuesday 17 September 2024 11:18
US Russia Sanctions
US Russia Sanctions (Copyright 2019 The Associated Press. All rights reserved.)

Your support helps us to tell the story

As your White House correspondent, I ask the tough questions and seek the answers that matter.

Your support enables me to be in the room, pressing for transparency and accountability. Without your contributions, we wouldn't have the resources to challenge those in power.

Your donation makes it possible for us to keep doing this important work, keeping you informed every step of the way to the November election

Head shot of Andrew Feinberg

Andrew Feinberg

White House Correspondent

America has announced new sanctions against a commercial spyware company headed by a former Israeli military officer whose program allowed easy access to almost any information stored on a smartphone.

U.S. officials and private researchers say Intellexa Consortium's products have been used for mass surveillance campaigns around the world, allowing unscrupulous users to track and obtain sensitive information from dissidents, journalists, political candidates and opposition figures.

The penalties target five people and one organization connected to Intellexa, a Greece-based network of companies with subsidiaries in North Macedonia, Hungary, Ireland and the British Virgin Islands. The company developed and sold a suite of spyware tools known as Predator that allowed entry into a target's device without requiring them to click on a link or attachment.

The program would then grant access to the camera and microphone as well as any data or files stored on the compromised phone.

“The United States will not tolerate the reckless propagation of disruptive technologies that threatens our national security and undermines the privacy and civil liberties of our citizens,” said Bradley T. Smith, acting undersecretary of the Treasury for terrorism and financial intelligence.

Several subsidiaries of Intellexa and two employees, including its founder, were sanctioned earlier this year by the Biden administration. Last year, the Commerce Department blacklisted Intellexa and one of its subsidiaries, denying them access to U.S. technology.

The five people subject to the new penalties each held senior positions at Intellexa or one of its subsidiaries, U.S. officials say. The Aliada Group, another subsidiary based in the British Virgin Islands, also was sanctioned over allegations of enabling financial transactions for Intellexa that totaled tens of millions of dollars, officials said.

Messages left with Intellexa and its executives were not immediately returned Monday.

Intellexa was created in 2019 by former Israeli military officer Tal Dilian. Dilian and Sara Hamou, a corporate offshoring specialist who has provided managerial services to Intellexa, were penalized earlier this year in what Biden administration officials said was the first time sanctions were issued over the misuse of spyware.

Individuals and organizations under sanctions are prohibited from engaging in business or financial transactions within the U.S. or with U.S. entities.

Amnesty International’s Security Lab published a report last year that found Predator had been used to target but not necessarily infect devices connected to the president of the European Parliament, Roberta Metsola, and the president of Taiwan, Tsai Ing-Wen, as well as Rep. Michael McCaul, R-Texas, and Sen. John Hoeven, R-N.D.

Europe also has faced a number of spyware incidents. Predator spyware was reportedly used in Greece, a revelation that helped precipitate the resignation in 2022 of two top government officials, including the national intelligence director.

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in