Source of this article and featured image is TechCrunch. Description and key fact are generated by Codevision AI system.

Researchers reveal that Intellexa, a sanctioned spyware firm, granted its staff remote access to government clients’ surveillance systems via TeamViewer, exposing victims’ personal data. Amnesty International and media partners uncovered leaked documents and training videos showing Intellexa employees could monitor live Predator spyware operations. The findings challenge claims by spyware companies that they never access customer systems, highlighting potential legal and privacy risks. The U.S. sanctioned Intellexa’s founder, Tal Dilian, for targeting Americans, marking a first for government action against individual spyware actors. Lorenzo Franceschi-Bicchierai, TechCrunch’s reporter, detailed how leaked material exposed Intellexa’s alleged data access practices.

Key facts

  • Intellexa employees could remotely access customers’ surveillance systems using TeamViewer, exposing victims’ data.
  • Amnesty International and media partners analyzed leaked documents showing live Predator spyware operations.
  • Spyware firms like NSO Group claim no access to customer systems, but Intellexa’s case challenges this norm.
  • U.S. sanctions against Tal Dilian, Intellexa’s founder, followed allegations of targeting American citizens.
  • Leaked training videos confirmed access to live customer systems, contradicting industry claims of data isolation.
See article on TechCrunch