It Could Happen Here - ICE Partners with Israeli Phone Hacking Spyware

Episode Date: September 10, 2025

Garrison talks with Cooper Quentin from the Electronic Frontier Foundation about Paragon’s spyware Graphite, how it reads text messages, who is most at risk, and misinformation exaggerating the ...spyware's known capabilities. Sources: https://ssd.eff.org/  https://citizenlab.ca/2025/03/a-first-look-at-paragons-proliferating-spyware-operations/  https://citizenlab.ca/2025/06/first-forensic-confirmation-of-paragons-ios-mercenary-spyware-finds-journalists-targeted/  https://www.theguardian.com/us-news/2025/sep/02/trump-immigration-ice-israeli-spyware https://jackpoulson.substack.com/p/exclusive-ice-has-reactivated-its  https://www.wired.com/story/ice-paragon-solutions-contract/ https://dfrlab.org/wp-content/uploads/sites/3/2024/09/Mythical-Beasts.pdf https://finder.startupnationcentral.org/company_page/paragon https://red-dot.capital/portfolio https://www.forbes.com/sites/thomasbrewster/2021/07/29/paragon-is-an-nso-competitor-and-an-american-funded-israeli-surveillance-startup-that-hacks-encrypted-apps-like-whatsapp-and-signal/ https://www.presidency.ucsb.edu/documents/executive-order-14093-prohibition-use-the-united-states-government-commercial-spyware-that https://www.eff.org/deeplinks/2025/09/eff-statement-ice-use-paragon-solutions-malwareSee omnystudio.com/listener for privacy information.

Transcript
Discussion (0)
Starting point is 00:00:00 This is an I-Heart podcast. I just think the process and the journey is so delicious. That's where all the good stuff is. You just can't live and die by the end result. That's comedian Phoebe Robinson. And yeah, those are the kinds of gems you'll only hear on my podcast, The Bright Side. I'm your host, Simone Boyce. I'm talking to the brightest minds in entertainment, health, wellness, and pop culture.
Starting point is 00:00:24 And every week, we're going places in our communities, our careers, and ourselves. So join me every Monday, and let's find the bright side together. Listen to The Bright Side on the IHeartRadio app, Apple Podcasts, or wherever you get your podcasts. In sitcoms, when someone has a problem, they just blurt it out and move on. Well, I lost my job and my parakeet is missing. How is your day? But the real world is different. Managing life's challenges can be overwhelming.
Starting point is 00:00:54 So what do we do? We get support. The Huntsman Mental Health Institute and the Ad Council have mental health. Health resources available for you at loveyourmindtay.org. That's loveyourmindtay.org. See how much further you can go when you take care of your mental health. Do you want to hear the secrets of psychopaths, murderers, sex offenders? In this episode, I offer tips from them.
Starting point is 00:01:16 I'm Dr. Leslie, forensic psychologist. This is a podcast where I cut through the noise with real talk. When you were described to me as a forensic psychologist, I was like snooze. We ended up talking for hours and I was like, this girl is my best friend. Let's talk about safety and strategies to protect yourself and your loved ones. Listen to intentionally disturbing on the IHeart radio app, Apple Podcasts, or wherever you get your podcasts. Lauren came in hot. From viral performances to red carpet looks that had everyone talking.
Starting point is 00:01:44 The podcast, the latest with Lauren the Rosa, is your go-to for everything. Be amazed. We'll be right here breaking it all down. I'm going to be giving you all the headlines, breaking down everything that is going down behind the scenes, and getting into what the people are saying. like what is the culture talking about? That's exactly what we'll be getting into here at the latest with Lauren the Rosa. Everything being amazed. To hear this and more, listen to the latest with Lauren the Rosa from the Black Effect Podcast Network or the iHeartRadio at Apple Podcast or wherever you get
Starting point is 00:02:12 your podcast. CallZone Media Welcome to It Could Happen here, a show about things falling apart. One such thing frequently falling apart is any. notion of privacy or digital privacy. Ever encroaching surveillance is one of the biggest global issues affecting free expression and a free press, both directly through surveillance technology, but also by chilling speech. I'm Garrison Davis, and this past week, news has swept the internet that ICE is using software from an Israeli company called Paragon, which allows ICE,
Starting point is 00:02:53 or DHS, to secretly hack into any smartphone, break encryption, access messages, track real-time location, and turn your iPhone or Android into a walking listening device. All of which sounds very scary, and some of which is true, though some of these claims are exaggerated or even likely false based on what we can currently infer from published research. Due to legitimate fears, we live in a world of surveillance paranoia, which can lead to surveillance myths. This is a core function of the Panopticon. People should take ICE's new enhanced smartphone surveillance capacity seriously, but to adequately do so requires an accurate understanding of the threat model, which we will get into later this episode with some help from the Electronic Frontier Foundation.
Starting point is 00:03:50 But first, let's address the newsworthy aspect of this story, what has actually changed recently. DHS first contracted with the U.S. branch of Paragon in September of 2024 for $2 million. But later that October, the contract was put on hold, thanks to a Biden executive order restricting government use of foreign spyware. And ever since then, the contract has been frozen pending a compliance review. But then, on September 1st, 2025, just last week, investigative journalist Jack Paulson reported that the stopwork order affecting the Paragon contract had quietly been lifted, allowing ICE to follow through on the contract and start using Paragon's
Starting point is 00:04:35 spyware technology, most likely, including their flagship product, graphite. What is graphite? Great question. One that I felt underqualified to fully answer myself, So I spoke with an expert, Cooper Quentin of the Digital Rights Group, the Electronic Frontier Foundation. You'll hear from him throughout the episode. My name is Cooper Quentin. I am a senior staff technologist at the Electronic Frontier Foundation. There, I do a lot of different things, most specifically for the purposes of this talk. I do malware research on malware that targets activists, journalists, and civil society.
Starting point is 00:05:13 So graphite is a type of spyware that is a... able to read your messages from your phone, the same way that you or, you know, maybe a cop could if they had physical access to your unlocked phone, right? That is the main capability that it has, according to the reporting published by Citizen Lab. Its main job is to hook into WhatsApp and into other encrypted chat apps and just read the messages in those apps, like in the messages you've already sent and any future messages that you send. That's really it. That's the meat of graphite. Something that sets Paragon apart from their fellow Israeli competitors is that Paragon has marketed itself as the ethical choice for spyware. One of their early
Starting point is 00:06:00 investors in Israeli firm called Red Dot wrote, quote, Paragon builds best in-class cyber intelligence software to empower democratic countries providing cutting-edge capabilities that make the world safer, unquote. On their U.S. website, Paragon says that they are quote-unquote empowering ethical cyber defense. And that they provide customers with, quote, ethically based tools, teams, and insights to disrupt intractable threats, unquote. Though they use the term cyber defense
Starting point is 00:06:32 on their U.S. site, Paragon's startup page reads, quote, Paragon is an offense-focused cyber company using digital intelligence for smartphone and internet surveillance solutions. The company applies strict moral restrictions on itself. limiting its extraction of information from targeted devices to conversations on chat apps. Paragon works solely with police forces and intelligence agencies that meet the standards of an enlightened democracy, which includes only 39 countries.
Starting point is 00:07:04 One of Paragon's senior executives told Forbes in 2021 that they would only sell their technology to governments that, quote, unquote, abide by international norms and respect fundamental rights and freedoms, and that, quote, authoritarian or non-democratic regimes would never be customers. Unfortunately, Paragon was not pressed on what their definition of authoritarian regimes includes. In recent reporting, there's been a lot of misconceptions about the capabilities of Paragon's main product, graphite. The Guardian wrote, quote, by essentially taking control of the mobile phone, ICE can not only track an individuals whereabouts, read their messages, look at their photographs, but also open and read information held on encrypted applications like
Starting point is 00:07:48 WhatsApp or signal. Spyware like Graphite can also be used as a listening device through manipulation of the phone's recorder, unquote. But research into Graphite by the surveillance watchdog group Citizen Lab has not indicated that Graphite has all these capabilities or tries to, quote unquote, take control of the entire device. But other tech journalists have since parroted the Guardian's unfounded claims. that graphite fully takes over a phone and can record audio through the microphone.
Starting point is 00:08:20 This is actually less full featured than other spyware we've seen in the past, like NSO Group's Pegasus spyware, other types of spyware that I've seen, tend to have a lot more capabilities, right? They have the capability of like turning on GPS location tracking, the capability to turn on a hot mic to do all these other things. And this seems, as far as Citizen Lab has reported, to not be present within the graphite malware. And I think this is because Paragon has presented themselves as kind of being the quote-unquote responsible malware manufacturer rate. And they're like trying to minimize the amount of data they collect.
Starting point is 00:09:01 It doesn't mean they couldn't add this stuff in the future, but that's the gist of it. It's actually, you know, kind of a very stripped-down malware. I don't want to minimize how impactful it would be for this malware to get all of your messages, right? That could have a huge impact for people, but we don't need to make up capabilities that our adversary has, especially under fascism, right? Like, we can just work with the capabilities that we know they have. A lot of reporting and discussion of graphite and Paragon frame it as an equivalent to NSO's spyware, Pegasus, which has been banned in the United States for four years. years. Pegasus seeks to completely hijack the target device more broadly, similar to Guardian's claims about graphite. But by forcing this comparison, people might be inadvertently boosting
Starting point is 00:09:50 Paragon's brand with free marketing by making their product out to be something that I'm sure Paragon would like to have people think it is, but doesn't actually equate their realistic threat model. Similar to how predictions of an evil, super intelligent AI actually currently serve to boost the stock price of AI companies. I think a lot of people are doing the work for these companies that are aligning themselves with fascism, right?
Starting point is 00:10:17 And I don't think it's a great trend actually, right? Like people are assuming that, you know, Palantir is sort of watching everything, right? And it really Palantir is just like fancy visual graphing software
Starting point is 00:10:33 essentially, right? Like the danger of Palantir is combining these two government databases, right? This malware, the graphite malware, right? Like, yeah, it's not good, but, you know, it's not magical, right? It's not omniscient. It's not able to, you know, I don't know, go eat the fridge out of your food and, you know, beat up your dad or something.
Starting point is 00:10:53 Like, you know, I don't. Well, now we're talking. Now, now that's a good app. If only tech bros could solve such social problems. No, no, they would never. No. But, yeah, you know, it's not, it's not a magical, right? And we don't need to do their work for them, right?
Starting point is 00:11:08 We don't need to do their myth-making for them, right? A bigger threat to the majority of people in the U.S. is getting your phone seized by the cops, right? Totally. There's nothing this Maurer can do, according to public reports, at least, the cops can't do if they get a hold of your unlocked phone, right? Having phased ID or a four-digit passcode is much more dangerous to your digital security. Yes.
Starting point is 00:11:33 as an average person, even as an average person going to a protest? Yes, yes, absolutely, absolutely. You know, celebrate, which is the machine that police plug your phone into you to make a copy of all the data on it, is much more dangerous to the average American than how the Paragon is. You're much more likely to encounter that. This is more of a niche gripe, but one that's still important. There's been claims that, quote, ICE can now hack any phone and break encryption.
Starting point is 00:12:02 But graphite doesn't actually, quote-unquote, break encryption. It's not going after the encryption on Signal or WhatsApp. Instead, Paragon tries to circumvent end-to-end encryption by trying to gain access to content on a targeted device once it's been unencrypted by an application like WhatsApp for the user to read. Similar to how if you have push notifications on for an application like Signal, if the police sees your phone
Starting point is 00:12:29 and push notifications display messages from signal, that doesn't mean the police have quote unquote broken signals encryption. Now, in order for graphite to extract messages from your phone, it needs to get onto your phone in the first place. Graphite is just the implanted code that can read and extract your messages. First, it needs to get onto your phone via what's called an exploit, which is usually a message sent to a phone number or a WhatsApp account that attacks a vulnerability in your phone's code
Starting point is 00:13:01 to gain permissions to load the graphite onto the messaging apps. Graphite and the exploit are two separate programs that work together. But exploits need to be frequently changed to keep up with software security updates, and that's expensive. You need different exploits for Android and iOS. Paragon has been using zero-click exploits, meaning the owner of the phone
Starting point is 00:13:25 doesn't have to manually click a link or intentionally download a file for the exploit to try to gain permissions on the device. You don't have to click or do anything. You just have to receive the message and then the spyware gets to work. Which is very scary,
Starting point is 00:13:40 but this technology cannot be deployed on mass because of how expensive and specific it needs to be in order to work. The other thing that I think is missing a lot from the conversation about graphite in particular is that the malware is just
Starting point is 00:13:54 the program that runs when it gets on your phone. And first, before they can install graphite, they have to get onto your phone through some sort of exploit. If your phone is up to date and fully patched, this will have to be a zero-date exploit, which means it's an exploit that has had zero days for Apple or Google or whoever to fix it because it is unknown to them.
Starting point is 00:14:15 And these exploits cost millions of dollars, right? Now, Paragon is not going to pay that millions of dollars for each person they're exploiting, but there is a large per person cost to ice for each person they're going to exploit. Because Paragon doesn't want to blow their zero day, which costs them millions of dollars to either buy or develop themselves. I'm Dr. Scott Barry Kaufman, host of the Psychology Podcast. Here's a clip from an upcoming conversation about exploring human potential.
Starting point is 00:14:50 I was going to schools to try to teach kids. these skills and I get eye rolling from teachers or I get students who would be like, it's easier to punch someone in the face. When you think about emotion regulation, like, you're not going to choose an adaptive strategy which is more effortful to use unless you think there's a good outcome as a result of it if it's going to be beneficial to you. Because it's easy to say like, like go you go blank yourself, right? It's easy. It's easy to just drink the extra beer. It's easy to ignore to suppress seeing a colleague who's bothering you and just like walk the other way. Avoidance is easier. Ignoring is easier. Denials is easier. Drinking is easier. Yelling, screaming is easy.
Starting point is 00:15:29 Complex problem solving, meditating, you know, takes effort. Listen to the psychology podcast on the IHeartRadio app, Apple Podcasts, or wherever you get your podcasts. If a baby is giggling in the back seat, they're probably happy. If a baby is crying in the back seat, they're probably hungry. But if a baby is sleeping in the back seat, Will you remember they're even there? When you're distracted, stressed, or not usually the one who drives them, the chances of forgetting them in the back seat are much higher. It can happen to anyone.
Starting point is 00:16:03 Parked cars get hot fast and can be deadly. So get in the habit of checking the back seat when you leave. A message from NHTSA and the ad council. Did you hear that excuse? You don't know if you don't lie about that, right? Lauren came in. From viral performances to red carpet looks that had everyone talking, the podcast, the latest with Lauren the Road,
Starting point is 00:16:21 is your go-to for everything VMAs. We will be right here breaking it all down. I'm going to be giving you all the headlines, breaking down everything that is going down behind the scenes, and getting into what the people are saying. Like, what is the culture talking about? That's exactly what we'll be getting into here at the latest with Lauren the Rosa.
Starting point is 00:16:40 Everything VMAs. I'm a homegirl that knows a little bit about everything and everybody. To hear this and more, listen to the latest with Lauren the Rosa from the Black Effect Podcast Network on the iHeartRadio at Apple Podcasts or wherever you get your podcast. Think back to the early 2000s.
Starting point is 00:17:02 You're flipping through TV channels and then you hear this. I was rooting for you. We were all rooting for you. How dare you? Learn something from this. But looking back 20 years later, that iconic show so many of us love,
Starting point is 00:17:18 it's horrified. Robin, first of all, is too old to be starting the model. She's huge. I talked to cast, crew, and producers who were there for some of the show's most shocking moments. If you were so rooting for her, what did you help her? With never-before-heard interviews, the curse of America's Next Top Model examines why this show was so popular and where it all went wrong. We basically sold our souls and they got rich. Listen to the curse of America's Next Top Model.
Starting point is 00:17:50 Starting on September 16th, on the IHeartRadio app, Apple Podcasts, or wherever you get your podcast. Welcome back. I'd like to get into a little bit of Paragon's backstory and how they've grown as a company. Paragon was founded in 2019 by former Israeli Prime Minister, Ahud Barak, and Ahud Shnorson, a former commander of the IDF's cyber warfare unit. basically Israel's equivalent of the NSA, called Unit 8200. Three other Paragon co-founders are also ex-Israeli intelligence. The startup got early financing from a Tel Aviv investment fund called Red. Capital, though Paragon also received backing from American Venture Capital. In 2021, Forbes reported that the Boston-based battery ventures had invested between 5 to 10 million in Paragon.
Starting point is 00:18:46 Bloomberg Capital has also supported the company. In 2022, Paragon launched a U.S. subsidiary and started recruiting former U.S. feds to help break into the American market. The New York Times reported that the DEA has used graphite as far back as 2022. Former CIA assistant director John Finbar Fleming became the executive chairman of Paragon U.S. in January of 2024, according to his LinkedIn. In December of 2024, Paragon was acquired by AE Industrial Partners for $900 million. A.E. Industrial Partners is a Florida-based private equity fund with a specialized security portfolio. Once they bought Paragon, it merged with another AE asset, the cybersecurity company Red Latus. Back in 2021, Paragon had about
Starting point is 00:19:40 50 employees. Now it has over 500. In June of 2025, they were hiring 150 more. Just a week ago, Executive Chairman John Finbar Fleming shared a recruitment post that Red Ladis was hiring, quote, emerging and offensive cyber engineers, unquote. Next, let's discuss the biggest case study of graphite being deployed that we know of. On January 31, 2025, Meta's encrypted messaging app WhatsApp sent a notification to 90 accounts that their smartphones were suspected of being targeted by spyware, which has since been traced to the Paragon product graphite. People targeted were journalists, human rights activists, and members of civil society
Starting point is 00:20:26 across Europe and the Mediterranean, but primarily based out of Italy. This was a zero-day and zero-click exploit, meaning both attacked a previously unknown vulnerability and required zero user interaction to infect the device. At first, the Italian government denied knowledge, but Paragon, canceled two contracts with customers in Italy and a parliamentary oversight committee later confirmed the Italian government was using Paragon technology
Starting point is 00:20:57 for spyware attacks against sea migration activists. One thing that's interesting to me is that we talk about this technology as being very expensive, very like individual. They have to individually target you. But then you see, you know, 90 people on WhatsApp. And you're like, that's a lot of people. So can talk about how this attack was like structured and what we've learned from it?
Starting point is 00:21:17 For sure. 90 people is a lot of people for such a targeted attack, although it's, you know, in terms of most Mao, like most commercial malware, 90 people would be a very, very small attack, right? Like, it wouldn't be worth your time. So, you know, it depends on the scale of things. I don't know what the scale of Italian civil society is, right? But 90 people is likely, I think, a small fraction of the whole of Italian civil society, right?
Starting point is 00:21:44 But, yeah, those, so those people that were targeted by Paragon, the ones that we know about, you know, one was a Italian anti-fascist journalist, right? I think another, there were a couple of other journalists that were covering migration issues. And, you know, just sort of a large swath across Italian civil society. So the way they were targeted was on WhatsApp, they were added to a group. And then they were sent a malicious PDF. which they didn't even have to open, and they didn't have to approve being added to the group. But as soon as that malicious PDF was received by their WhatsApp app, the WhatsApp client, the WhatsApp client processed the PDF, and it contained code, which exploited WhatsApp, and allowed Graphite to start running. So Graphite doesn't actually install anything to get a little bit technical.
Starting point is 00:22:36 Graphite only runs in memory of the phone, right? It only runs in the, like, temporary RAM, so to speak. Okay. So rebooting the phone would have cleared out of the graphite infection and they would have had to re-infect the person. Interesting. Right. In this case. Yeah.
Starting point is 00:22:52 It's possible that in the future, Paragon will find a way to make graphite persistent, but it does make it more stealthy. It makes it harder to forensically analyze for people like Citizen Lab and like EFF if it just runs in memory. Sure. Right. So it kind of makes sense that they would want to keep running it in memory, even though. rebooting it would clear out the infection, because you can just re-infect the person. Even like developers, like WhatsApp or like Apple might have a harder time, like, realizing that they've been attacked if it can get cleared out so quickly, I guess.
Starting point is 00:23:26 Yeah, absolutely, absolutely. And in this case, WhatsApp did realize they had been attacked. They quickly figured out the pattern and, you know, to their credit, warned everybody immediately. Often the only way I think people will find out they've been infected by this spimer is if, WhatsApp or, you know, somebody else maybe Apple warned you. That's not great. But it is, but it is better than the alternative where they just don't warn you at all, right? After the targets were notified of the spyware attack, some, including journalists and migrant refugee activists in Italy, agreed to participate in a forensic analysis of graphite by Citizen Lab. They found that Paragon
Starting point is 00:24:07 spyware had spread from WhatsApp to at least two other apps on the device. In April of 2025, we got forensic confirmation of graphite spyware on iPhone, with a zero-click exploit attacking iMessage. Citizen Lab was able to analyze the devices of a prominent European journalist who requested to remain anonymous, and an Italian journalist linked to the previous cluster of attacks in Italy. iPhone is slightly harder to target than your average Android, but certainly not impervious to this sort of attack, as we've seen from these examples in Europe. To date, Citizen Lab has also identified suspected Paragon deployments in Australia, Canada, Cyprus, Denmark, Israel, and Singapore. Though the encrypted messaging app signal is not mentioned in the citizen lab reporting,
Starting point is 00:24:54 their analysis did find that Graphite had the capability of going after several different messaging apps, and it's probably safe to assume that Signal would be one of the apps that Paragon would want to extract messages from. We don't have much information about this spyware targeting signal, possibly because signal does not have as large of an international user base compared to other apps like WhatsApp, IMessage, or Telegram, despite signal being much more secure. So what can you do? Though graphite might not be the total phone hijacking super spyware that the Guardian and others claim it to be, it still poses a significant security threat. Some basic digital security precautions apply here. Get into a habit of regular digital cleaning. Remove unnecessary content from your device.
Starting point is 00:25:45 Save space. Old photos can be uploaded to an external encrypted hard drive and question if you really need years of messages stored on your phone. Use an encrypted chat app like Signal, which has disappearing messages, so that there isn't a large backlog of communications that could be subtle. accessed by a hostile actor. Be very wary of cloud backups. They are often one of the least secure aspects of your digital life,
Starting point is 00:26:13 especially if they are unencrypted. And though it won't deter zero-click exploits, it's still best practice to avoid clicking mysterious links or downloading files and photos sent to your phone. Another tip is to regularly reboot your phone, contrary to claims that once your phone has been targeted by graphite's now compromised forever, something called malware persistence, To our current knowledge, rebooting can wipe Paragon's exploits.
Starting point is 00:26:40 It does not appear that Paragon SpyWare is, at the moment, reboot persistent. And it seems that rebooting would actually remove it from the phone. My reading is that rebooting it would remove the malware from your phone until you were re-exploited, which so, you know, if you just reboot and you don't update or, you know, the Zero Day isn't out yet, right? They're just going to run the exploit again, right? I think it's a fair bet that they're just going to run the exploit again. but it would be enough to get it off for that time, right? And I mean, I think as far as a mitigation,
Starting point is 00:27:10 my friend recommends that people, like, reboot their phone every morning when they're brushing their teeth, right? And I don't think it's a bad bit of security hygiene. If these guys are going to, in fact, you might as well make it, you know, more of a headache for them, right? You might as well make it more costly to them because there is going to be a charge to them for each time they have to reinfect you, right? But yeah, it's certainly, I think, overblown to say that,
Starting point is 00:27:34 You know, once it's on your phone, it's on your phone forever. There's, you know, you just got to, you know, throw your $1,000 phone in the trash and go buy another one. Like, no, you can, you know, if you don't feel safe just rebooting it, right? Like a factory reset, that would be the next step, right? I think that would, that would most likely get rid of any persistence mechanisms that were installed. I'm not familiar with any iOS malware, certainly, that would survive a factory reset. But probably the most important thing besides using signal is to keep your phone software updated. it. That's the simplest and best way to make it harder for spyware like graphite to make it
Starting point is 00:28:08 onto your phone in the first place. Out-of-date software has many more known vulnerabilities to attack. For extra protection, enable lockdown mode on iPhone or advanced protection on Android. So the reason it's important to keep your phone up to date and always install the latest security updates, even if it's a pain in the ass, and I know it's a pain in the ass, is because this makes an attacker have to use zero-day exploits. So if you have an old version of the software on your phone, there are known exploits.
Starting point is 00:28:41 Known exploits are, you know, more or less free, right? They are already out there. They are already burned. They do not matter, right? Like the company already knows about them. An exploit loses basically all of its value as soon
Starting point is 00:28:56 as, you know, the company knows about it and it's patched, right? So if you have out-of-date software out of your phone. If you have out of data software and a computer, it changes the entire economics of attacking. It's basically free for me to exploit your phone at this point. And I, you know, I will exploit it as many times as I want. And I don't care if that exploit is burned. I don't care if you find it. Because again, it's free, right? Zero day exploits for, especially for Apple, for like, you know, Android pixel phones, for for graphene, the alternative Android OS, not
Starting point is 00:29:28 graphite. This has been giving me real problems lately. Zero-day exploits, meaning explet that the manufacturer does not know about and has not had a chance to patch, cost millions of dollars for these platforms. And a zero-click exploit where the victim doesn't have to interact with it at all, right? I don't have to click a link. I don't have to do something. You just send me, you know, a PDF, an infected PDF or a magic file, right, or something. And my phone is infected.
Starting point is 00:29:59 Those are the most expensive of all, right? Those are sort of the, those are the golden ticket for malware companies, right? And these cost millions of dollars. And if you burn it, right, if it gets caught, like, like, you know, what happened with WhatsApp and Citizen Lab in Italy, right? That's millions of dollars down the drain for Paragon. You know, they're going to pass that on to the Italian government, to ICE, to whoever their contractors are, right? So keeping your phone up to date totally changes the economics. of running a malware attack against you, right?
Starting point is 00:30:34 Like, anybody can run out of their office, old, you know, end day, right, more than zero a day malware attacks against enemy, right? Like, those are cheap. But if your stuff is patched, no, it's good. It totally changes the entire game. And you've got to be doing really good work for ICE to want to burn that much money on you. All these tips can make it considerably harder and, more importantly, extremely expensive for this spyware to get onto your device.
Starting point is 00:30:59 these exploits could only be deployed against individual targets, and that gets quite expensive. Just because ICE could theoretically hack your phone, that doesn't mean that your phone is necessarily at a high risk of being hacked by ICE. Who are the possible targets for graphite spyware? Who is at higher risk? Journalists who report on ICE and immigration, people who work for immigration advocacy organizations, immigration lawyers, as well as high-profile activists. It goes without saying, that anything you do on your phone or on the internet carries a level of inherent risk. I'm Dr. Scott Barry Kaufman, host of the psychology podcast. Here's a clip from an upcoming conversation about exploring human potential. I was going to schools to try to teach kids these
Starting point is 00:31:52 skills and I get eye rolling from teachers or I get students who would be like, it's easier to punch someone in the face. When you think about it. emotion regulation like you're not going to choose an adapted strategy which is more effortful to use unless you think there's a good outcome as a result of it if it's going to be beneficial to you because it's easy to say like like go you go blank yourself right it's easy it's easy to just drink the extra beer it's easy to ignore to suppress seeing a colleague who's bothering you and just like walk the other way avoidance is easier ignoring is easier denial is easier drinking is easier yelling screaming is easy
Starting point is 00:32:28 complex problem solving, meditating, you know, takes effort. Listen to the psychology podcast on the IHeart Radio app, Apple Podcasts, or wherever you get your podcasts. I always had to be so good, no one could ignore me. Carve my path with data and drive. But some people only see who I am on paper. The paper ceiling. The limitations from degree screens to stereotypes that are holding back over 70 million stars. workers skilled through alternative routes
Starting point is 00:32:59 rather than a bachelor's degree it's time for skills to speak for themselves find resources for breaking through barriers at tailorpaper sealing.org brought to you by Opportunity at Work and the Ad Council Did you hear that excuse? You don't know if you don't lie about that, right? Lauren came in.
Starting point is 00:33:15 From viral performances to red carpet looks that had everyone talking. The podcast, the latest with Lauren the Rosa is your go-to for everything be amazed. We will be right here breaking it all down. I'm going to be giving you all the headlines breaking down everything that is going down behind the scenes and getting into what the people are saying
Starting point is 00:33:35 like what is the culture talking about that's exactly what we'll be getting into here at the latest with Lauren the Rosa everything VMAs I'm a homegirl that knows a little bit about everything and everybody to hear this and more listen to the latest with Lauren the Rosa
Starting point is 00:33:51 from the Black Effect Podcast Network on the IHeart Radio app Apple Podcasts or wherever you you get your podcast. Think back to the early 2000s. You're flipping through TV channels, and then you hear this. I was rooting for you.
Starting point is 00:34:07 We were all rooting for you. How dare you! Learn something from this! But looking back 20 years later, that iconic show so many of us love, is horrified. Robin, first of all, is too old to be starting a model. She's huge.
Starting point is 00:34:26 I talked to Kat. crew and producers who were there for some of the show's most shocking moments. If you were so rooting for her, what did you help her? With never before heard interviews, the curse of America's Next Top Model examines why this show was so popular and where it all went wrong. We basically sold our souls and they got rich. Listen to the curse of America's Next Top Model, starting on September 16th, on the IHeart Radio app, Apple Podcast, or wherever you get your podcast.
Starting point is 00:34:56 We'll close this episode with a longer segment from my interview with Cooper discussing who's at the most risk of ICE using Paragon software and more of Cooper's recommended surveillance mitigation practices. This is not something that can be deployed at a protest and sweep up thousands of people. This does go after individuals because of its cost and the way that it needs to be deployed. who would be the people that you would say are most at risk of this. Like, is this your local like, you know, food not bombs organizer or like an immigration lawyer?
Starting point is 00:35:36 Like, right. Who should be concerned, I guess? And take this threat more seriously. Definitely. I think people who should be concerned are, I mean, you hit the nail on the head, right? The people that should be concerned about
Starting point is 00:35:51 this are people who have you know, been a special pain in the ass for ice in particular, right? You know, people who might be under HSI investigation, right? People who, you know, have been threatened by the president or by Pam Bondi, you know, specifically, right, like had their name called out specifically, right? People who are, you know, very loud, very active, right? Like the sort of leaders, what's the term tall poppies, Like, the people that are really have their head sticking out, right, in a way that's, like, very public and very well-known. If you have risen to the level where, like, Tom Homan knows your name personally, right, that makes it a pretty good chance that, that, you know, you might become a target of this, right? Like, that's, but that's who we're talking about.
Starting point is 00:36:43 Well, and, like, as we've seen Italy, like, that can, that can include, like, anti-fascist journalists. Yeah, definitely. People who work for, like, migrant human rights organizations. Yes. high-profile activists. And I think, like, there's a real concern with, you know, trying to compromise the phone of journalists because of how journalists, like, talk to sources, how journalists might have information about, like, other people besides the journalist on their phone.
Starting point is 00:37:06 Yeah. They may be targeting through the journalists, but trying to get after other people who they're talking to. Same thing with, like, immigration lawyers. And, like, there is real concern about harm spreading from those factors. And I think that's why if you are in those sorts of, like, roles at, like, a human rights organization, a journalist or a lawyer, you need to. to be, like, extra careful about keeping your, like, phone updated, regularly engaging in,
Starting point is 00:37:29 like, digital hygiene, having disappearing messages, maybe putting on lockdown mode onto your iPhone, be very wary of being added to mysterious group chats. These are just general practices that are, I think, worthwhile to, like, engage in whether or not you're actually going to get targeted by this. Absolutely. And I want to especially single out lockdown mode there. Like, we are not aware of any infections of any malware, right? Pegasus, graphite, right, any others that have managed to successfully infect an iPhone on lockdown mode. So if you are worried about this, lockdown mode is the single most effective thing you can do to protect yourself against this malware, right? Is go turn on lockdown mode.
Starting point is 00:38:13 If you're on Android, I think Google calls it advanced protection mode, yeah. Yeah, advanced protection mode. So advanced protection mode used to be not very comprehensive and I think with the new Android update with Android 16 that came out I think like last week or something it's now much more
Starting point is 00:38:32 comparable to lockdown mode so I highly recommend turning that on if you're on Android all my homies love lockdown mode yes yes that is the number one protection right the other thing I strongly recommend always, and I be this drum
Starting point is 00:38:50 every day, is turn on disappearing messages. If you're on Signal or WhatsApp, go turn on disappearing messages, right? Because this is good against, you know, a lot of different things, right? Like, this is good against Celebrate as well as Pegasas as well as grabbing me, right? Like, if
Starting point is 00:39:05 the messages are gone by the time you get infected, there's no way to recover those, right? You're minimizing your footprint, right? Go delete old chats, right? Like, if you get a second, right? Like, we've all, Google has trained us to all be digital hoarders, right, and keep, depending how will you are 20 years of email, 10 years of email, whatever, right? Never, never delete anything, right? And that's,
Starting point is 00:39:26 don't ignore them, ignore Google. Google doesn't want you to delete things because they want to use all that data for selling you ads, right? Delete everything. I want more underwater data send me. Yes, yes, exactly. Delete everything, delete your files, you know, like get rid of those old group chats, right? Get rid of those old chats that you don't need anymore. You need to be like that lawyer in Death Note. Yeah. Delete. Yes.
Starting point is 00:39:48 Delete. Oh, the Death Note reference. Damn. Do you want to plug Citizen Lab slash EFF and tell people where to find both your work and then also other people who are doing research into graphite and like, you know, if you've been suspected of being targeted by, you know, maybe a notification. Yeah. How you can participate in forensic analysis to help everyone be more secure against this in the future.
Starting point is 00:40:15 Yeah, for sure. So one of the best ways to find out you've been targeted by state-sponsored malware is to get a notification from Apple or Google or WhatsApp or some of the large company that you have been targeted by state-sponsored malware. Typically, these notifications don't contain much more information than we believe you've been targeted by a nation-state or by state-sponsored malware. But if you do get one of those notifications, take it very seriously. You know, reach out to Access Now or to EFF or to Citizen Lab and let us know, right? And we will help figure out what's going on, right? Like, this is the number one indicator, right? Because, like, this malware is usually fairly stealthy, right?
Starting point is 00:40:58 Like, it's not actually, like, you know, I don't know, flashing. You're infected on your screen, right? But, yeah, Citizen Lab is always doing amazing work. I'm a fellow there, so I get to work with them sometimes, which is very exciting. they are based out of the Monk School of Global Affairs at the University of Toronto and her website is
Starting point is 00:41:20 citizenlap.org where you can find a lot of really excellent research on the types of threats that target civil society. I have citizenlap.ca. Oh. But I'm Canadian. You are probably correct. I can never remember the correct.
Starting point is 00:41:36 As a Canadian, I was very put off by you erasing our nation's history of our coveted.ca. We love our dot-CA. I am not trying to start a war with Canada. Well, many people are, so... Listen, I'm firmly on the side of Canada and the war against Canada, okay?
Starting point is 00:41:56 Please take me in, please. Yeah. Your solidarity is noted. So citizenlap.org actually redirects to citizenlap.ca. So we were both right. There you go. Or you were maybe more, right? So yeah, citizenlub.
Starting point is 00:42:11 And yeah, they're really fantastic. A lot of really good research going on there. At EFF.org, the Electronic Frontier Foundation, we're a U.S.-based nonprofit, been around for 35 years defending civil liberties as they intersect with technology. So a lot of free speech work, a lot of privacy and Fourth Amendment work.
Starting point is 00:42:32 And we also have a really excellent set of guides called the Surveillance Self-Defense Guides, which are at sSD.eaf.f.org, which I highly recommend people go and check out. It's the most sort of evergreen guide for defending yourself online. A lot of the problem with the online security guides get out of date right quickly. And we have a totally whole full-time person dedicated to making sure that our guides stay up to date. I'll put a link in the description. Yeah. And we're a nonprofit, a member supported nonprofit.
Starting point is 00:42:59 So, you know, if you like to work, throw us a few bucks. We work for tips. And yeah, those are the two places that I'm at that I want to plug. Only other thing to plug. I guess you can follow me on social media. I'm at Cooper Q.com. Blue Sky and CooperCue at masto.hackers.combe on mastodon. Hell yeah.
Starting point is 00:43:18 Yeah. All right. Well, thank you so much. Thank you for the work you do at EFF and Citizen Lab. Thank you. Yeah, I guess we should always throw away our phones since there's no way to use our phone safely anymore.
Starting point is 00:43:30 I mean, throwing away our phones isn't a terrible idea. That's how I'm at it. You know what? I could be on to something. I think for our own sanity, just in general. No, I think they're making us more connected And I think they're making us
Starting point is 00:43:44 More stable They are making us more connected That's for sure In that I get 5 billion notifications per day If that's what connected means, yeah All right It could happen here is a production of Cool Zone Media For more podcasts from Cool Zone Media
Starting point is 00:44:02 Visit our website, Coolzonemedia.com Or check us out on the IHeart Radio app, Apple Podcasts, or wherever you listen to podcasts. You can now find sources for it could happen here listed directly in episode descriptions. Thanks for listening. I just think the process and the journey is so delicious. That's where all the good stuff is. You just can't live and die by the end result.
Starting point is 00:44:23 That's comedian Phoebe Robinson. And yeah, those are the kinds of gems you'll only hear on my podcast, The Bright Side. I'm your host, Simone Boyce. I'm talking to the brightest minds in entertainment, health, wellness, and pop culture. And every week, we're going places. in our communities, our careers, and ourselves. So join me every Monday, and let's find the Bright Side together. Listen to the Bright Side on the IHeart Radio app, Apple Podcasts, or wherever you get your podcasts.
Starting point is 00:44:51 If a baby is giggling in the back seat, they're probably happy. If a baby is crying in the back seat, they're probably hungry. But if a baby is sleeping in the back seat, will you remember they're even there? When you're distracted, stressed, or not usually the one who drives them, The chances of forgetting them in the back seat are much higher. It can happen to anyone. Parked cars get hot fast and can be deadly. So get in the habit of checking the back seat when you leave.
Starting point is 00:45:19 A message from NHTSA and the ad council. Do you want to hear the secrets of psychopaths, murderers, sex offenders? In this episode, I offer tips from them. I'm Dr. Leslie, forensic psychologist. This is a podcast where I cut through the noise with real talk. When you were described to me as a forensic psychologist, I was like snooze. We ended up talking for hours, and I was like, this girl is my best friend.
Starting point is 00:45:40 Let's talk about safety and strategies to protect yourself and your loved ones. Listen to intentionally disturbing on the IHeart Radio app, Apple Podcasts, or wherever you get your podcasts. Lauren came in hot. From viral performances to red carpet looks that had everyone talking. The podcast, the latest with Lauren the Rosa, is your go-to for everything being made. We'll be right here breaking it all down.
Starting point is 00:46:03 I'm going to be giving you all the headlines, breaking down everything that is going down behind the scenes. and getting into what the people are saying. Like, what is the culture talking about? That's exactly what we'll be getting into here at the latest with Lauren the Rosa. Everything being amazed. To hear this and more, listen to the latest with Lauren the Rosa
Starting point is 00:46:18 from the Black Effect Podcast Network on the IHeart Radio at Apple Podcasts or wherever you get your podcast. This is an IHeart podcast.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.