Spying… Tools of the trade series

There are well-known commercial and government surveillance tools — some target individual phones/computers (vendor-made “spyware”), others are network-level intercept systems or mass-collection programs. I can give a high-level, non-actionable overview of the most famous ones, the kinds of capabilities they have, notable controversies, and safe privacy/defence suggestions. I will not provide instructions on how to acquire, deploy, or operate any spying tool.

Famous spying / surveillance tools (high level)

Pegasus (NSO Group) — a commercially-developed phone spyware that can be delivered to smartphones and (when successful) gives an operator near-complete access to a device: messages, calls, microphone/camera, location, apps, etc. Investigations (the “Pegasus Project”) found its use against journalists, activists and political figures, sparking major human-rights and legal controversies. I won’t explain attack vectors or how to exploit devices.

StingRays / IMSI catchers (cell-site simulators) — hardware that pretends to be a legitimate cell tower and forces nearby phones to connect, allowing operators to collect identifiers (like IMSI/IMEI), metadata, and sometimes intercept calls or texts depending on configuration and capabilities. Law-enforcement use of these devices raises big privacy and transparency questions because they can sweep up data from many innocent bystanders.

FinFisher / FinSpy (Gamma / Gamma International) — commercial “lawful-intercept” spyware sold to governments. Reported features include remote monitoring of PCs and phones, keylogging, file exfiltration, and stealth installation techniques. FinFisher has appeared in multiple investigations alleging misuse against dissidents.

PRISM and NSA collection tools — large scale intelligence programs (e.g., PRISM) and associated NSA systems are designed for bulk collection and targeted lawful intercept of internet communications, often via cooperation or compelled access to service providers or at backbone collection points. These programs are primarily state intelligence capacity rather than commercial spyware, and generated major public debate after 2013 disclosures.

Typical capabilities (general, non-technical)

  • phone access: messages, call logs, contacts, GPS, microphone/camera capture
  • computer access: files, keystrokes, screenshots, remote command & control
  • network surveillance: intercepting or rerouting traffic, locating devices, metadata collection
  • mass collection: bulk harvesting of communications or metadata at telecom/internet backbone scale

I’m summarising capability types only; I will not describe exploit techniques, configuration methods, or how to bypass protections.

Why these are controversial

  • Abuse: commercial spyware sold to or used by governments has frequently been linked to surveillance of journalists, activists, lawyers and political opponents rather than only criminals.
  • Transparency & oversight: use by police/intelligence often happens with limited public oversight or court transparency (e.g., secrecy around StingRay purchases/usage).
  • Legal/regulatory issues: export controls, lawsuits, and criminal investigations have followed several of these vendors and operators.