A global investigation spearheaded by Amnesty International has revealed that Intellexa, a company specializing in commercial spyware, allegedly possessed the capability to remotely access the surveillance systems of its government clientele. This unprecedented level of access would have allowed Intellexa personnel to directly view the highly sensitive personal data of individuals whose mobile devices had been compromised by its "Predator" spyware. The findings, which challenge long-standing assertions by the commercial surveillance industry, were published by Amnesty and a consortium of media organizations, including Israel’s Haaretz, Greece’s Inside Story, and Switzerland’s Inside IT, based on a trove of leaked Intellexa materials.
A Breach of Trust: Unveiling Direct Access
The most concerning disclosure from the leaked documents, which encompass internal company records, sales and marketing presentations, and training videos, points to Intellexa’s use of an off-the-shelf remote access tool, TeamViewer. This tool reportedly granted company staff the ability to connect to and operate their customers’ surveillance platforms over the internet. A leaked training video, in particular, offered a stark illustration of this capability, exposing privileged sections of the Predator spyware system, including its operational dashboard and the extensive storage infrastructure housing photographs, messages, and other intimate surveillance data extracted from victims.
Amnesty International’s Security Lab, responsible for the technical analysis of the leaked materials, underscored the gravity of these findings. Researchers highlighted that the video appeared to depict "live" infection attempts by Predator against actual targets. This conclusion was drawn from detailed information presented in the video, including a specific instance targeting an individual in Kazakhstan, complete with the infection URL, the target’s IP address, and the precise software versions of the victim’s phone. This level of detail, researchers argue, strongly suggests real-world operations rather than simulated demonstrations. Donncha Ó Cearbhaill, head of Amnesty’s Security Lab, further substantiated this, stating that an instructor in the training call explicitly confirmed it was a "live customer system" when questioned by a staff member about whether it was a demo environment.
The Predator Spyware Ecosystem
To understand the implications of Intellexa’s alleged direct access, it is crucial to place it within the broader context of the commercial spyware industry. Predator is a sophisticated form of malware designed to secretly infiltrate mobile devices, enabling comprehensive data exfiltration, remote activation of microphones and cameras, and real-time monitoring of communications. Unlike traditional cyberattacks that might target infrastructure, spyware like Predator is engineered for precision surveillance of individuals, transforming their personal devices into powerful eavesdropping tools.
Intellexa, reportedly founded by former Israeli intelligence officer Tal Dilian, operates in a highly secretive global market where private companies develop and sell these powerful surveillance tools primarily to government agencies. This market has expanded significantly over the past two decades, driven by increasing demand from national security, intelligence, and law enforcement entities seeking advanced capabilities to combat terrorism, organized crime, and other threats. However, the dual-use nature of this technology—its potential for both legitimate and illegitimate applications—has consistently fueled controversy.
The emergence of private spyware firms can be traced back to the early 2000s, with companies like Hacking Team (Italy) and NSO Group (Israel) pioneering the development of sophisticated surveillance tools. Tal Dilian, a prominent figure in this landscape, has a history intertwined with several such ventures, including Circles and Cytrox, before co-founding Intellexa. Cytrox’s "Predator" spyware has been linked to numerous incidents of targeting journalists, human rights defenders, and political opposition figures globally, particularly in Europe. The consolidation of various surveillance capabilities under the Intellexa umbrella aimed to offer a more comprehensive "intelligence alliance" to its clients.
Industry Norms Challenged
The commercial spyware industry has consistently maintained a strict operational firewall between vendors and their government clients. Companies like NSO Group, creator of the infamous Pegasus spyware, and the now-defunct Hacking Team have always asserted that once their software is sold and installed, they have no access to the targets’ data or the customers’ operational systems. This stance is predicated on several critical considerations.
From the perspective of the spyware developers, this separation is a crucial legal and ethical shield. By disclaiming access to victim data, they aim to mitigate their potential legal liability should their software be used for unlawful surveillance or human rights abuses. Their argument is that responsibility for the spyware’s application lies solely with the purchasing government entity.
For government customers, this operational autonomy is equally vital. National security and intelligence agencies typically guard the details of their investigations—including the identities of targets, their locations, and their sensitive personal information—with the utmost secrecy. Entrusting such sensitive data to a private company, especially one that might be based in a foreign jurisdiction, introduces significant security and counterintelligence risks. The idea that a third-party vendor could potentially view or even store this information has always been considered an unacceptable breach of operational security.
This is precisely why the alleged practices of Intellexa have sent shockwaves through the industry and among privacy advocates. Paolo Lezzi, CEO of Memento Labs, another spyware developer, articulated this industry norm when contacted for commentary on the allegations. He stated unequivocally that such remote access is "absolutely not normal," adding that "no [government] agency would accept it." Lezzi expressed skepticism that the leaked video depicted a live customer system, suggesting it might have been a demo environment. While acknowledging that some clients might request temporary, supervised access for technical troubleshooting, he emphasized that this would be under strict client oversight and for limited durations. Amnesty International’s firm assertion that the video indeed showed live operations, however, directly contradicts these industry assurances and raises profound questions about Intellexa’s operational model.
A History of Controversy: Tal Dilian and Intellexa
The revelations about Intellexa’s practices are not an isolated incident but rather the latest chapter in a series of controversies surrounding its founder, Tal Dilian. Dilian, a veteran of Israel’s elite Unit 81, a technology intelligence unit, has been a central figure in the often-shadowy world of offensive cyber capabilities. His career trajectory has been marked by a relentless pursuit of advanced surveillance technologies and a distinct lack of discretion, which one industry veteran colorfully described as "moving like an elephant in a crystal shop." This characterization implies a willingness to operate without the subtle concealment often favored by others in the clandestine surveillance market.
Intellexa itself has faced scrutiny for its operations, particularly its alleged role in providing surveillance technology to various governments with questionable human rights records. The company’s activities have drawn the attention of international bodies and advocacy groups concerned about the proliferation of sophisticated spyware and its potential for abuse against dissidents, journalists, and human rights defenders. The reported structure of Intellexa, encompassing multiple entities across different jurisdictions, further complicates efforts to trace its activities and enforce accountability.
Global Implications and Sanctions
The alleged direct access by Intellexa staff to victim data compounds concerns about privacy and security for potential surveillance targets. As Amnesty International pointed out, individuals’ most sensitive data could be exposed not only to the government agency deploying the spyware but also to a foreign commercial entity. This dual exposure magnifies the risk of data breaches, misuse, or further compromise, especially given the documented instances of security vulnerabilities within some spyware firms themselves.
The geopolitical ramifications of commercial spyware are profound. When foreign governments use these tools, often acquired from companies like Intellexa, to target individuals within other sovereign nations—including government officials, diplomats, or journalists—it can strain international relations and trigger diplomatic crises. The United States government has taken a leading role in addressing this challenge. In 2021, the U.S. Department of Commerce added NSO Group to its Entity List, effectively banning American companies from trading with the Israeli firm, citing its spyware’s use to target U.S. government officials abroad.
Building on this, in 2024, the U.S. Treasury Department escalated its actions by imposing sanctions directly on Tal Dilian and his business partner, Sara Aleksandra Fayssal Hamou. These sanctions were a direct response to allegations that Intellexa’s Predator spyware had been deployed against American citizens, including U.S. government personnel, journalists, and policy experts. This marked a significant policy shift, representing the first time the U.S. government targeted specific individuals within the commercial spyware industry, making it illegal for American entities and citizens to engage in any commercial dealings with Dilian and Hamou.
In response to the Haaretz report, Tal Dilian, through his legal counsel, vehemently denied any criminal activity or operating cyber systems in Greece or elsewhere. He further accused journalists of being "useful idiots" in what he described as an "orchestrated campaign" designed to undermine him and Intellexa, suggesting the campaign had influenced the Biden administration’s actions. These counter-accusations underscore the contentious and highly charged nature of the debate surrounding commercial spyware and its regulation.
The Broader Fight for Digital Rights
The Intellexa revelations underscore the urgent need for greater transparency and accountability within the commercial surveillance industry. The opaque nature of this market, coupled with the immense power of the tools it develops, poses a significant threat to civil liberties, human rights, and democratic processes worldwide. The ability of private companies to effectively become extensions of state surveillance apparatuses, potentially with direct access to sensitive information, blurs lines of responsibility and oversight.
Civil society organizations, like Amnesty International, and investigative journalists play a critical role in uncovering these clandestine operations, holding powerful actors accountable, and advocating for stronger regulatory frameworks. The ongoing efforts to expose the reach and impact of commercial spyware are integral to the broader fight for digital rights, ensuring that the proliferation of advanced surveillance technologies does not lead to an unchecked erosion of privacy and fundamental freedoms in an increasingly interconnected world.




