ICE acquires Israeli spyware capable of hacking phones and encrypted apps

ICE has reactivated a $2M contract for Israeli spyware Graphite, sparking fears of civil liberties after previous cases of misuse

Under Trump, ICE has seen its operations and powers vastly expanded [Getty] US Immigration and Customs Enforcement (ICE) are moving ahead with a multimillion-dollar contract for powerful Israeli-made spyware capable of hacking phones and encrypted messaging apps, drawing criticism from civil liberties groups and surveillance experts.

The $2 million deal with Paragon Solutions, the Israeli firm behind the Graphite spyware suite, was initially signed under the Biden administration in late 2024 but paused amid compliance reviews over privacy and security concerns.

According to The Guardian, the Trump administration has now lifted the pause, restoring ICE’s access to the tool and sparking a fresh debate over government surveillance powers.

Paragon’s Graphite software allows agencies to remotely penetrate smartphones, access encrypted applications such as WhatsApp and Signal, extract data, and even covertly activate microphones to turn devices into listening tools.

Critics warn the technology gives unprecedented surveillance capabilities to US immigration authorities at a time of heightened political and public scrutiny over civil liberty abuses by ICE.

The Washington Post reported that the pause was lifted following changes in Paragon’s ownership structure and the completion of federal regulatory reviews. The decision comes despite mounting evidence from rights groups and cybersecurity researchers about the risks of misuse, including against journalists and activists.

Earlier this year, researchers at the Citizen Lab, a cybersecurity watchdog based at the University of Toronto, discovered Graphite had been used to target the devices of journalists in Italy, including reporters from Fanpage.it, prompting a European investigation.

Italian officials denied any wrongdoing, but the revelations highlighted the growing global market for so-called “mercenary spyware” and the lack of transparency surrounding its deployment.

Related As ICE raids rise across US, attorney warns people to prepare

US affairs Brooke Anderson In Washington, civil liberties advocates have expressed alarm over the implications of ICE regaining access to such invasive technology. Nadine Farid Johnson, policy director at the Knight First Amendment Institute at Columbia University, urged lawmakers to act.

“Reports that ICE has renewed its contract with spyware vendor Paragon compounds the civil liberties concerns,” Johnson said in a statement last week.

“Spyware like Paragon’s Graphite poses a profound threat to free speech and privacy. Congress must step in to impose clear limits and safeguards before these tools are used in ways that undermine constitutional rights.”

The Guardian reported that ICE officials have defended the contract, insisting the spyware is used strictly for law enforcement purposes, such as targeting transnational criminal networks and human trafficking operations.

However, critics point to the lack of independent oversight mechanisms and the absence of public information about how frequently or against whom the software is deployed.

The Washington Post added that the reactivation of the Paragon deal may signal a more permissive stance by the Trump administration toward domestic surveillance technologies.

Past controversies over the use of spyware such as Pegasus, developed by the Israeli firm NSO Group, have already prompted calls for stricter regulation. The Biden administration previously blacklisted NSO after its tools were linked to the hacking of US diplomats’ phones.

Under Trump, ICE has seen dramatically expanded powers and funding, fuelling concerns about its growing politicisation.

Critics point to sweeping arrests, including of non-criminal migrants, and the use of tactics once considered off-limits, such as unmarked vehicles and plainclothes agents. Civil liberties groups warn that without oversight, the agency risks becoming a tool of political intimidation rather than law enforcement, especially with access to powerful surveillance technologies.

  • Novaling@lemmy.zip
    link
    fedilink
    English
    arrow-up
    4
    ·
    1 day ago

    So like, genuine question to all of those saying no sim cards/e-sims and only use wifi with airplane mode on, how do you communicate with people on the go? Do you just wait until you’re at a building with free Wi-Fi?

    • sunzu2@thebrainbin.org
      link
      fedilink
      arrow-up
      1
      ·
      10 hours ago

      Not serious proposal at this point but you can at least turn off the cell nework when home etc.

      it is about harm reduction just like drug use.

  • Ileftreddit@lemmy.world
    link
    fedilink
    arrow-up
    4
    ·
    2 days ago

    Is it just me or is getting all that for $2 million a pretty great deal? Still not cool, but I’d have thought the ability to totally eliminate privacy would have been more expensive

    • strung6387@lemmy.ml
      link
      fedilink
      arrow-up
      2
      ·
      1 day ago

      It’s not clear how the spyware gets onto the phone, though. Typically the user needs to download something that happens to have spyware in it. Unless the USA government includes this spyware in heretofore legitimate government apps so that a significant number of people install the spyware unintentionally, I don’t see how this spyware is of practical value. Including it in government apps might be their plan, though, even though there is a high chance that the malicious app(s) would be banned. But the USA government could threaten Apple or Google into letting the app remain available for download. Dark times.

  • quick_snail@feddit.nl
    link
    fedilink
    arrow-up
    11
    ·
    edit-2
    2 days ago

    Don’t put a Sim card in your phone, folks.

    Never take your phone out of airplane mode. Use WiFi.

      • quick_snail@feddit.nl
        link
        fedilink
        arrow-up
        6
        ·
        1 day ago

        Broadband processors on your device are extremely vulnerable black boxes. Almost all of the attacks that Citizen Lab discovered come from this vector.

        By not using a Sim card, you significantly decrease the surface area for attack, making yourself invulnerable to the majority of these zero days

    • birdwing@lemmy.blahaj.zone
      link
      fedilink
      arrow-up
      15
      ·
      2 days ago

      Everyone’s*.

      When Trump does something, the rest of the world experiences the antisocial oligarch pedo’s ruffles.

      • bobbyfiend@lemmy.ml
        link
        fedilink
        arrow-up
        3
        arrow-down
        11
        ·
        2 days ago

        Since you (like me) are pedantic about apostrophes, I’ll be pedantic about “pedo.” There’s no evidence Trump is a pedopile–that is, primarily attracted to children who have not yet reached puberty.

        Plenty of evidence strongly suggesting he’s a child molester, though.

    • quick_snail@feddit.nl
      link
      fedilink
      arrow-up
      10
      ·
      edit-2
      2 days ago

      If they breach the endpoint, it doesn’t matter if it’s e2ee.

      Just avoid putting a sim card in your phone, and it eliminates almost all of these vectors.

    • tapdattl@lemmy.world
      link
      fedilink
      arrow-up
      14
      ·
      2 days ago

      Well I’m assuming if it can bypass the lock screen somehow it can pull encryption keys, or just let the user gain full access to the phone and open the signal app directly.

  • irotsoma@lemmy.blahaj.zone
    link
    fedilink
    arrow-up
    11
    ·
    2 days ago

    I don’t really get how that’s helpful for ICE. They don’t investigate crime really. Shouldn’t they know a person’s immigration status based on their public records? What do they need private communications for to prove a person is in the country illegally?

    This is a rhetorical question. I know why they want it, just it doesn’t make sense for them to spend our money on for the things they’re supposed to be tasked with doing.