Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:01):
All Zone Media.
Speaker 2 (00:05):
Welcome back to It Could Happen here, the podcast that's
happening here in your ear. And one of the things
that we love talking about here is a critical ingredient
towards creeping authoritarianism, towards growing corporate control and surveillance over
all of our lives, which is of course technology that
makes it even easier to monitor you than it already is.
(00:29):
We're not talking primarily about like the government monitoring you,
because they can, you know, do stuff like just pull
your phone data from a you know which cell towers
is pinged. We're talking about the kind of stuff that
allows basically whoever can get an app on your phone
to track and stalk you. And Yeah, I'm going to
first introduce Mia Wong. Mia, welcome to the show that
(00:52):
you also host.
Speaker 3 (00:53):
Yes, I'm here.
Speaker 2 (00:56):
So what are we what are we talking about today?
And who are we talking with?
Speaker 4 (01:00):
Yeah, so we are talking about stalker wear, which is
the sort of broad name for the category of software
that Robert's been talking about. And we are talking about
someone who hacked, well.
Speaker 2 (01:11):
A stoker ware stalker.
Speaker 5 (01:13):
Yeah.
Speaker 4 (01:15):
One of the stockerware companies, my Aris and Crime, the
fame hacker, the no fly list. Yeah, returning guests, always
happy to have you on.
Speaker 5 (01:24):
Yeah, always happy to be on. Yeah.
Speaker 4 (01:29):
So I think I think, I don't know. I think
there's a real tendency among and I see this among
leftists a lot, for kind of good reasons and kind
of not good reasons to really only focus on state
and like large corporate actors in terms of surveillance. And
(01:50):
that's a mistake.
Speaker 5 (01:52):
Yeah, totally.
Speaker 4 (01:54):
Yeah, And so I guess I guess the place where
I want to start before we get into the specific
company that you do, is it still called owned?
Speaker 1 (02:03):
I can't.
Speaker 5 (02:03):
It's fine to call it owned or pond or whatever.
I still do that. Sometimes people get confused.
Speaker 4 (02:10):
But yeah, yeah, But before we get into that, I
want to I want to ask you a bit because
you've done a lot of sort of I guess you
could call it research, both actual research wise and then
in terms of poking around their servers.
Speaker 5 (02:26):
Research and journalism and whatever. Do you want to call it? Yeah, axic?
Speaker 4 (02:30):
Yeah, So I wanted to just start off by asking
if you can give sort of like a brief summary
of what stalker ware is.
Speaker 5 (02:39):
Yeah. So, so stalker ware like as a category, encompasses
like a number of different types of apps. Most of them,
like on the service, advertise themselves as like parental control software,
which is already bad enough. Just to be clear that
there's like advertised for like spying on your children's phone,
like seeing their location in real time, seeing their mass
(03:00):
such as that they receive any photo they take. Ostensibly
this is to prevent bullying and help with them when
they get depressed because they don't trust you and talk
to you for whatever reason. But obviously a lot of
these are then furthermore, because that's like that, sure, that's
a like target audience, that's a demographic you can advertise too.
(03:20):
But then there's this even bigger potential target demographic of
people who are insecure in their relationship, mostly men, not
only men, but who are then solved this idea that
they can use software like this for stalking their partner,
for finding out if they are cheating on you, things
like that, which is obviously an even bigger problem, which
once again not to discount the problems that's spying on
(03:42):
your children. It's already like bad enough, but yeah, lead
this leads to this whole big industry of these apps
being used by partners against each other like also just
by people, like against anyone in the in their surroundings
that they suspect might be doing something, might be like
talking behind their backs. It often kind of turns into
(04:05):
like it obviously turns into this obsessive thing, especially if
you're solved this idea that this this app can magically
solve like interpersonal issues, like with anything that sells you
this magic idea of being able to solve any problem.
That these people start kind of spying on everyone in
their like circles to some of them, like not everyone,
most like a lot of people on the spying like
(04:25):
their partner or like their child or whatever. But it
often like spirals out of control into this like controlling
everyone in their surroundings, knowing what everyone is up to
where they are, and spending like hundreds of dollars a
month on doing so. And yeah, that's pretty fucked up
if you ask me.
Speaker 3 (04:41):
Yeah.
Speaker 5 (04:43):
Yeah.
Speaker 2 (04:43):
One of the things that's interesting too. It's also in
a lot of cases illegal. This is going to vary,
you know, from country to country, in state to state,
but in the US there are states like California, which
gets pointed out in the very good Tech Crunch investigation
on truth spy where there are really strict laws that
journalists like you have to a bias to win, you
can record someone that these these apps absolutely break.
Speaker 5 (05:04):
Yes, it's specifically a thing that doesn't. Most of these
app will have like a disclaimer at the bond that
is like this might be illegal and your jurisdiction and
please ask for consent before doing this, and then they
have lots of tutorials on how to install this in
someone's device without their consent. Yeah, but it's like always
like a we do not take any like we we
it's not our fault if you break the law basically,
(05:26):
which obviously, like it's so far not a lot of
this has been challenged in court. But I don't think
this would hold up too long. I'm not, but I
don't think just saying we make a product to do
crimes with if you do crimes of it, it's not
I mean it works for the gun industry. So yeah.
Speaker 2 (05:44):
The difference is that like the with the gun industry,
it's a product where there is a legal and an illegal,
like clear way to do it.
Speaker 5 (05:52):
The thing with stocker were as well is that like
a lot of them will also explicitly say the only
real use of this we allow you to do to
use it for is to surveill or child, which unfortunately
is legal in most jurisdictions because children are property of
their parents. Yeah quotes because I do not agree with that, but.
Speaker 2 (06:10):
Yeah, it's one of those things where people using it,
like someone installing an app on their axes or their
their partner's phone or whatever without consent, could very easily
would lose any court case, whether or not the company
would get in trouble. I think it's going to rely
a lot on the stuff the videos they're posting about,
like how to put how to get these apps on
(06:30):
people's phones without them knowing, but like they do have
that out with like no, it's just for surveilling children, which.
Speaker 5 (06:35):
Is great, and for anyone else you need consent or whatever.
But I think it is important, yeah, to point this
out very early for anyone who's listening to this because
they think they might have stock aver on their phones,
or because they know they have stock averre on their phones.
You can use this in a domestic abuse case, well immediately,
this is explicit proof that abuse is happening, no matter
(06:56):
anything else, because like that's the thing generally with domestic
abuse case, it's really hard to prove abuses happening. Stalkerware
and any other type of spying device like also physical
GPS trackers and stuff that is immediate proof that there
is a there's controlling behavior going on, that you are
being spied on. This it cannot only be used and
(07:17):
there's explicit admissible evidence. This is also usually like makes
cases first like not for you like it just yeah,
it like can potentially add charges and make it more serious,
and that it can help making cops give a shit
about like abuse, which yeah, I hate that I need
to say that, but yeah, it's like it makes it
(07:39):
more serious because there's like spyware and whatever.
Speaker 2 (07:42):
It's easy evidence first off, like you can prove they're
spying on you, and second, if you are in one
of the states where that violates the law, then you
can immediately say this person is breaking the law, like
this is we don't have to debate whether or not
they've they've crossed the line.
Speaker 5 (07:56):
Yeah, And even if it doesn't directly break the law
to spy on someone on a partner like it, depending
on the on the on the region, it can be
kind of a hazy thing, especially if it's a device
you might co own if it's like a state where
you where with like code possession or whatever. In the US,
I do not know US law very much around this,
but yeah, there's like laws like that. But usually still
(08:18):
the fact that you're being spied on can be used
as proof for other abuse things you might be alleging,
because it's like hard proof that something is happening. And
also usually these companies will somewhat have to respond to
some point US, so they will have to give out
like who that account on there is behind like the
spying on your phone for some of them, we can
also there's also tools that help you find out who
(08:40):
is spying on you, or there's like someone with forensic
background can help.
Speaker 2 (08:45):
Yeah, and I think people. One thing we should note
is that if you're kind of curious, has my device
been infected by some of these tools, one the one
that we've been talking about most truth spy. If you
go to that tech Crunch article or to my art
it also has a link yet or to ye to
your article on your website. There's a tool you can
(09:05):
use where you it'll tell you how to get your
im SI I think I am I Yeah, which you
just dial a thing on your phone and it gives
you that number. It's basically how you identify specific bones
and you plug that in. It will let you know
if your device has been compromised.
Speaker 5 (09:22):
Now like December last year up until there is the
data and if you yeah, it can pretty much tell
you if you've been spined on using this specific tool
until then. For other stuff, there's also guides, usually on
TechCrunch and otherwise also on Stop stockerbar dot ARC, which
is the US Coalition against stalker Bear, and also just
generally I think a lot of like more local anti stocking,
(09:45):
anti abuse works are not as informed yet as they
should be, but there's still a good point also to
reach out to or like yeah, yeah.
Speaker 2 (09:54):
One of my questions about truth Spy that I'm hoping
you can answer is I know that you can like
text messages get transferred via it, your call records, all
that kind of stuff, get and who you were calling.
Does that include messages for like encrypted apps like Signal
or is that not accessible through this?
Speaker 5 (10:11):
It depends, Like for some of these, it will like
get signal messages, what's the messages and everything generally by
reading the notification contents because like from notifications, you know,
like what messages are have been like received. Sometimes it
will only then have the received messages and not the
set messages. Often these also include like a key logger
component that maps messages then sent back as well. It
(10:35):
depends a lot what these apps collect, but for most
of them, also the collection for other texting apps is
usually kind of broken. None of these apps are really
well maintained. They're mostly just quick cash graps, yeah, are
there to maintain features usually don't really work.
Speaker 2 (10:51):
And it seems like based on that, one thing people
can do outside of checking to see if their device
has been compromised, is do stuff like turn off notifications
for appsling Signal, Right, and that's that's actually just generally
good advice. Notifications are a compromise of the security that
Signal offers. Don't have them enabled, you know.
Speaker 5 (11:14):
Yeah, or at the very least disabled them on the
lock screen on Android. Yeah, I don't know how. I
think that's also possible on iOS, but I think I
doesn't show message content on the lock screen anyways. I'm
not sure anymore. But yeah, it's just also small things
like that, And also like one of the key tells
that someone probably tampered with your phone, especially for Android,
is if Google play Protect is disabled and you do
(11:37):
not remember disabling it for something else, it was almost
definitely disabled because someone installed something on your phone. Just
try re enabling it. Then they will probably tell you something.
The thing also to keep in mind if you find
stockaware on your phone, please get professional help. Do not
just delete it. Do not like necessarily confront whoever you
think might be your abuser about it unless you're very
(11:59):
sure that that's the situation you can handle, because like, yeah,
that's one of those things that like bringing it up
or just deleting it can very quickly lead to like, yeah, yeah,
complicating the situation a lot.
Speaker 4 (12:13):
You know what else complicates the situation.
Speaker 3 (12:16):
These ads and we are back.
Speaker 2 (12:31):
So when it comes to the actual fight against this stuff,
obviously what you're doing is a big part of it.
Getting inside these companies and finding out like what they're
doing and their capabilities is huge for in terms of
like what regular people are people who are interested in
becoming activists about this can do. What does the what
is the struggle to actually fight this stuff look like?
(12:53):
Like how do we how do we put a bullet
in this industry's head, I.
Speaker 5 (12:57):
Think one of the biggest things, and also like why
I do the work I do with like hacking it
with encouraging others to like send me data, be that
insiders from these companies sending it idea to me, or
like tech Crunch specifically currently because like me and tech
crunch are like the only people really doing like journalism
on this like regularly. And the important thing with like
(13:17):
journalism and all of this is like awareness. It's very
important to create awareness about this. That's also why I
do the media work with like being on this podcast
and things like that. I think the most important thing
is to make people aware, like talk about this in
your feminist circles or whatever. Things like that especially bring
it up just also in like general info things about
abuse or how to detect abuse. I think the most
(13:40):
important thing to do against stocker whereas demestify it, because
most people don't even know that this is a thing,
that this is, like that there's just commercially available spyware
anyone can install on your phone. It's as important to
not like give in to some sort of paranoia as
with any of these things. It's just important to like, yeah,
generate awareness about it and like spread these articles, let
(14:04):
friends know that this is a potential thing, and then yeah,
the hard thing with this is that like obviously it
should will probably help if there was some sort of
legislation against some of this, It's going to be very
hard to get any proper legislation that ends this industry
because in most Western countries, which are the only countries
which unfortunately would have enough power to like actually get
(14:27):
these apps shut down, because that's the world we live in.
But the problem there is usually that like this notion
that children are owned by their parents is too strong
to really make a full case against these apps. And
at the very best what I can, like the very
best time kind of hoping for from from legislators is
just a ban on advertising these apps on use against
(14:50):
other adults, which would be big already, But that doesn't
really solve the issue because there's still going to be
enough people who know of their use for use against
adults and their there's going to be enough people on
like Creddit threads talking about, hey, well yeah, you oh
you're not sure if your government is cheating on you, look,
you can just use this app, you know. That's also
how most of this marketing for this works. It's just yeah,
(15:13):
at the end of the day, this is like a
patriarchal issue. So yeah, I think that's also why, like
I am so focused on like the hacking and the
like blowing these companies up and showing like who's behind them.
It's because at the end of the day, the most
effective thing we have against these companies is like the
grassroots movement of making them too scared to run in
(15:34):
this business, making it not profitable enough, because as I said,
most of this is like quick cash grabs from like
web design studios and outsourcing companies. Yeah that a're just
making a quick buck from this because otherwise they don't
get paid enough. Like that's this sad thing really is
how much of this industry is in all of these countries.
(15:54):
Western companies outsource their IT too, because there's lots of
IT companies there and they are entirely reliant on like
Western companies giving them very underpaid tasks. And yeah, I
have this problem that you now have a bunch of
employees and not enough money to always pay them. And
what do you do you like find some weird niche
of like a tech product you can quickly build. Yeah,
(16:16):
and this is like one of those easy niches. It's
like always the scummy stuff and like yeah, it's that's
also why like so many of these companies are like
based out of Vietnam, out of Iran and whatever. It's
just companies that already have it hard enough to do
business globally, where the IT industry is like falling apart
because there's not enough like local customers and anything that's international.
(16:40):
You're just the cheap workforce, right, So yeah, it's it's
once again also like a class problem. I don't like
most people working in this industry know that they're working
in a like scummy industry.
Speaker 2 (16:51):
Yeah of course, but like yeah, you got to get
paid and that's yeah.
Speaker 5 (16:55):
And that's like why I think making it more scary
to operate in this industry is like yes, the wait
to go because like with just like these like four
hacks that have happened against these companies over the last
like half a year or so, two of them, three
of them, three of them have shut down completely. Others
seem to be slowly moving towards just building other software primarily. Yeah,
(17:20):
it's just like, yeah, it's like with any other like
shady industry that the best we can do is just
to not make it profitable to run the software, because
at the very best, anything else we will get it's
just pushing them more into the shadows, which is not
going to solve the issue at all.
Speaker 2 (17:38):
Yeah. I think a lot about like strategic thinking, which
I do believe is kind of often in part because
of how rightfully negative most people on the left think
about the military. There's a tendency to ignore some of
like the theory around how to actually win a conflict
and all of it all all strategy really, when you're
(17:59):
talking about like defeating an opponent, revolves around denying and
taking operational area from them, right, Yeah, And that's what
you're talking about when you talk about, well we need
to stop this. You know, one of the first things
we can do as part of fighting this is to
stop them from being able to advertise certain places.
Speaker 1 (18:15):
Right.
Speaker 2 (18:16):
It's making sure that they're not able to operate without
being seen. It's basically cutting down their area, their space
to maneuver, their ability to profit, which cuts down their money,
their access to people, their ability to actually like operate.
Speaker 5 (18:31):
Right.
Speaker 2 (18:31):
Like, that's what we're looking at in terms of how
do you kill this stuff? It's not one single really.
I use the comparison of like a bullet, but it's
never going to be one bullet. These things are too durable.
There's too many countries in the lay to do that.
Speaker 5 (18:43):
Yeah, that's also why I put so much emphasis on
doing media work about this and getting more people to
talk about this and getting more awareness of this out there,
to the point where I'm willing to work with more
conservative newspapers on this because everyone needs to know about this.
At the end of the day. This is how we
like stop people from falling victims to this. Most people
(19:03):
who are a victim of stocker apps have never heard
of stocker apps before, and I think that's like one
of the biggest ways to tackle this. And on the
other hand, we also have I think another big leverage
point with how many of these are getting hacked because
none of these apps are very secure. That's another thing
is this can also be leveraged against like the abusers
(19:24):
in this scenario. I think just pointing out to them
that all of these apps get hacked all the time
and that this is how they get found out, that
that this is how their data of them as abusers
ends up landing on the Internet. I think it's also
like a very important angle at the end of the day,
is just to make it clear like yeah, no, not
even you are like secure from this having consequences for
(19:46):
your life, like beyond like direct interpersonal or legal consequences.
This can and in the past has result in like
your email adders being on a list of people who
have do abuse to people online. You don't want to
be on such a list. I think that's also important
just to like point out there isn't one stockover app
that's not eventually going to get hacked. There is a
(20:08):
big war against these apps. They're all like there's so
many different hacking groups that keep sending me data from
these like I'm already working on another article that already
once again affects like the data of like I think
like eighty thousand more like abusers, and it's just the
abuser data this time. But I'm still going to report
on it, like it's it's it's this is not going
(20:30):
to stop. It's even also not going to stop when
I stop reporting on this myself, like I've there's been
work before me down on this. I also the first
time I got involved in finding stock over was back
in twenty twenty. People have been hacking these apps forever
and will keep hacking them, Like just look at the
Wikipedia page for stock over. There's an ever growing list
(20:51):
of these apps that have been hacked. And I think
at this point that like official count being kept by
one of the people at TechCrunch is at like thirty apps,
a few of which have been hacked two or three times. Yeah,
these are not These are not secure apps for any.
Speaker 2 (21:09):
No, no, no, of course not. Yeah, and they yeah,
I mean it makes sense that like an app dedicated
to violating people's privacy for money would also basically violate
the privacy of the people using it.
Speaker 5 (21:22):
Yeah, and also they don't care. Like I said, of
course it's a cash grap. It's nothing else. There's a
few apps that are like a little more than a
cash crap, but it's usually just because they're made, Like
there's still a cash grap, but they're like more well made,
But it's because they're a cash graph from a company
that has better developers or more money to do the
(21:42):
initial investment. The thing is also like most of these
companies don't have a lot of initial investment, And I
think the important thing to consider as well, here is
one big area of this that I have not yet
started tackling, but I do want to like look into
more sometimes. Is a big reason this industry is and
most of these apps have a lot of users despite
(22:04):
there being so many of them, is the affiliate marketing industry.
Once again, our very beloved friend. Yeah, all of these
apps are parts of various affiliate marketing networks, some of
them started by stock Aware company, and some of them
just other like things to advertise all the shady things
like all those phone number locator apps or whatever, that's
(22:25):
also part of those same affiliate marketing networks. And there's
lots of money flowing here, and there's lots of money
flowing to very big tech YouTube channels, and I might
soon have some proof for some of that. But that's
how these are advertised. It's everyone who advertises stock Aware
to you, who has a big platform, is doing that
because they're getting money, not for any other reason.
Speaker 3 (22:48):
We need to do more ads.
Speaker 4 (22:50):
We will be back shortly, and we are back.
Speaker 2 (23:06):
Well that's all I had, Miya, what do you got?
Speaker 4 (23:09):
Yeah, I guess there's there's another thing I wanted to
ask a little bit about, which Zach Whitaker, who's been
one of the journal journalists that tech Crunch doing a
lot of the research was great. One of the things
that he brings up that I think is another I
don't know, it's kind of a plane with fire angle
on them. But one of the issues that these companies
seem to have is payment platforms, because a lot of
(23:34):
payment platforms look at this and go wait, hold.
Speaker 5 (23:38):
On, yeah, so that's yeah.
Speaker 4 (23:39):
We've talked about that a little bit.
Speaker 5 (23:41):
That's an angle. We've also been a fighting on a lot.
Like me and sign we work on most of these
stories together. Like it's kind of funny. We both got
each other into the stockover thing back in twenty twenty.
As I mentioned, that was the first time I stumbled
into a stock cover app with a security issue. I
reached out to some random journalists that tech Crunch about it,
and now he is the only one talking about this
(24:03):
forever because I reached out to him that one time
and he got sucked into this horrible, horrible world of spying.
But yeah, like, one of the things we focus on
a lot is reporting these companies to their payment providers,
to their server hosters, to the point where sometimes like
for weeks sack will just wait for them to switch
to a new provider after we got them taken them
(24:24):
from like PayPal, and then from their other PayPal account
where they're just using like the checkout experience from one
of their completely unrelated software projects which they will later
claim is not related at all and there are different
companies and whatever. But then like eventually they get taken
down from that as well, and usually we can get
them taken them from most like Western hosters, like especially
(24:44):
US housters, will immediately take them down. You do not
want to risk being the company hosting spuywire on US grounds. Yeah. Yeah,
it's just like same with EU hosters, Like the few
companies that we've seen that were on Headsnerd, they immediately
react because it's like yeah, no, like under EULO, you
don't want to like risk that. And also just because
(25:05):
you don't want to host that, like there's no reason
for you to host shit like that. It will have
like image consequences, and that's an important thing that is
maybe also something you can do as more like a
grassroots thing. It's also like if you find one of
these apps and if you see, oh, they're using like
PayPal or whatever. Just reach out. I think paper is
(25:26):
even harder to reach is like just an average lay person.
I don't expect them to reply. They might still take action,
you will have to manually check. PayPal doesn't really reply
to things ever. But yeah, same as like hosting company,
if it's either hosted on like a European or American
hosting company, I just just reach out, be like, hey,
there's someone running spyware on your thing. Also used the
(25:48):
word spyware, not stocker, where they will not know what
that is, and it is spyware. So yeah, and that
can usually get them taken down. And often they don't
have proper backups and will have a few months of
data missing, and it's like, yeah, that's how you slowly
grind them to a halt. Yeah. And also once again
like if you have tips about any of these companies,
(26:10):
be it having found a vulnerability just or insider info
especially I'm always very happy about the insider info. You
can reach out to either me or Sakudak. We're both
very happy to talk about this. Yeah.
Speaker 4 (26:23):
Yeah, that's something that's been used really effectively by right
wingers to target sex workers. It's been a huge thing.
There's been a bunch of campaigns to get platform companies.
And yeah, so it's.
Speaker 5 (26:36):
It's interesting that for once we can use the very
restrictive and conservative rules of payment providers for our good.
Speaker 3 (26:44):
Yeah.
Speaker 5 (26:44):
But yeah, basically any of the big payment providers will
not respect something like this. Some of the small regional
odd ones probably won't really give a shit. They have
no reason to. It's like revenue for them. But yeah,
it's generally worth trying. And I'm always glad like if
someone just reaches out to these companies and we don't
have to do that ourselves. I think me and second,
(27:06):
a few other people like actively working in this are
doing more than enough work currently. But yeah, like just
if you find one of these things that don't go
digging too deep. It's a depressing world. But if you
stumble upon one of these somewhere or whatever, just just
report them. It's it's it's gonna disrupt their operations and
if it happens often enough, they might just give up. Yeah,
(27:28):
And I mean, like in cases like the truth Spy,
they are willing to do extreme amounts of fraud to
get to money easily because they like started with like
mostly just in like with the market, they could get
with their Vietnamese payment providers. Right. Eventually they realized, well,
the US is like this really big market, right, but
(27:49):
for really easy like US stuff, we need like a
PayPal thing, right, So they made like over twelve fake
American identities with fake passports and fake addresses and sign
up to pay Paul a whole bunch of times, and
had various employees that the company move money around. Yeah,
that's obviously not a thing the US government will like
(28:10):
if you do that. Generally speaking, they moved like millions
like that, so yeah, which is pretty crazy like that.
The amount of money that's moving in this industry is crazy.
Like yeah, actually, like most of these app apps will
be half broken, which no one ever complains about because
like it's shady, ye, Like you don't expect like if
(28:31):
you go online and you search for something shady like
anything like be it piracy or whatever, you don't expect
it to be the best experience ever. Like you know,
you're getting some weird service and it's probably going to
be half broken. But yeah, like most of these talkob
apps start at like forty dollars a month and more
and then some days for more features, you pay like
up to sixty or seventy or so, and then all
(28:53):
of these have like tens of thousands of users, sometimes
hundreds of thousands of users. Yeah, you can do themself.
It's crazy. This is a really big industry, which makes
it so crazy to me that it's like not a
thing that's talked about more, especially in like feminist spaces
and things like that, because this is such a like
big angle of like modern tech enabled abuse that they
(29:16):
really think should should be more of a topic, especially
on the left, Like this is this is bad?
Speaker 2 (29:22):
Yeah, no, this is like critically bad. I agree entirely.
Speaker 5 (29:25):
And also like that the whole thing with like all
of this data being so easily accept your data can
end up getting sold on some dark web forum. You're
both asked the abuse around that's the target, right, and
the government can find these like I have no like
this is this is not me making a statement of
that's a thing that's happening, but there's nothing preventing it
(29:46):
from hacking these companies and getting like like I sometimes
like when whenever I get these data sets, and it's
always hard to work with data sets that include like
non consent essentially collected data of people, right, Yes, but
like I do want like do some due diligence checks,
like mostly trying to find if the government is using
a specific app. Sometimes yes, there's always like the odd
(30:07):
correction law of some of the officer who has signed
up for one or two of these apps or like
education people and whatever. But then I also some of
the search through the text message just for just some
code words and the amount of people moving drugs have
Stocker were on their phones. It's you know.
Speaker 2 (30:26):
Yeah, and it's it's one of those things where there
are laws, like technically, if my understanding of the laws
around this are correct, it is illegal for an organization
like the FBI to utilize these apps.
Speaker 5 (30:38):
But yes, but we have an organized and called the
NSA who.
Speaker 2 (30:45):
And it is it is on paper illegal for them
to do this with a third party app. But one
thing that often gets done, particularly by the FBI, but
you know, not just by them, is it's not illegal
for law enforcement agencies to tracked with private agencies. And
if those agencies you don't you just don't check in
(31:05):
on what they're doing, you know, what they're using.
Speaker 5 (31:08):
But like yeah, or like if an inform or like
if an informant like sends you the data, like you're
not gonna say.
Speaker 2 (31:14):
No exactly exactly.
Speaker 5 (31:16):
And also you don't really need to disclose that because
it's information and got froment informant. You do not need
to disclose that informant in court ever. So yeah, it's
it's it's there.
Speaker 2 (31:26):
There are there are ways around, you know, the laws
that we put up, not that we shouldn't continue to
extend those laws, but you shouldn't like just because well
they're not allowed to use this doesn't mean they can't
get access to the info.
Speaker 5 (31:38):
Yeah. Yeah, And also there's all this important thing like
there's more like also globally, like there's other governments that
can just be using this. Like for one of the
apps I.
Speaker 2 (31:46):
Got the government, the Russian government doesn't give a ship.
Speaker 5 (31:50):
That was also like another thing where I's like for
one of the apps I got data for. There was
some indication that at some point the Colombian National Police
did a bigger evaluation of using commercials spyware for their use.
Because you're in the country with not that big of
a like police budget in comparison, you cannot afford like
all the Coolestraeli tools everyone else has. So what do
(32:12):
you do? You just look for random apps you can
find you know.
Speaker 2 (32:15):
Yeah you find the Walmart, the Kirklin.
Speaker 5 (32:18):
The Wish to the conversion I guess.
Speaker 2 (32:20):
Yeah, yeah, yeah yeah Ali Baba spywear right. Yeah.
Speaker 5 (32:25):
I don't think most of them moved forward with this
because these apps fucking suck. Like they're bad, Like that's
that's the other thing, Like they don't even really do
their jump. Well, they're bad and you don't know who
is behind them. You cannot even go up to someone
and be like, yo, don't do this. You also cannot
go to the cops and be like, this company is
scamming me, because yeah, I assume some people have probably
(32:46):
done that before, but it does involve admitting to a crime.
So yeah, it's like, yeah, these companies just get away
with not giving a shit about their product because like.
Speaker 2 (32:56):
Yeah, yeah, well I think that's that's all we had.
Thank you Maya for both the work you're doing and
for talking to us. Yeah always, is there anything you
wanted to plug before we roll out here?
Speaker 3 (33:09):
Just my just my.
Speaker 5 (33:10):
Blog, I think where we're like, I do this journalistic
work and also more, there's about to be another cool
investigative piece out soon, which tincantually involves more tracking and whatever,
and also involves like Hollywood and more. It's it's, it's
it's a crazy big story. I promise that will be
out like hopefully in a month or so. But yeah,
my blog at Maya dot CRIMEU dot gay crime, you
(33:34):
as in crime, w yeah, and k as in gay
yeah yeah. Just check out my blog at the bottom
of the blog. There's all my links to my social
media For anyone who's like listening to this and has
been wondering where I am. I am back on Twitter
as well.
Speaker 2 (33:50):
Yeah for now, for now, that's for for all of
us these days, that's always like yeah.
Speaker 5 (33:57):
Point, but yeah, I am back on Twitter. I'm I'm
posting there sometimes. Yeah.
Speaker 2 (34:04):
All right, Well, thank you and thank you all for listening.
We will be back tomorrow, unless this comes out on
a Friday, in which case we'll be back at some
other point, but soon.
Speaker 1 (34:20):
It could happen here as a production of cool Zone Media.
For more podcasts from cool Zone Media, visit our website
Coolzonemedia dot com, or check us out on the iHeartRadio app,
Apple Podcasts, or wherever you listen to podcasts. You can
find sources for it could happen here updated monthly at
coolzonemedia dot com. Slash Sources thanks for listening.