Stalkerware operator pleads guilty in rare prosecution
嗯,用户让我总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我得通读整篇文章,抓住主要内容。文章讲的是密歇根一家公司卖间谍软件,老板Bryan Fleming承认了罪行。这是2014年以来首个成功起诉的案例。 然后,用户可能需要的是简洁明了的摘要,重点突出事件、人物和影响。我得确保在100字以内涵盖这些要点:公司名称、老板名字、产品用途、案件的时间节点、执法机构的行动以及案件的意义。 还要注意不要使用“文章内容总结”之类的开头,直接描述事件。可能还需要提到这个案件的影响,比如对其他间谍软件公司的警示作用。 最后,检查一下字数,确保不超过限制,并且信息准确无误。 </think> 密歇根一家间谍软件公司老板Bryan Fleming承认非法销售用于未经授权监视他人的软件,并面临刑罚。这是2014年以来首个成功起诉的间谍软件运营商案件。Fleming通过pcTattletale推广其产品,声称可帮助用户发现伴侣不忠行为。尽管该公司警告用户不要用于非法目的,但其营销策略明显鼓励非法监视。Fleming的认罪标志着对间谍软件行业的一次重要打击。 2026-1-7 19:31:8 Author: therecord.media(查看原文) 阅读量:2 收藏

The owner of a Michigan-based stalkerware company pleaded guilty on Monday to federal charges for selling a surveillance product designed to spy on people without their consent.

Bryan Fleming admitted to founding and running pcTattletale, a company that marketed its spyware as a way for customers to catch romantic partners cheating. Fleming’s guilty plea is the first successful prosecution of a stalkerware operator since 2014.

Homeland Security Investigations (HSI) began probing pcTattletale and more than 100 other websites selling stalkerware applications in June 2021, according to a search warrant affidavit in the case.

Fleming was unusually public and direct about the product and even filmed a YouTube video promoting how pcTattletale could be used to catch a “spouse you’re worried about [if] you don’t think they’re being honest.”

“You put it on their Android phone, they won't be able to see it,” Fleming said in the video. “As they use their Android phone and click around, you see a movie of everything they've done.”

The pcTattletale website cautioned users against deploying the app for unlawful purposes, but also included a great deal of language promoting its potential for illegally spying on cheating partners, the affidavit says.

One section told customers the app “has been developed for over 15 years and has helped thousands of spouses, family’s [sic], and employers just like you,” according to the affidavit. 

Fleming pleaded guilty to one count of manufacturing, distributing, possessing and advertising wire, oral, or electronic communication intercepting devices. He will be sentenced on April 3.

The guilty plea was first reported by TechCrunch. 

Despite the fact that many purveyors of stalkerware are brazen about how they market their products, criminal prosecutions have been rare, with the most recent conviction of a stalkerware executive dating to 2014, said Eva Galperin, the director of cybersecurity at the Electronic Frontier Foundation.

The Federal Trade Commission has cracked down on stalkerware companies, but the dearth of criminal prosecutions has contributed to a thriving ecosystem for the products, she said.

“We can essentially name all of the companies that have experienced consequences off the top of our heads and number them using the fingers of one hand,” Galperin said. “One of the reasons why these companies operate out in the open seemingly with impunity is that they have been allowed to act with impunity.”

The investigation

Fleming began selling the stalkerware in at least 2017 and continued doing so until at least December 2022, according to court records

In November 2021, HSI agent Nick Jones posed as an affiliate marketer — someone who gets a commission for promoting a company’s products — and reached out to Fleming. 

Fleming sent Jones four banners to use for marketing pcTattletale in late 2021, according to the affidavit, telling him in an email that “there are a lot more women wanting to catch their man then the other way around.”

One of the banners Fleming gave Jones said “pcTattletale Cheating Husband? #1 catch a cheater spy app.” 

Days later, Jones posed as a customer trying to install pcTattletale on her boyfriend’s phone, the affidavit says, to which Fleming replied offering assistance.

In January 2022, Jones installed pcTattletale on a phone used for the investigation and was able to remotely monitor the device and see electronic communications, browsing activity and location data. He paid $99.99 for a subscription that allowed him to spy on three devices, the affidavit says.

A promotional video sent by the company to Jones said the pcTattletale software application is “completely undetectable by the user of the phone, and that the application will allow someone to covertly see everything that is happening on the target cell phone, to include text messages,” the affidavit says.

Authorities also received a warrant that allowed them to search Fleming’s emails in July 2022 and found several from customers seeking help spying on romantic partners. 

One customer emailed Fleming in May 2019 to say they worried pcTattletale would show up on their boyfriend’s credit card receipt. Fleming responded, saying the customer could choose for the purchase to show up as a “generic computer scan” without the pcTattletale name. 

The business was shut down in 2024 after a data breach in May of that year exposed more than 138,000 customers, TechCrunch reported at the time. A lawyer for Fleming did not respond to a request for comment.

According to the breach notification site Have I Been Pwned, a hacker defaced the pcTattletale website and posted gigabytes of data to its homepage.

Exposed data reportedly included membership records, infected PC names, captured messages and IP addresses and device information logs.

Fleming’s guilty plea is significant, EFF’s Galperin said, and will likely have a chilling effect on stalkerware operators working in the U.S. Many operators are based outside of the U.S., however, and are out of reach of American authorities.

The stalkerware space does appear to be shrinking, she said, citing a report she worked on with  the cybersecurity testing lab AV-Comparatives, which found 17 stalkerware products available in the marketplace last year, down from 20 found in 2021.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.


文章来源: https://therecord.media/stalkerware-guilty-plea-fleming
如有侵权请联系:admin#unsafe.sh