FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News > Technology

FTC Keeps Stalkerware Founder Scott Zuckerman On Ice

Gregory Zuckerman
Last updated: December 9, 2025 12:08 am
By Gregory Zuckerman
Technology
6 Min Read
SHARE

The U.S. Federal Trade Commission has declined to end a lengthy ban preventing Scott Zuckerman, the brain behind Support King and the SpyFone and OneClickMonitor applications, from engaging in the surveillance software business. The Commission’s action leaves one of the rare, wide-ranging bans on the books and also signals how regulators think about consumer spyware as being inherently dangerous for privacy and safety.

What the FTC order says about surveillance app bans

Zuckerman is forbidden from disbursing, marketing, or advertising surveillance apps or services, according to the order. It also includes the deletion of data gathered through his previous operations and robust security measures, with continuing independent oversight from civil rights experts. Practically, it stops him from relaunching or rebranding equivalent software—even if he does so with new ventures or affiliates under his control.

Table of Contents
  • What the FTC order says about surveillance app bans
  • Why the petition to lift the FTC surveillance ban failed
  • The data breach that exposed thousands of SpyFone users
  • A message to the stalkerware industry from the FTC
  • What comes next for enforcement and consumer protection
The SpyFone logo, featuring a blue location pin icon with an eye in the center, and the word SpyFone in blue and green text, set against a professional flat design background with soft patterns and gradients.

The FTC’s remedy is more than a simple cease-and-desist. It is designed to cover what the agency has called, in previous filings, systemic security problems and misleading design choices in apps that are engineered to be hidden, collect intimate information, and thwart detection by device owners.

Why the petition to lift the FTC surveillance ban failed

Zuckerman requested that the Commission overturn or modify the order, claiming requirements were expensive and onerous for his current non-tech-related businesses. He failed to demonstrate that there has been a change in any material fact or law, the FTC found, a significant threshold under its rules for reopening orders. Put another way, the Commission found no need to relax limits meant to shield individuals whose devices and private lives were compromised.

The agency has long cautioned that security and privacy protections are not something to add on as a mere afterthought—particularly for companies that handle vast amounts of sensitive data. “In surveillance matters, the risk calculus weighs heavily in favor of the protection of targeted individuals,” a position that history tells us the Commission does not reduce without strict evidence that there has been a sea change.

The data breach that exposed thousands of SpyFone users

The ban has its origins in a stunning lapse: an open cloud storage bucket linked to SpyFone that left highly sensitive data exposed.

The cache had selfies, along with text and chat messages, audio recordings, contact lists, location histories, logins, and hashed passwords. Security researchers said 44,109 unique email addresses were in the exposed data, including as many as 2,208 customers who had either posted a request for tech support or were still using the stalkerware, and content from some 3,666 phones running stalkerware.

An illustration depicting a smartphone with a red location pin above it, surrounded by numerous eyes on a blue and black background, with red teardrop shapes emanating from the phone.

More than the raw numbers, the breach laid bare how consumer spyware compounds harm. When installed on the phone of a partner, these apps can quietly relay location data, communications, and even images in an intimate context to the buyer. Advocacy groups such as the National Network to End Domestic Violence and the Electronic Frontier Foundation have documented how tech-facilitated abuse allows abusers to stalk and control victims. Security firms across the board, including Kaspersky and Avast, report tens of thousands of affected devices worldwide annually, emphasizing that this is not a niche problem.

A message to the stalkerware industry from the FTC

Here, the FTC’s ruling comes as part of a larger pressure effort on stalkerware makers. The Commission has previously targeted other vendors as well, including cases that resulted in data being deleted and the imposition of long-term security monitoring. Criminal enforcement in related spyware cases is also on the table for the Department of Justice, which should make it clear to anyone attempting to profit off secretive surveillance marketed under the guise of interpersonal monitoring that this crosses the threshold of acceptable law and practice.

Private platforms have also upped the ante. Policies in the app stores of major mobile platforms specifically prohibit surreptitious monitoring apps, while detection tools from security companies increasingly identify stalkerware behaviors. The Coalition Against Stalkerware, a collective of civil society and cybersecurity companies, also shares indicators and support resources for victims in order to limit stalkerware’s reach.

What comes next for enforcement and consumer protection

The FTC preserved one of its most aggressive remedies against consumer spyware by rejecting Zuckerman’s bid. The ban and audits from the order are still in place, and any violations could bring further discipline. For wannabe copycats, the lesson is stark: rebranding and pivoting won’t circumvent orders tailored to block secret spying.

For consumers and advocates, the decision serves as a reminder that those who reaped profits from invasive tools can, in fact, be held accountable for harm—including not just the corporate entities behind them but also individuals.

And for the surveillance industry, it underscores an uncomfortable truth: software designed to conceal, monitor, and siphon up personal communications without a user’s explicit informed consent undercuts itself by operating in the dark, inviting regulatory scrutiny, legal risk, or permanent bans.

Gregory Zuckerman
ByGregory Zuckerman
Gregory Zuckerman is a veteran investigative journalist and financial writer with decades of experience covering global markets, investment strategies, and the business personalities shaping them. His writing blends deep reporting with narrative storytelling to uncover the hidden forces behind financial trends and innovations. Over the years, Gregory’s work has earned industry recognition for bringing clarity to complex financial topics, and he continues to focus on long-form journalism that explores hedge funds, private equity, and high-stakes investing.
Latest News
Samsung Battery Pack Leak Teases Qi2 For Galaxy S26
Viral Video Sees Tesla Optimus Robot Take a Spill
ChatGPT now lets you buy groceries directly in chat
Waymo Robotaxi Rides Jump to 450,000 a Week
Commerce Greenlights Nvidia H200 Exports to China
Petco breach exposed SSNs and driver license numbers
Apple and Google make it easier to switch from Android to iOS
Green Groups Call For Congress To Block AI Data Centers
YouTube Recap: What personality rarity reveals
Lucid Motors Ex-Chief Engineer Sues for Firing and Bias
Google Expands Doppl With Shoppable Discovery Feed
Pebble Teases Mystery Launch: Countdown Starts
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
  • Corrections Policy
  • Diversity & Inclusion Statement
  • Diversity in Our Team
  • Editorial Guidelines
  • Feedback & Editorial Contact Policy
FindArticles © 2025. All Rights Reserved.