.png)
Global Intelligence Weekly Wrap up
Welcome to the Global Intelligence Knowledge Network Podcast, where real-world intelligence expertise meets insightful analysis. Join your host, Neil Bisson, a former Intelligence Officer with the Canadian Security Intelligence Service, for a weekly deep dive into the world of espionage, national security, foreign interference, terrorism, and all matters spy and intelligence related.
With over 25 years of experience in intelligence and law enforcement, both domestically and internationally, Neil Bisson brings a unique perspective to the table. From hunting spies and terrorists to recruiting and managing human sources, he's seen it all.
Each episode, Neil Bisson, Director of Global Intelligence Knowledge Network as he provides a comprehensive summary of the most intriguing international intelligence stories, dissecting the hottest media topics with professional analysis and insider knowledge. Whether you're a seasoned intelligence professional or simply fascinated by the world of spies, this podcast is your go-to source for accurate, insightful, and engaging content.
Tune in weekly to stay informed, enlightened, and entertained. Don't miss out on the latest from the frontlines of global intelligence. Subscribe now to the Global Intelligence Knowledge Network Podcast on Buzzsprout and never miss an episode. Stay sharp, stay informed, and stay ahead of the curve with the Global Intelligence Knowledge Network Podcast.
Global Intelligence Weekly Wrap up
OPP Using Phone Spyware. Tesla Terrorists?
đ Global Intelligence Weekly Wrap-Up | March 21, 2025 đđŁ
Espionage, sabotage, and surveillance... oh my. In this weekâs Global Intelligence Weekly Wrap-Up, Neil Bissonâretired CSIS intelligence officer and Director of the Global Intelligence Knowledge Networkâdives deep into the most pressing national security and intelligence headlines you need to know. With over 25 years of intel and law enforcement experience, Neil delivers top secret-level insights with expert analysis you wonât get from mainstream media.
đ¨ This week:
- China sentences a former engineer to death for espionageâwhat drove him to betray his country?
- Silicon Valley turns into a spy thriller as Rippling sues Deel for alleged corporate espionage.
- The Netherlands cracks down on digital and diaspora espionageâa game changer for foreign influence.
- Japan vs. Belarus: Was a Japanese manâs espionage conviction politically motivated?
- Europol reveals Russiaâs use of criminal gangs for sabotageâhybrid warfare just got an upgrade.
- Canada lays terrorism charges in a disturbing antisemitic case in Winnipeg.
- Tesla dealerships under attack in the U.S.âis this a new wave of domestic extremism?
- Ontario police using Israeli spywareâis our privacy at risk?
đĽ Buckle upâintelligence isnât just spy games anymore. Itâs about protecting your life, your job, and your country.
đľď¸ââď¸ Support the show through BuyMeACoffee or Buzzsprout! Links below.
https://www.patreon.com/c/NeilBisson
đŻ Chapters:
00:00 Intro
01:30 Death sentence in China for espionage
08:00 Silicon Valley corporate spying scandal: Rippling vs. Deel
13:45 Netherlands' bold law against foreign interference
17:10 Japanese national sentenced in Belarus for espionage
19:30 Europol uncovers Russian hybrid sabotage
21:40 Terrorism charges in Winnipeg antisemitic case
23:10 Tesla attacks: domestic extremism in the U.S.?
24:45 Ontario police and Israeli spyware
25:30 Outro
2025 03 21 Global Intelligence Weekly Wrap Up
INTRO:
Welcome to Global Intelligence Weekly Wrap-Up, where we break down the most pressing intelligence and national security stories shaping our world.
With over 25 years of experience in intelligence and law enforcement, Neil BissonâDirector of the Global Intelligence Knowledge Network and a retired Intelligence Officer with the Canadian Security Intelligence Serviceâdelivers expert analysis beyond the headlines.
This week, we begin in China, where a former research engineer has been sentenced to death for selling state secrets in a case driven by revenge and desperation.
What does this reveal about the psychology of espionage?
Then, Silicon Valley faces a real-life spy scandal as two tech giants battle over allegations of corporate espionage straight out of an intelligence playbook.
The Netherlands takes a bold legal step to counter foreign influence, passing a law targeting both digital and diaspora espionage.
In Belarus, a Japanese national is sentenced for espionageâwas it legitimate or politically motivated?
Europol uncovers how Russia is using criminal gangs to sabotage Europe from within, while Canada lays terrorism charges in a disturbing antisemitic case.
Tesla dealerships become targets in a wave of politically charged attacks across the U.S.âis this the rise of a new kind of domestic extremism?
And finally, Ontario police forces are reportedly using Israeli spywareâraising urgent questions about surveillance, privacy, and the future of cyber law enforcement.
Stay tuned as Neil unpacks these critical developments.
Now, letâs get started.
MUSIC
Hello everyone and welcome back to the Global Intelligence Weekly Wrap-Up.
Iâm Neil Bisson, a retired Intelligence Officer with the Canadian Security Intelligence Service and the Director of the Global Intelligence Knowledge Network.
The world of intelligence keeps spinning and itâs not just governments and nations that need to pay attention.
Private companies are being pulled into the shadowing side of espionage and domestic extremism as weâll see in this weekâs episode.
Letâs get started.
For our first story, weâre starting with a high-profile espionage case out of China.
A former Chinese research engineer, identified only as Liu, has been sentenced to death for selling classified material to foreign intelligence agencies.
According to Chinaâs Ministry of State Security, Liuâs motivations included revenge, debt, and desperationâall of which drove him to leak state secrets across multiple countries.
Letâs unpack the key elements of this case.
Liu reportedly felt wronged by his former employer.
In response, he deliberately saved a large cache of classified materials before resigning, intending to use it for revenge and blackmail.
After a string of failed investments left him in financial ruin, Liu reached out to an undisclosed foreign spy agency and sold the material at a -quote- "very low price."
But after they cut ties with him, he continued leaking secrets in multiple countries over a six-month period.
In the intelligence business this is known as an intelligence peddler. Someone who is looking to sell the same secrets to multiple agencies to maximize their return.
From an intelligence perspective, this case is significant for several reasons:
⢠It highlights the human vulnerabilitiesâpride, resentment, greedâthat foreign intelligence agencies often exploit.
⢠It shows that money is both an enticement and a detriment, as Liu was in debt and acted foolishly to try and peddle his information to anyone who would pay for it.
⢠It also underscores the threat posed by insiders with authorized access to sensitive material, especially when motivated by personal grievances or financial stress.
⢠And finally, itâs a yet another reminder of how economic instability and emotional factors can intersect, creating a perfect storm for espionage recruitment.
This isnât an isolated incident.
China has increasingly warned that its citizens are being targeted by foreign entities looking to co-opt them as spies.
Just last November, another Chinese government worker was sentenced to death after foreign spies allegedly seized classified data from his USB drive and turned him into a -quote-âpuppet.â
And in February of last year, Australian writer Yang Hengjun received a suspended death sentence on espionage charges, a move that continues to draw international attention.
Globally, weâre also seeing a rise in espionage arrests involving Chinese nationals, as governments become more attuned to foreign interference and infiltration risks.
This story is also being used by the Chinese Government to send severe warning to its citizens.
As many western countries are pushing back against Chinaâs foreign interference and identifying their spy networks, the Chinese Communist Party is trying to ensure that Chinese citizens donât look to offer government and technological secrets.
While Chinese state media provided their narrative, itâs clear that Liuâs case taps into a core issue in intelligence collection: What drives someone to betray their country?
As someone who spent years recruiting and managing human sources, I can tell you:
⢠Motivation is everything.
⢠Itâs not always about ideologyâoften, itâs about money, ego, or revenge.
⢠Intelligence agencies know thisâand theyâre adept at identifying and exploiting these triggers.
Understanding these psychological factors is essential in detecting, deterring, and countering insider threats.
I am currently teaching an online course at the University of Ottawa in the National Security Program that touches on this very topic: The Psychology Behind Human Sources in Intelligence Collection.
Iâll leave a link in the show notes for anyone interested in taking the course.
Liuâs case is a classic example of how personal grievances and financial desperation can drive individuals to espionage.
It also illustrates the methods foreign intelligence services useâoften buying sensitive information from sources who feel trapped or wronged.
As the Chinese government continues to fear citizens providing information to western governments, we can expect more of these cases to emerge.
MUSIC
For our next story, weâre shifting focus from the world of government espionage to that of corporate espionage.
A major lawsuit has rocked Silicon Valley: HR software giant Rippling has accused its competitor, Deel, of orchestrating corporate espionage through a planted spy.
The case, now in federal court, is drawing comparisons to state-sponsored intelligence operations, and it raises serious questions about tradecraft in the corporate world.
The heart of Ripplingâs case alleges that Deel cultivated an insider â a so-called âDeel spyâ â who systematically stole trade secrets.
This individual allegedly accessed internal Slack channels, customer data, sales strategies, and even Ripplingâs own playbook for competing against Deel.
Then, he passed this data to Deel executives and a journalist, all while actively employed by Rippling.
Rippling claims this was a calculated move by Deel, violating U.S. racketeering laws and trade-secret protections.
The accusations go further: when confronted, the spy reportedly locked himself in a bathroom to delete evidence from his phone, ignoring a court order and warnings from an independent solicitor.
From an intelligence perspective, the tactics here are classic insider threat indicators â unauthorized access to sensitive data, clandestine meetings, and attempted destruction of evidence under legal pressure.
Itâs a potent reminder that espionage isnât confined to the corridors of national security â it thrives in high-stakes corporate environments too.
To the point that a lot of corporate espionage goes unreported as fears of declining stock prices and lost intellectual property are not issues that most companies want to discuss with the board of directors or shareholders.
Corporate espionage has long been a quiet, shadowy threat to tech firms, especially in sectors where innovation and intellectual property are at a premium.
While Rippling and Deel are private entities, the techniques alleged, mirror those used by state actors: insider recruitment, exfiltration of data, and obfuscation of the spyâs true loyalties.
In a wider context, this comes amid increasing global attention on IP theft, particularly from Chinese firms and proxies â though in this case, the battle is between two Western startups.
This lawsuit could set a new legal precedent for how aggressive companies can get in their pursuit of competitive intelligence, and how the courts interpret âcorporate spyingâ under Racketeer Influenced and Corrupt Organizations or RICO laws â typically reserved for organized crime.
Rippling CEO Parker Conrad said on X: âWe are taking this extraordinary step to send a clear message that this type of misconduct has no place in our industry.â
While Deel has denied any wrongdoing, the fallout could damage reputations on both sides.
From my professional viewpoint: insider threats remain one of the most underappreciated dangers â whether itâs national security or corporate intelligence.
Vetting, monitoring, and safeguarding data access are essential.
This case may also encourage companies to invest in counterintelligence measures previously seen only in government operations.
Rippling vs. Deel is more than a tech spat â itâs a real-world example of modern espionage tactics applied to corporate competition.
The implications?
A likely surge in internal security reviews, legal action, and perhaps regulation aimed at curbing corporate spying.
As always, the line between business intelligence and outright espionage remains thin â and this case could redraw it.
What comes next?
Potential criminal charges, reputational fallout, and a close watch by competitors who now know that spies might be lurking in their Slack channels as well.
MUSIC
We head to the Netherlands for our next story, where we're delving into a significant development.
On March 18, 2025, the Dutch parliament approved a law criminalizing both digital and diaspora espionage, aiming to counter foreign powers attempting to influence communities within the country.
This newly enacted legislation expands upon existing laws by criminalizing actions such as leaking information or collaborating with foreign governments in ways that harm Dutch interests.
Offenders can face up to eight years in prison, with severe casesâsuch as espionage leading to deathâcarrying sentences of up to 12 years.
Justice Minister David van Weel emphasized the necessity of this law, stating that espionage is a frequent reality, and the nation must bolster its resilience against foreign attacks and threats.
The impetus for this legislation stems from growing concerns over foreign interference.
In 2024, Dutch intelligence services identified that at least eight foreign states were monitoring and intimidating diaspora communities within the Netherlands.
These activities often pressured individuals to show loyalty to their countries of origin, engage in espionage, or monitor fellow community members.
Additionally, the Dutch intelligence service previously warned that Chinese cyber espionage was more extensive than initially thought, targeting Western governments and defense companies.
Experts in international law have noted that while it's established that international law applies in cyberspace, the specifics of how existing laws are interpreted and applied remain complex.
This new Dutch legislation seeks to clarify and strengthen the country's stance against both digital and diaspora espionage.
The Netherlands' proactive approach in criminalizing digital and diaspora espionage underscores the evolving nature of global intelligence threats.
As nations grapple with both cyber threats and foreign influence operations, such legislative measures are pivotal in safeguarding national interests.
Any countries focus on Foreign Interference provides an opportunity for Canadian Intelligence to work with them to try and identify threats that may also be placed against diaspora communities in Canada.
Hopefully the Canadian Intelligence Community is looking to find inroads with Danish Intelligence to collaborate on these issues.
MUSIC
Our next story focuses on a headline grabbing case out of Belarus.
The story, entitled âBelarus sentences Japanese man to 7 years in jail for espionage,â covers the conviction and sentencing of a Japanese national accused of spying for Japanâs intelligence services (an intelligence organization that rarely gets attention in the media).
Letâs take a closer look at the facts and what this case reveals about the useâand potential misuseâof espionage charges in authoritarian states.
Masatoshi Nakanishi, a Japanese national residing in Belarus since 2018, was sentenced to seven years in prison after being convicted of espionage.
The Belarusian authorities alleged that over a six-year period, he took thousands of photos of military and civilian facilities near the Belarus-Ukraine border, which were then sent to Japanese intelligence services.
The trial, held behind closed doors in Minsk, resulted in Nakanishiâs conviction for cooperating with a foreign intelligence agency in a manner harmful to Belarusian national security.
He was also fined âŹ6,130.
From an intelligence standpoint, this case brings into focus the high-risk nature of intelligence collection in hostile environmentsâespecially in authoritarian regimes like Belarus.
It also shows how such regimes may weaponize espionage laws to suppress dissent or control foreign nationals.
Belarus has a long history of suppressing political opposition and using its legal system as a tool for regime control.
President Alexander Lukashenko has ruled Belarus for over 30 years, leaning heavily on Russian support and allowing Russia to use Belarus as a launch point for military operations in Ukraine.
Since the war in Ukraine began, Belarus has also allowed Russia to deploy tactical nuclear weapons on its soil, deepening its isolation from the West.
Japan has imposed sanctions on Belarus and Russia over their roles in the conflict, which may further strain relations and complicate the diplomatic status of detained Japanese citizens like Nakanishi.
No direct expert quotes were provided in the article, but the Viasna Human Rights Centre, a Belarusian NGO, declared Nakanishi a political prisonerâhighlighting concerns that the charges were politically motivated.
An exiled opposition leader (Sviatlana Tsikhanouskaya) also condemned the sentence, stating that Nakanishi was being dehumanized by regime propaganda.
My take on this, is that, in intelligence operations, especially human intelligence (HUMINT) collection, operatives and assets often operate in grey zones, where activities can be reinterpreted as espionage depending on the local regime's tolerance or strategic interests.
This case exemplifies how foreign nationals engaged in benign activitiesâeven something as innocuous as photographyâcan be accused of espionage in regimes seeking leverage or retribution on the international stage.
Masatoshi Nakanishiâs conviction is not just about espionageâitâs about geopolitical tension, diplomatic maneuvering, and authoritarian control.
As relations between Japan and Belarus worsen, this case may set a precedent for future detentions and politicized trials involving foreign nationals.
Looking forward, expect similar high-profile espionage accusations as tensions rise between authoritarian regimes and Western powers.
Cases like this underscore the growing complexity and risk in international intelligence operations.
MUSIC
For our next story, weâre examining a significant report from Europol that sheds light on how Russia and other state actors are leveraging criminal networks to increase sabotage and destabilization efforts across Europe.
The article highlights a rise in politically motivated cyber-attacks, sabotage of critical infrastructure, and other destabilizing activities.
It explores how criminal proxies are becoming key players in this hybrid threat environment.
The Europol report reveals a disturbing trend in which hybrid threat actors, particularly from Russia, are utilizing organized crime groups across Europe to carry out a variety of malicious activities.
These include cyber-attacks, sabotage, arson, data theft, and even migrant smuggling.
The aim is to undermine the stability of EU member states, destabilize democratic institutions, and disrupt public services.
From an intelligence perspective, this is a clear example of how non-state actors, in collaboration with state actors, are becoming more involved in covert warfare.
By relying on criminal gangs, Russia can deny direct involvement while still achieving strategic objectives.
The impact of such operations is multifaceted: it erodes public trust in institutions, weakens the rule of law, and targets critical infrastructure, all while obscuring the origins of the attacks.
Whatâs concerning is the growing sophistication of these hybrid threats.
These arenât just isolated incidents.
They're part of a broader, ongoing strategy that involves subtle, cumulative disruptions.
Like insect pests attacking a forest.
These attacks might appear to be random at first, but when viewed collectively, they reveal a strategic effort to destabilize European society and governance.
This strategy of using criminal proxies isn't new, but itâs evolving.
Historically, we've seen state actors rely on proxy forcesâwhether militias, mercenaries, or intelligence agentsâto carry out operations with plausible deniability.
Whatâs different now is the integration of cyber-capabilities and the expanding role of organized crime.
This marks a shift towards hybrid warfare, where state actors can leverage criminal networks to achieve political and military objectives without direct military engagement.
Looking at recent examples, Russia has long been suspected of involvement in cyber-attacks against critical infrastructure.
However, the collaboration with organized crime groups for operations like migrant smuggling or arson attacks is a new and troubling development.
Itâs a reminder that the lines between conventional warfare, cyber warfare, and criminal activity are becoming increasingly blurred.
Europolâs Magnus Brunner highlighted the novelty of criminal networks working on behalf of foreign powers, pointing out that threats can now enter the EU in mere secondsâwhether it's a cyber-attack or a migrant bus sent by state actors.
Similarly, another Europol representative, from Poland, warned that the Russian invasion of Ukraine could have a lasting impact on European security, particularly in terms of black-market weapons and ammunition.
From the standpoint of a former intelligence professional, this evolving tactic underscores a new dimension of hybrid warfare.
What makes these threats so potent is the integration of various actorsâfrom state intelligence agencies to criminal networksâworking in concert to destabilize a region.
The use of criminal proxies allows Russia to conduct operations while avoiding direct attribution, making countermeasures more difficult.
MUSIC
We travel back to Canada for our next story, where weâre focusing on a troubling case out of Winnipeg.
19-year-old, Nevin Thunder Young, is facing terrorism-related charges following a series of antisemitic graffiti attacks.
The charges include facilitating and participating in terrorist activities, tied to suspected links with neo-Nazi ideology.
According to RCMP, Young was originally arrested in January for spray-painting swastikas and other antisemitic symbols in the Charleswood neighbourhood.
That alone is concerningâbut now, federal law enforcement has laid terrorism charges, which suggests a deeper involvement with a terrorist group or ideology.
From an intelligence perspective, this is significant.
While we often associate terrorism with large-scale attacks or international plots, domestic extremism, particularly of the far-right variety, is a growing threat in Canada and beyond.
The application of terrorism charges here indicates that Youngâs actions werenât viewed as isolated vandalismâthey were seen as part of a broader, ideologically motivated campaign of intimidation and hate.
The RCMP's decision to pursue terrorism charges shows a shift in how Canadian authorities are treating domestic extremist threats.
Itâs worth noting that the initials "M.K.Y." were spray-painted alongside swastikas.
According to the Canadian Anti-Hate Network, those letters are associated with a transnational neo-Nazi groupâa sign that Young may have been aligning himself with, or even receiving direction from, an organized extremist entity.
In recent years, weâve seen similar patterns in both Canada and the U.S., where young people are radicalized online and begin acting out in ways that escalate from hate speech to criminal actionsâand sometimes terrorism.
Local community leaders arenât taking this lightly.
Avrom Charach, a Jewish Winnipegger, took the initiative to clean up some of the graffiti himself and stressed that neo-Nazis pose a threat not just to the Jewish community, but to society at large.
Gustavo Zentner from the Centre for Israel and Jewish Affairs echoed that concern, calling for law enforcement to use every tool available to combat what he described as an unprecedented rise in antisemitism.
From my own professional standpoint, this case illustrates how acts of hate can quickly become national security issues, especially when links to extremist networksâeven small or loosely organized onesâare discovered.
This case in Winnipeg serves as a reminder of the evolving face of terrorism.
Itâs not always foreign actors or large-scale plotsâsometimes itâs young individuals influenced by extremist ideology close to home.
Law enforcementâs move to apply terrorism charges sets a strong precedent and reflects a serious approach to combating domestic extremism.
MUSIC
For this next story, weâre taking a close look at a concerning series of attacks on Tesla dealerships and infrastructure across the U.S.
According to ABC News, U.S. Attorney General Pam Bondi is calling these events ânothing short of domestic terrorismâ as federal and local agencies investigate a growing trend of arson, vandalism, and gunfire targeting Tesla facilities.
The most recent attack took place in Las Vegas, where five Tesla vehicles were set ablaze, and shots were fired at others parked nearby.
The suspect, dressed in black, allegedly used Molotov cocktails and a firearm in the assault.
The word âRESISTâ was spray-painted across the facilityâs doors, signaling a political or ideological motive.
The FBIâs Joint Terrorism Task Force is now assisting in the investigation, and officials suspect this was a targeted and isolated attack.
This follows a similar incident in Kansas City, Missouri, where two Tesla Cybertrucks were destroyed in a suspected arson attack.
Police are investigating, and while no arrests have been made, federal authorities are closely involved.
In total, Tesla has experienced a wave of vandalism, arson, and even gunfire at its facilities in multiple states, including Oregon, Massachusetts, and South Carolina.
Whatâs driving this surge in violence?
Much of the backlash appears linked to Elon Muskâs recent appointment as the head of the Department of Government Efficiency (or DOGE), a new White House initiative.
Since then, Tesla has become a political flashpoint, with protests, graffiti attacks, and now arson targeting the company.
In South Carolina, a man was arrested after attacking a Tesla charging station with Molotov cocktails while shouting anti-Trump messages and support for Ukraine.
Heâs since been charged with arson of property in interstate commerce.
This pattern of politically charged violence raises significant concerns for law enforcement and intelligence agencies alike, as it reflects how corporate targets can become focal points in broader ideological or political conflicts â especially when high-profile figures like Musk are involved.
Attorney General Pam Bondi emphasized the gravity of these crimes, stating the Justice Department is pursuing five-year mandatory minimum sentences for perpetrators, including those who may be funding or coordinating the attacks behind the scenes.
White House Press Secretary Karoline Leavitt pointed to a possible political motive, arguing that Tesla became a target after Musk voiced support for Donald Trump, and she urged Democrats to condemn the violence.
Musk himself commented, saying:
âIâve never physically hurt anyone, so why the hate and violence against me? Because I am a deadly threat to the woke mind parasite and the humans it controls.â
From an intelligence perspective, this is classic domestic extremism, blending anti-government sentiments, political polarization, and violent direct action.
Regardless of Musk and his policies the destruction of private property and potential violence against innocent people who own this type of vehicle is not the way to protest the brand or the man.
The fact that Molotov cocktails and firearms are being used shows a tactical escalation, which could embolden copycats or inspire further acts of sabotage.
These attacks on Tesla are not just vandalism â theyâre being treated as domestic terrorism, with potential ramifications for public safety, corporate security, and political discourse in the U.S.
Moving forward, we can expect increased security at corporate facilities, heightened attention from federal agencies, and possibly new policies to counter the surge in ideologically motivated violence.
MUSIC
For our last story, weâre back in Canada for a revealing report from the Guardian detailing a growing ecosystem of military-grade spyware use within Ontarioâs police forces.
Based on findings from Citizen Lab at the University of Toronto, the report raises serious questions about Canadian law enforcement's reliance on tools developed by Israel-based Paragon Solutionsâand whether current laws are keeping up with the power and potential for misuse of such surveillance technologies.
At the heart of the article is the uncovering of potential links between Ontarioâs provincial policeâthe OPPâand Paragon Solutions, a spyware firm known for its product Graphite, capable of covertly infiltrating and extracting data from mobile phones.
This revelation comes amid ongoing concerns about how Canadian authorities deploy cyberweapons, especially in the absence of updated privacy laws.
While the OPP didnât deny using such tools, it emphasized that all surveillance is judicially authorized under Canadian law and the Charter of Rights and Freedoms.
Still, the Citizen Lab report points to a growing use of spyware among police forces, with mentions of both the Toronto Police Service and York Regional Police âconsideringâ or actively using spyware toolsâreferred to here as On-Device Investigative Tools or ODITs.
From an intelligence perspective, this highlights a significant shift: cyber tools once reserved for national-level security threats are now part of standard law enforcement investigations.
These tools are being used in response to the changing technologies used by terrorist groups, criminal organizations and hostile intelligence agencies on a regular basis.
Wiretapping and bug implanting have been replaced with cyber tools like zero click spyware because people communicate using these devices.
The same laws and responsibilities surrounding the implantation of bugs and wiretaps are still being adhered to.
The bigger concern is the use of these techniques by nefarious actors against Canadians.
Mercenary technology is used by whoever is willing to pay for it, and criminal organizations and adversarial governments have money to put towards spyware.
Letâs step back and look at this from the perspective of civil rights advocates.
The RCMP admitted in 2022 that it used spyware in serious investigationsâmarking the first time a Canadian law enforcement agency publicly acknowledged such practices.
Since then, thereâs been little movement on legislative reforms, despite a parliamentary committee recommending updates to privacy laws.
Compare this to global trends: Israelâs NSO Group, makers of the notorious Pegasus spyware, came under heavy scrutiny for similar tools being used against journalists and activists.
Now, Paragonâalso Israeli in origin but now U.S.-ownedâis facing comparable controversy.
In Italy, for instance, Paragon suspended its contract after its spyware was used against an Italian journalist and pro-immigrant activists.
Canada appears to be following a global pattern where high-end surveillance tech designed for counterterrorism or counterespionage is being adapted for broader law enforcement use.
The question is: Has there been enough adequate public debate or legal safeguards implemented for its use?
Kate Robertson of Citizen Lab summed it up this way:
there is a âwidening gap in public awarenessâ of how extensively spyware is being used in Canada.
She emphasized the need for law reform to address both security risks and potential human rights violations.
My professional take?
The deployment of spyware like Graphiteâcapable of bypassing encryption and accessing highly personal dataâ are essential tools in combatting serious crime and terrorism.
However, the risk of mission creep is real.
As these tools become more readily used by law enforcement, transparency, oversight, and legal controls, need to be considered to prevent privacy violations or abuse.
Ontarioâs possible use of Israeli spyware underscores a growing reliance on military-grade surveillance tools at the provincial level.
As law enforcement capabilities evolve in order to keep pace with technology and the methodologies used by criminal organizations, so too must our legal frameworks and public accountability mechanisms.
Looking ahead, expect this debate to gain more tractionâespecially as watchdog groups like Citizen Lab continue to expose the scope of spyware use.
Whether this leads to legislative change remains to be seen, but one thing is clear: the use of this type of technology will not be going away anytime soon.
Well, another week, another wrap up.
Thank you for taking the time to become aware of the issues that affect your well-being, your career and your country.
Have a great week everyone and as always, stay curious, stay informed and stay safe.
MUSIC
Thatâs a wrap for this weekâs Global Intelligence Weekly Wrap-Up.
From espionage-fueled death sentences in China to corporate spying scandals in Silicon Valley, and from Europeâs crackdown on foreign interference to Canadaâs growing use of military-grade spywareâthis weekâs stories highlight the shifting battleground of intelligence, security, and covert operations.
Delivering this level of expert insight takes time, dedication, and a deep understanding of the intelligence worldâand we appreciate your support.
If you found value in todayâs episode, help spread the word by liking, sharing, or leaving a review.
Your engagement helps bring these crucial conversations to a broader audience.
And if you'd like to support the show and fuel future episodes, you can do so through BuyMeACoffee or Buzzsproutâwhether it's a one-time contribution or ongoing support, it truly makes a difference. You'll find the links in the show notes.
Thanks for tuning in.
And as Neil always says: stay curious, stay informed, and stay safe.
See you next week.
OUTRO:
LINKS:
Story 1: Ex-researcher sentenced to death for spying, China says
Link: https://www.bbc.com/news/articles/c17q24270lzo
Story 2: Software startup Rippling sues competitor Deel, claiming a spy carried out âcorporate espionageâ
Link: https://www.cnbc.com/2025/03/17/startup-rippling-sues-competitor-deel-claiming-a-spy-stole-sales-data.html
Story 3: Netherlands passes law targeting digital and diaspora espionage
Link: https://www.reuters.com/world/europe/netherlands-passes-law-targeting-digital-diaspora-espionage-2025-03-18/
Story 4: Belarus sentences Japanese man to 7 years in jail for espionage
Link: https://www.reuters.com/world/europe/belarus-sentences-japanese-man-7-years-jail-espionage-2025-03-18
Story 5: Russia using criminal networks to drive increase in sabotage acts, says Europol
Link: https://www.theguardian.com/technology/2025/mar/18/russia-criminal-networks-drive-increase-sabotage-europol
Story 6: Winnipeg man faces terrorism-related charges: Manitoba RCMP
Link: https://www.cbc.ca/news/canada/manitoba/winnipeg-man-terrorism-charges-1.7176543
Story 7: Attorney general calls Tesla arson attacks 'nothing short of domestic terrorism'
Link: https://abcnews.go.com/US/tesla-vehicles-vandalized-us-musk-began-white-house/story?id=119910817
Story 8: Ontarioâs police force using âgrowing ecosystemâ of Israeli spyware Link: https://www.theguardian.com/world/article/ontario-police-israeli-spyware-report