Federal Trade Commission

FTC Bans Company From Selling ‘Stalkerware’ Monitoring Apps

Retina-X’s apps posed several security risks to users thanks to lax data protections and loopholes that allowed mobile devices to be monitored without the user’s knowledge.

In an unprecedented step, the Federal Trade Commission has barred a company and its owner from selling “stalking” apps that allow people to monitor mobile devices unless significant steps are taken to ensure the apps are being used for “legitimate purposes.”

Retina-X Studios, LLC and its owner, James N. Johns, were charged with developing three mobile apps that allowed buyers to monitor the mobile devices on which they were installed. This monitoring could take place without the permission or knowledge of the device’s user, according to a release from the FTC.

One app, MobileSpy, was promoted as a way to monitor employees and children. Two other apps created by Retina-X, PhoneSheriff and TeenShield, were marketed as tools to monitor children’s phone use. More than 15,000 subscriptions were purchased before the company stopped selling the apps in 2018.

Perhaps most concerning was the company’s instructions to users about how to bypass mobile device manufacturer restrictions and how to remove an app icon from appearing on a device screen. These moves exposed the devices to security vulnerabilities and prevented a user from knowing the app was installed on their device, according to the FTC complaint.

“This is our first action against a so-called ‘stalking app,’” Andrew Smith, the director of the FTC’s Bureau of Consumer Protection, said in a statement. “Although there may be legitimate reasons to track a phone, these apps were designed to run surreptitiously in the background and are uniquely suited to illegal and dangerous uses. Under these circumstances, we will seek to hold app developers accountable for designing and marketing a dangerous product.”

In addition, the FTC found that Retina-X failed to “adequately secure” sensitive information collected from the devices and outsourced most of its maintenance and development to third parties. A hacker was able to gain access to sensitive information at least twice between 2017 and 2018. Allegations against the company included a lack of information security policies and regular security testing on its apps as well as inadequate oversight of its service providers.

Under the FTC’s proposed settlement of the case, Johns and Retina-X must agree to delete the data it collected from the apps. Most notably, the settlement prohibits the company from promoting, selling or distributing any monitoring app that requires users to go around a device’s security protections to install it.

Users must also go through a process to determine if they are using the app for “legitimate purposes,” as dictated by the FTC.

“Retina-X and Johns must require purchasers to state that they will only use the app to monitor a child or an employee, or another adult who has provided written consent,” the FTC said. “In addition, they must include an icon with the name of the app on the mobile device, which is only removable by a parent or legal guardian who has installed the app on their minor child’s phone.”

Retina-X is also required to develop a comprehensive information security program to ensure data security. Johns and his company will be subject to required third-party assessments of the program every two years, according to the FTC.

While cybersecurity activist group Fight for the Future applauded the commission’s actions against so-called “stalkerware,” Eva Galperin, the group’s cybersecurity director, told VICE Motherboard that she will be watching closely to see if Retina-X can ensure apps are being used for “legitimate purposes.”

“Depending on the ways in which these apps are used and the jurisdictions involved, using these apps to monitor children or employees is not necessarily legal either,” Galperin said.

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3