The FBI Has Lost Track Of Its Hacking Tools

The US Federal Bureau of Investigation (FBI) has disclosed  that it can’t find records related to its purchase of a series of hacking tools. This is a highly embarrassing admission, since  the FBI has been spending heavily to acquire effective hacking tools and is despite  these purchases being included in a public US government procurement database.   

The news highlights the secrecy the FBI maintains around its use of hacking tools, with very little  information available about what the tools are, or what they are used for. Indeed, the original purchase records, running to several hundred thousand of dollars, have since been removed from the Internet.

The FBI has previously used classified technology in criminal investigations, pushed back against demands to provide details of hacking operations to defendants and purchased technology from surveillance vendors. This included an FOI request  for records related to the FBI’s purchase of multiple hacking tools costing around $250,000 from a child-protection charity, which was originally listed on a publicly accessible database. 

Several recent operations undertaken by the FBI have demonstrated the agency’s increasingly powerful cyber capabilities, however, if the FBI has spent hundreds of thousands of dollars on hacking technology, it might reasonably be expected to have kept records about that purchase, even if details are not made public. 

404Media   |  Gizmodo  |  REMM5   |   SlashDot   |   @slashdot  |   Privacy Guides 

Image: Ideogram 

You Might Also Read: 

Phishing Scheme That Generated $11M Taken Down:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« Hackers Claim They Are Selling FortiGate Firewall Access
Google's Online Advertising Technology Ruled Illegal »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Fenror7

Fenror7

Fenror7 lowers the TTD (Time To Detection) of hackers, malwares and APTs in enterprises and organizations from 300 days on average to 24 hrs or less.

Panaseer

Panaseer

Panaseer is an enterprise cybersecurity automation and data analytics company that helps organizations stop preventable breaches by ensuring security controls are working effectively.

Lutech

Lutech

Lutech is an Italian ICT engineering and services company. Business solution areas include cyber security.

CamCERT

CamCERT

CamCERT is the national Computer Emergency Response Team for Cambodia.

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC) is a government body providing support for ICT related activities including formulating national ICT strategy and policy.

Wipro

Wipro

Wipro Limited is a leading global information technology, consulting and business process services company.

Cybersecurity Defense Initiative (CDI) - University of Arkansas

Cybersecurity Defense Initiative (CDI) - University of Arkansas

The Cybersecurity Defense Initiative is a national cybersecurity training program, developed for technical personnel and managers who monitor and protect our nation's critical cyber infrastructures.

Isovalent

Isovalent

Isovalent deliver the most advanced Kubernetes networking & security capabilities to the most demanding of enterprise users.

LogicalTrust

LogicalTrust

LogicalTrust security testing specialists find the weakest points in your company and show you how to fix them step-by-step, as well as how to improve your security.

Quside

Quside

Quside, a spin-off from The Institute of Photonic Sciences in Barcelona, designs and manufactures innovative quantum technologies for a wide range of applications including cyber security.

Occentus Network

Occentus Network

Occentus Network is a telecommunications service provider specialized in High Availability Servers & managed Cloud services.

CentriVault

CentriVault

CentriVault is a leading independent provider of Cyber Security and Data protection services to small and medium enterprises (SMEs).

Moonlock

Moonlock

Cybersecurity tech for humans. At Moonlock, we make software that seamlessly protects you and has your back as you live your life.

AccessIT Group

AccessIT Group

AccessIT Group is a specialized cybersecurity solutions provider offering a full range of advanced security services.

Validia

Validia

Validia is a deepfake cybersecurity service that provides proactive and reactive defense to the deepfake threat enterprises increasingly face with the rapid growth of generative AI.

Netcom Training

Netcom Training

Netcom Training are a dynamic and forward-thinking training provider, passionate about creating change within the IT, tech and digital industries.