The US Is Buying Phone Hacking Tools For Ghana’s Police

The State Department is purchasing some very specific phone hacking tools that it plans to turn over to the Ghanaian police force to assist the country’s investigations into international crime.

The department released a solicitation Dec. 7 for phone hacking tools and hardware that are interoperable with tools used by the department and other US agencies. Once purchased, the department will donate those tools through the US Embassy in Accra to the Ghana Police Service’s cyber investigative unit.

“This will allow the Bureau of International Narcotics and Law Enforcement to accomplish its foreign assistance mission in Ghana to build the capacity of law enforcement to combat transnational organized crime, such as cybercrime that directly affects Americans,” according to the sole-source justification document.

The State Department is looking for a small business able to provide specific hacking tools.

The department is looking for a UFED Ultimate 4PC application developed by Cellebrite, the company that gained notoriety for being able to crack the iPhone used by a mass shooter in San Bernardino, California, in 2015, ending a legal standoff between the FBI and Apple.

The tool must be able to do several tasks, including bypassing security for Android devices, including HTC, Motorola and the Samsung Galaxy S, SII and SIII; data extraction and decoding for BlackBerry devices running OS 4-7 and Nokia BB5 devices; data extraction from any device running Windows phone 7.5 or 8; and decryption of trip logs for TomTom navigation devices.

The solicitation also asks for UltraBlock forensic kits, used as adapters to connect to any kind of device that needs cracking without compromising the device or the information stored within.

“Successful digital forensic investigations start by acquiring evidence from a wide array of modern and legacy storage devices,” according to the website for Digital Intelligence, UltraBlock’s manufacturer. “Be prepared for any forensic acquisition you’ll face.”

Current and former federal cybersecurity and acquisition officials who reviewed the solicitation noted to Nextgov that these tools have been used by nation-states for offensive operations around the globe.

According to the sole-source justification, these tools have been used by Ghanaian forensic examiners in the past, as well as by US agencies, prompting the State Department to look for the same to ensure interoperability.

Questions on the solicitation are due by 11 a.m. Jan. 4. Bids are due by 11 a.m. Jan. 14.

Defense One:

You Might Also Read:

How To Hack the Hackers: The Human Side Of Cybercrime

« Audit Finds Cyber Vulnerabilities In US Missile Defense System
Beware Of Cyber Criminals Demanding Payments In Bitcoin »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CyberVista

CyberVista

CyberVista is a cybersecurity training education and workforce development company. Our mission is to eliminate the skills gap by creating job ready professionals.

DefenseStorm

DefenseStorm

DefenseStorm is a Security Data Platform that watches everything on your network and matches it to your policies, providing cybersecurity management that is safe, compliant and cost effective.

Resilia

Resilia

RESILIA is a comprehensive portfolio of tools and training to help your organization achieve global best practice in cyber security.

HoxHunt

HoxHunt

HoxHunt is an automated cyber training program that transforms the way your employees react and respond to the growing amount of phishing emails.

Flipside

Flipside

Information Security training provider specialized in personalized training and security awareness campaigns.

Zymbit

Zymbit

Zymbit provides hardware security modules (HSM) for IoT devices, including Raspberry Pi and other single board computers.

SOOHO

SOOHO

SOOHO helps to detect security vulnerabilities earlier. Our blockchain security platform audits from smart contracts to on-chain transactions.

Abnormal Security

Abnormal Security

Abnormal is an API-based email security platform providing protection against the entire spectrum of targeted email attacks.

Cloudsine

Cloudsine

Cloudsine (formerly Banff Cyber Technologies) is a cloud technology company specializing in cloud adoption, security and innovation.

Sonrai Security

Sonrai Security

Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud.

Securosys

Securosys

Securosys is a technology company dedicated to securing data and communications. We develop, produce, and distribute hardware, software and services that protect and verify data and their transmission

Infiot

Infiot

Infiot is a pioneer in enabling secure, reliable access with zero trust security, network optimization, edge-intelligence and AI driven operations for all remote users, devices, sites and cloud.

Creative ITC

Creative ITC

Creative ITC is a leading infrastructure and cloud enablement company. We design and deliver exceptional managed services and cloud solutions.

Birch Cline Cybersecurity

Birch Cline Cybersecurity

Birch Cline specializes in helping Local Government and Education agencies, as well as mid-market organizations, build and maintain successful cybersecurity programs.

ARGOS Cloud Security

ARGOS Cloud Security

ARGOS aims to simplify and strengthen cloud security, by creating a visual map of security vulnerabilities, to your priceless information stored in any cloud provider environment.

PlanNet 21 Communications

PlanNet 21 Communications

PlanNet 21 Communications is Ireland most specialised technology solution provider.