The US Is Buying Phone Hacking Tools For Ghana’s Police

The State Department is purchasing some very specific phone hacking tools that it plans to turn over to the Ghanaian police force to assist the country’s investigations into international crime.

The department released a solicitation Dec. 7 for phone hacking tools and hardware that are interoperable with tools used by the department and other US agencies. Once purchased, the department will donate those tools through the US Embassy in Accra to the Ghana Police Service’s cyber investigative unit.

“This will allow the Bureau of International Narcotics and Law Enforcement to accomplish its foreign assistance mission in Ghana to build the capacity of law enforcement to combat transnational organized crime, such as cybercrime that directly affects Americans,” according to the sole-source justification document.

The State Department is looking for a small business able to provide specific hacking tools.

The department is looking for a UFED Ultimate 4PC application developed by Cellebrite, the company that gained notoriety for being able to crack the iPhone used by a mass shooter in San Bernardino, California, in 2015, ending a legal standoff between the FBI and Apple.

The tool must be able to do several tasks, including bypassing security for Android devices, including HTC, Motorola and the Samsung Galaxy S, SII and SIII; data extraction and decoding for BlackBerry devices running OS 4-7 and Nokia BB5 devices; data extraction from any device running Windows phone 7.5 or 8; and decryption of trip logs for TomTom navigation devices.

The solicitation also asks for UltraBlock forensic kits, used as adapters to connect to any kind of device that needs cracking without compromising the device or the information stored within.

“Successful digital forensic investigations start by acquiring evidence from a wide array of modern and legacy storage devices,” according to the website for Digital Intelligence, UltraBlock’s manufacturer. “Be prepared for any forensic acquisition you’ll face.”

Current and former federal cybersecurity and acquisition officials who reviewed the solicitation noted to Nextgov that these tools have been used by nation-states for offensive operations around the globe.

According to the sole-source justification, these tools have been used by Ghanaian forensic examiners in the past, as well as by US agencies, prompting the State Department to look for the same to ensure interoperability.

Questions on the solicitation are due by 11 a.m. Jan. 4. Bids are due by 11 a.m. Jan. 14.

Defense One:

You Might Also Read:

How To Hack the Hackers: The Human Side Of Cybercrime

« Audit Finds Cyber Vulnerabilities In US Missile Defense System
Beware Of Cyber Criminals Demanding Payments In Bitcoin »

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Tenable Network Security

Tenable Network Security

Tenable Network Security - Don't rely only on CVSS to prioritize. Use machine learning to predict what is most likely to be exploited.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

Thursday, August 20, 2020 - Join SANS and AWS Marketplace to learn the exercise of applying MITRE’s ATT&CK Matrix to the AWS Cloud and how to enhance threat detection and hunting in an AWS environment

MePIN

MePIN

MePIN is an online user authentication and transaction authorization solution.

Georgia Tech Research Institute (GTRI)

Georgia Tech Research Institute (GTRI)

GTRI's Cybersecurity, Information Protection, and Hardware Evaluation Research Laboratory (CIPHER Lab) is a leader in developing the technologies that secure, defend, and respond to cyber threats.

Cybercrime Coordination Unit Switzerland (CYCO)

Cybercrime Coordination Unit Switzerland (CYCO)

The Cybercrime Coordination Unit (CYCO) is Switzerland’s central office for reporting illegal subject matter on the Internet and for in-depth analyses of Internet crime.

Napatech

Napatech

Napatech develops and manufactures high speed network accelerators specifically designed for real-time network monitoring and analysis applications.

VisionWare

VisionWare

VisionWare provide consulting services and solutions in areas covering both physical and digital security.

Arsenal Recon

Arsenal Recon

Arsenal Recon are digital forensics experts, providing consultancy services and powerful software tools to improve the analysis of electronic evidence.

JpU

JpU

JpU develops a robust, purpose-built mobile network core to simplify the management of IoT networks and consolidate security for all connected devices.

Quantea

Quantea

Our multi-patented solutions - QP Series Network Analytics Accelerator appliance and PureInsight Analytics Software Suite allows you to capture, analyze, store, replay, network traffic data.