{"id":15912,"date":"2026-03-06T16:46:07","date_gmt":"2026-03-06T16:46:07","guid":{"rendered":"https:\/\/newestek.com\/?p=15912"},"modified":"2026-03-06T16:46:07","modified_gmt":"2026-03-06T16:46:07","slug":"fbi-wiretap-system-tapped-by-hackers","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=15912","title":{"rendered":"FBI wiretap system tapped by hackers"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>The US Federal Bureau of Investigation (FBI) has identified a suspected incident on a network used to manage wiretaps and foreign intelligence surveillance warrants, <a href=\"https:\/\/edition.cnn.com\/2026\/03\/05\/politics\/fbi-investigating-cyber-breach-critical-surveillance-network\" target=\"_blank\" rel=\"noreferrer noopener\">CNN reported<\/a>.<\/p>\n<p>The FBI acknowledged the incident in a statement to CNN, saying, \u201cThe FBI identified and addressed suspicious activities on FBI networks, and we have leveraged all technical capabilities to respond.\u201d<\/p>\n<p>The agency is not expanding on its statement but there will be concerns that this an attack prompted by a state agency, such as China. Last year, the bureau and the US Cybersecurity &amp; Infrastructure Security Agency <a href=\"https:\/\/www.csoonline.com\/article\/3830549\/fbi-and-cisa-warn-about-continuing-attacks-by-chinese-ransomware-group-ghost.html\">warned of continuing attacks by Chinese ransomware group<\/a>, Ghost, on US organizations.<\/p>\n<p>The FBI has faced questions about the security of its IT systems before. In 2007, <a href=\"https:\/\/www.computerworld.com\/article\/1497841\/fbi-infrastructure-less-secure-than-your-corporate-network.html\">a report from the Government Accounting Office<\/a>, found that the FBI\u2019s infrastructure was less secure than the average company\u2019s\u00a0 and in 2012, <a href=\"https:\/\/www.infoworld.com\/article\/2276164\/hackers-leak-1-million-apple-udids-allegedly-stolen-from-fbi-laptop-2.html\">an agent\u2019s laptop was allegedly subjected to a hacker\u2019s attack<\/a>, leading to claims that one million Apple UDIDs had been stolen.<\/p>\n<p>The bureau will certainly have tightened up procedures since then, although <a href=\"https:\/\/edition.cnn.com\/2023\/02\/17\/politics\/fbi-cyber-incident-computer-network\">CNN also reported an alleged security breach<\/a> at the FBI\u2019s field office in February 2023.<\/p>\n<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The US Federal Bureau of Investigation (FBI) has identified a suspected incident on a network used to manage wiretaps and foreign intelligence surveillance warrants, CNN reported. The FBI acknowledged the incident in a statement to CNN, saying, \u201cThe FBI identified and addressed suspicious activities on FBI networks, and we have leveraged all technical capabilities to respond.\u201d The agency is not expanding on its statement but&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=15912\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15912","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15912","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15912"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15912\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15912"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15912"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15912"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}