The US Is Buying Phone Hacking Tools For Ghana’s Police

The State Department is purchasing some very specific phone hacking tools that it plans to turn over to the Ghanaian police force to assist the country’s investigations into international crime.

The department released a solicitation Dec. 7 for phone hacking tools and hardware that are interoperable with tools used by the department and other US agencies. Once purchased, the department will donate those tools through the US Embassy in Accra to the Ghana Police Service’s cyber investigative unit.

“This will allow the Bureau of International Narcotics and Law Enforcement to accomplish its foreign assistance mission in Ghana to build the capacity of law enforcement to combat transnational organized crime, such as cybercrime that directly affects Americans,” according to the sole-source justification document.

The State Department is looking for a small business able to provide specific hacking tools.

The department is looking for a UFED Ultimate 4PC application developed by Cellebrite, the company that gained notoriety for being able to crack the iPhone used by a mass shooter in San Bernardino, California, in 2015, ending a legal standoff between the FBI and Apple.

The tool must be able to do several tasks, including bypassing security for Android devices, including HTC, Motorola and the Samsung Galaxy S, SII and SIII; data extraction and decoding for BlackBerry devices running OS 4-7 and Nokia BB5 devices; data extraction from any device running Windows phone 7.5 or 8; and decryption of trip logs for TomTom navigation devices.

The solicitation also asks for UltraBlock forensic kits, used as adapters to connect to any kind of device that needs cracking without compromising the device or the information stored within.

“Successful digital forensic investigations start by acquiring evidence from a wide array of modern and legacy storage devices,” according to the website for Digital Intelligence, UltraBlock’s manufacturer. “Be prepared for any forensic acquisition you’ll face.”

Current and former federal cybersecurity and acquisition officials who reviewed the solicitation noted to Nextgov that these tools have been used by nation-states for offensive operations around the globe.

According to the sole-source justification, these tools have been used by Ghanaian forensic examiners in the past, as well as by US agencies, prompting the State Department to look for the same to ensure interoperability.

Questions on the solicitation are due by 11 a.m. Jan. 4. Bids are due by 11 a.m. Jan. 14.

Defense One:

You Might Also Read:

How To Hack the Hackers: The Human Side Of Cybercrime

« Audit Finds Cyber Vulnerabilities In US Missile Defense System
Beware Of Cyber Criminals Demanding Payments In Bitcoin »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

FireMon

FireMon

FireMon is the only agile network security policy platform for firewalls and cloud security groups providing the fastest way to streamline network security policy management.

SafeCharge

SafeCharge

SafeCharge is a global provider of technology-based multi-channel payments services and risk management solutions for demanding businesses.

Private Internet Access

Private Internet Access

Private Internet Access is a Virtual Private Network services provider offering secure encrypted access to the internet.

CSIRT-NQN

CSIRT-NQN

CSIRT-NQN is the Computer Incident Response Team for the Argentine province of Neuquen.

ThreatAware

ThreatAware

Total visibility of your business cybersecurity. Monitoring, management and compliance for your cybersecurity tools, people and processes from one easy to use dashboard.

IoT Security Institute (IoTSI)

IoT Security Institute (IoTSI)

IoT Security Institute is an academic and industry body dedicated to providing frameworks and supporting educational services to assist in managing security within an Internet of Things eco-system.

Adyta

Adyta

Adyta specializes in cybersecurity solutions adapted to the needs of sovereign institutions, business groups and other organizations that handle information and sensitive or classified data.

Crown Sterling

Crown Sterling

Crown Sterling delivers next generation software-based, AI-driven cryptography in the form of random number generators and encryption products.

Vigilant Technology Solutions

Vigilant Technology Solutions

Vigilant is a global cyber security technology company offering solutions to manage entire IT & cyber security lifecycles.

Canopius Group

Canopius Group

Canopius is a global specialty lines insurance and reinsurance company and one of the top 10 insurers in the Lloyd’s insurance market.

Aigner Business Solutions

Aigner Business Solutions

Aigner Business Solutions GmbH is a specialist in IT-Security and Data Protection. Concise and focussed.

European Cyber Competence Network

European Cyber Competence Network

The purpose of the European Cyber Competence Network is to retain and develop the cybersecurity technological and industrial capacities of the EU necessary to secure its Digital Single Market.

Theta432

Theta432

THETA432 is a cybersecurity firm that provides 24/7/365 managed prevention, detection, response, Hybrid SOC, cyber defense monitoring services with dynamically defined defense (3D™).

Ballistic Ventures

Ballistic Ventures

Ballistic Ventures is a new kind of venture capital firm, built by and for cybersecurity entrepreneurs and investors.

CyFlare

CyFlare

CyFlare’s security platform integrates your tools with ours – delivering true positives, automated remediation, and interactive analytics built for security management teams.

AirMDR

AirMDR

Designed by experts, AirMDR solutions cater to the unique demands of security operations centers.