The US Is Buying Phone Hacking Tools For Ghana’s Police

The State Department is purchasing some very specific phone hacking tools that it plans to turn over to the Ghanaian police force to assist the country’s investigations into international crime.

The department released a solicitation Dec. 7 for phone hacking tools and hardware that are interoperable with tools used by the department and other US agencies. Once purchased, the department will donate those tools through the US Embassy in Accra to the Ghana Police Service’s cyber investigative unit.

“This will allow the Bureau of International Narcotics and Law Enforcement to accomplish its foreign assistance mission in Ghana to build the capacity of law enforcement to combat transnational organized crime, such as cybercrime that directly affects Americans,” according to the sole-source justification document.

The State Department is looking for a small business able to provide specific hacking tools.

The department is looking for a UFED Ultimate 4PC application developed by Cellebrite, the company that gained notoriety for being able to crack the iPhone used by a mass shooter in San Bernardino, California, in 2015, ending a legal standoff between the FBI and Apple.

The tool must be able to do several tasks, including bypassing security for Android devices, including HTC, Motorola and the Samsung Galaxy S, SII and SIII; data extraction and decoding for BlackBerry devices running OS 4-7 and Nokia BB5 devices; data extraction from any device running Windows phone 7.5 or 8; and decryption of trip logs for TomTom navigation devices.

The solicitation also asks for UltraBlock forensic kits, used as adapters to connect to any kind of device that needs cracking without compromising the device or the information stored within.

“Successful digital forensic investigations start by acquiring evidence from a wide array of modern and legacy storage devices,” according to the website for Digital Intelligence, UltraBlock’s manufacturer. “Be prepared for any forensic acquisition you’ll face.”

Current and former federal cybersecurity and acquisition officials who reviewed the solicitation noted to Nextgov that these tools have been used by nation-states for offensive operations around the globe.

According to the sole-source justification, these tools have been used by Ghanaian forensic examiners in the past, as well as by US agencies, prompting the State Department to look for the same to ensure interoperability.

Questions on the solicitation are due by 11 a.m. Jan. 4. Bids are due by 11 a.m. Jan. 14.

Defense One:

You Might Also Read:

How To Hack the Hackers: The Human Side Of Cybercrime

« Audit Finds Cyber Vulnerabilities In US Missile Defense System
Beware Of Cyber Criminals Demanding Payments In Bitcoin »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Information Commissioner's Office (ICO)

Information Commissioner's Office (ICO)

The Information Commissioner's Office is an independent authority set up to uphold information rights in the public interest.

Joe Security

Joe Security

Joe Security specializes in the development of automated malware analysis systems for malware detection and forensics.

CodeOne

CodeOne

CodeOne provides solutions for website and web app security.

Cyberwrite

Cyberwrite

Cyberwrite was founded to provide underwriters around the world a unique and innovative Cyber Underwriting platform.

Swiss Cyber Storm

Swiss Cyber Storm

Swiss Cyber Storm is a non profit organization hosting the international Swiss Cyber Storm Conference and running the Swiss part of the European Cyber Security Challenges.

XTN Cognitive Security

XTN Cognitive Security

XTN is focused on the development of security, Fraud and Mobile Threat Prevention advanced behaviour-based solutions.

Ensign InfoSecurity

Ensign InfoSecurity

Ensign InfoSecurity is Southeast Asia’s largest pure-play cybersecurity firm.

Safetica

Safetica

Safetica Technologies is a Czech software company that delivers data protection solutions for businesses of all types and sizes.

AU10TIX

AU10TIX

AU10TIX’s smart forensic-level ID authentication technology links physical and digital identities, meets compliance mandates, and ensures your customers know their trust and safety come first.

Synamic Technologies

Synamic Technologies

Synamic Technologies was founded in 2018 as a start-up to automate cyber security processes. Our CISOSCOPE product automates vulnerability management, risk management and compliance.

Brightsolid

Brightsolid

Brightsolid are experts in Hybrid Cloud. We design, build and manage secure, scalable cloud environments that meet customers’ business ambitions.

Performance Technologies

Performance Technologies

As a leading IT Solutions Provider in Greece, Performance Technologies delivers reliable, long life solutions, ensuring continuous availability of business-critical services and information.

Beetles Cyber Security

Beetles Cyber Security

Beetles is a crowdsourced penetration testing platform designed to build a trusted, hacker-centric approach to protectan organization’s digital attack surface.

Lenze

Lenze

Lenze are an experienced partner for automation systems, digitalization and cyber security.

RKON

RKON

RKON Technologies provides managed IT and cybersecurity services to organizations across various industries, helping businesses mitigate risks and secure their digital infrastructures.

Neeve

Neeve

Neeve is an edge cloud platform transforming smart buildings and spaces, making them more secure, smarter, and more sustainable.