The US Is Buying Phone Hacking Tools For Ghana’s Police

The State Department is purchasing some very specific phone hacking tools that it plans to turn over to the Ghanaian police force to assist the country’s investigations into international crime.

The department released a solicitation Dec. 7 for phone hacking tools and hardware that are interoperable with tools used by the department and other US agencies. Once purchased, the department will donate those tools through the US Embassy in Accra to the Ghana Police Service’s cyber investigative unit.

“This will allow the Bureau of International Narcotics and Law Enforcement to accomplish its foreign assistance mission in Ghana to build the capacity of law enforcement to combat transnational organized crime, such as cybercrime that directly affects Americans,” according to the sole-source justification document.

The State Department is looking for a small business able to provide specific hacking tools.

The department is looking for a UFED Ultimate 4PC application developed by Cellebrite, the company that gained notoriety for being able to crack the iPhone used by a mass shooter in San Bernardino, California, in 2015, ending a legal standoff between the FBI and Apple.

The tool must be able to do several tasks, including bypassing security for Android devices, including HTC, Motorola and the Samsung Galaxy S, SII and SIII; data extraction and decoding for BlackBerry devices running OS 4-7 and Nokia BB5 devices; data extraction from any device running Windows phone 7.5 or 8; and decryption of trip logs for TomTom navigation devices.

The solicitation also asks for UltraBlock forensic kits, used as adapters to connect to any kind of device that needs cracking without compromising the device or the information stored within.

“Successful digital forensic investigations start by acquiring evidence from a wide array of modern and legacy storage devices,” according to the website for Digital Intelligence, UltraBlock’s manufacturer. “Be prepared for any forensic acquisition you’ll face.”

Current and former federal cybersecurity and acquisition officials who reviewed the solicitation noted to Nextgov that these tools have been used by nation-states for offensive operations around the globe.

According to the sole-source justification, these tools have been used by Ghanaian forensic examiners in the past, as well as by US agencies, prompting the State Department to look for the same to ensure interoperability.

Questions on the solicitation are due by 11 a.m. Jan. 4. Bids are due by 11 a.m. Jan. 14.

Defense One:

You Might Also Read:

How To Hack the Hackers: The Human Side Of Cybercrime

« Audit Finds Cyber Vulnerabilities In US Missile Defense System
Beware Of Cyber Criminals Demanding Payments In Bitcoin »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CIO

CIO

CIO provides technology and business leaders with insight and analysis on information technology trends

SureCloud

SureCloud

SureCloud is a Governance, Risk and Compliance (GRC) and Cybersecurity Solutions provider.

Zymr

Zymr

Zymr specialize in cloud computing solutions including Cloud Security, Cloud Mobility, Cloud Apps, Cloud Infrastructure and Cloud Orchestration.

Alliance for Cyber Security (ACS)

Alliance for Cyber Security (ACS)

An alliance of all major players in the field of cyber security in Germany with a mission to strengthen Germany’s resistance to cyber-attacks.

Ethoca

Ethoca

Ethoca is a secure network for card issuers and merchants to connect and work cooperatively outside the payment network in a unique and powerful way.

European Recruitment

European Recruitment

European Recruitment is an award-winning, international recruitment agency specialising in niche technology areas including Cyber Security.

Computest

Computest

Computest security testing services include Mobile app security, Vulnerability assessments, Attack & penetration testing, Security awareness training, Network security assessments.

H-11 Digital Forensics

H-11 Digital Forensics

H-11 Digital Forensics is a global leader of digital forensic technology.

Cyber Lockout

Cyber Lockout

Comprehensive ransomware insurance and preventative cybersecurity technology solution, working together to help protect businesses 24/7/365.

Crayon

Crayon

Crayon is a customer-centric innovation and IT services company. We provide guidance on the best solutions for our clients’ business needs and budget with software, cloud, AI and big data.

Phylum

Phylum

Phylum provides powerful, automated software supply chain risk analysis that protects organizations, defends developers and enables secure innovation.

Zally

Zally

Using advanced behavioural biometrics and AI, Zally is the world's answer to next-generation security.

Mobilen Communications

Mobilen Communications

Mobilen are dedicated to providing our customers with the highest level of secure data in transit and to bring privacy back to a mobile world.

Panoptic Cyber

Panoptic Cyber

Panoptic Cyber are a team of elite Armed Forces Veterans who hold a wealth of experience in Information Security, Cyber Security, Data Protection and Risk Management.

Network Coverage

Network Coverage

Network Coverage align, maintain, and integrate technology and cloud solutions with business operations to improve productivity and security with as few issues and disruptions as possible.

CQR

CQR

CQR are at the forefront of innovative cyber solutions, dedicated to securing and fortifying Operational technology (OT) infrastructure.