If You Think Your Secrets Are Safe, Think Again: Even the FBI Can’t Hide

Estimated reading time: 4 minutes

"A high-tech topographic map of the United States showing glowing data streams and digital icons like user profiles, dollar signs, and hearts rising from cities and rural areas, representing nationwide surveillance, cyber breaches, and personal data extraction by drug cartels and state-backed hackers. The idea is this represents ubiquitous technical surveillance (UTS) in our society and its impact on your personal cybersecurity .

The Myth of Digital Safety

If you believe your private data is secure from cybercriminals, you may need to reconsider. A new report from the Justice Department Inspector General, which outlines the FBI’s “efforts to mitigate the effects of ubiquitous technical surveillance” (UTS), reveals an unsettling truth: even the most fortified U.S. agencies are vulnerable to technical surveillance and hacking by both drug cartels and state-sponsored cyber actors. As cybercrime democratizes and advances with the aid of tools like Artificial Intelligence (AI), this is a warning sign for all. From high-profile figures like celebrities and business executives to politicians and even the rest of us, the warning seems clear: YOUR SECRETS ARE OUT, and your personal cybersecurity is in jeopardy.

Cartel Surveillance: A Hacker on the Payroll

How a Drug Cartel Tracked an FBI Agent in Mexico

In 2018, during the FBI’s investigation into Joaquín “El Chapo” Guzmán, an informant revealed that the drug cartel had hired a hacker. The hacker exploited mobile networks to access the phone data of the FBI Assistant Legal Attaché (ALAT) in Mexico City. Through this breach, the cartel retrieved call logs and geolocation data, compromising national security and agent safety.

Camera Networks and Intimidation Tactics

The cartel didn’t stop with digital surveillance. They tapped into Mexico City’s public surveillance camera system to track the ALAT’s physical movements. “The cartel used that information to intimidate and, in some instances, kill potential sources or cooperating witnesses,” the report states.

Widespread UTS Threat: FBI’s Struggle to Respond

Ubiquitous Technical Surveillance (UTS): A Tier 1 Risk

The FBI’s internal audit acknowledged the existential threat posed by UTS, which is defined as the mass collection and analysis of data to track individuals, events, and devices. The risk was so severe that in 2022, it was elevated to a “Tier 1 Enterprise Risk,” leading to the formation of a Red Team across FBI divisions. An FBI red team simulates cyber or physical attacks to test the Bureau’s security and response readiness.

See also  The Looming Global Cyber Crisis: Are We On The Doorstep of Digital Disaster?
Red Team Findings: Gaps in Policy and Execution

Despite this elevation, the FBI’s Red Team failed to perform a comprehensive gap analysis. The team emphasized generalized vulnerabilities rather than integrating specific insights from internal reviews, such as the Counterintelligence Division’s “Anatomy of a Case.”

One Minute Watch – How AI Exploits Data Breaches

Chinese Hackers Breach U.S. Telecom Networks

The Salt Typhoon Infiltration

In 2024, a Chinese state-backed group known as Salt Typhoon infiltrated major U.S. telecom providers. These hackers accessed wiretap systems, call logs, and real-time SMS messages, affecting over one million Americans, including federal officials. What, then, US Senate Intelligence Committee Chairman Mark Warner called “the worst telecom hack in our nation’s history.” Just for clarity’s sake, Senator Warner added “By far,” for emphasis.

Wiretap Compromise and National Exposure

Perhaps the most alarming aspect of the breach was the hackers’ ability to view data from surveillance systems used by federal agencies. This included real-time access to communications under legal surveillance orders, posing broad and far-reaching risks to national security operations.

What the FBI Audit Revealed

Inadequate Training and Lack of Clear Authority

The FBI Inspector General’s report expressed concerns that FBI personnel are underprepared for UTS threats posed by drug cartels and others. While a 45-minute training module was introduced, advanced training remains optional and inaccessible to many agents. Furthermore, there is no single line of authority to handle UTS incidents, leaving the agency vulnerable during future breaches.

Strategic Plan Under Construction but Still Insufficient

The FBI’s draft UTS Strategic Plan lacks clarity on execution authority and coordination between departments. Without robust governance, the agency risks repeating past failures even as it attempts to modernize its surveillance defenses.

See also  Identity Theft - What to Do When Your Identity Has Been Stolen

From Intelligence Agencies to Drug Cartels: No One’s Safe

Both nation-state adversaries and organized crime syndicates now have access to technology powerful enough to breach the FBI. The question isn’t just about whether your data can be accessed; it’s when, by whom, and for what purpose.

Watch Our Podcast On Personal Cybersecurity

Is my data vulnerable to similar attacks?

Yes. If adversaries can penetrate federal systems, everyday users with fewer protections are even more susceptible.

What can I do to protect my personal data?

Regularly update software, use strong passwords, enable multi-factor authentication, and avoid oversharing personal data online.

Conclusion: If the FBI Can’t Hide, Can You?

This isn’t just a story about failed federal security. It’s a cautionary tale for all. When hackers can outsmart national agencies and drug cartels can outmaneuver the FBI, it’s clear that no digital footprint is truly invisible. A battle is being waged for your privacy. Are you in the fight?


×