Estimated reading time: 4 minutes

The Myth of Digital Safety
If you believe your private data is secure from cybercriminals, you may need to reconsider. A new report from the Justice Department Inspector General, which outlines the FBI’s “efforts to mitigate the effects of ubiquitous technical surveillance” (UTS), reveals an unsettling truth: even the most fortified U.S. agencies are vulnerable to technical surveillance and hacking by both drug cartels and state-sponsored cyber actors. As cybercrime democratizes and advances with the aid of tools like Artificial Intelligence (AI), this is a warning sign for all. From high-profile figures like celebrities and business executives to politicians and even the rest of us, the warning seems clear: YOUR SECRETS ARE OUT, and your personal cybersecurity is in jeopardy.
Cartel Surveillance: A Hacker on the Payroll
How a Drug Cartel Tracked an FBI Agent in Mexico
In 2018, during the FBI’s investigation into Joaquín “El Chapo” Guzmán, an informant revealed that the drug cartel had hired a hacker. The hacker exploited mobile networks to access the phone data of the FBI Assistant Legal Attaché (ALAT) in Mexico City. Through this breach, the cartel retrieved call logs and geolocation data, compromising national security and agent safety.
Camera Networks and Intimidation Tactics
The cartel didn’t stop with digital surveillance. They tapped into Mexico City’s public surveillance camera system to track the ALAT’s physical movements. “The cartel used that information to intimidate and, in some instances, kill potential sources or cooperating witnesses,” the report states.
Widespread UTS Threat: FBI’s Struggle to Respond
Ubiquitous Technical Surveillance (UTS): A Tier 1 Risk
The FBI’s internal audit acknowledged the existential threat posed by UTS, which is defined as the mass collection and analysis of data to track individuals, events, and devices. The risk was so severe that in 2022, it was elevated to a “Tier 1 Enterprise Risk,” leading to the formation of a Red Team across FBI divisions. An FBI red team simulates cyber or physical attacks to test the Bureau’s security and response readiness.
Red Team Findings: Gaps in Policy and Execution
Despite this elevation, the FBI’s Red Team failed to perform a comprehensive gap analysis. The team emphasized generalized vulnerabilities rather than integrating specific insights from internal reviews, such as the Counterintelligence Division’s “Anatomy of a Case.”
One Minute Watch – How AI Exploits Data Breaches
Chinese Hackers Breach U.S. Telecom Networks
The Salt Typhoon Infiltration
In 2024, a Chinese state-backed group known as Salt Typhoon infiltrated major U.S. telecom providers. These hackers accessed wiretap systems, call logs, and real-time SMS messages, affecting over one million Americans, including federal officials. What, then, US Senate Intelligence Committee Chairman Mark Warner called “the worst telecom hack in our nation’s history.” Just for clarity’s sake, Senator Warner added “By far,” for emphasis.
Wiretap Compromise and National Exposure
Perhaps the most alarming aspect of the breach was the hackers’ ability to view data from surveillance systems used by federal agencies. This included real-time access to communications under legal surveillance orders, posing broad and far-reaching risks to national security operations.
What the FBI Audit Revealed
Inadequate Training and Lack of Clear Authority
The FBI Inspector General’s report expressed concerns that FBI personnel are underprepared for UTS threats posed by drug cartels and others. While a 45-minute training module was introduced, advanced training remains optional and inaccessible to many agents. Furthermore, there is no single line of authority to handle UTS incidents, leaving the agency vulnerable during future breaches.
Strategic Plan Under Construction but Still Insufficient
The FBI’s draft UTS Strategic Plan lacks clarity on execution authority and coordination between departments. Without robust governance, the agency risks repeating past failures even as it attempts to modernize its surveillance defenses.
From Intelligence Agencies to Drug Cartels: No One’s Safe
Both nation-state adversaries and organized crime syndicates now have access to technology powerful enough to breach the FBI. The question isn’t just about whether your data can be accessed; it’s when, by whom, and for what purpose.
Watch Our Podcast On Personal Cybersecurity
Is my data vulnerable to similar attacks?
Yes. If adversaries can penetrate federal systems, everyday users with fewer protections are even more susceptible.
What can I do to protect my personal data?
Regularly update software, use strong passwords, enable multi-factor authentication, and avoid oversharing personal data online.
Conclusion: If the FBI Can’t Hide, Can You?
This isn’t just a story about failed federal security. It’s a cautionary tale for all. When hackers can outsmart national agencies and drug cartels can outmaneuver the FBI, it’s clear that no digital footprint is truly invisible. A battle is being waged for your privacy. Are you in the fight?