Hacker working for El Chapo reveals significant spy risks, a testament to the ongoing 'existential' intelligence concerns
In the face of the growing challenge posed by widespread technical surveillance enabled by commercial tools, the FBI has been actively raising awareness about sophisticated cyber threats. The agency has highlighted the activities of cybercriminal groups like the Scattered Spider, which have targeted critical sectors such as airlines through social engineering and bypassing multi-factor authentication [1].
However, the FBI's guidance on defensive cybersecurity practices, particularly for federal officials, has come under criticism for being insufficiently comprehensive and urgent. U.S. Senator Ron Wyden has publicly called for the FBI to strengthen and update its cybersecurity advice for lawmakers and their staff, emphasising the need for more robust recommendations against mobile device surveillance risks [2].
Cybersecurity experts, including Senator Wyden, argue that steps such as enabling advanced device protection modes like Apple's Lockdown Mode and Google's Advanced Protection Mode, using ad blockers, disabling ad tracking IDs, and opting out of data brokers should be adopted as default security settings for federal officials to mitigate risks from commercial spyware and other surveillance tools [2].
In addition to device-level advice, the FBI, in collaboration with agencies such as CISA, NSA, and the Department of Defense Cyber Crime Center, has issued broader cybersecurity warnings and guidance aimed at critical infrastructure operators and federal entities. These include measures such as disconnecting operational technology (OT) and industrial control systems from the public internet, enforcing strong, unique passwords, deploying phishing-resistant multi-factor authentication for network access, applying timely patches to vulnerable systems, monitoring access logs and configuration changes, and ensuring and rehearsing incident response and business continuity plans [3][4].
These initiatives demonstrate the FBI’s ongoing efforts to address the security challenges posed by ubiquitous surveillance and cyber threats through coordinated inter-agency advisories and targeted outreach. However, recent audits have revealed the FBI's struggles with addressing "ubiquitous technical surveillance," with the Justice Department's inspector general releasing an audit in late 2021 that highlighted these challenges [5].
As the world of smartphones, online data, interconnected technology, and artificial intelligence continues to evolve, so too do the threats posed by ubiquitous technical surveillance. Advanced spyware can infect phones without any user interaction, and technical defenses against deepfakes are struggling to keep up with the advancement of technology [6].
Government officials who may be targeted by spyware should assume their phones are already compromised and act cautiously. The FBI is expanding training to help agents navigate potential threats related to ubiquitous technical surveillance, but many advanced UTS courses remain optional and are unable to serve many students due to resource constraints [7].
Foreign intelligence agencies are using advanced cyber tools, biometric devices, unmanned systems, spyware, and AI to disrupt U.S. infrastructure, industries, and institutions. Recent examples include the hacking of an FBI assistant legal attaché's cell phone in Mexico City, which allowed the hacker to see phone calls and geolocation data, and the use of this information to intimidate and kill sources and cooperating witnesses [8].
In response to these challenges, the FBI Directorate of Intelligence has requested more funding to expand the number of UTS courses over the next two years, but higher-level FBI officials have denied those requests [9]. The FBI is also warning U.S. diplomats about deep-fake voice impersonation of high-ranking officials, such as the case of Secretary of State Marco Rubio [10].
In conclusion, the FBI's efforts to combat ubiquitous technical surveillance are ongoing, but the challenges posed by this complex and ever-evolving threat landscape are significant. The agency is working to update and improve its defensive cybersecurity guidance, particularly for federal officials, and is collaborating with other federal agencies to provide industry and infrastructure security guidance [1][2][3][4]. However, resource constraints and the rapid pace of technological advancement continue to pose challenges to these efforts.
The FBI is working to update and reimagine the cybersecurity workforce's shield against ubiquitous technical surveillance by adopting more robust recommendations such as enabling advanced device protection modes and monitoring access logs. These efforts aim to protect critical sectors like the federal workforce from commercial spyware and other surveillance tools. However, resource constraints and the rapid pace of technological advancement still present challenges in this increasingly complex and evolving threat landscape.