https://www.vice.com/en_us/article/59n4en/us-army-intelligence-bought-didnt-use-hacking-team-malware

By Joseph Cox
Vice.com
October 28 2019

Despite spending hundreds of thousands of dollars on equipment from
controversial malware vendor Hacking Team, a section of the U.S. Army focused on
counterintelligence never even used the tools.

The U.S. Army paid Cicom USA, the U.S. subsidiary of Hacking Team, $350,000 for
the company's "Remote Control System" (RCS) in 2011, according to publicly
available contract records. Motherboard filed a Freedom of Information Act
(FOIA) request with the U.S. Army for documents related to this contract, and
one showed the purchase was specifically for the 902nd Military Intelligence
Group.

"The 902nd Military Intelligence Group conducts proactive counterintelligence
activities to detect, identify, assess, and counter, neutralize or exploit
foreign intelligence entities and insider threats in order to protect Army and
designated Department of Defense forces, information and technologies
worldwide," the U.S. Army website reads. The group is based at Fort Meade,
Maryland.

Depending on the version purchased, Hacking Team's RCS is capable of remotely
breaking into and exfiltrating data from mobile phones and computers.

[...]


--
Subscribe to InfoSec News
https://www.infosecnews.org/subscribe-to-infosec-news/
https://twitter.com/infosecnews_

Reply via email to