https://www.vice.com/en_us/article/59n4en/us-army-intelligence-bought-didnt-use-hacking-team-malware
By Joseph Cox Vice.com October 28 2019 Despite spending hundreds of thousands of dollars on equipment from controversial malware vendor Hacking Team, a section of the U.S. Army focused on counterintelligence never even used the tools. The U.S. Army paid Cicom USA, the U.S. subsidiary of Hacking Team, $350,000 for the company's "Remote Control System" (RCS) in 2011, according to publicly available contract records. Motherboard filed a Freedom of Information Act (FOIA) request with the U.S. Army for documents related to this contract, and one showed the purchase was specifically for the 902nd Military Intelligence Group. "The 902nd Military Intelligence Group conducts proactive counterintelligence activities to detect, identify, assess, and counter, neutralize or exploit foreign intelligence entities and insider threats in order to protect Army and designated Department of Defense forces, information and technologies worldwide," the U.S. Army website reads. The group is based at Fort Meade, Maryland. Depending on the version purchased, Hacking Team's RCS is capable of remotely breaking into and exfiltrating data from mobile phones and computers. [...] -- Subscribe to InfoSec News https://www.infosecnews.org/subscribe-to-infosec-news/ https://twitter.com/infosecnews_
