The FBI has recently allocated substantial resources, amounting to hundreds of thousands of dollars, to acquire advanced hacking tools. However, the agency now reports a troubling issue: it cannot locate the documentation related to these significant procurements. This raises serious questions about accountability and transparency within federal operations.
Details regarding these hacking tools are scarce, leaving the public and experts alike in the dark about their functionalities and capabilities. According to a report by Vice, these tools were purchased for an impressive sum of $250,000 by the Child Exploitation Operational Unit (CEOU) from a nonprofit organization dedicated to combatting child predation. These tools are classified as part of the bureau’s network of investigative techniques (NITs) and are said to possess the ability to reveal the actual internet addresses of users who might be utilizing anonymizing technologies, such as VPNs or Tor.
After filing a Freedom of Information Act (FOIA) request to obtain further details about these tools, 404 Media received a perplexing response from the FBI, indicating that crucial information regarding the purchases had been deemed “missing.” The FBI’s correspondence noted:
“Potentially responsive records were identified during the search…However, we were advised that they were not in their expected locations. An additional search for the missing records also met with unsuccessful results. Since we were unable to review the records, we were unable to determine if they were responsive to your request.”
This statement raises an intriguing question: could the records actually be “not in their expected locations” because they have been deliberately relocated? To gain more insight, Gizmodo has reached out to the Justice Department for clarification on the matter.
Despite receiving notably less media attention compared to other intelligence agencies like the NSA, the FBI possesses a remarkably sophisticated array of hacking capabilities, which are not without their share of controversies. A report from the New York Times in 2022 revealed that the FBI had sought to acquire a tool capable of hacking “any phone in the U.S.” This controversial tool was sold by the NSO Group, an infamous Israeli spyware vendor whose products have been implicated in numerous international hacking scandals. In 2023, the New York Times further reported that a federal agency had violated a directive from the Biden administration that prohibited federal agencies from engaging in contracts with NSO. Investigations revealed that the FBI itself was the agency that had purchased the tool, raising ethical concerns regarding its procurement practices.
Recent operations led by the FBI have showcased the agency’s growing cyber capabilities. In January, it successfully closed a backdoor that had infected thousands of U.S. computers with Chinese malware, effectively taking over the hackers’ command-and-control server. Moreover, in 2023, the FBI employed one of its NITs to unmask a Tor user involved in an anti-terrorism case. That same year, the bureau infiltrated a notorious ransomware gang known as “Hive,” which enabled them to disrupt the criminal operations effectively. Overall, the FBI demonstrates a high level of expertise in cyber operations, even if it tends to maintain a low public profile regarding these capabilities.









