• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechFederal Bureau of Investigation

FBI Official Acknowledges Using Top Secret Hacking Weapons

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
December 9, 2015, 8:59 PM ET
Labratory forensic facial imaging program.
Quantico, VA - JUNE 20: Lisa Bailey, a forensic artist with the FBI, demonstrates how she does a 3D laser scan of a scull and discuss's the Laboratory's Forensic Imaging Program at the Marine Corps Base in Quantico, VA on Wednesday June 20, 2012. (Photo by Jabin Botsford/For The Washington Post via Getty Images)Jabin Botsford—The Washington Post The Washington Post via Getty Images

The Federal Bureau of Investigation recently made an unprecedented admission: It uses undisclosed software vulnerabilities when hacking suspects’ computers.

Amy Hess, head of the FBI’s science and technology arm, recently went on the record about the practice with the Washington Post. “Hess acknowledged that the bureau uses zero-days,” the Post reported on Tuesday, using industry-speak for generally unknown computer bugs. The name derives from the way such flaws blind side security pros. By the time attackers have begun taking advantage of these coding flubs, software engineers are left with zero days to fix them.

Never before has an FBI official conceded the point, the Post notes. That’s noteworthy. Although the news itself is not exactly a shocker. It is well known among cybersecurity and privacy circles that the agency has had a zero day policy in place since 2010, thanks to documents obtained by the American Civil Liberties Union and published earlier this year on Wired. And working groups had been assembled at least two years earlier to begin mapping out that policy, as a document obtained by the Electronic Frontier Foundation privacy organization and also published on Wired shows. Now though, Hess, an executive assistant director with the FBI, seems to have confirmed the activity.

(People surmised as much after the FBI was outed as a customer of the Italian spyware firm Hacking Team after hackers stole some of its internal documents and published them online this year, too.)

The agency’s “network investigative techniques,” as these hacking operations are known, originate inside the FBI’s Operational Technology Division in an enclave known as its Remote Operations Unit, according to the Post. They’re rarely discussed publicly, and many privacy advocates have a number of concerns about the system, which they say could potentially be abused or have unsavory consequences.

Law enforcement agencies’ reliance on such exploits poses a Catch-22. On the one hand, hoarding coveted bugs and keeping them secret lets authorities slyly target suspects and collect evidence (with a warrant, of course). On the other hand, alerting tech companies about flaws in their products lets them fix the problems, protecting customers everywhere and securing them against attacks from less well-intentioned hackers and spies. The two incentives are undeniably at odds.

That dilemma grows more complex when another compelling reason for agencies like the FBI to use zero days enters the mix. The hacking method lets investigators sidestep roadblocks posed by strong encryption, a technology that scrambles data and communications and increasingly leaves the Feds in the dark, so to speak, when probing wires and hard drives for incriminating information. Consider the hacking option as the agency’s “plan B,” as the Intercept has detailed.

The tactic isn’t necessarily a bad thing. Indeed, Jonathan Mayer, the Federal Communication Commission’s recently appointed technical lead for investigations who is also a well-known privacy advocate, earlier this year described hacking as a potentially “legitimate and effective law enforcement technique” in an academic paper. Another set of big-name security researchers also recently argued in a paper that targeted hacking campaigns could provide a tolerable alternative to mandating that tech firms add special “backdoor” access to their encrypted products for investigators.

Before the hacking option can be considered a comprehensive solution, many of the details would need to be worked out. Hess admits that the agency regularly grapples with these questions. As Post reporter Ellen Nakashima writes:

[Hess] said the trade-off is one the bureau wrestles with. “What is the greater good — to be able to identify a person who is threatening public safety?” Or to alert software makers to bugs that, if unpatched, could leave consumers vulnerable?

“How do we balance that?” she said. “That is a constant challenge for us.”

She added that hacking computers is not a favored FBI technique. “It’s frail,” she said. As soon as a tech firm updates its software, the tool vanishes. “It clearly is not reliable” in the way a traditional wiretap is, she said.

Perhaps that’s why the agency continues to throw its weight behind legislative proposals that seek “backdoor” access to encrypted products, despite the fact that many technologists oppose such a scenario on the grounds that it would expose people to unacceptable risk. For what it’s worth, the security scholars who wrote one of the papers referenced above recommend that law enforcement agencies adopt a prompt responsible disclosure policy. Per the paper:

“We propose that law enforcement adopt strict guidelines requiring immediate disclosure to the vendor any vulnerabilities as soon they are discovered,” they write. “As we will discuss, such guidelines would allow law enforcement to fully support crime prevention, and—because of the natural lag of the software lifecycle—still allow law enforcement to build a sufficiently rich toolkit to conduct investigations in practice.”

These legal procedures have yet to be thoroughly debated and ironed out but, in the meantime, we can at least put to rest a lingering uncertainty. To the question “is the FBI using zero days in criminal investigations?”—as the subject of a blog post on Just Security recently inquired—one can erase the question mark. The answer is apparently yes.

Follow Robert Hackett on Twitter at @rhhackett. Read his cybersecurity, technology, and business coverage here. And subscribe to Data Sheet, Fortune’s daily newsletter on the business of technology, where he writes a weekly column.

For more about the great encryption debate, watch the video below:

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

Image showing multiple computer screens with code.
CybersecuritySecurity
Mercor, a $10 billion AI startup that works with companies including OpenAI and Anthropic, confirms major data breach
By Beatrice NolanApril 2, 2026
8 hours ago
picture of the word "solana"
CryptoCryptocurrency
Latest crypto hack sees thieves make off with $280 million from Solana DeFi platform Drift
By Carlos GarciaApril 2, 2026
8 hours ago
Jack Dorsey and Roelof Botha think AI can make middle management obsolete 
AIBlock
Jack Dorsey and Roelof Botha think AI can make middle management obsolete 
By Jacqueline MunisApril 2, 2026
10 hours ago
china
AIChina
Meet China’s AI-powered recycling robot that sorts 220 pounds of clothes in 2 to 3 minutes
By Tian MacLeod Ji and The Associated PressApril 2, 2026
10 hours ago
In the age of vibe coding, trust is the real bottleneck
AIEye on AI
In the age of vibe coding, trust is the real bottleneck
By Sharon GoldmanApril 2, 2026
11 hours ago
A photo illustration of two laptops with eyeballs over a red background with alert signs.
CryptoNorth Korea
I knew about North Korean hackers—they still tricked me and got into my computer
By Ben WeissApril 2, 2026
11 hours ago

Most Popular

Gen Z fled San Francisco for Texas and Florida. Now they’re turning ‘welcomer cities’ into the next big tech towns
Real Estate
Gen Z fled San Francisco for Texas and Florida. Now they’re turning ‘welcomer cities’ into the next big tech towns
By Fortune EditorsApril 2, 2026
20 hours ago
Current price of gold as of April 1, 2026
Personal Finance
Current price of gold as of April 1, 2026
By Fortune EditorsApril 1, 2026
2 days ago
The tax escape map: Billionaires are bolting for Florida from the West Coast and taking billions in tax revenue with them
Real Estate
The tax escape map: Billionaires are bolting for Florida from the West Coast and taking billions in tax revenue with them
By Fortune EditorsApril 2, 2026
20 hours ago
Two-thirds of parents say their adult Gen Z kids still rely on them financially  for support—even though it's putting them under strain
Success
Two-thirds of parents say their adult Gen Z kids still rely on them financially  for support—even though it's putting them under strain
By Fortune EditorsMarch 31, 2026
2 days ago
Deutsche Bank asked AI if it’s true that AI will solve the economy’s inflation problems. The robots answered
Economy
Deutsche Bank asked AI if it’s true that AI will solve the economy’s inflation problems. The robots answered
By Fortune EditorsApril 1, 2026
1 day ago
Major 4-day workweek study suggests that when we work 5 days we spend one doing basically nothing
Success
Major 4-day workweek study suggests that when we work 5 days we spend one doing basically nothing
By Fortune EditorsApril 2, 2026
12 hours ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.