Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity NewsGovernment: Federal, State and Local

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

By Jordyn Alger, Managing Editor
Padlock with computer keys
FlyD via Unsplash
April 6, 2026

Upon investigating suspicious activity related to an FBI surveillance system, the agency has confirmed this breach is a “major incident” under the Federal Information Security Modernization Act (FISMA), a statute regarding federal data security.

According to a notice viewed by Politico, the impacted system contained “returns from legal process, such as pen register and trap and trace surveillance returns, and personally identifiable information pertaining to subjects of FBI investigations.”

Pen register and trap and trace devices enable the FBI to monitor calls to and from specific phones as well as websites accessed by an internet-connected device. While communication content is not recorded by these devices, the information potentially accessed in the breach could reveal: 

  • FBI criminal probes 
  • Targets of FBI surveillance 

Below, security leaders discuss this breach and share insights. 

Security Leaders Weigh In

Michael Bell, Founder & CEO, Suzu Labs:

The FBI just classified the breach of its wiretap surveillance network as a FISMA major incident. The system is the Digital Collection System Network, which stores court-authorized wiretap returns, pen register metadata, FISA warrant data, and personally identifiable information on active FBI investigation targets. The attackers got in through a vendor ISP that connects to the FBI’s network, not through the FBI’s own defenses. The Wall Street Journal reports that investigators suspect Chinese government-affiliated hackers.

This is the same playbook. Salt Typhoon compromised lawful intercept systems at AT&T and Verizon in 2024 by exploiting the telecom infrastructure that CALEA requires carriers to maintain for government surveillance. Now someone used the same supply chain approach on the FBI’s end of that infrastructure. CALEA mandated wiretap capability in 1994. Nobody mandated that the capability be secured against adversaries. Senator Wyden proposed legislation to fix that after the Salt Typhoon telecom breaches. It went nowhere. The vulnerability is still open.

The data in DCSNet is among the most sensitive in federal law enforcement. Active wiretap targets, investigation subjects, counterterrorism case details. If a foreign intelligence service has that information, they know who the FBI is watching, what methods are in use, and which operations are active. That’s a counterintelligence problem that doesn’t get fixed by patching the ISP.

The FBI had at least three distinct cyber incidents in March 2026. The DCSNet breach is attributed to suspected Chinese state-sponsored actors. The Kash Patel email compromise was claimed by Iran’s Handala Hack Team. Politico reports additional intrusions involving internal systems. Multiple adversaries, different attack vectors, one agency, one month. The White House, DHS, and NSA all joined the DCSNet investigation, which is not the response you see for a routine breach.”

Matt Wyckhouse, Founder and CEO, Finite State:

This is another reminder that product security is now a national security issue. Threat actors like Volt Typhoon aren’t just targeting hardened systems — they’re exploiting weaknesses across the broader connected-device ecosystem to gain access and persistence.

The U.S. still doesn’t have a consistent, enforceable baseline for product and software supply chain security, and recent moves have pushed us toward a more fragmented model. Meanwhile, Europe is putting real requirements in place through the Cyber Resilience Act.

That gap is becoming harder to justify when the same connected technologies underpin everything from consumer devices to critical infrastructure and sensitive government systems.

KEYWORDS: data breach FBI national security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Art museum

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

NYPD car

Explosives Thrown in Attempted Terrorist Attack Near NYC Mayor’s Home

American flag

Security Leaders Discuss Trump’s Cyber Strategy for America

Security Officer

Discussing Use of Force in Security: A Challenging Discussion?

Product Spotlight

ISC West 2026 Product Preview

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Trees around The Capitol Building

    CISA Director Jen Easterly to resign, cybersecurity experts weigh in

    See More
  • Adidas shoes

    Adidas Confirms Data Breach, Security Leaders Weigh In

    See More
  • Laptop with coding on screen

    Security leaders weigh in on Life360 data breach

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • s in europe.jpg

    Surveillance in Europe

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing