Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity NewsGovernment: Federal, State and Local

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

By Jordyn Alger, Managing Editor
Padlock with computer keys
FlyD via Unsplash
April 6, 2026

Upon investigating suspicious activity related to an FBI surveillance system, the agency has confirmed this breach is a “major incident” under the Federal Information Security Modernization Act (FISMA), a statute regarding federal data security.

According to a notice viewed by Politico, the impacted system contained “returns from legal process, such as pen register and trap and trace surveillance returns, and personally identifiable information pertaining to subjects of FBI investigations.”

Pen register and trap and trace devices enable the FBI to monitor calls to and from specific phones as well as websites accessed by an internet-connected device. While communication content is not recorded by these devices, the information potentially accessed in the breach could reveal: 

  • FBI criminal probes 
  • Targets of FBI surveillance 

Below, security leaders discuss this breach and share insights. 

Security Leaders Weigh In

Michael Bell, Founder & CEO, Suzu Labs:

The FBI just classified the breach of its wiretap surveillance network as a FISMA major incident. The system is the Digital Collection System Network, which stores court-authorized wiretap returns, pen register metadata, FISA warrant data, and personally identifiable information on active FBI investigation targets. The attackers got in through a vendor ISP that connects to the FBI’s network, not through the FBI’s own defenses. The Wall Street Journal reports that investigators suspect Chinese government-affiliated hackers.

This is the same playbook. Salt Typhoon compromised lawful intercept systems at AT&T and Verizon in 2024 by exploiting the telecom infrastructure that CALEA requires carriers to maintain for government surveillance. Now someone used the same supply chain approach on the FBI’s end of that infrastructure. CALEA mandated wiretap capability in 1994. Nobody mandated that the capability be secured against adversaries. Senator Wyden proposed legislation to fix that after the Salt Typhoon telecom breaches. It went nowhere. The vulnerability is still open.

The data in DCSNet is among the most sensitive in federal law enforcement. Active wiretap targets, investigation subjects, counterterrorism case details. If a foreign intelligence service has that information, they know who the FBI is watching, what methods are in use, and which operations are active. That’s a counterintelligence problem that doesn’t get fixed by patching the ISP.

The FBI had at least three distinct cyber incidents in March 2026. The DCSNet breach is attributed to suspected Chinese state-sponsored actors. The Kash Patel email compromise was claimed by Iran’s Handala Hack Team. Politico reports additional intrusions involving internal systems. Multiple adversaries, different attack vectors, one agency, one month. The White House, DHS, and NSA all joined the DCSNet investigation, which is not the response you see for a routine breach.

Matt Wyckhouse, Founder and CEO, Finite State:

This is another reminder that product security is now a national security issue. Threat actors like Volt Typhoon aren’t just targeting hardened systems — they’re exploiting weaknesses across the broader connected-device ecosystem to gain access and persistence.

The U.S. still doesn’t have a consistent, enforceable baseline for product and software supply chain security, and recent moves have pushed us toward a more fragmented model. Meanwhile, Europe is putting real requirements in place through the Cyber Resilience Act.

That gap is becoming harder to justify when the same connected technologies underpin everything from consumer devices to critical infrastructure and sensitive government systems.

KEYWORDS: data breach FBI national security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Trees around The Capitol Building

    CISA Director Jen Easterly to resign, cybersecurity experts weigh in

    See More
  • Adidas shoes

    Adidas Confirms Data Breach, Security Leaders Weigh In

    See More
  • Laptop with coding on screen

    Security leaders weigh in on Life360 data breach

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • s in europe.jpg

    Surveillance in Europe

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing