{"id":52060,"date":"2023-05-24T14:08:56","date_gmt":"2023-05-24T14:08:56","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34650\/Widespread-FBI-Abuse-Of-Foreign-Spy-Law-Sets-Off-Alarm-Bells.html"},"modified":"2023-05-24T14:08:56","modified_gmt":"2023-05-24T14:08:56","slug":"widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\/","title":{"rendered":"Widespread FBI Abuse Of Foreign Spy Law Sets Off Alarm Bells"},"content":{"rendered":"<figure class=\"intro-image intro-left\"> <img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2023\/05\/GettyImages-73534290-800x534.jpg\" alt=\"Widespread FBI abuse of foreign spy law sets off \u201calarm bells,\u201d tech group says\"><figcaption class=\"caption\"><\/figcaption><\/figure>\n<aside id=\"social-left\" class=\"social-left\" aria-label=\"Read the comments or share this article\"> <a class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/tech-policy\/2023\/05\/fbi-misused-foreign-surveillance-law-280k-times-to-snoop-on-people-in-the-us\/?comments=1\"> <\/p>\n<h4 class=\"comment-count-before\">reader comments<\/h4>\n<p> <span class=\"comment-count-number\">97<\/span> <span class=\"visually-hidden\"> with <\/span> <\/a> <\/aside>\n<p> <!-- cache hit 204:single\/related:eb48d89ab0df9ce72d563be962ea99cc --><!-- empty --><\/p>\n<p>The FBI isn&#8217;t supposed to use <a href=\"https:\/\/arstechnica.com\/tech-policy\/2023\/02\/the-fbis-most-controversial-surveillance-tool-is-under-threat\/2\/\">its most controversial spy tool<\/a> to snoop on emails, texts, and other private communications of Americans or anyone located in the United States. However, that didn&#8217;t stop the FBI from sometimes knowingly using its Foreign Intelligence Surveillance Act (FISA) Section 702 powers to conduct warrantless searches on US persons more than 280,000 times in 2020 and 2021, according to <a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2023\/05\/US-Foreign-Intelligence-Surveillance-Court-Section-702-FBI-report-4-21-2022.pdf\">new disclosures<\/a>.&nbsp;US Senator Ron Wyden (D-Ore.)&nbsp;<a href=\"https:\/\/www.wyden.senate.gov\/news\/press-releases\/wyden-calls-for-reforms-to-fisa-surveillance-following-disclosure-of-new-abuses\">described<\/a> the searches as&nbsp; &#8220;shocking abuses.&#8221;<\/p>\n<p>Among the most concerning <a href=\"https:\/\/cdt.org\/insights\/cdt-issue-brief-debunking-myths-fixing-fisa-s702-backdoor-search-loophole\/\">so-called backdoor searches<\/a> on Americans were disclosures that the FBI ran more than 23,000 queries on people involved in storming the US Capitol, 19,000 on political campaign donors, and 133 on protesters after the police killing of George Floyd. The deputy director of the Center for Democracy and Technology&#8217;s Security and Surveillance Project, Jake Laperruque, said that &#8220;these latest revelations should set off alarm bells across Congress,&#8221; urging lawmakers in a <a href=\"https:\/\/cdt.org\/press\/shocking-new-fbi-political-surveillance-disclosures-highlight-need-for-fisa-reform\/\">statement<\/a> not to re-authorize FISA Section 702 at the end of this year\u2014when it&#8217;s due to expire\u2014without a &#8220;full overhaul.&#8221;<\/p>\n<p>&#8220;The systemic misuse of this warrantless surveillance tool has made FISA 702 as toxic as COINTELPRO and the FBI abuses of the Hoover years,&#8221; Laperruque said, while his group&#8217;s press release noted that the court opinion &#8220;confirmed the worst fears of civil rights and civil liberties advocates.<\/p>\n<p>&#8220;We now know that the FBI, which has already been under scrutiny for a litany of past compliance violations involving Section 702, engaged in improper searches for Americans\u2019 communications targeted at political activities and actors,&#8221; the press release said.<\/p>\n<p>These revelations came to light after a <a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2023\/05\/US-Foreign-Intelligence-Surveillance-Court-Section-702-FBI-report-4-21-2022.pdf\">heavily redacted court opinion<\/a>\u2014decided in April 2022 by the US Foreign Intelligence Surveillance Court (FISC, also known as FISA Court)\u2014was newly unclassified last Friday. It detailed the &#8220;FBI&#8217;s pattern of conducting broad, suspicionless&#8221; queries and confirmed that Section 702 compliance issues have &#8220;continued to surface.&#8221;<\/p>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<p>The FISC order prompted the FBI to implement &#8220;technological and training responses&#8221; that have seemingly led to a &#8220;sharp decline&#8221; in warrantless searches accessing Americans&#8217; data from December 2021 to November 2022, according to a <a href=\"https:\/\/lahood.house.gov\/news?ContentRecord_id=50BBCE3B-C4B4-4D80-9565-2BB2C28A96E2\">press release<\/a> from US Representative Darin LaHood (R-Ill.). This is partly due to mandatory training that the FBI told the court had a 97.5 percent completion rate as of February 2022. Anyone who didn&#8217;t complete the training reportedly lost access to run Section 702 queries, the FBI told the court.&nbsp;Moving forward, FBI employees will have to complete annual training with a pass\/fail test.<\/p>\n<p>As the FBI continues to assess compliance issues, the FISC presiding judge who wrote the order, Rudolph Contreras, said that &#8220;perfect implementation is unrealistic,&#8221; and more reforms may be needed.<\/p>\n<p>&#8220;Compliance problems with the FBI&#8217;s querying of Section 702 information have proven to be persistent and widespread,&#8221; Contreras wrote. &#8220;If they are not substantially mitigated by these recent measures, it may become necessary to consider other responses, such as substantially limiting the number of FBI personnel with access to unminimized Section 702 information.&#8221;<\/p>\n<h2>Investigating the FBI\u2019s many missteps<\/h2>\n<p>LaHood <a href=\"https:\/\/arstechnica.com\/tech-policy\/2023\/02\/the-fbis-most-controversial-surveillance-tool-is-under-threat\/2\/\">leads a bipartisan working group charged with proposing Section 702 reforms<\/a> &#8220;to help deter abusive behavior by the FBI&#8221; by conducting a &#8220;thorough and comprehensive review of FISA&#8221; and confronting the &#8220;missteps and inappropriate actions taken by the FBI.&#8221;<\/p>\n<p>Contreras&#8217; opinion described some of these missteps as the FBI &#8220;frequently&#8221; violating querying standards by accessing information on Americans and then sometimes failing to purge that information once it was discovered.<\/p>\n<p>Some FBI personnel claimed that they couldn&#8217;t remember why they conducted some of these improper searches. Others claimed that queries on Black Lives Matters protesters were proper simply because they had been arrested. Personnel also said that queries on people who stormed the US Capitol were appropriate because these people were generally viewed as a threat to national security. Perhaps most alarming, one FBI employee had to be immediately retrained after admitting that he seemingly hid many incidents of abuse by always recording queries as not involving US persons, even if &#8220;the facts indicated otherwise.&#8221;<\/p>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<p>The court disagreed with all the FBI&#8217;s attempts to legitimize the improper searches but also validated the current process as generally sufficient to safeguard private information about people in the US.<\/p>\n<p>Regarding threats to Fourth Amendment protections, Contreras wrote that the FBI&#8217;s current querying standards are also sufficient but clarified that &#8220;if the scope and pervasiveness of FBI querying violations were to continue unabated, they would present greater statutory and Fourth Amendment difficulties in the future.&#8221;<\/p>\n<p>&#8220;There is a point at which it would be untenable to base findings of sufficiency on long promised, but still unrealized, improvements in how the FBI queries Section 702 information,&#8221; Contreras wrote.<\/p>\n<p>LaHood has said that his working group does not anticipate Congress re-authorizing Section 702 unless more serious reforms are implemented.<\/p>\n<p>\u201cWithout additional safeguards, a clean reauthorization of 702 is a non-starter,&#8221; LaHood said in his press release.<\/p>\n<p>Ars could not immediately reach the FBI or LaHood for comment.<\/p>\n<p>In his statement, Wyden said that he was &#8220;disappointed at the extent of the redactions&#8221; in the FISC opinions, saying that the Director of National Intelligence (DNI) needs &#8220;to inform the public about how the government and the FISA Court are interpreting the law.&#8221;<\/p>\n<p>&#8220;There is important, secret information about how the government has interpreted Section 702 that Congress and the American people need to see before the law is renewed,\u201d Wyden said.<\/p>\n<p>Laperruque agreed with this criticism, telling Ars that &#8220;we&#8217;ve made major improvements to the FISA Court over the last decade but we need to build on them, because serious issues remain.&#8221; Most critically, Laperruque told Ars that &#8220;the government has been able to block disclosure to defendants when FISA 702 is used and invoke standing and state secrets issues to block litigation on procedural grounds and avoid debating FISA 702 in court on its substance.&#8221;<\/p>\n<p>&#8220;That needs to change,&#8221; Laperruque said.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34650\/Widespread-FBI-Abuse-Of-Foreign-Spy-Law-Sets-Off-Alarm-Bells.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":52061,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[10529],"class_list":["post-52060","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentprivacyusaphonespywarefbi"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Widespread FBI Abuse Of Foreign Spy Law Sets Off Alarm Bells 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Widespread FBI Abuse Of Foreign Spy Law Sets Off Alarm Bells 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-24T14:08:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2023\/05\/GettyImages-73534290-800x534.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Widespread FBI Abuse Of Foreign Spy Law Sets Off Alarm Bells\",\"datePublished\":\"2023-05-24T14:08:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\\\/\"},\"wordCount\":989,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells.jpg\",\"keywords\":[\"headline,government,privacy,usa,phone,spyware,fbi\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\\\/\",\"name\":\"Widespread FBI Abuse Of Foreign Spy Law Sets Off Alarm Bells 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells.jpg\",\"datePublished\":\"2023-05-24T14:08:56+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells.jpg\",\"width\":800,\"height\":534},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,privacy,usa,phone,spyware,fbi\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentprivacyusaphonespywarefbi\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Widespread FBI Abuse Of Foreign Spy Law Sets Off Alarm Bells\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Widespread FBI Abuse Of Foreign Spy Law Sets Off Alarm Bells 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\/","og_locale":"en_US","og_type":"article","og_title":"Widespread FBI Abuse Of Foreign Spy Law Sets Off Alarm Bells 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-05-24T14:08:56+00:00","og_image":[{"url":"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2023\/05\/GettyImages-73534290-800x534.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Widespread FBI Abuse Of Foreign Spy Law Sets Off Alarm Bells","datePublished":"2023-05-24T14:08:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\/"},"wordCount":989,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells.jpg","keywords":["headline,government,privacy,usa,phone,spyware,fbi"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\/","url":"https:\/\/www.threatshub.org\/blog\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\/","name":"Widespread FBI Abuse Of Foreign Spy Law Sets Off Alarm Bells 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells.jpg","datePublished":"2023-05-24T14:08:56+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells.jpg","width":800,"height":534},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/widespread-fbi-abuse-of-foreign-spy-law-sets-off-alarm-bells\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,privacy,usa,phone,spyware,fbi","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentprivacyusaphonespywarefbi\/"},{"@type":"ListItem","position":3,"name":"Widespread FBI Abuse Of Foreign Spy Law Sets Off Alarm Bells"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52060","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=52060"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52060\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/52061"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=52060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=52060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=52060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}