Menu Close

FBI Palantir glitch allowed unauthorized access to private data

A personal computer glitch in a secretive program software made use of by the FBI allowed some unauthorized employees to accessibility private knowledge for extra than a year, prosecutors disclosed in a new court submitting.

The screw-up in the Palantir system — a software created by a sprawling facts analytics company co-started by billionaire Peter Thiel — was comprehensive in a letter by prosecutors in the Manhattan federal courtroom situation towards accused hacker Virgil Griffith.

Information recovered from Griffith’s Fb and Twitter accounts, which was obtained by a federal lookup warrant in March 2020, was accessed on Palantir for more than a year by at the very least 4 FBI personnel, all of whom perform outdoors of New York and had been not investigating the situation, prosecutors wrote. 

The FBI case agent assigned to Griffith’s case was alerted to the unauthorized entry earlier this month, when yet another agent emailed him and stated an analyst accessed the research warrant materials on Palantir, in accordance to the letter. 

“An FBI analyst, in the program of conducting a individual investigation, had determined communications concerning the defendant and the issue of that other investigation by implies of queries on the System that accessed the Look for Warrant Returns,” the feds wrote in the letter submitted Tuesday. 

A glitch in Palantir authorized some unauthorized employees to accessibility personal details for more than a year.

Federal prosecutors in Manhattan established the FBI staff — 3 analysts and an agent — had been equipped to check out the substance since it was entered in Palantir by the program’s default settings.

“When info is loaded onto the System, the default location is to permit accessibility to the knowledge to other FBI personnel or else licensed to entry the Platform,” prosecutors wrote in the letter. 

The material was accessed at minimum 4 moments from May 2020 to August 2021, in accordance to the letter. 

The workforce who accessed the information advised prosecutors that they did not remember making use of the information and facts in their investigations.

Manhattan prosecutors instructed Palantir employees to delete the knowledge on Aug. 17 and stated they do not intend on making use of the info in their circumstance in opposition to Griffith, according to the letter. 

The mishap could propose a broader challenge with the FBI’s use of Palantir, mentioned Albert Fox Cahn, the founder of Surveillance Know-how Oversight Undertaking, a privateness and civil legal rights team.

“Since this exact problem will happen when files are uploaded with the default settings, and considering that there doesn’t appear to be to be any form of automatic notice when they have been improperly accessed, this implies that it’s going on a ton more than just this one particular situation,” he said. 

Griffith is accused of violating global sanctions by touring to North Korea and offering a speech about cryptocurrency. 

He pleaded not guilty immediately after his arrest in 2019 and was subsequently purchased held in jail pending his demo this yr, according to court docket filings. 

Lawyers for Griffith and Palantir did not reply to requests for comment from The Write-up. A spokesperson for the New York FBI office declined to remark. 

Source connection