BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
CIPHER
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
CIPHERThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Federal Apps Deploy Sanctioned Tracking SDKs and Excessive Permissions

Federal Apps Deploy Sanctioned Tracking SDKs and Excessive Permissions

mediumPrivacy & Surveillance|March 29, 20262 min read

Originally reported by Sam Bent

#government-apps#mobile-privacy#tracking-sdks#permissions-abuse#supply-chain
Share

TL;DR

Security researcher Sam Bent identified serious privacy issues in federal mobile applications, including the White House app shipping with a sanctioned Chinese tracking SDK and FEMA requesting 28 permissions for basic weather alerts.

Why medium?

Government apps containing sanctioned Chinese SDKs represents a significant privacy and security concern, though no active exploitation is confirmed. The excessive permissions and tracking behavior warrant attention from security practitioners.

Federal Apps Harbor Privacy Violations

Security researcher Sam Bent has documented concerning privacy practices across 13 federal government mobile applications, revealing a pattern of excessive data collection that mirrors the behavior of apps these same agencies have previously flagged as security risks.

White House App Contains Sanctioned SDK

The official White House mobile application ships with a tracking SDK from a sanctioned Chinese company, according to Bent's analysis. This represents a significant supply chain security failure, as federal agencies have previously warned against applications containing similar tracking components from Chinese vendors.

The presence of sanctioned tracking technology in an official government application raises questions about app vetting processes and supply chain oversight within federal IT procurement.

Excessive Permission Requests Across Agencies

Bent's research identified a broader pattern of aggressive data collection across federal apps:

  • FEMA app: Requests 28 permissions to deliver basic weather alerts
  • FBI app: Serves advertisements alongside law enforcement content
  • Multiple agencies: Request access to device sensors, location data, and personal information far exceeding functional requirements

These permission requests often exceed what commercial apps require for similar functionality, suggesting inadequate privacy-by-design implementation in federal mobile development.

Security Implications

The findings highlight several critical security concerns:

  • Supply chain compromise: Sanctioned tracking SDKs embedded in official government applications
  • Attack surface expansion: Excessive permissions create additional vectors for potential exploitation
  • Data exposure: Government apps collecting citizen data through the same mechanisms agencies warn against in foreign applications

Regulatory Disconnect

The research exposes a disconnect between federal cybersecurity guidance and internal practices. Agencies that have issued warnings about foreign tracking SDKs and excessive app permissions are deploying similar technologies in their own mobile applications.

This pattern suggests inadequate application of the same security standards internally that agencies recommend for private sector and citizen use.

Mitigation Recommendations

Security teams should consider:

  • Auditing government app installations for unnecessary permissions
  • Implementing mobile device management policies that restrict government app permissions to functional minimums
  • Monitoring federal app network traffic for unexpected data transmission patterns

Sources

https://www.sambent.com/the-white-house-app-has-huawei-spyware-and-an-ice-tip-line/

Originally reported by Sam Bent

Tags

#government-apps#mobile-privacy#tracking-sdks#permissions-abuse#supply-chain

Tracked Companies

🇨🇳Huawei

Related Intelligence

  • Dutch Defense Secretary Proposes Jailbreaking F-35 Jets to Reduce US Software Dependency

    mediumMar 10, 2026
  • AI Regulation Under Attack, Defense Tech Turmoil, and Satellite Warfare Tactics Shape Digital Battleground

    mediumMar 26, 2026
  • Friday Squid Blogging: Bioluminescent Bacteria in Squid

    informationalMar 28, 2026

Related Knowledge

  • CIPHER Privacy Engineering Deep Training

    privacy
  • CIPHER Privacy Regulations Deep Training

    privacy
  • CIPHER Training: Privacy, OSINT & Forensics Deep Knowledge

    privacy

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Infinity Stealer Targets macOS Users Through ClickFix Social Engineering

Next Article

FBI Director's Email Compromised by Iranian Hackers as Microsoft Patches DNS Security Flaws→