WASHINGTON, 5 March 2026 – The Federal Bureau of Investigation (FBI) has confirmed that it detected “suspicious activity” on its internal computer networks, prompting an investigation into a possible cyber intrusion involving systems that store sensitive law-enforcement data.
An FBI spokesperson said the agency had identified and addressed the unusual activity and mobilised technical teams to respond to the incident, though officials declined to disclose details about when the breach occurred or how extensive it may be.
Sensitive Surveillance Systems Potentially Targeted
According to reports, the activity may have affected a network connected to law-enforcement surveillance tools, including systems used to manage wiretaps and other investigative data.
The compromised system reportedly contains law-enforcement-sensitive information, including data linked to surveillance requests such as pen-register and trap-and-trace records, as well as personal information tied to investigative targets.
Authorities said the network involved is not classified, but it does contain sensitive information used in ongoing investigations.
Investigation Ongoing
The FBI has not publicly identified the source of the suspicious activity or confirmed whether any data was stolen. Officials said the agency is continuing to assess the scope and impact of the incident.
Cybersecurity experts note that US government networks are frequently targeted by state-backed hackers and sophisticated cybercrime groups, especially during periods of geopolitical tension.
Part of Growing Cybersecurity Concerns
The incident adds to a series of cybersecurity events involving US government institutions. Recent cyber incidents have affected other agencies, including the Congressional Budget Office and systems associated with the US federal courts.
Analysts say the growing number of attacks reflects the strategic importance of government networks and the value of intelligence-related information stored in such systems.
For now, the FBI maintains that the situation is under control and that investigators are working to determine whether the activity represents a cyberattack, attempted intrusion or internal security anomaly.




