US immigration officials installed a whole load of personal apps on work phones

White House
(Image credit: David Everett Strickler / Unsplash)

US customs workers put their country at risk when they were found to have installed a bunch of personal apps on their work phones, an official rebuke has said.

An audit carried out by the US Department of Homeland Security Office of the Inspector General between April and August 2023 found that Immigration and Customs Enforcement (ICE)-managed devices had presented a serious security risk to the US government.

The result? No fewer than six recommendations were provided by the Inspector General in a management alert addressed to ICE’s Deputy Director.

Government put at risk by its own employees

According to the letter, “thousands” of applications had been installed on ICE devices by employees, contractors, and other agency workers, including “applications from companies banned from US Government information systems.”

The public version of the letter leaves some sections redacted, including the Inspector General’s mention of applications associated with two unknown entities. Given the US government’s recent approach to some Chinese firms, it’s possible that the two unknowns could be associated with spyware or malware – we can only speculate, though.

As well as banned apps and others associated with potentially malicious companies, countries, or developers, US ICE workers had also gone on to install third-party file-sharing applications (we all know the effects of the recent MOVEit breach), third-party VPNs, and third-party messaging apps, some of which with known vulnerabilities.

Ultimately, the Immigration and Customs Enforcement department was found to be at fault for “not sufficiently manag[ing], monitor[ing], or assess[ing] mobile applications.”

The first five recommendations directed at the ICE Chief Information Officer include: removing prohibited applications; assessing any breaches of sensitive information; introducing a process to assess and reduce such risks; introducing a policy to ensure that third-party applications on affected devices are up-to-date; and bringing the ICE and Department of Homeland Security (DHS) policies into better alignment.

The sixth suggestion is that the DHS Chief Information Security Officer investigates whether similar issues exist for other DHS agencies.

While some of the recommendations have already been acted upon, the report clearly signals the need for government agencies across the globe to keep their own policies up-to-date amid growing cybersecurity threats.

More from TechRadar Pro

Craig Hale

With several years’ experience freelancing in tech and automotive circles, Craig’s specific interests lie in technology that is designed to better our lives, including AI and ML, productivity aids, and smart fitness. He is also passionate about cars and the decarbonisation of personal transportation. As an avid bargain-hunter, you can be sure that any deal Craig finds is top value!

Read more
DeepSeek on a mobile phone
More US government departments ban controversial AI model DeepSeek
A hand holding an iPhone with the iCloud logo on screen.
US lawmakers want Trump to call out UK Apple iCloud encryption backdoor demand
An American flag flying outside the US Capitol building against a blue sky
Mass federal layoffs will have “devastating impact on cybersecurity, former NSA cybersecurity director warns
An American flag flying outside the US Capitol building against a blue sky
US military and defense contractors hit with Infostealer malware
IT
US government says companies are no longer allowed to send bulk data to these nations
Giant eye watching at man working at the computer. Surveillance, hacking, internet security concept. Flat vector illustration.
Israeli spyware company confirms US government and friends are customers
Latest in Security
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Data leak
A major Keenetic router data leak could put a million households at risk
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple routers hit by new critical severity remote command injection vulnerability, with no fix in sight
Code Skull
This dangerous new ransomware is hitting Windows, ARM, ESXi systems
An abstract image of a lock against a digital background, denoting cybersecurity.
Critical security flaw in Next.js could spell big trouble for JavaScript users
Latest in News
DeepSeek
Deepseek’s new AI is smarter, faster, cheaper, and a real rival to OpenAI's models
Open AI
OpenAI unveiled image generation for 4o – here's everything you need to know about the ChatGPT upgrade
Apple WWDC 2025 announced
Apple just announced WWDC 2025 starts on June 9, and we'll all be watching the opening event
Hornet swings their weapon in mid air
Hollow Knight: Silksong gets new Steam metadata changes, convincing everyone and their mother that the game is finally releasing this year
OpenAI logo
OpenAI just launched a free ChatGPT bible that will help you master the AI chatbot and Sora
An aerial view of an Instavolt Superhub for charging electric vehicles
Forget gas stations – EV charging Superhubs are using solar power to solve the most annoying thing about electric motoring