The Palantir software creator denies any wrongdoing and maintains that the failure was caused by the FBI specialists misusing the tool.
For more than a year, unauthorized individuals had access to sensitive investigations due to a flaw in the Palantir software used by the US FBI. As per The New York Post, the problem is mentioned in a statement from the Manhattan attorney’s office to the federal court in the case of hacker Virgil Griffith. Palantir rejects any culpability and maintains that the breakdown was caused by FBI specialists misusing the software.
Griffith was detained in 2019 on suspicion of supplying the DPRK with knowledge on how cryptocurrencies and blockchain may assist the regime in circumventing US prohibitions. The charge was based on information collected from the scammer’s social media profiles through the use of a court order in March 2020. According to prosecutors’ letter, material from Twitter and Facebook was put into Palantir technology with automatic updates, allowing unauthorized FBI personnel access to it.
Between May 2020 and August 2021, three researchers and one agent examined the information four times. As per the letter, an FBI agent assigned to Griffith’s case heard about the problem earlier this month from a coworker. The FBI agents who had access to the material informed the prosecutor’s office that they had no recollection of deploying it in their inquiries.
“In a separate investigation, an FBI analyst discovered linkages between the defendant and the target of this other investigation through searches on a Platform using return search warrants,” according to the letter.
According to Palantir, there was no software error, and the “client” simply did not follow “tight rules in place to secure returned orders.”