Edouard.ai
Back to blogCybersécurité

Wanted Persons File Hacked: National Security Compromised

February 3, 2026
10 min read
389 views

Wanted Persons File Hacked: Criminals Alerted, Lives in Danger

"The file containing the list of all wanted persons in France has fallen into the hands of hackers. The consequences are terrifying."


Table of Contents

  1. What Is the Wanted Persons File?
  2. The Hack: What We Know
  3. Consequences for Security
  4. The Most At-Risk Individuals
  5. Why Is This Possible?
  6. Official Responses
  7. What This Reveals
  8. Legal and Political Consequences
  9. FAQ
  10. Conclusion: National Security Compromised
  11. Sources

The FPR -- Fichier des Personnes Recherchees (Wanted Persons File) -- is one of the most sensitive files held by French law enforcement. It records all individuals subject to an arrest warrant, a judicial search, or an international alert.

In 2024, this ultra-confidential file was compromised. Wanted criminals may now know they are being tracked. Investigations are potentially sabotaged. Lives may be in danger.


What Is the Wanted Persons File?

Arrest warrants, Interpol alerts: the ultra-secret file of all searches.

The Tracking File

The FPR is the central registry of persons wanted by French and international authorities.

It contains information on:

  • Persons under arrest warrants
  • Persons sought in connection with investigations
  • Persons flagged at the international level (Interpol, SIS II)
  • Persons banned from French territory
  • Persons subject to specific judicial measures

Data Contained

Type of Information Present
Full identity Yes
Photograph Yes
Physical description Yes
Last known addresses Yes
Nature of warrant/search Yes
Reason for search Yes
Issuing jurisdiction Yes
Instructions to law enforcement Yes
Danger level Yes
International connections Yes

Different Categories of Searches

Type Description
Arrest warrant Court order to apprehend a person
Summons warrant Order to bring a person before the court
Simple search Person to be located for an investigation
SIS II alert European-level search (Schengen)
Interpol notice International-level search
ITF Ban from French Territory

Who Accesses the FPR?

The file is accessible to:

  • National Police and Gendarmerie
  • Border Police
  • Customs
  • Intelligence services
  • European partners (via SIS II)
  • Interpol partners

Source: Ministry of the Interior


The Hack: What We Know

Silent intrusion, investigation underway: criminals know they are wanted.

The Breach Revealed

Information about this attack remains partially confidential for national security reasons. What has leaked:

Element Information
Presumed date 2024
Intrusion method Not public
Compromised data Potentially massive
Investigation Ongoing (DGSI, UNC)

Hypotheses on the Method

Several scenarios are being considered:

1. Theft of authorized accounts

  • Stolen credentials from authorized agents
  • "Legitimate" access used fraudulently

2. Exploitation of technical vulnerabilities

  • Vulnerabilities in access systems
  • Poorly secured interfaces

3. Internal complicity

  • Corrupt agent
  • Access resold

4. Attack on interconnections

  • Via European links (SIS II)
  • Via Interpol connections

The Feared Scope

If the complete file was exfiltrated, this means:

  • Thousands of arrest warrants exposed
  • Ongoing investigations potentially sabotaged
  • Dangerous criminals alerted to their wanted status
  • Agents possibly identified

Consequences for Security

Criminals on the run, investigations sabotaged, agents in danger: a security disaster.

1. Criminals Alerted

This is the most immediate and most severe consequence.

If a fugitive criminal learns they are wanted:

  • They can flee before being apprehended
  • They can destroy evidence
  • They can change identity
  • They can warn their accomplices
  • They can take measures against investigators

"Imagine an international drug trafficker who discovers that a European arrest warrant has been issued against him. Within hours, he can disappear and never be found again."

-- Source close to the investigation

2. Investigations Sabotaged

Many police operations rely on the element of surprise:

Compromised investigations:

  • Surveillance rendered useless
  • Wiretaps detected
  • Arrests made impossible
  • Networks that scatter

Years of work potentially lost on sensitive cases.

3. Law Enforcement in Danger

The FPR contains sensitive instructions:

Information exploitable by criminals:

  • Names of lead investigators
  • Services involved
  • Investigation methods
  • Surveillance points

Risks for agents:

  • Personal targeting
  • Reprisals against families
  • Intimidation

4. International Implications

The FPR is interconnected with:

European systems:

  • SIS II (Schengen Information System)
  • ECRIS (European Criminal Records Information System)

International systems:

  • Interpol
  • Europol

If the leak affected these interconnections, foreign partners are also impacted.


The Most At-Risk Individuals

Witnesses, victims, undercover agents: lives directly threatened by the leak.

1. Protected Witnesses

Some individuals in the FPR are witnesses under protection:

  • Informants
  • Witnesses in organized crime cases
  • Cooperating defendants

Their identification puts their lives directly in danger.

2. Victims Under Protection

Victims of violence benefit from registered protective measures:

  • Domestic violence victims with restraining orders
  • Assault witnesses
  • Harassment victims

3. Undercover Agents

Undercover investigators can be identified:

  • Agents working under cover
  • Paid informants
  • Confidential sources

4. Protected Personalities

Certain public figures benefit from special protections:

  • Threatened political officials
  • At-risk magistrates
  • Investigative journalists

Why Is This Possible?

Thousands of agents with access, insufficient security, multiple interconnections: gaping vulnerabilities.

1. A System That Is Too Accessible

The FPR is consulted daily by thousands of agents:

  • Traffic stops
  • Identity checks
  • Border crossings
  • Routine investigations

Each access point is a potential vulnerability.

2. Insufficient Security

Despite the sensitivity of the data:

Problem Finding
Authentication Often simple login/password
Access auditing Insufficient to detect anomalies
Encryption Variable depending on access method
Training Personnel not always properly trained

3. Interconnections

The multiplicity of access points increases risks:

  • Access from different services
  • International connections
  • Mobile terminals
  • Remote access

4. Chronic Underinvestment

As with other government files:

  • Insufficient cybersecurity budgets
  • Aging systems
  • Expertise draining to the private sector
  • Priority given to functionality over security

Official Responses

Investigation opened, but radio silence for national security reasons.

The Ministry of the Interior

The Ministry responded with:

  • Opening of an internal investigation
  • Referral to UNC (National Cyber Unit)
  • Involvement of the DGSI (General Directorate for Internal Security)
  • Announced reinforcement of security measures

Communication Limitations

For national security reasons, information remains limited:

  • No public confirmation of the scope
  • No list of compromised data
  • No communication to potentially affected individuals

This opacity, while understandable for security, raises questions about democratic transparency.


What This Reveals

If the FPR falls, what remains of DGSI, military, and nuclear files?

The Failure to Secure Sovereign Files

If even the FPR can be hacked, what about other sensitive files?

File Sensitivity Status
FPR Critical Compromised
TAJ Very high Compromised
DGSI/DGSE files Maximum ?
Military files Maximum ?
Nuclear files Maximum ?

Systemic Vulnerability

This case confirms a recurring pattern:

  1. Underinvestment in cybersecurity
  2. Obsolete systems not updated
  3. Too many access points poorly controlled
  4. Late detection of intrusions
  5. Firefighting response rather than prevention

Unanswered Questions

  • How many arrest warrants are compromised?
  • Have dangerous criminals been alerted?
  • Are investigations permanently sabotaged?
  • Are agents in danger?
  • Who is responsible?

Legal and Political Consequences

State responsibility engaged: administrative recourse and parliamentary oversight needed.

Responsibilities

The Ministry of the Interior is responsible for securing police files. A leak of this magnitude engages its responsibility:

  • Administrative
  • Potentially criminal (endangerment)
  • Political

Possible Recourse

For individuals potentially endangered:

Action against the State:

  • Before the administrative court
  • For endangerment
  • For failure to secure

Referral to the Defender of Rights:

  • For serious dysfunction
  • For violation of fundamental rights

Parliamentary Oversight

This case should be subject to:

  • A parliamentary inquiry commission
  • Oversight by the intelligence delegation
  • An independent audit of file security

FAQ

Have wanted persons been alerted?

This is the major risk of this leak. If criminals under arrest warrants have access to this information, they can know they are being searched for and take measures to evade justice.

Does this hack concern all arrest warrants?

The exact scope is not publicly known. The leak may be partial or total. Authorities are maintaining ambiguity for security reasons.

Are police officers in danger?

Potentially. If investigator names and operation details have leaked, agents may be targeted for reprisals.

Can I find out if I am in the FPR?

The FPR is not accessible to the public. Only judicial and police authorities can consult it. Unlike the TAJ, there is no right-of-access procedure for private individuals.

Who is responsible for this leak?

The investigation is ongoing. Responsibilities may be multiple: external hackers, technical vulnerabilities, or internal complicity.


Conclusion: National Security Compromised

The hacking of the Wanted Persons File is far more than a technical incident. It is an attack on national security.

Key takeaways:

  1. Dangerous criminals may know they are wanted
  2. Investigations are potentially sabotaged
  3. Lives may be endangered
  4. The State has failed in its security mission
  5. Trust in institutions is shaken

This case is part of a broader context of digital vulnerability among French institutions. TAJ, CAF, France Travail, hospitals... and now the most sensitive police files.

For a complete assessment: France: A Digital Security Sieve.

For the other compromised police file: TAJ Criminal Records File Hacked.



Related Articles -- Cybersecurity & Data Protection

Sources


This content is for informational purposes and does not constitute legal advice.

Share:

Want to know more?

Discover all our articles and guides to master crypto.

View all articles