Ex-U.S. intel operatives admit hacking American networks
for UAE
Send a link to a friend
[September 15, 2021] By
Joel Schectman and Christopher Bing
WASHINGTON (Reuters) -Three former U.S.
intelligence operatives who worked as cyber spies for the United Arab
Emirates admitted to violating U.S. hacking laws and prohibitions on
selling sensitive military technology, under a deal to avoid prosecution
announced on Tuesday.
The operatives - Marc Baier, Ryan Adams and Daniel Gericke - were part
of a clandestine unit named Project Raven, first reported
https://www.reuters.com/investigates/
special-report/usa-spying-raven by Reuters, that helped the UAE spy on
its enemies.
At the behest of the UAE’s monarchy, the Project Raven team hacked into
the accounts of human rights activists, journalists and rival
governments, Reuters reported.
The three men admitted to hacking into computer networks in the United
States and exporting sophisticated cyber intrusions tools without
gaining required permission from the U.S. government, according to court
papers released in U.S. federal court in Washington, D.C., on Tuesday.
The operatives and their attorneys did not respond to requests for
comment.
The UAE embassy in Washington, D.C., did not immediately respond to a
request for comment.
As part of the deal with federal authorities to avoid prosecution, the
three former intelligence officials agreed to pay a combined $1.69
million and never again seek a U.S. security clearance, a requirement
for jobs that entail access to national security secrets.
“Hackers-for-hire and those who otherwise support such activities in
violation of U.S. law should fully expect to be prosecuted for their
criminal conduct,” Acting Assistant Attorney General Mark J. Lesko for
the Justice Department’s National Security Division said in a statement.
Revelations of Project Raven in 2019 by Reuters highlighted the growing
practice of former intelligence operatives selling their spycraft
overseas with little oversight or accountability.
“This is a clear message to anybody, including former U.S. government
employees, who had considered using cyberspace to leverage
export-controlled information for the benefit of a foreign government or
a foreign commercial company,” Assistant Director Bryan Vorndran of the
FBI’s Cyber Division said in a statement. “There is risk, and there will
be consequences.”
[to top of second column] |
General view of the
Robert F. Kennedy Department of Justice Building in Washington,
U.S., March 10, 2019. REUTERS/Mary F. Calvert
Lori Stroud, a former U.S. National Security Agency analyst who worked
on Project Raven and then acted as a whistleblower
https://www.reuters.com/investigates/
special-report/usa-spying-raven, said she was pleased to see the
charges.
“The most significant catalyst to bringing this issue to light was
investigative journalism - the timely, technical information reported
created the awareness and momentum to ensure justice," she said.
The Reuters investigation found that Project Raven spied on numerous
human rights activists
https://www.reuters.com/investigates/
special-report/usa-spying-karma, some of whom were later tortured by UAE
security forces.
Former program operatives said they believed they were following the law
because superiors promised them the U.S. government had approved the
work.
Baier, Adams and Gericke admitted to deploying a sophisticated
cyberweapon called “Karma” that allowed the UAE to hack into Apple
iPhones without requiring a target to click on malicious links,
according to court papers.
Karma allowed users to access tens of millions of devices and qualified
as an intelligence gathering system under federal export control rules.
But the operatives did not obtain the required U.S. government
permission to sell the tool to the UAE, authorities said.
Project Raven used Karma
https://www.reuters.com/investigates/
special-report/usa-spying-karma to hack into thousands of targets
including a Nobel Prize-winning Yemeni human rights activist and a BBC
television show host, Reuters reported.
(Reporting by Christopher Bing and Joel Schectman; Editing by Kieran
Murray and Stephen Coates)
[© 2021 Thomson Reuters. All rights
reserved.] Copyright 2021 Reuters. All rights reserved. This material may not be published,
broadcast, rewritten or redistributed.
Thompson Reuters is solely responsible for this content. |