Ex-Employee Suspected Of Leaking CIA Hacking Tools

The US government has identified a suspect in the leak last year of a large portion of the CIA's computer hacking arsenal, the cyber-tools the agency had used to conduct espionage operations overseas, according to interviews and public documents.

But despite months of investigation, prosecutors have been unable to bring charges against the man, who is a former CIA employee being held in a Manhattan jail on unrelated charges.

Joshua Adam Schulte, who worked for a CIA group that designs computer code to spy on foreign adversaries, is believed to have provided the agency's top-secret information to WikiLeaks, federal prosecutors acknowledged in a hearing in January. The anti-secrecy group published the code under the label "Vault 7" in March 2017.

It was one of the most significant leaks in the CIA's history, exposing secret cyber-weapons and spying techniques that might be used against the United States, according to current and former intelligence officials.

Some argued that the Vault 7 disclosures could cause more damage to American intelligence efforts than those by former National Security Agency contractor Edward Snowden. 

He revealed extraordinary details about the capabilities of the United States to spy on computers and phones around the world, but the Vault 7 leaks showed how such spying is actually done, the current and former officials argued.

Schulte, 29, already held without bail in Manhattan on child pornography charges, learned last Friday during a New York court appearance that additional charges were likely to be filed against him in about 45 days from what Assistant US Attorney Matthew Laroche said was a "broader investigation" unrelated to the pornography case.

"Mr Schulte has spent years working to ensure the safety of his country and is deeply saddened to hear that he could face charges of espionage," assistant federal defender Sabrina Shroff said on Tuesday.

At a January hearing, Laroche said Schulte was a target of an ongoing investigation into the theft of tools that were used by the CIA to spy overseas. His defence lawyers have insisted he was not involved.

The US government has all but publicly acknowledged the embarrassing leak from the CIA's Centre for Cyber Intelligence. President Donald Trump told a television host then, "I just want people to know the CIA was hacked, and a lot of things taken".
At January's hearing, Laroche said the material was taken from the CIA during the more than six years that Schulte worked for the agency in various positions, including technical development officer.

"The government immediately had enough evidence to establish that he was a target of that investigation," Laroche said.

"They conducted a number of search warrants on the defendant's residence."

Laroche said he disagreed with Schulte's lawyer at the time, who claimed the search warrants had not yielded anything consistent with the material released by WikiLeaks. "In fact, our investigation is ongoing," Laroche said. "He remains a target of that investigation."

Laroche told US District Judge Paul A. Crotty that the new charges were unlikely for several weeks.

"We're consulting with a lot of folks that are not within our office, so we're moving as quickly as we can on that front," he said.
The cryptic description at Friday's hearing led Shroff, who entered the case in March, to demand more.

"Are they secret charges that I'm not allowed to know about? What are these charges?" Shroff asked, saying she wanted to know of possible charges, whether they be sedition or something else. "Are they charging him with espionage?"

Laroche said it involved an ongoing grand jury investigation and added, "I don't think we have an obligation to disclose it at this time, but we certainly have had discussions with Ms. Shroff about the nature of the underlying investigation". Schulte, of New York, is being held at the Metropolitan Correctional Centre in Manhattan.

Jacob Kaplan, Schulte's attorney at the January hearing, told the court that "the government had full access to his computers and his phone, and they found the child pornography in this case, but what they didn't find was any connection to the WikiLeaks investigation".

Sydney Morning Herald:    Image: Nick Youngson

You Might Also Read:

CIA Malware Unveiled:

CIA Silent About Wikileaks Agency Files:
 

 

« NSA Spies Triple Text and Phone Collection
Secure Encrypted Email Platform PGP Is Not Secure »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Blue Solutions

Blue Solutions

Blue Solutions is a consultancy-led, accredited software distributor who provides IT solutions and support to small and medium enterprises.

Shavlik Protect

Shavlik Protect

Shavlik Protect is an easy-to-use security software solution that discovers missing patches and deploys them to the entire organization.

360Logica

360Logica

360Logica is a software testing company offering numerous kinds of testing services to improve the quality and performance of your software and IT systems.

CyberSmart

CyberSmart

CyberSmart is a platform that allows you to maintain compliance, achieve certification and secure your organisation.

HYAS Infosec

HYAS Infosec

HYAS is a highly skilled information security firm developing the next generation of information security technology.

StormWall

StormWall

StormWall is an Anti-DDoS protection service for websites and networks. We offer 100% protection from all types of DDoS attacks and 24/7 technical support.

TypingDNA

TypingDNA

TypingDNA uses AI to recognise people by the way they type on desktop keyboards and mobile devices.

Axcient

Axcient

Axcient offers MSPs the most secure backup and disaster recovery technology stack with a proven Business Availability suite.

ECOLUX

ECOLUX

ECOLUX is a professional IoT security service company committed to developing world-leading “IoT Lifecycle Security” technologies and products.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

Cyber Polygon

Cyber Polygon

Cyber Polygon is an annual online exercise which connects various global organisations to train their competencies and exchange best practices.

The Citadel Department of Defense Cyber Institute (CDCI)

The Citadel Department of Defense Cyber Institute (CDCI)

CDCI is established to address the critical national security needed for a skilled cybersecurity workforce.

xorlab

xorlab

xorlab is a Swiss cybersecurity company providing specialized, machine-intelligent defense against highly engineered, sophisticated and targeted email attacks.

Crypto Legal

Crypto Legal

Crypto Legal is a leading UK-based law firm specialising in blockchain forensics and legal services.

UltraViolet Cyber

UltraViolet Cyber

UltraViolet is an industry leading tech-enabled managed security services company.

MODUS X

MODUS X

MODUS X is a Ukrainian IT product and service company created from the IT department of the DTEK Group of Companies.