Ex-Employee Suspected Of Leaking CIA Hacking Tools

The US government has identified a suspect in the leak last year of a large portion of the CIA's computer hacking arsenal, the cyber-tools the agency had used to conduct espionage operations overseas, according to interviews and public documents.

But despite months of investigation, prosecutors have been unable to bring charges against the man, who is a former CIA employee being held in a Manhattan jail on unrelated charges.

Joshua Adam Schulte, who worked for a CIA group that designs computer code to spy on foreign adversaries, is believed to have provided the agency's top-secret information to WikiLeaks, federal prosecutors acknowledged in a hearing in January. The anti-secrecy group published the code under the label "Vault 7" in March 2017.

It was one of the most significant leaks in the CIA's history, exposing secret cyber-weapons and spying techniques that might be used against the United States, according to current and former intelligence officials.

Some argued that the Vault 7 disclosures could cause more damage to American intelligence efforts than those by former National Security Agency contractor Edward Snowden. 

He revealed extraordinary details about the capabilities of the United States to spy on computers and phones around the world, but the Vault 7 leaks showed how such spying is actually done, the current and former officials argued.

Schulte, 29, already held without bail in Manhattan on child pornography charges, learned last Friday during a New York court appearance that additional charges were likely to be filed against him in about 45 days from what Assistant US Attorney Matthew Laroche said was a "broader investigation" unrelated to the pornography case.

"Mr Schulte has spent years working to ensure the safety of his country and is deeply saddened to hear that he could face charges of espionage," assistant federal defender Sabrina Shroff said on Tuesday.

At a January hearing, Laroche said Schulte was a target of an ongoing investigation into the theft of tools that were used by the CIA to spy overseas. His defence lawyers have insisted he was not involved.

The US government has all but publicly acknowledged the embarrassing leak from the CIA's Centre for Cyber Intelligence. President Donald Trump told a television host then, "I just want people to know the CIA was hacked, and a lot of things taken".
At January's hearing, Laroche said the material was taken from the CIA during the more than six years that Schulte worked for the agency in various positions, including technical development officer.

"The government immediately had enough evidence to establish that he was a target of that investigation," Laroche said.

"They conducted a number of search warrants on the defendant's residence."

Laroche said he disagreed with Schulte's lawyer at the time, who claimed the search warrants had not yielded anything consistent with the material released by WikiLeaks. "In fact, our investigation is ongoing," Laroche said. "He remains a target of that investigation."

Laroche told US District Judge Paul A. Crotty that the new charges were unlikely for several weeks.

"We're consulting with a lot of folks that are not within our office, so we're moving as quickly as we can on that front," he said.
The cryptic description at Friday's hearing led Shroff, who entered the case in March, to demand more.

"Are they secret charges that I'm not allowed to know about? What are these charges?" Shroff asked, saying she wanted to know of possible charges, whether they be sedition or something else. "Are they charging him with espionage?"

Laroche said it involved an ongoing grand jury investigation and added, "I don't think we have an obligation to disclose it at this time, but we certainly have had discussions with Ms. Shroff about the nature of the underlying investigation". Schulte, of New York, is being held at the Metropolitan Correctional Centre in Manhattan.

Jacob Kaplan, Schulte's attorney at the January hearing, told the court that "the government had full access to his computers and his phone, and they found the child pornography in this case, but what they didn't find was any connection to the WikiLeaks investigation".

Sydney Morning Herald:    Image: Nick Youngson

You Might Also Read:

CIA Malware Unveiled:

CIA Silent About Wikileaks Agency Files:
 

 

« NSA Spies Triple Text and Phone Collection
Secure Encrypted Email Platform PGP Is Not Secure »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

VMworld

VMworld

VMworld is a global conference for virtualization and cloud computing, including associated security issues.

DNV

DNV

DNV are the independent expert in assurance and risk management. We deliver world-renowned testing, certification and technical advisory services.

NRD Cyber Security

NRD Cyber Security

NRD Cyber Security create a secure digital environment for countries, governments, and organisations and implement cybersecurity resilience enhancement projects around the world.

App-Ray

App-Ray

App-Ray provides fully automated security analysis of mobile applications to find security issues, privacy breaches and data leaking potentials.

Halon

Halon

Halon is a flexible security and operations platform for in-transit email.

Cyber Security Malta

Cyber Security Malta

Cyber Security Malta is part of Malta's National Cyber Security Strategy which aims to combat cybercrime, strengthen national cyber defence and provide cyber security awareness and education.

Irish National Accreditation Board (INAB)

Irish National Accreditation Board (INAB)

INAB is the national accreditation body for Ireland. The directory of members provides details of organisations offering certification services for ISO 27001.

ThreatSwitch

ThreatSwitch

ThreatSwitch a software platform for cleared federal contractors to get and stay compliant with NISPOM and Conforming Change 2.

TierPoint

TierPoint

TierPoint delivers secure, reliable, and connected infrastructure solutions at the internet’s edge. We meet you where you are in your journey to solve for data storage, compute, and recovery.

Strike Graph

Strike Graph

The Strike Graph GRC platform enables Security Audits & Certifications.

Apptega

Apptega

Apptega is an award-Winning Cybersecurity and Compliance Platform. Our mission is to make cybersecurity and compliance easy for everyone.

YorCyberSec

YorCyberSec

YorCyberSec act as a trusted Cyber and Information Security broker and procurement specialist. We help companies to Reduce Risk, Increase Assurance and Improve Performance.

Nitel

Nitel

Nitel is a leading next-generation technology services provider. We simplify the complex technology challenges of today’s enterprises to create seamless and integrated managed network solutions.

Hush

Hush

Hush is a premium privacy service that gives people unprecedented visibility and control of their digital footprint. Hush assesses threats, and goes to work to eliminate digital risks on your behalf.

NexGen Cyber

NexGen Cyber

NexGen Cyber helps customers in commercial SMB markets with IT security, security integration, service management, outsourced service transition, and transformative security solutions.

Clumio

Clumio

Clumio provides autonomous backup and recovery for critical cloud data.