Ex-Employee Suspected Of Leaking CIA Hacking Tools

The US government has identified a suspect in the leak last year of a large portion of the CIA's computer hacking arsenal, the cyber-tools the agency had used to conduct espionage operations overseas, according to interviews and public documents.

But despite months of investigation, prosecutors have been unable to bring charges against the man, who is a former CIA employee being held in a Manhattan jail on unrelated charges.

Joshua Adam Schulte, who worked for a CIA group that designs computer code to spy on foreign adversaries, is believed to have provided the agency's top-secret information to WikiLeaks, federal prosecutors acknowledged in a hearing in January. The anti-secrecy group published the code under the label "Vault 7" in March 2017.

It was one of the most significant leaks in the CIA's history, exposing secret cyber-weapons and spying techniques that might be used against the United States, according to current and former intelligence officials.

Some argued that the Vault 7 disclosures could cause more damage to American intelligence efforts than those by former National Security Agency contractor Edward Snowden. 

He revealed extraordinary details about the capabilities of the United States to spy on computers and phones around the world, but the Vault 7 leaks showed how such spying is actually done, the current and former officials argued.

Schulte, 29, already held without bail in Manhattan on child pornography charges, learned last Friday during a New York court appearance that additional charges were likely to be filed against him in about 45 days from what Assistant US Attorney Matthew Laroche said was a "broader investigation" unrelated to the pornography case.

"Mr Schulte has spent years working to ensure the safety of his country and is deeply saddened to hear that he could face charges of espionage," assistant federal defender Sabrina Shroff said on Tuesday.

At a January hearing, Laroche said Schulte was a target of an ongoing investigation into the theft of tools that were used by the CIA to spy overseas. His defence lawyers have insisted he was not involved.

The US government has all but publicly acknowledged the embarrassing leak from the CIA's Centre for Cyber Intelligence. President Donald Trump told a television host then, "I just want people to know the CIA was hacked, and a lot of things taken".
At January's hearing, Laroche said the material was taken from the CIA during the more than six years that Schulte worked for the agency in various positions, including technical development officer.

"The government immediately had enough evidence to establish that he was a target of that investigation," Laroche said.

"They conducted a number of search warrants on the defendant's residence."

Laroche said he disagreed with Schulte's lawyer at the time, who claimed the search warrants had not yielded anything consistent with the material released by WikiLeaks. "In fact, our investigation is ongoing," Laroche said. "He remains a target of that investigation."

Laroche told US District Judge Paul A. Crotty that the new charges were unlikely for several weeks.

"We're consulting with a lot of folks that are not within our office, so we're moving as quickly as we can on that front," he said.
The cryptic description at Friday's hearing led Shroff, who entered the case in March, to demand more.

"Are they secret charges that I'm not allowed to know about? What are these charges?" Shroff asked, saying she wanted to know of possible charges, whether they be sedition or something else. "Are they charging him with espionage?"

Laroche said it involved an ongoing grand jury investigation and added, "I don't think we have an obligation to disclose it at this time, but we certainly have had discussions with Ms. Shroff about the nature of the underlying investigation". Schulte, of New York, is being held at the Metropolitan Correctional Centre in Manhattan.

Jacob Kaplan, Schulte's attorney at the January hearing, told the court that "the government had full access to his computers and his phone, and they found the child pornography in this case, but what they didn't find was any connection to the WikiLeaks investigation".

Sydney Morning Herald:    Image: Nick Youngson

You Might Also Read:

CIA Malware Unveiled:

CIA Silent About Wikileaks Agency Files:
 

 

« NSA Spies Triple Text and Phone Collection
Secure Encrypted Email Platform PGP Is Not Secure »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

SecureDevice

SecureDevice

SecureDevice is a Danish IT Security company.

Lynxspring

Lynxspring

Lynxspring provides edge-to-enterprise solutions and IoT technology for intelligent buildings, energy management, equipment control and specialty machine-to-machine applications.

OGiTiX

OGiTiX

OGiTiX Software AG is a German software manufacturer specializing in Identity and Access Management.

Cybersecurity Competence Center (C3)

Cybersecurity Competence Center (C3)

The Cybersecurity Competence Center was created to further strengthen the Luxembourg economy in the field of cybersecurity.

SenseOn

SenseOn

SenseOn’s multiple threat-detection senses work together to detect malicious activity across an organisation’s entire digital estate, covering the gaps that single point solutions create.

GlobalPass

GlobalPass

Covering 200+ countries with 78 000 databases, GlobalPass provides sophisticated facial biometrics verification and deep screening, delivering peace of mind to every client.

Nova Leah

Nova Leah

Nova Leah helps connected medical device manufacturers meet cybersecurity compliance requirements throughout the entire product lifecycle.

Allthenticate

Allthenticate

Allthenticate Single Device Authentication (SDA), enables seamless authentication in both the physical and digital words while unifying management in one easy-to-use interface.

Slice

Slice

Slice offer subscription based Cyber Insurance for small businesses.

Research Institute in Secure Hardware and Embedded Systems (RISE)

Research Institute in Secure Hardware and Embedded Systems (RISE)

The UK Research Institute in Secure Hardware and Embedded Systems (RISE) seeks to identify and address key issues that underpin our understanding of Hardware Security.

KeyData Associates

KeyData Associates

KeyData is a recognized leader in cybersecurity services specializing in Identity and Access Management (IAM), Customer Identity & Access Management (CIAM) and Privileged Access Management (PAM).

Outsource Group

Outsource Group

Outsource Group is an award winning Cyber Security and IT Managed Services group working with a range of SME/Enterprise customers across the UK, Ireland and internationally.

WithSecure

WithSecure

WithSecure (formerly F-Secure Business) is your reliable cyber security partner, providing outcome-based cyber security that protects and enables operations.

Arcanna.ai

Arcanna.ai

Using a wide range of out-of-the box integrations, Arcanna.ai continuously learns from existing enterprise cybersecurity experts and scales your team’s capacity to deal with threats.

Netox

Netox

Netox is a comprehensive IT service provider that combines IT support services, IT solutions and specialist services; specializing in cybersecurity solutions.

Star Lab

Star Lab

Star Lab specializes in the development and productization of embedded security technologies.