UAEs Cyberwar on Civilians Employed Former US Intelligence Operatives

  /     /     /  
Publicated : 23/11/2024   Category : security


UAEs Cyberwar on Civilians Employed Former US Intelligence Operatives


A recent exposé about a surveillance program in the United Arab Emirates raises uncomfortable questions about cyberwarfare and US intelligence officers.



On Wednesday morning, Reuterss UK bureau reported on former NSA agents and other former US intelligence operatives turning mercenary for the UAE -- on a cyber black-ops mission dubbed
Project Raven
.
According to the report, Ravens secret purpose was to hack the devices and accounts of nation-state enemies. But were not talking about hacking superpowers or rival Middle Eastern countries; were talking about individuals -- including not only government officials and terrorists, but also human-rights activists, journalists and run-of-the-mill critics of the UAE.
Some days it was hard to swallow, like [when you target] a 16-year-old kid on Twitter, said Lori Stroud, an American who had worked for the NSA before becoming a Raven operative.
Targeting individuals
Virtually any private individual or organization in the world was fair game for Ravens crosshairs -- as is increasingly the case for cyberwar globally. Sometimes its
to throttle dissent
. Sometimes its
to seek revenge
. Often its to find nuggets of valuable political intelligence or intellectual property -- tidbits more easily cyber-extracted from less-aware private targets than from highly guarded government agencies or military mega-contractors.
Frequently, nation-state hackers directly go after the personal devices of individuals in targeted strikes. In particular, Reuters reports, beginning in 2016, Raven operatives used
Karma
, an exploit of Apples iMessage system, to hack into hundreds of iPhones at a time. This allowed them to target iPhones by phone number or email address and then siphon out emails, text messages, photos, location data and passwords.
Third-party compromises
More and more, however, these operations take a scorched-earth approach by hacking a third-party organization that has the individuals data -- such as the individuals employer or a company with whom theyve done business.
For example, US intelligence
reportedly
indicates that, since at least 2014, China has been building and maintaining a database of the identities, habits and other personal information of individuals across both the public sector and the private sector who have security clearances. News reports have linked these efforts to a series of breaches
dating back to 2014
, including those against
Anthem
and Marriott, respectively. (See:
China Suspected of Massive Marriott Data Breach – Report
.)
In 2015, hackers --
traced back to China
-- breached the University of Virginias systems, specifically targeting two employees conducting work involving China. Similarly, in 2016 and 2017, Harvard University -- which has had faculty members advising the US government and other governments -- was explicitly the target of state-sponsored attacks.
Theyre not even interested in Social Security numbers and IDs and things like that, said Rainer Fuchs, the then just-retired CIO of Harvard Medical School, speaking at the
2017 Bio-IT World Conference
. Theyre interested in using us as a jump-off point to other places they can penetrate.
Threats from within?
The upshot is that civilian companies and individuals are practically compelled to be on cyberwar defense against foreign nation-states -- making security education and threat sharing exponentially more important. More ominously, however, civilians may face this kind of cyber terror threat from actors within or once within their own government (
Edward Snowdens NSA leaks
aside).
Raven, for its part, repeatedly caught Americans in its net of targets. Ravens American operatives were contractually forbidden from targeting American citizens or companies. Nonetheless, Stroud described seeing on Ravens systems information about Americans that had previously been flagged for deletion, active target requests on Americans, and a specific designation for American targets. When she repeatedly raised concerns, Stroud was forced out of her job.
Per the report, while a 2014 agreement between the US State Department and the security company staffing the Raven operation prohibited the Raven operatives (American and Emirati alike) from using Raven to Exploit US Persons, State Department approval was also contingent upon the NSA granting specific approval before Raven operatives could even deliver a
presentation
about a proposed hack.
But as Reuters describes it, it is unclear if these actions were blessed by the US government -- even if only through willful ignorance. American Raven operatives were allegedly told that their work on Raven was being done with the NSAs blessing. American operatives further told Reuters that they would do pretty much everything except press the button -- leaving the actual attacks to their Emirati counterparts, for plausible deniability. The American operatives additionally described being directed to develop drive-by malware that would infect a device visiting a given target website -- regardless of whether or not the website traffic originated from the US.
The FBI has been investigating Stroud and her American cohorts since at least 2016 to determine if they shared classified US surveillance methods, targeted American systems, or otherwise broke US law.
The saga raises uncomfortable questions as to what extent former US intelligence officers have gone turncoat -- and to what extent the federal government may have allowed cyber attacks against Americans to happen. In whats known as a
trickle-down effect
, what goes around comes around in cyberwarfare; the expertise that a peoples government uses to defend them tends to gradually become turned against them.
Related posts:
Dispatch From the CyberWar: An Interview With Joseph Carson
Predicting Russian Cyberwar: A Look Back
Lazarus Suspected of Attacking South Korea Sites With Zero-Day Exploit
—Joe Stanganelli is managing director at research and consulting firm Blackwood King LC. In addition to being an attorney and consultant, he has spent several years analyzing and writing about business and technology trends. Follow him on Twitter at @JoeStanganelli.
 

Last News

▸ Criminal Possession of Government-Grade Stealth Malware ◂
Discovered: 23/12/2024
Category: security

▸ Senate wants changes to cybercrime law. ◂
Discovered: 23/12/2024
Category: security

▸ Car Sector Speeds Up In Security. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
UAEs Cyberwar on Civilians Employed Former US Intelligence Operatives