Select date

April 2024
Mon Tue Wed Thu Fri Sat Sun

Trial Of Alleged “Vault 7” CIA Leaker Ends In Hung Jury

10-3-2020 < SGT Report 35 533 words
 

from ZeroHedge:



The trial of a former CIA computer engineer accused of the largest leak of classified information in the spy agency’s history has ended with a hung jury.


On Monday, a federal jury in Manhattan could not agree on whether to convict 31-year-old Joshua Schulte on eight counts, including illegal gathering and transmission of national defense information, according to the New York Times. Schulte was convicted on two other counts; contempt of court and making false statements to the FBI.




The motivation for the alleged theft, prosecutors said, was Mr. Schulte’s belief that C.I.A. management did not take his workplace complaints seriously. His feuding with co-workers led to his resignation in November 2016 to join Bloomberg L.P. as a software engineer.


The partial verdict came after six days of chaotic deliberations. One juror was dismissed in the middle of the discussions because she violated the judge’s orders by researching the case, and the lawyers involved, on her own, and then shared that information with the jury. The judge declined to replace her with an alternate, leaving a panel of 11 people. –New York Times


As we noted in 2018, Vault 7 – a series of 24 documents which were released beginning on March 7, 2017 – revealed that the CIA had a wide variety of tools to use against adversaries, including the ability to “spoof” its malware to appear as though it was created by a foreign intelligence agency, as well as the ability to take control of Samsung Smart TV’s and surveil a target using a “Fake Off” mode in which they appear to be powered down while eavesdropping.



The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.



The CIA’s Remote Devices Branch’s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.


With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.


UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques. –WikiLeaks



Vault 7 also revealed:




In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.


CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover.




  • Instant messaging encryption is a joke.



These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.




  • The CIA laughs at Anti-Virus / Anti-Malware programs.


Read More @ ZeroHedge.com





Loading...




Print