Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Network Security

07:00 AM
Joe Stanganelli
Joe Stanganelli
Joe Stanganelli

UAE's Cyberwar on Civilians Employed Former US Intelligence Operatives

A recent expose about a surveillance program in the United Arab Emirates raises uncomfortable questions about cyberwarfare and US intelligence officers.

On Wednesday morning, Reuters's UK bureau reported on former NSA agents and other former US intelligence operatives turning mercenary for the UAE -- on a cyber black-ops mission dubbed Project Raven.

According to the report, Raven's secret purpose was to hack the devices and accounts of nation-state enemies. But we're not talking about hacking superpowers or rival Middle Eastern countries; we're talking about individuals -- including not only government officials and terrorists, but also human-rights activists, journalists and run-of-the-mill critics of the UAE.

"Some days it was hard to swallow, like [when you target] a 16-year-old kid on Twitter," said Lori Stroud, an American who had worked for the NSA before becoming a Raven operative.

Targeting individuals Virtually any private individual or organization in the world was fair game for Raven's crosshairs -- as is increasingly the case for cyberwar globally. Sometimes it's to throttle dissent. Sometimes it's to seek revenge. Often it's to find nuggets of valuable political intelligence or intellectual property -- tidbits more easily cyber-extracted from less-aware private targets than from highly guarded government agencies or military mega-contractors.

Frequently, nation-state hackers directly go after the personal devices of individuals in targeted strikes. In particular, Reuters reports, beginning in 2016, Raven operatives used Karma, an exploit of Apple's iMessage system, to hack into hundreds of iPhones at a time. This allowed them to target iPhones by phone number or email address and then siphon out emails, text messages, photos, location data and passwords.

Third-party compromises
More and more, however, these operations take a scorched-earth approach by hacking a third-party organization that has the individual's data -- such as the individual's employer or a company with whom they've done business.

For example, US intelligence reportedly indicates that, since at least 2014, China has been building and maintaining a database of the identities, habits and other personal information of individuals across both the public sector and the private sector who have security clearances. News reports have linked these efforts to a series of breaches dating back to 2014, including those against Anthem and Marriott, respectively. (See: China Suspected of Massive Marriott Data Breach Report.)

In 2015, hackers -- traced back to China -- breached the University of Virginia's systems, specifically targeting two employees conducting work involving China. Similarly, in 2016 and 2017, Harvard University -- which has had faculty members advising the US government and other governments -- was "explicitly" the target of state-sponsored attacks.

"They're not even interested in Social Security numbers and IDs and things like that," said Rainer Fuchs, the then just-retired CIO of Harvard Medical School, speaking at the 2017 Bio-IT World Conference. "They're interested in using us as a jump-off point to other places they can penetrate."

Threats from within? The upshot is that civilian companies and individuals are practically compelled to be on cyberwar defense against foreign nation-states -- making security education and threat sharing exponentially more important. More ominously, however, civilians may face this kind of cyber terror threat from actors within or once within their own government (Edward Snowden's NSA leaksaside).

Raven, for its part, repeatedly caught Americans in its net of targets. Raven's American operatives were contractually forbidden from targeting American citizens or companies. Nonetheless, Stroud described seeing on Raven's systems information about Americans that had previously been flagged for deletion, active target requests on Americans, and a specific designation for American targets. When she repeatedly raised concerns, Stroud was forced out of her job.

Per the report, while a 2014 agreement between the US State Department and the security company staffing the Raven operation prohibited the Raven operatives (American and Emirati alike) from using Raven "to Exploit US Persons", State Department approval was also contingent upon the NSA granting specific approval before Raven operatives could even deliver a presentation about a proposed hack.

But as Reuters describes it, it is unclear if these actions were blessed by the US government -- even if only through willful ignorance. American Raven operatives were allegedly told that their work on Raven was being done with the NSA's blessing. American operatives further told Reuters that they would do pretty much everything except "press the button" -- leaving the actual attacks to their Emirati counterparts, for "plausible deniability". The American operatives additionally described being directed to develop drive-by malware that would infect a device visiting a given target website -- regardless of whether or not the website traffic originated from the US.

The FBI has been investigating Stroud and her American cohorts since at least 2016 to determine if they shared classified US surveillance methods, targeted American systems, or otherwise broke US law.

The saga raises uncomfortable questions as to what extent former US intelligence officers have gone turncoat -- and to what extent the federal government may have allowed cyber attacks against Americans to happen. In what's known as a trickle-down effect, what goes around comes around in cyberwarfare; the expertise that a people's government uses to defend them tends to gradually become turned against them.

Related posts:

—Joe Stanganelli is managing director at research and consulting firm Blackwood King LC. In addition to being an attorney and consultant, he has spent several years analyzing and writing about business and technology trends. Follow him on Twitter at @JoeStanganelli.


Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
Malware Attacks Declined But Became More Evasive in Q2
Jai Vijayan, Contributing Writer,  9/24/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-09-30
Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW07 allows an attacker to change some special parameters without authentication. This issue affects: WAGO 750-852 version FW07 and prior versions. WAGO 750-880/xxx-xxx version FW07 and prior versions. WAGO 750-881 ve...
PUBLISHED: 2020-09-30
Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW03 allows an attacker to change the settings of the devices by sending specifically constructed requests without authentication This issue affects: WAGO 750-362 version FW03 and prior versions. WAGO 750-363 version ...
PUBLISHED: 2020-09-30
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a local user with specialized access to obtain sensitive information from a detailed technical error message. This information could be used in further attacks against the system. IBM X-Force ID: 185370.
PUBLISHED: 2020-09-30
Use of hard-coded cryptographic key vulnerability in August Connect Wi-Fi Bridge App, Connect Firmware allows an attacker to decrypt an intercepted payload containing the Wi-Fi network authentication credentials. This issue affects: August Connect Wi-Fi Bridge App version v10.11.0 and prior version...
PUBLISHED: 2020-09-30
An improper Input Validation vulnerability in the code handling file renaming and recovery in Bitdefender Engines allows an attacker to write an arbitrary file in a location hardcoded in a specially-crafted malicious file name. This issue affects: Bitdefender Engines versions prior to 7.85448.