Former CIA Engineer Charged with Giving Hacking Tools to WikiLeaks

Ex-CIA engineer charged with massive leak to WikiLeaks

A former CIA computer engineer has been indicted on charges he masterminded what appears to be the largest leak of classified information in the spy agency’s history.

Joshua Schulte, 29, was charged in a new grand jury indictment with providing WikiLeaks with a massive trove of U.S. government hacking tools that the online publisher posted in March 2017, the Justice Department announced on Monday.

Schulte was previously facing child pornography charges in federal court in New York, but the indictment broadens the case to accuse him of illegally gathering classified information, damaging CIA computers, lying to investigators and numerous other offenses.

In January, attorneys involved in the child porn case revealed in court that Schulte was the target of a major investigation into WikiLeaks’ release of a CIA collection known as “Vault 7.”

The Justice Department’snews release announcing Schulte’s indictment does not mention WikiLeaks by name, signaling that it has not been charged in the case. There was no mention of any other individuals being charged.

Attorneys for Schulte did not immediately respond to requests for comment.

The new charges make Schulte the fourth individual to face charges related to classified leaks since President Donald Trump took office and vowed a crackdown on leaks.

Last June, a National Security Agency contractor, Reality Winner, was arrested on charges of leaking to the online publication The Intercept a top secret report on the techniques that Russian government agents allegedly used to target computers of state election officials. She has pleaded not guilty and has been held without bail. Her trial is set for October.

In March, an FBI agent based in Minneapolis, Terry Albury, was charged with a leak to The Intercept of the FBI’s procedures for handling informants. He was also accused of retaining classified information at his home. He pleaded guilty to both charges and is free awaiting sentencing.

Earlier this month, the longtime head of security for the Senate Intelligence Committee, James Wolfe, was indicted on three felony counts of lying during the course of an FBI investigation into unauthorized disclosures of classified information. He was not charged with any leaks, but the indictment contends that he provided confidential committee information to at least one reporter. Wolfe pleaded not guilty to the charges last week. No trial date has been set.

Joshua Schulte named as suspect in 'Vault 7' leak of CIA ... photo

Criminal complaint found here.

*** More background detail:

Joshua Adam Schulte, the former CIA worker suspected of passing the agency’s hacking secrets to WikiLeaks, previously posted the source code for an internal CIA tool to his account on the public code-sharing site GitHub, The Daily Beast has learned.

That potential red flag was apparently missed by the spy agency just months after Edward Snowden walked out of the National Security Agency with a thumb drive of secrets in 2013. A spokesman for the CIA declined to comment.

Schulte, 29, worked at the CIA from 2010 to 2016. He was raided by the FBI on March 23, 2017, roughly two weeks after Julian Assange began releasing 8,000 CIA files under the rubric “Vault 7.” The files had been copied from an internal agency wiki sometime in 2016, and contained documentation and some source code for the hacking tools used by the CIA’s intrusion teams when conducting foreign surveillance.

When FBI agents examined Schulte’s hard drive, they found only a single classified document, but allegedly turned up 10,000 images of child pornography. Today Schulte is being held in a federal holding facility in Manhattan on one count each of possessing, receiving, and transporting child porn. He has not been charged with the Vault 7 leak, but, in January the FBI was still investigating him as the suspect.

Until now it’s been unclear how the FBI became suspicious of Schulte in the first place. In a statement to The Washington Post, which broke the story of the arrest, Schulte said the bureau went after him because he’d reported managerial incompetence to the CIA’s inspector general and then left the agency in 2016. “Due to these unfortunate coincidences, the FBI ultimately made the snap judgment that I was guilty of the leaks and targeted me.”

Prosecutor Matthew Larouch said at a January court appearance that “the government immediately had enough evidence to establish that [Schulte] was a target of that investigation,” but didn’t elaborate on the evidence.

Schulte has hosted 11 of his own coding projects on GitHub over the years. In the fall of 2013, he uploaded a robust software development tool he’d developed called OSB Project Wizard, described this way: “Create all types of projects following OSB build guidelines.” The OSB abbreviation went unexplained.

Here Comes a 6th Branch of the Military, Space Force

It has been a concept that has been floated for several months. The Pentagon and the Air Force are actually asking for this. The United States is vulnerable in this frontier which is but one reason for Space X. Consider what is in space: navigation, guided missiles, warning systems and satellites for drones, naval ships, communications and more.

Key Speakers At The 32nd Space Symposium | Getty Images

Russia and China are increasing their space operations and General John Hyten of U.S. Strategic Command has warned of the vulnerabilities for quite some time. China and Russia both have laser weapons designed to damage our systems. Boeing, Northrop Grumman and Lockheed Martin as well as Raytheon on poised to be recipients of Pentagon dollars and the future programs.

Steve Isakowitz, CEO of The Aerospace Corporation says ‘we are approaching a point where Star Wars is not just a movie.’

Seems, Ronald Reagan had great vision. And in 2001, former Defense Secretary Donald Rumsfeld also expressed significant concerns on space systems being attacked by an adversarial country. Read more here.

U.S. Army Research, Development and Engineering Command

As part of the National Defense Strategy, the Air Force asked for an 8% increase in space funding. Watch out too, as Boeing and Apple are examining the option of building a parallel internet in space.

President Donald Trump announced Monday that he is directing the Department of Defense to create a new “space force” to become the sixth branch of the U.S. military.

“My administration is reclaiming America’s heritage as the world’s greatest spacefaring nation,” Trump said at a meeting of the National Space Council, with Vice President Mike Pence standing by him. “The essence of the American character is to explore new horizons and to tame new frontiers, but our destiny beyond the Earth is not only a matter of national identity but a matter of national security, so important for our military.”

“When it comes to defending America, it is not enough to merely have an American presence in space; we must have American dominance in space, so important,” Trump said. “Very importantly, I am hereby directing the Department of Defense and Pentagon to immediately begin the process necessary to establish a space force as the sixth branch of the Armed Forces.”

Trump said the Air Force and future Space Force would be “separate, but equal.”

Trump ordered Gen. Joseph Dunford, chairman of the Joint Chiefs of Staff, to begin implementing the directive.

Trump has previously spoken about creating a space force, but this is the first concrete move, at least publicly, in that direction. The Air Force is currently responsible for space warfare, with the Air Force Space Command in charge of operating and protecting military satellites.

The National Aeronautics and Space Administration is responsible for the country’s civilian space program. Budget cuts in recent have resulted in fewer Americans going into space, leading some observers to call for the U.S. to explore space in a way not done since before the space shuttle came into existence.

How About the Chinese Interfering with Voting in America?

The super PAC Women Vote got a $5.4 million contribution in the form of stock in Chinese tech company Baidu. (notice the date too, seems like foreign interference to me)

In 2016, Women Vote raised almost $38 million and spent just over that. In 2018, they are in the $5 million range, so they need some help right? The political action committee, Women Vote was launched by Emily’s List. Ellen Malcolm is the Founder and Chairman of the Board of Emily’s List and her operation(s) are comprised of top leaders, entrepreneurs and activists committed to pro-choice democratic women according to the website. Another Board member is Lisa Jackson. You remember her right? She was head of the EPA during the Obama administration that too used an alias and non-government emails to conduct official government business. Another Board member is Laura Ricketts. She is the owner of the Chicago Cubs and is a member of the Democratic National Committee’s Executive Committee and was the co-chair of the DNC Finance Committee’s LGBT Leadership Council. Add in Maria Teresa Kumar. She is the founding President and CEO of VOTO Latino. She also serves on the Board of Planned Parenthood, the Latino Leaders Network.

Heck there are many progressive liberals on the Board of Emily’s List. Travel over to the site and check it out.

If you have had some weird messages as a Skype user from Baidu…here is the deal. It is a Chinese multinational technology company. Baidu is a top developer of Artificial Intelligence and highly aligned with China president Xi Jinping. What is interesting is Baidu is under a holding company based in the Cayman Islands. The company is also traded on NASDAQ.

According to Wikipedia, there is some shady history with Baidu.

Domain name redirection attack

On January 12, 2010, Baidu.com’s DNS records in the United States were altered such that browsers to baidu.com were redirected to a website purporting to be the Iranian Cyber Army, thought to be behind the attack on Twitter during the 2009 Iranian election protests, making the proper site unusable for four hours.[23] Internet users were met with a page saying “This site has been attacked by Iranian Cyber Army“.[24] Chinese hackers later responded by attacking Iranian websites and leaving messages.[25] Baidu later launched legal action against Register.com for gross negligence after it was revealed that Register.com’s technical support staff changed the email address for Baidu.com on the request of an unnamed individual, despite failing security verification procedures. Once the address had been changed, the individual was able to use the forgotten password feature to have Baidu’s domain passwords sent directly to them, allowing them to accomplish the domain hijacking.[26][27]

Baidu workers arrested

On August 6, 2012, the BBC reported that three employees of Baidu were arrested on suspicion that they accepted bribes. The bribes were allegedly paid for deleting posts from the forum service. Four people were fired in connection with these arrests.[28]

91 Wireless acquisition

On July 16, 2013, Baidu announced its intention to purchase 91 Wireless from NetDragon. 91 Wireless is best known for its app store, but it has been reported that the app store faces piracy and other legal issues.[29] On August 14, 2013, Baidu announced that its wholly owned subsidiary Baidu (Hong Kong) Limited has signed a definitive merger agreement to acquire 91 Wireless Web-soft Limited from NetDragon Web-soft Inc.[30] for 1.85 billion dollars in what was reported to be the biggest deal ever in China’s IT sector.[31]

There is more like the death of a student from cancer while working at headquarters.

Pretty weird that a Chinese tech company is getting involved with women voting and a political action committee right?

 

Chinese Front Company Used to Recruit Double Agents

THE TRUMP ADMINISTRATION JUST CAUGHT A NEW LEAKER! - US ... photo

Mallory, who had top secret security clearance, worked as a CIA officer, and was stationed in Iraq, China and Taiwan.

Mallory is a self-employed consultant with GlobalEx, LLC. and resides in Leesburg, Virginia. According to the criminal complaint, he graduated from Brigham Young University in 1981 with a bachelor’s degree in political science.

Shortly thereafter, Mallory worked full-time in a military position for five years. Once he left that job, he continued his military service as an Army reservist and worked as a special agent for the State Department Diplomatic Security Service for three years (1987-1990).

 

Kevin Mallory Criminal Complaint by Chris on Scribd

Revealed: Chinese Front Company Used to Recruit U.S. Double Agents

A single reference buried deep within hundreds of pages of court filings in the case of convicted CIA turncoat Kevin Mallory reveals the name of a Shanghai-based “executive search firm” that bears the hallmarks of a classic espionage front, former intelligence operatives from the U.S. and Russia tell The Daily Beast.

The U.S. government’s evidence against Mallory, who was found guilty Friday of espionage-related charges, included a photograph of a business card belonging to alleged Chinese Ministry of State Security (MSS) agent Richard Yang, who presented himself as a corporate headhunter. Prosecutors said he was one of Mallory’s handlers. According to court documents, the picture was taken at Darren & Associates, a supposed corporate recruiter with no listed phone number or executives and an address that traces back to a rent-by-the-hour space on Shanghai’s Hubin Road.

Darren & Associates’ connection to the Mallory case has not been previously reported. The firm has been in business for either “around 40 years,” as its website claims, or since 2014, as stated on its LinkedIn page. The job networking site lists no actual former or current employees, and the company has a near-zero web presence, which is highly unusual for an organization that describes itself as a successful global enterprise.

“Clearly this is phony,” said former KGB sleeper agent Jack Barsky. “The first thing you do to figure out how real [a company is] is look at their website, and this is just not the footprint of a solid company.”

“Clearly this is phony… The first thing you do to figure out how real [a company is] by looking at their website, and this is just not the footprint of a solid company.”
— former KGB sleeper agent Jack Barsky

It’s a “flimsy mechanism for them to use,” agreed former CIA officer Christopher Burgess. “To me, this is what someone would put up so that their business contact isn’t naked. But what it doesn’t do is talk about who they are, where they are, doesn’t give you names, and their mission is so general that it can cover anything.”

Richard Yang subsequently introduced Mallory to an associate, Michael Yang, who claimed to be affiliated with the Shanghai Academy of Social Sciences (SASS). It has a close relationship with the Shanghai State Security Bureau (SSSB), a sub-component of the Ministry of State Security, according to the FBI. The Shanghai security bureau “uses SASS employees as spotters and assessors,” says one court filing, and “FBI has further assessed that SSSB intelligence officers have also used SASS affiliation as cover identities.”

Chinese think tanks like the Shanghai academy “can be used to invite someone over who is either a person of interest or a source,” Peter Mattis of the Jamestown Foundation’s China Program told Bethany Allen-Ebrahimian and Elias Groll of Foreign Policy last year. “That person comes over and gives a talk, and they’ll be met and have meetings with the local state security element or the People’s Liberation Army.”

via Facebook

Others are based in the U.S., they pointed out. The China Institute of Contemporary International Relations describes itself as a “comprehensive research institution” but is also “an official numbered bureau of the Ministry of State Security, functioning rather like the CIA’s Open Source Center.”

Darren & Associates, the erstwhile headhunting firm, seems rather less sophisticated. Either the MSS was “too lazy” to create a more realistic front company, or they thought “no one would give a shit about this Mallory guy and no one would be checking it,” said a former Russian FSB officer now living in the U.S. under the pseudonym “Jan Neumann.”

But U.S. authorities did care, and Mallory’s scheme unraveled in 2017 when he was selected for secondary screening at Chicago’s O’Hare Airport after a trip to China. Although he said he had nothing to declare, customs officers found $16,500 in cash on him.

““An individual like Mallory, with 20-plus years of high-end intelligence community engagement should have known better than [to use] this weak cover story that the Chinese gave him.”
— former CIA officer Christopher Burgess

“An individual like Mallory, with 20-plus years of high-end intelligence community engagement should have known better than [to use] this weak cover story that the MSS gave him,” said Burgess. “He should have picked up the phone and called the FBI and said, ‘Hey, these people say they’re legitimate businesspeople, and I don’t think they are.’ And he should have done that years ago.”

The details of exactly what Mallory gave up have yet to be publicly revealed, and probably won’t ever be, said Burgess. But according to prosecutors, Mallory gave away the most precious secrets of all—the names of U.S. agents in China.

A CIA information review officer said in court last year that the documents Mallory gave to the Chinese contained sensitive intelligence, analysis, and the names of assets that “could reasonably be expected to cause the loss of critical intelligence and possibly result in the lengthy incarceration or death of clandestine human sources.”

”It’s a betrayal in the truest sense of the term,” former CIA Inspector General Frederick Hitz told The Daily Beast.

FBI analysts further determined that Mallory “had completed all of the steps necessary to securely transmit at least four documents…one of which contained unique identifiers for human sources who had helped the U.S. government.”

Some of these files were stored on a Toshiba SD card, which Mallory concealed in aluminum foil and hid in his bedroom closet.

“We overlooked it twice,” FBI Special Agent Melinda Capitano testified Thursday.

“What made you think to open it?” the prosecutor asked.

“Usually in my training, small bits of foil like this contain drugs,” Capitano replied.

via PACER

The foil-wrapped SD card found in Mallory’s home.

Mallory’s defense team claims that the documents were worthless and that he was actually operating as an independent, self-directed counterintelligence officer of sorts to reel in the Chinese agents so he could eventually turn them into U.S. authorities. Burgess calls that “hogwash.” Mallory wasn’t freelancing in counterintelligence, he “was all-in” as an asset, in Burgess’ opinion.

“He was responsive to tasking, he used covert communications to reduce face-to-face interactions with his PRC contact,” said Burgess. “If I was validating a source, those are all indications that I have a good one.”

“He’s throwing something at the wall to see if it sticks,” laughed former Defense Intelligence Agency officer Ray Semko. “Just as long as they get one fool [on the jury] to believe it.”

Mallory’s attorney, Geremy Kamens, declined a request for comment.

Mallory, his wife, and one of his three kids lived in a four-bedroom, four-bathroom, 7,100-square foot house in Leesburg, Virginia, complete with a home theater and two fireplaces. He paid $1.15 million in 2005, a lot of money for a guy prosecutors said earned only $25,000 in the three years—all of it from his Chinese handlers.

He also has three adult children from a previous marriage. A court filing said Mallory had $50,000 in credit card debt, and about $2,500 in cash and investments. His wife, Mariah Nan-Hua Mallory, drives a school bus and earns roughly $9,000 a year.

In a motion previously filed with the court arguing against Mallory’s release pending trial, prosecutors said he had “demonstrated a pattern of dishonesty.”

“The defendant says and does anything he wishes to suit his particular needs, which seem largely to be finding an easy path out of his financial hardship, by betraying his government,” the motion stated.

A disguise kit found by FBI agents during a search of Mallory’s home.

However, Patsy Harrington, a real estate broker and close friend of Mallory’s who sold him his home, insists that Mallory is being totally mischaracterized.

“He is a loyal serviceman that was hurt in the line of duty in the Middle East, he’s a wonderful family man and a devoted Mormon with a wonderful wife and three highly accomplished grown children,” Harrington told The Daily Beast. “He’s a good man. I was a single mom and he was wonderful to me. He’s much better than 97 percent of the human beings I know.”

A LinkedIn recommendation from Min Xu, an associate professor at Central China Normal University describes Mallory as “a very faithful, honest, loyal, serious but kind, helpful, contagious person, very nice to everyone around, I will always remember his timely help and the warmth he gave to us when we were in trouble. He is really an amazing man.”

In fact, the Chinese agents who targeted Mallory initially reached out to him on LinkedIn. It’s a virtual goldmine for those looking to identify members of the “cleared community,” said Christopher Burgess, who has been contacted by people he assumed were foreign intelligence operatives more times than he can count.

via PACER

Yet Chinese intelligence isn’t only interested in people with active security clearances. Anyone with access or influence can potentially be of value, and everyone from professors to scientists to journalists have received overtures from foreign spy services.

National security reporter Garrett Graff was targeted on LinkedIn by Evgeny Buryakov, a Russian SVR operative posing as a New York City investment banker. And a Chinese agent used LinkedIn to reach out to journalist Nate Thayer last year.

“On the day I received my first message from Chinese intelligence agents from the Ministry of State Security, they, of course, didn’t say they were Chinese spies,” Thayer wrote on his blog. “The note was from ‘Frank Hu,’ a ‘project assistant’ from Shanghai Pacific & International Strategy Consulting Co, saying he had found me on the Internet and was writing to ‘seek potential cooperation opportunities.’”

Predictably, there is no “Shanghai Pacific & International Strategy Consulting Co,” which doesn’t even maintain a rudimentary Darren & Associates-style website. “Hu” told Thayer the company was “a consulting firm, specializing in independent policy analysis and advisory services. We strive to help our clients properly assess political dynamics, risks and opportunities in countries and regions they operate in.”

“In terms of human source operations, the PRC ‘services’ are not all that sophisticated,” an intelligence community source told Thayer, “until they get you on their turf. So don’t go there–to Shanghai, that is–for any reason.”

Of course, there is no such thing as a foolproof system in espionage, and breaches like Mallory’s will surely happen again.

As Joseph Wippl, a 30-year veteran of the CIA’s National Clandestine Service, told The Daily Beast, “It’s part of the business.”

2300 Arrested in Operation Broken Heart

Maryland’s Internet Crimes Against Children Task Force yielded 56 arrests in Maryland — 21 of which were arrested by Maryland State Police investigators during “Operation Broken Heart,” a nationwide, three-month initiative targeting offenders of child sexual exploitation.
The Maryland Internet Crimes Against Children Task Force was one of 61 task forces included in the Operation Broken Heart initiative. Members from the Maryland ICAC worked throughout March, April and May, initiating 426 investigations. Investigators executed 149 search warrants with 56 arrests. There were also public outreach sessions, which reached nearly 780 people.

*** California: Hundreds Arrested in Massive Child Sex Ring ...

Department of Justice
Office of Public Affairs

Tuesday, June 12, 2018

More Than 2,300 Suspected Online Child Sex Offenders Arrested During Operation “Broken Heart”

The Department of Justice today announced the arrest of more than 2,300 suspected online child sex offenders during a three-month, nationwide, operation conducted by Internet Crimes Against Children (ICAC) task forces. The task forces identified 195 offenders who either produced child pornography or committed child sexual abuse, and 383 children who suffered recent, ongoing, or historical sexual abuse or production of child pornography.

The 61 ICAC task forces, located in all 50 states and comprised of more than 4,500 federal, state, local and tribal law enforcement agencies, led the coordinated operation known as “Broken Heart” during the months of March, April, and May 2018.  During the course of the operation, the task forces investigated more than 25,200 complaints of technology-facilitated crimes against children and delivered more than 3,700 presentations on Internet safety to over 390,000 youth and adults.

“No child should ever have to endure sexual abuse,” Attorney General Jeff Sessions said. “And yet, in recent years, certain forms of modern technology have facilitated the spread of child pornography and created greater incentives for its production. We at the Department of Justice are determined to strike back against these repugnant crimes. It is shocking and very sad that in this one operation, we have arrested more than 2,300 alleged child predators and investigated some 25,200 sexual abuse complaints. Any would-be criminal should be warned: this Department will remain relentless in hunting down those who victimize our children.”

The operation targeted suspects who: (1) produce, distribute, receive and possess child pornography; (2) engage in online enticement of children for sexual purposes; (3) engage in the sex trafficking of children; and (4) travel across state lines or to foreign countries and sexually abuse children.

The ICAC Program is funded through the Department’s Office of Juvenile Justice and Delinquency Prevention (OJJDP).  In 1998, OJJDP launched the ICAC Task Force Program to help federal, state, and local law enforcement agencies enhance their investigative responses to offenders who use the Internet, online communication systems or computer technology to exploit children. To date, ICAC Task Forces have reviewed more than 775,000 complaints of child exploitation, which resulted in the arrest of more than 83,000 individuals. In addition, since the ICAC program’s inception, more than 629,400 law enforcement officers, prosecutors and other professionals have been trained on techniques to investigate and prosecute ICAC-related cases.

For more information, visit the ICAC Task Force (link is external) webpage at: https://www.icactaskforce.org/ (link is external). For state-level Operation Broken Heart results, please contact the appropriate state ICAC task force commander. Contact information for task force commanders (link is external) are available online at: https://www.icactaskforce.org/Pages/ContactsTaskForce.aspx (link is external).