CIA Vault 7 Leaker Found Guilty–What Did He Actually Reveal?

ANGLO AMERICA, 1 Aug 2022

John Kiriakou | ScheerPost - TRANSCEND Media Service

CIA veteran John Kiriakou breaks down some of the most important elements of Vault 7—the biggest leak in CIA history—allegedly divulged to WikiLeaks by another former CIA officer.

FILE – In this courtroom sketch, Joshua Schulte, center, is seated at the defense table flanked by his attorneys during jury deliberations, Wednesday March 4, 2020, in New York. Schulte, the former CIA software engineer accused of causing the biggest theft of classified information in CIA history, has been convicted at a New York City retrial. A jury reached the guilty verdict against Joshua Schulte on Wednesday, July 13, 2022 in federal court in Manhattan. (Elizabeth Williams via AP)

26 Jul 2022 – A federal jury in New York last week convicted former CIA officer Joshua Schulte on nine felony counts under the Espionage Act for leaking information to Wikileaks that became known as Vault 7. Schulte has consistently denied that he was the source of the information. Two years ago, he was convicted on two of the original 11 charges, while the jury hung on the remaining nine. The most recent trial, in which Schulte represented himself, was on those nine counts, and he now faces up to 80 years in prison. Schulte is yet to be tried on state child pornography charges.Prosecutors had literally no forensic evidence that Schulte had taken the data from the CIA and transferred it to WikiLeaks. But they contended that he was a computer genius so brilliant that he was able to cover his tracks. They alleged that he leaked the information because he was a disgruntled former CIA employee who hated his boss, couldn’t get along with his coworkers and sought revenge against the agency. That was enough for the jury.

CIA Deputy Director for Digital Innovation Sean Roche called the Vault 7 leak “a digital Pearl Harbor.” Chief prosecutor Damian Williams said the revelations were “one of the most brazen and damaging acts of espionage in American history.” And Vice magazine said it was “the worst leak of CIA information ever.” The CIA leadership apparently thought the leak was so damaging that then-CIA Director Mike Pompeo ordered the agency to come up with a plan to kidnap or to kill Julian Assange in London. One former Trump Administration national security official said that Pompeo and other senior CIA leaders, “were completely detached from reality because they were so embarrassed about Vault 7. They were seeing blood.”

All of the major media outlets reported on the finalization of Schulte’s case. What they haven’t reported on, though, is exactly what Schulte was accused of leaking in the first place. What did we learn from Vault 7?

Vault 7 was a series of 24 collections of documents totaling hundreds of thousands of pages that included the most sophisticated computer hacking, surveillance and cyberwarfare tools that the CIA ever developed. Wikileaks published the first tranche, called “Year Zero,” on March 7, 2017. Just this first installment contained more information than all of that released by Edward Snowden and included vulnerabilities known to the CIA within web browsers, including Google Chrome, Microsoft Edge, Mozilla Firefox and Opera and the operating systems of most of the world’s cell phones, including Apple’s iOS and Google’s Android.

The fact that the CIA knew about these vulnerabilities and didn’t inform the companies was a violation of a longstanding policy the agency claims to have, stating it would assist US tech companies with their security if it learned of security weaknesses. Instead, it exploited those problems in its digital operations. We have no idea if the agency used these vulnerabilities to spy on Americans. Ashley Gorski, an American Civil Liberties Union staff attorney said at the time, “Our government should be working to help the companies patch vulnerabilities when they are discovered, not stockpile them.”

A second Vault 7 revelation came on March 23, 2017 and included accounts of CIA efforts to hack Apple’s iPhones and Mac computers.

Additional tranches were released every week or two until September 2017. Their revelations included proof that the CIA was able to hack into cars’ computer systems and could take over  control of the vehicle. Was the purpose of this to force the vehicle off the road? Off a cliff? Into a tree? The CIA never commented. Still other documents showed how CIA officers could take over an unsuspecting person’s smart TV and turn its speaker into a microphone to surreptitiously bug a room, even while the television appears to be turned off. Yet more documents showed that the CIA was running digital operations against the National Security Agency (NSA). It is unclear whether this was done as an exercise between the two agencies or if it was something more sinister.

Other revelations included a CIA-created program that was able to track documents transferred by would-be whistleblowers to media outlets (the program is called “Scribblers”), malware that can take over and control computers using the Microsoft Windows 10 operating system (called “Athena”) and malware that can be transferred from one “clean” computer to another through internal systems that are otherwise protected by anti-virus software (called “Pandemic”).

The revelations were not limited to software. Also leaked was a program called “HammerDrill,” that injects a trojan horse onto CDs and DVDs and then documents information on the discs for later transmission to the CIA. An operation called “Dark Matter” revealed security vulnerabilities unique to Apple operating systems while a huge range of Cisco Systems router models also had their own compromised vulnerabilities known to the CIA, costing Apple and Cisco untold millions of dollars to redesign their products and correct the security flaws.

The American people have a right to know what the government is doing in their name, especially if what the government is doing is illegal. Unfortunately, we most often have to rely on whistleblowers to learn what we need to know.

Either way, I feel strongly about the treatment that Schulte has endured, being held in barbaric conditions over the past two years and kept in a literal cage in solitary confinement at the Metropolitan Correctional Center (MCC) in Brooklyn. Now convicted, he’ll likely be placed in a Special Administrative Unit or a Communications Management Unit in a maximum-security or supermax penitentiary. The government will seek to cut him off from the rest of the world for as long as possible.

In addition, the state of New York, simultaneously with the federal charges, charged Schulte with multiple counts of child pornography, which has given many of Schulte’s natural supporters pause. Prosecutors maintained that they only discovered the pornography when they seized the computer hard drives in Schulte’s apartment while looking for Vault 7 information. Schulte’s defense to the child pornography charges will be that the considers himself to be a libertarian anarchist and that he set up a server to allow people unfettered “free speech,” something akin to the 4chan and 8chan servers. He maintains that he has not “received” or “disseminated” any child pornography personally. However, when child pornographers saw that Schulte’s server supported “unfettered free speech,” they used it to trade illegal images and videos.  Schulte is adamant that none of the pornography was his. His protestations likely won’t matter.

__________________________________________

John Kiriakou was a CIA analyst and case officer from 1990 to 2004. In December 2007, John was the first U.S. government official to confirm that waterboarding was used to interrogate al-Qaeda prisoners, a practice he described as torture. While employed with the CIA, he refused to be trained in so-called “enhanced interrogation techniques,” and never authorized or engaged in such crimes. Kiriakou is the sole CIA agent to go to jail in connection with the U.S. torture program, despite the fact that he never tortured anyone. Rather, he blew the whistle on this horrific wrongdoing. John can be reached at: jkiriakou@mac.com.

Go to Original – scheerpost.com


Tags: , , , , ,

 

Share this article:


DISCLAIMER: The statements, views and opinions expressed in pieces republished here are solely those of the authors and do not necessarily represent those of TMS. In accordance with title 17 U.S.C. section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. TMS has no affiliation whatsoever with the originator of this article nor is TMS endorsed or sponsored by the originator. “GO TO ORIGINAL” links are provided as a convenience to our readers and allow for verification of authenticity. However, as originating pages are often updated by their originating host sites, the versions posted may not match the versions our readers view when clicking the “GO TO ORIGINAL” links. This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.


There are no comments so far.

Join the discussion!

We welcome debate and dissent, but personal — ad hominem — attacks (on authors, other users or any individual), abuse and defamatory language will not be tolerated. Nor will we tolerate attempts to deliberately disrupt discussions. We aim to maintain an inviting space to focus on intelligent interactions and debates.

*

code

Note: we try to save your comment also when there are technical problems or a mistake in the Captcha. Still, for long comments we recommend that you copy them somewhere else as a backup before you submit them.

This site uses Akismet to reduce spam. Learn how your comment data is processed.