DarkMatter Group

DarkMatter Group
Company typePrivate
Industrycybersecurity
Founded2014; 10 years ago (2014)
HeadquartersAbu Dhabi, United Arab Emirates
Area served
UAE, Finland, Canada
Key people
Websitewww.darkmatter.ae

DarkMatter Group is a computer security company[1][2] founded in the United Arab Emirates (UAE) in 2014[3][4] or 2015.[5] The company has described itself as a purely defensive company, however in 2016, it became a contractor for Project Raven, to help the UAE surveil other governments, militants, and human rights activists.[citation needed] It has employed former U.S. intelligence operatives and graduates of the Israel Defense Force technology units.[6][citation needed]

Company history

[edit]

DarkMatter was founded in either 2014[3][4] or 2015[5] by Emirati business man Faisal al-Bannai, the founder of mobile phone vendor Axiom Telecom and the son of a major general in the Dubai Police Force.[5][3][2] Zeline 1, a wholly owned subsidiary of DarkMatter, became active in Finland around 2014.[4]

DarkMatter's public launch came in 2015, at the 2nd Annual Arab Future Cities Summit.[1] At this time, the company advertised capabilities including network security and bug sweeping, and promised to create a new, "secure" mobile phone handset.[1] It promoted itself as a "digital defense and intelligence service" for the UAE.[1]

In 2016, DarkMatter replaced CyberPoint as a contractor for Project Raven.[3][a][b] Also in 2016, DarkMatter sought smartphone development expertise in Oulu, Finland, recruiting several Finnish engineers.[4]

By early 2018, DarkMatter's turnover was hundreds of millions of U.S. dollars.[2] Eighty percent of its work was for the UAE government and related organizations, including the NESA.[2] It had developed a smartphone model called Katim, Arabic for "silence".[4][5] DarkMatter was an official provider for the Expo 2020,[14] but has since been dropped in favour of a different company.

In 2021, DarkMatter's cyber activities had already been transferred to Digital14, which has been distributing the secure communications system 'Katim'.[15]

Recruitment practices

[edit]

In addition to recruiting via conventional routes such as personal referrals and stalls at trade shows (e.g. Black Hat),[1] DarkMatter headhunted staff from the U.S. National Security Agency and "poached" competitors' staff after they were contracted to the UAE government, as happened with some CyberPoint employees.[1][2]

The company reportedly hired graduates of the Israel Defense Force technology units and paid them up to US$1 million annually.[16]

Simone Maragitelli, an Italian security researcher, blogged about DarkMatter's vague and dubious recruiting practices as a warning to others. He claimed that any questions or objections to the company's practices would result in being told that "things had been blown out of proportion" and that information about the job opening was extremely vague despite asking questions.[17][18]

Allegations of surveillance for UAE government

[edit]

In response to alleged cyber spying on opponents of Iran's best interests by the government of Iran during 2010 and 2011, the United States assisted the United Arab Emirates in late 2011 with establishing the National Electronic Security Authority (NESA) which is the UAE's equivalent to the US NSA.[19]

Project Raven

[edit]

Project Raven was a confidential initiative to help the UAE surveil other governments, militants, and human rights activists.[3] Its team included former U.S. intelligence agents, who applied their training to hack phones and computers belonging to Project Raven's victims.[3] The operation was based in a converted mansion in a suburb of Abu Dhabi in Khalifa City nicknamed "the Villa."[3]

The project originated in 2008 as the Development Research Exploitation and Analysis Department (DREAD), developed by Richard A. Clarke through his security advisory group Good Harbor Consulting, as an arm of UAE royal Mohamed bin Zayed Al Nahyan's court.[20] By the end of 2010, Good Harbor had stepped back from DREAD, ceding control to Karl Gumtow, the co-founder and CEO of CyberPoint.[20][21]

From around 2014 to 2016, CyberPoint supplied U.S.-trained contractors to Project Raven. In 2016, news reports emerged that CyberPoint had contracted with the Italian spyware company Hacking Team, which damaged CyberPoint's reputation as a defensive cybersecurity firm.[1] Reportedly dissatisfied with relying upon a U.S.-based contractor, the UAE replaced CyberPoint with DarkMatter as its contractor, and DarkMatter induced several CyberPoint staff to move to DarkMatter.[3][22] After this, Project Raven reportedly expanded its surveillance to include the targeting of Americans, potentially implicating its American staff in unlawful behaviour.[3][22][23]

Following a 24 October 2016 The Intercept article revealing DarkMatter surveillance for UAE, Samer Khalife, the chief financial officer for DarkMatter, transferred some United States citizens from DarkMatter to a new company Connection Systems and tiger teams were established by DarkMatter to counter the allegations contained in The Intercept article.[24]

On 1 February 2019, Ars Technica published comments from a former employee of DarkMatter, Daniel Wolford. He stated, "We did not hack Americans...Our mission was simple: advise and assist UAE to create a national cyber security program similar to NTOC (NSA/CSS Threat Operations Center)." The work done creating a "target list," Wolford said, was part of a training operation "to teach the Emiratis about lawful targeting and collection," he asserted. "We tried to show them who is and isn't a threat to their national security."[25]

On 9 December 2021, Loujain al-Hathloul filed a lawsuit in a US district court in Oregon against three former US intelligence and military officers, who carried out hacking operations on behalf of the UAE. According to the lawsuit, the three men — Marc Baier, Ryan Adams, and Daniel Gericke — worked for DarkMatter and assisted the Emirati security officials to exfiltrate data from her iPhone. The hacking had led to al-Hathloul's arrest from the UAE and rendition to Saudi Arabia, where she was detained, imprisoned and tortured.[26]

On 22 December 2021, a very popular messaging app named ToTok was deemed to be a secret spy tool, developed by the UAE. Very little is known about the tool and what its capabilities are.[27]

In December 2021, U.S. lawmakers urged the Treasury and State Departments to sanction DarkMatter, NSO Group, Nexa Technologies, and Trovicor. The letter signed by the Senate Finance Committee Chairman Ron Wyden, House Intelligence Committee Chairman Adam Schiff, and 16 other lawmakers, asked for Global Magnitsky sanctions, as the companies were accused of enabling human rights abuses. The letter demanded that high-ranking executives at DarkMatter, along with the three other firms, be sanctioned.[28]

On 26 August 2022, the three former U.S. intelligence operatives who helped the UAE spy on human rights activists, journalists, and governments were barred from arms export activities under a deal announced by the State Department. The operatives, Marc Baier, Ryan Adams, and Daniel Gericke, admitted their involvement in Project Raven on 15 September 2022, resulting in them relinquishing their security clearance and paying $1.68 million in exchange for their criminal charges being dropped.[29] The three were prohibited for three years from participating directly or indirectly in any activities subject to the International Traffic in Arms Regulations (ITAR).[30] Daniel Gericke subsequently served as Chief Technology Officer at ExpressVPN, a subsidiary of British-Israeli company Kape Technologies,[31] leading Edward Snowden to warn the company's customers.[32][33]


Karma spyware

[edit]

In 2016, Project Raven bought a tool called Karma.[34] Karma was able to remotely exploit Apple iPhones anywhere in the world, without requiring any interaction on the part of the iPhone's owner as long as a username was provided, such as Apple ID, Email address associated with the phone, or phone number.[3] It apparently achieved this by exploiting a zero-day vulnerability in the device's iMessage app.[3] Project Raven operatives were able to view passwords, emails, text messages, photos and location data from the compromised iPhones.[34][3]

People whose mobile phones have been deliberately compromised using Karma reportedly include:

Around mid-2017, Apple patched some of the security vulnerabilities exploited by Karma, unknowingly reducing the tool's effectiveness.[34]

Certificate authority controversy

[edit]

In 2016, two DarkMatter whistleblowers and multiple other security researchers expressed concerns that DarkMatter intended to become a certificate authority (CA).[1] This would give it the technical capability to create fraudulent certificates, which would allow fraudulent websites or software updates to convincingly masquerade as legitimate ones.[1] Such capabilities, if misused, would allow DarkMatter to more easily deploy rootkits to targets' devices, and to decrypt HTTPS communications of Firefox users via man-in-the-middle attacks.[1][37][38]

On 28 December 2017, DarkMatter requested that Mozilla include it as a trusted CA in the Firefox web browser.[39] For more than a year, Mozilla's reviewers addressed concerns about DarkMatter's technical practices, eventually questioning on that basis whether DarkMatter met the baseline requirements for inclusion.[39][40]

On 30 January 2019, Reuters published investigations describing DarkMatter's Project Raven.[3][37] Mozilla's reviewers noted the investigation's findings.[40] Subsequently, the Electronic Frontier Foundation (EFF) and others asked Mozilla to deny DarkMatter's request, on the basis that the investigation showed DarkMatter to be untrustworthy and therefore liable to misuse its capabilities.[37][38][40][39] On 5 July 2019, after Mozilla's public consultation it was decided to not allow DarkMatter to become a trusted CA in Firefox.[41][39]

In July 2019, Mozilla prohibited the government of the United Arab Emirates from operating as one of its internet security gatekeepers, following reports on the cyber-espionage program, which was run by Abu Dhabi-based DarkMatter staff for leading a clandestine hacking operation.[42]

In August 2019, Google blocked websites approved by DarkMatter, after Reuters reported the firm's involvement in a hacking operation led by the United Arab Emirates. Google, previously, said that all websites certified by DarkMatter would be marked as unsafe by its Chrome and Android browsers.[43]

FBI investigation and indictments

[edit]

As of 2020, DarkMatter has been under investigation by the FBI for crimes including digital espionage services, involvement in the Jamal Khashoggi assassination, and incarceration of foreign dissidents.[44]

On September 14, 2021, Marc Baier, 49, Ryan Adams, 34, and Daniel Gericke, 40, had each been indicted for violations of United States laws involving computer fraud and improper exporting of technology. They agreed to deferred prosecution in exchange for: (a) paying fines over three years of $750,000, $600,000, and $335,000, respectively, totaling $1.68 million; (b) supporting FBI and Justice Department investigations; (c) severing ties to any United Arab Emirates intelligence and law enforcement agencies; (d) submitting to a prohibition of services, including defense articles associated with ITAR and future computer network exploitation employment; (e) relinquishing their security clearances with the United States and any foreign entity; (f) accepting a lifetime ban on future security clearances from the United States.

After the UAE contracts shifted from the US parent firm CyberPoint to its UAE subsidiary DarkMatter, Baier, who was a former employee of the NSA, and Adams and Gericke, who had been in the United States military and intelligence communities, failed to acquire permission to be employed by the UAE firm. According to Lori Stroud who is a former NSA employee, the trio had worked for the United States-based CyberPoint and then for its UAE subsidiary DarkMatter. In 2018 Faisal al-Bannai confirmed that DarkMatter worked very closely with the government of the UAE and was a competitor of the Israeli firm NSO Group. From January 2016 to November 2019, the trio of Marc Baier, Ryan Adams, and Daniel Gericke significantly improved the services that DarkMatter provided to the government of the UAE.

For example, DarkMatter had hacked into an electronic communication between First Lady Michelle Obama and a former Qatari minister regarding Michelle Obama and Conan O'Brien's November 2015 trip to Qatar.[inconsistent] Both Obama and O'Brien visited the al-Udeid airbase which hosts the forward base headquarters of United States Central Command and the RAF's No. 83 Expeditionary Air Group. Additionally, the airbase has served as the headquarters of the United States Air Force Central Command during the Wars in Iraq and Afghanistan.[45][46][47][48][49][50][51][52][53][54]

DarkMatter was very interested in hacking Qatar's computers to obtain and read its electronic messages, as it was believed that Qatar was supporting the Muslim Brotherhood.[55]

New United States law

[edit]

In January 2020 during the FBI investigations into DarkMatter employees' conduct, the United States Congress passed a law proposed in 2019 by congressperson Max Rose of New York. The law requires the United States intelligence agencies to annually assess the risk to the United States national security posed by former intelligence officials and employees who are working for foreign-based firms, governments, and entities.[56][57] This law was driven in part by the United Arab Emirates cyber espionage operations against United States citizens, firms, entities, and government.[56]

See also

[edit]

Notes

[edit]
  1. ^ CyberPoint Inc. occupied suite 7967, which was a virtual office space with nineteen other companies, in the World Trade Center North Tower (also called 1 Tower or the old One World Trade Center) through the firm Alliance Business Centers / International Office Centers Corporation which was established in 1992 by its CEO Frank Cottle.[7][8][9][10][11][12]
  2. ^ From 1968 to 1969, Frank Cottle studied English as an undergraduate at Principia and from 1970 to 1973 attended United States International University in San Diego receiving a Bachelor's degree in English. From January 1973 to December 1983, he worked at Ardell Yacht and Ship Brokers in International Sales and from December 1998 to June 2000 he was at Deloitte Consulting in the Director of Procurement, USA department.[13]

References

[edit]
  1. ^ a b c d e f g h i j k l m n McLaughlin, Jenna (24 October 2016). "Featured News: Spies for Hire". The Intercept. Archived from the original on 12 June 2019.
  2. ^ a b c d e "Emerging Gulf State cyber security powerhouse growing rapidly in..." reuters.com. 2 February 2018.
  3. ^ a b c d e f g h i j k l m n o "Exclusive: Ex-NSA cyberspies reveal how they helped hack foes of UAE". Reuters.
  4. ^ a b c d e "Revealed: Secretive UAE cybersecurity firm with a history of spying on dissidents is operating in Finland". helsinkitimes.fi. 3 February 2019.
  5. ^ a b c d "UAE cyber firm DarkMatter slowly steps out of the shadows". phys.org.
  6. ^ "Ex-U.S. Intelligence Officers Admit to Hacking Crimes in Work for Emiratis".
  7. ^ Stock, Gary (September 21, 2001). "WTC Companies with phone numbers in the World Trade Center Towers". Gary Stock website. Archived from the original on September 15, 2021. Retrieved September 15, 2021 – via Southwestern Bell SMARTpages.
  8. ^ "Alliance Business Centers Network: Corporate Identity Program". Alliance Business Centers Network website (abcn.com). August 13, 2001. Archived from the original on August 13, 2001. Retrieved September 15, 2021.
  9. ^ "Alliance Business Centers: ABOUT ALLIANCE Who We Are and What We Do". Alliance Business Centers website (abcn.com). September 15, 2021. Archived from the original on September 15, 2021. Retrieved September 15, 2021.
  10. ^ Saunders, Mike (December 2016). "Frank Cottle – Chairman, Founder at Alliance Business Centers". Influential Entrepreneurs (businessinnovatorsradio.com). Archived from the original on September 15, 2021. Retrieved September 15, 2021.
  11. ^ "Alliance Virtual Offices: About Management and Staff, Frank Cottle". Alliance Virtual Offices website (alliancevirtualoffices.com). September 15, 2021. Archived from the original on September 15, 2021. Retrieved September 15, 2021.
  12. ^ "Alliance Business Centers Network: ALLIANCE NETWORK - New York". Alliance Business Centers Network website (abcn.com). December 25, 2001. Archived from the original on December 25, 2001. Retrieved September 15, 2021.
  13. ^ Cottle, Frank (September 15, 2021). "Frank Cottle bio". Retrieved September 15, 2021.
  14. ^ "Who's going to protect you online at Expo 2020?". Official Expo 2020 news blog. June 4, 2018. Retrieved August 20, 2020.[permanent dead link]
  15. ^ "Digital14 picks up Darkmatter's key activities, including the vulnerabilities researcher xen1thLabs". 21 January 2021. Retrieved September 15, 2021.
  16. ^ Ziv, Amitai [in Hebrew] (16 October 2019). "Mysterious UAE Cyber Firm Luring ex-Israeli Intel Officers With Astronomical Salaries". Haaretz.
  17. ^ Maragitelli, Simone (July 27, 2016). "How The United Arab Emirates Intelligence Tried to Hire me to Spy on its People". Archived from the original on 2016-07-27. Retrieved September 15, 2021.
  18. ^ McLaughlin, Jenna (2016-10-24). "Featured News: Spies for Hire". The Intercept. Retrieved 2020-03-03.
  19. ^ McLaughlin, Jenna (December 21, 2017). "Deep Pockets, Deep Cover: The UAE Is paying Ex-CIA officers to build a spy empire in the Gulf". Foreign Policy. Archived from the original on September 19, 2021. Retrieved September 18, 2021.
  20. ^ a b Schectman, Joel; Bing, Christopher (10 December 2019). "White House Veterans Helped Gulf Monarchy Build Secret Surveillance Unit". Reuters.
  21. ^ "Karl Gumtow". Maryland Daily Record. 2023-05-31. Retrieved 2024-03-22.
  22. ^ a b "A New Age of Warfare: How Internet Mercenaries Do Battle for Authoritarian Governments". The New York Times. 2019-03-21. Retrieved 2019-03-22.
  23. ^ "Takeaways From The Times's Investigation Into Hackers for Hire". The New York Times. 2019-03-21. Retrieved 2019-03-22.
  24. ^ Biddle, Sam; Cole, Matthew (June 12, 2019). "Team of American Hackers and Emirati Spies Discussed Attacking The Intercept". The Intercept. Archived from the original on June 12, 2019. Retrieved September 18, 2021.
  25. ^ Gallagher, Sean (February 1, 2019). "UAE buys its way toward supremacy in Gulf cyberwar, using US and Israeli experts".
  26. ^ "Saudi women's rights activist sues three ex-US intel operatives over hacking for UAE". The Guardian. 9 December 2021. Retrieved 9 December 2021.
  27. ^ Mazzetti, Mark; Perlroth, Nicole; Bergman, Ronen (22 December 2019). "It Seemed Like a Popular Chat App. It's Secretly a Spy Tool". The New York Times.
  28. ^ Menn, Joseph; Schectman, Joel (15 December 2021). "U.S. lawmakers call for sanctions against Israel's NSO, other spyware firms". Reuters. Retrieved 15 December 2021.
  29. ^ "Cyber Surveillance in the United Arab Emirates: Updated Assessment". European Centre for Democracy and Human Rights. Retrieved 25 September 2024.
  30. ^ "Ex-U.S. intel operatives who worked for UAE barred from arms exports, State Dept says". Reuters. 26 August 2022. Retrieved 26 August 2022.
  31. ^ Menn, Joseph. "ExpressVPN employees complain about ex-spy's top role at company". Reuters. Retrieved 25 September 2024.
  32. ^ Macleod, Alan. "Exposed: How Israeli Spies Control Your VPN". Orinoco Tribune. Retrieved 25 September 2024.
  33. ^ Snowden, Edward. Twitter https://x.com/Snowden/status/1438291654239215619. Retrieved 25 September 2024. {{cite web}}: Missing or empty |title= (help)
  34. ^ a b c Reuters staff. "A top secret UAE spy operation staffed by former NSA cyber-agents hacked into the iPhones of dissidents and rivals". Business Insider. {{cite web}}: |last= has generic name (help)
  35. ^ Craig Timberg; Michael Birnbaum; Drew Harwell; Dan Sabbagh (2021-07-20). "On the list: Ten prime ministers, three presidents and a king". The Washington Post. Washington, D.C. ISSN 0190-8286. OCLC 1330888409.
  36. ^ Schectman, Joel; Bing, Christopher (30 January 2019). "UAE Used Cyber Super-Weapon to Spy on iPhones of Foes". Reuters. Retrieved 18 March 2024.
  37. ^ a b c "CyberSecurity Firm Darkmatter Request to be Trusted Root CA Raises Concerns". BleepingComputer.
  38. ^ a b Quintin, Cooper (22 February 2019). "Cyber-Mercenary Groups Shouldn't be Trusted in Your Browser or Anywhere Else". Electronic Frontier Foundation.
  39. ^ a b c d "1427262 - Add DarkMatter Root Certificates". bugzilla.mozilla.org.
  40. ^ a b c "DarkMatter Concerns". Google Groups.
  41. ^ "Mozilla Blocks DarkMatter From Becoming a Trusted CA in Firefox". BleepingComputer. Retrieved 2024-01-04.
  42. ^ "Mozilla blocks UAE bid to become an internet security guardian after hacking reports". Reuters. Retrieved 9 June 2019.
  43. ^ "Google blocks websites certified by DarkMatter, after Reuters reports". Reuters. Retrieved 1 August 2019.
  44. ^ "Information War Led to Khashoggi's Murder | RealClearPolitics". www.realclearpolitics.com. Retrieved 2020-03-03.
  45. ^ "3 former U.S. officials charged in United Arab Emirates hacking scheme". Associated Press. September 14, 2021. Archived from the original on September 15, 2021. Retrieved September 15, 2021 – via Honolulu Star-Advertiser.
  46. ^ Schectman, Joel; Bing, Christopher (September 15, 2021). "Ex-U.S. intel operatives admit hacking American networks for UAE". Reuters. Retrieved September 15, 2021.
  47. ^ Bing, Christopher; Schectman, Joel (January 30, 2019). "Project Raven: Inside the UAE's secret hacking team of American mercenaries. Ex-NSA operatives reveal how they helped spy on targets for the Arab monarchy — dissidents, rival leaders and journalists". Reuters. Retrieved September 15, 2021.
  48. ^ Cimpanau, Catalin (September 14, 2021). "US fines former NSA employees who provided hacker-for-hire services to UAE". TheRecord.media. Retrieved September 15, 2021.
  49. ^ "3 former U.S. intelligence operatives to pay over $1.6 million to resolve mercenary hacking charges: The men worked for the United Arab Emirates and faced federal charges of conspiring to violate hacking laws, the Justice Department said Tuesday". NBC News. September 14, 2021. Retrieved September 15, 2021.
  50. ^ Hsu, Spencer (September 15, 2021). "Three former U.S. intelligence operatives admit to working as 'hackers-for-hire' for UAE". The Washington Post. Retrieved September 15, 2021.
  51. ^ "הסדר טיעון עם שלושה אנשי ביון לשעבר מגלה: איחוד האמירויות הפעיל פצחנים בארה"ב" [A plea deal with three former spies reveals: The UAE has activated crackers in the US]. news1.co.il (in Hebrew). September 15, 2021. Archived from the original on September 16, 2021. Retrieved September 15, 2021.
  52. ^ "First Lady Michelle Obama to Travel to the State of Qatar and the Hashemite Kingdom of Jordan". FLOTUS: The White House. October 28, 2015. Retrieved September 15, 2021.
  53. ^ Weinberg, David Andrew (November 3, 2015). "Michelle's Dangerous Journey to Qatar: The First Lady preaches tolerance where only last week a sheik declared of Jews: 'Kill them completely.'". Politico. Retrieved September 15, 2021.
  54. ^ AP staff (November 2, 2015). "US first lady Michelle Obama arrives in Qatar for speech". Associated Press. Retrieved September 15, 2021 – via Seattle Times.
  55. ^ "Will Qatar's Relationship with the Muslim Brotherhood Change after Gulf Reconciliation?".
  56. ^ a b Schectman, Joel; Bing, Christopher (January 22, 2020). "New U.S. law requires government to report risks of overseas activities by ex-spies". Reuters. Archived from the original on April 15, 2021. Retrieved September 18, 2021.
  57. ^ Riley, Tonya (September 14, 2021). "Former US intelligence operatives charged with helping UAE hack rivals, Americans". cyberscoop.com. Archived from the original on September 17, 2021. Retrieved September 14, 2021.
[edit]