Close this search box.
Close this search box.

Hackers For Hire : Are Hackers for Hire the Future of Global Terrorism?

Hackers For Hire : Are Hackers for Hire the Future of Global Terrorism?

Hackers For Hire : Are Hackers for Hire the Future of Global Terrorism? There was a major story earlier this week that was lost in all the big news related to the California Recall election and the still ongoing crisis in Afghanistan.

On Tuesday, the United States Department of Justice (DOJ) announced that Three Former U.S. Intelligence Community and Military Personnel that had been found to have been selling their services related to hacking to foreign governments entered into a deferred prosecution agreement.

How Vulnerable is the US Government to Cyber Attacks?

The agreement restricts their future activities. And employment and fines them a total of $1,685,000 in penalties.

This is to resolve a Department of Justice investigation. One that is regarding violations of U.S. export control, computer fraud and access device fraud laws.

The three individuals in question, Americans Marc Baier, 49, Ryan Adams, 34, and a former U.S. citizen, Daniel Gericke, 40, were all former employees of either the U.S. Intelligence Community (USIC) or the U.S. military.

According to the DOJ press release announcing the actions:

“the defendants worked as senior managers at a United Arab Emirates (U.A.E.)-based company (U.A.E. CO) that supported and carried out computer network exploitation (CNE) operations (i.e., “hacking”) for the benefit of the U.A.E government between 2016 and 2019. Despite being informed on several occasions that their work for U.A.E. CO, under the International Traffic in Arms Regulations (ITAR), constituted a “defense service” requiring a license from the State Department’s Directorate of Defense Trade Controls (DDTC), the defendants proceeded to provide such services without a license.

These services included the provision of support, direction and supervision in the creation of sophisticated “zero-click” computer hacking and intelligence gathering systems – i.e., one that could compromise a device without any action by the target. U.A.E. CO employees whose activities were supervised by and known to the defendants thereafter leveraged these zero-click exploits to illegally obtain and use access credentials for online accounts issued by U.S. companies, and to obtain unauthorized access to computers, like mobile phones, around the world, including in the United States.”

The prosecutions are significant. Due to recent shifts in power within the volatile Middle Eastern region. As a result of the ongoing crisis in Afghanistan and the implications of these events globally.

There have been several instances of terror. Ones inspired by hacking incidents. Incidents sponsored by sovereign nation states occurring in greater frequency over the past several years. In particular, countries that include Iran, China and Russia invested heavily in entities that are defined as Advanced Persistent Threats or APTs.

These groups have been previously associated with hacks against infrastructure targets. Furthermore hacks on widespread data collection campaigns. One of the more prominent examples of these attacks was the 2018 Petya/NotPetya attack which infected at least 230,000 computers across the globe.

The hack leveraged the same attack vector. One with malicious code hidden in a popular software update. This same hack appeared in the infamous SolarWinds hack. A hack that still has security personnel scrambling to access exposure and damages.

Terrorist groups have previously attempted to create modernized hacking operations only to see those efforts partially thwarted, but with the Taliban’s recent acquisition of tens of billions of dollars’ worth of weapons to potentially monetize, the chances of them quickly ramping up their terror hacking capabilities has certainly multiplied.

This makes the Justice Department’s attempt to dissuade US trained individuals from selling their knowledge to our enemies a significant development. Although it is a positive first step, there is one major limitation to the scope of these kinds of prosecutions.

That is the fact that Americans always have the option of renouncing their citizenship once they land on foreign soil. This gives an advantage to well-funded, Anti-American governments that may be able to entice individuals and offer them asylum and protection from prosecution.

By offering far more than a government. Or even an amount greater than most American contractors are willing to pay. Well-funded enemy belligerents may be able to buy off some of the countries’ best and brightest. As a result of their effort to carry out nefarious plans.

Growing Domestic Cyber Threats : New DHS and CISA Programs Created

And it certainly is not without precedent. During the rise of the Narco State in Columbia during the 1990’s. Drug cartels hired some of the world’s most prominent chemists. These cartels hired the chemists to manipulate cocaine. This was in an effort to make the drug less detectable and easier to transport globally.

The United States after WW2 also seized upon the some of the world’s premier engineers. After the fall of Nazi Germany and immediately put them to work for America.

In conclusion, monetary sums will always influence greedy and enethical hackers. Furthermore, they will do the bidding of whomever is willing to provide protection and the largest salary. Lastly, this makes it imperative that the United States and our allies create a different atmosphere. One that our top cyber professionals will never want to walk away from.

Beware: Election Phishing : many dark agents are at play in US voting

Hackers For Hire : Are Hackers for Hire the Future of Global Terrorism? Written by Julio Rivera

Julio is a business and political strategist, the Editorial Director for Reactionary Times, and a political commentator and columnist. Julio’s writing focuses on cybersecurity and politics. Websites including Newsmax, Townhall, American Thinker and BizPacReview have published Julio’s work.

Hackers For Hire : Are Hackers for Hire the Future of Global Terrorism?

Staying Safe Online : Protecting Your Device and Identity in 2021

Hackers For Hire : Are Hackers for Hire the Future of Global Terrorism?