View text source at Wikipedia
Company type | Private |
---|---|
Industry | cybersecurity |
Founded | 2014 |
Headquarters | Abu Dhabi, United Arab Emirates |
Area served | UAE, Finland, Canada |
Key people |
|
Website | www |
DarkMatter Group is a computer security company[1][2] founded in the United Arab Emirates (UAE) in 2014[3][4] or 2015.[5] The company has described itself as a purely defensive company, however in 2016, it became a contractor for Project Raven, to help the UAE surveil other governments, militants, and human rights activists.[citation needed] It has employed former U.S. intelligence operatives and graduates of the Israel Defense Force technology units.[6][citation needed]
DarkMatter was founded in either 2014[3][4] or 2015[5] by Emirati business man Faisal al-Bannai, the founder of mobile phone vendor Axiom Telecom and the son of a major general in the Dubai Police Force.[5][3][2] Zeline 1, a wholly owned subsidiary of DarkMatter, became active in Finland around 2014.[4]
DarkMatter's public launch came in 2015, at the 2nd Annual Arab Future Cities Summit.[1] At this time, the company advertised capabilities including network security and bug sweeping, and promised to create a new, "secure" mobile phone handset.[1] It promoted itself as a "digital defense and intelligence service" for the UAE.[1]
In 2016, DarkMatter replaced CyberPoint as a contractor for Project Raven.[3][a][b] Also in 2016, DarkMatter sought smartphone development expertise in Oulu, Finland, recruiting several Finnish engineers.[4]
By early 2018, DarkMatter's turnover was hundreds of millions of U.S. dollars.[2] Eighty percent of its work was for the UAE government and related organizations, including the NESA.[2] It had developed a smartphone model called Katim, Arabic for "silence".[4][5] DarkMatter was an official provider for the Expo 2020,[14] but has since been dropped in favour of a different company.
In 2021, DarkMatter's cyber activities had already been transferred to Digital14, which has been distributing the secure communications system 'Katim'.[15]
In addition to recruiting via conventional routes such as personal referrals and stalls at trade shows (e.g. Black Hat),[1] DarkMatter headhunted staff from the U.S. National Security Agency and "poached" competitors' staff after they were contracted to the UAE government, as happened with some CyberPoint employees.[1][2]
The company reportedly hired graduates of the Israel Defense Force technology units and paid them up to US$1 million annually.[16]
Simone Maragitelli, an Italian security researcher, blogged about DarkMatter's vague and dubious recruiting practices as a warning to others. He claimed that any questions or objections to the company's practices would result in being told that "things had been blown out of proportion" and that information about the job opening was extremely vague despite asking questions.[17][18]
In response to alleged cyber spying on opponents of Iran's best interests by the government of Iran during 2010 and 2011, the United States assisted the United Arab Emirates in late 2011 with establishing the National Electronic Security Authority (NESA) which is the UAE's equivalent to the US NSA.[19]
Project Raven was a confidential initiative to help the UAE surveil other governments, militants, and human rights activists.[3] Its team included former U.S. intelligence agents, who applied their training to hack phones and computers belonging to Project Raven's victims.[3] The operation was based in a converted mansion in a suburb of Abu Dhabi in Khalifa City nicknamed "the Villa."[3]
The project originated in 2008 as the Development Research Exploitation and Analysis Department (DREAD), developed by Richard A. Clarke through his security advisory group Good Harbor Consulting, as an arm of UAE royal Mohamed bin Zayed Al Nahyan's court.[20] By the end of 2010, Good Harbor had stepped back from DREAD, ceding control to Karl Gumtow, the co-founder and CEO of CyberPoint.[20][21]
From around 2014 to 2016, CyberPoint supplied U.S.-trained contractors to Project Raven. In 2016, news reports emerged that CyberPoint had contracted with the Italian spyware company Hacking Team, which damaged CyberPoint's reputation as a defensive cybersecurity firm.[1] Reportedly dissatisfied with relying upon a U.S.-based contractor, the UAE replaced CyberPoint with DarkMatter as its contractor, and DarkMatter induced several CyberPoint staff to move to DarkMatter.[3][22] After this, Project Raven reportedly expanded its surveillance to include the targeting of Americans, potentially implicating its American staff in unlawful behaviour.[3][22][23]
Following a 24 October 2016 The Intercept article revealing DarkMatter surveillance for UAE, Samer Khalife, the chief financial officer for DarkMatter, transferred some United States citizens from DarkMatter to a new company Connection Systems and tiger teams were established by DarkMatter to counter the allegations contained in The Intercept article.[24]
On 1 February 2019, Ars Technica published comments from a former employee of DarkMatter, Daniel Wolford. He stated, "We did not hack Americans...Our mission was simple: advise and assist UAE to create a national cyber security program similar to NTOC (NSA/CSS Threat Operations Center)." The work done creating a "target list," Wolford said, was part of a training operation "to teach the Emiratis about lawful targeting and collection," he asserted. "We tried to show them who is and isn't a threat to their national security."[25]
On 9 December 2021, Loujain al-Hathloul filed a lawsuit in a US district court in Oregon against three former US intelligence and military officers, who carried out hacking operations on behalf of the UAE. According to the lawsuit, the three men — Marc Baier, Ryan Adams, and Daniel Gericke — worked for DarkMatter and assisted the Emirati security officials to exfiltrate data from her iPhone. The hacking had led to al-Hathloul's arrest from the UAE and rendition to Saudi Arabia, where she was detained, imprisoned and tortured.[26]
On 22 December 2021, a very popular messaging app named ToTok was deemed to be a secret spy tool, developed by the UAE. Very little is known about the tool and what its capabilities are.[27]
In December 2021, U.S. lawmakers urged the Treasury and State Departments to sanction DarkMatter, NSO Group, Nexa Technologies, and Trovicor. The letter signed by the Senate Finance Committee Chairman Ron Wyden, House Intelligence Committee Chairman Adam Schiff, and 16 other lawmakers, asked for Global Magnitsky sanctions, as the companies were accused of enabling human rights abuses. The letter demanded that high-ranking executives at DarkMatter, along with the three other firms, be sanctioned.[28]
On 26 August 2022, the three former U.S. intelligence operatives who helped the UAE spy on human rights activists, journalists, and governments were barred from arms export activities under a deal announced by the State Department. The operatives, Marc Baier, Ryan Adams, and Daniel Gericke, admitted their involvement in Project Raven on 15 September 2022, resulting in them relinquishing their security clearance and paying $1.68 million in exchange for their criminal charges being dropped.[29] The three were prohibited for three years from participating directly or indirectly in any activities subject to the International Traffic in Arms Regulations (ITAR).[30] Daniel Gericke subsequently served as Chief Technology Officer at ExpressVPN, a subsidiary of British-Israeli company Kape Technologies,[31] leading Edward Snowden to warn the company's customers.[32][33]
In 2016, Project Raven bought a tool called Karma.[34] Karma was able to remotely exploit Apple iPhones anywhere in the world, without requiring any interaction on the part of the iPhone's owner as long as a username was provided, such as Apple ID, Email address associated with the phone, or phone number.[3] It apparently achieved this by exploiting a zero-day vulnerability in the device's iMessage app.[3] Project Raven operatives were able to view passwords, emails, text messages, photos and location data from the compromised iPhones.[34][3]
People whose mobile phones have been deliberately compromised using Karma reportedly include:
Around mid-2017, Apple patched some of the security vulnerabilities exploited by Karma, unknowingly reducing the tool's effectiveness.[34]
In 2016, two DarkMatter whistleblowers and multiple other security researchers expressed concerns that DarkMatter intended to become a certificate authority (CA).[1] This would give it the technical capability to create fraudulent certificates, which would allow fraudulent websites or software updates to convincingly masquerade as legitimate ones.[1] Such capabilities, if misused, would allow DarkMatter to more easily deploy rootkits to targets' devices, and to decrypt HTTPS communications of Firefox users via man-in-the-middle attacks.[1][37][38]
On 28 December 2017, DarkMatter requested that Mozilla include it as a trusted CA in the Firefox web browser.[39] For more than a year, Mozilla's reviewers addressed concerns about DarkMatter's technical practices, eventually questioning on that basis whether DarkMatter met the baseline requirements for inclusion.[39][40]
On 30 January 2019, Reuters published investigations describing DarkMatter's Project Raven.[3][37] Mozilla's reviewers noted the investigation's findings.[40] Subsequently, the Electronic Frontier Foundation (EFF) and others asked Mozilla to deny DarkMatter's request, on the basis that the investigation showed DarkMatter to be untrustworthy and therefore liable to misuse its capabilities.[37][38][40][39] On 5 July 2019, after Mozilla's public consultation it was decided to not allow DarkMatter to become a trusted CA in Firefox.[41][39]
In July 2019, Mozilla prohibited the government of the United Arab Emirates from operating as one of its internet security gatekeepers, following reports on the cyber-espionage program, which was run by Abu Dhabi-based DarkMatter staff for leading a clandestine hacking operation.[42]
In August 2019, Google blocked websites approved by DarkMatter, after Reuters reported the firm's involvement in a hacking operation led by the United Arab Emirates. Google, previously, said that all websites certified by DarkMatter would be marked as unsafe by its Chrome and Android browsers.[43]
As of 2020, DarkMatter has been under investigation by the FBI for crimes including digital espionage services, involvement in the Jamal Khashoggi assassination, and incarceration of foreign dissidents.[44]
On September 14, 2021, Marc Baier, 49, Ryan Adams, 34, and Daniel Gericke, 40, had each been indicted for violations of United States laws involving computer fraud and improper exporting of technology. They agreed to deferred prosecution in exchange for: (a) paying fines over three years of $750,000, $600,000, and $335,000, respectively, totaling $1.68 million; (b) supporting FBI and Justice Department investigations; (c) severing ties to any United Arab Emirates intelligence and law enforcement agencies; (d) submitting to a prohibition of services, including defense articles associated with ITAR and future computer network exploitation employment; (e) relinquishing their security clearances with the United States and any foreign entity; (f) accepting a lifetime ban on future security clearances from the United States.
After the UAE contracts shifted from the US parent firm CyberPoint to its UAE subsidiary DarkMatter, Baier, who was a former employee of the NSA, and Adams and Gericke, who had been in the United States military and intelligence communities, failed to acquire permission to be employed by the UAE firm. According to Lori Stroud who is a former NSA employee, the trio had worked for the United States-based CyberPoint and then for its UAE subsidiary DarkMatter. In 2018 Faisal al-Bannai confirmed that DarkMatter worked very closely with the government of the UAE and was a competitor of the Israeli firm NSO Group. From January 2016 to November 2019, the trio of Marc Baier, Ryan Adams, and Daniel Gericke significantly improved the services that DarkMatter provided to the government of the UAE.
For example, DarkMatter had hacked into an electronic communication between First Lady Michelle Obama and a former Qatari minister regarding Michelle Obama and Conan O'Brien's November 2015 trip to Qatar.[inconsistent] Both Obama and O'Brien visited the al-Udeid airbase which hosts the forward base headquarters of United States Central Command and the RAF's No. 83 Expeditionary Air Group. Additionally, the airbase has served as the headquarters of the United States Air Force Central Command during the Wars in Iraq and Afghanistan.[45][46][47][48][49][50][51][52][53][54]
DarkMatter was very interested in hacking Qatar's computers to obtain and read its electronic messages, as it was believed that Qatar was supporting the Muslim Brotherhood.[55]
In January 2020 during the FBI investigations into DarkMatter employees' conduct, the United States Congress passed a law proposed in 2019 by congressperson Max Rose of New York. The law requires the United States intelligence agencies to annually assess the risk to the United States national security posed by former intelligence officials and employees who are working for foreign-based firms, governments, and entities.[56][57] This law was driven in part by the United Arab Emirates cyber espionage operations against United States citizens, firms, entities, and government.[56]
{{cite web}}
: Missing or empty |title=
(help)
{{cite web}}
: |last=
has generic name (help)