Operations Support Branch

Last updated

Operations Support Branch
Seal of the Central Intelligence Agency with wordmark.svg
Agency overview
TypeDepartment of the Central Intelligence Agency
StatusActive (As of 2020)
HeadquartersVirginia
Parent agency Central Intelligence Agency

The Operations Support Branch (OSB) is a unit of the cyber-intelligence division of the Central Intelligence Agency (CIA). [1] It is located on the ninth floor of a secret facility in the suburbs of northern Virginia, west of Washington, D.C. [1] Patrick Radden Keefe described the OSB as the CIA's "secret hacker unit, in which a cadre of élite engineers create cyberweapons" in a June 2022 article for The New Yorker . [1]

The OSB specialises in physical access operations in which 'physical access' is gained to electronic devices owned by high value individual targets such as foreign government officials and terrorists. [1] The OSB is able to quickly develop tools that can be utilised in cyberintelligence missions at short notice. [1]

According to anonymous witnesses who testified at Joshua Schulte's trial, the OSB was filled with workspace pranks, like stealing coworkers' things, name calling, shoving matches, rubber band and Nerf gun wars. Asked if she was aware of this, the former head of CIA's Center for Cyber Intelligence Bonnie Stith said she was not. [2]

The employees of the OSB numbered about a dozen in the 2010s. [1] Radden Keefe described the extreme secrecy of the OSB at this period as resulting in staff unable to " ... take work home, or talk with anyone on the outside about what they did all day. Their office was a classified sanctum, a locked vault. Like the crew of a submarine, they forged strong bonds—and strong antagonisms". [1] The software engineer Joshua Schulte was employed by the OSB from 2010 to 2016. He was convicted of being the leaker of the Vault 7 documents which detail electronic surveillance and cyber warfare tools developed by the CIA. [1] [3] [4] [5] Schulte was nicknamed 'Voldemort' during his time at the OSB. [1] The leak and publication of the Vault 7 documents was a significant blow to the CIA, a senior official likened it to the 'digital' equivalent of the attack on Pearl Harbor in its scope and fallout. [1]

Related Research Articles

<span class="mw-page-title-main">Hacktivism</span> Computer-based activities as a means of protest

Internet activism, hacktivism, or hactivism, is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. With roots in hacker culture and hacker ethics, its ends are often related to free speech, human rights, or freedom of information movements.

Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation. Acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet by means of tools such as computer viruses, computer worms, phishing, malicious software, hardware methods, and programming scripts can all be forms of internet terrorism. Cyberterrorism is a controversial term. Some authors opt for a very narrow definition, relating to deployment by known terrorist organizations of disruption attacks against information systems for the primary purpose of creating alarm, panic, or physical disruption. Other authors prefer a broader definition, which includes cybercrime. Participating in a cyberattack affects the terror threat perception, even if it isn't done with a violent approach. By some definitions, it might be difficult to distinguish which instances of online activities are cyberterrorism or cybercrime.

<span class="mw-page-title-main">Stratfor</span> American geopolitical advising firm

Strategic Forecasting Inc., commonly known as Stratfor, is an American strategic intelligence publishing company founded in 1996. Stratfor's business model is to provide individual and enterprise subscriptions to Stratfor Worldview, its online publication, and to perform intelligence gathering for corporate clients. The focus of Stratfor's content is security issues and analyzing geopolitical risk.

A news leak is the unsanctioned release of confidential information to news media. It can also be the premature publication of information by a news outlet, of information that it has agreed not to release before a specified time, in violation of a news embargo.

<span class="mw-page-title-main">WikiLeaks</span> News leak publishing organisation

WikiLeaks is a media organisation and publisher of leaked documents. It is a non-profit and is funded by donations and media partnerships. It has published classified documents and other media provided by anonymous sources. It was founded in 2006 by Julian Assange, an Australian editor, publisher, and activist, who is currently challenging extradition to the United States over his work with WikiLeaks. Since September 2018, Kristinn Hrafnsson has served as its editor-in-chief. Its website states that it has released more than ten million documents and associated analyses. WikiLeaks' most recent publication of original documents was in 2019 and its most recent publication was in 2021. From November 2022, numerous documents on the organisation's website became inaccessible. In 2023, Assange said that WikiLeaks is no longer able to publish due to his imprisonment and the effect that US government surveillance and WikiLeaks' funding restrictions were having on potential whistleblowers.

<span class="mw-page-title-main">Consulate General of the United States, Frankfurt</span> US consular post in Germany

The Consulate General of the United States in Frankfurt am Main represents the interests of the United States government in Frankfurt, Germany and nearby surrounding areas. It is the largest Consulate General of the US. It is more extensive regarding personnel and facilities than many US Embassies. Although technically a part of Mission Germany and reporting through the Embassy of the United States in Berlin, the Frankfurt Consulate General operates with a significant degree of autonomy compared to other U.S. Consulates. This is partly due to several large U.S. government regional centers housed within the Consulate, which provide support in security, construction, and financial matters to several other U.S Diplomatic posts located throughout Europe, the Middle East, and Africa.

<span class="mw-page-title-main">John Kiriakou</span> American counter-terrorism consultant

John Chris Kiriakou is an American author, journalist and former intelligence officer. Kiriakou is a columnist with Reader Supported News and co-host of Political Misfits on Sputnik Radio.

Cyberwarfare by China is the aggregate of all combative activities in the cyberspace which are taken by organs of the People's Republic of China, including affiliated advanced persistent threat (APT) groups, against other countries.

Operation Olympic Games was an ostensible and still unacknowledged campaign of sabotage by means of cyber disruption, directed at Iranian nuclear facilities likely by the United States and Israel. As reported, it is one of the first known uses of offensive cyber weapons. Started under the administration of George W. Bush in 2006, Olympic Games was accelerated under President Obama, who heeded Bush's advice to continue cyber attacks on the Iranian nuclear facility at Natanz. Bush believed that the strategy was the only way to prevent an Israeli conventional strike on Iranian nuclear facilities.

Cyberweapons are commonly defined as malware agents employed for military, paramilitary, or intelligence objectives as part of a cyberattack. This includes computer viruses, trojans, spyware, and worms that can introduce malicious code into existing software, causing a computer to perform actions or processes unintended by its operator.

<span class="mw-page-title-main">Patrick Radden Keefe</span> American writer and journalist (born 1976)

Patrick Radden Keefe is an American writer and investigative journalist. He is the author of five books—Chatter,The Snakehead,Say Nothing,Empire of Pain, and Rogues—and has written extensively for many publications, including The New Yorker, Slate, and The New York Times Magazine. He is a staff writer at The New Yorker.

The 2016 Democratic National Committee email leak is a collection of Democratic National Committee (DNC) emails stolen by one or more hackers operating under the pseudonym "Guccifer 2.0" who are alleged to be Russian intelligence agency hackers, according to indictments carried out by the Mueller investigation. These emails were subsequently leaked by DCLeaks in June and July 2016 and by WikiLeaks on July 22, 2016, just before the 2016 Democratic National Convention. This collection included 19,252 emails and 8,034 attachments from the DNC, the governing body of the United States Democratic Party. The leak includes emails from seven key DNC staff members dating from January 2015 to May 2016. On November 6, 2016, WikiLeaks released a second batch of DNC emails, adding 8,263 emails to its collection. The emails and documents showed that the Democratic Party's national committee favored Clinton over her rival Bernie Sanders in the primaries. These releases caused significant harm to the Clinton campaign, and have been cited as a potential contributing factor to her loss in the general election against Donald Trump.

Harold Thomas Martin III is an American computer scientist and former contractor for Booz Allen Hamilton who in 2019 pleaded guilty to illegally removing 50 terabytes of data from the National Security Agency. The United States government reportedly failed to note or effectively respond to a number of issues with Martin's security practices and behaviors over a period of 10 to 20 years. The motive for the crime has been a subject of debate, investigators reportedly had difficulty determining if Martin was engaged in conventional espionage or digital hoarding since throughout his decades of work, he appeared not to have ever accessed any of the files once he removed them from government facilities.

<span class="mw-page-title-main">Vault 7</span> CIA files on cyber war and surveillance

Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, detailing the activities and capabilities of the United States Central Intelligence Agency (CIA) to perform electronic surveillance and cyber warfare. The files, dating from 2013 to 2016, include details on the agency's software capabilities, such as the ability to compromise cars, smart TVs, web browsers including Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera, the operating systems of most smartphones including Apple's iOS and Google's Android, and computer operating systems including Microsoft Windows, macOS, and Linux. A CIA internal audit identified 91 malware tools out of more than 500 tools in use in 2016 being compromised by the release. The tools were developed by the Operations Support Branch of the CIA.

<span class="mw-page-title-main">Joshua Schulte</span> Former CIA employee and criminal (born 1988)

Joshua Adam Schulte is a former Central Intelligence Agency (CIA) employee who was convicted of leaking classified documents to WikiLeaks. WikiLeaks published the documents as Vault 7, which The New York Times called "the largest loss of classified documents in the agency's history and a huge embarrassment for C.I.A. officials." After his conviction, the Department of Justice called it "one of the most brazen and damaging acts of espionage in American history."

The Signals Intelligence Agency (SIA), formerly known as the National Electronic Security Authority (NESA), is the United Arab Emirates intelligence agency. In response to alleged cyber spying on opponents of Iran's best interests by the government of Iran during 2010 and 2011, the United States assisted the United Arab Emirates in late 2011 with establishing the National Electronic Security Authority (NESA) which is the UAE's equivalent to the US NSA. Created in 2012 through a Federal Decree Law, one of its official objectives is to organize the protection of the UAE's communications network and information systems.

References

  1. 1 2 3 4 5 6 7 8 9 10 Keefe, Patrick Radden (June 6, 2022). "The Surreal Case of a C.I.A. Hacker's Revenge". The New Yorker . Retrieved June 8, 2022.
  2. Hong, Nicole (February 17, 2020). "Life of a C.I.A. Coder: Nerf Guns, Pranks and Fat Jokes". The New York Times . ISSN   0362-4331 . Retrieved July 30, 2022.
  3. Williams, Damian (July 13, 2022). "Statement Of U.S. Attorney Damian Williams On The Espionage Conviction Of Ex-CIA Programmer Joshua Adam Schulte" (Press release). United States Department of Justice . Retrieved July 29, 2022.
  4. Shanahan, Ed (July 13, 2022). "Ex-C.I.A. Engineer Convicted in Biggest Theft Ever of Agency Secrets". The New York Times . ISSN   0362-4331 . Retrieved July 29, 2022.
  5. "Ex-CIA engineer convicted over massive data leak". Al Jazeera English. July 14, 2022. Retrieved July 29, 2022.