Thursday, August 11, 2022
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

At Second Trial, Ex-CIA Employee Defends Himself in Big Leak

Researcher by Researcher
June 15, 2022
in Cybersecurity
0
High-Severity Flaw in Argo CD is Information Leak Risk
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


A former CIA software engineer charged with causing the biggest theft of classified information in CIA history defended himself at the start of his trial Tuesday, telling jurors he was falsely accused and the victim of a political witch hunt.

Joshua Schulte, 33, said he was singled out for investigation and arrested on espionage charges because of his clashes with CIA management before the 2017 public release of a trove of CIA secrets by WikiLeaks. At a previous trial, a jury deadlocked on espionage charges but convicted him of lesser contempt and false statement charges.

Related articles

U.S. Gov Offers $5M Reward For North Korean Cybercrime Intel

How Three Ransomware Groups Targeted One Vulnerable Network

August 11, 2022
High-Severity Flaw in Argo CD is Information Leak Risk

Organizations Warned of Critical Vulnerabilities in NetModule Routers

August 11, 2022

He said the government had built a case that was “literally forensically impossible” after singling him out for prosecution as the guilty party during a “political witch hunt” and then working backward to present jurors with “an alternative reality, an upside-down world, a government twilight zone.”

[ Read: “Vault 7” Leak Shows CIA Learned From NSA Mistakes ]

“The trial evidence will absolutely prove my innocence,” Schulte told jurors in Manhattan federal court. “Because I am in fact innocent.”

Schulte made his opening statement after Assistant U.S. Attorney David Denton told the jury that the evidence would prove that Schulte was responsible for an unprecedented leak that brought critical intelligence gathering around the world “to a crashing halt.”

He said years of work and millions of dollars spent to develop tools that enabled the CIA’s digital sleuths to spy on foreign adversaries “went up in smoke” as Schulte gave “precious secrets of America’s national defense” to the world.

The so-called Vault 7 leak revealed how the CIA hacked Apple and Android smartphones in overseas spying operations and efforts to turn internet-connected televisions into listening devices.

Prior to his arrest, Schulte worked as a coder at the agency’s headquarters in Langley, Virginia.

Denton portrayed the government’s case against Schulte as airtight, saying there was “devastating proof of this man’s crimes.”

He said Schulte was motivated to leak the materials because he believed the CIA had disrespected him. So he tried “to burn to the ground” the very work he had helped the agency to create, the prosecutor said.

Denton said Schulte, after his arrest, continued his crimes by trying to leak additional classified materials from prison as he carried on an “information war” against the government.

But Schulte contested the portrayal, saying he was inspired to serve his country ever since the Sept. 11 terrorism attacks, when as a 12-year-old boy in the 7th grade, he vowed to do whatever he could to prevent another day like that.

Hired by the CIA in 2010, Schulte said he worked on a team that helped verify the location of Osama bin Laden before the al-Qaida leader was killed in a U.S. overnight raid in Pakistan.

“No one has ever questioned my loyalty or patriotism,” he said, adding “That is until now.”

Clad in a coat and tie, he also decried his treatment for the last five years in federal jails, telling jurors: “My very life is in our hands. Put yourself in my shoes.”

After the jury was sent home for the day, Judge Jesse M. Furman told Schulte he had at times crossed the line between testifying and presenting an opening statement and warned him to be more careful going forward.

Related: Cisco Finds Zero-Day Vulnerability in ‘Vault 7’ Leak

view counter

Previous Columns by Associated Press:
Tags:



Source link

Tags: BigDefendsemployeeExCIAleakTrial
Share76Tweet47

Related Posts

U.S. Gov Offers $5M Reward For North Korean Cybercrime Intel

How Three Ransomware Groups Targeted One Vulnerable Network

August 11, 2022
0

“This is something we’re seeing affecting more and more organizations, and it’s likely due to an increasingly crowded market for...

High-Severity Flaw in Argo CD is Information Leak Risk

Organizations Warned of Critical Vulnerabilities in NetModule Routers

August 11, 2022
0

Flashpoint is warning organizations of two newly identified critical vulnerabilities in NetModule Router Software (NRSW) that could be exploited in...

Top 5 best backup practices

Top 5 best backup practices

August 10, 2022
0

Give yourself peace of mind by implementing a new backup strategy with our tips. Image: apinan/Adobe Stock You know that...

NVIDIA Fixes High-Severity Flaws in Graphics Drivers For Windows, Linux

Microsoft Fixes Known, Exploited Flaw in Windows Diagnostic Tool

August 10, 2022
0

Microsoft said it fixed a variant of a publicly known vulnerability that was first reported to the company in 2019....

Musk Threatens to Walk Away From Twitter Deal

Jury Finds Ex-Twitter Worker Spied for Saudi Royals

August 10, 2022
0

A former Twitter worker was found guilty on Tuesday of spying for Saudi officials keen to unmask critics on the...

Load More
  • Trending
  • Comments
  • Latest
Brave browser’s Tor mode exposed users’ dark web activity

Brave browser’s Tor mode exposed users’ dark web activity

February 18, 2022
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
U.S. Gov Offers $5M Reward For North Korean Cybercrime Intel

How Three Ransomware Groups Targeted One Vulnerable Network

August 11, 2022
High-Severity Flaw in Argo CD is Information Leak Risk

Organizations Warned of Critical Vulnerabilities in NetModule Routers

August 11, 2022
Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

August 11, 2022
Makulu Linux Shift makes shifting between desktop layouts easy

Makulu Linux Shift makes shifting between desktop layouts easy

August 10, 2022

Recent Posts

U.S. Gov Offers $5M Reward For North Korean Cybercrime Intel

How Three Ransomware Groups Targeted One Vulnerable Network

August 11, 2022
High-Severity Flaw in Argo CD is Information Leak Risk

Organizations Warned of Critical Vulnerabilities in NetModule Routers

August 11, 2022
Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

August 11, 2022

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access Android attack Attacks banking BiWeekly bug Cisco critical Cyber Cybersecurity Data devices Digital exploited financial Finds Fintech Flaw flaws Google Group Hackers Krebs Latest malware Microsoft million Network News open Payments phishing Ransomware RoundUp security Software TFT Threat Top vulnerability warns Week Windows zeroday

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved