<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:snf="http://www.smartnews.be/snf"
     xmlns:media="http://search.yahoo.com/mrss/" >

    <channel>
        <title>The Intercept</title>
        <atom:link href="https://theintercept.com/staff/jennamclaughlin/feed/" rel="self" type="application/rss+xml" />
        <link>https://theintercept.com/staff/jennamclaughlin/</link>
        <description></description>
        <lastBuildDate>Sat, 25 Apr 2026 19:19:25 +0000</lastBuildDate>
        <language>en-US</language>
                <sy:updatePeriod>hourly</sy:updatePeriod>
        <sy:updateFrequency>1</sy:updateFrequency>
        <generator>https://wordpress.org/?v=6.9.4</generator>
<site xmlns="com-wordpress:feed-additions:1">220955519</site>
            <item>
                <title><![CDATA[Congress May Lack Technical Expertise to Properly Investigate Russian Hacking]]></title>
                <link>https://theintercept.com/2017/02/28/congress-may-lack-technical-expertise-to-properly-investigate-russian-hacking/</link>
                <comments>https://theintercept.com/2017/02/28/congress-may-lack-technical-expertise-to-properly-investigate-russian-hacking/#comments</comments>
                <pubDate>Tue, 28 Feb 2017 15:38:19 +0000</pubDate>
                                    <dc:creator><![CDATA[Jenna McLaughlin]]></dc:creator>
                                		<category><![CDATA[Unofficial Sources]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=114749</guid>
                                    <description><![CDATA[<p>The lack of technical chops among congressional staff has become a glaring problem as cyber attacks escalate and move to the political fore.</p>
<p>The post <a href="https://theintercept.com/2017/02/28/congress-may-lack-technical-expertise-to-properly-investigate-russian-hacking/">Congress May Lack Technical Expertise to Properly Investigate Russian Hacking</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><u>Congressional intelligence committee</u> leaders have pledged to examine Russia&#8217;s involvement in hacks against Democrats during the 2016 presidential election. As the ranking member of the Senate&#8217;s intelligence panel Rep. Adam Schiff put it, &#8220;we want to make sure that the intelligence community got it right. &#8230; We want to look at the raw intelligence, and make sure their conclusions were substantiated.&#8221;</p>
<p>But a detailed investigation into hacking demands technical skills that staff for the House and Senate Intelligence Committees appear to be lacking.</p>
<p>Research into public committee staff lists, LinkedIn, and conversations with several sources who have interacted with the committees shows a serious dearth of technical expertise among the staffers cleared to access classified materials that would be involved in the investigation. Essentially, committee staff are underwater when it comes to poking into the nitty gritty of cyber warfare — a longstanding problem made more relevant as attacks on U.S. government and politicians escalate.</p>
<!-- BLOCK(promote-post)[0](%7B%22componentName%22%3A%22PROMOTE_POST%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22slug%22%3A%22election%22%2C%22crop%22%3A%22promo%22%7D) --><aside class="promote-banner">
    <a class="promote-banner__link" href="/collections/election-insecurity/">
              <span class="promote-banner__image">
          <img decoding="async" width="300" height="150" src="https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?fit=300%2C150" class="attachment-medium size-medium" alt="Supporters of Democratic presidential nominee Hillary Clinton wave flags during election night at the Jacob K. Javits Convention Center in New York on November 8, 2016.  / AFP / Kena Betancur        (Photo credit should read KENA BETANCUR/AFP/Getty Images)" srcset="https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?w=2965 2965w, https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?w=2400 2400w" sizes="(max-width: 300px) 100vw, 300px" />        </span>
            <div class="promote-banner__text">
                  <p class="promote-banner__eyebrow">
            Read Our Complete Coverage          </p>
        
        <h2 class="promote-banner__title">Election Insecurity</h2>
      </div>
    </a>
  </aside><!-- END-BLOCK(promote-post)[0] -->
<p>Committees and their members customarily rely on staff to do the heavy lifting to prepare background research, evaluate evidence and information, and advise on policy and legal issues. Depending on the committee, staffers are typically well-versed in the law, international affairs, Washington policy debates, and more. But a technical matter like the election hacks benefits from knowledge of coding, information security, and attribution.</p>
<p>The bulk of staff on the intelligence committees — more than two dozen on each — are lawyers, policy wonks, and budget experts.  Many staffers worked in the legislative affairs offices of other senators and members of Congress, government budget offices, the Department of Justice, the military, private law firms, defense contractors, or Washington think tanks. While they&#8217;ve served for many years in their respective areas, those areas are rarely technical.</p>
<p>While some programs were created in recent years to remedy the desperate need for computer scientists and hackers on the Hill — like TechCongress, a tech policy fellowship in D.C. — the intelligence committees don&#8217;t normally accept fellows or detailees due to the sensitivity of the policy issues they discuss.</p>
<p>&#8220;Anecdotally, of the 15,000 staff in Congress, I&#8217;m aware of six that have technology-related educational backgrounds,&#8221; Travis Moore, the founder and director of TechCongress told The Intercept in response to a question about the staffing on the intelligence committees. &#8220;This is a problem. All policy is increasingly &#8216;tech&#8217; policy.&#8221;</p>
<p>Spokespeople for the House and Senate Intelligence Committees declined comment on the expertise of their staff. The Senate Intelligence Committee does have new leadership in Democratic Sen. Mark Warner, who made his fortune investing in the cellular telecom industry and took a prominent role in the debate over encryption technology last Congress and who may emphasize technical issues in the coming debates over Russia.</p>
<p>But at the end of the day, there&#8217;s not much money to throw around, and adding a technical staffer might mean replacing another qualified legal or policy expert. &#8220;Congressional budgets have been slashed 35% and even officers that would like to hire for this expertise don&#8217;t have the resources to do so,&#8221; Moore said.</p>
<p>What technical knowledge the committees have historically added to their staffs is typically rooted in the legal sphere or the policy space rather than in the nuts and bolts of tech.</p>
<p>“Evidence of hacking, computer forensics, and attribution are highly technical fields,&#8221; Steven Bellovin, a computer science researcher and professor at Columbia University with experience advising the government on technology, wrote in an email.</p>
<!-- BLOCK(pullquote)[1](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22none%22%7D) --><blockquote class="stylized pull-none" data-shortcode-type="pullquote" data-pull="none"><!-- CONTENT(pullquote)[1] -->&#8220;If you don&#8217;t have independent experts in those fields, you cannot independently evaluate the evidence &#8212; all you can do is look at their reports and see if all of the analysts agree,” Bellovin added.<!-- END-CONTENT(pullquote)[1] --></blockquote><!-- END-BLOCK(pullquote)[1] -->
<p>There are staffers with some tech-related experience, like Bob Minehart of the House Intelligence Committee, who spent several decades in the intelligence community, including at the NSA doing &#8220;technical&#8221; work, according to Yahoo News. But even Minehart &#8220;may not have the right background for attribution&#8221; Bellovin said. Minehart, who has served in Congress for 12 years, works on the &#8220;Technical and Tactical&#8221; Subcommittee of the House Intelligence Committee, which polices the NSA, the National Reconnaissance Office, and the National Geospatial Intelligence agency on issues including offensive and defense cyber capabilities. Then there&#8217;s Brett Freedman, a counsel to the Senate Intelligence Committee, who spent time in the NSA and worked on the President&#8217;s Review Group on Intelligence and Communication technologies to advise President Barack Obama on how to maintain intelligence collection capabilities while protecting privacy and civil liberties. While often working on cyber policy issues, Freedman&#8217;s role appears strictly legal rather than technical. Neither Minehart or Freedman responded to a request for comment.</p>
<p>Other staffers were intelligence analysts for the government, served on the National Security Council, worked in the Pentagon, or were in the private sector working on defense at companies like Booz Allen Hamilton or BAE Systems.</p>
<p>Chris Soghoian, formerly the chief technologist of the American Civil Liberties Union and now a TechCongress fellow, has worked with several members on technical issues including Sen. Ron Wyden, D-Ore., who serves on the Senate Intelligence Committee — but never on the Russia investigation, confirmed by Hill staffers who have worked with him. Soghoian was not available for comment.</p>
<p>A major part of the investigation into Russian groups&#8217; malicious cyber activities is actually linking their habits and traits, their trail of breadcrumbs, to the DNC hack itself. It&#8217;s challenging to solve whodunits in the cyber realm, because it&#8217;s possible to hide your tracks, and you can strike from halfway across the world without warning.</p>
<p>It is &#8220;continuity of knowledge&#8221; of past attacks and understanding of the &#8220;style of the attack and the tools and the software used&#8221; that helps companies make confident assessments about who&#8217;s behind what, Bellovin notes.</p>
<p>There’s a “typical tendency of governments to appoint lawyers to senior roles in leading all their cyber efforts,” according to Tony Cole, the chief technology officer of global government at cybersecurity firm FireEye. “The legal expertise is needed to ensure all applicable laws are followed, especially since this is a relatively gray area in the area around international law … [but] more operational cyber expertise at the most senior levels in government is needed badly,” he wrote in an email to The Intercept.</p>
<p>Security experts criticized the government&#8217;s rather pitiful report on the DNC hacks in December titled &#8220;Grizzly Steppe,&#8221; which listed malicious IP addresses as evidence of the attacks&#8217; attribution to Russia — but noted that private sector reports painted a more revealing picture of the historical behavior of those groups than the report itself. Crowdstrike has been tracking <a href="https://theintercept.com/2016/12/14/heres-the-public-evidence-russia-hacked-the-dnc-its-not-enough/">purported</a> Russian hacking groups — “Fancy Bear” and “The Dukes” — for years, since at least 2007.</p>
<p>&#8220;There have been personnel detailed to the committees in the past to try to provide greater technical expertise. But it&#8217;s always been woefully inadequate to the task,” Amy Zegart, the co-director of the Center for International Security and Cooperation, wrote in an email. Zegart penned a 2011 essay for the Hoover Institution titled “<a href="http://media.hoover.org/sites/default/files/documents/FutureChallenges_Zegart.pdf">The Roots of Weak Congressional Intelligence Oversight</a>” discussing the need for detailed knowledge and experience in the intelligence community to properly patrol its conduct.</p>
<p>Zegart helped launch a boot camp for congressional staffers to beef up on cyber issues at Stanford University in 2014, which they’ll be hosting again this summer — a program with a long waitlist. But it has not been sufficient, yet. “The fundamental challenge is you can&#8217;t oversee something effectively if you don&#8217;t understand it,” she concluded.</p>
<p class="caption">Top photo: Republican members of Congress attend a Joint Session of Congress at the U.S. Capitol in 2011 in Washington. </p>
<p>The post <a href="https://theintercept.com/2017/02/28/congress-may-lack-technical-expertise-to-properly-investigate-russian-hacking/">Congress May Lack Technical Expertise to Properly Investigate Russian Hacking</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2017/02/28/congress-may-lack-technical-expertise-to-properly-investigate-russian-hacking/feed/</wfw:commentRss>
                <slash:comments>66</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2017/02/congreSS-technology-security-committee-1487889379.jpg?fit=2927%2C1484' width='2927' height='1484' /><post-id xmlns="com-wordpress:feed-additions:1">114749</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?fit=300%2C150" />
		<media:content url="https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?fit=300%2C150" medium="image">
			<media:title type="html">Supporters of Democratic presidential nominee Hillary Clinton wave flags during election night at the Jacob K. Javits Convention Center in New York on November 8, 2016.  / AFP / Kena Betancur        (Photo credit should read KENA BETANCUR/AFP/Getty Images)</media:title>
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[Profiling the target]]></title>
                <link>https://theintercept.com/annotation/profiling-the-target/</link>
                <comments>https://theintercept.com/annotation/profiling-the-target/#respond</comments>
                <pubDate>Tue, 31 Jan 2017 11:29:02 +0000</pubDate>
                                    <dc:creator><![CDATA[Jenna McLaughlin]]></dc:creator>
                                
                <guid isPermaLink="false">https://theintercept.com/?post_type=annotation&#038;p=107824</guid>
                                    <description><![CDATA[<p>The post <a href="https://theintercept.com/annotation/profiling-the-target/">Profiling the target</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p>The post <a href="https://theintercept.com/annotation/profiling-the-target/">Profiling the target</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/annotation/profiling-the-target/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <post-id xmlns="com-wordpress:feed-additions:1">107824</post-id>
            </item>
        
            <item>
                <title><![CDATA[Spies for Hire]]></title>
                <link>https://theintercept.com/2016/10/24/darkmatter-united-arab-emirates-spies-for-hire/</link>
                <comments>https://theintercept.com/2016/10/24/darkmatter-united-arab-emirates-spies-for-hire/#comments</comments>
                <pubDate>Mon, 24 Oct 2016 13:02:08 +0000</pubDate>
                                    <dc:creator><![CDATA[Jenna McLaughlin]]></dc:creator>
                                		<category><![CDATA[Uncategorized]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=88490</guid>
                                    <description><![CDATA[<p>In its quest to create a state where every person is monitored all the time, the UAE is hiring some of the world’s best cyberwarriors. Not all of these recruits know what they’re in for.</p>
<p>The post <a href="https://theintercept.com/2016/10/24/darkmatter-united-arab-emirates-spies-for-hire/">Spies for Hire</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<h1 class="spies-for-hire-title">Spies for Hire</h1>
<p><!-- INLINE(dropcap)[0](%7B%22componentName%22%3A%22DROPCAP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22resource%22%3A%7B%22__typename%22%3A%22Image%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2016%5C%2F10%5C%2FI4.png%22%7D%7D)(%7B%22text%22%3A%22I%22%2C%22image%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2016%5C%2F10%5C%2FI4.png%22%7D) --><span data-shortcode-type='dropcap' class='dropcap dropcap--image'><img data-recalc-dims="1" src="https://theintercept.com/wp-content/uploads/2016/10/I4.png?w=1200" alt='I' /><span class='hidden'><!-- INLINE-CONTENT(dropcap)[0] -->I<!-- END-INLINE-CONTENT(dropcap)[0] --></span></span><!-- END-INLINE(dropcap)[0] --><u>n July, Simone</u> Margaritelli, an Italian <a href="https://www.evilsocket.net/random-facts-about-me.html">security researcher</a>, boarded a Boeing 777 in Rome headed for Dubai, a city now billing itself as a tech startup hub.</p>
<p>He had a big job interview with a new, well-funded cybersecurity company called <a href="https://darkmatter.ae">DarkMatter</a>, whose self-described mission is to “safeguard the most complex organizations,” from government to the private sector, by preventing and fighting malicious cyberattacks and providing secure methods of communication — defensive cybersecurity, rather than offensive, which involves breaking into online systems and devices for espionage or destruction.</p>
<p>A friend of a friend had recommended Margaritelli, who was invited to spend five days in the United Arab Emirates at the company’s expense to learn more about the job. When he arrived in Dubai, the City of Gold, he found a full schedule of outings and a deluxe suite at the Jannah Marina Bay Suites hotel.</p>
<p>Margaritelli used to be a “blackhat” — a hacker looking to break into electronic systems. Now he works for a mobile security firm called Zimperium, where he still hunts for security flaws but does so to help people fix them. I “break stuff to make the world a safer place,” his <a href="https://www.evilsocket.net">website</a> reads. He’s most well known for a portable tool he developed <a href="https://www.evilsocket.net/2016/01/30/osx-mass-pwning-using-bettercap-and-the-sparkle-updater-vulnerability/">called</a> Bettercap, used to perform a man-in-the-middle attack, where a hacker can eavesdrop or sometimes alter private communications between individuals.</p>
<p>When he arrived at the 29th floor of the Marina Plaza for his interview, the company representative described a plan to deploy electronic probes all over major cities in the UAE, which a team of hackers would then break into, guaranteeing access for DarkMatter and its customer — the Emirati government. The mission would be for the “exclusive” benefit of national security, Margaritelli was told. “Imagine that there&#8217;s a person of interest at the Dubai Mall, we&#8217;ve already set up all our probes all over the city, we press a button and BOOM! All the devices in the mall are infected and traceable,” Margaritelli wrote in a blog post <a href="https://www.evilsocket.net/2016/07/27/How-The-United-Arab-Emirates-Intelligence-Tried-to-Hire-me-to-Spy-on-its-People/#.V5ks7BiunWI.twitter">recounting his experience</a>.<!-- BLOCK(photo)[1](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22right%22%2C%22width%22%3A%22280px%22%7D) --><figure class="img-wrap align-right  width-fixed" style="width: 280px;"><!-- CONTENT(photo)[1] -->
<p><img loading="lazy" decoding="async" width="2000" height="2000" class="alignright size-medium wp-image-92151" src="https://theintercept.com/wp-content/uploads/2016/10/simone-margaritelli-article.jpg" alt="simone-margaritelli-article" srcset="https://theintercept.com/wp-content/uploads/2016/10/simone-margaritelli-article.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2016/10/simone-margaritelli-article.jpg?w=440 440w, https://theintercept.com/wp-content/uploads/2016/10/simone-margaritelli-article.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2016/10/simone-margaritelli-article.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2016/10/simone-margaritelli-article.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2016/10/simone-margaritelli-article.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2016/10/simone-margaritelli-article.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2016/10/simone-margaritelli-article.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></p>
<figcaption class="caption source">Italian security researcher Simone Margaritelli.<br/>Photo: Matteo Flora</figcaption><!-- END-CONTENT(photo)[1] --></figure><!-- END-BLOCK(photo)[1] --></p>
<p>Margaritelli declined to pursue the job offer. After his post, titled “How the United Arab Emirates Intelligence Tried to Hire Me to Spy on Its People,” began circulating, DarkMatter issued a single <a href="https://twitter.com/GuardedbyGenius/status/760980553059405824">terse</a> Twitter reply. The company said it preferred “talking reality &amp; not fantasy.”</p>
<p>“No one from DarkMatter or its subsidiaries have ever interviewed Mr. Margaritelli,” Kevin Healy, director of communications for DarkMatter, wrote in an email to The Intercept<em>. </em>The man Margaritelli says interviewed him, Healy continued, was only an advisory consultant to DarkMatter — and that relationship has since ended (though several sources say he was employed by the company and had a DarkMatter email address).</p>
<p>“While we respect an author’s right to express a personal opinion, we do not view the content in question as credible, and therefore have no further comment,” Healy wrote.</p>
<p>DarkMatter denied outright Margaritelli’s assertions that it was recruiting hackers to research offensive security techniques. “Neither DarkMatter – nor any subsidiary, subset, research wing, or advisory department—engage in the activities described,&#8221; Healy wrote. “We conduct rigorous testing on all our products to ensure they do not include any vulnerabilities.”</p>
<p>Indeed, the idea of a UAE-based company recruiting an army of cyberwarriors from abroad to conduct mass surveillance aimed at the country&#8217;s own citizens may sound like something out of a bad Bond movie, but based on several months of interviews and research conducted by The Intercept, it appears DarkMatter has been doing precisely that.</p>
<p>Most of those who spoke with The Intercept asked to remain anonymous, citing nondisclosure agreements, fear of potential political persecution in the UAE, professional reprisals, and loss of current and future employment opportunities. Those quoted anonymously were speaking about events based on their direct experience with DarkMatter.</p>
<p>Margaritelli isn’t the only one who insists that DarkMatter isn’t being truthful about its operations and recruitment. More than five sources with knowledge of different parts of the company told The Intercept that sometime after its public debut last November, DarkMatter or a subsidiary began aggressively seeking skilled hackers, including some from the United States, to help it accomplish a wide range of offensive cybersecurity goals. Its work is aimed at exploiting hardware probes installed across major cities for surveillance, hunting down never-before-seen vulnerabilities in software, and building stealth malware implants to track, locate, and hack basically any person at any time in the UAE, several sources explained. As Margaritelli described it in an email to me, “Basically it’s big brother on steroids.”<br />
<!-- BLOCK(photo)[2](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[2] -->
<p><img loading="lazy" decoding="async" width="1440" height="960" class="aligncenter size-large wp-image-93052" src="https://theintercept.com/wp-content/uploads/2016/10/arab-future-cities-article.jpg" alt="arab-future-cities-article" srcset="https://theintercept.com/wp-content/uploads/2016/10/arab-future-cities-article.jpg?w=1440 1440w, https://theintercept.com/wp-content/uploads/2016/10/arab-future-cities-article.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2016/10/arab-future-cities-article.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2016/10/arab-future-cities-article.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2016/10/arab-future-cities-article.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2016/10/arab-future-cities-article.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></p>
<figcaption class="caption source pullright">Attendees listen to a speaker at the Arab Future Cities Summit in Dubai on Nov. 2, 2015.<br/>Photo: Expotrade</figcaption><!-- END-CONTENT(photo)[2] --></figure><!-- END-BLOCK(photo)[2] --><br />
<!-- INLINE(dropcap)[3](%7B%22componentName%22%3A%22DROPCAP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22resource%22%3A%7B%22__typename%22%3A%22Image%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2016%5C%2F10%5C%2FD2.png%22%7D%7D)(%7B%22text%22%3A%22D%22%2C%22image%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2016%5C%2F10%5C%2FD2.png%22%7D) --><span data-shortcode-type='dropcap' class='dropcap dropcap--image'><img data-recalc-dims="1" src="https://theintercept.com/wp-content/uploads/2016/10/D2.png?w=1200" alt='D' /><span class='hidden'><!-- INLINE-CONTENT(dropcap)[3] -->D<!-- END-INLINE-CONTENT(dropcap)[3] --></span></span><!-- END-INLINE(dropcap)[3] --><u>arkMatter made its</u> public debut when the CEO, Faisal Al Bannai, <a href="https://twitter.com/StephensLogic/status/661420522266337280">gave a keynote</a> speech surrounded by government officials, engineers, and businesspeople at the 2nd Annual Arab Future Cities Summit in Dubai. DarkMatter launched its portfolio of cybersecurity products as a “digital defense and intelligence service” for the nation. Al Bannai’s speech and DarkMatter marketing materials were peppered with buzzwords like cyber network defense and secure communications. Following its launch, the company routinely boasted, online and during conferences and radio interviews, about its would-be world-changing defensive cybersecurity missions, including developing its own encryption platforms and potentially secure phones in house, defending national and corporate networks, bug-sweeping and countersurveillance, and more, all under a single umbrella.</p>
<p>Local tech blogs <a href="http://comm.ae/uae-cyber-security-company-darkmatter-showcases-portfolio/">praised</a> the company and celebrated its connection to the UAE government. They described DarkMatter as a savior to UAE businesses and institutions at constant threat of cyber intrusion, citing attacks against several banks in 2015 that temporarily crippled the country’s online banking infrastructure.</p>
<p>Soon, DarkMatter had hired a <a href="https://darkmatter.ae/en/about_us/#leadership_team">roster</a> of top-level talent from major tech giants around the world, including <a href="http://comm.ae/darkmatter-ex-google-nest-head-as-svp-of-secure-communications-engineering/">Google,</a> <a href="https://darkmatter.ae/en/press_releases/2">Samsung</a>, <a href="https://darkmatter.ae/en/press_releases/74">Qualcomm</a><a href="http://www.prnewswire.com/news-releases/darkmatter-appoints-michael-pak-as-svp-of-secure-communications-engineering-adding-to-already-impressive-management-team-564213411.html">, McAfee</a>, and even a <a href="https://darkmatter.ae/en/team/6">co-founder</a> of the encrypted messaging service Wickr. The new star-studded squad traveled to conferences like San Francisco’s annual <a href="https://www.rsaconference.com/events/us16/expo-sponsors/exhibitor-list/2119/darkmatter">RSA summit</a>, appearing on <a href="https://www.youtube.com/watch?v=As510O5gDTg">radio</a> and TV shows along the way. They <a href="http://www.prnewswire.com/news-releases/darkmatter-takes-bold-step-into-the-secure-communications-market-with-introduction-of-a-secure-voice-and-chat-application-569084661.html">rolled out a secure</a> voice and chat application, <a href="http://www.prnewswire.com/news-releases/darkmatter-and-symantec-to-provide-next-generation-cyber-security-solutions-and-services-577230451.html">partnered</a> up with Symantec to improve digital threat detection in the Middle East, and <a href="http://www.prnewswire.com/news-releases/darkmatter-inaugurates-rd-centre-based-in-toronto-canada-575520061.html">opened a research</a> and development center in Canada, as well as <a href="https://www.zawya.com/story/DarkMatter_creates_first_globalstandard_cyber_security_powerhouse_headquartered_in_the_UAE-ZAWYA20151104100401/">offices</a> in China.</p>
<p>But sometime last year, a segment of the company’s mandate grew from providing defense and forensics research to developing a powerful team capable of cyber offense, multiple sources tell The Intercept. According to one source, DarkMatter’s newfound interest in offensive operations coincided with revelations contained in leaked emails that the Italian company Hacking Team had sold surveillance equipment to a large number of repressive regimes. Out of Hacking Team’s ashes, DarkMatter rose.</p>
<p>While cybersecurity companies traditionally aim to ensure that the code in software and hardware is free of flaws — mistakes that malicious hackers can take advantage of — DarkMatter, according to sources familiar with the company’s activities, was trying to find and exploit these flaws in order to install malware. DarkMatter could take over a nearby surveillance camera or cellphone and basically do whatever it wanted with it — conduct surveillance, interfere with or change any electronic messages it emitted, or block the signals entirely.<!-- BLOCK(photo)[4](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22left%22%2C%22width%22%3A%22500px%22%7D) --><figure class="img-wrap align-left  width-fixed" style="width: 500px;"><!-- CONTENT(photo)[4] -->
<p><img loading="lazy" decoding="async" width="512" height="512" class="alignleft size-thumbnail wp-image-92150" src="https://theintercept.com/wp-content/uploads/2016/10/faisal-al-bennai-article.jpg" alt="faisal-al-bennai-article" srcset="https://theintercept.com/wp-content/uploads/2016/10/faisal-al-bennai-article.jpg?w=512 512w, https://theintercept.com/wp-content/uploads/2016/10/faisal-al-bennai-article.jpg?w=440 440w, https://theintercept.com/wp-content/uploads/2016/10/faisal-al-bennai-article.jpg?w=300 300w" sizes="auto, (max-width: 512px) 100vw, 512px" /></p>
<figcaption class="caption source">DarkMatter CEO Faisal Al Bennai.<br/>Photo: DarkMatter</figcaption><!-- END-CONTENT(photo)[4] --></figure><!-- END-BLOCK(photo)[4] --></p>
<p>It’s not clear that the company’s defensive employees have any idea; in fact, multiple sources suggested those projects are likely hidden from them. One source explained how company representatives tried to insist that the offensive research they were recruiting for would be conducted outside DarkMatter, with some sort of partner organization or offshoot. But several sources, Margaritelli included, said top leadership was directly involved in interviews and knew the truth.</p>
<p>DarkMatter’s spokesperson said the company is “privately held” and “does not receive any funding from the United Arab Emirates.”</p>
<p>There do, however, appear to be strong links between the company and the government. In press releases, the company <a href="https://darkmatter.ae/en/press_releases/11">identifies itself</a> as “already a strategic partner to the UAE government,” and its offices are located on the 15th floor of the round Aldar Headquarters in Abu Dhabi, two floors away from the country’s intelligence agency, the National Electronic Security Authority. DarkMatter&#8217;s senior vice president of technology research used to hold the same position at NESA.</p>
<!-- BLOCK(photo)[5](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[5] -->
<p><img loading="lazy" decoding="async" width="1440" height="961" class="aligncenter size-large wp-image-92169" src="https://theintercept.com/wp-content/uploads/2016/10/black-hat-article.jpg" alt="Charlie Miller, security researcher for Twitter Inc. and a former NSA hacker, right, speaks as Chris Valasek, director of vehicle security research at the consultancy IOActive, listens during a presentation about a remote exploitation of a passenger vehicle demonstration at the Black Hat Conference in Las Vegas, Nevada, U.S., on Wednesday, Aug. 5, 2015. Features that buyers now expect in most modern automobiles, such as driving directions and restaurant guides, count on a constant connection to a telecommunications network. But that link also makes cars vulnerable to security invasions like those that threaten computers in homes and businesses. Photographer: David Paul Morris/Bloomberg via Getty Images" srcset="https://theintercept.com/wp-content/uploads/2016/10/black-hat-article.jpg?w=1440 1440w, https://theintercept.com/wp-content/uploads/2016/10/black-hat-article.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2016/10/black-hat-article.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2016/10/black-hat-article.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2016/10/black-hat-article.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2016/10/black-hat-article.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></p>
<figcaption class="caption source pullright">Charlie Miller, right, a security researcher and former NSA hacker, speaks with Chris Valasek, a noted car hacker, during a presentation at the BlackHat conference in Las Vegas, Nevada, on Aug. 5, 2015.<br/>Photo: David Paul Morris/Bloomberg/Getty Images</figcaption><!-- END-CONTENT(photo)[5] --></figure><!-- END-BLOCK(photo)[5] -->
<p><!-- INLINE(dropcap)[6](%7B%22componentName%22%3A%22DROPCAP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22resource%22%3A%7B%22__typename%22%3A%22Image%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2016%5C%2F10%5C%2FB.png%22%7D%7D)(%7B%22text%22%3A%22B%22%2C%22image%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2016%5C%2F10%5C%2FB.png%22%7D) --><span data-shortcode-type='dropcap' class='dropcap dropcap--image'><img data-recalc-dims="1" src="https://theintercept.com/wp-content/uploads/2016/10/B.png?w=1200" alt='B' /><span class='hidden'><!-- INLINE-CONTENT(dropcap)[6] -->B<!-- END-INLINE-CONTENT(dropcap)[6] --></span></span><!-- END-INLINE(dropcap)[6] --><u>y the early</u> months of 2016, DarkMatter’s recruitment push was already well underway. The company’s publicly identifiable employees came from across the U.S. national security establishment. According to public LinkedIn profiles, one current DarkMatter employee was a global network exploitation analyst for the U.S. Department of Defense who “strategized activities against particular networks” and supported “foreign intelligence collection.” Another was a counterintelligence “special agent” for the Pentagon, whose LinkedIn boasts an “active” top-secret security clearance with a polygraph screening. Another experienced cryptographer working for DarkMatter was a senior technical adviser to the NSA, where he was intricately involved in designing “U.S. voice and data systems.”</p>
<p>But the company hasn’t been upfront about all the jobs it’s recruiting top talent for, Margaritelli and multiple other sources suggest. DarkMatter’s recruiters reached out to the information security community, promising high-paying, exciting jobs that would be focused on cyberdefense, according to more than a dozen security researchers interviewed by The Intercept, some of whom shared recruitment materials. A number of cybersecurity experts claimed on Twitter to have been contacted by recruiters, including <a href="https://twitter.com/0xcharlie/status/758465881433313280">Charlie Miller</a>, an Uber security researcher and former NSA analyst; Chris Valasek, a noted car hacker who has teamed up with Miller; and Fabio Assolini, a security researcher for Kaspersky Labs.</p>
<p>One recruiting email reviewed by The Intercept offered a carefree, tax-free life in Dubai, with housing, meals, health care, children&#8217;s education, and transportation all provided free of charge. The email said the job was with a newly formed “public/private partnership” that would be the “Cyber Security provider for all UAE Government.” Another email said DarkMatter’s plan was to hire 250 “geniuses” before the end of 2016. One security researcher said DarkMatter recruiters had contacted him on LinkedIn five or six separate times.</p>
<p>Some potential recruits didn’t respond, but others were excited; the job offered the chance to innovate the cybersecurity of an entire nation. The lucrative payday also attracted them; according to one source, who requested anonymity fearing professional reprisal, some offers were as high as half a million dollars a year — a number similar to other offers shared with The Intercept.</p>
<p>According to a source familiar with the company, an American citizen named Victor Kouznetsov who splits his time between the U.S. and the Middle East was a key recruiter for DarkMatter in the United States.</p>
<p>A man answering a cellphone identified in public records as belonging to Kouznetsov insisted that he must have been contacted in error; he did not work for DarkMatter and his name was not Victor. When asked why his voicemail message gave his name as “Victor,” he hung up. Reached by The Intercept via email, Kouznetsov declined to answer questions. “As you can imagine my NDA with DarkMatter prevents me from disclosing exactly what I do for the company, but I could say that none of it is recruiting researchers in offensive security,” he wrote.</p>
<!-- BLOCK(pullquote)[7](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22center%22%7D) --><blockquote class="stylized pull-center" data-shortcode-type="pullquote" data-pull="center"><!-- CONTENT(pullquote)[7] -->One recruiting email said DarkMatter’s plan was to hire 250 “geniuses” before the end of 2016.<!-- END-CONTENT(pullquote)[7] --></blockquote><!-- END-BLOCK(pullquote)[7] -->
<p>Several researchers whom DarkMatter approached, including Margaritelli, confirmed they were specifically told they would be working on offensive operations. In Margaritelli’s case, he was informed the company wanted to install a set of probes around Dubai, including base transceiver stations &#8212; equipment that allows for wireless communication between a device and a network &#8212; wireless access points, drones, surveillance cameras, and more.</p>
<p>The probes could be installed by DarkMatter surreptitiously or facilitated by telecoms tacitly agreeing to the surveillance setup, and the company could attach an offensive implant directly onto the probes capable of intercepting and modifying digital traffic on IP, 2G, 3G, and 4G networks. Anyone with a cellphone or using a device to connect to a wireless network connected to one of the probes would be vulnerable to hacking and tracking.</p>
<p>As Margaritelli explained it, the software DarkMatter originally designed to penetrate the probes “does not scale well enough” and therefore couldn&#8217;t handle the massive amounts of traffic it would be intercepting — forcing the need for a second team of hackers to do the job. The company wanted him to help solve the problem.</p>
<p>Margaritelli’s account is the most revealing, but several other sources discussed similar projects proposed by DarkMatter, including researching and developing exploits for zero-day vulnerabilities, as well as deploying and developing some of the same stealth malware implants Margaritelli was asked to work on. DarkMatter asked one researcher, who has discovered and reported bugs to Facebook, Google, and other major technology companies, to use his vulnerability research “to allow them to have access on trusted domains.” Basically, he would find a flaw in a website that would allow DarkMatter to manipulate it to help spread malware to targets without being detected. The researcher, who spoke anonymously, said he refused, even after getting an offer for more money, because, in contrast to DarkMatter&#8217;s proposal, “what I’m doing is ethical hacking.”</p>
<p>But what two sources and several security researchers The Intercept consulted were most concerned about was DarkMatter’s <a href="http://www.prnewswire.com/news-releases/darkmatter-to-lead-the-region-in-certification-authority-services-with-appointment-of-pki-specialist-573814631.html">plan</a> to become a certificate authority. A certificate authority is a trusted third party, typically a company or official agency, that issues digital certificates — basically, electronic “passports” that verify a user’s identity and that software is legitimate.</p>
<p>Web traffic and code from Microsoft, Facebook, Mozilla, and others is trustworthy because the company digitally signs off on it. But DarkMatter, as a certificate authority, could pretend to be someone else and issue its own digital certificate. There are mechanisms in place to prevent this type of attack, called certificate pinning, but many sites don’t use those precautions — and they still might not prevent DarkMatter from signing code, such as for a software update, as someone else. In theory, the company could sign an anti-virus update that looked like it came from Kaspersky Labs, when in reality it is sending malicious code.</p>
<p>DarkMatter, according to one source, would be able to use its authority to sign its own rootkits &#8212; software tools that allow undetected and unauthorized access to computer systems &#8212; in order to carry out man-in-the-middle attacks. “This is huge,” the source said.</p>
<p>DarkMatter has a business unit dedicated to public key infrastructure “or national root certificates of trust for countries regionally and internationally,” Healy confirmed. “While DarkMatter is not a central [public key infrastructure] authority for the UAE, we currently provide consulting and management services and intend to launch our own commercial Certification services soon.”</p>
<p>While DarkMatter denied any plans to use its capabilities for cyber offense, if the company continues to develop secure messaging platforms, or hardware including its own phones, it would have access to all the internal schematics of those products: bug reports, security standards, and more. DarkMatter’s hackers could secretly take advantage of that information while its defensive staff works to fix the flaw and push an update to consumer devices, a process that can take years.</p>
<p>When asked about the possibility of selling its own phones, Healy wrote that DarkMatter is, in fact, considering developing hardware.<br />
<!-- BLOCK(photo)[8](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22690px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 690px;"><!-- CONTENT(photo)[8] -->
<p><img loading="lazy" decoding="async" width="690" height="322" class="aligncenter size-article-medium wp-image-92160" src="https://theintercept.com/wp-content/uploads/2016/10/karl-gumtow-abu-dhabi-article.jpg" alt="karl-gumtow-abu-dhabi-article" srcset="https://theintercept.com/wp-content/uploads/2016/10/karl-gumtow-abu-dhabi-article.jpg?w=690 690w, https://theintercept.com/wp-content/uploads/2016/10/karl-gumtow-abu-dhabi-article.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2016/10/karl-gumtow-abu-dhabi-article.jpg?w=540 540w" sizes="auto, (max-width: 690px) 100vw, 690px" /></p>
<figcaption class="caption source">CyberPoint CEO Karl Gumtow gives a presentation at Abu Dhabi&#8217;s RSA conference on Nov. 4, 2015.<br/>Photo: CyberPoint</figcaption><!-- END-CONTENT(photo)[8] --></figure><!-- END-BLOCK(photo)[8] --><br />
<!-- INLINE(dropcap)[9](%7B%22componentName%22%3A%22DROPCAP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22resource%22%3A%7B%22__typename%22%3A%22Image%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2016%5C%2F10%5C%2FR.png%22%7D%7D)(%7B%22text%22%3A%22R%22%2C%22image%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2016%5C%2F10%5C%2FR.png%22%7D) --><span data-shortcode-type='dropcap' class='dropcap dropcap--image'><img data-recalc-dims="1" src="https://theintercept.com/wp-content/uploads/2016/10/R.png?w=1200" alt='R' /><span class='hidden'><!-- INLINE-CONTENT(dropcap)[9] -->R<!-- END-INLINE-CONTENT(dropcap)[9] --></span></span><!-- END-INLINE(dropcap)[9] --><u>ecruiting wasn’t the</u> only way DarkMatter snapped up top offensive talent. Last winter, the company poached a large number of employees from an American company, a Baltimore startup called CyberPoint International, <a href="https://theintercept.com/2015/07/07/baltimore-firm-supplying-united-arab-emirates-surveillance-software-won-special-export-license-state-department/">formally on contract</a> with the Ministry of the Interior of the United Arab Emirates. CyberPoint, founded by <a href="http://thedailyrecord.com/2015/09/03/karl-gumtow/">CEO Karl Gumtow</a> and his wife, Vicki, in 2009, billed itself as a defensive operation — protecting financial information, intellectual property, business records, and other forms of communications. It won multiple contracts with different parts of the U.S. government, including $6 million from the Pentagon’s Defense Advanced Research Projects Agency, and Gumtow was nominated last year for the Maryland region Entrepreneur of the Year award. <a href="http://www.upi.com/Saudis-and-allies-build-cyberwar-defenses/74121355160291/">News articles</a> also listed CyberPoint as one of the companies that sent employees to the United Arab Emirates to train its intelligence agency, NESA, essentially the equivalent of the United States NSA.</p>
<p>But last summer, CyberPoint made headlines for teaming up with the Italian surveillance peddler Hacking Team, whose internal emails were leaked — revealing an extensive account of sales to repressive regimes. The leaked emails indicated that representatives from CyberPoint had worked with Hacking Team to facilitate the sale of what appeared to be surveillance equipment to the UAE government. Around the end of 2015, there was an internal struggle within CyberPoint over the UAE contract, five sources familiar with the company told The Intercept<em>.</em> Former CyberPoint employees spoke to The Intercept on the condition of anonymity out of fear of reprisal and concern for the safety of associates still living in the Emirates.</p>
<p>After the Hacking Team emails leaked in July, there were loud, angry meetings in CyberPoint offices — people deciding what to do now that their internal operations in the Middle East had been exposed to the world. As a result of those discussions, two things happened: A vast chunk of CyberPoint staff jumped ship to DarkMatter, which was already dangling massive yearly salaries and luxurious benefits. DarkMatter even helped some employees legally shift their state residency to South Dakota to get more lenient tax breaks while living overseas, according to one source. DarkMatter does not “comment on individual employment contracts,” Healy wrote to The Intercept. “In summary we abide by the law in our employment and operational activities in all the jurisdictions in which we operate.”</p>
<p>CyberPoint employees in the UAE who weren’t offered &#8212; or didn&#8217;t accept &#8212; jobs at DarkMatter weren’t promised contract extensions. CyberPoint sent out a notice in December, one former employee said, announcing two months’ notice on the contract. For some who left, it was a surprise, and they still aren’t totally sure what happened. Others suggested DarkMatter was only interested in the more technical staff. One source described the exodus of employees as more of a “hostile takeover” directed by the United Arab Emirates government — ending CyberPoint’s original UAE contract and offering positions within the country instead, to get engineers under its own roof.</p>
<p>DarkMatter confirmed that some CyberPoint employees joined the UAE company but said this was nothing extraordinary. “DarkMatter recruits talent from across the globe and currently has over 400 team members, some of whom joined us from CyberPoint. They now occupy a diverse set of duties and responsibilities across several departments,” Healy said.</p>
<p>According to Gumtow, CyberPoint’s CEO, the company has gone through “quite a few changes” since it pulled out of the UAE for good. He sent responses to questions submitted by The Intercept via LinkedIn messages. There are no longer any CyberPoint employees in the Emirates, and no part of the company was acquired or bought by DarkMatter or anyone else, he wrote. CyberPoint, Gumtow said, never contracted with DarkMatter.</p>
<p>Additionally, Gumtow clarified that CyberPoint isn’t in the business of developing “cyberweapons.” Instead, the company conducts “penetration tests and security assessments,” he wrote. “We use commercial and custom tools that are widely available all around the world.”</p>
<p>However, those same tools used for improving cyberdefense can be turned around to infect unsuspecting targets. Even if the intelligence community uses those tools lawfully to infect targeted systems during national security investigations, others can steal or adapt the code to hack unsuspecting journalists or activists. &#8220;The overlap between offense and defense is very large,” Nicholas Weaver, a security researcher at the International Computer Science Institute, wrote in an email to The Intercept. “Especially when it comes to network monitoring: The exact same tools can be used to monitor your network to detect attacks and monitor a network for bulk surveillance.&#8221;</p>
<p>CyberPoint International did “good work, maybe noble, in some cases,” one former employee said<em>. </em>But a small percentage of the work was “shady,” suggesting it involved offensive research against different online platforms.</p>
<p>Another source stated that research, development, and coding conducted within CyberPoint ended up being used for a targeted spyware attack on journalists and activists in the Emirates between 2012 and the present. The attack involved spyware sent through Twitter, spear-phishing emails, and a malicious URL shortening service. These types of attacks are familiar to Emirati human rights activist Ahmed Mansoor. He told The Intercept that he hasn&#8217;t encountered DarkMatter but was warned about the company recently by a friend, who told him, &#8220;They are doing the hacking for UAE security bodies.&#8221;<br />
<!-- BLOCK(photo)[10](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221000px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1000px;"><!-- CONTENT(photo)[10] -->
<p><img data-recalc-dims="1" height="99999" width="1000" decoding="async" class="aligncenter size-article-large wp-image-92198" src="https://theintercept.com/wp-content/uploads/2016/10/ahmed-mansour-w-article.jpg?fit=1000%2C99999" alt="Human rights activist Ahmed Mansoor speaks to Associated Press journalists in Ajman, United Arab Emirates, on Thursday, Aug. 25, 2016. Mansoor was recently targeted by spyware that can hack into Apple's iPhone handset. The company said Thursday it has updated its security. (AP Photo/Jon Gambrell)" /></p>
<figcaption class="caption source">Emirati human rights activist Ahmed Mansoor speaks to journalists in Ajman, United Arab Emirates, on Aug. 25, 2016.<br/>Photo: Jon Gambrell/AP</figcaption><!-- END-CONTENT(photo)[10] --></figure><!-- END-BLOCK(photo)[10] --><br />
Security researchers <a href="https://citizenlab.org/2016/05/stealth-falcon/">nicknamed</a> the hacking group behind the attack “Stealth Falcon.&#8221; The researchers noted that “circumstantial evidence suggests a link between Stealth Falcon and the UAE government,” based on “digital artifacts.”</p>
<p>Stealth Falcon attacked some UAE targets after CyberPoint left the UAE, and some employees who worked on the spyware or had access to it joined DarkMatter, according to the source, who said that not every instance of the malware attack has yet been detected. “There’s a lot that hasn’t been discovered,” the source said.</p>
<p>DarkMatter, Healy said, is not aware of Stealth Falcon or the offensive tools used to access journalists’ information. “As we have explained previously, we do not own or develop any cybersecurity solutions for offensive purposes.”</p>
<p>At one point in time, CyberPoint was essentially capable of penetrating millions of devices regardless of brand, given its awareness of vulnerabilities — undiscovered or unpatched — in software around the world, one source explained. Those included vulnerabilities in Tor Browser, Firefox, Internet Explorer, and Microsoft Office.</p>
<p>The United Arab Emirates appears to be hoping to create its own cyber offense team, another source explained. Those capabilities could include cyber network attack teams and cyber network exploitation teams, for disruptive cyberattacks to disable adversaries’ online resources, as well as for espionage and spying — <a href="https://www.schneier.com/blog/archives/2014/03/computer_networ.html">capabilities</a> being developed in governments worldwide with varying levels of oversight and restriction.</p>
<p>According to Ryan Duff, a security researcher and former cyber operations tactician for U.S. Cyber Command, computer network exploitation and computer network attacks are distinguished based on the purpose of the intrusion: intelligence collection versus destruction. Exploitation &#8220;basically means gaining access to a machine for the purpose of collection. So you would have some type of software, malware, or implant installed on the machine” to monitor it, he said. Network attacks, on the other hand, also rely on gaining access but are aimed at destruction, such as “wiping a hard drive, destroying servers,” or using a botnet to launch a denial of service attack. These types of network attacks are linked to military action or covert missions.</p>
<p>Most evidence so far points toward espionage. DarkMatter may have hired members of CyberPoint, with knowledge of code capable of infecting users through Twitter and other online platforms, to help.</p>
<p>“It is my understanding that &#8230; there were some types of offensive activities that [CyberPoint International] couldn’t or wouldn’t do for the client and the client did not want to be told no so they sought to restructure in a way that a foreign company could not impede their efforts,” one former employee said.</p>
<p>One thing is clear: The new arrangement led dozens of employees to leave the UAE rather than join DarkMatter. Several who opted out of the relationship cited concerns about the UAE’s human rights record, including arbitrary detention and torture of activists and dissidents. One cited the issue with “free speech” as a particular sore point.<br />
<!-- BLOCK(photo)[11](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[11] -->
<p><img loading="lazy" decoding="async" width="1440" height="960" class="alignleft size-large wp-image-92170" src="https://theintercept.com/wp-content/uploads/2016/10/uae-burj-article.jpg" alt="DUBAI, UNITED ARAB EMIRATES - JANUARY 03: View from the observation deck &quot;At The Top&quot; located on the 124th floor of Burj Khalifa tower on January 3, 2010 in Dubai, United Arab Emirates. The tower, designed by Chicago architect Adrian Smith, is the tallest free-standing structure on Earth. (Photo by Kuni Takahashi/Getty Images)" srcset="https://theintercept.com/wp-content/uploads/2016/10/uae-burj-article.jpg?w=1440 1440w, https://theintercept.com/wp-content/uploads/2016/10/uae-burj-article.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2016/10/uae-burj-article.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2016/10/uae-burj-article.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2016/10/uae-burj-article.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2016/10/uae-burj-article.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></p>
<figcaption class="caption source pullright">The shadow of the Burj Khalifa extends across Dubai on Jan. 3, 2010, in the United Arab Emirates.<br/>Photo: Kuni Takahashi/Getty Images</figcaption><!-- END-CONTENT(photo)[11] --></figure><!-- END-BLOCK(photo)[11] --><br />
<!-- INLINE(dropcap)[12](%7B%22componentName%22%3A%22DROPCAP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22resource%22%3A%7B%22__typename%22%3A%22Image%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2016%5C%2F10%5C%2FA4.png%22%7D%7D)(%7B%22text%22%3A%22A%22%2C%22image%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2016%5C%2F10%5C%2FA4.png%22%7D) --><span data-shortcode-type='dropcap' class='dropcap dropcap--image'><img data-recalc-dims="1" src="https://theintercept.com/wp-content/uploads/2016/10/A4.png?w=1200" alt='A' /><span class='hidden'><!-- INLINE-CONTENT(dropcap)[12] -->A<!-- END-INLINE-CONTENT(dropcap)[12] --></span></span><!-- END-INLINE(dropcap)[12] --> <u>bigger question,</u> perhaps, is whether DarkMatter’s use of American-developed hacking tools is even legal, since it may be covered by U.S. export regulations. According to the <a href="https://www.washingtonpost.com/world/national-security/as-cyberwarfare-heats-up-allies-turn-to-us-companies-for-expertise/2012/11/22/a14f764c-192c-11e2-bd10-5ff056538b7c_story.html">Washington Post</a>, the State Department at one point granted CyberPoint permission to advise the UAE on cybersecurity. But two people who spoke with The Intercept questioned whether DarkMatter, which appears to have subsumed CyberPoint’s earlier work in the UAE, would be covered by that license.</p>
<p>The world of cyber exports is a confusing one. Depending on what DarkMatter is actually doing, its sales might be regulated by multiple bodies of law. If the products involve cryptography technology, there may be some arms export restrictions — while hacking tools and zero-days are not typically regulated that way, said Eva Galperin, a global policy analyst for the Electric Frontier Foundation and technology adviser for the Freedom of the Press Foundation. “If you want to sell surveillance malware from the UAE, nothing stops you,” she said during a phone interview.</p>
<p>The United States, however, has <a href="http://arstechnica.com/tech-policy/2016/03/us-to-renegotiate-rules-on-exporting-intrusion-software-under-wassenaar-arrangement/">attempted</a> to regulate those types of “cyberweapons,” and many U.S. officials wanted to tighten regulations in response to instances like Hacking Team’s sale of surveillance tools to repressive regimes. Critics of those proposed regulations pointed out that such technologies could be used for legitimate purposes, like testing products for cybersecurity or penetration testing.</p>
<!-- BLOCK(pullquote)[13](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22left%22%7D) --><blockquote class="stylized pull-left" data-shortcode-type="pullquote" data-pull="left"><!-- CONTENT(pullquote)[13] -->“If you want to sell surveillance malware from the UAE, nothing stops you.”<!-- END-CONTENT(pullquote)[13] --></blockquote><!-- END-BLOCK(pullquote)[13] -->
<p>It’s unclear, however, where DarkMatter’s work may fall in terms of export law. If the work involving U.S.-origin technology or technical expertise involved cryptography, a license would be required from the U.S. State Department. According to Colby Goodman, director of the Security Assistance Monitor and an expert in International Traffic in Arms Regulations, any American employees working on regulated products would need some sort of export license, even if they moved overseas and started working for a foreign company. “If you were a UAE citizen, and I was telling you about something that was ITAR controlled,” he explained, “that would be exporting it, unless I had a license.”</p>
<p>“It’s a similar concept with classified information,” he continued. Just because you leave the country doesn’t mean you forget the classified information — and if you give it away, that’s a violation.</p>
<p>The State Department declined to comment on whether an export license had been issued to cover DarkMatter or its employees, including those formerly from CyberPoint. The Commerce Department, which regulates some security equipment sales, did not respond to a request for comment.</p>
<p>DarkMatter, for its part, said it has obtained proper licenses, though it did not provide details.</p>
<p>“DarkMatter has provided its customers with technologies worth hundreds of millions of dollars, through its global security and technology vendors,” Healy, the spokesperson, said. “A number of these contracts extend to highly sensitive security systems that DarkMatter has applied for and &#8212; following the standard screening process &#8212; been granted export control licenses from jurisdictions including the U.S. and various European countries.”<br />
<!-- BLOCK(photo)[14](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[14] -->
<p><img loading="lazy" decoding="async" width="1440" height="983" class="aligncenter size-large wp-image-92859" src="https://theintercept.com/wp-content/uploads/2016/10/blackhat-conference-article.jpg" alt="August 3, 2016 - Las Vegas, NV, UNITED STATES - Attendees arrive at the 2016 Black Hat cyber-security conference in Las Vegas, Nevada, U.S. August 3, 2016  (Credit Image: © David Becker/Reuters via ZUMA Press)" srcset="https://theintercept.com/wp-content/uploads/2016/10/blackhat-conference-article.jpg?w=1440 1440w, https://theintercept.com/wp-content/uploads/2016/10/blackhat-conference-article.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2016/10/blackhat-conference-article.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2016/10/blackhat-conference-article.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2016/10/blackhat-conference-article.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2016/10/blackhat-conference-article.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></p>
<figcaption class="caption source pullright">Attendees arrive at the 2016 BlackHat cybersecurity conference in Las Vegas, Nevada, on Aug. 3, 2016.<br/>Photo: David Becker/Reuters/ZUMA</figcaption><!-- END-CONTENT(photo)[14] --></figure><!-- END-BLOCK(photo)[14] --><br />
<!-- INLINE(dropcap)[15](%7B%22componentName%22%3A%22DROPCAP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22resource%22%3A%7B%22__typename%22%3A%22Image%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2016%5C%2F10%5C%2FA4.png%22%7D%7D)(%7B%22text%22%3A%22A%22%2C%22image%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2016%5C%2F10%5C%2FA4.png%22%7D) --><span data-shortcode-type='dropcap' class='dropcap dropcap--image'><img data-recalc-dims="1" src="https://theintercept.com/wp-content/uploads/2016/10/A4.png?w=1200" alt='A' /><span class='hidden'><!-- INLINE-CONTENT(dropcap)[15] -->A<!-- END-INLINE-CONTENT(dropcap)[15] --></span></span><!-- END-INLINE(dropcap)[15] --><u>t a crowded</u> Las Vegas convention hall in August, representatives from DarkMatter were camped out in several large canopied stations, a short stroll from a vendor making hand-rolled cigars, several open bars, and a booth raffling off a robot dinosaur.</p>
<p>DarkMatter has started showing up in U.S. cybersecurity circles in recent months — including at BlackHat USA, the massive annual security and hacking conference in Vegas, where it handed out swag to attendees, including pens and notebooks adorned with a DarkMatter insignia. A representative at the booth said the company was still busy recruiting.</p>
<p>In his July blog post describing his UAE interview, Margaritelli wrote that he hoped his account would “serve to warn those who, like me, might find themselves dragged into shady affairs, partially or completely unaware, as well as anyone pursuing job offers that entail moving to the UAE. Know that you would be giving up your privacy, and more importantly, your freedom of speech for money.”</p>
<!-- BLOCK(pullquote)[16](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[16] -->“You can’t blame the bag man for the job you gave them.”<!-- END-CONTENT(pullquote)[16] --></blockquote><!-- END-BLOCK(pullquote)[16] -->
<p>Not everyone I spoke with agreed with his view. French security researcher Matt Suiche, whose cybersecurity startup Comae Technologies is also based in the UAE, said that “every country does surveillance” and hiring foreign workers in the UAE was not unusual; the UAE was simply trying to establish its own technology base. “It’s like the UAE Mars mission,” he said.</p>
<p>Some of the former CyberPoint employees in the UAE said they didn’t mind the surveillance work, treating it as an inevitable and natural path for a young modern nation facing legitimate threats. “I was impartial to the work I did,” one former employee told me. For the UAE, the source said, using surveillance to track its own citizens has become normalized. He described himself as a “realist” though admitted he tried to minimize his “exposure to certain things” the company did.</p>
<p>“You can’t blame the bag man for the job you gave them,” he said.</p>
<p>In the lobby of a Vegas hotel during BlackHat, I spoke with Margaritelli about his frustrations with DarkMatter &#8212; a Platinum sponsor at the event. He has all the trappings of a hacker from movies, including lip and nose piercings, rectangular glasses, and cigarettes. He avoids cellphones but finds other ways to communicate. He went to school for physics and engineering but never finished his degree. He has a very specific memory for numbers, network domains, addresses, and people. Though he says his English isn’t very good, he can rapidly translate Italian text into colloquial English.</p>
<p>Margaritelli told me he started off wary of DarkMatter. He was familiar with the UAE government’s reputation of locking up and <a href="http://www.independent.co.uk/news/world/middle-east/dr-naser-bin-ghaith-uae-economist-who-criticised-government-disappears-after-arrest-a6730616.html">disappearing dissidents</a> and purchasing surveillance equipment from other countries. Plus, his interviewer — a former employee of another controversial surveillance company, Verint — seemed a little too interested in Bettercap, Margaritelli’s well-known hacking tool.</p>
<p>While some researchers may argue that what DarkMatter is doing is simply par for the course in cybersecurity, Margaritelli said that the scale of the endeavor is unprecedented, creating a zombie hoard of infected devices, primed for hacking and surveillance. “In a near future, every single electronic device in the UAE will unwillingly be part of their state botnet,” he said.</p>
<p>Later, in an email, Margaritelli wrote that he works with all sorts of hacking technologies, but he remains shocked by DarkMatter’s ambitions to surveil an entire nation. “What they want to do,” he wrote, “it’s fucking insane.”</p>
<p>The post <a href="https://theintercept.com/2016/10/24/darkmatter-united-arab-emirates-spies-for-hire/">Spies for Hire</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2016/10/24/darkmatter-united-arab-emirates-spies-for-hire/feed/</wfw:commentRss>
                <slash:comments>35</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2016/10/gif-1.gif?fit=1439%2C961' width='1439' height='961' /><post-id xmlns="com-wordpress:feed-additions:1">88490</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/10/I4.png?w=1200" />
		<media:content url="https://theintercept.com/wp-content/uploads/2016/10/I4.png?w=1200" medium="image">
			<media:title type="html">I</media:title>
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2016/10/simone-margaritelli-article.jpg?fit=2000%2C2000" medium="image">
			<media:title type="html">simone-margaritelli-article</media:title>
			<media:description type="html">Italian Security Researcher Simone Margaritelli.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/10/simone-margaritelli-article.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2016/10/arab-future-cities-article.jpg?fit=1440%2C960" medium="image">
			<media:title type="html">arab-future-cities-article</media:title>
			<media:description type="html">Attendees listen to a speaker at the Arab Future Cities Summit Dubai 2015  on Nov. 2, 2015, in Dubai.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/10/arab-future-cities-article.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2016/10/D2.png?w=1200" medium="image">
			<media:title type="html">D</media:title>
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2016/10/faisal-al-bennai-article.jpg?fit=512%2C512" medium="image">
			<media:title type="html">faisal-al-bennai-article</media:title>
			<media:description type="html">DarkMatter CEO Faisal Al Bennai.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/10/faisal-al-bennai-article.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2016/10/black-hat-article.jpg?fit=1440%2C961" medium="image">
			<media:title type="html">Remote Exploitation Of An Unaltered Passenger Vehicle At The Black Hat Conference</media:title>
			<media:description type="html">Charlie Miller, security researcher for Twitter Inc. and a former NSA hacker, right, speaks as Chris Valasek, director of vehicle security research at the consultancy IOActive, listens during a presentation about a remote exploitation of a passenger vehicle demonstration at the Black Hat Conference in Las Vegas, Nevada on August 5, 2015.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/10/black-hat-article.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2016/10/B.png?w=1200" medium="image">
			<media:title type="html">B</media:title>
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2016/10/karl-gumtow-abu-dhabi-article.jpg?fit=690%2C322" medium="image">
			<media:title type="html">karl-gumtow-abu-dhabi-article</media:title>
			<media:description type="html">CyberPoint CEO Karl Gumtow, gives a presentation RSA Abu Dhabi on November 4, 2015, in Dubai.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/10/karl-gumtow-abu-dhabi-article.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2016/10/R.png?w=1200" medium="image">
			<media:title type="html">R</media:title>
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2016/10/ahmed-mansour-w-article.jpg?fit=1440%2C1032" medium="image">
			<media:title type="html">iPhone Spyware</media:title>
			<media:description type="html">Human rights activist Ahmed Mansoor speaks to Associated Press journalists in Ajman, United Arab Emirates on August 25, 2016.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/10/ahmed-mansour-w-article.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2016/10/uae-burj-article.jpg?fit=1440%2C960" medium="image">
			<media:title type="html">The World&#8217;s Tallest Building The Burj Khalifa</media:title>
			<media:description type="html">The shadown of the Burj Khalifa extends across the city of Dubai on January 3, 2010 in Dubai, United Arab Emirates.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/10/uae-burj-article.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2016/10/A4.png?w=1200" medium="image">
			<media:title type="html">A</media:title>
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2016/10/blackhat-conference-article.jpg?fit=1440%2C983" medium="image">
			<media:title type="html">Reuters World News &#8211; August 3, 2016</media:title>
			<media:description type="html">Attendees arrive at the 2016 Black Hat cybersecurity conference in Las Vegas, Nevada, on Aug. 3, 2016.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2016/10/blackhat-conference-article.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2016/10/A4.png?w=1200" medium="image">
			<media:title type="html">A</media:title>
		</media:content>
            </item>
            </channel>
</rss>
