Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Tracking & Law Enforcement

At Second Trial, Ex-CIA Employee Defends Himself in Big Leak

A former CIA software engineer charged with causing the biggest theft of classified information in CIA history defended himself at the start of his trial Tuesday, telling jurors he was falsely accused and the victim of a political witch hunt.

A former CIA software engineer charged with causing the biggest theft of classified information in CIA history defended himself at the start of his trial Tuesday, telling jurors he was falsely accused and the victim of a political witch hunt.

Joshua Schulte, 33, said he was singled out for investigation and arrested on espionage charges because of his clashes with CIA management before the 2017 public release of a trove of CIA secrets by WikiLeaks. At a previous trial, a jury deadlocked on espionage charges but convicted him of lesser contempt and false statement charges.

He said the government had built a case that was “literally forensically impossible” after singling him out for prosecution as the guilty party during a “political witch hunt” and then working backward to present jurors with “an alternative reality, an upside-down world, a government twilight zone.”

[ Read: “Vault 7” Leak Shows CIA Learned From NSA Mistakes ]

“The trial evidence will absolutely prove my innocence,” Schulte told jurors in Manhattan federal court. “Because I am in fact innocent.”

Schulte made his opening statement after Assistant U.S. Attorney David Denton told the jury that the evidence would prove that Schulte was responsible for an unprecedented leak that brought critical intelligence gathering around the world “to a crashing halt.”

He said years of work and millions of dollars spent to develop tools that enabled the CIA’s digital sleuths to spy on foreign adversaries “went up in smoke” as Schulte gave “precious secrets of America’s national defense” to the world.

The so-called Vault 7 leak revealed how the CIA hacked Apple and Android smartphones in overseas spying operations and efforts to turn internet-connected televisions into listening devices.

Prior to his arrest, Schulte worked as a coder at the agency’s headquarters in Langley, Virginia.

Denton portrayed the government’s case against Schulte as airtight, saying there was “devastating proof of this man’s crimes.”

He said Schulte was motivated to leak the materials because he believed the CIA had disrespected him. So he tried “to burn to the ground” the very work he had helped the agency to create, the prosecutor said.

Denton said Schulte, after his arrest, continued his crimes by trying to leak additional classified materials from prison as he carried on an “information war” against the government.

But Schulte contested the portrayal, saying he was inspired to serve his country ever since the Sept. 11 terrorism attacks, when as a 12-year-old boy in the 7th grade, he vowed to do whatever he could to prevent another day like that.

Hired by the CIA in 2010, Schulte said he worked on a team that helped verify the location of Osama bin Laden before the al-Qaida leader was killed in a U.S. overnight raid in Pakistan.

“No one has ever questioned my loyalty or patriotism,” he said, adding “That is until now.”

Clad in a coat and tie, he also decried his treatment for the last five years in federal jails, telling jurors: “My very life is in our hands. Put yourself in my shoes.”

After the jury was sent home for the day, Judge Jesse M. Furman told Schulte he had at times crossed the line between testifying and presenting an opening statement and warned him to be more careful going forward.

Related: Cisco Finds Zero-Day Vulnerability in ‘Vault 7’ Leak

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Ransomware

The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.

Cybercrime

Spanish Court agreed to extradite Joseph James O’Connor to he U.S., who allegedly took part in the July 2020 hacking of Twitter accounts of...

Ransomware

US government reminds the public that a reward of up to $10 million is offered for information on cybercriminals, including members of the Hive...

Cybercrime

A hacker who reportedly posed as the CEO of a financial institution claims to have obtained access to the more than 80,000-member database of...

Privacy

Employees of Chinese tech giant ByteDance improperly accessed data from social media platform TikTok to track journalists in a bid to identify the source...

Application Security

Virtualization technology giant Citrix on Tuesday scrambled out an emergency patch to cover a zero-day flaw in its networking product line and warned that...