FOIA - Project Raven (Central Intelligence Agency)
Tracking # |
F-2019-00987 F-2018-00987 |
Multi Request | FOIA - Project Raven |
Submitted | Jan. 30, 2019 |
MuckRock users can file, duplicate, track, and share public records requests like this one. Learn more.
Communications
From: J Ader
To Whom It May Concern:
Pursuant to the Freedom of Information Act, I hereby request the following records:
All records relating or referring to UAE intelligence group 'Project Raven' or digital intelligence tool 'Karma.' This request includes copies of emails mentioning or relating to either item, reports, statistics/data, memoranda of understanding, and briefings
The group and tool have come into the public light after an investigation featured in a recent Reuters articles [https://www.reuters.com/investigates/special-report/usa-spying-raven/ ]:
"She had joined Project Raven, a clandestine team that included more than a dozen former U.S. intelligence operatives recruited to help the United Arab Emirates engage in surveillance of other governments, militants and human rights activists critical of the monarchy.
Stroud and her team, working from a converted mansion in Abu Dhabi known internally as “the Villa,” would use methods learned from a decade in the U.S intelligence community to help the UAE hack into the phones and computers of its enemies.
Stroud had been recruited by a Maryland cybersecurity contractor to help the Emiratis launch hacking operations, and for three years, she thrived in the job. But in 2016, the Emiratis moved Project Raven to a UAE cybersecurity firm named DarkMatter. Before long, Stroud and other Americans involved in the effort say they saw the mission cross a red line: targeting fellow Americans for surveillance."
[https://www.reuters.com/investigates/special-report/usa-spying-karma/ ]
"Karma was used by an offensive cyber operations unit in Abu Dhabi comprised of Emirati security officials and former American intelligence operatives working as contractors for the UAE’s intelligence services. The existence of Karma and of the hacking unit, code named Project Raven, haven’t been previously reported. Raven’s activities are detailed in a separate story published by Reuters today.
The ex-Raven operatives described Karma as a tool that could remotely grant access to iPhones simply by uploading phone numbers or email accounts into an automated targeting system. The tool has limits it doesn’t work on Android devices and doesn’t intercept phone calls. But it was unusually potent because, unlike many exploits, Karma did not require a target to click on a link sent to an iPhone, they said."
The requested documents will be made available to the general public, and this request is not being made for commercial purposes.
In the event that there are fees, I would be grateful if you would inform me of the total charges in advance of fulfilling my request. I would prefer the request filled electronically, by e-mail attachment if available or CD-ROM if not.
Thank you in advance for your anticipated cooperation in this matter. I look forward to receiving your response to this request within 20 business days, as the statute requires.
Sincerely,
J Ader
From: Central Intelligence Agency
An acknowledgement letter, stating the request is being processed.
From: Central Intelligence Agency
The request has been rejected, with the agency stating that it can neither confirm nor deny the existence of the requested documents.
Files
pages