FOIA - Project Raven (Federal Bureau of Investigation)

J Ader filed this request with the Federal Bureau of Investigation of the United States of America.
Tracking #

1427958-000

Multi Request FOIA - Project Raven
Status
Rejected

Communications

From: J Ader


To Whom It May Concern:

Pursuant to the Freedom of Information Act, I hereby request the following records:

All records relating or referring to UAE intelligence group 'Project Raven' or digital intelligence tool 'Karma.' This request includes copies of emails mentioning or relating to either item, reports, statistics/data, memoranda of understanding, and briefings

The group and tool have come into the public light after an investigation featured in a recent Reuters articles [https://www.reuters.com/investigates/special-report/usa-spying-raven/ ]:

"She had joined Project Raven, a clandestine team that included more than a dozen former U.S. intelligence operatives recruited to help the United Arab Emirates engage in surveillance of other governments, militants and human rights activists critical of the monarchy.

Stroud and her team, working from a converted mansion in Abu Dhabi known internally as “the Villa,” would use methods learned from a decade in the U.S intelligence community to help the UAE hack into the phones and computers of its enemies.

Stroud had been recruited by a Maryland cybersecurity contractor to help the Emiratis launch hacking operations, and for three years, she thrived in the job. But in 2016, the Emiratis moved Project Raven to a UAE cybersecurity firm named DarkMatter. Before long, Stroud and other Americans involved in the effort say they saw the mission cross a red line: targeting fellow Americans for surveillance."

[https://www.reuters.com/investigates/special-report/usa-spying-karma/ ]

"Karma was used by an offensive cyber operations unit in Abu Dhabi comprised of Emirati security officials and former American intelligence operatives working as contractors for the UAE’s intelligence services. The existence of Karma and of the hacking unit, code named Project Raven, haven’t been previously reported. Raven’s activities are detailed in a separate story published by Reuters today.

The ex-Raven operatives described Karma as a tool that could remotely grant access to iPhones simply by uploading phone numbers or email accounts into an automated targeting system. The tool has limits it doesn’t work on Android devices and doesn’t intercept phone calls. But it was unusually potent because, unlike many exploits, Karma did not require a target to click on a link sent to an iPhone, they said."

The requested documents will be made available to the general public, and this request is not being made for commercial purposes.

In the event that there are fees, I would be grateful if you would inform me of the total charges in advance of fulfilling my request. I would prefer the request filled electronically, by e-mail attachment if available or CD-ROM if not.

Thank you in advance for your anticipated cooperation in this matter. I look forward to receiving your response to this request within 20 business days, as the statute requires.

Sincerely,

J Ader

From: Federal Bureau of Investigation

There are eFOIA files available for you to download.

  • Ebcefdafc6035baea82e5873fe7137521a25570ce_Q50474_D2200349

From: Federal Bureau of Investigation

There are eFOIA files available for you to download.

From: Federal Bureau of Investigation

There are eFOIA files available for you to download.

Files

pages

Close
  • 02/11/2019

    Ebcefdafc6035baea82e5873fe7137521a25570ce_Q50474_D2200349

  • 02/11/2019

    Ebcefdafc6035baea82e5873fe7137521a25570ce_Q50438_D2200347

  • 02/11/2019

    Ebcefdafc6035baea82e5873fe7137521a25570ce_Q50474_D2200349

  • 02/21/2019

    Ebcefdafc6035baea82e5873fe7137521a25570ce_Q50438_D2203130

  • 02/21/2019

    Ebcefdafc6035baea82e5873fe7137521a25570ce_Q50474_D2203136