{"id":814023,"date":"2022-09-26T16:41:23","date_gmt":"2022-09-26T16:41:23","guid":{"rendered":"https:\/\/theintercept.com\/?p=408754"},"modified":"2022-09-26T16:41:23","modified_gmt":"2022-09-26T16:41:23","slug":"former-nsa-chief-signed-deal-to-train-saudi-hackers-months-before-jamal-khashoggis-murder","status":"publish","type":"post","link":"https:\/\/radiofree.asia\/2022\/09\/26\/former-nsa-chief-signed-deal-to-train-saudi-hackers-months-before-jamal-khashoggis-murder\/","title":{"rendered":"Former NSA Chief Signed Deal to Train Saudi Hackers Months Before Jamal Khashoggi\u2019s Murder"},"content":{"rendered":"

In early 2018,<\/u> former National Security Agency chief Keith Alexander worked out a deal with Saudi Crown Prince Mohammed bin Salman and the cyber institute led by one of his closest aides, Saud al-Qahtani, to help the Saudi ruler train the next generation of Saudi hackers to take on the kingdom\u2019s enemies.<\/p>\n

While the\u00a0agreement between IronNet, founded by Alexander, and the cyber school was widely reported in intelligence industry outlets and the Saudi press at the time, it faced no scrutiny for its association with Qahtani, after the brutal killing of Jamal Khashoggi he reportedly orchestrated just a few months later.<\/p>\n

Alexander officially inked the deal with the Prince Mohammed bin Salman College of Cyber Security,\u00a0Artificial Intelligence, and Advanced Technologies \u2014 a school set up to train Saudi cyber intelligence agents \u2014 at a signing ceremony<\/a> in Washington, D.C., according to an announcement<\/a> in early July.<\/p>\n

Qahtani\u2019s proxy at the signing noted in a statement that \u201cthe strategic agreement will ensure [Saudi Arabia is] benefiting from the experience of an advisory team comprising senior officers who had held senior positions in the Cyber Command of the US Department of Defense.\u201d Alexander\u2019s for-profit cyber security firm IronNet would work closely with the Saudi Federation of Cybersecurity, Programming, and Drones, an affiliate of the college devoted to offensive cyber operations and at the time overseen by Qahtani.<\/p>\n\n

Saudi Arabia\u2019s\u00a0agreement with IronNet was part of a host of moves to step up its cyber capabilities, coinciding with a campaign against the kingdom\u2019s critics abroad. Khashoggi, then a Washington Post columnist and prominent Salman critic, received a series of threatening messages, including one from Qahtani, warning him to remain silent. Khashoggi, whose family and close associates discovered listening malware electronically implanted on their smartphones, was then lured to the Saudi Embassy in Istanbul.<\/p>\n

It was there that a team dispatched by Qahtani detained and tortured the Saudi government critic. Qahtani, according to reports, beamed in through Skype<\/a> to insult Khashoggi during the ordeal, allegedly instructing his team to \u201cbring me the head of the dog.\u201d Khashoggi was then dismembered with a bone saw.<\/p>\n

IronNet\u2019s\u00a0agreement tied to the alleged mastermind behind the killing of Khashoggi is not listed on the IronNet website, and it is not known if the business relationship still stands \u2014 or what the extent of it ever was. IronNet and representatives of the Saudi government did not respond to repeated requests for comment. The Saudi Arabia relationship, according to former IronNet employees, has largely been shrouded in secrecy, even within the firm.<\/p>\n

Qahtani\u2019s role of<\/u> enforcer on behalf of bin Salman, well known prior to the Khashoggi slaying, has closely followed the young prince\u2019s meteoric rise as the effective leader of Saudi Arabia.<\/p>\n

In 2017, Qahtani played a pivotal role in the abduction and interrogation of hundreds of Saudi elites, who were held captive at the Ritz-Carlton in Riyadh, at which they were forced to pledge loyalty and money to Salman. Qahtani personally led the questioning efforts, according to reports.<\/p>\n

Later that year, he reportedly participated in the interrogation of former Lebanese Prime Minister Saad al-Hariri, who was beaten and forced to resign. The following year, according to the brother of Saudi women\u2019s rights activist Loujain al-Hathloul, Qahtani also directly participated in the torture of al-Hathloul<\/a>, where he mocked her and threatened to have her raped.<\/p>\n

<\/div>\n

On behalf of the kingdom, Qahtani has made it his personal quest<\/a> to acquire and expand Saudi cyberwarfare tools. Beyond the deal with IronNet and other top-flight American cyber experts, he has spent over a decade directly negotiating the accumulation of computer and phone infiltration technology.<\/p>\n

Qahtani took the helm of official state-backed efforts to expand Saudi Arabia’s cyber offensive capabilities in October 2017, when he was named president of a committee called the Electronic Security and Software Alliance, later renamed the Saudi Federation for Cybersecurity, Programming, and Drones.<\/p>\n

Earlier this year, SAFCSP signed an agreement with Spire Solutions, a consulting firm that partners with a wide range of cyber intelligence contractors. Haboob, another cyber venture promoted by Qahtani, is a private venture that recruits hackers on behalf of the Saudi government. Haboob’s chair, Naif bin Lubdah, is on SAFCSP\u2019s board of directors<\/a>.<\/p>\n

<\/div>\n

In 2018, Chiron Technology Services, another American cyber consulting firm, also inked a memorandum of understanding to provide training to the same Saudi hacker school advised by IronNet. Chiron\u2019s team includes top talent recruited from the U.S. Air Force, Army, and NSA, including Michael Tessler, who previously worked at the NSA\u2019s Tailored Access Operations command, which handles high-profile computer infiltration missions of foreign governments.<\/p>\n

Jeff Weaver, the chief executive of Chiron, said in an email that his company signed a memorandum of understanding “with the college to develop a cybersecurity curriculum in support of their technical degree programs. However, no collaboration ever occurred, and they never called on us to contribute. We haven\u2019t heard from them since 2018.”<\/p>\n

Online cyber sleuths identified<\/a> Qahtani\u2019s multiple handles on online hacking forums, where he was an active member seeking to purchase hacking tools. A screen name used by Qahtani, for instance, appeared to have purchased a remote access trojan known as Blackshades, which can infect targeted computers to modify and seize files, activate the webcam, and record keystrokes and passwords.<\/p>\n

Cybersecurity researchers have identified powerful hacking technology implanted on the phones of Khashoggi\u2019s family<\/a>, likely by agents of the United Arab Emirates, a close Saudi ally. Several received malicious texts that infected their phones with Pegasus, a tool created by the NSO Group to remotely access a target\u2019s microphone, text messages, and location<\/a>.<\/p>\n

Qahtani, who briefly faced house arrest, was swiftly cleared of wrongdoing in Khashoggi\u2019s death by the Saudi government. Five of the hitmen in the squad sent to kill Khashoggi were sentenced<\/a> to death, including Maher Abdulaziz Mutreb, an intelligence officer who worked under Qahtani. Qahtani\u2019s current relationship with the institute is unknown.
\n

\n\"People\n

People hold posters of slain Saudi journalist Jamal Khashoggi, near the Saudi Arabia consulate in Istanbul, on Oct. 2, 2020.<\/p>\n

\nPhoto: Emrah Gurel\/AP<\/p><\/div>
\nFollowing Khashoggi\u2019s killing,<\/u> many U.S. firms faced pressure to exit business deals with Saudi Arabian entities. Yet, in the years following Khashoggi\u2019s murder, the Saudi cyberwarfare institute central to the plot has continued to do business with Western defense industry leaders.<\/p>\n

In 2019, BAE Systems, a major defense contractor based in the U.S. and the U.K., entered<\/a> into a training agreement with the MBS College of Cyber Security. Last year, Cisco unveiled<\/a> a training relationship with the Saudi Federation of Cybersecurity, Programming, and Drones.<\/p>\n

BAE, reached for comment, distanced itself from the deal. \u201cBAE Systems works with a number of partner companies based in Saudi Arabia,”\u00a0said a spokesperson for the company. “ISE, one of our Saudi partner companies, was awarded a contract in 2019 by the MBS College for Cyber Security to provide support services to establish the college, such as general staffing and facilities management but this contract wasn\u2019t activated and is still on hold.\u201d<\/p>\n

Alexander has continued to do work in the region as a member of Amazon\u2019s board. Intelligence Online, a trade outlet for intelligence contractors, reported<\/a>,\u00a0\u201cAs a partner of Amazon, for which it offers native surveillance of its AWS’ cloud traffic, IronNet helps the company win public contracts, especially since CEO Keith Alexander has sat on Amazon’s board.\u201d<\/p>\n

<\/div><\/p>\n

IronNet, however, has faltered in recent months, with two waves of layoffs this year and a lawsuit from investors<\/a>. The company has touted skyrocketing growth, like many defense-related contractors, by promising to harness growing security threats. Much of the American traditional defense industry has long sought lucrative foreign relationships, particularly with the Saudi Arabian government, a path IronNet appears to have attempted to follow.<\/p>\n

And President Joe Biden, who promised during his election campaign to make the Saudi state a \u201cpariah\u201d over the slaying, has since appeared<\/a> to move on<\/a> from the scandal. In June, he traveled to Riyadh to shore up the U.S.-Saudi alliance and request an increase in oil production. The four-year anniversary of Khashoggi\u2019s slaying<\/a> is on October 2.<\/p>\n

The post Former NSA Chief Signed Deal to Train Saudi Hackers Months Before Jamal Khashoggi\u2019s Murder<\/a> appeared first on The Intercept<\/a>.<\/p>\n\n

This post was originally published on The Intercept<\/a>. <\/p>","protected":false},"excerpt":{"rendered":"

Retired Gen. Keith Alexander\u2019s company IronNet signed an agreement with a Saudi Arabia cyberwarfare institute led by the official who oversaw Khashoggi\u2019s killing.<\/p>\n

The post Former NSA Chief Signed Deal to Train Saudi Hackers Months Before Jamal Khashoggi\u2019s Murder<\/a> appeared first on The Intercept<\/a>.<\/p>\n","protected":false},"author":228,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[383,369,340],"tags":[],"_links":{"self":[{"href":"https:\/\/radiofree.asia\/wp-json\/wp\/v2\/posts\/814023"}],"collection":[{"href":"https:\/\/radiofree.asia\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/radiofree.asia\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/radiofree.asia\/wp-json\/wp\/v2\/users\/228"}],"replies":[{"embeddable":true,"href":"https:\/\/radiofree.asia\/wp-json\/wp\/v2\/comments?post=814023"}],"version-history":[{"count":1,"href":"https:\/\/radiofree.asia\/wp-json\/wp\/v2\/posts\/814023\/revisions"}],"predecessor-version":[{"id":814024,"href":"https:\/\/radiofree.asia\/wp-json\/wp\/v2\/posts\/814023\/revisions\/814024"}],"wp:attachment":[{"href":"https:\/\/radiofree.asia\/wp-json\/wp\/v2\/media?parent=814023"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/radiofree.asia\/wp-json\/wp\/v2\/categories?post=814023"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/radiofree.asia\/wp-json\/wp\/v2\/tags?post=814023"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}