We use cookies to understand how you use our site and to improve your experience. This includes personalizing content and advertising. By continuing to use our site, you accept our use of Cookies, revised Privacy Policy and Terms of Use.
  • Edit

Former U.S. Counterintelligence Agent Charged With Espionage on Behalf of Iran

2019-02-13 22:38
A former U.S. counterintelligence agent has been indicted by a federal grand jury for conspiracy to deliver and delivering national defense information to representatives of the Iranian government, prosecutors said. Monica Elfriede Witt, 39, who defected to Iran in 2013, allegedly assisted Iranian intelligence services to target her former agent colleagues inside the U.S. Intelligence Community (USIC). She is also believed to have disclosed the code name and classified mission of a U.S. Department of Defense Special Access Program. Witt still remains at large and an arrest warrant on her has been issued. She was a former active duty U.S. Air Force Intelligence Specialist and Special agent of the Air Force Office of Special Investigations. She first entered duty around August 1997 and had served continuously until around March 2008. After her separation from the Air Force, Witt got a job with the Department of Defense as a contractor in 2010 where she was issued high-level security clearances and was deployed overseas to conduct classified counterintelligence missions, according to a DOJ indictment unsealed on Feb. 13. The same indictment also charges four Iranian nationals—Mojtaba Masoumpour, Behzad Mesri, Hossein Parvar, and Mohamad Paryar (the “Cyber Conspirators”)—with conspiracy, attempts to commit computer intrusion, and aggravated identity theft. The four Iranian’s had targeted former co-workers and colleagues of Witt in the U.S. Intelligence Community in 2014 and 2015. They also remain at large. The United States has designated the government of Iran a state sponsor of terrorism each year since 1984 due to the country’s repeated and direct support for acts of international terrorism, including those that had targeted America and its allies. With the use of fictional social media accounts, the Iranians deployed malware that would give them access to their target’s computers and networks. They worked on behalf of the Iranian Revolutionary Guard Corps (IRGC). “Monica Witt is charged with revealing to the Iranian regime a highly classified intelligence program and the identity of a U.S. Intelligence Officer, all in violation of the law, her solemn oath to protect and defend our country, and the bounds of human decency,” said Assistant Attorney General for National Security John Demers. ‘Target Packages’ Witt traveled to Iran in Feb 2012 to attend the Iranian New Horizon Organization’s “Hollywoodism” conference, an event sponsored by the IRGC, which aimed at, among other things, condemning American moral standards and promoting anti-U.S. propaganda. She managed to re-enter Iran in August 2013 after communicating with an individual that had dual U.S.-Iranian citizenship, referred to as Individual A in the indictment. After her re-entry, Iranian government officials gave Witt housing and computer equipment where she went on to disclose classified U.S. information to an Iranian government official. Witt also conducted research about USIC personnel that she had worked with previously, creating draft “target packages” against her former colleagues. Cyber Conspirators The four Iranian nationals began a campaign targeting Witt’s former colleagues in late 2014. As part of their campaign, Mesri registered and helped manage an Iranian company which conducted computer intrusions against targets inside and outside the United States. The identity of the company was known to the United States. Between January and May 2015, the Cyber Conspirators used fictitious accounts and attempted to trick their targets into clicking links or opening files that would enable them to deploy malware on the target’s computer. The group tested their malware, in some cases procured by Mesri, to gather information from target computers or networks. In one instance the conspirators created a fake Facebook account using information from the employee’s real Facebook account. Through this fake account, they managed to successfully add several of Witt’s former colleagues.