Lawmakers seek probe on U.S. hacking services sold globally
WASHINGTON (Reuters) – U.S. lawmakers are pushing legislation that would force the State Department to report what it is doing to control the spread of U.S. hacking tools around the world.
A bill passed in a House of RepresentativesÔÇÖ appropriations subcommittee on Tuesday said Congress is ÔÇ£concernedÔÇØ about the State DepartmentÔÇÖs ability to supervise U.S. companies that sell offensive cybersecurity products and know-how to other countries.
The proposed legislation, released on Wednesday, would direct the State Department to report to Congress how it decides whether to approve the sale of cyber capabilities abroad and to disclose any action it has taken to punish companies for violating its policies in the past year.
National security experts have grown increasingly concerned about the proliferation of U.S. hacking tools and technology.
The legislation follows a Reuters report in January which showed a U.S. defense contractor provided staff to a United Arab Emirates hacking unit called Project Raven. The UAE program utilized former U.S. intelligence operatives to target militants, human rights activists and journalists.
State Department officials granted permission to the U.S. contractor, Maryland-based CyberPoint International, to assist an Emirate intelligence agency in surveillance operations, but it is unclear how much they knew about its activities in the UAE.
Under U.S. law, companies selling cyber offensive products or services to foreign governments must first obtain permission from the State Department.
The new measure was added to a State Department spending bill by Dutch Ruppersberger, a Democrat from Maryland and member of the House Appropriations Committee.
Ruppersberger said in an emailed statement he had been ÔÇ£particularly troubled by recent media reportsÔÇØ about the State DepartmentÔÇÖs approval process for the sale of cyberweapons and services.
CyberPointÔÇÖs Chief Executive Officer Karl Gumtow did not respond to a request for comment. He previously told Reuters that to his knowledge, CyberPoint employees never conducted hacking operations and always complied with U.S. laws.
The State Department has declined to comment on CyberPoint, but said in an emailed statement on Wednesday that it is ÔÇ£firmly committed to the robust and smart regulation of defense articles and services exportÔÇØ and before granting export licenses it weighs ÔÇ£political, military, economic, human rights, and arms control considerations.ÔÇØ
Robert Chesney, a national security law professor at the University of Texas, said the Reuters report raised an alarm over how Washington supervises the export of U.S. cyber capabilities.
ÔÇ£The Project Raven (story) perfectly well documents that there is reason to be concerned and it is CongressÔÇÖ job to get to the bottom of it,ÔÇØ he said.
The bill is expected to be voted on by the full appropriations committee in the coming weeks before going onto the full House.
Reporting by Christopher Bing and Joel Schectman; editing by Grant McCool