Monica Elfriede Witt, 39, who defected to Iran in 2013, allegedly assisted Iranian intelligence services to target her former agent colleagues inside the U.S. Intelligence Community (USIC). She is also believed to have disclosed the code name and classified mission of a U.S. Department of Defense Special Access Program.
The same indictment also charges four Iranian nationals—Mojtaba Masoumpour, Behzad Mesri, Hossein Parvar, and Mohamad Paryar (the “Cyber Conspirators”)—with conspiracy, attempts to commit computer intrusion, and aggravated identity theft. The four Iranians had targeted former coworkers and colleagues of Witt in the U.S. Intelligence Community in 2014 and 2015. They also remain at large.
The United States has designated the government of Iran as a state sponsor of terrorism each year since 1984, due to the country’s repeated and direct support for acts of international terrorism, including those that have targeted America and its allies.
With the use of fake social-media accounts, the Iranians deployed malware that would give them access to their target’s computers and networks. They worked on behalf of the Iranian Revolutionary Guard Corps (IRGC).
“Monica Witt is charged with revealing to the Iranian regime a highly classified intelligence program and the identity of a U.S. intelligence officer, all in violation of the law, her solemn oath to protect and defend our country, and the bounds of human decency,” said Assistant Attorney General for National Security John Demers.
‘Target Packages’
Witt traveled to Iran in Feb 2012 to attend the Iranian New Horizon Organization’s “Hollywoodism” conference, an event sponsored by the IRGC, which aimed to condemn American moral standards and promote anti-U.S. propaganda, among other things.She managed to re-enter Iran in August 2013 after communicating with an individual who had dual U.S.–Iranian citizenship, referred to as Individual A in the indictment.
Cyber Conspirators
The four Iranian nationals began a campaign targeting Witt’s former colleagues in late 2014.As part of the campaign, Mesri registered and helped manage an Iranian company that conducted computer intrusions against targets inside and outside the United States. The identity of the company was known to the United States.
Between January and May 2015, the cyber conspirators used fake accounts and attempted to trick their targets into clicking links or opening files that would enable them to deploy malware on the target’s computer. The group tested their malware, in some cases procured by Mesri, to gather information from target computers or networks.
In one instance, the conspirators created a fake Facebook account using information from the employee’s real Facebook account. Through this fake account, they managed to successfully add several of Witt’s former colleagues.