DoJ fines former intel operatives who provided hacker-for-hire services to UAE
A deal will see the charges suspended and the three defendants pay more than $1.6 million in penalties


The Department of Justice (DoJ) has announced federal computer fraud charges against three men who allegedly helped build a hacking program for the United Arab Emirates government.
The defendants - US citizens Marc Baier, 49, and Ryan Adams, 34, and a former US citizen Daniel Gericke, 40 - are all former employees of the US Intelligence Community (USIC) or military. They agreed to cooperate with prosecutors as part of a deal with the government that will see the charges suspended and the three men pay more than $1.6 million in penalties.
According to court documents, the defendants worked as senior managers at a UAE-based firm that carried out hacking campaigns on behalf of the UAE government between 2016 and 2019. They provided “zero-click” hacking that “could compromise a device without any action by the target”.
The deal is known as a deferred prosecution agreement (DPA) and restricts them in future activities and employment and requires the payment of $1,685,000 in penalties. Baier will pay the largest share of the fine, $750,000, according to the DoJ, while Adams and Gericke will pay $600,000 and $335,000, respectively.
“This agreement is the first-of-its-kind resolution of an investigation into two distinct types of criminal activity: providing unlicensed export-controlled defense services in support of computer network exploitation, and a commercial company creating, supporting, and operating systems specifically designed to allow others to access data without authorization from computers worldwide, including in the United States,” said acting assistant attorney general Mark Lesko for the Justice Department’s National Security Division in a statement.
RELATED RESOURCE
The ultimate law enforcement agency guide to going mobile
Best practices for implementing a mobile device program
“Hackers-for-hire and those who otherwise support such activities in violation of US law should fully expect to be prosecuted for their criminal conduct.”
The DoJ said that the services provided by the men constituted a “defense service” requiring a license from the State Department’s Directorate of Defense Trade Controls (DDTC). The defendants proceeded to provide such services without a license.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The FBI said this would be a warning to any American looking to provide hacking services to foreign governments.
“The FBI will fully investigate individuals and companies that profit from illegal criminal cyber activity,” said assistant director Bryan Vorndran of the FBI’s Cyber Division.
“This is a clear message to anybody, including former US government employees, who had considered using cyberspace to leverage export-controlled information for the benefit of a foreign government or a foreign commercial company – there is risk, and there will be consequences.”
Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
UK cyber experts on red alert after Salt Typhoon attacks on US telcos
Analysis The UK could be next in a spate of state-sponsored attacks on telecoms infrastructure
By Solomon Klappholz Published
-
Healthcare data breaches are out of control – here's how the US plans to beef up security standards
News Changes to HIPAA security rules will require organizations to implement MFA, network segmentation, and more
By Solomon Klappholz Published
-
The US could be set to ban TP-Link routers
News US authorities could be lining up the largest equipment proscription since the 2019 ban on Huawei networking infrastructure
By Solomon Klappholz Published
-
US government IT contractor could face death penalty over espionage charges
News The IT pro faces two espionage charges, each of which could lead to a death sentence or life imprisonment, prosecutors said
By Ross Kelly Published
-
US identifies and places $10 million bounty on LockBit, Hive ransomware kingpin
News Mikhail Pavlovich Matveev was linked to specific ransomware attacks, including a 2021 raid on the DC police department
By Rory Bathgate Published
-
Breach at US Transportation Department exposes 240,000 employee records
News An investigation is underway into the breach, which affected former and current employee data
By Rory Bathgate Published
-
IRS mistakenly publishes 112,000 taxpayer records for the second time
News A contractor is thought to be responsible for the error, with the agency reportedly reviewing its relationship with Accenture
By Zach Marzouk Published
-
US begins seizure of 48 DDoS-for-hire services following global investigation
News Six people have been arrested who allegedly oversaw computer attacks launched using booters
By Zach Marzouk Published