Feds turn up heat on high-tech industry links to al-Qaeda
Computerworld - Last night's raid of a Massachusetts-based software firm for possible links to al-Qaeda signals a shift in the FBI's focus on nongovernmental organizations and charities to corporate America, including the IT industry, experts close to the investigation said.
Bringing to a close one phase of an ongoing investigation code-named Operation Greenquest, the FBI raided the Quincy, Mass., offices of Ptech Inc. in an effort to search for evidence that the company was involved in helping to finance al-Qaeda operations. It is also investigating the possibility that software Ptech sold to various government agencies may have contained malicious code (see story).
The company's client list reads like a who's who of the high-tech industry, including companies such as IBM, Booz Allen & Hamilton Inc., Motorola Inc., Sprint Corp. and The Mitre Corp.
"We are investigating the [situation] and are cooperating with authorities," said Jeffrey Gluck, a spokesman for IBM Global Services, which works with Ptech to build IT architectures for its customers. "But it's still too early in the investigation to know, with any degree of certainty, exactly what the allegations are," he said.
A spokesman for Allegheny Energy Supply Co. in Hagerstown, Md., another Ptech customer, declined to comment.
Senior counterintelligence officials familiar with the case said the U.S. Customs Service initiated the investigation of Ptech after a disgruntled employee tipped off the agency to the company's alleged hidden ownership. As a result, customs officials and the FBI began investigating Yacub Mirza, a former member of Ptech's board of directors who also manages a number of other businesses in the U.S.
"Mirza was acting on behalf of Yassin Qadi, the Saudi financier who was on the U.S. [terrorism] watchlist and whose accounts here are frozen," said Vince Cannistraro, the former chief of counterterrorism at the CIA. "Qadi is the guy behind Ptech."
Although it's not clear if Ptech made any money for Osama bin Laden's terrorist network, Operation Greenquest is trying to determine if it has served as a laundering entity for al-Qaeda, said Cannistraro.
The company, which currently has 35 employees, issued a statement this afternoon denying that federal agents conducted a "raid" of Ptech's offices, saying instead that the company "granted access" to investigators and is cooperating fully.
"The company categorically denies having any connection with any terrorist organization," the statement read. "Ptech has been informed by government investigators that neither Ptech nor its officers or employees are targets of the government's investigation."
Blake Bisson, the company's vice president of sales, told Computerworld today that he believes federal authorities are routinely investigating companies with employees from Islamic countries.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Gartner Report: A Guide to Gartner's Enterprise Mobile Security Self-Assessment Gartner introduces a model and a Toolkit intended to help mobility and security IT leaders assess their enterprise mobility programs from a security...
- Gartner Report: Containing Mobile Security Risks With the 80/20 Rule IT planners can deliver better mobile protection with higher user satisfaction by segmenting users into risk groups before committing to specific management or...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts