Category Archives: US government

Russian espionage piggybacks on a cybercriminal’s hacking

The New York Times reports: To the F.B.I., Evgeniy M. Bogachev is the most wanted cybercriminal in the world. The bureau has announced a $3 million bounty for his capture, the most ever for computer crimes, and has been trying to track his movements in hopes of grabbing him if he strays outside his home turf in Russia.

He has been indicted in the United States, accused of creating a sprawling network of virus-infected computers to siphon hundreds of millions of dollars from bank accounts around the world, targeting anyone with enough money worth stealing — from a pest control company in North Carolina to a police department in Massachusetts to a Native American tribe in Washington.

In December, the Obama administration announced sanctions against Mr. Bogachev and five others in response to intelligence agencies’ conclusions that Russia had meddled in the presidential election. Publicly, law enforcement officials said it was his criminal exploits that landed Mr. Bogachev on the sanctions list, not any specific role in the hacking of the Democratic National Committee.

But it is clear that for Russia, he is more than just a criminal. At one point, Mr. Bogachev had control over as many as a million computers in multiple countries, with possible access to everything from family vacation photographs and term papers to business proposals and highly confidential personal information. It is almost certain that computers belonging to government officials and contractors in a number of countries were among the infected devices. For Russia’s surveillance-obsessed intelligence community, Mr. Bogachev’s exploits may have created an irresistible opportunity for espionage. [Continue reading…]

Facebooktwittermail

Authorities question CIA contractors in connection with WikiLeaks dump

The Wall Street Journal reports: Investigators probing who may have provided WikiLeaks with classified information about the Central Intelligence Agency’s purported computer-hacking techniques are zeroing in on a small number of contractors who have worked for the agency and may have been disgruntled over recent job losses, according to people familiar with the investigation.

Authorities on Thursday questioned a handful of contractors working in at least two locations in the Virginia suburbs of Washington, D.C., these people said. Law-enforcement officials said no arrests had been made, but one person familiar with the investigation said it was “rapidly unfolding.”

This person added that a digital trail has pointed authorities, at least initially, to a team of software developers working with the CIA’s Engineering Development Group. The group designs tools that, according to the documents released this week by WikiLeaks, the CIA uses to break into smartphones, personal computers and televisions connected to the internet. The more than 8,000 pages of documents that WikiLeaks disclosed appear to have been taken last December from a server that the Engineering Development Group uses, this person said, and that “only a few contractors would have access to.”

More than a dozen companies work for the CIA on hacking projects, the bulk of them at a facility near Chantilly, Va. It wasn’t clear which companies the people who were questioned worked for. In recent months, there has been talk of “bad blood” in the small world of CIA contractors who are vital to the agency’s hacking projects, the people familiar with the probe said. One group of contractors recently had been working for the CIA overseas and expected to be given new jobs with the agency in the U.S., but their positions were later eliminated, one person said. [Continue reading…]

Facebooktwittermail

If Russia inquiry is not ‘legitimate,’ Democrats may abandon it

The New York Times reports: They agreed just a week ago to the terms of a House Intelligence Committee investigation into Russian meddling in the 2016 presidential election. But now some of the panel’s Democrats are warning that they may pull their support for the inquiry if it becomes mired in party-line politics.

When that might happen is unclear, and Democrats know that the current moment of even tentative comity on the Republican-controlled panel may offer their best chance for scrutinizing links between people close to President Trump and Russian officials.

Still, Democrats are bracing for fights over subpoenaing witnesses and documents — including, possibly, Mr. Trump’s tax returns — since Republicans have balked at an outside, independent inquiry into what intelligence officials say was an unprecedented intrusion into an American election by a foreign power.

“I’m not going to be part of a dog-and-pony show that is not a serious effort to do an investigation because this is really serious,” said Representative Jackie Speier, Democrat of California. “If it’s not a legitimate and comprehensive and in-depth investigation, why would we be party to it?” [Continue reading…]

Facebooktwittermail

Preet Bharara said he wanted to be a U.S. attorney ‘forever.’ Well, he was just fired

The Washington Post reports: Days after Donald Trump won the 2016 presidential election, he summoned Preet Bharara to Trump Tower. The president-elect wanted to talk to the U.S. attorney for the Southern District of New York about his future.

Afterward, Bharara — one of the most influential prosecutors in the country, best known for going after Wall Street as well as members of both political parties — told reporters he’d been asked whether he wanted to stay on.

“The President-elect asked, presumably because he’s a New Yorker and is aware of the great work that our office has done over the past seven years, asked to meet with me to discuss whether or not I’d be prepared to stay on as the United States attorney to do the work as we have done it, independently, without fear or favor, for the last seven years,” Bharara said in a brief statement to reporters after meeting with Trump.

Three months later, Bharara is suddenly out of a job, part of an ouster of 46 U.S. attorneys appointed by President Barack Obama.

Bharara was fired after he refused to tender his resignation.

It was an abrupt end to Bharara’s nearly-eight-year tenure prosecuting powerful people in finance and politics. [Continue reading…]

Facebooktwittermail

Sessions ordered 46 U.S. attorneys to resign immediately but New York’s Preet Bharara has yet to do so

Harry Siegel writes: Preet Bharara, the crusading U.S. Attorney for the Southern District of New York who was asked to submit his resignation letter Friday, along with the 45 other U.S. Attorneys held over from the Obama administration, has yet to do so, a federal law enforcement official tells The Daily Beast.

Bharara — whose office is in the end stages of an investigation of New York Mayor Bill de Blasio, about to begin the trials of two close allies of Governor Andrew Cuomo, and also appears to be investigating how Fox News structured settlements of sexual harassment and other claims brought by its employees — met with Donald Trump shortly after the election and was told that he would stay. Just this week, Attorney General Jeff Sessions assured him in a phone conversation that he’d remain atop the Southern District, according to the federal law enforcement official.

Since receiving the letter demanding his resignation Friday afternoon, Bharara has yet to speak to the press or to his full office. Friday evening, the law enforcement official said, Bharara told his section chiefs that he’d yet to submit the requested letter and may instead challenge Sessions to fire him.

The request for Bharara’s resignation came a week to the day after he’d started a personal Twitter feed where he’d Tweeted Monday: “This Senate hearing on political interference @ DOJ was 10 yrs ago today. Is that me in background? Boy I’ve aged.”

Bharara, then the chief counselor to Sen. Charles Schumer, helped lead the Senate’s probe into the midterm dismissals of eight U.S. Attorneys that in turn led to the resignation of Attorney General Alberto Gonzales. [Continue reading…]

Facebooktwittermail

FBI chief expected to testify in House Russia hearing

The Hill reports: FBI Director James Comey is expected to testify before the House Intelligence Committee in its March 20 hearing on Russian interference in the U.S. election, a senior bureau official tells The Hill.

“That’s the plan — we’re still working out the details and the ground rules with the committee, but we expect that we will be able to accommodate that date,” said Greg Brower, assistant director for the FBI’s Office of Congressional Affairs.

The hearing — just announced this week — is the first public hearing in the committee’s contentious probe.

It is unclear whether Comey will appear during the public component or in a closed-door session. A committee aide said that while there will probably be a closed component to the hearing, it likely won’t be on March 20. [Continue reading…]

Facebooktwittermail

FBI Counterintelligence Division in charge of the Russia investigation

CNN reports: One source familiar with the Russia investigation resorted to a mathematical equation to divulge — sort of — the number of agents assigned to the matter.

It’s five to 10 fewer than were assigned to the Hillary Clinton email investigation, said the source, who is not authorized to speak publicly and did so on the condition of anonymity. There were about two dozen dedicated to that case, so that makes 15 to 20 on the Russia investigation.

The resources assigned to the Clinton investigation were in response to agents having to sort through a vast amount of electronic data in a finite period of time before the then-looming presidential election, the source said. With the Russia probe, there is no such time pressure and efforts are more focused on interviews with human sources.

The smaller number of agents assigned to the case should not be interpreted as a lack of interest, the source said. Developments in the case are sent up the chain to the highest levels on a regular basis.

Known simply as CD within the bureau, the Counterintelligence Division is responsible for protecting the secrets of the US intelligence community, the advanced technologies of American institutions both public and private, keeping weapons of mass destruction away from US enemies and countering the activities of foreign spies, including cyberintrusions. [Continue reading…]

Facebooktwittermail

State Dept. approves renewal of arms sales to Saudis as they continue bombing famine-stricken Yemen

The Washington Post reports: The State Department has approved a resumption of weapons sales that critics have linked to Saudi Arabia’s bombing of civilians in Yemen, a potential sign of reinvigorated U.S. support for the kingdom’s involvement in its neighbor’s ongoing civil war.

The proposal from the State Department would reverse a decision made late in the Obama administration to suspend the sale of precision guided munitions to Riyadh, which leads a mostly Arab coalition conducting airstrikes against Houthi rebels in Yemen.

Secretary of State Rex Tillerson’s approval this week of the measure, which officials say needs White House backing to go into effect, provides an early indication of the new administration’s more Saudi-friendly approach to the conflict in Yemen and a sign of its more hawkish stance on Iran.

It also signals a break with an approach the previous administration hoped would limit civilian deaths in a conflict that has pushed Yemen to the brink of widespread famine but that Persian Gulf ally Saudi Arabia has cast as a battle against the spread of Iranian influence across the Middle East. [Continue reading…]

Facebooktwittermail

If Tillerson doesn’t raise his profile, Bannon will control foreign policy

David Ignatius writes: Rex Tillerson is off to an agonizingly slow start as secretary of state. That matters, because if Tillerson doesn’t develop a stronger voice, control of foreign policy is likely to move increasingly toward Stephen K. Bannon, the insurgent populist who is chief White House strategist.

Tillerson’s State Department has been in idle gear these past two months. He doesn’t have a deputy or other top aides. His spokesman can’t give guidance on key issues, because decisions haven’t yet been made. Tillerson didn’t attend important meetings with foreign leaders.

As a former chief executive of ExxonMobil, Tillerson is accustomed to a world where a visible display of power is unnecessary, corporate planning is meticulous and office politics are suppressed. But this is Washington.

“I am an engineer by training. I seek to understand the facts,” Tillerson said at his confirmation hearing. That sounds reassuring, but it doesn’t fit the glitzy, backstabbing capital that spawned the television series “House of Cards.” [Continue reading…]

Facebooktwittermail

Marines have battled misogyny for years. Will it be different this time?

Marine Times reports: Although the Marine Corps was quick to condemn the secretive “Marines United” Facebook group, the Corps’ leadership has known for years about websites that encourage misogyny and cyber bullying of female Marines, veterans and other women.

Four years ago, Rep. Jackie Speier, D-Calif., warned then-Commandant Gen. James Amos that male Marines were harassing their female counterparts on Facebook pages.

“Back in 2013 then-Commandant Gen. Amos wrote to me saying, ‘We share your indignation,’ regarding deplorable images on social media that denigrate women in the United States Marine Corps,” Speier said in a Wednesday speech on the House floor.

“They were words — just words. I fear military leadership will say anything to placate Congress and an outraged public but then do nothing.”

While the Marine Corps is moving rapidly to deal with the fallout from the scandal, it is unclear whether the Corps will have any more success than it has in the past in stopping cyber bullying and online harassment.

The latest revelations have sparked a criminal investigation amid allegations that Marines and others were posting “revenge porn” and encouraging sexual assault, potential violations of the Uniform Code of Military Justice.

The potential crimes were first reported by Marine Corps veteran Thomas Brennan and published by the Center for Investigative Reporting’s Reveal on March 4.

Speier is now calling on Defense Secretary James Mattis, a retired Marine general, to ensure that the Marines involved with “Marines United” face consequences for their actions.

“That means heads should roll,” she said. “Talk is cheap. Action is what is needed for the integrity of the military. Survivors must be supported, and that will only happen if those bad Marines are drummed out of the Corps — with no exceptions.” [Continue reading…]

Facebooktwittermail

With a show of Stars and Stripes, U.S. forces in Syria try to keep warring allies apart

The Washington Post reports: The U.S. military is getting drawn into a deepening struggle for control over areas liberated from the Islamic State that risks prolonging American involvement in wars in Syria and Iraq long after the militants are defeated.

In their first diversion from the task of fighting the Islamic State since the U.S. military’s involvement began in 2014, U.S. troops dispatched to Syria have headed in recent days to the northern town of Manbij, 85 miles northwest of the extremists’ capital, Raqqa, to protect their Kurdish and Arab allies against a threatened assault by other U.S. allies in a Turkish-backed force.

Russian troops have also shown up in Manbij under a separate deal that was negotiated without the input of the United States, according to U.S. officials. Under the deal, Syrian troops are to be deployed in the area, also in some form of peacekeeping role, setting up what is effectively a scramble by the armies of four nations to carve up a collection of mostly empty villages in a remote corner of Syria. [Continue reading…]

Facebooktwittermail

The truth about the WikiLeaks CIA cache

Zeynep Tufekci writes: On Tuesday morning, WikiLeaks released an enormous cache of documents that it claimed detailed “C.I.A. hacking tools.” Immediately afterward, it posted two startling tweets asserting that “C.I.A. hacker malware” posed a threat to journalists and others who require secure communication by infecting iPhone and Android devices and “bypassing” encrypted message apps such as Signal and WhatsApp.

This appeared to be a bombshell. Signal is considered the gold standard for secure communication. WhatsApp has a billion users. The C.I.A., it seemed, had the capacity to conduct sweeping surveillance on what we had previously assumed were our safest and most private digital conversations.

In their haste to post articles about the release, almost all the leading news organizations took the WikiLeaks tweets at face value. Their initial accounts mentioned Signal, WhatsApp and other encrypted apps by name, and described them as “bypassed” or otherwise compromised by the C.I.A.’s cyberspying tools.

Yet on closer inspection, this turned out to be misleading. Neither Signal nor WhatsApp, for example, appears by name in any of the alleged C.I.A. files in the cache. (Using automated tools to search the whole database, as security researchers subsequently did, turned up no hits.) More important, the hacking methods described in the documents do not, in fact, include the ability to bypass such encrypted apps — at least not in the sense of “bypass” that had seemed so alarming. Indeed, if anything, the C.I.A. documents in the cache confirm the strength of encryption technologies. [Continue reading…]

Facebooktwittermail

How the CIA’s hacking hoard makes everyone less secure

Andy Greenberg writes: When Wikileaks yesterday released a trove of documents purporting to show how the CIA hacks everything from smartphones to PCs to smart televisions, the agency’s already shadowy reputation gained a new dimension. But if you’re an average American, rather than Edward Snowden or an ISIS jihadi, the real danger clarified by that leak wasn’t that someone in Langley is watching you through your hotel room’s TV. It’s the rest of the hacker world that the CIA has inadvertently empowered.

As security researchers and policy analysts dig through the latest WikiLeaks documents, the sheer number of hacking tools the CIA has apparently hoarded for exploiting zero-day vulnerabilities—secret inroads that tech firms haven’t patched—stands out most. If the US intelligence community knows about them, that leaves open the possibility that criminal and foreign state hackers do as well.

Its broad zero-day stash, then, strongly suggests that the CIA—along with other intelligence agencies—has long allowed Americans to remain vulnerable to those same attacks. Now that those hacking secrets are public, potentially along with enough details to replicate them, the danger of the feds leaving major security flaws unfixed only escalates.

“If the CIA can use it, so can the Russians, or the Chinese or organized crime,” says Kevin Bankston, the director of the New America Foundation’s Open Technology Institute. “The lesson here, first off, is that stockpiling a bunch of vulnerabilities is bad for cybersecurity. And two, it means they’re likely going to get leaked by someone.”

It’s no surprise, of course, that one of America’s most well-resourced spy agencies can hack its foreign adversaries. The shock, says Johns Hopkins cryptographer Matt Green, comes instead from the sudden spill of those hacking tools onto the web. “In the same way the military would probably have one technique for killing every single tank in an enemy’s arsenal, you would expect the CIA to collect the same thing,” says Green. “What’s different is that we’re seeing them out in public.”

In fact, WikiLeaks wrote in a note accompanying its Tuesday release that “the archive appears to have been circulated among former US government hackers and contractors in an unauthorized manner.” That raises the possibility the full document set, along with actual exploit details or code, may have fallen into the hands of hackers long before it was published in part by WikiLeaks. [Continue reading…]

Facebooktwittermail

Wikileaks files show the CIA repurposing hacking code to save time, not to frame Russia

The Intercept reports: Attributing hacking attacks to the correct perpetrators is notoriously difficult. Even the U.S. government, for all its technical resources and expertise, took warranted criticism for trying to pin a high-profile 2014 cyberattack on North Korea, and more recently faced skepticism when it blamed Russia for hacks against top Democrats during the 2016 election.

In those cases, government officials said they based their attribution in part on software tools the hackers employed, which had been used in other cyberattacks linked to North Korea and Russia. But that sort of evidence is not conclusive; hackers have been known to intentionally use or leave behind software and other distinctive material linked to other groups as part of so-called false flag operations intended to falsely implicate other parties. Researchers at Russian digital security firm Kaspersky Lab have documented such cases.

On Tuesday, Wikileaks published a large cache of CIA documents that it said showed the agency had equipped itself to run its own false-flag hacking operations. The documents describe an internal CIA group called UMBRAGE that Wikileaks said was stealing the techniques of other nation-state hackers to trick forensic investigators into falsely attributing CIA attacks to those actors. According to Wikileaks, among those from whom the CIA has stolen techniques is the Russian Federation, suggesting the CIA is conducting attacks to intentionally mislead investigators into attributing them to Vladimir Putin.

“With UMBRAGE and related projects, the CIA can not only increase its total number of attack types, but also misdirect attribution by leaving behind the ‘fingerprints’ of the groups that the attack techniques were stolen from,” Wikileaks writes in a summary of its CIA document dump

It’s a claim that seems intended to shed doubt on the U.S. government’s attribution of Russia in the DNC hack; the Russian Federation was the only nation specifically named by Wikileaks as a potential victim of misdirected attribution. It’s also a claim that some media outlets have accepted and repeated without question.

“WikiLeaks said there’s an entire department within the CIA whose job it is to ‘misdirect attribution by leaving behind the fingerprints’ of others, such as hackers in Russia,” CNN reported without caveats.

It would be possible to leave such fingerprints if the CIA were re-using unique source code written by other actors to intentionally implicate them in CIA hacks, but the published CIA documents don’t say this. Instead they indicate the UMBRAGE group is doing something much less nefarious.

They say UMBRAGE is borrowing hacking “techniques” developed or used by other actors to use in CIA hacking projects. This is intended to save the CIA time and energy by copying methods already proven successful. If the CIA were actually re-using source code unique to a specific hacking group this could lead forensic investigators to mis-attribute CIA attacks to the original creators of the code. But the documents appear to say the UMBRAGE group is writing snippets of code that mimic the functionality of other hacking tools and placing it in a library for CIA developers to draw on when designing custom CIA tools. [Continue reading…]

Facebooktwittermail

Russia turns Wikileaks CIA dump into disinformation

Kevin Poulsen reports: For the second time in a matter of months, U.S. intelligence agencies have suffered a devastating breach of their hacking secrets.

But unlike the last breach in August, an American Central Intelligence Agency worker, not Russian hackers, is the most likely source of a new tranche of documents detailing the methods and tools used by the CIA to steal secrets from foreign governments and terror groups — though some experts have seen signs that Russia is working overtime to take advantage of the disclosure.

Tuesday’s document dump, titled “Vault 7, Year Zero” by WikiLeaks, details the capabilities and culture within the CIA’s secretive Center for Cyber Intelligence in Langley, Virginia. The leak portrays a robust, if not unique, computer-intrusion capability inside the CIA, accented by a few James Bond novelties, like special snooping software intended to be carried into an adversary’s lair on a thumb drive, where a CIA asset plugs it into a USB port. Another program, code-named Weeping Angel, turns a Samsung smart TV into a covert listening device.

The leak follows an incident last August when a mysterious group or individual called the Shadow Brokers began publishing hacking tools stockpiled by the NSA’s elite Tailored Access Operations group, including dozens of backdoor programs and 10 exploits. Experts suspected the Shadow Brokers were a shot across the bow by Russia’s intelligence services.

But the CIA leak could be worse for U.S. intelligence, because it includes code from the agency’s malware development frameworks. Using that code, security experts and counterintelligence agents could sniff out a variety of CIA malware. “For the CIA this is huge loss,” said Jake Williams, founder of Rendition Infosec. “For incident responders like me, this is a treasure trove.” [Continue reading…]

Facebooktwittermail

Wikileaks and the CIA’s hacking arsenal

Julian Sanchez writes: It’s a cliche of political scandals that “the coverup is worse than the crime”: Attempts to conceal misconduct, because they’re easier to prove and provide otherwise elusive evidence of a guilty mind, often end up being more politically damaging than the underlying misconduct would have been. In the case of the latest Wikileaks document dump, the first in a planned series from a cache the site has dubbed “Vault 7,” we have an apparent reversal of the formula: The un-coverup—the fact of the leak itself—is probably more significant than the substance of what has thus far been revealed.

There are, of course, some points of real interest in the archive of documents, mostly concerning an array of hacking tools and software exploits developed or used by the Central Intelligence Agency’s Engineering Development Group — and it’s likely more will emerge as reporters and analysts churn through more than 8,000 files and documents. We’ve confirmed that the CIA has hung onto and exploited at least a handful of undisclosed “zero day” vulnerabilities in widely-used software platforms, including Apple’s iOS and Google’s Android, the operating systems on which nearly all modern smartphones run.

We also learn that — as many of us expected — the obstacles to conventional wiretapping posed by the growing prevalence of encryption have spurred intelligence agencies to hunt for alternative means of collection, which include not only compromising communications endpoints such as smartphones, but also seeking to repurpose networked appliances on the Internet of Things as surveillance devices. The latter goal has even spawned its own research department, the Embedded Development Branch.

Still, in light of what we already knew about the National Security Agency’s own efforts along similar lines, thanks to Edward Snowden’s disclosures about the agency’s Tailored Access Operations division, this is—at least from a policy perspective—not so much revelation as confirmation. Moreover, there’s little here to suggest surveillance that’s either aimed at Americans or indiscriminate, the features that made Snowden’s leaks about NSA surveillance so politically explosive. One of the more widely-reported projects in Vault 7, for instance, has been the Doctor Who — referencingWeeping Angel” implant, which can turn Samsung televisions into surveillance microphones even when they appear to be turned off. Yet, at least at the time the documentation in the Wikileaks release was written, Weeping Angel appeared to require physical access to be installed—which makes it essentially a fancy and less detectable method of bugging a particular room once a CIA agent has managed to get inside. This is all fascinating to surveillance nerds, to be sure, but without evidence that these tools have been deployed either against inappropriate targets or on a mass scale, it’s not intrinsically all that controversial. Finding clever ways to spy on people is what spy agencies are supposed to do. [Continue reading…]

Facebooktwittermail

U.S. aware of CIA security breach in 2016; contractors suspected in leak

Reuters reports: U.S. intelligence and law enforcement officials said on Wednesday they have been aware since the end of last year of a security breach at the CIA and were focusing on contractors as the likeliest source of documents being passed on to anti-secrecy group WikiLeaks detailing the agency’s hacking tools.

The officials, who spoke on condition of anonymity, told Reuters that they believed documents published by WikiLeaks on Tuesday about CIA techniques used between 2013 and 2016 were authentic.

The documents showed that CIA hackers could get into Apple iPhones, Google Android devices and other gadgets in order to capture text and voice messages before they were encrypted with sophisticated software.

The White House said on Wednesday that President Donald Trump was “extremely concerned” about a CIA security breach that led to the Wikileaks release, and the administration would be tough on leakers. [Continue reading…]

Facebooktwittermail

CIA providing raw intelligence as Trump-Russia probes heat up

Politico reports: Lawmakers are trekking to CIA headquarters in Langley, Va., to review classified evidence on Russia’s involvement in the presidential election. The House has scheduled its first public hearing on the issue. And the Senate is preparing to interview witnesses.

The congressional investigations into ties between President Donald Trump’s campaign and Russian officials are in full swing.

For months, the leaders of the House and Senate Intelligence Committees said their investigations into Russia’s meddling in the 2016 presidential election were in their “initial” stages. On Tuesday, it became clear that the probes had moved into a new phase.

The CIA is now providing raw intelligence documents to committee members, according to multiple senators. Senate Intelligence Chairman Richard Burr (R-N.C.) and Majority Whip John Cornyn (R-Texas) visited CIA headquarters on Monday to view the documents underlying the intelligence community’s unclassified assessment that Russia sought to sway the election in favor of Trump.

At Langley, Cornyn said Tuesday, he viewed “four large binders full of classified information that’s been made available to the committee to conduct” its wide-ranging investigation. [Continue reading…]

The Washington Post reports: The FBI has begun preparing for a major mole hunt to determine how anti-secrecy group WikiLeaks got an alleged arsenal of hacking tools the CIA has used to spy on espionage targets, according to people familiar with the matter.

The leak rattled government and technology industry officials, who spent Tuesday scrambling to determine the accuracy and scope of the thousands of documents released by the group. They were also trying to assess the damage the revelations may cause, and what damage may come from future releases promised by WikiLeaks, these people said. [Continue reading…]

Facebooktwittermail