WikiLeaks strikes again. Here are 4 big questions about Vault 7. – Washington Post

By Brandon Valeriano By Brandon Valeriano March 8 at 9:00 AM

WikiLeaks says it has a trove on the CIA's hacking secrets. Washington Post national security reporter Greg Miller explains what these documents reveal. (Dalton Bennett,Greg Miller/The Washington Post)

WikiLeaks is once again in the news with a massive dump of information regarding the alleged cybersecurity activities of the Central Intelligence Agency. The Vault 7 dump of information comes at a fortuitous time for President Trump as he tries to regain control of the news cycle after the seemingly constant revelations that current and former staffers actively met with Russian officials during the run-up to the election and before his inauguration.

The latest information release is potentially devastating to the CIA but it should promote a positive discussion about U.S. cyber-capabilities and steps forward to promote resiliency in all targets. Here are four big questions:

None of the revelations reported by WikiLeaks should be shocking and we must first consider the source. The intelligence community previously reported direct linkages between WikiLeaks and Russia in relation to the DNC hack. A WikiLeaks news release on March 7 suggests these documents were obtained from a contractor and have been in circulation for some time. While a third-party contractor is likely the source of this information, with the great majority of successful attacks against U.S. targets coming through third parties, this also does not preclude Russias involvement, given their previous relationship with WikiLeaks.

A key point here is that this document trove shifts the narrative away from the hacking of the DNC and Russias relationship with Trump and toward a focus on the malfeasance allegedly committed by the CIA. Instead, we must consider where the information came from and the lack of credibility WikiLeaks has as a news source.

[The DNC email hack didnt tell us much. Heres why cyberattacks have limited punch.]

Attribution in cyberspace is difficult, but not impossible, as scholars have pointed out. In cyberspace, we mainly have a reasonability problem, not an attribution problem. There is a clear motive for Russia to engage in passing this document dump on, both to distract from current speculation about close ties to Trump and to gain revenge for the previously released Panama Papers, which they blame on the United States.

But can we know that Russia is directly responsible? That is tough given the likely many layers of insulation between the source of the information and its delivery.

At this point, the information dump does seem legitimate but it will take some time for technical experts to sift through the data and code. Theres an important question here:How many zero dayexploits does the U.S. control? Zero day exploits are unknown vulnerabilities and possible avenues of attack, called zero days because they have yet to be discovered and can act as open doors to inaccessiblesystems.

[Trump says that classified leaks are devastating America. Heres the real issue with secrets and leaks.]

Former cybersecurity official Jason Healey, now a Columbia University professor, had previous research that suggested the U.S. was only in control of dozens of zero days. This information dump could possibly reveal many important vulnerabilities held by U.S. assets.

If so, the leaked information could be a troubling degradation of U.S. cyber-capabilities, because once known, these pathways toward access become useless. But we should remember that cyber-capabilities are as much about the technical abilities and human capital in the U.S. government rather than the pure number of exploits available at one time. If there is any positive to be taken from this, it could be that this allows for the holes identified in the data dump to be fixed. It also reignites thedebate on the responsibility of government to disclose vulnerabilities to the public.

Caution is the key, and we should not be surprised that the CIA has extensive cybersecurity capabilities. The great majority of cyber-actions that are not criminal are what might be termed cyberespionage. Information operations seeking to gain an advantage by manipulating information and risk often drive cyberconflict behavior, a key theme in my teams ongoing research on cyber-coercion.

[The 10 things you need to know about cyberconflict]

The real danger here was pointed out by Thomas Rid, professor at Kings College, who noted that misinformation could be slipped into these files to sow discord. Among the thousands of files, one or two fake campaigns waged by the U.S. would foment discord and mistrust. The common misguided focus on cyberwar often misses the importance of deception in cyber-operations, a point noted by Erik Gartzke and Jon Lindsay in their research.

4) Whats next?

The next steps are clear. The cybersecurity community has been waiting for the Trump administration to release its promised cybersecurity executive order. Now is the time to do this, but we must go beyond the circulated drafts that just order more studies on current vulnerabilities and capacity. A clear plan of action that would delineate lines of control over cyber-operations and protection of critical infrastructure in the U.S. government, limit access of critical systems to contractors, and create a scalable plan to recruit young cybersecurity talent are pressing needs. And responsibility for these continued cyber-breaches needs to be established and prevented in the future.

Brandon Valeriano is the Donald Bren Chair of Armed Politics at the Marine Corps University and a Reader at Cardiff University. He also serves as an Adjunct Fellow at the Niskanen Center and is the author of Cyber War versus Cyber Realities (Oxford University Press, 2015).

View post:
WikiLeaks strikes again. Here are 4 big questions about Vault 7. - Washington Post

Republican Party, WikiLeaks, International Women’s Day: Your Wednesday Briefing – New York Times


New York Times
Republican Party, WikiLeaks, International Women's Day: Your Wednesday Briefing
New York Times
Speaker Paul D. Ryan, center, presented the American Health Care Act at the Capitol on Tuesday. Some critics of the bill have called it Obamacare lite. Credit Gabriella Demczuk for The New York Times. (Want to get this briefing by email? Here's the ...

See more here:
Republican Party, WikiLeaks, International Women's Day: Your Wednesday Briefing - New York Times

WikiLeaks Dumps Trove of Purported CIA Hacking Tools – Wall Street Journal (subscription)


Wall Street Journal (subscription)
WikiLeaks Dumps Trove of Purported CIA Hacking Tools
Wall Street Journal (subscription)
WASHINGTONWikiLeaks released a massive trove of documents and files Tuesday that it says exposes how the Central Intelligence Agency hacks smartphones, computer operating systems, message applications and internet-connected televisions, ...

Continue reading here:
WikiLeaks Dumps Trove of Purported CIA Hacking Tools - Wall Street Journal (subscription)

How Trump feels about WikiLeaks: A timeline – USA TODAY

President Trump gestures as he walks down the stairs of Air Force One upon his arrival at Palm Beach International Airport in West Palm Beach, Fla., on March 3, 2017.(Photo: Luis M. Alvarez, AP)

President Trump has remained mum about the release of CIA documents by WikiLeaks on Tuesday.

While Trump praised the organization during the 2016 presidential campaign, he has been at odds with them in recent months, including over Trump's attack on Wikileaks source Chelsea Manning and the president's ongoing refusal to release his tax returns. Trump lastmentioned WikiLeaks on Twitter onNov. 5, 2016, three days prior to Election Day, when he posted a story about a WikiLeaks release and Clinton campaign aides.

Here are some of the notable times Trump has talked about WikiLeaks in the past:

Trump: "I think it's disgraceful."

Where: In a preview for a December 2010 interview withKilmeade & Friends, as reported by CNN

Context: Trump, years prior to announcing his presidential campaign, appeared on the Kilmeade & Friends, a radio show on Fox News. In a clip posted on YouTube to preview the interview, host Brian Kilmeade mentioned WikiLeaks, saying, "You didn't have anything to do with it, did you?" Trump replied, "Nope, but I think it's disgraceful. I think there should be a death penalty or something." Earlier that week in a move that helped bring WikiLeaks into international view, the nonprofit organization began releasing leaked U.S. embassy cables.

Trump: Went on a tweetstorm to talk about the WikiLeaks release of emails from the Democratic National Committee. One tweet: "Leaked e-mails of DNC show plans to destroy Bernie Sanders. Mock his heritage and much more. On-line from Wikileakes, really vicious. RIGGED"

Where: Twitter

Context: On July 22, 2016, WikiLeaks dumped thousands of emails and attachments from top aides at the DNC. The emails raised questions about whether Democrats tried to undercut Sen. Bernie Sanders' presidential campaign in order to favor Hillary Clinton.

Trump: "I love WikiLeaks!"

Where: A campaign rally in Pennsylvania

Context: A few days before then-candidate Donald Trump spoke to supporters in Wilkes-Barre, Pa., WikiLeaks began releasing the emails of Hillary Clinton campaign chairman John Podesta.The emails were dropped within an hour of the release of the now infamous Access Hollywoodvideo of Trump bragging of kissing and groping women (and using some choice language to do so). At his campaign rally, Trump read the excerpts of Clinton's past closed-door speeches, which were contained within the emails released by WikiLeaks (and he twisted some of those excerpts while doing so).

Trump: "So in one case youre talking about highly classified information. In the other case youre talking about John Podesta saying bad things about the boss."

Where:Press conference at the White House

Context: During the press conference, Trump addressed leaks that resulted in the resignation of National Security Adviser Michael Flynn earlier that week, saying they werea "real problem." When a reporter noted that the president had encouraged leaks during the campaign, specifically from WikiLeaks, Trump replied that those releasesdid not compare because it was not classified: Podesta "said terrible things about her. But it wasn't classified information."

Autoplay

Show Thumbnails

Show Captions

Read or Share this story: http://usat.ly/2m2IR8F

See more here:
How Trump feels about WikiLeaks: A timeline - USA TODAY

WikiLeaks says it has the CIA’s hacking secrets. Here’s what you need to know. – Washington Post


Washington Post
WikiLeaks says it has the CIA's hacking secrets. Here's what you need to know.
Washington Post
March 7, 2017 6:20 PM EST - WikiLeaks says it has a trove on the CIA's hacking secrets. Washington Post national security reporter Greg Miller explains what these documents reveal. (Dalton Bennett, Greg Miller / The Washington Post). March 7, 2017 6:20 ...

Here is the original post:
WikiLeaks says it has the CIA's hacking secrets. Here's what you need to know. - Washington Post

WikiLeaks Fast Facts – fox2now.com

Heres a look at WikiLeaks and the trial of Chelsea Manning.

Facts: WikiLeaks is an organization that facilitates the anonymous leaking of secret information through its website.

It was founded in 2006 by Julian Assange, activist, computer programmer and hacker.

Chelsea Manning, a transgender woman and former Army intelligence analyst who provided WikiLeaks with classified documents, was convicted of violating the Espionage Act in 2013 and sentenced to 35 years in prison. Her sentence was later commuted by President Barack Obama.

Timeline: December 2007 WikiLeaks posts the US Army manual for soldiers dealing with prisoners at Camp Delta, Guantanamo Bay.

March 2008 WikiLeaks posts internal documents from the Church of Scientology.

September 2008 WikiLeaks posts emails from the Yahoo email account of Sarah Palin.

November 2008 WikiLeaks posts a list of names and addresses of people it claims belong to the far-right British National Party.

November 2009 WikiLeaks posts what it claims are 500,000 messages sent during the September 11, 2001 attacks.

April 5, 2010 A classified military video is posted by WikiLeaks. It shows a US Apache helicopter firing on and killing two journalists and a number of Iraqi civilians in 2007. The military claimed that the helicopter crew believed the targets were armed insurgents, not civilians.

May 2010 The US military detains Manning for allegedly leaking US combat video, including the US helicopter gunship attack posted on WikiLeaks, and classified State Department records. Manning was turned in by Adrian Lamo, a former hacker, who Manning confided in about leaking the classified records.

July 6, 2010 The military announces it has charged Manning with violating army regulations by transferring classified information to a personal computer and adding unauthorized software to a classified computer system and of violating federal laws of governing the handling of classified information.

July 25, 2010 WikiLeaks posts more than 90,000 classified documents relating to the Afghanistan war in what has been called the biggest leak since the Pentagon Papers during the Vietnam War. The documents are divided into more than 100 categories and touch on everything from the hunt for Osama bin Laden to Afghan civilian deaths resulting from US military actions.

October 22, 2010 WikiLeaks publishes nearly 400,000 classified military documents from the Iraq War, providing a new picture of how many Iraqi civilians have been killed, the role that Iran has played in supporting Iraqi militants and many accounts of abuse by Iraqs army and police.

November 28, 2010 WikiLeaks begins publishing approximately 250,000 leaked State Department cables dating back to 1966. The site says the documents will be released in stages over the next few months.

November 28, 2010 The WikiLeaks website suffers an attack designed to make it unavailable to users. A Twitter user called Jester claims responsibility for the attack.

December 1, 2010 Amazon removes WikiLeaks from its servers.

April 24, 2011 Nearly 800 classified US military documents obtained by WikiLeaks reveal details about the alleged terrorist activities of al Qaeda operatives captured and housed in Guantanamo Bay.

September 2, 2011 WikiLeaks releases its archive of more than 250,000 unredacted U.S. diplomatic cables.

October 24, 2011 WikiLeaks announces that it is temporarily halting publication to aggressively fundraise. Assange states that a financial blockade by Bank of America, VISA, MasterCard, PayPal and Western Union has cut off 95% of WikiLeaks revenue.

December 16, 2011 Mannings Article 32 hearing, the military equivalent of a grand jury hearing that will determine whether enough evidence exists to merit a court-martial, begins.

February 23, 2012 Manning is formally charged with aiding the enemy, wrongfully causing intelligence to be published on the Internet, transmitting national defense information and theft of public property or records.

February 26, 2012 WikiLeaks begins releasing what it says are five million emails from the private intelligence company, Stratfor, starting with a company glossary that features unflattering descriptions of US government agencies. The authenticity of the documents could not be independently confirmed.

July 5, 2012 WikiLeaks begins publishing more than 2.4 million emails from Syrian politicians, government ministries and companies dating back to 2006.

February 28, 2013 Manning pleads guilty to some of the 22 charges against him, but not the most serious charge of aiding the enemy, which carries a life sentence.

June 3, 2013 Mannings court-martial begins.

July 30, 2013 Manning is acquitted of aiding the enemy, but found guilty on 20 other counts, including violations of the Espionage Act.

August 21, 2013 A military judge sentences Manning to 35 years in prison.

August 22, 2013 Through a statement read on NBCs Today show, Manning announces he wants to live life as a woman and wants to known by his new name, Chelsea Manning.

April 23, 2014 A Kansas judge grants Mannings request for a formal name change from Bradley to Chelsea.

July 22, 2016 WikiLeaks releases nearly 20,000 emails from Democratic National Committee staffers. The emails appear to show the committee favoring Hillary Clinton over Bernie Sanders during the US presidential primary.

October 7, 2016 More than 2,000 hacked emails from Clintons campaign chairman, John Podesta are published by WikiLeaks. The emails include possible excerpts from closed-door speeches. During the Democratic primary, Sanders asked Clinton to release the transcripts from her speeches but she declined. WikiLeaks claims that it has more than 50,000 of Podestas emails and pledges to continue releasing batches of documents during the weeks leading up to the election.

January 3, 2017 During an interviews on the Fox News Network, Assange says that Russia did not give WikiLeaks hacked emails.

January 12, 2017 WikiLeaks tweets that Asssange will agree to be extradited to the US if Obama grants clemency to Manning.

January 17, 2017 Obama commutes Mannings sentence, setting the stage for her to be released on May 17.

The rest is here:
WikiLeaks Fast Facts - fox2now.com

What Is WikiLeaks’ Vault 7? Photos & Clues – Heavy.com

Julian Assange(Getty)

After releasing a series of very cryptic #Vault7 messages in early February, WikiLeaks has finally released a file that contains the mysterious Vault 7. The file wont be readable until tomorrow, when WikiLeaks releases a passphrase at 9 a.m. Eastern. However, WikiLeaks released a new clue about Vault 7, hidden in its tweet. Heres everything we know about Vault 7 so far, along with theories about what might be waiting for us in the morning.

And by the way, according to a tweet WikiLeaks sent out later, this is thefirstin a series of releases related to Vault 7:

Heres what you need to know about Vault 7.

WikiLeaks Vault 7 tweet contained a hidden message, because the background isnt just a black frame. In fact, its a photo that has been darkened.

Lighten it a little and you see this:

The photo says Prefecture beneath the world Vault. Some think it reads Prefecture 333, but it actually reads Prefecture 353. We found the source of the photo. But first, here are the guesses that were wrong:

Some believe that the photo appears to be of Kryptos, a sculpture outside the CIA headquarters in Langley. The sculpture, by James Sanborn, includes four encrypted messages. Since it was dedicated on November 3, 1990, three out of four of the messages have been solved. Heres a photo of the sculpture below. However, this isnotthe sculpture in WikiLeaks photo.

(Jim Sanborn)

Otherssay the photo is actually thissculpture in the D.C. Convention Center.

We found out what it actually is. The photo isLingua, one of two art pieces at the registration area of the Walter E. Washington Convention Center.This is the photo that WikiLeaks used, courtesy of Flickrs open source library:

Vault 7 (Flickr/David) License:https://creativecommons.org/licenses/by/2.0/

As you can see, WikiLeaksdid notedit the Prefecture part into the photo. The sculpture alreadyreads Prefecture 353 A.D. So no, unlike what some theories have surmised, this isnotrelated to Chinas 333 prefecture-level cities.

What happened in 353 AD? There was the Battle of Mons Seleucus, where Emperor Constantius II defeated Magnentius, who committed suicide in Gaul to avoid capture. Constantius then reunified the Roman Empire. Constantius II sent his official, Catena, to Britain to kill opponents supporting Magnentius. Martinus committed suicide after failing to kill Catena.

As far as the Year Zero part of the tweet, some surmised that it could mean that the information is sohuge that it could feel like restarting part of history once its released.However, according to a later tweet by WikiLeaks, it actually means that its the first in a series of releases that WikiLeaks plans for Vault 7.

In February, WikiLeaks released six cryptic tweets about Vault 7. The first was this:

The tweet featuresa photo of the Svalbard Seed Vault.The seed vault is on the Norwegian island of Spitsbergen in a remote Arctic archipelago. The vault was started by Cary Fowler and the Consultative Group on International Agriculture Research to preserve plant seeds and make sure there are always spare copies of seeds around the world, in case of a global or regional crisis.What you see above the entrance to the vault, in the photo, is an illuminated public artwork. It was made by Dyveke Sanne and is called Perpetual Repercussion.

The second tweet was this:

It asked Where is #Vault7? Thephoto in the tweet shows Nazi gold stored in Merkers Salt Mine (its referenced in this Wikipedia article.)According to the National Archives, the minecontained gold bullion, gold Reichsmarks, British gold pounds, French gold francs, American gold pieces, gold and silver coins, additional foreign currency, silver bars, platinum bars, artwork, and more. Nazi gold was allegedly transferred by Nazi Germany to overseas banks during World War II, as part of a strategy involving looting victims assets to fund the war. Authorsand conspiracy theorists have long guessed about what happened to the Nazi gold that disappeared.In fact, a group of Holocaust survivorseven brought a civil suit against the Vatican Bank over it, filed in November 1999. The case was dismissed in 2003, but then reinstated in part in 2005.Various parts of the case were dismissed again in 2007-2009.

The third tweet was this:

(Twitter/WikiLeaks)

It asked When Is #Vault7? The photo in the tweet was from 2010, takenat Langley Air Force Base in Virginia, while running a test on a Pratt and Whitney F119-PW-100 jet engine. The jet inspections look for any objects that could damage blades inside the engines.The article that the picture is from talks about soundproof hush houses that are used for jet engine testing. These are sometimes called vaults. The type of engine fed more theories that Vault 7 was about 9/11, because F119 is 911 backwards.

Heres the fourth tweet:

The photosare part of a series of spy posterscreated by the U.S. government. You can see all of the posters in the series at the Center for Development of Security Excellences website. Beneath Snowdens photo the poster reads: Spilled the Beans and Ran. Beneath Assanges it reads: The Hack Behind WikiLeaks. Beneath Mannings it reads: Leaked the Largest Cache of Classifieds.

Heres the fifth tweet:

In Why is #Vault7?, areverse image search reveals this photo to be from an article posted by Whiteman Air Force Base. The caption of the photo reads: Staff Sgt. Adam Boyd, 509th Civil Engineer Squadron structural supervisor, welds a box blade for a snow plow, Feb. 27. Structures Airmen perform jobs such as this one to save the Air Force from having to possibly spend money on parts made by civilian companies. This photo fed more theories that these tweets are about 9/11.

The sixth tweet read: How did #Vault7 Make Its Way to Wikileaks? Here it is:

This photo can be found in several locations, including Open Society Foundations Images from the Secret Stasi Archives here. The caption reads: Whenmailboxes were beingobserved by Stasi agents,every person posting a letter was photographed. Some films found in theStasiarchives also show persons dressed in civilian clothing emptying the mailbox after the conclusion of the surveillance action. Its part of a series of photos of people at mailboxes. Stasi is The Ministry for State Security, which was the official state security service of the German Democratic Republic (East Germany.) Wikipedia cites several sources as saying Stasi was often referred to as one of the most effective and repressive intelligence and secret police agencies to have existed.

George Soros is the founder and chairman of Open Society Foundations, the source of this photo.

There are so many theories about Vault 7, its hard to keep track. Here are just a few.

One of the top theories was that this was about a seventh vault of FBI emails, since the FBI had released six sets of Clinton emails at the time that the tweets were published. But this seems less likely now, since the FBI just released Part 7 of its Clinton vault here. Others believed that it was related to Clintons missing 33,000 emails. However,the Vault 7 file is just about half a gig in size, so it likely doesnt contain Clintons missing 33,000 emails. (Although, as some have pointed out, it could just be part one of a series of leaks.)

Because of the latest photo, some believe this is about the CIA.

Others theorize this is somehow related to a longstanding conspiracy theory about pizzagate, which involves the idea that high-ranking politicians are involved in a pedophile ring. So far no conclusive evidence has been found to support this theory.

Still others believe its related to September 11, 2001, because several pictures can be interpreted as hinting at that.In the third tweet, the engine was an F119. Theoristsalso reference Building 7, which has been the source of many 9/11 conspiracy theories, including a theorythat there was a vault of gold beneath the building. (This conspiracy theory is oftenincorrectly ascribed to Building 7, but its actually about Building 6.) The fifth tweet features a photo of someone welding, which some believe is a reference to a conspiracy theory about an angled cut on a World Trade Center beam. The box blade hes welding, some say, might also be a reference to box cutters used on 9/11.

Others believe it has something to do with George Soros and the Democrats, since his website was the source for one of the photos.

A new theory, derived from the fifth tweet, is that WikiLeaks is going to release something related to government spending or military projects. The fifth tweet referenced a photo from Whiteman Air Force Base, which talked about government spending. In addition, the host unit for the base is the 509th Bomb Wing, which operates the B-2 Spirit Stealth Bomber. Whiteman is the only permanent base for the B-2. B-2 bombers were used in October 2001 in Afghanistan.

In several WikiLeaks Reddit discussions, some have said that it might be a reference to the nextmass extinction event following the sixth, whichsome scientists say we are already in the middle of. This theory is connected to the first tweet, which showed the seed vault, and proposes that #Vault7 has something to do with climate change.

CNBCreported in October that a newFBI release featuredclaims of a shadow government composed of high-ranking state officials, whom some referred to as The 7th Floor Group. So some believe that Vault 7 is somehow connected to this.

EmbassyCat, a Twitter account run by Assanges cat, only posted one thing possibly related to Vault 7.

On Twitter, @gal_deplorable provided a translation of the comic:

It talks about how the Papyrus proved that Caesar was lying and all Gaul was not conquered. The whole empire will tremble when the scandal comes out. The year 353 AD was referenced in WikiLeaks tweet about Vault 7s release, which also relates back to Gaul, so there could be a connection there. What do you think? Let us know in the comments below.

Find out what 7z (7-Zip) is and why WikiLeaks referenced it today, including where to find the program.

See original here:
What Is WikiLeaks' Vault 7? Photos & Clues - Heavy.com

Trump confidant Roger Stone admits WikiLeaks collusion, then … – AOL

By Josh King, Buzz60

Former Trump campaign advisor Roger Stone admitted that he had a "perfectly legal back channel" to Wikileaks founder Julian Assange.

The Huffington Post reports that Stone, a close friend of President Donald Trump tweeted the statement, then deleted it on Saturday.

See more on recent news regarding Donald Trump:

5 PHOTOS

President Trump accuses Obama on Twitter of wiretapping him

See Gallery

Terrible! Just found out that Obama had my "wires tapped" in Trump Tower just before the victory. Nothing found. This is McCarthyism!

Is it legal for a sitting President to be "wire tapping" a race for president prior to an election? Turned down by court earlier. A NEW LOW!

I'd bet a good lawyer could make a great case out of the fact that President Obama was tapping my phones in October, just prior to Election!

How low has President Obama gone to tapp my phones during the very sacred election process. This is Nixon/Watergate. Bad (or sick) guy!

HIDE CAPTION

SHOW CAPTION

Stone denied having direct contact with Assange but said in October that he and Assange "have a good mutual friend".

He even tweeted this tweet about Hillary Clinton campaign chairman John Podesta before the Wikileaks emails were released.

Stone's admission of a link between himself and Assange comes at a time when allegations against him and the Trump administration having ties with Russia are being investigated.

In an interview with CBS, Stone said this about an investigation into his ties with Russia

"Sure, they'll get my grocery lists. "They may get the emails between my wife and I, but here's what they won't get any contact with the Russians."

He calls the investigation into his alleged ties with Russia a "witch hunt". Something President Trump, himself has said in a tweet about the Russian investigation.

More from AOL.com: Obama administration officials left intelligence trail suspicious of Trump on Russia, report says 'This is Nixon/Watergate': Trump accuses Obama of wiretapping Trump Tower during campaign FBI made deal with ex-spy for Trump dossier

Read the original post:
Trump confidant Roger Stone admits WikiLeaks collusion, then ... - AOL

Former Trump Adviser Roger Stone Admits Collusion With … – Huffington Post

Roger Stone, a confidant to President Donald Trump and former adviser to his campaign, acknowledged late Saturday that he had a back channel to WikiLeaks founder Julian Assange, amid mounting reports that multiple advisers to Trumps campaign had undisclosed communication with Russian officials.

Never denied perfectly legal back channel to Assange who indeed had the goods on #CrookedHillary, Stone wrote Saturday night.

Stone later deleted the tweet, along with several other offensive tweets, including posts where he called various women fat [and] stupid and you stupid ignorant ugly bitch.

Stone admitted in October that he had back-channel communication with Assangeafter WikiLeaks began releasing the hacked emails of John Podesta, campaign chairman for Democratic presidential nominee Hillary Clinton.

I do have a back-channel communication with Assange, because we have a good mutual friend, Stone said in October. That friend travels back and forth from the United States to London and we talk. I had dinner with him last Monday.

Stone denied having direct contact with Assange himself.

In August, even before the emails were released, Stone alluded to Podestas time in the barrel.

Sure, theyll get my grocery lists, he said. They may get the emails between my wife and I, but heres what they wont get any contact with the Russians.

The New York Times reported last month that Stone is one of several Trump advisers under FBI investigation for contact with Russian officials.

But Stone denied that he was being investigated, telling NBC that they wont find anything of this nature.

Theyd be pretty bored if they wanted to look at my e-mails or transmissions because they wont find anything of this nature, he said. I have no Russian clients. Ive never been in touch with anyone in Russia.

More:
Former Trump Adviser Roger Stone Admits Collusion With ... - Huffington Post