Julian Assange Says WikiLeaks Will Share CIA Code With Tech Companies – NPR

WikiLeaks founder Julian Assange stands on the balcony of the Ecuadorean Embassy in London. Frank Augstein/AP hide caption

WikiLeaks founder Julian Assange stands on the balcony of the Ecuadorean Embassy in London.

Updated at 2:10 p.m. ET

WikiLeaks will be sharing alleged CIA hacking techniques with major technology companies such as Apple and Google to allow them to develop fixes for vulnerabilities in their phones and other electronic devices, according to Julian Assange.

In a lengthy address from Ecuador's Embassy in London, where he remains holed up since 2012, the WikiLeaks founder said the group would work with manufacturers to "disarm" purported CIA hacking tools. When the fixes are in place, he said, WikiLeaks would publish the code for those tools online.

On Tuesday, the group published what it calls a trove of internal CIA documents describing agency techniques and programs for hacking into phones, computers and Internet-connected appliances. Many of the techniques take advantage of flaws in software that make programs or devices vulnerable.

The document dump did not include the code itself. Instead, it consisted of user guides, troubleshooting manuals, program specifications and developer chatter.

WikiLeaks said Tuesday it was "avoiding the distribution of 'armed' cyberweapons" until there was a "consensus" on how to disable the tools. On Wednesday, the group suggested on Twitter that it might work with major tech companies to fix the vulnerabilities that allow the tools to work.

On Thursday, Assange confirmed that would be the group's strategy.

"We have decided to work with [manufacturers] to give them exclusive access to the additional technological details we have so that fixes can be developed and pushed out," Assange said. "Once this material is effectively disarmed by us we will publish additional details."

He did not give a timeline for that publication.

It was not immediately clear how the tech companies would respond to the WikiLeaks offer. Apple, for example, said Tuesday that it had already patched many of the problems cited in the WikiLeaks document dump, which allegedly covers the period of 2013 to 2016.

The CIA hasn't confirmed the authenticity of the documents released in the dump, but has criticized WikiLeaks for what it says is an attempt to undermine the agency's operations.

Immediately after Assange spoke on Thursday, CIA spokeswoman Heather Fritz Horniak responded by saying that the "CIA continues to aggressively collect foreign intelligence overseas to protect America from terrorists, hostile nation states and other adversaries."

She added: "As we've said previously, Julian Assange is not exactly a bastion of truth and integrity."

In the news conference, which was livestreamed online, Assange repeated WikiLeaks' assertion that the CIA has lost control of its vast collection or hacking techniques.

"This is an historic act of devastating incompetence to have created such an arsenal and stored it all in one place and not secured it," he said.

Assange appeared in a dark suit and red tie, occasionally shuffling papers as he spoke. Over his shoulder, the WikiLeaks icon was present.

He also suggested it was possible the CIA was using some of the tools against Americans, which is prohibited by law. He said WikiLeaks is investigating IP addresses associated with U.S. computers, to determine if they are "attack systems" controlled by the CIA or "victims" targeted by the CIA.

WikiLeaks has not released those IP addresses. On Wednesday, the CIA denied that it targets Americans through electronic surveillance, saying the agency "is legally prohibited" from targeting Americans and that it "does not do so."

Visit link:
Julian Assange Says WikiLeaks Will Share CIA Code With Tech Companies - NPR

Julian Assange says WikiLeaks will share CIA hacking tools with tech companies – AOL

Dustin Volz

Mar 9th 2017 11:54AM

WASHINGTON, March 9 (Reuters) - WikiLeaks founder Julian Assange said on Thursday his organization would provide technology companies with exclusive access to CIA hacking tools to allow them to patch software flaws.

The anti-secrecy group published documents this week describing secret CIA hacking tools and snippets of computer code. It did not publish the full programs that would be needed to actually conduct cyber exploits against phones, computers and Internet-connected televisions.

"So I want to announce that after today, considering what we think is the best way to proceed and hearing these calls from some of the manufacturers, we have decided to work with them to give them some exclusive access to the addition technical details that we have so that the fixes can be developed and pushed out, so people can be secure," Assange said during a press conference broadcast via Facebook Live.

6 PHOTOS

Julian Assange

See Gallery

A supporter of Wikileaks founder Julian Assange holds a banner outside the Ecuadorian embassy in London as he marks three years since Assange claimed asylum in the embassy on June 19, 2015. WikiLeaks founder Julian Assange clocks up three years inside the Ecuadoran embassy in London today, after claiming that Swedish prosecutors cancelled a landmark meeting in his case earlier this week. AFP PHOTO / JUSTIN TALLIS (Photo credit should read JUSTIN TALLIS/AFP/Getty Images)

A supporter of Wikileaks founder Julian Assange holds banners outside the Ecuadorian embassy in London as he marks three years since Assange claimed asylum in the embassy on June 19, 2015. WikiLeaks founder Julian Assange clocks up three years inside the Ecuadoran embassy in London today, after claiming that Swedish prosecutors cancelled a landmark meeting in his case earlier this week. AFP PHOTO / JUSTIN TALLIS (Photo credit should read JUSTIN TALLIS/AFP/Getty Images)

WikiLeaks founder Julian Assange makes a speech from the balcony of the Ecuadorian Embassy, in central London, Britain February 5, 2016. REUTERS/Peter Nicholls/Files

Julian Assange, Founder and Editor-in-Chief of WikiLeaks speaks via video link during a press conference on the occasion of the ten year anniversary celebration of WikiLeaks in Berlin, Germany, October 4, 2016. REUTERS/Axel Schmidt TPX IMAGES OF THE DAY

WikiLeaks founder Julian Assange appears on screen via video link during his participation as a guest panelist in an International Seminar on the 60th anniversary of the college of Journalists of Chile in Santiago, Chile, July 12, 2016. REUTERS/Rodrigo Garrido

HIDE CAPTION

SHOW CAPTION

On Wednesday, U.S. intelligence and law enforcement officials told Reuters that contractors likely breached security and handed over the documents to WikiLeaks. Two officials said they believed the published documents about hacking techniques used by the Central Intelligence Agency between 2013 and 2016 were authentic.

Assange said he possessed "a lot more information" about the CIA's cyber arsenal that would be released soon.

WikiLeaks' publication of the documents on Tuesday reignited a debate about whether U.S. intelligence agencies should hoard serious cyber security vulnerabilities rather than share them with the public. An interagency process created under former President Barack Obama called for erring on the side of disclosure.

Two U.S. officials speaking on condition of anonymity told Reuters that intelligence agencies have been aware since the end of last year of a breach at the CIA, which led to WikiLeaks releasing thousands of pages of information on its website.

More from AOL.com: CIA contractors likely source of latest WikiLeaks release: US officials Journalist Juan Thompson arrested in bomb threats to Jewish centers As Indiana governor, VP Pence used private email for state business

Follow this link:
Julian Assange says WikiLeaks will share CIA hacking tools with tech companies - AOL

Julian Assange Wants to Protect Tech Companies From CIA Hacking – Fortune


Fortune
Julian Assange Wants to Protect Tech Companies From CIA Hacking
Fortune
All products and services featured are based solely on editorial selection. FORTUNE may receive compensation for some links to products and services on this website. Quotes delayed at least 15 minutes. Market data provided by Interactive Data. ETF and ...

Read the original:
Julian Assange Wants to Protect Tech Companies From CIA Hacking - Fortune

China mulls national cryptocurrency in race to digital money – Naked Security

Eight years ago, bitcoin was an experimental technology of interest only to a handful of enthusiasts. Today, China which contains one in every five internet users is mulling the idea of a national cryptocurrency.

The Peoples Bank of China (PBOC) has been trialling a national digital currency based onthe same underlying technology as Bitcoin. Heres a description of how the blockchain works, but in summary its decentralized, transparent and secure.

Governments worldwide have had a problematic relationship with Bitcoin. The US has held federal hearings on it, while at a state level New York has heavily regulated the cryptocurrency with its Bitlicense. Ecuador, Bolivia and Russia have all moved to ban Bitcoin outright, while other countries have taken their time working out what to do with the cryptocurrency.

China has been among the more aggressively anti-Bitcoin regimes. Over the past few years, PBOC has pressured exchanges and banks over Bitcoin, and the government turned up the heatagain this year.

Its not surprising that countries have found it difficult to tackle cryptocurrencies. People exchanging things on peer to peer (P2P) networks used to be the music and video industrys problem. Now, suddenly, people were exchanging money with them.

When used properly, P2P money offers true anonymity, which creates problems for authorities trying to track the flow of cash to terrorists and organized criminals. Left unchecked, its also a greattax evasion tool.Wheregovernments are regulating, theyre typically making sure that anyone trading bitcoins registers their identities so that authoritiescan follow the money.

Its a tricky line for policymakers to walk. Governments need to control cryptocurrencies, but if they squash them altogether, they risk missing some of its best innovations. These include fast payments, micropayments, integration with the Internet of Things, and the ability to secure transactions using permission from multiple parties.

Governments could digitize paymentsusing a centrally controlled digital currency, sans blockchain, but then people might not trust it.Many people would find the idea ofgovernment-tracked money unpalatable.

Could a cryptocurrency-based national currency satisfy everyone, providing convenience and privacy, while giving governments enoughvisibility to avoid fraud and criminal financing? Thats what China seems to be hoping for.

PBOC said as far back as January 2016 that it was exploring a digital national currency, arguing that it would reduce the cost of distributing money, also also help curb financial fraud. It released several working papers, and trialled a blockchain-based trading platform that also supported currency issuance.

Fan Yifei, PBOCs vice-governor, has emphasised the differences between privately issued currencies (like Bitcoin) and other cryptocurrencies issued by central banks. The former is volatile, with limited acceptance, he has said, while sovereign credit backs the latter.

PBOC deputy director Yao Ago last autumn described a digital currency that could be issued by Chinas central bank, but through commercial banks that distribute it to the public. PBOC seems to recognize the need for anonymity, and wants to preserve that through the use of cryptography, but also wants to analyze data at a macroscopic level to understand where its going.

In short, he seems to be saying you can trust us. Bitcoins original ethos, though, was that you didnt have to trust anyone.

Still, tighter currency controls will be more attractive to many countries wanting to understand where the money goes and nowhere more than China, which faces a hefty shadow banking problem.

China isnt the only country to consider a digital version of a national currency. Singapore has been testing one. In the UK, a Bank of England economist at least toyed with the idea. In Canada, which for a while mulled its own digital payment system before selling it, the central bank has suggested that a digital currency would need its guiding hand to be truly successful.

National cryptocurrencies can come from other sources. In Iceland, where the economy suffered more than most during the financial crisis, anonymous cryptocurrency advocates released a cryptocurrency for the nation, called Auroracoin.

The blockchain isnt a necessity for countries considering digitised national currencies, but if used, it does offer at least a shot at privacy. Detail is everything, though, and specialists focused on cryptocurrency and security will be taking a close look.

See the article here:
China mulls national cryptocurrency in race to digital money - Naked Security

Four More Cryptocurrency Exchanges Add ChronoBank’s TIME – Finance Magnates

ChronoBank, a blockchain-based initiative aimed at disrupting the short-term recruitment sector which ended its crowdsale with $5.4 million in funding, has announced thatTIME the Ethereum token representing a stake in ChronoBank has been added to several new exchanges.

Livecoin is an exchange that opened in 2015, registered in London.The exchange evenoffers VISA cards for rapid and easy withdrawal of funds. Currently, the majority of TIMEs volume occurs on Livecoin, as recorded by CoinMarketCap.

Liqui is a fairly new and relatively small exchange, but one that has a thriving community and a dedicated core of traders. Liqui is often quick to add new coins, proving agile where the larger exchanges take their time.

Mercatox is a professional trading platform for digital currencies. Although they focus on bitcoin, they have taken the decision to add TIME as well, judging it to have potential and appeal to their traders.

EtherDelta is a decentralised exchange built on Ethereum. More tech-savvy users will be able to trade peer-to-peer, without any risk of hacking or the failures that come with centralised exchanges.

ChronoBank are actively exploring listings with larger exchanges, and working closely with them to ensure that both compliance and technical requirements can be met, comments ChronoBank CEO Sergei Sergienko. The nature of this is that it can be a relatively drawn-out process, because it needs doing right, though rest assured that we are working as fast as we can from our end.

Here is the original post:
Four More Cryptocurrency Exchanges Add ChronoBank's TIME - Finance Magnates

IOHK founds blockchain lab with Edinburgh University, creates Cryptocurrency Collaborative Research Chair with … – CoinReport

The northern end of Ice House Street, near the junction with Chater Road. Input Output Hong Kong is located at Suites 2001-3, 20th Floor, St. Georges Building 2,Ice House Street, Central Hong Kong

Blockchain research and development company Input Output Hong Kong (IOHK) announced in press releases sent to CoinReport that it, with the University of Edinburgh, has established a Blockchain Technology Laboratory and, with the Tokyo Institute of Technology, created the Input Output Cryptocurrency Collaborative Research Chair.

The lab is located within the Appleton Tower of Edinburgh Universitys School of Informatics, while the chair is located within the Tokyo Institute of Technologys School of Computing.

Blockchain Technology Laboratory

The lab will unite students and academics to work together on blockchain research and development with an emphasis on industry-inspired issues.

IOHK co-founder and CEO Charles Hoskinson said on the occasion, IOHK is delighted to be partnering with the University of Edinburgh, a world-leading institution in information, cognition and computing research and teaching. The partnership will develop IOHKs core business area, cryptocurrencies and blockchain related technologies, and nurture and develop the global talent in these areas in the United Kingdom.

Serving as the headquarters for IOHKs growing network of global university partnerships, the lab is led by Professor Aggelos Kiayias, chair in cyber security and privacy at the University of Edinburgh and chief scientist at IOHK. Prof. Kiayias, as the director of the lab, will organize teamwork with other academics at the university and supervise researchers and students from undergraduate to PhD level in a wide array of topics connected to blockchain systems.

Square in front of the McEwan Hall, University of Edinburgh, on graduation day

Being interdisciplinary in nature, research collaborations will include, beyond cryptography and computer science, business, game theory, law, regulation and compliance and economics. By offering a direct connection between researchers and developers, the lab helps to get projects live faster and aims to pursue outreach projects with businesspersons in the vibrant local technology community of Edinburgh. Outreach and recruiting has already begun. The full facility, however, will be operational from summer

Professor Kiayias said: We are very excited regarding this collaboration on blockchain technology between the School of Informatics and IOHK. Distributed ledgers is an upcoming disruptive technology that can scale information services to a global level. The academic and industry connection forged by this collaboration puts the Blockchain Technology Lab at Edinburgh at the forefront of innovation in blockchain systems.

All funded research and development will be open source and patent-free.

Sir Timothy OShea, the principal of the University of Edinburgh, said, We are delighted to be at the forefront of UK institutions in the field of distributed ledgers and proud to have a dedicated research laboratory for industry inspired research in this important emerging area.

IOHK co-founder Jeremy Wood commented, IOHKs partnership with the University of Edinburgh provides unique opportunities for current students to become the next generation of blockchain and cryptography leaders. As a headquarters for IOHKs international academic research community, we expect to see the university facilitate innovative projects that drive how businesses and governments approach blockchain and cryptocurrencies.

Input Output Cryptocurrency Collaborative Research Chair

The Centennial Hall in okayama campus of Tokyo Institute of Technology, designed by the renowned architect Kazuo Shinohara, professor at Tokodai.

Under the banner of the chair, the Tokyo Institute of Technology and IOHK will, during 2017 and 2018, push joint research in blockchain and digital currencies-related technologies among teams of professors and researchers of the two establishments. Specifically, IOHK researchers will join the institute, while graduate students and professors will take on industry issues in this fast-evolving area of research.

The chair also has the goal of producing young professionals and educating society about blockchains benefits.

Hoskinson said, This collaboration has two main goals: the first is develop our business area, which is cryptocurrencies and blockchain related technologies in the fundamental level. The second is to nurture and develop global talent in these areas in Japan.

The Tokyo Institute of Technology president Yoshinao Mishima commented, This agreement is important because Tokyo Tech is seeking to enhance the collaboration with industries and universities in Japan and abroad by producing groundbreaking results in research and engineering which will be published in internationally renowned scientific journals and conferences.

Researchers of both organizations will produce actionable research through joint activities like production of academic papers and organization of seminars. Another activity is to start offering blockchain technology courses with lectures on the topics of cryptocurrencies and cryptographic protocols, made available to the students of the Tokyo Institute of Technology, pioneering it among educational institutions in Japan.

All research and developments in the labs will be open source and patent-free, with the research findings helping the industry at large.

The formation of the chair is an extension of a six-month collaborative work agreement between IOHK and the Tokyo Institute of Technology. The agreement began on July 1, 2016 and concluded on December 31. Professor Tanaka, who is the chief research for the chair on behalf of the institute, and his team were in contact with IOHK during the period of the agreement, with weekly seminars being conducted and a body of students studying the scientific literature and the latest development of digital currencies. The end result of these activities was a published paper that was presented at the Symposium Cryptography and information Security (SCIS), the national forum in Japan for security research, in January 2017. Another activity presently under way is the Japanese version of the Ouroboros paper, the Proof-of-Stake protocol developed by IOHK.

The chair will, from 2017, improve the founded association with the inclusion of the two IOHK researchers, Dr. Mario Larangeira and Bernardo David, to Prof. Tanaka-managed Tokyo Institute of Technology research team. Both of them will work full-time with the team of Prof. Tanaka at Ookayama campus, the institutes main campus, on daily basis.

The chair will also support graduate students and researchers to attend international conferences.

IOHK is committed to developing industry standards and best practices that progress the field of cryptography. The companys chair, along with the center at the University of Edinburgh, is the first in its growing global network of technology laboratories. IOHK intends to set up more research laboratories, particularly in the United States and Greece, later this year, and has plans for more the following year.

Image credits:

Photo of Ice House Street Ceeseven(CC BY-SA 3.0)

Photo of square in front of McEwan Hall Duncan Grey(CC BY-SA 2.0)

Photo ofThe Centennial Hall in okayama campus Hykw-a4 at Japanese Wikipedia(CC BY-SA 3.0)

More here:
IOHK founds blockchain lab with Edinburgh University, creates Cryptocurrency Collaborative Research Chair with ... - CoinReport

WikiLeaks reveal of CIA hacking trove has feds on mole hunt …

Manning. Snowden. Whose name is next to be added to the notorious list of government leakers?

The CIA is trying to answer that question right now.

A day after WikiLeaks released what it alleged to be the entire hacking capacity of the CIA, the focus Wednesday began shifting to just who gave the stunning surveillance information to the anti-secrecy website.

There is heavy s--- coming down, said a veteran cyber contractor for the intelligence community who previously worked in the breached unit, the CIAs Center for Cyber Intelligence.

WIKILEAKS RELEASES 'ENTIRE HACKING CAPACITY' OF CIA

The contractor told Fox News that CCI has long maintained an internal database of information -- accessible to anyone with proper credentials or security clearance -- that seemed to be dumped in total to WikiLeaks. In its news release on the disclosure, WikiLeaks said CCI had more than 5,000 registered users, a number alternatively referred to as absurd and a bit high by security experts who spoke to Fox News.The CIA declined comment to Fox News.

The FBI opened a federal criminal investigation into the WikiLeaks disclosure on Wednesday, Fox News confirmed. As the probe gets underway,experts said theres a typical incident response playbook they would use to narrow down the massive pool of suspects.

Theyre going to try to do some forensic work because those documents probably have been changed [over time], so that enables them to narrow down the period to when they were taken, said Alex Yampolskiy, the CEO of SecurityScorecard. Once you say this seems like it was a snapshot from this particular time, then they can look at audit logs of who had access to the document during that time frame.

Yampolskiy said analysts would likely target the most sensitive documents that were revealed during their forensic work, as only those with a higher security clearance would have had access to them again, shrinking the group of suspects.

Once a core group is established, investigators would institute behavioral profiling.

Theyll run certain types of analytics what websites did they access? What are the emails? How many people are still working there? Yampolskiy said.

Regardless of the results of the inquiry, Brian Vecci, a technological evangelist for cybersecurity company Varonis, said the secret trove revealed by WikiLeaks illustrates the pervasive issue of another major data breach of a major government organization tasked with security.

Whats clear to me -- and this is true of pretty much every big data breach -- the preventive controls were broken, or the detective controls were broken, Vecci said. Meaning, either too many people had access to the information, or the people that had access werent being recorded and analyzed. Or both.

Last year SecurityScorecard ranked 18 industries by their cybersecurity performance. Information services, construction and food ranked 1, 2 and 3, respectively. Government was dead last.

But there was a twist, Yampolskiy said.

The CIA was specifically one of the top performers in the government, he said. An A letter grade.

Fox News Catherine Herridge and James Rosen contributed to this report.

Original post:
WikiLeaks reveal of CIA hacking trove has feds on mole hunt ...

2016 Democratic National Committee email leak – Wikipedia

The 2016 Democratic National Committee email leak is a collection of Democratic National Committee (DNC) emails leaked to and subsequently published by WikiLeaks on July 22, 2016. This collection included 19,252 emails and 8,034 attachments from the DNC, the governing body of the United States' Democratic Party.[1] The leak includes emails from seven key DNC staff members, and date from January 2015 to May 2016.[2] The leak prompted the resignation of DNC chair Debbie Wasserman Schultz before the Democratic National Convention.[3] After the convention, DNC CEO Amy Dacey, CFO Brad Marshall, and Communications Director Luis Miranda also resigned in the wake of the controversy.[4]

WikiLeaks did not reveal its source; a self-styled hacker going by the moniker Guccifer 2.0 claimed responsibility for the attack. On July 25, 2016, the FBI announced that it would investigate the hack.[5][6][7][8][9][10][11] The same day, the DNC issued a formal apology to Bernie Sanders and his supporters, stating, "On behalf of everyone at the DNC, we want to offer a deep and sincere apology to Senator Sanders, his supporters, and the entire Democratic Party for the inexcusable remarks made over email," and that the emails did not reflect the DNC's "steadfast commitment to neutrality during the nominating process."[12] On November 6, 2016, WikiLeaks released a second batch of DNC emails, adding 8,263 emails to its collection.[13]

On December 9, 2016, the CIA told U.S. legislators that the U.S. Intelligence Community concluded Russia conducted operations during the 2016 U.S. election to prevent Hillary Clinton[14] from winning the presidency.[15] Multiple U.S intelligence agencies concluded people with direct ties to the Kremlin gave WikiLeaks hacked emails from the Democratic National Committee.[15]

The leak revealed information about the DNC's interactions with the media, Hillary Clinton's and Bernie Sanders' campaigns, and financial contributions. It also includes personal information about the donors of the Democratic Party, including credit card and Social Security numbers, which could facilitate identity theft.[16][17]

The emails include DNC staff's "off-the-record" correspondence with media personalities, including the reporters at CNN,[18][19][20]Politico, the Wall Street Journal, and the Washington Post.[21]

In the emails, DNC staffers derided the Sanders campaign.[22]The Washington Post reported: "Many of the most damaging emails suggest the committee was actively trying to undermine Bernie Sanders's presidential campaign. Basically, all of these examples came late in the primaryafter Hillary Clinton was clearly headed for victorybut they belie the national party committee's stated neutrality in the race even at that late stage."[23]

In a May 2016 email chain, the DNC chief financial officer (CFO) Brad Marshall told the DNC chief executive officer, Amy Dacy, that they should have someone from the media ask Sanders if he is an atheist prior to the West Virginia primary.[23][24] In another email, Wasserman Schultz said of Bernie Sanders, "He isn't going to be president."[22]

On May 21, 2016, DNC National Press Secretary Mark Paustenbach sent an email to DNC Spokesman Luis Miranda mentioning a controversy that ensued in December 2015 when the National Data Director of the Sanders campaign and three subordinate staffers accessed the Clinton campaign's voter information on the NGP VAN database.[25] (The party accused Sanders' campaign of impropriety and briefly limited their access to the database. The Sanders campaign filed suit for breach of contract against the DNC; they dropped the suit on April 29, 2016.)[24][26][27] Paustenbach suggested that the incident could be used to promote a "narrative for a story, which is that Bernie never had his act together, that his campaign was a mess." (The suggestion was rejected by the DNC.) [23][24]The Washington Post wrote: "Paustenbach's suggestion, in that way, could be read as a defense of the committee rather than pushing negative information about Sanders. But this is still the committee pushing negative information about one of its candidates."[23]

In the aftermath of the Nevada Democratic convention, Debbie Wasserman Schultz wrote about Jeff Weaver, manager of Bernie Sanders' campaign: "Damn liar. Particularly scummy that he barely acknowledges the violent and threatening behavior that occurred".[28][29][30]

In May 2016, MSNBC's Mika Brzezinski called on Debbie Wasserman Schultz to step down over the DNC's bias against the Bernie Sanders campaign.[31][32] Schultz was upset at the negative coverage of her actions in the media, and she emailed Chuck Todd that such coverage of her "must stop".[33][34] Describing the coverage as the "LAST straw", she ordered the DNC's communications director to call MSNBC president Phil Griffin to demand an apology from Brzezinski.[35][36]

The New York Times wrote that the cache included "thousands of emails exchanged by Democratic officials and party fund-raisers, revealing in rarely seen detail the elaborate, ingratiating and often bluntly transactional exchanges necessary to harvest hundreds of millions of dollars from the partys wealthy donor class. The emails capture a world where seating charts are arranged with dollar totals in mind, where a White House celebration of gay pride is a thinly disguised occasion for rewarding wealthy donors and where physical proximity to the president is the most precious of currencies."[37] As is common in national politics, large party donors "were the subject of entire dossiers, as fund-raisers tried to gauge their interests, annoyances and passions."[37]

In a series of email exchanges in April and May 2016, DNC fundraising staff discussed and compiled a list of people (mainly donors) who might be appointed to federal boards and commissions.[38]Center for Responsive Politics senior fellow Bob Biersack noted that this is a longstanding practice in the United States: "Big donors have always risen to the top of lists for appointment to plum ambassadorships and other boards and commissions around the federal landscape."[38] The White House denied that financial support for the party was connected to board appointments, saying: "Being a donor does not get you a role in this administration, nor does it preclude you from getting one. Weve said this for many years now and there's nothing in the emails that have been released that contradicts that."[38]

A self-styled hacker going by the moniker "Guccifer 2.0" claimed to be the source of the leaks;[39][40] WikiLeaks did not reveal its source.[21]Cybersecurity experts and firms, including CrowdStrike, Fidelis Cybersecurity, Mandiant, SecureWorks, and ThreatConnect, and the editor for Ars Technica, stated the leak was part of a series of cyberattacks on the DNC committed by two Russian intelligence groups.[41][42][43][44][45][46]U.S. intelligence agencies also stated (with "high confidence"[47]) that the Russian government was behind the theft of emails and documents from the DNC, according to reports in the New York Times and the Washington Post.[47][48][49][50][51]

WikiLeaks founder Julian Assange initially stuck to WikiLeaks policy of neither confirming or denying sources but in January 2017 said that their "source is not the Russian government and it is not a state party",[52][53] and the Russian government said it had no involvement.[54]

On October 7, 2016, the United States Department of Homeland Security and the Office of the Director of National Intelligence stated that the US intelligence community was confident that the Russian government directed the breaches and the release of the obtained or allegedly obtained material in an attempt to " interfere with the US election process."[55][56][57]

The U.S. Intelligence Community tasked resources debating why Putin chose summer 2016 to escalate active measures influencing U.S. politics.[58]Director of National Intelligence James R. Clapper said after the 201113 Russian protests, Putin's confidence in his viability as a politician was damaged, and Putin responded with the propaganda operation.[58] Former CIA officer Patrick Skinner explained the goal was to spread uncertainty.[59] U.S. Congressman Adam Schiff, Ranking Member of the House Permanent Select Committee on Intelligence, commented on Putin's aims, and said U.S. intelligence agencies were concerned with Russian propaganda.[58] Speaking about disinformation that appeared in Hungary, Slovakia, the Czech Republic, and Poland, Schiff said there was an increase of the same behavior in the U.S.[58] Schiff concluded Russian propaganda operations would continue against the U.S. after the election.[58]

On December 9, 2016, the CIA told U.S. legislators the U.S. Intelligence Community concluded Russia conducted operations during the 2016 U.S. election to assist Donald Trump in winning the presidency.[15][60][61] Multiple U.S intelligence agencies concluded people with direct ties to the Kremlin gave WikiLeaks hacked emails from the DNC and additional sources such as John Podesta, campaign chairman for Hillary Clinton.[15] These[citation needed] intelligence organizations additionally concluded Russia attempted to hack the Republican National Committee (RNC) as well as the DNC but were prevented by security defenses on the RNC network.[62][63]

The CIA said the foreign intelligence agents were Russian operatives previously known to the U.S.[15] CIA officials told U.S. Senators it was "quite clear" Russia's intentions were to help Trump.[60] Trump released a statement December 9, and disregarded the CIA conclusions.[15]

On July 18, 2016, Russian press secretary Dmitry Peskov stated that the Russian government had no involvement in the DNC hacking incident.[64] Peskov called it "paranoid" and "absurd",[65] saying: "We are again seeing these maniacal attempts to exploit the Russian theme in the US election campaign."[66] That position was later reiterated by the Russian Embassy in Washington, DC, which called the allegation "entirely unrealistic".[67]

On July 24, 2016, Sanders urged Wasserman Schultz to resign following the leak and stated that he was "disappointed" by the leak, but that he was "not shocked."[45][68] Jeff Weaver, Bernie Sanders' campaign manager, called for greater accountability in the DNC, calling Wasserman Schultz "a figure of disunity" within the Democratic Party.[69][70] Later the same day, Wasserman Schultz resigned from her position as DNC Chairman, effective as of the end of the nominating convention.[71] After Wasserman Schultz resigned, Sanders said that she had "made the right decision for the future of the Democratic Party."[72] On the following day, the DNC apologized to Bernie Sanders, his supporters, and the Democratic Party for "inexcusable remarks made over email." [73] On July 24, 2016, in an interview with NPR, former DNC Chair and current Governor of Virginia Terry McAuliffe said "... that the chair's job should be "to remain neutral." "I sat in that chair in 2004 trying to navigate all the different candidates we had. But if you had people in there who were trashing one of the candidates, I can tell you this, if I were still chairman they wouldn't be working there. I mean, that is just totally unacceptable behavior."[74]

On July 25, 2016, Anthony Zurcher, North America reporter for the BBC, commented that "the revelation that those in the heart of the Democratic establishment sought to undermine the anti-establishment Sanders is roughly on a par with [Casablanca character] police Capt Renault's professed shock that gambling was taking place in the Casablanca club he was raiding, as a waiter hands him his winnings."[75]

On July 25, 2016, Republican National Committee chairman Reince Priebus said that "Today's events show really what an uphill climb the Democrats are facing this week in unifying their party. Starting out the week by losing your party chairman over longstanding bitterness between factions is no way to keep something together." [76]

On October 14, 2016, NBC News reported that multiple sources were telling them that Barack Obama had ordered the CIA to present him with options for a retaliatory cyber attack against the Russian Federation for allegedly interfering in the US presidential election. Sources said that this is not the first time the CIA has presented such options to a president, but that on all previous occasions the decision was made not to carry out the proposed attacks.[77]

The New York Times reported that Julian Assange stated in an interview on British ITV on June 12, 2016, that he hoped that the publication of the emails would "...harm Hillary Clinton's chances to win the presidency" and that he had timed the release to coincide with the 2016 Democratic National Convention.[47][78] In an interview with CNN, Assange would neither confirm nor deny who WikiLeaks' sources were; he claimed that his website "...might release "a lot more material" relevant to the US electoral campaign..." [79]

Following the publication of the stolen emails, NSA whistleblower Edward Snowden criticized WikiLeaks for its wholesale leakage of data, writing that "their hostility to even modest curation is a mistake."[17] The Washington Post contrasted the difference between WikiLeaks' practices and Snowden's disclosure of information about NSA: while Snowden worked with journalists to vet documents (withholding some where it would endanger national security), WikiLeaks' "more radical" approach involves the dumping of "massive, searchable caches online with fewif anyapparent efforts to remove sensitive personal information."[17]

On July 25, 2016, Anne Applebaum, columnist for the Washington Post, writes that "with the exception of a few people on Twitter and a handful of print journalists, most of those covering this story, especially on television, are not interested in the nature of the hackers, and they are not asking why the Russians apparently chose to pass the emails on to WikiLeaks at this particular moment, on the eve of the Democratic National Convention. They are focusing instead on the content of what were meant to be private emails..." She goes on to describe in detail other Russian destabilization campaigns in Eastern European countries.[80]

On July 25, 2016, Thomas Rid, Professor in Security Studies at Kings College, London, and non-resident fellow at the School for Advanced International Studies, Johns Hopkins University, in Washington, DC, summed up the evidence pointing to Russia being behind the hacking of the DNC files and the "Guccifer-branded leaking operation". He concludes that these actions successfully blunted the "DNC's ability to use its opposition research in surprise against Trump...". [43] He further writes that data exfiltration from political organizations is done by many countries and is considered to be a legitimate form of intelligence work. "But digitally exfiltrating and then publishing possibly manipulated documents disguised as freewheeling hacktivism is crossing a big red line and setting a dangerous precedent: an authoritarian country directly yet covertly trying to sabotage an American election."[43]

Russian security expert and investigative journalist Andrei Soldatov said "It is almost impossible to know for sure whether or not Russia is behind a hack of the DNC's servers". According to him, one of the reasons Russia would try to sway the US presidential election is that the Russian government considers Clinton "a hater of Russia": "There is this mentality in Russia of being besieged; that it is always under attack from the United States. ...They are trying to interfere in our internal affairs so why not try to do the same thing to them?"[81]

Originally posted here:
2016 Democratic National Committee email leak - Wikipedia

WikiLeaks Will Help Tech Companies Fix Security Flaws, Assange Says – New York Times


New York Times
WikiLeaks Will Help Tech Companies Fix Security Flaws, Assange Says
New York Times
The founder of WikiLeaks, Julian Assange, said the Central Intelligence Agency lost control of a large arsenal of cyberwarfare tools and then covered up that the material was not secured. He said WikiLeaks is working with companies like Apple and ...
Julian Assange Says WikiLeaks Will Share CIA Code With Tech CompaniesNPR
Julian Assange Says WikiLeaks May Release More CIA Hacking ToolsNBCNews.com
WikiLeaks pledges to release software code of CIA hacking tools to tech firmsWashington Post
Financial Times -Los Angeles Times -CNNMoney -WIKILEAKS
all 2,395 news articles »

Read the rest here:
WikiLeaks Will Help Tech Companies Fix Security Flaws, Assange Says - New York Times

WikiLeaks has joined the Trump administration – Chicago Tribune

As a presidential candidate, Donald Trump declared, "I love WikiLeaks!" And he had good reason to display affection to this website run by accused rapist Julian Assange. By releasing reams of emails stolen from the Democratic National Committee and Hillary Clinton campaign chairman John Podesta, WikiLeaks helped tilt the 2016 election in Trump's favor.

As president, Trump hasn't come out and said anything laudatory about WikiLeaks following its massive disclosure of CIA secrets on Tuesday - a treasure trove that some experts already believe may be more damaging than Edward Snowden's revelations. But Trump hasn't condemned WikiLeaks. The recent entries on his Twitter feed - a pure reflection of his unbridled id - contain vicious attacks on, among other things, Arnold Schwarzenegger, the New York Times, and Barack Obama but not a word about WikiLeaks. Did the president not notice that the intelligence community he commands has just suffered a devastating breach of security? Or did he simply not feel compelled to comment?

Actually there is a third, even more discomfiting, possibility: Perhaps Trump is staying silent because he stands to benefit from WikiLeaks' latest revelations.

On Saturday, recall, Trump was making wild-eyed accusations that Obama had ordered the U.S. intelligence community to wiretap him. "How low has President Obama gone to tapp (sic) my phones during the very sacred election process. This is Nixon/Watergate. Bad (or sick) guy!" The White House could not come up with one iota of evidence to support this irresponsible allegation, which was denied by FBI Director James Comey and former Director of National Intelligence James Clapper. But Trump would not be dissuaded from pursuing this charge, which serves as a convenient distraction from the far more serious accusations of possible collusion between the Trump campaign and the Kremlin while Russia was interfering with the presidential campaign.

Is it just a coincidence that WikiLeaks dumped a massive database pertaining to CIA hacking and wiretapping just three days after Trump made wiretapping a major political issue? Perhaps so. But there is cause for suspicion.

In the first place, WikiLeaks has often timed its leaks for maximum political impact. It released 20,000 stolen DNC emails just three days before the Democratic National Convention on July 25, 2016. As expected, WikiLeaks generated headlines about DNC staffers disparaging Sen. Bernie Sanders, buttressing a Trump campaign effort to prevent Clinton from consolidating Sanders supporters. DNC Chairwoman Debbie Wasserman Schultz resigned as a result, and the Clinton campaign suffered significant public relations damage.

In the second place, WikiLeaks, which has often leaked American but never Russian secrets, has been identified by the U.S. intelligence community as a front for Russian intelligence. In January, the Office of the Director of National Intelligence released a declassified estimate that found "with high confidence that Russian military intelligence relayed material to WikiLeaks." This was done with a definite purpose: "Putin and the Russian Government aspired to help President-elect Trump's election chances when possible by discrediting Secretary Clinton and publicly contrasting her unfavorably to him."

Trump has consistently resisted the intelligence agency's conclusions, insisting that some 400-pound coach potato might have committed the hacking before grudgingly accepting the findings but continuing to claim that the Russian hack had no impact on the election. (Given that 70,000 votes in three states were his margin of victory, how does he know what affected the outcome and what didn't? And if WikiLeaks was so inconsequential, why did he tout its revelations in almost every appearance during the last month of the campaign?)

The intelligence community's finding that Putin helped him win the election spurred Trump to pursue a vendetta against it. For example, he accused the spooks - with no support - of being behind BuzzFeed's publication of a damning dossier compiled by a former British intelligence officer claiming that the Kremlin had compiled compromising materials on him. Trump outrageously tweeted: "Intelligence agencies should never have allowed this fake news to 'leak' into the public. One last shot at me. Are we living in Nazi Germany?" His animus against the intelligence agencies has continued down to his more recent accusations that they allowed themselves to be used by Obama to wiretap him. The consistent (if hardly believable) storyline from Trump is that he has no connections to Russia, and that he is a victim of the nefarious machinations of the American "deep state."

It is significant, therefore, that one of the major storylines to emerge from the latest WikiLeaks release is that the CIA supposedly has a program to reuse computer codes from foreign hackers, thus disguising CIA fingerprints on a hacking operation. Never mind that there is no evidence that the codes used to break into the DNC were part of this CIA database. Right-wing outlets are nevertheless trumpeting these revelations with headlines such as this one on Breitbart: "WikiLeaks: CIA Uses 'Stolen' Malware to 'Attribute' Cyberattacks to Nations Like Russia." Russian-controlled Internet "bots" are also said to be playing up these claims online.

The implication is clear. Trump was a victim of a "false flag" operation wherein CIA hackers broke into the DNC and blamed the Russians. This may be nutty, but it's eminently believable to an audience conditioned to believe that 9/11 was an inside job and that the Sandy Hook massacre was staged - favorite tropes of the radio talk-show host Alex Jones, whose work Trump has praised. Other WikiLeaks revelations - for instance, that the CIA can use Samsung smart TVs as listening devices - lend further credence to Trump's charge that he was secretly wiretapped.

Quite apart from its specifics, the WikiLeaks release changes the subject after a bad few days for Trump highlighted by Attorney General Jeff Sessions's decision to recuse himself from any Kremlingate probe after he was revealed to have lied under oath when he denied meeting any Russian representatives. Last week it was Trump on the defensive. Now it's his nemeses in the U.S. intelligence community who are answering embarrassing questions about how this leak could have occurred and the contents of the leaked information.

Again, maybe this is entirely coincidental, but WikiLeaks' history of being used by Russian intelligence to support Trump should lead to much greater scrutiny not only of who leaked this information - is there a mole in the CIA? - but why it was released now. Even if there is no active collusion between the White House and the Kremlin, the extent to which their agendas coincide is striking. Both Putin and Trump want to discredit the U.S. intelligence community because they see it as an obstacle to their power.

---

Boot is the Jeane J. Kirkpatrick senior fellow for national security studies at the Council on Foreign Relations.

Excerpt from:
WikiLeaks has joined the Trump administration - Chicago Tribune