{"id":31677,"date":"2017-03-12T06:41:59","date_gmt":"2017-03-12T10:41:59","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/fbi-prepares-for-new-hunt-for-wikileaks-source-washington-post.php"},"modified":"2017-03-12T06:41:59","modified_gmt":"2017-03-12T10:41:59","slug":"fbi-prepares-for-new-hunt-for-wikileaks-source-washington-post","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/bradley-manning\/fbi-prepares-for-new-hunt-for-wikileaks-source-washington-post.php","title":{"rendered":"FBI prepares for new hunt for WikiLeaks&#8217; source &#8211; Washington Post"},"content":{"rendered":"<p><p>    The FBI has begun preparing for a major mole hunt to determine    how anti-secrecy group WikiLeaks got an alleged arsenal of    hacking tools the CIA has used to spy on espionage targets,    according to people familiar with the matter.  <\/p>\n<p>    The leak rattled government and technology industry officials,    who spent Tuesday scrambling to determine the accuracy and    scope of the thousands of documents released by the group. They    were also trying to assess the damage the revelations may    cause, and what damage may come from future releases promised    by WikiLeaks, these people said.  <\/p>\n<p>    It was all a familiar scenario for a government that has    repeatedly seen sensitive information compromised in recent    years.  <\/p>\n<p>    In the wake of revelations from Army private Chelsea Manning    and former National Security Agency contractor Edward Snowden,    officials sought to tighten security procedures, and federal    agents came under greater pressure to find and prevent secrets    from spilling out of the government.  <\/p>\n<p>    But cracks keep appearing in the system. Last year, the FBI    arrested Harold T. Martin III, an NSA contractor who took home    documents detailing some of the agencys most sensitive    offensive cyberweapons. Some of those files later appeared    online, although investigators are still trying to determine    Martins role, if any, in that part of the case.  <\/p>\n<p>      (Dalton Bennett,Greg Miller\/The      Washington Post)    <\/p>\n<p>    He has pleaded not guilty to charges that he violated the    Espionage Act. Officials call the Martin case the largest theft    of classified information in U.S. history.  <\/p>\n<p>    Now, less than a year after the Martin case, U.S. intelligence    agencies are rushing to determine whether they again have    suffered an embarrassing compromise at the hands of one of    their own.  <\/p>\n<p>    Anybody who thinks that the Manning and Snowden problems were    one-offs is just dead wrong, said Joel Brenner, former head    of U.S. counterintelligence at the office of the Director of    National Intelligence. Ben Franklin said three people can keep    a secret if two of them are dead. If secrets are shared on    systems in which thousands of people have access to them, that    may really not be a secret anymore. This problem is not going    away, and its a condition of our existence.  <\/p>\n<p>    In Silicon Valley, industry figures said they received no    heads-up from the government or the hacking community that such    a move by WikiLeaks was in the works. By midday Tuesday,    industry officials said they still had not heard from the FBI.  <\/p>\n<p>    It wasnt immediately clear if the CIA had sent a crimes report    to the Justice Department  a formal mechanism alerting law    enforcement of a potentially damaging and illegal national    security leak. Such a report would offer the FBI a road map for    where to begin investigating, and whom to question.  <\/p>\n<p>    The FBI and CIA both declined to comment.  <\/p>\n<p>    Once investigators verify the accuracy of the WikiLeaks    documents, a key question to answer is who had access to the    information, according to veterans of past leak probes. The FBI    has spent years investigating WikiLeaks, and authorities are    eager to figure out whether it has recruited a new, well-placed    source from the U.S. government.  <\/p>\n<p>    In releasing thousands of pages of documents, WikiLeaks    indicated that its source was a former government employee or    contractor.  <\/p>\n<p>    This extraordinary collection, which amounts to more than    several hundred million lines of code, gives its possessor the    entire hacking capacity of the CIA, WikiLeaks said in    announcing the first release of documents. The archive appears    to have been circulated among former U.S. government hackers    and contractors in an unauthorized manner, one of whom has    provided WikiLeaks with portions of the archive.  <\/p>\n<p>    One former intelligence official said if that claim is    accurate, theres going to be another major mole hunt ... If    this is all correct, its a big deal.  <\/p>\n<p>    A key distinction for investigators will be whether WikiLeaks    reveals the actual computer code  or enough details about such    code  that others can develop and deploy some of the hacking    tools, according to current and former officials.  <\/p>\n<p>    The security failures highlighted by damaging leaks from    Snowden and Manning have proven difficult to address.  <\/p>\n<p>    Manning was arrested in Iraq in May 2010 after transmitting    documents to WikiLeaks that came to be known as the Iraq and    Afghanistan War Logs. She also leaked a video showing a U.S.    Apache helicopter in Baghdad opening fire on a group of people    that the crew thought were insurgents. Among the dead were two    journalists who worked for Reuters. She also leaked documents    pertaining to Guantanamo Bay prisoners, as well as 250,000    State Department cables.  <\/p>\n<p>    In response to the Manning case, the Obama administration    created the National Insider Threat Task Force, designed to    teach and train government workers and contractors to spot    potential leakers.  <\/p>\n<p>    Manning, formerly known as Bradley Manning, came out as    transgender after her 2013 conviction. In the waning days of    his presidency, Barack Obama commuted her 35-year prison    sentence, and she is due to be released in coming months.  <\/p>\n<p>    The post-Manning efforts did not stop Snowden from taking reams    of data about sensitive bulk intelligence collection in 2013    and giving the material to reporters. Those revelations,    including a court document showing how the government gathered    Americans phone records, sparked years of political debate    about privacy and government surveillance in the digital age.  <\/p>\n<p>    Snowden has remained out of reach of the U.S. government,    living in Russia.  <\/p>\n<p>    Brenner, the former counterintelligence official, said the net    effect of the new leaks could be very dangerous to us, because    they accelerate the leveling of the playing field between the    United States and its adversaries in cyberspace.  <\/p>\n<p>    The bigger lesson of the newest leak, Brenner argued, is that    U.S. pursuit of dominance in cyberspace may actually be    destabilizing over the long run. That is a very unsettling    debate for our military and our intelligence services, but I    think its coming, he said.  <\/p>\n<p>    Snowden also weighed in regarding the alleged CIA documents,    tweeting: What @Wikileaks has here is genuinely a big deal.    Looks authentic.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See original here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/fbi-prepares-for-new-hunt-for-wikileaks-source\/2017\/03\/07\/28dcb9e0-0356-11e7-ad5b-d22680e18d10_story.html\" title=\"FBI prepares for new hunt for WikiLeaks' source - Washington Post\">FBI prepares for new hunt for WikiLeaks' source - Washington Post<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The FBI has begun preparing for a major mole hunt to determine how anti-secrecy group WikiLeaks got an alleged arsenal of hacking tools the CIA has used to spy on espionage targets, according to people familiar with the matter. The leak rattled government and technology industry officials, who spent Tuesday scrambling to determine the accuracy and scope of the thousands of documents released by the group<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[48],"tags":[],"class_list":["post-31677","post","type-post","status-publish","format-standard","hentry","category-bradley-manning"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31677"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=31677"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31677\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=31677"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=31677"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=31677"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}