Connect with us

Technology

The Trump campaign hacking scandal and leak resembles a repeat of 2016. This time, the media is reacting differently

Published

on

Trump campaign hack-and-leak appears like a rerun of 2016. This time, media outlets are responding differently

This weekend Politico dropped an information bomb:An individual using only the name “Robert” provided the editorial staff with documents allegedly stolen from Donald Trump’s presidential campaign.

Since then now we have learned that New York Times AND The Washington Post I also heard from the same person and received several stolen documents. The document dump has the characteristics of a hack and leak operation, which usually involves malicious hackers stealing confidential information and strategically revealing it to harm the goal of the hack. The FBI said it was investigating the hack. Trump himself he accused Iran’s government about the breach. Longtime Trump confidante Roger Stone said his email account was breached, which likely began the whole operation, based on anonymous people who spoke to The Washington Post.

If this all sounds familiar, it’s because a nearly similar hack-and-leak operation before the US election happened before and will inevitably occur again. It’s value going back in time to the previous hack-and-leak operation to spotlight what we learned then and how those lessons apply now.

Advertisement

In the summer of 2016, a hacker who introduced himself as Guccifer 2.0 and described himself as a Romanian “hacker, manager, philosopher (and) woman lover” claimed to be behind the Democratic National Committee break-in. This got here as a surprise, as cybersecurity firm CrowdStrike he accused Russian intelligence agency behind the hack. In an ironic twist, Roger Stone, meanwhile, publicly disclosed was involved with Guccifer 2.0 and joined the hacker’s claims that he was attacking Democrats.

But because it turned out, after I began asking Guccifer 2.0 some specific questions in 2016, their mask quickly began to fallTwo years later, the FBI confirmed that Guccifer 2.0 was not the only Romanian hacker, but a person controlled by two agents working for the Russian military intelligence unit, the Main Intelligence Directorate or GRU. While I I pat myself on the backI also wish to be clear that in some ways it was easier for me to deal with Guccifer 2.0, his identity, and his motivations, than on the leaked documents, just because I used to be (and still am) a reporter covering cybersecurity moderately than politics.

At this point, and on this latest case, it’s unclear who “Robert” really is. However, early signs point to a repeat of the Guccifer 2.0 situation.

The day before the Politico report on the attack on Trump was published, Microsoft it was revealed that a hacking group supported by the Iranian government “sent a spear-phishing email in June to a high-ranking presidential campaign official from the compromised email account of a former senior adviser.” Microsoft didn’t say what the campaign was or name the “former senior adviser” who was targeted, but sources later said, The Washington Post AND Political that the FBI has been investigating the hacking of the Trump campaign since June.

Advertisement

IN latest report on wednesdayGoogle’s Threat Analysis Group, which studies hackers and government-backed threats, agreed with most of Microsoft’s assessment. Google said it had evidence that Iran-backed hackers were behind attacks on the personal email accounts of about a dozen people related to President Biden and former President Trump back in May.

To summarize: It appears that Iranian government hackers could have hacked Stone, used his email address to then goal and infiltrate the Trump campaign, stolen certain documents (to this point, we only learn about files related to the vetting process for Republican vice presidential candidate J.D. Vance), and finally used someone named Robert to contact reporters in the hopes that they’d look into the leaked documents.

Contact us

Do you may have more details about the Trump campaign hack? Or other politically motivated hacks? From a non-work device, you’ll be able to safely contact Lorenzo Franceschi-Bicchierai on Signal at +1 917 257 1382 or on Telegram and Keybase @lorenzofb or email. You can even contact TechCrunch via SecureDrop.

The difference from what happened in 2016 is how the media is presenting the whole story.

Advertisement

During this time, countless media outlets acquired Guccifer 2.0’s documents, and later also the stolen ones. from Hillary Clinton’s then campaign manager, John Podesta — and published stories that essentially reinforced the message the Russian government wanted the American public to deal with, namely allegations of corruption and abuse. Kathleen Hall Jamieson, a professor at the University of Pennsylvania who wrote a 2016 book about the hacking campaigns, he told the Associated Press this week it was found that the media had distorted some of the leaks in 2016 in a way that hurt Clinton greater than it must have.

This time, initial coverage of the Trump campaign hack and leak focused on the hack and leak itself, moderately than what was leaked, a undeniable fact that disinformation experts have praised.

“Politico and (its reporter) Alex Isenstadt deserve a lot of credit for turning this story into a story about a (weak, it seems) foreign disinformation effort, rather than reporting on leaked Trump campaign documents themselves.” Thomas Rid saidprofessor at Johns Hopkins and someone who closely monitored 2016 Russian hacking and disinformation campaign

It is essential to notice that this might all change, perhaps if or when “Robert” decides to disclose something that the media deems more newsworthy. It is also essential to keep in mind that as my former colleague Joseph Cox said written a few years agowere many matters hackers leaky information that was in the public interest. The data from these hacks and leaks deserved to be discussed and reported. That could also be true this time, too.

Advertisement

Regardless, it is essential for journalists to offer the full context of hacking and leak operations, whether or not they are carried out by hackers working for governments attempting to undermine elections or specific presidential candidates, or by hacktivists with well-intentioned intentions.

When Politico asked the hacker how he obtained the documents, Robert supposedly said: “I suggest you do not inquire where I got them from. Any answer to that question will compromise me and also legally prevent you from publishing them.”

Perhaps Robert himself knows that this time the journalists have drawn conclusions.

Advertisement
This article was originally published on : techcrunch.com

Technology

The signal is the number one application in the Netherlands. But why?

Published

on

By

Signal

The application signal for sending a privacy -oriented message flew high in Dutch application stores last month, often sitting at the top as the most steadily downloaded free application for iOS and Android in all categories, for data from many application tracking platforms akin to the sensor tower.

The application has experienced popularity over the years, often in response to Changes in politics in rivals akin to WhatsApp Or Geopolitical events. This is because Signal has set a reputation as a more friendly privacy option-it is served by the non-profit foundation (though based in the USA), not a personal company focused on data earning data. In addition, the signal tracks minimal metadata.

In 2025, along with the recent US president, who strengthened the warm Big Tech hug, it is not surprising that digital privacy tools have a moment – especially in Europe, which attracted the anger of President Trump.

Advertisement

But this time, the meaning of the signal in one very specific place-Holandia is particularly eye-catching.

Signal data from the sensor towerImage loans:Sensor tower / screenshot

IN Interview with Dutch newspaper de Telelegraaf last week, President signal Meredith Whittaker He noticed that the number of “new registrations” in the Netherlands was 25 this 12 months, even though it is not clear what the exact comparative period for this data is.

Asked why the Netherlands recorded such development, Whittaker pointed to the combination of things: “growing awareness of privacy, distrust of large technology and political reality in which people realize how sensitive digital communication can be,” said Whittaker.

Data provided to TechCrunch from the application intelligence company Appfigures Increase in Signal Signal in the Netherlands. According to its data, the signal was 365. Among the applications apart from the iPhone in the Netherlands on January 1 and didn’t appear on the list of the most significant general applications. Then, from around January 5, he began to climb the rankings, reaching the highest position until February 2.

Advertisement

The signal immersed and comes out of the lead during weeks, spending around mid -February at the top – including every single day from February 22. By digging deeper into the data, the AppFigures estimates that the total download in Apple and Google Applets in total in December 2024 jumped to 99,000 in January and increased to 233,000 to February – 958%.

While a part of this height could be assigned to a lower saturation signal than other markets, a continuing application position at the top in comparison with neighboring markets of comparable size.

“No other markets are approaching the Netherlands in terms of growth between December and February,” said AppFigures Techcrunch.

For comparison, from December in Belgium, download increased by over 250%, Sweden by 153%and dishes by 95%.

Advertisement

So why the signal can experience what one redditor called “The moment of mass adoption“In the Netherlands?

Clear signal

Give ZengerSenior Policy Advisor at Dutch Digital Rights Foundation Fragments of freedomHe said that even though it is difficult to point one specific reason, he is not surprised.

The last changes in the US have seen Large platform suppliers Adapt with the recent Trump administration, and this has retained a major public and media debate. Relying Europe from the technology of big private American corporations has turn out to be the point of interest of this debate.

“The Dutch are, like many others, very dependent on the infrastructure provided by extremely dominant technology companies, mainly from the USA,” said Zenger. “What does this mean, and the risk that results from it has been nicely demonstrated in the last few weeks. As a result, the public debate in the Netherlands was relatively sharp. Where in the past this problem was discussed only at the level “:” I feel that we are now conducting a debate at the higher levels: “.

Advertisement

In this context, society can mix dominance with data protection abuse. Since corporations akin to meta are frequently studied and fined in the field of information privacy practices, the signal could appear to be less evil: it is based on the US, but supported by a non-profit organization, which ensures encryption of each the content of the message and around it.

Vincent BöhreDirector of the Dutch Organization of Privacy Privacy firstHe also pointed to increased media relationships and a wider change of public opinion.

“Since a few months ago he was re-elected in the United States, in the Dutch-and European media, which seem to support Trump, there were many” Elon) Muska. “Articles criticizing X (previously Twitter) and Meta appear everywhere in the Dutch media, which leads to a change in Dutch public opinion: even people who have never really known or cared for privacy and security in social media, suddenly became interested in” friendly privacy “alternative, in particular the signal.”

Signal of intentions

President of the application for sending a signal message Meredith Whittaker.
President Signa Meredith Whittaker on Web Summit, in Lisbon on November 4, 2022.Image loans:Patricia de Melo Moreira / AFP / Getty Images

While the Netherlands is only one market of 18 million people in the European population over 700 million, its increase in adoption can signal a wider trend throughout the continent, especially when governments try to cut back privacy barriers.

For example, Apple has recently pulled out comprehensive encryption from iCloud in Great Britain to counteract government efforts to put in a backdoor.

Advertisement

Speech Fr. Rightcon 25 In Taiwan, this week, Whittaker confirmed the unwavering Signal attitude regarding privacy.

“Signal position on this subject is very clear- we will not walk, falsify or otherwise disturb the solid guarantees of privacy and security that people rely on” Said Whittaker. “Regardless of whether this disturbance or backdoor is called scanning on the client’s side or removing the protection of encryption against one or the other, the features similar to what Apple has been forced to do in Great Britain”

Separately, in Interview with Swedish public broadcaster, Whittaker said that Signal wouldn’t follow the proposed Swedish law requiring application to send messages for storage.

“In practice, this means asking us to break encryption, which is the basis of our entire activity,” said Whittaker. “Asking us to store data would undermine all our architecture and we would never do it. We would prefer to completely leave the Swedish market. “

Advertisement

TechCrunch contacted to signal a comment, but he didn’t hear during the publication.

(Tagstotranslat) signal of the Netherlands

This article was originally published on : techcrunch.com
Continue Reading

Technology

Gayle King announces participation in the space mission of all women

Published

on

By

Gayle King, CBS News, new deal, morning show

Gayle King will join the thirty first Blue Origin civil flight into space.


Gayle King announced that he was going to space. The host of the talk show during the day provided messages CBS MORNINGS.

King revealed Her participation in the thirty first Blue Origin flights, NS-31. Before discussing the details of the mission, she and her co -lecturers presented the video editing, which described her long -term fascination with travel travel.

Advertisement

In one clip, King said: “I am excited to watch the premiere at home in my pajamas.”

Her enthusiasm led to an invite with Blue Origin. The television personality will disappear from Crew from the whole familyIncluding an award -winning journalist Lauren Sánchez, award -winning Grammy singer Katy Perry and astronaut Aish Bowe.

Soon the explorer of the space admitted that she was hesitating at first.

“I don’t know how to explain at the same time terrified and excited,” said King.

Advertisement

To make a choice, King turned to a gaggle of family members, including her children and a detailed friend, Oprah Winfrey. She said that when her most trusted confidants approved, she was ready.

“When Kirby, Will and Oprah were fine, I was fine,” said King. “I thought Oprah would say no. She said: “I feel that when you don’t do it, if you all come back and also you had the opportunity to do it, you’ll kick.” She is right. “

King is not going to be the first television host who wandered into space with blue origin. In 2021, then-Good morning America Coheat Michael Strahan took part in the third civil flight Blue Origin. The former NFL star and the sender was delighted after returning, expressing how this experience gave him a brand new “perspective” in the world.

“I want to come back,” said Strahan.

Advertisement

Blue origin, Founded by Amazon Billionaire Jeff Bezos in 2000 is a non-public aviation company that focuses on sharing space travels for civilians and developing technology to explore the space long.

The upcoming flight of the king New Shepard It will probably be part of Blue Origin’s constant efforts to normalize civil space travel.


Advertisement
This article was originally published on : www.blackenterprise.com
Continue Reading

Technology

Instagram can turn the rollers in a separate application

Published

on

By

Instagram

Meta is occupied with an independent application for brief movies, Information He informed, citing an anonymous source, which he heard the boss on Instagram Adam Mosseri talked about the personnel project.

The project is reportedly called RAY code, which goals to enhance recommendations for brand new users and existing users in the US and to conclude one other three minutes of movies, the report quoted the source.

The finish line didn’t answer immediately at the request for comment.

Advertisement

Last month, the company announced a video editing application called Edyta to compete with Capcut (belonging to Tiktok Matter Company Bytedance) since it was geared toward using the uncertain future Tiktok and Bytedance in the USA

Currently, the Instagram channel is a mixture of photos, movies (drums) and stories. However, many users imagine that the application has been cluttered since it incorporates movies and not persist with the roots as an application for sharing photos. If the company rotates in an independent application for brief movies, it can create a possibility for Instagram to emphasise other functions.

Instagram began at the starting of this yr paying creators To promote Instagram on other platforms, resembling Tiktok, Snapchat and YouTube. Apparently he also began to supply Big money for the creators Present only on roller skates.

(Tagstranslate) Instagram

Advertisement
This article was originally published on : techcrunch.com
Continue Reading
Advertisement

OUR NEWSLETTER

Subscribe Us To Receive Our Latest News Directly In Your Inbox!

We don’t spam! Read our privacy policy for more info.

Trending