Connect with us

Technology

The Trump campaign hacking scandal and leak resembles a repeat of 2016. This time, the media is reacting differently

Published

on

Trump campaign hack-and-leak appears like a rerun of 2016. This time, media outlets are responding differently

This weekend Politico dropped an information bomb:An individual using only the name “Robert” provided the editorial staff with documents allegedly stolen from Donald Trump’s presidential campaign.

Since then now we have learned that New York Times AND The Washington Post I also heard from the same person and received several stolen documents. The document dump has the characteristics of a hack and leak operation, which usually involves malicious hackers stealing confidential information and strategically revealing it to harm the goal of the hack. The FBI said it was investigating the hack. Trump himself he accused Iran’s government about the breach. Longtime Trump confidante Roger Stone said his email account was breached, which likely began the whole operation, based on anonymous people who spoke to The Washington Post.

If this all sounds familiar, it’s because a nearly similar hack-and-leak operation before the US election happened before and will inevitably occur again. It’s value going back in time to the previous hack-and-leak operation to spotlight what we learned then and how those lessons apply now.

In the summer of 2016, a hacker who introduced himself as Guccifer 2.0 and described himself as a Romanian “hacker, manager, philosopher (and) woman lover” claimed to be behind the Democratic National Committee break-in. This got here as a surprise, as cybersecurity firm CrowdStrike he accused Russian intelligence agency behind the hack. In an ironic twist, Roger Stone, meanwhile, publicly disclosed was involved with Guccifer 2.0 and joined the hacker’s claims that he was attacking Democrats.

But because it turned out, after I began asking Guccifer 2.0 some specific questions in 2016, their mask quickly began to fallTwo years later, the FBI confirmed that Guccifer 2.0 was not the only Romanian hacker, but a person controlled by two agents working for the Russian military intelligence unit, the Main Intelligence Directorate or GRU. While I I pat myself on the backI also wish to be clear that in some ways it was easier for me to deal with Guccifer 2.0, his identity, and his motivations, than on the leaked documents, just because I used to be (and still am) a reporter covering cybersecurity moderately than politics.

At this point, and on this latest case, it’s unclear who “Robert” really is. However, early signs point to a repeat of the Guccifer 2.0 situation.

The day before the Politico report on the attack on Trump was published, Microsoft it was revealed that a hacking group supported by the Iranian government “sent a spear-phishing email in June to a high-ranking presidential campaign official from the compromised email account of a former senior adviser.” Microsoft didn’t say what the campaign was or name the “former senior adviser” who was targeted, but sources later said, The Washington Post AND Political that the FBI has been investigating the hacking of the Trump campaign since June.

IN latest report on wednesdayGoogle’s Threat Analysis Group, which studies hackers and government-backed threats, agreed with most of Microsoft’s assessment. Google said it had evidence that Iran-backed hackers were behind attacks on the personal email accounts of about a dozen people related to President Biden and former President Trump back in May.

To summarize: It appears that Iranian government hackers could have hacked Stone, used his email address to then goal and infiltrate the Trump campaign, stolen certain documents (to this point, we only learn about files related to the vetting process for Republican vice presidential candidate J.D. Vance), and finally used someone named Robert to contact reporters in the hopes that they’d look into the leaked documents.

Contact us

Do you may have more details about the Trump campaign hack? Or other politically motivated hacks? From a non-work device, you’ll be able to safely contact Lorenzo Franceschi-Bicchierai on Signal at +1 917 257 1382 or on Telegram and Keybase @lorenzofb or email. You can even contact TechCrunch via SecureDrop.

The difference from what happened in 2016 is how the media is presenting the whole story.

During this time, countless media outlets acquired Guccifer 2.0’s documents, and later also the stolen ones. from Hillary Clinton’s then campaign manager, John Podesta — and published stories that essentially reinforced the message the Russian government wanted the American public to deal with, namely allegations of corruption and abuse. Kathleen Hall Jamieson, a professor at the University of Pennsylvania who wrote a 2016 book about the hacking campaigns, he told the Associated Press this week it was found that the media had distorted some of the leaks in 2016 in a way that hurt Clinton greater than it must have.

This time, initial coverage of the Trump campaign hack and leak focused on the hack and leak itself, moderately than what was leaked, a undeniable fact that disinformation experts have praised.

“Politico and (its reporter) Alex Isenstadt deserve a lot of credit for turning this story into a story about a (weak, it seems) foreign disinformation effort, rather than reporting on leaked Trump campaign documents themselves.” Thomas Rid saidprofessor at Johns Hopkins and someone who closely monitored 2016 Russian hacking and disinformation campaign

It is essential to notice that this might all change, perhaps if or when “Robert” decides to disclose something that the media deems more newsworthy. It is also essential to keep in mind that as my former colleague Joseph Cox said written a few years agowere many matters hackers leaky information that was in the public interest. The data from these hacks and leaks deserved to be discussed and reported. That could also be true this time, too.

Regardless, it is essential for journalists to offer the full context of hacking and leak operations, whether or not they are carried out by hackers working for governments attempting to undermine elections or specific presidential candidates, or by hacktivists with well-intentioned intentions.

When Politico asked the hacker how he obtained the documents, Robert supposedly said: “I suggest you do not inquire where I got them from. Any answer to that question will compromise me and also legally prevent you from publishing them.”

Perhaps Robert himself knows that this time the journalists have drawn conclusions.

This article was originally published on : techcrunch.com
Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Technology

Introducing the Next Wave of Startup Battlefield Judges at TechCrunch Disrupt 2024

Published

on

By

Announcing our next wave of Startup Battlefield judges at TechCrunch Disrupt 2024

Startup Battlefield 200 is the highlight of every Disrupt, and we will’t wait to search out out which of the 1000’s of startups which have invited us to collaborate can have the probability to pitch to top enterprise capitalists at TechCrunch Disrupt 2024. Join us at Moscone West in San Francisco October 28–30 for an epic showdown where everyone can have the probability to make a major impact.

Get insight into what the judges are in search of in a profitable company as they supply detailed feedback on the evaluation criteria. Don’t miss the opportunity to learn from their expert insights and discover the key characteristics that result in startup success, only at Disrupt 2024.

We’re excited to introduce our next group of investors who will evaluate startups and dive into each pitch in an in-depth and insightful Q&A session. Stay tuned for more big names coming soon!

Alice Brooks, Partner, Khosla Ventures

Alicja is a partner in Khosla’s ventures interests in sustainability, food, agriculture, and manufacturing/supply chain. She has worked with multiple startups in robotics, IoT, retail, consumer goods, and STEM education, and led mechanical, electrical, and application development teams in the US and Asia. She also founded and managed manufacturing operations in factories in China and Taiwan. Prior to KV, Alice was the founder and CEO of Roominate, a STEM education company that helps girls learn engineering concepts through play.

Mark Crane, Partner, General Catalyst

Mark Crane is a partner at General Catalysta enterprise capital firm that works with founders from seed to endurance to assist them construct corporations that may stand the test of time. Focused on acquiring and investing in later-stage investment opportunities equivalent to AuthZed, Bugcrowd, Resilience, and TravelPerk. Prior to joining General Catalyst, Mark was a vice chairman at Cove Hill Partners in Massachusetts. Prior to that, he was a senior associate at JMI Equity and an associate at North Bridge Growth Equity.

Sofia Dolfe, Partner, Index Ventures

Sofia partners with founders who use their unique perspective and private understanding of the problem to construct corporations that drive behavioral change, powerful network effects, and transform entire industries, from grocery and e-commerce to financial services and healthcare. Sofia can also be one of Index projects‘ gaming leads, working with some of the best gaming corporations in Europe, making a recent generation of iconic gaming titles. He spends most of his time in the Nordics, but works with entrepreneurs across the continent.

Christine Esserman, Partner, Accel

Christine Esserman joined Acceleration in 2017 and focuses on software, web, and mobile technology corporations. Since joining Accel, Christine has helped lead Accel’s investments in Blackpoint Cyber, Linear, Merge, ThreeFlow, Bumble, Remote, Dovetail, Ethos, Guru, and Headway. Prior to joining Accel, Christine worked in product and operations roles at multiple startups. A native of the Bay Area, Christine graduated from the Wharton School at the University of Pennsylvania with a level in Finance and Operations.

Haomiao Huang, Founding Partner, Matter Venture Partners

Haomiao from Venture Matter Partners is a robotics researcher turned founder turned investor. He is especially obsessed with corporations that bring digital innovation to physical economy enterprises, with a give attention to sectors equivalent to logistics, manufacturing and transportation, and advanced technologies equivalent to robotics and AI. Haomiao spent 4 years investing in hard tech with Wen Hsieh at Kleiner Perkins. He previously founded smart home security startup Kuna, built autonomous cars at Caltech and, as part of his PhD research at Stanford, pioneered the aerodynamics and control of multi-rotor unmanned aerial vehicles. Kuna was part of the Y Combinator Winter 14 cohort.

Don’t miss it!

The Startup Battlefield winner, who will walk away with a $100,000 money prize, can be announced at Disrupt 2024—the epicenter of startups. Join 10,000 attendees to witness this breakthrough moment and see the next wave of tech innovation.

Register here and secure your spot to witness this epic battle of startups.

This article was originally published on : techcrunch.com
Continue Reading

Technology

India Considers Easing Market Share Caps for UPI Payments Operators

Published

on

By

phonepe UPI being used to accept payments at a road-side sunglasses stall.

The regulator that oversees India’s popular UPI rail payments is considering relaxing a proposed market share cap for operators like Google Pay, PhonePe and Paytm because it grapples with enforcing the restrictions, two people accustomed to the matter told TechCrunch.

The National Payments Corporation of India (NPCI), which is regulated by the Indian central bank, is considering increasing the market share that UPI operators can hold to greater than 40%, said two of the people, requesting anonymity because the knowledge is confidential. The regulator had earlier proposed a 30% market share limit to encourage competition within the space.

UPI has change into the most well-liked option to send and receive money in India, with the mechanism processing over 12 billion transactions monthly. Walmart-backed PhonePe has about 48% market share by volume and 50% by value, while Google Pay has 37.3% share by volume.

Once an industry heavyweight, Paytm’s market share has fallen to 7.2% from 11% late last yr amid regulatory challenges.

According to several industry executives, the NPCI’s increase in market share limits is more likely to be a controversial move as many UPI providers were counting on regulatory motion to curb the dominance of PhonePe and Google Pay.

NPCI, which has previously declined to comment on market share, didn’t reply to a request for comment on Thursday.

The regulator originally planned to implement the market share caps in January 2021 but prolonged the deadline to January 1, 2025. The regulator has struggled to seek out a workable option to implement its proposed market share caps.

The stakes are high, especially for PhonePe, India’s Most worthy fintech startup, valued at $12 billion.

Sameer Nigam, co-founder and CEO of PhonePe, said last month that the startup cannot go public “if there is uncertainty on regulatory issues.”

“If you buy a share at Rs 100 and value it assuming we have 48-49% market share, there is uncertainty whether it will come down to 30% and when,” Nigam told a fintech conference last month. “We are reaching out to them (the regulator) whether they can find another way to at least address any concerns they have or tell us what the list of concerns is,” he added.

This article was originally published on : techcrunch.com
Continue Reading

Technology

Bluesky addresses trust and security issues related to abuse, spam and more

Published

on

By

Bluesky butterfly logo and Jay Graber

Social media startup Bluesky, which is constructing a decentralized alternative to X (formerly Twitter), provided an update Wednesday on the way it’s approaching various trust and security issues on its platform. The company is in various stages of developing and piloting a variety of initiatives focused on coping with bad actors, harassment, spam, fake accounts, video security and more.

To address malicious users or those that harass others, Bluesky says it’s developing recent tools that can have the option to detect when multiple recent accounts are created and managed by the identical person. This could help curb harassment when a foul actor creates several different personas to attack their victims.

Another recent experiment will help detect “rude” replies and forward them to server moderators. Like Mastodon, Bluesky will support a network where self-hosters and other developers can run their very own servers that connect to Bluesky’s server and others on the network. This federation capability is still in early access. But in the long term, server moderators will have the option to resolve how they need to take care of individuals who post rude responses. In the meantime, Bluesky will eventually reduce the visibility of those responses on its app. Repeated rude labels on content will even lead to account-level labels and suspensions, it says.

To curb using lists to harass others, Bluesky will remove individual users from the list in the event that they block the list creator. Similar functionality was recently introduced to Starter Packs, a sort of shared list that will help recent users find people to follow on the platform (check TechCrunch Starter Pack).

Bluesky will even scan lists with offensive names or descriptions to limit the potential of harassing others by adding them to a public list with a toxic or offensive name or description. Those who violate Bluesky’s Community Guidelines might be hidden from the app until the list owner makes changes that align with Bluesky’s policies. Users who proceed to create offensive lists will even face further motion, though the corporate didn’t provide details, adding that the lists are still an area of ​​energetic discussion and development.

In the approaching months, Bluesky also intends to move to handling moderation reports through its app, using notifications relatively than counting on email reports.

To combat spam and other fake accounts, Bluesky is launching a pilot that can attempt to routinely detect when an account is fake, scamming or sending spam to users. Combined with moderation, the goal is to have the option to take motion on accounts inside “seconds of receiving a report,” the corporate said.

One of the more interesting developments is how Bluesky will comply with local laws while still allowing free speech. It will use geotags that allow it to hide some content from users in a particular area to comply with the law.

“This allows Bluesky’s moderation service to maintain flexibility in creating spaces for free expression while also ensuring legal compliance so that Bluesky can continue to operate as a service in these geographic regions,” the corporate shared in a blog post. “This feature will be rolled out on a country-by-country basis, and we will endeavor to inform users of the source of legal requests when legally possible.”

To address potential trust and safety issues with videos which have recently been added, the team is adding features like the flexibility to disable autoplay, ensuring videos are labeled, and providing the flexibility to report videos. They are still evaluating what else might need to be added, which might be prioritized based on user feedback.

When it comes to abuse, the corporate says its general framework is “a question of how often something happens versus how harmful it is.” The company focuses on addressing high-impact, high-frequency issues, in addition to “tracking edge cases that could result in significant harm to a few users.” The latter, while only affecting a small number of individuals, causes enough “ongoing harm” that Bluesky will take motion to prevent abuse, it says.

User concerns will be reported via reports, emails and mentions @safety.bsky.app account.

This article was originally published on : techcrunch.com
Continue Reading
Advertisement

OUR NEWSLETTER

Subscribe Us To Receive Our Latest News Directly In Your Inbox!

We don’t spam! Read our privacy policy for more info.

Trending