Technology
The Trump campaign hacking scandal and leak resembles a repeat of 2016. This time, the media is reacting differently
This weekend Politico dropped an information bomb:An individual using only the name “Robert” provided the editorial staff with documents allegedly stolen from Donald Trump’s presidential campaign.
Since then now we have learned that New York Times AND The Washington Post I also heard from the same person and received several stolen documents. The document dump has the characteristics of a hack and leak operation, which usually involves malicious hackers stealing confidential information and strategically revealing it to harm the goal of the hack. The FBI said it was investigating the hack. Trump himself he accused Iran’s government about the breach. Longtime Trump confidante Roger Stone said his email account was breached, which likely began the whole operation, based on anonymous people who spoke to The Washington Post.
If this all sounds familiar, it’s because a nearly similar hack-and-leak operation before the US election happened before and will inevitably occur again. It’s value going back in time to the previous hack-and-leak operation to spotlight what we learned then and how those lessons apply now.
In the summer of 2016, a hacker who introduced himself as Guccifer 2.0 and described himself as a Romanian “hacker, manager, philosopher (and) woman lover” claimed to be behind the Democratic National Committee break-in. This got here as a surprise, as cybersecurity firm CrowdStrike he accused Russian intelligence agency behind the hack. In an ironic twist, Roger Stone, meanwhile, publicly disclosed was involved with Guccifer 2.0 and joined the hacker’s claims that he was attacking Democrats.
But because it turned out, after I began asking Guccifer 2.0 some specific questions in 2016, their mask quickly began to fallTwo years later, the FBI confirmed that Guccifer 2.0 was not the only Romanian hacker, but a person controlled by two agents working for the Russian military intelligence unit, the Main Intelligence Directorate or GRU. While I I pat myself on the backI also wish to be clear that in some ways it was easier for me to deal with Guccifer 2.0, his identity, and his motivations, than on the leaked documents, just because I used to be (and still am) a reporter covering cybersecurity moderately than politics.
At this point, and on this latest case, it’s unclear who “Robert” really is. However, early signs point to a repeat of the Guccifer 2.0 situation.
The day before the Politico report on the attack on Trump was published, Microsoft it was revealed that a hacking group supported by the Iranian government “sent a spear-phishing email in June to a high-ranking presidential campaign official from the compromised email account of a former senior adviser.” Microsoft didn’t say what the campaign was or name the “former senior adviser” who was targeted, but sources later said, The Washington Post AND Political that the FBI has been investigating the hacking of the Trump campaign since June.
IN latest report on wednesdayGoogle’s Threat Analysis Group, which studies hackers and government-backed threats, agreed with most of Microsoft’s assessment. Google said it had evidence that Iran-backed hackers were behind attacks on the personal email accounts of about a dozen people related to President Biden and former President Trump back in May.
To summarize: It appears that Iranian government hackers could have hacked Stone, used his email address to then goal and infiltrate the Trump campaign, stolen certain documents (to this point, we only learn about files related to the vetting process for Republican vice presidential candidate J.D. Vance), and finally used someone named Robert to contact reporters in the hopes that they’d look into the leaked documents.
Contact us
Do you may have more details about the Trump campaign hack? Or other politically motivated hacks? From a non-work device, you’ll be able to safely contact Lorenzo Franceschi-Bicchierai on Signal at +1 917 257 1382 or on Telegram and Keybase @lorenzofb or email. You can even contact TechCrunch via SecureDrop.
The difference from what happened in 2016 is how the media is presenting the whole story.
During this time, countless media outlets acquired Guccifer 2.0’s documents, and later also the stolen ones. from Hillary Clinton’s then campaign manager, John Podesta — and published stories that essentially reinforced the message the Russian government wanted the American public to deal with, namely allegations of corruption and abuse. Kathleen Hall Jamieson, a professor at the University of Pennsylvania who wrote a 2016 book about the hacking campaigns, he told the Associated Press this week it was found that the media had distorted some of the leaks in 2016 in a way that hurt Clinton greater than it must have.
This time, initial coverage of the Trump campaign hack and leak focused on the hack and leak itself, moderately than what was leaked, a undeniable fact that disinformation experts have praised.
“Politico and (its reporter) Alex Isenstadt deserve a lot of credit for turning this story into a story about a (weak, it seems) foreign disinformation effort, rather than reporting on leaked Trump campaign documents themselves.” Thomas Rid saidprofessor at Johns Hopkins and someone who closely monitored 2016 Russian hacking and disinformation campaign
It is essential to notice that this might all change, perhaps if or when “Robert” decides to disclose something that the media deems more newsworthy. It is also essential to keep in mind that as my former colleague Joseph Cox said written a few years agowere many matters hackers leaky information that was in the public interest. The data from these hacks and leaks deserved to be discussed and reported. That could also be true this time, too.
Regardless, it is essential for journalists to offer the full context of hacking and leak operations, whether or not they are carried out by hackers working for governments attempting to undermine elections or specific presidential candidates, or by hacktivists with well-intentioned intentions.
When Politico asked the hacker how he obtained the documents, Robert supposedly said: “I suggest you do not inquire where I got them from. Any answer to that question will compromise me and also legally prevent you from publishing them.”
Perhaps Robert himself knows that this time the journalists have drawn conclusions.
Technology
US medical device giant Artivion says hackers stole files during a cybersecurity incident
Artivion, a medical device company that produces implantable tissue for heart and vascular transplants, says its services have been “disrupted” resulting from a cybersecurity incident.
In 8-K filing In an interview with the SEC on Monday, Georgia-based Artivion, formerly CryoLife, said it became aware of a “cybersecurity incident” that involved the “compromise and encryption” of information on November 21. This suggests that the corporate was attacked by ransomware, but Artivion has not yet confirmed the character of the incident and didn’t immediately reply to TechCrunch’s questions. No major ransomware group has yet claimed responsibility for the attack.
Artivion said it took some systems offline in response to the cyberattack, which the corporate said caused “disruptions to certain ordering and shipping processes.”
Artivion, which reported third-quarter revenue of $95.8 million, said it didn’t expect the incident to have a material impact on the corporate’s funds.
Technology
It’s a Raspberry Pi 5 in a keyboard and it’s called Raspberry Pi 500
Manufacturer of single-board computers Raspberry Pi is updating its cute little computer keyboard device with higher specs. Named Raspberry Pi500This successor to the Raspberry Pi 400 is just as powerful as the present Raspberry Pi flagship, the Raspberry Pi 5. It is on the market for purchase now from Raspberry Pi resellers.
The Raspberry Pi 500 is the simplest method to start with the Raspberry Pi because it’s not as intimidating because the Raspberry Pi 5. When you take a look at the Raspberry Pi 500, you do not see any chipsets or PCBs (printed circuit boards). The Raspberry Pi is totally hidden in the familiar housing, the keyboard.
The idea with the Raspberry Pi 500 is you could connect a mouse and a display and you are able to go. If, for instance, you’ve got a relative who uses a very outdated computer with an outdated version of Windows, the Raspberry Pi 500 can easily replace the old PC tower for many computing tasks.
More importantly, this device brings us back to the roots of the Raspberry Pi. Raspberry Pi computers were originally intended for educational applications. Over time, technology enthusiasts and industrial customers began using single-board computers all over the place. (For example, when you’ve ever been to London Heathrow Airport, all of the departures and arrivals boards are there powered by Raspberry Pi.)
Raspberry Pi 500 draws inspiration from the roots of the Raspberry Pi Foundation, a non-profit organization. It’s the right first computer for college. In some ways, it’s a lot better than a Chromebook or iPad because it’s low cost and highly customizable, which inspires creative pondering.
The Raspberry Pi 500 comes with a 32GB SD card that comes pre-installed with Raspberry Pi OS, a Debian-based Linux distribution. It costs $90, which is a slight ($20) price increase over the Raspberry Pi 400.
Only UK and US keyboard variants will probably be available at launch. But versions with French, German, Italian, Japanese, Nordic and Spanish keyboard layouts will probably be available soon. And when you’re in search of a bundle that features all the things you would like, Raspberry Pi also offers a $120 desktop kit that features the Raspberry Pi 500, a mouse, a 27W USB-C power adapter, and a micro-HDMI to HDMI cable.
In other news, Raspberry Pi has announced one other recent thing: the Raspberry Pi monitor. It is a 15.6-inch 1080p monitor that’s priced at $100. Since there are quite a few 1080p portable monitors available on the market, this launch is not as noteworthy because the Pi 500. However, for die-hard Pi fans, there’s now also a Raspberry Pi-branded monitor option available.
Technology
Apple Vision Pro may add support for PlayStation VR controllers
According to Apple, Apple desires to make its Vision Pro mixed reality device more attractive for gamers and game developers latest report from Bloomberg’s Mark Gurman.
The Vision Pro was presented more as a productivity and media consumption device than a tool geared toward gamers, due partly to its reliance on visual and hand controls moderately than a separate controller.
However, Apple may need gamers if it desires to expand the Vision Pro’s audience, especially since Gurman reports that lower than half one million units have been sold to this point. As such, the corporate has reportedly been in talks with Sony about adding support for PlayStation VR2 handheld controllers, and has also talked to developers about whether they may support the controllers of their games.
Offering more precise control, Apple may also make other forms of software available in Vision Pro, reminiscent of Final Cut Pro or Adobe Photoshop.
-
Press Release9 months ago
CEO of 360WiSE Launches Mentorship Program in Overtown Miami FL
-
Press Release8 months ago
U.S.-Africa Chamber of Commerce Appoints Robert Alexander of 360WiseMedia as Board Director
-
Business and Finance7 months ago
The Importance of Owning Your Distribution Media Platform
-
Business and Finance9 months ago
360Wise Media and McDonald’s NY Tri-State Owner Operators Celebrate Success of “Faces of Black History” Campaign with Over 2 Million Event Visits
-
Ben Crump8 months ago
Another lawsuit accuses Google of bias against Black minority employees
-
Theater9 months ago
Telling the story of the Apollo Theater
-
Ben Crump9 months ago
Henrietta Lacks’ family members reach an agreement after her cells undergo advanced medical tests
-
Ben Crump9 months ago
The families of George Floyd and Daunte Wright hold an emotional press conference in Minneapolis