Hillary Clinton Says WikiLeaks Is 'Russian Propaganda'

Hillary Clinton’s campaign is firing back as Wikileaks released a new tranche of hacked emails from the account of its chairman John Podesta, dubbing the website a “propaganda arm of the Russian government” seeking to help elect Republican nominee Donald Trump.

The latest batch of more than 2,000 emails, disclosed on Monday 10th Oct, offered a glimpse into the inner workings of the Clinton campaign. They included insights on multiple fronts, such as a lack of preparedness for Bernie Sanders’ insurgent campaign, concerns raised by Chelsea Clinton over potential conflicts of interest for the family’s foundation, and efforts by aides on how to best frame the former secretary of state’s second bid for the White House.

Early October, Wikileaks published other hacked emails from Podesta’s account, which included alleged excerpts of Clinton’s paid speeches to Wall Street. Clinton’s campaign has neither confirmed nor denied authenticity of the emails, but in recent days escalated its charge that the hack was conducted by Russian state actors.

Brian Fallon, a spokesman for Clinton’s campaign, fired off a recent tweet storm in which he assailed Wikileaks and its founder, Julian Assange, for working on behalf of the Russian government.

“You are no media organisation,” Fallon tweeted at Wikileaks. “You are a propaganda arm of the Russian government, running interference for their pet candidate, Trump.

“How about probing possibility of Trump associates directly coordinating with Russia and Wikileaks? That is the thing that should cause chills,” he added.
In another tweet, Fallon acknowledged that reporters would be interested in their internal campaign operation but implored the media to scrutinize collusion between the hackers and Trump’s associates.

“For God sakes, Roger Stone admitted meeting with Assange,” Fallon said of one of Trump’s closest advisers. “Wouldn’t it be good reading to see internal discussions [about] Trump’s taxes? Yes but Wikileaks isn’t targeting Trump. That tells you something.”

The US government has formally accused Russia of attempting to “interfere” with the 2016 presidential election, pointing to the hacking of more than 19,000 emails from Democratic party officials in a statement over the weekend to suggest that only the country’s “senior-most officials could have authorized these activities”.

The allegations against Russia include the hacking in July of the Democratic National Committee’s emails, which were released just before the party’s convention in Philadelphia and prompted the resignation of DNC chairwoman Debbie Wasserman Schultz. Russian president Vladimir Putin praised that breach as a public service, but has denied that his government had any involvement.

The White House weighed in about the latest hack, saying the administration “will ensure that our response is proportional”.

“The president has talked before about the significant capabilities that the US government has to both defend our systems in the United States, but also carry out offensive operations in other countries,” Josh Earnest, the White House press secretary, told reporters. “So there are a range of responses that are available to the president and he will consider a response that is proportional.”

The latest batch of Podesta emails include concerns within Clinton’s inner circle about her positioning on key issues as well as the private server email controversy that has dogged the campaign since March of last year.

In one email, Clinton’s chief strategist Joel Benenson wrote that she “risks looking very political” in coming out against the controversial Keystone XL Pipeline. In another, Podesta said he was “skeptical” about hitting Sanders on his gun control record, which during the Democratic primary became one of Clinton’s more prominent lines of attack against the Vermont senator.

“Interestingly, I am worried about blowback from our supporters,” Podesta wrote, as the campaign mulled criticizing Sanders in an op-ed that ran in Clinton’s name in the New York Daily News.

Aides ultimately concluded they would “tone down the contrast” between Clinton and her Democratic opponent.

One exchange revealed tensions between Clinton’s longtime aide Doug Band and her daughter Chelsea Clinton in late 2011, when Chelsea cited “serious concerns” about the blurring of lines between the family’s foundation and Band’s consulting company, Teneo.

Band, who insisted his company had “almost nothing to do” with the Clintons or its foundation, lashed out at Chelsea in an email to Podesta on the subject. “She is acting like a spoiled brat who has nothing else to do but create issues to justify what she’s doing because she, as she has said, hasn’t found her way and has a lack of focus in her life,” Band wrote.

The fallout from Clinton’s use of a private email server while heading the state department was also a topic of discussion. In an email from August of 2015, campaign spokeswoman Jennifer Palmieri noted Clinton was “not in the same place” as her team on how to address the controversy.

“As you all know, I had hoped that we could use the ‘server moment’ as an opportunity for her to be viewed as having taken [sic] a big step to deal with the email problem that would best position us for what is ahead,” Palmieri wrote. “It is clear that she is not in same place (unless John has a conversation with her and gets her in a different place).”

The Trump campaign pounced on the hacked emails, focusing on one exchange it claimed showed evidence of “collusion” between Clinton’s campaign and the Department of Justice in the investigation into her private server. But the emails cited by Trump adviser Jason Miller were sent two months before the federal government opened its inquiry into Clinton’s email setup, and show nothing more than the exchange of information that was already publicly available. 

Trump tried to draw attention to the hacked emails himself during a rally in Wilkes-Barre, Pennsylvania, holding up a printed statement he misattributed to longtime Clinton friend Sidney Blumenthal. “Sleazy Sidney,” Trump told his supporters, admitted “they could have done something about Benghazi”.

“This just came out a little while ago,” he added, prompting the familiar “lock her up” chants against Clinton that are now a staple at Trump’s rallies.

But the words the Republican nominee claimed were written by Blumenthal were, in fact, sentences from a story published in Newsweek by journalist Kurt Eichenwald last October about the 2012 attack in Benghazi. Blumenthal was simply passing along the article to Podesta, in an email that contained the subject line “the truth” and prompted an essay in Newsweek from Eichenwald himself titled: Dear Donald Trump and Vladimir Putin, I am not Sydney Blumenthal.

The source of the false story linking Blumenthal to the passages he never wrote was Sputnik, a government-controlled Russian news agency. The website took its post down after the error became clear, but Eichenwald questioned how a conspiracy went quickly from Russian print to Trump’s podium.

Guardian

 

« US Security Bureau Finally Reacts To Snowden
Indian Police In A Cyberwar »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ACIS Professional Center

ACIS Professional Center

ACIS provides training and consulting services in the area of information technology, cybersecurity, IT Governance, IT Service management, information security and business continuity management.

Help Net Security

Help Net Security

Help Net Security has been a prime resource for information security news and insight since 1998.

Davis Wright Tremaine (DWT)

Davis Wright Tremaine (DWT)

Davis Wright Tremaine is a full-service law firm with offices throughout the US and in Shanghai, China. Practice areas include Technology, Privacy & Security.

Finjan Holdings

Finjan Holdings

Finjan solutions are aimed at keeping the web, networks, and endpoints safe from malicious code and security threats.

CERT.LV

CERT.LV

CERT.LV is the national Computer Emergency Response Team for Latvia.

Terranova Security

Terranova Security

Terranova is dedicated to providing information security awareness programs customized to your internal policies and procedures.

Industrial Networking Solutions (INS)

Industrial Networking Solutions (INS)

INS Services specializes in designing, deploying and providing on-going support for critical OT (Operational Technology) and IIoT (Industrial Internet of Things) networks.

Cyverse

Cyverse

Cyverse is a cyber-security firm which provides corporations with state-of-the-art cyber-security service-based and technological solutions made in Israel.

Cellopoint

Cellopoint

Cellopoint is a leading manufacturer of information security and email lifecycle management (ELM) products.

Zivaro

Zivaro

Zivaro provides transformational consulting and technology services to help clients attain real business value from their technology investments.

Devel

Devel

Devel is a LATAM cybersecurity company specialized in providing red, blue and purple team services for the financial sector.

SlowMist

SlowMist

SlowMist is a blockchain ecosystem security company providing cybersecurity audits and protection for leading digital asset exchanges, crypto wallets, public chains, and smart contracts.

CyberEdBoard

CyberEdBoard

CyberEdBoard is a private, peer-to-peer education and networking community focused on cybersecurity, technology, business processes and risk management.

Foundries.io

Foundries.io

Foundries.io have built a secure, open source platform for the world's connected devices, and a cloud service to configure this to any hardware and any cloud.

CYMAR

CYMAR

CYMAR The “CYBER” Smart Solution to offer sustainability and bring resilience to Global SMART Terminals and protect the supply chain of the World’s economy.

Datos Insights

Datos Insights

Datos Insights is a leading global provider of insights, data, and advisory services to the financial services, insurance, and retail technology industries.