As it stated in CNN reportedthat the FBI and CIA “are coordinating reviews of the matter.”
See more videosIt is no surprise that the CIA uses malicious software to gather information about specific individuals.
A glimpse at the history of WikiLeaks, which has been publishing news leaks and secret information for 10 years.
The U.S. official who confirmed the existence of the federal probe requested anonymity to discuss the sensitive investigation.
Carol Cratty, an FBI spokeswoman, referred calls on the matter to the CIA.
As it stated in White House spokesman Sean Spicer on Wednesday said there was a “massive, massive” difference between WikiLeaks’ release of Central Intelligence Agency hacking methods and that site’s release of former Clinton campaign manager John Podesta’s Gmail account.
On the Republican healthcare bill, Spicer said the amount of affordable healthcare services, not the number of people who obtain health insurance coverage, is the more important metric.
President Trump, during the campaign, had declared, “I love WikiLeaks.”
“The interest and outrage that occurred last year by a lot of Democrats when it came to leaks, it’s interesting that we’re hearing not as much outrage now when it comes to national security,” Spicer said.
WikiLeaks Dumps Trove of Purported CIA Hacking Tools
As it stated in The group, which was behind the leak of emails stolen from the Democratic National Committee during last year’s presidential campaign, said the release consists of 8,761 documents and files from the CIA’s Center for…
WASHINGTON—WikiLeaks released a massive trove of documents and files Tuesday that it says exposes how the Central Intelligence Agency hacks smartphones, computer operating systems, message applications and internet-connected televisions, in what would be one of the biggest breaches in the spy agency’s history.
This content may collect you by Owen Daniel