The Justice Department will no longer subpoena journalists’ records in leak investigations, White House says

Brian Netter, a lawyer for the women’s soccer team in an equal pay case, will be a top defender of Biden policies at the Justice Department.

  • The Justice Department will no longer issue subpoenas for the records of reporters in leak investigations, The White House confirmed Saturday.
  • The Justice Department under Trump secretly fought to get emails sent by New York Times reporters.
  • Under Biden, the Justice Department informed the Times of the subpoena but had imposed a gag order.
  • See more stories on Insider’s business page.

The White House on Saturday announced that the United States Department of Justice would no longer secretly work to obtain the records of journalists involved as part of investigations into leaks.

The news was first reported by the Associated Press and was confirmed by the White House on Saturday.

“While the White House does not intervene in criminal investigations, the issuing of subpoenas for the records of reporters in leak investigations is not consistent with the President’s policy direction to the Department, and the Department of Justice has reconfirmed it will not be used moving forward,” White House Press Secretary Jen Psaki said in a statement.

The announcement follows a report from The New York Times published one day earlier that the Justice Department under President Donald Trump had quietly fought to obtain the emails of four New York Times reporters as part of its investigation into leaks at the agency.

The Times was not informed of the attempt by the Trump administration, according to the report. The Justice Department under Biden continued the investigation but informed The New York Times of its existence, the outlet reported. But the agency on March 3 placed a gag rule preventing anyone from speaking publicly about it until it was lifted.

David McCraw, the New York Times’ top lawyer, said the move was “unprecedented” and the gag order had been lifted Friday, according to the report.

In the statement Saturday, Psaki said “no one at the White House” had been aware of the gag order until Friday night.

Read the original article on Business Insider

America built the world’s most sophisticated cyberweapons. Now they’re being used against the country, a new book argues.

US cyberwarfare Exercises on cyberwarfare and security are seen taking place during the NATO CWIX interoperability exercise n 22 June, 2017 in Bydgoszcz, Poland. (Photo by Jaap Arriens/NurPhoto via Getty Images)
  • The US has long emphasized cyber offense over defense, Nicole Perlroth argues in a new book.
  • But now the weapons it developed are being used against it, the The New York Times reporter said.
  • Perlroth told Insider the US needs to shore up its biggest vulnerability: critical infrastructure.
  • Visit the Business section of Insider for more stories.

In March 2017, WikiLeaks published a trove of leaked CIA hacking tools. The agency’s internal report, obtained last year by The Washington Post, eventually blamed the CIA’s hackers for spending too much effort “building cyber weapons at the expense of securing their own systems.”

A month after the CIA tools leaked, a group called the Shadow Brokers dumped its fifth batch of hacking tools that it had stolen from the NSA’s elite “Tailored Access Operations” group. Those tools were then used by foreign actors to carry out extensive cyberattacks, including the infamous WannaCry attacks, whose targets included American companies and government agencies.

More recently, the Solarwinds hack and an attempt by hackers to poison a Florida town’s water supply exposed just how vulnerable America is to cyberattacks on its home turf.

For decades, the US has had the most sophisticated arsenal of cyberweapons in the world. But America’s focus on building up its cyber offenses – and lack of focus on defensive measures – has increasingly become one of its biggest weaknesses, The New York Times reporter Nicole Perlroth argues in a new book. 

In “This Is How They Tell Me the World Ends: The Cyberweapons Arms Race,” Perlroth, who has covered cybersecurity for more than a decade, says other countries’ cyber capabilities have caught up to the US in recent years. At the same time, she argues, America’s critical infrastructure – because so much of it is owned by private companies and connected to the internet – has become a huge target for its adversaries.

“More nation-states and cybercriminals target the United States with cyberattacks than almost any other nation, and we’re the most vulnerable because we’re the most wired,” Perlroth said in an interview with Insider.

That wasn’t always the case, Perlroth said, adding that the US is largely to blame for the flood of attacks.

In 2010, the US and Israel used a computer worm known as Stuxnet to sabotage a substantial portion of Iran’s nuclear enrichment program, in what is widely considered the first cyber “use of force” that dealt damage in the physical world. Eventually, the code that powered the attack leaked online and hackers around the world – including in Iran – were able to reverse engineer it and re-deploy it for their own purposes.

According to Perlroth, that ignited a cyber arms race that hasn’t stopped.

“Since then, almost every government on earth with maybe the exception of Antarctica has pursued these programs,” Perlroth said. “And any government official will readily admit that the target of that attack – that Iran – caught up in terms of its capabilities for cyberattacks in a much shorter timeframe than we gave it credit for.”

Countries like Iran, Russia, China, and North Korea have poured massive amounts of resources into their cyber capabilities and have successfully hit American targets using tools originally built by the US and its allies as well as tools developed in-house. And because it’s so difficult to definitively attribute a cyberattack to a specific country, Perlroth said, the threat of the US retaliating with a strong offensive attack isn’t as strong of a deterrent as it is with conventional weapons.

“We don’t need to back off on offense,” she said. “But the thing is, if we’re going to pursue an offensive strategy, if we’re going to just keep hacking into our adversaries…then we need to make sure that our own grid and our own critical infrastructure isn’t vulnerable. And right now we’re incredibly vulnerable.”

The US has long neglected the security of critical infrastructure like power plants, hospitals, and airports, which hackers could infiltrate and wreak havoc on by shutting off power, deleting patient data, or causing planes to crash, according to Perlroth.

“These are all things that could happen simultaneously and would be in many ways more deadly than a bomb going off somewhere,” Perlroth said, adding that these threats are amplified by the fact that private companies like Solarwinds, which own and operate the vast majority of US infrastructure, are first and foremost concerned with making money.

“The incentive has been get your product first to market, make your products easily accessible, not just to customers, but employees and contractors and vendors,” she said. Perlroth also said that, following the Solarwinds hack, the US government should “pause here and take inventory” of its own IT systems, including which software touches various networks, who makes it and where, and what security practices those companies have in place.

Additionally, Perlroth says better information sharing is needed between the government and private sector around constantly evolving cyber threats – something lawmakers alluded to in their recent grilling of executives from Solarwinds, Microsoft, FireEye, and Crowdstrike.

Ultimately, Perlroth said the US needs to better incentivize companies to prioritize security, both by requiring and rewarding good security practices through stricter legal requirements and tax credits, but also by slapping fines on “companies whose passwords are ‘Solarwinds123.’

Read the original article on Business Insider

How Comcast’s investing arm Comcast Ventures unraveled

Good morning and welcome to Insider Advertising for February 25. I’m senior advertising reporter Lauren Johnson, and here’s what’s going on:

But first, we’re looking to highlight the top PR pros helping companies go public. Submit nominations here by March 5.

If this email was forwarded to you, sign up here for your daily insider’s guide to advertising and media.

Tips, comments, suggestions? Drop me a line at or on Twitter at @LaurenJohnson.

Comcast logo
Comcast logo

Comcast Ventures was once a kingmaker for healthcare benefits startups. Then its team fell apart.

Read the story.

GettyImages 465186899
Carolyn Ryan on “Meet the Press” in 2014

Carolyn Ryan is the most powerful woman in The New York Times newsroom – and she could become its next top editor

Read the story.


Netflix has an elite ‘Lstaff’ team of 23 execs that helps make the company’s biggest decisions. Here are its members, who range from key content VPs to data leads.

Read the story.

More stories we’re reading:

Thanks for reading and see you tomorrow! You can reach me in the meantime at and subscribe to this daily email here.

Read the original article on Business Insider