CNN is reporting that Attorney General Jeff Sessions did not disclose meetings he had last year with Russian officials when he applied for his security clearance.
Sessions, who met with Russian Ambassador Sergey Kislyak at least two times last year, didn’t note those interactions on the form, which requires him to list “any contact” he or his family had with a “foreign government” or its “representatives” over the past seven years, officials said.
The new information from the Justice Department is the latest example of Sessions failing to disclose contacts he had with Russian officials. He has come under withering criticism from Democrats following revelations that he did not disclose the same contacts with Kislyak during his Senate confirmation hearings earlier this year.
Sessions initially listed a year’s worth of meetings with foreign officials on the security clearance form, according to Justice Department spokeswoman Sarah Isgur Flores. But she says he and his staff were then told by an FBI employee who assisted in filling out the form, known as the SF-86, that he didn’t need to list dozens of meetings with foreign ambassadors that happened in his capacity as a senator.
Turns out the mastermind behind the software leading to a massive Target breach that swiped credit card information from 110 million customers last November may have been none other than a (brilliant) teenager,according to investigators.
Authorities suspect that an unnamed 17-year-old with “ties to St. Petersburg” may have developed the “malware” software used to skim credit card numbers in the enormous data breach, which involved the theft of everything from confidential credit and debit card data to personal information like addresses and phone numbers. That same software may have also been used to hit up several other retailers, and a federal report this week suggested the software breach was an organized, likely Russian-instigated cyber attack on the U.S.
California cyber-security firm IntelCrawler says they’ve identified the “malware”‘s architect, tracking the software back to a 17-year-old with the username “ree4.” And though the firm does not believe the teenager orchestrated the cyber-attack, they note this isn’t the first malicious software he has designed, as per CEO Andrew Komarov: “Previously he has created several tools used in hacking community for brute force attacks, such as ‘Ree4 mail brute’, and also earned some first money with social networks accounts hacking and DDoS attacks trainings, as well as software development including malicious code.”
Several online chats were embedded in the report; the chats were conducted in Russian, and the translation alleges Ree4 sold one download of the software for $2000; investigators have still not managed to pinpoint the hackers directly responsible for the attack.
h/t – gothamist