Days after a high school kid revealed he had hacked the emails of CIA chief John Brennan, Wikileaks announced Wednesday that it obtained the account’s contents and “will be releasing it shortly.”
On Wednesday, WikiLeaks published a few documents, allegedly from Brennan’s email account. WikiLeaks announced the leak on Twitter.
The organization said that Brennan “used the account occasionally for several intelligence related projects,” and released six documents to support the claim. WikiLeaks said it would release more documents “over the coming days.”
— WikiLeaks (@wikileaks) October 21, 2015
Wikileaks did not say how it got Brennan’s data.
The Post first reported Sunday that a teenager claimed to have easily hacked into the private emails addresses of both Brennan and Johnson.
By Monday, the kid tweeted an image of a spreadsheet containing the purported Social Security numbers, phone numbers and email addresses of Brennan and more than a dozen other current and former national security officials.
Twitter suspended the account.
Asked about the personal hacking incident by lawmakers at House Homeland Security Committee hearing, Johnson demurred.
“I don’t think that I can comment about an ongoing investigation,” Johnson said. “The one thing I’ll say is: Don’t believe everything you read in the newspaper because a lot of it is inaccurate. But there’s a pending investigation by the FBI and the Secret Service and so I don’t think I can comment.”
Rep. Shelia Jackson-Lee (D-Texas) apologized to Johnson for having his privacy violated.
“We are certainly concerned about the hacking incident,” Jackson-Lee said in asking for classified briefing on the matter.
“And I frankly apologize for you, a public servant, to have had that issue occur.”
No one mentioned the unfolding Wikileaks bombshell during the hearing. Asked afterwards about the matter, Johnson declined comment.
Follow us on Twitter at @thesignalng
Copyright 2015 SIGNAL. Permission to use portions of this article is granted provided appropriate credits are given to www.signalng.com and other relevant sources.