CIA director: We didn't hack Senate computers

Mar 11, 2014 by Associated Press

CIA director John Brennan says the spy agency did not hack into computers that Senate staffers were using to investigate Bush-era interrogation programs.

Brennan says the CIA wants to put the post-9/11 detention and interrogation program behind it. That program is the subject of an investigation by the Senate Intelligence Committee. The committee says the CIA improperly accessed Senate computers. Brennan says the CIA wouldn't do that.

The Justice Department has been asked to review whether there was any in Senate staffers' removal of CIA documents about the now-defunct torture program and whether the CIA inappropriately monitored the Senate's access to these documents.

The committee has reviewed millions of documents and found the interrogations and confinements of suspected terrorists after 9/11 were harsher than the CIA has previously described.

Explore further: US watchdog urges safeguards for 'Internet of Things'

1 /5 (1 vote)
add to favorites email to friend print save as pdf

Related Stories

New website to open spy agency to public: CIA

Feb 08, 2011

The CIA has launched a revamped website with links to YouTube and Flickr to help the public better understand the spy agency's often clandestine work, officials said.

CIA rolls out 'new and improved website'

Jun 24, 2013

The CIA prides itself on secrecy but the spy agency unveiled a revamped website Monday that promises a user-friendly layout and a "sleeker, more modern web experience."

Ex-CIA boss: Telecoms should store metadata, not NSA

Jan 14, 2014

Telephone "metadata" controversially scooped up by a US intelligence agency should not be destroyed but stored by private telecom giants, a former CIA chief said Tuesday days before President Barack Obama ...

Recommended for you

Computerised vehicles are vulnerable to hacking and theft

Jan 27, 2015

Theft of vehicles is about as old as the notion of transport – from horse thieves to carjackers. No longer merely putting a brick through a window, vehicle thieves have continually adapted to new technology, ...

How we can each fight cybercrime with smarter habits

Jan 26, 2015

Hackers gain access to computers and networks by exploiting the weaknesses in our cyber behaviors. Many attacks use simple phishing schemes – the hacker sends an email that appears to come from a trusted ...

Davos elites warned about catastrophic cyberattacks

Jan 24, 2015

Attacks on power plants, telecommunications and financial systems, even turning all of Los Angeles' traffic lights green: Davos elites were warned Saturday of the terrifying possibilities of modern cyber ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.