The Associated Press used illegal hacked emails from a Republican fundraiser and is refusing to help them find the hacker.
For months and months we have heard how it was wrong for Wikileaks to release hacked emails demonstrating DNC corruption. They have also asserted that “Russia” or “Putin” was responsible for the emails being hacked—an assertion without any hard evidence—and that they are evil for doing so.
Yet when Republican hacked emails become available, the mainstream media suddenly prioritizes the actual content of the emails without worrying about the criminality of the hacking that acquired them.
An obvious double standard is being used here, but no one cares!
Politico reports, “GOP fundraiser subpoenas AP over hacked emails, setting up legal showdown.”
A top Republican fundraiser has subpoenaed the Associated Press for information about the source of hacked emails that formed the basis of recent reports about him, people familiar with the matter tell POLITICO.
The AP has received the subpoena from Elliott Broidy — the subject of several recent articles about his efforts to lobby President Donald Trump and the U.S. government to adopt a hard-line stance against the Persian Gulf state of Qatar — and is planning to resist it, according to the outlet’s director of media relations, Lauren Easton.
The impasse sets up a potential legal standoff over press protections at a time when political battles are increasingly being waged via leaks of hacked data. A copy of the subpoena obtained by POLITICO demands the AP turn over all its information about its sources, including their names, along with information about how the AP obtained the hacked emails.
While several outlets — including the Wall Street Journal and the Hollywood Reporter — have published articles based on Broidy’s stolen emails, the businessman is singling out the AP for a subpoena because of the lengths the outlet has gone to conceal the identity of its sources, according to a person familiar with Broidy’s thinking.
The difference seems to be that other outlets have provided original PDFs while AP has only released scanned copies.
Original PDF documents contain metadata that can be helpful […] when attempting to trace the source of a hack, .