{"id":125566,"date":"2025-03-21T17:21:38","date_gmt":"2025-03-21T17:21:38","guid":{"rendered":"http:\/\/cryptospotters.net\/?p=125566"},"modified":"2025-03-21T17:21:38","modified_gmt":"2025-03-21T17:21:38","slug":"how-elon-musk-searches-for-leaks-lawsuits-mole-hunts-and-secret-codes","status":"publish","type":"post","link":"http:\/\/cryptospotters.net\/?p=125566","title":{"rendered":"How Elon Musk searches for leaks: Lawsuits, mole hunts and secret codes"},"content":{"rendered":"<p>Source: Politics<\/p>\n<p>Elon Musk has again <a href=\"https:\/\/www.politico.eu\/article\/elon-musk-threatens-pentagon-leakers-new-york-times-briefing-china-war\/\" target=\"_blank\" rel=\"noopener\">publicly threatened people<\/a> who leaked information on his sweeping power across the Trump administration. How he\u2019s handled leaks at his companies could be a sign of what\u2019s next for the federal government.<\/p>\n<p>\u201cI look forward to the prosecutions of those at the Pentagon who are leaking maliciously false information to NYT,\u201d Musk wrote hours after <a href=\"https:\/\/www.nytimes.com\/2025\/03\/20\/us\/politics\/musk-pentagon-briefing-china-war-plan.html\" target=\"_blank\" rel=\"noopener\">The New York Times reported<\/a> that Pentagon officials were expected to brief the top adviser to President Donald Trump on U.S.-China tensions, including potential war planning. \u201cThey will be found.\u201d (<a href=\"https:\/\/www.politico.com\/news\/2025\/03\/21\/musk-china-classified-war-plans-pentagon-00242182\" target=\"_blank\" rel=\"noopener\">POLITICO has reported that the Pentagon briefing<\/a> will focus on the threats China poses, but won\u2019t include any classified war plans. It was not clear if that was the initial plan.)<\/p>\n<p>Musk\u2019s statement, posted on his social media site X, echos his playbook of berating and pursuing recourse against leakers to snuff out internal sabotage at the tech billionaire\u2019s companies, like the electric vehicle company Tesla, space exploration and defense contractor SpaceX, and X. <\/p>\n<p>These moments indicate how he may move forward with leakers in the federal government.<\/p>\n<p>Here\u2019s how he\u2019s cracked down on leaks.<\/p>\n<h4 class=\"story-text__heading-large\">Musk\u2019s mole hunts<\/h4>\n<p>Leaks aren\u2019t always so easy to handle when you can\u2019t identify the leaker.<\/p>\n<p>After Musk bought the company, Twitter\u2019s source code was leaked online and posted on GitHub, a website where software developers can share project codes. It was unclear then who leaked the code.<\/p>\n<p>So in March 2023, the social media site <a href=\"https:\/\/github.com\/github\/dmca\/blob\/master\/2023\/03\/2023-03-24-twitter.md\" target=\"_blank\" rel=\"noopener\">issued a copyright infringement<\/a> notice against GitHub, which removed the information.<\/p>\n<p>At the time, though, Twitter could not identify the person who leaked the code and <a href=\"https:\/\/storage.courtlistener.com\/recap\/gov.uscourts.cand.410088\/gov.uscourts.cand.410088.4.0_4.pdf\" target=\"_blank\" rel=\"noopener\">sought to subpoena information<\/a> both on the poster and \u201cfor the users who posted, uploaded, downloaded or modified the data\u201d related to the source code leak.<\/p>\n<p>Months later, Twitter leadership, including its CEO Linda Yaccarino, announced she wanted to stamp out leaks \u2014 and asked employees to help find any leakers in their midst. <\/p>\n<p>\u201cIf you suspect any employee is not protecting Twitter\u2019s confidential information, please report it by submitting a ticket,\u201d read an internal email <a href=\"https:\/\/x.com\/benarroch_joe\/status\/1671683847745077249\" target=\"_blank\" rel=\"noopener\">shared publicly by a then-executive<\/a>. \u201cIf you need guidance or want to schedule training for your team, please email insiderthreat@twitter.com.\u201d<\/p>\n<h4 class=\"story-text__heading-large\">Secret codes<\/h4>\n<p>When Musk wants to find a leaker, he might set a canary trap.<\/p>\n<p>In 2022, Musk <a href=\"https:\/\/x.com\/elonmusk\/status\/1579101966453858305?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1579101966453858305%7Ctwgr%5E298f2c2cb1ecf80d29221cd5150c592d50bbc01b%7Ctwcon%5Es1_&amp;ref_url=https%3A%2F%2Fwww.ibtimes.co.uk%2Felon-used-simple-email-trick-catch-employee-leaking-tesla-data-press-1724419\" target=\"_blank\" rel=\"noopener\">revealed on X<\/a> how he ensnared a Tesla worker who had leaked the company\u2019s private information to the press over a decade ago: The company sent \u201cwhat appeared to be identical emails to all, but each was actually coded with either one or two spaces between sentences.\u201d<\/p>\n<p>The emails, which he contended were his brainchild, effectively created a fingerprint for every recipient that could be traced if the messages were sent to or published by the press.<\/p>\n<p>Using metadata or unique markers to identify leakers is not unusual. The <a href=\"https:\/\/www.justice.gov\/archives\/opa\/press-release\/file\/971331\/dl?inline=\" target=\"_blank\" rel=\"noopener\">federal government in 2017<\/a> said it relied, in part, on noting that documents obtained by The Intercept were \u201cfolded and\/or creased\u201d to determine which employee leaked it, and printed documents can have <a href=\"https:\/\/arstechnica.com\/information-technology\/2017\/06\/how-a-few-yellow-dots-burned-the-intercepts-nsa-leaker\/\" target=\"_blank\" rel=\"noopener\">unique identifiers on them<\/a>.<\/p>\n<p>People have since found ways around these traps to leak information to the press securely. Some have taken photos of internal communications on other devices. Or they\u2019ve turned to encrypted messaging platforms like Signal to chat with reporters.<\/p>\n<h4 class=\"story-text__heading-large\">In the courts<\/h4>\n<p>When a former Tesla worker allegedly stole confidential information, merged it with falsehoods and leaked it to the media, the company <a href=\"https:\/\/www.courtlistener.com\/docket\/7244147\/tesla-inc-v-tripp\/?page=1\" target=\"_blank\" rel=\"noopener\">swiftly filed a lawsuit against them in 2018<\/a>. The lawsuit claimed Tesla employees had already identified the hacker by the time the complaint was filed through an internal investigation in which the man confessed he wrote software that transferred heaps of data externally.<\/p>\n<p>But Musk has realized the mere threat of a lawsuit is an equally powerful tool to silence many testy employees.<\/p>\n<p>Musk\u2019s Tesla warned staffers in 2019 that if they leaked information, they could be sued by the company, which had filed a couple lawsuits against employees who allegedly took company information to competitors, <a href=\"https:\/\/www.cnbc.com\/2019\/05\/03\/tesla-email-warns-employees-stop-leaking.html\" target=\"_blank\" rel=\"noopener\">CNBC reported<\/a> at the time.<\/p>\n<p>And in December 2022, months after the Twitter source code leak, the company said in an internal email that \u201cif you clearly and deliberately violate the NDA that you signed when you joined, you accept liability to the full extent of the law &amp; Twitter will immediately seek damages,\u201d according to an <a href=\"https:\/\/x.com\/ZoeSchiffer\/status\/1601582028100894721\" target=\"_blank\" rel=\"noopener\">email tech journalist Zoe Schiffer obtained<\/a>.<\/p>\n<p>Staff at Musk\u2019s companies have largely been tight-lipped in recent years, particularly after he hired people loyal to the companies&#8217; missions and himself. Now, it is possible the same blueprint could come into play in the federal government, months after the Trump administration seeded some federal agencies with the tech billionaire\u2019s acolytes.<\/p>\n<p><a href=\"https:\/\/www.politico.com\/news\/2025\/03\/21\/elon-musk-leak-hunt-026928\" target=\"_blank\" class=\"feedzy-rss-link-icon\" rel=\"noopener\">Read More<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Source: Politics Elon Musk has again publicly threatened people who leaked information on his sweeping power across the Trump administration. How he\u2019s handled leaks at his companies could be a&hellip; <\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6],"tags":[],"_links":{"self":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/posts\/125566"}],"collection":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=125566"}],"version-history":[{"count":0,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/posts\/125566\/revisions"}],"wp:attachment":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=125566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=125566"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=125566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}