
Image by Bjoertvedt, from Wikimedia Commons
DOJ Adviser’s Past In Piracy And Hacking Comes Under Spotlight
- Written by Kiara Fabbri Former Tech News Writer
- Fact-Checked by Sarah Frazier Former Content Manager
Christopher Stanley, a senior advisor in the U.S. Justice Department, has come under scrutiny for his past activities as a hacker and distribution of pirated software, as first reported in an exclusive article by Reuters .
In a rush? Here are the quick facts:
- The Justice Department confirmed Stanley has an active security clearance.
- The Internet Archive took down his previous websites following Reuters’ outreach.
- The hiring procedures at DOGE face scrutiny because of new demands from lawmakers.
Stanley, 33, was previously employed at Elon Musk’s companies X and SpaceX and was posted to the Justice Department’s Department of Government Efficiency (DOGE), which Musk oversees.
Reuters reports that Stanley started operating websites containing pirated software, ebooks, and video game cheats in 2006, when he was 15. Through online forums Stanley shared details about his hacking activities, which included website breaches, and obtaining administrative access.
The Justice Department did not comment on Stanley’s role or past activities but confirmed that he has an active security clearance. Reuters adds that Attorney General Pam Bondi expressed confidence in him, saying she has “full trust and confidence in Chris’s ability to help the federal government.” Stanley, the White House, X, and SpaceX did not respond to requests for comment, as noted by Reuters.
The Internet Archive removed several of Stanley’s former websites after Reuters reached out to him. The Wayback Machine director Mark Graham confirmed website owners can request content removal but he did not verify Stanley’s role in the content disappearances, as reported by Reuters.
People have different opinions about Stanley’s past. Jonathan Rusch, a former Justice Department prosecutor, expressed his doubts, saying, “I would have very serious concerns about hiring him in and giving him access to these kinds of records,” as reported by Reuters. He noted that Stanley had previously leaked data obtained through questionable means.
Others were more lenient. Dan Guido, CEO of security firm Trail of Bits, argued that Stanley’s hacking history shouldn’t disqualify him, as he primarily targeted other hackers. “That is a way I’ve seen a lot of people learn,” Guido said, as reported by Reuters.
The exact responsibilities of Stanley at the Justice Department are still unclear, as well as his employment status with X and SpaceX. Reuters noted that his LinkedIn profile still lists both companies but does not mention his government work. He is a “special government employee” and does not get a government salary.
Reuters argues that the controversy stems from a recent report that revealed that DOGE staffer Edward Coristine allegedly offered network support to cybercriminals. Democratic lawmakers have demanded an investigation into DOGE’s hiring practices.
Stanley previously distanced himself from hacking in a 2010 post, stating, “I no longer hack into Paypals, gain root access into other people’s computer (sic), or exploit online websites like StickAM,” as reported by Reuters. However, records show he continued discussing software piracy and cyber exploits even after making that claim, said Reuters.

Image by ORACLE, from Wikimedia Commons
Oracle Faces Scrutiny Over Alleged Cloud Security Breach
- Written by Kiara Fabbri Former Tech News Writer
- Fact-Checked by Sarah Frazier Former Content Manager
Oracle is under fire after cybersecurity researchers and journalists uncovered evidence of a major security breach in its cloud services—despite the company’s denials.
In a rush? Here are the quick facts:
- The company Oracle states through official channels that Oracle Cloud did not experience any kind of breach.
- The analysis of leaked information shows that the data is authentic and reveals email addresses together with job positions and contact information.
- The company allegedly verified the breach through private communication yet refuses to provide written confirmation of the incident.
The hacker ‘rose87168’ announced on March 21 that they had penetrated Oracle’s cloud infrastructure before revealing confidential information, as noted by Medium .
The hacker presented files together with login credentials which cybersecurity experts verified as authentic. Bleeping Computer received a statement from Oracle which denied any breach of their Cloud infrastructure.
Medium reported that internal Oracle meeting recordings revealed employees discussing password vault access and customer system entry after the initial breach. The public release of the video indicates that the breach extended beyond Oracle’s initial statements.
TechSpot notes that Hudson Rock, CloudSEK, and Trustwave SpiderLabs analyzed the data and said it was real customer information, including email addresses, job titles, and contact details. Trustwave said this leak poses “severe cybersecurity and operational risks.”
Despite these findings, Oracle allegedly used wordplay to distance itself from the breach, stating only that “Oracle Cloud” was unaffected while reportedly shifting blame onto “Oracle Classic,” a rebranded version of its legacy services, as reported by TechSpot.
Medium reports that some Oracle customers claim that the company has confirmed a breach through private communication yet refuses to issue written statements despite mounting evidence. However, the absence of clear disclosure has triggered extensive public disapproval.
Meanwhile, “rose87168” continues leaking data and has threatened to release more unless demands are met, as reported by Medium. Experts warn that affected organizations should take immediate security measures, as Oracle remains silent on mitigation efforts.