By Raphael Satter
2026年3月11日 上午10:02 UTC 更新于1小时前
[1/2]吉斯莱恩·麦克斯韦尔(Ghislaine Maxwell)和杰弗里·爱泼斯坦(Jeffrey Epstein)在这张由美国司法部于2025年12月19日在华盛顿特区发布的照片中被拍到,该照片是其针对已故金融家及被判有罪的性犯罪者杰弗里·爱泼斯坦调查的新一批文件的一部分。美国司法部/路透社图片社/档案照片
- 摘要
- 外国黑客三年前访问了与爱泼斯坦调查相关的FBI文件
- 此次黑客入侵引发对外国间谍对这些爆炸性文件兴趣的担忧
- FBI表示对该事件的调查仍在进行中
华盛顿,3月11日(路透社) – 据熟悉此事的消息人士和路透社查阅的最新公布的司法部文件显示,三年前,一名外国黑客在闯入美国联邦调查局(FBI)纽约现场办公室期间,获取了与已故性犯罪者杰弗里·爱泼斯坦调查相关的文件。
这是首次报道谁访问了FBI纽约现场办公室的服务器,其中包括一名外国黑客参与的指控。
路透社伊朗简报通讯会让您了解伊朗战争的最新动态和分析。请在此处注册。
广告 · 继续滚动阅读
FBI在一份声明中称这起”网络事件”是”孤立事件”。
“联邦调查局已限制对恶意行为者的访问并修复了网络。调查仍在进行中,因此我们目前无法提供进一步评论。”
尽管消息人士称此次入侵似乎是由网络罪犯而非外国政府实施的,但一位学者表示,这一事件凸显了这些文件潜在的情报价值。根据法律规定,美国司法部公布的文件曝光了这位已故金融家与政治、金融、学术界和商界知名人士的联系,引发了全球多个国家的调查。
广告 · 继续滚动阅读
“如果你是俄罗斯人或对’妥协材料’感兴趣的人,谁不会去追查爱泼斯坦档案呢?”佐治亚理工学院研究新兴技术在全球安全中作用的乔恩·林赛(Jon Lindsay)表示。”如果外国情报机构没有认真考虑将爱泼斯坦档案作为目标,那我会感到震惊。”
此次入侵事件于2月17日同时被美国有线电视新闻网(CNN)和路透社报道;法国《玛丽安娜》杂志(Marianne)指出了与爱泼斯坦材料的关联。
爱泼斯坦是唐纳德·特朗普总统的长期伙伴,2008年他因涉及未成年人的卖淫指控(包括引诱未成年女孩)认罪。2019年,在因涉嫌性交易未成年人的联邦指控再次被捕后,他在监狱牢房中被发现上吊身亡,当局裁定为自杀。
2023年2月入侵事件
据消息人士和文件显示,入侵发生在FBI纽约现场办公室的儿童剥削取证实验室的一台服务器被疏忽暴露安全漏洞后。特别探员亚伦·斯皮瓦克(Aaron Spivack)在尝试熟悉该局处理数字证据的复杂流程时,无意中造成了这一漏洞。
斯皮瓦克编写的时间线(包含在今年早些时候发布的大量爱泼斯坦相关文件中)显示入侵发生在2023年2月12日。文件称,次日斯皮瓦克打开电脑时发现一个文本文件警告其网络已被入侵。
进一步调查发现服务器上存在异常活动,文件补充道,这些活动”包括查阅与爱泼斯坦调查相关的某些文件”。
时间线未说明具体访问了哪些文件、黑客是否下载了数据或黑客身份。路透社无法确定受影响数据与今年早些时候公布的爱泼斯坦相关文件或仍被封存的文件是否有重叠。
斯皮瓦克的名字在其他与爱泼斯坦调查相关的文件中出现,但他未回复多次要求置评的信息。路透社无法联系到文件中提到的斯皮瓦克的律师理查德·J·罗伯逊二世(Richard J. Roberson, Jr.)。文件中提到的七名参与此次事件调查的FBI探员也未回复消息。
黑客与FBI通过视频聊天沟通
在向FBI调查人员说明自己是否对此次入侵负有责任的陈述中,斯皮瓦克表示自己正”被当作入侵事件的替罪羊”,并指责该局内部相互矛盾的政策和不完善的信息技术指导方针是问题根源。路透社无法确定该局内部调查的结果。
熟悉此次入侵事件的消息人士称,入侵由一名外国黑客实施,该黑客似乎未意识到自己已侵入执法部门服务器。消息人士称,黑客对设备上存在儿童虐待图像表示厌恶,并留下信息威胁要将设备所有者交给FBI。
消息人士还称,该局官员通过让黑客相信他们确实是FBI,从而化解了局势,部分通过让黑客加入视频聊天,在摄像头前展示执法机构证件。
路透社无法确定(消息人士称他们也不知道)黑客身份、其所在国家、对所获取材料的处理方式,或是否曾试图识别或惩罚其入侵FBI服务器的行为。
尽管去年有法律要求司法部全面公布相关文件,但许多文件已被大量编辑,其他文件则完全被保密。特朗普政府表示,他们扣留可能会泄露受害者身份或危及正在进行的调查的材料。
报道:Raphael Satter;编辑:David Gaffen
我们的标准:汤森路透信任原则。
Exclusive: Foreign hacker in 2023 compromised Epstein files held by FBI, source and documents show
By Raphael Satter
March 11, 2026 10:02 AM UTC Updated 1 hour ago
节点运行失败
Item 1 of 2 Ghislaine Maxwell and Jeffrey Epstein are seen in this image released by the Department of Justice in Washington, D.C., U.S., on December 19, 2025 as part of a new trove of documents from its investigations into the late financier and convicted sex offender Jeffrey Epstein. U.S. Justice Department/Handout via REUTERS /File Photo
[1/2]Ghislaine Maxwell and Jeffrey Epstein are seen in this image released by the Department of Justice in Washington, D.C., U.S., on December 19, 2025 as part of a new trove of documents from its investigations into the late financier and convicted sex offender Jeffrey Epstein. U.S. Justice… Read more
- Summary
- Foreign hacker accessed FBI files ‘pertaining to the Epstein investigation’ three years ago
- Hack raises concerns over foreign spies’ interest in the explosive documents
- FBI says its investigation into the incident is ongoing
WASHINGTON, March 11 (Reuters) – A foreign hacker compromised files relating to the FBI’s investigation of the late sex offender Jeffrey Epstein during a break-in at the bureau’s New York Field Office three years ago, according to a source familiar with the matter and recently published Justice Department documents reviewed by Reuters.
The details of who accessed a server at the FBI’s New York Field Office, including the allegation that a foreign hacker was involved, are being reported here for the first time.
The Reuters Iran Briefing newsletter keeps you informed with the latest developments and analysis of the Iran war. Sign up here.
Advertisement · Scroll to continue
In a statement, the FBI said what it described as a “cyber incident” was “an isolated one.”
“The FBI restricted access to the malicious actor and rectified the network. The investigation remains ongoing, so we do not have further comments to provide at this time.”
Although the source said the intrusion appeared to have been carried out by a cybercriminal rather than a foreign government, the incident underscores the files’ potential intelligence value, one academic said. The legally mandated publication of U.S. Justice Department documents has exposed the dead financier’s ties to prominent people in politics, finance, academia and business, triggering investigations in numerous countries around the world.
Advertisement · Scroll to continue
“Who wouldn’t be going after the Epstein files if you’re the Russians or somebody interested in kompromat?” said Jon Lindsay, who researches the role of emerging technology in global security at the Georgia Institute of Technology. “If foreign intelligence agencies are not thinking seriously about the Epstein files as a target, then I would be shocked.”
The breach was reported contemporaneously by CNN and Reuters on February 17; the connection to Epstein materials was made by the French magazine Marianne.
Epstein, a longtime associate of President Donald Trump, pleaded guilty in 2008 to prostitution charges, including soliciting an underage girl. He was found hanged in his jail cell in 2019, in what was ruled a suicide, after being arrested again on federal charges of sex trafficking of minors.
FEBRUARY 2023 BREAK-IN
The hack occurred after a server at the Child Exploitation Forensic Lab in the FBI’s New York Field Office was inadvertently left vulnerable by Special Agent Aaron Spivack, who was trying to navigate the bureau’s complex procedures for handling digital evidence, according to the source and the documents.
A timeline written by Spivack and included in the large cache of Epstein documents released earlier this year said the break-in happened on February 12, 2023. It was discovered the following day when Spivack turned on his computer and discovered a text file warning him that his network had been compromised, according to that document.
Further investigation turned up traces of unusual activity on the server, the document said, adding that the activity “included combing through certain files pertaining to the Epstein investigation.”
The timeline does not say which specific files were accessed, whether the hacker downloaded the data, or who the hacker was. Reuters could not establish what, if any, overlap the affected data had with the Epstein documents published earlier this year or the files that remain under wraps.
Spivack, whose name appears elsewhere in the documents in connection with the Epstein investigation, did not return repeated messages seeking comment. Reuters was unable to reach the man identified in the documents as Spivack’s lawyer, Richard J. Roberson, Jr. Seven FBI agents identified in the documents as being involved in the investigation into the incident did not return messages.
HACKER, FBI CHATTED BY VIDEO
In his statement to FBI investigators examining whether he was responsible for the breach, Spivack said he was being made “a scapegoat for the intrusion” and that conflicting bureau policies and faulty guidance around information technology were to blame. Reuters could not establish the result of the bureau’s internal investigation.
The person familiar with the breach said the intrusion was carried out by a foreign hacker who did not appear to realize they had penetrated a law enforcement server. The hacker expressed disgust at the presence of child abuse images on the device and left a message threatening to turn its owner over to the FBI, the person said.
The source said bureau officials defused the situation by convincing the hacker that they actually were the FBI, in part by having the hacker join a video chat where they flashed their law enforcement credentials in front of a web camera.
Reuters could not determine – and the source said they did not know – who the hacker was, what country they were operating from, what they did with the material accessed, or whether any effort was made to identify or punish them for breaking into the FBI’s server.
Many of the Justice Department’s documents have been heavily redacted and others have been kept secret altogether despite a law mandating their full release last year. The Trump administration says it is withholding material that could compromise victims’ identities or jeopardize ongoing investigations.
Reporting by Raphael Satter; editing by David Gaffen
Our Standards: The Thomson Reuters Trust Principles.
发表回复