DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

The RNC stopped paying a data firm after a serious breach — then paid a mysterious LLC with the same address

Posted on March 1, 2020 by Dissent

The RNC Stopped Paying a Data Firm After A Serious Breach. Then It Paid A Mysterious LLC With the Same Address.

Three years after the Republican National Committee publicly sidelined the sullied firm, it paid an LLC with the same address $900,000 for “data services.” The RNC said it wouldn’t “waste any more breath explaining these innocuous issues.”

by Mike Spies and Jake Pearson

Feb. 28, 12 p.m. EST

ProPublica is a Pulitzer Prize-winning investigative newsroom. Sign up for The Big Story newsletter to receive stories like this one in your inbox.

Last fall the Republican National Committee paid $900,000 for “data services” to a Delaware-registered limited liability corporation that had existed for only three weeks.

The company receiving the money has no online presence and has not been used by other campaigns or committees. But there is one clue about the company, Howler Insights LLC, in paperwork the RNC filed with the Federal Election Commission. Howler’s Arlington, Virginia, address and suite number are the same as a conservative data firm whose work for the RNC was placed on hold nearly three years ago after a massive data breach.

The incident left personal information such as voter registration details, names, addresses, phone numbers and potential ethnicities of about 200 million Americans accessible to anyone on the internet. At the time, the security consultant who identified the breach called it the “largest known data exposure of its kind.”

The RNC said then that it would halt business with the company, Deep Root Analytics, because it “takes the security of voter information very seriously and we require vendors to do the same.” Although Deep Root does business with other campaigns and committees, the RNC has not directly paid the company since August 2017, shortly after the breach occurred, FEC filings show.

Sara Fagen, Deep Root’s chief executive, said in a brief email that Howler Insights is “related” to Deep Root, which uses data to help Republican political campaigns and organizations target their digital and television messaging. She offered few details about Howler’s work or its relationship with the RNC. “I formed it b/c it’s a new product offering that I plan to keep separate from our traditional TV analytics work,” she wrote.

The Howler transaction occurred under Richard Walters, the RNC’s chief of staff, whose many responsibilities include executing all of the organization’s vendor contracts. In 2019, the RNC raised and spent record-breaking sums, taking in $241 million and dolling out $192 million. Last week, ProPublica reported that the RNC paid Walters and a small group of party operatives, one of whom Walters previously worked for, through a number of opaque business entities.

In Walters’ case, he received $135,000 through a shell company, in addition to a salary that earned him more than $200,000. The arrangement obscured Walters’ total compensation last year, which allowed him to take in more cash than his boss, chairwoman Ronna McDaniel.

Larry Noble, a former FEC general counsel, told ProPublica that the payments to the shell company, Red Wave Strategies LLC, amounted to a “serious reporting violation.” The RNC disputed the allegation, but hasn’t addressed why it steered money through Red Wave from April to December of 2019. The most recently filed FEC reports show the RNC did not pay the company in January, the same month ProPublica first inquired about the arrangement.

The organization has defended Walters’ compensation and top officials commended his abilities and work as chief of staff. Glenn McCall, the RNC’s budget committee chair, said Walters is “probably underpaid for his position,” and McDaniel said Walters had overseen “massive new investments” in the RNC’s data, political and digital teams.

Chris Vickery, the researcher who first identified Deep Root’s data breach, told ProPublica that Deep Root’s failure to protect its data had huge implications.

“There’s no end to the amount of scams and fraud and harassment and stalking with that kind of concentrated collection of data — both publicly available and private, non-publicly available data,” he said.

In response to a Florida lawsuit brought against the company on behalf of voters whose data was exposed, lawyers for Deep Root said in court papers that since the breach Deep Root “has imposed additional security protocols and restrictions on its data.” The lawsuit was voluntarily withdrawn in 2017.

After ProPublica asked Mike Reed, an RNC spokesman, about Howler, Deep Root and the change in Walters’ compensation arrangement, he provided a statement.

“It is obvious that ProPublica has a severe bias against conservatives and President Trump and zero interest in reporting on this fairly,” he said. “So we aren’t going to waste any more breath explaining these innocuous issues to you.”

Reed told ProPublica last week that in addition to Walters, the organization’s budget is approved by two committees and voted on by its 168 members.

 

Category: Commentaries and AnalysesMiscellaneous

Post navigation

← Meet the white-hat group fighting Emotet, the world’s most dangerous malware
GA: Records reveal City of Cartersville paid ransomware attackers $380K →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Massachusetts hacker to plead guilty to PowerSchool data breach
  • Cyberattack brings down Kettering Health phone lines, MyChart patient portal access (1)
  • Gujarat ATS arrests 18-year-old for cyberattacks during Operation Sindoor
  • Hackers Nab 15 Years of UK Legal Aid Applicant Data
  • Supplier to major UK supermarkets Aldi, Tesco & Sainsbury’s hit by cyber attack with ransom demand
  • UK: Post Office to compensate hundreds of data leak victims
  • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
  • Cocospy stalkerware apps go offline after data breach
  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.