A little-known company is thrust into national view after one of its employees in Augusta allegedly leaked top-secret intelligence documents to the media.
Reality Leigh Winner, 25, worked as a contractor for Pluribus International Corporation at a U.S. government facility. She's accused of giving the news site, The Intercept, a top-secret National Security Agency report about Russia's interference with the 2016 presidential election.
What is Pluribus?
This is one of several questions the AJC is working to answer following Winner’s arrest.
The company’s website appeared to be down Tuesday, but internet archives have a recent version saved. The site says the company, founded in 2004, is based in Alexandria, Virginia, and specializes in “high quality analytical, operational, engineering and program management support” to the U.S. government. Its clients include agencies in federal defense, security, military and intelligence.
Related: Who is Reality Leigh Winner, the alleged NSA leaker?
Related: Exclusive - Accused NSA leaker's stepdad: 'She is a patriot'
Related: What's spear-phishing, Russia's alleged voter hacking technique?
Pluribus supports its clients with contractors at locations across the country, in Europe and in Asia, the site says. It offers contractors with expertise in translation, intelligence, counterintelligence and counterterrorism.
The company, which reports $100 million annual revenue, bills itself as a small business, “which enables us to provide dedicated and responsive support to our customers.”
Winner had been working at the company almost four months, and had a Top Secret security clearance.
The AJC has several staffers — including in Augusta and Winner’s hometown of Kingsville, Texas — reporting on this story throughout the day offering exclusives including interviews with family and others who know Winner, Georgia’s expanding cybersecurity community and the impact of the leak on election security. Visit myAJC.com for the latest updates, such as what we know about the alleged leak, The Intercept and spear-phishing.
About the Author