{"id":218876,"date":"2017-06-12T10:13:58","date_gmt":"2017-06-12T14:13:58","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/5-unanswered-questions-raised-by-the-leaked-nsa-hacking-report-npr.php"},"modified":"2017-06-12T10:13:58","modified_gmt":"2017-06-12T14:13:58","slug":"5-unanswered-questions-raised-by-the-leaked-nsa-hacking-report-npr","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/5-unanswered-questions-raised-by-the-leaked-nsa-hacking-report-npr.php","title":{"rendered":"5 Unanswered Questions Raised By The Leaked NSA Hacking Report : NPR"},"content":{"rendered":"<p><p>            Here are 5 questions that were raised by the leaked NSA            hacking report and the ongoing threat that national            security officials say Russia poses to the integrity of            American elections. Patrick Semansky\/AP hide caption          <\/p>\n<p>          Here are 5 questions that were raised by the leaked NSA          hacking report and the ongoing threat that national          security officials say Russia poses to the integrity of          American elections.        <\/p>\n<p>    America's sprawling elections infrastructure has been called \"a    hairball\"  but as people in Silicon Valley might ask, is that    a feature or a bug?  <\/p>\n<p>    Then-FBI Director James Comey touted it as a good thing  \"the    beauty of our system,\" he told Congress, is that the \"hairball\"    is too vast, unconnected and woolly to be hacked from the    outside.  <\/p>\n<p>    That was before     Monday's leak of a top secret National Security Agency report    about a Russian election cyberattack. What that document    confirms is that if the whole is safe, its many individual    parts may not be.  <\/p>\n<p>    The NSA report,     posted by The Intercept, documents a scheme by Russia's    military intelligence agency, the GRU, to compromise the    systems of a Florida elections services company  then use that    access to explore local voting registration records.  <\/p>\n<p>    \"It is unknown whether the aforementioned spear-phishing    deployment successfully compromised the intended victims, and    what potential data could have been accessed by the cyber    actor,\" as one NSA analyst wrote in the report.  <\/p>\n<p>    Here are 5 other questions that remain unknown about this story    and the ongoing threat that national security officials say    Russia poses to the integrity of American elections.  <\/p>\n<p>    1. How widespread are these attacks?  <\/p>\n<p>    The Department of Homeland Security and U.S. intelligence    leaders     have said generally that voter registration rolls were a    pet target of Russian cyberattackers, but that Russia didn't    change any votes. The American leaders also have warned,    however, that they expect the Russian mischief to continue in    the 2018 and 2020 election cycles. If the GRU continues    operations like this elsewhere, how much better of an    understanding will it have of local elections officials and    their vendors next year or beyond?  <\/p>\n<p>    Elections systems analysts tell NPR that although electronic    voting machines are not connected to the public Internet, the    computers that update their firmware are, or the ones that    program them at the factory. It isn't clear what's practically    possible in this realm in terms of hacking or compromising    those systems; Comey told members of Congress that Russia has    attempted to tamper with votes \"in other countries,\" but the    details aren't clear.  <\/p>\n<p>    Even with the redactions, The Intercept made at the    request of the NSA to protect some of its key secrets, there    are tantalizing details about the extent of the GRU mischief.    One note makes clear that this so-called \"spear-phishing\"    campaign was separate from another major program known within    secret circles  though the name of that is blacked out.  <\/p>\n<p>    Another mention in the NSA report suggests that two-factor    authentication  the popular system in which Gmail, for    example, sends users a text message with a code they must enter    along with a password in order to log in  is not a failsafe    security feature. The GRU hackers were able to use fake    websites that used real Google verification codes to gain    access to victims' accounts.  <\/p>\n<p>    2. Can the federal government do    more?  <\/p>\n<p>    Then-DHS Secretary Jeh Johnson said last year that the federal    government was offering help across the board to local    elections officials to be aware of the Russian cyber-mischief.    And Comey told the Senate Intelligence Committee last month    that the government continued to provide information about the    ongoing threat.  <\/p>\n<p>    \"Two things we can do, and that we are doing, both in the    United States and with our allies, is telling the people    responsible for protecting the election infrastructure in the    United States everything we know about how the Russians and    others try to attack those systems,\" Comey said. \"How they    might come at it, what [Internet protocol] addresses they might    use, what phishing techniques they might use.\"  <\/p>\n<p>    That may have been one eventual goal for the NSA report posted    on Monday  it could have been the top secret original from    which DHS or other agencies might have created unclassified    advisories to send out to states.  <\/p>\n<p>    But is it enough just to share information about such a    sophisticated adversary? Local vendors and state officials    don't have vast IT resources or sophisticated    counterintelligence to help defend themselves against    state-actor adversaries. And states \"pushed back\" against    Johnson when he offered help last year, as former Director of    National Intelligence James Clapper told Congress  they    rejected what he called \"federal interference.\"  <\/p>\n<p>    Clapper said he believed Congress should designate the national    election apparatus \"critical infrastructure,\" the way the    U.S. has    labeled 16 other \"sectors,\" including the American chemical    industry, dams, the power grid and others. That could get very    complicated, however, and it would take time and cost money.  <\/p>\n<p>    3. Why do these leaks keep happening?  <\/p>\n<p>    The Justice Department has charged     a U.S. intelligence community contractor, Reality Winner,    with allegedly leaking the NSA report to The    Intercept. According to court documents, when the news    site's correspondents asked the NSA's public affairs office to    verify the report, that enabled the FBI to narrow down who had    access to it and pinpoint Winner.  <\/p>\n<p>    From the perspective of NSA leaders, that's a partial success    story: they plugged a leak quickly instead of having it turn    into a gusher. But at the same time Winner's case is just the    latest example of a contractor on the outer periphery of a spy    agency hazarding closely held secrets.  <\/p>\n<p>    Last month, tens of thousands of sensitive files connected to    the National Geospatial-Intelligence Agency were left on a    publicly accessible Amazon server by an engineer with    contractor Booz Allen Hamilton. Last year, an NSA contractor    also with Booz Allen was charged with hoarding a \"breathtaking\"    amount of sensitive material. And before that, NSA contractor    Edward Snowen took huge amounts of secret information about the    U.S. intelligence community and the military.  <\/p>\n<p>    Agency bosses, now led by Director of National Intelligence Dan    Coats, say they've focused intensely on what they call the    \"insider threat\" since the Snowden days, and the intelligence    community now has     a task force dedicated to helping snuff it out.  <\/p>\n<p>    The question that Winner's case again raises is how secure    Coats and agency leaders can make a constellation of 17    separate agencies that each has its own wider network of    contractors who support it.  <\/p>\n<p>    4. Why can't the U.S. stop these cyberattacks?  <\/p>\n<p>    Then-CIA Director John Brennan     called his counterpart in Russia last year to read him the riot    act: \"I said that all Americans, regardless of political    affiliation or whom they might support in the election, cherish    their ability to elect their own leaders without outside    interference or disruption,\" Brennan told the Senate last    month. \"I said American voters would be outraged by any Russian    attempt to interfere in the election.\"  <\/p>\n<p>    But Alexander Bortnikov, the head of Russia's FSB intelligence    agency  the successor to the infamous KGB  claimed he didn't    know anything about any election meddling. In Brennan's    telling, he promised he'd relay the details of the phone    conversation to Russian President Vladimir Putin.  <\/p>\n<p>    President Barack Obama also is believed to have warned Putin to    knock off the interference  with no result. The NSA report    posted on Monday describes a cyberattack that lasted until just    before Election Day in November,     well after the U.S. announced publicly that Russia had been    responsible for campaign mischief.  <\/p>\n<p>    U.S. intelligence officials said at the time that they believed    so-called \"attribution\" was a powerful weapon. The FBI later    issued indictments for Russian intelligence officers and others    involved with the meddling, making public how much information    Americans have about what's taking place behind the scenes.  <\/p>\n<p>    None of it, however, appears to have made a difference. Coats,    Comey, Brennan and other leaders continue to warn that Russian    cyber-mischief proceeds, that Moscow considers it successful    and that it could ramp up again in the 2018 midterm and 2020    presidential elections. One political scientist told NPR the    world of foreign meddling is \"the new normal.\"  <\/p>\n<p>    Is that so, or can the U.S. government do more  launch    cyberattacks of its own, impose further restrictions on Russia    or take some other step  to impose greater costs on the    Russians?  <\/p>\n<p>    5. Will this change Trump's tune?  <\/p>\n<p>    \"As far as hacking, I think it was Russia,\"    then-President-elect Trump said at a news conference before    Inauguration Day.  <\/p>\n<p>    Since then, however, he's dismissed the election-meddling story    as an excuse created by Democrats to cover up Hillary Clinton's    loss, or opined that cyberspace is so complicated that no one    could ever know for certain who might have been behind it.    Russian President Vladimir     Putin made the same point over the weekend to NBC News' Megyn    Kelly.  <\/p>\n<p>    The NSA report leaked on Monday, however, shows that, in fact,    American intelligence officers have a highly detailed technical    understanding about how much of Russia's hacking operation    works. They attribute the scheme without hesitation to the GRU    and talk in detail about the software and other tools used to    try to compromise the victims' computers.  <\/p>\n<p>    It was one thing for the intelligence community to conclude    that Russia had interfered and not explain how it knew. Now    there are more clues in the open about how it knows. And the    report, completed in May, shows that its analysis continues    about the ways Russia's intelligence agencies attacked the U.S    during the 2016 cycle.  <\/p>\n<p>    Trump     rejects any notion that his campaign aides might have colluded    with the Russian operatives who meddled in the election,    but does the emergence of this NSA document make it tougher for    him to continue to question whether it even happened?  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Original post: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.npr.org\/2017\/06\/06\/531764199\/5-unanswered-questions-raised-by-the-leaked-nsa-hacking-report\" title=\"5 Unanswered Questions Raised By The Leaked NSA Hacking Report : NPR\">5 Unanswered Questions Raised By The Leaked NSA Hacking Report : NPR<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Here are 5 questions that were raised by the leaked NSA hacking report and the ongoing threat that national security officials say Russia poses to the integrity of American elections. Patrick Semansky\/AP hide caption Here are 5 questions that were raised by the leaked NSA hacking report and the ongoing threat that national security officials say Russia poses to the integrity of American elections. America's sprawling elections infrastructure has been called \"a hairball\" but as people in Silicon Valley might ask, is that a feature or a bug?  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/5-unanswered-questions-raised-by-the-leaked-nsa-hacking-report-npr.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-218876","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/218876"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=218876"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/218876\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=218876"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=218876"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=218876"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}