{"id":197097,"date":"2017-06-07T16:57:50","date_gmt":"2017-06-07T20:57:50","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/leaked-nsa-doc-highlights-deep-flaws-in-us-election-system-gainesville-sun\/"},"modified":"2017-06-07T16:57:50","modified_gmt":"2017-06-07T20:57:50","slug":"leaked-nsa-doc-highlights-deep-flaws-in-us-election-system-gainesville-sun","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/leaked-nsa-doc-highlights-deep-flaws-in-us-election-system-gainesville-sun\/","title":{"rendered":"Leaked NSA doc highlights deep flaws in US election system &#8211; Gainesville Sun"},"content":{"rendered":"<p><p>    Experts say the U.S. election system remains profoundly    vulnerable to trickery or sabotage.  <\/p>\n<p>    HOUSTON  A leaked intelligence document outlining alleged    attempts by Russian military intelligence to hack into U.S.    election systems is the latest evidence suggesting a broad and    sophisticated foreign attack on the integrity of the nation's    elections.  <\/p>\n<p>    And it underscores the contention of security experts and    computer scientists that the highly decentralized, often    ramshackle U.S. election system remains profoundly vulnerable    to trickery or sabotage .  <\/p>\n<p>    The document, purportedly produced by the U.S. National    Security Agency, does not indicate whether actual    vote-tampering occurred. But it adds significant new detail to    previous U.S. intelligence assessments that alleged    Russia-backed hackers had compromised elements of America's    electoral machinery. It also suggests that attackers may also    have been laying groundwork for future subversive activity.  <\/p>\n<p>    The operation described in the document could have given    attackers \"a foothold into the IT systems of elections offices    around the country that they could use to infect machines and    launch a vote-stealing attack,\" said J. Alex Halderman, a    University of Michigan computer scientist. \"We don't have    evidence that that happened,\" he said, \"but that's a very real    possibility.\"  <\/p>\n<p>    Computer scientists have proven in the lab that once    sophisticated attackers are inside an election network, they    could manipulate pre-election programming of its systems and    alter results without leaving a trace.  <\/p>\n<p>    Sen. Mark Warner of Virginia, the ranking Democrat on the    Senate intelligence committee, said Tuesday that hacking into    state voting systems ahead of the Nov. 8 vote was more    widespread than has been disclosed.  <\/p>\n<p>    Attempts by Russia to \"break into a number of our state voting    processes\" was \"broad-based,\" he said, without offering    details. In Moscow, a Kremlin spokesman categorically denied    Tuesday that Moscow had tried to hack the U.S. elections.  <\/p>\n<p>    Warner did not directly address the classified intelligence    report published Monday by The Intercept, an online news    outlet. The Associated Press has not independently verified the    authenticity of the report, although its apparent leaker, an    NSA contract worker, was arrested last weekend in Georgia.  <\/p>\n<p>    The NSA document says Russian military intelligence first    targeted employees of a Florida voting systems supplier in    August. Apparently exploiting technical data obtained in that    operation, the cyber spies later sent phishing emails to more    than 100 local U.S. election officials just days ahead of the    Nov. 8 vote, intent on stealing their login credentials and    breaking into the their systems, the document says.  <\/p>\n<p>    The emails packed malware into Microsoft Word documents and    were forged to give the appearance of being sent by the system    vendor, VR Systems of Tallahassee, Florida.  <\/p>\n<p>    The Department of Homeland Security knew in September that    hackers believed to be Russian agents had targeted the voter    registration systems of more than 20 states. To date, no    evidence of tampering with vote tallies or registration rolls    has emerged.  <\/p>\n<p>    The U.S. elections system is a patchwork of more than 3,000    jurisdictions overseen by the states with almost no federal    oversight or standards. The attack sketched out in the NSA    document appears designed specifically to cope with that    sprawl.  <\/p>\n<p>    The NSA document did not name any of the states where local    officials were targeted by the emails masquerading as being    from VR Systems.  <\/p>\n<p>    But in September, the FBI held a conference call with all 67    county elections supervisors in the battleground state of    Florida to inform them of infiltration of VR Systems without    naming the company. Ion Sancho, who retired as Leon County    supervisor in December, said he later learned from industry    contacts that it was VR Systems.  <\/p>\n<p>    VR Systems officials did not respond directly to questions    emailed by the AP. In a statement, the company said it only    knows of a \"handful\" of customers who received the fraudulent    email, adding that it had \"no indication\" that anyone had    clicked on the malware. The NSA document says at least one    account was likely compromised.  <\/p>\n<p>    The company makes software for on-site voter registration at    polling stations and backend systems for voting management,    according to its website, which says it has customers in    California, Florida, Illinois, Indiana, New York, North    Carolina, Virginia, and West Virginia.  <\/p>\n<p>    VR Systems' electronic poll books  electronic systems used to    verify registered voters at polling places  experienced    problems on Nov. 8 in Durham County, North Carolina. The issue    forced officials to abandon the system, issue paper ballots and    extend voting hours.  <\/p>\n<p>    North Carolina's state elections director said Tuesday that    officials would investigate to see if officials in Durham    County were targeted and possibly compromised.  <\/p>\n<p>    Iowa University's Douglas Jones is among computer scientists    who say voter registration systems are particularly vulnerable    to tampering, in part because they are on the internet.  <\/p>\n<p>    Someone trying to cause chaos and discredit an election could    delete names from registration rolls prior to voting  or    request absentee ballots en masse. In the latter case, a voter    showing up at the polls on Election Day would be recorded as    having already cast their ballot. That could force voters to    file provisional ballots, and provoke long lines.  <\/p>\n<p>    There is no evidence any of that happened last Election Day.  <\/p>\n<p>    ___  <\/p>\n<p>    Satter reported from Paris. Associated Press writers Deb    Riechmann in Washington, D.C., and Emery D'Alesio in Raleigh,    N.C., contributed to this report.  <\/p>\n<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the original post here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.gainesville.com\/news\/20170607\/leaked-nsa-doc-highlights-deep-flaws-in-us-election-system\" title=\"Leaked NSA doc highlights deep flaws in US election system - Gainesville Sun\">Leaked NSA doc highlights deep flaws in US election system - Gainesville Sun<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Experts say the U.S. election system remains profoundly vulnerable to trickery or sabotage. HOUSTON A leaked intelligence document outlining alleged attempts by Russian military intelligence to hack into U.S <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/leaked-nsa-doc-highlights-deep-flaws-in-us-election-system-gainesville-sun\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-197097","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/197097"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=197097"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/197097\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=197097"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=197097"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=197097"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}