Facebook

Facebook Will Open a 'War Room' Next Week To Monitor Election Interference (theverge.com) 218

An anonymous reader quotes a report from The Verge: Sheera Frankel and Mike Isaac [write from The New York Times]: "Sandwiched between Building 20 and Building 21 in the heart of Facebook's campus, an approximately 25-foot by 35-foot conference room is under construction. Thick cords of blue wiring hang from the ceiling, ready to be attached to window-size computer monitors on 16 desks. On one wall, a half dozen televisions will be tuned to CNN, MSNBC, Fox News and other major cable networks. A small paper sign with orange lettering taped to the glass door describes what's being built: "War Room."

Set to open next week, the conference room is in keeping with Facebook's nick-of-time approach to midterm election preparedness. (It introduced a "pilot program" for candidate account security on Monday.) It's a big project. Samidh Chakrabarti, who oversees elections and civic engagement, told the Times: "We see this as probably the biggest companywide reorientation since our shift from desktops to mobile phones." Of course, the effort extends beyond the new conference room. Chakrabarti showed the Times a new internal tool "that helps track information flowing across the social network in real time," helping to identify misinformation as it goes viral or a surge in the creation of new (and likely fake) accounts.

Government

US Senate Staff Targeted By State-Backed Hackers, Senator Says (pbs.org) 62

An anonymous reader quotes a report from PBS NewsHour: Sen. Ron Wyden, an Oregon Democrat, said in a Wednesday letter to Senate leaders that his office discovered that "at least one major technology company" has warned an unspecified number of senators and aides that their personal email accounts were "targeted by foreign government hackers." Similar methods were employed by Russian military agents who leaked the contents of private email inboxes to influence the 2016 elections. Wyden did not specify the timing of the notifications, but a Senate staffer said they occurred "in the last few weeks or months." But the senator said the Office of the Sergeant at Arms, which oversees Senate security, informed legislators and staffers that it has no authority to help secure personal, rather than official, accounts. "This must change," Wyden wrote in the letter. "The November election grows ever closer, Russia continues its attacks on our democracy, and the Senate simply does not have the luxury of further delays."
Google

Leaked Video Shows Google Executives' Candid Reaction To Trump Victory (theguardian.com) 558

A number of Slashdot users have shared a leaked Google video from Breitbart, revealing the candid reactions of company executives to Donald Trump's unexpected victory in 2016. The Guardian summarizes: In an hour-long conversation, Google co-founders Sergey Brin and Larry Page, chief executive Sundar Pichai, and executives Kent Walker, Ruth Porat and Eileen Noughton offered their reflections on the election, sought to reassure employees about issues such as immigration status and benefits for same-sex partners, and answered questions on topics ranging from filter bubbles and political polarization to encryption and net neutrality. The executives' reactions ranged from the emotional to the philosophical to the purely pragmatic. Porat appeared near tears in discussing her open support for Hillary Clinton and her father, who was a refugee. Walker discussed global political trends toward nationalism, populism and xenophobia. Pichai noted that the company was already "thoughtfully engaging" with Trump's transition team. While Breitbart argues the video shows evidence of Google's inherent bias against Republicans, Google says the executives are simply sharing their "personal views" and that it has no political bias. It does beg the question, should politics be discussed in the workplace? Longtime Slashdot reader emil writes in response to the video: [...] Disregarding the completely inappropriate expression of partisan views in the workplace, the video claims that "history is our side." These executives appear to have forgotten the incredible tumult in the distant past of the U.S. The last election was not an electoral tie that was thrown into the house of representatives (as was the election of 1800). The last election did not open a civil war as happened in 1861 when Lincoln took office. The last election did not open war with Great Britain, and will likely not precipitate a new set of proposed constitutional amendments to curb presidential power as did either of James Madison's terms in office (War of 1812, Hartford Convention). There may be a time for tears, and a time for hugs, but that time cannot be in the workplace. Most Fortune 500 employees took the news of the latest president elect with quiet perseverance in their professional settings regardless of their leanings, and it is time for Google to encourage the same. "At a regularly scheduled all-hands meeting, some Google employees and executives expressed their own personal views in the aftermath of a long and divisive election season," Google said in a statement. "For over 20 years, everyone at Google has been able to freely express their opinions at these meetings. Nothing was said at that meeting, or any other meeting, to suggest that any political bias ever influences the way we build or operate our products. To the contrary, our products are built for everyone, and we design them with extraordinary care to be a trustworthy source of information for everyone, without regard to political viewpoint."
Government

Trump To Target Foreign Meddling In US Elections With Sanctions Order (reuters.com) 187

An anonymous reader shares an exclusive report from Reuters: President Donald Trump plans to sign an executive order as soon as Wednesday that will slap sanctions on any foreign companies or people who interfere in U.S. elections, based on intelligence agency findings, two sources familiar with the matter said. Trump's decision to sign an executive order coincides with intelligence agencies, military and law enforcement preparing to defend the Nov. 6 congressional elections from predicted foreign attacks even as Trump derides a special counsel investigation into Russian interference in the 2016 elections.

Sanction targets could include individual people or entire companies accused of interfering in U.S. elections by cyber attacks or other means, a U.S. official told Reuters. The order will put a range of agencies in charge of deciding if meddling occurred, led by the Office of the Director of National Intelligence, and including the CIA, the National Security Agency and the Homeland Security Department, the sources said. Based on a recent draft of the order reviewed by the U.S. official, it will require any federal agency aware of election interference by foreigners to take the information to the office of Director of National Intelligence. Election interference will be defined in the order as hacking attempts against "election infrastructure," and efforts to sway public opinion through coordinated digital propaganda or systematic leaks of private political information.
UPDATE: The story has been updated with additional information from Reuters.
United States

Pretty Clear GRU's Goal Was To Weaken a Future Clinton Presidency, Former Facebook CSO Says (zdnet.com) 345

Speaking at the TechCrunch Disrupt tech conference this week, former Facebook chief security officer Alex Stamos reflected on his time dealing with fake news and Russian intelligence interference ahead and after the 2016 US presidential election. From a report: The former Facebook security head said "it [was] pretty clear the GRU's goal was to weaken a future Hillary presidency. Putin has a [you know, it's been well-documented] like a personal antipathy towards her and believes that she was behind the protests against him in the 2012 Russian election, and so, the GRU activity was specifically focused on weakening her."

"I think it was less about actually electing Trump," Stamos added. "I find it unlikely that the Russians are better than Nate Silver at predicting elections."
What kind of attacks could we expect in the near future? Per Stamos, "Throwing an election one way or another is going to be very difficult for a foreign adversary but throwing any election into chaos is totally doable right now."
Government

Blockchains Are Not Safe For Voting, Concludes NAP Report (nytimes.com) 106

The National Academies Press has released a 156-page report, called "Securing the Vote: Protecting American Democracy," concluding that blockchains are not safe for the U.S. election system. "While the notion of using a blockchain as an immutable ballot box may seem promising, blockchain technology does little to solve the fundamental security issues of elections, and indeed, blockchains introduce additional security vulnerabilities," the report states. "In particular, if malware on a voter's device alters a vote before it ever reaches a blockchain, the immutability of the blockchain fails to provide the desired integrity, and the voter may never know of the alteration."

The report goes on to say that "Blockchains do not provide the anonymity often ascribed to them." It continues: "In the particular context of elections, voters need to be authorized as eligible to vote and as not having cast more than one ballot in the particular election. Blockchains do not offer means for providing the necessary authorization. [...] If a blockchain is used, then cast ballots must be encrypted or otherwise anonymized to prevent coercion and vote-selling." The New York Times summarizes the findings: The cautiously worded report calls for conducting all federal, state and local elections on paper ballots by 2020. Its other top recommendation would require nationwide use of a specific form of routine postelection audit to ensure votes have been accurately counted. The panel did not offer a price tag for its recommended overhaul. New York University's Brennan Center has estimated that replacing aging voting machines over the next few years could cost well over $1 billion. The 156-page report [...] bemoans a rickety system compromised by insecure voting equipment and software whose vulnerabilities were exposed more than a decade ago and which are too often managed by officials with little training in cybersecurity.

Among its specific recommendations was a mainstay of election reformers: All elections should use human-readable paper ballots by 2020. Such systems are intended to assure voters that their vote was recorded accurately. They also create a lasting record of "voter intent" that can be used for reliable recounts, which may not be possible in systems that record votes electronically. [...] The panel also calls for all states to adopt a type of post-election audit that employs statistical analysis of ballots prior to results certification. Such "risk-limiting" audits are designed to uncover miscounts and vote tampering. Currently only three states mandate them.

Government

White House Says Anonymous 'Coward' Behind New York Times Op-Ed Should Resign (freerepublic.com) 898

Earlier today, The New York Times published an op-ed from an anonymous staffer in the Trump administration, who has "vowed to thwart parts of [President Trump's] agenda and his worst inclinations," citing the president's amorality. The staffer writes: "We want the administration to succeed and think that many of its policies have already made America safer and more prosperous. But we believe our first duty is to this country, and the president continues to act in a manner that is detrimental to the health of our republic. That is why many Trump appointees have vowed to do what we can to preserve our democratic institutions while thwarting Mr. Trump's more misguided impulses until he is out of office." An anonymous [coward] shares the response from the White House: White House Press Secretary Sarah Sanders ripped the anonymous senior White House staffer who wrote an op-ed for The New York Times slamming President Trump's conduct. "The individual behind this piece has chosen to deceive, rather than support, the duly elected President of the United States," she said in a statement. "He is not putting country first, but putting himself and his ego ahead of the will of the American people. This coward should do the right thing and resign," she added. Trump himself called the op-ed's author "gutless." He tweeted: "Does the so-called 'Senior Administration Official' really exist, or is it just the Failing New York Times with another phony source? If the GUTLESS anonymous person does indeed exist, the Times must, for National Security purposes, turn him/her over to government at once!"

The New York Times op-ed page editor Jim Dao described the process behind publishing the op-ed, telling CNN that the official contacted him "through an intermediary." He said that the New York Times also spoke with the anonymous individual but there are only a "very small number of people within the Times who know this person's identity." Dao didn't provide a gender for the person, but the author was described in a New York Times tweet as a "he" earlier Wednesday. [The Times later said that the tweet was a mistake and that it "was drafted by someone who is not aware of the author's identity."] Furthermore, Dao "said there was no special effort to disguise the person's writing style, for example by rewriting the piece in some fashion," reports CNN. "'There's editing in everything we do,' he said, but it's based on making the person's views 'clearer' and adhering to style standards."

A separate CNN article highlights 12 senior Trump administration officials who may be behind the op-ed.
Government

Facebook, Twitter Execs Admit Failures, Warn of 'Overwhelming' Threat To Elections (gizmodo.com) 250

Openly recognizing their companies' past failures in rare displays of modesty, Facebook and Twitter executives touted new efforts to combat state-sponsored propaganda across their platforms before the Senate Intelligence Committee on Wednesday, acknowledging that the task is often "overwhelming" and proving a massive drain on their resources. Gizmodo: In opening remarks on Wednesday, Facebook's chief operating officer, Sheryl Sandberg, acknowledged that Facebook had been "too slow to act" in 2016 against the Kremlin-backed campaign that was designed to sow discord among American voters. "That's on us," she said, describing Moscow's meddling as "completely unacceptable" and a violation of Facebook's values "and of the country we love." "We're investing for the long term because security is never a finished job," Sandberg added, noting that Facebook has increased its security and communications staff to 20,000 people, doubling it over the past year. "Our adversaries are determined, creative, and well-funded," she said. "But we are even more determined -- and we will continue to fight back."

Twitter CEO Jack Dorsey, meanwhile, portrayed the matter as not just a threat to democracy, but as a threat to the overall health and security of his business, saying that above all else, Twitter's goal is to serve a "global public conversation." Dorsey also acknowledged a range of threats faced by his company, including widespread abuse, manipulation by foreign powers, and "malicious automation" (i.e., bots). "Any attempts to undermine the integrity of our service is antithetical to our fundamental rights," he said, calling freedom of expression a "core tenant" upon which the Twitter is based.
Google, which was also asked to appear before the committee, chose not to do so. An empty chair was left at the table next to Sandberg and Dorsey to signify Google's absence.
Open Source

Open Source Devs Reverse Decision to Block ICE Contractors From Using Software (vice.com) 427

An anonymous reader quotes Motherboard: Less than 24 hours after a software developer revoked access to Lerna, a popular open-source software management program, for any organization that contracted with U.S. immigrations and Customs Enforcement, access has been restored for any organization that wishes to use it and the developer has been removed from the project... The modified version specifically banned 16 organizations, including Microsoft, Palantir, Amazon, Northeastern University, Johns Hopkins University, Dell, Xerox, LinkedIn, and UPS... Although open-source developer Jamie Kyle acknowledged that it's "part of the deal" that anyone "can use open source for evil," he told me he couldn't stand to see the software he helped develop get used by companies contracting with ICE.

Kyle's modification of Lerna's license was originally assented to by other lead developers on the project, but the decision polarized the open-source community. Some applauded his principled stand against ICE's human rights violations, while others condemned his violation of the spirit of open-source software. Eric Raymond, the founder of the Open Source Initiative and one of the authors of the standard-bearing Open Source Definition, said Kyle's decision violated the fifth clause of the definition, which prohibits discrimination against people or groups. "Lerna has defected from the open-source community and should be shunned by anyone who values the health of that community," Raymond wrote in a blog post on his website.

The core contributor who eventually removed Kyle also apologized for Kyle's licensing change, calling it a "rash decision" (which was also "unenforceable.")

Eric Raymond had called the decision "destructive of one of the deep norms that keeps the open source community functional -- keeping politics separated from our work."
NASA

Texas Lawmakers Press NASA To Base Lunar Lander Program In Houston (arstechnica.com) 128

Eric Berger writes via Ars Technica: The Apollo missions that flew to the Moon during the 1960s were designed and controlled by what is now known as Johnson Space Center, the home of the famous "Mission Control." Moreover, the astronauts that flew to the Moon all lived in Houston. It would stand to reason, therefore, that as NASA gears up to return to the Moon, major elements of this program would likewise be controlled from the Texas metropolis that styles itself "Space City." Times change, however. In recent months, the politically well-positioned Marshall Space Flight Center, in Huntsville, Alabama, has been quietly pressing leaders with NASA Headquarters for program management of mid- to large-size landers to the lunar surface, which would evolve into human landers. Sources indicated this effort was having some success.

However, Texas legislators have now begun to push back. On Tuesday, both of Texas' senators (John Cornyn and Ted Cruz), as well as three representatives with space-related committee chairs (John Culberson, Lamar Smith, and Brian Babin), wrote a letter to NASA Administrator Jim Bridenstine. "We support NASA's focus on returning to the Moon and using it as part of a stepping stone approach to place American boots on the surface of Mars in the 2030s," the Texas Republicans wrote. "As NASA reviews solicitations for lunar landers, we write to express our strong support for the establishment of NASA's lunar lander program at the Johnson Space Center." The letter reminds Bridenstine of Houston's strong spaceflight heritage.

Censorship

Google Debunks Trump's Claim It Censored His State of the Union Address (theverge.com) 508

An anonymous reader quotes a report from The Verge: President Donald Trump intensified his criticism of Google today, posting a native video of unknown origin to his Twitter account this afternoon claiming the search giant stopped promoting the State of the Union (SOTU) address on its homepage after he took office. It turns out the video he posted is not only misleading, but also contains what appears to be a fake screenshot of the Google homepage on the day in question. It has since been viewed more than 1.5 million times. In a statement given to The Verge, a Google spokesperson clarifies that the company promoted neither former President Barack Obama nor Trump's inaugural SOTU addresses in 2009 and 2017, respectively. That's because they were not technically State of the Union addresses, but "addresses to a joint session" of Congress, a tradition set back in 1993 so that new presidents didn't have to immediately deliver SOTU addresses after holding office for just a few weeks. Google resumed promoting Obama's SOTU address in 2010 and continued to do so through 2016, as he held office for all six of those years.

With regards to the 2018 SOTU, Google says it did in fact promote it on its homepage. "On January 30th 2018, we highlighted the livestream of President Trump's State of the Union on the google.com homepage," reads Google's statement. "We have historically not promoted the first address to Congress by a new President, which is not a State of the Union address. As a result, we didn't include a promotion on google.com for this address in either 2009 or 2017."

Security

No, a Teen Did Not Hack a State Election (propublica.org) 73

Headlines from Def Con, a hacking conference held this month in Las Vegas, might have left some thinking that infiltrating state election websites and affecting the 2018 midterm results would be child's play. Articles reported that teenage hackers at the event were able to "crash the upcoming midterm elections" and that it had taken "an 11-year-old hacker just 10 minutes to change election results." A first-person account by a 17-year-old in Politico Magazine described how he shut down a website that would tally votes in November, "bringing the election to a screeching halt." But now, elections experts are raising concerns that misunderstandings about the event -- many of them stoked by its organizers -- have left people with a distorted sense of its implications. From a report: In a website published before r00tz Asylum, the youth section of Def Con, organizers indicated that students would attempt to hack exact duplicates of state election websites, referring to them as "replicas" or "exact clones." (The language was scaled back after the conference to simply say "clones.") Instead, students were working with look-alikes created for the event that had vulnerabilities they were coached to find. Organizers provided them with cheat sheets, and adults walked the students through the challenges they would encounter. Josh Franklin, an elections expert formerly at the National Institute of Standards and Technology and a speaker at Def Con, called the websites "fake." "When I learned that they were not using exact copies and pains hadn't been taken to more properly replicate the underlying infrastructure, I was definitely saddened," Franklin said. Franklin and David Becker, the executive director of the Center for Election Innovation & Research, also pointed out that while state election websites report voting results, they do not actually tabulate votes. This information is kept separately and would not be affected if hackers got into sites that display vote totals.
Security

Senators Demand Voting Machine Vendor Explain Why It Dismisses Researchers Prodding Its Devices (bleepingcomputer.com) 62

Four US senators, members of the US Senate Select Committee on Intelligence, sent a letter on Wednesday to Election Systems and Software (ES&S), the largest voting machine vendor in the US, asking for clarifications on why the vendor is trying to discourage independent security reviews of its products. From a report: The four senators who signed the letter are Kamala D. Harris (D-CA), Mark Warner (D-VA), Susan Collins (R-ME), and James Lankford (R-OK). The senators sent the letter to ES&S following the conclusion of the Voting Village at the DEF CON 26 security conference held in Las Vegas at the start of the month, where security researchers found several security vulnerabilities in the company's products. "We are disheartened that ES&S chose to dismiss these demonstrations as unrealistic and that your company is not supportive of independent testing," the letter reads. "Many of the world's leading electronics and software companies have opened their arms to the research community, maintaining active presences at the largest security research conferences and inviting 'white hat' hackers to probe their products to identify how they can improve product security," the letter continued. At DEF CON, security researchers found vulnerabilities in the voting machines of other vendors. Only ES&S is mentioned in the senators' letter because of the company's dismissive approach to external security research.
Social Networks

Trump Accuses Social Media Firms of 'Silencing Millions' (reuters.com) 570

U.S. President Donald Trump accused social media companies on Friday of silencing "millions of people" in an act of censorship, but without offering evidence to support the claim. From a report: "Social Media Giants are silencing millions of people. Can't do this even if it means we must continue to hear Fake News like CNN, whose ratings have suffered gravely. People have to figure out what is real, and what is not, without censorship!" Trump wrote on Twitter, not mentioning any specific companies. Trump also criticized social media outlets last week, saying without providing proof that unidentified companies were "totally discriminating against Republican/Conservative voices." Mr. President's Friday remarks comes days after he expressed concerns over Twitter and Facebook regulating the content on their own platforms. He found such practice "very dangerous."
Media

Reality Winner Sentenced To More Than 5 Years For Leaking Info About Russia Hacking Attempts (nbcnews.com) 261

A former government contractor who pleaded guilty to leaking U.S. secrets about Russia's attempts to hack the 2016 presidential election was sentenced Thursday to five years and three months in prison. From a report: It was the sentence that prosecutors had recommended in the plea deal -- the longest sentence ever given for a federal crime involving leaks to the news media -- for Reality Winner, the Georgia woman at the center of the case. Winner was also sentenced to three years of supervised release and no fine, except for a $100 special assessment fee. The crime carried a maximum penalty of 10 years. U.S. District Court Judge J. Randal Hall in Augusta, Georgia, was not bound to follow the plea deal, but elected to give Winner the amount of time prosecutors requested. Winner, 26, who contracted for the National Security Agency, pleaded guilty in June to copying a classified report that detailed the Russian government's efforts to penetrate a Florida-based voting software supplier. Further reading: How a Few Yellow Dots Burned the Intercept's NSA Leaker.
United States

DNC Says Reported Hack Attempt Was a False Alarm (wsj.com) 115

furry_wookie writes: A suspected attempt to hack into the Democratic National Committee's voter database was actually a cybersecurity test [Editor's note: the originally submitted article might be paywalled; an alternative source], the organization said. The DNC, which was [allegedly] hacked by Russian intelligence officers during the 2016 presidential campaign, said Tuesday it had contacted the Federal Bureau of Investigation after being alerted to an apparent phishing scheme by the computer security firm Lookout Inc., which uncovered a replica of the login page to the DNC's Votebuilder database during an online scan. In a statement early Wednesday, Bob Lord, the DNC's chief information security officer, said the DNC and its partners who reported the site 'now believe it was built by a third party as part of a simulated phishing test.'
Open Source

LA County Gets State Approval of New Vote-Counting System Using Open-Source Software (latimes.com) 95

A new voting system that uses open-source software for counting ballots has been approved by California elections officials. "The certification of the new tally system for the county paves the way for other improvements, including redesigned absentee ballot packets, in the Nov. 6 election," reports Los Angeles Times. "It is the first election system of its kind, using publicly available source code that has been certified for use in California." From the report: The ballot-counting equipment is part of a broader redesign of Los Angeles County's voting system, which will include new equipment while relying on a traditional paper ballot. The county's existing system, portions of which are now decades old, has been targeted for replacement for several years.
United States

Democratic National Committee Says Hackers Unsuccessfully Targeted Voter Database (cnn.com) 150

The Democratic National Committee contacted the FBI on Tuesday after it detected what it believes was the beginning of a sophisticated attempt to hack into its voter database, a Democratic source tells CNN. From a report: The DNC was alerted in the early hours of Tuesday morning by a cloud service provider and a security research firm that a fake login page had been created in an attempt to gather usernames and passwords that would allow access to the party's database, the source said. The page was designed to look like the access page Democratic Party officials and campaigns across the country use to log into a service called Votebuilder, which hosts the database, the source said, adding the DNC believed it was designed to trick people into handing over their login details. The source said the DNC is investigating who may have been responsible for the attempted attack, but that it has no reason to believe its voter file was accessed or altered.
United States

Senators Introduce Bill That Would Require State and Local Governments To Use Paper Ballots in an Effort To Secure Elections (cnet.com) 470

From a report: On Tuesday, nine Senators introduced a bill that would require state and local governments to use paper ballots in an effort to secure elections from hackers. The bill would also require rigorous audits for all federal elections to ensure that results match the votes. "Leaving the fate of America's democracy up to hackable election machines is like leaving your front door open, unlocked and putting up a sign that says 'out of town,'" Sen. Ron Wyden, a Democrat from Oregon, said in a release. "Any failure to secure our elections amounts to disenfranchising American voters." The Protecting American Votes and Elections Act of 2018 was drafted amid intense scrutiny of voting systems ahead of the mid-term elections in November. Russian interference in the 2016 presidential election has elevated concern over the security of the country's voting systems. The senators said rigorous audits will ensure votes are legitimate. Currently, 22 states don't require post-election audits, according to the release.
Microsoft

Russian Hackers Targeted US Conservative Think-Tanks, Says Microsoft (reuters.com) 170

retroworks shares a report: Hackers linked to Russia's government tried to target the websites of two right-wing U.S. think-tanks, suggesting they were broadening their attacks in the build-up to November elections, Microsoft said. The software giant said it thwarted the attempts last week by taking control of sites that hackers had designed to mimic the pages of The International Republican Institute and The Hudson Institute. Users were redirected to fake addresses where they were asked to enter usernames and passwords. There was no immediate comment from Russian authorities, but the Kremlin was expected to address the report later on Tuesday. It has regularly dismissed accusations that it has used hackers to influence U.S. elections and political opinion. Casting such allegations as part of an anti-Russian campaign designed to justify new sanctions on Russia, it says it wants to improve not worsen ties with Washington. Further reading: Microsoft Reveals First Known Midterm Campaign Hacking Attempts, and Microsoft Launches Pilot Program To Provide Cybersecurity Protection To Political Campaigns and Election Authorities.
United States

Did Russians Really Penetrate Florida's Election Systems? Maybe (nbcnews.com) 205

Anonymous readers share a report: Sen. Bill Nelson, a Florida Democrat, has reaped the political whirlwind in the 10 days since he proclaimed that Russian hackers had "penetrated" some of his state's county voting systems. The governor of Florida, Rick Scott, a Republican who is running against Nelson for his U.S. Senate seat this fall, has blasted his claim as irresponsible. The top Florida elections official, also a Republican, said he had seen no indication it's true. And The Washington Post weighed in Friday with a 2,717-word fact check that all but accused Nelson -- without evidence -- of making it up. However, three people familiar with the intelligence tell NBC News that there is a classified basis for Nelson's assertion, which he made at a public event after being given information from the leaders of the Senate Intelligence Committee. The extent and seriousness of the threat remains unclear, shrouded for reasons of national security.

[...] Through a spokesman, Nelson declined to comment. At a, Aug. 7 campaign event in Florida's capital, Nelson said Intelligence Committee leaders asked that he "let supervisors of elections in Florida know that Russians are inside our records." He added that Russian hackers "have already penetrated certain counties in the state and they now have free rein to move about." "Either Bill Nelson knows of crucial information the federal government is withholding from Florida election officials, or he is simply making things up," said Scott, who is seeking to take Nelson's Senate seat, which the senator has held since 2001. But Scott, who as governor has a security clearance, has not actually disputed Nelson's assertion. His spokesman said the governor had not personally called anyone at the Department of Homeland Security to seek a classified briefing to get to the bottom of the matter.

United States

36 of 50 States Have Installed Sensors at 'Elections Infrastructure Level' To Monitor Computer Systems Managing Voter Data or Devices (reuters.com) 90

A majority of U.S. states has adopted technology that allows the federal government to see inside state computer systems managing voter data or voting devices in order to root out hackers. From a report: Two years after Russian hackers breached voter registration databases in Illinois and Arizona, most states have begun using the government-approved equipment, according to three sources with knowledge of the deployment. Voter registration databases are used to verify the identity of voters when they visit polling stations. The rapid adoption of the so-called Albert sensors, a $5,000 piece of hardware developed by the Center for Internet Security www.cisecurity.org, illustrates the broad concern shared by state government officials ahead of the 2018 midterm elections, government cybersecurity experts told Reuters. [...] As of August 7, 36 of 50 states had installed Albert at the "elections infrastructure level," according to a Department of Homeland Security official. The official said that 74 individual sensors across 38 counties and other local government offices have been installed. Only 14 such sensors were installed before the U.S. presidential election in 2016.
United States

Trump, Seeking To Relax Rules on US Cyberattacks, Reverses Obama Directive (wsj.com) 153

President Trump has reversed an Obama-era memorandum dictating how and when the U.S. government can deploy cyberweapons against its adversaries, in an effort to loosen restrictions on such operations [Editor's note: the link may be paywalled; alternative source], WSJ reports. From the report: Mr. Trump signed an order on Wednesday reversing the classified rules, known as Presidential Policy Directive 20, that had mapped out an elaborate interagency process that must be followed before U.S. use of cyberattacks, particularly those geared at foreign adversaries. The change was described as an "offensive step forward" by an administration official briefed on the decision, one intended to help support military operations, deter foreign election influence and thwart intellectual property theft by meeting such threats with more forceful responses. The Trump administration has faced pressure to show that it is taking seriously national-security cyberthreats -- particularly those that intelligence officials say are posed by Moscow.
Google

Google Releases a Searchable Database of US Political Ads (techcrunch.com) 46

An anonymous reader quotes a report from TechCrunch: In an effort to provide more transparency and deliver on a promise to Congress, Google just published an archive of political ads that have run on its platform. Google's new database, which it calls the Ad Library, is searchable through a dedicated launch page. Anyone can search for and filter ads, viewing them by candidate name or advertiser, spend, the dates the ads were live, impressions and type. For anyone looking for the biggest ad budget or the farthest reaching political ad, the ads can be sorted by spend, impressions and recency, as well. Google also provided a report on the data, showing ad spend by U.S. state, by advertiser and by top keywords.
Space

US Warns on Russia's New Space Weapons (reuters.com) 179

The United States voiced deep suspicion on Tuesday over Russia's pursuit of new space weapons, including a mobile laser system to destroy satellites in space, and the launch of a new inspector satellite which was acting in an "abnormal" way. From a report: Russia's pursuit of counterspace capabilities was "disturbing," Yleem D.S. Poblete, U.S. Assistant Secretary of State for Arms Control, Verification and Compliance, told the U.N.'s Conference on Disarmament which is discussing a new treaty to prevent an arms race in outer space. A Russian delegate at the conference dismissed Poblete's remarks as unfounded and slanderous. Russian Foreign Minister Sergei Lavrov, at the Geneva forum in February, said a priority was to prevent an arms race in outer space, in line with Russia's joint draft treaty with China presented a decade ago.
United States

US House Candidates Vulnerable To Hacks, Researchers Say (reuters.com) 35

About 30 percent of House candidates running for office this year have significant cybersecurity issues with their campaign websites, according to a new study. Reuters: The research was unveiled on Sunday at the annual Def Con security conference in Las Vegas, where some attendees have spent three days hacking into voting machines to highlight vulnerabilities in technology running polling operations. A team of four independent researchers led by former National Institutes for Standards and Technology security expert Joshua Franklin concluded that the websites of nearly one-third of U.S. House candidates, Democrats and Republicans alike, are vulnerable to attacks. NIST is a U.S. Commerce Department laboratory that provides advice on technical issues, including cyber security. Using automated scans and test programs, the team identified multiple vulnerabilities, including problems with digital certificates used to verify secure connections with users, Franklin told Reuters ahead of the presentation. The warnings about the midterm elections, which are less than three months away, come after Democrats have spent more than a year working to bolster cyber defenses of the party's national, state and campaign operations.
Government

11-Year-Old Changes Election Results On Florida's Website: Defcon 2018 (pbs.org) 202

UnknowingFool writes: At this year's DEFCON, a group of 50 children aged 8 to 16 participated in a hack of 13 imitation election websites. One 11-year-old boy changed the voting results in 10 minutes. A 11 year-old-girl was also able to change the voting results in 30 minutes. Overall, more than 30 of the 50 children were able to hack the websites in some form. The so-called "DEFCON Voting Machine Hacking Village" allowed kids the chance to manipulate vote tallies, party names, candidate names and vote count totals. The 11-year-old girl was able to triple the number of votes found on the website in under 15 minutes.

The National Association of Secretaries of State said in a statement that it is "ready to work with civic-minded members of the DEFCON community wanting to become part of a proactive team effort to secure our elections." But the organization expressed skepticism over the hackers' abilities to access the actual state websites. "It would be extremely difficult to replicate these systems since many states utilize unique networks and custom-built databases with new and updated security protocols," it read. "While it is undeniable websites are vulnerable to hackers, election night reporting websites are only used to publish preliminary, unofficial results for the public and the media. The sites are not connected to vote counting equipment and could never change actual election results."
United States

EPA Staff Objected To Agency's New Rules on Asbestos Use, Internal Emails Show (nytimes.com) 212

Top officials at the Environmental Protection Agency pushed through a measure to review applications for using asbestos in consumer products, and did so over the objections of E.P.A.'s in-house scientists and attorneys, internal agency emails show. From a report: The clash over the proposal exposes the tensions within the E.P.A. over the Trump administration's efforts to roll back environmental rules and rewrite other regulations that industries have long fought. Asbestos, a naturally occurring mineral and known carcinogen, was once common in insulation and fireproofing materials, but today most developed countries ban it. The United States still allows limited use in products including gaskets, roofing materials and sealants. The proposed new rule would create a new process for regulating uses of asbestos, something the E.P.A. is obliged to do under a 2016 amendment to a toxic substances law.
Bitcoin

Colorado Candidate For Governor Wants To Put His State On the Blockchain (gizmodo.com) 61

An anonymous reader quotes a report from Gizmodo: The Democratic nominee for governor of Colorado, U.S. Representative Jared Polis, wants to add blockchain to the list of items voters consider this year. Polis currently represents Colorado's 2nd district in the House, and he won the Democratic gubernatorial nomination last month. He's held his seat in the House for about a decade and has been a fairly solid progressive. On Wednesday, Polis added a set of limited proposals regarding blockchain to his gubernatorial platform that at least give us an idea of what it means for a politician to campaign on blockchain. Polis told us he would like to resolve some of the "ambiguity" in federal rules, encourage fintech company investment, remove some licensing requirements for token securities, and exempt cryptocurrencies from state money transition laws. He says these companies are "trying to fit what they're doing into an obsolete, outdated, and often obsolete federal law."

Polis also wants to explore how blockchain could be used for voting security. Polis isn't ready to necessarily endorse moving all voting to the blockchain system. He likes paper ballots and told us, "this would be more how the information is generated and stored from those paper ballots rather than doing so in a centralized database it would be done across a distributed ledger." The congressman also thinks that blockchain could be used to streamline the process for storing public records and making them available to the public. "We're talking more about everything from Colorado contracts, expenditures, titles, a lot of the data-intensive aspects of state government can be more secure and more accessible through distributed ledgers," he said.

Government

VP Pence Lays Out Trump's Vision For Establishing a US Space Force (nbcnews.com) 528

Vice President Mike Pence on Thursday laid out details for President Donald Trump's proposed new branch of the U.S. military responsible for protecting national security in outer space. From a report: In a speech at the Pentagon, Pence said the new Space Force would be established by 2020. "As President Trump has said, in his words, it is not enough to merely have an American presence in space -- we must have American dominance in space. And so we will," Pence said. "Space is, in his words, a war-fighting domain just like land and air and sea." He added, "History proves that peace only comes through strength, and in the realm of outer space, the United States Space Force will be that strength in the years ahead." The Space Force would ultimately become the sixth branch of the U.S. Armed Forces and would be equal to the other five, Pence said. The Department of Defense has prepared a report laying out the phases of creating the new branch, which will ultimately have to be reviewed and approved by Congress.
Security

Georgia Defends Electronic Voting Machines Despite 243-Percent Turnout In One Precinct (arstechnica.com) 431

"In Chicago, it used to be claimed that even death couldn't stop a person from voting," writes Slashdot reader lunchlady55. "But in the Deep South, there are new reports of discrepancies in voter turnout with the approval of new electronic voting systems." Ars Technica reports: [I]f any state is a poster child for terrible election practices, it is surely Georgia. Bold claims demand bold evidence, and unfortunately there's plenty; on Monday, McClatchy reported a string of irregularities from the state's primary election in May, including one precinct with a 243-percent turnout.

McClatchy's data comes from a federal lawsuit filed against the state. In addition to the problem in Habersham County's Mud Creek precinct, where it appeared that 276 registered voters managed to cast 670 ballots, the piece describes numerous other issues with both voter registration and electronic voting machines. (In fact it was later corrected to show 3,704 registered voters in the precinct.) Multiple sworn statements from voters describe how they turned up at their polling stations only to be turned away or directed to other precincts. Even more statements allege incorrect ballots, frozen voting machines, and other issues.
"George is one of four states in the U.S. that continues to use voting machines with no ability to provide voters a paper record so that they can verify the machine counted their vote correctly," the report adds.
Government

West Virginia To Introduce Mobile Phone Voting For Midterm Elections (cnn.com) 215

West Virginians serving overseas will be the first in the country to cast federal election ballots using a smartphone app, a move designed to make voting in November's election easier for troops living abroad. But election integrity and computer security experts expressed alarm at the prospect of voting by phone, and one went so far as to call it "a horrific idea." CNN: The state's decision to pioneer mobile voting comes even as the United States grapples with Russian interference in its elections. A recent federal indictment outlined Russia's attempts to hack US voting infrastructure during the 2016 presidential race, and US intelligence agencies have warned of Russian attempts to interfere with the upcoming midterm election. Still, West Virginia Secretary of State Mac Warner and Voatz, the Boston company that developed the app, insist it is secure. Anyone using it must first register by taking a photo of their government-issued identification and a selfie-style video of their face, then upload them via the app. Voatz says its facial recognition software will ensure the photo and video show the same person. Once approved, voters can cast their ballot using the Voatz app.
Democrats

Senate Rejects New Money For Election Security (apnews.com) 456

The Republican-controlled Senate has defeated a push by Democrats to set aside an additional $250 million for states to upgrade their voting systems to protect against hacking and other cyberattacks. From a report: An amendment offered by Vermont Sen. Patrick Leahy received 50 yes votes, 10 short of the 60 needed for approval. Leahy said securing U.S. elections and "safeguarding our democracy" is not a partisan issue. He said the Senate "must send a clear message to Russia and other foreign adversaries that tampering in our elections will not be tolerated. The president will not act. This duty has fallen to us." A similar effort was also rejected in the House.
Microsoft

Microsoft Launches Pilot Program To Provide Cybersecurity Protection To Political Campaigns and Election Authorities (bleepingcomputer.com) 42

An anonymous reader shares a report: Microsoft has launched a pilot program aimed at providing cybersecurity protection for political campaigns and election authorities. The pilot program -- named AccountGuard -- was launched at the end of July, Bleeping Computer has learned, and was set in motion for the 2018 US midterm elections. According to the pilot's website, AccountGuard "provides additional security and threat monitoring for Microsoft accounts belonging to participating US campaigns, political committees, campaign tech vendors, and their staff, who are likely to be at a higher risk in the lead up to elections."

Microsoft is now running a website where participants in the 2018 US midterm elections can sign up for this increased protection. According to the portal, participation is offered on a non-partisan basis and is by invitation only. Users from the following organizations are eligible to participate: (1) US-based political campaigns (2) US-based political committees (3) Select campaign technology vendors (4) Select individuals may also participate, if invited by eligible campaigns and affiliated organizations
Last month, Microsoft said they had detected and helped block hacking attempts -- the first known example of cyber interference in the midterm elections -- against three congressional candidates this year. On Tuesday, Facebook said it was blocking more than two dozen pages that it believed were part of an ongoing political influence campaign.
United States

DHS Forms New Cyber Hub To Protect Critical US Infrastructure (wsj.com) 57

The Department of Homeland Security announced on Tuesday the creation of a new center aimed at guarding the nation's banks, energy companies and other industries from major cyberattacks that could cripple critical infrastructure. From a report: The launch of the National Risk Management Center was unveiled by DHS Secretary Kirstjen Nielsen at a government-hosted cyber summit in New York City, at which Vice President Mike Pence and several other cabinet secretaries are expected to speak. In prepared remarks, Ms. Nielsen said that cyber threats now posed a greater threat to the country than physical attacks. DHS was founded 15 years ago to prevent another Sept. 11, 2001, Ms. Nielsen said, but "today I believe the next major attack is more likely to reach us online than on an airplane." The center's creation was motivated by a growing recognition in government that sophisticated cyberattacks, particularly those deployed by foreign adversaries, can not only harm a company or industry but can cause systemic failure across society, Chris Krebs, DHS's top cyber official, said in an interview.
Facebook

Facebook Has Identified Ongoing Political Influence Campaign (nytimes.com) 263

Facebook is preparing to announce that it has identified a coordinated political influence campaign, with dozens of inauthentic accounts and pages that are believed to be engaging in political activity ahead of November's midterm elections, The New York Times reported Tuesday, citing three people briefed on the matter. From the report: In a series of briefings on Capitol Hill this week, the company told lawmakers that it detected the influence campaign as part of its investigations into election interference. It has been unable to tie the accounts to Russia, whose Internet Research Agency was at the center of an indictment earlier this year for interfering in the 2016 election, but company officials told Capitol Hill that Russia was possibly involved, according to two of the officials. Facebook is expected to announce its findings on Tuesday afternoon. The company has been working with the F.B.I. to investigate the activity. Like the Russian interference campaign in 2016, the recently detected campaign dealt with divisive social issues. Update: Facebook has confirmed the story, adding: Today we removed 32 Pages and accounts from Facebook and Instagram because they were involved in coordinated inauthentic behavior. This kind of behavior is not allowed on Facebook because we don't want people or organizations creating networks of accounts to mislead others about who they are, or what they're doing. We're still in the very early stages of our investigation and don't have all the facts -- including who may be behind this. But we are sharing what we know today given the connection between these bad actors and protests that are planned in Washington next week. We will update this post with more details when we have them, or if the facts we have change. It's clear that whoever set up these accounts went to much greater lengths to obscure their true identities than the Russian-based Internet Research Agency (IRA) has in the past. We believe this could be partly due to changes we've made over the last year to make this kind of abuse much harder.
Democrats

Senate Democrat Floats First Serious Proposals For Regulating Big Tech (gizmodo.com) 223

On Monday, Senator Mark Warner published 20 proposals on how to regulate big tech platforms. What's interesting is that none of the proposals call for breaking up the pseudo-monopolies. Instead, they aim to start a substantive debate by laying out different paths to address problems posed by the platforms. Gizmodo reports: What may be more important than the individual proposals themselves is that the document is at least trying to organize a holistic way of thinking about the issues now on the table. It breaks down the areas that need addressing into the promotion of disinformation, privacy and consumer protection, and ensuring competition in the marketplace. Just to highlight a few of the good issues on the table, the white paper blessedly brings the conversation back to privacy and data ownership -- something that seems to have been lost as the conversation has turned to content moderation. The easiest recommendation is to implement what it calls "GDPR-like" data protection legislation that would give Americans similar data rights as EU citizens gained in May. The jury is still out on the long-term consequences of those reforms, but they require greater transparency and consent for a company's terms of service, along with many more tools for keeping track of what information a company collects on you.

On the competition side of things, the proposal suggests a data-transparency bill that would give users a more granular idea of how their data is being used and how much its worth to an individual platform. One concern it addresses is that platforms expand how they monetize a person's data while the user is often unaware of how much they're actually giving up, value-wise, when they agree to hand over their data in exchange for a particular service. Another benefit would be that regulators would have a better idea of what they're evaluating in antitrust enforcement cases. The proposals relating to disinformation are a little more worrisome. A requirement that platforms "clearly and conspicuously label bots" wouldn't be so bad, but it's a daunting task and opens up the potential for false positives. Likewise, demanding networks identify a user's true identity is unrealistic, and the option of anonymity online should be protected.
Axios was first to publish the list of 20 proposals compiled by Warner's staff. Is there a proposal that resonates with you? If not, how would you regulate the Big Tech platforms?
United Kingdom

Facebook Finally Discloses Pro-Brexit Ads (techcrunch.com) 165

"The UK parliament has provided another telling glimpse behind the curtain of Facebook's unregulated ad platform by publishing data on scores of pro-Brexit adverts..." reports TechCrunch, adding that the 2016 ads "were run prior to Facebook having any disclosure rules for political ads. So there was no way for anyone other than each target recipient to know a particular ad existed or who it was being targeted at." An anonymous reader quotes their report: The targeting of the ads was carried out on Facebook's platform by AggregateIQ, a Canadian data firm that has been linked to Cambridge Analytica/SCL... [I]t's not clear how many ad impressions they racked up in all. But total impressions look very sizable. While some of what runs to many thousands of distinctly targeted ads which AIQ distributed via Facebook's platform are listed as only garnering between 0-999 impressions apiece, according to Facebook's data, others racked up far more views. Commonly listed ranges include 50,000 to 99,999 and 100,000 to 199,999 -- with even higher ranges like 2M-4.9M and 5M-9.9M also listed....

The publication of the Brexit ads is, above all, a reminder that online political advertising has been allowed to be a blackhole -- and at times a cesspit -- because cash-rich entities have been able to unaccountably exploit the obscurity of Facebook's systemically dark ad targeting tools for their own ends, and operate in a darkness where only Facebook had oversight (and wasn't exercising any), leaving the public no right of objection let alone reply, despite it being people's lives that are indelibly affected by political outcomes.... The company has been making some voluntary changes to offer a degree of political ad disclosure, as it seeks to stave off regulatory rule. Whether its changes -- which at best offer partial visibility -- will go far enough remains to be seen.

Earlier this month the UK's data watchdog released a report titled "Democracy disrupted?" in which the UK's Information Commissioner recommends an "ethical pause" of political advertising on social media to allow key players "to reflect on their responsibilities in respect to the use of personal data..." And this weekend an interim report from the House of Commons' media committee "said democracy is facing a crisis because the combination of data analysis and social media allows campaigns to target voters with messages of hate without their consent," according to the Associated Press.

"Tech giants like Facebook, which operate in a largely unregulated environment, are complicit because they haven't done enough to protect personal information and remove harmful content, the committee said."
Republicans

Twitter Is Limiting the Visibility of Prominent Republicans In Search Results (vice.com) 726

An anonymous reader quotes a report from VICE News: Twitter is limiting the visibility of prominent Republicans in search results -- a technique known as "shadow banning" -- in what it says is a side effect of its attempts to improve the quality of discourse on the platform. The Republican Party chair Ronna McDaniel, several conservative Republican congressmen, and Donald Trump Jr.'s spokesman no longer appear in the auto-populated drop-down search box on Twitter, VICE News has learned. It's a shift that diminishes their reach on the platform -- and it's the same one being deployed against prominent racists to limit their visibility. The profiles continue to appear when conducting a full search, but not in the more convenient and visible drop-down bar. (The accounts appear to also populate if you already follow the person.)

Democrats are not being "shadow banned" in the same way, according to a VICE News review. McDaniel's counterpart, Democratic Party chair Tom Perez, and liberal members of Congress -- including Reps. Maxine Waters, Joe Kennedy III, Keith Ellison, and Mark Pocan -- all continue to appear in drop-down search results. Not a single member of the 78-person Progressive Caucus faces the same situation in Twitter's search. Presented with screenshots of the searches, a Twitter spokesperson told VICE News: "We are aware that some accounts are not automatically populating in our search box and shipping a change to address this." Asked why only conservative Republicans appear to be affected and not liberal Democrats, the spokesperson wrote: "I'd emphasize that our technology is based on account *behavior* not the content of Tweets."

Privacy

Putin's Soccer Ball for Trump Had Transmitter Chip, Logo Indicates (bloomberg.com) 241

Russian President Vladimir Putin's gift of a soccer ball to U.S. President Donald Trump last week set off a chorus of warnings -- some of them only half in jest -- that the World Cup souvenir could be bugged. Republican Senator Lindsey Graham even tweeted, "I'd check the soccer ball for listening devices and never allow it in the White House." It turns out they weren't entirely wrong. From a report: Markings on the ball indicate that it contained a chip with a tiny antenna that transmits to nearby phones. But rather than a spy device, the chip is an advertised feature of the Adidas AG ball. Photographs from the news conference in Helsinki, where Putin handed the ball to Trump, show it bore a logo for a near-field communication tag. During manufacturing, the NFC chip is placed inside the ball under that logo, which resembles the icon for a WiFi signal, according to the Adidas website. The chip allows fans to access player videos, competitions and other content by bringing their mobile devices close to the ball. The feature is included in the 2018 FIFA World Cup match ball that's sold on the Adidas website for $165 (reduced to $83 in the past week).
Advertising

Facebook Signs Agreement With Washington State To End Discriminatory Ad Targeting (reuters.com) 86

Last month, Washington filed a lawsuit against Facebook (and Google) for failing to disclose political ad spending, as required by state law. Washington law requires that "political campaign and lobbying contributions and expenditures be fully disclosed to the public and that secrecy is to be avoided." Today, as reported by Reuters, Facebook has signed an agreement with the state to stop third-party advertisers in the U.S. from excluding protected groups from seeing their ads. From the report: Facebook confirmed the agreement with the state, and said the announcement is part of a long process to ensure that tools used to target ads on the social network are safe, civil, and fair. "We've removed thousands of categories related to potentially sensitive personal attributes -- like race, ethnicity, sexual orientation and religion -- from our exclusion targeting tools," the company said, pointing to its efforts from over a year-and-a-half. The legally binding agreement with Washington state requires Facebook to make the changes to its ad platform within 90 days, Washington Attorney General Bob Ferguson said.
Government

Russian Hackers Reach US Utility Control Rooms, Homeland Security Officials Say (wsj.com) 371

"Russian hackers [...] broke into supposedly secure, "air-gapped" or isolated networks owned by utilities (Warning: source may be paywalled; alternative source) with relative easy by first penetrating the networks of key vendors who had trusted relationships with the power companies," reports The Wall Street Journal, citing officials at the Department of Homeland Security. "They got to the point where they could have thrown switches" and disrupted power flows, said Jonathan Homer, chief of industrial-control-system analysis for DHS. The hacking campaign started last year and likely is continuing. From the report: DHS has been warning utility executives with security clearances about the Russian group's threat to critical infrastructure since 2014. But the briefing on Monday was the first time that DHS has given out information in an unclassified setting with as much detail. It continues to withhold the names of victims but now says there were hundreds of victims, not a few dozen as had been said previously. It also said some companies still may not know they have been compromised, because the attacks used credentials of actual employees to get inside utility networks, potentially making the intrusions more difficult to detect.

The attackers began by using conventional tools -- spear-phishing emails and watering-hole attacks, which trick victims into entering their passwords on spoofed websites -- to compromise the corporate networks of suppliers, many of whom were smaller companies without big budgets for cybersecurity. Once inside the vendor networks, they pivoted to their real focus: the utilities. It was a relatively easy process, in many cases, for them to steal credentials from vendors and gain direct access to utility networks. Then they began stealing confidential information. For example, the hackers vacuumed up information showing how utility networks were configured, what equipment was in use and how it was controlled. They also familiarized themselves with how the facilities were supposed to work, because attackers "have to learn how to take the normal and make it abnormal" to cause disruptions, said Mr. Homer. Their goal, he said: to disguise themselves as "the people who touch these systems on a daily basis."

Government

Open Gov't Advocates Fear that Private Messaging Apps Are Being Misused by Public Officials To Conduct Business in Secret (pbs.org) 125

The proliferation of digital tools that make text and email messages vanish may be welcome to Americans seeking to guard their privacy. But open government advocates fear they are being misused by public officials to conduct business in secret and evade transparency laws. From a report: Whether communications on those platforms should be part of the public record is a growing but unsettled debate in states across the country. Updates to transparency laws lag behind rapid technological advances, and the public and private personas of state officials overlap on private smartphones and social media accounts. "Those kind of technologies literally undermine, through the technology itself, state open government laws and policies," said Daniel Bevarly, executive director of the National Freedom of Information Coalition. "And they come on top of the misuse of other technologies, like people using their own private email and cellphones to conduct business." Some government officials have argued that public employees should be free to communicate on private, non-governmental cellphones and social media platforms without triggering open records requirements.
United Kingdom

Ecuador Will Be Handing Assange Over To UK Authorities 'In Coming Weeks Or Days': RT (express.co.uk) 467

Ecuador is planning to hand over WikiLeaks founder Julian Assange to UK authorities in the "coming weeks or even days," RT editor-in-chief Margarita Simonyan said, citing her own sources. Simonyan reported the news in a recent tweet, which was reposted by WikiLeaks. Slashdot reader Okian Warrior first shared the news. Daily Express reports: Foreign Office minister Sir Alan Duncan is said to be involved in the diplomatic effort, which has come weeks ahead of a visit by new Ecuadorian president, Lenin Moreno, who called Mr Assange an "inherited problem." He also referred to the exiled WikiLeaks founder as a "stone in the shoe." Sources close to Assange claim he was not aware of the talks, but believe America is piling "significant pressure" on Ecuador to give him up, according to the Sunday Times. The sources claim that America has threatened to block a loan from the International Monetary Fund (IMF) if he is not removed from the embassy, based in Knightsbridge, west London. UPDATE 7/21/18: The Intercept also confirmed the news. Glen Greenwald, former reporter for The Guardian, writes: "A source close to the Ecuadorian Foreign Ministry and the President's office, unauthorized to speak publicly, has confirmed to the Intercept that Moreno is close to finalizing, if he has not already finalized, an agreement to hand over Assange to the UK within the next several weeks. The withdrawal of asylum and physical ejection of Assange could come as early as this week."
Security

Microsoft Reveals First Known Midterm Campaign Hacking Attempts (politico.com) 163

An anonymous reader shares a report: Microsoft detected and helped block hacking attempts against three congressional candidates this year, a company executive said Thursday, marking the first known example of cyber interference in the midterm elections. "Earlier this year, we did discover that a fake Microsoft domain had been established as the landing page for phishing attacks," said Tom Burt, Microsoft's vice president for security and trust, at the Aspen Security Forum. "And we saw metadata that suggested those phishing attacks were being directed at three candidates who are all standing for election in the midterm elections."

Burt declined to name the targets but said they were "people who, because of their positions, might have been interesting targets from an espionage standpoint as well as an election disruption standpoint." Microsoft took down the fake domain and worked with the federal government to block the phishing messages.

Security

Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States (vice.com) 244

Kim Zetter, reporting for Motherboard: The nation's top voting machine maker has admitted in a letter to a federal lawmaker that the company installed remote-access software on election-management systems it sold over a period of six years, raising questions about the security of those systems and the integrity of elections that were conducted with them. In a letter sent to Sen. Ron Wyden (D-OR) in April and obtained recently by Motherboard, Election Systems and Software acknowledged that it had "provided pcAnywhere remote connection software ... to a small number of customers between 2000 and 2006," which was installed on the election-management system ES&S sold them.

The statement contradicts what the company told me and fact checkers for a story I wrote for the New York Times in February. At that time, a spokesperson said ES&S had never installed pcAnywhere on any election system it sold. "None of the employees -- including long-tenured employees, has any knowledge that our voting systems have ever been sold with remote-access software," the spokesperson said. ES&S did not respond on Monday to questions from Motherboard, and it's not clear why the company changed its response between February and April. Lawmakers, however, have subpoena powers that can compel a company to hand over documents or provide sworn testimony on a matter lawmakers are investigating, and a statement made to lawmakers that is later proven false can have greater consequence for a company than one made to reporters.

Republicans

GOP Congressman Introduces Bill To Reinstate Net Neutrality Rules (theverge.com) 120

Rep. Mike Coffman (R-CO) today announced his support for a bill that would institute the basic outlines of the FCC's 2015 Open Internet order, which banned the throttling and blocking of content as well as harmful paid prioritization practices. He is also the first Republican to sign on to the Democrat-led discharge petition, which aims to force a vote on the House floor to roll back the FCC's December decision to repeal net neutrality. The Verge reports: The 21st Century Internet Act aims to restructure the current framework by which the internet has been governed since the '90s. Coffman's bill moves past this argument by amending the 1934 Telecommunications Act and adding the new Title VIII. This new classification would "permanently codify into law the 'four corners' of net neutrality" by banning providers from controlling traffic quality and speed and forbidding them from participating in paid prioritization programs or charging access fees from edge providers.

On top of providing stable ground for net neutrality rules to be upheld in the future, the legislation also makes it illegal for providers to participate in "unfair or deceptive acts or practices." It directs the FCC to investigate claims of anticompetitive behavior on behalf of consumers after receiving their complaints. Transparency requirements are heightened for providers as well, as companies must publicly disclose information regarding their network practices to allow consumers to "make informed choices regarding use of such services."

Government

Special Counsel Mueller Charges 12 Russian Intelligence Officers With Hacking Democrats During 2016 Election (cnbc.com) 778

Special counsel Robert Mueller has obtained a new indictment charging 12 Russian intelligence officers with hacking Democrats to interfere with the 2016 presidential election, and with stealing information of about 500,000 American voters, the Justice Department announced Friday. From a report: The indictment lodged in Washington, D.C., accuses the Russian spies of hacking into the Democratic National Committee and the presidential campaign of Hillary Clinton, and of releasing emails obtained from that cybersnooping with a a goal of influencing the election. The accused also hacked into state boards of elections, secretaries of state, and into companies that provided software used to administer elections, according to Deputy Attorney Rod Rosenstein. Rosenstein said he briefed President Donald Trump about the case earlier in the week.
United States

Russian Influence Campaign Sought To Exploit Americans' Trust In Local News (npr.org) 287

An anonymous reader quotes a report from NPR: The information operatives who worked out of the Internet Research Agency in St. Petersburg did not stop at posing as American social media users or spreading false information from purported news sources, according to new details. They also created a number of Twitter accounts that posed as sources for Americans' hometown headlines. NPR has reviewed information connected with the investigation and found 48 such accounts. They have names such as @ElPasoTopNews, @MilwaukeeVoice, @CamdenCityNews and @Seattle_Post. "A not-insignificant amount of those had some sort of variation on what appeared to be a homegrown local news site," said Bret Schafer, a social media analyst for the Alliance for Securing Democracy, which tracks Russian influence operations and first noticed this trend. Another example: The Internet Research Agency created an account that looks like it is the Chicago Daily News. That newspaper shuttered in 1978. The Internet Research Agency-linked account was created in May 2014, and for years, it just posted local headlines, accumulating some 19,000 followers by July 2016.

Another twist: These accounts apparently never spread misinformation. In fact, they posted real local news, serving as sleeper accounts building trust and readership for some future, unforeseen effort. "They set them up for a reason. And if at any given moment, they wanted to operationalize this network of what seemed to be local American news handles, they can significantly influence the narrative on a breaking news story," Schafer told NPR. "But now instead of just showing up online and flooding it with news sites, they have these accounts with two years of credible history."

Government

UK Politicians Push For FOSTA SESTA-Style Sex Censorship (engadget.com) 124

An anonymous reader quotes a report from Engadget: If you're familiar with the phrase "that's a terrible idea, let's do it" then you might be one of the British MPs who think that the UK should do its own version of FOSTA-SESTA. That's exactly what Labour MP Sarah Champion has done by leading a debate this week for the creation of laws to criminalize websites used by sex workers in the UK -- under the rubric of fighting trafficking, of course. A self-appointed group of MPs (the "All-Party Parliamentary Group on Prostitution and the Global Sex Trade") fronted by Ms. Champion made a call to ban "prostitution websites" during a Wednesday House of Commons debate. Conflating sex work with trafficking just like their American counterparts, they claim websites where workers advertise and screen clients "directly and knowingly" profit from sex trafficking.

Slashdot Top Deals