No Let Up in Cyberattacks, Influence Campaigns Targeting US

No Let Up in Cyberattacks, Influence Campaigns Targeting US

September 5, 2018, 1:40 AM

No Let Up in Cyberattacks, Influence Campaigns Targeting US

Director of National Intelligence Dan Coats arrives for a closed senators-only Capitol Hill briefing on election security at the U.S. Capitol in Washington, Aug. 22, 2018.
Director of National Intelligence Dan Coats arrives for a closed senators-only Capitol Hill briefing on election security at the U.S. Capitol in Washington, Aug. 22, 2018.

WASHINGTON —

Top U.S. intelligence and defense officials caution the threat to the U.S. in cyberspace is not diminishing ahead of November’s midterm elections despite indications that Russia’s efforts to disrupt or influence the vote may not match what it did in 2016.

The warnings of an ever more insidious and persistent danger come as lawmakers and security officials have increasingly focused on hardening defenses for the country’s voter rolls and voting systems.

It also comes as top executives from social media giants Facebook, Twitter and Google prepare to testify on Capitol Hill about their effort to curtail the types of disinformation campaigns used by Moscow and which are increasingly being copied by other U.S. adversaries.

“The cyberthreat to the U.S. is not limited to U.S. elections, a point that is too often missed,” Director of National Intelligence Dan Coats told a conference outside of Washington Tuesday. “The weaponization of cybertools and the relative lack of global guardrails in a cyber domain significantly increases the risk that a discrete act will have enormous strategic implications.

“Foreign influence efforts online are increasingly being used around the globe,” he added.

This combination of 2017-2018 photos shows from left, a Facebook posting from a group named "Being Patriotic" attributed to Russian agents by the U.S. House Intelligence Committee, Democratic Sen. Claire McCaskill of Missouri whose campaign was targeted by Russian hackers and voting machines in Chicago after hackers found a way into the voter registration database at the Illinois State Board of Elections in mid-2016.
This combination of 2017-2018 photos shows from left, a Facebook posting from a group named "Being Patriotic" attributed to Russian agents by the U.S. House Intelligence Committee, Democratic Sen. Claire McCaskill of Missouri whose campaign was targeted by Russian hackers and voting machines in Chicago after hackers found a way into the voter registration database at the Illinois State Board of Elections in mid-2016.

Others ramp up attacks

Government officials as well as those from private cybersecurity have said repeatedly over the past few months that they have not yet seen a repeat of what Coats himself described as the “robust” campaign Moscow launched in the run-up to the 2016 presidential election.

Still, there are concerns that even if the Kremlin has eased its efforts, other countries and a variety of nonstate actors have ramped up their own campaigns, often learning from Russia’s 2016 exploits.

“I remain deeply concerned about threats from several countries to upcoming U.S. elections — the midterms this year, the presidential elections in 2020 and beyond,” Coats said.

While the director of national intelligence did not name any countries in particular, other officials have previously pointed to China, Iran and North Korea as the main culprits.

Two weeks ago, social media giants Facebook and Twitter announced they had removed hundreds of pages and accounts linked to a disinformation campaign that originated in Iran and targeted the U.S. as well as other countries.

A worker is silhouetted against a computer display showing a live visualization of the online phishing and fraudulent phone calls across China during the 4th China Internet Security Conference (ISC) in Beijing, Aug. 16, 2016.
A worker is silhouetted against a computer display showing a live visualization of the online phishing and fraudulent phone calls across China during the 4th China Internet Security Conference (ISC) in Beijing, Aug. 16, 2016.

Once major attacks now normal

U.S. cybersecurity officials warn that hacking, phishing attacks and disinformation campaigns have become increasingly popular tools for so-called bad actors’ and that they often escape the attention of the general public.

One reason is that what might have been described as a major cyberattack 10 years ago is often seen now as part of the normal threat landscape.

“We’ve crossed that threshold many, many times,” said John Rood, the Pentagon’s undersecretary of defense for policy. “We are in that environment where on a near daily basis we are being challenged with those activities.”

What worries him, he said, is not the cyberattacks on their own but the prospects of someone combining cyber with a more traditional type of attack on the U.S. homeland.

“Some of our allies or friends have experienced a combination of cyberactivities, manipulation of the electromagnetic spectrum and physical — air, land, sea — domain [attacks], whether that be Ukraine or Georgia.”

A laptop displays a message after being infected by ransomware as part of a worldwide cyberattack on June 27, 2017 in Geldrop, Netherlands.
A laptop displays a message after being infected by ransomware as part of a worldwide cyberattack on June 27, 2017 in Geldrop, Netherlands.

Small attacks just as worrisome

Yet other U.S. officials believe it is not the prospect of large-scale cyberattacks that should be the sole reason for concern.

“While I don’t see a dramatic cyberattack coming at us, every day there are small ones,” according to National Security Agency Deputy Director George Barnes.

“The problem is we focus on the big and the slow drip happens out the back,” he said. “And the slow drip is the continued theft of intellectual properties from our industries.”

Part of the problem, according to Barnes and other officials, is the extent to which government and industry in the U.S. in connected to and dependent on cyberspace, creating what they describe as a large and vulnerable “attack surface.”

And despite government efforts to reach out to private companies to share information about the threats, and even about ongoing or imminent attacks, U.S. officials fear the current level of cooperation is still not enough.

As a result, the U.S. is “continually pummeled by nation state and non-nation state sponsored malicious cyber activity,” Barnes said.

A portion of the Feb. 16, 2018, indictment against Russia's Internet Research Agency is photographed in Washington, March 15, 2018.
A portion of the Feb. 16, 2018, indictment against Russia's Internet Research Agency is photographed in Washington, March 15, 2018.

In response to the growing pace of attacks, the U.S. military and intelligence agencies have become ever more vocal in identifying the perpetrators and calling attention to their exploits.

Increasingly, they are also talking out loud about hitting back.

“We are not standing idly by,” Coats said.

“Every kind of cyberoperation, malicious or not, leaves a trail,” he said. “Persistence on our part has enabled us to identify and publicly attribute responsibility for numerous cyber attacks and foreign influence efforts and then prepare for the response.”

Original Article

WATCH THE AMERICAN SUNRISE SHOW M-F AT 8AM ET.

WATCH THE LATEST EDITION OF WAR ROOM WITH STEVE BANNON

CATCH THE LATEST STEVE GRUBER SHOW

CATCH THE LATEST AMERICA'S VOICE LIVE SHOW

WATCH THE LATEST COWBOY LOGIC BARN PARTY SHOW

CATCH THE LATEST BREAKING POINT SHOW WITH DAVID ZERE

WATCH THE LATEST EDITION OF SECURING AMERICA WITH FRANK GAFFNEY

WATCH RAV'S SPECIAL REPORT M-5 AT 4PM ET.

WATCH RAV'S ELECTION NIGHT 2024 LIVE COVERAGE

WATCH ON RUMBLE WATCH ON GETTR

JOIN US IN LIVE CHAT 24/7 ON RUMBLE

JOIN US ON OUR 24/7 LIVE RUMBLE STREAM