Saturday Soother – April 15, 2023

The Daily Escape:

Wildflowers, Ennis, TX – April 2023 photo by Teresa Gawor

Welcome to the start of taxpayer’s blues weekend. The date for submitting your taxes is April 18 this year, since April 15 falls on a Saturday and Emancipation Day, a holiday observed in Washington, DC, is April 17. Around 88 million Americans still hadn’t filed by April 1, so there’s got to be some burning of the midnight oil this weekend.

Let’s talk about the leak of classified Pentagon documents by Jack Teixeira, a 21 year-old member of the intelligence wing of the Massachusetts Air National Guard. Teixeira was arrested on Thursday for posting US secret documents in a private Discord chat room he hosted. The classified material was shared with some 20-30 room members, including some of whom were foreigners.

The details are depressing. The group had a taste for racist and anti-Semitic memes. The WaPo reports that they seemed to love guns, military gear and God.

What happens next will be a damage assessment by the US Intelligence Community (IC), along with some of the usual suspects staking out political positions about how inept the IC is by allowing another classified leak.

Sadly, Teixeira has already picked up supporters in the GOP, as this tweet by Rep. Marjorie Taylor Greene (R-GA) shows:

It’s surprising how open and direct the pro-Putin Right is in linking Russia’s policies to those of the authoritarian white Christian secession movement in America. If you read Wrongo’s column yesterday on what’s dividing America, today’s tweet by Greene is a prime example of the difficulty in finding common cause with the extremist wing of the Republican Party.

Perhaps you didn’t see that Fox’s Tucker Carlson said that Teixeira deserves a medal not prison time. Or that he said that Teixeira is today’s Daniel Ellsberg. Others are saying that the racist meme and the god and guns framing aren’t true and are simply what the liberals at the DOJ and the NYT are spoon feeding to us. If you can stomach it, read some of the comments Right Wingers leave after viewing Tucker’s spew.

If this had happened when GW Bush was president, the GOP would be demanding that Teixeira receive a public execution.

But the GOP has moved on, and now there isn’t a substantial difference between Trump and Teixeira. The crimes are the same, and it seems, so are their motives. But Trump isn’t a 21-year old trying to impress his friends in a private forum. After four years as US president, he knows exactly why his behavior was criminal and dangerous.

And whatever sentence Teixeira receives should also apply to Trump, only with less leniency.

A basic question for the US Intelligence Community is how many more disaffected people are out there who have access to our intelligence? How many have a desire to steal it, either to stick it to the man or to simply hoard a few secrets? How many more IC oddballs are out there living in houses filled with terabytes of digital and paper secrets squirreled away?

That’s enough for today, it’s time for our Saturday Soother, where we block out all distractions and try to figure out how many miles our cars were driven for business in 2022.

Here on the fields of Wrong, it’s been in the high 80’s and it’s suddenly apparent that there’s plenty of yard work that needs doing. Wrongo has started trimming and shaping the bushes that seemed to grow wildly last year, even without much rain. Ms. Right helpfully says just chain saw them off to half their size. It will be brutal, but effective!

But before starting the yard work, let’s take a few minutes to center ourselves and try to prepare for the week to come.

Start by finding a seat near an open window. Now, watch and listen to the Vienna Philharmonic play Offenbach’s “Les Contes d’Hoffmann: Barcarolle” live and outdoors in Vienna in 2020. Here the orchestra is conducted by Valery Gergiev. Barcarolle comes from the Italian “barca” or boat. It is a traditional folk song sung by Venetian gondoliers, or a piece of music composed in that style:

Facebooklinkedinrss

Monday Wake Up Call – May 24, 2021

The Daily Escape:

Sun, clouds and Saguaros, North Scottsdale AZ – photo by rayredstonemedia61

After three decades of digital technology development, it’s evident that cybersecurity isn’t being adequately ensured by Mr. Market’s “invisible hand.” In remarks at the White House last Thursday, Biden said:

“…private entities are in charge of their own cybersecurity…and we know what they need. They need greater private-sector investment in cybersecurity.”

Wrongo’s last assignment was as CEO for a division of a F500 defense contractor. We were targeted by Chinese and other hackers thousands of times per day. By 2005, the parent company was investing tens of millions annually on cybersecurity. Most non-defense firms have come to investing in cybersecurity slowly and without large funding.

We again became painfully aware of the issue when hackers shut down the Colonial pipeline on Mother’s Day, bringing back gas shortages and long conga lines of cars trying to fill up. We subsequently heard that Colonial paid the hackers $4.4 million in Bitcoin to regain control of their networks.

From the New Yorker:

“…we are a country that has seen nearly a thousand reported ransomware attacks on our critical infrastructure since 2013. This includes transportation services, wastewater facilities, communications systems, and hospitals. The average recovery cost of a ransomware attack for businesses is around two million dollars.”

Even though private companies are most vulnerable to counterattacks, they continue to set their own cybersecurity standards largely based on operational and economic priorities, even if their negligence exposes the public to risks. So why won’t companies fix their mess?

Most in the private sector think that cybersecurity regulations will cost too much, which they do not want to pay, or may be incapable of paying. Many in the private sector also consider requirements for better cybersecurity to be yet another form of government regulation.

Mostly, it’s about money and secondarily, about a shortage of IT skills. Some argue that the incentive structure is backwards. Companies often think the costs of adding robust cybersecurity to be higher than their likely losses from a cyber theft. In a way, they are self-insuring, but that ignores the harm to their customers that occurs when personal information is stolen, or when you can’t buy gasoline.

CEOs are concerned primarily with the short-term profits and stock prices of their corporations. Companies have regularly absorbed losses incurred by security breaches, rather than reveal weaknesses in their internal cybersecurity systems, all in the name of protecting management reputations.

In 2015, Obama’s DHS designated dams, defense, agriculture, health care, and twelve other sectors of the economy as “critical infrastructure,” meaning that they:

“…are so vital to the US that their incapacity or destruction would have a debilitating impact on our physical or economic security or public health or safety.”

But while the DHS issued cybersecurity guidelines to those sectors, most companies operating critical infrastructure (like Colonial) are privately owned, and they ignored them. That includes 80% of the energy sector, including pipelines, power generation, and the electricity grid. DHS said in 2015 that those industries needed to develop a common vision and framework to deal with cyber threats.

But corporate America never developed that vision and framework.

In 2019, a European cybersecurity researcher using open-source tools available to anyone, identified and mapped the location of twenty-six thousand industrial-control systems across the US whose internet configurations left them exposed and vulnerable to attack. But you know, they would be prohibitively expensive to fix.

On May 12th, Biden issued an executive order that directed federal agencies and their contractors to abide by a host of stringent new cybersecurity regulations and reporting requirements. The order also required IT service providers and companies that operate industrial-control systems, to inform the government about cybersecurity breaches that could affect American networks.

Biden’s order is a significant workaround for the lack of government control of cybersecurity in the private sector. Many of the cloud services and software packages used by government agencies are also used in the private sector. So, Biden is creating the likelihood that those standards and requirements will be more broadly adopted. That would be similar to auto-emissions standards: When California raised its standards, 12 other states decided to adopt those requirements, and five automakers agreed to design all their new cars to meet them.

Something similar could occur with cybersecurity. Like with Covid, we’re again learning that there’s a very good reason for a robust central government that has the will to write and enforce 21st Century regulations.

Time to wake up America! Corporations aren’t your friends. From sending jobs abroad, to out-of-control share buybacks, to failing to invest in cybersecurity, they need much closer scrutiny. To help you wake up, let’s dust off Depeche Mode with their 1989 hit “Personal Jesus”:

Facebooklinkedinrss

Saturday Soother – March 27, 2021

The Daily Escape:

Stinson Beach, Marin County, CA – photo by Merrill Dodd

A single-point-of-failure in the global economy failed last week when the Ever Given, one of the world’s largest container ships, ran aground in the Suez Canal shutting down traffic in both directions. It’s now stuck sideways in the Canal.

And the Suez Canal isn’t just any waterway; it links the factories of Asia to the customers of Europe. It’s also a major conduit for crude oil. The WaPo reports that 12% of the world’s cargo travels through the Suez Canal. That this vast flow of cargo could come to a halt because a gust of wind blew a ship off course makes the brittleness of our global system of trade apparent.

That one mishap could spread chaos from Los Angeles to Rotterdam to Shanghai underscores the extent to which commerce today is tightly intertwined with the global supply chain. From the WaPo:

“By Friday, more than 160 ships were anchored in the Mediterranean and the Red seas. Egyptian officials appeared confident the canal could reopen within days, while salvage engineers cautioned that freeing the stuck ship might take weeks.”

A delay of two weeks could strand at sea one-fourth of the supply of containers that would normally be in European ports.

The NYT reports that a surge of Covid-related goods orders for items like exercise equipment has exhausted the supply of available containers at ports in China. The cost of shipping a container from Asia to North America has more than doubled since November. And on the US west coast, container unloading has been slowed as dockworkers and truck drivers were infected with Covid-19 or forced to stay home to attend to children who are out of school.

For decades, economists have lectured us about the virtues of “economic efficiency”. But, as the initially poor response of the global supply chain to the Covid-19 showed, economic resilience is also particularly important. We couldn’t get PPE for essential workers because we followed just-in-time inventory management and relied on China as our primary supplier. We’ve also seen shortages of computer chips for cars.

From the NYT: (brackets by Wrongo)

“It [just-in-time] has also yielded a bonanza for corporate executives and other shareholders: Money not spent filling warehouses with unneeded auto parts is, at least in part, money that can be given to shareholders in the form of dividends.”

Once again, we’re learning that the neo-liberal economic solution fails the people. So the economists and the CEOs have gotten it wrong. And the canal blockage, like the PPE shortages, show that they can be spectacularly wrong sometimes. More from the WaPo:

“And the grounding of the Ever Given has exposed how complex ownership structures in global shipping make it difficult to hold anyone accountable: The Ever Given is operated by Taiwan-based shipping company Evergreen Maritime. Evergreen charters the ship from a Japanese firm; a Dubai-based company acts as the agent for the ship in ports; and the ship flies the flag of Panama.”

So, accidents will happen, and they’re nobody’s fault.

The challenges presented by the Suez blockage come directly from the ‘just-in-time’ mantra. While a crisis cannot be predicted, it can be prepared for. Corporations and nations need to stop sticking their head in the sand about long-term planning, and get back to doing what the MBA’s call “resilience planning.”

Resilience planning’s been devalued by our push for short-term profits and stock market gains. If you doubt that, read about the massive cyberhack of US government agencies and major corporations, perhaps the biggest in history, that was discovered in early December by the security firm FireEye. Much of that was preventable by better management and planning.

Globalization isn’t our only problem. Add to it our short-term mindset which, when combined with greed, has endangered America.

It is unclear how long it will take for the Ever Given to be refloated and the flow of the canal traffic can resume. CNN reports that it may be freed over the weekend. But to do that, more than this level of effort will be required:

Credit: Reuters

As the clock ticks, Egypt isn’t collecting tolls for ships’ passage. And many ships, including some operated by Evergreen, have begun to re-route around the Cape of Good Hope. Multiple shipping firms have contacted the US Navy for protection against pirates on their rerouted trip, according to the Financial Times (paywalled).

Enough of the world’s problems for now. It’s time for our Saturday Soother, when we take a break and either watch the Sweet Sixteen if so inclined, or do more spring yardwork, since today is supposed to be the better of the weekend days.

Before pulling on the gloves, let’s take a few moments and listen to “Cloudburst” by George Winston, from his album, “Plains”. The video is of springtime in the northern Idaho plains. It’s a meditation on a few of our feathered friends in spring:

Facebooklinkedinrss

Sunday Cartoon Blogging – December 20, 2020

Many lawmakers have already gotten their first vaccine shots. Good for them! Most of us would take it on the first day they could get it too. But it’s wrong that they’re getting shots while (at least at the time of writing this) they haven’t passed a COVID relief bill. And is there a better metaphor for Trump’s presidency than this story from NPR?

“For….six years, the ghost of the Trump Plaza Hotel and Casino has haunted the boardwalk in Atlantic City, N.J…..But not for long: The…eyesore is scheduled for demolition late next month, and the city is offering…the opportunity to bring it down….”

From Bodnar’s Auction House:

“We are selling the experience to push the button to implode Trump Plaza…”

There will be a bidding war for the right to implode Trump’s failed casino, just nine days after Trump leaves office. Atlantic City mayor Marty Small:

“…on his way out, Donald Trump openly mocked Atlantic City, saying he made a lot of money and then got out….I wanted to use the demolition of this place to raise money for charity.”

Trump persuaded the Republican Party and enough Americans that he was a genius businessman based on hype and his stupid TV show. While Trump was pretending to be a real estate big shot with a game show, his Atlantic City three-casino empire died. Information about his business failures was out there. But people didn’t want to believe it. Now after four years, America’s imploding. Pathetic. On to cartoons.

Will help arrive in time?

Will the new gifts for the season arrive on time?

Trump fails transitions:

Republican wish list for Santa:

The new hackers will control everything:

Mitch goes back to what he does best:

It didn’t take long for a chorus of Republicans to find a stupid non-issue to sing about:

Facebooklinkedinrss

Trump Failed to Protect Government Networks

The Daily Escape:

Old cabin in winter – photo by Julie Williams

Various thoughts about US cyber security: First, along with the news about the cyber hack of the US government, comes news that Trump’s twitter account was hacked in October:

“Dutch prosecutors have confirmed that Donald Trump’s Twitter account was hacked in October despite denials from Washington…. The hacker…Victor Gevers, broke into Trump’s account @realDonaldTrump on 16 October by guessing the US president’s password…”

The password? MAGA2020. Gevers told the Dutch paper De Volkskrant that the president was not using basic security measures, like two-step verification:

“I expected to be blocked after four failed attempts. Or at least asked to provide additional information,”

The current US government-wide hack is a true disaster. The cyber security firm FireEye working with the FBI, has reported that the hack was caused by an infiltration of its network security via a software product made by the firm, Solar Winds. Reuters reported:

“On Monday, SolarWinds confirmed that Orion – its flagship network management software – had served as the…conduit for a sprawling international cyberespionage operation. The hackers inserted malicious code into Orion software updates pushed out to nearly 18,000 customers.”

Reuters earlier had reported that a researcher informed SolarWinds last year that he had uncovered the password to SolarWinds’ update mechanism, the vehicle through which its 18,000 customers were compromised. The password was “solarwinds123.”

That isn’t even as strong as Trump’s password. Right now, the damage is uncertain, but it seems extensive. NYT reported:

“…the Treasury and Commerce Departments, the first agencies reported to be breached, were only part of a far larger operation…. About 18,000 private and government users downloaded a Russian tainted software update…that gave its hackers a foothold into victims’ systems, according to SolarWinds, the company whose software was compromised.”

FireEye’s analysis shows that once the virus had infected the targets, it started ‘phoning home’ within 14 days. Sounds like quite a few people in the Trump administration were asleep at the switch: (brackets by Wrongo)

“Two of the most embarrassing breaches came at the Pentagon and the Department of Homeland Security….[who] issued an obfuscating official statement that said only: ‘The Department of Homeland Security is aware of reports of a breach. We are currently investigating the matter.’”

Tom Bossert, Trump’s original Homeland Security advisor in 2017, has an op-ed in the NYT that claims the hack was the work of the Russians. Whether that’s true or not, he’s correct about what has happened since:

“The magnitude of this ongoing attack is hard to overstate. The Russians have had access to a considerable number of important and sensitive networks for six to nine months….For those targets, the hackers will have long ago moved past their entry point, covered their tracks and gained what experts call “persistent access,” meaning the ability to infiltrate and control networks in a way that is hard to detect or remove.”

It will take years to know for certain which networks the hackers are monitoring. Politico reports that Trump has tried to gag the administration’s intelligence community leaders from reporting on the extent of the breach to Congress:

“During a National Security Council meeting on Tuesday night, national security leaders were instructed not to reach out to Capitol Hill for briefings on the massive hack without explicit approval from the White House or ODNI, according to people familiar with the episode.”

This is more dereliction of duty by the Trumpers.

We shovel money at the NSA, the CIA, and Homeland Security, but rarely ask what we get in return. How much compromise of our systems will it take to get accountability from these bureaucrats? It’s staggering that we continue to spend on a bloated military when the most crippling attacks we’ve faced in the past 20 years involve box cutters and computer hackers.

It’s hard to know which was worse: That the federal government was blindsided by a state controlled intelligence agency, or that when it became evident what was happening, White House officials said nothing.

This much is clear: While Trump was busy complaining loudly about the voter hack that didn’t happen in an election that he clearly lost, he’s been silent about the fact that someone was hacking our government. He can hide from this for another five weeks, and after that Biden will doubtless dig into it.

Republicans have spent six weeks crying fraud about the presidential election. But for this? Absolute silence. If this had happened during a Democratic administration, we’d have Republican hearings and talking points for the next 10 years. Where’s their outrage?

Facebooklinkedinrss

Republicans Vote Against Funding Election Security

The Daily Escape:

Palacio del Segundo Cabo, Havana Cuba. Built in 1772, it was the royal post office. 2018 photo by Nestor Marti for Smithsonian Magazine

Are Republicans committed to free and fair elections? Maybe not. Republicans in the Senate had a chance to say “yes” on August 1st, when an amendment adding funding for election security failed to pass.

With all the cross talk about election meddling, you could be forgiven if you think that our very democracy may be under threat. But when given a chance to take a concrete step, adding $250 million to help confront this challenge, the Republican majority in the Senate said no. From The Hill:

Senators voted 50-47 against adding an amendment from Sen. Patrick Leahy (D-VT) that would have provided the funding. Sixty votes were needed to include the proposal in the appropriations legislation under Senate rules. Sen. Bob Corker (R-TN) was the only GOP senator who voted in support of the amendment to an appropriations measure. The proposal, spearheaded by Leahy, would have provided $250 million for state election security grants.

How is this a partisan issue? Doesn’t every American want to protect our electoral system? Republicans argued that more funding wasn’t needed, that states haven’t yet spent the $380 million previously approved by Congress. Sen. James Lankford (R-OK) said it was “far too early” for the Senate to sign off on more money:

We don’t know how the first $380 million has even been spent, and the intelligence committee did an extensive research on how much money was needed and the $380 million amount was what was needed for the moment.

Sounds reasonable. If only there were some sort of accounting system that allowed you to find out how much was spent, and what the remaining need might be. And yet, not knowing where the Pentagon spends its money hasn’t stopped Congress from giving them even more than they asked for.

Surprising what expenditures cause the GOP to develop fiscal responsibility. They just gave $12 billion to bailout America’s farmers. They happily voted to create a $1 trillion deficit with their corporate tax cuts. Trump wants to add another $100 billion in tax cuts, because more has to be better.

But with an expenditure designed to head off a possible vote heist, that’s when America needs more fiscal accountability.

We’ve learned that Russian cyber warriors already have targeted the re-election campaign of Sen. Claire McCaskill, (D-MO), and that Facebook closed 32 accounts because they exhibited behavior similar to that of accounts belonging to Russian hackers. Facebook said that more than 290,000 accounts followed at least one of the fake pages.

Our electoral legitimacy crisis is real. We are witnessing a slow-moving insurrection driven by the Republicans, the Citizens United decision, Koch operatives, Evangelicals, Russian cyber hacks, along with determined vote suppression by Republican state legislatures. All are working to make your vote less valuable. Republicans have been trying for years to destroy the value of your vote with voter suppression and gerrymandering.

If the Russians want to help them, the GOP seems to be OK with that, too.

From Charlie Pierce: (emphasis by Wrongo)

The only reason to vote against this bill is because you don’t want the money spent to confront the crisis. States can’t do this alone—and too many of them are controlled by people who don’t want the job in the first place….The idea that we’re nickel-and-diming this particular problem as what can only be called an anti-democratic epidemic rages across the land is so preposterous as to beggar belief. We are febrile and weak as a democratic republic. Too many people want to keep us that way.

The only thing that can save us is TURN-OUT this fall.

Kiss our democracy good-bye if you stay home!

Facebooklinkedinrss

Saturday Soother – June 9, 2018

The Daily Escape:

Rakotz Bridge, Kromlauer Park, Germany via @archpics

With the press busy mourning the deaths of Kate Spade and Anthony Bourdain, you probably missed a couple of news stories about press freedom.

First, on Thursday night, the DOJ unsealed an indictment of James Wolfe, the long-time Director of Security for the Senate Intelligence Committee. Wolfe, a former Army intelligence analyst, had worked for the committee in a nonpartisan capacity for nearly 30 years. He is accused of one count of false statements to the FBI. The indictment alleges that he lied about his conversation with four journalists, Ali Watkins of the NYT, and three others.

The NYT revealed that Watkins, who had a three-plus year relationship with Wolfe, has had years of her communications subpoenaed. The DOJ obtained her subscriber information, and additional information from her phone.

The subscriber information that can be obtained by the DOJ is invasive. It includes your name, financial and other contact information, and IP and device addresses that allow them to map out all the communications a person uses.

It gives the government all of a journalist’s sources.

And the DOJ also sought and received Ali Watkins’ her email from when she was an undergraduate at Temple. She graduated in 2014. She broke her first national security story as a senior in college, so perhaps her school emails are relevant to the government’s investigation.

But this breach of the reporter/source privilege needs to explained. The government must delineate the boundary of what is, and isn’t acceptable in terms of vacuuming up a reporter’s source information.

It is important that counterintelligence sources and information be kept secret. James Wolfe’s motives are unclear, since he shared information with other reporters that he wasn’t having an affair with.

As of now, we don’t know if there was actual damage to an investigation.

The second item is the report, originally in April, that the Department of Homeland Security (DHS) intends to list and track  290,000 news outlets, journalists, bloggers, and influencers following select news stories. Their intent is to share those data with federal, state, local and private partners.

Naturally, there was pushback by news organizations, enough for the DHS’s Tyler Houlton to say:

Sure. Only a crank could possibly have an issue with one of the least transparent government agencies, the one with an Orwellian name, tracking and cataloging journalists. This amounts to mass monitoring of the press by the state.

So, two attacks on press freedom by the Trumpets, one by DOJ, and the other by DHS.

Remember, the government now has virtually unlimited processing power, bandwidth, and storage, and with that: Anything that can be monitored will be monitored.

This wasn’t feasible in the past, but now it is. We are at the point when privacy, as we have understood it in America, is over. For most of our country’s first 200 years, the government accepted that reporters would never reveal their sources, and by and large, no prosecutor and no judge would force them to try. It was a sacred protection guaranteed by the First Amendment.

Well, that’s changed. And it isn’t just the hard right bunch currently running the country. They are building on the efforts by Obama’s DOJ to seize journalists’ emails using the Espionage Act, to increase surveillance pressure on journalists and prosecute leakers of classified secrets.

It will take another court case similar to the Pentagon Papers to stem this undermining of press freedom. Good luck with that, given the current and likely future makeup of the Supreme Court.

Trump must respect and obey the First Amendment, in its entirety. The First Amendment is the core of our free society. Most whistle blowers are heroes.

This is how freedom is lost a little at a time, until one day we’ll wake up and find out that we’re no longer free. Technology has made Big Brother possible, but it is Congress that has made it legal.

Only pushback from freedom loving citizens will prevent it.

Wow! We really need a Saturday soothing. So, get off the couch, and brew up a cup of Kiniyota Espresso by Madison, Wisconsin’s JBC Coffee Roasters. It is produced entirely of the heirloom Bourbon variety of Arabica. Then, taste its rich notes of stone fruit and dark chocolate ($17.60/12oz). Now, sit outside, hopefully in a shady spot, and listen to the Viola Concerto in G major by Georg Philipp Telemann. It was probably composed in 1715. It was the first concerto for Viola. Here, it is played by Midwest Young Artists Conservatory:

Someone said that the viola is like the cream in an Oreo cookie; sweet and creamy, while holding the top and the bottom together.

Those who read the Wrongologist in email can view the video here.

Facebooklinkedinrss

March 1, 2018

The Daily Escape:

The Wrong family is at its annual temporary winter headquarters in Florida, enjoying this view. Blogging will be intermittent until March 12th, when we will be back in residence at the Mansion of Wrong. 2015 photo by Wrongo.

A few cartoons. When will the GOP start complaining, saying “Armed union thugs are patrolling our schools”:

Trump refines his role:

US Cyber Command chief Adm. Mike Rogers said Trump hasn’t granted him the authority to disrupt increased cyber threats. Trump, no longer jumping to the rescue. He’s just the security monitor:

Facebooklinkedinrss

Our Election System Is Under Threat

The Daily Escape:

The Dark Hedges near Ballymoney, County Antrim, Northern Ireland. (Featured in the Game of Thrones as the King’s Road) – photo by Colin Park

America is also walking down a dark path. We need to work on the integrity of our election process. From the WSJ:

To understand the scale of the hacking attempts against election systems in the 2016 presidential election, consider South Carolina. On Election Day alone, there were nearly 150,000 attempts to penetrate the state’s voter-registration system, according to a postelection report by the South Carolina State Election Commission.

If hackers were that persistent against a state that President Donald Trump won with 54.9% of the vote, what did they try to do in the states that were in play? Quite a bit, it turns out. More from the WSJ: (emphasis by the Wrongologist)

In harder-fought Illinois, for instance, hackers were hitting the State Board of Elections “5 times per second, 24 hours per day” from late June until Aug. 12, 2016, when the attacks ceased for unknown reasons, according to an Aug. 26, 2016, report by the state’s computer staff. Hackers ultimately accessed approximately 90,000 voter records, the State Board of Elections said.

The next day, Illinois temporarily took its voter-registration database and public-facing website offline. No records were altered, according to the state, and the issue was resolved before Election Day. The hackers haven’t been identified.

Many hackers, including state-sponsored ones, use automated programs to target hundreds or even thousands of computers to check for vulnerabilities. All of this is done by bots. This happens to ALL websites, (including Wrongo’s) not just to election systems. Confirming intrusions can be difficult, even if intrusion detection technology is deployed. But many municipalities and counties have not deployed it, since it can be very expensive.

Time Magazine reported that the number of actual successful intrusions in the 2016 election cycle, where hackers gained sufficient access to attempt to alter, delete or download any information, was “fewer than a dozen”.

The tally of hacking (or attempted hacking) into state election databases was widespread in the 2016 election. Jeanette Manfra, acting deputy undersecretary for cyber-security and communications at the Department of Homeland Security, said at a Senate Intelligence Committee hearing last month:

There is evidence that 21 states were targeted by hackers

From the NYT:

By 2020, cyberattacks could try to alter or erase voter registration databases…or do something else to interfere with actual voting on Election Day…public confidence in the fairness of our electoral process could decrease further, even if the hacks are unsuccessful, as incendiary and unsupported claims about voter fraud, cheating and altered vote totals spread via social media.

America needs to start from the premise that one state’s (any state’s) insufficient protections against hacking in presidential elections affects us all. From mobile device management to company firewalls, companies like Fleetsmith can provide cybersecurity to numerous companies, protecting them from hackings and it’s time for the US government to follow in their footsteps and do the same, otherwise, there may be detrimental impacts. Protecting government databases is critical and needs to be done yesterday. From Wrongo’s experience as a former provider of outsourced services to both state and federal governments, it is clear that the IT staff at many government agencies lack the expertise or budgets to harden the electoral system against attacks.

We have been discussing the hacking of the voter databases, not vote results. These databases have little to do with the actual vote tallies in a given election. But if the US developed one giant database that recorded everyone’s votes along with names, addresses, and SSNs, people’s identities could be stolen.

Unfortunately, that’s exactly what Trump’s Presidential Advisory Commission on Election Integrity plans to build. Nearly all states have said that they will not comply with the commission’s request for voter data. When the winners of one election cycle try to pick the rules, referees and judges for the next cycle, it’s clearly a system at risk of shutting out true democratic input.

The story of possible Russian hacking in our 2016 election, and the possible Trump family involvement in the Russian efforts diverts our attention from the real story, which is that cyber security in the US is a gaping vulnerability.

It threatens our security, our economy and our democracy.

We need a musical break. Over the weekend, there was a two-day Rock concert at Dodger Stadium in Los Angeles called “Classic West”. Many old groups performed over two days. Here, we focus on the Eagles, who played with the son of the late Eagle, Glenn Frey. His 23 year-old son Deacon Frey stood in for his legend of a father, in front of 50k fans, who accepted him as part of the family. It was a fitting tribute. The Eagles also added Vince Gill, who sang “Take It to the Limit“, and “Lyin’ Eyes“. But here is Deacon Frey delivering an emotional moment on “Take It Easy“:

https://www.youtube.com/watch?v=ZQCFwL3uoPE

Those who read the Wrongologist in email can view the video here.

Facebooklinkedinrss

Parsing the “Russia Hacked Our Democracy” Meme

The Daily Escape:

Kangaroos in a vineyard in Barossa Valley Australia, June 2017 – photo by David Gray

People can’t stop talking about the Donny/Vlad meeting in Hamburg, and the idea that Trump’s position regarding the potential Russian involvement in the 2016 election is: “Let’s move on”. Then, we learned that our new Syria strategy is driven by Russia and its plan for a cease fire.

But, Russia is the story of the Trump presidency. We learned over the weekend that Paul Manafort, Jared Kushner, and Donald Trump Jr. met with Russian lawyers back in June of 2016. But, despite the continued news about meetings with the Russians, appearances don’t make the Trumps guilty. Mueller and his team will examine and understand the full extent of what the Russians did, and what they attempted to do. Only then will we determine if the Russians efforts had any effect.

There are two broad areas of potential Russian involvement to consider:

Interference in the electoral process: Russians attempt to manipulate domestic politics of many countries, including the US. We do the same. How serious is the threat? Political candidates already use a full array of tools and technologies to persuade voters toward specific social and political agendas. This persuasion effort is as old as humanity itself.

Whether tech-centric forms of propaganda, employing social media, fake news and data-mining techniques are effective remains to be proven. America has been engaged in exactly this sort of exercise in foreign lands for a long time, without significant (or lasting) success.

These technologies can only support ideas and feelings that are already out there. So, what was out there? Consider these:

  • Hillary’s emails threatening national security!
  • Dispensing contradictory, or conflicting, information like “Hillary Clinton is very sick”.
  • Using social connections to generate, or modify, beliefs, like “Trump is a successful executive who can fix the government”.

This type of information warfare is a lot like managing a stock portfolio. Hackers write small, diverse news stories and then wait to see what pays off. It is unclear that hackers were the tipping point in the election, and it is far from clear that the Russians were the sole party behind them. We don’t talk about the many countries that tried to influence our elections, including Saudi Arabia, China, Israel, and Ukraine. Is it more acceptable that the Saudi’s did it the “right” way, by donating massive amounts to their candidate’s campaign?

It is highly unlikely that there was collusion between the Trump campaign and the Russians regarding interference in the 2016 election.

Hacking into political databases: the “Russian hacking” stories are not just that Russians hacked the computers of US political operations including the DNC, but that the Russians have somehow delivered the election to Trump. Thus, the story morphed from “Russians infiltrated DNC computers,” to “Russians hacked our democracy.”

The first is both possible and probable, but the second is just wrong.

Hacking our democracy requires changing or destroying votes for one side in the presidential election, or suppressing voter turnout. Not even the Russians have the resources to pull off that feat. They may have preferred that Trump win, they may have done a few things, and Trump won, but that isn’t “hacked our democracy”.

Wrongo thinks it is probable that “Russian hacking” occurred. It is a serious story, but it needs to be placed in context. Yes, Russia has a political agenda. Yes, they use dirty tricks to influence political outcomes. Yes, this needs to be taken seriously. The problem is that once that is taken out of context, everything is reduced to political talking points. We are asked to choose between two absurd choices: Either Trump is a Russian stooge, or accusations against Trump are a baseless pack of lies.

The likely “truth” is that Russians were doing something, but what they did wasn’t material to the (relatively) close outcome of this election. This has been crowded out of serious discussion.

And who hacked us is still not definitively attributed: there are too many suspects with a motive, means, and opportunity. We can’t yet discount the possibility of domestic operatives (or disgruntled campaign workers) or political plants within campaigns doing mischief.

Sooner or later, we will figure out the definitive attribution for the hacks. And 2018 will bring new tools and techniques.

Who falls short may depend more on message, and less on technology.

Time for a tune. Here is Jason Isbell and the 400 Unit doing “Hope the High Road” (leads you home again):

Takeaway Lyric:

I know you’re tired
And you ain’t sleeping well
Uninspired
And likely mad as hell
But wherever you are
I hope the high road leads you home again
To a world you want to live in

Those who read the Wrongologist in email can view the video here.

Facebooklinkedinrss