Search Results for “David E. Sanger”


July 27, 2019
David E. Sanger, Reid J. Epstein and Michael Wines / New York Times

David E. Sanger, Reid J. Epstein and Michael Wines / New York Times  
States Scramble to Address Potential Election Security Problems While Several Agencies Wargame Scenarios, Including Hackers Causing Power Blackouts in Contested Districts

Given fears over the vulnerabilities in and security of American voting systems, a number of states are rushing to address potential voting problems even as intelligence officials fear the U.S. is not ready for the next generation of election threats. Ransomware attacks are a major concern. Several agencies are wargaming scenarios, even examining what would happen if hackers turned off the power in contested districts. “It wouldn’t have to be a long outage” to create the perception that some votes might never be counted, said one official involved in the examination. The NSA fears that Russian hackers are learning to operate from networks based in the United States outside the intelligence agency’s legal purview. Donald Trump has thwarted any coordinated federal effort to tackle the problem and the $380 million that Congress allocated to the problem two years ago has already been spent, while Republican Senate Majority Leader Mitch McConnell has blocked any new spending to address it.

July 26, 2019
David E. Sanger and Catie Edmondson / New York Times

David E. Sanger and Catie Edmondson / New York Times  
Senate Intelligence Committee Report on Russian Efforts Against Election Infrastructure Shows Russia Probed or Targeted All Fifty States During 2016 Election

One day after the former special counsel Robert S. Mueller III warned that Russia was moving again to interfere in U.S. elections “as we sit here,” the Senate Intelligence Committee released the first volume of its investigation into Russian election hacking indicating that election systems in all 50 states were targeted or probed by Russia in 2016, an effort more far-reaching than previously acknowledged and one largely undetected by the states and federal officials at the time. The heavily redacted report describes “an unprecedented level of activity against state election infrastructure” intended largely to search for vulnerabilities in the security of the election systems. The report, entitled “Russian Efforts Against Election Infrastructure,” is so heavily redacted that key recommendations for protecting election infrastructure for 2020 are mostly blacked-out.

Related: CBSNews.com, POLITICO, Axios, AP Breaking News, Intelligence Committee (PDF), Bloomberg, TechCrunch, The Verge, StateScoop, Mother Jones, Vox, emptywheel, Dark Reading: Attacks/Breaches, Engadget

Tweets:@jennycohn1 @SenatorBurr

CBSNews.com: Election security report on Russian meddling released by Senate panel
POLITICO: Senate Intelligence Committee details Russian activities to disrupt 2016 vote
Axios: Senate Intel releases 1st half of report on Russian interference in 2016 election
AP Breaking News: The Latest: Report says states have outdated voting machines
Intelligence Committee: REPORT OF THE SELECT COMMITTEE ON INTELLIGENCE UNITED STATES SENATE ON RUSSIAN ACTIVE MEASURES CAMPAIGNS AND INTERFERENCE IN THE 2016 U.S. ELECTIONVOLUME 1: RUSSIAN EFFORTS AGAINST ELECTIONINFRASTRUCTUREWITH ADDITIONAL VIEWS (PDF)
Bloomberg: Senate Probe Finds ‘Extensive’ Russian Meddling in U.S. Election
TechCrunch: Senate Intelligence Committee releases first volume of its investigation into Russian election hacking
The Verge: Russia targeted election systems in all 50 states, Senate concludes
StateScoop: State IT and elections officials struggled to communicate, says Senate report on 2016 Russian hacking
Mother Jones: The Senate Intel Committee Just Released a Report Detailing Russia’s “Extensive” Meddling in the 2016 Elections
Vox: New Senate Intelligence report shows “extensive” Russia 2016 election interference
emptywheel: Sergey Kislyak, Guccifer 2.0, and Maria Butina Walk into an Election Precinct
Dark Reading: Attacks/Breaches: Senate Report: US Election Security ‘Sorely Lacking’ in 2016
Engadget: Intelligence Committee releases heavily redacted report on 2016 election hacking

@jennycohn1: Here’s part of @RonWyden ’s corrective comments to the misleading new Senate Intelligence Committee report. Note also that the SIC report addresses only foreign interference, ignoring the obvious potential for DOMESTIC interference. The SIC thinks we’re too stupid to notice. 2/
@SenatorBurr: 1/ Today, the Senate Intelligence Committee released its report on election security - the first volume in our bipartisan investigation into Russian interference attempts in the 2016 U.S. elections. Read it here: (link: https://www.burr.senate.gov/press/releases/senate-intel-releases-election-security-findings-in-first-volume-of-bipartisan-russia-report) burr.senate.gov/press/releases…
:


September 23, 2019
David E. Sanger and Julian E. Barnes / New York Times

David E. Sanger and Julian E. Barnes / New York Times  
White House Views Cyber Strike Against Iran as Most Appealing Course of Action but Pentagon, Cyber Command Warn That It’s No ‘Magic Bullet’ and Might Trigger Even Larger Iranian Counterattack, Sources

A second cyber strike against Iran after one launched three months ago has emerged as the most appealing course of action for the White House, according to several senior officials, although a broader debate is taking place inside and outside the administration over whether a cyberattack alone will be enough to alter Iran’s aggressive calculations. The concerns in White House, the Pentagon and Cyber Command’s operations room center on whether a strong message of deterrence with a cyberattack might trigger an even larger Iranian counterattack. General. Paul Nakasone, head of Cyber Command NSA, and a key player in designing a plan called “Nitro Zeus” to shut down Tehran and other Iranian cities in the event of a war, reportedly warned Trump and his aides that a cyberattack is no “magic bullet” against Iran because Iran has an increasingly skillful “cyber corps.” Other officials in the Administration believe that a sufficiently large cyberattack against Iran would be an effective deterrent against further aggression by the country.

Related: MSSP Alert, Yahoo News, JNS.org, Zero Hedge, TIME, POLITICO, Task & Purpose, Algemeiner.com, Vox

Tweets:@gonzadan @SangerNYT


June 25, 2018
Joseph Cox / Motherboard

Joseph Cox / Motherboard  
FireEye Refutes Chinese Hack-Back Claim in Sanger’s Book, Says Sanger Misunderstood Videos from Victim Organization

FireEye, which acquired security firm Mandiant in 2014, is refuting a claim by New York Times journalist David Sanger in his latest book that Mandiant broke into the laptops of Chinese military hackers, saying that Sanger did not accurately report how the company identified the Chinese hackers. Mandiant discovered in 2013 a Chinese Army economic and industrial espionage campaign targeting organizations for commercial gain. Sanger wrote that Mandiant’s “investigators reached back through the network to activate the cameras on the [Chinese] hackers’ own laptops.” As it turns out, Sanger reviewed live stream videos of APT1 operators interacting with malware command and control servers that Mandiant had provided him and concluded on his own that it was the result of Mandiant “hacking” those computers. The videos Mr. Sanger viewed were from Windows Remote Desktop Protocol (RDP) network packet captures (PCAP) of Internet traffic at these victim organizations and FireEye states it has never turned on the webcam of an attacker or victim system.

May 29, 2019
The Lawfare Podcast

The Lawfare Podcast  
Avril Haines, Eric Rosenbach, and David Sanger on U.S. Offensive Cyber Operations

Last month at the 2019 Verify Conference, the William and Flora Hewlett Foundation hosted a panel discussion featuring former CIA Deputy Director Avril Haines, former Pentagon chief of staff Eric Rosenbach, and New York Times national security correspondent David Sanger. They talked about how the U.S. projects power in cyberspace, the difficulties of developing norms to govern state behavior in that domain, and more.

April 3, 2018
The Cyberlaw Podcast

The Cyberlaw Podcast  
Interview with David Sanger

Nick Weaver, Ben Wittes, Stewart Baker and Michael Vatis talk about the FBI and encryption, the Carbanak mastermind busted in Spain, Yevgeny Nikulin extradited to the US over Russian objections and more. The week’s interview is with New York Times reporter David Sanger who talks about the vulnerability of the US grid, the psychic income and electoral popularity that Vladimir Putin gets from crossing the West’s red lines, and whether we’d be better off sparking an escalating set of cyberattacks now or later. (Photo by Jorge Alcala on Unsplash.)

June 6, 2017
Steptoe Cyberlaw Podcast

Steptoe Cyberlaw Podcast  
Interview with David Sanger

Stewart Baker, Karen Eltis, and Maury Shenk discuss the week’s top news including Theresa May’s call for Internet regulation in the wake of the London attacks, Wikimedia’s challenge to NSA surveillance and China’s new cybersecurity law. They also talk with David Sanger, Chief Washington Correspondent for the New York Times to about cyber statecraft topics.

January 8, 2017
David Sanger / New York Times

David Sanger / New York Times  
ODNI Report Shows U.S. Too Slow to React to Russian Hacking Risks, Sanger

The U.S. government is moving at a much slower, analog-type pace in responding to escalating digital threats, New York Times Journalist David Sanger argues, pointing to the publicly released report from U.S. intelligence agencies on the Russian interference in the U.S. election. While some officials saw what was happening, it took sixteen months for the government to see the implications of Russia’s blending of information warfare techniques with the echo chamber of the Internet, allowing Russia to roam freely around the DNC server for eleven months.