Cyber Security Expert: Election Cyberattack ‘Threat Is Real’ | MSNBC

September 11, 2019 posted by


NEED TO DEFEND THEMSELVES FROM THOSE SORTS OF ATTACKS WAS — IT THOSE SORTS OF ATTACKS WAS — IT WAS TOO MUCH FOR US TO TAKE. WAS TOO MUCH FOR US TO TAKE.>>JOINING ME NOW, SEAN HENRY,>>JOINING ME NOW, SEAN HENRY, FORMER ASSISTANT DIRECTOR AND FORMER ASSISTANT DIRECTOR AND MSNBC CYBER SECURITY AND MSNBC CYBER SECURITY AND NATIONAL SECURITY ANALYST. NATIONAL SECURITY ANALYST. I WANT TO GET TO IT HERE. I WANT TO GET TO IT HERE. I’M CURIOUS ABOUT THE SERIOUS I’M CURIOUS ABOUT THE SERIOUS NATURE OF THIS HACKING THREAT TO NATURE OF THIS HACKING THREAT TO U.S. ELECTION SYSTEMS. U.S. ELECTION SYSTEMS. WHERE ARE THESE SYSTEMS WHERE ARE THESE SYSTEMS VULNERABLE? VULNERABLE?>>WELL, ALEX, THESE SYSTEMS ARE>>WELL, ALEX, THESE SYSTEMS ARE SOMEWHAT DISPARATE. SOMEWHAT DISPARATE. YOU’VE GOT STATE, LOCAL AND YOU’VE GOT STATE, LOCAL AND FEDERAL ELECTION PROCESSES. FEDERAL ELECTION PROCESSES. AND YOU’VE GOT TO THINK ABOUT AND YOU’VE GOT TO THINK ABOUT LEADING UP TO THE ACTUAL LEADING UP TO THE ACTUAL ELECTION, ALL THE MANY MONTHS ELECTION, ALL THE MANY MONTHS AND EVEN YEARS OF WORK THAT’S AND EVEN YEARS OF WORK THAT’S BEING DONE BY CAMPAIGNS. BEING DONE BY CAMPAIGNS. THEN YOU’VE GOT THE ACTUAL PACs THEN YOU’VE GOT THE ACTUAL PACs INVOLVED, THE DAY-TO-DAY VOTING INVOLVED, THE DAY-TO-DAY VOTING ON ELECTION DAY. ON ELECTION DAY. AND THEN POST THE ELECTION, AND THEN POST THE ELECTION, YOU’VE GOT ALL THE PROCESSING YOU’VE GOT ALL THE PROCESSING AND THE TALLYING OF THE VOTES. AND THE TALLYING OF THE VOTES. SO THIS IS A WIDELY DISPARATE SO THIS IS A WIDELY DISPARATE PROCESS. PROCESS. THAT BEING SAID, THE DEPARTMENT THAT BEING SAID, THE DEPARTMENT OF HOMELAND SECURITY HAS OF HOMELAND SECURITY HAS RECENTLY DESIGNATED OUR ELECTION RECENTLY DESIGNATED OUR ELECTION PROCESS AS CRITICAL PROCESS AS CRITICAL INFRASTRUCTURE. INFRASTRUCTURE. CRITICAL INFRASTRUCTURE BEING CRITICAL INFRASTRUCTURE BEING THOSE SYSTEMS AND NETWORKS THAT THOSE SYSTEMS AND NETWORKS THAT ARE SO VITAL TO THE AMERICAN WAY ARE SO VITAL TO THE AMERICAN WAY OF LIFE, IF THEY WERE SOMEHOW OF LIFE, IF THEY WERE SOMEHOW ATTACKED OR DISRUPTED, THEY ATTACKED OR DISRUPTED, THEY WOULD HAVE A SIGNIFICANT IMPACT WOULD HAVE A SIGNIFICANT IMPACT ON NATIONAL SECURITY. ON NATIONAL SECURITY. SO THE THREAT IS REAL. SO THE THREAT IS REAL. AND IT GOES BEYOND NATION AND IT GOES BEYOND NATION STATES. STATES. THERE ARE A LOT OF THERE ARE A LOT OF ORGANIZATIONS, ENTITIES, ORGANIZATIONS, ENTITIES, ADVERSARIES, LOOKING TO DISRUPT ADVERSARIES, LOOKING TO DISRUPT OUR WAY OF LIFE, ALEX. OUR WAY OF LIFE, ALEX.>>SO, SEAN, A MICROSOFT>>SO, SEAN, A MICROSOFT EXECUTIVE WAS TELLING THE ASPEN EXECUTIVE WAS TELLING THE ASPEN SECURITY FORUM THAT HIS COMPANY SECURITY FORUM THAT HIS COMPANY DEALT WITH A TAX ON THREE 2018 DEALT WITH A TAX ON THREE 2018 ELECTION CAMPAIGNS. ELECTION CAMPAIGNS. IS THIS PROBLEM TOO INTIMIDATING IS THIS PROBLEM TOO INTIMIDATING FOR THE SMALLER CAMPAIGNS, AND FOR THE SMALLER CAMPAIGNS, AND SHOULD THE GOVERNMENT GET MORE SHOULD THE GOVERNMENT GET MORE INVOLVED IN TRYING TO PROTECT INVOLVED IN TRYING TO PROTECT THE CANDIDATES? THE CANDIDATES?>>I’VE GOT TO TELL YOU, THOUGH>>I’VE GOT TO TELL YOU, THOUGH WE’VE HEARD JUST IN 2016 ABOUT WE’VE HEARD JUST IN 2016 ABOUT ELECTION ISSUES, THIS GOES BACK ELECTION ISSUES, THIS GOES BACK MANY YEARS, BACK IN 2008 WHEN I MANY YEARS, BACK IN 2008 WHEN I WAS IN THE FBI AND THE CYBER WAS IN THE FBI AND THE CYBER DIVISION, THERE WAS AN ATTACK BY DIVISION, THERE WAS AN ATTACK BY CHINA AGAINST BOTH THE OBAMA AND CHINA AGAINST BOTH THE OBAMA AND THE McCAIN CAMPAIGN. THE McCAIN CAMPAIGN. SO THIS IS SOMETHING THAT’S BEEN SO THIS IS SOMETHING THAT’S BEEN GOING ON FOR OVER A DECADE. GOING ON FOR OVER A DECADE. I THINK THAT WHEN WE THINK ABOUT I THINK THAT WHEN WE THINK ABOUT THE CAPABILITIES OF ADVERSARIES, THE CAPABILITIES OF ADVERSARIES, WHAT THEIR TOOLS AND TACTICS WHAT THEIR TOOLS AND TACTICS ARE, WHAT THEIR SPECIFIC ARE, WHAT THEIR SPECIFIC MOTIVATIONS ARE, THAT IT MOTIVATIONS ARE, THAT IT ABSOLUTELY GOES ABOVE AND BEYOND ABSOLUTELY GOES ABOVE AND BEYOND THE CAPABILITIES AND THE THE CAPABILITIES AND THE EXPERTISE OF SOME OF THESE EXPERTISE OF SOME OF THESE SMALLER ENTITIES. SMALLER ENTITIES. WHEN YOU THINK ABOUT COUNTIES WHEN YOU THINK ABOUT COUNTIES AND LOCAL ORGANIZATIONS. AND LOCAL ORGANIZATIONS. AND THAT THE ABILITY OF THE AND THAT THE ABILITY OF THE UNITED STATES GOVERNMENT WITH UNITED STATES GOVERNMENT WITH ITS MANY RESOURCES AND ITS ITS MANY RESOURCES AND ITS EXPERTISE, THEY CAN ADD A LOT OF EXPERTISE, THEY CAN ADD A LOT OF VALUE TO HELP PROTECT THAT VALUE TO HELP PROTECT THAT CRITICAL ELECTION PROCESS. CRITICAL ELECTION PROCESS.>>SO DEPUTY AG, ROD ROSENSTEIN,>>SO DEPUTY AG, ROD ROSENSTEIN, HAS ANNOUNCED A DOJ PLAN TO HAS ANNOUNCED A DOJ PLAN TO BATTLE ELECTION HACKING. BATTLE ELECTION HACKING. THERE ARE SIX MAJOR THREATS, IN THERE ARE SIX MAJOR THREATS, IN HIS MIND. HIS MIND. AND I’M GOING TO GO THROUGH THEM AND I’M GOING TO GO THROUGH THEM HERE. HERE. DIRECT DAMAGE TO COMPUTER DIRECT DAMAGE TO COMPUTER SYSTEMS. SYSTEMS. DATA THEFT. DATA THEFT. FRAUD SCHEMES. FRAUD SCHEMES. EXTORTION. EXTORTION. BLACKMAIL. BLACKMAIL. ATTACKS ON CRITICAL ATTACKS ON CRITICAL INFRASTRUCTURE. INFRASTRUCTURE. AND MALIGNED FOREIGN INFLUENCE AND MALIGNED FOREIGN INFLUENCE OPERATIONS. OPERATIONS. YOUR ASSESSMENT ON THAT? YOUR ASSESSMENT ON THAT? IS HE SPOT ON WITH THE TARGET IS HE SPOT ON WITH THE TARGET THERE, AND WOULD THAT MAKE A THERE, AND WOULD THAT MAKE A DENT ON THE VOLUME OF ATTACKS DENT ON THE VOLUME OF ATTACKS EXPECTED AS MID TERMS ROLL EXPECTED AS MID TERMS ROLL AROUND IF THEY DO INVEST IN AROUND IF THEY DO INVEST IN TRYING TO FOIL ANYTHING FROM TRYING TO FOIL ANYTHING FROM THESE SOURCES? THESE SOURCES?>>I THINK THE DEPUTY ATTORNEY>>I THINK THE DEPUTY ATTORNEY GENERAL IS SPOT ON IN TERMS OF GENERAL IS SPOT ON IN TERMS OF THE TYPE OF THREATS. THE TYPE OF THREATS. AND HE’S TALKING SPECIFICALLY AND HE’S TALKING SPECIFICALLY ABOUT ELECTIONS. ABOUT ELECTIONS. THIS IS SUCH A MUCH BROADER THIS IS SUCH A MUCH BROADER ISSUE AGAINST ALL CRITICAL ISSUE AGAINST ALL CRITICAL INFRASTRUCTURE. INFRASTRUCTURE. ELECTRIC POWER AND ENERGY, ELECTRIC POWER AND ENERGY, WATER, ET CETERA. WATER, ET CETERA. IN TALKING ABOUT SPECIFICALLY IN TALKING ABOUT SPECIFICALLY THE ELECTIONS, THE U.S. THE ELECTIONS, THE U.S. GOVERNMENT HAS A LOT THAT THEY GOVERNMENT HAS A LOT THAT THEY CAN BRING TO BEAR AGAINST THESE CAN BRING TO BEAR AGAINST THESE MULTIPLE ADVERSARIES. MULTIPLE ADVERSARIES. FIRST THEY CAN BRING FIRST THEY CAN BRING INTELLIGENCE THAT THEY’VE INTELLIGENCE THAT THEY’VE COLLECTED. COLLECTED. TO MAKE PEOPLE AWARE. TO MAKE PEOPLE AWARE. THE LOCAL AGENCIES ABOUT WHO THE THE LOCAL AGENCIES ABOUT WHO THE PARTICULAR ACTORS ARE AND WHAT PARTICULAR ACTORS ARE AND WHAT TYPES OF THINGS THEY SHOULD BE TYPES OF THINGS THEY SHOULD BE LOOKING FOR. LOOKING FOR. THEY CAN ALSO PROVIDE EXPERTISE THEY CAN ALSO PROVIDE EXPERTISE IN TERMS OF INCIDENT RESPONSE, IN TERMS OF INCIDENT RESPONSE, TRAINING AND THE LIKE. TRAINING AND THE LIKE. AT THE END OF THE DAY, AT THE END OF THE DAY, UNFORTUNATELY, THE GOVERNMENT IS UNFORTUNATELY, THE GOVERNMENT IS NOT PUTTING UP SENSORS IN THE NOT PUTTING UP SENSORS IN THE ISPs THAT ARE BLOCKING ALL THE ISPs THAT ARE BLOCKING ALL THE MALICIOUS TRAFFIC. MALICIOUS TRAFFIC. THE LOCAL AGENCIES ARE GOING TO THE LOCAL AGENCIES ARE GOING TO BE RESPONSIBLE FOR DEPLOYING BE RESPONSIBLE FOR DEPLOYING TECHNOLOGY AND DETECTING AND TECHNOLOGY AND DETECTING AND DISRUPTING THESE SPECIFIC DISRUPTING THESE SPECIFIC THREATS THEMSELVES. THREATS THEMSELVES. THERE IS AN AWFUL LOT THE THERE IS AN AWFUL LOT THE GOVERNMENT CAN DO, A LOT MORE GOVERNMENT CAN DO, A LOT MORE THAT’S GOING TO REQUIRE A THAT’S GOING TO REQUIRE A COMPREHENSIVE PROCESS ACROSS ALL COMPREHENSIVE PROCESS ACROSS ALL THE AGENCIES IN THE U.S. THE AGENCIES IN THE U.S. GOVERNMENT, BRINGING OUR GOVERNMENT, BRINGING OUR RESOURCES TO BEAR AGAINST THIS RESOURCES TO BEAR AGAINST THIS MOST SIGNIFICANT THREAT TO OUR

27 Comments

27 Replies to “Cyber Security Expert: Election Cyberattack ‘Threat Is Real’ | MSNBC”

  1. Bob Smoth says:

    Paper ballots take longer to count but they can't be hacked

  2. Oba*** Man says:

    The only computer safe out there, is a computer that is not connected to the internet, lock inside a storage room with security guards outside the door protecting any entry.

  3. Ondrášovku Ne says:

    Who is loving MSNBC ?

  4. She's my President says:

    Cyber attack will come from THE Intel agencies and then they'll blame the candidates they dont want in office , they dont answer to nobody.

  5. Oba*** Man says:

    Every country in the world, uses paper ballots for their presidential election

  6. Mr. Chiweeni says:

    Just noticed that the entire website for voting in Massachusetts isn't secure.
    http://www.sec.state.ma.us/

  7. She's my President says:

    Word is; Dept of Homeland Security stole 5 states for Hillary in 2016 .. DEPT of HOMELAND SECURITY was doing the hacking but trying to make it look like the Russians

  8. Stephen Miller says:

    This administration ended the cyber security position. and trump says russia will help with cyber attacks.

  9. Ali Alghail says:

    ' Fear Factor' is back. Only a war will distract Americans from their real problems. It is so sad that even Trump can call Fear Factor.

  10. Ilona Bacskai says:

    The infrastructure for the cybersecurity is not coherent and most of them not up to date. As financially only the top federal agencies has significance in the matter of data protection and accessibility blocking. Just plain lie and insane if he say just need a comprehensive approach. First need to HAVE infrastructure what ABLE to and capable to run security dataprocessing. The fundament to have every voting station in every counties this should be on the federal budget 20years ago. And since chip in whatever local state taxpayers could within a security nightmare of incompability in software and program what old hard drives unable to add the needed security above the current capacity of old computers. The needed datahandeling capability still at the level of 1995 with the same 1995 security protection software's! I'm the 21th century and with apps and games what have abilities to intrude such low level software. Beside the old system crash if cannot have processing ram by the avaridge hard drive only 80 gig from 2004! When a phone has larger storage within the speed and processing synchronisation of protection actual time. As by the news the Russians ARE invested into such infrastructure within capacity and capabilities. For the very reason. But by not the profitability but national security; what China followed and the American companies complain they CAN get blocked if the government censorship wanna! WHY it is a surprise for the Intel community such advancement?? Why! Because nobody paid for new computers only the Obama administration's had update for SOME offices for security reason. But not the very election what ABLE to form the government in both level. Bill to pay or pay much more by the neglect of not paid IN TIME for such protection for the national interest or the budgets of "responsible representation" including the budget of all Intel community. 😨

  11. Verruca says:

    The Russians already have their man in the WH – how are you going to stop them swinging the mid-terms without full co-operation from government?

  12. Wilson says:

    And the Republican led Senate just voted down a Bill to increase funding to prevent 'cyber attacks'…

  13. FACTS over FICTION says:

    Vote DEMOCRATIC,if you want to live,and for your children's future

  14. Septembers Whisper says:

    More of concern here are the facts that Calif democrats are registering illegals to vote, and as always doing the same in many other states. Given that and the fact democrats refuse to enforce ID's for elections, well, there you have it. That seems like the real threat here in our country.

  15. Sean Dring says:

    Don't run Kaspersky Anti-virus as iIt a Russian product. It's a great product on the face of it but there's a risk Putin could hijack it for his own use.

  16. 99smite says:

    Refusing to set up efficient cyber security is criminal neglect on the side of ALL REPUBLICUNTS! They're traitors and should be handled as such, their assets seized and their fat bodies put on display where they can dance the hemp fandango…

  17. Jane Doe says:

    Paper and pen ballots of chads need to come back for the Nov. election. Nothing else is safe. National Guard should be called to guard all polling places to protect the vote. No electronic should be allowed.

  18. Richard Carlington says:

    oh Russia, you're on my side? then I ain't doing anything to stop your interference…so say Republicans, so say they all.

  19. oogachaka says:

    What Shawn says goes in-contrary to what Rand Paul stated earlier about the elections.

  20. wandering spirit says:

    Thank God the Republicans are doing something about cyber security. The Democrats were asleep
    at the wheel for eight years and let the China, iran, NOKO and Russia meddle and rob us blind
    of military secrets and intellectual property with China being the biggest thief of them all.

  21. M A says:

    Designation of critical infrastructure is great but that also mean the government makes the voting machines and it's software more secretive.
    Both should be open to the public for audit because we shouldnt trust any party that happens to be in charge of the government at the time to verify the vote. We also need to go back to paper for voting.

  22. Junior Harry says:

    Hi Alex.👋.
    Exceptional, excellent, brilliant(smart) reporting.👍👏👏.
    Keep on digging, Alex.👍.
    👉👉Patience democrats, patience.👍.

  23. Swissffun Nani says:

    Constitutional Amendment to reform ELECTIONS: voter access, standard methods, universal registration, felon voting, Electoral College, financing,

  24. ulli goschmidt says:

    Of course the Retrumplicans will do nothing.They are the ones who will profit from that voter fraud.

  25. andtam008 says:

    It's crazy when there's no paper trail in electronic voting.

  26. Mary Willson says:

    Bye bye, electrical grid, it was great having you around, you were really useful. Too bad about The Donald throwing you under the bus too. We'll mourn you while we're dying of thirst

  27. SmokeStack says:

    Never put voting machines online and you wouldn't have to worry about it. If it has a functional connection to the internet it is hackable.

Leave a Comment

Your email address will not be published. Required fields are marked *