Monday, June 5, 2017

NSA Document Indicates Russia May Have Attempted To Hack 2016 Voting Systems


The Intercept is reporting that a top-secret National Security Agency document indicates Russian government hackers may have attempted to hack more than 100 local election systems before Election Day 2016.

Russian military intelligence executed a cyber attack on at least one U.S. voting software supplier and sent spear-phishing emails to more than 100 local election officials just days before last November’s presidential election, according to a highly classified intelligence report obtained by The Intercept.

The top-secret National Security Agency document, which was provided anonymously to The Intercept and independently authenticated, analyzes intelligence very recently acquired by the agency about a months-long Russian intelligence cyber effort against elements of the U.S. election and voting infrastructure. The report, dated May 5, 2017, is the most detailed U.S. government account of Russian interference in the election that has yet come to light.

The report indicates that Russian hacking may have penetrated further into U.S. voting systems than was previously understood. It states unequivocally in its summary statement that it was Russian military intelligence, specifically the Russian General Staff Main Intelligence Directorate, or GRU, that conducted the cyber attacks described in the document.

According to Huffington Post, the leaker of the document has been arrested.

A government contractor in Georgia was arrested this weekend after a classified National Security Agency report was leaked on an alleged cyberattack attempt by Russian military intelligence officers on a voting software company and local election officials.

Reality Leigh Winner, a 25-year-old federal contractor for Pluribus International Corp. who had a top secret security clearance and was working at a government agency, was arrested by FBI agents Saturday at her home in Augusta, Georgia, according to the Justice Department.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.