<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:snf="http://www.smartnews.be/snf"
     xmlns:media="http://search.yahoo.com/mrss/" >

    <channel>
        <title>The Intercept</title>
        <atom:link href="https://theintercept.com/staff/kimzetter/feed/" rel="self" type="application/rss+xml" />
        <link>https://theintercept.com/staff/kimzetter/</link>
        <description></description>
        <lastBuildDate>Fri, 24 Apr 2026 00:01:11 +0000</lastBuildDate>
        <language>en-US</language>
                <sy:updatePeriod>hourly</sy:updatePeriod>
        <sy:updateFrequency>1</sy:updateFrequency>
        <generator>https://wordpress.org/?v=6.9.4</generator>
<site xmlns="com-wordpress:feed-additions:1">220955519</site>
            <item>
                <title><![CDATA[Israel May Have Destroyed Iranian Centrifuges Simply by Cutting Power]]></title>
                <link>https://theintercept.com/2021/04/13/iran-nuclear-natanz-israel/</link>
                <comments>https://theintercept.com/2021/04/13/iran-nuclear-natanz-israel/#respond</comments>
                <pubDate>Tue, 13 Apr 2021 15:41:09 +0000</pubDate>
                                    <dc:creator><![CDATA[Kim Zetter]]></dc:creator>
                                		<category><![CDATA[National Security]]></category>
		<category><![CDATA[Technology]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=351582</guid>
                                    <description><![CDATA[<p>The details of the blackout at Iran’s Natanz nuclear facility are scattered — but intriguing.</p>
<p>The post <a href="https://theintercept.com/2021/04/13/iran-nuclear-natanz-israel/">Israel May Have Destroyed Iranian Centrifuges Simply by Cutting Power</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><u>The explosion and blackout</u> at the Natanz nuclear facility in Iran <a href="https://www.nytimes.com/2021/04/11/world/middleeast/iran-nuclear-natanz.html">over the weekend</a> raised the specter of past sabotage — including the Stuxnet cyberattack that took out some of Natanz’s centrifuges between 2007 and 2010 as well as an explosion and fire that occurred there last July — destroying about three-fourths of a newly opened plant for the assembly of centrifuges.</p>
<p>Government officials and news reports gave conflicting accounts of what caused the latest blasts, the extent of damage, and Iran’s capacity to quickly recover. Initial reports said there was no harm to the Natanz facility, but Iranian officials later acknowledged damage to its centrifuges.</p>
<p class="p1"></p>
<p>And while media accounts have suggested saboteurs focused on taking out the facility’s electric supply, David Albright, founder and president of the Institute for Science and International Security in Washington, D.C., believes the aim was to destroy centrifuges. Power is easy to restore even when electrical equipment is damaged, allowing enrichment work to quickly resume. But an abrupt blackout that also takes out backup power would have destroyed some centrifuges, Albright says, since they need to be powered down slowly. Failure to do so leads to vibrations that can cause centrifuge rotors and bellows to become damaged and in some cases disintegrate, which is what Albright suspects occurred.</p>
<p>Below is a summary of what we currently know and don’t know about the incident at Natanz.</p>
<h3>What Happened?</h3>
<p>On Sunday, news organizations reported an electrical blackout at the Natanz uranium enrichment plant, located in the desert about 155 miles south of Tehran. Natanz is critical to Iran’s nuclear program. The heavily secured site is protected by anti-aircraft guns and has two large centrifuge halls buried more than 50 feet underground to protect them from airstrikes. Despite the conflicting reports, it appears the facility’s main power distribution equipment — Natanz has its own grid — was taken out with explosives. <a href="https://www.nytimes.com/2021/04/11/world/middleeast/iran-nuclear-natanz.html">Backup emergency electricity</a> also was taken down, and power cut out across the multibuilding compound, Behrouz Kamalvandi, spokesperson for Iran’s Atomic Energy Organization, told Iran’s state-run TV.</p>
<p>Iranian officials initially said there were no casualties or damage to facilities. But Kamalvandi later conceded that the &#8220;small explosion” had “damaged sectors [which] can be quickly repaired.” Kamalvandi was speaking from <a href="https://twitter.com/AbasAslani/status/1381526694532677634">a hospital bed</a>, however, because he had fallen down a 20-foot hole while visiting Natanz after the attack, breaking an ankle and gashing his head. This would suggest that the explosions may have done extensive ground or structural damage.</p>
<p>“This tells me that the damage must be quite a lot in some spots,” says Olli Heinonen, former deputy director of the Safeguards Division of the U.N.’s International Atomic Energy Organization and currently a Distinguished Fellow with the Stimson Center in Washington, DC. “Nuclear installations normally are very safe. There are no open places where you can go down 7 meters just like that. So probably he went to some area that is damaged, and that is a bad sign.”</p>
<p>Reports have indicated that the sabotage set Iran’s uranium enrichment program back nine months. See “How Quickly Can Iran Recover?” below.</p>
<h3>Who Was Behind the Explosions?</h3>
<p>Iranian Foreign Minister Mohammad Javad Zarif blamed the incident on Israeli sabotage, calling it a “terrorist attack” and “nuclear terrorism.” Both U.S. and Israeli sources have told Western reporters that Israel was indeed behind the attack. Though Israel has not formally taken responsibility for the operation, Lt. Gen. Aviv Kohavi, chief of staff of the Israel Defense Forces seemed to hint at Israel’s involvement during a speech on Sunday at a ceremony for Israeli soldiers.</p>
<p>“The IDF’s actions throughout the Middle East are not hidden from our enemies’ vision, who are observing us, seeing our capabilities and carefully considering their next steps,” he said. “By virtue of clever operational activities, the past year was one of the most secure years that the citizens of the State of Israel have known. We will continue to act, combining power and discretion, determination and responsibility — all of this to guarantee the security of the State of Israel.”</p>
<p>Israel has the most to fear from a nuclear-armed neighbor. Although Iran has long insisted that its controversial nuclear program is peaceful and not a weapons program, the U.S. intelligence community found that Iran did have a nuclear weapons program until 2003, when it halted the program following the U.S.-coalition invasion of Iraq. And although Israel has its own nuclear program, it has worked hard to prevent its close neighbors from developing one as well.</p>
<p>Israel has a long history of sabotaging nuclear facilities in Iraq, Syria, and Iran, both through cyber means — including the sophisticated Stuxnet attack against Iran, which Israel conducted with U.S. and <a href="https://www.yahoo.com/entertainment/revealed-how-a-secret-dutch-mole-aided-the-us-israeli-stuxnet-cyber-attack-on-iran-160026018.html">Dutch intelligence agencies</a> — and with conventional bombs and explosives. Israel is also reportedly behind a number of assassinations of Iranian nuclear scientists and officials over the last decade. The Stuxnet attack was particularly significant because it launched the era of cyberwarfare, as it was the first cyberattack known to use a digital weapon that could leap into the physical realm to cause actual destruction of equipment. The highly skilled covert operation was conducted in lieu of a kinetic attack to avoid attribution and an escalation in hostilities with Iran; it remained undetected for three years.</p>
<!-- BLOCK(photo)[1](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22large%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed large-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[1] -->
<img loading="lazy" decoding="async" width="4464" height="2976" class="aligncenter size-large wp-image-351591" src="https://theintercept.com/wp-content/uploads/2021/04/11854633c.jpg" alt="U.S. Defense Secretary Lloyd Austin (L) and Israeli Defense Minister Benny Gantz are seen at a ceremony at the Kirya military base in Tel Aviv, Israel on April 11, 2021." srcset="https://theintercept.com/wp-content/uploads/2021/04/11854633c.jpg?w=4464 4464w, https://theintercept.com/wp-content/uploads/2021/04/11854633c.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2021/04/11854633c.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2021/04/11854633c.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2021/04/11854633c.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2021/04/11854633c.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2021/04/11854633c.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2021/04/11854633c.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2021/04/11854633c.jpg?w=2400 2400w, https://theintercept.com/wp-content/uploads/2021/04/11854633c.jpg?w=3600 3600w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source pullright">U.S. Defense Secretary Lloyd Austin, left, and Israeli Defense Minister Benny Gantz are seen at a ceremony at the Kirya military base in Tel Aviv, Israel, on April 11, 2021.<br/>Photo: Chine Nouvelle/SIPA/Shutterstock</figcaption><!-- END-CONTENT(photo)[1] --></figure><!-- END-BLOCK(photo)[1] -->
<h3>Timing of the Sabotage</h3>
<p>The sabotage on Sunday seemed timed to send a message — both to Iran and to the U.S. and Europe. It occurred just days after talks began in Vienna to revive the 2015 nuclear agreement that the Obama administration had worked hard to broker with Iran to control its uranium enrichment production. The Trump administration, urged on by Israel, unilaterally <a href="https://theintercept.com/2018/05/08/donald-trump-iran-nuclear-deal-john-bolton/">withdrew from the deal</a> in 2018 and imposed <a href="https://theintercept.com/2020/03/17/coronavirus-iran-sanctions/">sanctions</a> on Iran.</p>
<p>The sabotage also occurred the same day U.S. Defense Secretary Lloyd Austin visited Tel Aviv to drum up support for reviving that agreement with Iran. Albright believes it was designed to telegraph to the U.S. that Israel won’t support restoring the old agreement and has no problem scuttling them in order to keep Iran’s nuclear program in check.</p>
<p>The timing of the sabotage was also significant for another reason. The day before the Natanz incident, Iran celebrated National Nuclear Technology Day, an annual event marking the nation’s atomic advances. To mark the event and send a message to its negotiating partners, technicians at Natanz began to operate a small batch of IR-6 centrifuges as well. The majority of centrifuges at Natanz are a model known as IR-1, which is much less efficient at enriching uranium than the IR-6 design. The nuclear agreement signed with Iran in 2015 (known as the Joint Comprehensive Plan of Action, or JCPOA) limited it to using only IR-1 centrifuges, so the installation of the IR-6s is widely seen as a provocation designed to give Iran leverage in the revived talks. To add to the tension, Iran has been enriching uranium gas to <a href="https://www.nytimes.com/2021/01/04/world/middleeast/iran-nuclear-uranium-enrichment.html">20 percent</a> since the Trump administration withdrew from the agreement two years ago. Prior to this, it was enriching uranium to 3 to 5 percent. The higher levels put Iran closer to the 90 percent enrichment that is needed for nuclear weapons, all of which raises the stakes for Israel.</p>
<h3>Was It a Cyberattack?</h3>
<p>Israeli media, among the first to report on the incident, said the sabotage was caused by a <a href="https://www.jpost.com/middle-east/incident-reported-in-iranian-natanz-nuclear-facility-664792">cyberattack</a>, though no details have been reported to support this, and <a href="https://www.nytimes.com/2021/04/11/world/middleeast/iran-nuclear-natanz.html">other reports</a> have said the sabotage was caused by explosives. It is possible to produce physical explosions through a cyber assault, however. In 2007, the U.S. Energy Department&#8217;s Idaho National Laboratory demonstrated that it was possible to physically destroy a 27-ton electrical generator using nothing more than 21 lines of malicious code, in what is known as the <a href="https://www.youtube.com/watch?v=LM8kLaJ2NDU">Aurora Generator Test</a>.</p>
<p>The use of explosives at Natanz doesn’t rule out the possibility that the sabotage involved a hybrid attack with explosives taking out the main power distribution equipment and malicious code taking out the emergency backup power supply to manipulate the frequency converters that control the speed at which the centrifuges spin.</p>
<p>It will take days or weeks before we have a clear understanding of what the attack entailed and how the perpetrators pulled it off, but if an outside generator or transformer was destroyed by explosives, this should become apparent in satellite images that will no doubt be available in the next day or so, Albright said.</p>
<h3>Were Centrifuges Damaged?</h3>
<p>Although the attack targeted the electric distribution at Natanz, the real target was likely the centrifuges. Centrifuges spin in excess of 100,000 revolutions per minute and as noted above, need to be slowed gradually, otherwise they vibrate dangerously, and the rotors and bellows inside can be destroyed.</p>
<p>One reason Iranian officials may have changed their story about the damage at Natanz, initially claiming there was none but later conceding centrifuge damage, is that damage to a centrifuge is generally internal and can’t be seen until technicians remove its outer aluminum casing.</p>
<p>On Monday, the day after the sabotage, Ali Akbar Salehi, head of Iran’s Atomic Energy Organization, said some parts of the enrichment facility are now running on emergency backup electricity, but he didn&#8217;t say if this included the centrifuges.</p>
<p>Albright says that to slow down the centrifuges, the sabotage would have needed to target the frequency converters, which are power supplies that regulate the flow of energy to the centrifuges and their speed. To affect these converters, the attackers would have needed to take out the emergency backup power supply, “which is deep inside the plant,” he said.</p>
<p>“The emergency system will come on as soon as the outside power will stop, and that will run for quite a while and that will keep the centrifuges spinning,” Albright said. “But if you can take out the main power supply and the emergency system, then you can stop the centrifuges.”</p>
<p>The frequency converters, notably, were <a href="https://www.penguinrandomhouse.com/books/219931/countdown-to-zero-day-by-kim-zetter/">also the target of Stuxnet</a> in 2009 and 2010. The malicious Stuxnet code caused the converters to increase and decrease the speed of the centrifuges for timed periods in order to destroy their motors and bellows and spoil the uranium gas inside the centrifuges. The computer systems controlling the frequency converters at Natanz are not connected to the internet, so in that attack, the perpetrators snuck the first version of Stuxnet into the facility on a USB stick carried in with a <a href="https://www.yahoo.com/entertainment/revealed-how-a-secret-dutch-mole-aided-the-us-israeli-stuxnet-cyber-attack-on-iran-160026018.html">mole working for Dutch intelligence</a>. Subsequent versions were delivered to Natanz computers by infecting the laptops of outside engineers who worked at the plant and who then unwittingly carried Stuxnet into Natanz on their computers.,</p>
<p>Although Iran has been testing a number of different models of centrifuge at Natanz, the vast majority of centrifuges there are IR-1s. Iran has 6,000 of these at Natanz and over the last five months has also installed 1,000 <a href="https://www.nti.org/analysis/articles/iranian-centrifuge-model-collection/">IR-2m</a> centrifuges. Salehi told Iranian news media that the only centrifuges damaged in Sunday’s attack were IR-1s: the same centrifuge model that Stuxnet targeted a decade ago.</p>
<p>IR-1 centrifuges are very difficult to stop when they are spinning at full speed, Albright says.</p>
<p>“It requires slowing down the speed, stopping, and waiting for the centrifuge to stabilize [at several stages]. If you don’t do that, then the centrifuge can just crash. At a certain speed of revolutions, they will start to shake like a <a href="https://www.youtube.com/watch?v=no7ZPPqtZEg">vibrating string</a>.”</p>
<p>Without pauses to stabilize, the vibrations will increase, causing the rotor inside to scrape the side of the aluminum casing, which is just a few millimeters away from the rotor, and destroy the rotor and internal casing.</p>
<p>“It will be like shrapnel going off, and you’ll hear it break,” Albright said. “They would hear it all through the plant if these things are breaking.”</p>
<!-- BLOCK(photo)[2](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22large%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed large-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[2] -->
<img loading="lazy" decoding="async" width="3000" height="1927" class="aligncenter size-large wp-image-351594" src="https://theintercept.com/wp-content/uploads/2021/04/GettyImages-73849888.jpg" alt="A general view of the Natanz nuclear enrichment facility, is seen on April 9, 2007, 180 miles south of Tehran, Iran." srcset="https://theintercept.com/wp-content/uploads/2021/04/GettyImages-73849888.jpg?w=3000 3000w, https://theintercept.com/wp-content/uploads/2021/04/GettyImages-73849888.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2021/04/GettyImages-73849888.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2021/04/GettyImages-73849888.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2021/04/GettyImages-73849888.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2021/04/GettyImages-73849888.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2021/04/GettyImages-73849888.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2021/04/GettyImages-73849888.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2021/04/GettyImages-73849888.jpg?w=2400 2400w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source pullright">A general view of the Natanz nuclear enrichment facility, seen on April 9, 2007, located 180 miles south of Tehran, Iran.<br/>Photo: Majid Saeedi/Getty Images</figcaption><!-- END-CONTENT(photo)[2] --></figure><!-- END-BLOCK(photo)[2] -->
<h3>How Quickly Can Iran Recover?</h3>
<p>It remains to be seen how long it will take Iran to recover. News reports have said the sabotage set the program back nine months. Salehi has said, “Enrichment in Natanz has not stopped and is moving forward vigorously.”</p>
<p>Heinonen, the former U.N. atomic safeguards official, says it would not take nine months just to replace a destroyed transformer or generator and the destroyed centrifuges.</p>
<p>“If you need to replace the transformer or the electric supply, that may take some time; it&#8217;s not something you take from the shelf. It’s custom-designed for the purpose,” he said. But it would take only a few weeks to replace it.</p>
<p>He says the issue is likely that Iran will have to rebuild entire cascades; cascades are clusters of centrifuges joined by pipes that carry uranium gas from one to the next as it goes through stages of enrichment. If shrapnel and metal dust created by the rotor scraping the casing got into the piping, that would all have to be replaced.</p>
<p>“[That dust] probably will break additional centrifuges,” he said. “To replace a centrifuge, you need to clean the whole mess, including the cascade piping. If there are small pieces here and there, it’s very difficult to clean such small pipes, so you have to replace them. That is a very time-consuming operation.”</p>
<p>If the frequency converters were damaged as well, then this will add to the recovery time. The devices are tailor-made, and Heinonen said it’s not clear how many Iran has in stock.</p>
<p>Heinonen said Iran can recover more quickly by simply abandoning the affected cascades and centrifuges and building new cascades in an empty corner of the hall, and installing IR-2m centrifuges that are more efficient than the damaged IR-1s. If Iran has everything it needs for this, it will take six months to rebuild, he said. Not only will Iran be up and running by the end of summer, it will have a more efficient operation.</p>
<p>With 1,500 IR-2m centrifuges, “you are actually exactly where you were last week in terms of enrichment capacity, because these are four times more powerful than the IR-1s,” he said. “So I would install them and show to the world that [they] are back in business, and that will take a few months, provided that the electricity is there.”</p>
<p>This appears to be what Iran is planning to do, not only to recover from the sabotage but also to secure a stronger bargaining position in its nuclear negotiations. Zarif, the Iranian foreign minister, has stated, &#8220;Natanz will be stronger than ever with more advanced machines, and if they think our hand in negotiation is weak, this act will strengthen our position in the negotiations.&#8221;</p>
<h3>How Will Iran Respond to the Attack?</h3>
<p>An Iranian official announced on Tuesday that Iran will <a href="https://www.nbcnews.com/news/world/iran-says-it-will-enrich-uranium-60-percent-purity-after-n1263920">begin to enrich uranium to 60 percent</a> in response to the attack on Natanz. Whether Iran is just using this to gain leverage in the Vienna talks is unclear. But if the enrichment plan proceeds, it would put Iran closer to having weapons-grade uranium than it has ever been, introducing a new level of destabilization in the Middle East.</p>
<p>Iran is also under pressure from lawmakers in Tehran to halt the nuclear talks in Vienna. “Talks under pressure have no meaning,” Abbas Moghtadaie, deputy chair of the Iranian parliament’s national security and foreign policy committee, said in a Clubhouse talk on Monday, <a href="https://www.nytimes.com/2021/04/12/world/middleeast/iran-israel-nuclear-site.html">according</a> to the New York Times.</p>
<p>In addition, Iran has vowed to get revenge for the sabotage. It’s unclear whether this will involve cyberattacks against Israel — similar to attacks that were launched against Israel’s <a href="https://www.timesofisrael.com/cyber-attacks-again-hit-israels-water-system-shutting-agricultural-pumps/">water supply</a> following the previous sabotage at Natanz last July — or include a kinetic response, such as rockets launched across Israel’s northern border by Iran-backed Hezbollah. Whatever the retaliation, it will likely escalate further response from Israel.</p>
<p>Regardless of what Iran does to retaliate, it’s clear that attacks against Iran’s nuclear program won’t end, says Albright.</p>
<p>“The Israelis … want to make the point that this isn’t simply about going back to the [old agreement with Iran]. The fact that the U.S. secretary of defense was there when it happened is a pretty strong signal to the U.S. and Europe that JCPOA … is not going to cut it [going forward].”</p>
<p>The post <a href="https://theintercept.com/2021/04/13/iran-nuclear-natanz-israel/">Israel May Have Destroyed Iranian Centrifuges Simply by Cutting Power</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2021/04/13/iran-nuclear-natanz-israel/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2021/04/AP19311365175839-crop3.jpg?fit=2000%2C1000' width='2000' height='1000' /><post-id xmlns="com-wordpress:feed-additions:1">351582</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2021/04/11854633c.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2021/04/11854633c.jpg?fit=4464%2C2976" medium="image">
			<media:title type="html">Israel Tel Aviv U.S. Lloyd Austin Visit &#8211; 11 Apr 2021</media:title>
			<media:description type="html">U.S. Defense Secretary Lloyd Austin (L) and Israeli Defense Minister Benny Gantz are seen at a ceremony at the Kirya military base in Tel Aviv, Israel on April 11, 2021.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2021/04/11854633c.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2021/04/GettyImages-73849888.jpg?fit=3000%2C1927" medium="image">
			<media:title type="html">Mahmoud Ahmadinejad Announces Scaling-Up Of Nuclear Enrichment Programme</media:title>
			<media:description type="html">A general view of the Natanz nuclear enrichment facility, is seen on April 9, 2007, 180 miles south of Tehran, Iran.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2021/04/GettyImages-73849888.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[SolarWinds Hack Infected Critical Infrastructure, Including Power Industry]]></title>
                <link>https://theintercept.com/2020/12/24/solarwinds-hack-power-infrastructure/</link>
                <comments>https://theintercept.com/2020/12/24/solarwinds-hack-power-infrastructure/#respond</comments>
                <pubDate>Thu, 24 Dec 2020 19:33:33 +0000</pubDate>
                                    <dc:creator><![CDATA[Kim Zetter]]></dc:creator>
                                		<category><![CDATA[Technology]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=338440</guid>
                                    <description><![CDATA[<p>The companies involved used compromised software, but it's not clear if hackers entered their networks. Finding out could be difficult.</p>
<p>The post <a href="https://theintercept.com/2020/12/24/solarwinds-hack-power-infrastructure/">SolarWinds Hack Infected Critical Infrastructure, Including Power Industry</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><u>The hacking campaign</u> that infected numerous government agencies and tech companies with malicious SolarWinds software has also infected more than a dozen critical infrastructure companies in the electric, oil, and manufacturing industries who were also running the software, according to a security firm conducting investigations of some of the breaches.</p>
<p>In addition to the critical infrastructure companies, the SolarWinds software also infected three firms that provide services for such companies, says Rob Lee, CEO of Dragos, Inc., which specializes in industrial control system security and discovered some of the infections.</p>

<p>The service companies are known within the industry as original equipment manufacturers, or OEMs. They sometimes have remote access to critical parts of customer networks, as well as privileges that let them make changes to those networks, install new software, or even control critical operations. This means that hackers who breached the OEMs could potentially use their credentials to control critical customer processes.</p>
<p>“If an OEM has access to a network, and it’s bi-directional, it’s usually for more sensitive equipment like turbine control, and you could actually do disruptive actions,” Lee told The Intercept. “But just because you have access doesn’t mean you know what to do or how to do it. It doesn&#8217;t mean they can then flip off the lights; they have to do more after that.”</p>
<p>But compromising an OEM does magnify the potential risks to infrastructure.</p>
<p>“[I]t’s particularly concerning because … compromising one OEM, depending on where you compromise them, could lead to access to thousands of organizations,” said Lee, a former critical infrastructure threat intelligence analyst for the NSA. “Two of the … OEMs that have been compromised … have access to hundreds of ICS networks around the world.”</p>
<!-- BLOCK(pullquote)[1](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[1] -->“Compromising one OEM could lead to access to thousands of organizations.”<!-- END-CONTENT(pullquote)[1] --></blockquote><!-- END-BLOCK(pullquote)[1] -->
<p>Lee notes that in some cases the OEMs don&#8217;t just have access to customer networks — they actually directly infected their customers with the SolarWinds software. That&#8217;s because some of them use SolarWinds not just on their own networks, but also have installed it on customer networks to manage and monitor those, sometimes without the customers being aware this was done.</p>
<p>Lee wouldn’t identify the OEMs and doesn&#8217;t know if the SolarWinds hackers took an interest in them.</p>
<p>SolarWinds was compromised in March, modified with a so-called &#8220;backdoor&#8221; to provide an attacker access to the network of anyone who downloaded it. Government officials have linked the hack to Russia. The backdoor, which security researchers at cybersecurity company FireEye have dubbed SUNBURST, gathers information about the infected network, then waits about two weeks before sending a beacon to a server owned by the hackers, along with information about the infected network, to signal that the infected system is open for them to surreptitiously enter. The hackers would have used that information to  determine which targets they wanted to burrow into further. Once inside an infected system, the hackers could download more malicious tools and steal employee credentials to gain access to more critical parts of the network — collecting information or altering data or processes there.</p>
<p>Kevin Mandia, CEO of FireEye, has said the attackers only entered about 50 of the thousands of entities that were infected with the backdoor.</p>
<p>Lee said the infections in the critical infrastructure sector occurred not just on companies&#8217; IT networks but also sometimes on actual industrial control system networks that manage critical functions.</p>
<p>There is currently no evidence, however, that the hackers used the backdoor in the SolarWinds software to gain access into the 15 electric, oil, gas, and manufacturing entities that were infected with the software. But Lee notes that it may not be possible to uncover such activity if the attackers did access them and burrow further into the industrial control networks, because critical infrastructure entities generally don’t do extensive logging and monitoring of their control system networks.</p>
<p>“In these ICS networks, most organizations don’t have the data and visibility to actually look for the breach,” says Lee. “So they might determine if they are compromised, but … almost none of them have network logs to … determine if there is follow-on activity [in their network].”</p>
<p>He says all of the infected companies are “doing the necessary hunting and [are] assuming they are compromised.” But without logging to catch the infection and track the hackers’ movements through the network, the companies have to hunt for what looks like malicious behavior. “And this is an adversary that burrows in deep and is very very hard to root out.”</p>
<!-- BLOCK(pullquote)[2](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22left%22%7D) --><blockquote class="stylized pull-left" data-shortcode-type="pullquote" data-pull="left"><!-- CONTENT(pullquote)[2] -->“Almost none of them have network logs.”<!-- END-CONTENT(pullquote)[2] --></blockquote><!-- END-BLOCK(pullquote)[2] -->
<p>If the hackers came in through the infected OEMs instead, using those companies&#8217; credentials and privileged access, it could be even more difficult for OEM customers to spot the hackers’ activity since it would look legitimate.</p>
<p>Dragos notified the three OEMs that they were infected, as well as government officials and officials in President-elect Joe Biden’s incoming administration. An alert published last week by the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency noted that critical infrastructure entities were compromised by SolarWinds software, but didn’t indicate which industries were affected and didn’t note that this included the OEMs for critical infrastructure.<br />
<!-- BLOCK(photo)[3](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22large%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed large-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[3] -->
<img data-recalc-dims="1" height="1024" width="1024" decoding="async" class="aligncenter size-large wp-image-338491" src="https://theintercept.com/wp-content/uploads/2020/12/GettyImages-119416160.jpg?fit=1024%2C1024" alt="Internal computer internet servers are seen at the Telvent GIT SA company headquarters in Madrid, Spain, on Tuesday, July 19, 2011." />
<figcaption class="caption source pullright">Internal computer internet servers are seen at the Telvent GIT SA company headquarters in Madrid on July 19, 2011.<br/>Photo: Denis Doyle/Bloomberg via Getty Images</figcaption><!-- END-CONTENT(photo)[3] --></figure><!-- END-BLOCK(photo)[3] --></p>
<h3>Potential Operations Against a “Pretty Resilient” U.S. Power Grid</h3>
<p>It’s not the first time an OEM in the industrial control system has been hacked. In 2012, hackers believed to be from China breached an OEM called <a href="https://www.wired.com/2012/09/scada-vendor-telvent-hacked/">Telvent</a> and stole engineering drawings and accessed files used to program industrial control systems. Telvent is a division of Schneider Electric that is headquartered in Spain, but its software is used in oil and gas pipelines across the U.S. and Canada, as well as some water control system networks. The breach raised concerns at the time that the hackers could have embedded malicious code in the software to infect customer control systems.</p>
<p>“When you look at industrial networks, many people still believe them to be highly segmented, but that only means segmented from the” corporate enterprise network, Lee said. “While they might be segmented from the enterprise, they have a vast series of connections to OEMs and others who are connected to those networks for maintenance and other [purposes].”</p>
<p>The SolarWinds hacking campaign came to light earlier this month when FireEye revealed that it had been breached by hackers who took software tools the company uses to find vulnerabilities in customer systems. The company then revealed days later that the intruders had gained access to their network using a backdoor that had been implanted in network monitoring software made by the Austin-based company SolarWinds. The software is used widely across government and industry to manage and monitor networks, and SolarWinds has revealed that up to 18,000 customers could have downloaded the infected code.</p>
<p>Investigators in the security community have said they have seen nothing to attribute the SolarWinds campaign to a particular known hacking group or nation, but officials in the government have attributed the operation to Russia, though they haven’t indicated what has led them to this conclusion.</p>
<p>“It’s so many different people in the government [attributing this to Russia], you wouldn’t get this sort of statement if there wasn’t something there,” says James Lewis, a former government official who oversees cybersecurity programs at the Center for Strategic and International Studies. “[T]he forensic guys are looking at what’s left behind [on networks], and that may not be the best way to attribute something. Governments use other methods to look for attribution. So the fact that the forensic people haven’t discovered it isn&#8217;t determinative; they don’t have the full picture.”</p>
<p>Russia has denied responsibility for the hacking operation.</p>
<p>The scope of the hacking operation is still unknown, but so far reports indicate that the <a href="https://www.reuters.com/article/global-cyber/u-s-homeland-security-thousands-of-businesses-scramble-after-suspected-russian-hack-idUSKBN28O1Z3">departments</a> of Homeland Security, Commerce, and the Treasury; at least two national laboratories; the Federal Energy Regulatory Commission; and the <a href="https://www.politico.com/news/2020/12/17/nuclear-agency-hacked-officials-inform-congress-447855">National Nuclear Safety Agency</a>, which maintains the nation’s stockpile of nuclear weapons, were all infected. <a href="https://www.reuters.com/article/us-usa-cyber-breach/microsoft-says-it-found-malicious-software-in-its-systems-idUSKBN28R2ZJ">Microsoft</a>, <a href="https://www.wsj.com/articles/solarwinds-hack-victims-from-tech-companies-to-a-hospital-and-university-11608548402">Cisco, and Intel</a> are among those in the tech sector that were also infected. A number of the intrusions at government agencies went beyond merely being infected by the SolarWinds malware. Sen. Ron Wyden revealed this week that the hackers were able to read and steal emails of some of the top officials at the Treasury Department.</p>
<p>Currently, the campaign is being characterized by security professionals and government officials as an espionage operation. But the compromise of critical infrastructure could have put the hackers in a position to do more than simply steal data, if they wanted to do so. Although there is currently no evidence this was or would have been their intention, Russia has a history of engaging in disruptive operations in critical infrastructure.</p>
<p>In 2015, Russia hacked several <a href="https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/">Ukrainian power distribution plants</a> and took out power for about 230,000 customers for up to six hours in some cases, in the middle of winter. They repeated their operation again in Ukraine in 2016, taking out power to some customers for about an hour, and also struck the State Administration of Railway Transport, which manages Ukraine’s national railway system. The operations led experts to conclude that the Russians were <a href="https://www.vice.com/en/article/bmvkn4/ukrainian-power-station-hacking-december-2016-report">using Ukraine as a test bed</a> to refine hacking techniques that could be used in other countries, such as the U.S.</p>
<p>On Sunday, <a href="https://thehill.com/homenews/sunday-talk-shows/531038-romney-calls-for-response-of-like-magnitude-or-greater-to-russia">speaking</a> on CNN’s “State of the Union,” Sen. Mitt Romney said, “What Russia has done is put in place a capacity to potentially cripple us in terms of our electricity, our power, our water, our communications.” He continued, “This is the same sort of thing one can do in a wartime setting, and so it&#8217;s extraordinarily dangerous, and it’s an outrageous affront on our sovereignty and one that&#8217;s going to have to be met with a very strong response.”</p>
<p>But Suzanne Spaulding, former undersecretary for the Department of Homeland Security who led the division that oversees critical infrastructure security, cautions that the intentions of the SolarWinds adversary are still unknown, and even if they breached networks in the electric, oil, and gas industries, this isn’t the same as having the ability to cause disruption or damage.</p>
<p>&#8220;But you can [still] get a lot of information &#8230; that can help you to plan a truly disruptive attack,” she noted. Because the hackers in the SolarWinds campaign were also able to breach FERC, this could have provided them with information on vulnerabilities and security measures in the U.S. grid that they could later leverage for an attack. She points to the 2015 Russian hack of the Ukrainian distribution plants: The hackers were in the plant networks at least six months doing reconnaissance to understand the equipment and how it worked before taking out the power in December that year.</p>
<!-- BLOCK(pullquote)[4](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[4] -->“You can get a lot of information &#8230; that can help you to plan a truly disruptive attack.”<!-- END-CONTENT(pullquote)[4] --></blockquote><!-- END-BLOCK(pullquote)[4] -->
<p>But even an attack aimed at disrupting the U.S. electric grid would be limited in its effect, she notes.</p>
<p>“It’s hard to have a really impactful attack, particularly on our electric grid, which is pretty resilient,” she said. “[But] we don’t know that that’s what they’re doing.”</p>
<p>In the past, when Russian hackers have targeted the oil and gas industry in hacking operations, Spaulding said the U.S. government assessed that they may have just been looking for information that could make their own oil and gas industry more efficient. “So I don’t think that we can know that their objective here is reconnaissance for being in a position to potentially disrupt critical infrastructure,&#8221; Spaulding said. “I do think that we should always, for planning purposes, assume that and take measures to reduce the damage that could be done. But we can’t know that [this is their intention]. And there’s a difference between assuming that for planning purposes and for mitigation, and assuming that for a [U.S. government] response to Russia.”</p>
<p>Spaulding says this doesn’t mean anyone should take the SolarWinds campaign lightly.</p>
<p>“I don&#8217;t think this is just traditional spy vs. spy espionage. This is of a scale and scope that really is beyond traditional espionage,” she said. “Particularly because we have been told that over half the victims were not government, but were private sector. And if it’s critical infrastructure, not just defense-industrial base, that is not traditional kinds of espionage and that’s very serious.”</p>
<p>Lee cautions that there is no indication yet that the SolarWinds hacking campaign is anything other than espionage at the moment, but just being in critical infrastructure networks gives the adversary potential political power they might not otherwise have. “I&#8217;m thinking about president-elect Biden. The last thing I want him to have to worry about is getting into international relation discussions with Putin or others and not knowing if a foreign adversary can turn their access [in these networks] into a foreign operation on key parts of the infrastructure.”</p>
<p>Although other intruders have been inside the U.S. electric grid before, Lee says this is different. If Iran or China compromises industrial control systems in critical infrastructure, “you assume they could [disrupt operations] but you don’t know [if they have the knowledge and ability],” Lee said. But if Russia is behind the SolarWinds attack, “Russia has shown an ability to go beyond access to disruption. So when they get access you no longer have the question could they use it? The question is how long would it take them and would they?”</p>
<p>The post <a href="https://theintercept.com/2020/12/24/solarwinds-hack-power-infrastructure/">SolarWinds Hack Infected Critical Infrastructure, Including Power Industry</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2020/12/24/solarwinds-hack-power-infrastructure/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2020/12/GettyImages-667160156-e1608833710618.jpg?fit=2500%2C1250' width='2500' height='1250' /><post-id xmlns="com-wordpress:feed-additions:1">338440</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2020/12/GettyImages-119416160.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2020/12/GettyImages-119416160.jpg?fit=2000%2C1409" medium="image">
			<media:title type="html">GettyImages-119416160</media:title>
			<media:description type="html">Internal computer internet servers are seen at the Telvent GIT SA company headquarters in Madrid, Spain, July 19, 2011.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2020/12/GettyImages-119416160.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[How Cops Can Secretly Track Your Phone]]></title>
                <link>https://theintercept.com/2020/07/31/protests-surveillance-stingrays-dirtboxes-phone-tracking/</link>
                <comments>https://theintercept.com/2020/07/31/protests-surveillance-stingrays-dirtboxes-phone-tracking/#respond</comments>
                <pubDate>Fri, 31 Jul 2020 11:00:04 +0000</pubDate>
                                    <dc:creator><![CDATA[Kim Zetter]]></dc:creator>
                                		<category><![CDATA[Justice]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[Technology]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=313025</guid>
                                    <description><![CDATA[<p>A guide to stingray surveillance technology, which may have been deployed at recent protests.</p>
<p>The post <a href="https://theintercept.com/2020/07/31/protests-surveillance-stingrays-dirtboxes-phone-tracking/">How Cops Can Secretly Track Your Phone</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><u>Since May, as</u><span style="font-weight: 400"> protesters around the country have marched against police brutality and in support of the Black Lives Matter movement, activists have spotted a recurring presence in the skies: mysterious <a href="https://theintercept.com/2020/07/23/air-force-surveillance-plane-portland-protests/">planes</a> and helicopters hovering overhead, apparently conducting surveillance on protesters. </span><span style="font-weight: 400">A press release from the Justice Department at the end of May revealed that the Drug Enforcement Agency and U.S. Marshals Service were asked by the Justice Department to </span><a href="https://www.justice.gov/opa/pr/attorney-general-william-p-barr-s-statement-death-george-floyd-and-riots"><span style="font-weight: 400">provide unspecified support to law enforcement</span></a><span style="font-weight: 400"> during protests. A few days later, a </span><a href="https://www.buzzfeednews.com/article/jasonleopold/george-floyd-police-brutality-protests-government"><span style="font-weight: 400">memo</span></a><span style="font-weight: 400"> obtained by BuzzFeed News offered a little more insight on the matter; it revealed that shortly after protests began in various cities, the DEA had sought special authority from the Justice Department to covertly spy on Black Lives Matter protesters on behalf of law enforcement. </span></p>
<p><span style="font-weight: 400">Although the press release and memo didn’t say what form the support and surveillance would take, it’s likely that the two agencies were being asked to assist police for a particular reason. Both the DEA and the Marshals possess airplanes outfitted with so-called stingrays or dirtboxes: powerful technologies capable of tracking mobile phones or, depending on how they’re configured, collecting data and communications from mobile phones in bulk.</span></p>
<p class="p1"><!-- BLOCK(promote-post)[0](%7B%22componentName%22%3A%22PROMOTE_POST%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22slug%22%3A%22protests-for-black-lives%22%2C%22crop%22%3A%22promo%22%7D) --><aside class="promote-banner">
    <a class="promote-banner__link" href="/collections/protests-for-black-lives/">
              <span class="promote-banner__image">
          <img loading="lazy" decoding="async" width="300" height="150" src="https://theintercept.com/wp-content/uploads/2020/07/GettyImages-1218280802-crop.jpg?fit=300%2C150" class="attachment-medium size-medium" alt="" srcset="https://theintercept.com/wp-content/uploads/2020/07/GettyImages-1218280802-crop.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2020/07/GettyImages-1218280802-crop.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2020/07/GettyImages-1218280802-crop.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2020/07/GettyImages-1218280802-crop.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2020/07/GettyImages-1218280802-crop.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2020/07/GettyImages-1218280802-crop.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2020/07/GettyImages-1218280802-crop.jpg?w=1000 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" />        </span>
            <div class="promote-banner__text">
                  <p class="promote-banner__eyebrow">
            Read Our Complete Coverage          </p>
        
        <h2 class="promote-banner__title">Protests for Black Lives</h2>
      </div>
    </a>
  </aside><!-- END-BLOCK(promote-post)[0] --></p>
<p><span style="font-weight: 400">Stingrays have been used on the ground and in the air by law enforcement for years but are highly controversial because they don’t just collect data from targeted phones; they collect data from any phone in the vicinity of a device. That data can be used to identify people — protesters, for example — and track their movements during and after demonstrations, as well as to identify others who associate with them. They also can inject spying software onto specific phones or direct the browser of a phone to a website where malware can be loaded onto it, though it’s not clear if any U.S. law enforcement agencies have used them for this purpose.</span></p>
<p class="p1"></p>
<p><span style="font-weight: 400">Although law enforcement has been using the technologies since the 1990s, the general public learned about them only in the last decade, and much about their capabilities remains unknown because law enforcement agencies and the companies that make the devices have gone to great lengths to keep details secret. Stingrays are routinely used to target suspects in drug and other criminal investigations, but activists also believe the devices were used during </span><a href="https://www.kgw.com/article/news/nd-pipeline-protesters-question-aircraft-surveillance-jamming/283-345780315"><span style="font-weight: 400">protests against the Dakota Access pipeline</span></a><span style="font-weight: 400">, and against Black Lives Matter protesters over the last three months. The Justice Department requires federal agents to obtain a probable cause warrant to use the technology in criminal cases, but there is a </span><a href="https://www.eff.org/deeplinks/2015/09/finally-doj-reverses-course-and-will-get-warrants-stingrays"><span style="font-weight: 400">carve-out for national security</span></a><span style="font-weight: 400">. Given that President Donald Trump has referred to protesters as “</span><a href="https://www.cnn.com/2020/07/25/politics/us-protests-trump-terrorists-intl/index.html"><span style="font-weight: 400">terrorists</span></a><span style="font-weight: 400">,” and that paramilitary-style officers from the Department of Homeland Security have been deployed to the streets of </span><span style="font-weight: 400"><a href="https://theintercept.com/2020/07/24/portland-federal-police-protests/">Portland</a>, Oregon</span><span style="font-weight: 400">, it’s conceivable that surveillance conducted at recent demonstrations has been deemed a national security matter — raising the possibility that the government may have used stingray technology to </span><a href="https://theintercept.com/2020/06/24/fbi-surveillance-social-media-cellphone-dataminr-venntel/"><span style="font-weight: 400">collect data on protesters</span></a><span style="font-weight: 400"> without warrants.</span></p>
<p><span style="font-weight: 400">To better understand the kind of surveillance that may be directed at protesters, here’s a breakdown of what we know and still don’t know about stingrays, and why their use is so controversial.</span></p>
<h3>What is a stingray?</h3>
<p><span style="font-weight: 400">Stingray is the generic name for an electronic surveillance tool that simulates a cell phone tower in order to force mobile phones and other devices to connect to it instead of to a legitimate cell tower. In doing so, the phone or other device reveals information about itself and its user to the operator of the stingray. Other common names for the tool are “cell-site simulator” and “IMSI catcher.”</span></p>
<h3>Why is it called a stingray?</h3>
<p><span style="font-weight: 400">The name stingray comes from the brand name of a specific commercial model of IMSI catcher made by the Florida-based Harris Corporation. That company’s StingRay is a briefcase-sized device that can be operated from a vehicle while plugged into the cigarette lighter. Harris also makes products like the Harpoon, a signal booster that makes the StingRay more powerful, and the KingFish, a smaller hand-held device that operates like a stingray and can be used by a law enforcement agent while walking around outside a vehicle. About a dozen other companies make variants of the stingray with different capabilities. The surveillance equipment is pricey and often sold as a package. For example, in documents obtained by Motherboard in 2016, Harris offered a </span><a href="https://www.vice.com/en_us/article/gv5k3x/heres-how-much-a-stingray-cell-phone-surveillance-tool-costs"><span style="font-weight: 400">KingFish package that cost $157,300</span></a><span style="font-weight: 400"> and a StingRay package that cost $148,000, not including training and maintenance. Documents obtained this year by the American Civil Liberties Union indicate that Harris has upgraded the StingRay to a newer device it calls a </span><a href="https://www.aclu.org/sites/all/libraries/pdf.js/web/viewer.html?file=https%3A%2F%2Fwww.aclu.org%2Fsites%2Fdefault%2Ffiles%2Ffield_document%2F1-282_-_1_-_march_2020_release_.pdf#page=67"><span style="font-weight: 400">Crossbow</span></a><span style="font-weight: 400">, though <a href="https://www.vice.com/en_us/article/jgxm3g/crossbow-imsi-catcher-new-stingray">not a lot of information</a> is known about how it works. Separately, a </span><a href="https://theintercept.com/document/2015/12/16/government-cellphone-surveillance-catalogue/"><span style="font-weight: 400">classified catalog of surveillance tools</span></a><span style="font-weight: 400"> leaked to The Intercept in 2015 describes other similar devices.</span></p>
<!-- BLOCK(photo)[2](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[2] -->
<img data-recalc-dims="1" height="1024" width="1024" decoding="async" class="aligncenter size-large wp-image-313267" src="https://theintercept.com/wp-content/uploads/2020/06/AP_17325676668811.jpg?fit=1024%2C1024" alt="FILE - This undated file photo provided by the U.S. Patent and Trademark Office shows the StingRay II, a cellular site simulator used for surveillance purposes manufactured by Harris Corporation, of Melbourne, Fla. Police departments across the country use military-developed technology that can track down suspects by using the signals emitted by their cellphones. Civil liberties groups are increasingly raising objections to the suitcase-sized devices known as StingRays that can sweep up cellphone data from an entire neighborhood. (U.S. Patent and Trademark Office via AP, File)" />
<figcaption class="caption source">StingRay II, a cellular site simulator used for surveillance purposes manufactured by Harris Corporation, of Melbourne, Fla.<br/>Photo: U.S. Patent and Trademark Office via AP</figcaption><!-- END-CONTENT(photo)[2] --></figure><!-- END-BLOCK(photo)[2] -->
<h3>How does the stingray work?</h3>
<p><span style="font-weight: 400">Phones periodically and automatically broadcast their presence to the cell tower that is nearest to them, so that the phone carrier’s network can provide them with service in that location. They do this even when the phone is not being used to make or receive a call. When a phone communicates with a cell tower, it reveals the unique ID or IMSI number (International Mobile Subscriber Identity) associated with the SIM card in the phone. The IMSI number identifies that phone and its owner as a paying customer of a cell carrier, and that number can be matched by the carrier to the owner’s name, address, and phone number.</span></p>
<p><span style="font-weight: 400">A stingray masquerades as a cell tower in order to get phones to ping it instead of legitimate cell towers, and in doing so, reveal the phones’ IMSI numbers. In the past, it did this by emitting a signal that was stronger than the signal generated by legitimate cell towers around it. The switch to 4G networks was supposed to address this in part by adding an authentication step so that mobile phones could tell if a cell tower is legitimate. But a security researcher named Roger Piqueras Jover found that the </span><a href="https://arxiv.org/abs/1607.05171"><span style="font-weight: 400">authentication on 4G doesn’t occur</span></a><span style="font-weight: 400"> until after the phone has already revealed its IMSI number, which means that stingrays can still grab this data before the phone determines it’s not communicating with an authentic cell tower and switches to one that is authenticated. That vulnerability </span><a href="https://arxiv.org/abs/1809.06925"><span style="font-weight: 400">still exists in the 5G protocol</span></a><span style="font-weight: 400">, says Jover. Though the 5G protocol offers a feature that encrypts the IMSI when it’s disclosed during pre-authentication communication, law enforcement would simply be able to ask phone carriers to decrypt it for them. And a group of researchers from Purdue University and the University of Iowa also found a way to </span><span style="font-weight: 400"><a href="https://homepage.divms.uiowa.edu/~comarhaider/publications/LTE-torpedo-NDSS19.pdf">guess an IMSI number</a> </span><span style="font-weight: 400">without needing to get a carrier to decrypt it.</span></p>
<p><span style="font-weight: 400">Because a stingray is not really a tower on the carrier’s network, calls and messages to and from a phone can’t go through while the phone is communicating with the stingray. So after the stingray captures the device’s IMSI number and location, the stingray “releases” the phone so that it can connect to a real cell tower. It can do this by broadcasting a message to that phone that effectively tells the phone to find a different tower.</span></p>
<h3>What can law enforcement do with the IMSI number?</h3>
<p><span style="font-weight: 400">Law enforcement can use a stingray either to identify all of the phones in the vicinity of the stingray or a specific phone, even when the phones are not in use. Law enforcement can then, with a subpoena, ask a phone carrier to provide the customer name and address associated with that number or numbers. They can also obtain a historical log of all of the cell towers a phone has pinged in the recent past to track where it has been, or they can obtain the cell towers it’s pinging in real time to identify the user’s current location. By catching multiple IMSI numbers in the vicinity of a stingray, law enforcement can also potentially uncover associations between people by seeing which phones ping the same cell towers around the same time.</span></p>
<p><span style="font-weight: 400">If law enforcement already knows the IMSI number of a specific phone and person they are trying to locate, they can program that IMSI number into the stingray and it will tell them if that phone is nearby. Law enforcement can also home in on the location of a specific phone and its user by moving the stingray around a geographical area and measuring the phone’s signal strength as it connects to the stingray. The Harris StingRay can be operated from a patrol vehicle as it drives around a neighborhood to narrow a suspect’s location to a specific cluster of homes or a building, at which point law enforcement can switch to the hand-held KingFish, which offers even more precision. For example, once law enforcement has narrowed the location of a phone and suspect to an office or apartment complex using the StingRay, they can walk through the complex and hallways using the KingFish to find the specific office or apartment where a mobile phone and its user are located.</span></p>
<h3>Does the device only track mobile phones?</h3>
<p><span style="font-weight: 400">No. In 2008, authorities used a StingRay and a KingFish to locate a suspect who was using an air card: an internet-connectivity device that plugs into a computer and allows the user to get online through a wireless cellular network. The suspect, </span><a href="https://www.theverge.com/2016/1/13/10758380/stingray-surveillance-device-daniel-rigmaiden-case"><span style="font-weight: 400">Daniel Rigmaiden</span></a><span style="font-weight: 400">, was an identity thief who was operating from an apartment in San Jose, California. Rigmaiden had </span><a href="https://www.wired.com/2013/04/verizon-rigmaiden-aircard/"><span style="font-weight: 400">used a stolen credit card number</span></a><span style="font-weight: 400"> and a fake name and address to register his internet account with Verizon. With Verizon’s help, the FBI was able to identify him. They determined the general neighborhood in San Jose where Rigmaiden was using the air card so they could position their stingray in the area and move it around until they found the apartment building from which his signal was coming. They then walked around the apartment complex with a hand-held KingFish or similar device to pinpoint the precise apartment Rigmaiden was using.</span></p>
<h3>What is a dirtbox?</h3>
<p><span style="font-weight: 400">A dirtbox is the common name for specific models of an IMSI catcher that are made by a Boeing subsidiary, Maryland-based Digital Receiver Technology — hence the name “DRT box.” They are reportedly used by the DEA and Marshals Service from airplanes to intercept data from mobile phones. A 2014 </span><span style="font-weight: 400">Wall Street Journal article</span><span style="font-weight: 400"> <a href="https://www.wsj.com/articles/americans-cellphones-targeted-in-secret-u-s-spy-program-1415917533">revealed</a> that the Marshals Service began using dirtboxes in Cessna airplanes in 2007. An airborne dirtbox has the ability to collect data on many more phones than a ground-based stingray; it can also move more easily and quickly over wide areas. According to the </span><a href="https://theintercept.com/document/2015/12/16/government-cellphone-surveillance-catalogue/"><span style="font-weight: 400">2006 catalog of surveillance technologies</span></a><span style="font-weight: 400"> leaked in 2015, models of dirtboxes described in that document can be configured to track up to 10,000 targeted IMSI numbers or phones.</span></p>
<h3>Do stingrays and dirtboxes have other capabilities?</h3>
<p><span style="font-weight: 400">Stingrays and dirtboxes can be configured for use in either active or passive mode. In active mode, these technologies broadcast to devices and communicate with them. Passive mode involves grabbing whatever data and communication is occurring in real time across cellular networks without requiring the phone to communicate directly with the interception device. The data captured can include the IMSI number as well as text messages, email, and voice calls. </span></p>
<p><span style="font-weight: 400">If that data or communication is encrypted, then it would be useless to anyone intercepting it if they don’t also have a way to  decrypt it. Phones that are using 4G employ strong encryption. But stingrays can force phones to downgrade to 2G, a less secure protocol, and tell the phone to use either no encryption or use a weak encryption that can be cracked. They can do this because even though most people use 4G these days, there are some areas of the world where 2G networks are still common, and therefore all phones have to have the ability to communicate on those networks.</span></p>
<p><span style="font-weight: 400">The versions of stingrays used by the military can intercept the contents of mobile communications — text messages, email, and voice calls — and decrypt some types of this mobile communication. The military also uses a jamming or denial-of-service feature that prevents adversaries from detonating bombs with a mobile phone. </span></p>
<p><span style="font-weight: 400">In addition to collecting the IMSI number of a device and intercepting communications, military-grade IMSI catchers can also spoof text messages to a phone, according to David Burgess, a telecommunications engineer who used to work with U.S. defense contractors supporting overseas military operations. Burgess says that if the military knows the phone number and IMSI number of a target, it can use an IMSI catcher to send messages to other phones as if they are coming from the target’s phone. They can also use the IMSI catcher for a so-called man in the middle attack so that calls from one target pass through the IMSI catcher to the target phone. In this way, they can record the call in real time and potentially listen to the conversation if it is unencrypted, or if they are able to decrypt it. The military systems can also send a silent SMS message to a phone to alter its settings so that the phone will send text messages through a server the military controls instead of the mobile carrier’s server.</span></p>
<h3>Can the devices be used to infect phones with malware?</h3>
<p><span style="font-weight: 400">Versions of the devices used by the military and intelligence agencies can potentially inject malware into targeted phones, depending on how secure the phone is. They can do this in two ways: They can either redirect the phone’s browser to a malicious web site where malware can be downloaded to the phone if the browser has a software vulnerability the attackers can exploit; or they can inject malware from the stingray directly into the baseband of the phone if the baseband software has a vulnerability. Malware injected into the baseband of a phone is harder to detect. Such malware can be used to turn the phone into a listening device to spy on conversations. Recently, Amnesty International reported on the cases of two Moroccan activists whose phones </span><a href="https://www.amnesty.org/en/latest/research/2020/06/moroccan-journalist-targeted-with-network-injection-attacks-using-nso-groups-tools/"><span style="font-weight: 400">may have been targeted through such network injection attacks</span></a><span style="font-weight: 400"> to install spyware made by an Israeli company.</span></p>
<p><span style="font-weight: 400">U.S. law enforcement use of stingrays domestically is more curtailed, given that they, unlike the military, need to obtain warrants or court orders to use the devices in federal investigations. But there is little transparency or oversight around how the devices are used by federal agents and local police, so there is still a lot that is unknown: for example, whether they’ve ever been used to record the contents of mobile phone communications or to install malware on phones.</span></p>
<p><a href="https://www.wsj.com/articles/americans-cellphones-targeted-in-secret-u-s-spy-program-1415917533"><span style="font-weight: 400">News stories</span></a><span style="font-weight: 400"> suggest that some models of stingrays used by the Marshals Service can extract text messages, contacts, and photos from phones, though they don’t say how the devices do this. </span><span style="font-weight: 400">Documents</span><a href="https://www.wired.com/2015/10/stingray-government-spy-tools-can-record-calls-new-documents-confirm/"><span style="font-weight: 400"> obtained by the ACLU</span></a><span style="font-weight: 400"> in 2015 also indicate such devices do have the ability to record the numbers of incoming and outgoing calls and the date, time, and duration of the calls, as well as to intercept the content of voice and text communications. But the Justice Department has long asserted publicly that the stingrays it uses domestically </span><a href="http://www.justice.gov/opa/pr/justice-department-announces-enhanced-policy-use-cell-site-simulators"><span style="font-weight: 400">do not intercept the content of communications</span></a><span style="font-weight: 400">. The Justice Department has stated that the devices “may be capable of intercepting the contents of communications and, therefore, such devices must be configured to disable the interception function, unless interceptions have been authorized by a Title III [wiretapping] order.”</span></p>
<p><span style="font-weight: 400">As for jamming communications domestically, Dakota Access pipeline protesters at Standing Rock, North Dakota, in 2016 </span><a href="https://www.kgw.com/article/news/nd-pipeline-protesters-question-aircraft-surveillance-jamming/283-345780315"><span style="font-weight: 400">described planes and helicopters flying overhead</span></a><span style="font-weight: 400"> that they believed were using technology to jam mobile phones. Protesters described having problems such as phones crashing, livestreams being interrupted, and issues uploading videos and other posts to social media.</span></p>
<!-- BLOCK(photo)[3](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[3] -->
<p><img loading="lazy" decoding="async" width="2001" height="295" class="aligncenter size-large wp-image-313368" src="https://theintercept.com/wp-content/uploads/2020/06/singray-theintercept-2-26.png" alt="singray-theintercept-2-26" srcset="https://theintercept.com/wp-content/uploads/2020/06/singray-theintercept-2-26.png?w=2001 2001w, https://theintercept.com/wp-content/uploads/2020/06/singray-theintercept-2-26.png?w=300 300w, https://theintercept.com/wp-content/uploads/2020/06/singray-theintercept-2-26.png?w=768 768w, https://theintercept.com/wp-content/uploads/2020/06/singray-theintercept-2-26.png?w=1024 1024w, https://theintercept.com/wp-content/uploads/2020/06/singray-theintercept-2-26.png?w=1536 1536w, https://theintercept.com/wp-content/uploads/2020/06/singray-theintercept-2-26.png?w=540 540w, https://theintercept.com/wp-content/uploads/2020/06/singray-theintercept-2-26.png?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
</p><!-- END-CONTENT(photo)[3] --></figure><!-- END-BLOCK(photo)[3] -->
<h3>Why are stingrays and dirtboxes so controversial?</h3>
<p><span style="font-weight: 400">The devices don’t just pick up data about targeted phones. Law enforcement may be tracking a specific phone of a known suspect, but any phone in the vicinity of the stingray that is using the same cellular network as the targeted phone or device will connect to the stingray. Documents in a 2011 criminal case in Canada showed that devices used by the Royal Canadian Mounted Police had a range of a third of a mile, and in just three minutes of use, one device had intercepted </span><a href="https://web.archive.org/web/20160419030412/https:/www.theglobeandmail.com/news/national/rcmp-listening-tool-capable-of-knocking-out-911-calls-memo-reveals/article29672075/"><span style="font-weight: 400">136 different phones</span></a><span style="font-weight: 400">.</span></p>
<p><span style="font-weight: 400">Law enforcement can also use a stingray in a less targeted way to sweep up information about all nearby phones. During the time a phone is connecting to or communicating with a stingray, service is disrupted for those phones until the stingray releases them. The connection should last only as long as it takes for the phone to reveal its IMSI number to the stingray, but it’s not clear what kind of testing and oversight the Justice Department has done to ensure that the devices release phones. Stingrays are supposed to allow 911 calls to pass through to a legitimate cell tower to avoid disrupting emergency services, but other emergency calls a user may try to make while their phone is connected to a stingray will not get through until the stingray releases their phone. It’s also not clear how effective the devices are at letting 911 calls go through. The FBI and DHS have indicated that they </span><a href="https://docs.fcc.gov/public/attachments/DOC-355228A2.pdf"><span style="font-weight: 400">haven’t commissioned studies</span></a><span style="font-weight: 400"> to measure this, but a study conducted by federal police in Canada found that the 911 bypass didn’t always work.</span></p>
<p><span style="font-weight: 400">Depending on how many phones are in the vicinity of a stingray, hundreds could connect to the device and potentially have service disrupted. </span></p>
<h3>How long has law enforcement been using stingrays?</h3>
<p><span style="font-weight: 400">The technology is believed to have originated in the military, though it’s not clear when it was first used in combat zones or domestically in the U.S. The earliest public mention of a stingray-like device being used by U.S. law enforcement occurred in 1994, when the FBI used a crude, jury-rigged version of the tool to</span><span style="font-weight: 400"><a href="https://www.wired.com/1996/02/catching/"> track former hacker Kevin Mitnick</a>; authorities </span><span style="font-weight: 400">referred to that device as a Triggerfish. In a case in Utah in 2009, an FBI agent revealed in a court document that cell-site simulators had been in use by law enforcement for more than a decade. He also said they weren’t just used by the FBI but also by the Marshals Service, the Secret Service, and other agencies. Recent documents obtained by the ACLU also indicate that between 2017 and 2019, the Department of Homeland Security’s Homeland Security Investigations unit has </span><a href="https://www.aclu.org/news/immigrants-rights/ice-records-confirm-that-immigration-enforcement-agencies-are-using-invasive-cell-phone-surveillance-devices/"><span style="font-weight: 400">used stingrays at least 466 times</span></a><span style="font-weight: 400"> in investigations. BuzzFeed News had previously obtained records showing that from 2013 to 2017, HSI had used the technology </span><a href="https://www.buzzfeednews.com/article/adolfoflores/this-is-how-many-times-the-department-of-homeland-security"><span style="font-weight: 400">1,885 times</span></a><span style="font-weight: 400">.</span></p>
<h3>Aside from the potential for widespread surveillance, are there other problems with the technology?</h3>
<p><span style="font-weight: 400">The other controversy with stingrays involves secrecy and lack of transparency around their use. Law enforcement agencies and the companies that make the devices have prevented the public from obtaining information about their capabilities and from learning how often the technology is deployed in investigations. Agencies sign nondisclosure agreements with the companies, which they use as a shield whenever journalists or others file public records requests to obtain information about the technology. Law enforcement agencies claim criminals could craft anti-surveillance methods to undermine the technology if they knew how it worked. The companies themselves cite trade secrets and proprietary information to prevent the public from obtaining sales literature and manuals about the technology.</span></p>
<p><span style="font-weight: 400">For years, law enforcement used the devices without obtaining a court order or warrant. Even when they did seek approval from a court, they often described the technology in misleading terms to make it seem less invasive. They would often refer to stingrays in court documents as a “pen register device,” passive devices that sit on a network and record the numbers dialed from a certain phone number. They withheld the fact that the devices force phones to connect to them, that they force other phones that aren’t the target device to connect to them, and that they can perform more functions than simply grabbing an IMSI number. Most significantly, they withheld the fact that the device emits signals that can track a user and their phone inside a private residence. After the FBI used a stingray to track Rigmaiden (the identity thief in San Jose) in his apartment, Rigmaiden’s lawyers got the Justice Department to </span><a href="https://www.wired.com/2011/11/feds-fake-cell-phone-tower/"><span style="font-weight: 400">acknowledge it qualified as a Fourth Amendment search</span></a><span style="font-weight: 400"> that would require a warrant.</span></p>
<p><span style="font-weight: 400">Law enforcement agents have not only deceived judges, however; they’ve also misled defense attorneys seeking information about how agents tracked their clients. In some court documents, law enforcement officials have indicated that they obtained location information about the defendant from a “</span><a href="https://www.aclu.org/blog/free-future/aclu-obtained-documents-reveal-breadth-secretive-stingray-use-florida"><span style="font-weight: 400">confidential source</span></a><span style="font-weight: 400">,” when in truth they used a stingray to track them.</span></p>
<p><span style="font-weight: 400">To address this deception, the Justice Department in 2015 implemented a new policy requiring all federal agents engaged in criminal investigations to obtain a probable cause search warrant before using a stingray. It also requires agents and prosecutors to tell judges when the warrant they are seeking is for a stingray; and it requires them to limit the use of the stingray’s capabilities to tracking the location of a phone and logging the phone numbers for calls received and made by the phone. They cannot collect the contents of communication, such as text messages and emails. And agents are required to purge the data they collect from non-targeted phones within 24 hours or 30 days, depending on the circumstances.</span></p>
<p><span style="font-weight: 400">The problem, however, is that Justice Department policy is not law. And although the policy includes state and local law enforcement agencies when they are working on a case with federal agents and want to use the devices, it does not cover those agencies </span><a href="https://www.eff.org/deeplinks/2015/09/finally-doj-reverses-course-and-will-get-warrants-stingrays"><span style="font-weight: 400">when they are working on cases alone</span></a><span style="font-weight: 400">. To address this loophole, lawmakers would need to pass a federal law banning the use of stingrays without a warrant, but </span><a href="https://www.wired.com/2015/11/new-bill-would-force-cops-to-get-warrants-before-spying-with-stingrays/"><span style="font-weight: 400">efforts to do so</span></a><span style="font-weight: 400"> have so far been unsuccessful.</span></p>
<p><span style="font-weight: 400">One bigger issue with the Justice Department policy is that, as noted above, it only applies to criminal investigations, not national security ones, and it also includes a carve-out for “exigent circumstances” that are not clearly defined. Federal agents are not required to seek a warrant to use the technology in cases involving such circumstances. Whether the government has used the technology against Black Lives Matter protesters without a warrant is likely something that will remain a secret for some time.</span></p>
<p>The post <a href="https://theintercept.com/2020/07/31/protests-surveillance-stingrays-dirtboxes-phone-tracking/">How Cops Can Secretly Track Your Phone</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2020/07/31/protests-surveillance-stingrays-dirtboxes-phone-tracking/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2020/06/singray-theintercept-SH-25.jpg?fit=2001%2C1001' width='2001' height='1001' /><post-id xmlns="com-wordpress:feed-additions:1">313025</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2020/07/GettyImages-1218280802-crop.jpg?fit=300%2C150" />
		<media:content url="https://theintercept.com/wp-content/uploads/2020/07/GettyImages-1218280802-crop.jpg?fit=300%2C150" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2020/06/AP_17325676668811.jpg?fit=2788%2C1783" medium="image">
			<media:title type="html">Cellphone Surveillance</media:title>
			<media:description type="html">StingRay II, a cellular site simulator used for surveillance purposes manufactured by Harris Corporation, of Melbourne, Fla.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2020/06/AP_17325676668811.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2020/06/singray-theintercept-2-26.png?fit=2001%2C295" medium="image">
			<media:title type="html">singray-theintercept-2-26</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2020/06/singray-theintercept-2-26.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[One Little-Watched Race Has Huge Implications for Election Hacking and Voter Suppression in Georgia]]></title>
                <link>https://theintercept.com/2018/11/13/georgia-secretary-of-state-voter-suppression/</link>
                <comments>https://theintercept.com/2018/11/13/georgia-secretary-of-state-voter-suppression/#respond</comments>
                <pubDate>Tue, 13 Nov 2018 15:50:00 +0000</pubDate>
                                    <dc:creator><![CDATA[Kim Zetter]]></dc:creator>
                                		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Technology]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=222550</guid>
                                    <description><![CDATA[<p>A December 4 runoff for secretary of state will help determine how Georgia handles decisions around securing voting machines and purging voter rolls.</p>
<p>The post <a href="https://theintercept.com/2018/11/13/georgia-secretary-of-state-voter-suppression/">One Little-Watched Race Has Huge Implications for Election Hacking and Voter Suppression in Georgia</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><u>So much attention</u> in the midterm elections this year has focused on the gubernatorial race in Georgia between Republican Brian Kemp and Democrat Stacey Abrams that the race for secretary of state, the office Kemp is vacating, has gone largely ignored.</p>
<p>It&#8217;s arguably the more important race, since this is the office that will control the state&#8217;s voter registration database and any purges made to the voter roll going forward. Equally important, it&#8217;s the office that will be responsible for programming all of the state&#8217;s currently paperless voting machines that can&#8217;t be audited, though Georgia will be looking to replace these machines with an undetermined model next year. Both of these factors could make Georgia a hotbed for voter suppression tactics and vote-counting integrity in the 2020 presidential elections, experts said.</p>
<p class="p1"><!-- BLOCK(promote-post)[0](%7B%22componentName%22%3A%22PROMOTE_POST%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22slug%22%3A%22election%22%2C%22crop%22%3A%22promo%22%7D) --><aside class="promote-banner">
    <a class="promote-banner__link" href="/collections/election-insecurity/">
              <span class="promote-banner__image">
          <img loading="lazy" decoding="async" width="300" height="150" src="https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?fit=300%2C150" class="attachment-medium size-medium" alt="Supporters of Democratic presidential nominee Hillary Clinton wave flags during election night at the Jacob K. Javits Convention Center in New York on November 8, 2016.  / AFP / Kena Betancur        (Photo credit should read KENA BETANCUR/AFP/Getty Images)" srcset="https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?w=2965 2965w, https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?w=2400 2400w" sizes="auto, (max-width: 300px) 100vw, 300px" />        </span>
            <div class="promote-banner__text">
                  <p class="promote-banner__eyebrow">
            Read Our Complete Coverage          </p>
        
        <h2 class="promote-banner__title">Election Insecurity</h2>
      </div>
    </a>
  </aside><!-- END-BLOCK(promote-post)[0] --></p>
<p>&#8220;We&#8217;ve said all along for the last two years that this is probably the most important office we would be electing in 2018 because of the broad scope of oversight and duties that the secretary of state has in Georgia,&#8221; said Sara Henderson, executive director of Common Cause Georgia, a nonprofit, nonpartisan voting advocacy group. &#8220;There&#8217;s a lot of talk within the national media that in Georgia, the counties control their own elections. But nothing could be further from the truth. That&#8217;s how we&#8217;re set up regarding our election laws, but that is not in effect how it operates here. The secretary of state absolutely 100 percent impacts how and what the counties do.&#8221;</p>
<p>Georgia is one of only a few states that uses a single model of voting machines statewide — in this case, paperless direct-recording electronic machines made by the now-defunct Diebold Election Systems — and also uses a centralized model for programming those machines before each election. Instead of letting county elections offices or an independent third party program them, Kemp&#8217;s office controls this task — a job it only assumed last year in a controversial move that occurred in the middle of Kemp&#8217;s heated campaign for governor.</p>
<p>Kemp has so far narrowly escaped a runoff in his gubernatorial race with Abrams, after barely amassing the 50 percent of votes needed for victory (he had 50.2 percent at last count, about 59,000 more votes than Abrams; a federal judge on Monday <a href="https://www.nytimes.com/2018/11/12/us/georgia-governor-election.html">ordered</a> election results not be certified for several more days, responding to one of several challenges seeking time to resolve questions over the number of absentee and provisional ballots being counted). But this isn&#8217;t the case for the two candidates now vying for Kemp&#8217;s former job. The tight race for secretary of state between Republican Brad Raffensperger, a state representative and businessman, and former Democratic Rep. John Barrow, who served in the House for a decade, will go into a runoff on December 4. The tally in their race as of Friday gave Raffensperger the lead with 49.2 percent of votes to Barrow&#8217;s 48.6 percent, a difference of 24,210 votes. The candidates now face challenges with getting voters to turn up for the runoff, as such races traditionally produce lower voter turnout than regular elections.</p>
<p>Who wins the secretary of state’s race will determine in part whether Kemp’s controversial handling of voter purges continues.</p>
<!-- BLOCK(photo)[1](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22large%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed large-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[1] -->
<img loading="lazy" decoding="async" width="3000" height="2000" class="aligncenter size-large wp-image-222606" src="https://theintercept.com/wp-content/uploads/2018/11/AP_18312691395810-kemp-1542086145.jpg" alt="Republican Brian Kemp, right, holds a news conference with Georgia Gov. Nathan Deal, left, in the Governor's ceremonial office at the Capitol on Thursday, Nov. 8, 2018, in Atlanta, Ga. Kemp resigned Thursday as Georgia's secretary of state, a day after his campaign said he's captured enough votes to become governor despite his rival's refusal to concede. (Bob Andres/Atlanta Journal-Constitution via AP)" srcset="https://theintercept.com/wp-content/uploads/2018/11/AP_18312691395810-kemp-1542086145.jpg?w=3000 3000w, https://theintercept.com/wp-content/uploads/2018/11/AP_18312691395810-kemp-1542086145.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/11/AP_18312691395810-kemp-1542086145.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/11/AP_18312691395810-kemp-1542086145.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/11/AP_18312691395810-kemp-1542086145.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2018/11/AP_18312691395810-kemp-1542086145.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2018/11/AP_18312691395810-kemp-1542086145.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/11/AP_18312691395810-kemp-1542086145.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2018/11/AP_18312691395810-kemp-1542086145.jpg?w=2400 2400w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source pullright">Republican Brian Kemp, right, holds a news conference to resign as Georgia&#8217;s secretary of state with Gov. Nathan Deal, left, on Nov. 8, 2018, in Atlanta, Ga.<br/>Photo: Bob Andres/Atlanta Journal-Constitution via AP</figcaption><!-- END-CONTENT(photo)[1] --></figure><!-- END-BLOCK(photo)[1] -->
<p><u>Kemp and his</u> office have been accused of voter suppression through aggressive purges of the state&#8217;s voter roll. Last year, his office purged some 668,000 voters who Kemp&#8217;s staff said had died, moved, or been inactive in casting ballots for six years or more. But a recent investigation has <a href="https://www.rollingstone.com/politics/politics-news/brian-kemp-340000-voters-748165/">called into question</a> whether 340,000 voters who had been removed for allegedly moving out of state actually moved. Kemp also attempted to block the registration of 53,000 new voters this year by determining that signatures and other information on their applications weren’t an “exact match” with secondary documents on file for the voters; a lawsuit and <a href="https://www.washingtonpost.com/politics/2018/11/03/judge-rules-against-brian-kemp-over-georgia-voting-restrictions-days-before-gubernatorial-election/?utm_term=.df07e1382bd6">court ruling, however, intervened to stop him</a>.</p>
<p>The issue of purging inactive voters came up during the secretary of state’s race. Raffensperger said <a href="https://politics.myajc.com/news/state--regional-govt--politics/voting-integrity-debated-georgia-secretary-state-candidates/H9FxgQmhD3cgyB31JJHQoJ/">in a debate</a> that he supports purging inactive registered voters whose only lapse is not voting in past elections, while Barrow opposes such purges.</p>
<p>But purging voters wasn’t the only control Kemp wielded over the midterms. As chief election official in the state, he had certain authority over election procedures and recounts, including of his own gubernatorial race. Kemp came under fire by former President Jimmy Carter and others for refusing to recuse himself from overseeing an election in which he was also a candidate for office. Carter has served as an election monitor for years in dozens of other countries. &#8220;This runs counter to the most fundamental principle of democratic elections that the electoral process be managed by an independent and impartial election authority,&#8221; Carter <a href="https://www.apnews.com/02bf11f29ada46d0833be6e3091b0c31">wrote in a letter to Kemp</a> before the election. Kemp only resigned from his secretary of state position last Thursday, after securing the lead in his gubernatorial race.</p>
<p>&#8220;It&#8217;s unquestionably improper for the secretary of state to control the programming and management of the voting machines that will decide his election contest [or his replacement],&#8221; said Susan Greenhalgh, policy director at the National Election Defense Coalition, a voter integrity group. &#8220;But in Georgia, it&#8217;s much worse because there is no paper ballot, no physical evidence that provides a permanent record of voter intent that can be used to confirm the correctness of the election outcome. Voters just have to trust the secretary of state.&#8221;</p>
<!-- BLOCK(pullquote)[2](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[2] -->“In Georgia, there is no physical evidence that provides a permanent record of voter intent.”<!-- END-CONTENT(pullquote)[2] --></blockquote><!-- END-BLOCK(pullquote)[2] -->
<p>Georgia&#8217;s current governor, Nathan Deal, appointed attorney Robyn Crittenden as interim secretary of state until the runoff for the office in December. Crittenden, an African-American who headed the state&#8217;s Department of Human Services, <a href="https://www.ajc.com/news/state--regional-govt--politics/who-robyn-crittenden-georgia-new-secretary-state/RoW4e16x3QBQ5isc3HD6CN/">told the Atlanta Journal-Constitution</a> that she intends “to take on this role in the same way I have approached my previous work in state government with a focus on transparency and service to the people of Georgia. Georgians can rest assured that I’m going to give this job my all, and that we’re going to follow the law.”</p>
<p>Common Cause&#8217;s Henderson called the appointment of a neutral party as interim secretary of state a good move and said her group feels &#8220;more confident about the runoff than we did about Election Day and early voting when Kemp was overseeing that process.&#8221;</p>
<p>During his tenure as secretary of state, Kemp didn’t just control the programming of all machines in the state; he also vigorously fought with election integrity activists who filed a lawsuit last year seeking to rid the state of its paperless voting machines on grounds that the machines aren&#8217;t secure and can&#8217;t be audited to verify that the software hasn&#8217;t been manipulated by malicious code. Georgia has been using its paperless machines since 2002, with Kemp and Republican secretaries of states that preceded him defying numerous calls over the years to replace the machines with systems that can be audited; they resisted these calls even as other states around the country, like California, Florida and Ohio, passed laws requiring their counties to switch to machines that produce a paper trail or use voter-marked paper ballots that can be audited.</p>
<p>Georgia isn&#8217;t the only state where the secretary of state oversees elections; that person is also chief election official in many states. But elsewhere, these offices serve a broad oversight function that doesn&#8217;t involve direct involvement in the administration of elections. Instead, local election officials in most states choose the machines they use, which generally results in a patchwork of voting machines around the state, and program those machines either through in-house staff, the voting machine vendor, or a third-party contractor. Georgia not only uses a single model of voting machine statewide, but also programs those machines from the secretary of state&#8217;s office.</p>
<!-- BLOCK(photo)[3](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22large%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed large-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[3] -->
<img loading="lazy" decoding="async" width="4000" height="2667" class="aligncenter size-large wp-image-222608" src="https://theintercept.com/wp-content/uploads/2018/11/GettyImages-1014454350-1542086674.jpg" alt="A voter uses an electronic voting machine to cast a ballot during the Georgia primary runoff elections in Atlanta, Georgia, U.S., on Tuesday, July 24, 2018. As government officials warn of continuing cyberattacks intended to disrupt U.S. elections, Georgia is among 14 states heading into Election Day using touchscreen, computerized machines that don't meet federal security guidelines because they produce no paper recordso voters can't verify their choices and officials can't audit the results. Photographer: Elijah Nouvelage/Bloomberg via Getty Images" srcset="https://theintercept.com/wp-content/uploads/2018/11/GettyImages-1014454350-1542086674.jpg?w=4000 4000w, https://theintercept.com/wp-content/uploads/2018/11/GettyImages-1014454350-1542086674.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2018/11/GettyImages-1014454350-1542086674.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2018/11/GettyImages-1014454350-1542086674.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2018/11/GettyImages-1014454350-1542086674.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2018/11/GettyImages-1014454350-1542086674.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2018/11/GettyImages-1014454350-1542086674.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2018/11/GettyImages-1014454350-1542086674.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2018/11/GettyImages-1014454350-1542086674.jpg?w=2400 2400w, https://theintercept.com/wp-content/uploads/2018/11/GettyImages-1014454350-1542086674.jpg?w=3600 3600w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source pullright">A voter uses an electronic voting machine to cast a ballot during the Georgia primary runoff elections in Atlanta on July 24, 2018.<br/>Photo: Elijah Nouvelage/Bloomberg via Getty Images</figcaption><!-- END-CONTENT(photo)[3] --></figure><!-- END-BLOCK(photo)[3] -->
<p><u>This wasn&#8217;t always</u> the case. In 2002, when the state first purchased its paperless voting machines, the programming and testing of the machines was contracted out to the Center for Election Systems at Kennesaw State University. But <a href="https://www.politico.com/magazine/story/2017/06/14/will-the-georgia-special-election-get-hacked-215255">a story I wrote for Politico last year</a> revealed that security problems at the center allowed a researcher to download registration records for the state’s 6.7 million voters, as well as software files for the state’s electronic poll books — used by poll workers to verify that people are registered before they can cast a ballot — and many other files. An investigation by KSU revealed that the center had a number of security lapses that had existed for years, which raised the possibility that attackers could have altered voter records or votes in previous elections without the center knowing during that time.</p>
<p>After the story published, Kemp&#8217;s office canceled its contract with the center. A spokesperson for Kemp said at the time that the office was considering farming out the programming of voting machines to academics at the Georgia Institute of Technology, which has a highly respected institute for information security. But Kemp ultimately decided to program the voting machines in-house, hiring Michael Barnes, director of the now-defunct Center for Election Systems, to do the work, even though the center&#8217;s poor security practices had occurred during Barnes&#8217;s management of the operation.</p>
<p>At least two other states, Louisiana and Maryland, also program their statewide machines centrally before each election. But of these two, only Louisiana does the programming out of the secretary of state&#8217;s office. Louisiana uses paperless voting machines statewide like Georgia, but a different model. The secretary of state&#8217;s staff loads election software onto USB sticks that are driven to each of the state&#8217;s 64 parish warehouses and loaded onto machines, according to a spokesperson. In the case of Maryland, which uses a uniform model of optical-scan systems with paper ballots statewide, the state&#8217;s Board of Elections, an agency separate from the secretary of state&#8217;s office, programs the machines and delivers the election database to counties on DVDs, or via a closed network using a VPN, before elections.</p>
<p>A handful of other states also use a single system statewide. Delaware uses paperless direct-recording electronic machines; Oklahoma uses a single brand of paperless direct-recording electronic machines and optical-scan machines statewide; and Colorado, Oregon, and Washington state use mail-in ballots exclusively and scan them optically. Colorado election officials program their machines themselves, however. The Intercept was unable to reach election officials in Oklahoma, Oregon, and Washington on Monday — due to Veterans Day — to determine if they program the machines centrally at the state level or individually at the county level.</p>

<p>Georgia lawmakers plan to look at legislation to <a href="https://politics.myajc.com/news/state--regional-govt--politics/voting-companies-show-paper-ballot-options-for-georgia/8VMKOa5dKJp3U9GcsJmhaM/">replace the current statewide voting machines</a> with new systems that use paper and can be audited. A Georgia commission will likely decide between optical-scan machines that use voter-marked paper ballots or ballot-marking devices that use a touchscreen machine to mark ballots that are then printed out for voters to examine before they’re inserted into an optical reader that records and tallies the votes.</p>
<p>Both Barrow and Raffensperger have said they support switching to machines that use paper ballots, but Barrow has said he prefers voter-marked paper ballots, while Raffensperger has said he prefers ballot-marking devices. In both cases, the paper ballot serves as an auditing record that can be used to compare against the digital tallies tabulated by the software on the optical scanner. But election integrity activists say that some ballot-marking systems are problematic if they print a barcode on the ballot. With these systems, although the voter is able to see their selections printed on the ballot, the ballot reader uses the barcode to record and tally votes. A hacker could subvert the software on the ballot-marking device to print one thing in the human-readable portion of the ballot that the voter sees, while printing something else in the barcode that the machine reads and records. If Georgia doesn&#8217;t conduct manual audits of the paper ballots, no one would know if the barcodes were manipulated, which would essentially put Georgia in the same situation it&#8217;s in today with elections that aren’t verified.</p>
<p>It&#8217;s not clear how long it will take Georgia to decide on new systems and get them in place, though it won&#8217;t be soon enough for the secretary of state&#8217;s runoff in December. Election integrity activists fought to get a court to decertify Georgia&#8217;s paperless systems and force counties to use paper ballots for the midterms. Although U.S. District Judge Amy Totenberg agreed with the plaintiffs that the secretary of state&#8217;s office had failed to adequately secure the systems, she felt it would create too much of a burden on election officials to switch the entire state to paper so soon before the election.</p>
<p>Barrow said during a <a href="https://politics.myajc.com/news/state--regional-govt--politics/voting-integrity-debated-georgia-secretary-state-candidates/H9FxgQmhD3cgyB31JJHQoJ/">debate with Raffensperger</a> this year that if elected, he would do what Kemp has resisted and decertify the state&#8217;s current paperless machines, forcing counties to switch to paper ballots until lawmakers choose replacement machines.</p>
<p>Henderson says the outcome of this election will have a huge impact on how future elections in the state are run.</p>
<p>&#8220;We have a lot to do to undo what Brian Kemp did during his nearly eight years in office as secretary of state,&#8221; she told The Intercept. &#8220;I think the world is really waking up to what a serious situation we have in Georgia regarding voter suppression.”</p>
<p>The post <a href="https://theintercept.com/2018/11/13/georgia-secretary-of-state-voter-suppression/">One Little-Watched Race Has Huge Implications for Election Hacking and Voter Suppression in Georgia</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2018/11/13/georgia-secretary-of-state-voter-suppression/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2018/11/AP_18311138498671-1542085883-e1542086014242.jpg?fit=6631%2C3282' width='6631' height='3282' /><post-id xmlns="com-wordpress:feed-additions:1">222550</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?fit=300%2C150" />
		<media:content url="https://theintercept.com/wp-content/uploads/2018/07/election-insecurity-thumbnail-1532363333.jpg?fit=300%2C150" medium="image">
			<media:title type="html">Supporters of Democratic presidential nominee Hillary Clinton wave flags during election night at the Jacob K. Javits Convention Center in New York on November 8, 2016.  / AFP / Kena Betancur        (Photo credit should read KENA BETANCUR/AFP/Getty Images)</media:title>
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/11/AP_18312691395810-kemp-1542086145.jpg?fit=3000%2C2000" medium="image">
			<media:title type="html">Election 2018 Governor Georgia Kemp</media:title>
			<media:description type="html">Republican Brian Kemp, right, holds a news conference to resign as Georgia&#039;s secretary of state with Gov. Nathan Deal, left, on Nov. 8, 2018, in Atlanta, Ga.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/11/AP_18312691395810-kemp-1542086145.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/11/GettyImages-1014454350-1542086674.jpg?fit=4000%2C2667" medium="image">
			<media:title type="html">Advocates Say Paper Ballots Are Safest</media:title>
			<media:description type="html">A voter uses an electronic voting machine to cast a ballot during the Georgia primary runoff elections in Atlanta on July 24, 2018.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/11/GettyImages-1014454350-1542086674.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[Leaked Files Show How the NSA Tracks Other Countries’ Hackers]]></title>
                <link>https://theintercept.com/2018/03/06/leaked-files-show-how-nsa-tracks-other-countries-hackers/</link>
                <comments>https://theintercept.com/2018/03/06/leaked-files-show-how-nsa-tracks-other-countries-hackers/#respond</comments>
                <pubDate>Wed, 07 Mar 2018 04:32:37 +0000</pubDate>
                                    <dc:creator><![CDATA[Kim Zetter]]></dc:creator>
                                		<category><![CDATA[Uncategorized]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=174771</guid>
                                    <description><![CDATA[<p>The Shadow Brokers leak showed the NSA was tracking at least 45 nation-state hacking operations. Experts explain how the agency stepped up its monitoring.</p>
<p>The post <a href="https://theintercept.com/2018/03/06/leaked-files-show-how-nsa-tracks-other-countries-hackers/">Leaked Files Show How the NSA Tracks Other Countries’ Hackers</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p class="gmail-p1"><u>When the mysterious</u> entity known as the &#8220;Shadow Brokers&#8221; released a tranche of stolen NSA hacking tools to the internet a year ago, most experts who studied the material homed in on the most potent tools, so-called zero-day exploits that could be used to install malware and take over machines. But a group of Hungarian security researchers spotted something else in the data, a collection of scripts and scanning tools that the National Security Agency uses to detect other nation-state hackers on the machines it infects.</p>
<p class="gmail-p1"><span class="gmail-s1">It turns out those scripts and tools are just as interesting as the exploits. They show that in 2013 — the year the NSA tools were believed to have been stolen by the Shadow Brokers<span class="gmail-Apple-converted-space">  </span>— the agency was tracking at least 45 different nation-state operations, known in the security community as advanced persistent threats, or APTs. Some of these appear to be operations known by the broader security community — but some may be threat actors and operations currently unknown to researchers.</span></p>
<p class="gmail-p1"><span class="gmail-s1">The scripts and scanning tools dumped by Shadow Brokers and studied by the Hungarians were created by an NSA team known as Territorial Dispute, or TeDi. Intelligence sources told The Intercept that the NSA established the team after hackers, believed to be from China, <a href="http://www.cnn.com/2009/US/04/21/pentagon.hacked/">stole designs for the military&#8217;s Joint Strike Fighter plane</a>, along with other sensitive data, from U.S. defense contractors in 2007; the team was supposed to detect and counter sophisticated nation-state attackers more quickly, when they first began to emerge online.</span></p>
<p class="gmail-p1"><span class="gmail-s1">&#8220;As opposed to the U.S. only finding out in five years that everything was stolen, their goal was to try to figure out when it was being stolen in real time,&#8221; one intelligence source told The Intercept.</span></p>
<p class="gmail-p1"><span class="gmail-s1">But their mission evolved to also provide situational awareness for NSA hackers to help them know when other nation-state actors are in machines that they&#8217;re trying to hack. The NSA could not immediately be reached for comment.</span></p>
<p class="gmail-p1"><!-- BLOCK(pullquote)[0](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[0] -->&#8220;Their goal was to try to figure out when it was being stolen in real time.&#8221;<!-- END-CONTENT(pullquote)[0] --></blockquote><!-- END-BLOCK(pullquote)[0] --></p>
<p class="gmail-p1"><span class="gmail-s1">When the NSA hacks machines in Iran, Russia, China, and elsewhere, its operators want to know if foreign spies are in the same machines because these hackers can steal NSA tools or spy on NSA activity in the machines. If the other hackers are noisy and reckless, they can also cause the NSA&#8217;s own operations to get exposed. So based on who else is on a machine, the NSA might decide to withdraw or proceed with extra caution. Indeed, there are a number of warnings and other comments among the Territorial Dispute data instructing operators what to do when they discover certain malware files of particular interest — &#8220;UNKNOWN &#8211; PLEASE PULL BACK&#8221; are the instructions to operators for one file; &#8220;DANGEROUS MALWARE &#8211; SEEK HELP ASAP&#8221; and &#8220;FRIENDLY TOOL &#8211; SEE HELP ASAP&#8221; apply to others.</span></p>
<p class="gmail-p1"><span class="gmail-s1">&#8220;They started to become concerned about sitting on a box with our tools and there being other actors there that could steal or figure out what we were doing. It was to avoid being detected,&#8221; a second intelligence official familiar with the program told The Intercept.<span class="gmail-Apple-converted-space"> </span></span></p>
<p class="gmail-p1"><span class="gmail-s1">The Territorial Dispute scripts use digital signatures to hunt APT actors. Such signatures act like fingerprints for hacking groups — they can include file names or snippets of code from known malware that the advanced threat actors use repeatedly or particular changes the advanced hackers are known to make to a machine&#8217;s core operating system settings. Such elements are called indicators of compromise, or IoC, by the security community. </span></p>
<p class="gmail-p1"><span class="gmail-s1">None of the advanced threat groups are identified in the NSA scripts by names commonly used for them by the research community — instead the NSA calls them Sig1, Sig2, etc. — but the Hungarian researchers have spent the last year going through the scripts to try to match them to known malware samples and advanced threat groups. They have also studied the sequence of signatures in the NSA&#8217;s numbered list to determine when the Territorial Dispute team added certain operations to the list and see if the NSA may have known about certain operations before the security community.<br />
</span></p>
<p class="gmail-p1"><!-- BLOCK(photo)[1](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22540px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 540px;"><!-- CONTENT(photo)[1] --> <a href="https://theintercept.com/wp-content/uploads/2018/03/Screen-Shot-2018-03-06-at-3.28.44-PM-1520390066.png"><img data-recalc-dims="1" height="99999" width="540" decoding="async" class="aligncenter size-article-medium wp-image-174836" src="https://theintercept.com/wp-content/uploads/2018/03/Screen-Shot-2018-03-06-at-3.28.44-PM-1520390066.png?fit=540%2C99999" alt="" /></a>
<figcaption class="caption source">Hungarian researchers took the cryptic names assigned by the NSA to nation-state computer attacks — Sig1, Sig2, etc. — and mapped them to publicly known malware and groups.<br/>Laboratory of Cryptography and System Security, Ukatemi</figcaption><!-- END-CONTENT(photo)[1] --></figure><!-- END-BLOCK(photo)[1] --></p>
<p class="gmail-p1"><span class="gmail-s1">In at least one case, involving a sophisticated hacking group known as Dark Hotel, believed to be from South Korea and targeting entities in Asia, it appears the NSA may have been tracking some of the group&#8217;s tools in 2011, about three years before the broader security community discovered them.</span></p>
<p class="gmail-p1"><span class="gmail-s1">&#8220;It raises questions &#8230; about whether the NSA should have leaked or published information about some of this unidentified stuff,&#8221; said Boldizsár Bencsáth, from the Laboratory of Cryptography and System Security, also known as CrySyS Lab.</span></p>
<p class="gmail-p1"><span class="gmail-s1">The research team, led by Bencsáth, includes colleagues from his lab and researchers from the Hungarian security firm Ukatemi. The CrySyS Lab is best known for its 2011 discovery of an Israeli spy tool called <a href="https://theintercept.com/2014/11/12/stuxnet/"><span class="gmail-s3">Duqu</span></a>, believed to be created by some of the same Israeli hackers who were involved in developing the famous <a href="https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet"><span class="gmail-s3">Stuxnet digital attack used to sabotage</span></a> Iran&#8217;s nuclear program.<span class="gmail-Apple-converted-space"> </span></span></p>
<p class="gmail-p1"><span class="gmail-s1">Bencsáth&#8217;s team plans to release its findings about the NSA scripts this week at the <a href="https://sas.kaspersky.com/#friday-march-9-2018-conference-day-2">Kaspersky Security Summit</a> in Cancun, Mexico, in the hopes that other researchers will dig through the data to identify more of the advanced threat groups that the NSA is hunting. The team also hopes the information will help the community classify some malware samples and signatures that have previously been uncovered by the security community, but remain unattributed to a specific threat group because researchers don&#8217;t know to which advanced hacking group they belong. The team has only been able to definitively identify a handful of the advanced threat groups so far, with plausible guesses about many others.</span></p>
<p class="gmail-p1"><span class="gmail-s1">&#8220;Based on the current results, some attacks, samples, or even hundreds of samples will get to be identified as part of some APT attacks that [were] previously unknown or partially unknown,&#8221; the team&#8217;s report states.</span></p>
<p class="gmail-p1"><span class="gmail-s1">Bencsáth notes that in most cases the NSA used between two and five indicators of compromise for each threat group it was hunting, even though security researchers can generally amass dozens or, in some cases, even hundreds for a hacking group. One of the intelligence officials told The Intercept that the NSA only needs a few high-quality signatures to find an APT. &#8220;It&#8217;s a big myth that there are thousands of [signatures] for any particular groups,&#8221; he notes. &#8220;These [Territorial Dispute] guys really focus on finding the two or three telltale signs that could lock you in [on an APT].&#8221;</span></p>
<p class="gmail-p1"><!-- BLOCK(photo)[2](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[2] --> <a href="https://theintercept.com/wp-content/uploads/2018/03/GettyImages-653581232-1520391021.jpg"><img data-recalc-dims="1" height="99999" width="1000" decoding="async" class="aligncenter size-article-large wp-image-174840" src="https://theintercept.com/wp-content/uploads/2018/03/GettyImages-653581232-1520391021.jpg?fit=1000%2C99999" alt="OGDEN, UT - MARCH 15: A ground crew member prepare an F-35 fighter fro taxi for a training mission at Hill Air Force Base on March 15, 2017 in Ogden, Utah. Hill is the first Air Force base to get combat ready F-35's. They currently have 17 that might be deployed in the fight against terrorism and ISIS in the near future. (Photo by George Frey/Getty Images)" /></a>
<p class="caption overlayed">The F-35 Joint Strike Fighter. After Chinese hackers reportedly stole plans for the aircraft from a defense contractor, the NSA stepped up its efforts to detect nation-state hackers, sources told The Intercept.</p>
<p class="gmail-p1">
<figcaption class="caption source pullright">Photo: George Frey/Getty Images</figcaption></p><!-- END-CONTENT(photo)[2] --></figure><!-- END-BLOCK(photo)[2] --></p>
<p class="gmail-p1"><span class="gmail-s1"><u>The NSA doesn&#8217;t</u> just scan for foreign threat actors to protect its own operations, it&#8217;s also interested in observing what the foreign hackers are stealing and how they&#8217;re doing it. And such scanning can also help the NSA uncover high-value targets in geographical regions where it might lack the insight needed to identify the best machines to target.</span></p>
<p class="gmail-p1"><span class="gmail-s1">&#8220;In some regions where you might not have all the specific insights it could be very important to know if you&#8217;re on the right box,&#8221; the second official told The Intercept. If multiple threat actors are on the same machine, this would indicate a valuable target.</span></p>
<p class="gmail-p1"><span class="gmail-s1">In fact, it&#8217;s not uncommon to find multiple advanced persistent threat groups on high-value systems. In March 2014, Kaspersky Lab discovered multiple groups on a machine at a research institute in the Middle East that Kaspersky dubbed the &#8220;Magnet of Threats&#8221;; in addition to Regin, believed to be a British spy kit, they found the NSA&#8217;s Equation Group malware, as well as modules belonging to <a href="https://www.wired.com/2012/06/us-and-israel-behind-flame/">Flame</a>, believed to be an Israeli operation; <a href="https://securelist.com/animals-in-the-apt-farm/69114/"><span class="gmail-s3">Animal Farm</span></a>, believed to belong to French intelligence; <a href="https://www.wired.com/2014/02/mask/"><span class="gmail-s3">Careto</span></a> (or Mask), believed to be a Spanish-speaking nation-state group; and <a href="https://usa.kaspersky.com/resource-center/threats/epic-turla-snake-malware-attacks"><span class="gmail-s3">Turla</span></a>, a Russian-speaking group. </span></p>
<p class="gmail-p1"><span class="gmail-s1">The Territorial Dispute team created their signatures for APTs in sequential order; whenever a new attack was uncovered or someone found something interesting that was suspected of being an advanced threat group, a new signature was created, according to one of the intelligence sources. Although the team initially focused on Chinese and Russian hacking groups, those of other nations got added over time, including Israel and even the U.S., as Bencsáth&#8217;s team discovered.</span></p>
<p class="gmail-p1"><span class="gmail-s1">Sig1, the first NSA malware signature on the list when it was created in 2007, refers to Agent.btz, according to Bencsáth&#8217;s team. Dubbed &#8220;the most serious breach of the U.S. military’s classified computer systems,&#8221; the <a href="https://www.wired.com/2008/11/army-bans-usb-d/"><span class="gmail-s3">Agent.btz worm is</span></a> believed to have been introduced to the Department of Defense&#8217;s high-security Secret Internet Protocol Router, or SIPR, network for classified information from a USB stick that a soldier picked up at an internet cafe in Afghanistan. It has been attributed to Russia.</span></p>
<p class="gmail-p1"><span class="gmail-s1">Bencsáth&#8217;s team identifies Sig25 as the threat actor known to researchers as <a href="https://www.wired.com/2014/11/darkhotel-malware/">Dark Hotel</a> and Tapaoux. A top-tier actor, the group is believed to have been active since 2007 and targets high-profile executives, government agencies, and NGOs, with their primary focus being entities in North Korea, Japan, and India — countries in Asia with nuclear programs. &#8220;Their targeting is nuclear-themed, but they also target the defense industry base in the U.S. and important executives from around the world in all sectors having to do with economic development and investments,&#8221; Costin Raiu, director of Kaspersky Lab&#8217;s Global Research and Analysis Team, has said. Raiu&#8217;s team, which publicly exposed some of Dark Hotel&#8217;s hacks in 2014, <a href="https://www.wired.com/2014/11/darkhotel-malware/"><span class="gmail-s3">found indications</span></a> it may have originated from South Korea.</span></p>
<p class="gmail-p1"><span class="gmail-s1">One of the former intelligence officials told The Intercept that Sig16 is an Israeli APT. The Hungarian researchers believe this signature is for Flame, a <a href="https://www.wired.com/2012/05/flame/"><span class="gmail-s3">massive spy kit</span></a> discovered by Kaspersky Lab in 2012 and believed to have been created in 2007 by the some of the same team that worked on Stuxnet.</span></p>
<p class="gmail-p1"><span class="gmail-s1">Sig8 on the NSA list is looking for signs of Stuxnet infections on machines, according to Bencsáth&#8217;s team.</span></p>
<p class="gmail-p1"><span class="gmail-s1">Why would the NSA be searching machines it&#8217;s hacking for its own malware or that of its hacking allies? In the case of hacking tools belonging to the close U.S. allies in the &#8220;Five Eyes&#8221; group that includes the United Kingdom, Canada, Australia, and New Zealand, it&#8217;s likely looking for these for deconfliction purposes, so that parties with mutual interests aren&#8217;t running into each other on the same machines. But in the case of Stuxnet, one of the former intelligence officials said that signatures were added by the Territorial Dispute team in 2010 after Stuxnet had begun to spread uncontrollably — spreading that led to its discovery and public exposure.  </span></p>
<p class="gmail-p1"><span class="gmail-s1">&#8220;There were cleanup efforts,&#8221; the official said.</span></p>
<p class="gmail-p1"><span class="gmail-s1">All of this raises questions about what NSA operators are told about the APTs for which they&#8217;re scanning. Stuxnet was a highly classified, closely held operation that was known to only a small group of people in the government and the NSA, so telling operators about the malware Sig8 was trying to detect could have put the cover operation at risk of being exposed. For this reason, the former intelligence officials told The Intercept that the operators are kept largely in the dark.</span></p>
<p class="gmail-p1"><span class="gmail-s1">&#8220;The guys running ops were told they had to start running these scripts to see if any of these other tools were there,&#8221; he said. &#8220;But they don&#8217;t know what any of the things are.&#8221;</span></p>
<p>The post <a href="https://theintercept.com/2018/03/06/leaked-files-show-how-nsa-tracks-other-countries-hackers/">Leaked Files Show How the NSA Tracks Other Countries’ Hackers</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2018/03/06/leaked-files-show-how-nsa-tracks-other-countries-hackers/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2018/03/AP_17159080143400-1520389252.jpeg?fit=4500%2C2964' width='4500' height='2964' /><post-id xmlns="com-wordpress:feed-additions:1">174771</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/03/Screen-Shot-2018-03-06-at-3.28.44-PM-1520390066.png?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2018/03/Screen-Shot-2018-03-06-at-3.28.44-PM-1520390066.png?fit=1292%2C1466" medium="image">
			<media:title type="html">Screen-Shot-2018-03-06-at-3.28.44-PM-1520390066</media:title>
			<media:description type="html">one two three</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/03/Screen-Shot-2018-03-06-at-3.28.44-PM-1520390066.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2018/03/GettyImages-653581232-1520391021.jpg?fit=4562%2C2886" medium="image">
			<media:title type="html">Air Force&#8217;s Airmen Partake In Training Flights With The New F-35 At Hill Air Force Base</media:title>
			<media:description type="html">The F-35 Joint Strike Fighter. After Chinese hackers reportedly stole plans for the aircraft from a defense contractor, the NSA stepped up its efforts to detect nation-state hackers, sources told The Intercept.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2018/03/GettyImages-653581232-1520391021.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
            </channel>
</rss>
