Ƶ

How lessons learned from the 2016 campaign led US officials to be more open about Iran hack

In this file photo taken on January 23, 2018 a person works at a computer during the 10th International Cybersecurity Forum in Lille, France. (AFP)
In this file photo taken on January 23, 2018 a person works at a computer during the 10th International Cybersecurity Forum in Lille, France. (AFP)
Short Url
Updated 28 August 2024

How lessons learned from the 2016 campaign led US officials to be more open about Iran hack

How lessons learned from the 2016 campaign led US officials to be more open about Iran hack
  • They accused Iranian hackers of targeting the presidential campaigns of both major parties as part of a broader attempt to sow discord in the American political process

WASHINGTON: The 2016 presidential campaign was entering its final months and seemingly all of Washington was abuzz with talk about how Russian hackers had penetrated the email accounts of Democrats, triggering the release of internal communications that seemed designed to boost Donald Trump’s campaign and hurt Hillary Clinton’s.
Yet there was a notable exception: The officials investigating the hacks were silent.
When they finally issued a statement, one month before the election, it was just three paragraphs and did little more than confirm what had been publicly suspected — that there had been a brazen Russian effort to interfere in the vote.
This year, there was another foreign hack, but the response was decidedly different. US security officials acted more swiftly to name the culprit, detailing their findings and blaming a foreign adversary — this time, Iran — just over a week after Trump’s campaign revealed the attack.
They accused Iranian hackers of targeting the presidential campaigns of both major parties as part of a broader attempt to sow discord in the American political process.
The forthright response is part of a new effort to be more transparent about threats. It was a task made easier because the circumstances weren’t as politically volatile as in 2016, when a Democratic administration was investigating Russia’s attempts to help the Republican candidate.
But it also likely reflects lessons learned from past years when officials tasked with protecting elections from foreign adversaries were criticized by some for holding onto sensitive information — and lambasted by others for wading into politics.
Suzanne Spaulding, a former official with the Department of Homeland Security, said agencies realize that releasing information can help thwart the efforts of US adversaries.
“This is certainly an example of that — getting out there quickly to say, ‘Look, this is what Iran’s trying to do. It’s an important way of building public resilience against this propaganda effort by Iran,’” said Spaulding, now a senior adviser at the Center for Strategic and International Studies.
The Aug. 19 statement by security officials followed a Trump campaign announcement that it had been breached, reports from cybersecurity firms linking the intrusion to Iran and news articles disclosing that media organizations had been approached with apparently hacked materials.
But the officials suggested their response was independent of those developments.
The FBI, which made the Iran announcement along with the Office of the Director of National Intelligence and the Cybersecurity and Infrastructure Security Agency, said in a statement to The Associated Press that “transparency is one of the most powerful tools we have to counteract foreign malign influence operations intended to undermine our elections and democratic institutions.”
The FBI said the government had refined its policies to ensure that information is shared as it becomes available, “so the American people can better understand this threat, recognize the tactics, and protect their vote.
A Wholesale Reorganization
A spokesperson for the ODNI also told AP that the government’s assessment arose from a new process for notifying the public about election threats.
Created following the 2020 elections, the framework sets out a process for investigating and responding to cyber threats against campaigns, election offices or the public. When a threat is deemed sufficiently serious, it is “nominated” for additional action, including a private warning to the attack’s target or a public announcement.
“The Intelligence Community has been focused on collecting and analyzing intelligence regarding foreign malign influence activities, to include those of Iran, targeting US elections,” the agency said. “For this notification, the IC had relevant intelligence that prompted a nomination.”
The bureaucratic terminology obscures what for the intelligence community has been a wholesale reorganization of how the government tracks threats against elections since 2016, when Russian hacking underscored the foreign interference threat.
“In 2016 we were completely caught off guard,” said Sen. Mark Warner, D-Virginia, the chairman of the Senate Intelligence Committee. “There were some indications, but nobody really understood the scale.”
That summer, US officials watched with alarm as Democratic emails stolen by Russian military hackers spilled out in piecemeal fashion on WikiLeaks. By the end of July, the FBI had opened an investigation into whether the Trump campaign was coordinating with Russia to tip the election. The probe ended without any finding that the two sides had criminally colluded with each other.
Inside the White House, officials debated how to inform the public of its assessment that Russia was behind the hack-and-leak. There was discussion about whether such a statement might have the unintended consequence of making voters distrustful of election results, thereby helping Russia achieve its goal of undermining faith in democracy.
Then-FBI Director James Comey wrote in his book, “A Higher Loyalty,” that he at one point proposed writing a newspaper opinion piece documenting Russia’s activities. He described the Obama administration deliberations as “extensive, thoughtful, and very slow,” culminating in the pre-election statement followed by a longer intelligence community assessment in January 2017.
“I know we did agonize over whether to say something and when to say it and that sort of thing because it appeared in the case of the Russians that they were favoring one candidate over the other,” James Clapper, the then-director of national intelligence, said in an interview.
A Bumpy Road

In 2018, Congress created CISA, the Department of Homeland Security’s cyber arm, to defend against digital attacks. Four years later the Foreign and Malign Influence Center was established within the ODNI to track foreign government efforts to sway US elections.
Bret Schafer, a senior fellow at the Alliance for Securing Democracy, a Washington-based organization that analyzes foreign disinformation, said he’s pleased that in its first election, the center doesn’t seem to have been “hobbled by some of the partisanship that we’ve seen cripple other parts of the government that tried to do this work.”
Still, there have been obstacles and controversies. Shortly after Joe Biden won the 2020 election, Trump fired the head of CISA, Christopher Krebs, for refuting his unsubstantiated claim of electoral fraud.
Also during the 2020 elections, The New York Post reported that it had obtained a hard drive from a laptop dropped off by Hunter Biden at a Delaware computer repair shop. Public confusion followed, as did claims by former intelligence officials that the emergence of the laptop bore the hallmarks of a Russian disinformation campaign. Trump’s national intelligence director, John Ratcliffe, soon after rebutted that assessment with a statement saying there were no signs of Russian involvement.
In 2022, the work of a new office called the Disinformation Governance Board was quickly suspended after Republicans raised questions about its relationship with social media companies and concerns that it could be used to monitor or censor Americans’ online discourse.
Legal challenges over government restrictions on free speech have also complicated the government’s ability to exchange information with social media companies, though Deputy Attorney General Lisa Monaco said in a recent address that the government has resumed sharing details with the private sector.
Earlier this year, Warner said he worried the US was more vulnerable than in 2020, in part because of diminished communication between government and tech companies. He said he’s satisfied by the government’s recent work, citing a greater number of public briefingsand warnings, but is concerned that the greatest test is likely still ahead.
“The bad guys are not going to do most of this until October,” Warner said. “So we have to be vigilant.”


Torrential rain leaves at least 18 dead in South Korea, trail of devastation

Torrential rain leaves at least 18 dead in South Korea, trail of devastation
Updated 44 sec ago

Torrential rain leaves at least 18 dead in South Korea, trail of devastation

Torrential rain leaves at least 18 dead in South Korea, trail of devastation
  • Nine people remained missing as of Sunday evening, the ministry said, with residents of the worst-hit areas in shock.
REUTERS: Severe wet weather in South Korea eased on Monday following days of torrential rain that triggered floods and landslides and left at least 18 people dead, the Ministry of the Interior and Safety said on Monday.
Nine people remained missing as of Sunday evening, the ministry said, with residents of the worst-hit areas in shock.
At Gapyeong, some 62 kilometers (38.5 miles) northeast of the capital Seoul, some residents recalled narrow escapes from the floods after 173 millimeters (6.8 inches) of rain deluged the area over just 17 hours on Sunday.
Gapyeong was among a number of places that saw a record amount of rain in a single day and broke the previous high for national daily precipitation of 156.3 mm that was set on September 30, 1998.
“The ground just sank beneath me, and the water rose all the way up to my neck. Luckily, there was an iron pipe nearby. I held on to it with all my strength,” said Ahn Gyeong-bun, the owner of a restaurant that was almost completely destroyed.
Two people died and four were missing after a landslide engulfed homes around Gapyeong and floods swept away vehicles as of Sunday, the ministry said.
For those remaining like Ahn, an uncertain future awaits.
“I’ve run this restaurant for 10 years ... What am I supposed to do now?” said Ahn, as she stood next to the badly damaged structure of her building perched next to a still swollen river.
At times breaking down in tears, the 65-year-old said several of the restaurant’s refrigerators were washed away by the flood.
Across South Korea, rain damage had been reported to 1,999 public structures and 2,238 private facilities, including farms, the interior ministry said.
While the rain has eased, the national weather agency has now issued a nationwide heatwave watch.
South Korean President Lee Jae Myung has ordered a thorough response to the disaster, his office said.
“As local heavy rains have become commonplace, customised measures based on regional characteristics are urgently needed,” said Kang Yu-jung, the spokesperson for Lee’s office.
“If serious laxity or mistakes are found in civil servants’ discipline, we will hold them accountable and thorough measures will be taken to prevent a recurrence.”
Lee, who took office in June, has promised to make the country safer and to prevent any repeat of the disasters in recent years that have often been blamed on the inadequate response by authorities.

Sri Lanka Catholics seek prosecution of sacked spy chief

Sri Lanka Catholics seek prosecution of sacked spy chief
Updated 43 min 56 sec ago

Sri Lanka Catholics seek prosecution of sacked spy chief

Sri Lanka Catholics seek prosecution of sacked spy chief
  • Sri Lanka’s Catholic Church on Monday demanded the criminal prosecution of the intelligence chief who was sacked for failing to prevent the 2019 Easter bombings that killed 279 people

AFP: Sri Lanka’s Catholic Church on Monday demanded the criminal prosecution of the intelligence chief who was sacked for failing to prevent the 2019 Easter bombings that killed 279 people, including 45 foreigners.
Church spokesman Cyril Gamini Fernando said they welcomed the dismissal days ago of Nilantha Jayawardena, who was head of the State Intelligence Service (SIS) when jihadist suicide bombers attacked three churches and three hotels.
“This (sacking) is for the negligence part of it, but we want the authorities to investigate Jayawardena’s role in the attack itself,” Fernando told reporters in Colombo. “We want a criminal prosecution.”
He said evidence presented before several courts and commissions of inquiry indicated that the SIS, under Jayawardena, had attempted to cover up the actions of the jihadists in the lead-up to the April 21 attacks.
“Six years on, we are still looking for answers. We want to know the truth about who was behind the attack,” he said.
Jayawardena, 52, was dismissed Saturday from the police department, where he was the second most senior officer in charge of administration and on track to become the next inspector-general.
Court proceedings have revealed that both military and police intelligence units were closely linked to the home-grown jihadists, and some had even been on the payroll of the intelligence services.
The current ruling party, led by Anura Kumara Dissanayake, had while in opposition accused Gotabaya Rajapaksa of orchestrating the attacks to win the 2019 presidential election.
The once powerful Rajapaksa family has denied the allegations.
The attacks occurred despite a warning from an intelligence agency in neighboring India, which alerted Jayawardena 17 days before the devastating bombings.
He was found guilty of ignoring a series of alerts. More than 500 people were also wounded in the bombings, Sri Lanka’s worst jihadist attack on civilians.
Jayawardena was removed from his position as SIS chief in December 2019 but was later promoted to deputy head of the police force, overseeing administration.
However, he was placed on compulsory leave a year ago, pending the disciplinary inquiry, following repeated judicial orders to take action against him.


13 dead in Russian bus crash

13 dead in Russian bus crash
Updated 21 July 2025

13 dead in Russian bus crash

13 dead in Russian bus crash
  • The driver appeared to have lost control of the vehicle

MOSCOW: Thirteen people were killed and 20 injured after a bus transporting mine workers in Russia’s far eastern Yakutia region crashed early Monday, authorities said.
The driver appeared to have lost control of the vehicle, swerving off the road and sending the bus plummeting 25 meters (82 feet) into a ravine, according to officials.
The incident took place at around 3:20 am (1820 GMT on Sunday), the local interior ministry said.
It published images showing the bus overturned next to a pool of muddy water, its wheels facing upward, while another showed a twisted metal barrier on the road above.
“The road accident occurred on the industrial road of the Denisovsky Mining and Processing Plant,” it added.
The plant mines and processes coal.
Investigators said they had opened a probe into criminal negligence.
Industrial accidents are common in Russia, with investigators often pointing to lax safety standards.
Local authorities declared a day of mourning for Tuesday.


China denies link to espionage group accused of attacking Singapore critical infrastructure

China denies link to espionage group accused of attacking Singapore critical infrastructure
Updated 21 July 2025

China denies link to espionage group accused of attacking Singapore critical infrastructure

China denies link to espionage group accused of attacking Singapore critical infrastructure
  • Last Friday, a Singapore minister said the espionage group UNC3886 was “going after high value strategic threat targets, vital infrastructure that delivers essential services”

REUTERS: The Chinese embassy in Singapore refuted claims that an espionage group accused of performing cyberattacks on Singapore’s critical infrastructure was linked to China.
In a Facebook post published over the weekend, the Chinese embassy said such claims were “groundless smears and accusations.”
“The embassy would like to reiterate that China is firmly against and cracks down all forms of cyberattacks in accordance with law. China does not encourage, support or condone hacking activities,” it wrote on Saturday.
Last Friday, a Singapore minister said the espionage group UNC3886 was “going after high value strategic threat targets, vital infrastructure that delivers essential services” but did not give details of the attacks.
The minister did not link the group to China but Google-owned cybersecurity firm Mandiant has described UNC3886 as a “China-nexus espionage group” that has attacked defense, technology and telecommunications organizations in the United States and Asia.
Beijing routinely denies any allegations of cyberespionage, and says it opposes all forms of cyberattacks and is in fact a victim of such threats.
Singapore’s critical infrastructure sectors include energy, water, banking, finance, health care, transport, government, communication, media, as well as security and emergency services, according to the country’s cyber agency.


Pakistan arrests 11 suspects after viral video of couple shot dead in the name of ‘honor’

Pakistan arrests 11 suspects after viral video of couple shot dead in the name of ‘honor’
Updated 21 July 2025

Pakistan arrests 11 suspects after viral video of couple shot dead in the name of ‘honor’

Pakistan arrests 11 suspects after viral video of couple shot dead in the name of ‘honor’
  • Couple shot dead on the orders of a local tribal council last month in Pakistan’s southwestern Balochistan province
  • The Human Rights Commission of Pakistan said that in 2024, there were at least 405 cases of ‘honor killings’

QUETTA, Pakistan: Pakistan has arrested 11 suspects after a video emerged on social media of a woman and a man being shot and killed for marrying against the wishes of their families, in a so-called honor killing, authorities said.

The couple, who were not identified, were shot dead on the orders of a local tribal council last month in Pakistan’s southwestern Balochistan province, according to provincial authorities, who investigated after the video went viral.

Eleven suspects have been arrested, the provincial chief minister, Sarfraz Bugti, said in a statement on Monday, hours after he announced that the location and people in the video had been identified.

A case has been registered against all those involved, Bugti said, adding that they will be prosecuted.

The video shows people in a desert, and some pickup trucks and SUVs in which they had apparently been driven there. The woman is given a copy of the Qur’an, the Muslim holy book, and she then tells a man: “Come walk seven steps with me, after that you can shoot me.”

The man then follows her for a few steps. A local police official said the woman did not cry or seek mercy.

“You are allowed only to shoot me. Nothing more than that,” the woman says in the regional Brahavi language, translated by the official.

It was not clear what she meant by “nothing more than that.” The man, who had followed her, then aimed a pistol at her as she turned her back to the shooter.

The woman, wrapped in a shawl, stood still as shots were fired. She remained standing after two shots, delivered from close range, dropping to the ground after the third shot.

That is followed by a series of gunshots. The footage then shows a bloodied man lying on the ground, close to the woman’s body. Then, men are shown shooting at both the bodies.

Reuters could not independently verify the authenticity of the video.

The Human Rights Commission of Pakistan said that in 2024, there were at least 405 “honor killings,” criticizing the authorities for failing to stamp out these crimes. Most victims are women, and the killings are usually carried out by relatives professing to defend their family’s reputation, human rights groups say.

Conservative families in many parts of Pakistan and India do not allow couples to marry against their wishes.