Welcome to DU!
The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards.
Join the community:
Create a free account
Support DU (and get rid of ads!):
Become a Star Member
Latest Breaking News
General Discussion
The DU Lounge
All Forums
Issue Forums
Culture Forums
Alliance Forums
Region Forums
Support Forums
Help & Search
McCamy Taylor
McCamy Taylor's Journal
McCamy Taylor's Journal
May 25, 2019
How do know that one of Trump's insecure friends with a security clearance did not release this NSA property to Russia in 2017? We don't!
Congress needs to start investigating this issue yesterday! If North Korea was the first to exploit it followed by Russia, you can bet that Russia stole it, tested it in North Korea and now has access to a tool that will allow it to corrupt local computer databases in a way that may make a fair e-vote election all but impossible. Complicating the matter--if local Republicans believe that the malware will allow Russian hackers to aid them in 2020, they will be inclined to look the other way, allowing hansom hackers to prey upon US citizens.
First on the agenda--Congress must do away with e-voting and insist upon paper ballots. The Senate and Trump will stonewall, which will make it very clear to Americans that the GOP is counting on election fraud.
Then, the House must offer aid to local communities to upgrade their security. Those which decline should be named publicly and asked why they want to enable organized crime.
THIS Is What House Democrats Need to Investigate! How Russia Got NSA Malware in 2017
Forget sex. America is bored with sex. The House needs to investigate this:
https://www.nytimes.com/2019/05/25/us/nsa-hacking-tool-baltimore.html?action=click&module=Top%20Stories&pgtype=Homepage#commentsContainer
Since 2017, when the N.S.A. lost control of the tool, EternalBlue, it has been picked up by state hackers in North Korea, Russia and, more recently, China, to cut a path of destruction around the world, leaving billions of dollars in damage. But over the past year, the cyberweapon has boomeranged back and is now showing up in the N.S.A.s own backyard.
It is not just in Baltimore. Security experts say EternalBlue attacks have reached a high, and cybercriminals are zeroing in on vulnerable American towns and cities, from Pennsylvania to Texas, paralyzing local governments and driving up costs.
snip
North Korea was the first nation to co-opt the tool, for an attack in 2017 called WannaCry that paralyzed the British health care system, German railroads and some 200,000 organizations around the world. Next was Russia, which used the weapon in an attack called NotPetya that was aimed at Ukraine but spread across major companies doing business in the country. The assault cost FedEx more than $400 million and Merck, the pharmaceutical giant, $670 million.
The damage didnt stop there. In the past year, the same Russian hackers who targeted the 2016 American presidential election used EternalBlue to compromise hotel Wi-Fi networks. Iranian hackers have used it to spread ransomware and hack airlines in the Middle East, according to researchers at the security firms Symantec and FireEye.
It is not just in Baltimore. Security experts say EternalBlue attacks have reached a high, and cybercriminals are zeroing in on vulnerable American towns and cities, from Pennsylvania to Texas, paralyzing local governments and driving up costs.
snip
North Korea was the first nation to co-opt the tool, for an attack in 2017 called WannaCry that paralyzed the British health care system, German railroads and some 200,000 organizations around the world. Next was Russia, which used the weapon in an attack called NotPetya that was aimed at Ukraine but spread across major companies doing business in the country. The assault cost FedEx more than $400 million and Merck, the pharmaceutical giant, $670 million.
The damage didnt stop there. In the past year, the same Russian hackers who targeted the 2016 American presidential election used EternalBlue to compromise hotel Wi-Fi networks. Iranian hackers have used it to spread ransomware and hack airlines in the Middle East, according to researchers at the security firms Symantec and FireEye.
How do know that one of Trump's insecure friends with a security clearance did not release this NSA property to Russia in 2017? We don't!
Congress needs to start investigating this issue yesterday! If North Korea was the first to exploit it followed by Russia, you can bet that Russia stole it, tested it in North Korea and now has access to a tool that will allow it to corrupt local computer databases in a way that may make a fair e-vote election all but impossible. Complicating the matter--if local Republicans believe that the malware will allow Russian hackers to aid them in 2020, they will be inclined to look the other way, allowing hansom hackers to prey upon US citizens.
First on the agenda--Congress must do away with e-voting and insist upon paper ballots. The Senate and Trump will stonewall, which will make it very clear to Americans that the GOP is counting on election fraud.
Then, the House must offer aid to local communities to upgrade their security. Those which decline should be named publicly and asked why they want to enable organized crime.
Profile Information
Member since: Tue Nov 9, 2004, 07:05 PMNumber of posts: 19,240