TMCnet - World's Largest Communications and Technology Community

Security Feature

October 24, 2016

Hacking Goes Mainstream

By Special Guest
Arthur Layne, Executive Vice President, Cognetyx

Banks Rob Customers, Olympians Discredited and Potential for Election Fraud

It seems not a single day passes without a 21st Century version of the World War II era radio game show “Can You Top This,” broadcasting how the latest data hack tops yesterday’s breach, making our society  much more vulnerable than the one that existed 50 years ago. While all of today’s technological innovations have made our lifestyle easier, those same advances have made us less secure than the coldest days of the Cold War.

The transition from a paper-based system to an electronic information system holds us hostage to some of the worst violations of our personal information including credit card numbers, bank accounts, driver’s license identification, Social Security digits, and even sexual preferences, salary details, religious and political beliefs,  shopping purchases and more.  

The concept of “secret information” harkens back to a time when only top spymasters knew and kept secrets.  Now everyone seems to want to keep them. When you make a phone call, how often do you hear, “This call may be monitored?” This phrase often really means the call can and will be used against you in court, sometimes for simply calling your phone carrier. Just how vulnerable is our personal information?

When the Bank Robs You

Approximately 5,330 Wells Fargo (News - Alert) employees were fired for hacking customer data that enabled them to secretly create millions of unauthorized bank and credit card accounts without their customers knowing it. This has been going on since 2011. The phony accounts earned the bank unwarranted fees and allowed employees to boost their sales figures and make extra money.

Employees created phony PIN numbers and fake email addresses to enroll customers in online banking services. “Wells Fargo employees secretly opened unauthorized accounts to hit sales targets and receive bonuses,” Richard Cordray, director of the Consumer Financial Protection Bureau, said in a statement.

Care to Dance With A Fancy Bear?

Fancy Bear is a Russian cyber espionage group believed to be associated with GRU, Russia’s largest military intelligence agency. The organization is believed to have penetrated the World Anti-Doping Agency’s (WADA) athlete database and publicly revealed private medical information about three of the United States’ most famous athletes—Serena Williams, Venus Williams and Simone Biles.

The agency published documents showing that Biles and the Williams sisters received medical exemptions to use banned drugs during the Summer 2016 Olympics in Rio, Brazil. WADA recently confirmed the authenticity of those documents. 

Fancy Bear has also been tied to breaches against government agencies, not-for-profit organizations and corporations. The group is also suspected of involvement in the recent theft of emails and documents from the Democratic National Committee (DNC) and Hillary Clinton campaign chairman John Podesta.

Even former Secretary of State Colin Powell’s email account was hacked, which proved embarrassing for Powell and those mentioned in the emails, including presidential candidates Hillary Clinton and Donald Trump. 

These hacks have spurred concerns over the security of the U.S. election system, with mounting fear that the election results cannot be trusted. And who is behind the distrust—Putin and his apparent surrogate WikiLeaks?  

Vladimir Putin says he doesn't know or care who hacked the DNC, but he thinks it was a public service. Julian Assange, the ubiquitous WikiLeaks founder told CNN there will be more election related material coming. No doubt the picture is getting murkier.

Will the Election Be Rigged?

The U.S. Department of Homeland Security (DHS) is urging state and local election officials to seek assistance from the federal government to fend off cyberattacks that could be used to manipulate the results of the November presidential election.  So far the agency isn’t aware of any manipulation of data, but there have been signs that hackers have been probing multiple state voting systems.

 So far DHS has received requests from 33 states and county or local election agencies, an increase of almost a third from the more than 24 states have expressed interest in a general “cyber hygiene” scan of key websites, which is akin to ensuring that windows in a home are properly closed.

Bethany Salzarulo, director of Elections and Voter Registration for Cumberland County, Pennsylvania, said there is “absolutely no” chance one of her voting machines could be hacked. It seems that the voting machines cannot be hooked to the Internet and therefore there is no chance of hacking. However, the real harm is the appearance of election tampering which could call into question the results and in close races trigger demands for time consuming recounts. 

Despite assurances from government officials, the FBI’s Cyber Division released an amber alert in August to warn election officials of potential voting booth attacks. The Federal Bureau of Investigation (FBI) has detected a variety of “scanning activities” that are early indications of hacking. Arizona, Illinois and both the Democratic and Republican parties have been the victims of either attempted or successful cyber attacks that FBI agents with expertise in Russian government hacking are currently investigating.

Federal law enforcement and local election officials say the decentralized nature of the voting process, which is run by states and counties, makes it impossible to ensure a high level of security in each district. There is particular concern about electronic balloting from overseas that travels on vulnerable networks before landing in the United States and about efforts to use cyber attacks to disrupt vote tabulations being transmitted to state-level offices. Encryption, secure paper backups and backup computers will be critical.

The question remains: Should we just dig deeper moats and build higher walls?

Are Hackers Just Crackers?

Upon examination, the attacks are not as sophisticated as one might think. Two North Carolina millennials were recently arrested for allegedly hacking into the computer systems of several senior government officials, according to an affidavit released by a Virginia district court. Using playful Twitter (News - Alert) names like “INCURSIO” and “D3F4ULT,” the two youths are accused of conspiring with a hacking collective who calls itself “CRACKAS WITH ATTITUDE” (CWA (News - Alert)) to breach government accounts and publish personal information online.

Earlier this year, CWA was credited with attacks targeting CIA director John Brennan, FBI Deputy Director Mark Giuliano and the Miami Police.

The hackers used a technique known as “social engineering” to target members of the U.S. government and their families, communicating to each other via direct messages on Twitter. Members of CWA utilized several different handles, including @GENUINELYSPOOKY, @CRACKA, and @PORNG0D.

Further investigations have revealed that the modus operandi is often surprisingly simple. Terms such as Typosquatting, social engineering and Bitcoin have been associated with these attacks. Technically none of the attacks can be called criminal activities; however, they remain at the fringe of legitimacy.

Out Sleuthing the Hackers

The U.S. has enough cybersecurity expertise to counter these emerging threats. Innovative new cybersecurity technology is providing a path forward to end our national anxiety over the vulnerability of U.S. election systems to attack. The security domain of artificial intelligence and “expert systems,” machine learning, data analytics and predictive analytics are being investigated in new ways to stop hacks. In fact, technology has moved way ahead in safeguarding our cyber space with the use of artificial intelligence and machine learning systems.

The technology is available now and can effectively safeguard the elections. One of those technologies is “Ambient (News - Alert) Cognitive Cyber Surveillance,” a platform which deploys a virtual intelligent eye, combining artificial intelligence with advanced machine learning algorithms to provide real-time behavior analysis and anomalous user access monitoring.

Baselines of normal user behavior are set up to identity any activities that breach those parameters. The eye works by creating a digital “fingerprint” that identifies the login behavior of every election official who logs into any application. This behavioral information records every detail of an official’s interaction with voter data and the systems it resides in. If the user’s behavior violates a baseline parameter, the system can easily identify irregularities in user activity and send out the appropriate alerts to IT officials immediately.

There can be no doubt that effective cybersecurity measures are required to counter these threats, especially when our sovereignty is threatened. U.S. elections are sacrosanct and no one should be allowed to meddle with them.

About the Author

Arthur Layne has more than 30 years of executive healthcare experience. He has led hospitals as a CEO for twenty years, working primarily in the for-profit sector. Beginning in 2004, he was appointed president of a healthcare data and analytics company providing planning and market assessment services to over 500 hospitals. He served in this role for over ten years.

He has also served on several healthcare company advisory boards. He received both his BS and MHA from Virginia Commonwealth University and continues to be actively involved in student education and mentorship. He was recognized in 2013 as the Alumnus of the year for the VCU School of Allied Health Professions and in 2015 as Alumnus of the year for the Program in Healthcare Administration.

His goal at Cognetyx is to help bring the most advanced products in cyber security to an industry being overwhelmed by credential hackers and rogue users. Art recognized immediately that the Cognetyx digital finger print specifically addressed the problem of rogue users and stolen credentials that are the common factor in 95 percent of data breaches and HIPAA violations. 

Edited by Alicia Young

Technology Marketing Corporation

2 Trap Falls Road Suite 106, Shelton, CT 06484 USA
Ph: +1-203-852-6800, 800-243-6002

General comments:
Comments about this site:


© 2020 Technology Marketing Corporation. All rights reserved | Privacy Policy