Professional Documents
Culture Documents
Exhibit A
Hayward Street
Ann Arbor, mi usa
(mobile ) +
jhalderm@eecs.umich.edu
J. Alex Halderman
Professor, Computer Science and Engineering
University of Michigan
November ,
J. Alex Halderman.com
Research Overview
My research focuses on computer security and privacy, with an emphasis on problems that
broadly impact society and public policy. Topics that interest me include software security,
network security, data privacy, anonymity, surveillance, electronic voting, censorship resistance,
digital rights management, computer forensics, ethics, and cybercrime. Im also interested in
the interaction of technology with law, regulatory policy, and international affairs.
Selected Projects
: Lets Encrypt HTTPS certificate authority
: Weak Diffie-Hellman and the Logjam attack
: Understanding Heartbleeds aftermath
: Security problems in full-body scanners
: Analysis of Estonias Internet voting system
: ZMap Internet-wide network scanner
: Widespread weak keys in network devices
: Anticensorship in the network infrastructure
: Hacking Washington D.C.s Internet voting
:
:
:
:
:
:
:
:
:
Positions
University of Michigan, Ann Arbor, MI
Department of Electrical Engineering and Computer Science,
Computer Science and Engineering Division
Professor . . . (present)
Associate Professor . . . ()
Assistant Professor . . . ()
Director, Center for Computer Security and Society (present)
Education
Ph.D. in Computer Science, Princeton University, June
Advisor: Ed Felten
Thesis: Investigating Security Failures and their Causes: An Analytic Approach to Computer Security
Doctoral committee: Andrew Appel, Adam Finkelstein, Brian Kernighan, Avi Rubin
Best Paper Award of the nd ACM Conference on Computer and Communications Security
for Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice ()
Pwnie Award in the category of Most Innovative Research
for Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice, Black Hat
IRTF Applied Networking Research Prize for Neither Snow Nor Rain Nor MITM. . . An Empirical Analysis of Email Delivery Security ()
Alfred P. Sloan Research Fellowship ()
University of Michigan College of Engineering E Award () (recognizes an outstanding
teacher in both elementary and advanced courses, an understanding counselor of students who seek
guidance in their choice of a career, a contributor to the educational growth of his/her College, and a
teacher whose scholarly integrity pervades his/her service and the profession of Engineering)
Book Chapters
[] Practical Attacks on Real-world E-voting
J. A. Halderman
In Feng Hao and Peter Y. A. Ryan (Eds.), Real-World Electronic Voting: Design, Analysis and
Deployment, pages , CRC Press, .
Journal Publications
[] Lest We Remember: Cold-Boot Attacks on Encryption Keys
J. A. Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A.
Calandrino, Ariel J. Feldman, Jacob Appelbaum, and Edward W. Felten
Communications of the ACM, ():, .
[] A Search Engine for D Models
Thomas Funkhouser, Patrick Min, Michael Kazhdan, Joyce Chen, J. A. Halderman, David P.
Dobkin, and David Jacobs
ACM Transactions on Graphics (TOG), ():, .
Patents
[] Controlling Download and Playback of Media Content
Wai Fun Lee, Marius P. Schilder, Jason D. Waddle, and J. A. Halderman
U.S. Patent No. ,,, issued Dec. .
[] System and Method for Machine-Assisted Election Auditing
Edward W. Felten, Joseph A. Calandrino, and J. A. Halderman
U.S. Patent No. ,,, issued Oct. .
Speaking
Major Invited Talks and Keynotes
Lets Encrypt
Invited speaker, TTI/Vanguard conference on Cybersecurity, Washington, D.C., Sept. , .
Elections and Cybersecurity: What Could Go Wrong?
Keynote speaker, th Information Security Conference (ISC), Honolulu, September , .
Internet Voting: What Could Go Wrong?
Invited speaker, USENIX Enigma, San Francisco, January , .
Logjam: Diffie-Hellman, Discrete Logs, the NSA, and You
c, Hamburg, December , .
The Network Inside Out: New Vantage Points for Internet Security
Invited talk, China Internet Security Conference (ISC), Beijing, September , .
The Network Inside Out: New Vantage Points for Internet Security
Keynote speaker, ESCAR USA (Embedded Security in Cars), Ypsilanti, Michigan, May , .
Security Analysis of the Estonian Internet Voting System.
c, Hamburg, December , .
The Network Inside Out: New Vantage Points for Internet Security
Keynote speaker, th Brazilian Symposium on Information Security and Computer Systems
(SBSeg), Belo Horizonte, Brazil, November , .
Empirical Cryptography: Measuring How Crypto is Used and Misused Online
Keynote speaker, rd International Conference on Cryptography and Information Security in
Latin America (Latincrypt), Florianpolis, Brazil, September .
Healing Heartbleed: Vulnerability Mitigation with Internet-wide Scanning
Keynote speaker, th Conference on Detection of Intrusions and Malware and Vulnerability
Assessment (DIMVA), London, July , .
Fast Internet-wide Scanning and its Security Applications.
c, Hamburg, December , .
Challenging Security Assumptions. Three-part tutorial. nd TCE Summer School on Computer Security, Technion (Haifa, Israel), July , .
Ethical Issues in E-Voting Security Analysis. Invited talk, Workshop on Ethics in Computer
Security Research (WECSR) (Castries, St. Lucia), Mar. , [with David Robinson].
Electronic Voting: Danger and Opportunity. Invited speaker, Interfaces : Technology,
Society and Innovation, Center for Technology and Society (CTS/FGV) (Rio de Janeiro), Dec.
, [host: Ronaldo Lemos]; Invited speaker, Conference on EVMs: How Trustworthy?,
Centre for National Renaissance (Chennai, India), Feb. , ; Google, Inc., Tech Talk
(Mountain View, CA), Jan. , ; Star Camp (Cape Town, South Africa), Dec. , ; Lehigh
University, Nov. , ; Princeton OiT Lunch-n-Learn, Oct. , ; University of Waterloo
(Canada), Feb. , .
A New Approach to Censorship Resistance. Think Conference, Nov. , .
Practical AVC-Edge CompactFlash Modifications can Amuse Nerds [PACMAN]. Rump session, th USENIX Security Symposium (Washington, D.C.), Aug. , ; Rump session,
EVT/WOTE (Washington, D.C.), Aug. , .
Legal Challenges to Security Research. Guest lecture, Law : Copyright, U. Michigan Law
School, Apr. , ; Invited talk, University of Florida Law School, Oct. , .
Adventures in Computer Security. Invited talk, Greenhills School, grades (Ann Arbor,
MI), Mar. , .
The Role of Designers Incentives in Computer Security Failures. STIET Seminar, U. Michigan, Oct. , .
Cold-Boot Attacks Against Disk Encryption. Invited speaker, SUMIT Security Symposium,
U. Michigan, Oct. , .
On the Attack. Distinguished lecture, U.C. Berkeley EECS, Nov. , .
Panelist: Civil Societys Challenge in Preserving Civic Participation. The Public Voice workshop: Privacy Rights are a Global Challenge, held in conjunction with the th International
Conference of Data Protection and Privacy Commissioners, Punta del Este, Uruguay, Oct. ,
[moderator: Lillie Coney].
Panelist: Election Technologies: Today and Tomorrow. Microsoft Faculty Summit (Redmond),
July , [moderator: Josh Benaloh].
Panelist: Is America Ready to Vote on the Internet? CSPRI Seminar, George Washington
University (Washington, D.C.), May , [moderator: Lance Hoffman].
Panelist: Technical Methods of Circumventing Censorship. Global Censorship Conference,
Yale Law School, Mar. , .
Panelist: Internet Voting. RSA Conference (San Francisco), Mar. , [moderator: Ron
Rivest].
Panelist: The Law and Science of Trustworthy Elections. Association of American Law
Schools (AALS) Annual Meeting, Jan. , [moderator: Ron Rivest].
Panelist: Connecticut Secretary of States Online Voting Symposium (New Britain, CT), Oct.
, [moderator: John Dankosky].
Panelist: CS Saves the World. Michigan CSE Mini-symposium, Mar. , [moderator:
Prabal Dutta].
Panelist: Cyber Security / Election Technology. Overseas Voting Foundation Summit, Feb. ,
[moderator: Candice Hoke].
Tutorial speaker/organizer: Security Issues in Electronic Voting, ICISS (Gandhinagar, India),
Dec. , [canceled under threat of deportation].
Invited testimony: On D.C. Board of Elections and Ethics Readiness for the Nov. General Election. D.C. Council Hearing, Oct. , .
Panelist and organizer: Indias Electronic Voting Machines. EVT/WOTE (Washington, D.C.),
Aug. , .
Panelist: Ethics in Networking and Security Research. ISOC Network and Distributed System
Security Symposium (San Diego, CA), Mar. , [moderator: Michael Bailey].
Post Docs
Colleen Swanson ()
Doctoral Committees
Denis Bueno (C.S. P.D. expected , Michigan)
Eric Crockett (C.S. Ph.D expected , Georgia Tech)
Jakub Czyz (C.S. Ph.D. , Michigan)
Eric Wustrow (C.S. Ph.D. , Michigan; chair)
James Kasten (C.S. Ph.D. , Michigan; chair)
Jing Zhang (C.S. Ph.D. , Michigan)
Katharine Cheng (C.S. Ph.D. , Michigan)
Matt Knysz (C.S. Ph.D. , Michigan)
Zhiyun Qian (C.S. Ph.D. , Michigan)
Xin Hu (C.S. Ph.D. , Michigan)
Ellick Chan (C.S. Ph.D. , UIUC)
Teaching
Introduction to Computer Security, EECS , University of Michigan
Terms: Fall , Fall , Fall , Fall , Fall , Fall , Fall , Fall
Created new undergrad security elective that has grown to reach > students/year. An accessible intro,
teaches the security mindset and practical skills for building and analyzing security-critical systems.
Professional Service
Program Committees
Boards
Board of Directors for the Internet Security Research Group (present)
Board of Advisors for the Verified Voting Foundation (present)
External Advisory Board for the DemTech Project, IT University of Copenhagen (present)
Advisory Council for the Princeton University Department of Computer Science ()
Cold-Boot Attacks ()
Developed the cold boot attack against software disk encryption systems, which altered widespread
thinking on security assumptions about the behavior of RAM, influenced computer forensics practice,
and inspired the creation of a new subfield of theoretical cryptography.
References
Edward W. Felten
Professor
Princeton University
ACM Fellow, NAE Member
Farnam Jahanian
Provost
Carnegie Mellon University
AAAS, ACM, & IEEE Fellow
Ronald L. Rivest
Professor
MIT
A.M. Turing Award Winner
felten@cs.princeton.edu
farnam@andrew.cmu.edu
rivest@mit.edu
Michael Bailey
Associate Professor
UIUC
Matt Blaze
Professor
University of Pennsylvania
Avi Rubin
Professor
Johns Hopkins University
mdbailey@illinois.edu
mab@crypto.com
rubin@jhu.edu
Doug Tygar
Professor
U. C. Berkeley
Dan Wallach
Professor
Rice University
David Wagner
Professor
U. C. Berkeley
doug.tygar@gmail.com
dwallach@cs.rice.edu
daw@cs.berkeley.edu
Exhibit B
11/24/2016
HeresWhatWeKnowAboutRussiaandtheDNCHack|WIRED
HRWHATWKNOWAOUTRUIAANDTHDNC
HACK
GTTYIMAG
ATHDMOCRATIC v -
Pp, f p.
p, m pb.
m f.
b b f m mm. b
v m , pv m, pp , mp
p. F, m 20,000 f pv m
pb, v mb f p m .
ff vm b b. m
p p.
mb f p b , pbb .
AriefHitorofaHack
https://www.wired.com/2016/07/heres-know-russia-dnc-hack/
1/7
11/24/2016
HeresWhatWeKnowAboutRussiaandtheDNCHack|WIRED
f f m mm f b m-J.
, fm , v
p p v, f
p -ff v p .
mpv p f f J 14,
mp P . f
p, f, v f m .
f p, m mv f 2.0 (
f) m pb f b p.
b mp , f 2.0 f
m p, mf .
m v m f b .
f , b fm, F b M,
p b m
f , v f p
m m b
m p.
B m f m mp v b
f b f J b m , pf
, v mm--
m f m m
Pm 2015. m ff, m
fm m . f f b
b.
v m fm . f m m mp v
v . Fm,
f 2.0 m b fm m, b Mb
j m. B , f
x b f m.
, M Mq-B,
m xp b. f m
b b vm, m b
. b b
https://www.wired.com/2016/07/heres-know-russia-dnc-hack/
2/7
11/24/2016
HeresWhatWeKnowAboutRussiaandtheDNCHack|WIRED
pm m v, fm v fm P bm
Bb.
M, m vvm b. B
vb ; m bb m
f , f m v m v f m f
B .
FromRuiaWithLove
mp v , m m f m
f 2.0 , v mv b v f
m p. b f. v B,
J f v f v f m b
, , pf f
v, . v , f ,
v b p b mp.
, f , m b pb f p f
m pb Pm Pp f
mp P f m. p fq f
m pm. m m mp
bf m b b
.
f pv , p p f .
, b pb m mp .
P pf mp p. b pb
m m f P, pb
f v. p ff, mp mp
m, P Mf, fm v V v,
-b P f bf 2014.
m f , m v p, MqB.
f f m m .
, f m .
p: v m m.
https://www.wired.com/2016/07/heres-know-russia-dnc-hack/
3/7
11/24/2016
HeresWhatWeKnowAboutRussiaandtheDNCHack|WIRED
Update: p f , pb p
mp v v m m fm mp
m. b xp b m p
pb .
https://www.wired.com/2016/07/heres-know-russia-dnc-hack/
4/7
11/24/2016
HeresWhatWeKnowAboutRussiaandtheDNCHack|WIRED
https://www.wired.com/2016/07/heres-know-russia-dnc-hack/
5/7
11/24/2016
HeresWhatWeKnowAboutRussiaandtheDNCHack|WIRED
https://www.wired.com/2016/07/heres-know-russia-dnc-hack/
6/7
11/24/2016
HeresWhatWeKnowAboutRussiaandtheDNCHack|WIRED
https://www.wired.com/2016/07/heres-know-russia-dnc-hack/
7/7
Exhibit C
11/24/2016
PrivateSecurityGroupSaysRussiaWasBehindJohnPodestasEmailHack-TheNewYorkTimes
http://nyti.ms/2eqNSVY
EL ECTION2016
Full Reult
xit Poll
Trump Cainet
PrivateSecurityGroupSaysRussia
WasBehindJohnPodestasEmail
Hack
ByNICOLEPERLROTHandMICHAELD.SHEAR OCT.20,2016
SANFRANCISCOAtthestartof2014,PresidentObamaassignedhistrusted
counselor,JohnD.Podesta,toleadareviewofthedigitalrevolution,itspotential
anditsperils.WhenMr.Podestapresentedhisfindingsfivemonthslater,hecalled
theinternetsonslaughtofbigdataahistoricdriverofprogress.Buttwoshort
yearslater,aschairmanofHillaryClintonspresidentialcampaign,Mr.Podesta
wouldalsobecomeoneoftheinternetsmostnotablevictims.
OnThursday,privatesecurityresearcherssaidtheyhadconcludedthatMr.
PodestawashackedbyRussiasforeignintelligenceservice,theGRU,afterittricked
himintoclickingonafakeGoogleloginpagelastMarch,inadvertentlyhandingover
hisdigitalcredentials.
Formonths,thehackersminedMr.Podestasinboxforhismostsensitiveand
potentiallyembarrassingcorrespondence,muchofwhichhasbeenpostedonthe
WikiLeakswebsite.AdditionstothecollectiononThursdayincludedthreeshort
http://www.nytimes.com/2016/10/21/us/private-security-group-says-russia-was-behind-john-podestas-email-hack.html
1/4
11/24/2016
PrivateSecurityGroupSaysRussiaWasBehindJohnPodestasEmailHack-TheNewYorkTimes
emailexchangesbetweenMr.PodestaandMr.Obamahimselfinthedaysleadingup
tohiselectionin2008.
Mr.PodestasemailswerefirstpublishedbyWikiLeaksearlierthismonth.The
releasecamejustdaysafterJamesR.ClapperJr.,thedirectorofnational
intelligence,andtheDepartmentofHomelandSecuritypubliclyblamedRussian
officialsforcyberattacksontheDemocraticNationalCommittee,inwhatthey
describedasanefforttoinfluencetheAmericanpresidentialelection.
Todate,nogovernmentofficialshaveofferedevidencethatthesameRussian
hackersbehindtheD.N.C.cyberattackswerealsobehindthehackofMr.Podestas
emails,butaninvestigationbytheprivatesecurityresearchersdeterminedthatthey
werethesame.
ThreatresearchersatDellSecureWorks,anAtlanta-basedsecurityfirm,had
beentrackingtheRussianintelligencegroupformorethanayear.InJune,they
reportedthattheyhaduncoveredacriticaltoolintheRussianspycampaign.
SecureWorksresearchersfoundthattheRussianhackerswereusingapopularlink
shorteningservice,calledBitly,toshortenmaliciouslinkstheyusedtosendtargets
fakeGoogleloginpagestobaitthemintosubmittingtheiremailcredentials.
ThehackersmadeacriticalerrorbyleavingsomeoftheirBitlyaccountspublic,
makingitpossibleforSecureWorkstotrace9,000oftheirlinkstonearly4,000
GmailaccountstargetedbetweenOctober2015andMay2016withfakeGooglelogin
pagesandsecurityalertsdesignedtotrickusersintoturningovertheirpasswords.
Amongthelistoftargetsweremorethan100emailaddressesassociatedwith
HillaryClintonspresidentialcampaign,includingMr.Podestas.ByJune,20staff
membersforthecampaignhadclickedontheshortlinkssentbyRussianspies.In
June,SecureWorksdisclosedthatamongthosewhoseemailaccountshadbeen
targetedwerestaffmemberswhoadvisedMrs.Clintononpolicyandmanagedher
travel,communicationsandcampaignfinances.
Independent journalim.
More eential than ever.
SubscribetotheTimes
http://www.nytimes.com/2016/10/21/us/private-security-group-says-russia-was-behind-john-podestas-email-hack.html
2/4
11/24/2016
PrivateSecurityGroupSaysRussiaWasBehindJohnPodestasEmailHack-TheNewYorkTimes
TwosecurityresearcherswhohavebeentrackingtheGRUsspearphishing
campaignconfirmedThursdaythatMr.Podestawasamongthosewhohad
inadvertentlyturnedoverhisGoogleemailpassword.ThefactthatMr.Podestawas
amongthosebreachedbytheGRUwasfirstdisclosedThursdaybyEsquireandthe
Motherboardblog,whichpublishedthelinkRussianspiesusedagainstMr.Podesta.
ThenewpublicdataconfirmingtheRussiansarebehindthehackofJohn
Podestasemailisabigdeal,JakeSullivan,Mrs.Clintonsseniorpolicyadviser,said
Thursday.ThereisnolongeranydoubtthatPutinistryingtohelpDonaldTrump
byweaponizingWikiLeaks.
ThenewreleaseofMr.PodestasemailexchangewithMr.Obamafrom2008
madeclearthatMr.Obamasteamwasconfidenthewouldwin.
Inoneoftheemails,Mr.PodestawroteMr.Obamaalengthymemointhe
eveningonElectionDayrecommendingthathenotacceptaninvitationfrom
PresidentGeorgeW.BushtoattendanemergencymeetingoftheGroupof20
leaders.
AttendancealongsidePresidentBushwillcreateanextremelyawkward
situation,thememosaid.Ifyouattempttodissociateyourselffromhispositions,
youwillbesubjecttocriticismforprojectingadividedUnitedStatestotherestof
theworld.Butifyouadoptamorereservedposture,youwillbeassociatednotonly
withhispolicies,butalsowithhisverytenuousglobalstanding.
TheWhiteHousedidnotrespondtoquestionsabouttheemail.
Cor r ection:October 22,2016
AnarticleonFridayaboutsuspectedemailhackingbyRussiasforeignintelligence
servicemisstatedthenameofoneorganizationthatfirstdisclosedthatapresidential
counselor,JohnD.Podesta,wasamongthosewhoseaccountswerebreached.Theblog
isMotherboard,notVICEMotherload.
NicolePerlrothreportedfromSanFrancisco,andMichaelD.ShearfromWashington.
FollowTheNewYorkTimesspoliticsandWashingtoncoverageonFacebookand
Twitter,andsignupfortheFirstDraftpoliticsnewsletter.
http://www.nytimes.com/2016/10/21/us/private-security-group-says-russia-was-behind-john-podestas-email-hack.html
3/4
11/24/2016
PrivateSecurityGroupSaysRussiaWasBehindJohnPodestasEmailHack-TheNewYorkTimes
AversionofthisarticleappearsinprintonOctober21,2016,onpageA14oftheNewYorkeditionwith
theheadline:PrivateSecurityGroupSaysRussiaWasBehindHackofClintonCampaignChairman.
2016TheNewYorkTimesCompany
http://www.nytimes.com/2016/10/21/us/private-security-group-says-russia-was-behind-john-podestas-email-hack.html
4/4
Exhibit D
11/24/2016
RussiansHackedTwoU.S.VoterDatabases,OfficialsSay-NBCNews
SECTIONS
advertisement
INVESTIGATIONS
ASIAN AMERICA
LATINO
NBCBLK
Hackers based in Russia were behind two recent attempts to breach state voter
registration databases, fueling concerns the Russian government may be trying
to interfere in the U.S. presidential election, U.S. intelligence ocials tell NBC
News.
The breaches included the theft of data from as many as 200,000 voter records
in Illinois, ocials say.
The incidents led the FBI to send a "ash alert" earlier this month to election
ocials nationwide, asking them to be on the lookout for any similar cyber
intrusions.
One ocial tells NBC News that the attacks have been attributed to Russian
intelligence agencies.
"This is the closest we've come to tying a recent hack to the Russian
government," the ocial said.
That person added that "there is serious concern" that the Kremlin may be
seeking to sow uncertainty in the U.S. presidential election process.
Voters cast their ballots at ChiArts High School on March 15 in Chicago, Illinois. Scott Olson / Getty
Images
Two other ocials said that U.S. intelligence agencies have not yet concluded
that the Russian government is trying to do that, but they are worried about it.
http://www.nbcnews.com/news/us-news/russians-hacked-two-u-s-voter-databases-say-officials-n639551
1/4
11/24/2016
RussiansHackedTwoU.S.VoterDatabases,OfficialsSay-NBCNews
They said the Russians have long conducted cyber espionage on political
targets. The question now is whether they are moving into a covert intelligence
operation designed to destabilize the U.S. political process.
The alert, rst reported by Yahoo News, provided IP addresses associated with
the hack attempts, though it did not mention Russia.
One of the IP addresses was involved in both breaches, the FBI alert said.
"The FBI is requesting that states contact their Board of Elections and
determine if any similar activity to their logs, both inbound and outbound, has
been detected," the alert said.
The bulletin does not identify the targeted states, but ocials told NBC News
they were Illinois and Arizona. Illinois ocials said in July that they shut down
their state's voter registration after a hack. State ocials said Monday the
hackers downloaded information on as many 200,000 people.
State ocials told the Chicago Tribune they were condent no voter record had
been deleted or altered.
In Arizona, ocials said, hackers tried to get in using malicious software but
were unsuccessful. The state took its online voter registration down for nine
days, beginning in late June, after malware was discovered on a county election
ocial's computer. But the state concluded that the system was not successfully
breached.
Those incidents led Homeland Security Secretary Jeh Johnson to host a call
earlier this month with state election ocials to talk about cybersecurity and
election infrastructure.
Johnson said DHS isn't aware of any specic cyber threat against electionrelated networks, but he urged ocials to examine how to better secure their
systems, according to a summary of the call put out by the department.
U.S. intelligence ocials have previously said Russian intelligence agencies
were behind hacks into the Democratic National Committee and related
organizations. There has been a long running debate among intelligence
analysts about what Russia is up to.
Voting systems have not been considered "critical infrastructure," by the
Department of Homeland Security, so they are not subject to federal
government protections.
Independent assessments have found that many state and local voting system
are extremely vulnerable to hacking.
ROBERT WINDREM
WILLIAM M. ARKIN
KEN DILANIAN
http://www.nbcnews.com/news/us-news/russians-hacked-two-u-s-voter-databases-say-officials-n639551
2/4
11/24/2016
RussiansHackedTwoU.S.VoterDatabases,OfficialsSay-NBCNews
More to Explore
SponsoredLinksbyTaboola
SPONSORED CONTENT
MORE FROM NBC
NEWS
Your Warrington
Grocery Store is
70% Mo Blue Apron
Harry's Releases
New Blade, Keeps
ABOUT US
CAREERS
CONTACT
TERMS OF SERVICE
ADVERTISE
http://www.nbcnews.com/news/us-news/russians-hacked-two-u-s-voter-databases-say-officials-n639551
ADCHOICES
2016 NBCNEWS.COM
3/4
11/24/2016
RussiansHackedTwoU.S.VoterDatabases,OfficialsSay-NBCNews
http://www.nbcnews.com/news/us-news/russians-hacked-two-u-s-voter-databases-say-officials-n639551
4/4
Exhibit E
11/24/2016 JointStatementfromtheDepartmentOfHomelandSecurityandOfficeoftheDirectorofNationalIntelligenceonElectionSecurity|Homeland
OfficialwebsiteoftheDepartmentofHomelandSecurity
ContactUs
QuickLinks
SiteMap
A-ZIndex
ForImmediateRelease
DHSPressOffice
Contact:202-282-8010
TheU.S.IntelligenceCommunity(USIC)isconfidentthatthe
RussianGovernmentdirectedtherecentcompromisesofemailsfromUSpersonsandinstitutions,includingfromUS
politicalorganizations.Therecentdisclosuresofalleged
hackede-mailsonsiteslikeDCLeaks.comandWikiLeaks
andbytheGuccifer2.0onlinepersonaareconsistentwith
themethodsandmotivationsofRussian-directedefforts.
https://www.dhs.gov/news/2016/10/07/joint-statement-department-homeland-security-and-office-director-national
1/3
11/24/2016 JointStatementfromtheDepartmentOfHomelandSecurityandOfficeoftheDirectorofNationalIntelligenceonElectionSecurity|Homeland
Thesetheftsanddisclosuresareintendedtointerferewiththe
USelectionprocess.SuchactivityisnotnewtoMoscowthe
Russianshaveusedsimilartacticsandtechniquesacross
EuropeandEurasia,forexample,toinfluencepublicopinion
there.Webelieve,basedonthescopeandsensitivityof
theseefforts,thatonlyRussia'ssenior-mostofficialscould
haveauthorizedtheseactivities.
Somestateshavealsorecentlyseenscanningandprobingof
theirelection-relatedsystems,whichinmostcasesoriginated
fromserversoperatedbyaRussiancompany.However,we
arenotnowinapositiontoattributethisactivitytothe
RussianGovernment.TheUSICandtheDepartmentof
HomelandSecurity(DHS)assessthatitwouldbeextremely
difficultforsomeone,includinganation-stateactor,toalter
actualballotcountsorelectionresultsbycyberattackor
intrusion.Thisassessmentisbasedonthedecentralized
natureofourelectionsysteminthiscountryandthenumber
ofprotectionsstateandlocalelectionofficialshaveinplace.
Statesensurethatvotingmachinesarenotconnectedtothe
Internet,andtherearenumerouschecksandbalancesas
wellasextensiveoversightatmultiplelevelsbuiltintoour
electionprocess.
Nevertheless,DHScontinuestourgestateandlocalelection
officialstobevigilantandseekcybersecurityassistancefrom
DHS.Anumberofstateshavealreadydoneso.DHSis
providingseveralservicestostateandlocalelectionofficials
toassistintheircybersecurity.Theseservicesincludecyber
hygienescansofInternet-facingsystems,riskand
vulnerabilityassessments,informationsharingaboutcyber
incidents,andbestpracticesforsecuringvoterregistration
databasesandaddressingpotentialcyberthreats.DHShas
convenedanElectionInfrastructureCybersecurityWorking
Groupwithexpertsacrossalllevelsofgovernmenttoraise
awarenessofcybersecurityriskspotentiallyaffectingelection
infrastructureandtheelectionsprocess.SecretaryJohnson
andDHSofficialsareworkingdirectlywiththeNational
AssociationofSecretariesofStatetoofferassistance,share
https://www.dhs.gov/news/2016/10/07/joint-statement-department-homeland-security-and-office-director-national
2/3
11/24/2016 JointStatementfromtheDepartmentOfHomelandSecurityandOfficeoftheDirectorofNationalIntelligenceonElectionSecurity|Homeland
information,andprovideadditionalresourcestostateand
localofficials.
###
LastPublishedDate:October7,2016
https://www.dhs.gov/news/2016/10/07/joint-statement-department-homeland-security-and-office-director-national
3/3
Exhibit F
11/24/2016
U.S.official:Hackerstargetedvoterregistrationsystemsof20states-ChicagoTribune
U.S.official:Hackerstargetedvoterregistration
systemsof20states
InthisJune5,2015,filephoto,theHomelandSecurityDepartmentheadquartersinnorthwestWashington.AHomelandSecurity
Departmentofficialsayshackershavetargetedthevoterregistrationsystemsofmorethan20statesinrecentmonths.FBIDirectorJames
Comeytoldlawmakersthisweekthattheagencyislooking"very,veryhard"atRussianhackerswhomaytrytodisrupttheU.S.election.
Russia
(SusanWalsh/AP)
WASHINGTON
ackershavetargetedthevoterregistrationsystemsofmorethan20statesinrecentmonths,a
HomelandSecurityDepartmentofficialsaidFriday.
Thedisclosurecomesamidheightenedconcernsthatforeignhackersmightunderminevoterconfidenceinthe
integrityofU.S.elections.Federalofficialsandmanycybersecurityexpertshavesaiditwouldbenearly
impossibleforhackerstoalteranelection'soutcomebecauseelectionsystemsareverydecentralizedand
generallynotconnectedtotheinternet.
ADVERTISING
http://www.chicagotribune.com/news/nationworld/ct-hackers-target-election-systems-20160930-story.html
1/3
11/24/2016
U.S.official:Hackerstargetedvoterregistrationsystemsof20states-ChicagoTribune
Theofficialwhodescribeddetectingthehackeractivitywasnotauthorizedtospeakpubliclyonthesubjectand
spoketoTheAssociatedPressonconditionofanonymity.Itwasunclear,theofficialsaid,whetherthehackers
wereforeignordomestic,orwhattheirmotivesmightbe.ABCNewsearlierreportedthatmorethan20states
weretargeted.
TheFBIlastmonthwarnedstateofficialsoftheneedtoimprovetheirelectionsecurityafterhackerstargeted
systemsinIllinoisandArizona.FBIDirectorJamesComeytoldlawmakersthisweekthattheagencyislooking
"very,veryhard"atRussianhackerswhomaytrytodisrupttheU.S.election.
Lastmonth,DonaldTrump,theGOPnomineeforpresident,suggestedthathefearedthegeneralelection"is
goingtoberigged."
TheHomelandSecurityDepartmenthassteppedupitsoutreachtostatesandlocalities,butitisuptothemto
askforhelp.Sofar,19stateshaveexpressedinterestinageneral"cyberhygiene"scanofkeywebsitesakinto
ensuringthatwindowsinahomeareproperlyclosed,accordingtoanotherHomelandSecurityofficialdirectly
involvedinsecuringlocalelectionswhoalsowasnotauthorizedtospeakpubliclyaboutongoingefforts.
TheFBIhasdetectedavarietyof"scanningactivities"thatareearlyindicationsofhacking,Comeytoldthe
HouseJudiciaryCommitteethisweek.
TheFBIheldaconferencecallonFridaywiththelocalofficialswhorunelectionsinthebattlegroundstateof
Florida.MeredithBeatrice,aspokeswomanforSecretaryofStateKenDetzner,calleditan"informationalcall
relatedtoelectionssecurity,"butapersononthecallwhowasnotauthorizedtodiscussitandrequested
anonymitysaidauthoritieshadseenevidenceofsomeoneprobingalocalelectionswebsite.
HomelandSecuritySecretaryJehJohnsonspoketostateelectionofficialsbyphonelastmonth,encouraging
themtoimplementexistingtechnicalrecommendationstosecuretheirelectionsystemsandensurethat
electronicvotingmachinesarenotconnectedtotheinternet.
DHSisofferingstatesmorecomprehensive,on-siteriskandvulnerabilitychecks.Onlyfourstateshave
expressedinterestintheassessment,andbecausetheelectionisonlyweeksaway,thedepartmentwilllikely
onlybeabletoconductanassessmentofonestatebeforeElectionDayonNov.8,theofficialsaid.
TwoofthehackingattemptsinvolvedeffortstominedatafromtheArizonaandIllinoisvoterregistration
systems,accordingtoKayStimson,aspokeswomanfortheNationalAssociationofSecretariesofState.She
saidinArizonaahackertriedtoprobevoterregistrationdata,butneverinfiltratedthesystem,whileinIllinois
hackersgotintothesystem,butdidn'tmanipulateanydata.
http://www.chicagotribune.com/news/nationworld/ct-hackers-target-election-systems-20160930-story.html
2/3
11/24/2016
U.S.official:Hackerstargetedvoterregistrationsystemsof20states-ChicagoTribune
Thesesystemshave"nothingtodowithvotecastingorcounting,"Stimsonsaidinanemail."Whileitis
theoreticallypossibletodisruptanelectionbyinfiltratingavoterregistrationsystem,theircompromisewould
notaffectelectionresults"andtherearesystemcontrolsinplacetocatchanyfraud.
Rep.HenryJohnson,D-Ga.,introducedtwobillsearlierthismonththatwouldrequirevotingsystemsbe
designatedascriticalinfrastructureandlimitpurchasesofnewvotingsystemsthatdon'tprovidepaperballots,
amongothermeasures.It'sunlikelythebillswillbepassedbeforetheelection.
TheHomelandSecurityDepartmentisalreadyconsideringdesignatingvotingsystemsascriticalinfrastructure
inthefuture,thoughitisunlikelytohappenbeforetheelection,thesecondofficialsaid.
Apresidentialdirectivereleasedin2013details16sectorsthatareconsideredcriticalinfrastructure,including
energy,financialservices,healthcare,transportation,foodandagriculture,andcommunications.The
designationplacesresponsibilitiesontheHomelandSecuritysecretarytoidentifyandprioritizethosesectors,
consideringphysicalandcyberthreats.Thesecretaryisalsorequiredtoconductsecuritychecksandprovide
informationaboutemergingandimminentthreats.
AssociatedPress
Copyright2016,ChicagoTribune
Thisarticleisrelatedto:JehJohnson,JamesComey
http://www.chicagotribune.com/news/nationworld/ct-hackers-target-election-systems-20160930-story.html
3/3
Exhibit G
11/24/2016
Ukraineelectionnarrowlyavoided'wantondestruction'fromhackers(+video)-CSMonitor.com
Log In | Register
World
USA
Commentary
Business
Energy / Environment
Technology
Science
Culture
Books
Take Action
Subscribe
Passcode
WORLD | PASSCODE
Popular Now
1
Athree-prongedwaveofcyber-attacksaimedatwreckingUkraines
presidentialvoteincludinganattempttofakecomputervotetotalswas
narrowlydefeatedbygovernmentcyberexperts,Ukrainianofficialssay.
Thestilllittle-knownhacks,whichsurfacedMay22-26,appeartobeamong
themostdangerouscyber-attacksyetdeployedtosabotageanational
electionandawarningshotforfutureelectionsintheUSandabroad,
politicalscientistsandcyberexpertssay.
NationalelectionsintheNetherlands,Norway,andothernationshaveseen
hackersprobeInternet-tiedelectionsystems,butneverwithsuch
Follow Passcode
Passcode covers security and privacy in the digital
age. Sign up below to stay up to date with Passcode
news, columnists, and upcoming events.Read more
about us.
E-mail address
SIGN-UP
Michael B. Farrell
Passcode Editor | Michael is an editor
and writer based in Boston.
destructiveabandon,saidexpertsmonitoringtheUkrainevote.
Sara Sorcher
Thisisthefirsttimeweveseenacyber-hacktivistorganizationactina
maliciouswayonsuchagrandscaletotrytowreckanationalelection,
Jack Detsch
Sta writer | Jack is the Mark Clayton
Fellow in Cybersecurity
http://www.csmonitor.com/World/Passcode/2014/0617/Ukraine-election-narrowly-avoided-wanton-destruction-from-hackers-video
1/6
11/24/2016
Ukraineelectionnarrowlyavoided'wantondestruction'fromhackers(+video)-CSMonitor.com
maliciouswayonsuchagrandscaletotrytowreckanationalelection,
saysJosephKiniry,anInternetvotingsystemscyber-securityexpert.To
Paul F. Roberts
Correspondent | Paul covers critical
infrastructure and the Internet of Things.
hackinanddeleteeverythingonthoseserversisjustpillaging,wanton
destruction.
Jaikumar Vijayan
Correspondent | Jaikumar is an awardwinning technology reporter.
Thatwantondestructionbeganfourdays
aheadofthenationalvote,whenCyberBerkut,
agroupofpro-Russiahackers,infiltrated
Nadya T. Bliss
Ukrainescentralelectioncomputersand
deletedkeyfiles,renderingthevote-tallying
systeminoperable.Thenextday,thehackers
declaredtheyhaddestroyedthecomputer
networkinfrastructurefortheelection,
| How much do
Dan Geer
spillinge-mailsandotherdocumentsontothe
webasproof.
Jason Healey
Adaylater,governmentofficialssaidthe
systemhadbeenrepaired,restoredfrom
backups,andwasreadytogo.Butitwasjust
thebeginning.
IN PICTURES
Sascha Meinrath
| Ukraine: 10 years in 30
images
Only40minutesbeforeelectionresultswereto
Lysa Myers
goliveontelevisionat8p.m.,Sunday,May25,
ateamofgovernmentcyberexpertsremoveda
Bruce Schneier
viruscovertlyinstalledonCentralElection
Commissioncomputers,Ukrainiansecurity
VIDEO
officialssaidlater.
Evan Selinger
Columnist | Evan is a philosophy
professor at Rochester Institute of
Technology.
Ifithadnotbeendiscoveredandremoved,themalicioussoftwarewould
haveportrayedultra-nationalistRightSectorpartyleaderDmytroYarosh
Melanie Teplinsky
asthewinnerwith37percentofthevote(insteadofthe1percenthe
Nicole Wong
Columnist | Nicole served as deputy chief
technology ocer at the White House.
actuallyreceived)andPetroPoroshenko(theactuallywinnerwitha
majorityofthevote)withjust29percent,Ukraineofficialstoldreporters
thenextmorning.
Curiously,RussianChannelOneairedabulletinthateveningdeclaringMr.
Yaroshthevictorwith37percentofthevoteoverMr.Poroshenkowith29
percent,Ukraineofficialssaid.
Offendersweretryingbymeansofpreviouslyinstalledsoftwaretofake
electionresultsinthegivenregionandinsuchawaytodiscreditgeneral
resultsofelectionsofthePresidentofUkraine,theUkrainianSecurity
Service(SBU)saidinastatement.
SUBSCRIBE
Still,therewasmoretocome.
Intheweehoursofthemorningafterpollsclosed,asresultsflowedinfrom
Ukrainianelectiondistricts,Internetlinksfeedingthatdatatothevotetally
systemwerehitwithabarrageoffakedatapacketsknownasdistributed
denialofservice(DDoS)attacks.Sofromabout1to3a.m.onMay26,
electionresultswereblocked,delayingthefinallytallyuntiltheearly
http://www.csmonitor.com/World/Passcode/2014/0617/Ukraine-election-narrowly-avoided-wanton-destruction-from-hackers-video
2/6
11/24/2016
Ukraineelectionnarrowlyavoided'wantondestruction'fromhackers(+video)-CSMonitor.com
electionresultswereblocked,delayingthefinallytallyuntiltheearly
morning,apreliminaryreportbyinternationalelectionobservers
recounted.
AnanalysisoftheDDoSattackbyArborNetworks,aBurlington,Mass.,
cyber-securitycompany,tiesittoCyberBerkut.
Intheend,internationalobserversdeclaredUkrainesvoteagenuine
election.ButUSresearcherssayitsclearthatUkrainedodgedamajor
cyber-bullet.
WeveseenvotefraudbeforeinUkraine,includingariggedcomputer
systemin2004,saysPeterOrdeshook,aCaliforniaInstituteofTechnology
politicalscientist.Butthiswasntanefforttostealtheelectionoutcome,so
muchastostealtheelectionitselfbyentirelydiscreditingitintheeyesof
keysegmentsofthepopulationinUkraineandinRussia,too.
WhileitwaswellunderstoodacrossmostofUkraineandinternationally
thatthefar-rightcandidateYaroshhadlittlepoliticalsupport,thefaked
resultswouldhavelentcredibilitytoRussian-inspiredaccountsthatthe
popularrevoltlastfallagainsttheUkrainegovernmentwasfomentedby
ultra-nationalists.
Inthatlight,thecyberfakerylooksincrediblyclumsyfromtheoutside
becausenoonetherewouldhavebelievedit,Dr.Ordeshooksays.But
thesefakedresultsweregearedforaspecificaudienceinordertofeedthe
Russiannarrativethathasclaimedfromthestartthatultra-nationalistsand
NaziswerebehindtherevolutioninUkraine.
Iftheviruswiththefakedcomputerresultshadnotbeendiscovered,it
wouldhavefomentedunrestacrossthevolatileethnic-RussianDonetsk
regionnowundertheshadowofRussianforcesontheborderwithUkraine,
hesays.Suchspuriousresultsalsowouldhaveunderminedthecredibility
ofthenewUkrainegovernmentandcouldhavepavedthewayforRussian
militaryaction,saypoliticalscientistswhomonitorUkraineelections.
TheUkrainehackisastarkwarningfortheUSandotherdemocraciesthat
usetheInternetfortabulationandevendirectvoting,electionsecurity
expertssay.Oneclearlesson,theysay,istoalwayshavepaperballotsto
backupelectionresultslikeUkraineandtoavoidInternetvoting.
TheUkraineattackstorydemonstratesthereisnoshortageofmethods
whichadeterminedadversarywillmakeuseoftosabotageanelection,
saysPamelaSmith,presidentoftheVerifiedVotingFoundation,aUSgroup
thathasresearchedUSelectionsystemssecurity.
Intherunuptotheelection,PresidentObamaonMay2warnedRussianot
tointerfereortheUSwillnothaveachoicebuttomoveforwardwith
additional,moreseveresanctions.
Sincethen,USofficialsappearreluctanttomaketoomuchoftheattacks.
Referencestothecyber-attackshavebeenbriefandoblique.With
anonymitycloakingcyber-attacksacrosstheInternet,itsdifficulttotell
http://www.csmonitor.com/World/Passcode/2014/0617/Ukraine-election-narrowly-avoided-wanton-destruction-from-hackers-video
3/6
11/24/2016
Ukraineelectionnarrowlyavoided'wantondestruction'fromhackers(+video)-CSMonitor.com
anonymitycloakingcyber-attacksacrosstheInternet,itsdifficulttotell
howdeeplyinvolvedRussiasgovernmentmighthavebeen.
Ukraineexperiencedcyber-attacksontheCentralElectionCommissionof
thekindthatgenerallywouldrequireoutsidesupport,VictoriaNuland,
assistantsecretaryofStateforEuropeanaffairs,acknowledgedinaMay27
interviewontheCharlieRoseshow.MarkGreen,aformercongressman,
saidinSenatetestimonyJune6thathehadbeentoldbyaUSdiplomatofa
failedRussiancyber-attackontheelection.
UkrainianofficialshavebeenunabashedinthrowingblameatRussia,
sayingthatarrestsweremadeinthecase,althoughnonameshaveyetbeen
madepublic.
"ItwaspreparedinadvanceandstoredonRussian(Internet)re-sources,"
VolodymyrZverev,headoftheUkrainesAdministrationofPublicService
ofSpecialCommunicationandProtectionofInformationsaidofthe
malwarethatwasintendedtodeliverthefakeelectionresults,accordingto
Interfax-Ukraine."Theywantedto,andmadethepreparations,buttheydid
notsucceed."
WhileRussianhacktivistsappeartobelinkedtoatleastsomeofthe
attacks,noteveryoneagreestheRussiangovernmenthadahandinthe
mostdeviouselement.InternetsecurityexpertMr.Kiniry,forinstance,
saysthereisnosolidproofyettobacktheUkrainiangovernmentclaimofa
viruscarryingfakeelectionresults.
OtherssayRussiaspawprintsareallovertheattack.
DidRussiaattempttoswaytheUkrainianPresidentialElection?Ihonestly
dontknowtheanswertothat,saysJefferyStutzman,CEOofRedSky
Alliance,acyber-securitygroupinNewHampshire.
But,headds,theideathattheseguysweretryingtopoisontheelection
resultbycompromisingtheelectioncommissioncomputersisamazingto
meandthiscoincidencewiththeRussianchannelshowingthesamefake
resultsisjusttoomuch.Ifitwalkslikeaduckandquackslikeone,maybe
itsaduck.
Next up
PASSCODE
Major cyber-assaults on
Ukraine, then Moscow, on
eve of Crimea vote (+video)
http://www.csmonitor.com/World/Passcode/2014/0617/Ukraine-election-narrowly-avoided-wanton-destruction-from-hackers-video
4/6
11/24/2016
Ukraineelectionnarrowlyavoided'wantondestruction'fromhackers(+video)-CSMonitor.com
US indicts ve in China's
secret 'Unit 61398' for cyberspying on US rms (+video)
HowtheGreatBubbleBur stof2017CanMakeYou
Global Galleries
Latest News
Doing Good
http://www.csmonitor.com/World/Passcode/2014/0617/Ukraine-election-narrowly-avoided-wanton-destruction-from-hackers-video
Movies
5/6
11/24/2016
Ukraineelectionnarrowlyavoided'wantondestruction'fromhackers(+video)-CSMonitor.com
Hes championed
cleanup of the Chesapeake Bay for four
decades
DIFFERENCE MAKER
ABOUT
CONTACT US
CONTENT MAP
TEXT
SUBSCRIBE
CORRECTIONS
E-READERS
ADVERTISE WITH US
MULTIMEDIA
CAREERS
|
FIND US ONLINE
The Christian Science Monitor. All Rights Reserved. Terms under which this service is provided to you. Privacy Policy.
http://www.csmonitor.com/World/Passcode/2014/0617/Ukraine-election-narrowly-avoided-wanton-destruction-from-hackers-video
6/6