Voter Data Being Used To Disrupt US Election

US intelligence agencies are accusing Iran and Russia of trying to use voter registration data in “desperate attempts” to sow chaos and confusion ahead of the US presidential election. US the officials also warn that Iran is responsible for sending threatening emails to Democratic voters. The emails appeared to come from a far-right pro-Trump group and were meant to "incite unrest". 

National Intelligence Director John Ratcliffe appeared alongside FBI Director Chris Wray at a hastily arranged news conference this week where he said that both  Iran and Russia have stolen data about the election in the hope of influencing the outcome. He also said Iran had sent “spoofed emails designed to intimidate” voters. 

Some Florida voters were recently sent email messages purporting to be from the 'Proud Boys' right-wing extremist group urging the recipients to vote for Donald Trump. Ratcliffe said that the voter contact data could be used in attempts to "communicate false information to registered voters that they hope will sow confusion chaos and undermine your confidence in American democracy".

The announcement comes just two weeks before the election and shows the level of alarm among US intelligence officials that foreign actors were seeking to undermine Americans’ confidence in the integrity of the vote and spread misinformation in an attempt to sway its outcome.

In many states, voter data is available upon request, though each state has different requirements on who can request voter information, what data is available and how this data might be used, according to the National Conference of State Legislatures.“We have confirmed that some voter registration information has been obtained by Iran, and separately, by Russia,” Ratcliffe said during the news conference. 

Democrats and a group of former intelligence officials have accused Ratcliffe, a former Republican congressman tapped to lead the intelligence community this year, of selectively declassifying intelligence in the run-up to the election to help Trump's campaign and Democrats on the Homeland Security Committee criticised him after the news conference. 

US Intelligence have also said that China and Iran favor Democratic candidate Joe Biden, whereas Russia favors President Donald Trump and last month the FBI stated that false claims of hacked voter information were likely intended to undermine the credibility of elections. 

US intelligence say that the federal government has in many areas improved its methods of election threats detection. 
David Imbordino, the NSA’s elections security lead, told reportersthat the “adversary landscape” is bigger this year than previously. 

Reuters:     BBC:     CNN:    VOA:      Telegraph:      DefenseOne

You Might Also Read:

Social Media Campaigns Designed To Disrupt US Election:

 
« Russian Spies Attacked Olympic Games With Malware
Phishers Target Microsoft & Google Public Cloud Users »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Claroty

Claroty

Claroty was conceived to secure and optimize OT networks that run the world’s most critical infrastructures.

Kudelski Security

Kudelski Security

Kudelski Security is an international cybersecurity company providing innovative, independent and tailored security solutions for large enterprise and public sector clients.

Apricorn

Apricorn

Apricorn provides hardware-based 256-bit encrypted external storage products to companies and organizations that require high-level protection for their data at rest.

RCMP National Cybercrime Coordination Unit (NC3)

RCMP National Cybercrime Coordination Unit (NC3)

As set out in the Government of Canada's National Cyber Security Strategy, the RCMP has established the National Cybercrime Coordination Unit (NC3).

Asia Data Destruction (ADD)

Asia Data Destruction (ADD)

ADD is the leading IT Assets Disposal and Data Destruction Company in Thailand.

MythX

MythX

MythX is the premier security analysis service for Ethereum smart contracts.

Sequretek

Sequretek

Sequretek was formed with the aim to “Simplify Security”. We envision a future where enterprise networks are streamlined, secure and simple.

Australian Cyber Collaboration Centre (Aus3C)

Australian Cyber Collaboration Centre (Aus3C)

The Australian Cyber Collaboration Centre (Aus3C) is committed to building cyber capacity and securing Australia's digital landscape.

Cybriant

Cybriant

Cybriant Strategic Security Services provide a framework for architecting, constructing, and maintaining a secure business with policy and performance alignment.

Pyxsoft PowerWAF

Pyxsoft PowerWAF

Pyxsoft PowerWAF responds to the problem of business cybersecurity. We protect our clients' websites and data against attacks and exploitation of all kinds of vulnerabilities.

DataExpert Singapore

DataExpert Singapore

DataExpert Singapore provide solutions and services in the areas of Digital Forensics, Data Recovery, Data Duplication, Data Degaussing & Wiping, Data Destruction, and IT Disposal.

IDX

IDX

IDX is the leading consumer privacy platform built for agility in the digital age.

Suridata

Suridata

Suridata’s SaaS Security platform enables organizations to secure the use of SaaS applications.

Infosys

Infosys

Infosys is a global leader in consulting, technology and outsourcing solutions.. Services include IT strategy, technical architecture and operations including cybersecurity.

Cygna Labs

Cygna Labs

Cygna Labs is a software developer and one of the top three global DDI (DNS, DHCP, and IP address management) vendors.

Huntr

Huntr

Huntr provides a single place for security researchers to submit vulnerabilities, to ensure the security and stability of AI/ML applications.