President-Elect Donald Trump may want to ask his 10-year-old son about how hacking really works.
The Dear Utol (2025): Doctor, Doctor I'm Sick Episode 41CIA is now pretty sure that the Russians hacked the Presidential election, not by attacking voting booths and polling places, but through the Democratic National Committee email hack that promoted the slow, steady release of embarrassing emails, which may have swayed public sentiment, if not the vote.
But Donald Trump isn't having any of it.
He doesn't believe the CIA, wonders why the news is just coming out now and, finally, has a theory about how you catch hackers: "In the act."
This Tweet is currently unavailable. It might be loading or has been removed.
On one level, Trump's actually right. It's hard to pin down a hacker's identity. It also might help Trump answer his own question: "Why wasn't this brought up before the election?" Clearly, the CIA was looking at the DNC hack as early as June of this year, when the first reports of Russian hackers infiltrating the DNC surfaced. It'd appear that it took all these months for the CIA to reach its conclusion.
It's a conclusion Trump clearly doesn't buy, and off the back of it, may serve as evidence (to him) that the CIA's somehow seeking to undermine his incoming administration by questioning the legitimacy of his presidency (funny, considering Trump long claimed that President Barack Obama wasn't actually an American citizen, before backpedaling that entire series of events during his presidential campaign).
That said? Trump's claim that the surest way to catch a hacker is "in the act" is just plain wrong.
Of course, it'd be awesome if authorities could—like tracing a call in a Hollywood blockbuster ("Keep him talking ... almost got it, almost got it!")—burst in on a hacker, just as he's downloading a destructive payload onto the DNC (and maybe RNC) servers.
But that's just not how hacking works in the 21st century.
Hackers don't have to be connected to your servers to hack them. Usually, all they need is one weak link in the cyber chain: an average person on email, who opened a fake email from "their bank" or "their favorite social network." Then, they followed the link. Since the email wasn't really from their bank or social network and, instead, a Russian hacker, the opened email dropped a payload on the network, which found its way to the servers.
Once inside, the payload opens a backdoor where a Russian hacker waltzes in, pours over the servers for useful data, and then, downloads whatever they can. All of this can happen in minutes. Once they have what they need—such as all of former Hillary Clinton Campaign Chair John Podesta's emails—they pull up their stakes, and try to leave as little evidence as possible.
In the case of the Russian hack, they did leave some bots in place to watch further email and chat traffic, which may be one of the reasons the DNC noticed the hack was happening.
With the help of cybersecurity firm CrowdStrike, the DNC cleaned up its servers. In a July report amusingly entitled Bears in the Midst,the firm identified "Russian intelligence-affiliated adversaries" on the DNC network.
The two "adversaries" were actually a pair of hacking bots known as CozyBear and FancyBear. From the report:
Both adversaries engage in extensive political and economic espionage for the benefit of the government of the Russian Federation and are believed to be closely linked to the Russian government’s powerful and highly capable intelligence services.
Firms like CrowdStrike identify these bits of malware based on digital signatures. The signatures are what pointed them to the Russian government with a high-level of confidence. In an interview with Bloomberg News, CrowdStrike CEO George Kurtz said "We talk about having high confidence, but there's no absolute in cyber security. That's what makes it so hard."
Signatures are one thing, but tracing a hack back to its source is even trickier, because the hackers are usually gone by the time the hack's been discovered. But sometimes, investigators get lucky. Because CrowdStrike found malware active on the DNC servers, they may have been able to collect IP addresses, which they likely shared with authorities (including the CIA).
If the addresses weren't spoofed or piped through the Dark Web, it might have been traceable, or at least, may have pointed to a large geographic origin point.
It's not catching someone in the act, but an IP address can, like a paw print in the mud, tell you something about what made the track, and where it came from. That track often ends after one server hop or another, but considering the certainty of the CIA's report to lawmakers, this one may have led much closer to its originator than a typical case.
Steven Morgan, cyber security expert and CEO of Cybersecurity Ventures, agrees that yes, you can track some hackers via IP addresses, but added that the more sophisticated hackers will try to leave behind spoofed IPs built to misdirect investigators. Fortunately, "our intelligence agencies are also very sophisticated and aware of fake footprints. So, if they see something indicating an IP address belonging to a particular (hostile) nation—they'll be especially careful before calling it out," Morgan wrote to me in an email.
So maybe the CIA did get close enough to smell the bear's hot breath.
This is how hacking and cyber sleuthing works. The room where the hacker sat is empty. There is no catching a hacker in the act—just a trace that's followed as keenly and as doggedly as election returns. There's no rushing the truth or the facts, just acceptance.
It's something President-Elect Trump's 10-year-old son probably could have told him.
He is, after all, so good with computers, "it's unbelievable."
Topics Cybersecurity Donald Trump
Barack surprised Michelle at her final White House HarvestBarack surprised Michelle at her final White House HarvestWhy more politicians should livestream their own State of the Union responseCNN contributor blasts colleague for asking her not to quote Trump's remarksSorry, Taika Waititi won't be directing 'Guardians of the Galaxy Vol. 3'Sorry, Taika Waititi won't be directing 'Guardians of the Galaxy Vol. 3'British autonomous vehicles won't require someone in the carABC's 'Single Parents' fills the 'New Girl' void on TVHow ‘Schitt’s Creek’ evolved into a great TV comedyDrudge and Trump’s disregard for facts has endangered lives amid Hurricane MatthewYou can now unsend your Facebook messages if you're quick enoughEnergizer to launch 26 new phones this month. Yes, you read that rightHimalayan glaciers are rapidly vanishing due to climate change, tooWatch an IRL Dug from 'Up' surprise humans in the parkDonald Trump caught on tape: 'I did try and f*ck her, she was married'FBI conducted sting operation on Huawei at CES: reportTesla Model 3 now costs $35,000 with incentives and gas savingsDrudge and Trump’s disregard for facts has endangered lives amid Hurricane MatthewWhy more politicians should livestream their own State of the Union responseTesla plans to buy Maxwell Technologies for $218 million Researchers bid farewell to 'Granny,' the world's oldest known orca Hello, World! Part One: Eliza by Sheila Heti Hello, World! Part Two: Eliza?!!?!?! by Sheila Heti Why are people watching therapy and therapist porn? Is 'Saltburn' streaming? Here's how to watch the film for free. Cooking with Intizar Husain by Valerie Stivers Why Tights and No Knickers? by Sophie Haigney 26 lawmakers defend Energy Department scientists against Trump Michelle de Kretser and David Orr Recommend; Our Editors Remember Hilary Mantel by The Paris Review Google Pixel 9 leak reveals 3 big design tweaks. It looks more iPhone Notes from Iran by Nilo Tabrizy What the Paris Review Staff Read in 2022 by The Paris Review Taylor Swift deepfakes have gone viral. How does this keep happening? I Remember All Too Well: Taylor Swift and Joe Brainard by JoAnna Novak Honor launches its super iOS 17.4 beta adds 118 new emoji. The phoenix one is fire. How 'Snakes on a Plane' shaped Medusa in 'Percy Jackson and the Olympians' Vivian Gornick Will Receive Our 2023 Hadada Award by The Paris Review How to watch KU vs. ISU basketball without cable: Game time, streaming deals, and more A guide to Trump's alarming cabinet full of climate deniers
2.3502s , 10133.78125 kb
Copyright © 2025 Powered by 【Dear Utol (2025): Doctor, Doctor I'm Sick Episode 41】,Miracle Information Network