米兰体育

Skip to content
NOWCAST Weekday Morning Newscast
Live Now
Advertisement

EXCLUSIVE: 鈥極peration Blackout鈥� tests law enforcement response to simulated election cyberattack

DHS: 鈥業t was very realistic鈥�

EXCLUSIVE: 鈥極peration Blackout鈥� tests law enforcement response to simulated election cyberattack

DHS: 鈥業t was very realistic鈥�

Advertisement
EXCLUSIVE: 鈥極peration Blackout鈥� tests law enforcement response to simulated election cyberattack

DHS: 鈥業t was very realistic鈥�

The tense updates come at rapid-fire pace."911 call center is down, hacked and offline.鈥� 鈥� all over the city."It's an Election Day meltdown as fictitious hackers attack a nameless, large city in an American swing state.The goal: affect the electoral result without ever touching a voting machine."We have to increase fear,鈥� declared one of the hackers. "Our ultimate goal is to get people to stay home,鈥� said another as the simulated cyber offensive began.And in the first 30 minutes or so, the plan worked."Attendance extremely low at polls,鈥� came one readout."Tempers seem to be flaring amongst voters,鈥� said another.But instead of an apocalyptic Election Day reality, this was "Operation Blackout" 鈥� a cyber drill conducted earlier this month inside the famous John Hancock Tower in Boston.While it may have utilized mock threats, the risks are very real, participants said.Journalists and camera crews from the Hearst Television National Investigative Unit were the only members of the media allowed to watch as the Black Team -- a team of agents and officers from the U.S. Department of Homeland Security, U.S. Secret Service, several state police agencies and local law enforcement -- squared off against the Red Team, comprised of experts from Harvard University, Boston University, Nichols College and the private firm Cybereason, which pretended to be hackers targeting Election Day.Hackers attack mock Election DayThe Red Team launches the first moves."All lights are green,鈥� one announces, indicating a hack of the traffic light system to create gridlock on the roads, slowing people down on their way to voting booths.A concurrent attack envisions targeting the city鈥檚 closed-circuit camera network to doctor images from the city cameras: 鈥淒eep fakes,鈥� one hacker proposes.And a malicious penetration of the city鈥檚 Emergency Alert System allows unfettered access to send false bulletins from official channels. "An active shooter in districts 8 and 5,鈥� says one hacker. Another warns of 鈥渁 flood alert on the subway.鈥滲ut the law enforcement-stacked Black Team quickly counters. "Are we calling in the National Guard?鈥� asks one member as the traffic gridlock quickly builds.An agent at a federal agency worries, "If we're not in communication with the campaigns, they could be disseminating misinformation unwittingly."Their moves are not without setbacks. "We just lost 60 more officers,鈥� one participant bemoans, as those officers are diverted for other public safety needs.At another point, a participant summarizes a social media defeat: "So they compromised the mayor's Facebook page, they have compromised his Twitter account."Within a half hour, though, a concerted effort 鈥� built upon lessons learned in previous simulations 鈥� results in a string of victories for the Black Team."911 is back online,鈥� a relieved participant declares.鈥楨normous progress鈥� for law enforcementSam Curry, the chief security officer at Cybereason, is in charge of the drill, and monitors and moderates the moves of each team. At the conclusion of the 90-minute simulation, he declares a win for Black Team, which successfully outmaneuvered the hackers and preserved the mock election."In the past, I've rarely seen the Black Team emerge well,鈥� Curry said candidly in an interview after the event. When asked if that meant law enforcement鈥檚 victory over the Red Team on this day surprised him, Curry responded, 鈥淚t did.鈥濃淟aw enforcement has made enormous progress. We've done similar exercises in the past and we've seen they're often caught flat-footed. 鈥� They didn't have an integrated cyber function before. This time, the folks knew what assets they had on the ground, they knew how to use them, and knew how to develop them and do so fast,鈥� Curry said.鈥淭hey knew what was likely to come and they were ready for it. They absolutely got voters to the polls and got an election result that nobody can contest long term.By the end of the day, they had clearly won,鈥� said Curry.An intelligence officer from the U.S. Department of Homeland Security who participated on the Black Team and whose supervisors requested his name not be used in this story called the exercise 鈥渧ery realistic.鈥濃淭he emphasis on countering influence operations, that's our bread and butter these days. 鈥� Collectively, everybody's paying more attention to this now,鈥� the Boston-based D.H.S. officer said during a post-event 鈥渉ot-wash鈥� briefing with his colleagues. Lessons from 9/11Allison McDowell-Smith, director of the Graduate Counterterrorism Program at Nichols College near Boston, said in an interview that she kept in mind a key lesson from the 9/11 Commission report: a government "failure of imagination."She said they are trying to prevent that from occurring again.鈥淪tart brainstorming ideas of what could happen.鈥滾ast week, the Senate Intelligence Committee released its long awaited report into Russian interference in the 2016 election. The bipartisan report recommended all voting machines be replaced with ones that leave a paper trail and consider giving states more money for election security 鈥� both steps blocked so far by Republican Majority Leader Sen. Mitch McConnell (R-Ky.). Know of election security vulnerabilities? Send investigative tips to the National Investigative Unit at [email protected].

The tense updates come at rapid-fire pace.

"911 call center is down, hacked and offline.鈥�
鈥淸Expletive] all over the city."

Advertisement

It's an Election Day meltdown as fictitious hackers attack a nameless, large city in an American swing state.

The goal: affect the electoral result without ever touching a voting machine.

"We have to increase fear,鈥� declared one of the hackers. "Our ultimate goal is to get people to stay home,鈥� said another as the simulated cyber offensive began.

And in the first 30 minutes or so, the plan worked.

"Attendance extremely low at polls,鈥� came one readout.

"Tempers seem to be flaring amongst voters,鈥� said another.

But instead of an apocalyptic Election Day reality, this was "Operation Blackout" 鈥� a cyber drill conducted earlier this month inside the famous John Hancock Tower in Boston.

While it may have utilized mock threats, the risks are very real, participants said.

Participants in ‘Operation Blackout’ gather for a post-cyber drill briefing at Cybereason in Boston on July 10, 2019
Hearst Television
Participants in 鈥極peration Blackout鈥� gather for a post-cyber drill briefing at Cybereason in Boston on July 10, 2019

Journalists and camera crews from the Hearst Television National Investigative Unit were the only members of the media allowed to watch as the Black Team -- a team of agents and officers from the U.S. Department of Homeland Security, U.S. Secret Service, several state police agencies and local law enforcement -- squared off against the Red Team, comprised of experts from Harvard University, Boston University, Nichols College and the private firm , which pretended to be hackers targeting Election Day.

Hackers attack mock Election Day

The Red Team launches the first moves.

"All lights are green,鈥� one announces, indicating a hack of the traffic light system to create gridlock on the roads, slowing people down on their way to voting booths.

A concurrent attack envisions targeting the city鈥檚 closed-circuit camera network to doctor images from the city cameras: 鈥淒eep fakes,鈥� one hacker proposes.

And a malicious penetration of the city鈥檚 Emergency Alert System allows unfettered access to send false bulletins from official channels. "An active shooter in districts 8 and 5,鈥� says one hacker. Another warns of 鈥渁 flood alert on the subway.鈥�

But the law enforcement-stacked Black Team quickly counters. "Are we calling in the National Guard?鈥� asks one member as the traffic gridlock quickly builds.

A mock voting booth sits outside the Black Team’s room as it counters moves from the Red Team of hackers during a simulated Election Day cyber attack held at Cybereason in Boston on July 10, 2019
Hearst Television
A mock voting booth sits outside the Black Team鈥檚 room as it counters moves from the Red Team of hackers during a simulated Election Day cyber attack held at Cybereason in Boston on July 10, 2019

An agent at a federal agency worries, "If we're not in communication with the campaigns, they could be disseminating misinformation unwittingly."

Their moves are not without setbacks.

"We just lost 60 more officers,鈥� one participant bemoans, as those officers are diverted for other public safety needs.

At another point, a participant summarizes a social media defeat: "So they compromised the mayor's Facebook page, they have compromised his Twitter account."

Within a half hour, though, a concerted effort 鈥� built upon lessons learned in previous simulations 鈥� results in a string of victories for the Black Team.

"911 is back online,鈥� a relieved participant declares.

鈥楨normous progress鈥� for law enforcement

Sam Curry, the chief security officer at Cybereason, is in charge of the drill, and monitors and moderates the moves of each team.

At the conclusion of the 90-minute simulation, he declares a win for Black Team, which successfully outmaneuvered the hackers and preserved the mock election.

"In the past, I've rarely seen the Black Team emerge well,鈥� Curry said candidly in an interview after the event.

When asked if that meant law enforcement鈥檚 victory over the Red Team on this day surprised him, Curry responded, 鈥淚t did.鈥�

A map of the fictitious American city used during ‘Operation Blackout,’ a simulated cyber attack on a mock Election Day.
Hearst Television
A map of the fictitious American city used during 鈥極peration Blackout,鈥� a simulated cyber attack on a mock Election Day.

鈥淟aw enforcement has made enormous progress. We've done similar exercises in the past and we've seen they're often caught flat-footed. 鈥� They didn't have an integrated cyber function before. This time, the folks knew what assets they had on the ground, they knew how to use them, and [they] knew how to develop them and do so fast,鈥� Curry said.

鈥淭hey knew what was likely to come and they were ready for it. They absolutely got voters to the polls and got an election result that nobody can contest long term.

By the end of the day, they had clearly won,鈥� said Curry.

An intelligence officer from the U.S. Department of Homeland Security who participated on the Black Team and whose supervisors requested his name not be used in this story called the exercise 鈥渧ery realistic.鈥�

鈥淭he emphasis on countering influence operations, that's our bread and butter these days. 鈥� Collectively, everybody's paying more attention to this now,鈥� the Boston-based D.H.S. officer said during a post-event 鈥渉ot-wash鈥� briefing with his colleagues.

Lessons from 9/11

, director of the Graduate Counterterrorism Program at Nichols College near Boston, said in an interview that she kept in mind a key lesson from the 9/11 Commission report: a government "failure of imagination."

She said they are trying to prevent that from occurring again.

鈥淪tart brainstorming ideas of what could happen.鈥�

Last week, the Senate Intelligence Committee released its into Russian interference in the 2016 election.

The bipartisan report recommended all voting machines be replaced with ones that leave a paper trail and consider giving states more money for election security 鈥� both steps blocked so far by Republican Majority Leader Sen. Mitch McConnell (R-Ky.).

Know of election security vulnerabilities? Send investigative tips to the National Investigative Unit at [email protected].