More stories

  • in

    After CrowdStrike Causes Outage, Are U.S. Networks Safe?

    With each cascade of digital disaster, new vulnerabilities emerge. The latest chaos wasn’t caused by an adversary, but it provided a road map of American vulnerabilities at a critical moment.In the worst-case scenarios that the Biden administration has quietly simulated over the past year or so, Russian hackers working on behalf of Vladimir V. Putin bring down hospital systems across the United States. In others, China’s military hackers trigger chaos, shutting down water systems and electric grids to distract Americans from an invasion of Taiwan.As it turned out, none of those grim situations caused Friday’s national digital meltdown. It was, by all appearances, purely human error — a few bad keystrokes that demonstrated the fragility of a vast set of interconnected networks in which one mistake can cause a cascade of unintended consequences. Since no one really understands what is connected to what, it is no surprise that such episodes keep happening, each incident just a few degrees different from the last.Among Washington’s cyberwarriors, the first reaction on Friday morning was relief that this wasn’t a nation-state attack. For two years now, the White House, the Pentagon and the nation’s cyberdefenders have been trying to come to terms with “Volt Typhoon,” a particularly elusive form of malware that China has put into American critical infrastructure. It is hard to find, even harder to evict from vital computer networks and designed to sow far greater fear and chaos than the country saw on Friday.Yet as the “blue screen of death” popped up from the operating rooms of Massachusetts General Hospital to the airline management systems that keep planes flying, America got another reminder of the halting progress of “cyber resilience.” It was a particularly bitter discovery then that a flawed update to a trusted tool in that effort — CrowdStrike’s software to find and neutralize cyberattacks — was the cause of the problem, not the savior.Only in recent years has the United States gotten serious about the problem. Government partnerships with private industry were put together to share lessons. The F.B.I. and the National Security Agency, along with the Cybersecurity and Infrastructure Security Agency at the Homeland Security Department, issue bulletins outlining vulnerabilities or blowing the whistle on hackers.President Biden even created a Cyber Safety Review Board that looks at major incidents. It is modeled on the National Transportation Safety Board, which reviews airplane and train accidents, among other disasters, and publishes “lessons learned.”We are having trouble retrieving the article content.Please enable JavaScript in your browser settings.Thank you for your patience while we verify access. If you are in Reader mode please exit and log into your Times account, or subscribe for all of The Times.Thank you for your patience while we verify access.Already a subscriber? Log in.Want all of The Times? Subscribe. More

  • in

    What is FISA, and What Does It Mean for U.S. Surveillance and Spying?

    Under Section 702, the government is empowered to collect, without a warrant, the messages of Americans communicating with targeted foreigners abroad.The House on Friday passed a two-year reauthorization of an expiring warrantless surveillance law known as Section 702, reversing course after the bill collapsed days earlier when former President Donald J. Trump urged his allies to “kill” it.But disappointing privacy advocates, the House narrowly rejected a longstanding proposal to require warrants to search for Americans’ messages swept up by the program.Here is a closer look.What is Section 702?It is a law that allows the government to collect — on domestic soil and without a warrant — the communications of targeted foreigners abroad, including when those people are interacting with Americans.Under that law, the National Security Agency can order email services like Google to turn over copies of all messages in the accounts of any foreign user and network operators like AT&T to intercept and furnish copies of any phone calls, texts and internet communications to or from a foreign target.Section 702 collection plays a major role in the gathering of foreign intelligence and counterterrorism information, according to national security officials.Why was Section 702 established?After the attacks of Sept. 11, 2001, President George W. Bush secretly ordered a warrantless wiretapping program code-named Stellarwind. It violated the Foreign Intelligence Surveillance Act of 1978, or FISA, which generally required a judge’s permission for national security surveillance activities on domestic soil.We are having trouble retrieving the article content.Please enable JavaScript in your browser settings.Thank you for your patience while we verify access. If you are in Reader mode please exit and log into your Times account, or subscribe for all of The Times.Thank you for your patience while we verify access.Already a subscriber? Log in.Want all of The Times? Subscribe. More

  • in

    Reality Winner Tried to Resist and Found Herself Alone

    It was a big deal that Reality Winner’s probation officer let her travel from Texas to her sister’s house in North Carolina over Thanksgiving. She is, after all, a traitor, in the eyes of the law.Ms. Winner was arrested in 2017 for leaking to journalists a classified intelligence report on Russian hacks into U.S. election infrastructure and has been confined ever since — in a Georgia county jail, a federal prison, a halfway house and, most recently, in a probation so strict that she often feels strangled.Still, Ms. Winner viewed the trip with the wariness of an underdog conditioned to expect any small kindnesses to turn back against her.“It wasn’t my idea,” she said flatly by phone. “I preferred not to go.”Oh, and another thing, she said pointedly: She went during Thanksgiving but for her niece’s birthday.“I hate Thanksgiving,” she said. “I hate the food. I hate the vibe.”This side of Ms. Winner becomes familiar after a while: the cranky prison yard impulse to let everyone know just how much she doesn’t care and can’t be hurt. It poorly camouflages the battered idealist who, despite disillusionment and harsh punishment, appears bent on finding some way to make herself useful on a grand scale. She never had much money, education or connections, but in her own way, she has repeatedly tried to save the country — first as a military linguist guiding foreign drone attacks and later by warning the public that Donald Trump was lying to them about Russia.Both efforts went bad, though, which is why I think of Ms. Winner as a sorrowful casualty — not only of our poisoned political culture but also of a contemporary America replete with corruption and amoral bureaucracy. The harder she tried, it seems, the more her ideals soured into disgust.When I first spoke to Ms. Winner, in the summer of 2021, she was still fighting the drug habit she’d picked up behind bars and trying to tamp down the explosive aggression she’d used on the guards. On home confinement at her mother and stepfather’s ranch outside Corpus Christi, Texas, she held forth in meandering, disarmingly frank phone calls about the degradations of prison, the power of linguistics, a surreal childhood crossing back and forth into Mexico on pharmacy runs with her opioid-addicted father.All these months later, Ms. Winner is still on probation, but she’s grown more focused and stable. Most of her energies now are fixed on attracting clients to her CrossFit coaching practice. At 31, she is already a living relic of one of our nation’s most surreal political crises.She still isn’t allowed to talk about her military service or the contents of her leak, leaving me to puzzle over why a young woman who still guards the secrets of the terrorism wars would risk everything to expose a five-page National Security Agency file on efforts to hack voter registration systems.Ms. Winner mailed the report anonymously to The Intercept, where a reporter took the ill-advised step of giving a copy to the N.S.A. for verification. The authorities almost immediately zeroed in on her. She was charged under the Espionage Act, the same laws used to prosecute the Rosenbergs, Aldrich Ames and pretty much any other 20th-century spy you can name. The act has long been criticized for lumping together leaks motivated by public interest and, say, peddling nuclear secrets to a foreign government. Ms. Winner is considered a prime example of its downside.She pleaded guilty and was given 63 months in prison, the longest federal sentence ever for the unauthorized release of materials to the media. (The former C.I.A. director David Petraeus got off with probation and a fine for sharing eight notebooks full of highly classified information with his biographer, who was also his mistress.)Deemed a flight risk and denied bail, Ms. Winner languished for 16 months in a crammed Georgia county jail cell. While negotiating her plea deal with prosecutors, she said, she plotted suicide and fantasized about federal prison “like I was going away to an elite university — ‘Oh, look, they have a rec center, they have a track, they have a commissary, they sell makeup.’”All of that for nothing or, at least, for very little. Ms. Winner’s intervention hardly registered. She wanted to prove that the White House was lying: U.S. officials knew that Russia had attacked U.S. voting infrastructure just days before the 2016 election. But the revelation hardly scratched public awareness.“Reality Winner is a whistleblower because?” said Ben Wizner, the director of the American Civil Liberties Union’s Speech, Privacy and Technology Project. “How many people would give the same answer to that?”“You can’t imagine a more unlikely person to serve the longest-ever sentence under the Espionage Act” for leaking to the media, he added. “It’s perverse.”The hardest part, Ms. Winner said once, is not the punishment but “just knowing that you really didn’t change anything. Nobody cares.”“The people on the left who pretend to champion you. They really didn’t do anything for you,” she said. “The people in the center won’t say your name. And the people on the right still think you’re a terrorist.”Shane Lavalette for The New York TimesWhy did she do it? Ms. Winner bristled at this question. “Come on, you were there, too. You remember how it was. It was such a weird time,” she said.She’s right. I remember.It was Mr. Trump’s first year in the White House, and America was having a nervous breakdown all over the internet — MAGA fanatics in rapturous dreams of banning Muslims and building shark-infested moats along the border and, from others, fevered warnings of impending fascist takeover and Vladimir Putin as Mr. Trump’s puppet master. The thick suspicion that we were drifting toward something intolerable. The hyperbole of it all.Commentators suggested that the president could be a Russian asset; retired government servants openly urged their successors to insubordination; Mr. Trump described a “deep state” within the government working to undermine him. What does it mean, in such times, to be a traitor?Ms. Winner left the Air Force and started a desk job with an N.S.A. contractor in Augusta, Ga. She’d found her house online for just $500 a month and rented it sight unseen because it was close to her gym. The neighborhood proved rough; her dog cowered at gunfire outside. But she didn’t mind. She had her dog and a few guns, including a Glock and a pink AR-15. ( “Georgia has castle laws, so as long as you don’t shoot ’em in the back, you get off. So, duh.”)She practiced yoga and CrossFit and spent her days off wandering downtown, daydreaming about buying a derelict Woolworths and turning it into an ashram where people down on their luck could get a free meal. She had a Sunday morning ritual: chop vegetables to prepare her dinners for the week while talking on the phone with her mother.“It was getting more and more political because, like, we can’t help it,” Ms. Winner recalled.Mr. Trump was a constant theme. According to Ms. Winner’s mother, Billie Winner-Davis, her daughter was convinced that he would destroy the country. Ms. Winner told her mother she was glad she’d left the Air Force, because there was no way she could serve under him. When the United States bombed an air base in Syria, Ms. Winner told her mother it was “smoke and mirrors,” Ms. Winner-Davis recalled — Russia was given warning to evacuate the base, her daughter said.Ms. Winner watched Mr. Trump on TV scoffing at suggestions of Russian interference. “He’s lying,” she thought; she’d seen the proof. She recalled that the whole enterprise of government and war had started to seem rotten; she’d thought that she could make a difference working quietly within national security and, eventually, gaining enough authority to make better decisions. Now it felt pointless.“If there’s this jackass in the White House, apparently none of this matters,” she said recently, trying to describe her mind-set when she printed the report and dropped it in the mail. “It was the repeated lies.”For years, Ms. Winner had dreamed of distinguishing herself in a moment of heroism. “I always wanted to be a badass like Carrie from ‘Homeland,’” she said. “Somebody who got something done in counterintelligence or counterterrorism and I think — I don’t know — just kind of being that stand-alone figure.”There was a lot of talk about insurgency that year. Twitter was full of grandstanding and “I am Spartacus” declamations. But Ms. Winner slammed into a hard realization: Despite all the grumbling and proclaiming, the resistance, if it existed, did not rush to defend her.Ms. Winner talks a lot about social media, about its capacity to warp political life and set traps for people — including herself. She is haunted by the experience of watching news stories about politicians’ tweets from inside prison, where she had zero access to social media.Twitter didn’t give the prisoners protective gear during the pandemic. Facebook didn’t prevent inmates from losing family members to street violence. Nothing came of it, she realized, but cluttered minds and wasted time.“When you’re pulled away from it and you see all the energy put into it, it’ll break your heart,” Ms. Winner said. “Nobody is coming to save you, because they’re so busy with a tweet.”Shane Lavalette for The New York TimesIt is hard to understand how Ms. Winner evolved into an ideological insurgent, because she can’t talk freely about the days when she was a loyal service member. The state-imposed silence about the years she spent identifying drone targets and helping to assassinate people casts a fog of ambiguity over a complicated and perhaps even morally compromising part of her story.Everything we know about Ms. Winner’s war contributions comes from an Air Force Commendation Medal praising her for “enemy intelligence exploitation” and geolocating combatants. According to the medal, she aided in 650 captures and 600 kills.That’s a sobering body count for a young woman who, just a few years earlier, was teaching herself Arabic at the public library to better understand the faraway land that her country had invaded. As a teenager, Ms. Winner joined the military to learn more languages and because college looked like “somebody else’s moneymaking machine.” In the Air Force she learned Pashto, Dari and Farsi but ended up sequestered in a Maryland base eavesdropping on the other side of the planet.At times she expressed empathy for the people on the receiving end of the U.S. wars, fantasized about burning the White House down and even told her sister that she hated America. Those expressions of disgust, captured in online messages and private notes seized from Ms. Winner’s home, were eventually resurrected and patched together by prosecutors who seemed, Ms. Winner thought, to imply that she was a terrorist.Ms. Winner-Davis believes her daughter ended up leaking, at least in part, because she had been disillusioned by her military service. She recalled her daughter fretting over the reliability of the intelligence, telling her mother, “When you see somebody go poof on the screen, you’ve got to make sure it’s right.”“Through her work, she saw a lot of lies,” Ms. Winner-Davis said. “Reality saw another side of our country.”In the military and as an N.S.A. contractor, Ms. Winner vanished into the secrecy of federal institutions. It happened again when she went to prison. Each time, it seems, she emerged traumatized and depleted.Ms. Winner lived through both the pandemic and the racial tensions of 2020 in prison, where the social upheaval manifested in flares of violence and harsh recriminations. Covid meant draconian, monthslong quarantines and lockdowns in cells so tightly packed, she said, that inmates had to take turns standing up. As nerves frayed, guards began to randomly engage in collective punishment like tossing the cells and destroying people’s belongings.But it was the death of George Floyd that, to Ms. Winner, made prison life unbearable. Just hours after his murder hit the national consciousness, she said, she watched a white guard assault a Black inmate who’d made a rude comment.It was in those supercharged early days, stressed by increased hostility from prison staff members, Winner said, that she started getting high. Everyone, she said, had stores of psychiatric medications and other pills; you could combine them in different ways and crush and snort them to produce a buzz.“I was very, very aggressive” toward the guards, Ms. Winner said. “I’d just sit at the door punching the glass every time they walked by.”And so it was: a gradual disintegration in situation and morale until, at last, anticlimactically, Ms. Winner was released.Shane Lavalette for The New York TimesMs. Winner landed back where she started — at her mother’s place, saddled with an ankle monitor, dreaming of escape. She couldn’t bear to tell her mother how bad things had been in prison, but she couldn’t act normal, either. Her mother sensed that Ms. Winner had regressed to adolescence.“It definitely feels like there’s been some permanent damage,” Ms. Winner told me around that time. “Coming home and being in a stable environment and trying to have that control day to day — it hasn’t really fixed anything.”In those early weeks, Ms. Winner sought solace with a high school friend who, like her, had struggled with substance abuse and the law.“The scars were still healing from where I cut myself in quarantine,” she said. “He was the only person I could show those to and say, ‘Look, all I want to do is get high.’”In the confusion of those early weeks, she married her friend in secret — a decision that scandalized her disapproving mother and unraveled when the pair split up after just 44 days of marriage. Describing all of this, Ms. Winner suddenly laughed.“I’m obviously a 130 percent person,” she said. “Obviously.”She spent time with her family’s menagerie of four rescue dogs, three cats and a young horse. The Winner-Davis place has long operated as an informal refuge for rejected animals, giving Ms. Winner early lessons in the unforeseen complications of benevolence. She was a teenager when her pet kitten was killed by a pack of 15 dogs. Realizing their good intentions had mushroomed beyond control — and getting no help from the local animal shelter — the family ended up shooting some of the dogs they’d tried to save.Her childhood memories unfolded like tales from the forgotten margins of America, especially when it comes to her father, who bestowed on Ms. Winner her unforgettable name and lectured her at length about the importance of the traitor Judas to Christian theology. She called her father a “forever student”; she also described him as a junkie, gambler, possible draft dodger and would-be minister. His spine was shattered in a car accident before she was born, leading to years of excruciating surgeries and an unshakable dependence on painkillers.“OxyContin became his best friend, and of course nobody saw it as a vice,” Ms. Winner said. “But after that, he was never a competent person.” Eventually he split up with her mother and moved to Harlingen, Texas, near the U.S.-Mexico border.Still, he kept turning up to collect her and her older sister for allotted custody weekends. As they drove south along the coast, he’d hold forth on mystical and pseudoscientific topics. “Ninety minutes of ancient aliens, the Maya, the enigma of cultures, people coming from the sky,” Ms. Winner recalled.When their father won at cards, they’d take his winnings over the Rio Grande into Nuevo Progreso, Mexico, where he’d drop the girls at the orthodontist to have their braces checked while he sauntered from pharmacy to pharmacy, telling the clerks to keep the change so they’d leave his prescription unmarked. He’d redeem the same prescription at eight or nine shops.“He was a trafficker,” Ms. Winner said. “We learned everything. All the different checkpoints all the way up into Texas.”At first she loved the adventure of these trips, but as she got older, the shine began to wear off. Their father was getting sicker, surviving a few overdoses. Today these trips are the stuff of bad dreams.“I have nightmares about trying to get out of Harlingen, just the anxiety of needing to go home,” she said. “And realizing how many times he was probably high on pain pills and driving us.”Ms. Winner’s father didn’t live long enough to witness her moment of disastrous fame. Incapacitated from a series of heart attacks, he died in 2016. Like his daughter, he’d been radicalized by the Trump era — but in the opposite direction. He had become an ardent MAGA supporter, a development she attributes to incessant exposure to Fox News broadcasts in his nursing home.Relations between the unreliable father and the rest of the family had been strained for years. And yet at the end, Ms. Winner drew close to him.Watching him slip deeper into dementia, she realized that he could offer her a unique gift: He wasn’t lucid enough to repeat her secrets about the Air Force and the wars. So she unburdened herself into the closing door of a fading mind, this unfathomable father figure collapsed into moribund confessor.Back in Texas, Ms. Winner has narrowed her ambitions down to her local community. She said that she wants to do good things there, at home, where she can see them. She wants to coach, to use physical activity to fight addiction and give young people a chance to work through their stress.She’s got her scars — and maybe we do, too — but she’s ready to try, yet again, to turn all this into something good.The Times is committed to publishing a diversity of letters to the editor. We’d like to hear what you think about this or any of our articles. Here are some tips. And here’s our email: letters@nytimes.com.Follow The New York Times Opinion section on Facebook, Twitter (@NYTopinion) and Instagram. More

  • in

    After Biden Meets Putin, U.S. Exposes Details of Russian Hacking Campaign

    The revelations, which dealt with a Russian espionage campaign, came after President Biden demanded that President Vladimir V. Putin rein in more destructive ransomware attacks.WASHINGTON — Two weeks after President Biden met President Vladimir V. Putin of Russia and demanded that he rein in ransomware attacks on U.S. targets, American and British intelligence agencies on Thursday exposed the details of what they called a global effort by Russia’s military intelligence organization to spy on government organizations, defense contractors, universities and media companies.The operation, described as crude but broad, is “almost certainly ongoing,” the National Security Agency and its British counterpart, known as GCHQ, said in a statement. They identified the Russian intelligence agency, or G.R.U., as the same group that hacked into the Democratic National Committee and released emails in an effort to influence the 2016 presidential election in favor of Donald J. Trump.Thursday’s revelation is an attempt to expose Russian hacking techniques, rather than any new attacks, and it includes pages of technical detail to enable potential targets to identify that a breach is underway. Many of the actions by the G.R.U. — including an effort to retrieve data stored in Microsoft’s Azure cloud services — have already been documented by private cybersecurity companies.But the political significance of the statement is larger: It underscored the scope of hacking efforts out of Russia, which range from the kind of intelligence gathering engaged in by the G.R.U. and the intelligence agencies of many states to the harboring of criminal groups like the one that brought down Colonial Pipeline. The company provides much of the gasoline, jet fuel and diesel used on the East Coast, and when it was attacked, it shut down the pipeline for fear that the malicious code could spread to the operational controllers that run the pipeline.Ever since the pipeline attack, the Biden administration’s focus on cyberattacks shifted, homing in on the potential for disruption of key elements of the nation’s economic infrastructure. It has focused on Russia-based criminal groups like DarkSide, which took credit for the Colonial attack, but then announced it was shutting down operations after the United States put pressure on it. The F.B.I. later announced it had recovered some of the more than $4 million in ransom that Colonial paid the hackers to unlock the company’s records.Whether those ransomware attacks abate will be the first test of whether Mr. Biden’s message to Mr. Putin at the summit in Geneva sunk in. There, Mr. Biden handed him a list of 16 areas of “critical infrastructure” in the United States and said that it would not tolerate continued, disruptive Russian cyberattacks. But he also called for a general diminishment of breaches originating from Russian territory.“We’ll find out whether we have a cybersecurity arrangement that begins to bring some order,” Mr. Biden said at the end of the meeting, only minutes after Mr. Putin declared that the United States, not Russia, was the largest source of cyberattacks around the world. Mr. Biden also repeatedly said that he was uncertain Mr. Putin would respond to the American warning or the series of related financial sanctions imposed on Moscow over the past five years.According to administration officials, the White House or intelligence agencies did not intend the advisory as a follow-up to the summit. Instead, they said, it was released as part of the National Security Agency’s routine warnings, said Charlie Stadtlander, an agency spokesman, “not in response to any recent international gatherings.”But that is unlikely to matter to Mr. Putin or the G.R.U., as they try to assess the steps the Biden administration is willing to take to curb their cybercampaigns — and in what order.For now, it is the ransomware attacks that have moved to the top of the administration’s agenda, because of their effects on ordinary Americans.Jake Sullivan, the national security adviser, said days after the summit that it might take months to determine whether the warning to Mr. Putin resulted in a change in behavior. “We set the measure at whether, over the next six to 12 months, attacks against our critical infrastructure actually decline coming out of Russia,” he said on CBS. “The proof of the pudding will be in the eating, so we will see over the course of months to come.”It was unclear from the data provided by the National Security Agency how many of the targets of the G.R.U. — also known as Fancy Bear or APT 28 — might be on the critical infrastructure list, which is maintained by the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency. At the time of the attacks on the election system in 2016, election systems — including voting machines and registration systems — were not on the list and were added in the last days of the Obama administration. American intelligence agencies later said Mr. Putin had directly approved the 2016 attacks.But the National Security Agency statement identified energy companies as a primary target, and Mr. Biden specifically cited them in his talks with Mr. Putin, noting the ransomware attack that led Colonial Pipeline to shut down in May, and interrupted the delivery of gasoline, diesel and jet fuel along the East Coast. That attack was not by the Russian government, Mr. Biden said at the time, but rather by a criminal gang operating from Russia.In recent years, the National Security Agency has more aggressively attributed cyberattacks to specific countries, particularly those by adversarial intelligence agencies. But in December, it was caught unaware by the most sophisticated attack on the United States in years, the SolarWinds hacking, which affected federal agencies and many of the nation’s largest companies. That attack, which the National Security Agency later said was conducted by the S.V.R., a competing Russian intelligence agency that was an offshoot of the K.G.B., successfully altered the code in popular network-management software, and thus in the computer networks of 18,000 companies and government agencies.There is nothing particularly unusual about the methods the United States says the Russian intelligence unit used. There is no bespoke malware or unknown exploits by the G.R.U. unit. Instead, the group uses common malware and the most basic techniques, like brute-force password spraying, which relies on passwords that have been stolen or leaked to gain access to accounts.The statement did not identify the targets of the G.R.U.’s recent attacks but said that they included government agencies, political consultants, party organizations, universities, and think tanks.The attacks appear to mostly be about gathering intelligence and information. The National Security Agency did not specify ways that the Russian hackers damaged systems.The recent wave of G.R.U. attacks has gone on for a relatively long time, beginning in 2019 and continuing through this year. Once inside, the G.R.U. hackers would gain access to protected data and email — as well as to cloud services used by the organization.The hackers were responsible for the primary breach of the Democratic National Committee in 2016 which resulted in the theft, and release, of documents meant to damage the campaign of Hillary Clinton.On Thursday, the National Security Agency released a list of evasion and exfiltration techniques the G.R.U. used to help information technology managers identify — and stop — attacks by the hacking group.That lack of sophistication means fairly basic measures, like multifactor authentication, timeout locks and temporary disabling of accounts after incorrect passwords are entered, can effectively block brute force attacks. More

  • in

    Reality Winner, Who Leaked Government Secrets, Is Released From Prison

    Out on good behavior, the former National Security Agency contractor was sent to a halfway house.WASHINGTON — Reality L. Winner, a former National Security Agency contractor who was the first person prosecuted during the Trump administration on charges of leaking classified information, has been released to a halfway house, her lawyer announced on Monday.Ms. Winner’s case was the subject of an intense public campaign to win her a pardon or clemency. But it was her good behavior in prison, not the outside advocacy or a compassionate release process, that shortened her 63-month sentence, her lawyer said.While her good-behavior release was not unusual, her lawyer, Alison Grinter Allen, said she and Ms. Winner’s family were worried that the government would find a reason to extend her prison stay.“When we knew release was imminent, there were a lot of anxieties that it would be denied to her,” Ms. Allen said in an interview.Ms. Winner was released on June 2 from Federal Medical Center, Carswell, a prison in Fort Worth, Texas, said Emery Nelson, a Bureau of Prisons spokesman.The San Antonio Residential Re-entry Management Office will oversee her “community confinement,” Mr. Nelson added. Ms. Winner is in a halfway house, where she will have access to the outdoors and be able to meet with her family, and then will be under supervised release, Ms. Allen said. She could be transferred to home confinement before her full release from custody in November.While in prison, Ms. Winner was held under difficult conditions. The prison lost power and heat during last winter’s ice storms in Texas, and a number of fellow inmates died of Covid-19.Her communications were closely monitored, and the government refused until now to move her to a less secure facility, Ms. Allen said.“It was a terrible, terrible time,” Ms. Allen said. “Not that there is any great time to be in prison.”A former Air Force linguist, Ms. Winner entered a guilty plea in 2018, after being prosecuted for leaking classified information. She had been arrested in 2017 and charged with sending a classified report about election interference to reporters at The Intercept.The report described hacks by Russian intelligence operatives against local election officials and a company that sold software related to voter registration.As Ms. Winner began to petition for a pardon or a commutation, Ms. Allen was added to her legal team because her other lawyers were banned from speaking publicly about the case.Ms. Winner, now 29, sought clemency from President Donald J. Trump, with her legal team submitting thousands of letters in an effort to get him to intervene in her case.There had been some cause to think Mr. Trump could commute Ms. Winner’s sentence. In 2018, he called her sentence “so unfair” and said that what she had done was “small potatoes.” But Mr. Trump never acted on the commutation request.Despite Mr. Trump’s apparent ambivalence, the case was an early example of a campaign against leaks by his Justice Department.While many of the Trump-era leak investigations moved slowly, the Justice Department announced the charges against Ms. Winner an hour after The Intercept published the article.The Intercept came under criticism for how it reported the article, including by Ms. Winner’s mother. Ms. Winner had mailed the document to the publication anonymously, but the reporters showed a copy of it to the National Security Agency’s public affairs office and published the document to the internet, including markings that helped officials identify Ms. Winner.In 2017, The Intercept acknowledged its practices fell short and said it should have taken more steps to ensure the identity of the person leaking the document was protected.Ms. Winner could move relatively quickly from the halfway house to home confinement, where she could live with her family. Because of the pandemic, visitation had been cut off from the federal prison for the last 18 months and Ms. Winner had spoken to her family only on phone calls and occasional video calls. During her time in prison, Ms. Winner became an aunt and is looking forward to meeting her new family members, Ms. Allen said.Once Ms. Winner is released from the halfway house, she will still not be able to talk about any of the documents she reviewed while working at the National Security Agency, but she will be able to speak broadly about issues that concern her.“It would surprise me if advocacy and activism was not a part of her life going forward,” Ms. Allen said, “whether it be about the conditions and the state of mass incarceration or political prosecutions or election integrity.” More

  • in

    Biden to Restore Homeland Security and Cybersecurity Aides to Senior White House Posts

    #masthead-section-label, #masthead-bar-one { display: none }The Coronavirus OutbreakliveLatest UpdatesMaps and CasesA Future With CoronavirusVaccine InformationF.A.Q.TimelineAdvertisementContinue reading the main storySupported byContinue reading the main storyBiden to Restore Homeland Security and Cybersecurity Aides to Senior White House PostsThe two appointments illustrate how the president-elect appears determined to rebuild a White House national security team to focus on threats that critics say were ignored by President Trump.The headquarters of the National Security Agency at Fort Meade, Md. President-elect Joseph R. Biden Jr. is expected to take a harder stand against Russian hacking.Credit…T.J. Kirkpatrick for The New York TimesJan. 13, 2021Updated 7:51 a.m. ETPresident-elect Joseph R. Biden Jr., facing the rise of domestic terrorism and a crippling cyberattack from Russia, is elevating two White House posts that all but disappeared in the Trump administration: a homeland security adviser to manage matters as varied as extremism, pandemics and natural disasters, and the first deputy national security adviser for cyber and emerging technology.The White House homeland security adviser will be Elizabeth Sherwood-Randall, according to transition officials. She is a longtime aide to Mr. Biden who served under President Barack Obama as senior director for Europe and then deputy secretary of energy, where she oversaw the modernization of the nuclear arsenal.And for the complex task of bolstering cyberoffense and defense, Mr. Biden has carved out a role for Anne Neuberger, a rising official at the National Security Agency. She ran the Russia Small Group, which mounted a pre-emptive strike on the Kremlin’s cyberactors during the 2018 midterm elections, part of an effort to counter Moscow after its interference in the 2016 presidential election.For the past 15 months, she has overseen the agency’s Cybersecurity Directorate, a newly formed organization to prevent digital threats to sensitive government and military industry networks. But it has also been an incubator for emerging technologies, including the development of impenetrable cryptography — the National Security Agency’s original mission nearly 70 years ago — with a new generation of quantum computers.Taken together, the two appointments show how Mr. Biden appears determined to rebuild a national security apparatus that critics of the Trump administration say withered for the past four years. The new White House team will focus on threats that were battering the United States even before the coronavirus pandemic reordered the nation’s challenges.Transition officials say that Ms. Sherwood-Randall and Ms. Neuberger will be given new powers to convene officials from around the government to deal with emerging threats. Both are expected to begin their jobs on Jan. 20, since neither position requires Senate confirmation.Ms. Sherwood-Randall will have to oversee the effort to contain right-wing groups that laid siege to the Capitol last week, and Ms. Neuberger will face the aftermath of the most unnerving cyberbreach to affect the federal government. She will, senior officials say, have to help determine how to make good on Mr. Biden’s vow that the hackers behind the recent intrusion, which has spread across government networks, “will pay a price.”Ms. Sherwood-Randall, a Rhodes Scholar who in recent years has been a professor at the Georgia Institute of Technology, had been considered a candidate for secretary of energy. The job went to Jennifer Granholm, a former governor of Michigan.She will serve as the White House homeland security adviser, a position created by President George W. Bush that became more powerful under Mr. Obama, and is distinct from the secretary of the Department of Homeland Security, who sits in the cabinet.“We’re going to be dealing at once again with border security, biosecurity, global public health and strengthening the resilience of our own democracy,” she said in a brief interview. “The last of those have grown more urgent.”The Coronavirus Outbreak More

  • in

    Trump Was Briefed on Uncorroborated Intelligence About Chinese Bounties

    AdvertisementContinue reading the main storySupported byContinue reading the main storyTrump Was Briefed on Uncorroborated Intelligence About Chinese BountiesThe unverified intelligence echoes a similar report, deemed credible by the C.I.A. but dismissed by the president, that Russian military agents had offered payments for attacks on Americans in Afghanistan.President Trump and the first lady, Melania Trump, this month at Joint Base Andrews outside Washington.Credit…Erin Scott for The New York TimesDec. 30, 2020President Trump was briefed this month about intelligence reports that China had offered to pay bounties to fighters in Afghanistan who attacked American soldiers there, but the information was uncorroborated and comes months after Mr. Trump dismissed as a “hoax” a C.I.A. assessment that Russia had paid for such attacks.It is unclear whether the intelligence on China shows that any bounties were paid, or whether any attacks on American personnel were even attempted. United States intelligence agencies collect enormous amounts of information, much of which turns out to be false or misleading.The information, included in the president’s written briefing on Dec. 17 and relayed verbally by the national security adviser, Robert C. O’Brien — was earlier reported on Wednesday night by Axios and confirmed by U.S. officials.It comes at a time when Trump administration officials, including the director of national intelligence, John Ratcliffe, have sought to put more pressure on China, partly in the hope of limiting any plans by the incoming Biden administration to ease tensions with Beijing.Mr. Trump, Mr. Ratcliffe and other officials have also sought to direct attention toward Chinese misbehavior in areas where other American officials consider Russia to be a greater threat, including computer hacking and the use of disinformation to disrupt American politics.After the disclosure this month that the United States government had been subjected to a huge cyberbreach that American officials, including Secretary of State Mike Pompeo, confidently attributed to Russia, Mr. Trump angrily cast doubt on that notion and sought to implicate Beijing. “Russia, Russia, Russia is the priority chant when anything happens,” Mr. Trump wrote on Twitter, charging that the news media avoids “discussing the possibility that it may be China (it may!).”The Axios report said on Wednesday that the underlying intelligence on the bounties, about which it obtained no further details, would be declassified, although it was unclear why or for whom. White House officials would not elaborate but did not dispute that the intelligence was uncorroborated.Although tensions between the United States and China have escalated significantly during the Trump era, Beijing is not known to provide substantial support to anti-American proxies in combat zones like Afghanistan, and some national security experts were initially skeptical that Beijing would support attacks on Americans. By contrast, many considered similar reports about Russian bounties to be credible.If confirmed, and particularly if traced to political leaders in Beijing, such an action by China would constitute a grave provocation that might demand a response by President-elect Joseph R. Biden Jr. after he takes office in January.A Biden transition official would not say on Wednesday night whether Mr. Biden, who now receives official daily intelligence briefings, had been presented with the same information as the president.But the official said that the Biden team would seek to learn more about it from the Trump administration and that it underscored the importance of a fully cooperative transition process, including with the Defense Department, which Mr. Biden on Monday accused of “obstruction.”“Right now,” Mr. Biden said in Wilmington, Del., “we just aren’t getting all the information that we need from the outgoing administration in key national security areas.”Months before the report involving China, the Pentagon and U.S. intelligence agencies were investigating reports collected this year, and first reported by The New York Times, that Russian military intelligence agents had offered to pay Taliban-linked fighters in Afghanistan for the killing of American soldiers there.The C.I.A. assessed with medium confidence that Russia had covertly offered and paid the bounties to a network of Afghan militants and criminals. The National Security Agency placed lower confidence in the intelligence. But Mr. Pompeo, for one, took the reports seriously enough to issue a stern face-to-face warning this summer to his Russian counterpart.Mr. Trump was similarly provided with a written briefing on that intelligence, but publicly he dismissed it as “fake news” and an extension of what he called the “Russia hoax,” including the investigation into his 2016 campaign’s ties to the Kremlin. At the same time, the president suggested that subordinates had not done enough to draw the report about Russia to his attention.“If it reached my desk, I would have done something about it,” Mr. Trump said in July. United States officials have said that the assessment regarding Russia was included in his written intelligence brief in February, but that he rarely reads that document.In multiple subsequent conversations with President Vladimir V. Putin of Russia, Mr. Trump did not raise the matter.Many questions are outstanding about the unverified intelligence regarding China, including when such bounties were said to be offered, by whom and to whom. The United States and its coalition partners in Afghanistan are fighting not only the Taliban but also Al Qaeda, the Islamic State and various other militant and criminal groups.The reportedly planned release of more information comes at a time when Democrats and many career intelligence officials are concerned that Trump officials like Mr. Ratcliffe have sought to selectively declassify intelligence for political purposes, like the Russia investigation and election interference.AdvertisementContinue reading the main story More

  • in

    Trump Administration Is Criticized Over Proposal to Split Cyberoperations Leadership

    @media (pointer: coarse) {
    .nytslm_outerContainer {
    overflow-x: scroll;
    -webkit-overflow-scrolling: touch;
    }
    }

    .nytslm_outerContainer {
    display: flex;
    align-items: center;
    /* Fixes IE */
    overflow-x: auto;
    box-shadow: -6px 0 white, 6px 0 white, 1px 3px 6px rgba(0, 0, 0, 0.15);
    padding: 10px 1.25em 10px;
    transition: all 250ms;
    -ms-overflow-style: none;
    /* IE 10+ */
    scrollbar-width: none;
    /* Firefox */
    background: white;
    margin-bottom: 20px;
    z-index: 1000;
    }

    @media (min-width: 1024px) {
    .nytslm_outerContainer {
    margin-bottom: 0px;
    padding: 13px 1.25em 10px;
    }
    }

    .nytslm::-webkit-scrollbar {
    display: none;
    /* Safari and Chrome */
    }

    .nytslm_innerContainer {
    margin: unset;
    display: flex;
    align-items: center;
    }

    @media (min-width: 600px) {
    .nytslm_innerContainer {
    margin: auto;
    min-width: 600px;
    }
    }

    .nytslm_title {
    padding-right: 1em;
    border-right: 1px solid #ccc;
    }

    @media (min-width: 740px) {
    .nytslm_title {
    max-width: none;
    font-size: 1.0625rem;
    line-height: 1.25rem;
    }
    }

    .nytslm_spacer {
    width: 0;
    border-right: 1px solid #E2E2E2;
    height: 45px;
    margin: 0 1.4em;
    }

    .nytslm_list {
    font-family: nyt-franklin, helvetica, arial, sans-serif;
    display: flex;
    width: auto;
    list-style: none;
    padding-left: 1em;
    flex-shrink: 0;
    align-items: baseline;
    justify-content: center;
    }

    .nytslm_li {
    margin-right: 1.4em;
    flex-shrink: 0;
    font-size: 0.8125rem;
    line-height: 0.8125rem;
    font-weight: 600;
    padding: 1em 0;
    }

    #nytslm .nytslm_li a {
    color: #121212;
    text-decoration: none;
    }

    #nytslm .nytsmenu_li_current,
    #nytslm .nytslm_li a:hover,
    #nytslm .nytslm_li a:active,
    #nytslm .nytslm_li a:focus {
    color: #121212;
    border-bottom: 2px solid #121212;
    padding-bottom: 2px;
    }

    .nytslm_li_live_loud:after {
    content: ‘LIVE’
    }

    .nytslm_li_live_loud {
    background-color: #d0021b;
    color: white;
    border-radius: 3px;
    padding: 4px 6px 2px 6px;
    margin-right: 2px;
    display: inline-block;
    letter-spacing: 0.03rem;
    font-weight: 700;
    }

    .nytslm_li_upcoming_loud {
    border: 1px solid #d0021b;
    color: #d0021b;
    border-radius: 3px;
    padding: 4px 6px 2px 6px;
    margin-right: 2px;
    display: inline-block;
    letter-spacing: 0.03rem;
    font-weight: 700;
    }

    .nytslm_li_upcoming_loud:before {
    content: ‘Upcoming’
    }

    .nytslm_li_loud a:hover,
    .nytslm_li_loud a:active,
    .nytslm_li_loud a:focus {
    border-bottom: 2px solid;
    padding-bottom: 2px;
    }

    .nytslm_li_updated {
    color: #777;
    }

    #masthead-bar-one {
    display: none;
    }

    .electionNavbar__logoSvg {
    width: 80px;
    align-self: center;
    display: flex;
    }

    @media(min-width: 600px) {
    .electionNavbar__logoSvg {
    width: 100px;
    }
    }

    .nytslm_notification {
    border-left: 1px solid #ccc;
    font-family: nyt-franklin, helvetica, arial, sans-serif;
    padding-left: 1em;
    }

    .nytslm_notification_label {
    color: #D0021B;
    text-transform: uppercase;
    font-weight: 700;
    font-size: 0.6875rem;
    margin-bottom: 0.2em;
    letter-spacing: 0.02em;
    }

    .nytslm_notification_link {
    font-weight: 600;
    color: #121212;
    display: flex;
    align-items: center;
    }

    .nytslm_notification_headline {
    font-size: 0.875rem;
    line-height: 1.0625rem;
    }

    .nytslm_notification_image_wrapper {
    position: relative;
    max-width: 75px;
    margin-left: 10px;
    flex-shrink: 0;
    }

    .nytslm_notification_image {
    max-width: 100%;
    }

    .nytslm_notification_image_live_bug {
    position: absolute;
    text-transform: uppercase;
    bottom: 7px;
    left: 2px;

    font-size: 0.5rem;
    background-color: #d0021b;
    color: white;
    border-radius: 3px;
    padding: 4px 4px 2px 4px;
    font-weight: 700;
    margin-right: 2px;
    letter-spacing: 0.03rem;
    }

    /* No hover state on in app */
    .Hybrid .nytslm_li a:hover,
    .Hybrid .nytslm_li_loud a:hover {
    border-bottom: none;
    padding-bottom: 0;
    }

    .Hybrid #TOP_BANNER_REGION {
    display: none;
    }

    .nytslm_st0 {
    fill: #f4564a;
    }

    .nytslm_st1 {
    fill: #ffffff;
    }

    .nytslm_st2 {
    fill: #2b8ad8;
    }

    Electoral College Results

    Election Disinformation

    Full Results

    Biden Transition Updates

    “),e+=””+b+””,e+=””,d&&(e+=””,e+=””,e+=”Live”,e+=””),e+=””,e}function getVariant(){var a=window.NYTD&&window.NYTD.Abra&&window.NYTD.Abra.getAbraSync&&window.NYTD.Abra.getAbraSync(“STYLN_elections_notifications”);// Only actually have control situation in prd and stg
    return[“www.nytimes.com”,”www.stg.nytimes.com”].includes(window.location.hostname)||(a=”STYLN_elections_notifications”),a||”0_control”}function reportData(){if(window.dataLayer){var a;try{a=dataLayer.find(function(a){return!!a.user}).user}catch(a){}var b={abtest:{test:”styln-elections-notifications”,variant:getVariant()},module:{name:”styln-elections-notifications”,label:getVariant(),region:”TOP_BANNER”},user:a};window.dataLayer.push(Object.assign({},b,{event:”ab-alloc”})),window.dataLayer.push(Object.assign({},b,{event:”ab-expose”})),window.dataLayer.push(Object.assign({},b,{event:”impression”}))}}function insertNotification(a,b){// Bail here if the user is in control
    if(reportData(),”0_control”!==getVariant()){// Remove menu bar items or previous notification
    var c=document.querySelector(“.nytslm_innerContainer”);if(c&&1 30 * 60 * 1000) return restoreMenuIfNecessary();
    // Do not update DOM if the content won’t change
    if(currentNotificationContents!==a.text&&window.localStorage.getItem(“stylnelecs”)!==a.timestamp)// Do not show if user has interacted with this link
    // if (Cookie.get(‘stylnelecs’) === data.timestamp) return;
    {expireLocalStorage(“stylnelecs”),currentNotificationContents=a.text;// Construct URL for tracking
    var b=a.link.split(“#”),c=b[0]+”?action=click&pgtype=Article&state=default&module=styln-elections-notifications&variant=1_election_notifications&region=TOP_BANNER&context=Menu#”+b[1],d=formatNotification(c,a.text,a.kicker,a.image);insertNotification(d,function(){var b=document.querySelector(“.nytslm_notification_link”);return b?void(b.onclick=function(){window.localStorage.setItem(“stylnelecs”,a.timestamp)}):null})}})}(function(){navigator.userAgent.includes(“nytios”)||navigator.userAgent.includes(“nyt_android”)||window.stylnelecsHasLoaded||(// setInterval(getUpdate, 5000);
    window.stylnelecsHasLoaded=!0)})(),function(){try{if(navigator.userAgent.includes(“nytios”)||navigator.userAgent.includes(“nyt_android”)){var a=document.getElementsByClassName(“nytslm_title”)[0];a.style.pointerEvents=”none”}}catch(a){}}(); More