{"id":11237,"date":"2018-01-25T10:45:18","date_gmt":"2018-01-25T18:45:18","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/01\/25\/news-5008\/"},"modified":"2018-01-25T10:45:18","modified_gmt":"2018-01-25T18:45:18","slug":"news-5008","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/01\/25\/news-5008\/","title":{"rendered":"Bob Lord Is the DNC&#8217;s New Chief Security Officer"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5a69e3ce9899195a26786998\/master\/pass\/BobLordDNC.jpg\"\/><\/p>\n<p><strong>Credit to Author: Issie Lapowsky| Date: Thu, 25 Jan 2018 17:59:11 +0000<\/strong><\/p>\n<p><span class=\"lede\">The Democratic National <\/span>Committee has hired Bob Lord, most recently Yahoo&#x27;s head of information security, to be its chief security officer\u2014a brand new position, created in the aftermath of the <a href=\"https:\/\/www.wired.com\/2016\/07\/heres-know-russia-dnc-hack\/\">historic hack by Russian operatives<\/a> of the DNC&#x27;s servers during the 2016 presidential campaign.<\/p>\n<p>This is Lord&#x27;s first foray into the world of politics, having spent his career in Silicon Valley working at companies like Twitter, AOL, and Netscape. But it&#x27;s far from Lord&#x27;s first stint leading a cleanup crew in the wake of an extensive and deeply damaging hack. Lord was responsible for detecting two massive data breaches that occurred prior to his arrival at Yahoo, and worked with the Federal Bureau of Investigation to track down those responsible.<\/p>\n<p>&quot;I&#x27;ll be working to protect my new colleagues at the DNC from the attackers who would prefer to keep us distracted from our mission of getting Democrats across the nation elected,&quot; Lord said in a statement. &quot;And my job doesn\u2019t stop at the front door of the building\u2014my team and I will work with state parties to update their information security strategies and deployments to change the economics for the attackers.\u201d On Thursday, Lord was already meeting with state party chairs, leading a tutorial on security protocol for volunteers and new hires.<\/p>\n<p>According to Raffi Krikorian, who worked with Lord at Twitter and now serves as the DNC&#x27;s chief technology officer, Lord&#x27;s experience dealing with the Yahoo hack was central to the committee&#x27;s decision to hire him.<\/p>\n<p>&quot;There are very few people in the world who actually found foreign actors in their system and did something about it,&quot; Krikorian says.<\/p>\n<p>DNC chairman Tom Perez found that background compelling as well. \u201cWhen I took this job, I made it crystal clear that our organization\u2019s cybersecurity required immediate attention and resources,&quot; Perez said in a statement to WIRED. &quot;I\u2019m confident Bob\u2019s skills and hard work will help protect us against the sort of cyberattacks and intrusions that are unfortunately all too common in today\u2019s age.&quot;<\/p>\n<p>The DNC is still recovering from the hack of its servers in 2016. Russian hackers penetrated the system with a barrage of phishing emails that appeared to be from Google, encouraging DNC staffers to change their passwords. According to the <em><a href=\"https:\/\/www.apnews.com\/dea73efc01594839957c3c9a6c962b8a\" target=\"_blank\">Associated Press<\/a><\/em>, 29 of those attempts failed. One succeeded. Internal emails which were then leaked to and published by WikiLeaks sent the committee, and arguably the country, into a chaotic spiral over Russian attempts to influence the American election.<\/p>\n<p>&#x27;There are very few people in the world who actually found foreign actors in their system and did something about it.&#x27;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Raffi Krikorian, DNC<\/p>\n<p>It&#x27;s a kind of chaos with which Lord is all too familiar. After spending four years at Twitter, where he was the company&#x27;s first dedicated security hire, Lord joined Yahoo in 2015. Just a year later, he <a href=\"https:\/\/yahoo.tumblr.com\/post\/150781911849\/an-important-message-about-yahoo-user-security\" target=\"_blank\">broke the news<\/a> to the world that half a billion Yahoo accounts had been exposed during a 2014 data breach. Just months later, the company <a href=\"https:\/\/yahoo.tumblr.com\/post\/154479236569\/important-security-information-for-yahoo-users\" target=\"_blank\">disclosed<\/a> the even larger 2013 breach, which Yahoo now says affected all three billion of its users. The hackers used stolen information from the Yahoo accounts to gain entry to users&#x27; Google accounts, skim credit card information, and redirect <a href=\"https:\/\/techcrunch.com\/2017\/03\/15\/yahoo-hackers-manipulated-search-results-for-erectile-dysfunction-medications\/\" target=\"_blank\">Yahoo searches<\/a> for &quot;erectile dysfunction medication&quot; to a phony online pharmacy in what seemed to be a profit-making spam campaign. In March of 2017, the Department of Justice <a href=\"https:\/\/www.justice.gov\/opa\/pr\/us-charges-russian-fsb-officers-and-their-criminal-conspirators-hacking-yahoo-and-millions\" target=\"_blank\">announced<\/a> it had charged two officers of the Russian Federal Security Service and two additional accomplices with computer hacking, economic espionage, and other crimes, and credited Yahoo with helping them track down the perpetrators.<\/p>\n<p>\u201cWorking closely with Yahoo and Google, Department of Justice lawyers and the FBI were able to identify and expose the hackers responsible for the conduct described today, without unduly intruding into the privacy of the accounts that were stolen,&quot; US attorney Brian Stretch said at the time.<\/p>\n<p>In an interview at <a href=\"https:\/\/techcrunch.com\/2017\/05\/15\/yahoos-bob-lord-said-massive-data-breach-felt-like-vertigo\/\" target=\"_blank\">TechCrunch Disrupt<\/a> last year, Lord described the experience of discovering the cascade of hacks as a kind of vertigo. \u201cIf you\u2019re familiar with that effect that Alfred Hitchcock perfected\u2014where things look like they\u2019re sort of telescoping out. And you can still see everything but you still have this weird parallax going on,\u201d he said. \u201cI remember feeling that when I was putting all of the different pieces together. And that\u2019s not a great feeling.\u201d<\/p>\n<p>&#x27;This is in my opinion one of the hardest challenges in cybersecurity.&#x27;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Raffi Krikorian<\/p>\n<p>Lord&#x27;s new position has clear parallels to his work securing Yahoo in the wake of the attacks. But it also differs in critical ways, says Krikorian. Unlike a major tech company, the Democratic party is essentially a nationwide network of small offices that scale up and down overnight. They also need to open their systems up to volunteers, who often work on unsecured, personal devices. &quot;It\u2019s an absolute nightmare,&quot; Krikorian says. &quot;This is in my opinion one of the hardest challenges in cybersecurity.&quot;<\/p>\n<p>Krikorian&#x27;s team of 25 has worked hard to convince the DNC&#x27;s full-time staffers that they are constantly under attack. The tech team <a href=\"https:\/\/www.wired.com\/story\/the-dncs-technology-chief-is-phishing-his-staff-good\/\">periodically launches phishing attacks<\/a> on its own staffers. It was a phishing attack, after all, that gave Russian operatives a window into the DNC&#x27;s servers to begin with. One recent attack conducted by Krikorian&#x27;s team used an email that appeared to be an ad for a Nordstrom sale\u2014it elicited more clicks than Krikorian would have hoped for.<\/p>\n<p>Krikorian says the committee sees &quot;interesting traffic,&quot; everyday: repeated login attempts with incorrect passwords, odd patterns in times of usage, logins from IP addresses in places other than the Washington DC area, and at least one phony Google Hangout request that was flagged by the recipient. Lord&#x27;s job, Krikorian says, is to rethink all of the organization&#x27;s existing systems, from its email provider to its physical infrastructure, in order to prevent history from repeating itself.<\/p>\n<p>&quot;I&#x27;ve always taken the position we probably still have someone in the system. We have to have that kind of posture,&quot; Krikorian says. &quot;I&#x27;ll never claim we\u2019re fully locked down. This is an arms race.&quot;<\/p>\n<p>The US wasn&#x27;t the only country Russia targeted. <a href=\"https:\/\/www.wired.com\/story\/russia-election-hacking-playbook\/?mbid=BottomRelatedStories\">Here&#x27;s their playbook for disrupting elections around the world<\/a><\/p>\n<p>In fact, they don&#x27;t just target elections; <a href=\"https:\/\/www.wired.com\/story\/a-guide-to-russias-high-tech-tool-box-for-subverting-us-democracy\/?mbid=BottomRelatedStories\">Russia has a whole toolkit at its disposal<\/a> for messing with the US<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/the-dncs-technology-chief-is-phishing-his-staff-good\/?mbid=BottomRelatedStories\">Phishing your own staff might seen cruel, but it&#x27;s actually critical<\/a> for maintaining good security hygiene<\/p>\n<p class=\"related-cne-video-component__dek\">The only way to be truly secure on Facebook is to delete your account. But that&#39;s crazy talk! Here&#39;s how to lock down your privacy and security and bonus, keep targeted ads at bay.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/bob-lord-dnc-chief-security-officer\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5a69e3ce9899195a26786998\/master\/pass\/BobLordDNC.jpg\"\/><\/p>\n<p><strong>Credit to Author: Issie Lapowsky| Date: Thu, 25 Jan 2018 17:59:11 +0000<\/strong><\/p>\n<p>At Yahoo, Bob Lord led the response to two massive cyberattacks. Now he&#8217;s bringing that know-how to the Democratic National Committee.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-11237","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11237"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11237\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11237"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}