Mueller Reports On Russian Interference

Moscow's interference in the 2016 election, was unequivocal and emphatic and Mueller says that Russia had used "sophisticated cyber techniques" like hacking computer networks, email accounts.

And posing as Americans on social media they had "launched a concerted attack on our political system."

The Mueller report says that the Russian governments interference in the 2016 US Presidential election was significant, ‘sweeping and systematic’.

Also in 2016 the Democratic National Committee and its cyber team said that Russian hackers had invaded and influenced its computer systems.

It can now be read on-line, in two parts and is 448 pages in total.

The first part of the Report explains Russian interference in the 2016 election and its connections with the Trump campaign.

And the second part discusses the President’s actions concerning the FBI’s investigations of Russian influence in the 2016 elections.

The Internet Research Agency (IRA), based in St. Petersburg, which is said to be funded by President Putin, designed a social media campaign to provoke and use information warfare to disparage the Clinton campaign and to help and favour Trump’s campaign.

Robert Mueller’s report represents a thorough, insightful and professional analysis of Russia’s interference with the 2016 presidential election.

However, it was never intended to present the final word on whether President Donald Trump, his campaign aides and executive officials in the Trump administration engaged in illegal and criminal activities. The report marks an important but distinctly partial step.

As made clear in the introduction to Volume 1: “A statement that the investigation did not establish particular facts does not mean there was no evidence of those facts.”

New information will shed further light on whether Trump and other individuals pursued activities that placed their financial and political ambitions over the national interest and the need to protect our constitutional system.

The report provides extensive detail on what is called the Trump Moscow project. Between approximately Oct. 13, 2015, and Nov. 2, 2015, the Trump Organisation, through its subsidiary Trump Acquisitions, completed a letter of intent for a Trump Moscow property.

Signed by Trump for the Trump Organisation, the letter was “intended to facilitate further discussions” in order to reach a mutually acceptable agreement.

The letter contemplated an extensive development with residential, hotel, commercial and office components, calling for approximately 150 first class, luxury residential condominiums as well as one first class, luxury hotel consisting of approximately 15 floors and containing no fewer than 150 hotel rooms.

The Mueller report states that Michael Cohen recalled that both he and Trump wanted the Moscow project “to succeed and that Trump never discouraged him from working on the project because of the campaign.”

The Trump Organisation “stood to earn substantial sums over the lifetime of the project, without assuming significant liabilities or financing commitments.” To Cohen, the Trump Tower Moscow “was potentially a $1 trillion deal.”

The report states that Cohen remembered that Trump would be willing to travel to Russia if Cohen could “lock and load” the deal. Despite efforts by both sides, the Moscow project was eventually cancelled.

The report notes that Trump responded to questions about possible connections to Russia “by denying any business involvement in Russia, even though the Trump Organisation had pursued a business project in Russia as late as June 2016.”

Mueller said, Wednesday 29th of May, that he is "resigning from the Department of Justice and returning to private life."

Law.com:      DocumentCloud:

You Might Also Read:

The Mueller Investigation Identifies Russian Spies

« Data Analytics Is Changing The Insurance Industry
Jamie Bartlett: Tech Will Change Us »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

European Defence Agency (EDA)

European Defence Agency (EDA)

EDAs mission is to improve European defence capabilities. Programme areas include Cyber Defence.

CSIRT Malta

CSIRT Malta

CSIRT Malta supports critical infrastructure organisations in Malta on how to protect their information infrastructure assets and systems from cyber threats and incidents.

Haltdos

Haltdos

Haltdos is an AI driven website protection service that secures websites against today's cyber threats.

London Office for Rapid Cybersecurity Advancement (LORCA)

London Office for Rapid Cybersecurity Advancement (LORCA)

LORCA's mission is to support the most promising cyber security innovators in growing solutions to meet the most pressing industry challenges and build the UK’s international cyber security profile.

ePlus

ePlus

ePlus designs and delivers effective, integrated cybersecurity programs centered on culture and technology, aimed at mitigating business risk and empowering digital transformation.

CyberGuru

CyberGuru

CyberGuru is a service provided by CyberSecurity Malaysia specializing in cyber security professional training and development.

Institute of Informatics and Telematics (IIT)

Institute of Informatics and Telematics (IIT)

IIT carries out activities of research, assessment, technology transfer and training in the field of Information and Communication Technologies and of Computational Sciences.

Crypto International

Crypto International

Crypto International offers comprehensive services for the operation of our customers’ IT and communication infrastructure, with a focus on cybersecurity and encryption solutions.

Anvilogic

Anvilogic

Anvilogic provides a unifying experience for security professionals aimed at providing improved visibility, enrichment, and context across hundreds of alerting datasets and security tools.

Policy Monitor

Policy Monitor

Policy Monitor is a cyber security company founded by experts with extensive experience in operational and risk management.

Immunefi

Immunefi

Immunefi provides bug bounty hosting, consultation, and program management services to blockchain and smart contract projects.

Pessimistic Security

Pessimistic Security

The team behind Pessimistic helps blockchain startups meet modern security challenges since 2017.

Troye Computer Systems

Troye Computer Systems

Troye provide a complete range of digital workspace solutions that empower people to do their very best work in a safe and secure manner anywhere, anytime, using any device.

Prikus Tech

Prikus Tech

Prikus is a full-fledged Cyber Security Company helping organizations worldwide to manage cyber risks. We offer Risk & Compliance Services, Security Testing & Managed Security Services.

Information Security Society of Africa – Nigeria (ISSAN)

Information Security Society of Africa – Nigeria (ISSAN)

The Information Security Society of Africa – Nigeria (ISSAN) is a not-for-profit organization dedicated to the protection of Nigeria’s cyberspace.

SECTA5

SECTA5

SECTA5 is a cybersecurity company building a next-generation Continuous Threat and Exposure Management platform, leveraging the expertise of offensively trained cyber defenders.