Obama Orders ‘Deep Dive’ Into Election Hacking

The White House has requested the Office of the Director of National Intelligence to present a full review of the cyber and espionage activity aimed at United States elections, going back to 2008.

“This is something the president wants done under his watch,” Deputy Press Secretary Eric Schultz told reporters at the White House recently.

The probe will not be specifically focused on Russia. For example, experts have blamed China for election hacks in 2008 against the Obama and McCain campaigns. However, the intelligence community’s assertion that Kremlin-backed actors led hacking activities against the most recent election would be included in the review.

“This will be a deep dive,” Schultz said. But he added that the effort was “not an effort to challenge the outcome of the election” and would not call into question the election results. “This will be a challenge for the next administration.”

The announcement comes after lawmakers across party lines called for more information to be made public about Kremlin-backed activities aimed at destabilising the United States presidential election.

John McCain, Chairman of the Senate Committee on Armed Services, Lindsey Graham, Charles E. Schumer, Senate Democratic Leader-elect, and Jack Reed, Ranking Member of the Senate Committee on Armed Services said that they would press ahead with hearings. 

“This cannot become a partisan issue. The stakes are too high for our country. We are committed to working in this bipartisan manner, and we will seek to unify our colleagues around the goal of investigating and stopping the grave threats that cyberattacks conducted by foreign governments pose to our national security,” they wrote in a statement.

“Congress’s national security committees have worked diligently to address the complex challenge of cybersecurity, but recent events show that more must be done.  While protecting classified material, we have an obligation to inform the public about recent cyberattacks that have cut to the heart of our free society. Democrats and Republicans must work together, and across the jurisdictional lines of the Congress, to examine these recent incidents thoroughly and devise comprehensive solutions to deter and defend against further cyberattacks.

Democrats and independents on the Senate Intelligence Committee, led by Ron Wyden, recently sent a letter to the president, saying, “We believe there is additional information concerning the Russian Government and the US election that should be declassified and released to the public. We are conveying specifics through classified channels.”

In a separate statement, Sen. Mark Warner, said, “Interference in America’s democracy and our electoral process by any outside power is unacceptable. I commend the President for undertaking a comprehensive review of meddling in the election by Russia. Similarly, I strongly believe Congress must play a proactive role in this investigation.”

And in an implicit reply to president-elect Donald Trump, who once again rejected the consensus view that Russia meddled in the election he won, Warner added, “As the incoming Vice Chairman of the Senate Select Committee on Intelligence, I know that one of the primary missions of the intelligence professionals in this country is to render their best professional judgment, regardless of political considerations.”

In the House of Represenetaives, Democrats pushed legislation that called for a formal probe. The effort was led by Rep. Adam Schiff,  “We are deeply concerned by Russian efforts to undermine, interfere with and even influence the outcome of our recent election,” Schiff said in a letter.

Schultz said that the review was unrelated to Congressional pressure. “We’ve received requests from Congress for briefings on this. We’ve been briefing them on this. We’re happy to go through the process to figure out” if more material can be declassified, he said.

Recently The Washington Post published a bombshell report stating that intelligence agencies had discovered the names of actual agents involved in the transfer of stolen emails to Wikileaks. 

DefenseOne:                  Putin Personally Interfered With The US Election:
 

 

« Putin Personally Interfered With The US Election
Yahoo Hack Affects 1 Billion Accounts »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

SSH Communications Security

SSH Communications Security

SSH Communications Security is a leading provider of enterprise cybersecurity solutions for controlling trusted access to information systems and data.

Continuity Shop

Continuity Shop

Continuity Shop provides training and consultancy in Business Continuity and Information Security to some of the world's biggest organisations.

Okta

Okta

Okta is an enterprise-grade identity management service, built from the ground up in the cloud to address the challenges of a cloud-mobile-interconnected world.

Agenci

Agenci

Agenci are specialists in cyber security and information security and deliver ISO 27001 Certification.

MAY Cyber Technology

MAY Cyber Technology

MAY Cyber Technology is a Security Management solutions provider located in Turkey & Germany.

Center for Education & Research in Information Assurance & Security (CERIAS)

Center for Education & Research in Information Assurance & Security (CERIAS)

CERIAS is one of the world’s leading centers for research and education in areas of information and cyber security.

Cypherix

Cypherix

Cypherix is tightly focused on cryptography and data security. We leverage our expertise to deliver state-of-the-art, world-class encryption software packages.

WebSec

WebSec

WebSec is a cybersecurity firm based in Amsterdam (NL) and Wyoming (US), specializing in offensive security services including penetration testing, red teaming, and tailored security assessments.

Flix11

Flix11

Flix11 is a Cyber Security & ICT Solutions focused company. We provide a range of products and services in Cyber Security, Internet of Things (IoT) and infrastructure solutions.

Kordia

Kordia

Kordia is a leading provider of mission-critical technology solutions throughout Australasia. We have the most comprehensive cyber security offering in New Zealand.

Mindaro Insurance

Mindaro Insurance

Mindaro is adding the crucial piece of the cyber security puzzle that protects your organization from the financial ramifications of cyber attacks.

Celera Networks

Celera Networks

Celera Networks is a managed services provider specializing in cybersecurity, cloud and managed IT services.

NSI Global

NSI Global

NSI Global is a specialist Global Risk and Intelligence Advisory Firm that has built a reputation for consistently managing complex projects.

Velum Labs

Velum Labs

Velum Labs is a cyber intelligence company that provides simple and non-intrusive, cloud and cyber intelligence solutions; built from a market-leading understanding of cyber-attack methodology.

Stack Identity

Stack Identity

Stack Identity protects access to cloud data by prioritizing identity and access vulnerabilities via a live data attack map.

Board of Cyber

Board of Cyber

Board of Cyber offers Security Rating: a fast, non-intrusive, continuous, 100% automated solution to evaluate the cyber performance of an organization.