Obama Orders ‘Deep Dive’ Into Election Hacking

The White House has requested the Office of the Director of National Intelligence to present a full review of the cyber and espionage activity aimed at United States elections, going back to 2008.

“This is something the president wants done under his watch,” Deputy Press Secretary Eric Schultz told reporters at the White House recently.

The probe will not be specifically focused on Russia. For example, experts have blamed China for election hacks in 2008 against the Obama and McCain campaigns. However, the intelligence community’s assertion that Kremlin-backed actors led hacking activities against the most recent election would be included in the review.

“This will be a deep dive,” Schultz said. But he added that the effort was “not an effort to challenge the outcome of the election” and would not call into question the election results. “This will be a challenge for the next administration.”

The announcement comes after lawmakers across party lines called for more information to be made public about Kremlin-backed activities aimed at destabilising the United States presidential election.

John McCain, Chairman of the Senate Committee on Armed Services, Lindsey Graham, Charles E. Schumer, Senate Democratic Leader-elect, and Jack Reed, Ranking Member of the Senate Committee on Armed Services said that they would press ahead with hearings. 

“This cannot become a partisan issue. The stakes are too high for our country. We are committed to working in this bipartisan manner, and we will seek to unify our colleagues around the goal of investigating and stopping the grave threats that cyberattacks conducted by foreign governments pose to our national security,” they wrote in a statement.

“Congress’s national security committees have worked diligently to address the complex challenge of cybersecurity, but recent events show that more must be done.  While protecting classified material, we have an obligation to inform the public about recent cyberattacks that have cut to the heart of our free society. Democrats and Republicans must work together, and across the jurisdictional lines of the Congress, to examine these recent incidents thoroughly and devise comprehensive solutions to deter and defend against further cyberattacks.

Democrats and independents on the Senate Intelligence Committee, led by Ron Wyden, recently sent a letter to the president, saying, “We believe there is additional information concerning the Russian Government and the US election that should be declassified and released to the public. We are conveying specifics through classified channels.”

In a separate statement, Sen. Mark Warner, said, “Interference in America’s democracy and our electoral process by any outside power is unacceptable. I commend the President for undertaking a comprehensive review of meddling in the election by Russia. Similarly, I strongly believe Congress must play a proactive role in this investigation.”

And in an implicit reply to president-elect Donald Trump, who once again rejected the consensus view that Russia meddled in the election he won, Warner added, “As the incoming Vice Chairman of the Senate Select Committee on Intelligence, I know that one of the primary missions of the intelligence professionals in this country is to render their best professional judgment, regardless of political considerations.”

In the House of Represenetaives, Democrats pushed legislation that called for a formal probe. The effort was led by Rep. Adam Schiff,  “We are deeply concerned by Russian efforts to undermine, interfere with and even influence the outcome of our recent election,” Schiff said in a letter.

Schultz said that the review was unrelated to Congressional pressure. “We’ve received requests from Congress for briefings on this. We’ve been briefing them on this. We’re happy to go through the process to figure out” if more material can be declassified, he said.

Recently The Washington Post published a bombshell report stating that intelligence agencies had discovered the names of actual agents involved in the transfer of stolen emails to Wikileaks. 

DefenseOne:                  Putin Personally Interfered With The US Election:
 

 

« Putin Personally Interfered With The US Election
Yahoo Hack Affects 1 Billion Accounts »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Snort

Snort

Snort is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.

ATSEC Information Security

ATSEC Information Security

ATSEC is an independent, privately-owned company that focuses on providing laboratory and consulting services for information security.

CANVAS Consortium

CANVAS Consortium

The CANVAS Consortium aims to unify technology developers with legal and ethical scholar and social scientists to approach the challenges of cybersecurity.

PerimeterX

PerimeterX

PerimeterX is the leading provider of solutions that secure digital businesses against automated fraud and client-side attacks.

Galvanize

Galvanize

Galvanize is a leading provider of award-winning, cloud-based security, risk management, compliance, and audit software for some of the world’s largest organizations.

SCIS Security

SCIS Security

SCIS Security provides affordable cyber security services and solutions to small to medium sized businesses and homes.

PROOF

PROOF

PROOF is a Brazilian leader in cybersecurity. Our goal is to assist our Customers in managing security efficiently and in tune with business needs.

ThreatSwitch

ThreatSwitch

ThreatSwitch a software platform for cleared federal contractors to get and stay compliant with NISPOM and Conforming Change 2.

Cloud & Cyber Security Expo

Cloud & Cyber Security Expo

Cloud & Cyber Security Expo is the UK’s largest cloud and cyber security event.

Avertro

Avertro

Avertro helps leaders manage the business of cyber. We help explain cybersecurity to executives, forecasting outcomes, right-sizing your spend, and validating your cyber strategy.

Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is a leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security.

Third Point Ventures

Third Point Ventures

Third Point brings deep technical expertise, a strong network of relationships, and decades of investing experience to add value to our partners throughout their journey from idea to IPO and beyond.

Sitehop

Sitehop

Sitehop is a cybersecurity technology company developing and supplying FPGA hardware-enforced cyber security solutions for networks.

Esprinet

Esprinet

The Esprinet Group is an enabler of the technology ecosystem: a team of people who promote access to technology through an extensive network of professional resellers.

C2 Risk

C2 Risk

C2 Risk are focussed on risk analytics for information assurance, privacy and ESG (Environmental, Social, and Governance).

Simbian

Simbian

Simbian, with its hardened TrustedLLM system, is the first to accelerate security by empowering every member of a security team from the C-Suite to frontline practitioners.