US Intelligence Has The Evidence That Proves Russian Presidential Election Interference

At the last debate, Donald Trump said that Hillary Clinton “has no idea whether it’s Russia” who hacked into the private networks of her campaign’s allies, then released the information to Wikileaks and the world. “Our country has no idea.”

The cybersecurity community has attributed that attack and leak to FANCY BEAR, a group also known as APT 28.

Without calling out Trump by name, Director of National Intelligence James Clapper said, um, yeah, we do.

Clapper (pictured) cited his office’s Oct. 7 press release. “We wouldn’t have made it unless we were very confident. I’m not going to discuss the underlying evidentiary basis for it, but I can say with confidence, it speaks for itself,” he said.

The statement reads: “The recent disclosures of alleged hacked e-mails on sites like DCLeaks.com and WikiLeaks and by the Guccifer 2.0 online persona are consistent with the methods and motivations of Russian-directed efforts. These thefts and disclosures are intended to interfere with the US election process.”

Clapper also hinted that the intelligence community had more information about the groups than has yet been made public.

“That’s one of the reasons we waited for as long as we did to make the statement, was to ensure that we had sufficient evidence both forensic and otherwise, to reach the conclusion we reached as articulated in the statement. I don’t think I need to say anything more about it, other than the fact the statement speaks for itself. It was mainly addressed to the American electorate, not to any foreign nation-state.”

The Office of the Director of National Intelligence collects and coordinates for the President the information and analysis from the 17 agencies that make up US national intelligence collection.

Speaking at an American Enterprise Institute event on 19th October, the NSA’s Curt Dukes said that the US Cyber Command was the leading investigatory agency.

“I would be remiss. It was US Cyber Command, with support from the information assurance directorate” said Dukes, NSA’s deputy national Manager for National Security Systems. “US Cyber command led the activity. I can’t get into who the actors are.”

DefenseOne:

« US Banks Face New Demands To Protect Themselves From Hackers
British Military Is Using Cyber Warfare Against Islamic State »

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 4,000+ specialist service providers.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

WEBINAR: How to improve security visibility and detection-response operations in AWS

WEBINAR: How to improve security visibility and detection-response operations in AWS

Thursday 30 January 2020: Join SANS and AWS Marketplace to learn how you can reduce noise from security alerts and prioritize incidents more effectively.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Go Cyber

Go Cyber

Go Cyber is a new, highly innovative cyber security training app that uses action based learning to significantly improve the online behaviour of all employees in less than a month.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Mako Group

Mako Group

The Mako Group specializes in protection - providing security through auditing, testing, and assessments. And, we do it all with the highest quality standards possible.

Cybercrowd

Cybercrowd

Cybercrowd is a cyber security specialist offering technical services, cyber security assessments, guidance and security thought leadership.

DocAuthority

DocAuthority

DocAuthority automatically discovers and accurately identifies unprotected, sensitive documents, enabling a broad yet business-friendly security policy.

BEAM Teknoloji

BEAM Teknoloji

BEAM Technology is an independent Software Quality and Security Testing Center in Turkey.

Kickstart

Kickstart

Kickstart supports your startup in scaling deep technology businesses in Switzerland in areas such as AI, Blockchain and Cybersecurity.