US Intelligence Has The Evidence That Proves Russian Presidential Election Interference

At the last debate, Donald Trump said that Hillary Clinton “has no idea whether it’s Russia” who hacked into the private networks of her campaign’s allies, then released the information to Wikileaks and the world. “Our country has no idea.”

The cybersecurity community has attributed that attack and leak to FANCY BEAR, a group also known as APT 28.

Without calling out Trump by name, Director of National Intelligence James Clapper said, um, yeah, we do.

Clapper (pictured) cited his office’s Oct. 7 press release. “We wouldn’t have made it unless we were very confident. I’m not going to discuss the underlying evidentiary basis for it, but I can say with confidence, it speaks for itself,” he said.

The statement reads: “The recent disclosures of alleged hacked e-mails on sites like DCLeaks.com and WikiLeaks and by the Guccifer 2.0 online persona are consistent with the methods and motivations of Russian-directed efforts. These thefts and disclosures are intended to interfere with the US election process.”

Clapper also hinted that the intelligence community had more information about the groups than has yet been made public.

“That’s one of the reasons we waited for as long as we did to make the statement, was to ensure that we had sufficient evidence both forensic and otherwise, to reach the conclusion we reached as articulated in the statement. I don’t think I need to say anything more about it, other than the fact the statement speaks for itself. It was mainly addressed to the American electorate, not to any foreign nation-state.”

The Office of the Director of National Intelligence collects and coordinates for the President the information and analysis from the 17 agencies that make up US national intelligence collection.

Speaking at an American Enterprise Institute event on 19th October, the NSA’s Curt Dukes said that the US Cyber Command was the leading investigatory agency.

“I would be remiss. It was US Cyber Command, with support from the information assurance directorate” said Dukes, NSA’s deputy national Manager for National Security Systems. “US Cyber command led the activity. I can’t get into who the actors are.”

DefenseOne:

« US Banks Face New Demands To Protect Themselves From Hackers
British Military Is Using Cyber Warfare Against Islamic State »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IDpendant

IDpendant

IDpendant offers a wide range of services, including authentication technology, client security products, single sign on systems, encryption solutions, card and mobile device management systems.

Intensity Analytics

Intensity Analytics

Intensity Analytics is a software firm that develops next-generation, physical user and entity behavioral authentication ("physical UEBA") security software technology.

ITC Secure Networking

ITC Secure Networking

ITC are a leading cloud-based MSSP delivering service innovation in cyber security analytics & cloud technology.

Intertrust Technologies

Intertrust Technologies

Intertrust Technologies is a software company specializing in trusted computing products and services.

Tech Mahindra

Tech Mahindra

Tech Mahindra is a global leader in IT solutions, BPO, business consulting services & digital technologies.

DANAK

DANAK

DANAK is the national accreditation body for Denmark. The directory of members provides details of organisations offering certification services for ISO 27001.

Palantir

Palantir

Palantir software empowers entire organizations to answer complex questions quickly by bringing the right data to the people who need it.

Sharktech

Sharktech

Sharktech designs, develops, and supports advanced DDoS protection and web technologies.

Cybergroot

Cybergroot

Cybergroot provides Cybersecurity Assessment services and professional Information Security trainings.

TPx Communications

TPx Communications

TPx is a leading managed services provider offering a full suite of managed IT, unified communications, network connectivity and security services.

Stryve

Stryve

Stryve is a leading carbon-neutral provider of specialist cloud and cybersecurity services in Europe.

Security Discovery

Security Discovery

Stay ahead of cyber threats with Security Discovery. We offer expert consulting, comprehensive services, and a powerful vulnerability monitoring SaaS platform.

BBS Technology

BBS Technology

BBS Technology is a company that develops and delivers next-generation cyber security technologies worldwide.

Driven Technologies

Driven Technologies

Driven is a cloud native service provider transforming the way companies leverage technology to improve business by securing, modernizing, and connecting applications, users, and data.

UberEther

UberEther

UberEther are a dedicated group of software developers and consultants developing and deploying the next generation of identity management and cloud solutions.

NetAlly

NetAlly

NetAlly network test solutions help engineers and technicians better deploy, manage, maintain, and secure today’s complex wired and wireless networks.