US Intelligence Has The Evidence That Proves Russian Presidential Election Interference

At the last debate, Donald Trump said that Hillary Clinton “has no idea whether it’s Russia” who hacked into the private networks of her campaign’s allies, then released the information to Wikileaks and the world. “Our country has no idea.”

The cybersecurity community has attributed that attack and leak to FANCY BEAR, a group also known as APT 28.

Without calling out Trump by name, Director of National Intelligence James Clapper said, um, yeah, we do.

Clapper (pictured) cited his office’s Oct. 7 press release. “We wouldn’t have made it unless we were very confident. I’m not going to discuss the underlying evidentiary basis for it, but I can say with confidence, it speaks for itself,” he said.

The statement reads: “The recent disclosures of alleged hacked e-mails on sites like DCLeaks.com and WikiLeaks and by the Guccifer 2.0 online persona are consistent with the methods and motivations of Russian-directed efforts. These thefts and disclosures are intended to interfere with the US election process.”

Clapper also hinted that the intelligence community had more information about the groups than has yet been made public.

“That’s one of the reasons we waited for as long as we did to make the statement, was to ensure that we had sufficient evidence both forensic and otherwise, to reach the conclusion we reached as articulated in the statement. I don’t think I need to say anything more about it, other than the fact the statement speaks for itself. It was mainly addressed to the American electorate, not to any foreign nation-state.”

The Office of the Director of National Intelligence collects and coordinates for the President the information and analysis from the 17 agencies that make up US national intelligence collection.

Speaking at an American Enterprise Institute event on 19th October, the NSA’s Curt Dukes said that the US Cyber Command was the leading investigatory agency.

“I would be remiss. It was US Cyber Command, with support from the information assurance directorate” said Dukes, NSA’s deputy national Manager for National Security Systems. “US Cyber command led the activity. I can’t get into who the actors are.”

DefenseOne:

« US Banks Face New Demands To Protect Themselves From Hackers
British Military Is Using Cyber Warfare Against Islamic State »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

American International Group (AIG)

American International Group (AIG)

AIG, is an American multinational insurance corporation. Commercial services include cyber risk insurance.

Ridgeback Network Defense

Ridgeback Network Defense

Ridgeback is an enterprise security software platform that defeats malicious network invasion in real time. Ridgeback champions the idea that to defeat an enemy you must engage them.

Crossword Cybersecurity

Crossword Cybersecurity

We work with research intensive European university partners to identify promising cyber security intellectual property from research that meets emerging real-world challenges.

FedRAMP

FedRAMP

FedRAMP, is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.

Sompo International

Sompo International

Sompo International is a global specialty provider of property and casualty insurance and reinsurance services including Cyber & Network Risk.

BI.ZONE

BI.ZONE

BI.ZONE creates high-tech products and solutions to protect IT infrastructures and applications, and provides services from cyber intelligence and proactive defence to cybercrime investigation.

Liberty Mutual

Liberty Mutual

Liberty Specialty Markets offers specialty and commercial insurance and reinsurance products, including Cyber, across the USA, Europe, Middle East and other international locations.

Seknox

Seknox

Seknox TRASA™ protects your business from insider threats.

SDG Corp

SDG Corp

SDG is a global cybersecurity, identity governance, risk consulting and advisory firm, addressing complex security, compliance and technology needs.

Alertot

Alertot

Hackers attack minutes after a new vulnerability is published. Alertot helps to decrease exposure time in organizations by notifying new issues when they are disclosed.

Qrypt

Qrypt

Qrypt has developed the only cryptographic solution capable of securing information indefinitely with mathematical proof as evidence.

Infuse Technology

Infuse Technology

Infuse Technology provide the highest level of cybersecurity support, implementing practical solutions to protect against cyber-attacks, from simple phishing scams to complex data security breaches.

HiddenLayer

HiddenLayer

HiddenLayer is a provider of security solutions for machine learning algorithms, models and the data that power them.

Global Resilience Federation (GRF)

Global Resilience Federation (GRF)

GRF builds, develops and connects security information sharing communities for mutual defense.

DART Consulting & Training

DART Consulting & Training

DART is a leading cyber training and consultancy company. We enhance our clients’ cyber capabilities by growing and strengthening their frontline defense – the cyber teams.