Both US Presidential Campaigns Hacked

The US intelligence chief say cyber-hackers working for foreign governments are targeting the candidates in this year's presidential election.

James Clapper, director of the Office of National Intelligence, said he expects more attempted hacks as the campaigns intensify. This would follow a pattern established in the last two presidential elections. The FBI is working with the campaigns to make their networks more secure.

The Department of Homeland Security is also assisting, but cyber-security experts said political campaigns have not done much to improve their defences since 2008.

Hacking was widespread during the 2008 election cycle. The Office of National Intelligence described its scale as "like no other" in a report released earlier this month. 

V Newtown Miller, a data security consultant advising government agencies, said the hackers' attempts could have a huge effect on presidential politics. "It's a matter of when and how serious of an impact it is going to have on this election," said Mr. Miller, who believes these foreign hackers attempt to extract sensitive information, rather than commit cyber vandalism.

If a hacker is able to reveal embarrassing information about a candidate, it could sway how people vote in the election. But simply taking down a candidate’s website for a few hours could also have an effect, as it limits the campaign's ability to online fundraise, as happened to Mitt Romney in 2012 for several hours.

The global hacking collective, Anonymous, declared a cyber war against Republican candidate Donald Trump several weeks ago. They are encouraging their members to target Mr. Trump's business interests as well as his campaign resources.

In 2008, hackers thought to be working for the Chinese government obtained a letter by Senator John McCain expressing support for Taiwan. A Chinese diplomat called the McCain campaign to complain about the letter before it had been sent.

Former Secretary of State Hillary Clinton has drawn criticism for operating a private email server during her time as the nation's top diplomat. She is being investigated by the FBI to determine whether classified information was sent through the unsecured server.

James Clapper has not had to officially answer for apparent perjury. It has been 1165 days since James Clapper according to Snowden lied to Congress and the American people.

On March 12th, 2013, during a United States Senate Select Committee on Intelligence hearing, Senator Ron Wyden asked Director of National Intelligence James R. Clapper the following question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?"

Director Clapper responded "No, sir."
Incredulously, Senator Wyden asked "It does not?"
Director Clapper responded "Not wittingly. There are cases where they could inadvertently perhaps collect, but not wittingly."

Now US lawmakers are pressing the nation’s top intelligence official to estimate the number of Americans ensnared in email surveillance and other such spying on foreign targets, saying the information was needed to gauge possible reforms to the controversial programs. They requested that Clapper provide the information about data collected under a statute, known as Section 702, by May.

That law, set to expire at the end of 2017, enables an internet surveillance program called Prism that was first disclosed in a series of leaks by former National Security Agency contractor Edward Snowden some three years ago.

Prism gathers messaging data from Alphabet’s Google, Facebook, Microsoft, Apple and other major tech companies that is sent to and from a foreign target under surveillance. Intelligence officials say data about Americans are “incidentally” collected during communication with a target reasonably believed to be living overseas. Critics see it as “back-door” surveillance on Americans without a warrant.

A recently declassified November opinion from the US Foreign Intelligence Surveillance Court, a secretive body that oversees the legality of US spy programs, rejected a constitutional challenge to rules permitting the FBI to access foreign intelligence data for use in domestic criminal investigations.

The Republican-controlled House of Represenatives has voted overwhelmingly since the Snowden leaks to require US agencies obtain a warrant before searching collected foreign intelligence for data belonging to Americans, but those proposals have gained minimal traction in the Senate.

BBC:       HasJamesClapperBeenIndictedyet:      Guardian

« March Of The Machines
Open Access To The Snowden Archive »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Finnish Information Security Cluster (FISC)

Finnish Information Security Cluster (FISC)

FISC is an organization established by major Finnish information security companies to promote their activities nationally and internationally.

CyberDef

CyberDef

CyberDef is a consulting company specialising in cyber defence services for small and medium enterprises.

AGAT Software

AGAT Software

AGAT Software is an innovative security provider specializing in external access authentication and data protection solutions.

SEC Consult

SEC Consult

SEC Consult is a leading European consultancy for application security services and information security.

Greenwave Systems

Greenwave Systems

Greenwave's AXON Platform enables IoT and M2M network service providers to address security, interoperability, flexibility and scalability from a single IoT platform.

International Accreditation Forum (IAF)

International Accreditation Forum (IAF)

The IAF is the world association of Conformity Assessment Accreditation Bodies. Its primary function is to develop a single worldwide programme of conformity assessment.

Vigilant Software

Vigilant Software

Vigilant Software develops industry-leading tools for intelligent, simplified compliance, including ISO27001-risk management and EU GDPR.

Infosec Partners

Infosec Partners

Whether you’re looking for complete managed security or an on-call expert advisor, we offer a range of managed security services to complement your internal team or primary outsource partner.

WebSec

WebSec

WebSec is a cybersecurity firm based in Amsterdam (NL) and Wyoming (US), specializing in offensive security services including penetration testing, red teaming, and tailored security assessments.

Ethyca

Ethyca

Ethyca builds automated data privacy infrastructure and tools for developers and privacy teams to easily build products that comply with GDPR, CCPA Privacy Regulations.

GovernmentCIO

GovernmentCIO

GovernmentCIO was founded with a single purpose: to transform government IT. We are thought leaders in data analytics, machine learning, cybersecurity and IT transformation.

Fenix24

Fenix24

Fenix24 is an industry leader in the incident-response space. We ensure the fastest response, leading to the full restoration of critical infrastructure, data, and systems.

Polestar Industrial IT

Polestar Industrial IT

Polestar work on both sides of the IT & OT divide. Network, Data & Asset Security is our priority. Polestar installations are robust and resilient and comply with the appropriate security.

Orca Technology

Orca Technology

Orca is a UK-based Managed Service Provider delivering end-to-end managed IT services, support, hosted desktop, cloud solutions and strategic guidance.

ITButler e-Services

ITButler e-Services

At IT Butler, our mission is crystal clear: we are dedicated to providing top-tier cybersecurity solutions and best-practice methodologies to secure and enhance your digital infrastructure’s resilienc

Nova Microsystems

Nova Microsystems

Nova's mission is to revolutionize cybersecurity through continuous data analysis and dynamic AI-driven encryption.