Both US Presidential Campaigns Hacked

The US intelligence chief say cyber-hackers working for foreign governments are targeting the candidates in this year's presidential election.

James Clapper, director of the Office of National Intelligence, said he expects more attempted hacks as the campaigns intensify. This would follow a pattern established in the last two presidential elections. The FBI is working with the campaigns to make their networks more secure.

The Department of Homeland Security is also assisting, but cyber-security experts said political campaigns have not done much to improve their defences since 2008.

Hacking was widespread during the 2008 election cycle. The Office of National Intelligence described its scale as "like no other" in a report released earlier this month. 

V Newtown Miller, a data security consultant advising government agencies, said the hackers' attempts could have a huge effect on presidential politics. "It's a matter of when and how serious of an impact it is going to have on this election," said Mr. Miller, who believes these foreign hackers attempt to extract sensitive information, rather than commit cyber vandalism.

If a hacker is able to reveal embarrassing information about a candidate, it could sway how people vote in the election. But simply taking down a candidate’s website for a few hours could also have an effect, as it limits the campaign's ability to online fundraise, as happened to Mitt Romney in 2012 for several hours.

The global hacking collective, Anonymous, declared a cyber war against Republican candidate Donald Trump several weeks ago. They are encouraging their members to target Mr. Trump's business interests as well as his campaign resources.

In 2008, hackers thought to be working for the Chinese government obtained a letter by Senator John McCain expressing support for Taiwan. A Chinese diplomat called the McCain campaign to complain about the letter before it had been sent.

Former Secretary of State Hillary Clinton has drawn criticism for operating a private email server during her time as the nation's top diplomat. She is being investigated by the FBI to determine whether classified information was sent through the unsecured server.

James Clapper has not had to officially answer for apparent perjury. It has been 1165 days since James Clapper according to Snowden lied to Congress and the American people.

On March 12th, 2013, during a United States Senate Select Committee on Intelligence hearing, Senator Ron Wyden asked Director of National Intelligence James R. Clapper the following question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?"

Director Clapper responded "No, sir."
Incredulously, Senator Wyden asked "It does not?"
Director Clapper responded "Not wittingly. There are cases where they could inadvertently perhaps collect, but not wittingly."

Now US lawmakers are pressing the nation’s top intelligence official to estimate the number of Americans ensnared in email surveillance and other such spying on foreign targets, saying the information was needed to gauge possible reforms to the controversial programs. They requested that Clapper provide the information about data collected under a statute, known as Section 702, by May.

That law, set to expire at the end of 2017, enables an internet surveillance program called Prism that was first disclosed in a series of leaks by former National Security Agency contractor Edward Snowden some three years ago.

Prism gathers messaging data from Alphabet’s Google, Facebook, Microsoft, Apple and other major tech companies that is sent to and from a foreign target under surveillance. Intelligence officials say data about Americans are “incidentally” collected during communication with a target reasonably believed to be living overseas. Critics see it as “back-door” surveillance on Americans without a warrant.

A recently declassified November opinion from the US Foreign Intelligence Surveillance Court, a secretive body that oversees the legality of US spy programs, rejected a constitutional challenge to rules permitting the FBI to access foreign intelligence data for use in domestic criminal investigations.

The Republican-controlled House of Represenatives has voted overwhelmingly since the Snowden leaks to require US agencies obtain a warrant before searching collected foreign intelligence for data belonging to Americans, but those proposals have gained minimal traction in the Senate.

BBC:       HasJamesClapperBeenIndictedyet:      Guardian

« March Of The Machines
Open Access To The Snowden Archive »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Rubicon Workflow Solutions

Rubicon Workflow Solutions

Rubicon is a leading provider of managed IT support and strategic services, specialising in creative and mixed platform environments.

Axiomatics

Axiomatics

Axiomatics provides dynamic authorization and access control solutions to protect critical data assets.

Convercent

Convercent

We offer comprehensive and integrated compliance management, reporting, and analytics. A 360-degree view of compliance drives efficiency by aligning initiatives and data into a single dashboard.

SCIS Security

SCIS Security

SCIS Security provides affordable cyber security services and solutions to small to medium sized businesses and homes.

Secon Cyber Security

Secon Cyber Security

Secon Cyber Security is an Advanced Managed Security Services Provider with long standing experience of providing cyber security solutions to customers ranging from small to large enterprises.

Logic Supply

Logic Supply

Logic Supply is a global industrial PC company focused on hardware for the IoT edge. We design highly-configurable computers engineered for reliability.

Vigilant Software

Vigilant Software

Vigilant Software develops industry-leading tools for intelligent, simplified compliance, including ISO27001-risk management and EU GDPR.

Cryptyk

Cryptyk

CRYPTYK CLOUD is the first complete enterprise-class cloud security solution that includes cloud storage and broad protection against all external and internal threats.

KnectIQ

KnectIQ

Building Trust Environments in a Zero-Trust World. KnectIQ offers KIQAssure, an Ultra High Security Solution for Data in Flight.

Earlybird Venture Capital

Earlybird Venture Capital

Earlybird is a venture capital investor focused on European technology innovators.

Grip Security

Grip Security

Grip Security provides comprehensive visibility, governance and data security to help enterprises effortlessly secure a burgeoning and chaotic SaaS ecosystem.

Strata Identity

Strata Identity

Strata is pioneering identity orchestration to unify on-premises and cloud-based authentication and access systems for consistent identity management in multi-cloud environments.

Irys Technologies

Irys Technologies

Irys Technologies specialize in pioneering digital transformation solutions designed to streamline communications and enhance maintenance and operational efficiency for a variety of sectors.

Trustack

Trustack

Trustack services cover connectivity, infrastructure services, security, unified comms, agile working and more. Our team of consultants deliver customised solutions tailored to your needs.

Boldend

Boldend

Boldend offers leading-edge offensive and defensive cybersecurity solutions that empower government and commercial organizations to stay resilient in an evolving threat landscape.

Neo Auth

Neo Auth

Neo Auth is an identity and access management solution to help organizations optimize their cybersecurity processes.