Both US Presidential Campaigns Hacked

The US intelligence chief say cyber-hackers working for foreign governments are targeting the candidates in this year's presidential election.

James Clapper, director of the Office of National Intelligence, said he expects more attempted hacks as the campaigns intensify. This would follow a pattern established in the last two presidential elections. The FBI is working with the campaigns to make their networks more secure.

The Department of Homeland Security is also assisting, but cyber-security experts said political campaigns have not done much to improve their defences since 2008.

Hacking was widespread during the 2008 election cycle. The Office of National Intelligence described its scale as "like no other" in a report released earlier this month. 

V Newtown Miller, a data security consultant advising government agencies, said the hackers' attempts could have a huge effect on presidential politics. "It's a matter of when and how serious of an impact it is going to have on this election," said Mr. Miller, who believes these foreign hackers attempt to extract sensitive information, rather than commit cyber vandalism.

If a hacker is able to reveal embarrassing information about a candidate, it could sway how people vote in the election. But simply taking down a candidate’s website for a few hours could also have an effect, as it limits the campaign's ability to online fundraise, as happened to Mitt Romney in 2012 for several hours.

The global hacking collective, Anonymous, declared a cyber war against Republican candidate Donald Trump several weeks ago. They are encouraging their members to target Mr. Trump's business interests as well as his campaign resources.

In 2008, hackers thought to be working for the Chinese government obtained a letter by Senator John McCain expressing support for Taiwan. A Chinese diplomat called the McCain campaign to complain about the letter before it had been sent.

Former Secretary of State Hillary Clinton has drawn criticism for operating a private email server during her time as the nation's top diplomat. She is being investigated by the FBI to determine whether classified information was sent through the unsecured server.

James Clapper has not had to officially answer for apparent perjury. It has been 1165 days since James Clapper according to Snowden lied to Congress and the American people.

On March 12th, 2013, during a United States Senate Select Committee on Intelligence hearing, Senator Ron Wyden asked Director of National Intelligence James R. Clapper the following question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?"

Director Clapper responded "No, sir."
Incredulously, Senator Wyden asked "It does not?"
Director Clapper responded "Not wittingly. There are cases where they could inadvertently perhaps collect, but not wittingly."

Now US lawmakers are pressing the nation’s top intelligence official to estimate the number of Americans ensnared in email surveillance and other such spying on foreign targets, saying the information was needed to gauge possible reforms to the controversial programs. They requested that Clapper provide the information about data collected under a statute, known as Section 702, by May.

That law, set to expire at the end of 2017, enables an internet surveillance program called Prism that was first disclosed in a series of leaks by former National Security Agency contractor Edward Snowden some three years ago.

Prism gathers messaging data from Alphabet’s Google, Facebook, Microsoft, Apple and other major tech companies that is sent to and from a foreign target under surveillance. Intelligence officials say data about Americans are “incidentally” collected during communication with a target reasonably believed to be living overseas. Critics see it as “back-door” surveillance on Americans without a warrant.

A recently declassified November opinion from the US Foreign Intelligence Surveillance Court, a secretive body that oversees the legality of US spy programs, rejected a constitutional challenge to rules permitting the FBI to access foreign intelligence data for use in domestic criminal investigations.

The Republican-controlled House of Represenatives has voted overwhelmingly since the Snowden leaks to require US agencies obtain a warrant before searching collected foreign intelligence for data belonging to Americans, but those proposals have gained minimal traction in the Senate.

BBC:       HasJamesClapperBeenIndictedyet:      Guardian

« March Of The Machines
Open Access To The Snowden Archive »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Subgraph

Subgraph

Subgraph is an open source security company, committed to making secure and usable open source computing available to everyone.

Network Box

Network Box

Network Box is one of the world's leading Managed Security Service Providers.

Department of Justice - Office of Cybercrime (DOJ-OOC)

Department of Justice - Office of Cybercrime (DOJ-OOC)

The Office of Cybercrime within the Philippines Department of Justice is the Central Authority in all matters relating to international mutual assistance and extradition for cybercrime.

Absio

Absio

Absio provides the technology you need to build data security directly into your software by default, and the design and development services you need to make it happen.

US Venture Partners (USVP)

US Venture Partners (USVP)

USVP is a leading Silicon Valley venture capital firm focusing on early-stage start-ups that transform cybersecurity, enterprise software, consumer mobile and e-commerce, and healthcare.

New Enterprise Associates (NEA)

New Enterprise Associates (NEA)

As one of the world’s largest and most active venture capital firms, NEA has developed deep domain expertise and insight into our industries of focus - technology and healthcare.

Automox

Automox

Remediate vulnerabilities 30X faster than the industry norm – and dramatically reduce your risk with simple, fast, and cloud-native endpoint hardening from Automox.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

1Kosmos

1Kosmos

1Kosmos provide Digital Identity and Passwordless Authentication for workforce and customers. Powered by advanced biometrics and blockchain technology.

Netlinkz

Netlinkz

Netlinkz has developed the Virtual Secure Network (VSN) overlay technology platform, a breakthrough in connectivity security, speed, and simplicity.

Allentis

Allentis

Allentis provide adapted solutions to ensure the security and performance of your information system.

PhishFirewall

PhishFirewall

PhishFirewall is an advanced AI-driven CyberSecurity Awareness Education, Threat Emulation, and Human Security Analytics Platform.

Difenda

Difenda

Difenda Shield is a fully integrated and modular cybersecurity suite that gives your organization the agility it needs to implement a world-class cybersecurity system.

ThreatFabric

ThreatFabric

ThreatFabric integrates industry-leading threat intel, behavioral analytics, advanced device fingerprinting and over 10.000 adaptive fraud indicators.

Ionize

Ionize

Ionize offers solutions to help you uplift your capability across the full-spectrum of cyber security - assessment, remediation, monitoring, governance and ongoing education.

Boldend

Boldend

Boldend offers leading-edge offensive and defensive cybersecurity solutions that empower government and commercial organizations to stay resilient in an evolving threat landscape.