Mueller Reports On Russian Interference

Moscow's interference in the 2016 election, was unequivocal and emphatic and Mueller says that Russia had used "sophisticated cyber techniques" like hacking computer networks, email accounts.

And posing as Americans on social media they had "launched a concerted attack on our political system."

The Mueller report says that the Russian governments interference in the 2016 US Presidential election was significant, ‘sweeping and systematic’.

Also in 2016 the Democratic National Committee and its cyber team said that Russian hackers had invaded and influenced its computer systems.

It can now be read on-line, in two parts and is 448 pages in total.

The first part of the Report explains Russian interference in the 2016 election and its connections with the Trump campaign.

And the second part discusses the President’s actions concerning the FBI’s investigations of Russian influence in the 2016 elections.

The Internet Research Agency (IRA), based in St. Petersburg, which is said to be funded by President Putin, designed a social media campaign to provoke and use information warfare to disparage the Clinton campaign and to help and favour Trump’s campaign.

Robert Mueller’s report represents a thorough, insightful and professional analysis of Russia’s interference with the 2016 presidential election.

However, it was never intended to present the final word on whether President Donald Trump, his campaign aides and executive officials in the Trump administration engaged in illegal and criminal activities. The report marks an important but distinctly partial step.

As made clear in the introduction to Volume 1: “A statement that the investigation did not establish particular facts does not mean there was no evidence of those facts.”

New information will shed further light on whether Trump and other individuals pursued activities that placed their financial and political ambitions over the national interest and the need to protect our constitutional system.

The report provides extensive detail on what is called the Trump Moscow project. Between approximately Oct. 13, 2015, and Nov. 2, 2015, the Trump Organisation, through its subsidiary Trump Acquisitions, completed a letter of intent for a Trump Moscow property.

Signed by Trump for the Trump Organisation, the letter was “intended to facilitate further discussions” in order to reach a mutually acceptable agreement.

The letter contemplated an extensive development with residential, hotel, commercial and office components, calling for approximately 150 first class, luxury residential condominiums as well as one first class, luxury hotel consisting of approximately 15 floors and containing no fewer than 150 hotel rooms.

The Mueller report states that Michael Cohen recalled that both he and Trump wanted the Moscow project “to succeed and that Trump never discouraged him from working on the project because of the campaign.”

The Trump Organisation “stood to earn substantial sums over the lifetime of the project, without assuming significant liabilities or financing commitments.” To Cohen, the Trump Tower Moscow “was potentially a $1 trillion deal.”

The report states that Cohen remembered that Trump would be willing to travel to Russia if Cohen could “lock and load” the deal. Despite efforts by both sides, the Moscow project was eventually cancelled.

The report notes that Trump responded to questions about possible connections to Russia “by denying any business involvement in Russia, even though the Trump Organisation had pursued a business project in Russia as late as June 2016.”

Mueller said, Wednesday 29th of May, that he is "resigning from the Department of Justice and returning to private life."

Law.com:      DocumentCloud:

You Might Also Read:

The Mueller Investigation Identifies Russian Spies

« Data Analytics Is Changing The Insurance Industry
Jamie Bartlett: Tech Will Change Us »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZDL Group

ZDL Group

At ZDL (formerly ZeroDayLab) we take a comprehensive view of our clients cyber security risks and provide quality services to address those risk

KnowBe4

KnowBe4

KnowBe4 is an integrated platform for security awareness training combined with simulated phishing attacks.

Core Security

Core Security

Core Security provides threat-aware identity, access, authentication and vulnerability management solutions.

Oneconsult

Oneconsult

Oneconsult provides cyber security services focusing on penetration tests / ethical hacking, ISO 27001 security audits and incident response & IT forensics.

SKKU Security Lab (seclab)

SKKU Security Lab (seclab)

SKKU Security Lab supports research and education in information security engineering. The lab is a part of the College of Software, Sungkyunkwan University.

ADL Process

ADL Process

ADL Process offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institutions.

Crypsis

Crypsis

Crypsis was built based on a shared vision of creating a more secure digital world by providing the highest quality incident response, risk management, and digital forensic services.

Visible Statement

Visible Statement

Visible Statement is a computer-based delivery system designed to insure the retention and recall of your most important security training messages.

AirEye

AirEye

AirEye is a leader in Network Airspace Protection (NAP). Block attacks against your corporate network launched from wireless devices in your corporate network airspace.

Technivorus Technology

Technivorus Technology

Technivorus is a deep-tech firm delivering customized Cybersecurity, Digital Marketing, Web & App Development, and multifarious IT services for businesses across the globe.

N2K Networks

N2K Networks

N2K Networks is the world’s first “news to knowledge” network. The news to knowledge network is how you stay at the cutting edge in a rapidly changing world.

PointWire

PointWire

PointWire offers a range of cybersecurity solutions and services including Penetration Testing on various levels, as well as Intrusion Detection and Prevention Systems.

Fletch

Fletch

Fletch’s AI tracks the evolving cybersecurity threat landscape by reading and interpreting every threat article every day and matching those threats to a company’s exposure.

Unified Solutions

Unified Solutions

Unified Solutions provide a full continuum of cyber security services, compliance, and technology solutions.

iOT365

iOT365

iOT365 is the first-of-its-kind SAAS platform dedicated exclusively to Operational Technology (OT) security.

Intech Security

Intech Security

Intech Security provides expert cybersecurity services, including Cyber Essentials, to protect UK businesses from digital threats and ensure compliance.