Mueller Reports On Russian Interference

Moscow's interference in the 2016 election, was unequivocal and emphatic and Mueller says that Russia had used "sophisticated cyber techniques" like hacking computer networks, email accounts.

And posing as Americans on social media they had "launched a concerted attack on our political system."

The Mueller report says that the Russian governments interference in the 2016 US Presidential election was significant, ‘sweeping and systematic’.

Also in 2016 the Democratic National Committee and its cyber team said that Russian hackers had invaded and influenced its computer systems.

It can now be read on-line, in two parts and is 448 pages in total.

The first part of the Report explains Russian interference in the 2016 election and its connections with the Trump campaign.

And the second part discusses the President’s actions concerning the FBI’s investigations of Russian influence in the 2016 elections.

The Internet Research Agency (IRA), based in St. Petersburg, which is said to be funded by President Putin, designed a social media campaign to provoke and use information warfare to disparage the Clinton campaign and to help and favour Trump’s campaign.

Robert Mueller’s report represents a thorough, insightful and professional analysis of Russia’s interference with the 2016 presidential election.

However, it was never intended to present the final word on whether President Donald Trump, his campaign aides and executive officials in the Trump administration engaged in illegal and criminal activities. The report marks an important but distinctly partial step.

As made clear in the introduction to Volume 1: “A statement that the investigation did not establish particular facts does not mean there was no evidence of those facts.”

New information will shed further light on whether Trump and other individuals pursued activities that placed their financial and political ambitions over the national interest and the need to protect our constitutional system.

The report provides extensive detail on what is called the Trump Moscow project. Between approximately Oct. 13, 2015, and Nov. 2, 2015, the Trump Organisation, through its subsidiary Trump Acquisitions, completed a letter of intent for a Trump Moscow property.

Signed by Trump for the Trump Organisation, the letter was “intended to facilitate further discussions” in order to reach a mutually acceptable agreement.

The letter contemplated an extensive development with residential, hotel, commercial and office components, calling for approximately 150 first class, luxury residential condominiums as well as one first class, luxury hotel consisting of approximately 15 floors and containing no fewer than 150 hotel rooms.

The Mueller report states that Michael Cohen recalled that both he and Trump wanted the Moscow project “to succeed and that Trump never discouraged him from working on the project because of the campaign.”

The Trump Organisation “stood to earn substantial sums over the lifetime of the project, without assuming significant liabilities or financing commitments.” To Cohen, the Trump Tower Moscow “was potentially a $1 trillion deal.”

The report states that Cohen remembered that Trump would be willing to travel to Russia if Cohen could “lock and load” the deal. Despite efforts by both sides, the Moscow project was eventually cancelled.

The report notes that Trump responded to questions about possible connections to Russia “by denying any business involvement in Russia, even though the Trump Organisation had pursued a business project in Russia as late as June 2016.”

Mueller said, Wednesday 29th of May, that he is "resigning from the Department of Justice and returning to private life."

Law.com:      DocumentCloud:

You Might Also Read:

The Mueller Investigation Identifies Russian Spies

« Data Analytics Is Changing The Insurance Industry
Jamie Bartlett: Tech Will Change Us »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyberlytic

Cyberlytic

Cyberlytic applies artificial intelligence to combat the most sophisticated of web application threats, addressing the growing problem of high volumes of threat data.

Wallix

Wallix

Wallix is a software company offering privileged access management solutions for enterprises, public organizations and cloud service providers

Nuvias Group

Nuvias Group

Nuvias Group is a specialist value-addedd IT distribution company offering a service-led and solution-rich proposition ready for the new world of technology supply.

Cybersixgill

Cybersixgill

Cybersixgill was founded with a single mission: to protect organizations against malicious cyber attacks that come from the deep and dark web, before they materialize.

Monegasque Digital Security Agency (AMSN)

Monegasque Digital Security Agency (AMSN)

AMSN is the national authority in charge of the security of information systems in Monaco.

SwiftSafe

SwiftSafe

SwiftSafe is a cybersecurity consulting company providing auditing, pentesting, compliance and managed security services.

itbox.online

itbox.online

Itbox.online offers IT solutions to ensure that your company's technologies are always available and secure as your business demands.

AFNOR Group

AFNOR Group

AFNOR Group designs and deploys solutions based on voluntary standards around the world and provides services including training, professional and technical information, assessment and certification.

Recruit.net

Recruit.net

Recruit.net allows job seekers to instantly find millions of jobs from thousands of web sites with a single search.

PAX Momentum

PAX Momentum

PAX Momentum is the Mid-Atlantic’s premier startup accelerator, specializing in cyber, enterprise software, telecom, CleanTech, FinTech, InsureTech, and AI.

Maven Security Consulting

Maven Security Consulting

Maven Security Consulting helps companies secure their information assets and digital infrastructure by providing a wide range of customized consulting and training services.

Enzoic

Enzoic

Enzoic is an enterprise-focused cybersecurity company committed to preventing account takeover and fraud through compromised credential detection.

Communications & Information Technology Regulatory Authority (CITRA)

Communications & Information Technology Regulatory Authority (CITRA)

CITRA is responsible for overseeing the telecommunications sector, monitoring and protecting the interests of users and service providers, and regulating the services of telecomms networks in Kuwait.

ExchangeDefender

ExchangeDefender

ExchangeDefender provides cybersecurity services that secures your company email and data, and guarantees 24/7 email access.

Arista Middle East

Arista Middle East

Arista Middle East is part of Global Arista Technologies specializing in OT Cybersecurity.

Star Lab

Star Lab

Star Lab specializes in the development and productization of embedded security technologies.