Mueller Reports On Russian Interference

Moscow's interference in the 2016 election, was unequivocal and emphatic and Mueller says that Russia had used "sophisticated cyber techniques" like hacking computer networks, email accounts.

And posing as Americans on social media they had "launched a concerted attack on our political system."

The Mueller report says that the Russian governments interference in the 2016 US Presidential election was significant, ‘sweeping and systematic’.

Also in 2016 the Democratic National Committee and its cyber team said that Russian hackers had invaded and influenced its computer systems.

It can now be read on-line, in two parts and is 448 pages in total.

The first part of the Report explains Russian interference in the 2016 election and its connections with the Trump campaign.

And the second part discusses the President’s actions concerning the FBI’s investigations of Russian influence in the 2016 elections.

The Internet Research Agency (IRA), based in St. Petersburg, which is said to be funded by President Putin, designed a social media campaign to provoke and use information warfare to disparage the Clinton campaign and to help and favour Trump’s campaign.

Robert Mueller’s report represents a thorough, insightful and professional analysis of Russia’s interference with the 2016 presidential election.

However, it was never intended to present the final word on whether President Donald Trump, his campaign aides and executive officials in the Trump administration engaged in illegal and criminal activities. The report marks an important but distinctly partial step.

As made clear in the introduction to Volume 1: “A statement that the investigation did not establish particular facts does not mean there was no evidence of those facts.”

New information will shed further light on whether Trump and other individuals pursued activities that placed their financial and political ambitions over the national interest and the need to protect our constitutional system.

The report provides extensive detail on what is called the Trump Moscow project. Between approximately Oct. 13, 2015, and Nov. 2, 2015, the Trump Organisation, through its subsidiary Trump Acquisitions, completed a letter of intent for a Trump Moscow property.

Signed by Trump for the Trump Organisation, the letter was “intended to facilitate further discussions” in order to reach a mutually acceptable agreement.

The letter contemplated an extensive development with residential, hotel, commercial and office components, calling for approximately 150 first class, luxury residential condominiums as well as one first class, luxury hotel consisting of approximately 15 floors and containing no fewer than 150 hotel rooms.

The Mueller report states that Michael Cohen recalled that both he and Trump wanted the Moscow project “to succeed and that Trump never discouraged him from working on the project because of the campaign.”

The Trump Organisation “stood to earn substantial sums over the lifetime of the project, without assuming significant liabilities or financing commitments.” To Cohen, the Trump Tower Moscow “was potentially a $1 trillion deal.”

The report states that Cohen remembered that Trump would be willing to travel to Russia if Cohen could “lock and load” the deal. Despite efforts by both sides, the Moscow project was eventually cancelled.

The report notes that Trump responded to questions about possible connections to Russia “by denying any business involvement in Russia, even though the Trump Organisation had pursued a business project in Russia as late as June 2016.”

Mueller said, Wednesday 29th of May, that he is "resigning from the Department of Justice and returning to private life."

Law.com:      DocumentCloud:

You Might Also Read:

The Mueller Investigation Identifies Russian Spies

« Data Analytics Is Changing The Insurance Industry
Jamie Bartlett: Tech Will Change Us »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity provide solutions for Secure Networks, Secure Communications, Network Analysis, and Endpoint Security.

Cyber Seguridad (Cyberseg)

Cyber Seguridad (Cyberseg)

Cyberseg provides specialized Cybersecurity services, including managed services (SOC / CERTs) and solutions for the protection of critical infrastructures.

Cyber Base

Cyber Base

Cyber Base is an Information Technology company based in Uganda providing software and hardware solutions to clients.

PROOF

PROOF

PROOF is a Brazilian leader in cybersecurity. Our goal is to assist our Customers in managing security efficiently and in tune with business needs.

Asia Data Destruction (ADD)

Asia Data Destruction (ADD)

ADD is the leading IT Assets Disposal and Data Destruction Company in Thailand.

Police Digital Security Centre (PDSC)

Police Digital Security Centre (PDSC)

PDSC is a not-for-profit organisation, owned by the police, that works across the UK in partnership with industry, government, academia and law enforcement.

Perch Security

Perch Security

Perch is a co-managed threat detection and response platform backed by an in-house Security Operations Center (SOC).

Tracepoint

Tracepoint

Tracepoint provide full-service cyber incident response, remediation and recovery solutions for the most time-sensitive situation your company may ever face.

Internet Crime Complaint Center (IC3)

Internet Crime Complaint Center (IC3)

The Internet Crime Complaint Center provide the public with a reporting mechanism to submit information to the FBI concerning suspected Internet-facilitated criminal activity.

Internet Security Research Group (ISRG)

Internet Security Research Group (ISRG)

ISRG's mission is to reduce financial, technological, and educational barriers to secure communication over the Internet.

Larsen & Toubro Infotech (LTI)

Larsen & Toubro Infotech (LTI)

LTI is a global technology consulting and digital solutions company with operations in 33 countries.

Venticento

Venticento

Venticento is an IT company specialized in consulting and network support and assistance for companies that need to make their business processes more effective.

DataProof Communications

DataProof Communications

DataProof Communications is Cybersecurity Company specialising in cybersecurity operations, incident management and response best practices and technologies.

JustunSecure

JustunSecure

JustunSecure is dedicated to promoting information technology and cybersecurity in Africa.

RedLattice

RedLattice

RedLattice are at the cutting edge of tool development and AI-assisted vulnerability research in cybersecurity.

Unified Infotech

Unified Infotech

Unified Infotech is a trusted partner for IT and software solutions dedicated to empowering businesses.