Mueller Reports On Russian Interference

Moscow's interference in the 2016 election, was unequivocal and emphatic and Mueller says that Russia had used "sophisticated cyber techniques" like hacking computer networks, email accounts.

And posing as Americans on social media they had "launched a concerted attack on our political system."

The Mueller report says that the Russian governments interference in the 2016 US Presidential election was significant, ‘sweeping and systematic’.

Also in 2016 the Democratic National Committee and its cyber team said that Russian hackers had invaded and influenced its computer systems.

It can now be read on-line, in two parts and is 448 pages in total.

The first part of the Report explains Russian interference in the 2016 election and its connections with the Trump campaign.

And the second part discusses the President’s actions concerning the FBI’s investigations of Russian influence in the 2016 elections.

The Internet Research Agency (IRA), based in St. Petersburg, which is said to be funded by President Putin, designed a social media campaign to provoke and use information warfare to disparage the Clinton campaign and to help and favour Trump’s campaign.

Robert Mueller’s report represents a thorough, insightful and professional analysis of Russia’s interference with the 2016 presidential election.

However, it was never intended to present the final word on whether President Donald Trump, his campaign aides and executive officials in the Trump administration engaged in illegal and criminal activities. The report marks an important but distinctly partial step.

As made clear in the introduction to Volume 1: “A statement that the investigation did not establish particular facts does not mean there was no evidence of those facts.”

New information will shed further light on whether Trump and other individuals pursued activities that placed their financial and political ambitions over the national interest and the need to protect our constitutional system.

The report provides extensive detail on what is called the Trump Moscow project. Between approximately Oct. 13, 2015, and Nov. 2, 2015, the Trump Organisation, through its subsidiary Trump Acquisitions, completed a letter of intent for a Trump Moscow property.

Signed by Trump for the Trump Organisation, the letter was “intended to facilitate further discussions” in order to reach a mutually acceptable agreement.

The letter contemplated an extensive development with residential, hotel, commercial and office components, calling for approximately 150 first class, luxury residential condominiums as well as one first class, luxury hotel consisting of approximately 15 floors and containing no fewer than 150 hotel rooms.

The Mueller report states that Michael Cohen recalled that both he and Trump wanted the Moscow project “to succeed and that Trump never discouraged him from working on the project because of the campaign.”

The Trump Organisation “stood to earn substantial sums over the lifetime of the project, without assuming significant liabilities or financing commitments.” To Cohen, the Trump Tower Moscow “was potentially a $1 trillion deal.”

The report states that Cohen remembered that Trump would be willing to travel to Russia if Cohen could “lock and load” the deal. Despite efforts by both sides, the Moscow project was eventually cancelled.

The report notes that Trump responded to questions about possible connections to Russia “by denying any business involvement in Russia, even though the Trump Organisation had pursued a business project in Russia as late as June 2016.”

Mueller said, Wednesday 29th of May, that he is "resigning from the Department of Justice and returning to private life."

Law.com:      DocumentCloud:

You Might Also Read:

The Mueller Investigation Identifies Russian Spies

« Data Analytics Is Changing The Insurance Industry
Jamie Bartlett: Tech Will Change Us »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Information Commissioner's Office (ICO)

Information Commissioner's Office (ICO)

The Information Commissioner's Office is an independent authority set up to uphold information rights in the public interest.

Applause

Applause

Applause provides real-world software testing for functionality, usability, accessibility, load, localization and security.

Singapore Cybersecurity Consortium

Singapore Cybersecurity Consortium

Singapore Cybersecurity Consortium was created to encourage use-inspired research, training and technology awareness in cybersecurity.

Centripetal Networks

Centripetal Networks

Centripetal Networks was founded with one vision - to protect networks from advanced threats by simplifying intelligence-driven security.

HyTrust

HyTrust

HyTrust specialises in security, compliance and control software for virtualization and cloud environments.

LEXFO

LEXFO

LEXFO specializes in the security of information systems, assisting clients in protecting information assets using an offensive and innovative approach.

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER)

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER)

The Office of Cybersecurity, Energy Security, and Emergency Response (CESER) addresses the emerging threats of tomorrow while protecting the reliable flow of energy to Americans today.

Bavarian IT Security Cluster

Bavarian IT Security Cluster

The Bavarian IT Security Cluster works to build regional IT security competencies and increase the competitiveness and market opportunities of its member companies.

Cloud Managed Networks

Cloud Managed Networks

Cloud Managed Networks provides enterprise grade IT network solutions for cloud-based and on premise network security, Wi-Fi, data switching, collaboration, device management and more.

Space ISAC

Space ISAC

Space ISAC is the only all-threats security information source for the public and private space sector.

Audea

Audea

Audea is a consultancy firm specialising in cybersecurity, risk and compliance. We provide professional services addressing all areas of Cybersecurity and GRC.

SecureStream Technologies

SecureStream Technologies

SecureStream Technologies have built the IoT SafetyNet - the Network Security Analytics platform to Eliminate Security Threats, Guarantee Privacy, Ensure Compliance, Simply & Easily.

PreVeil

PreVeil

We started PreVeil to bring radically better security to ordinary business and personal communication and information storage.

Beyon Cyber

Beyon Cyber

Beyon Cyber offer a complete portfolio of advanced solutions & services for cyber security in Bahrain.

Cisilion

Cisilion

Cisilion's mission is simple – to transform and connect business with next-generation IT infrastructure. Our expertise includes enterprise networking, security, data centre & cloud, managed services.

Datapac

Datapac

Datapac is one of Ireland’s largest and most successful ICT solutions and services providers. We have been at the forefront of technology innovation in Ireland for the past three decades.