Obama Orders ‘Deep Dive’ Into Election Hacking

The White House has requested the Office of the Director of National Intelligence to present a full review of the cyber and espionage activity aimed at United States elections, going back to 2008.

“This is something the president wants done under his watch,” Deputy Press Secretary Eric Schultz told reporters at the White House recently.

The probe will not be specifically focused on Russia. For example, experts have blamed China for election hacks in 2008 against the Obama and McCain campaigns. However, the intelligence community’s assertion that Kremlin-backed actors led hacking activities against the most recent election would be included in the review.

“This will be a deep dive,” Schultz said. But he added that the effort was “not an effort to challenge the outcome of the election” and would not call into question the election results. “This will be a challenge for the next administration.”

The announcement comes after lawmakers across party lines called for more information to be made public about Kremlin-backed activities aimed at destabilising the United States presidential election.

John McCain, Chairman of the Senate Committee on Armed Services, Lindsey Graham, Charles E. Schumer, Senate Democratic Leader-elect, and Jack Reed, Ranking Member of the Senate Committee on Armed Services said that they would press ahead with hearings. 

“This cannot become a partisan issue. The stakes are too high for our country. We are committed to working in this bipartisan manner, and we will seek to unify our colleagues around the goal of investigating and stopping the grave threats that cyberattacks conducted by foreign governments pose to our national security,” they wrote in a statement.

“Congress’s national security committees have worked diligently to address the complex challenge of cybersecurity, but recent events show that more must be done.  While protecting classified material, we have an obligation to inform the public about recent cyberattacks that have cut to the heart of our free society. Democrats and Republicans must work together, and across the jurisdictional lines of the Congress, to examine these recent incidents thoroughly and devise comprehensive solutions to deter and defend against further cyberattacks.

Democrats and independents on the Senate Intelligence Committee, led by Ron Wyden, recently sent a letter to the president, saying, “We believe there is additional information concerning the Russian Government and the US election that should be declassified and released to the public. We are conveying specifics through classified channels.”

In a separate statement, Sen. Mark Warner, said, “Interference in America’s democracy and our electoral process by any outside power is unacceptable. I commend the President for undertaking a comprehensive review of meddling in the election by Russia. Similarly, I strongly believe Congress must play a proactive role in this investigation.”

And in an implicit reply to president-elect Donald Trump, who once again rejected the consensus view that Russia meddled in the election he won, Warner added, “As the incoming Vice Chairman of the Senate Select Committee on Intelligence, I know that one of the primary missions of the intelligence professionals in this country is to render their best professional judgment, regardless of political considerations.”

In the House of Represenetaives, Democrats pushed legislation that called for a formal probe. The effort was led by Rep. Adam Schiff,  “We are deeply concerned by Russian efforts to undermine, interfere with and even influence the outcome of our recent election,” Schiff said in a letter.

Schultz said that the review was unrelated to Congressional pressure. “We’ve received requests from Congress for briefings on this. We’ve been briefing them on this. We’re happy to go through the process to figure out” if more material can be declassified, he said.

Recently The Washington Post published a bombshell report stating that intelligence agencies had discovered the names of actual agents involved in the transfer of stolen emails to Wikileaks. 

DefenseOne:                  Putin Personally Interfered With The US Election:
 

 

« Putin Personally Interfered With The US Election
Yahoo Hack Affects 1 Billion Accounts »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT GRC Forum

IT GRC Forum

The IT GRC Forum is an online resource and networking platform for the Governance, Risk Management, and Compliance (GRC) community

CyberArk Software

CyberArk Software

CyberArk is an established leader in privileged access management and offers the most complete set of Identity Security capabilities.

Magic Software Enterprises

Magic Software Enterprises

Magic provide Mobile Device Management (MDM) for Secure Enterprise Mobility. Magic MDM overcomes the challenges of mobile device management security by protecting all of your devices, data and content

France Cybersecurity

France Cybersecurity

France Cybersecurity represents the French cybersecurity industry to raise international awareness of French cybersecurity capabilities and solutions.

BCS Financial

BCS Financial

BCS Financial delivers financial and insurance solutions. Specialty risk products include Cyber and Privacy Liability insurance.

Mitchell Sandham

Mitchell Sandham

Mitchell Sandham is an, independent insurance and financial services brokerage. Business products include Cyber/Privacy Liability insurance.

NSO Group

NSO Group

NSO Group develops technology that enables government intelligence and law enforcement agencies to prevent and investigate terrorism and crime.

Zeguro

Zeguro

Zeguro provides complete cybersecurity risk assessment, mitigation and insurance, allowing you to easily manage your cyber risk.

Global Resources

Global Resources

Global Resources' planning and management capabilities support city, regional, and national utility and infrastructure management, and information systems and cyber security service delivery.

Firmus

Firmus

As the leading penetration testing services provider in Malaysia, Firmus evaluates the ability of your internal or external information assets to withstand attacks.

Plante Moran

Plante Moran

Plante Moran is a leading audit, tax, consulting, and wealth management firm. Areas of consulting expertise include cybersecurity.

Tentacle

Tentacle

Tentacle has developed a configurable data management tool that helps organizations to improve their information security programs and overall security posture.

Triskele Labs

Triskele Labs

Triskele Labs deliver services including Penetration Testing, Compliance and Risk Management through to 24*7*365 Security Operations and outsourced Cybersecurity Managers.

OpenZiti

OpenZiti

OpenZiti is the world’s most used and widely integrated open source secure networking platform. OpenZiti provides both zero trust security and overlay networking as pure open source software.

Vonahi Security

Vonahi Security

Vonahi Security is a cybersecurity SaaS company that pioneered automated network penetration testing.

Future Crime Research Foundation (FCRF)

Future Crime Research Foundation (FCRF)

FCRF is a Non-Profit NGO specializing in Research in Cyber Security, Digital Crime, Fraud Risk Management, Cyber Laws and Cyber Forensics.