Obama Orders ‘Deep Dive’ Into Election Hacking

The White House has requested the Office of the Director of National Intelligence to present a full review of the cyber and espionage activity aimed at United States elections, going back to 2008.

“This is something the president wants done under his watch,” Deputy Press Secretary Eric Schultz told reporters at the White House recently.

The probe will not be specifically focused on Russia. For example, experts have blamed China for election hacks in 2008 against the Obama and McCain campaigns. However, the intelligence community’s assertion that Kremlin-backed actors led hacking activities against the most recent election would be included in the review.

“This will be a deep dive,” Schultz said. But he added that the effort was “not an effort to challenge the outcome of the election” and would not call into question the election results. “This will be a challenge for the next administration.”

The announcement comes after lawmakers across party lines called for more information to be made public about Kremlin-backed activities aimed at destabilising the United States presidential election.

John McCain, Chairman of the Senate Committee on Armed Services, Lindsey Graham, Charles E. Schumer, Senate Democratic Leader-elect, and Jack Reed, Ranking Member of the Senate Committee on Armed Services said that they would press ahead with hearings. 

“This cannot become a partisan issue. The stakes are too high for our country. We are committed to working in this bipartisan manner, and we will seek to unify our colleagues around the goal of investigating and stopping the grave threats that cyberattacks conducted by foreign governments pose to our national security,” they wrote in a statement.

“Congress’s national security committees have worked diligently to address the complex challenge of cybersecurity, but recent events show that more must be done.  While protecting classified material, we have an obligation to inform the public about recent cyberattacks that have cut to the heart of our free society. Democrats and Republicans must work together, and across the jurisdictional lines of the Congress, to examine these recent incidents thoroughly and devise comprehensive solutions to deter and defend against further cyberattacks.

Democrats and independents on the Senate Intelligence Committee, led by Ron Wyden, recently sent a letter to the president, saying, “We believe there is additional information concerning the Russian Government and the US election that should be declassified and released to the public. We are conveying specifics through classified channels.”

In a separate statement, Sen. Mark Warner, said, “Interference in America’s democracy and our electoral process by any outside power is unacceptable. I commend the President for undertaking a comprehensive review of meddling in the election by Russia. Similarly, I strongly believe Congress must play a proactive role in this investigation.”

And in an implicit reply to president-elect Donald Trump, who once again rejected the consensus view that Russia meddled in the election he won, Warner added, “As the incoming Vice Chairman of the Senate Select Committee on Intelligence, I know that one of the primary missions of the intelligence professionals in this country is to render their best professional judgment, regardless of political considerations.”

In the House of Represenetaives, Democrats pushed legislation that called for a formal probe. The effort was led by Rep. Adam Schiff,  “We are deeply concerned by Russian efforts to undermine, interfere with and even influence the outcome of our recent election,” Schiff said in a letter.

Schultz said that the review was unrelated to Congressional pressure. “We’ve received requests from Congress for briefings on this. We’ve been briefing them on this. We’re happy to go through the process to figure out” if more material can be declassified, he said.

Recently The Washington Post published a bombshell report stating that intelligence agencies had discovered the names of actual agents involved in the transfer of stolen emails to Wikileaks. 

DefenseOne:                  Putin Personally Interfered With The US Election:
 

 

« Putin Personally Interfered With The US Election
Yahoo Hack Affects 1 Billion Accounts »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Roka Security

Roka Security

Roka Security is a boutique security firm specializing in full-scale network protection, defending against advanced attacks, and rapid response to security incidents.

ECOS Technology

ECOS Technology

ECOS Technology specializes in the development and sale of IT solutions for high-security remote access as well as the management of certificates and smart cards.

National Cybersecurity Hub - South Africa

National Cybersecurity Hub - South Africa

The mission of the National Cybersecurity Hub is to be the central point of collaboration for cybersecurity incidents in South Africa.

VerSprite

VerSprite

VerSprite is a specialist information security consulting firm. We provide organizations with detection across all their attack surfaces and deliver critical insight into all possible attack methods.

Greenwave Systems

Greenwave Systems

Greenwave's AXON Platform enables IoT and M2M network service providers to address security, interoperability, flexibility and scalability from a single IoT platform.

Sierra Ventures

Sierra Ventures

Sierra Ventures is an early-stage venture firm investing globally with a focus on Next Generation Enterprise and Emerging Technologies.

Sovereign Intelligence

Sovereign Intelligence

Sovereign Intelligence provides automated insight into the relative intensity of hidden Cyber, Brand, and Financial Risks to your company.

Deepnet Security

Deepnet Security

Deepnet Security is a leading security software developer and hardware provider in Multi-Factor Authentication (MFA), Single Sign-On (SSO) and Identity & Access Management (IAM).

SystemExperts

SystemExperts

SystemExperts is a premier provider of IT compliance and cyber security consulting services.

Hunter Strategy

Hunter Strategy

Hunter Strategy focuses on delivering solutions that are concise, scalable, and target our customer’s complex technical challenges.

QuSecure

QuSecure

QuSecure provides a software-driven security architecture that overlays your current infrastructure and provides next-generation security to protect your entire network from quantum threats.

Sikich

Sikich

Sikich LLP is a leading professional services firm specializing in accounting, advisory, technology and managed services.

Incognia

Incognia

Incognia have created a ubiquitous private identity based on location behavior, that enables a personalized frictionless experience with mobile apps and connected devices.

National Cybersecurity Agency (ACN) - Italy

National Cybersecurity Agency (ACN) - Italy

The ACN is the National Authority for Cybersecurity in Italy. the Agency promotes public-private initiatives to strengthen the national cybersecurity and resilience posture.

Blue Bastion

Blue Bastion

Don’t give cybercriminals the chance to find weaknesses in your company’s cyber security system. Defend your institution from all attacks from all directions with Blue Bastion.

BLOCX

BLOCX

BLOCX is designed to address the ever-growing challenges of managing and securing digital devices, from personal computers to corporate networks.