US Intelligence Has The Evidence That Proves Russian Presidential Election Interference

At the last debate, Donald Trump said that Hillary Clinton “has no idea whether it’s Russia” who hacked into the private networks of her campaign’s allies, then released the information to Wikileaks and the world. “Our country has no idea.”

The cybersecurity community has attributed that attack and leak to FANCY BEAR, a group also known as APT 28.

Without calling out Trump by name, Director of National Intelligence James Clapper said, um, yeah, we do.

Clapper (pictured) cited his office’s Oct. 7 press release. “We wouldn’t have made it unless we were very confident. I’m not going to discuss the underlying evidentiary basis for it, but I can say with confidence, it speaks for itself,” he said.

The statement reads: “The recent disclosures of alleged hacked e-mails on sites like DCLeaks.com and WikiLeaks and by the Guccifer 2.0 online persona are consistent with the methods and motivations of Russian-directed efforts. These thefts and disclosures are intended to interfere with the US election process.”

Clapper also hinted that the intelligence community had more information about the groups than has yet been made public.

“That’s one of the reasons we waited for as long as we did to make the statement, was to ensure that we had sufficient evidence both forensic and otherwise, to reach the conclusion we reached as articulated in the statement. I don’t think I need to say anything more about it, other than the fact the statement speaks for itself. It was mainly addressed to the American electorate, not to any foreign nation-state.”

The Office of the Director of National Intelligence collects and coordinates for the President the information and analysis from the 17 agencies that make up US national intelligence collection.

Speaking at an American Enterprise Institute event on 19th October, the NSA’s Curt Dukes said that the US Cyber Command was the leading investigatory agency.

“I would be remiss. It was US Cyber Command, with support from the information assurance directorate” said Dukes, NSA’s deputy national Manager for National Security Systems. “US Cyber command led the activity. I can’t get into who the actors are.”

DefenseOne:

« US Banks Face New Demands To Protect Themselves From Hackers
British Military Is Using Cyber Warfare Against Islamic State »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Digital Detective

Digital Detective

Digital Detective offer a range of products and services for digital forensic analysis and advanced data recovery.

Alan Boswell Group

Alan Boswell Group

We are a Group of Companies providing specialist Insurance Broking and Risk Management advice and services including Cyber Risk cover.

Robert Half Technology

Robert Half Technology

Robert Half Technology offers a full spectrum of technology staffing solutions to meet contract and full-time IT recruitment needs.

TrustInSoft

TrustInSoft

TrustInSoft develops solutions that validate mission-critical software and eliminate attack vectors.

Abusix

Abusix

Abusix specializes in Internet security, network abuse handling, antispam and fraud prevention.

SMESEC

SMESEC

SMESEC is a lightweight Cybersecurity framework for protecting small and medium-sized enterprises (SME) against Cyber threats.

Bridewell

Bridewell

Bridewell provide cost effective Security & Risk Assurance Services across Information Security, Cyber Security, Technology Risk, Security Testing and Data Privacy.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

ConvergeOne

ConvergeOne

ConvergeOne is a leading global IT services provider of collaboration and technology solutions including cybersecurity.

Crypto Valley Association

Crypto Valley Association

Crypto Valley Association is an independent, government-supported association established to build the world’s leading blockchain and cryptographic technologies ecosystem.

StateRAMP

StateRAMP

StateRAMP reduces risk from unsecure cloud solutions and protects data by providing State and local governments a standardized approach for verifying and monitoring security postures.

Amidas Hong Kong

Amidas Hong Kong

Amidas is your trusted companion on the road to Digital Transformation. We provide a full range of Information Technology Solutions and Professional Services to Enterprise customers.

Teleport

Teleport

Teleport is a remote-first technology company. We enable engineers to quickly access any computing resource anywhere on the planet.

Trenton Systems

Trenton Systems

Trenton Systems are committed to providing high-performance computing solutions to customers running mission-critical applications in harsh settings worldwide and across various industries.

Cyabra

Cyabra

Cyabra is leading the fight against disinformation. Our AI shields companies and the public sector by uncovering malicious actors, bot networks, and GenAI content.

Atumcell

Atumcell

Atumcell’s targeted risk assessment exposes emerging threats before they cause harm.