US Intelligence Has The Evidence That Proves Russian Presidential Election Interference

At the last debate, Donald Trump said that Hillary Clinton “has no idea whether it’s Russia” who hacked into the private networks of her campaign’s allies, then released the information to Wikileaks and the world. “Our country has no idea.”

The cybersecurity community has attributed that attack and leak to FANCY BEAR, a group also known as APT 28.

Without calling out Trump by name, Director of National Intelligence James Clapper said, um, yeah, we do.

Clapper (pictured) cited his office’s Oct. 7 press release. “We wouldn’t have made it unless we were very confident. I’m not going to discuss the underlying evidentiary basis for it, but I can say with confidence, it speaks for itself,” he said.

The statement reads: “The recent disclosures of alleged hacked e-mails on sites like DCLeaks.com and WikiLeaks and by the Guccifer 2.0 online persona are consistent with the methods and motivations of Russian-directed efforts. These thefts and disclosures are intended to interfere with the US election process.”

Clapper also hinted that the intelligence community had more information about the groups than has yet been made public.

“That’s one of the reasons we waited for as long as we did to make the statement, was to ensure that we had sufficient evidence both forensic and otherwise, to reach the conclusion we reached as articulated in the statement. I don’t think I need to say anything more about it, other than the fact the statement speaks for itself. It was mainly addressed to the American electorate, not to any foreign nation-state.”

The Office of the Director of National Intelligence collects and coordinates for the President the information and analysis from the 17 agencies that make up US national intelligence collection.

Speaking at an American Enterprise Institute event on 19th October, the NSA’s Curt Dukes said that the US Cyber Command was the leading investigatory agency.

“I would be remiss. It was US Cyber Command, with support from the information assurance directorate” said Dukes, NSA’s deputy national Manager for National Security Systems. “US Cyber command led the activity. I can’t get into who the actors are.”

DefenseOne:

« US Banks Face New Demands To Protect Themselves From Hackers
British Military Is Using Cyber Warfare Against Islamic State »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Radiant Logic

Radiant Logic

Radiant Logic is a market-leading provider of federated identity solutions based on virtualization, and delivers simple, logical, and standards-based access to all identities within an organization.

Bromium

Bromium

Bromium deliver a new technology called micro-virtualization to address the enterprise security problem and provide protection for end users against advanced malware.

RU-CERT

RU-CERT

RU-CERT is the CSIRT / CERT team of the Russian Federation.

CyberCrowd

CyberCrowd

CyberCrowd is a cyber security specialist offering technical services, cyber security assessments, guidance and security thought leadership.

DomainTools

DomainTools

DomainTools is the global leader for internet intelligence and the first place security practitioners go when they need to know.

Cyber Security Academy (CSA)

Cyber Security Academy (CSA)

The CSA aims to educate professionals who wish to contribute to strengthening the digital defensibility of states, organisations and individual citizens.

Zero Networks

Zero Networks

With Zero Network, you can achieve affordable, airtight network access security at scale.

White Bullet

White Bullet

White Bullet’s risk profiling AI detects, dynamically scores and flags unsafe domains, apps and advertising.

Cryptoloc

Cryptoloc

Cryptoloc's core business is developing solutions designed to protect businesses from all kinds of security threats using a unique patented cryptography.

Mr Backup (MRB)

Mr Backup (MRB)

MRB offers Data Protection as a Service for businesses looking to reduce the time, cost and complexity of securing your company data.

Guidepost Solutions

Guidepost Solutions

Guidepost Solutions are a diverse, global team of investigators, experienced security and technology consultants, and compliance and monitoring experts.

GoPlus Security

GoPlus Security

GoPlus is working as the "security infrastructure" for web3, by providing open, permissionless, user-driven Security Services.

Hexens

Hexens

Hexens introduces a whole new approach to cybersecurity solutions. Indisputable skills and a unique super-focused perspective on every single case are the values we create.

Vercara

Vercara

Vercara offers a purpose-built, global cloud security platform that provides layers of protection to safeguard businesses’ online presence, no matter where an attack comes from or where it is aimed.

Attestiv

Attestiv

Attestiv puts authenticity into photos, videos and documents by utilizing advanced technologies in AI and tamper-proofing.

CyberRey

CyberRey

CyberRey is a leading distributor of comprehensive cybersecurity solutions, empowering organizations of all sizes to thrive in the digital age.