
{"id":1514,"date":"2017-01-07T16:25:30","date_gmt":"2017-01-07T16:25:30","guid":{"rendered":"http:\/\/blogs.plymouth.ac.uk\/dcss\/?p=1514"},"modified":"2017-01-07T16:25:30","modified_gmt":"2017-01-07T16:25:30","slug":"us-releases-declassified-report-on-russian-hacking-during-2016-presidential-election-period","status":"publish","type":"post","link":"https:\/\/blogs.plymouth.ac.uk\/dcss\/2017\/01\/07\/us-releases-declassified-report-on-russian-hacking-during-2016-presidential-election-period\/","title":{"rendered":"US RELEASES DECLASSIFIED REPORT ON RUSSIAN HACKING DURING 2016 PRESIDENTIAL ELECTION PERIOD"},"content":{"rendered":"<p><a href=\"http:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2015\/11\/CYBER-SECURITY.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-513\" src=\"http:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2015\/11\/CYBER-SECURITY-1024x670.jpg\" alt=\"CYBER SECURITY\" width=\"560\" height=\"366\" srcset=\"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2015\/11\/CYBER-SECURITY-1024x670.jpg 1024w, https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2015\/11\/CYBER-SECURITY-300x196.jpg 300w, https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2015\/11\/CYBER-SECURITY-560x366.jpg 560w, https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2015\/11\/CYBER-SECURITY-260x170.jpg 260w, https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2015\/11\/CYBER-SECURITY-160x105.jpg 160w, https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-content\/uploads\/sites\/50\/2015\/11\/CYBER-SECURITY.jpg 1835w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/a><\/p>\n<p>Sourced : The Verge<\/p>\n<p>\u0392y Colin Lecher<\/p>\n<p>The Office of the Director of National Intelligence has released its public report on Russian hacking operations in the United States.<\/p>\n<p>The report, a declassified version of a classified report ordered by President Obama, details attempts by Russia to interfere with the 2016 presidential election, and concludes cyber-operations from the country were directly ordered by President Putin to harm Hillary Clinton\u2019s campaign.<\/p>\n<p>\u201cWe assess Russian President Vladimir Putin ordered an influence campaign in 2016 aimed at the US presidential election,\u201d according to the report, titled \u201cAssessing Russian Activities and Intentions in Recent US Elections.\u201d \u201cRussia\u2019s goals were to undermine public faith in the US democratic process, denigrate Secretary Clinton, and harm her electability and potential presidency. We further assess Putin and the Russian Government developed a clear preference for President-elect Trump.\u201d<\/p>\n<p>This week, in a hearing in front of lawmakers, Director of National Intelligence James Clapper previewed some parts of the report, saying Russia had relied on a \u201cmultifaceted\u201d program to influence opinion in the US, and the report outlines some of those efforts officially for the first time.<\/p>\n<p>\u201cThe Kremlin\u2019s campaign aimed at the US election featured disclosures of data obtained through Russian cyber operations; intrusions into US state and local electoral boards; and overt propaganda,\u201d according to the report.<\/p>\n<p>The report states that Russian intelligence services made cyber attacks against \u201cboth major US political parties,\u201d and specifically mentions the successful hack of the Democratic National Committee. (\u201cRussia collected on some Republican-affiliated targets but did not conduct a comparable disclosure campaign,\u201d it reads.) The report also publicly names Guccifer 2.0 and DCLeaks.com, two sources of stolen information released to the public, as Russian operatives working on behalf of the country\u2019s military intelligence unit, the GRU. Officials from the organization were recently the target of US sanctions. WikiLeaks is also cited as a recipient of stolen information.<\/p>\n<p>The intelligence report cites outlets like RT, as well as quasi-government paid trolls, as sources of pro-Trump, anti-Clinton propaganda online. The report also notes that the US has determined Russia \u201caccessed elements of multiple state or local electoral boards,\u201d though no vote-tallying processes were tampered with.<\/p>\n<p>The FBI and CIA have \u201chigh confidence\u201d the election tampering was ordered to help then-candidate Trump, according to the report. NSA has \u201cmoderate confidence\u201d in that assessment. All three agencies put high confidence in Russia\u2019s responsibility, and that the operations were meant to damage Clinton\u2019s chances.<\/p>\n<p>Despite those assessments, however, the report includes scant information on how the government tied the operations to Russian intelligence. The report cites \u201csensitive sources or methods\u201d that would be damaged through public release, and claims the classified report contains more information. \u201cThus, while the conclusions in the report are all reflected in the classified assessment, the declassified report does not and cannot include the full supporting information, including specific intelligence and sources and methods,\u201d according to the report.<\/p>\n<p>That may not be enough for some critics, who have been publicly calling on the intelligence community to release more information explaining how it linked hacking operations to Russia.<\/p>\n<p>Trump has attempted to cast doubt on the intelligence community\u2019s attribution of Russia, although after an intelligence briefing on the hack today, he seemed to soften his tone slightly, saying in a statement that \u201cRussia, China, other countries, outside groups, and people\u201d are hacking the US, but claiming (unknowably) that \u201cthere was absolutely no effect on the outcome of the election.\u201d<\/p>\n<p>The report concludes that, after its successes in 2016, Russia will likely continue with similar tactics. \u201cWe assess Moscow will apply lessons learned from its Putin-ordered campaign aimed at the US presidential election to future influence efforts worldwide, including against US allies and their election processes,\u201d the report reads.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sourced : The Verge \u0392y Colin Lecher The Office of the Director of National Intelligence has released its public report on Russian hacking operations in the United States. The report, a declassified version of a classified report ordered by President Obama, details attempts by Russia to interfere with the 2016 presidential election, and concludes cyber-operations&hellip; <a class=\"more-link\" href=\"https:\/\/blogs.plymouth.ac.uk\/dcss\/2017\/01\/07\/us-releases-declassified-report-on-russian-hacking-during-2016-presidential-election-period\/\">Continue reading <span class=\"screen-reader-text\">US RELEASES DECLASSIFIED REPORT ON RUSSIAN HACKING DURING 2016 PRESIDENTIAL ELECTION PERIOD<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":513,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[1192,1191,1130,27,1193],"class_list":["post-1514","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-and-strategy","tag-cia","tag-fbi","tag-president-obama","tag-russia","tag-trump","entry"],"_links":{"self":[{"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/posts\/1514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/comments?post=1514"}],"version-history":[{"count":1,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/posts\/1514\/revisions"}],"predecessor-version":[{"id":1515,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/posts\/1514\/revisions\/1515"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/media\/513"}],"wp:attachment":[{"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/media?parent=1514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/categories?post=1514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.plymouth.ac.uk\/dcss\/wp-json\/wp\/v2\/tags?post=1514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}