The Democratic National Committee cyber attacks took place in 2015 and 2016,
in which two groups of Russian
computer hackers infiltrated the
Democratic National Committee
The Democratic National Committee (DNC) is the governing body of the United States Democratic Party. The committee coordinates strategy to support Democratic Party candidates throughout the country for local, state, and national office, as well ...
(DNC)
computer network
A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections ar ...
, leading to a
data breach
A data breach is a security violation, in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so. Other terms are unintentional information disclosure, data leak, info ...
.
Cybersecurity
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, th ...
experts, as well as the U.S. government, determined that the
cyberespionage was the work of Russian intelligence agencies.
Forensic evidence analyzed by several cybersecurity firms,
CrowdStrike
CrowdStrike Holdings, Inc. is an American cybersecurity technology company based in Austin, Texas. It provides cloud workload and endpoint security, threat intelligence, and cyberattack response services. The company has been involved in inves ...
,
Fidelis, and
Mandiant
Mandiant is an American cybersecurity firm and a subsidiary of Google. It rose to prominence in February 2013 when it released a report directly implicating China in cyber espionage. In December 2013, Mandiant was acquired by FireEye for $1 b ...
(or
FireEye
Trellix (formerly FireEye and McAfee Enterprise) is a privately held cybersecurity company founded in 2022. It has been involved in the detection and prevention of major cyber attacks.
It provides hardware, software, and services to investigat ...
), strongly indicates that two
Russian intelligence agencies separately infiltrated the DNC computer systems. The American
cybersecurity
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, th ...
firm CrowdStrike, which removed the hacking programs, revealed a history of encounters with both groups and had already named them, calling one of them
Cozy Bear
Cozy Bear, classified by the United States federal government as advanced persistent threat APT29, is a Russian hacker group believed to be associated with one or more intelligence agencies of Russia. The Dutch General Intelligence and Securit ...
and the other
Fancy Bear, names which are used in the media.
On December 9, 2016, the CIA
The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
told U.S. legislators the U.S. Intelligence Community concluded Russia conducted the cyberattacks and other operations during the 2016 U.S. election to assist Donald Trump
Donald John Trump (born June 14, 1946) is an American politician, media personality, and businessman who served as the 45th president of the United States from 2017 to 2021.
Trump graduated from the Wharton School of the University of ...
in winning the presidency. Multiple U.S. intelligence agencies concluded that specific individuals tied to the Russian government provided WikiLeaks with the stolen emails from the DNC, as well as stolen emails from Hillary Clinton
Hillary Diane Rodham Clinton ( Rodham; born October 26, 1947) is an American politician, diplomat, and former lawyer who served as the 67th United States Secretary of State for President Barack Obama from 2009 to 2013, as a United States senat ...
's campaign chairman, who was also the target of a cyberattack. These intelligence organizations additionally concluded Russia hacked the Republican National Committee
The Republican National Committee (RNC) is a U.S. political committee that assists the Republican Party of the United States. It is responsible for developing and promoting the Republican brand and political platform, as well as assisting in f ...
(R.N.C.) as well as the D.N.C., but chose not to leak information obtained from the R.N.C.
Cyber attacks and responsibility
Cyber attacks that successfully penetrated the DNC computing system began in 2015. Attacks by "Cozy Bear" began in the summer of 2015. Attacks by "Fancy Bear" began in April 2016. It was after the "Fancy Bear" group began their activities that the compromised system became apparent. The groups were presumed to have been spying on communications, stealing opposition research on Donald Trump
Donald John Trump (born June 14, 1946) is an American politician, media personality, and businessman who served as the 45th president of the United States from 2017 to 2021.
Trump graduated from the Wharton School of the University of ...
, as well as reading all email
Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices. Email was thus conceived as the electronic ( digital) version of, or counterpart to, mail, at a time when "mail" mean ...
and chats. Both were finally identified by CrowdStrike in May 2016. Both groups of intruders were successfully expelled from the DNC systems within hours after detection. These attacks are considered to be part of a group of recent attacks targeting U.S. government departments and several political organizations, including 2016 campaign organizations.
On July 22, 2016, a person or entity going by the moniker " Guccifer 2.0" claimed on a WordPress
WordPress (WP or WordPress.org) is a free and open-source software, free and open-source content management system (CMS) written in PHP, hypertext preprocessor language and paired with a MySQL or MariaDB database with supported secure hypert ...
-hosted blog to have been acting alone in hacking the DNC. He also claimed to send significant amounts of stolen electronic DNC documents to WikiLeaks
WikiLeaks () is an international non-profit organisation that published news leaks and classified media provided by anonymous sources. Julian Assange, an Australian Internet activist, is generally described as its founder and director and ...
. WikiLeaks has not revealed the source for their leaked emails. However, cybersecurity
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, th ...
experts and firms, including CrowdStrike
CrowdStrike Holdings, Inc. is an American cybersecurity technology company based in Austin, Texas. It provides cloud workload and endpoint security, threat intelligence, and cyberattack response services. The company has been involved in inves ...
, Fidelis Cybersecurity, Mandiant
Mandiant is an American cybersecurity firm and a subsidiary of Google. It rose to prominence in February 2013 when it released a report directly implicating China in cyber espionage. In December 2013, Mandiant was acquired by FireEye for $1 b ...
, SecureWorks, ThreatConnect, and the editor for Ars Technica
''Ars Technica'' is a website covering news and opinions in technology, science, politics, and society, created by Ken Fisher and Jon Stokes in 1998. It publishes news, reviews, and guides on issues such as computer hardware and software, sc ...
, have rejected the claims of "Guccifer 2.0" and have determined, on the basis of substantial evidence, that the cyberattacks were committed by two Russian state-sponsored groups (Cozy Bear and Fancy Bear).
According to separate reports in ''The New York Times'' and ''The Washington Post'', U.S. intelligence agencies have concluded with "high confidence" that the Russian government was behind the theft of emails and documents from the DNC.[Ellen Nakashima]
Is there a Russian master plan to install Trump in the White House? Some intelligence officials are skeptical
''New York Times'' (July 27, 2016). While the U.S. intelligence community has concluded that Russia was behind the cyberattack, intelligence officials told ''The Washington Post'' that they had "not reached a conclusion about who passed the emails to WikiLeaks" and so did not know "whether Russian officials directed the leak." A number of experts and cybersecurity analysts believe that "Guccifer 2.0" is probably a Russian government disinformation cover story to distract attention away from the DNC breach by the two Russian intelligence agencies.[
Note: ]Dmitri Alperovitch
Dmitri Mikhailovich Alperovitch (born 1980) is a Soviet-born American think-tank founder, investor, philanthropist, podcast host and former computer security industry executive. He is the chairman of Silverado Policy Accelerator, a geopolitics th ...
is a CrowdStrike co-founder, CTO, and cybersecurity expert.[ Note: This news article is licensed under a Creative Commons Attribution-Share Alike 3.0 License]
President Obama and Russian President Vladimir Putin had a discussion about computer security
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, t ...
issues, which took place as a side segment during the then-ongoing G20 summit in China in September 2016. Obama said Russian hacking stopped after his warning to Putin.
In a joint statement on October 7, 2016, the United States Department of Homeland Security
The United States Department of Homeland Security (DHS) is the Federal government of the United States, U.S. United States federal executive departments, federal executive department responsible for public security, roughly comparable to the I ...
and the Office of the Director of National Intelligence stated that the US intelligence community is confident that the Russian government directed the breaches and the release of the obtained material in an attempt to "… interfere with the US election process."
Background
As is common among Russian intelligence services, both groups used similar hacking tools and strategies. It is believed that neither group was aware of the other. Although this is antithetical to American computer intelligence
The expression computational intelligence (CI) usually refers to the ability of a computer to learn a specific task from data or experimental observation. Even though it is commonly considered a synonym of soft computing, there is still no ...
methods, for fear of undermining or defeating intelligence operations of the other, this has been common practice in the Russian intelligence community since 2004.[
]
This intrusion was part of several attacks attempting to access information from American political organizations, including the 2016 U.S. presidential campaigns.[
] Both "Cozy Bear" and "Fancy Bear" are known adversaries, who have extensively engaged in political and economic espionage that benefits the Russian Federation
Russia (, , ), or the Russian Federation, is a transcontinental country spanning Eastern Europe and Northern Asia
North Asia or Northern Asia, also referred to as Siberia, is the northern region of Asia, which is defined in geographic ...
government. Both are believed connected to the Russian intelligence services. Also, both access resources and demonstrate levels of proficiency matching nation-state capabilities.
"Cozy Bear" has in the past year infiltrated unclassified computer systems of the White House
The White House is the official residence and workplace of the president of the United States. It is located at 1600 Pennsylvania Avenue Northwest, Washington, D.C., NW in Washington, D.C., and has been the residence of every U.S. preside ...
, the U.S. State Department, and the U.S. Joint Chiefs of Staff. According to CrowdStrike
CrowdStrike Holdings, Inc. is an American cybersecurity technology company based in Austin, Texas. It provides cloud workload and endpoint security, threat intelligence, and cyberattack response services. The company has been involved in inves ...
, other targeted sectors include: Defense, Energy, Mining
Mining is the extraction of valuable minerals or other geological materials from the Earth, usually from an ore body, lode, vein, seam, reef, or placer deposit. The exploitation of these deposits for raw material is based on the economic ...
, Financial, Insurance, Legal, Manufacturing, Media, Think tank
A think tank, or policy institute, is a research institute that performs research and advocacy concerning topics such as social policy, political strategy, economics, military, technology, and culture. Most think tanks are non-governmental ...
s, Pharmaceutical, Research
Research is "creative and systematic work undertaken to increase the stock of knowledge". It involves the collection, organization and analysis of evidence to increase understanding of a topic, characterized by a particular attentiveness t ...
and Technology
Technology is the application of knowledge to reach practical goals in a specifiable and reproducible way. The word ''technology'' may also mean the product of such an endeavor. The use of technology is widely prevalent in medicine, scie ...
industries as well as universities. "Cozy Bear" observed attacks have occurred in Western Europe
Western Europe is the western region of Europe. The region's countries and territories vary depending on context.
The concept of "the West" appeared in Europe in juxtaposition to "the East" and originally applied to the ancient Mediterranean ...
, Brazil, China, Japan, Mexico, New Zealand
New Zealand ( mi, Aotearoa ) is an island country in the southwestern Pacific Ocean. It consists of two main landmasses—the North Island () and the South Island ()—and over 700 List of islands of New Zealand, smaller islands. It is the ...
, South Korea, Turkey
Turkey ( tr, Türkiye ), officially the Republic of Türkiye ( tr, Türkiye Cumhuriyeti, links=no ), is a list of transcontinental countries, transcontinental country located mainly on the Anatolia, Anatolian Peninsula in Western Asia, with ...
and Central Asia
Central Asia, also known as Middle Asia, is a region of Asia that stretches from the Caspian Sea in the west to western China and Mongolia in the east, and from Afghanistan and Iran in the south to Russia in the north. It includes the former ...
.[
"Fancy Bear" has been operating since the mid-2000s. ]CrowdStrike
CrowdStrike Holdings, Inc. is an American cybersecurity technology company based in Austin, Texas. It provides cloud workload and endpoint security, threat intelligence, and cyberattack response services. The company has been involved in inves ...
reported targeting has included Aerospace
Aerospace is a term used to collectively refer to the atmosphere and outer space. Aerospace activity is very diverse, with a multitude of commercial, industrial and military applications. Aerospace engineering consists of aeronautics and astrona ...
, Defense, Energy, Government and the Media industries. "Fancy Bear" intrusions have occurred in United States
The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 U.S. state, states, a Washington, D.C., federal district, five ma ...
, Western Europe, Brazil, Canada
Canada is a country in North America. Its ten provinces and three territories extend from the Atlantic Ocean to the Pacific Ocean and northward into the Arctic Ocean, covering over , making it the world's second-largest country by tota ...
, China, Republic of Georgia, Iran
Iran, officially the Islamic Republic of Iran, and also called Persia, is a country located in Western Asia. It is bordered by Iraq and Turkey to the west, by Azerbaijan and Armenia to the northwest, by the Caspian Sea and Turkm ...
, Japan, Malaysia
Malaysia ( ; ) is a country in Southeast Asia. The federation, federal constitutional monarchy consists of States and federal territories of Malaysia, thirteen states and three federal territories, separated by the South China Sea into two r ...
and South Korea
South Korea, officially the Republic of Korea (ROK), is a country in East Asia, constituting the southern part of the Korea, Korean Peninsula and sharing a Korean Demilitarized Zone, land border with North Korea. Its western border is formed ...
. Targeted defense ministries and military organizations parallel Russian Federation government interests. This may indicate affiliation with the Main Intelligence Directorate (GRU, a Russian military intelligence service). Specifically, "Fancy Bear" has been linked to intrusions into the German Bundestag
German(s) may refer to:
* Germany (of or related to)
**Germania (historical use)
* Germans, citizens of Germany, people of German ancestry, or native speakers of the German language
** For citizens of Germany, see also German nationality law
**Ger ...
and France's TV5 Monde (television station) in April 2015.[ SecureWorks, a cybersecurity firm headquartered in the United States, concluded that from March 2015 to May 2016, the "Fancy Bear" target list included not merely the DNC, but tens of thousands of foes of Putin and the Kremlin in the United States, Ukraine, Russia, Georgia, and Syria. Only a handful of Republicans were targeted, however.
]
Hacking the DNC
On January 25, 2018 Dutch newspaper de Volkskrant
''de Volkskrant'' (; ''The People's Paper'') is a Dutch daily morning newspaper. Founded in 1919, it has a nationwide circulation of about 250,000.
Formerly a leading centre-left Catholic broadsheet, ''de Volkskrant'' today is a medium-sized ...
and TV program Nieuwsuur reported that in 2014 the Dutch Intelligence agency General Intelligence and Security Service (AIVD) successfully infiltrated the computers of Cozy Bear
Cozy Bear, classified by the United States federal government as advanced persistent threat APT29, is a Russian hacker group believed to be associated with one or more intelligence agencies of Russia. The Dutch General Intelligence and Securit ...
and observed the hacking of the head office of the State Department and subsequently the White House and were the first to alert the National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collectio ...
about the cyber-intrusion.
In early 2015, the NSA apprised the FBI and other agencies of the DNC intrusions which the Dutch had secretly detected and on August 15, 2015, the Washington field office first alerted DNC technical staff of the compromise of their systems. Much later, the lack of higher level communications between the political party and the government was seen by the former as an "unfathomable lapse" and it wasn't until April 2016 when legal authorizations to share sensitive technical data with the government finally apprised DNC leaders that their systems had been penetrated.
Cozy Bear" had access to DNC systems since the summer of 2015; and "Fancy Bear", since April 2016. There was no evidence of collaboration or knowledge of the other's presence within the system. Rather, the "two Russian espionage groups compromised the same systems and engaged separately in the theft of identical credentials".[
] "Cozy Bear" employed the "Sea Daddy" implant and an obfuscated PowerShell
PowerShell is a task automation and configuration management program from Microsoft, consisting of a command-line shell and the associated scripting language. Initially a Windows component only, known as Windows PowerShell, it was made open-sou ...
script as a backdoor, launching malicious code
Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, depr ...
at various times and in various DNC systems. "Fancy Bear" employed X Agent malware, which enabled distant command execution, transmissions of files and keylogging, as well as the "X-Tunnel" malware.
DNC leaders became aware of the compromise in April 2016. These attacks broadly reflect Russian government interest in the U.S. political system, as well as political leaders' policies, tendencies and proclivities while assessing possible beneficial outcomes. The attacks also broadly reflect Russian government interest in the strategies, policies, and practices of the U.S. Government. This also globally reflects foreign governments' interest in ascertaining information on Donald Trump as a new entry into U.S. political leadership roles, in contrast to information likely to have been garnered over the decades pertaining to the Clintons.[
The DNC commissioned the cybersecurity company ]CrowdStrike
CrowdStrike Holdings, Inc. is an American cybersecurity technology company based in Austin, Texas. It provides cloud workload and endpoint security, threat intelligence, and cyberattack response services. The company has been involved in inves ...
to defeat the intrusions. Its chief technology officer, Dmitri Alperovitch
Dmitri Mikhailovich Alperovitch (born 1980) is a Soviet-born American think-tank founder, investor, philanthropist, podcast host and former computer security industry executive. He is the chairman of Silverado Policy Accelerator, a geopolitics th ...
, who is also a cybersecurity expert, stated:
Other cybersecurity firms, Fidelis Cybersecurity and FireEye
Trellix (formerly FireEye and McAfee Enterprise) is a privately held cybersecurity company founded in 2022. It has been involved in the detection and prevention of major cyber attacks.
It provides hardware, software, and services to investigat ...
, independently reviewed the malware and came to the same conclusion as CrowdStrike
CrowdStrike Holdings, Inc. is an American cybersecurity technology company based in Austin, Texas. It provides cloud workload and endpoint security, threat intelligence, and cyberattack response services. The company has been involved in inves ...
—that expert Russian hacking groups were responsible for the breach. In November 2017, US authorities identified 6 Russian individuals who conducted the hack. Beginning in December 2016 the Russian government arrested Sergei Mikhailov, a high ranking government cyber-spy, Ruslan Stoyanov, a private sector cyber-security expert, Georgy Fomchenkov, a former government cyber-spy, and Dmitry Dokuchaev, a Mikhailov associate and charged them with aiding U.S. intelligence agencies which the New York Times associated with the DNC hacking.
Donor information
Although the DNC claimed that no personal, financial, or donor information was accessed, "Guccifer 2.0" leaked what he or they claimed were donor lists detailing DNC campaign contributions to Gawker
''Gawker'' is an American blog founded by Nick Denton and Elizabeth Spiers and based in New York City focusing on celebrities and the media industry. According to SimilarWeb, the site had over 23 million visits per month as of 2015. Founded ...
and The Smoking Gun
The Smoking Gun is a website that posts legal documents, arrest records, and police mugshots on a daily basis. The intent is to bring to the public light information that is somewhat obscure or unreported by more mainstream media sources. Most o ...
.
However, this information has not been authenticated, and doubts remain about Guccifer 2.0's backstory.[
]
Guccifer 2.0
In June 2016, a person or person(s) claimed to be the hacker who had hacked the DNC servers and then published the stolen documents online.[Tal Kopan,] "Guccifer 2.0" later also claimed to have leaked 20.000 emails to WikiLeaks
WikiLeaks () is an international non-profit organisation that published news leaks and classified media provided by anonymous sources. Julian Assange, an Australian Internet activist, is generally described as its founder and director and ...
.
U.S. intelligence conclusions
The U.S. Intelligence Community tasked resources debating why Putin chose summer 2016 to escalate active measures influencing U.S. politics. Director of National Intelligence
The director of national intelligence (DNI) is a senior, cabinet-level United States government official, required by the Intelligence Reform and Terrorism Prevention Act of 2004 to serve as executive head of the United States Intelligence Comm ...
James R. Clapper said after the 2011–13 Russian protests that Putin's confidence in his viability as a politician was damaged, and Putin responded with the propaganda operation. Former CIA
The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
officer Patrick Skinner explained the goal was to spread uncertainty. U.S. Congressman Adam Schiff
Adam Bennett Schiff (born June 22, 1960) is an American lawyer, author, and politician who has served as a U.S. representative since 2001. A member of the Democratic Party, he has represented since 2013.
Schiff's district (numbered as the ...
, Ranking Member of the House Permanent Select Committee on Intelligence
The United States House Permanent Select Committee on Intelligence (HPSCI), also known as the House Intelligence Committee, is a committee of the United States House of Representatives, currently chaired by Adam Schiff. It is the primary committ ...
, commented on Putin's aims, and said U.S. intelligence agencies were concerned with Russian propaganda. Speaking about disinformation that appeared in Hungary
Hungary ( hu, Magyarország ) is a landlocked country in Central Europe. Spanning of the Carpathian Basin, it is bordered by Slovakia to the north, Ukraine to the northeast, Romania to the east and southeast, Serbia to the south, Croa ...
, Slovakia
Slovakia (; sk, Slovensko ), officially the Slovak Republic ( sk, Slovenská republika, links=no ), is a landlocked country in Central Europe. It is bordered by Poland to the north, Ukraine to the east, Hungary to the south, Austria to the ...
, the Czech Republic
The Czech Republic, or simply Czechia, is a landlocked country in Central Europe. Historically known as Bohemia, it is bordered by Austria to the south, Germany to the west, Poland to the northeast, and Slovakia to the southeast. Th ...
, and Poland
Poland, officially the Republic of Poland, , is a country in Central Europe. Poland is divided into Voivodeships of Poland, sixteen voivodeships and is the fifth most populous member state of the European Union (EU), with over 38 mill ...
, Schiff said there was an increase of the same behavior in the U.S. Schiff concluded Russian propaganda operations would continue against the U.S. after the election.
On December 9, 2016, the CIA
The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
told U.S. legislators the U.S. Intelligence Community concluded Russia conducted operations during the 2016 U.S. election to assist Donald Trump in winning the presidency. Multiple U.S intelligence agencies concluded people with specific individuals tied to the Russian government gave WikiLeaks
WikiLeaks () is an international non-profit organisation that published news leaks and classified media provided by anonymous sources. Julian Assange, an Australian Internet activist, is generally described as its founder and director and ...
hacked emails from the Democratic National Committee
The Democratic National Committee (DNC) is the governing body of the United States Democratic Party. The committee coordinates strategy to support Democratic Party candidates throughout the country for local, state, and national office, as well ...
(D.N.C.) and additional sources such as John Podesta
John David Podesta Jr. (born January 8, 1949) is an American political consultant who has served as Senior Advisor to President Joe Biden for clean energy innovation and implementation since September 2022. Podesta previously served as White ...
, campaign chairman for Hillary Clinton
Hillary Diane Rodham Clinton ( Rodham; born October 26, 1947) is an American politician, diplomat, and former lawyer who served as the 67th United States Secretary of State for President Barack Obama from 2009 to 2013, as a United States senat ...
. These intelligence organizations additionally concluded Russia hacked the Republican National Committee
The Republican National Committee (RNC) is a U.S. political committee that assists the Republican Party of the United States. It is responsible for developing and promoting the Republican brand and political platform, as well as assisting in f ...
(R.N.C.) as well as the D.N.C.—and chose not to leak information obtained from the R.N.C. The CIA said the foreign intelligence agents were Russian operatives previously known to the U.S. CIA officials told U.S. Senators it was "quite clear" Russia's intentions were to help Trump. Trump released a statement December 9, and disregarded the CIA conclusions.
FBI involvement
A senior law enforcement official told CNN:
The FBI therefore had to rely on an assessment from CrowdStrike
CrowdStrike Holdings, Inc. is an American cybersecurity technology company based in Austin, Texas. It provides cloud workload and endpoint security, threat intelligence, and cyberattack response services. The company has been involved in inves ...
instead, who were hired by the DNC to investigate the cyber attacks.
U.S. legislative response
Members of the U.S. Senate Intelligence Committee traveled to Ukraine and Poland in 2016 and learned about Russian operations to influence their affairs. U.S. Senator Angus King
Angus Stanley King Jr. (born March 31, 1944) is an American lawyer and politician serving as the junior United States senator from Maine since 2013. A political independent since 1993, he previously served as the 72nd governor of Maine from ...
told the ''Portland Press Herald
The ''Portland Press Herald/Maine Sunday Telegram'' is a morning daily newspaper with a website that serves southern Maine and is focused on the greater metropolitan area around Portland, Maine, in the United States.
Founded in 1862, its roots e ...
'' that tactics used by Russia during the 2016 U.S. election were analogous to those used against other countries. On November 30, 2016, King joined a letter in which seven members of the U.S. Senate Intelligence Committee asked President Obama to publicize more information from the intelligence community on Russia's role in the U.S. election. In an interview with CNN, King warned against ignoring the problem, saying it was a bipartisan issue.
Representatives in the U.S. Congress took action to monitor the National security of the United States by advancing legislation to monitor propaganda. On November 30, 2016, legislators approved a measure within the National Defense Authorization Act
The National Defense Authorization Act (NDAA) is the name for each of a series of United States federal laws specifying the annual budget and expenditures of the U.S. Department of Defense. The first NDAA was passed in 1961. The U.S. Congress o ...
to ask the U.S. State Department to act against propaganda with an inter-agency panel. The legislation authorized funding of $160 million over a two-year-period. The initiative was developed through a bipartisan
Bipartisanship, sometimes referred to as nonpartisanship, is a political situation, usually in the context of a two-party system (especially those of the United States and some other western countries), in which opposing political parties find c ...
bill, the Countering Foreign Propaganda and Disinformation Act, written by U.S. Senators Rob Portman
Robert Jones Portman (born December 19, 1955) is an American attorney and politician serving as the Seniority in the United States Senate, junior United States Senate, United States senator from Ohio since 2011. A member of the Republican Party ...
(Republican) and Chris Murphy
Christopher Scott Murphy (born August 3, 1973) is an American lawyer, author, and politician serving as the junior United States senator from Connecticut since 2013. A member of the Democratic Party, he previously served in the United States ...
(Democrat). Portman urged more U.S. government action to counter propaganda. Murphy said after the election it was apparent the U.S. needed additional tactics to fight Russian propaganda. U.S. Senate Intelligence Committee member Ron Wyden
Ronald Lee Wyden (; born May 3, 1949) is an American politician and retired educator serving as the senior United States senator from Oregon, a seat he has held since 1996. A member of the Democratic Party, he served in the United States House ...
said frustration over covert Russian propaganda was bipartisan.
Republican U.S. Senators stated they planned to hold hearings and investigate Russian influence on the 2016 U.S. elections. By doing so they went against the preference of incoming Republican President-elect Donald Trump, who downplayed any potential Russian meddling in the election. U.S. Senate Armed Services Committee
The Committee on Armed Services (sometimes abbreviated SASC for ''Senate Armed Services Committee'') is a committee of the United States Senate empowered with legislative oversight of the nation's military, including the Department of Defe ...
Chairman John McCain and U.S. Senate Intelligence Committee Chairman Richard Burr
Richard Mauze Burr (born November 30, 1955) is an American businessman and politician who is the senior United States senator from North Carolina, serving since 2005. A member of the Republican Party, Burr was previously a member of the Unite ...
discussed plans for collaboration on investigations of Russian cyberwarfare
Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic war ...
during the election. U.S. Senate Foreign Relations Committee
The United States Senate Committee on Foreign Relations is a standing committee of the U.S. Senate charged with leading foreign-policy legislation and debate in the Senate. It is generally responsible for overseeing and funding foreign aid pro ...
Chairman Bob Corker
Robert Phillips Corker Jr. (born August 24, 1952) is an American businessman and politician who served as a United States Senator from Tennessee from 2007 to 2019. A member of the Republican Party, he served as Chair of the Senate Foreign Relat ...
planned a 2017 investigation. Senator Lindsey Graham
Lindsey Olin Graham (born July 9, 1955) is an American lawyer and politician serving as the senior United States senator from South Carolina, a seat he has held since 2003. A member of the Republican Party, Graham chaired the Senate Committee ...
indicated he would conduct a sweeping investigation in the 115th Congress
The 115th United States Congress was a meeting of the legislative branch of the United States of America federal government, composed of the Senate and the House of Representatives. It met in Washington, D.C., from January 3, 2017, to January ...
.
President Obama order
On December 9, 2016, President Obama ordered the entire United States Intelligence Community
United may refer to:
Places
* United, Pennsylvania, an unincorporated community
* United, West Virginia, an unincorporated community
Arts and entertainment Films
* United (2003 film), ''United'' (2003 film), a Norwegian film
* United (2011 film) ...
to conduct an investigation into Russia's attempts to influence the 2016 U.S. election — and provide a report before he left office on January 20, 2017. Lisa Monaco
Lisa Oudens Monaco (born February 25, 1968) is an American attorney, former federal prosecutor and national security official who has served as the 39th deputy attorney general of the United States since April 2021.
Monaco previously served as ...
, U.S. Homeland Security Advisor and chief counterterrorism advisor to the president, announced the study, and said the intrusion of a foreign nation into a U.S. national election was an unprecedented event that would necessitate further investigation by subsequent administrations in the executive branch. The intelligence analysis will take into account data from the last three presidential elections in the U.S. Evidence showed malicious cyberwarfare
Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic war ...
during the 2008
File:2008 Events Collage.png, From left, clockwise: Lehman Brothers went bankrupt following the Subprime mortgage crisis; Cyclone Nargis killed more than 138,000 in Myanmar; A scene from the opening ceremony of the 2008 Summer Olympics in Beijing ...
and 2016 U.S. elections.
See also
* 2016 Democratic National Committee email leak
The 2016 Democratic National Committee email leak is a collection of Democratic National Committee (DNC) emails stolen by one or more hackers operating under the pseudonym " Guccifer 2.0" who are alleged to be Russian intelligence agency hacker ...
* Cold War II
The Second Cold War,
Cold War II,
or the New Cold War
are terms that refer to heightened political, social, ideological, informational, and military tensions in the 21st century. The term is used in the context of the tensions between th ...
* Conspiracy theories related to the Trump–Ukraine scandal
* Democratic Congressional Campaign Committee cyber attacks
* Foreign electoral intervention
Foreign electoral interventions are attempts by governments, covertly or overtly, to influence elections in another country.
Academic studies Intervention measurements
Theoretical and empirical research on the effect of foreign electoral inte ...
* Office of Personnel Management data breach
* Operation Aurora
Operation Aurora was a series of cyber attacks conducted by advanced persistent threats such as the Elderwood Group based in Beijing, China, with ties to the People's Liberation Army. First publicly disclosed by Google on January 12, 2010, in ...
* '' The Plot to Hack America''
* Podesta emails
In March 2016, the personal Gmail account of John Podesta, a former White House chief of staff and chair of Hillary Clinton's 2016 U.S. presidential campaign, was compromised in a data breach accomplished via a spear-phishing attack, and some ...
* Russian espionage in the United States
* Russian interference in the 2016 United States elections
The Russian government interfered in the 2016 U.S. presidential election with the goals of harming the campaign of Hillary Clinton, boosting the candidacy of Donald Trump, and increasing political and social discord in the United States. Acc ...
* Russian interference in the 2018 United States elections
The United States Intelligence Community concluded in early 2018 that the Russian government was continuing the interfence it started during the 2016 elections and was attempting to influence the 2018 United States mid-term elections by gener ...
* Social media in the 2016 United States presidential election
* Trump Tower meeting
*
* Yahoo! data breaches
The Internet service company Yahoo! was subjected to the largest data breach on record. Two major data breaches of user account data to hackers were revealed during the second half of 2016. The first announced breach, reported in September 2016, ...
References
External links
Timeline of hacks and publications
on Glomar Disclosure
{{Hacking in the 2010s
Computer security
Democratic National Committee
Espionage
Russian intelligence agencies
2015 scandals
2016 scandals
Data breaches in the United States
2015 in the United States
2016 in the United States
Email hacking
Hacking in the 2010s
2015 in computing
2016 in computing
Russian interference in the 2016 United States elections