HOME

TheInfoList



OR:

The Democratic National Committee cyber attacks took place in 2015 and 2016, in which two groups of Russian
computer hackers A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge ...
infiltrated the
Democratic National Committee The Democratic National Committee (DNC) is the governing body of the United States Democratic Party. The committee coordinates strategy to support Democratic Party candidates throughout the country for local, state, and national office, as well ...
(DNC)
computer network A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are ...
, leading to a
data breach A data breach is a security violation, in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so. Other terms are unintentional information disclosure, data leak, inf ...
.
Cybersecurity Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, t ...
experts, as well as the U.S. government, determined that the cyberespionage was the work of Russian intelligence agencies. Forensic evidence analyzed by several cybersecurity firms, CrowdStrike, Fidelis, and
Mandiant Mandiant is an American cybersecurity firm and a subsidiary of Google. It rose to prominence in February 2013 when it released a report directly implicating China in cyber espionage. In December 2013, Mandiant was acquired by FireEye for $1 bi ...
(or
FireEye Trellix (formerly FireEye and McAfee Enterprise) is a privately held cybersecurity company founded in 2022. It has been involved in the detection and prevention of major cyber attacks. It provides hardware, software, and services to investigat ...
), strongly indicates that two Russian intelligence agencies separately infiltrated the DNC computer systems. The American
cybersecurity Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, t ...
firm CrowdStrike, which removed the hacking programs, revealed a history of encounters with both groups and had already named them, calling one of them
Cozy Bear Cozy Bear, classified by the United States federal government as advanced persistent threat APT29, is a Russian hacker group believed to be associated with one or more intelligence agencies of Russia. The Dutch General Intelligence and Securi ...
and the other
Fancy Bear Fancy Bear (also known as APT28 (by Mandiant), Pawn Storm, Sofacy Group (by Kaspersky), Sednit, Tsar Team (by FireEye) and STRONTIUM (by Microsoft)) is a Russian cyber espionage group. Cybersecurity firm CrowdStrike has said with a medium l ...
, names which are used in the media. On December 9, 2016, the
CIA The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
told U.S. legislators the U.S. Intelligence Community concluded Russia conducted the cyberattacks and other operations during the 2016 U.S. election to assist
Donald Trump Donald John Trump (born June 14, 1946) is an American politician, media personality, and businessman who served as the 45th president of the United States from 2017 to 2021. Trump graduated from the Wharton School of the University of P ...
in winning the presidency. Multiple U.S. intelligence agencies concluded that specific individuals tied to the Russian government provided WikiLeaks with the stolen emails from the DNC, as well as stolen emails from
Hillary Clinton Hillary Diane Rodham Clinton ( Rodham; born October 26, 1947) is an American politician, diplomat, and former lawyer who served as the 67th United States Secretary of State for President Barack Obama from 2009 to 2013, as a United States sen ...
's campaign chairman, who was also the target of a cyberattack. These intelligence organizations additionally concluded Russia hacked the
Republican National Committee The Republican National Committee (RNC) is a U.S. political committee that assists the Republican Party of the United States. It is responsible for developing and promoting the Republican brand and political platform, as well as assisting in ...
(R.N.C.) as well as the D.N.C., but chose not to leak information obtained from the R.N.C.


Cyber attacks and responsibility

Cyber attacks that successfully penetrated the DNC computing system began in 2015. Attacks by "Cozy Bear" began in the summer of 2015. Attacks by "Fancy Bear" began in April 2016. It was after the "Fancy Bear" group began their activities that the compromised system became apparent. The groups were presumed to have been spying on communications, stealing
opposition research In politics, opposition research (also called oppo research) is the practice of collecting information on a political opponent or other adversary that can be used to discredit or otherwise weaken them. The information can include biographical, le ...
on
Donald Trump Donald John Trump (born June 14, 1946) is an American politician, media personality, and businessman who served as the 45th president of the United States from 2017 to 2021. Trump graduated from the Wharton School of the University of P ...
, as well as reading all
email Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices. Email was thus conceived as the electronic ( digital) version of, or counterpart to, mail, at a time when "mail" mean ...
and chats. Both were finally identified by CrowdStrike in May 2016. Both groups of intruders were successfully expelled from the DNC systems within hours after detection. These attacks are considered to be part of a group of recent attacks targeting U.S. government departments and several political organizations, including 2016 campaign organizations. On July 22, 2016, a person or entity going by the moniker "
Guccifer 2.0 "Guccifer 2.0" is a persona which claimed to be the hacker(s) who gained unauthorized access to the Democratic National Committee (DNC) computer network and then leaked its documents to the media, the website WikiLeaks, and a conference event. S ...
" claimed on a
WordPress WordPress (WP or WordPress.org) is a free and open-source content management system (CMS) written in hypertext preprocessor language and paired with a MySQL or MariaDB database with supported HTTPS. Features include a plugin architectu ...
-hosted blog to have been acting alone in hacking the DNC. He also claimed to send significant amounts of stolen electronic DNC documents to
WikiLeaks WikiLeaks () is an international non-profit organisation that published news leaks and classified media provided by anonymous sources. Julian Assange, an Australian Internet activist, is generally described as its founder and director and ...
. WikiLeaks has not revealed the source for their leaked emails. However,
cybersecurity Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, t ...
experts and firms, including CrowdStrike,
Fidelis Cybersecurity Fidelis Cybersecurity is a cybersecurity company focused on threat detection, hunting, and targeted response of advanced threats and data breaches. Among its customers includes IBM, the United States Army and the United States Department of Comme ...
,
Mandiant Mandiant is an American cybersecurity firm and a subsidiary of Google. It rose to prominence in February 2013 when it released a report directly implicating China in cyber espionage. In December 2013, Mandiant was acquired by FireEye for $1 bi ...
, SecureWorks,
ThreatConnect ThreatConnect is a cyber-security firm based in Arlington, Virginia. They provide a Threat Intelligence Platform for companies to aggregate and act upon threat intelligence. History The firm was founded in 2011 as Cyber Squared Inc. by Adam Vinc ...
, and the editor for
Ars Technica ''Ars Technica'' is a website covering news and opinions in technology, science, politics, and society, created by Ken Fisher and Jon Stokes in 1998. It publishes news, reviews, and guides on issues such as computer hardware and software, sc ...
, have rejected the claims of "Guccifer 2.0" and have determined, on the basis of substantial evidence, that the cyberattacks were committed by two Russian state-sponsored groups (Cozy Bear and Fancy Bear). According to separate reports in ''The New York Times'' and ''The Washington Post'', U.S. intelligence agencies have concluded with "high confidence" that the Russian government was behind the theft of emails and documents from the DNC.Ellen Nakashima
Is there a Russian master plan to install Trump in the White House? Some intelligence officials are skeptical
''New York Times'' (July 27, 2016).
While the U.S. intelligence community has concluded that Russia was behind the cyberattack, intelligence officials told ''The Washington Post'' that they had "not reached a conclusion about who passed the emails to WikiLeaks" and so did not know "whether Russian officials directed the leak." A number of experts and cybersecurity analysts believe that "Guccifer 2.0" is probably a Russian government disinformation cover story to distract attention away from the DNC breach by the two Russian intelligence agencies. Note: Dmitri Alperovitch is a CrowdStrike co-founder, CTO, and cybersecurity expert. Note: This news article is licensed under a Creative Commons Attribution-Share Alike 3.0 License President Obama and Russian President Vladimir Putin had a discussion about
computer security Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, t ...
issues, which took place as a side segment during the then-ongoing G20 summit in China in September 2016. Obama said Russian hacking stopped after his warning to Putin. In a joint statement on October 7, 2016, the
United States Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-ter ...
and the Office of the Director of National Intelligence stated that the US intelligence community is confident that the Russian government directed the breaches and the release of the obtained material in an attempt to "… interfere with the US election process."


Background

As is common among Russian intelligence services, both groups used similar hacking tools and strategies. It is believed that neither group was aware of the other. Although this is antithetical to American computer intelligence methods, for fear of undermining or defeating intelligence operations of the other, this has been common practice in the Russian intelligence community since 2004. This intrusion was part of several attacks attempting to access information from American political organizations, including the 2016 U.S. presidential campaigns. Both "Cozy Bear" and "Fancy Bear" are known adversaries, who have extensively engaged in political and economic espionage that benefits the
Russian Federation Russia (, , ), or the Russian Federation, is a transcontinental country spanning Eastern Europe and Northern Asia. It is the largest country in the world, with its internationally recognised territory covering , and encompassing one-eig ...
government. Both are believed connected to the Russian intelligence services. Also, both access resources and demonstrate levels of proficiency matching nation-state capabilities. "Cozy Bear" has in the past year infiltrated unclassified computer systems of the
White House The White House is the official residence and workplace of the president of the United States. It is located at 1600 Pennsylvania Avenue NW in Washington, D.C., and has been the residence of every U.S. president since John Adams in ...
, the
U.S. State Department The United States Department of State (DOS), or State Department, is an executive department of the U.S. federal government responsible for the country's foreign policy and relations. Equivalent to the ministry of foreign affairs of other n ...
, and the
U.S. Joint Chiefs of Staff The Joint Chiefs of Staff (JCS) is the body of the most senior uniformed leaders within the United States Department of Defense, that advises the president of the United States, the secretary of defense, the Homeland Security Council and the ...
. According to CrowdStrike, other targeted sectors include: Defense, Energy,
Mining Mining is the extraction of valuable minerals or other geological materials from the Earth, usually from an ore body, lode, vein, seam, reef, or placer deposit. The exploitation of these deposits for raw material is based on the econom ...
, Financial, Insurance, Legal, Manufacturing, Media,
Think tank A think tank, or policy institute, is a research institute that performs research and advocacy concerning topics such as social policy, political strategy, economics, military, technology, and culture. Most think tanks are non-govern ...
s, Pharmaceutical,
Research Research is "creative and systematic work undertaken to increase the stock of knowledge". It involves the collection, organization and analysis of evidence to increase understanding of a topic, characterized by a particular attentiveness ...
and
Technology Technology is the application of knowledge to reach practical goals in a specifiable and reproducible way. The word ''technology'' may also mean the product of such an endeavor. The use of technology is widely prevalent in medicine, scien ...
industries as well as universities. "Cozy Bear" observed attacks have occurred in
Western Europe Western Europe is the western region of Europe. The region's countries and territories vary depending on context. The concept of "the West" appeared in Europe in juxtaposition to "the East" and originally applied to the ancient Mediterranean ...
, Brazil,
China China, officially the People's Republic of China (PRC), is a country in East Asia. It is the world's List of countries and dependencies by population, most populous country, with a Population of China, population exceeding 1.4 billion, slig ...
, Japan, Mexico,
New Zealand New Zealand ( mi, Aotearoa ) is an island country in the southwestern Pacific Ocean. It consists of two main landmasses—the North Island () and the South Island ()—and over 700 smaller islands. It is the sixth-largest island coun ...
, South Korea,
Turkey Turkey ( tr, Türkiye ), officially the Republic of Türkiye ( tr, Türkiye Cumhuriyeti, links=no ), is a transcontinental country located mainly on the Anatolian Peninsula in Western Asia, with a small portion on the Balkan Peninsula ...
and
Central Asia Central Asia, also known as Middle Asia, is a region of Asia that stretches from the Caspian Sea in the west to western China and Mongolia in the east, and from Afghanistan and Iran in the south to Russia in the north. It includes the fo ...
. "Fancy Bear" has been operating since the mid-2000s. CrowdStrike reported targeting has included
Aerospace Aerospace is a term used to collectively refer to the atmosphere and outer space. Aerospace activity is very diverse, with a multitude of commercial, industrial and military applications. Aerospace engineering consists of aeronautics and ast ...
, Defense, Energy, Government and the Media industries. "Fancy Bear" intrusions have occurred in
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country Continental United States, primarily located in North America. It consists of 50 U.S. state, states, a Washington, D.C., ...
, Western Europe, Brazil,
Canada Canada is a country in North America. Its ten provinces and three territories extend from the Atlantic Ocean to the Pacific Ocean and northward into the Arctic Ocean, covering over , making it the world's second-largest country by to ...
, China, Republic of Georgia,
Iran Iran, officially the Islamic Republic of Iran, and also called Persia, is a country located in Western Asia. It is bordered by Iraq and Turkey to the west, by Azerbaijan and Armenia to the northwest, by the Caspian Sea and Turkmeni ...
, Japan,
Malaysia Malaysia ( ; ) is a country in Southeast Asia. The federal constitutional monarchy consists of thirteen states and three federal territories, separated by the South China Sea into two regions: Peninsular Malaysia and Borneo's East Mal ...
and
South Korea South Korea, officially the Republic of Korea (ROK), is a country in East Asia, constituting the southern part of the Korea, Korean Peninsula and sharing a Korean Demilitarized Zone, land border with North Korea. Its western border is formed ...
. Targeted defense ministries and military organizations parallel Russian Federation government interests. This may indicate affiliation with the
Main Intelligence Directorate Main Intelligence Directorate may refer to: * Main Directorate of Intelligence (Ukraine), the military intelligence service of Ukraine * GRU, the foreign military intelligence agency of the Russian Armed Forces * GRU (Soviet Union) Main Intel ...
(GRU, a Russian military intelligence service). Specifically, "Fancy Bear" has been linked to intrusions into the
German Bundestag German(s) may refer to: * Germany (of or related to) **Germania (historical use) * Germans, citizens of Germany, people of German ancestry, or native speakers of the German language ** For citizens of Germany, see also German nationality law **Ge ...
and France's
TV5 Monde TV5Monde (), formerly known as TV5, is a French public television network, broadcasting several channels of French-language programming. It is an approved participant member of the European Broadcasting Union. The network is available across ...
(television station) in April 2015. SecureWorks, a cybersecurity firm headquartered in the United States, concluded that from March 2015 to May 2016, the "Fancy Bear" target list included not merely the DNC, but tens of thousands of foes of Putin and the Kremlin in the United States, Ukraine, Russia, Georgia, and Syria. Only a handful of Republicans were targeted, however.


Hacking the DNC

On January 25, 2018
Dutch Dutch commonly refers to: * Something of, from, or related to the Netherlands * Dutch people () * Dutch language () Dutch may also refer to: Places * Dutch, West Virginia, a community in the United States * Pennsylvania Dutch Country People E ...
newspaper
de Volkskrant ''de Volkskrant'' (; ''The People's Paper'') is a Dutch daily morning newspaper. Founded in 1919, it has a nationwide circulation of about 250,000. Formerly a leading centre-left Catholic broadsheet, ''de Volkskrant'' today is a medium-sized c ...
and TV program
Nieuwsuur Nieuwsuur (''News Hour'') is a Dutch current affairs television program produced for the NPO by the government broadcasters NOS and NTR. It is broadcast daily between 9.30 pm and 10 pm (9.30-10 pm at weekends) on NPO 2. The programme pays part ...
reported that in 2014 the Dutch Intelligence agency
General Intelligence and Security Service The General Intelligence and Security Service ( nl, Algemene Inlichtingen- en Veiligheidsdienst, AIVD; ) is the intelligence and security agency of the Netherlands, tasked with domestic, foreign and signals intelligence and protecting nationa ...
(AIVD) successfully infiltrated the computers of
Cozy Bear Cozy Bear, classified by the United States federal government as advanced persistent threat APT29, is a Russian hacker group believed to be associated with one or more intelligence agencies of Russia. The Dutch General Intelligence and Securi ...
and observed the hacking of the head office of the State Department and subsequently the White House and were the first to alert the
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
about the cyber-intrusion. In early 2015, the NSA apprised the FBI and other agencies of the DNC intrusions which the Dutch had secretly detected and on August 15, 2015, the Washington field office first alerted DNC technical staff of the compromise of their systems. Much later, the lack of higher level communications between the political party and the government was seen by the former as an "unfathomable lapse" and it wasn't until April 2016 when legal authorizations to share sensitive technical data with the government finally apprised DNC leaders that their systems had been penetrated. Cozy Bear" had access to DNC systems since the summer of 2015; and "Fancy Bear", since April 2016. There was no evidence of collaboration or knowledge of the other's presence within the system. Rather, the "two Russian espionage groups compromised the same systems and engaged separately in the theft of identical credentials". "Cozy Bear" employed the "Sea Daddy" implant and an obfuscated
PowerShell PowerShell is a task automation and configuration management program from Microsoft, consisting of a command-line shell and the associated scripting language. Initially a Windows component only, known as Windows PowerShell, it was made open-sou ...
script as a backdoor, launching
malicious code Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, dep ...
at various times and in various DNC systems. "Fancy Bear" employed X Agent malware, which enabled distant command execution, transmissions of files and keylogging, as well as the "X-Tunnel" malware. DNC leaders became aware of the compromise in April 2016. These attacks broadly reflect Russian government interest in the U.S. political system, as well as political leaders' policies, tendencies and proclivities while assessing possible beneficial outcomes. The attacks also broadly reflect Russian government interest in the strategies, policies, and practices of the U.S. Government. This also globally reflects foreign governments' interest in ascertaining information on Donald Trump as a new entry into U.S. political leadership roles, in contrast to information likely to have been garnered over the decades pertaining to the Clintons. The DNC commissioned the cybersecurity company CrowdStrike to defeat the intrusions. Its chief technology officer, Dmitri Alperovitch, who is also a cybersecurity expert, stated: Other cybersecurity firms,
Fidelis Cybersecurity Fidelis Cybersecurity is a cybersecurity company focused on threat detection, hunting, and targeted response of advanced threats and data breaches. Among its customers includes IBM, the United States Army and the United States Department of Comme ...
and
FireEye Trellix (formerly FireEye and McAfee Enterprise) is a privately held cybersecurity company founded in 2022. It has been involved in the detection and prevention of major cyber attacks. It provides hardware, software, and services to investigat ...
, independently reviewed the malware and came to the same conclusion as CrowdStrike—that expert Russian hacking groups were responsible for the breach. In November 2017, US authorities identified 6 Russian individuals who conducted the hack. Beginning in December 2016 the Russian government arrested Sergei Mikhailov, a high ranking government cyber-spy, Ruslan Stoyanov, a private sector cyber-security expert, Georgy Fomchenkov, a former government cyber-spy, and Dmitry Dokuchaev, a Mikhailov associate and charged them with aiding U.S. intelligence agencies which the New York Times associated with the DNC hacking.


Donor information

Although the DNC claimed that no personal, financial, or donor information was accessed, "Guccifer 2.0" leaked what he or they claimed were donor lists detailing DNC campaign contributions to
Gawker ''Gawker'' is an American blog founded by Nick Denton and Elizabeth Spiers and based in New York City focusing on celebrities and the media industry. According to SimilarWeb, the site had over 23 million visits per month as of 2015. Founded ...
and
The Smoking Gun The Smoking Gun is a website that posts legal documents, arrest records, and police mugshots on a daily basis. The intent is to bring to the public light information that is somewhat obscure or unreported by more mainstream media sources. Mos ...
. However, this information has not been authenticated, and doubts remain about Guccifer 2.0's backstory.


Guccifer 2.0

In June 2016, a person or person(s) claimed to be the hacker who had hacked the DNC servers and then published the stolen documents online.Tal Kopan, "Guccifer 2.0" later also claimed to have leaked 20.000 emails to
WikiLeaks WikiLeaks () is an international non-profit organisation that published news leaks and classified media provided by anonymous sources. Julian Assange, an Australian Internet activist, is generally described as its founder and director and ...
.


U.S. intelligence conclusions

The U.S. Intelligence Community tasked resources debating why Putin chose summer 2016 to escalate active measures influencing U.S. politics.
Director of National Intelligence The director of national intelligence (DNI) is a senior, cabinet-level United States government official, required by the Intelligence Reform and Terrorism Prevention Act of 2004 to serve as executive head of the United States Intelligence Co ...
James R. Clapper James Robert Clapper Jr. (born March 14, 1941) is a retired lieutenant general in the United States Air Force and former Director of National Intelligence. Clapper has held several key positions within the United States Intelligence Community. H ...
said after the 2011–13 Russian protests that Putin's confidence in his viability as a politician was damaged, and Putin responded with the propaganda operation. Former
CIA The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
officer Patrick Skinner explained the goal was to spread uncertainty. U.S. Congressman
Adam Schiff Adam Bennett Schiff (born June 22, 1960) is an American lawyer, author, and politician who has served as a U.S. representative since 2001. A member of the Democratic Party, he has represented since 2013. Schiff's district (numbered as the 2 ...
, Ranking Member of the House Permanent Select Committee on Intelligence, commented on Putin's aims, and said U.S. intelligence agencies were concerned with Russian propaganda. Speaking about disinformation that appeared in
Hungary Hungary ( hu, Magyarország ) is a landlocked country in Central Europe. Spanning of the Carpathian Basin, it is bordered by Slovakia to the north, Ukraine to the northeast, Romania to the east and southeast, Serbia to the south, Cr ...
,
Slovakia Slovakia (; sk, Slovensko ), officially the Slovak Republic ( sk, Slovenská republika, links=no ), is a landlocked country in Central Europe. It is bordered by Poland to the north, Ukraine to the east, Hungary to the south, Austria to the ...
, the
Czech Republic The Czech Republic, or simply Czechia, is a landlocked country in Central Europe. Historically known as Bohemia, it is bordered by Austria to the south, Germany to the west, Poland to the northeast, and Slovakia to the southeast. The ...
, and
Poland Poland, officially the Republic of Poland, is a country in Central Europe. It is divided into 16 administrative provinces called voivodeships, covering an area of . Poland has a population of over 38 million and is the fifth-most populou ...
, Schiff said there was an increase of the same behavior in the U.S. Schiff concluded Russian propaganda operations would continue against the U.S. after the election. On December 9, 2016, the
CIA The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
told U.S. legislators the U.S. Intelligence Community concluded Russia conducted operations during the 2016 U.S. election to assist Donald Trump in winning the presidency. Multiple U.S intelligence agencies concluded people with specific individuals tied to the Russian government gave
WikiLeaks WikiLeaks () is an international non-profit organisation that published news leaks and classified media provided by anonymous sources. Julian Assange, an Australian Internet activist, is generally described as its founder and director and ...
hacked emails from the
Democratic National Committee The Democratic National Committee (DNC) is the governing body of the United States Democratic Party. The committee coordinates strategy to support Democratic Party candidates throughout the country for local, state, and national office, as well ...
(D.N.C.) and additional sources such as
John Podesta John David Podesta Jr. (born January 8, 1949) is an American political consultant who has served as Senior Advisor to President Joe Biden for clean energy innovation and implementation since September 2022. Podesta previously served as Whit ...
, campaign chairman for
Hillary Clinton Hillary Diane Rodham Clinton ( Rodham; born October 26, 1947) is an American politician, diplomat, and former lawyer who served as the 67th United States Secretary of State for President Barack Obama from 2009 to 2013, as a United States sen ...
. These intelligence organizations additionally concluded Russia hacked the
Republican National Committee The Republican National Committee (RNC) is a U.S. political committee that assists the Republican Party of the United States. It is responsible for developing and promoting the Republican brand and political platform, as well as assisting in ...
(R.N.C.) as well as the D.N.C.—and chose not to leak information obtained from the R.N.C. The CIA said the foreign intelligence agents were Russian operatives previously known to the U.S. CIA officials told U.S. Senators it was "quite clear" Russia's intentions were to help Trump. Trump released a statement December 9, and disregarded the CIA conclusions.


FBI involvement

A senior law enforcement official told CNN: The FBI therefore had to rely on an assessment from CrowdStrike instead, who were hired by the DNC to investigate the cyber attacks.


U.S. legislative response

Members of the U.S. Senate Intelligence Committee traveled to Ukraine and Poland in 2016 and learned about Russian operations to influence their affairs. U.S. Senator
Angus King Angus Stanley King Jr. (born March 31, 1944) is an American lawyer and politician serving as the junior United States senator from Maine since 2013. A political independent since 1993, he previously served as the 72nd governor of Maine from 19 ...
told the '' Portland Press Herald'' that tactics used by Russia during the 2016 U.S. election were analogous to those used against other countries. On November 30, 2016, King joined a letter in which seven members of the U.S. Senate Intelligence Committee asked President Obama to publicize more information from the intelligence community on Russia's role in the U.S. election. In an interview with CNN, King warned against ignoring the problem, saying it was a bipartisan issue. Representatives in the U.S. Congress took action to monitor the National security of the United States by advancing legislation to monitor propaganda. On November 30, 2016, legislators approved a measure within the
National Defense Authorization Act The National Defense Authorization Act (NDAA) is the name for each of a series of United States federal laws specifying the annual budget and expenditures of the U.S. Department of Defense. The first NDAA was passed in 1961. The U.S. Congress o ...
to ask the
U.S. State Department The United States Department of State (DOS), or State Department, is an executive department of the U.S. federal government responsible for the country's foreign policy and relations. Equivalent to the ministry of foreign affairs of other n ...
to act against propaganda with an inter-agency panel. The legislation authorized funding of $160 million over a two-year-period. The initiative was developed through a
bipartisan Bipartisanship, sometimes referred to as nonpartisanship, is a political situation, usually in the context of a two-party system (especially those of the United States and some other western countries), in which opposing political parties find co ...
bill, the
Countering Foreign Propaganda and Disinformation Act Countering Foreign Propaganda and Disinformation Act is a bipartisan bill that was introduced by the United States Congress on 10 May 2016. The bill was initially called the Countering Information Warfare Act. The bipartisan legislation was writ ...
, written by U.S. Senators
Rob Portman Robert Jones Portman (born December 19, 1955) is an American attorney and politician serving as the junior United States senator from Ohio since 2011. A member of the Republican Party, Portman was the 35th director of the Office of Management ...
(Republican) and
Chris Murphy Christopher Scott Murphy (born August 3, 1973) is an American lawyer, author, and politician serving as the junior United States senator from Connecticut since 2013. A member of the Democratic Party, he previously served in the United States H ...
(Democrat). Portman urged more U.S. government action to counter propaganda. Murphy said after the election it was apparent the U.S. needed additional tactics to fight Russian propaganda. U.S. Senate Intelligence Committee member
Ron Wyden Ronald Lee Wyden (; born May 3, 1949) is an American politician and retired educator serving as the senior United States senator from Oregon, a seat he has held since 1996. A member of the Democratic Party, he served in the United States Hou ...
said frustration over covert Russian propaganda was bipartisan. Republican U.S. Senators stated they planned to hold hearings and investigate Russian influence on the 2016 U.S. elections. By doing so they went against the preference of incoming Republican President-elect Donald Trump, who downplayed any potential Russian meddling in the election. U.S. Senate Armed Services Committee Chairman
John McCain John Sidney McCain III (August 29, 1936 – August 25, 2018) was an American politician and United States Navy officer who served as a United States senator from Arizona from 1987 until his death in 2018. He previously served two te ...
and U.S. Senate Intelligence Committee Chairman Richard Burr discussed plans for collaboration on investigations of Russian
cyberwarfare Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic ...
during the election.
U.S. Senate Foreign Relations Committee The United States Senate Committee on Foreign Relations is a standing committee of the U.S. Senate charged with leading foreign-policy legislation and debate in the Senate. It is generally responsible for overseeing and funding foreign aid p ...
Chairman
Bob Corker Robert Phillips Corker Jr. (born August 24, 1952) is an American businessman and politician who served as a United States Senator from Tennessee from 2007 to 2019. A member of the Republican Party, he served as Chair of the Senate Foreign Rel ...
planned a 2017 investigation. Senator
Lindsey Graham Lindsey Olin Graham (born July 9, 1955) is an American lawyer and politician serving as the senior United States senator from South Carolina, a seat he has held since 2003. A member of the Republican Party, Graham chaired the Senate Committee on ...
indicated he would conduct a sweeping investigation in the
115th Congress The 115th United States Congress was a meeting of the legislative branch of the United States of America federal government, composed of the Senate and the House of Representatives. It met in Washington, D.C., from January 3, 2017, to January ...
.


President Obama order

On December 9, 2016, President Obama ordered the entire
United States Intelligence Community United may refer to: Places * United, Pennsylvania, an unincorporated community * United, West Virginia, an unincorporated community Arts and entertainment Films * ''United'' (2003 film), a Norwegian film * ''United'' (2011 film), a BBC Two f ...
to conduct an investigation into Russia's attempts to influence the 2016 U.S. election — and provide a report before he left office on January 20, 2017.
Lisa Monaco Lisa Oudens Monaco (born February 25, 1968) is an American attorney, former federal prosecutor and national security official who has served as the 39th deputy attorney general of the United States since April 2021. Monaco previously served as ...
, U.S. Homeland Security Advisor and chief counterterrorism advisor to the president, announced the study, and said the intrusion of a foreign nation into a U.S. national election was an unprecedented event that would necessitate further investigation by subsequent administrations in the executive branch. The intelligence analysis will take into account data from the last three presidential elections in the U.S. Evidence showed malicious
cyberwarfare Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic ...
during the
2008 File:2008 Events Collage.png, From left, clockwise: Lehman Brothers went bankrupt following the Subprime mortgage crisis; Cyclone Nargis killed more than 138,000 in Myanmar; A scene from the opening ceremony of the 2008 Summer Olympics in Beijing; ...
and 2016 U.S. elections.


See also

*
2016 Democratic National Committee email leak The 2016 Democratic National Committee email leak is a collection of Democratic National Committee (DNC) emails stolen by one or more hackers operating under the pseudonym " Guccifer 2.0" who are alleged to be Russian intelligence agency hackers ...
*
Cold War II The Second Cold War, Cold War II, or the New Cold War are terms that refer to heightened political, social, ideological, informational, and military tensions in the 21st century. The term is used in the context of the tensions between th ...
*
Conspiracy theories related to the Trump–Ukraine scandal Since 2016, then-presidential candidate Donald Trump and his allies have promoted several conspiracy theories related to the Trump–Ukraine scandal. One such theory seeks to blame Ukraine, instead of Russia, for interference in the 2016 Unit ...
*
Democratic Congressional Campaign Committee cyber attacks On Friday July 29, 2016 the Democratic Congressional Campaign Committee reported that its computer systems had been infiltrated. It is strongly believed by US intelligence sources that the infiltrator groups are Russian foreign intelligence groups ...
*
Foreign electoral intervention Foreign electoral interventions are attempts by governments, covertly or overtly, to influence elections in another country. Academic studies Intervention measurements Theoretical and empirical research on the effect of foreign electoral inte ...
*
Office of Personnel Management data breach In June 2015, the United States Office of Personnel Management (OPM) announced that it had been the target of a data breach targeting personnel records. Approximately 22.1 million records were affected, including records related to government emplo ...
*
Operation Aurora Operation Aurora was a series of cyber attacks conducted by advanced persistent threats such as the Elderwood Group based in Beijing, China, with ties to the People's Liberation Army. First publicly disclosed by Google on January 12, 2010, in ...
* '' The Plot to Hack America'' *
Podesta emails In March 2016, the personal Gmail account of John Podesta, a former White House chief of staff and chair of Hillary Clinton's 2016 U.S. presidential campaign, was compromised in a data breach accomplished via a spear-phishing attack, and some ...
*
Russian espionage in the United States Russian espionage in the United States has occurred since at least the Cold War (as the Soviet Union), and likely well before. According to the United States government, by 2007 it had reached Cold War levels.
*
Russian interference in the 2016 United States elections The Russian government interfered in the 2016 U.S. presidential election with the goals of harming the campaign of Hillary Clinton, boosting the candidacy of Donald Trump, and increasing political and social discord in the United States. Ac ...
*
Russian interference in the 2018 United States elections The United States Intelligence Community concluded in early 2018 that the Russian government was continuing the interfence it started during the 2016 elections and was attempting to influence the 2018 United States mid-term elections by gener ...
*
Social media in the 2016 United States presidential election Social media played an important role in shaping the course of events leading up to, during, and after the 2016 United States presidential election. It enabled people to have a greater interaction with the political climate, controversies, and n ...
*
Trump Tower meeting Trump most commonly refers to: * Donald Trump (born 1946), 45th president of the United States (2017–2021) * Trump (card games), any playing card given an ad-hoc high rank Trump may also refer to: Businesses and organizations * Donald J. Tr ...
* * Yahoo! data breaches


References


External links


Timeline of hacks and publications
on Glomar Disclosure {{Hacking in the 2010s Computer security Democratic National Committee Espionage Russian intelligence agencies 2015 scandals 2016 scandals Data breaches in the United States 2015 in the United States 2016 in the United States Email hacking Hacking in the 2010s 2015 in computing 2016 in computing Russian interference in the 2016 United States elections