Click to Skip Ad
Closing in...

US government blames recent political hacks on Russia

Updated Oct 7th, 2016 4:08PM EDT
Russia Hacks DNC Emails
Image: Minchillo/AP/REX/Shutterstock

If you buy through a BGR link, we may earn an affiliate commission, helping support our expert product labs.

On Friday afternoon, the Department of Homeland Security and Office of the Director of National Intelligence on Election Security issued a joint statement confirming that the Russian government was behind “the recent compromises of e-mails from US persons and institutions, including from US political organizations.”

DON’T MISS: Watch a pilot fly through the eye of Hurricane Matthew

There have been several high-profile cyber attacks on government officials in recent months, and although Russia was the prime suspect, this is the first time that Obama’s administration has made a formal accusation against the country.

The subject of the hacks came up in the first presidential debate, where Hillary Clinton called out Donald Trump for inviting Russia to continue hacking in light of the Democratic National Convention hack earlier this year. Trump responded by saying that no one knew who the actual perpetrators were, noting it could have been Russia, China or “someone sitting on their bed that weighs 400 pounds.”

Below is the full statement from the DHS and ODNI regarding the hacks:

“The U.S. Intelligence Community (USIC) is confident that the Russian Government directed the recent compromises of e-mails from US persons and institutions, including from US political organizations. The recent disclosures of alleged hacked e-mails on sites like DCLeaks.com and WikiLeaks and by the Guccifer 2.0 online persona are consistent with the methods and motivations of Russian-directed efforts. These thefts and disclosures are intended to interfere with the US election process. Such activity is not new to Moscow—the Russians have used similar tactics and techniques across Europe and Eurasia, for example, to influence public opinion there. We believe, based on the scope and sensitivity of these efforts, that only Russia’s senior-most officials could have authorized these activities.

Some states have also recently seen scanning and probing of their election-related systems, which in most cases originated from servers operated by a Russian company. However, we are not now in a position to attribute this activity to the Russian Government. The USIC and the Department of Homeland Security (DHS) assess that it would be extremely difficult for someone, including a nation-state actor, to alter actual ballot counts or election results by cyber attack or intrusion. This assessment is based on the decentralized nature of our election system in this country and the number of protections state and local election officials have in place. States ensure that voting machines are not connected to the Internet, and there are numerous checks and balances as well as extensive oversight at multiple levels built into our election process.

Nevertheless, DHS continues to urge state and local election officials to be vigilant and seek cybersecurity assistance from DHS. A number of states have already done so. DHS is providing several services to state and local election officials to assist in their cybersecurity. These services include cyber “hygiene” scans of Internet-facing systems, risk and vulnerability assessments, information sharing about cyber incidents, and best practices for securing voter registration databases and addressing potential cyber threats. DHS has convened an Election Infrastructure Cybersecurity Working Group with experts across all levels of government to raise awareness of cybersecurity risks potentially affecting election infrastructure and the elections process. Secretary Johnson and DHS officials are working directly with the National Association of Secretaries of State to offer assistance, share information, and provide additional resources to state and local officials.”

Jacob Siegal
Jacob Siegal Associate Editor

Jacob Siegal is Associate Editor at BGR, having joined the news team in 2013. He has over a decade of professional writing and editing experience, and helps to lead our technology and entertainment product launch and movie release coverage.