- How a 10-second Disney jingle became a meme in Thailand Today 4:48 PM
- Instagram users share photos showing gruesome killing of 17-year-old Bianca Devins Today 4:33 PM
- The horror game banned for mocking China’s president probably isn’t coming back Today 3:31 PM
- Cheap vibrators, condoms, and lube: The most satisfying Amazon Prime Day deals Today 3:07 PM
- George R.R. Martin says fan backlash won’t affect his ‘Game of Thrones’ ending Today 3:03 PM
- The very finest Area 51 memes Today 2:52 PM
- Tweet map ranks states where people are boycotting Amazon Prime Day Today 1:54 PM
- Lil Nas X says he will perform at Area 51 for free Today 12:56 PM
- The best Prime Day deals for gamers Today 12:53 PM
- How Republicans are dancing around Trump’s racist tweets Today 12:42 PM
- Not even anti-immigrant groups are defending Trump’s ‘go back’ tweets Today 12:37 PM
- Netflix’s latest chase thriller ‘Point Blank’ lacks electricity Today 12:27 PM
- Jay Inslee floats Megan Rapinoe as his secretary of state pick Today 11:33 AM
- The cast list for the ‘Kingsman’ prequel movie looks totally nuts Today 11:17 AM
- The best Prime Day deals to heat up your kitchen Today 11:16 AM
Here’s the evidence U.S. intelligence has on Russia’s election hacking
This is the full FBI–DHS report on Russian election hacking, dubbed ‘Grizzly Steppe.’
U.S. intelligence agencies on Thursday released a detailed report laying out evidence showing that Russia’s government orchestrated cyberattacks meant to tamper with America’s presidential election.
The 13-page Joint Analysis Report (JAR), released by the FBI and the Department of Homeland Security (DHS), details the technical methods two Russian intelligence agencies used to “compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities.”
The report coincides with the White House announcement that it has ejected 35 Russian intelligence diplomats and imposed sanctions on nine Russian officials or entities.
The Obama administration imposed sanctions on four officers of the Russian military intelligence agency—the Main Intelligence Directorate, or GRU—whom the U.S. believes orchestrated cyberattacks against the Democratic National Committee (DNC) and John Podesta, former campaign manager for Democratic nominee Hillary Clinton. The U.S. has also sanctioned the GRU itself, as well as Russia’s civilian intelligence agency, the Federal Security Service, or FSB. The U.S. also imposed sanctions on three companies the White House says aided GRU’s cyberattacks.
U.S. intelligence dubbed the Russian cyber campaign “Grizzly Steppe” in its report, which repeatedly refers to the attacks on the DNC and Podesta but does not mention them by name.
Emails stolen from the DNC, the Democratic Congressional Campaign Committee (DCCC), and Podesta were published online by various outlets, including WikiLeaks, which has denied Russian operatives were its source for more than 50,000 Podesta emails.
President-elect Donald Trump has repeatedly denied that U.S. intelligence agencies know Russia hacked Democratic entities, calling the claims “ridiculous” and urging Americans to “get on with our lives.” On Thursday evening, Trump reiterated the latter sentiment while agreeing to meeting with intelligence agencies for a briefing on the Russia-led cyberattacks.
“It is time for our country to move on to bigger and better things,” Trump said in a short statement. “Nevertheless, in the interest of our country and its great people, I will meet with leaders of the intelligence community next week in order to be updated on the facts of this situation.”
The JAR contains a variety of intelligence jargon. Here’s a quick glossary:
- RIS: Shorthand for both the GRU and the FSB, Russia’s military and civilian intelligence agencies, respectively.
- APT28: A GRU-run hacking group the U.S. says breached the DNC and Podesta and provided documents to WikiLeaks.
- APT29: An FSB-run hacking group said to have infiltrated the DNC’s system for over a year.
- RATs: Remote Access Tools, or viruses used to infiltrate targets.
- Spearphishing: A targeted technique used to trick specific users into handing over sensitive information or downloading malware; APT28 is said to have used a spearphishing email to gain Podesta’s Gmail credentials.
The full JAR is below:
Update 8:30pm CT, Dec. 29: Added Trump statement released Thursday evening.
Andrew Couts is the former editor of Layer 8, a section dedicated to the intersection of the Internet and the state—and the gaps in between. Prior to the Daily Dot, Couts served as features editor and features writer for Digital Trends, associate editor of TheWeek.com, and associate editor at Maxim magazine. When he’s not working, Couts can be found hiking with his German shepherds or blasting around on motorcycles.