Professional Documents
Culture Documents
6, 2016
We are concerned that an ongoing Russian influence operation is targeting the 2016
U.S. election. This is a serious national security issue that transcends partisan
politics.
For this reason, we urge our colleagues in the press and our fellow citizens to be
cautious in the use of allegedly leaked information. The free flow of information
and ideas is what makes Americas political discourse so vibrant, but we now know
that our enemies are using this part of our system against us.
Private cybersecurity firms, independent experts, and senior U.S. intelligence and
law enforcement officials, all link Guccifer 2.0 to Russia and identify Russian cyber
intelligence agents as the likely perpetrator of the hack of political institutions like
the DNC and the DCCC. In this election, private documents and emails stolen by
Guccifer 2.0 have already made their way into the public discourse.
The hackers themselves have told us more are coming.
While we cannot rule out the possibility of isolated cyber attacks on US voting
systems on Election Day, it is imperative that we focus on the broad disinformation
campaign that is already underway.
What is taking place in the United States follows a well-known Russian playbook:
First leak compelling and truthful information to gain credibility. The next step:
release fake documents that look the same. This leaves a discredited actor in the
position of denying the authenticity in the merciless court of public opinion, just
weeks before an election. When this tactic is successful, opinions change and the
foreign actor proves its ability to manipulate perceptions and likely votes.
Disinformation and influence operations like these are a formal part of Russian
military doctrine and intelligence operations. These operations most often target
Russias near neighbors, like Estonia, Georgia, and Ukraine. But the Russians have
also used cyber tools to influence elections in the Netherlands and spread false
stories through the media in Germany and here in the United States.
Thus far, Democratic candidates and staff, as well as former Republican Secretaries
of State, have been targeted with information obtained in the hack on the DNC. In
the instances when they have been given the opportunity, those attacked have
validated that the documents are genuine. The process has begun and stage has
been set for the introduction of false information.