2016 Election and Hostile Foreign Power
The hackers had a distinct behavior of engaging in online campaign activities which would influence the Americans’ presidential choices. They made use of Facebook and Twitter to undermine the popularity of Hillary Clinton amongst the population. The two social media platforms allowed the attackers to spread defaming information about Hillary’s presidency to the Internet users in America. An example of the hackers’ tendency to use social media to propagate political stance is on the day of election when there was a group on Twitter which sent the hashtag #WarAgainstDemocrats about 1,700 times (Miller). The fraudsters were responsible for creating the groups that spread the public awareness campaign. Similarly, Facebook had propagandas which included a post which held ‘Never Hillary and the revolution must continue’. Eventually, the hackers went on to endorse Clinton’s rivals for the Democrats’ nomination using the information they illegally acquired from her emails.
The hackers were able to acquire Facebook and Twitter accounts with the American profiles. They would then impersonate the US citizens to improve the credibility of the propaganda they were sharing on the Internet. An inquiry by the Federal Bureau of Investigation indicates that over 10 million people saw the hackers’ ads on Facebook. Also, the attackers were able to purchase space on computer servers within the United States to make the political opinions appear to be coming from within the nation. Making the voters of America think that the political views were from within would significantly influence their choice of president.
Finally, the hackers illegally obtained personal details from the party members’ emails from the Democrats National Committee information system. The fraudsters then shared the controversial content on the financing of the party presidential candidate with the public portraying Hillary as lacking leadership ethics necessary for holding the office. The hackers also compromised the personal files of the party leaders, official chats, and the credit information of the party donors. At the same time, the attackers were cultivating an excellent reputation for Trump through campaigns on the social media.
Investigations by both governmental and private firms indicate that Russia was responsible for the hack of the Democratic National Committee in 2016. The Secure Works Company investigated the URL which had lured John Podesta to giving up the password he was using to obtain authorization for accessing the Democrats’ information system. The firm discovered that hackers sent the link to military targets, and its source was Russia. The United States Intelligence Agencies also claimed they were confident that the nation was responsible for the hack. Secondly, there was a registration of a domain whose purpose was to trick the Democrats National Committee employees’ using fraudulent emails. The address present in the political organization system malware was similar to the one that had been used on the parliament of Germany in 2015. An investigation by the German security officers revealed that the malware was from Russia. Their findings concurred with those of Crowd Strike which claimed that the attack was carried out by a Russian operation. Besides, there was a similar SSL certificate present in both breaches.
Further, there was the accidental inclusion of Russian language metadata in the leaked files (Office of the Director of National Intelligence 13). Also, the documents had errors which were in the Russian language. The presence of the latter on some of