Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInEmail this to someone

The House Oversight Committee’s top Democrat on Thursday requested the panel launch a “robust” investigation into the cyberattacks that shook the presidential campaign.

“I propose that the Oversight Committee begin by obtaining for all of our Members and appropriately-cleared staff a classified briefing from the Intelligence Community on these issues, followed by a robust investigation designed to identify specific recommendations for actions that our country can take to respond to these attacks and safeguard against similar attacks in the future,” Rep. Elijah Cummings wrote to Rep. Jason Chaffetz, who chairs the oversight panel.

“Over the course of your chairmanship, we have had our differences on certain issues, but this should not be one of them,” he added. “This perilous menace goes beyond party, beyond politics, and beyond partisanship.”

Cummings cited comments by NSA Director Adm. Mike Rogers, Florida Sen. Marco Rubio and the office of House Speaker Paul Ryan warning of the dangers of Russian cyber activity directed at the U.S. election.

“Although these attacks were executed to harm the Democratic candidate for president on this occasion,” he wrote, “Russia’s actions sow doubts about our entire elections system and merit a robust congressional investigation.”

The Obama administration has publicly blamed Russia for cyberattacks on the Democratic National Committee, the Democratic Congressional Campaign Committee and other political organizations.

Hillary Clinton’s campaign chairman and other private individuals also had their emails hacked and leaked by entities reportedly connected to hacker groups linked to the Russian government.

Sen. Lindsey Graham on Tuesday also called for hearings to investigate Russia’s behavior.

Source

Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInEmail this to someone
  • Learn more about eGRC Strategy, Products and Services click here
  • Learn more about Threat & Vulnerability Management Platforms click here
  • Learn more about Advanced End Point Protection click here
  • Learn more about NextGen Identity & Access Management Solutions click here