The US administration does not exclude that the presidential election voting system States will undergo large-scale hacker attack. This statement was made by the Minister of national security Jay Johnson.
“In recent months, hackers have thoroughly studied a large number of systems (voting) States, which can be a preparation to an attempt of penetration. In some cases, as we have determined that the hackers gained access to a system of voting States. However, at the moment we are not aware of any manipulation with these data”, – quotes TASS Johnson.
He called on the authorities of all States to apply to the Federal government for help in strengthening cyber defence systems of voting. At the moment this advice was followed by 21 staff.
Earlier, Republicans Paul Ryan and Mitch McConnell and Democrats Nancy Pelosi and Gary Reid in a joint letter stressed that the presidential election is necessary to strengthen the cyber defence and said that the attackers can use hacking to disrupt the vote.
Note that the previous leadership of the democratic party, publicly accused Russia of organizing the hacking of the servers. The National Committee of the democratic party noted that the burglary was committed in favor of rival former Secretary of state Hillary Clinton in the fight for the U.S. presidency – Republican nominee Donald trump.
During the first round of debate with trump Clinton returned to the theme, accusing his rival that he “invited the Russians to organize an attack. Trump denied the charges and said that the Russian involvement in the incident has not been proven.
Still, the U.S. government had not provided official evidence of the involvement of Russia to cracking. The investigation leads the FBI. In the Kremlin’s accusations categorically reject.
A few days ago it became known that the FBI is investigating cyber attacks on the new Democratic party USA, took place last month. According to investigators, the mobile phones of the Democrats tried to hack the hackers, “supported by the Russian government.”
Reuters citing a source said that if the attack was successful, the hackers could obtain a wide range of data: information about calls, text messages, emails, photos.