COMMITTEE SENSITIVE—RUSSIA INVESTIGATION ONLY
| |
August 31, 2016 | FBI opened its investigation on the and "conducted outreach to State 2 county election officials to discuss individual security postures and any suspicious activity."[1] FBI outreach reveals that one State 2 county—County A—was scanned.[2] |
September 30, 2016 | FBI held a conference call with county election officials to advise of the attempt to probe County A.[3] FBI also notified state and local officials of available DHS services.[4] |
October 4, 2016 | County B's IT administrator contacted FBI regarding a potential intrusion.[5] According to the FBI, "Of particular concern, the activity included a connection to a county voting, testing, and maintenance server used for poll worker classes."[6] |
October 14, 2016 | (U) FBI shared County B indicators by issuing a FLASH.[7] |
December 29, 2016 | (U) DHS and FBI released a Joint Analysis Report (JAR) on the "GRIZZLY STEPPE" intrusion set; report represents the first IC attribution of state election-related systems to the Russians.[8] |
[9] | |
June 2017 | (U) DHS notified State 2 counties of a possible intrusion "as part of a broader notification to 122 entities identified as spearphishing victims in an intelligence report."[10] |
- ↑ (U) DTS 2018-2416; FBI Briefing on [State 2] Election Systems, June 25, 2018, p. 5.
- ↑ (U) Ibid.
- ↑ (U) Ibid., pp. 5-6.
- ↑ (U) Ibid., p. 6.
- ↑ (U) Ibid.
- ↑ (U) Ibid.
- ↑ (U/ ) FBI FLASH, Alert Number T-LD1005-TT, TLP-AMBER,
- ↑ (U) DHS/FBI, Joint Analysis Report, JAR-16-20296A, GRIZZLY STEPPE – Russian Malicious Cyber Activity, December 29, 2016,
- ↑ (U) DTS 2018-2416; FBI Briefing on [State 2] Election Systems, June 25, 2018, p. 7.
- ↑ (U) Ibid.
26
COMMITTEE SENSITIVE—RUSSIA INVESTIGATION ONLY