cnn cannot independently verify the authenticity of this frame grab. turkish officials apparently releasing two photos of the suspect. they tell us they have his fingerprints from the scene but so far have not given us a name of the suspect. there is also dramatic surveillance video of the gunman entering the nightclub. take a look at this. he is firing as he goes in. in some frames you can even see bullets ricocheting. he killed 39 people inside the nightclub and wounded dozens of others. the victims were from 14 different countries. isis has claimed responsibility for this attack but has given no clues about the identity of the gunman. terror experts tell us, if isis actually directed the attack, it may have been more likely to have been a martyrdom operation with the perpetrator either taking his own life or confronting police and dying in a hail of gunfire. the information that this man slipped away leads some experts to believe this might have been an isis-inspired attack by a man
i think. he was ranting on and on about russian leaders and putin and everything else. now he is putin s favorite congressman, apparently. times have changed. i guess so. times are changing but not in the way bob dylan sang about in the 60s. any way. the u.s. government is continuing as we speak of russia to grapple with the suspected cyber attacks by that country. the latest. russian malware discovered on a laptop at a small vermont electric provider. the utility company said it discovered the virus before it affected the grid. the homeland security is warning officials to be on lookout for a code associated with, quote, grizzly step. the cyberoperations targeting the u.s. government and pl political organizations and businesses and scitizens could e widespread. on friday putin said he would
reciprical measures. the foreign ministry saying russia will announce retialiatin measures on friday. tomorrow is the official counter measures. tomorrow is being today, of course. athena jones. thank you. it includes two russian hackers on the fbi most wanted list for years. the two are both wanted for large scale theft of money. both men are fugitives. whereabouts unknown. the administration backing up the sanctions with the release of a report from the fbi and department of homeland security. it lays out unclassified technical details explains how investigators linked russian agencies to the hack of the democratic national convention and clinton campaign manager john podesta. the russian cyber attacks have been code named grizzly step.
that was known as grizzly step. can you cliffs note this for us? what most important information did we learn from the report? thanks very much. i would take two major points out of that report. first, it was very pointed in its description of russian activities in cyberspace. not just as it pertains to the activities around the election. but the activities that they are taking as cyber against universities and government institutions and in fact the destructive attacks that have been attributed to the russians in the ukraine and others as far as critical infrastructure and those sorts of things. so point one is the russians have integrated cyber into the national security policy and they re playing by a different set of rules than we are. we really have to think about how we would do that. the second thing i would take out go ahead. go ahead, sorry i interrupted. the second major point is that i would argue the dnc and
that there are digital fingerprints, and the code, in effect, of these hacks. one example being the use of cyrillic key boards, that being the russian alphabet, something you would use there and not here. there is the impression that this evidence is somehow secret or murky. as an example, the fbi and department of homeland security released what s in effect a schematic of exactly how the hacks were done. flow charts, they have a code name for it. grizzly step, a name for russian malicious cyber activity. a lot of the ways the hacks were carried out is now being made public so that companies, both private and public, can use the information to prevent acts in the future. you know, it s very interesting, the u.s. has identified foreign countries hacking the u.s. before, hasn t it? no question. they ve done this before with confidence. you may remember in 2013 they were able to identify a specific