WASHINGTON — The leaders of the Senate Intelligence Committee on Wednesday largely endorsed the findings of the intelligence community that Russia sought to sway the 2016 U.S. elections through a hacking and influence campaign, and they called for a “more aggressive, whole-of-government approach” to ensure future elections are not similarly compromised.

“There is consensus among members and staff that we trust the conclusions of the ICA,” Sen. Richard Burr, R-N.C., the committee’s chairman, said at Wednesday news conference, referring to the intelligence community’s assessment that Russia was behind hackings of the Democratic National Committee and Hillary Clinton campaign director John Podesta’s email account and had attempted to exploit public opinion by sowing false information, much of it through fake social media accounts.

“But we don’t close our consideration of it,” he added.

Burr also said that “the issue of collusion is still open” and would not be resolved until the committee’s work was done. He said that a deadline for the committee was the looming start of the 2018 primary season.

“We’ve got to make our facts, as it related to Russia’s involvement in our election, before the primaries getting started in 2018,” Burr said.

“You can’t walk away from this and believe that Russia’s not currently active,” he added.

Burr and Sen. Mark Warner, D-Va., the committee’s vice chairman, said the committee has interviewed more than 100 people and reviewed more than 100,000 documents, many of them from the intelligence community, President Trump’s inner circle and former members of the Obama administration.

In some areas of the investigation, Burr added, investigators had “exhausted every individual” they could speak with in several areas of the probe – such as an April 2016 meeting at the Mayflower Hotel in Washington.


Only subscribers are eligible to post comments. Please subscribe or login first for digital access. Here’s why.

Use the form below to reset your password. When you've submitted your account email, we will send an email with a reset code.