Hacking The Vote: Russia Wins, America Loses

Russia has finally issued a response to the allegations of hacking American government servers and it proved to be a very unsubtle one.

Sergei Lavrov, the Kremlin’s unofficial spokesman and Vladimir Putin’s right hand man as Foreign Minister (pictured) was scathing in his rebuke to claims his country was trying to swing the upcoming US election Donald Trump’s way through cyber invasion. He described the accusations in an interview with CNN as “flattering.”

“It’s flattering, of course, to get this kind of attention – for a regional power, as President Obama called us some time ago – Now everybody in the United States is saying that it is Russia that it is Russia which is running the Presidential election”

The point was punctuated in typically passive aggressive terms.

“We have not seen a single fact, a single proof.”

His statement seems to fly in the face of an FBI report which, although now proven to be unsubstantiated though plausible, blamed the Russian government for the invasion of American governmental cyberspace. Furthermore, perhaps ironically, it does finally show that despite claims from both Trump and Lavrov Moscow does have a preferred 45th president in mind and their name is not Hilary Clinton.

In the second presidential debate Trump strenuously denied any involvement or affection for Russia, and especially Putin. Clearly he has not quite worked out the power of the internet, despite repeatedly mentioning Mrs Clinton’s email scandal in interviews and debates. Within minutes of making a statement saying “I don’t know Russia, I don’t have any property there” internet trolls had posted videos of him openly praising Putin’s style of leadership.

This clearly means that in terms of Russia’s relationship with the US would benefit far more from a Trump presidency than a second Clinton one but in all honesty from the way Lavrov behaved in the interview, and he has long been known to reflect to the letter his president’s thoughts, that the former does not really care.In an official statement from the White House, the US government said their response to this perceived attack by the old enemy as “proportional” without specifying exactly what measures they were prepared to take.

Lavrov’s response summed up their attitude succinctly.

“It’s not worth, I believe, speculating. If they decided to do something, let them do it. But to say that Russia is interfering in the United States’ domestic matters is ridiculous.”

He then proceeded to echo the Reoublican candidate’s mantra “There are so many pussies around {the American} presidential campaign on both sides and I prefer not to comment.”

And so this diplomatic spat has come to a stalemate. Perhaps the Russians are just being nonchalant despite being behind a serious breach of security for the most powerful nation in the western world or perhaps Trump is right, perhaps it really is “somebody sitting on their bed that weighs 400 pounds.”

Either way, it appears that the situation will not resolve itself, but that does not necessarily mean that a resolution will need to be found as long as the Kremlin cares so little about what they see as a petty quarrel. 

JM-H 

 

 

« What Does Brexit Mean For British Data Privacy?
Global Cyber Security Awareness Month »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DKCERT

DKCERT

DKCERT (Danish Computer Security Incident Response Team) handles security incidents on forskningsnettet, the National Research and Education Network (NREN) in Denmark.

Infrascale

Infrascale

Infrascale specialise in providing cloud backup and disaster recovery services.

Indium Software

Indium Software

Indium Software is an Independent Software Testing Company offering software testing services (including security testing) and offshore Quality Assurance solutions.

Rogue Wave Software

Rogue Wave Software

At Rogue Wave, our mission is to simplify your hardest problems, improve software quality and security, and shorten the time it takes to deliver value.

Flexential

Flexential

Flexential helps organizations optimize their journey of IT transformation while simultaneously balancing cost, scalability, compliance and security.

Nok Nok Labs

Nok Nok Labs

Nok Nok is a market leader in next generation authentication for cloud, mobile and IoT applications.

VietSunshine

VietSunshine

VietSunshine is a leading provider of network security infrastructure and solutions in Vietnam.

CloudOak

CloudOak

CloudOak is a cloud channel provider for hybrid cloud Backup as a Service (BaaS), Disaster Recovery as a Service (DRaaS) and Archiving to Small to Medium Business (SMB).

TAG Cyber

TAG Cyber

TAG Cyber's mission is to provide world-class cyber security research, advisory, and consulting services to enterprise security teams around the world.

CyberAcuView

CyberAcuView

CyberAcuView is a company dedicated to enhancing cyber risk mitigation efforts across the insurance industry.

eCentre@LindenPointe

eCentre@LindenPointe

The eCenter@LindenPointe provides assistance to the development, management and promotion of STEM (Science, Technology, Engineering, Mathematics) related business ventures.

IBM Security

IBM Security

IBM manufactures and markets computer hardware, middleware and software, and offers hosting and consulting services in areas ranging from mainframe computers to nanotechnology.

Phylum

Phylum

Phylum provides powerful, automated software supply chain risk analysis that protects organizations, defends developers and enables secure innovation.

ITRM

ITRM

ITRM are one of the UK’s top managed service providers and offer a range of award-winning IT solutions, from ad-hoc consultancy to cyber security.

ACDS (Advanced Cyber Defence Systems)

ACDS (Advanced Cyber Defence Systems)

ACDS was founded in the belief that cyber security can be done better. We’re combining emerging technologies and proven methods to bring a new approach to tackling the growing threat landscape.

Fable Security

Fable Security

We’re reimagining human risk management. Fable brings together the best of engineering, behavioral science, and AI to solve one of security’s hardest problems.