US & Russia Relations: It’s A New Cold War

Retaliation: US expels Russian diplomats and threatens other undisclosed measure in response to interference in the Presidential election.

Today’s US sanctions against Russia, including the expulsion of 35 diplomats and the closure of two Russian intelligence gathering sites in Maryland and New York, are much stiffer than expected. 

Taken in response to the alleged Kremlin-ordered hacking of the recent presidential election, they underline how relations between the two former superpowers are now at their worst since the early 1980s, during the last spasm of the Cold War.

Although Russia, which has denied the charges, is likely to respond in kind, the repercussions of the incident could be fairly short lived, given that the new administration of Donald Trump, who has poured scorn on the hacking claims and vowed to improve ties with Moscow.

Nonetheless, they will surely greatly complicate life for the president-elect. Not only do President Obama and the Democrats, the victims of the hacking, believe such measures are overdue. 

So do senior Congressional figures of Mr Trump’s Republican Party, including House Speaker Paul Ryan and several Senators, led by Arizona’s John McCain, chairman of the Senate Armed Services Committee. Even before today’s announcement, pressure has been building on Capitol Hill for a special committee, akin to the 1973 Watergate committee, to examine the matter further.

At the very least, the dramatic expulsions, and the certainty of tit-for-tat measures by Moscow, ensure the future of US-Russian relations will be front and centre of the confirmation hearings next month of Rex Tillerson, Mr Trump’s nominee for Secretary of State, who as head of ExxonMobil had close ties with the Kremlin, and of Congressman Mike Pompeo, named to take over the CIA.

Measured by numbers alone, the expulsions appear to be the largest such exercise since 2001, when Washington ordered out 50 Russian personnel after the capture of Robert Hanssen, the FBI counter intelligence agent who had spied for the Soviet Union and then Russia for more than 20 years.

US officials moreover believe the election hacking, most notably of the Democratic National Committee and the personal email account of John Podesta, Hillary Clinton’s campaign chairman, was but the culmination of a long campaign of disruption.

According to the country’s intelligence community, such interference is “decade-long.” Mounted by hacking groups believed to be linked to the FSB, successor to the KGB, and to Russian military intelligence, it has involved methods such as “spear-phishing, and campaigns targeting government organizations, critical infrastructure, think tanks, universities, political organisations, and corporations,” the US intelligence agencies believe.

In addition, the CIA and FBI are now reportedly convinced that the hacking – and the leaks published by Wikileaks – were not merely aimed at generally disrupting the US electoral process, but specifically at damaging Ms. Clinton, and helping the more sympathetic Mr Trump win.

Whether the meddling made a tangible difference however is hotly disputed, above all by Mr Trump, who has branded the charges “ridiculous.” Only this week he called for Americans to “get on with our lives” rather than pick a sanctions fight with Moscow.

Independent:        Obama Orders ‘Deep Dive’ Into Election Hacking:

Photo: Kremlin.ru

 

« Malaysia Sets Up Cybersecurity Academy
Obama Advises Trump To Train 100,000 Hackers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BruCON

BruCON

Brucon is Belgiums premium security and hacking conference.

Prewen

Prewen

Prewen provide solutions to protect sensitive data across the organisation.

CyberSource

CyberSource

CyberSource provides online payment and fraud management services for medium and large-sized merchants.

Mi-Token

Mi-Token

Mi-Token is an advanced two-factor authentication solution that offers unparalleled security, flexibility, cost-effectiveness and ease of use.

UL

UL

UL is a safety, security and compliance consulting and certification company. Areas covered include cyber security.

e-Governance Academy (eGA)

e-Governance Academy (eGA)

eGA is a think tank and consultancy founded for the transfer of knowledge and best practice in e-governance, e-democracy and national cyber security.

Devel

Devel

Devel is a LATAM cybersecurity company specialized in providing red, blue and purple team services for the financial sector.

Redborder

Redborder

Redborder is an Open Source network visibility, data analytics, and cybersecurity Big Data solution that is scalable up to the needs of enterprise networks and service providers.

Get Safe Online

Get Safe Online

Get Safe Online is a leading source of unbiased, factual and easy-to-understand information on online safety.

Cybersecurity Coalition

Cybersecurity Coalition

The mission of the Cybersecurity Coalition is to bring together leading companies to help policymakers develop consensus-driven policy solutions to achieve improvements in cybersecurity.

Bolt Learning

Bolt Learning

Bolt's Cyber Security eLearning module provides users with an in-depth understanding of cybercrime, how it can occur and what everyone can contribute to preventing it.

Securance Consulting

Securance Consulting

Since 2002, Securance has empowered enterprises to assume proactive security, compliance, and risk management strategies.

Cognisys Group

Cognisys Group

Cognisys provides cyber security penetration testing and compliance services from its offices in Leeds and Manchester.

DruvStar

DruvStar

DruvStar provides B2B cybersecurity around threat management to strengthen businesses across attack vectors.

CyberFOX

CyberFOX

CyberFOX is a global cybersecurity solutions provider focused on identity access management (IAM) for managed service providers (MSPs) and IT professionals.

Invictus International Consulting

Invictus International Consulting

Invictus International Consulting are a recognized leader in full-spectrum cyber technology solutions designed to protect the security of our nation's global defense and critical infrastructure.