US & Russia Relations: It’s A New Cold War

Retaliation: US expels Russian diplomats and threatens other undisclosed measure in response to interference in the Presidential election.

Today’s US sanctions against Russia, including the expulsion of 35 diplomats and the closure of two Russian intelligence gathering sites in Maryland and New York, are much stiffer than expected. 

Taken in response to the alleged Kremlin-ordered hacking of the recent presidential election, they underline how relations between the two former superpowers are now at their worst since the early 1980s, during the last spasm of the Cold War.

Although Russia, which has denied the charges, is likely to respond in kind, the repercussions of the incident could be fairly short lived, given that the new administration of Donald Trump, who has poured scorn on the hacking claims and vowed to improve ties with Moscow.

Nonetheless, they will surely greatly complicate life for the president-elect. Not only do President Obama and the Democrats, the victims of the hacking, believe such measures are overdue. 

So do senior Congressional figures of Mr Trump’s Republican Party, including House Speaker Paul Ryan and several Senators, led by Arizona’s John McCain, chairman of the Senate Armed Services Committee. Even before today’s announcement, pressure has been building on Capitol Hill for a special committee, akin to the 1973 Watergate committee, to examine the matter further.

At the very least, the dramatic expulsions, and the certainty of tit-for-tat measures by Moscow, ensure the future of US-Russian relations will be front and centre of the confirmation hearings next month of Rex Tillerson, Mr Trump’s nominee for Secretary of State, who as head of ExxonMobil had close ties with the Kremlin, and of Congressman Mike Pompeo, named to take over the CIA.

Measured by numbers alone, the expulsions appear to be the largest such exercise since 2001, when Washington ordered out 50 Russian personnel after the capture of Robert Hanssen, the FBI counter intelligence agent who had spied for the Soviet Union and then Russia for more than 20 years.

US officials moreover believe the election hacking, most notably of the Democratic National Committee and the personal email account of John Podesta, Hillary Clinton’s campaign chairman, was but the culmination of a long campaign of disruption.

According to the country’s intelligence community, such interference is “decade-long.” Mounted by hacking groups believed to be linked to the FSB, successor to the KGB, and to Russian military intelligence, it has involved methods such as “spear-phishing, and campaigns targeting government organizations, critical infrastructure, think tanks, universities, political organisations, and corporations,” the US intelligence agencies believe.

In addition, the CIA and FBI are now reportedly convinced that the hacking – and the leaks published by Wikileaks – were not merely aimed at generally disrupting the US electoral process, but specifically at damaging Ms. Clinton, and helping the more sympathetic Mr Trump win.

Whether the meddling made a tangible difference however is hotly disputed, above all by Mr Trump, who has branded the charges “ridiculous.” Only this week he called for Americans to “get on with our lives” rather than pick a sanctions fight with Moscow.

Independent:        Obama Orders ‘Deep Dive’ Into Election Hacking:

Photo: Kremlin.ru

 

« Malaysia Sets Up Cybersecurity Academy
Obama Advises Trump To Train 100,000 Hackers »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Gigamon

Gigamon

Gigamon provides intelligent Traffic Visability solutions that provide unmatched visbility into physical & birtual networks without affecting the performance or stability of production environments.

Institute for National Security and Counterterrorism (INSCT)

Institute for National Security and Counterterrorism (INSCT)

INSCT is a center for the study of national security, international security, and counterterrorism. Research programs include New Frontiers in Science, Cyber, & Technology

Talend

Talend

Talend is a leader in cloud and big data integration software. Applications include Risk and Compliance management.

Japan Information Security Audit Association (JASA)

Japan Information Security Audit Association (JASA)

JASA is non-profit association active in developing and managing the quality of Information Security Auditing and Auditors in Japan.

Arcanum Information Security (AIS)

Arcanum Information Security (AIS)

Arcanum Information Security is a specialist Information Assurance Consultancy and a leading provider of Cyber Security services to UK Defence, UK Government, Enterprise businesses and SMEs.

TechBeacon

TechBeacon

TechBeacon.com is a digital hub by and for software engineering, IT and security professionals sharing practical and passionate guidance to real-world challenges.

Rentalworks

Rentalworks

Rentalworks is a leading provider of Internet-of-Things (IoT) Asset Lifecycle Management Services including secure data erasure and disposal.

Project Moore

Project Moore

Project Moore is an Amsterdam law firm specialising in IT-law and privacy.

InfoLock

InfoLock

Infolock are experts in data governance, providing consulting and advisory services that help organizations effectively secure, manage, and optimize their data.

N-able

N-able

N-Able deliver simple and sophisticated monitoring, security, and business solutions that empower you to solve your toughest IT challenges.

Pathlock

Pathlock

Pathlock (formerly Greenlight) help enterprises and organizations automate the enforcement of any process, access, or IT general control, for any business application.

Edgio

Edgio

Edgio provides unmatched speed, security, and simplicity at the edge through globally-scaled media and applications platforms.

Three Wire Systems

Three Wire Systems

Three Wire is a leader in innovative and efficient technology solutions for government agencies and large enterprise corporations.

Semgrep

Semgrep

Semgrep is a fast, open-source, static analysis tool for profoundly improving software security and reliability.

Invisily

Invisily

Invisily makes enterprise and cloud computing resources invisible to attackers with zero trust solutions, making them visible only when needed to only those who need them.

Datacom

Datacom

Datacom design, build and run IT systems and processes across operations, cybersecurity, cloud, digital platforms, payroll and enterprise applications.