Trump’s Joint Cybersecurity Unit With Russia – It’s Not Happening

Donald Trump initially claimed victory after his trip to Europe, describing a new era of co-operation with Russia and outlining plans for a joint cyber-security unit to protect against election hacking.

He has has now backtracked on a proposal to work with Russia to create an "impenetrable" cybersecurity unit to prevent election hacking.

Hours after promoting the idea on Sunday 9th July, the US president said that he did not think it could actually happen. The idea of a partnership with Russia was ridiculed by senior Republicans. It comes after Mr Trump's first face-to-face talks with Russian President Vladimir Putin in Germany on Friday, in which the pair discussed the issue.

Mr Trump described the outcome of the talks as positive and suggested closer co-operation between the two nations.
"Putin and I discussed forming an impenetrable cybersecurity unit so that election hacking, and many other negative things, will be guarded and safe," he said. 

The initial proposal immediately prompted derision from Democrats, as well as some Republicans who questioned why the US would work with Russia after the Kremlin's alleged meddling in the 2016 US election.
Mr Trump shifted his position on Sunday night.
"The fact that President Putin and I discussed a cyber-security unit doesn't mean I think it can happen. It can't," he tweeted.
However, he stressed that another issue discussed in his talks with Mr Putin, a ceasefire in south-western Syria, had come into effect.

Treasury Secretary Steve Mnuchin had sought to defend the proposed cyber unit after Mr Trump's initial announcement. Speaking on ABC's This Week programme, he described it as a "significant accomplishment" for Mr Trump.
"What we want to make sure is that we co-ordinate with Russia," he added.
However, Republican Senator Marco Rubio suggested that such an initiative would be like partnering with Syrian President Bashar al-Assad on chemical weapons.

Republican Senator Lindsey Graham said: "It's not the dumbest idea I've ever heard, but it's pretty close."

Trump initially delivered his verdict in customary style after returning home from the G20 summit, with a slew of Twitter messages pouring scorn on fake news and his political opponents.

But his plans for a joint cyber unit brought immediate ridicule amid concerns it was a Russian ruse to collect secrets.
The biggest moment of Mr Trump’s second foreign trip was his meeting with Vladimir Putin which came amid continuing questions about whether the American president’s campaign colluded with Russia in efforts to swing last year’s election.
In his Twitter messages, Mr Trump insisted he had twice pressed his counterpart on the Kremlin’s role in election meddling and that Mr Putin had denied any involvement.

His announcement of a joint initiative with the man American intelligence agencies believe ordered Russia’s hacking efforts brought immediate concerns that it was a classic ruse to obtain confidential US information.

A former senior CIA figure even predicted a similar move last month, suggesting any co-operation could be withdrawn at the first sign of disagreement over Ukraine or Syria. 
“The Russians will establish some sort of counter-terrorism cooperation as a chit, a quid pro quo, and withdraw it because of some of the other things we’re doing,” Steve Hall, former CIA chief of Russian operations, told The Daily Beast adding that Russia could then exploit details of US operatives they had learnt from the joint operation.
Mr Trump also used Twitter to declare the G20 a success for America. It marks a now familiar style of politics in which America’s president bypasses traditional media by offering his own analysis direct to his public.

Yet Mr Trump’s trip to Europe garnered mixed reviews at home. While some lauded a presidential vision of Western values delivered during a speech in Warsaw, others said the G20 demonstrated a growing gulf between an isolationist America and the rest of the world on matters of trade and climate change.

BBC:       Telegraph:    

You Might Also Read: 

Trump Handed Russia Classified Intelligence:

Putin Applauds Patriotic Russian Hackers:

 

« GCHQ Unveils Its Cybersecurity Playbook
Fraud And The Internet of Things »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Assured Data Protection

Assured Data Protection

Assured Data Protection specialises in data protection and disaster recovery services for large SME and enterprise organisations.

EG-CERT

EG-CERT

EG-CERT is the national Computer Emergency Response Team for Egypt.

French Expert Center Against Cybercrime (CECyF)

French Expert Center Against Cybercrime (CECyF)

CECyF is a centre of excellence for countering cybercrime in France.

ZenMate

ZenMate

ZenMate is a Virtual Private Network services provider offering secure encrypted access to the internet.

Global Cyber Alliance (GCA)

Global Cyber Alliance (GCA)

Global Cyber Alliance is an international, cross-sector effort dedicated to eradicating cyber risk and improving our connected world.

Aspen Insurance

Aspen Insurance

Aspen is a leading diversified specialty insurance and reinsurance company. Products offered include cyber insurance.

Incognito Forensic Foundation Lab (IFF Lab)

Incognito Forensic Foundation Lab (IFF Lab)

IFF Lab is a premier cyber and digital forensics lab in India that offers forensic services and solutions, cyber security analysis and assessment, IT support, training and consultation.

Flipside

Flipside

Information Security training provider specialized in personalized training and security awareness campaigns.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Vortiv

Vortiv

Vortiv Ltd (formerly known as Transaction Solutions International Ltd) is a technology based company focused on the cybersecurity and the cloud services sector.

Satori Cyber

Satori Cyber

The Satori Cyber Secure Data Access Cloud is the first solution on the market to offer continuous visibility and granular control for data flows across all cloud and hybrid data stores.

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance provides an array of cybersecurity services including cybersecurity policy management, risk assessments and regulatory compliance consulting.

Noerr

Noerr

Noerr is one of the top European law firms with 500 professionals in Germany, Europe and the USA. We provide solutions to complex and sophisticated legal matters including cyber risks.

EPAM Systems

EPAM Systems

Since 1993, EPAM Systems has leveraged its advanced software engineering heritage to become a leading global digital transformation services provider.

Judy Security

Judy Security

Judy (formerly AaDya Security) provides smart, simple, effective, all-in-one cybersecurity for SMBs. Get the 24/7 protection and support you deserve, at a price you can afford.

Oak9

Oak9

Oak9's Security as Code platform dynamically secures Infrastructure as Code (IaC) and deployed cloud workloads, automatically.