US & Russia Relations: It’s A New Cold War

Retaliation: US expels Russian diplomats and threatens other undisclosed measure in response to interference in the Presidential election.

Today’s US sanctions against Russia, including the expulsion of 35 diplomats and the closure of two Russian intelligence gathering sites in Maryland and New York, are much stiffer than expected. 

Taken in response to the alleged Kremlin-ordered hacking of the recent presidential election, they underline how relations between the two former superpowers are now at their worst since the early 1980s, during the last spasm of the Cold War.

Although Russia, which has denied the charges, is likely to respond in kind, the repercussions of the incident could be fairly short lived, given that the new administration of Donald Trump, who has poured scorn on the hacking claims and vowed to improve ties with Moscow.

Nonetheless, they will surely greatly complicate life for the president-elect. Not only do President Obama and the Democrats, the victims of the hacking, believe such measures are overdue. 

So do senior Congressional figures of Mr Trump’s Republican Party, including House Speaker Paul Ryan and several Senators, led by Arizona’s John McCain, chairman of the Senate Armed Services Committee. Even before today’s announcement, pressure has been building on Capitol Hill for a special committee, akin to the 1973 Watergate committee, to examine the matter further.

At the very least, the dramatic expulsions, and the certainty of tit-for-tat measures by Moscow, ensure the future of US-Russian relations will be front and centre of the confirmation hearings next month of Rex Tillerson, Mr Trump’s nominee for Secretary of State, who as head of ExxonMobil had close ties with the Kremlin, and of Congressman Mike Pompeo, named to take over the CIA.

Measured by numbers alone, the expulsions appear to be the largest such exercise since 2001, when Washington ordered out 50 Russian personnel after the capture of Robert Hanssen, the FBI counter intelligence agent who had spied for the Soviet Union and then Russia for more than 20 years.

US officials moreover believe the election hacking, most notably of the Democratic National Committee and the personal email account of John Podesta, Hillary Clinton’s campaign chairman, was but the culmination of a long campaign of disruption.

According to the country’s intelligence community, such interference is “decade-long.” Mounted by hacking groups believed to be linked to the FSB, successor to the KGB, and to Russian military intelligence, it has involved methods such as “spear-phishing, and campaigns targeting government organizations, critical infrastructure, think tanks, universities, political organisations, and corporations,” the US intelligence agencies believe.

In addition, the CIA and FBI are now reportedly convinced that the hacking – and the leaks published by Wikileaks – were not merely aimed at generally disrupting the US electoral process, but specifically at damaging Ms. Clinton, and helping the more sympathetic Mr Trump win.

Whether the meddling made a tangible difference however is hotly disputed, above all by Mr Trump, who has branded the charges “ridiculous.” Only this week he called for Americans to “get on with our lives” rather than pick a sanctions fight with Moscow.

Independent:        Obama Orders ‘Deep Dive’ Into Election Hacking:

Photo: Kremlin.ru

 

« Malaysia Sets Up Cybersecurity Academy
Obama Advises Trump To Train 100,000 Hackers »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Bulb Security

Bulb Security

Whether your internal red team or penetration testing team needs training, or you lack internal resources and need an outsourced penetration test, Bulb Security can help.

High Technology Crime Investigation Association (HTCIA)

High Technology Crime Investigation Association (HTCIA)

HTCIA was formed to provide education and collaboration to our global members for the prevention and investigation of high tech crimes.

Wavestone

Wavestone

Wavestone is a strategy and technology consulting company with areas of expertise including digital transformation and cybersecurity.

Secon Cyber Security

Secon Cyber Security

Secon Cyber Security is an Advanced Managed Security Services Provider with long standing experience of providing cyber security solutions to customers ranging from small to large enterprises.

Dell Technologies

Dell Technologies

Dell Technologies Consulting Services enables a highly resilient business amidst the proliferation of cloud-based IT services and constant threats to your most critical information.

Redstor

Redstor

Redstor's complete data management helps you discover, manage and control your data from a single control centre, unifying backup and recovery, disaster recovery, archiving and search and insight.

SecuLetter

SecuLetter

SecuLetter is able to detect unknown attacks with hybrid approaches, static and dynamic analysis.

DarkOwl

DarkOwl

DarkOwl provides the world’s largest index of darknet content and the tools to efficiently find leaked or otherwise compromised sensitive data.

AuthLite

AuthLite

With AuthLite, you can keep using all your existing software, with added two-factor authentication security placed exactly where you need it.

DoControl

DoControl

DoControl gives organizations the automated, self-service tools they need for SaaS applications data access monitoring, orchestration, and remediation.

Guardio

Guardio

Guardio develop tools and products to combat modern web and browser threats.

Think|Stack

Think|Stack

Think|Stack is a managed IT services company specializing in cloud and cybersecurity with human-centered design.

Polestar Industrial IT

Polestar Industrial IT

Polestar work on both sides of the IT & OT divide. Network, Data & Asset Security is our priority. Polestar installations are robust and resilient and comply with the appropriate security.

Mondoo

Mondoo

Mondoo is a powerful security, compliance, and asset inventory tool that helps businesses identify vulnerabilities, track lost assets, and ensure policy compliance across their entire infrastructure.

PixelQA

PixelQA

Are you looking for a security testing company to cross-check whether your software or mobile app has a possible security threat or not?

Swick Technologies (SWICKtech)

Swick Technologies (SWICKtech)

SWICKtech offer IT managed services to increase IT security, stability, and performance for your organization.