Previous All Posts Next

US Responds to Russian Election Meddling: Sanctions and Expulsions

Posted: December 14, 2016 to Cybersecurity.

Tags: Data Breach, Compliance, Cloud Security

The great irony of the 2016 US presidential election is that after all the talk from Donald Trump of it being rigged, when it was all said and done, it’s the Democrats who end up feeling like the election was stolen. Now it seems that behind the scenes the Obama administration wrestled with how to respond to Russian meddling, but continually came up with reasons not to. By the time fall had come, Americans had begun to drown in the slow dripping of documents released by Wikileaks, but their focus entirely on Democrats had only proved what the intelligence community already knew: the Russians were trying to influence the election in favor of Donald Trump. In June, hackers released an opposition file Democrats had on Trump and a month later US intelligence was sure hackers working for the Russian government had breached the Democratic National Committee. The US and other countries routinely use hacking to spy on each other, but attempting to influence an election was deemed a step too far. During this time period, the White House met with national security officials in order come up with a suitable response. The fear was that with much of the US economy and infrastructure dependent on the internet, it had far more to lose if the US pushed Russia into a broader cyberwar. Hanging over this decision was also the on again off again Russian talks over Syria and the fear of giving Trump more reason to doubt the legitimacy of a Clinton victory, which the Obama Administration believed to be a foregone conclusion. The White House denies these allegations to be to true, citing their slow response had more to do with the law enforcement and intelligence agencies doing their due diligence, but that may be cold comfort to Democrats.

Related Resources

Learn more about how Petronella Technology Group can help:

Need help implementing these strategies? Our cybersecurity experts can assess your environment and build a tailored plan.
Get Free Assessment

About the Author

Craig Petronella, CEO and Founder of Petronella Technology Group
CEO, Founder & AI Architect, Petronella Technology Group

Craig Petronella founded Petronella Technology Group in 2002 and has spent more than 30 years working at the intersection of cybersecurity, AI, compliance, and digital forensics. He holds the CMMC Registered Practitioner credential (RP-1372) issued by the Cyber AB, is an NC Licensed Digital Forensics Examiner (License #604180-DFE), and completed MIT Professional Education programs in AI, Blockchain, and Cybersecurity. Craig also holds CompTIA Security+, CCNA, and Hyperledger certifications.

He is an Amazon #1 Best-Selling Author of 15+ books on cybersecurity and compliance, host of the Encrypted Ambition podcast (95+ episodes on Apple Podcasts, Spotify, and Amazon), and a cybersecurity keynote speaker with 200+ engagements at conferences, law firms, and corporate boardrooms. Craig serves as Contributing Editor for Cybersecurity at NC Triangle Attorney at Law Magazine and is a guest lecturer at NCCU School of Law. He has served as a digital forensics expert witness in federal and state court cases involving cybercrime, cryptocurrency fraud, SIM-swap attacks, and data breaches.

Under his leadership, Petronella Technology Group has served 2,500+ clients, maintained a zero-breach record among compliant clients, earned a BBB A+ rating every year since 2003, and been featured as a cybersecurity authority on CBS, ABC, NBC, FOX, and WRAL. The company leverages SOC 2 Type II certified platforms and specializes in AI implementation, managed cybersecurity, CMMC/HIPAA/SOC 2 compliance, and digital forensics for businesses across the United States.

CMMC-RP NC Licensed DFE MIT Certified CompTIA Security+ Expert Witness 15+ Books
Related Service
Protect Your Business with Our Cybersecurity Services

Our proprietary 39-layer ZeroHack cybersecurity stack defends your organization 24/7.

Explore Cybersecurity Services
Previous All Posts Next
Free cybersecurity consultation available Schedule Now