Category Archives: hacking

‘Never Trump’ Republicans join call for select committee to investigate Russia and Trump

Josh Rogin writes: Democrats in Congress have long argued that the ongoing intelligence committee investigations into Russia’s interference in the presidential election and the Trump campaign’s ties to the Kremlin are unlikely to get to the bottom of the issue. Now a group of “Never Trump” Republicans are planning to pressure GOP leaders to establish a bipartisan select committee to take over the inquiries and settle the matter once and for all.

Stand Up Republic, a nonprofit organization led by former independent presidential candidate Evan McMullin and his running mate, Mindy Finn, is launching a public campaign aimed at building support among Republicans for consolidating the various congressional Russia-related investigations into one empowered and fully funded select committee. The organization’s ad, which goes live Tuesday with a six-figure television ad buy, makes the case that the Russia issue is too important not to investigate fully.

“Trump’s Russia crisis. Secret contacts. Conflicting stories. Mounting signs of hidden ties and shady deals. Fear our president is compromised,” says the narrator. “The values of liberty, justice and honor shaped America. Generations fought for freedom, and presidents of both parties stood against foreign tyrants like Vladimir Putin. Why won’t Donald Trump? Tell Congress to name a bipartisan select committee to get the truth?” [Continue reading…]

Facebooktwittermail

Russian espionage piggybacks on a cybercriminal’s hacking

The New York Times reports: To the F.B.I., Evgeniy M. Bogachev is the most wanted cybercriminal in the world. The bureau has announced a $3 million bounty for his capture, the most ever for computer crimes, and has been trying to track his movements in hopes of grabbing him if he strays outside his home turf in Russia.

He has been indicted in the United States, accused of creating a sprawling network of virus-infected computers to siphon hundreds of millions of dollars from bank accounts around the world, targeting anyone with enough money worth stealing — from a pest control company in North Carolina to a police department in Massachusetts to a Native American tribe in Washington.

In December, the Obama administration announced sanctions against Mr. Bogachev and five others in response to intelligence agencies’ conclusions that Russia had meddled in the presidential election. Publicly, law enforcement officials said it was his criminal exploits that landed Mr. Bogachev on the sanctions list, not any specific role in the hacking of the Democratic National Committee.

But it is clear that for Russia, he is more than just a criminal. At one point, Mr. Bogachev had control over as many as a million computers in multiple countries, with possible access to everything from family vacation photographs and term papers to business proposals and highly confidential personal information. It is almost certain that computers belonging to government officials and contractors in a number of countries were among the infected devices. For Russia’s surveillance-obsessed intelligence community, Mr. Bogachev’s exploits may have created an irresistible opportunity for espionage. [Continue reading…]

Facebooktwittermail

If Russia inquiry is not ‘legitimate,’ Democrats may abandon it

The New York Times reports: They agreed just a week ago to the terms of a House Intelligence Committee investigation into Russian meddling in the 2016 presidential election. But now some of the panel’s Democrats are warning that they may pull their support for the inquiry if it becomes mired in party-line politics.

When that might happen is unclear, and Democrats know that the current moment of even tentative comity on the Republican-controlled panel may offer their best chance for scrutinizing links between people close to President Trump and Russian officials.

Still, Democrats are bracing for fights over subpoenaing witnesses and documents — including, possibly, Mr. Trump’s tax returns — since Republicans have balked at an outside, independent inquiry into what intelligence officials say was an unprecedented intrusion into an American election by a foreign power.

“I’m not going to be part of a dog-and-pony show that is not a serious effort to do an investigation because this is really serious,” said Representative Jackie Speier, Democrat of California. “If it’s not a legitimate and comprehensive and in-depth investigation, why would we be party to it?” [Continue reading…]

Facebooktwittermail

FBI Counterintelligence Division in charge of the Russia investigation

CNN reports: One source familiar with the Russia investigation resorted to a mathematical equation to divulge — sort of — the number of agents assigned to the matter.

It’s five to 10 fewer than were assigned to the Hillary Clinton email investigation, said the source, who is not authorized to speak publicly and did so on the condition of anonymity. There were about two dozen dedicated to that case, so that makes 15 to 20 on the Russia investigation.

The resources assigned to the Clinton investigation were in response to agents having to sort through a vast amount of electronic data in a finite period of time before the then-looming presidential election, the source said. With the Russia probe, there is no such time pressure and efforts are more focused on interviews with human sources.

The smaller number of agents assigned to the case should not be interpreted as a lack of interest, the source said. Developments in the case are sent up the chain to the highest levels on a regular basis.

Known simply as CD within the bureau, the Counterintelligence Division is responsible for protecting the secrets of the US intelligence community, the advanced technologies of American institutions both public and private, keeping weapons of mass destruction away from US enemies and countering the activities of foreign spies, including cyberintrusions. [Continue reading…]

Facebooktwittermail

How the CIA’s hacking hoard makes everyone less secure

Andy Greenberg writes: When Wikileaks yesterday released a trove of documents purporting to show how the CIA hacks everything from smartphones to PCs to smart televisions, the agency’s already shadowy reputation gained a new dimension. But if you’re an average American, rather than Edward Snowden or an ISIS jihadi, the real danger clarified by that leak wasn’t that someone in Langley is watching you through your hotel room’s TV. It’s the rest of the hacker world that the CIA has inadvertently empowered.

As security researchers and policy analysts dig through the latest WikiLeaks documents, the sheer number of hacking tools the CIA has apparently hoarded for exploiting zero-day vulnerabilities—secret inroads that tech firms haven’t patched—stands out most. If the US intelligence community knows about them, that leaves open the possibility that criminal and foreign state hackers do as well.

Its broad zero-day stash, then, strongly suggests that the CIA—along with other intelligence agencies—has long allowed Americans to remain vulnerable to those same attacks. Now that those hacking secrets are public, potentially along with enough details to replicate them, the danger of the feds leaving major security flaws unfixed only escalates.

“If the CIA can use it, so can the Russians, or the Chinese or organized crime,” says Kevin Bankston, the director of the New America Foundation’s Open Technology Institute. “The lesson here, first off, is that stockpiling a bunch of vulnerabilities is bad for cybersecurity. And two, it means they’re likely going to get leaked by someone.”

It’s no surprise, of course, that one of America’s most well-resourced spy agencies can hack its foreign adversaries. The shock, says Johns Hopkins cryptographer Matt Green, comes instead from the sudden spill of those hacking tools onto the web. “In the same way the military would probably have one technique for killing every single tank in an enemy’s arsenal, you would expect the CIA to collect the same thing,” says Green. “What’s different is that we’re seeing them out in public.”

In fact, WikiLeaks wrote in a note accompanying its Tuesday release that “the archive appears to have been circulated among former US government hackers and contractors in an unauthorized manner.” That raises the possibility the full document set, along with actual exploit details or code, may have fallen into the hands of hackers long before it was published in part by WikiLeaks. [Continue reading…]

Facebooktwittermail

Wikileaks and the CIA’s hacking arsenal

Julian Sanchez writes: It’s a cliche of political scandals that “the coverup is worse than the crime”: Attempts to conceal misconduct, because they’re easier to prove and provide otherwise elusive evidence of a guilty mind, often end up being more politically damaging than the underlying misconduct would have been. In the case of the latest Wikileaks document dump, the first in a planned series from a cache the site has dubbed “Vault 7,” we have an apparent reversal of the formula: The un-coverup—the fact of the leak itself—is probably more significant than the substance of what has thus far been revealed.

There are, of course, some points of real interest in the archive of documents, mostly concerning an array of hacking tools and software exploits developed or used by the Central Intelligence Agency’s Engineering Development Group — and it’s likely more will emerge as reporters and analysts churn through more than 8,000 files and documents. We’ve confirmed that the CIA has hung onto and exploited at least a handful of undisclosed “zero day” vulnerabilities in widely-used software platforms, including Apple’s iOS and Google’s Android, the operating systems on which nearly all modern smartphones run.

We also learn that — as many of us expected — the obstacles to conventional wiretapping posed by the growing prevalence of encryption have spurred intelligence agencies to hunt for alternative means of collection, which include not only compromising communications endpoints such as smartphones, but also seeking to repurpose networked appliances on the Internet of Things as surveillance devices. The latter goal has even spawned its own research department, the Embedded Development Branch.

Still, in light of what we already knew about the National Security Agency’s own efforts along similar lines, thanks to Edward Snowden’s disclosures about the agency’s Tailored Access Operations division, this is—at least from a policy perspective—not so much revelation as confirmation. Moreover, there’s little here to suggest surveillance that’s either aimed at Americans or indiscriminate, the features that made Snowden’s leaks about NSA surveillance so politically explosive. One of the more widely-reported projects in Vault 7, for instance, has been the Doctor Who — referencingWeeping Angel” implant, which can turn Samsung televisions into surveillance microphones even when they appear to be turned off. Yet, at least at the time the documentation in the Wikileaks release was written, Weeping Angel appeared to require physical access to be installed—which makes it essentially a fancy and less detectable method of bugging a particular room once a CIA agent has managed to get inside. This is all fascinating to surveillance nerds, to be sure, but without evidence that these tools have been deployed either against inappropriate targets or on a mass scale, it’s not intrinsically all that controversial. Finding clever ways to spy on people is what spy agencies are supposed to do. [Continue reading…]

Facebooktwittermail

CIA providing raw intelligence as Trump-Russia probes heat up

Politico reports: Lawmakers are trekking to CIA headquarters in Langley, Va., to review classified evidence on Russia’s involvement in the presidential election. The House has scheduled its first public hearing on the issue. And the Senate is preparing to interview witnesses.

The congressional investigations into ties between President Donald Trump’s campaign and Russian officials are in full swing.

For months, the leaders of the House and Senate Intelligence Committees said their investigations into Russia’s meddling in the 2016 presidential election were in their “initial” stages. On Tuesday, it became clear that the probes had moved into a new phase.

The CIA is now providing raw intelligence documents to committee members, according to multiple senators. Senate Intelligence Chairman Richard Burr (R-N.C.) and Majority Whip John Cornyn (R-Texas) visited CIA headquarters on Monday to view the documents underlying the intelligence community’s unclassified assessment that Russia sought to sway the election in favor of Trump.

At Langley, Cornyn said Tuesday, he viewed “four large binders full of classified information that’s been made available to the committee to conduct” its wide-ranging investigation. [Continue reading…]

The Washington Post reports: The FBI has begun preparing for a major mole hunt to determine how anti-secrecy group WikiLeaks got an alleged arsenal of hacking tools the CIA has used to spy on espionage targets, according to people familiar with the matter.

The leak rattled government and technology industry officials, who spent Tuesday scrambling to determine the accuracy and scope of the thousands of documents released by the group. They were also trying to assess the damage the revelations may cause, and what damage may come from future releases promised by WikiLeaks, these people said. [Continue reading…]

Facebooktwittermail

Why Wikileaks? Why now?

Fred Kaplan writes: Tuesday’s WikiLeaks release exposing thousands of detailed documents on CIA hacking tools is an unbridled attack on U.S. intelligence operations with little or no public benefit. It makes no claim or pretense that the CIA has used these tools to engage in domestic surveillance or any other illegal activity. Most whistleblowers who leak national security secrets take care to avoid revealing where the secrets come from — the “sources and methods” of the intelligence. These documents are about nothing but sources and methods. [Continue reading…]

Reuters reports: A longtime intelligence contractor with expertise in U.S. hacking tools told Reuters the documents included correct “cover” terms describing active cyber programs.

“People on both sides of the river are furious,” he said, referring to the CIA and the eavesdropping National Security Agency based in Fort Meade, Maryland. “This is not a Snowden-type situation. This was taken over a long term and handed over to WikiLeaks.” [Continue reading…]

In a press release, Wikileaks said: Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete. [Continue reading…]

The Atlantic reports: WikiLeaks appears to be shifting its strategy with its latest document dump. In the past, it has let the public loose on its leaked documents with little more than a few paragraphs of introduction, occasionally building search functions to let users sift through the largest dumps. The CIA leak, on the other hand, came with a detailed press release and analysis of the some key findings from the documents, written in a journalistic style.

Uncharacteristically, WikiLeaks appears to have gone out of its way to redact sensitive information and withhold malicious code from the CIA documents it made public. That’s a slight departure from previous leaks, which were wholly unfiltered. [Continue reading…]

Given that it has become increasingly difficult to differentiate between Wikileaks the organization and Julian Assange the individual, I have my doubts that the massive number of redactions and carefully crafted press release should necessarily be attributed to a shift in strategy on the part of Wikileaks/Assange. This may in fact be the way the leaks were delivered: pre-packaged.

In other words, the leaker(s) were just as concerned about how this information got out as they were with its contents — and that begs the question (as posed by @pwnallthethings): why use Wikileaks?

If, as the source is alleged to claim, the goal here is to generate public debate, why use such a flawed messenger — a messenger widely viewed as operating in the service of the Russian intelligence.

The source’s choice of going through Wikileaks suggests they were opting for a suitably malleable conduit and wanted to reach a target audience that thinks little or cares less about Julian Assange’s agenda.

Journalists are hamstrung (or to put it less kindly, incredibly easy to manipulate) in this situation. The key questions are about the source of leaks and the agenda being pursued, yet these are at this time matters of pure conjecture. The alternative to speculation is to focus on the content and get distracted by smart TV vulnerabilities etc.

Yet the source/Wikileaks is in large part teeing this up for political debate and casting the CIA as a rogue intelligence agency — a narrative that surely plays well inside the White House.

As is often the case, Donald Trump’s current silence is much more telling than his tweets.

Facebooktwittermail

Russian hackers said to seek hush money from liberal groups

Bloomberg reports: Russian hackers are targeting U.S. progressive groups in a new wave of attacks, scouring the organizations’ emails for embarrassing details and attempting to extract hush money, according to two people familiar with probes being conducted by the FBI and private security firms.

At least a dozen groups have faced extortion attempts since the U.S. presidential election, said the people, who provided broad outlines of the campaign. The ransom demands are accompanied by samples of sensitive data in the hackers’ possession.

In one case, a non-profit group and a prominent liberal donor discussed how to use grant money to cover some costs for anti-Trump protesters. The identities were not disclosed, and it’s unclear if the protesters were paid.

At least some groups have paid the ransoms even though there is little guarantee the documents won’t be made public anyway. Demands have ranged from about $30,000 to $150,000, payable in untraceable bitcoins, according to one of the people familiar with the probe. [Continue reading…]

Facebooktwittermail

Greenwald, Limbaugh, Hannity, Drudge, Assange all use same ‘deep state’ formula to push back against Russia story

The first step in dismissing someone’s concerns is to brand them as hysterical.

Trump’s ties to Russia, the hacking of the DNC, Trump administration officials lying about their communications with Russians, a global disinformation campaign that is undermining democracy and empowering right-wing authoritarian leaders and parties across the West — the attention being directed at all of this, is, some observers claim, all part of an “anti-Russia frenzy” that is being stoked in order to topple the Trump presidency.

The new coalition of left and right that has brought together Trump supporters and nominal Trump opponents, seem to be agreed on this: the best way of addressing the story of Russian interference in American democracy is to ignore Russia.

After all, if for decades you have been obsessed about the enemy in Washington, how can all this Kremlin talk be seen as anything other than another sinister plot spawned by the American masters of the Deep State?

Apparently the term Deep State is new to some on the right, but it’s popularization by Glenn Greenwald is serving the Trump camp well.

 

For those who are eager to counteract the effects of the unremitting flow of Russia-related stories involving team Trump, the latest piece of ammunition has been provided by Michael Tracey whose supposed deconstruction of the story cycle is being hailed as a “must read.”


I don’t think Greenwald gets directions from Moscow, but if he did, they would be very concise: keep doing what you’re already doing.

Facebooktwittermail

Russia heats up its infowar with the West

Ilan Berman writes: When it comes to Russian propaganda, we haven’t seen anything yet.

Over the past several months, Americans have become acutely aware of a phenomenon that Europeans were already all too familiar with: the pervasive, corrosive nature of Russian propaganda. Russia’s purported attempts to meddle in the U.S. presidential election remain a major topic of national debate—one that could, even now, lead to fresh Congressional investigations and a political showdown between Capitol Hill and the new White House.

Yet the scope of Russia’s propaganda machine is still poorly understood by most Americans. Many may by now be familiar with Moscow’s highest profile media outlets, like television channel RT (which the Russian government funds to the tune of some $250 million annually) and the flashy Sputnik “news” multimedia website (which is likewise lavishly bankrolled by the Kremlin). But the full range of Russia’s information operations are still truly appreciated only by the small cadre of foreign policy and national security professionals who have been forced to grapple with their far-reaching and negative effects.

That effort is enormous, encompassing billions of dollars and dozens of domestic and international media outlets in an architecture that dwarfs the disinformation offensive marshaled against the West by the Soviet Union during the Cold War. [Continue reading…]

Facebooktwittermail

The huge problem with appointing special prosecutors

Peter Zeidenberg writes: Prosecutors are not journalists, and their job is not to inform the public of the results of their investigations. Rather, their mission is to gather all of the relevant facts and determine whether a crime was committed and, if so, whether it can be proved in court beyond a reasonable doubt. Their work, when done properly, is done in secret. Indeed, violations of grand jury secrecy can result in serious sanctions from the court.

If, after a full criminal investigation, it was determined that a crime occurred but the critical evidence was not obtainable — say, for purposes of argument, that this evidence was in Russia, unobtainable by subpoena — then it would be improper to seek an indictment. Critically, the entire investigation would then remain secret. It would be a violation of law for a prosecutor to make public the results of a grand jury investigation that did not result in an indictment.

Further, it is entirely possible that there could have been improper or inappropriate contacts between the Trump campaign and Russian intelligence without U.S. laws having being broken. If, for example, a Trump campaign operative actively coordinated with WikiLeaks the release of Clinton campaign emails — originally hacked by the Russians — the public would be justifiably outraged. But that does not necessarily mean the conduct was illegal. Were a special prosecutor to reach such a conclusion, the public would remain entirely in the dark. All they would know is that, after many months — or, more likely, years — of investigation, the special prosecutor had packed up his or her bags and gone home. No special reports. No Comey-style news conferences. Just radio silence.

Needless to say, this would be highly unsatisfactory. The public has a right to know, conclusively, whether their president’s campaign coordinated in any fashion with a foreign power — even if that coordination did not amount to a violation of U.S. law. Conduct can be wrongful — even reprehensible — and still not necessarily be criminal. The remedy for such conduct should be political. [Continue reading…]

Facebooktwittermail

Obama administration rushed to preserve intelligence of Russian election hacking

The New York Times reports: In the Obama administration’s last days, some White House officials scrambled to spread information about Russian efforts to undermine the presidential election — and about possible contacts between associates of President-elect Donald J. Trump and Russians — across the government. Former American officials say they had two aims: to ensure that such meddling isn’t duplicated in future American or European elections, and to leave a clear trail of intelligence for government investigators.

American allies, including the British and the Dutch, had provided information describing meetings in European cities between Russian officials — and others close to Russia’s president, Vladimir V. Putin — and associates of President-elect Trump, according to three former American officials who requested anonymity in discussing classified intelligence.

Separately, American intelligence agencies had intercepted communications of Russian officials, some of them within the Kremlin, discussing contacts with Trump associates. [Continue reading…]

Facebooktwittermail

U.S. inquiries into Russian election hacking include three FBI probes

Reuters reports: The U.S. Federal Bureau of Investigation is pursuing at least three separate probes relating to alleged Russian hacking of the U.S. presidential elections, according to five current and former government officials with direct knowledge of the situation.

While the fact that the FBI is investigating had been reported previously by the New York Times and other media, these officials shed new light on both the precise number of inquires and their focus.

The FBI’s Pittsburgh field office, which runs many cyber security investigations, is trying to identify the people behind breaches of the Democratic National Committee’s computer systems, the officials said. Those breaches, in 2015 and the first half of 2016, exposed the internal communications of party officials as the Democratic nominating convention got underway and helped undermine support for Hillary Clinton.

The Pittsburgh case has progressed furthest, but Justice Department officials in Washington believe there is not enough clear evidence yet for an indictment, two of the sources said.

Meanwhile the bureau’s San Francisco office is trying to identify the people who called themselves “Guccifer 2” and posted emails stolen from Clinton campaign manager John Podesta’s account, the sources said. Those emails contained details about fundraising by the Clinton Foundation and other topics.

Beyond the two FBI field offices, FBI counterintelligence agents based in Washington are pursuing leads from informants and foreign communications intercepts, two of the people said. [Continue reading…]

Facebooktwittermail

Republicans are failing to protect the nation

Evan McMullin, a former CIA officer and chief policy director of the House Republican Conference from January 2015 until August 2016, when he left to run as an independent candidate in the presidential election, writes: President Trump’s disturbing Russian connections present an acute danger to American national security. According to reports this week, Mr. Trump’s team maintained frequent contact with Russian officials, including senior intelligence officers, during the campaign. This led to concerns about possible collusion with one of America’s principal strategic adversaries as it tried to influence the election in Mr. Trump’s favor. On Monday, Mr. Trump’s national security adviser, Michael T. Flynn, was forced to resign after details of his communications with the Russian ambassador emerged.

Republican leaders in Congress now bear the most responsibility for holding the president accountable and protecting the nation. They can’t say they didn’t see the Russian interference coming. They knew all along.

Early in 2015, senior Republican congressional leaders visited Ukraine and returned full of praise for its fight for independence in spite of Russia’s efforts to destabilize the country and annex some of its regions. And in June, coincidentally just before Mr. Trump announced his campaign for the Republican nomination, they met with Ukraine’s prime minister in Washington — one of many meetings I attended as a senior aide to the House Republican Conference.

As the presidential race wore on, some of those leaders began to see parallels between Russia’s disinformation operations in Ukraine and Europe and its activities in the United States. They were alarmed by the Kremlin-backed cable network RT America, which was running stories intended, they judged, to undermine Americans’ trust in democratic institutions and promote Mr. Trump’s candidacy. Deeply unsettled, the leaders discussed these concerns privately on several occasions I witnessed. [Continue reading…]

Facebooktwittermail

Flynn apparently lied to the FBI about discussions on sanctions with Russian ambassador

The Washington Post reports: Former national security adviser Michael Flynn denied to FBI agents in an interview last month that he had discussed U.S. sanctions against Russia with that country’s ambassador to the United States before President Trump took office, contradicting the contents of intercepted communications collected by intelligence agencies, current and former U.S. officials said.

The Jan. 24 interview potentially puts Flynn in legal jeopardy. Lying to the FBI is a felony offense. But several officials said it is unclear whether prosecutors would attempt to bring a case, in part because Flynn may parse the definition of the word “sanctions.” He also followed his denial to the FBI by saying he couldn’t recall all of the conversation, officials said.

Any decision to prosecute would ultimately lie with the Justice Department. [Continue reading…]

Facebooktwittermail

Trump dodges, then dismisses, Russia scrutiny

Politico reports: President Donald Trump dodged and then dismissed lingering questions about his relationship with Russia during his long-winded news conference on Thursday — first describing recent reports on the scrutiny as “fake news,” then saying he has no knowledge of campaign associates contacting the country before the election.

“No, nobody that I know of,” Trump said.

Trump did not, notably, say definitively that his campaign had no contact with Russian officials, but vaguely offered that he had no knowledge that it had. [Continue reading…]

Facebooktwittermail

Why Flynn’s resignation matters

David Frum writes: Stop talking about the Logan Act.

It was not the violation of this antique and ignored piece of anti-Jacobin legislation that has touched off the biggest foreign-policy scandal since Watergate.

Nobody would care if an incoming national security adviser had confidential conversations with an ambassador of a hostile foreign government before Inauguration Day, if it were believed that the conversations served a legitimate and disinterested public purpose.

But that is exactly what is doubted in this case.

To put the story in simplest terms:

1) Russian spies hacked Democratic Party communications in order to help elect Donald Trump.

2) Donald Trump welcomed the help, used it, publicly solicited more of it—and was then elected president of the United States.

3) President Obama sanctioned Russia for its pro-Trump espionage.

4) While Russia considered its response, its ambassador spoke with the national security adviser-designate about the sanctions

5) The adviser, Flynn, reportedly asked Russia not to overreact, signaling that the new administration would review the sanctions; Russia did not respond.

6) As president-elect and then president, Donald Trump has indicated that he seeks to lift precisely those sanctions caused by Russia’s espionage work on his behalf.

All of this takes place against the background of Donald Trump’s seeming determination to align U.S. foreign policy ever closer to Russia’s: endorsing the annexation of Crimea, supporting Russia’s war aims in Syria, casting doubt on the U.S. guarantee to NATO allies, cheering on the breakup of the European Union. [Continue reading…]

Facebooktwittermail