Obama team couldn't cope with Russian election meddling, report says

The administration did not view cyber activities by Russia as part of a larger overall campaign and limited information-sharing efforts in ways that inhibited a more cohesive response.

President Obama receives a daily brief via ipad in 2012. White House photo by Pete Souza

The Obama administration had no real game plan for dealing with Russian election interference in 2016, lacking the visibility and policy options to swiftly respond to a range of malicious activity in cyberspace and constrained by the perceived political consequences of going public with what they knew, according to a new report by the Senate Intelligence Committee.

According to interviews of Obama administration officials conducted by committee staff, the administration had only limited visibility and understanding of Russian activities in fall 2016, particularly the targeting of state and local election systems. Those efforts, along with disinformation campaigns on social media, continued even after the administration reached out to warn Moscow to cease its campaign.

Crucially, the report asserts that the Obama administration did not view Russian cyber activity as part of a larger, holistic geopolitical campaign of active measures until August 2016, years into Moscow's campaign and mere months before voters cast their ballots.

Indeed, most officials, including National Security Advisor Susan Rice and White House Cybersecurity Coordinator Michael Daniel, first learned that Russian GRU officers had hacked and stolen Democratic National Committee emails from media reports. Even then, their initial reaction was that it "fell within the bounds of traditional espionage," rather than a precursor to a larger campaign of manipulation.

This view informed the White House response, from how seriously to treat the theft of DNC emails to the speed and breadth of its information sharing efforts to the decision to have the FBI, rather than the National Security Council or intelligence agencies, take the lead on responding to the intrusion. While FBI agents attempted to warn the DNC in 2015 and 2016 that it was being targeted, how the organization responded to those warnings is redacted.

Despite the Obama administration's sluggish response to the 2016 election, Russian cyber activity against the U.S. was "a well-known issue within the administration" prior to that.

On disinformation, former Deputy Secretary of State Antony Blinken recalled a 2014 episode in which a phone call between the Department of State and Ukraine was intercepted by Russian hackers and later posted on YouTube, telling the committee it "fed the larger concern that we had that we were in a new world of misinformation … a new world where information warfare was really the new front line, and that the Russians were using it in increasingly aggressive ways."

The report found that the administration was fearful of responding too forcefully, out of concern that it would be viewed as a partisan act to harm Donald Trump's candidacy and fear that doing so could, in the words of then Chief of Staff Denis McDonough, result in "doing the Russians' dirty work for them" of undermining faith in the integrity of the election.

Following the DNC leaks, the White House received "key insights" from U.S. intelligence agencies about Russian plans to weaponize the information. Just what they may have learned was redacted, but Rice and others advocated Obama be briefed "within an hour or two" of learning about it, followed by the Gang of Eight in Congress during August 2016.

Still, Rice was adamant about restricting the discussion about policy responses within the executive branch, with only a select number of high-level government officials involved in her "small-group" meetings. That group did not include the secretaries of Defense, State, Treasury, the chairman of the Joint Chiefs of Staff or White House cybersecurity coordinator.

While Daniel was not part of the small group convened by the White House, he had been tasked by Homeland Security Advisor Lisa Monaco in June 2016 to tee up a list of potential responses to Russia's cyber activities, which reportedly included the use of denial of service attacks against Russian news sites and other offensive cyber options to deter further meddling.

Those options, which were sent to NSC staffers and other interagency partners, were not synchronized with the Rice's group and led to some confusion. Rice told the committee the response by Daniel "was not part of my small-group process" and that he had sent his response options "to a bunch of people who had no business seeing them."

A lack of information sharing within the federal government and among other stakeholders has been widely cited as one of the biggest mistakes made by the U.S. government responding to Russian interference efforts in 2016.

In a statement, Senate Intelligence Committee Chair Richard Burr (R-N.C.) said the Obama administration "made decisions that limited their options, including preventing internal information-sharing and siloing cyber and geopolitical threats."

Sen. Ron Wyden (D-Ore.) criticized the Obama administration for its decision to "severely limit" its briefings to Congress on Russian interference, excluding committee staff from participating and preventing recordkeeping that could have prompted larger discussions about accountability and notifying the broader public.

"If the Administration had informed the public of Russian hacking and dumping earlier than October 7, and had there been bipartisan condemnation of these operations, the public and the press may have reacted differently to the WikiLeaks releases," Wyden wrote.

Intelligence agencies have admitted the need for faster information sharing around election threats, within the federal government and particularly to stakeholders in state and local government, who are on the front lines of election administration but lack the intelligence apparatus to identify such foreign campaigns.

The Office of the Director of National Intelligence created a new position to specifically address coordination on election threats, while the Department of Homeland Security has worked to ensure that every state has at least one official with the necessary security clearance to receive classified intelligence. The FBI and DHS have also committed to informing state governments when the federal government knows one of their local election systems have been hacked.

While coordination has increased in some areas, it has decreased in others. Notably, the White House cybersecurity coordinator position was eliminated by the Trump administration in 2018, leaving no one at the National Security Council specifically tasked with coordinating executive branch actions on cybersecurity matters.

The report recommends a number of other actions to deter future campaigns by Russia or other countries, including supporting international cyber norms, developing concrete plans to respond to foreign interference in the "highly politicized" environment of a U.S. election, integrating cyberattacks by foreign governments into larger geopolitical foreign policy discussions, collecting better intelligence on the information warfare capabilities of foreign adversaries, providing "substantive and timely" information sharing to federal agencies, Congress and state and local governments about future threats, and clarifying roles and responsibilities within the intelligence community for detecting and mitigating influence operations online.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.