United States Imposes Cybersecurity Sanctions on Russia

Jan 6, 2017

Reading Time : 6 min

On January 4, 2017, the U.S. Department of Commerce’s Bureau of Industry and Security (BIS) added the five entities newly designated as SDNs to the Entity List. As a result of such designations, additional licensing requirements and restrictions apply to exports, re-exports, and transfers (in-country) to these entities under the Export Administration Regulations (EAR).

The State Department also announced that it is denying Russian access to two Russian government-­owned recreational compounds in Maryland and New York and is declaring “persona non grata” 35 officials from the Russian Embassy in Washington and the Russian Consulate in San Francisco. The State Department announced that these measures were part of a comprehensive response to Russia’s interference in the U.S. election; a pattern of harassment of U.S. diplomats overseas (including arbitrary police stops, physical assault and the broadcast on Russian State TV of personal details about our personnel that put them at risk); and Russian government actions that the State Department maintained impeded U.S. diplomatic operations.

Finally, on December 29, the Department of Homeland Security and the Federal Bureau of Investigation (FBI) released declassified technical information on Russian civilian and military intelligence service cyber activity to allow for the public to be able to better identify, detect and disrupt “Russia’s global campaign of malicious cyber activities.” This Joint Analysis Report follows the October 7, 2016, joint statement by Secretary Johnson and Director Clapper that the intelligence community was confident that the Russian government directed recent compromises of emails from U.S. persons and institutions and that the disclosures of alleged hacked emails was consistent with the Russian­-directed efforts, both in the United States and to influence public opinion in Europe and Eurasia. The full Joint Analysis Report can be found here.

President Obama suggested that additional actions are already under way and forthcoming: “These actions are not the sum total of our response to Russia’s aggressive activities. We will continue to take a variety of actions at a time and place of our choosing, some of which will not be publicized.”

Congressional leaders have generally supported the December 29 actions by President Obama, with certain senior Republican members of Congress remarking that measures should have been taken earlier.

Russian President Vladimir Putin has indicated that he will not take retaliatory measures at this time and will await the inauguration of President-­elect Donald Trump. In response, President-­elect Trump praised President Putin’s restrained response to these measures.

These and other sanctions involving Russia are subject to potential change by executive order. Although the U.S. Congress is considering legislation to codify existing sanctions and/or impose additional sanctions against Russia, President-­elect Trump may seek to roll back these executive actions after he takes office on January 20, 2017. An initial indication of what is to come will likely occur during the upcoming confirmation hearings for Rex Tillerson as the nominee for Secretary of State, who has extensive business experience in Russia.

Cybersecurity Executive Order Expanded to Cover Election Interference

As originally issued in April 2015, Executive Order 13694 created an authority for the U.S. government to respond more effectively to the most significant cyber threats and targeted persons who engage in malicious cyber­-enabled activities. The President amended Executive Order 13694 to authorize sanctions on those who engage in malicious cyber­-enabled activities that have the purpose or effect of “tampering with, altering, or causing a misappropriation of information with the purpose or effect of interfering with or undermining election processes or institutions.”

Specific Additions to the SDN List

Under this new authority, President Obama added five entities and four individuals to the SDN List. The Fact Sheet issued by the White House explained the basis for each of these additions, indicating that each of these entities and individuals had tampered, altered or caused a misappropriation of information with the purpose or effect of interfering with the 2016 U.S. election processes, as explained below:

  • Two Russian intelligence services: the Main Intelligence Directorate (aka Glavnoe Razvedyvatel’noe Upravlenie) (GRU), which was involved in external collection using human intelligence officers and a variety of technical tools; and the Federal Security Service (aka Federalnaya Sluzhba Bezopasnosti) (FSB), which assisted the GRU in conducting the activities described above
  • Three companies that provided material support to the GRU’s cyber operations: the Special Technology Center (aka STLC, Ltd. Special Technology Center St. Petersburg), which assisted the GRU in conducting signals intelligence operations; Zorsecurity (aka Esage Lab), which provided the GRU with technical research and development; and Autonomous Noncommercial Organization “Professional Association of Designers of Data Processing Systems” (ANO PO KSI), which provided specialized training to the GRU
  • Four individual officers of the GRU: Igor Valentinovich Korobov, the current Chief of the GRU; Sergey Aleksandrovich Gizunov, Deputy Chief of the GRU; Igor Olegovich Kostyukov, a First Deputy Chief of the GRU; and Vladimir Stepanovich Alexseyev, also a First Deputy Chief of the GRU.

In addition, OFAC designated two Russian individuals under a pre­existing portion of Executive Order 13694 for using cyber­-enabled means to cause misappropriation of funds and personal identifying information, explaining the bases for such designations as indicated below:

  • Evgeniy Mikhailovich Bogachev, who engaged in significant malicious cyber­-enabled misappropriation of financial information for private financial gain; Bogachev and his associates were responsible for the theft of more than $100 million from U.S. financial institutions, Fortune 500 firms, universities and government agencies
  • Aleksey Alekseyevich Belan, who engaged in significant malicious cyber-enabled misappropriation of personal identifiers for private financial gain; Belan compromised the computer networks of at least three major United States­-based e­commerce companies, and he used his unauthorized access to steal user data belonging to approximately 200 million accounts worldwide and then actively engaged in successful efforts to sell the stolen information for private financial gain.

Both men have multiple arrest warrants pending in the United States for various computer­-related crimes and remain on the FBI’s Most Wanted List.

U.S. persons are prohibited from dealing with SDNs, and all assets of SDNs that are currently in, or come within, the United States or the possession or control of a U.S. person are blocked, and U.S. persons are generally prohibited from engaging in transactions with them. Any entities that these SDNs own (defined as a direct or indirect ownership interest of 50 percent or more) are also blocked, regardless of whether those entities are separately named on the SDN List, and U.S. persons are generally prohibited from engaging in transactions with such entities as well. The individuals designated as SDNs will also be denied entry into the United States.

Corresponding Additions to the Entity List

Following OFAC’s designations, BIS added the two Russian intelligence agencies (GRU and FSB) and the three companies (Special Technology Center, Zorsecurity and ANO PO KSI) to the Entity List.

As a result of such designations, additional licensing requirements and restrictions apply to exports, re-exports and transfers (in-country) under the Export Administration Regulations (EAR) to such entities. Specifically, a license is required where items subject to the EAR are to be exported, re-exported, or transferred (in-country) to any of the entities added to the Entity List or in which such entities act as purchaser, intermediate consignee, ultimate consignee, or end-user. No license exceptions are available and BIS has imposed a presumption of denial policy to any license applications for the export, re-export or transfer of items subject to the EAR to these entities. 

Practical Implications

Entities and individuals subject to U.S. jurisdiction should ensure that they do not engage in impermissible transactions with persons named on OFAC’s SDN List or any entity owned by such persons. Exporters should also ensure that their export compliance programs have adequate measures in place to address the export, re-export and transfer restrictions imposed by BIS.  Additionally, U.S. officials are encouraging the public to review the declassified technical information relating to the cyber activities by Russia to help identify, detect and disrupt cyber activities that may have occurred or remain ongoing.

Additional Information

The White House: Amended Executive Order , President Obama’s Statement on the Executive Order  and Fact Sheet

The White House Blog: The Administration’s Response to Russia: What You Need to Know 

Bureau of Industry and Security: Addition of Certain Entities to the Entity List

Share This Insight

Previous Entries

Deal Diary

June 27, 2024

On June 24, 2024, the U.S. Securities and Exchange Commission (SEC) published five new Form 8-K Compliance and Disclosure Interpretations (C&DIs) expanding the agency’s interpretations of cybersecurity incident disclosures pursuant to Item 1.05 of Form 8-K. In July 2023, the SEC adopted final rules with respect to cybersecurity incidents that generally require public companies to disclose (i) material cybersecurity incidents within four business days after determining the incident was material and (ii) material information regarding their cybersecurity risk management, strategy and governance on an annual basis. We wrote about the final cybersecurity disclosure rules here.

...

Read More

Deal Diary

February 12, 2024

The Securities and Exchange Commission (SEC) recently adopted final rules (available here; also see the fact sheet and press release) representing significant changes to  special purpose acquisition companies (SPACs), shell companies and the disclosure of projections. These rules aim to enhance disclosures, protect investors and align the regulatory framework for SPACs with traditional IPOs. The following summarizes the key aspects of these rules.

...

Read More

Deal Diary

October 4, 2023

On September 20, 2023, the U.S. Securities and Exchange Commission (SEC) issued a final rule amending the so-called “Names Rule” (found here) that is “designed to modernize and enhance” protections under Rule 35d-1 of the Investment Company Act of 1940. The final rule is part of the SEC’s holistic efforts to regulate environmental, social and governance (ESG) matters, and is the SEC’s latest attempt to curb greenwashing in U.S. capital markets. The amendments require registered investment funds that include ESG factors in their names to place 80% of their assets in investments corresponding to those factors, thereby extending to ESG funds the SEC’s long-standing approach of regulating the names of registered funds to ensure they are marketed to investors truthfully. Fund complexes with more than $1 billion in assets will have two years from the final rule’s effective date (60 days after publication in the Federal Register) to comply, while fund complexes with less than $1 billion in assets will be given a compliance period of 30 months.

Chair Gary Gensler said “[t]he Names Rule reflects a basic idea: A fund’s investment portfolio should match a fund’s advertised investment focus. In essence, if a fund’s name suggests an investment focus, the fund in turn needs to invest shareholders’ dollars in a manner consistent with that investment focus. Otherwise, a fund’s portfolio might be inconsistent with what fund investors desired when selecting a fund based upon its name.” The sole dissenting vote against the rule modification, Commissioner Mark Uyeda, said “[w]ith these amendments, the Commission overemphasizes the importance of a fund’s name, as if to suggest that investors and their financial professionals need not look at the prospectus disclosures.” Commissioner Uyeda also expressed concern that fund investors will bear the increased compliance costs associated with the rule change.

...

Read More

Deal Diary

May 31, 2023

As discussed in our prior publication (found here), the Securities and Exchange Commission (SEC) adopted amendments on December 14, 2022, regarding Rule 10b5-1 insider trading plans and related disclosures. On May 25, 2023, the SEC issued three new compliance and disclosure interpretations (C&DIs) relating to the Rule 10b5-1 amendments.

...

Read More

Deal Diary

May 24, 2023

On May 15, 2023, the Eastern District of California ruled that California Assembly Bill No. 979 (“AB 979”) violates the Equal Protection Clause of the U.S. Constitution’s Fourteenth Amendment and 42 U.S.C. § 1981. As enacted, California’s Board Diversity Statute, required public companies with headquarters in the state to include a minimum number of directors from “underrepresented communities” or be subject to fines for violating the statute. AB 979 defines a “director from an underrepresented community” as “an individual who self-identifies as Black, African American, Hispanic, Latino, Asian, Pacific Islander, Native American, Native Hawaiian, or Alaska Native, or who self-identifies as gay, lesbian, bisexual, or transgender.”

...

Read More

Deal Diary

May 9, 2023

Update: On October 31, 2023, the Fifth Circuit granted the US Chamber of Commerce's petition for review of the SEC's share repurchase disclosure rules, holding that the SEC acted arbitrarily and capriciously in violation of the Administrative Procedure Act. The court directed the SEC to correct the defects within 30 days of the opinion. On December 1, 2023, the SEC informed the Fifth Circuit that it was unable to correct the rule's defects within 30 days of the opinion. On December 19, 2023, the Fifth Circuit vacated the SEC’s share repurchase disclosure rules.

...

Read More

Deal Diary

April 12, 2023

We have released our 2023 ESG Survey which includes a collection of reports reflecting on significant ESG themes and trends from 2022, as well as what we believe to be key developments for 2023.

...

Read More

Deal Diary

February 6, 2023

As companies begin preparing for the 2023 proxy season, we note that Institutional Shareholder Services Inc. (ISS) and Glass Lewis, the leading providers of corporate governance solutions and proxy advisory services, issued updated benchmark policies (proxy voting guidelines), which can be found here and here, respectively. The updated proxy voting guidelines generally focus on board accountability and oversight considerations and address topics such as climate accountability, board diversity, shareholder rights, corporate governance standards, executive compensation and social issues. What follows is a summary of the proxy voting guidelines published by ISS and Glass Lewis for the 2023 proxy season.

...

Read More

© 2024 Akin Gump Strauss Hauer & Feld LLP. All rights reserved. Attorney advertising. This document is distributed for informational use only; it does not constitute legal advice and should not be used as such. Prior results do not guarantee a similar outcome. Akin is the practicing name of Akin Gump LLP, a New York limited liability partnership authorized and regulated by the Solicitors Regulation Authority under number 267321. A list of the partners is available for inspection at Eighth Floor, Ten Bishops Square, London E1 6EG. For more information about Akin Gump LLP, Akin Gump Strauss Hauer & Feld LLP and other associated entities under which the Akin Gump network operates worldwide, please see our Legal Notices page.