|2017.01.31||Leaked Trump order gives defense department equal footing with homeland security in civilian cybersecurity, and may give Pentagon bigger role, but White House announces signing is cancelled without explanation on Tuesday. theguardian.com (See also First 100 Days, Department of Homeland Security, Department of Defense, James Mattis, John Kelly)|
|2018.02.22||The head of a federal commission who has helped U.S. states protect election systems from possible cyber attacks by Russia or others is being replaced at the behest of Republican House of Representatives Speaker Paul Ryan and the White House. reuters.com (See also Russian Meddling in Election, Voter Fraud)|
|2018.04.04||The security advocacy group Global Cyber Alliance tested the 26 email domains managed by the Executive Office of the President (EOP) and found that only one fully implements a security protocol that verifies the emails as genuinely from the White House. axios.com (See also Department of Homeland Security, Hypocrisy)|
Of the 26 domains, 18 are not in compliance with a Department of Homeland Security directive to implement that protocol.
|2018.05.08||Russia was preparing to undermine confidence in the United States’ voting process when its hackers surveilled around 20 state election systems in the run-up to the 2016 elections, according to the Senate Intelligence Committee. nytimes.com (See also 2016 Election, Russia)|
|2018.05.09||Donald Trump’s national security team is weighing the elimination of the top White House cybersecurity job, as the nation faces growing digital threats from adversaries such as Russia and Iran. politico.com (See also Russia, Iran)|
|2018.05.15||The Trump administration has eliminated the White House’s top cyber policy role, jettisoning a key position created during the Obama presidency to harmonize the government's overall approach to cybersecurity policy and digital warfare. politico.com (See also Reversals)|
|2018.05.21||Donald Trump uses a White House cellphone that isn’t equipped with sophisticated security features designed to shield his communications — a departure from the practice of his predecessors that potentially exposes him to hacking or surveillance. politico.com (See also Hypocrisy)|