Hillary Clinton’s Cyber Warfare Warning

Hillary Clinton has been in the UK recently, promoting her book What Happened and giving her own analysis of that very question.

While she has enjoyed standing ovations, she has been criticised for reliving the campaign and refusing to take responsibility for her defeat. In particular, some argue that Clinton’s insistence that Vladimir Putin swung the election for Donald Trump is sour grapes.

Indeed, there are many reasons why she lost beyond simply blaming Russia. But while Clinton as a messenger may be controversial, her message goes far beyond despairing at Trump’s Twitter habit, and has crucial implications for the future of democracy itself.

What Happened has an entire chapter dedicated to “fake news and real Russians”. Whether or not you accept Clinton’s conclusion that the Kremlin swung the 77,000 votes in three key swing states that won Trump the election, it makes disturbing reading: cyber-attacks, grudges, weaponised information, illegal meetings, murky Trump-Moscow business ties, and an alarming invitation from Trump for Russia to hack and release Clinton’s private emails in July 2016.

Multiple US intelligence agencies, including the CIA and FBI, confirmed that Russia was behind cyber-attacks the summer before the election. There are currently three congressional investigations into Moscow’s involvement, while special counsel Robert Mueller is looking into whether the Trump team colluded with Russian agents.

But let’s take the most conservative view, which is that the Russian efforts were not enough to make a material difference to the election results. What happens next time?

We know that the Kremlin attempted to (at the very least) sow seeds of doubt among voters and spread fake news. Bizarre stories, such as the Clintons operating a child-sex exploitation ring from a pizza restaurant, were dressed up as fact by a deluge of new media sites with Russian fingerprints all over them, and disseminated by an army of fake social media accounts.

That in itself is something we have to take seriously. As former FBI director James Comey testified in the Senate: “we’re talking about a foreign government that, using technical intrusion… tried to shape the way we think, we vote, we act.”
This is not just a question of who should be US President today. Comey also warned “they’ll be back”. They will, and not just in America.

The US may have been first in the firing line, but from Russia’s funding of far-right parties across Europe (Front National, Alternative fur Deutschland, Austria’s Freedom Party), to the adverts for state-controlled propaganda machine Russia Today (RT) plastered all over the London Underground, Moscow is attempting to exert its influence across the Western world.

Putin’s UK allies tend to be found more on the far left than the far right. Jeremy Corbyn and his shadow frontbenchers are regular guests on RT, despite its role in suppressing free speech in Russia and spreading government disinformation.
Then there are our alt-left news outlets: The Canary, Skwawkbox, Another Angry VoiceThese sites are dedicated to churning out memes and clickbait, promoting Corbyn and attacking his enemies (whether Tories, moderate Labourites, or anyone else), with a lax attitude to fact-checking and opaque donors.

Recently, The British left-wing online news outlet Canary ran a hit-piece on BBC political editor Laura Kuenssberg, which implied she was speaking at a Conservative party fringe event. She wasn’t, but the fake news piece still went viral.

These sites aren’t direct outlets for the Kremlin. But they, and their alt-right counterparts, could be used as such, even inadvertently. Russian Facebook adverts weaponised hacked data from private emails, repeated false accusations about Clinton, and tried to build a movement against her. What if Russia, or China, or North Korea, aired Theresa May’s personal emails to try to bring her down? What if a more sophisticated attack were enough to make Corbyn Prime Minister next election?

What the US fallout has shown is that the tools are there for a foreign power to undermine citizens’ faith in their leaders and their democracy.

At the end of the Russia chapter, Clinton has some advice for what we can do: keep investigating, improve cyber defences, get tough with foreign autocrats who think they are invincible, and rebuild trust in institutions.

This is by no means easy, but the fate of our elections, and by extension the future of western democracy, depends on it. We might not like what Clinton has to say, but we cannot afford to ignore it.

Ein News

You Might Also Read:

How Russian Cyber Power Attacked The US:

How Did WikiLeaks Get Clinton's Emails?:
 

« ‘Bad Rabbit’ Cyber Attack Hits Russia & Ukraine
Microsoft Cloud Is Hosting US Spy Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cybertrust Japan

Cybertrust Japan

Cybertrust Japan provides a comprehensive security certification and digital authentication service, enabling customers to build and manage highly secure IT infrastructures.

REVI-IT

REVI-IT

REVI-IT is a Danish state-owned audit firm focusing on enterprise IT business processes and compliance,

TrustArc

TrustArc

TrustArc provide privacy compliance and risk management with integrated technology, consulting and TRUSTe certification solutions – addressing all phases of privacy program management.

ADL Process

ADL Process

ADL Process offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institutions.

u-blox

u-blox

u-blox deliver leading wireless technology to reliably and securely locate and connect people and devices.

Forgepoint Capital

Forgepoint Capital

ForgePoint Capital is a premier venture investor for early stage cybersecurity companies.

SignalSEC

SignalSEC

SignalSEC provides vulnerability intelligence, malware analysis, penetration testing and associated training services.

Nostra

Nostra

Nostra are a next generation managed services provider with a constant focus on Security and Business Continuity.

Quantexa

Quantexa

Quantexa automates millions of operational decisions, at scale, across multiple business units, including Anti-Money Laundering, Know-Your-Customer, Fraud, Credit Risk and Customer Intelligence.

HEROIC Cybersecurity

HEROIC Cybersecurity

HEROIC’s enterprise cybersecurity services help improve overall organizational security with industry best practices and advanced technology solutions.

BlueCat Networks

BlueCat Networks

BlueCat is the Adaptive DNS company. Our mission is to help the world’s largest organizations thrive on network complexity, from the edge to the core.

Northdoor

Northdoor

Northdoor provides a comprehensive set of services around information security and works with leading global technology vendors to deploy and manage cyber security solutions.

Assured Clarity

Assured Clarity

Assured Clarity are a global consultancy, specialising in Risk Management and Data Privacy, through Education, Awareness and Training, throughout an organisation.

RB42

RB42

RB42 (formerly Nexa Technologies) provide cyber defense solutions (ComUnity, secure and encrypted messaging, detection of interception tools, etc) and cyber defense consultancy service.

CyberNut

CyberNut

CyberNut are a security awareness training solution built exclusively for schools.

TeamT5

TeamT5

TeamT5 Inc. is a leading cybersecurity company dedicated to cyber threat research and solutions.