Hillary Clinton’s Cyber Warfare Warning

Hillary Clinton has been in the UK recently, promoting her book What Happened and giving her own analysis of that very question.

While she has enjoyed standing ovations, she has been criticised for reliving the campaign and refusing to take responsibility for her defeat. In particular, some argue that Clinton’s insistence that Vladimir Putin swung the election for Donald Trump is sour grapes.

Indeed, there are many reasons why she lost beyond simply blaming Russia. But while Clinton as a messenger may be controversial, her message goes far beyond despairing at Trump’s Twitter habit, and has crucial implications for the future of democracy itself.

What Happened has an entire chapter dedicated to “fake news and real Russians”. Whether or not you accept Clinton’s conclusion that the Kremlin swung the 77,000 votes in three key swing states that won Trump the election, it makes disturbing reading: cyber-attacks, grudges, weaponised information, illegal meetings, murky Trump-Moscow business ties, and an alarming invitation from Trump for Russia to hack and release Clinton’s private emails in July 2016.

Multiple US intelligence agencies, including the CIA and FBI, confirmed that Russia was behind cyber-attacks the summer before the election. There are currently three congressional investigations into Moscow’s involvement, while special counsel Robert Mueller is looking into whether the Trump team colluded with Russian agents.

But let’s take the most conservative view, which is that the Russian efforts were not enough to make a material difference to the election results. What happens next time?

We know that the Kremlin attempted to (at the very least) sow seeds of doubt among voters and spread fake news. Bizarre stories, such as the Clintons operating a child-sex exploitation ring from a pizza restaurant, were dressed up as fact by a deluge of new media sites with Russian fingerprints all over them, and disseminated by an army of fake social media accounts.

That in itself is something we have to take seriously. As former FBI director James Comey testified in the Senate: “we’re talking about a foreign government that, using technical intrusion… tried to shape the way we think, we vote, we act.”
This is not just a question of who should be US President today. Comey also warned “they’ll be back”. They will, and not just in America.

The US may have been first in the firing line, but from Russia’s funding of far-right parties across Europe (Front National, Alternative fur Deutschland, Austria’s Freedom Party), to the adverts for state-controlled propaganda machine Russia Today (RT) plastered all over the London Underground, Moscow is attempting to exert its influence across the Western world.

Putin’s UK allies tend to be found more on the far left than the far right. Jeremy Corbyn and his shadow frontbenchers are regular guests on RT, despite its role in suppressing free speech in Russia and spreading government disinformation.
Then there are our alt-left news outlets: The Canary, Skwawkbox, Another Angry VoiceThese sites are dedicated to churning out memes and clickbait, promoting Corbyn and attacking his enemies (whether Tories, moderate Labourites, or anyone else), with a lax attitude to fact-checking and opaque donors.

Recently, The British left-wing online news outlet Canary ran a hit-piece on BBC political editor Laura Kuenssberg, which implied she was speaking at a Conservative party fringe event. She wasn’t, but the fake news piece still went viral.

These sites aren’t direct outlets for the Kremlin. But they, and their alt-right counterparts, could be used as such, even inadvertently. Russian Facebook adverts weaponised hacked data from private emails, repeated false accusations about Clinton, and tried to build a movement against her. What if Russia, or China, or North Korea, aired Theresa May’s personal emails to try to bring her down? What if a more sophisticated attack were enough to make Corbyn Prime Minister next election?

What the US fallout has shown is that the tools are there for a foreign power to undermine citizens’ faith in their leaders and their democracy.

At the end of the Russia chapter, Clinton has some advice for what we can do: keep investigating, improve cyber defences, get tough with foreign autocrats who think they are invincible, and rebuild trust in institutions.

This is by no means easy, but the fate of our elections, and by extension the future of western democracy, depends on it. We might not like what Clinton has to say, but we cannot afford to ignore it.

Ein News

You Might Also Read:

How Russian Cyber Power Attacked The US:

How Did WikiLeaks Get Clinton's Emails?:
 

« ‘Bad Rabbit’ Cyber Attack Hits Russia & Ukraine
Microsoft Cloud Is Hosting US Spy Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Hotlava Systems

Hotlava Systems

HotLava network adapters enable today's powerful servers and workstations to deliver more productivity by reducing congestion at the network interface.

CloudHesive

CloudHesive

CloudHesive provides cloud solutions through consulting and managed services with a focus on security, reliability, availability and scalability.

CloudCodes Software

CloudCodes Software

CloudCodes is a cloud security solutions provider focused on providing cloud security solutions to enterprise customers.

ABL Cyber Academy

ABL Cyber Academy

ABL provide certified training courses in the field of cyber security and IT project management.

Cybraics

Cybraics

Cybraics nLighten platform implements a unique and sophisticated artificial intelligence engine that rapidly learns your environment and alerts security teams to threats and vulnerabilities.

Datacom Systems

Datacom Systems

Datacom Systems is a leading manufacturer of network visibility solutions.

Vuntie

Vuntie

Vuntie blend European craftsmanship, performance and open-source technology to deliver cybersecurity services including penetration testing, incident response, training and consultancy.

Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference is a non-profit, annual, information security conference located in Halifax, Nova Scotia, Canada.

RackTop Systems

RackTop Systems

RackTop Systems is the pioneer of CyberConverged data security, a new market that fuses data storage with advanced security and compliance into a single platform.

Barikat Cyber Security

Barikat Cyber Security

Barikat is a provider of information security solution and services including security analysis and compliance, security testing, managed security services, incident response and training.

ShardSecure

ShardSecure

ShardSecure Microshard technology eliminates data sensitivity, providing security, privacy and compliance beyond encryption.

Tactic Labs

Tactic Labs

Tactic Labs (part of the Avnon Group) delivers a holistic Cyber-Security Management Platform which provides military-grade protection, safeguarding critical infrastructures and mission-critical data.

Conversant Group

Conversant Group

Conversant Group is an IT infrastructure and security consulting company, providing technical, organizational, procedural, and process consulting internationally.

Seedcamp

Seedcamp

Seedcamp identify and invest early in world-class founders attacking large and global markets through disruptive technology in areas including AI, cybersecurity, and Fintech.

Cura Technology

Cura Technology

Cura Technology offers a wide array of security solutions meticulously designed to address specific facets of your security requirements.

Infrassist Technologies

Infrassist Technologies

We're Infrassist - a trusted white label Managed IT & Professional Services partner for MSP businesses.