U.S Elections and the Coming Cyber Wars

Hillary Clinton is the leading US Democratic Party candidate. That means if US primaries were on tomorrow, Clinton would win. And she would be running for President next year. But things might be about to change…

As a former US Secretary of State it’s fair to say she has some pretty strong connections in the US government. She is also a former First Lady.

Thus it’s fair to say she has access to a fair bit of top-secret information. As a person in her position, digital security is very important. And in a typical case the Department of Homeland Security (DHS) would give a person in such a position a ‘secure’ email server. Well that’s not the case for Clinton. In fact her choice of email server could swing the US primaries. And in turn impact the 2016 US Presidential elections. Who would have thought an email server could be so important? And who would have thought her decision would create some of the best investment opportunities of the 21st century? 

An email server affecting a presidential race, but the FBI is looking into Hillary Clinton, and not in a good way. Her email set up at home is ‘unusual’ according to government officials.

She doesn’t use the typical government email set up. Instead she has a private account set up by a Denver-based company.
And this is now under question due to one big factor, the security of her email. Remember, Clinton is privy to top-secret information. And the government is worried about the security of said information.

They like control and right now with Clinton, they don’t have it. Let’s me ask you something. Assume you had to choose between two email set-ups. Your decision is solely based on the security that email will provide. Nothing else. One is an email that a national security government agency sets up for you. The other is an email server set up by a private technology company.

Which do you choose? It sounds like a straightforward answer right? You’d go with the government one. Wouldn’t you? Surely they would have the highest level of security? Well…maybe not.

Ein News:

 

 

« Malaysia: Umno members told to go on ‘cyber war’
Predictive Policing Technology Arrests »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BCS, The chartered Institute for IT

BCS, The chartered Institute for IT

BCS provides IT professionals with up to date and relevant certifications enabling them to manage IT security effectively within their budget.

CROW - University of Waikato

CROW - University of Waikato

CROW is the first cyber security lab established in a New Zealand educational institution at the University of Waikato.

National Security Agency (NSA) - USA

National Security Agency (NSA) - USA

NSA is a US intel agency responsible for the protection of government communications and information systems against penetration and network warfare.

Sentia

Sentia

Sentia is an IT and infrastructure firm, with focus on Outsourcing, IT operation and management, Hosting, Co-location, Network, and IT security.

Phirelight Security Solutions

Phirelight Security Solutions

Phirelight empowers an enterprise to easily understand how their networks behave, while at the same time assessing and managing cyber threats in real time.

Cybernetic Global Intelligence (CGI)

Cybernetic Global Intelligence (CGI)

CGI is a global IT Security firm that helps companies protect their data and minimize their vulnerability to cyber threats through a range of services such as Security Audits and Managed Services.

Merlin Cyber

Merlin Cyber

Merlin is a premier cybersecurity platform that leverages security technologies, trusted relationships, and capital to develop and deliver groundbreaking security solutions.

Incognito Forensic Foundation Lab (IFF Lab)

Incognito Forensic Foundation Lab (IFF Lab)

IFF Lab is a premier cyber and digital forensics lab in India that offers forensic services and solutions, cyber security analysis and assessment, IT support, training and consultation.

PixelPlex

PixelPlex

PixelPlex is a blockchain and custom software development company with offices and developers in New York, Geneva, and Seoul.

Ethyca

Ethyca

Ethyca builds automated data privacy infrastructure and tools for developers and privacy teams to easily build products that comply with GDPR, CCPA Privacy Regulations.

Spyderbat

Spyderbat

Spyderbat ATI closes the manual investigation gap between detection and response by instantly presenting causally connected threat activity to security analysts at the onset of an investigation.

Purism

Purism

Purism works with hardware component manufactures and the free software community to build high quality hardware that respects your digital life.

Airlock Digital

Airlock Digital

Airlock Digital was created after many years of experience in implementing whitelisting/ allowlisting solutions in Federal Government and various enterprises in Australia.

Lithuanian Cyber Command (LTCYBERCOM)

Lithuanian Cyber Command (LTCYBERCOM)

The Lithuanian Cyber Command is responsible for planning and execution of operations in cyberspace and installation of strategic and operational communications and information systems.

Archipelo

Archipelo

At Archipelo, we empower organizations with Developer Security - to increase software security and compliance throughout the development lifecycle.

Konsulko Group

Konsulko Group

Konsulko Group offers embedded Linux software and hardware development and Yocto Project services.