Hillary Clinton’s Cyber Warfare Warning

Hillary Clinton has been in the UK recently, promoting her book What Happened and giving her own analysis of that very question.

While she has enjoyed standing ovations, she has been criticised for reliving the campaign and refusing to take responsibility for her defeat. In particular, some argue that Clinton’s insistence that Vladimir Putin swung the election for Donald Trump is sour grapes.

Indeed, there are many reasons why she lost beyond simply blaming Russia. But while Clinton as a messenger may be controversial, her message goes far beyond despairing at Trump’s Twitter habit, and has crucial implications for the future of democracy itself.

What Happened has an entire chapter dedicated to “fake news and real Russians”. Whether or not you accept Clinton’s conclusion that the Kremlin swung the 77,000 votes in three key swing states that won Trump the election, it makes disturbing reading: cyber-attacks, grudges, weaponised information, illegal meetings, murky Trump-Moscow business ties, and an alarming invitation from Trump for Russia to hack and release Clinton’s private emails in July 2016.

Multiple US intelligence agencies, including the CIA and FBI, confirmed that Russia was behind cyber-attacks the summer before the election. There are currently three congressional investigations into Moscow’s involvement, while special counsel Robert Mueller is looking into whether the Trump team colluded with Russian agents.

But let’s take the most conservative view, which is that the Russian efforts were not enough to make a material difference to the election results. What happens next time?

We know that the Kremlin attempted to (at the very least) sow seeds of doubt among voters and spread fake news. Bizarre stories, such as the Clintons operating a child-sex exploitation ring from a pizza restaurant, were dressed up as fact by a deluge of new media sites with Russian fingerprints all over them, and disseminated by an army of fake social media accounts.

That in itself is something we have to take seriously. As former FBI director James Comey testified in the Senate: “we’re talking about a foreign government that, using technical intrusion… tried to shape the way we think, we vote, we act.”
This is not just a question of who should be US President today. Comey also warned “they’ll be back”. They will, and not just in America.

The US may have been first in the firing line, but from Russia’s funding of far-right parties across Europe (Front National, Alternative fur Deutschland, Austria’s Freedom Party), to the adverts for state-controlled propaganda machine Russia Today (RT) plastered all over the London Underground, Moscow is attempting to exert its influence across the Western world.

Putin’s UK allies tend to be found more on the far left than the far right. Jeremy Corbyn and his shadow frontbenchers are regular guests on RT, despite its role in suppressing free speech in Russia and spreading government disinformation.
Then there are our alt-left news outlets: The Canary, Skwawkbox, Another Angry VoiceThese sites are dedicated to churning out memes and clickbait, promoting Corbyn and attacking his enemies (whether Tories, moderate Labourites, or anyone else), with a lax attitude to fact-checking and opaque donors.

Recently, The British left-wing online news outlet Canary ran a hit-piece on BBC political editor Laura Kuenssberg, which implied she was speaking at a Conservative party fringe event. She wasn’t, but the fake news piece still went viral.

These sites aren’t direct outlets for the Kremlin. But they, and their alt-right counterparts, could be used as such, even inadvertently. Russian Facebook adverts weaponised hacked data from private emails, repeated false accusations about Clinton, and tried to build a movement against her. What if Russia, or China, or North Korea, aired Theresa May’s personal emails to try to bring her down? What if a more sophisticated attack were enough to make Corbyn Prime Minister next election?

What the US fallout has shown is that the tools are there for a foreign power to undermine citizens’ faith in their leaders and their democracy.

At the end of the Russia chapter, Clinton has some advice for what we can do: keep investigating, improve cyber defences, get tough with foreign autocrats who think they are invincible, and rebuild trust in institutions.

This is by no means easy, but the fate of our elections, and by extension the future of western democracy, depends on it. We might not like what Clinton has to say, but we cannot afford to ignore it.

Ein News

You Might Also Read:

How Russian Cyber Power Attacked The US:

How Did WikiLeaks Get Clinton's Emails?:
 

« ‘Bad Rabbit’ Cyber Attack Hits Russia & Ukraine
Microsoft Cloud Is Hosting US Spy Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Evidence Talks Ltd

Evidence Talks Ltd

A leading forensic computing authority developing unique digital forensic technologies. Tools that detect potential terrorists & criminals & used by the military, enforcement & intelligence commmunity

TypingDNA

TypingDNA

TypingDNA uses AI to recognise people by the way they type on desktop keyboards and mobile devices.

Secon Cyber Security

Secon Cyber Security

Secon Cyber Security is an Advanced Managed Security Services Provider with long standing experience of providing cyber security solutions to customers ranging from small to large enterprises.

Clavis Information Security

Clavis Information Security

Clavis is an Information Security company offering a complete portfolio of solutions from Pentesting and Security Assessments to Managed Security Services and Training.

Data Destruction London

Data Destruction London

Data Destruction London offers fast, confidential and compliant expert data destruction services to businesses and organisations in London.

2Keys

2Keys

2Keys designs, deploys and operates Digital Identity Platforms and Cyber Security Platforms through Managed Service and Professional Service engagements.

LinkShadow

LinkShadow

LinkShadow is a next-generation cybersecurity solution that provides unparalleled detection of even the most sophisticated threats.

ZecOps

ZecOps

ZecOps is a cybersecurity automation company offering solutions for servers, endpoints, mobile devices, and custom devices.

MONITORAPP

MONITORAPP

MONITORAPP is responsible for complete web security. Protect your business environment with Application Security Solutions from MONTORAPP.

Converge Technology Solutions

Converge Technology Solutions

Converge Technology Solutions Corp. is a North American IT solution provider delivering advanced analytics, cloud, cybersecurity, and managed services solutions.

StackHawk

StackHawk

StackHawk is built to help dev teams ship secure code. Find and fix bugs early before they become vulnerabilities in production.

Packetlabs

Packetlabs

Packetlabs specializes in penetration testing services and application security.

Gunnison Consulting Group

Gunnison Consulting Group

Gunnison Consulting Group serves the Federal Government with high quality IT consulting services.

Curatrix Technologies

Curatrix Technologies

Curatrix Technologies is a Managed IT Service provider based in Hampshire, UK, providing high quality and reliable Managed IT Services since 2015.

Indevtech

Indevtech

Indevtech has been serving Hawaii since 2001, providing end-to-end managed IT services to small- and medium-businesses.

Ark Technology Consultants

Ark Technology Consultants

Ark Technology Consultants is a unique IT Services Firm which blends technology solutions with consultative insight around governance and process management.