Hillary Clinton’s Cyber Warfare Warning

Hillary Clinton has been in the UK recently, promoting her book What Happened and giving her own analysis of that very question.

While she has enjoyed standing ovations, she has been criticised for reliving the campaign and refusing to take responsibility for her defeat. In particular, some argue that Clinton’s insistence that Vladimir Putin swung the election for Donald Trump is sour grapes.

Indeed, there are many reasons why she lost beyond simply blaming Russia. But while Clinton as a messenger may be controversial, her message goes far beyond despairing at Trump’s Twitter habit, and has crucial implications for the future of democracy itself.

What Happened has an entire chapter dedicated to “fake news and real Russians”. Whether or not you accept Clinton’s conclusion that the Kremlin swung the 77,000 votes in three key swing states that won Trump the election, it makes disturbing reading: cyber-attacks, grudges, weaponised information, illegal meetings, murky Trump-Moscow business ties, and an alarming invitation from Trump for Russia to hack and release Clinton’s private emails in July 2016.

Multiple US intelligence agencies, including the CIA and FBI, confirmed that Russia was behind cyber-attacks the summer before the election. There are currently three congressional investigations into Moscow’s involvement, while special counsel Robert Mueller is looking into whether the Trump team colluded with Russian agents.

But let’s take the most conservative view, which is that the Russian efforts were not enough to make a material difference to the election results. What happens next time?

We know that the Kremlin attempted to (at the very least) sow seeds of doubt among voters and spread fake news. Bizarre stories, such as the Clintons operating a child-sex exploitation ring from a pizza restaurant, were dressed up as fact by a deluge of new media sites with Russian fingerprints all over them, and disseminated by an army of fake social media accounts.

That in itself is something we have to take seriously. As former FBI director James Comey testified in the Senate: “we’re talking about a foreign government that, using technical intrusion… tried to shape the way we think, we vote, we act.”
This is not just a question of who should be US President today. Comey also warned “they’ll be back”. They will, and not just in America.

The US may have been first in the firing line, but from Russia’s funding of far-right parties across Europe (Front National, Alternative fur Deutschland, Austria’s Freedom Party), to the adverts for state-controlled propaganda machine Russia Today (RT) plastered all over the London Underground, Moscow is attempting to exert its influence across the Western world.

Putin’s UK allies tend to be found more on the far left than the far right. Jeremy Corbyn and his shadow frontbenchers are regular guests on RT, despite its role in suppressing free speech in Russia and spreading government disinformation.
Then there are our alt-left news outlets: The Canary, Skwawkbox, Another Angry VoiceThese sites are dedicated to churning out memes and clickbait, promoting Corbyn and attacking his enemies (whether Tories, moderate Labourites, or anyone else), with a lax attitude to fact-checking and opaque donors.

Recently, The British left-wing online news outlet Canary ran a hit-piece on BBC political editor Laura Kuenssberg, which implied she was speaking at a Conservative party fringe event. She wasn’t, but the fake news piece still went viral.

These sites aren’t direct outlets for the Kremlin. But they, and their alt-right counterparts, could be used as such, even inadvertently. Russian Facebook adverts weaponised hacked data from private emails, repeated false accusations about Clinton, and tried to build a movement against her. What if Russia, or China, or North Korea, aired Theresa May’s personal emails to try to bring her down? What if a more sophisticated attack were enough to make Corbyn Prime Minister next election?

What the US fallout has shown is that the tools are there for a foreign power to undermine citizens’ faith in their leaders and their democracy.

At the end of the Russia chapter, Clinton has some advice for what we can do: keep investigating, improve cyber defences, get tough with foreign autocrats who think they are invincible, and rebuild trust in institutions.

This is by no means easy, but the fate of our elections, and by extension the future of western democracy, depends on it. We might not like what Clinton has to say, but we cannot afford to ignore it.

Ein News

You Might Also Read:

How Russian Cyber Power Attacked The US:

How Did WikiLeaks Get Clinton's Emails?:
 

« ‘Bad Rabbit’ Cyber Attack Hits Russia & Ukraine
Microsoft Cloud Is Hosting US Spy Data »

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Plc

Cyber Plc

Cyber Plc is a global cybersecurity consulting firm providing services to government, the public sector and enterprises.

Virtual Security

Virtual Security

Virtual Security provides solutions in the field of managed security services, network security, secure remote work, responsible internet, application security, encryption, BYOD and compliance.

Asigra

Asigra

Asigra provides an industry leading cloud backup and recovery software platform called Asigra Cloud Backup.

Cyber Security Network

Cyber Security Network

Cyber Security Network provide specialist cyber security recruitment services.

Owl Cyber Defense Solutions

Owl Cyber Defense Solutions

Owl patented DualDiode Technology enables hardware-enforced network segmentation and deterministic, one-way transfer of all data types and file sizes.

CyberDefcon

CyberDefcon

CyberDefcon is an independent organization dedicated to the pursuit of making the internet a safer place.

Deep Instinct

Deep Instinct

Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization’s endpoints, servers, and mobile devices.

Meiya Pico Information Co

Meiya Pico Information Co

Meiya Pico is the leading digital forensics and information security products and service provider in China.

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU-ARCC acts as ITU’s cybersecurity hub in the Arab Region localizing and coordinating cybersecurity initiatives.

FirstPoint Mobile Guard

FirstPoint Mobile Guard

FirstPoint Mobile Guard has developed the market’s most advanced solution for securing cellular devices, including mobile phones and IoT products, by blocking malicious data leakage.

Bl4ckswan

Bl4ckswan

Bl4ckswan is a Management Consulting firm specialized in the delivery of information security and compliance services.

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity make Cars & Infrastructures Cybersecure.

IntaPeople

IntaPeople

IntaPeople are IT and engineering recruitment specialists. We have specialist teams for job sectors including Cybersecurity, IT infrastructure and DevOps.

Picnic

Picnic

Picnic is a gritty, pioneering team of intelligence and cybersecurity specialists focused on solving the security challenge of our time - social engineering.

Appdetex

Appdetex

Appdetex is a global leader in securing your brand’s digital footprint. We are a full-service brand protection company in the online and mobile brand protection space.

IgmGuru

IgmGuru

Igmguru offers certification online training courses for IT professionals and students. Get certified with high-in-demand job-oriented professional courses.