Skip to content
Search

Latest Stories

Welcome! Log in to stay connected and make the most of your experience.

Input clean

The Cyber Campaigns

Cybersecurity legislation was a major component of President Barack Obama’s 2015 State of the Union Address, soon followed by the introduction and approval of the Cybersecurity Information Sharing Act.

In the 2016 address? Not a mention.


But as we move closer to welcoming a new President to the Oval Office, how will cybersecurity influence elections, campaigning, foreign relations, and policy? The threads are interwoven and complex.

The Unknown Landscape

This is just one of a handful of presidential elections that have been conducted in the age of big data and hyper-connectivity. Innovation, social sourcing, and online activism have increased ten-fold since the 2008 and 2012 campaigns, making for a very unknown and unstable foothold, particularly with the backdrop of the presidency.

Any motivated citizen, opponent, party, terrorist, or hacktivist has a much easier path to taking down a candidate than they might have had five or 10 years ago. Where dirty secrets and smear campaigns were the primary fears in the past, the vast data that’s now available — and likely not properly secured— is alarming. The sheer scope of the online landscape and its related data will be a major player in the forthcoming elections.

Fraud at the Polls

Cyber warfare, viewed as a national threat, has advanced tremendously since the 2012 election. What more of an attack target exists than changing the landscape of the presidency? Focus points will target voter fraud activity and hacks around classified activity, and there may even be instances of hackers going after Donald Trump’s financial records.

Unfortunately, the environments that can be attacked vary greatly, so there will certainly be targeted attacks against candidates as voters are picking their favorites come poll time.

Us Versus Them

From an information security standpoint, this is not a party-versus-party conflict. The official who is elected to govern America affects many countries — both positively and negatively. Many governments will attempt to influence the election, even if that means shaping outcomes.

But to what degree? What lengths will they go? Will they stop at the aforementioned poll fraud? Or could they stoop to extortion or other types of digital leverage? As data becomes increasingly valuable, this is a story to monitor across both state, national, and international levels.

Re-Focus on Education

A candidate’s viewpoints on education may have a major influence on the future of cybersecurity. The country’s deficiencies in cyber defense are directly related to the educational system’s lag in math, science and, to a point, relevant security curriculum and degree paths.

However, with a renewed emphasis on education, the new President could very well change the course of cybersecurity — making this election all the more important.

Current curriculums lack focus on math and science, and most universities don’t offer security-specific programs. This produces fewer and fewer graduates who are qualified for critical cybersecurity jobs. In turn, there is more demand for talent. Cybersecurity salaries grow to a point that enterprises can no longer invest in this much-needed area. The problem is compounded by a deficit of 209,000 cybersecurity professionals in the U.S.; numbers project that some one million cybersecurity jobs will be available worldwide in 2016. 

This dangerous trend could be mitigated by a strategic and consistent focus from the White House and Capitol Hill.

Data Policy Could Turn Election

It’s just not the tangible data that could turn the tide. Data privacy policy isn’t quite the hot-button topic it was just a year ago. But that doesn’t mean one of the final candidates won’t leverage the public’s concern over big data to tilt the polls in their favor. Or will ignoring the topic altogether have the opposite effect?

If democratic candidate Hilary Clinton’s personal email scandal garners so much attention, any mistake involving sensitive government or private data could prove pivotal come November.

While it is considered a best practice in the private sector, government officials must use extreme caution when accessing, storing or transmitting sensitive information. It’s alarming that this behavior isn’t already routine in D.C.

Related Articles

The Next War Won’t Target Cities, It Will Target Choke Points.

OPINION — In the age of strategic disruption, critical infrastructure is both the terrain and the target. The West’s optimization of systems for [...] More

China Wants Our Hearts. Literally.

OPINION — China is pre-positioning itself on U.S. networks for disruptive and destructive attacks against our critical infrastructure. In the past [...] More

Chinese Industrial Espionage: What Happens in the Netherlands Doesn’t Stay in the Netherlands

OPINION — China is conducting intelligence operations in the Netherlands that are targeting key industrial sectors including semiconductors, [...] More

China’s ‘Leap Forward’ in Drone Weapons

China’s ‘Leap Forward’ in Drone Weapons

DEEP DIVE – China’s military is in the midst of an innovation and manufacturing boom in drone weaponry — a “leap forward,” as one expert put it, that [...] More

The Trump AI Deals in the Gulf: Measuring the Value Against the Security Concerns

The Trump AI Deals in the Gulf: Measuring the Value Against the Security Concerns

EXPERT INTERVIEWS – When the White House announced multibillion-dollar artificial intelligence deals with the UAE and Saudi Arabia earlier this [...] More

Ukraine is a Crucible of Innovation, Not a Perfect Blueprint

EXPERT PERSPECTIVE – Ukrainian technology expositions are abuzz with enterprise and excitement. I have watched unmanned systems glide through [...] More