Vulnerabilities / Threats
10/27/2016
05:40 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

How Clinton, Trump Could Champion Cybersecurity

The major party Presidential candidates, which both have experienced the aftermath of hacks and poor security practices of their own, could serve as 'poster children' and advocate for better cybersecurity, experts say.

If there was ever a time when Presidential candidates could serve as real advocates for cybersecurity, it would be now.

Both Democratic nominee Hillary Clinton and Republican nominee Donald Trump this year each have had firsthand experiences at the hands of hackers - Clinton, with the email hacks and dumps of the Democratic National Committee and of her campaign manager John Podesta, and Trump, with his hotel chain's payment card breaches. Neither candidate has demonstrated savvy deployment of security of their own systems: Clinton has been under fire for her use of a personal email server and account while serving as Secretary of State, while security researchers revealed that Trump's own email servers used the outdated and no longer-supported Microsoft Windows 2003 Server software, as well as a flaw in his campaign's public website that left intern resumes exposed.

But in a year when cybersecurity has been a major mainstream newsmaker and the threat of more cyberattacks from Russia loom over the Presidential election, both Clinton and Trump have an opportunity to spin their missteps and real-world data breach experiences into fresh personal perspectives on lessons learned in the need for stronger security posture for the US government, private industry, and private citizens, security experts say.

"If they get religion on this topic, they could be poster children for all of us in becoming more" security-savvy, says Jack Danahy, co-founder and CTO of Barkly, a security software vendor. Clinton's use of a private email server, as well as former Secretary of State Colin Powell's use of personal email during his tenure, reflect the infamous security tradeoff theme of "convenience versus security," Danahy says.

Clinton and Trump have outlined their respective cybersecurity platforms, both of which are relatively slim when it comes to details.

"It's important that they both appreciate cybersecurity as a major factor in policy-making," says Michael Marriott, a research analyst with Digital Shadows. "They have to show an appreciation of the importance of the issue. But it's such a fast-moving area," which makes that challenging for politicians to keep up with, he notes.

Whoever becomes the next President of the US will have to strike a delicate balance between setting policy while not over-regulating, he says. They should avoid "being heavy-handed," Marriott says.

Black Hat Europe 2016 is coming to London's Business Design Centre November 1 through 4. Click for information on the briefing schedule and to register.

Here's a look at the cybersecurity platforms of Clinton and Trump:

Clinton

Hillary Clinton plans to "build on" President Obama's Cybersecurity National Action Plan (CNAP), a game plan unveiled early this year by Obama that added a federal chief information security officer (CISO), and plans for updating government agencies' IT infrastructures as well as beefing up their cybersecurity measures.

"She supports expanded investment in cybersecurity technologies, as well as public-private collaboration on cybersecurity innovation, responsible information sharing on cyber threats, and accelerated adoption of best practices such as the National Institute of Standards and Technology Cybersecurity Framework," according to Clinton's platform on technology. Efforts to reach a campaign spokesperson for more details were unsuccessful.

When it comes to the debate over privacy and US security interests, Clinton supports the USA Freedom Act as well as the concept of a national commission on digital security and encryption, a proposal by Sen. Mark Warner, D-Va. and Rep. Michael McCaul, R-Tex. The commission would unite both the tech community and law enforcement to determine how to balance national security and individual privacy interests.

Security technology-wise, Clinton supports multi-factor authentication practices and bug bounty programs as a way to root out vulnerabilities. "She will encourage government agencies to consider innovative tools like bug bounty programs, modeled on the Defense Department’s recent “Hack the Pentagon” initiative, to encourage hackers to responsibly disclose vulnerabilities they discover to the government," her platform says. "And she will bolster the government’s ability to test its own defenses by increasing the capacity of elite, cleared government red teams to help agencies find and fix vulnerabilities before hackers exploit them."

Trump

Republican candidate Trump plans to set up a cyber review team comprised of military, law enforcement, and private industry members, to assess US cyber defenses and weaknesses. "The Cyber Review Team will provide specific recommendations for safeguarding different entities with the best defense technologies tailored to the likely threats, and will followed up regularly at various Federal agencies and departments," according to Trump's cybersecurity vision statement posted on his website. "The Cyber Review Team will establish detailed protocols and mandatory cyber awareness training for all government employees while remaining current on evolving methods of cyber-attack."

The Justice Department will create Joint Task Forces that coordinate cyber threat response among federal, state, and local law enforcement, and the US Cyber Command will be reviewed by the Secretary of Defense and the Chairman of the Joint Chiefs of Staff, with the "focus on both offense and defense."

Trump also calls for developing "offensive" capabilities in cybersecurity. "Develop the offensive cyber capabilities we need to deter attacks by both state and non-state actors and, if necessary, to respond appropriately," according to his statement.

Efforts to reach a Trump spokesperson for more details on the scope of the offensive cybersecurity policy were unsuccessful.

Cyber War, What Is It Good For?

Clinton also has alluded to tougher response options by the feds to cyberattacks. In the first Presidential debate, she said the US needs to "make it very clear" to nations who engage in cyberattacks against the US that "the US has much greater capacity and we are not going to sit idly by and permit state actors to go after our information: our private-sector information or our public sector information," she said. "And we're going to have to make it clear that we don't want to use the kinds of tools that we have. We don't want to engage in a different kind of warfare. But we will defend the citizens of this country, and the Russians need to understand that."

It's unclear whether Clinton and Trump are truly advocating hacking back by the feds and or private industry, or just what the parameters would be. Hacking back is a controversial concept in the security industry, mainly because it is fraught with perils in accurate attribution and potential collateral damage.

"I'm uncomfortable with the thought of how individual businesses would take advantage of what they think is attribution to attack who they think" was behind a hack, Barkly's Danahy says.

Going on the offense as to retaliate with cyber attackers can quickly escalate, says John Bambenek, threat systems manager at Fidelis Cybersecurity. "Escalation is not linear," he says. Even if the US were to target the Russian government's systems, for instance, civilians could get caught in the cyber crossfire.

"I want them to talk about what we're going to do to defend the government" and critical infrastructure, he says.

Danahy also says the candidates should be focused on better securing technology infrastructure, noting that the Office of Personnel Management (OPM)'s massive breach should not have come as such a shock after the General Accounting Office's report that the agency had security weaknesses for years that had not been addressed.

"I'd hope we see an acknowledgement that there has to be increased investment in understanding where infrastructure is vulnerable and remediating it," he says.

"Both [Clinton and Trump] identified that they are going to take a look at infrastructure, systems and configurations and where vulnerabilities are," including critical infrastructure, which is great, he says.

Related Content:

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Shantaram
50%
50%
Shantaram,
User Rank: Strategist
11/7/2016 | 5:51:53 AM
Re: dog grooming
Good post! Your site raising my mood every time! Thanks
Shantaram
50%
50%
Shantaram,
User Rank: Strategist
11/7/2016 | 5:50:55 AM
dog grooming
Thanks for this post!
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
11/2/2016 | 6:12:03 AM
Re: Authentication as an Administrative Problem
@jcavery: Compelling points.  Accordingly, maybe the next step for enterprises is to start funding skunkworks projects in their security departments.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
11/2/2016 | 6:10:29 AM
Re: Authentication as an Administrative Problem
> this is an administrative problem.  we have the technology but can we find the imperative to proceed?

Fair points, but through this lens, almost every security problem is an administrative problem.
macker490
50%
50%
macker490,
User Rank: Ninja
11/1/2016 | 7:57:16 AM
beyond "Enough is Enough"
an essay on The Register this morning reports computers having been attacked in the medical NHS system:

disrupting DYN was, as the British would say "a damn nuisance".    messing with medical systems is beyond that.

I agree:    we are beyond "enough is enough".

in looking at responsibility I think we should focus on the idea that every "stakeholder" should take responsibility for that part of security that he/she has control over.

for example: if I'm going to install "System X" -- I need to check the SHA-256 checksums for the components from the vendor that I am going to install;   by providng these checksums the vendor warrants that he/she has not introduced anything improper and takes responsibility for his/her own work;

The vendor/developer will have used various compilers and libraries in developing his product -- and as a developer or distributor  he is reponnsible for checking the check-sums on the tools he/she uses for development;
jcavery
50%
50%
jcavery,
User Rank: Moderator
10/31/2016 | 2:02:37 PM
Re: Authentication as an Administrative Problem
I think we have passed the "enough is enough" point already long ago, the problem is the same with cops and robbers, or crime in general. It won't ever end, we just have to do "the best we can" to improve the situation, to get as close to 100% as we can, as often as we can, and I think we are on that track technically speaking, @macker but you're absolutely right about the economic and budget decisions being made that are holding us back from progressing at our full potential. Hackers and bad guys don't have the same budget or legal restrictions, so it costs nothing to take a chance on a new hack, and move onto another one, yet the good guys have to spend the money and be sure the defenses work every single time, all the time.
macker490
50%
50%
macker490,
User Rank: Ninja
10/31/2016 | 8:13:03 AM
Authentication as an Administrative Problem
i think it is important to recognize that authentication is an administrative problem -- not a technical one.

example: if i want to sign my Tax return forms 1040 how does Intuit and then the IRS come to obtain a copy of my public key and verify it as authentic?

this is an administrative problem.  we have the technology but can we find the imperative to proceed?

hacking keeps getting worse; when is "enough is enough" ?
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
10/29/2016 | 4:37:20 PM
Re: Cybersecurity as an Economic Problem
@macker: Indeed.  Too many people think encryption is the ultimate answer -- but encryption by itself usually isn't much of a solution (especially if the data is not encrypted at rest -- because hackers are ultimately getting inside access), and systems still get compromised with encryption.  Certificates and keys and other authentication methods are important...but so too with making sure the certificates/keys/authentication haven't been compromised themselves.  (Case in point: Aruba getting negative press earlier this year for using certificates that were known to be compromised.)
macker490
50%
50%
macker490,
User Rank: Ninja
10/29/2016 | 8:21:08 AM
Re: Cybersecurity as an Economic Problem
thanks, Kelly--

we face a Thorny Problem -- but, like most Thorny Problems, I think we can get at it by breaking it down into its components: OEM and Developers should be responsible for elements over which they have control.

Authentication is a key element -- which often doesn't get attention.   For example, if I download a Compiler and Library -- I really should satisfy myself that I have an authentic copy -- before putting it inservice.

this can be done by using PGP signatures, SHA-256 checksums -- and the like.   It's a bit of additional effort but to work with software, or firmware, -- or even e/mails, electronic 1040s, or EFT systems -- authentication is CRITICAL.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
10/28/2016 | 11:32:58 AM
Re: Cybersecurity as an Economic Problem
Great point about the economic realities of this, @macker490. What types of economic pressures would make sense, do you think?
Page 1 / 2   >   >>
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.