Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    What Governments, Enterprises Can Learn From 2016 Election Hacks

    By
    Chris Preimesberger
    -
    June 13, 2017
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1What Governments, Enterprises Can Learn From 2016 Election Hacks

      1 - What Governments, Enterprises Can Learn From 2016 Election Hacks

      The 2016 U.S. presidential election was historic for numerous reasons, not the least of which was the prominent role cyber-security played throughout the campaign and in the first weeks of the new administration. Nation-states and politically motivated actors realize the effectiveness of stealing and releasing politically damaging information as a means of shaping public opinion, posing a threat to election outcomes and resulting in widely publicized attacks, such as the Democratic National Committee hack. In this eWEEK slide show, using insight from Travis Farral, director of security strategy at Anomali, we provide a timeline of events related to cyber-security incidents during last year’s political campaign, what steps other nations can take to prevent similar attacks and how governments can use threat intelligence technologies to stop hackers before they can cause material damage.

      2June 2016: News Breaks That the DNC Was Hacked

      2 - June 2016: News Breaks That the DNC Was Hacked

      On June 14, 2016, the Democratic National Committee hack is made public. Russian government hackers are suspected to have penetrated the computer network of the DNC, gaining access to sensitive party emails. The next day, a hacker by the name of Guccifer 2.0 publicly claims it was he who hacked the DNC and sent stolen DNC documents to WikiLeaks.

      3July 2016: DNC Fallout Continues to Plague Democrats

      3 - July 2016: DNC Fallout Continues to Plague Democrats

      On July 1, DC Leaks publishes some of the emails supposedly stolen by Guccifer 2.0, but not the treasure trove that he claimed to have. However, as promised, WikiLeaks on July 22 publishes 19,252 emails and 8,034 attachments supposedly from the hack. As a result, several prominent members of the DNC, including Chairwoman Debbie Wasserman Schultz, later resign. The same day as the WikiLeaks publication, Hillary Clinton’s campaign accuses Russia not only of the hack itself, but of deliberately trying to help Donald Trump win the election. Julian Assange, proprietor of WikiLeaks, strongly denies the Russian allegations and claims the leaks came from a Democratic insider.

      4August 2016: News Breaks of Voter Database Hack

      4 - August 2016: News Breaks of Voter Database Hack

      Following the DNC hack and subsequent fallout, cyber-security and election hacking continues to play a major role in the presidential campaign. On Aug. 29, the FBI announces an investigation into attempted breaches of voter databases in Arizona and Illinois that could compromise voter information. Investigators found that the voter database in Illinois had been accessed but not altered, while the Arizona voter database had not been successfully accessed by attackers.

      5September 2016: Guccifer 2.0 Strikes Again

      5 - September 2016: Guccifer 2.0 Strikes Again

      On Sept. 23, Guccifer 2.0 publishes additional documents claiming that he also hacked the Democratic Congressional Campaign Committee (DCCC), a mere two weeks after news broke that the FBI was investigating a possible breach at the DCCC.

      6October 2016: Yes, Those Emails

      6 - October 2016: Yes, Those Emails

      Heading into the most crucial weeks of the presidential campaign, Guccifer 2.0 announces that he has hacked the Clinton Foundation. The hacker then proceeds to share the information with WikiLeaks, which releases more than 50,000 emails from Hillary Clinton’s campaign chairman, John Podesta, on Oct. 7. The same day, the Obama administration officially blames Russia for hacking political elements in the United States and releasing sensitive information in an effort “to interfere with the U.S. election process.”

      7Nov. 8, 2016: Election Day

      7 - Nov. 8, 2016: Election Day

      Only days before the election, Guccifer 2.0 announces he hacked the Federal Election Commission and that Democrats were planning on rigging the election for Hillary Clinton—an announcement that damaged the Clinton campaign in the final days of campaigning. As the world now knows, on Nov. 8, then-Republican candidates Donald Trump and Mike Pence defeated Hillary Clinton and Tim Kaine, despite several polls showing Clinton with a favorable lead. This has led many people to the belief that Russia intended to influence the election in favor of Trump.

      8December 2016: The Aftermath

      8 - December 2016: The Aftermath

      As his days in office dwindled, President Obama issued an executive order announcing sanctions against several Russian entities and individuals for election interference. These actions reflect the assertion by U.S. spy agencies that they do indeed have direct evidence of the involvement of those entities named. Concurrently, the DHS and the FBI release a Joint Analysis Report on suspected malicious Russian cyber activity that includes a list of indicators associated with the hacking activities suspected of coming from entities associated with Russian government.

      9January 2017: The World Reacts

      9 - January 2017: The World Reacts

      Early in January, the U.S. Office of the Director of National Intelligence releases a declassified report aimed at bolstering its case that the Russian government was behind the election-related attacks of 2016. The report is devoid of clear evidence pointing to Russian government involvement but does offer more substantial details than the FBI report noted previously. Meanwhile, the Joint Committee on the National Security Strategy in the UK launches an inquiry into cyber-security, noting that the government would treat an information security attack on the UK as seriously as a conventional attack.

      10Looking Back for Future Protection

      10 - Looking Back for Future Protection

      Addressing threats in the information security realm is a daunting task for any organization but especially for governments that typically have limited budgets for such things. Applying the resources they do have as effectively as possible can make the difference between stopping potential attackers or ending up as a news story. One of the most commonly overlooked defensive capabilities is that of retrospective analysis. More often organizations are focused on looking at current threat intelligence feeds and logs.

      11What Comes Next?

      11 - What Comes Next?

      As European countries such as the UK, France (which elected Emmanuel Matron in May) and Germany hold their own election campaigns in 2017, many will face similar concerns about cyber-security and breaches of critical election infrastructures. However, they may not be aware of the steps needed to properly prepare for cyber warfare. The most important of these is simply to raise awareness within their organizations about these types of cyber-threats, set clear boundaries for staffers regarding personal device and application use for sensitive information. 

      12Solving the 200-Day Problem With Threat Intelligence

      12 - Solving the 200-Day Problem With Threat Intelligence

      Equally crucial to preventing a massive data breach is how government organizations use threat intelligence technologies. In many cases, once a hacker gets into the system, he or she can sit in a network for up to 200 days undetected, allowing them to find and collect massive amounts of damaging materials to release. An effective threat intelligence system will be able to sift through data and highlight potential risks to help stop hackers before they can cause material damage. Lesson to learn: Government and political organizations need to encourage intelligence-sharing among themselves.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×