Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • IT Management

    Astonishing Level of Ineptitude Exposed in RNC Breach

    Written by

    Wayne Rash
    Published June 21, 2017
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      It’s difficult to characterize the data breach of a consulting firm that worked for the Republican National Committee. Deep Root Analytics of Arlington, Va., was paid approximately $1 million by the RNC to amass a storehouse of information on nearly every voter in the United States.

      As one might expect, the data files included the name, address and age of those voters—information a researcher would find out from voter registration data. However, in addition, the files reportedly contained information about political leanings, purported stands on certain issues and even limited social media postings. Fortunately, no Social Security or credit card numbers were included.

      But perhaps what’s most surprising about the revelations regarding the Deep Root breach is the group’s astonishing demonstrated level of ineptitude. The data was exposed following a software upgrade, when the company forgot to turn on the password protection again.

      Yes, that’s right. Deep Root protected a data store with highly proprietary data belonging to the RNC using simply a password. That was it. There was no attempt to logically separate the names of the voters from their information—something that could be done easily because each item had a unique RNC ID number. It also showed that the RNC was getting ripped off.

      Little Sophistication Exhibited in Selecting Data for Storage

      Deep Root showed little sophistication in choosing the data it used to identify potential leanings or political opinions, basing its social media analysis only on Reddit posts. Other data appears to have come from other research firms that collected it, but there appears to have been no effort to ensure accuracy.

      And of course, there’s the security—or, rather, the total lack of security. As a contractor, Deep Root had an obligation to protect the RNC’s intellectual property, as well as the intellectual property of the other research firms from which Deep Root gathered data. Apparently, those obligations were ignored.

      In fact, when cyber-risk analyst Chris Vickery, who works for Silicon Valley security startup UpGuard, was doing a routine survey of unprotected data, he found more than a terabyte of voter files lying unprotected. In addition to the basic voter information, the Deep Root data contained modeled voter ethnicities and religions.

      Naturally, this was alarming to some highly regarded data analysis firms that also worked for the RNC. TargetPoint, for example, had compiled a database of policy preferences and political actions that UpGuard described as highly accurate. The Deep Root breach exposed all TargetPoint’s efforts.

      Other Data Analytics Companies Exposed

      Likewise, Data Trust, a Washington firm created by the RNC for data analysis, was exposed by Deep Root. The breach also laid bare the RNC’s entire data file, which it had spent years and millions of dollars developing. This massive data file, combined with the data from Target Point, was intended to be used in micro-targeting, which allows the GOP to zero in on individual voters or small groups with information they knew would resonate.

      So, what we have with the Deep Root breach is the public release of data that is essentially the heart of the GOP campaign data-analysis effort. While the usefulness of Reddit posts is up for debate, the fact is that the revelations have a vast and negative impact on the future operations of the Republican Party as it enters a critical election year.

      It’s negative because the GOP has no way to know who else has this data. The Russians could easily have downloaded it, as could the Democrats. If that’s the case, the other parties would know everything the Republicans know about every voter in the United States. At the very least, the GOP data-analysis effort will be operating with an overtone of doubt.

      Unfortunately, there’s not much the government can do to penalize Deep Root. This is one area where the laws have failed to keep pace with technology. Even the Federal Trade Commission can’t do much, because it’s impossible to say that Deep Root managed to hurt the public, since much of the factual information is available from public records.

      Civil Action Is a Possibility

      But there are things that can be done. The RNC, Data Trust and TargetPoint all can take civil action against Deep Root for failing to protect their intellectual property. And if the RNC doesn’t already have some sort of contractual data protection requirement, then it certainly will have one starting now. No doubt, the other contractors already have non-disclosure requirements to protect their data, which Deep Root has clearly violated.

      This incident also creates an awareness that security must be a requirement that’s enforced by stringent provisions of any contract to manage data. Deep Root’s astonishing level of ineptitude points out the fact that you can’t just assume that your contractors will do the right thing.

      While there are things that could have been done, such as masking the personal information so the data was accurate but the names were not, might have worked. Delphix strategic adviser Adam Bowen suggested that for most uses, the real names of voters didn’t need to be paired with the data. He noted that part of the problem stems from a lack of understanding of the value of data.

      “Until we start treating data the same way we do intellectual property, we’re going to continue to see this, where people see data as a disposable commodity,” Bowen told eWEEK.

      On a larger basis, this breach underscores the need for legislation covering data protection. The fact that it is the Republican Party suffering might encourage some GOP legislators to support such a bill.

      After all, why complain about the Russians when the GOP can’t even secure its own data?

      Wayne Rash
      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a content writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.