Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Privacy

Digital Takeaways From the Supreme Court Fight

It’s always interesting to watch how the ongoing digital transformation of our lives is changing the world in ways we never would have anticipated years ago. Financial information, social interactions, even our physical locations may be up for grabs in cyberspace, with real-world ramifications. 

It’s always interesting to watch how the ongoing digital transformation of our lives is changing the world in ways we never would have anticipated years ago. Financial information, social interactions, even our physical locations may be up for grabs in cyberspace, with real-world ramifications. 

For a few weeks this fall, the U.S. was fixated on a dramatic fight in the Senate over the confirmation of Justice Brett Kavanaugh. Like Anita Hill did decades ago during the confirmation of Justice Clarence Thomas, Dr. Christine Blasey Ford took to the Senate floor to testify about her experiences with Kavanaugh. 

But whereas Hill’s testimony took place in Senate chambers and television, in 2018 there were digital footprints everywhere. Through the proceedings, we could watch the progression from 30-year-old testimony to the modern era where so much of our lives is recorded, documented, and potentially available to be used. 

As time goes on, judges, CEOs and other public officials will have lived so much of their lives during the “digital era” that almost anything they’ve said or done, for better or worse, could be laid out for public view. How will this change our public institutions and interactions? We are only beginning to find out. 

Here are some key digital takeaways from the proceedings:

The emails 

It’s clear that people who didn’t grow up with email have experienced a bit of a learning curve in recent years about the indelibility of words spoken online. Kavanaugh was repeatedly stung by statements he’d made in email years ago that seemed to cast doubt on some of his testimony during confirmation proceedings. While the judge’s emails were public record from his time in the Bush administration, it’s a good reminder that communications in cyberspace can have a long shelf life that both individuals and organizations would be wise to consider.

Meanwhile, soon after Dr. Ford’s identity was known, her lawyers wrote to the senate that her emails had been hacked. Clearly the account was targeted as a potential source of damaging information, and the attackers even went so far as to send an email from her account stating she’d recanted her testimony. The information contained in the account also could have been used to track her whereabouts or for other purposes.

Advertisement. Scroll to continue reading.

Crowdfunding 

During the proceedings, millions of dollars were donated by individuals around the country. As of the Friday before the final vote, two Gofundme campaigns launched on behalf of Ford had reached nearly $700,000. The first campaign had received donations from more than 10,000 people in just over a week, tallying close to half a million dollars. A second launched to cover her security costs had raised more than $200,000 from more than 6,500 people. 

Yet another campaign was launched with intention of influencing Senator Susan Collins of Maine. Launched from another site, Crowdpac, which is dedicated to political fundraising. The campaign spiked so heavily during Collins’ statement in support of Kavanaugh that the Crowdpac site actually crashed. So far donations are nearing the $3 million mark, all of which is earmarked for Collins’ eventual opponent during the 2020 election cycle. For her part, Collins called the funding campaign a “bribe.” 

While there is nothing illegal going on here, it does show a new form of cyber risk that organizations should at least have on their radar. As the talent pool needed for cybersecurity continues to grow, remember to keep corporate communications on the list of important contributors. The movement of readily available crowdfunding sites means that a communications or PR crisis can easily turn into a big financial risk for an organization. 

Information campaigns

Also prevalent during the hearings was the ongoing influence of foreign information campaigns on popular opinion in the U.S. The Russian outlets Sputnik International and RT, which was recently forced to register as a foreign agent in the U.S., came out swinging for the judge with stories that both supported his innocence from wrongdoing as well as casting doubt on the motivations of protestors and Ford herself.

At the same time, a cascade of memes and tweets from purported Russian bots made their way across social media sites like Twitter. The site Hamilton 68, which tracks Russian activity on Twitter, showed hundreds of uses of #kavanaugh attributed to Russian trolls in the week leading up to the confirmation. 

While it may come as no surprise, it does show that foreign efforts to influence the U.S. political landscape have not abated, and in fact are making their way into not just elections, but the procedural machinations of the government—and there is no reason that a business or other organization couldn’t find itself in similar crosshairs.

Most of these tactics are not even necessarily illegal, but they all pose risks that security pros need to be thinking about. For every new service that comes online in cyberspace, the endless ingenuity of the human mind will find a novel way to use it for purposes it may never have been intended for. Bringing crowdfunding sites into the realm of politics and social movements, for example, has potentially disruptive consequences not just in the political realm, but across industries. 

For security pros, it’s another reminder of how digital transformation continually changes the threat landscape. While protecting organizational assets like email may pose more of a traditional cybersecurity challenge, security orgs need to have their eye on a broad range of motivations to really understand today’s convoluted risks. 

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

More People On The Move

Expert Insights

Related Content

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Privacy

Many in the United States see TikTok, the highly popular video-sharing app owned by Beijing-based ByteDance, as a threat to national security.The following is...

Privacy

Employees of Chinese tech giant ByteDance improperly accessed data from social media platform TikTok to track journalists in a bid to identify the source...

Application Security

Open banking can be described as a perfect storm for cybersecurity. At one end, small startups with financial acumen but little or no security...

Government

The proposed UK Online Safety Bill is the enactment of two long held government desires: the removal of harmful internet content, and visibility into...

Mobile & Wireless

As smartphone manufacturers are improving the ear speakers in their devices, it can become easier for malicious actors to leverage a particular side-channel for...

Cloud Security

AWS has announced that server-side encryption (SSE-S3) is now enabled by default for all Simple Storage Service (S3) buckets.