Modern field guide to security and privacy

What Trump's victory means for cybersecurity

During the campaign, Donald Trump split with intelligence officials over Russia's involvement in hacking US political organizations and offered few details about cybersecurity policies.

|
Mike Segar/Reuters
President-elect Donald Trump greeted supporters at his election night rally in Manhattan.

Other than a few technological glitches, voting systems Tuesday appeared to run smoothly. Election Day concerns that malicious hackers might tamper with voting, after a presidential season marked by digital attacks, didn't materialize. But that wasn't the biggest surprise of the night. That honor went to President-elect Donald Trump, whose win stunned pollsters and pundits alike.

So, what does Mr. Trump's victory mean for cybersecurity? There are already some indications. 

"To truly make America safe, we truly have to make cybersecurity a major priority," Trump told a Virginia crowd in October, adding that cyberattacks from other countries including "China, Russia, and North Korea constitute one of our most critical national security concerns." 

His cybersecurity plan promises an "immediate review" of the country's "cyberdefenses and vulnerabilities" including within US critical infrastructure, which includes the energy and banking sectors. He pledged to create task forces to respond to digital threats throughout the country – and get recommendations on how to enhance the military's Cyber Command with "with a focus on both offense and defense."

Still, Trump may need to brush up cybersecurity issues when he's in office. His response to a question on cybersecurity at a September debate – in which he invoked his 10-year-old son's prowess with computers and inadvertently started an internet meme by calling digital threats "the cyber" – was widely dismissed by the tech press as "incoherent" and "utterly disconnected."

There are also important questions about how a future President Trump will engage with those on the front lines of intelligence gathering in cyberspace. 

During his campaign, he refused to blame Russia for hacking US political organizations. That position contradicted US intelligence officials, prominent cybersecurity researchers who investigated the hacks, and even his own senior military adviser retired Army lieutenant general Michael Flynn, who all said there was enough evidence to blame Moscow. 

Instead, Trump offered up his own idea that China or "someone sitting on their bed that weighs 400 pounds" may have been responsible.

There are also lingering questions about what Trump's election means for the US quest to forge international norms for cyberspace in the Digital Age. Trump drew outrage from critics when he went so far as to encourage Russia – if its intelligence services had indeed hacked his opponent Hillary Clinton's email server – to publish the data it might have stolen. 

"Russia, if you’re listening," he said, "I hope you’re able to find the 30,000 emails that are missing. I think you will probably be rewarded mightily by our press." The New York Times reported at the time that this call was "essentially urging a foreign adversary to conduct cyberespionage against a former secretary of state."

Now that Trump will soon hold the Oval Office, Politico's Tim Starks noted there could be consequences for remarks made in the frenzy of a heated campaign: "Trump's election may herald an era of Russian free rein ... the prospect that Russia will face no US punishment for its behavior, something experts fear will embolden President Vladimir Putin and his regime to keep mounting cyberattacks around the globe."

Trump's election may also renew the encryption fight that went unresolved during the Obama administration. Trump went so far as to call for a boycott of Apple for its stance on encryption as it pledged to fight a court's ruling to help the FBI unlock the iPhone used by the shooter in the San Bernardino terror attack.

His antiencryption stance, says security researcher Jonathan Zdziarski, adds urgency to the need for people to adopt encryption:

In the remaining months of Obama's presidency, digital rights advocacy groups are making a final play for the current commander-in-chief to rein in the government's spying powers – a rallying point since former National Security Agency contractor-turned-whistleblower Edward Snowden exposed sweeping surveillance programs in 2013.

Yet, as noted privacy advocate and author Cory Doctorow wrote Wednesday on the tech blog Boing Boing, "The seven years of GW Bush-after-9/11 gave us the foundations for a surveillance state that was one madman away from totalitarianism. Then, eight years of Obama operationalized that surveillance state, gave it the competent administrators and diverse stakeholders – local police, international partners, military-industrial contractors with fat lobbying budgets – that it needs to sustain itself indefinitely." 

Now, he adds, Trump will inherit control "over a surveillance arsenal that includes the legal authority to spy on all of us, all the time ... and a hoard of deadly technological vulnerabilities in tools we all rely upon that America has weaponized to attack its enemies, even if that means leaving Americans undefended against criminals, nihilist griefers, and foreign state and industrial spies." (Mr. Doctorow views him as unfit for the responsibility.)

So some advocates such as Evan Greer of tech advocacy group Fight for the Future want to see Obama take action before Trump takes office: 

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to CSMonitor.com.

QR Code to What Trump's victory means for cybersecurity
Read this article in
https://www.csmonitor.com/World/Passcode/2016/1109/What-Trump-s-victory-means-for-cybersecurity
QR Code to Subscription page
Start your subscription today
https://www.csmonitor.com/subscribe