Contributor

Emails, politics and common sense

opinion
Dec 20, 20165 mins

Email technology played a crucial role in influencing the 2016 U.S. election.

email thinkstock
Credit: Thinkstock

Like many Americans, I’ve been trying to explain and justify the 2016 election cycle.

I am not an expert political scientist. I am a software engineer. The question I ask myself is: “What role did technology play in this election?” In particular, I want to focus on email.

Email is an insecure medium. Period.

I once attended an HR orientation session where we were told to write our emails in a way that wouldn’t embarrass the company if it showed up on the front page of The New York Times. The reason was that emails are inherently easy to leak. Even without someone hacking the email server, it is incredibly easy to mistype an email address or add the wrong person or the wrong group to Cc or Bcc list.

We have all heard stories of someone broadcasting their private emails to entire departments or even entire companies. There are anecdotes of whistleblowers forwarding company emails to the newspapers. And of course, we’ve all heard of the DNC email leaks. Email is simply the wrong mechanism for private and secure communications.

Both the DNC and Hillary Clinton could learn a simple lesson that private sector companies teach their employees: write your emails as if you are writing for the New York Times. This way if the DNC CFO Brad Marshall feels the need to send an anti-Semitic email he will think twice.

DNC used an on-premise Microsoft Exchange

To understand what made the DNC email leaks possible and so seemingly trivial I went to Wikileaks and searched for a sample set of emails. In the raw source of the emails there is a clear indication the DNC email system used a custom configured Microsoft Exchange. There are signs that this is an internally configured private server.

I searched long and hard to find out who configured the on-premise Microsoft Exchange server for the DNC and why they did that. Did they properly configure it? Did they rely on Microsoft alone to secure it? Has the DNC followed the advisories on Outlook and Exchange vulnerabilities? Is the DNC taking advantage of the Exchange compliance and security features? Why is DNC not using Office365 or Google?

Any system designed to archive emails is bound to be vulnerable to a leak. A private email server configured to archive emails is susceptible to that one administrator user with a poorly chosen password or a phishing attack. Using a cloud provider isn’t going to solve all privacy and security questions. Google’s Vault that is part of the G Suite is subject to the same vulnerabilities. Recent revelations about Dropbox hack just prove my point.

The implications for transparency and compliance

I fear that politicians, public officials, and publicly traded company officers are likely to gravitate towards end-to-end encrypted means of communication such as Edward Snowden approved Signal. This can weaken and rollback information retention, transparency and disclosure laws such as the Freedom of Information Act and Dodd-Frank Act. My concern is that the institutions we trust with power will become even less transparent.

Storing sensitive emails on-premises doesn’t make it any more secure

The DNC emails were all leaked from an on-premise private Microsoft Exchange server. Personally identifiable data must meet PCI DSS and HIPAA requirements regardless of where it is stored. Sensitive data should be encrypted. As Edward Snowden and the DNC email leaks demonstrated, a determined hacker or government agency can obtain private data from a walled garden environment. Most recently, one billion Yahoo accounts had been leaked from Yahoo’s data centers. Hillary Clinton’s private walled garden email server was not immune to government intrusion or hacking either.

All you need is common sense

You don’t need to abandon email or be in violation of archival information rules to feel secure about your communications. Following basic common sense with regards to your data is all that’s needed to avoid disastrous consequences for yourself and others:

  1. Don’t store anything you would not want to show up on the front page of a major newspaper in an un-encrypted form. If somebody intends to look at your data, whether they are a government or a hacker, they have to ask your permission first to unencrypt it.
  2. Use two-factor authentication. Stealing your password should not enough for a hacker to access your data. They will need a second mechanism to authenticate themselves.
  3. Do not use the same password for all of your accounts. Use a password manager, such as 1Password to generate and manage random and secure passwords.
  4. Apply common sense to your emails: Do not click on links that look suspicious, verify the URLs before you fill out password forms, and take great care not to forward your emails to people you don’t trust. In other words, do not fall for phishing.

Oleg Dulin is a Big Data software engineer and consultant in the New York City area.

In 1997 Oleg co-founded Clarkson University Linux Users Group. This group was influential in bringing awareness of open-source to Clarkson, and later morphed into what now is a dedicated lab and curriculum called Clarkson Open Source Institute. While at Clarkson, Oleg advocated on behalf of open-source and Linux and community and helped with construction of Clarkson’s first open-source high-performance computing cluster called “The North Country.”

While at IBM T. J. Watson Research Center in 1999-2000 Oleg co-authored a paper on federated information systems that was presented at Engineering of Federated Information Systems (EFIS) conference in 2000. This R&D project involved building a proof-of-concept federated IS that integrated structured (SQL) and unstructured (multi-media) data under a single set of API and user interfaces.

From 2001 to 2003 Oleg worked as a data integration consultant at a major investment bank in NYC on a web portal for private banking. This project involved aggregation of secure financial data from multiple legacy databases and presenting it in a customizable web portal.

In 2004, while working at a startup called ConfigureCode, Oleg contributed to two patent applications involving construction and semantic validation of mixed-schema XML documents. This technology was utilized in a Data Capture and Tracking System for Human Resources data integration.

From 2005 to 2011 Oleg worked at a Wall St. company (see Oleg’s LinkedIn Profile for more details) where he was instrumental in improving data quality, reducing trading errors, implementing analytics and reporting within the context of an equities order management system. The system was a 24/7 high performance computing platform that processed billions of dollars worth of trade executions daily.

From fall of 2011 to end of 2016, Oleg worked at Liquid Analytics as Cloud Platform Architect, where he was a thought leader in the implemention of a cloud-based PaaS for mobile Business Intelligence.

Presently, Oleg works at ADP Innovation Lab as Chief Architect.

The opinions expressed in this blog are those of Oleg Dulin and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

More from this author