Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cyber Tactics ColumnCybersecurity News

Securing our Democracy: The case for robust campaign cybersecurity

By John McClurg
SEC0820-Cyber-Feat-slide1_900px.jpg
SEC0820-cyber-slide2_900px.jpg
SEC0820-Cyber-Feat-slide1_900px.jpg
SEC0820-cyber-slide2_900px.jpg
August 1, 2020

Sun Tzu famously said, “all warfare is based on deception.” He could hardly have anticipated how his words would ultimately be substantiated—particularly in the tactics of today’s cybercriminals. Even after 30 years in the trenches, I’m still surprised by their innovative tactics. Sun Tzu reportedly also said, “It’s not an admission of defeat to recognize and respect the strengths of your enemy; rather, it’s a necessary precondition to victory.”

I was perplexed by reports that two-thirds of Democratic presidential candidates, in addition to President Donald Trump, had failed to implement and enforce the basic email security protocol, DMARC, which stands for “Domain-based Message Authentication, Reporting & Conformance.” DMARC helps prevent business email compromise (BEC) by verifying the authenticity of a sender’s email in order to reject spoofed emails and prevent the exploitations of an individual’s address for malicious purposes.

While this protocol is important for both public and private sector professionals, it’s absolutely critical for political operatives, candidates and elected officials who will almost certainly face daily cyberattacks. Politicians and their staff are enticing targets because they have access to both sensitive information and VIPs.

Beyond political and policy impacts, the potential for financial fraud is readily apparent. Spoofing campaign email domains in order to fraudulently request campaign donations represents one possible attack vector and — given the swarm of messages sent by campaigns — one with a relatively high chance of going undetected. In one high profile instance, a California man managed to trick aspiring activists out of $250,000 in political donations.

 Although the proximity of political actors to information and wealth makes them alluring targets for BEC, it’s their behavior that makes them easy victims. These individuals are often highly ambulant, operating in hectic environments and under constant stress. They’re forced into snap decisions, often made on the run and communicated through smartphones with small interfaces, making minute anomalies difficult to detect. That makes candidates and staff prime targets for socially engineered, “muscle-memory” attacks that exploit our reliance on mindless, routine actions and our inability to effectively multi-task.

It’s worth noting that even the savviest cybersecurity professionals are victimized by BEC attacks. Recently, a colleague of mine nearly completed a wire transfer to a fraudulent party after initially missing a small anomaly in an otherwise legitimate-looking email request. That even the most experienced among us fail to consistently detect these tactics is a nod to cybercriminals, who are cunningly adept at encouraging urgency, mimicking trusted third parties, and otherwise taking advantage of our innate cognitive limits of rationality.

While politicians and staff are skilled in the nuance of policy and the intricacies of stumping for votes, they appear to be woefully uninformed in the most basic segment of cybersecurity: email security. Given that they are targets of both state-sponsored and financially-motivated attacks, it’s imperative they move quickly and decisively to secure such a primary communication method. That starts with the implementation and enforcement of DMARC protocols. But it extends also to MFA and enterprise-grade messaging platforms. Combined, these help prevent unauthorized email access and electronic eavesdropping while encouraging the detection of phishing and other social engineering emails. Most importantly, campaigns should deploy AI-driven predictive threat detection to stay in front of sophisticated cyberattacks from state-sponsored groups.

We can indeed learn much from Sun Tzu. One of his axioms, however, is no longer descriptive of the landscape we currently inhabit — we cannot choose when we’ll have to fight a cyber battle. That’s particularly true for today’s politicians, who must prepare as if under constant attack and move quickly to secure their campaign’s digital activities. Failure in that regard represents a direct threat to the critical inner workings of our democracy.

KEYWORDS: Blackberry cyber security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John mcclurg

John McClurg served as Sr. Vice President, CISO and Ambassador-At-Large in BlackBerry's/Cylance’s Office of Security & Trust. McClurg previously was CSO at Dell; Vice President of Global Security at Honeywell International, Lucent Technologies/Bell Laboratories; and in the U.S. Intelligence Community, as a twice-decorated member of the Federal Bureau of Investigation.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Cyber tactics

    2023: The year for contextual cyber threat intelligence

    See More
  • cyber security

    Reflections on 35 years in the trenches

    See More
  • Medical Training for Security

    The case for robust medical training for security staff

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • 150 things.jpg

    The Handbook for School Safety and Security

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing