Alleged leaks connecting Democratic presidential candidate Joe Biden to his son's dealings in Ukraine immediately raised alarm bells to forensic analysts. The race to determine what is real and what is doctored mirrors challenges faced by security teams needing to validate company files.
Specifically, one of the most explosive emails released by the New York Post was published in such a way to hide Domain Keys Identified Mail information, or DKIM, which is used to detect forged sender addresses. It also displayed metadata that called into question whether the email supplied to the Post was the original file. Whether the email is legitimate or not is still under debate.
The situation points to a widespread challenge for political campaigns and businesses alike: Technologies that could provide some evidence that a particular file is fake or manipulated only work in specific cases and may be cost-prohibitive and impractical for many industries and many sized organizations to implement.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.