{"id":2051,"date":"2016-03-20T17:32:34","date_gmt":"2016-03-20T17:32:34","guid":{"rendered":"https:\/\/techcafeteria.com\/new\/?p=2051"},"modified":"2016-03-20T17:32:36","modified_gmt":"2016-03-20T17:32:36","slug":"hillary-clintons-shadow-it-problem","status":"publish","type":"post","link":"https:\/\/techcafeteria.com\/?p=2051","title":{"rendered":"Hillary Clinton&#8217;s Shadow IT Problem"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">As you likely know, when <a href=\"https:\/\/en.wikipedia.org\/wiki\/Hillary_Clinton\">Hillary Clinton<\/a> was Secretary of State, she set up a private email server at home and used it for her email communication, passing up a secure government account. This was a b<a href=\"https:\/\/techcafeteria.com\/2016\/03\/20\/hillary-clintons-shadow-it-problem\/hillary_clinton_testimony_to_house_select_committee_on_benghazi\/\" rel=\"attachment wp-att-2052\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignleft size-medium wp-image-2052\" src=\"http:\/\/techcafeteria.com\/new\/wp-content\/uploads\/2016\/03\/Hillary_Clinton_Testimony_to_House_Select_Committee_on_Benghazi-300x183.png\" alt=\"Hillary_Clinton_Testimony_to_House_Select_Committee_on_Benghazi\" width=\"300\" height=\"183\" srcset=\"https:\/\/techcafeteria.com\/wp-content\/uploads\/2016\/03\/Hillary_Clinton_Testimony_to_House_Select_Committee_on_Benghazi-300x183.png 300w, https:\/\/techcafeteria.com\/wp-content\/uploads\/2016\/03\/Hillary_Clinton_Testimony_to_House_Select_Committee_on_Benghazi-768x467.png 768w, https:\/\/techcafeteria.com\/wp-content\/uploads\/2016\/03\/Hillary_Clinton_Testimony_to_House_Select_Committee_on_Benghazi-624x380.png 624w, https:\/\/techcafeteria.com\/wp-content\/uploads\/2016\/03\/Hillary_Clinton_Testimony_to_House_Select_Committee_on_Benghazi.png 797w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>ad idea, for a number of reasons, primary among them the fact that sensitive information could be leaked on this less secure system, and that <a href=\"http:\/\/www.foia.gov\/\">Freedom of Information Act (FOIA)<\/a> requests could be bypassed. But the burning question, at a time when Clinton looks likely to be nominated as the Democratic candidate for President, is what her motivation was for setting up the server in the first place. Was it to bypass the Freedom of Information Act? Was it to easily trade classified materials, as her most critical\u00a0accusers suspect? Or was it, as she claims, because she had a lot of personal email to send and she didn&#8217;t want to manage two accounts?\u00a0<\/span><\/p>\n<p>This post doesn&#8217;t seek to answer those questions. Instead, it pitches yet another theory: that Clinton&#8217;s motivations might have had everything to do with technology and little to do with politics.\u00a0<span style=\"font-weight: 400;\"><a href=\"http:\/\/www.judicialwatch.org\/\">Judicial Watch<\/a>, a conservative foundation looking for evidence that Clinton broke laws in her handling of the email, received some fascinating information in response to a recent FOIA request.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Upon joining the State Department in early 2009, Clinton immediately requested a <a href=\"http:\/\/www.letsgodigital.org\/images\/artikelen\/699\/blackberry-smartphone_software.jpg\">Blackberry smartphone<\/a>. Having used one extensively during her 2008 Presidential campaign, she, like almost every attorney in that decade, had fallen in love with her Blackberry, hence the request. After all, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Condoleezza_Rice\">Condoleezza Rice<\/a>, her predecessor as Secretary of State, had used one. President Obama had<a href=\"http:\/\/blogs.blackberry.com\/2014\/11\/you-cant-run-the-worlds-most-powerful-nation-without-your-blackberry-president-obama-discovers\/\"> a special secure one<\/a> that the NSA had developed for him. But they said no. Even after being called to a high level meeting with Clinton&#8217;s top aide and five State Department officials, they still said no.The NSA offered Clinton <a href=\"http:\/\/arstechnica.com\/information-technology\/2016\/03\/nsa-refused-clinton-a-secure-blackberry-like-obama-so-she-used-her-own\/\">an alternative<\/a>. But it was based on Windows CE, a dramatically different, less intuitive smartphone operating system. A\u00a0month later, Clinton started using her own server. Judicial Watch\u00a0claims that this info proves that Clinton knew that her email was not secure, but I think that she has already admitted that. But it also\u00a0reveals something much more telling.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As a three plus decade technology Director\/CIO (working primarily with Attorneys), I can tell you that people\u00a0get attached to specific types of technology. I know a few Attorneys who still swear to this day that <a href=\"https:\/\/winworldpc.com\/res\/img\/screenshots\/5x-dos-57015085390ba61da28451a13992801d-WordPerfect%205.1%20-%20Splash.png\">Wordperfect 5.1 for DOS<\/a> was the best word processing software ever released. And there are millions who will tell you that their Blackberry was their virtual right arm in the 2000\u2019s. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">How devoted are people to their favorite applications and devices? I worked for a VP who was only comfortable using Word, so when she did her quarterly reports to the board, she had her assistant export huge amounts of information\u00a0from our case management system. Then she modified all of it in Word. Once delivered, she\u00a0had her assistant manually update the case management system in order to incorporate her changes. Efficient? Not at all. But she loved herself some Word. I&#8217;ve\u00a0seen staff\u00a0using seven year old laptops because they know them and don&#8217;t want to have to learn and set up a new one. And it wasn&#8217;t until the bitter end of 2014 that both my boss and my wife finally gave in and traded up their Blackberries for iPhones.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Again, the point here is not that Clinton should have ditched the secure, government system in order to use her phone of choice. In her circumstances, the security concerns should have outweighed her personal comfort. But for many, the desire to stick with tech that they know and love is often counter to logic, efficiency, security and policy. And most of us work in environments where bucking the system isn&#8217;t quite as dire as it could be for the nation&#8217;s top diplomat. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201c<a href=\"https:\/\/en.wikipedia.org\/wiki\/Shadow_IT\">Shadow IT<\/a>\u201d is technology that users install without company approval because they prefer it to what&#8217;s offered. What I know is that I can&#8217;t secure my network if it\u2019s packed with technology that my users hate. Smart people will bypass that security in order to use the tools that work for them. An approach to security that neglects usability and user preference is likely to fail. In most cases, there are compromises that can be made between IT and users that allow secure products to be willingly adopted. In other cases, with proper training, hand-holding, and executive sponsorship, \u00a0you can win users over. But when we are talking about Blackberries in the last decade, or the iPhone in this one, we have to acknowledge that the popularity of the product is a serious factor in adoption that technologists can&#8217;t ignore. And if you don&#8217;t believe me, just ask Hillary Clinton.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As you likely know, when Hillary Clinton was Secretary of State, she set up a private email server at home and used it for her email communication, passing up a secure government account. This was a bad idea, for a number of reasons, primary among them the fact that sensitive information could be leaked on<br \/><a class=\"moretag\" href=\"https:\/\/techcafeteria.com\/?p=2051\">+ Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,35,82],"tags":[445,129,444,88,443,107],"class_list":["post-2051","post","type-post","status-publish","format-standard","hentry","category-nptech","category-politics","category-tech","tag-adoption","tag-email","tag-foia","tag-management","tag-mobile","tag-security"],"_links":{"self":[{"href":"https:\/\/techcafeteria.com\/index.php?rest_route=\/wp\/v2\/posts\/2051","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techcafeteria.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techcafeteria.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techcafeteria.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/techcafeteria.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2051"}],"version-history":[{"count":7,"href":"https:\/\/techcafeteria.com\/index.php?rest_route=\/wp\/v2\/posts\/2051\/revisions"}],"predecessor-version":[{"id":2059,"href":"https:\/\/techcafeteria.com\/index.php?rest_route=\/wp\/v2\/posts\/2051\/revisions\/2059"}],"wp:attachment":[{"href":"https:\/\/techcafeteria.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2051"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techcafeteria.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2051"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techcafeteria.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2051"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}