At a recent conference on election security, Orange County Registrar of Voters Neal Kelley said he’d asked former CIA Director Michael Hayden if Russian hackers will try to disrupt the 2018 mid-term elections. “He didn’t hesitate,” Kelley recounted. “He said, ‘They will be targeting congressional races.’” In Southern California, home to some of the nation’s most-competitive congressional contests, that threat is being taken seriously. Consider just a few of the many new security protocols being adopted by election officials in the four-county region.
Office emails are being encrypted and networks buttressed. Election employees are randomly being mock phished to see if they’ll fall for simulated online invaders. Federal officials are being invited to inspect and test the region’s many voting systems. Even the seemingly oldest of old-school safety protocols — counting up some election results by hand — is expected to play an expanded role in the 2018 midterms. The local upgrades are part of a national response to Russia’s meddling in America’s 2016 elections. Intelligence agencies have determined that, among other things, Russian agents and their operatives executed a cyberattack on a U.S. voting software supplier, sent spear-phishing emails to election officials, and targeted voter rolls in at least 21 states, breaching a small (but undisclosed) number of them.
California’s voting infrastructure is, in many ways, far more secure than those of most other states. Counties in California are legally required to keep paper ballots as fixed records of electronic voting tallies and to hand-count the ballots cast at one percent of all precincts to verify digital totals. That means even if voting machines are compromised, there’s a physical backup to warn of a discrepancy.
In Los Angeles County, home to another one of the nation’s most competitive congressional races, Logan has educated his staff on cyber threats by having them see firsthand how voting machines can be hacked.
Last year, he sent members of his team to DEF CON in Las Vegas, one of the world’s largest hacker conventions. There, at something called the “Voting Machine Hacking Village,” they watched white-hat hackers “go through and show the vulnerability of voting systems,” a process that helped Logan’s office identify its own potential shortcomings. Since the 2016 elections, the office has upgraded its malware protection and mandated cybersecurity training for staff. It soon will implement vulnerability-assessment and phishing exercises to further test its new systems. “If we don’t know those vulnerabilities, we can’t respond to them,” Logan said at the conference.
http://www.govtech.com/security/Souther ... -Vote.html
San Francisco’s system is typical, said John Arntz, the city’s elections chief. There’s an “air gap” in the electronic voting machines and the equipment that tallies the votes, he said. Those machines “are never connected to the Internet,” Arntz said. “The way the system is set up, if someone physically hacked into one voting machine, they couldn’t affect the other machines, because they’re not connected. And even then, they’d have to just about destroy the machine to hack in.”
California has another safeguard, which Arntz called “the ultimate fail-safe.” Since 2006, all touch-screen voting systems in the state have had to provide a paper receipt that confirms the electronic totals. About a dozen states allow electronic voting without requiring a paper trail audit.
https://www.sfchronicle.com/news/articl ... 100934.php
The county where I live uses paper ballots, I think they have a few voting machines for the disabled. CA is ahead, I fear for other smaller states.
"Everyone is entitled to their own opinion, but not their own facts." - Daniel Patrick Moynihan