<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Hacking the election in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27378#M1736</link>
    <description>&lt;P&gt;Subsequent &lt;A href="https://www.djournal.com/news/voting-issues-being-addressed-at-two-area-precincts/article_2cc49529-f73f-51dd-9417-232ea2ac7ea8.html" target="_blank" rel="noopener"&gt;news articles&lt;/A&gt; indicate that the issue was technical and they make it sound as if the issue arose during transport. Makes me wonder how they handled the 12 votes on the machine that occurred before the issue was reported.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, this only heightens the risk of being fodder for election tampering claims and instilling distrust in the election process.&amp;nbsp; After all, the video does "explain" tampering in a compelling way that will resonate with even the most novice of voters.&amp;nbsp; Such distrust is the biggest risk to election security.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/780103681"&gt;@CraginS&lt;/a&gt;, you might consider adding disinformation-campaigns, voter-disenfranchisement and gerrymandering to your list of election tampering mechanisms.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 28 Aug 2019 21:48:21 GMT</pubDate>
    <dc:creator>denbesten</dc:creator>
    <dc:date>2019-08-28T21:48:21Z</dc:date>
    <item>
      <title>Hacking the election</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27356#M1723</link>
      <description>&lt;P&gt;It is now being reported that&amp;nbsp;&amp;nbsp;&lt;A href="https://www.washingtonpost.com/nation/2019/08/28/mississippi-election-machine-changes-votes-video/" target="_blank" rel="noopener"&gt;A few voting machines were visibly changing people's votes&lt;/A&gt;, and it was caught on video and posted on social media.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Who knows if the video is factual, but regardless I'm sure it will&amp;nbsp;spark much discussion in the media and political arenas.&amp;nbsp; Hopefully, at a minimum, the result will be a mandatory paper trail (which does not exist on the machines in question).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Aug 2019 13:12:50 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27356#M1723</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2019-08-28T13:12:50Z</dc:date>
    </item>
    <item>
      <title>Re: Hacking the election</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27357#M1724</link>
      <description>&lt;P&gt;Dude, we can do anything with AI and software to rig the election. How do we audit the code is one question that we need to ask ourselves.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Aug 2019 13:14:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27357#M1724</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2019-08-28T13:14:41Z</dc:date>
    </item>
    <item>
      <title>Re: Hacking the election</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27365#M1730</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Bottom line: Your vote counts --- although what you cast might not add up to what you want...&amp;nbsp;&lt;img id="manlol" class="emoticon emoticon-manlol" src="https://community.isc2.org/i/smilies/16x16_man-lol.png" alt="Man LOL" title="Man LOL" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Aug 2019 17:08:32 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27365#M1730</guid>
      <dc:creator>Shannon</dc:creator>
      <dc:date>2019-08-28T17:08:32Z</dc:date>
    </item>
    <item>
      <title>Re: Hacking the election</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27366#M1731</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;It is now being reported that&amp;nbsp;&amp;nbsp;&lt;A href="https://www.washingtonpost.com/nation/2019/08/28/mississippi-election-machine-changes-votes-video/" target="_blank" rel="noopener"&gt;A few voting machines were visibly changing people's votes&lt;/A&gt;, and it was caught on video and posted on social media.&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Hacking individual voting machines is a stupid kid trick, demonstrably even more stupid if evidence of the hack is left visible to the voters, as in this situation. It is a waste of time and resources to corrupt the s/w in hundreds or thousands of voting machines. To control an election outcome, you need to hack the vote counting and aggregation steps of the process. For a summary if the issues in selecting the processes involved in elections and voting, see my blog post,&amp;nbsp;&lt;STRONG&gt;&lt;A href="https://cragins.blogspot.com/2019/05/dhs-security-tip-19-001-best-practices.html" target="_blank" rel="noopener"&gt;DHS Security Tip 19-001, Best Practices for Securing Election Systems&lt;/A&gt;&lt;/STRONG&gt;. For an excellent discussion by a team of professionals in the many areas needed, see the NAP Press book,&amp;nbsp;&lt;STRONG&gt;&lt;A href="https://www.nap.edu/catalog/25120/securing-the-vote-protecting-american-democracy" target="_blank" rel="noopener"&gt;Securing the Vote:&amp;nbsp;Protecting American Democracy&lt;/A&gt;&lt;/STRONG&gt; (2018). This&amp;nbsp;Consensus Study Report&amp;nbsp;is available as &amp;nbsp;free PDF, dead tree version for $45 USD, or eBook (ePub or Kindle) for $36.89 USD.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Aug 2019 18:00:57 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27366#M1731</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2019-08-28T18:00:57Z</dc:date>
    </item>
    <item>
      <title>Re: Hacking the election</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27369#M1733</link>
      <description>&amp;gt; denbesten (Community Champion) posted a new topic in Tech Talk on 08-28-2019&lt;BR /&gt;&lt;BR /&gt;&amp;gt; &amp;nbsp; Who&lt;BR /&gt;&amp;gt; knows if the video is factual&lt;BR /&gt;&lt;BR /&gt;I'm sorry, but this statement is *very* concerning.&lt;BR /&gt;&lt;BR /&gt;It is very much to the point if the video is factual. If it *is* factual, then we have&lt;BR /&gt;to ensure that voting machines from that manufacturer do not make it into the&lt;BR /&gt;election process.&lt;BR /&gt;&lt;BR /&gt;But if the video *isn't* factual, we have an effort to create mistrust in the election&lt;BR /&gt;process, and must ensure that the video is *not* spread, else we are only&lt;BR /&gt;supporting the attacker.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; &amp;nbsp; Hopefully, at a minimum, it the&lt;BR /&gt;&amp;gt; result will be&amp;nbsp; a mandatory paper trail (which does not exist on the machines in&lt;BR /&gt;&amp;gt; question). &amp;nbsp; &amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Unfortunately, it can have graver and much more damaging results than that ...&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@vcn.bc.ca slade@victoria.tc.ca rslade@computercrime.org&lt;BR /&gt;`I'm always surprised when I meet an atheist.'&lt;BR /&gt;`Mm.'&lt;BR /&gt;`I mean, I know you exist, but that's not the same as believing.'&lt;BR /&gt;`Yes God, I get it.'&lt;BR /&gt;- &lt;A href="https://twitter.com/MicroSFF/status/545881676396888064" target="_blank"&gt;https://twitter.com/MicroSFF/status/545881676396888064&lt;/A&gt;&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://is.gd/RotlWB" target="_blank"&gt;https://is.gd/RotlWB&lt;/A&gt;</description>
      <pubDate>Wed, 28 Aug 2019 19:05:52 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27369#M1733</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2019-08-28T19:05:52Z</dc:date>
    </item>
    <item>
      <title>Re: Hacking the election</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27374#M1735</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/780103681"&gt;@CraginS&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;Hacking individual voting machines is a stupid kid trick [snip] To control an election outcome, you need to hack the vote counting and aggregation steps of the process.&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Exactly. The publicity stunts pulled relating to this are a huge disservice on multiple levels. Here's the real threat I see, however. The people exaggerating the risk - knowingly or not - are only going to add fuel to the idiots clamoring for some national voting system. Right now our best defense is the extremely disjointed and distributed nature of voting throughout the country. Once some uniform system is in place, then that is where it becomes easy to attack counting and aggregation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Listen folks, the biggest threat to our system of government isn't the Russians, the North Koreans, the socialists, the fascists, or even 1990s boy bands planning reunion tours. It is an electorate that is incapable of thinking for itself. No one is stealing elections. We're giving them away.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Aug 2019 20:49:58 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27374#M1735</guid>
      <dc:creator>JoePete</dc:creator>
      <dc:date>2019-08-28T20:49:58Z</dc:date>
    </item>
    <item>
      <title>Re: Hacking the election</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27378#M1736</link>
      <description>&lt;P&gt;Subsequent &lt;A href="https://www.djournal.com/news/voting-issues-being-addressed-at-two-area-precincts/article_2cc49529-f73f-51dd-9417-232ea2ac7ea8.html" target="_blank" rel="noopener"&gt;news articles&lt;/A&gt; indicate that the issue was technical and they make it sound as if the issue arose during transport. Makes me wonder how they handled the 12 votes on the machine that occurred before the issue was reported.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, this only heightens the risk of being fodder for election tampering claims and instilling distrust in the election process.&amp;nbsp; After all, the video does "explain" tampering in a compelling way that will resonate with even the most novice of voters.&amp;nbsp; Such distrust is the biggest risk to election security.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/780103681"&gt;@CraginS&lt;/a&gt;, you might consider adding disinformation-campaigns, voter-disenfranchisement and gerrymandering to your list of election tampering mechanisms.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Aug 2019 21:48:21 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27378#M1736</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2019-08-28T21:48:21Z</dc:date>
    </item>
    <item>
      <title>Re: Hacking the election</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27447#M1744</link>
      <description>&lt;P&gt;We have, of course, discussed &lt;A href="https://community.isc2.org/t5/Industry-News/Voting-systems/td-p/12576" target="_blank" rel="noopener"&gt;voting systems&lt;/A&gt; elsewhere (and &lt;A href="https://community.isc2.org/t5/Industry-News/Voting-technologies-Paper-is-best/m-p/14550" target="_blank" rel="noopener"&gt;elsewhere&lt;/A&gt;, and &lt;A href="https://community.isc2.org/t5/Tech-Talk/Blockchain-for-online-voting-Yay-or-Nay/m-p/26833" target="_blank" rel="noopener"&gt;elsewhere&lt;/A&gt;), but it is interesting to note that there is a link to another recent topic: &lt;A href="https://community.isc2.org/t5/Tech-Talk/Homomorphic-Encryption/m-p/19049" target="_blank" rel="noopener"&gt;homomorphic encryption&lt;/A&gt;.&amp;nbsp; Ron Rivest has suggested an &lt;A href="https://en.wikipedia.org/wiki/ThreeBallot" target="_blank" rel="noopener"&gt;interesting system&lt;/A&gt; which allows for verification of personal voting (voters can't vote twice), direct counting of ballots without decryption, public audit trail, as well as verification (by the voter) that the vote was correctly counted as cast.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It can be used with paper ballots, but can also be implemented for electronic and online systems.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2019 18:42:58 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27447#M1744</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2019-08-30T18:42:58Z</dc:date>
    </item>
    <item>
      <title>Re: Hacking the election</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27459#M1745</link>
      <description>&lt;P&gt;And, at the moment, the &lt;A href="https://www.npr.org/2019/08/30/755523088/as-fec-nears-shutdown-priorities-such-as-stopping-election-interference-on-hold" target="_blank" rel="noopener"&gt;US electoral system is pretty much unprotected&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Sat, 31 Aug 2019 08:47:23 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27459#M1745</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2019-08-31T08:47:23Z</dc:date>
    </item>
    <item>
      <title>Re: Hacking the election</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27474#M1749</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/780103681"&gt;@CraginS&lt;/a&gt;, you might consider adding disinformation-campaigns, voter-disenfranchisement and gerrymandering to your list of election tampering mechanisms.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Actually, William, no, not for this community. We have now reached a point in the discussion where we should distinguish between &lt;EM&gt;election system hacking&lt;/EM&gt; and &lt;EM&gt;election hacking&lt;/EM&gt;. Our collective areas of expertise in this forum are focused on the means of interfering with elections through interfering with election systems, primarily involving IT systems. The concept of &lt;EM&gt;election hacking&lt;/EM&gt; is a higher- level construct, that most definitely includes the methods if disinformation campaigns, over-disenfranchisement, and gerrymandering that you have listed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Societally, yes, we really should address and evaluate all the means of election hacking, including the social and political processes you have listed. However, in our InfoSec community, we should focus on the election systems and processes within our area of expertise. That said, I also believe we should engage with the legal, political, sociological, and psychological experts as a wide-ranging team to address the full challenge of election security and validity. As it happens, I believe &amp;nbsp;that one of the most insidious, and potentially effective tools in this bundle, is disinformation campaigns, which often include lies of fact, implication, and innuendo by the candidates themselves&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 31 Aug 2019 15:32:35 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27474#M1749</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2019-08-31T15:32:35Z</dc:date>
    </item>
    <item>
      <title>Re: Hacking the election</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27475#M1750</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1324864413"&gt;@rslade&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;And, at the moment, the &lt;A href="https://www.npr.org/2019/08/30/755523088/as-fec-nears-shutdown-priorities-such-as-stopping-election-interference-on-hold" target="_blank" rel="noopener"&gt;US electoral system is pretty much unprotected&lt;/A&gt;.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;BR /&gt;Seems like another item to add to&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/780103681"&gt;@CraginS&lt;/a&gt;;' list --- ignoring the results.&lt;/P&gt;</description>
      <pubDate>Sat, 31 Aug 2019 15:30:32 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27475#M1750</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2019-08-31T15:30:32Z</dc:date>
    </item>
    <item>
      <title>Re: Hacking the election</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27477#M1751</link>
      <description>&lt;P&gt;Your list, your choice, but I liken it to the fact that we concern ourselves with phishing, although it is not a technical hack.&lt;/P&gt;</description>
      <pubDate>Sat, 31 Aug 2019 18:38:03 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27477#M1751</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2019-08-31T18:38:03Z</dc:date>
    </item>
    <item>
      <title>Re: Hacking the election</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27480#M1752</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Your list, your choice, but I liken it to the fact that we concern ourselves with phishing, although it is not a technical hack.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;William,&lt;/P&gt;&lt;P&gt;You have a good point to relate the human factor and use of deception to compare phishing to disinformation campaigns. However, the difference I draw is that a phishing attack uses the deception of a human to leverage access into the IT technology. The other social attacks you addressed use deception and psychology to influence humans to take specific action, that is vote a particular way, but that does not grant access into the IT system.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 31 Aug 2019 21:47:21 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27480#M1752</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2019-08-31T21:47:21Z</dc:date>
    </item>
    <item>
      <title>Re: Hacking the election</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27481#M1753</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1324864413"&gt;@rslade&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;And, at the moment, the &lt;A href="https://www.npr.org/2019/08/30/755523088/as-fec-nears-shutdown-priorities-such-as-stopping-election-interference-on-hold" target="_blank" rel="noopener"&gt;US electoral system is pretty much unprotected&lt;/A&gt;.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1324864413"&gt;@rslade&lt;/a&gt;&amp;nbsp;that might be employing a bit of hyperbole. The news story is about the Federal Election Commission not being able to meet due to a quorum. The FEC has very little to do with electing - more with campaign finance. In the U.S., elections - even those for national office - are run according to each state's make-up. In most cases, it is up to the city or town in question to conduct the elections however it wants. They determine the official count which then gets reported and aggregated at the state level (or possibly first to the county level and then to the state). Each city or town uses its own mechanism, which can change in any given year according to the whim and budget of that municipality. Even if someone were able to compromise the aggregation of votes in an entire state, the contributing cities and towns would have the data with which to cry foul.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;In all seriousness, I think these continued claims that election mechanisms are subject to compromise are the attack in and of itself. The first step to truly hacking U.S. election is to convince the people and the politicians to build some monolithic election system. Now you have a single point of attack. The inefficiency of the system is also its strongest defense.&lt;/P&gt;</description>
      <pubDate>Sat, 31 Aug 2019 22:38:16 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27481#M1753</guid>
      <dc:creator>JoePete</dc:creator>
      <dc:date>2019-08-31T22:38:16Z</dc:date>
    </item>
    <item>
      <title>Re: Hacking the election</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27482#M1754</link>
      <description>&amp;gt; JoePete (Contributor II) mentioned you in a post! Join the conversation below:&lt;BR /&gt;&lt;BR /&gt;&amp;gt; The inefficiency of the system is also its strongest defense.&lt;BR /&gt;&lt;BR /&gt;Normally I would have a lot of sympathy for that position: a lot of things are&lt;BR /&gt;done in the name of "efficiency" that shouldn't be done at all.&lt;BR /&gt;&lt;BR /&gt;But, in the case of democracy, I might want to give it a second thought ...&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@vcn.bc.ca slade@victoria.tc.ca rslade@computercrime.org&lt;BR /&gt;I am now alone in the library, mistress of all I survey.&lt;BR /&gt;- Jane Austen, September 24 1813&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://is.gd/RotlWB" target="_blank"&gt;https://is.gd/RotlWB&lt;/A&gt;</description>
      <pubDate>Sun, 01 Sep 2019 00:23:52 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27482#M1754</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2019-09-01T00:23:52Z</dc:date>
    </item>
    <item>
      <title>Re: Hacking the election</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27483#M1755</link>
      <description>&lt;P&gt;Personally, I do not view InfoSec as inherently technology bound, nor do I see much difference between "Vote for Alice" vs "Give Bob money".&amp;nbsp; The most common phishing example is "Hey CFO, write Bad Bob a check. Thanks, CIO.".&amp;nbsp; Although this might come via email, it could just as easily come over a phone call, a formal letter or even a post-it.&amp;nbsp; Some, but not all of these involve technology, yet we defend against them all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To protect an organization, one needs to consider all avenues of attack, not just those for which involve technology, nor just those for which we are responsible for defending.&amp;nbsp;When a risk arises that is outside of our expertise, we need just enough knowledge to recognize its impact, know which experts (PR, legal, management, law enforcement, medical, etc) to engage and with what urgency.&amp;nbsp;&amp;nbsp;Our involvement often comes from the fact that technology amplifies the risk, not necessarily because it is the cause or target.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So if it were my election security list, it would include "disinformation campaign", as a risk but the mitigation would likely be deferred to our partners outside of IT.&amp;nbsp;&amp;nbsp;But, as I said, your list -- your decision.&amp;nbsp; I'm just here because I find the topic and the discussion interesting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If a "tech tie-in" is a prerequisite, keep in mind that many of the disinformation campaigns are successful precisely because technology has significantly elevated the volume (both amplitude and quantity) of non-vetted sources, particularly social media, and us IT people can definitely play a role in detecting the "fake news".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 01 Sep 2019 03:31:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27483#M1755</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2019-09-01T03:31:42Z</dc:date>
    </item>
    <item>
      <title>Re: Hacking the election</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27484#M1756</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1005241419"&gt;@JoePete&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;The inefficiency of the system is also its strongest defense.&lt;/BLOCKQUOTE&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Also, as &lt;A href="https://www.npr.org/2019/08/31/754412132/what-you-need-to-know-about-u-s-election-security-and-voting-machines" target="_blank" rel="noopener"&gt;has been pointed out&lt;/A&gt;, "A huge breadth and diversity of counties means a huge breadth and diversity of security capabilities."&lt;/P&gt;</description>
      <pubDate>Sun, 01 Sep 2019 07:26:24 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27484#M1756</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2019-09-01T07:26:24Z</dc:date>
    </item>
    <item>
      <title>Re: Hacking the election</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27487#M1757</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To protect an organization, one needs to consider all avenues of attack, not just those for which involve technology, nor just those for which we are responsible for defending.&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Lots of good points in that post. I doubt there is a professional among us that hasn't experienced people who really shouldn't own a smartphone, laptop, or possibly a Twitter account. A huge part of our job these days is security awareness, but often it feels like teaching driver's ed to people that already have their licenses and have bought a car. There's a reason why we wait until kids reach a certain maturity, have some preliminary experience, and pass a test before we make them drivers. Even then it is often probationary. Yet, any moron 18 or over can vote.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If certain democracies have failed in their election systems, it's not in the technology. It is in the broad education of their electorate. Classic skills of logic, debate, and reason have atrophied in U.S. society. This has happened despite rising achievement as measured by college degrees attained or high school test scores. What's interesting are the emerging data points that show Millennials are more likely to be caught in confidence schemes than their grandparents. I think a huge factor in this we have raised kids in an environment that when faced with a "problem" they are to select the "correct" answer from the following choices - i.e. standardized testing. That is not how anything in the world works. Sure it generates these great metrics but it teaches kids to discount other possibilities. This pretty much defines politics today: If you don't agree with me, then you are a fascist, radical, elitist, etc. That lack of thinking, empathy, and logic is what makes us so susceptible to the potential social engineering of a campaign. Quite honestly, far more of that kind of garbage originates within the U.S. than outside of it. I don't see the Russians, for example, taking over the Commission on Presidential Debates, which has continually lowered the bar in terms of debate quality by inherently raising the bar to entry to the debate stage.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 01 Sep 2019 11:27:59 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27487#M1757</guid>
      <dc:creator>JoePete</dc:creator>
      <dc:date>2019-09-01T11:27:59Z</dc:date>
    </item>
    <item>
      <title>Re: Hacking the election</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27620#M1773</link>
      <description>&lt;P&gt;&lt;A href="https://www.npr.org/2019/09/04/755066523/cyber-experts-warn-of-vulnerabilities-facing-2020-election-machines" target="_blank" rel="noopener"&gt;Windows CE 5.0&lt;/A&gt;?&amp;nbsp; You've got to be kidding me ...&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2019 04:27:29 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27620#M1773</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2019-09-05T04:27:29Z</dc:date>
    </item>
    <item>
      <title>Re: Hacking the election</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27906#M1785</link>
      <description>&lt;P&gt;&lt;A href="https://www.lawfareblog.com/op-ed-future-election-security" target="_blank" rel="noopener"&gt;What could possibly go wrong&lt;/A&gt;?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(A really great piece, amalgamating all the potential problems ...)&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2019 16:24:11 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Hacking-the-election/m-p/27906#M1785</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2019-09-10T16:24:11Z</dc:date>
    </item>
  </channel>
</rss>

