. Military Space News .
CYBER WARS
Ahead of US election, angst over hacking threats
By Rob Lever
Washington (AFP) Oct 7, 2018

At a Boston technology conference last month, computer scientist Alex Halderman showed how easy it was to hack into an electronic voting machine and change the result, without leaving a trace.

Halderman staged a mock election in which three conference attendees voted for George Washington, but an infected memory card switched the result to give a 2-1 victory to Benedict Arnold, the military officer who sold secrets during the Revolutionary War.

Halderman's demonstration was on a voting machine still in use in 20 US states, which had no paper ballots that could be compared to the electronic output, and thus no way to determine if vote totals had been altered.

"What keeps me up at night is the threat that a hostile nation-state could probe every swing state or swing district (and) find the ones most weakly protected, to silently change the results of a national election," the University of Michigan professor said.

A month ahead of the midterm congressional elections, security experts say the risks remain high for a hack on voting machines or other targets.

The vote comes two years after the US national election in which, according to intelligence officials, Russian agents probed voter registration networks in at least 20 states and accessed at least one.

Halderman said the Russians had the ability to destroy or alter voting records, which could have led to chaos on election day. He added however that, according to a Senate Intelligence Committee investigation, "they did not pull the trigger on that ability."

Other researchers have shown flaws which could allow hackers to penetrate voting machines or networks, and have stepped up calls for new methods to replace all-electronic systems with no paper backup, still in use for an estimated 20 to 25 percent of US voters.

The Defcon conference of security researchers discovered a voting tabulator used in 23 states is vulnerable to a remote hack via a network attack and another machine used in 18 states could be hacked within two minutes.

- More paper needed -

A National Academy of Science report in September recommended that every effort should be made to use paper ballots in the 2018 election and that by 2020 "human readable" ballots should be standard.

States should mandate audits prior to the certification of election results, it said, getting enough data to ensure that any electronic totals match the ones on paper.

US elections are managed by state and local officials, meaning standards may not be uniform, and some states have resisted efforts to impose norms, claiming this would impinge on their authority.

In Georgia, a judge declined to order the replacement of electronic voting machines for the November 6 vote because it was too late, but warned that voters may have a case that their constitutional rights were violated.

Five states still use "paperless" systems without any form of backup, according to Joseph Hall, who heads an election security research team at the Center for Democracy and Technology.

Hall said that in addition to voting machines and election rolls, hackers may look at other targets such as candidates, or the networks of state or local officials who run the elections.

"We are increasingly worried about adversaries attacking the election system," Hall said.

In addition to possible attacks from nation-states, Hall pointed to opportunistic attackers who don't have political motives but want to "make a name for themselves."

Mike Murray, of security firm Lookout, said attackers could disrupt the election by hacking into mobile phones of candidates, staffers, activists and others -- sometimes simply by sending a text message infected with malware.

"There's a whole electoral ecosystem" of people whose phones can be hijacked, Murray told a Capitol Hill briefing. "The mobile device has become one of the primary targets of nation-states."

- Making strides -

Congress this year allocated $380 million to states to improve election security. But lawmakers declined to pass a proposed Secure Elections Act that would have mandated security standards and audits.

The National Association of Secretaries of State, comprised of officials in charge of state election systems, has downplayed the risks from hacking demonstrations, saying they don't reflect real-world conditions.

Meanwhile US Homeland Security Secretary Kirstjen Nielsen said there have been "tremendous strides" in election security in the past two years.

Her agency, she said, is providing technical assistance to all 50 states, including the deployment of sensors that can detect network intrusions.

"We are really and truly throwing everything we have at it," Nielsen told a Washington Post cybersecurity conference.

But some analysts say even a minor incident can undermine credibility in the election result.

Christine Santoro of the Open Source Election Technology Institute said adversaries are using a combination of direct and indirect attacks, combined with propaganda and disinformation efforts.

"They may not have to expend great effort to derail an election," she said in a blog post.

"With a little luck they can continue to sow seeds of mistrust and distrust in our vital democratic processes."


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


CYBER WARS
U.S., Montenegro conduct cybersecurity exercises
Washington (UPI) Oct 4, 2018
The U.S. has worked alongside cyberdefense experts within the government of Montenegro over the past several weeks to build cyberdefense capabilities. The U.S. Air Force Cyber Command and U.S. European Command have spent recent weeks working with Montenegro to conduct Cyber Defense Security Cooperation exercises, which are designed to increase mutual capabilities and deter foreign influence in democratic processes. "Such efforts are important in terms of identifying new risks and better ... read more

Comment using your Disqus, Facebook, Google or Twitter login.



Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
Raytheon receives contract for new AEGIS radars

Raytheon receives $1.5B contract for Patriot systems for Poland

Pentagon to pull some Patriots from Middle East: US official

Lockheed Martin to upgrade AEGIS Combat System for U.S. warships

CYBER WARS
Russia completed S-300 delivery to Syria: defence minister

Russia, India set to sign S-400 deal; Russia completed S-300 delivery to Syria

US, Chinese unease as Putin seeks India arms deals

Lockheed contracted by Army for HIMARS launchers, support

CYBER WARS
General Atomics to provide technical services for Gray Eagle drones

Raytheon to deliver small drone decoys to the U.S. Navy

Self-flying glider 'learns' to soar like a bird

General Atomics contracted for Reaper drone ground control work

CYBER WARS
Airbus tests 4G 5G stratospheric balloons for defence comms

Lockheed Martin embraces agile software development to evolve signals intelligence capabilities

Lockheed Martin Introduces Mission Planning System That Connects Systems and Assets Across Domains

ViaSat contracted for JTRS aircraft communications systems

CYBER WARS
WWII bombs sent shockwaves to the edge of space

L-3 receives contract for Bradley, MLRS transmissions

Taiwan, Bahrain contract Lockheed for sniper targeting pods

American Ordnance contracted for 40mm grenade training rounds

CYBER WARS
US Congress passes major spending bill, sending it to Trump

Boeing's takeover of satellite firm further consolidates space defense industry

France fears damage after Hollande fans controversy over India arms deal

India's Modi mauled over French defence deal

CYBER WARS
Catalonia eyes mediation, with nod to China, Russia

Expanded Marine rotational force deploys to Norway

Amid trade spat, US-China military tensions soar

British minister slams 'pariah state' Russia

CYBER WARS
Precise control of multimetallic one-nanometer cluster formation achieved

Two quantum dots are better than one: Using one dot to sense changes in another

Nucleation a boon to sustainable nanomanufacturing

New nanoparticle superstructures made from pyramid-shaped building blocks









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.