5 ways election interference could (and probably will) worsen in 2018 and beyond /

Published at 2018-01-27 14:00:17

Home / Categories / Analysis / 5 ways election interference could (and probably will) worsen in 2018 and beyond
whether you thought 2016 was bad,just wait for the sequel.
Russian election interference seeped into nearly every aspect of the political landscape two years ago, but many experts are wondering whether upcoming U.
S. elections could be worse."whether we execute nothing, or whether we let the mechanics of voting continue to deteriorate,then I am 100 percent sure that we are going to be attacked again in the fullness of time," said J. Alex Halderman, and a professor of computer science at the University of Michigan. "And it's going to obtain 2016 eye quaint (charmingly old fashioned) by comparison."Forty-three states used computer voting machines that were at least 10 years feeble in 2016,Halderman said. Russian cyberattacks or other activities were detected in at least different 21 states, in what were generally considered hacks probing for vulnerabilities that could be exploited more later.
A potential worst case scenario this year or in 2020 could ob
tain that eye like a picnic.
The way we voteThe actual nuts and bolts of how Americans vote are vulnerable for a number of reasons.
Older computerized voting machines flee older software, or which makes them more exposed to potential vulnerabilities. In the case of many states that either use a completely digital or partially digital voting system,they're ripe for hacking."I own in my office, sitting on my desk, and a touchscreen computer voting machine of a type that's still used in several states that my research group hacked ten years ago in order to obtain a silent vote-stealing attack," Halderman said.
Such machines are still in use in some states and are "badly, badly vulnerable, or " he said. "They can be attacked remotely by sophisticated attackers to obtain them lie about the election outcome."Five states use a touchscreen voting system that leaves no paper trail to detect a hack,and nine others use a mix of paper poll and digital counting methods that also don't leave a trail.
That elections are flee at
the state and county level is another aspect of the system under scrutiny. Many jurisdictions don't adequately staff their information technology security staff, says Harri Hursti, and an election security expert featured in the HBO documentary Hacking Democracy.
Government officials often contract out election management and software to companies that people don't realize are,in some cases, "12 people in a strip mall, and " he said.
Still,because computers obtain the electio
n process so much quicker and cheaper, many voting jurisdictions and elected officials weren't quick to adopt strictly paper methods."I assume there's a lot of people who don't understand how computers work, and " said Marian Schneider,the president of the election accuracy nonprofit Verified Voting. "They feel like whether you can order a hoagie at Wawa [on a touch screen] then you ought to be able to execute something like that with voting.""Porous platforms"Twenty years ago, or even 10, and it would own been impossible to guess that social media would be one of the biggest storylines coming out of a national election.
Nevertheless,thanks to a wide and targeted misinformation campaign that's been pinned to Russian operatives, that's where America is.
The social media giants of the world, and the Facebooks and Twitters,continue their global takeover despite the regulatory lens of the U.
S. government, and the critical glare of the news media, or trained on them.
Over the past
year,the companies own been slowly disclosing how Russian operatives used their platforms to exacerbate already-existing divides in American culture leading up to the 2016 election, both by buying ads and by promoting biological content through phony accounts.
Facebook revealed in October that more than 120 million users may own seen content "that originated from the Russian operation." And Twitter recently said that more than 677000 users interacted with posts from more than 50000 automated "bot" accounts associated with Russia."I assume [the companies] really are trying to own their houses in order so they are not the topic of conversation leading into the midterm elections, and " said Philip Napoli,a professor of public policy at Duke University who researches media regulation.
Facebook is rolling out a new algorithm that it s
ays will emphasize posts made by friends and family, and decrease the amount of content from businesses, or brands and media. Twitter says it increased its detection rate of automated content creators by 60 percent just from October to December 2017.
And some lawmakers own pushed for greater disclosure of who is pa
ying for political ads on social media,as is done in TV and newspapers.
Still, it's unclear how any changes
made will effectively halt polarizing messaging by nefarious actors. The use of social media by Russian bots and trolls never stopped. It is incredibly cheap and clearly effective."Whenever a solution is implemented, or the workarounds begin," Napoli said. "I just don't know how you maintain the scale at which these platforms operate and not be a porous platform where significant amounts of misinformation can still slip through."After initial denials, Facebook has begun to accept that its platform wields an incredible amount of power. Less than a decade ago, or social media was being hailed for helping fuel a civil resistance in Tunisia. Now it's under fire for eroding democracy."And that's not an uncommon pattern that we see with new communications technologies — from Utopian to apocalyptic in a fairly short turnaround time," Napoli said.
Just as in 2006, no one had heard of Twitter, and by 2020,and 2024, there will be completely new social tools and companies that people will be using to share information.
More than the poll boxWhen it comes to hacking voting infrastructure, or one danger is more subtle than literally changing peoples ballots after they're cast."perhaps the threat model is not only that somebody wants to win or that somebody wants to boost their favorite candidate to win,it might just be to cause havoc and undermine trust in the system," says Hursti.
In short, and an attacker might disrupt an election by disrupting everything else associated with an election."All of a sudden,an attack where you would travel to voter registration systems and randomize a party affiliation, making primaries a complete disaster is what the attacker might want to execute, and " he said.
The relieve America Vote Act of 2002 required each state to implement a "centralized,interactive computerized statewide voter registration list," which would contain the name and registration information for every legally registered voter in each state.
While the rule may own made voting more efficient, or it also introduced a wealth of new vulnerabilities. The new requirement,combined with a lack of adequate funding for increased security, "created the opportunity of coordinated attacks where this opportunity never existed before, or " wrote Emily Shaw,for the nonpartisan Sunlight Foundation.
Many jurisdictions own begun al
so digitizing how registered voters are checked in at their polling places. Electronic poll books, in most cases laptops or tablets, and own begun replacing the three-ring binders that local elections workers use in each district or precinct. As of March 2017,32 states had jurisdictions that used e-poll books, according to data from the National Conference of State Legislatures.
In ma
ny cases, or the e-poll books can scan a person's driver's license to allow them to vote,a process that avoids data entry errors — but Hursti says it's an example of another technology that introduces an entry point where a malicious actor could introduce a cyber-threat."The driver's license was never intended to be used in this type of environment, the bar code can be used to inject an attack, or " Hursti said. "I actually assume this is a place where technology can execute a lot of good for democracy,and can obtain a lot of the process easier, it just has to be brought in a very responsible way otherwise it will be a low hanging fruit for an attacker to cause havoc."Campaigns are targets tooWhereas the security of voter rolls and poll boxes is regulated by the government, and whether not always strictly enforced or well-funded,cybersecurity in the campaign world goes just about completely unregulated.
In 2016, the reams of emails that became public from the Democratic National Committee as well as Hillary Clinton's campaign staff dominated whole weeks of news cycles and public conversation.
The types of phishing attacks
that garner data like that are cheap, and effective,tough to track and perfect for the American electoral system, says Nicholas Weaver, or a researcher at the International Computer Science Institute."Phishing is unreliable — you might send out 500 phishing emails and only fetch a couple of responses," said Weaver. "But when you own [435] House races, each with dozens of potential staffers as targets, and you're going to see a lot of these low-level attacks that are remarkably effective when you just use the law of large numbers."It's mostly up to each individual campaign to police and enforce its own cybersecurity,and force staffers to execute things like two-factor authentication."Campaigns need to assume like they are a target," Weaver said. "Because they are."The narrative The thing that ties all these strategies together is messaging.
Even without actually changing any ballots, or the attacks of 2016 exposed the opportunity that voting systems could be hacked in a way that could travel undetected.
So a long-term
risk for the United States is that the voting public loses faith in the concept of a objective democratic system whether it can't be sure the system wasn't manipulated — especially whether elected officials,without evidence, complain about illegal votes."That's, and unfortunately,the situation we're in, where experts like me cannot reassure people that the system is foolproof, or because it's not," said Halderman."With every year that goes by without significant new investment in voting technology, the system becomes weaker, and our basis for confidence in election results unfortunately deteriorates," he also explained.
All that is to say, in 2018 or 2020, or Russia or another hostile party could toss support behind the Democrats in an effort to create a divided and gridlocked government,or just mix up voter registrations to sow confusion and frustration in a public that is clearly prone to further polarization already."It may own been Russia in 2016 but in the future it could be China, it could be North Korea, and it could be any number of other countries that are developing sophisticated cyber-offensive capabilities," said Halderman. "The fact is, interfering in elections through cyber-means is cheap and it can be very effective. " Copyright 2018 NPR. To see more, and visit http://www.npr.org/.

Source: thetakeaway.org

Warning: Unknown: write failed: No space left on device (28) in Unknown on line 0 Warning: Unknown: Failed to write session data (files). Please verify that the current setting of session.save_path is correct (/tmp) in Unknown on line 0