Election Security: Beyond Mail-In Voting

Election Security: Beyond Mail-In Voting

There are many areas of the election process that criminal hackers can target to influence election results.

As a highly publicized event, every four years the U.S presidential election comes with inevitable security risks — and interest from high-level hackers and sophisticated cybercriminals looking to sway its results. The upcoming election ups the stakes — it has captured the attention of everyone across the globe, and is seen as one of the most important and pivotal elections in decades.

And with the COVID-19 pandemic, there is no doubt that this year’s election will be the first of its kind. It is a true race against time as counties and states across the country, some which never previously allowed votes to be cast by mail, rapidly change their election processes to support mail-in ballots.

That presents a fresh set of security concerns, which include a lack of transparency over the security measures and voter auditing applied to each type of voting method. The lack of resources needed to adapt and secure the mail-in voting process by the early November election date is has been another cause for concern.

However, if security experts and the wider public focus too much time and attention on trying to secure this year’s predominately mail-in voting infrastructure, it may give criminal hackers the opportunity to take advantage of other areas and systems that are just as important.

Cyberattackers gaining access to the infrastructure, machines and firmware used to cast and count votes is always a concern. And, there are many areas of the election process that criminal hackers can target to influence election results — not just hacking the outcome of the vote but ultimately hacking democracy.

For instance, attackers can target an election’s voter-registration systems and invalidate votes from the outset. Gaining access to this type of system can lead to the possibility of poisoning voter data, such as voter names being deleted, added or changed. A voter’s location can also be altered to support a specific result, especially in key swing states.

Voter suppression in the form of distributed denial-of-service (DDoS) attacks is also another issue we see time and time again, especially when voting registration deadlines approach, because they can prevent voters from registering on time.

All of that said, while there is still a long way to go when it comes to election security and transparency, it is important to acknowledge the positive changes that have happened in recent years. The regulations implemented by social platforms that flag and prevent the spread of false political statements or “fake news” is a step in the right direction. The public reporting of malicious and ransomware attacks both related and non-related to the election has also helped improve transparency and awareness levels.

A key that still need to be made: Changing the level of confidence that voters have in the security and accuracy of the voter system. This negative conception may lead to an increase in non-voters. The worst potential outcome of this or any election and the ultimate hack is to create distrust in the voting system so that fewer voters will participate in the election. So, it is of the utmost importance that the government focus on rebuilding the trust in democracy, which has been eroded in recent years due to foreign hacking influence.

government hacks infosec insider vulnerabilities web security election results election security hackers infosec insider infrastructure joseph carson mail in voting security risks thycotic

Bootstrap 5 Complete Course with Examples

Bootstrap 5 Tutorial - Bootstrap 5 Crash Course for Beginners

Nest.JS Tutorial for Beginners

Hello Vue 3: A First Look at Vue 3 and the Composition API

Building a simple Applications with Vue 3

Deno Crash Course: Explore Deno and Create a full REST API with Deno

How to Build a Real-time Chat App with Deno and WebSockets

Convert HTML to Markdown Online

HTML entity encoder decoder Online

Shoring Up the 2020 Election: Secure Vote Tallies Aren’t the Problem

With many in the public sphere warning about a potential compromise of the integrity of the Presidential Election, security researchers instead flag online resources and influence campaigns as the biggest problem areas.

Black Hat 2020: In a Turnaround, Voting Machine Vendor Embraces Ethical Hackers

Voting machine technology seller Election Systems & Software (ES&S) offered an olive branch to security researchers with new safe harbor terms and vulnerability disclosure policies at Black Hat USA 2020.

Best Custom Web & Mobile App Development Company

Top Web & Mobile Application Development Company in India & USA. We specialize in Golang, Ruby on Rails, Symfony, Laravel PHP, Python, Angular, Mobile Apps, Blockchain, & Chatbots

Grindr's Bug Bounty Pledge Doesn't Translate to Security

At [email protected], Luta Security CEO Katie Moussouris stressed that bug bounty programs aren't a 'silver bullet' for security teams.

Black Hat 2020: Scaling Mail-In Voting Spawns Broad Challenges

Voting Village security celeb Matt Blaze delves into the logistics of scaling up mail-in voting ahead of November's election.