As recently as 2014, people could use WiFi to connect to voting machines inside certain voting places in the state of Virginia. They simply had to be nearby. Once connected, they could interfere with ballots. That major problem in election security has been fixed. Virginia stopped using those machines last year. But election cybersecurity is getting a closer look. Republican Party presidential nominee Donald Trump has repeatedly suggested that the election in November may be rigged. And, a politically sensitive hacking of the Democratic National Committee computer system increased public concern about election cybersecurity. Security experts say the risks are real. But, the probability of attacks on voting cybersystems is hard to estimate. Every machine a possible target David Wagner is a computer science professor at the University of California at Berkeley. He worked on a 2007 statewide examination of California's voting system. He says a sophisticated attacker could hack machines and steal votes. He says every machine is at risk. But, such a hack would not be easy, he says. "It would require considerable technical sophistication. And it would require someone to be physically present in each county, tampering with at least one machine. This is not something that some random teenager can do over a weekend. It's not something that can be done from across the world over the Internet." Hard-copy ballots help The best defense against cheating is a system that has a hard-copy ballot and a system in place to look for ballot irregularities. These systems are on the rise. This November, 75 percent of voters across the United States will vote on machines that retain a hard copy of their choices, says Verified Voting. It is an election observation organization. Also, 26 states require ballot audits after the voting. But that leaves 25 percent of voters entering ballots with no paper copy. And nearly half of the 50 states do not require audits. Wagner says a lot more can and should be done to improve cybersecurity. But, he adds, "We've come a long way in protecting our elections." Locks and keys If attackers want to hack voting machines, they would have to get to them first. "Most of them are under lock and key," says Denise Merrill, Connecticut secretary of state and president of the National Association of Secretaries of State. Usually they are under two keys, in fact -- one for a Republican representative and one for a Democrat. Both keys are required to unlock the machine. Local jurisdictions control their elections, and there are more than 7,000 jurisdictions nationwide. The voting equipment and methods differ widely from place to place. As a result, security can differ widely. But, that also means an attack on one jurisdiction would not affect the others. Secretary of State Merrill says someone who is really determined and had a very large operation might be able to attack. "But,” she says, “even then, it would have to be in very specific places." Safety comes from understanding risks Pam Smith is president of Verified Voting, the election observation organization. She says more states are already moving toward paper ballots and increased physical security of voting equipment. "I think what will happen as we go forward is that people will want to have any and every extra tool they can to eliminate any lingering concerns or questions that people might have." The U.S. Homeland Security Secretary, Jeh Johnson, spoke to state election officials Monday. He offered them help in finding and fixing election cybersecurity risks. The department is considering designating the nation’s election systems as “critical infrastructure.” The government provides extra resources to protect critical infrastructure. Verified Voting’s Pam Smith has another idea for anyone concerned about possible election cheating. "It's not too late to sign up to be a poll worker. You can learn more about it from the inside out and see what some of the safeguards are.” On November 8, those safeguards – as well as the presidential candidates – will be put to the test. I’m Dorothy Gundy. And I'm Kaveh Razaei. VOA Steve Baragona wrote this report. Caty Weaver adapted his report for Learning English. Kelly Jean Kelly was the editor. We want to hear from you. Write to us in the Comments Section. ________________________________________________________________ Words in This Story rigged - v. having fixed something for a desired result; to control, usually through dishonest methods sophisticated - adj. having or showing a lot of knowledge or experience about the world; highly developed tampering - v. to interfere with so as to weaken or change for the worse random - n. without aim, direction or rule irregularities - n. things that are not usual, often a sign of dishonest behavior audits - n. complete and careful examinations of official records jurisdictions - n. areas where a system of laws is used determined - v. found to be the cause of or reason for something; to lean or find out specific - adj. special; clearly and exactly presented eliminate - v. to remove; to defeat and remove linger - v. to stay somewhere after the usual or expected time; to continue to exist as time passes designating - v. to officially choose someone or something; to be used as a name for something poll - adj. of or related to a study of public opinion
from Voice of America http://ift.tt/2baieca
via IFTTT
No comments:
Post a Comment