Fears Of Hacked US Election Ebb Away

The US government assertions that Russia has been attempting to destabilise the election and accusations by Republican candidate Donald Trump that the process was rigged have come to nothing as Trump becomes the next President of the US.

Despite concerns about possible attempts to hack or otherwise tamper with the US election, voting appears to have gone smoothly, with no attacks or intrusions as Donald Trump will become the 45th US president after a stunning victory over Democrat Hillary Clinton.

The Department of Homeland Security said it had no reports of election-related cyber breaches.

In Indianapolis, a team of cybersecurity experts spent Tuesday 8th November monitoring for any cybersecurity issues linked to the election, but found none.

“All is clear on the digital front,” said J.J. Thompson, CEO of Indianapolis-based Rook Security. He was one of more than 25 security staffers, law enforcement and government workers who spent the day poised to deal with any hacker attacks on Indiana’s state voting system.

Despite the lack of actual incidents, exit polling showed voters were much less confident that their ballots would be counted accurately than in years past.

About one in six voters said they were not confident that their vote would be accurately counted, according to exit polls from the National Election Pool Survey by Edison Research. More than three-quarters of Trump supporters and more than nine in 10 Clinton voters said they were confident their votes would be counted accurately.

That is in contrast to 2008, when fewer than one in ten voters said they were not confident their vote would be counted accurately.

State Issues but no Cyber Issues

There were always two ways that electronic issues could have affected the election: system breakdowns and actual cyber-attacks.

It doesn’t appear that there were any attacks attempted. That could either be that no one tried or it could be that the work the Department of Homeland Security and other agencies put into helping states protect their election infrastructure paid off.

“All the discussions this year about security gave states another measure of protection,” said Pamela Smith, president of Verified Voting, a non-partisan, non-profit organization that advocates for elections accuracy.

That work also helped minimize the effects caused by breakdowns of voting machines or crashes of registration databases. In Smith's experience, the resiliency of the voting system after something goes wrong is what keeps small problems small.

Colorado goes down - for 29 min

For example, in Colorado, the state’s electronic voter registration system went down for 29 minutes, from 2:47 p.m. to 3:16 p.m. local time, according to Secretary of State's spokeswoman Lynn Bartels.

Voting continued during the outage, though while the registration system was out, clerks were not be able to process mail-in ballots and in-person voters had to use provisional ballots. Once the system was back up and running normal voting resumed.

“It’s very possible that things like what happened in Colorado could have been worse had there not been this emphasis on checking these systems. Instead of it being 29 minutes it could have been much longer,” Verified Voting's Smith said.

Electronic poll-books, used to check voter registration, went down in Durham County, NC, but voters were still able to vote using paper back-up copies of the poll-books.

In three Virginia precincts, voting machine problems caused lines. However, there was no evidence that was anything more than machine error. In several precincts in New Jersey there were reports of “only one machine working,” with election officials sending out more equipment, said Smith.

The issue was believed to be linked to simple machine malfunction, “more likely age than anything else,” Smith said. While not a hack, some online misinformation was sent under a Twitter handle of @CNN Politics. The real CNN account handle is @CNNPolitics.

The account tweeted false first exit poll numbers from Florida, putting Trump far ahead of Clinton. The account was quickly suspended. Twitter declined to comment on the account or the suspension.

Nationally, the Department of Homeland Security, FBI and other federal and state law enforcement agencies had incident response teams ready to take action. Election Protection  staffed hotlines for voters and had an election geek squad ready to answer technical questions from jurisdictions. Individual state election offices also convened their own SWAT teams, though most did not publicly discuss their plans.

The high level of readiness came in part due to US government assertions that Russia has been attempting to destabilise the election and accusations by Republican candidate Donald Trump that the process was rigged.

USA Today:      ‘How The Russians Won An American Election’ - Opinion By Ronald Marks:
 

« IoT Is A Cyberwar Nightmare
NATO Cyberwar: Establishing Rules Of Engagement »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Security Associates (CSA)

Cyber Security Associates (CSA)

Cyber Security Associates provides cyber consultancy and cyber managed services which help to detect, protect and educate against the ever-changing cyber threat.

BlueID

BlueID

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches.

ElcomSoft

ElcomSoft

ElcomSoft is a global leader in computer and mobile forensics, IT security and forensic data recovery.

The Data Privacy Group

The Data Privacy Group

The Data Privacy Group provide expert professional services underpinned by world leading automation tools and a consulting team specialized in privacy and data protection.

DeviceAssure

DeviceAssure

DeviceAssure enables organizations to reliably identify counterfeit and non-standard devices with a real-time check on a device's authenticity.

Haven Group

Haven Group

Haven Group and its companies are a cyber security one-stop-shop for our clients offering a full range of cyber security services to our clients in a unified and united way.

Internetwork Defense (IND)

Internetwork Defense (IND)

Internetwork Defense is a premier provider of Information Security Training and Business Consulting Services in the Mid-Atlantic region.

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance is a global, non-profit industry association which is working to enable a secure connected future.

Quintillion Consulting

Quintillion Consulting

Quintillion Consulting is a strategic risk based consulting firm. We help companies safeguard the core business and IT capabilities that deliver competitive advantage.

Nullify

Nullify

Nullify is your automated security sentry that continuously finds and fixes security issues across your codebase.

QEDIT

QEDIT

QEDIT is leading the standardization of Zero-Knowledge Proofs through the ZKProof.org Workshops, and builds production-grade ZKP systems for blockchain.

Dynamic Networks

Dynamic Networks

Dynamic Networks provide Managed Cloud Services; Unified Communications; Security & Compliance Services and Network & Infrastructure Services for both Public Sector and Private sector businesses.

BetterWorld Technology

BetterWorld Technology

BetterWorld Technology provides cloud solutions, managed services, SaaS, cybersecurity and virtual CIO, all customized to meet your needs.

Skillfield

Skillfield

Skillfield is a Melbourne based Cyber Security and Data Services consultancy and professional services company.

Yokai

Yokai

Yokai is a secure, distributed platform for data communication with enhanced security features tailored for classified environments such as finance, defence, healthcare, cybersecurity, and more.

Transcendental Technologies

Transcendental Technologies

Transcendental is a consulting organization which specializes in customized assurance services in the fields of Localization, Mobile Software Solutions, Web Design, Cyber Security & Cyber Forensics.