Fears Of Hacked US Election Ebb Away

The US government assertions that Russia has been attempting to destabilise the election and accusations by Republican candidate Donald Trump that the process was rigged have come to nothing as Trump becomes the next President of the US.

Despite concerns about possible attempts to hack or otherwise tamper with the US election, voting appears to have gone smoothly, with no attacks or intrusions as Donald Trump will become the 45th US president after a stunning victory over Democrat Hillary Clinton.

The Department of Homeland Security said it had no reports of election-related cyber breaches.

In Indianapolis, a team of cybersecurity experts spent Tuesday 8th November monitoring for any cybersecurity issues linked to the election, but found none.

“All is clear on the digital front,” said J.J. Thompson, CEO of Indianapolis-based Rook Security. He was one of more than 25 security staffers, law enforcement and government workers who spent the day poised to deal with any hacker attacks on Indiana’s state voting system.

Despite the lack of actual incidents, exit polling showed voters were much less confident that their ballots would be counted accurately than in years past.

About one in six voters said they were not confident that their vote would be accurately counted, according to exit polls from the National Election Pool Survey by Edison Research. More than three-quarters of Trump supporters and more than nine in 10 Clinton voters said they were confident their votes would be counted accurately.

That is in contrast to 2008, when fewer than one in ten voters said they were not confident their vote would be counted accurately.

State Issues but no Cyber Issues

There were always two ways that electronic issues could have affected the election: system breakdowns and actual cyber-attacks.

It doesn’t appear that there were any attacks attempted. That could either be that no one tried or it could be that the work the Department of Homeland Security and other agencies put into helping states protect their election infrastructure paid off.

“All the discussions this year about security gave states another measure of protection,” said Pamela Smith, president of Verified Voting, a non-partisan, non-profit organization that advocates for elections accuracy.

That work also helped minimize the effects caused by breakdowns of voting machines or crashes of registration databases. In Smith's experience, the resiliency of the voting system after something goes wrong is what keeps small problems small.

Colorado goes down - for 29 min

For example, in Colorado, the state’s electronic voter registration system went down for 29 minutes, from 2:47 p.m. to 3:16 p.m. local time, according to Secretary of State's spokeswoman Lynn Bartels.

Voting continued during the outage, though while the registration system was out, clerks were not be able to process mail-in ballots and in-person voters had to use provisional ballots. Once the system was back up and running normal voting resumed.

“It’s very possible that things like what happened in Colorado could have been worse had there not been this emphasis on checking these systems. Instead of it being 29 minutes it could have been much longer,” Verified Voting's Smith said.

Electronic poll-books, used to check voter registration, went down in Durham County, NC, but voters were still able to vote using paper back-up copies of the poll-books.

In three Virginia precincts, voting machine problems caused lines. However, there was no evidence that was anything more than machine error. In several precincts in New Jersey there were reports of “only one machine working,” with election officials sending out more equipment, said Smith.

The issue was believed to be linked to simple machine malfunction, “more likely age than anything else,” Smith said. While not a hack, some online misinformation was sent under a Twitter handle of @CNN Politics. The real CNN account handle is @CNNPolitics.

The account tweeted false first exit poll numbers from Florida, putting Trump far ahead of Clinton. The account was quickly suspended. Twitter declined to comment on the account or the suspension.

Nationally, the Department of Homeland Security, FBI and other federal and state law enforcement agencies had incident response teams ready to take action. Election Protection  staffed hotlines for voters and had an election geek squad ready to answer technical questions from jurisdictions. Individual state election offices also convened their own SWAT teams, though most did not publicly discuss their plans.

The high level of readiness came in part due to US government assertions that Russia has been attempting to destabilise the election and accusations by Republican candidate Donald Trump that the process was rigged.

USA Today:      ‘How The Russians Won An American Election’ - Opinion By Ronald Marks:
 

« IoT Is A Cyberwar Nightmare
NATO Cyberwar: Establishing Rules Of Engagement »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Gamma

Gamma

Gamma is a leading provider of Unified Communications as a Service (UCaaS) into the UK, Dutch, Spanish and German business markets.

Teneo

Teneo

Teneo is a Solutions Provider focused on reducing complexity. We combine leading technology with deep expertise to create new ideas on how to simplify IT operations.

Sonatype

Sonatype

Sonatype protects the world's enterprise software from security, compliance, licensing risks, while reducing application development and deployment time.

LogicManager

LogicManager

LogicManager offer a complete set of IT governance, risk and compliance software solutions and advisory services.

QuintessenceLabs

QuintessenceLabs

QuintessenceLabs offers a suite of Data Security technology, products and solutions to secure digital information in-transit, at-rest or in-use.

ID Quantique (IDQ)

ID Quantique (IDQ)

ID Quantique is a world leader in quantum-safe crypto solutions, designed to protect data for the long-term future.

Arsenal Recon

Arsenal Recon

Arsenal Recon are digital forensics experts, providing consultancy services and powerful software tools to improve the analysis of electronic evidence.

Capsule8

Capsule8

Capsule8 is the only company providing high-performance attack protection for Linux production environments.

Secmation

Secmation

Secmation are an agile engineering services firm providing advanced DoD level security design and consultation services for both commercial and defense hardware and software applications.

Bleam Cyber Security

Bleam Cyber Security

Bleam is a leading provider of Managed Cyber Security Services and Information Security consulting. We deliver enterprise class security services to UK SME’s to stop data breaches.

Electrosoft Services

Electrosoft Services

Electrosoft provide mature, innovative technology-based services and solutions to power critical IT programs and keep our nation safe from cybersecurity attacks.

Com Olho

Com Olho

Com Olho provides the measurement, analytics, quality assurance, and fraud protection technologies brands need for their business and customers.

OryxLabs

OryxLabs

OryxLabs provide advanced enterprise digital risk protection solutions. Learn more about how 24x7 continuous assessment, monitoring, and improvement can secure your network.

SecureLake

SecureLake

SecureLake (formerly Managni) is one of the most trusted US-based IT security and infrastructure companies.

CQR

CQR

CQR are at the forefront of innovative cyber solutions, dedicated to securing and fortifying Operational technology (OT) infrastructure.

FatPipe Networks

FatPipe Networks

FatPipe’s network optimization solutions along with robust native security and SASE-based protection provides organizations all they need for super network performance and security.