Fears Of Hacked US Election Ebb Away

The US government assertions that Russia has been attempting to destabilise the election and accusations by Republican candidate Donald Trump that the process was rigged have come to nothing as Trump becomes the next President of the US.

Despite concerns about possible attempts to hack or otherwise tamper with the US election, voting appears to have gone smoothly, with no attacks or intrusions as Donald Trump will become the 45th US president after a stunning victory over Democrat Hillary Clinton.

The Department of Homeland Security said it had no reports of election-related cyber breaches.

In Indianapolis, a team of cybersecurity experts spent Tuesday 8th November monitoring for any cybersecurity issues linked to the election, but found none.

“All is clear on the digital front,” said J.J. Thompson, CEO of Indianapolis-based Rook Security. He was one of more than 25 security staffers, law enforcement and government workers who spent the day poised to deal with any hacker attacks on Indiana’s state voting system.

Despite the lack of actual incidents, exit polling showed voters were much less confident that their ballots would be counted accurately than in years past.

About one in six voters said they were not confident that their vote would be accurately counted, according to exit polls from the National Election Pool Survey by Edison Research. More than three-quarters of Trump supporters and more than nine in 10 Clinton voters said they were confident their votes would be counted accurately.

That is in contrast to 2008, when fewer than one in ten voters said they were not confident their vote would be counted accurately.

State Issues but no Cyber Issues

There were always two ways that electronic issues could have affected the election: system breakdowns and actual cyber-attacks.

It doesn’t appear that there were any attacks attempted. That could either be that no one tried or it could be that the work the Department of Homeland Security and other agencies put into helping states protect their election infrastructure paid off.

“All the discussions this year about security gave states another measure of protection,” said Pamela Smith, president of Verified Voting, a non-partisan, non-profit organization that advocates for elections accuracy.

That work also helped minimize the effects caused by breakdowns of voting machines or crashes of registration databases. In Smith's experience, the resiliency of the voting system after something goes wrong is what keeps small problems small.

Colorado goes down - for 29 min

For example, in Colorado, the state’s electronic voter registration system went down for 29 minutes, from 2:47 p.m. to 3:16 p.m. local time, according to Secretary of State's spokeswoman Lynn Bartels.

Voting continued during the outage, though while the registration system was out, clerks were not be able to process mail-in ballots and in-person voters had to use provisional ballots. Once the system was back up and running normal voting resumed.

“It’s very possible that things like what happened in Colorado could have been worse had there not been this emphasis on checking these systems. Instead of it being 29 minutes it could have been much longer,” Verified Voting's Smith said.

Electronic poll-books, used to check voter registration, went down in Durham County, NC, but voters were still able to vote using paper back-up copies of the poll-books.

In three Virginia precincts, voting machine problems caused lines. However, there was no evidence that was anything more than machine error. In several precincts in New Jersey there were reports of “only one machine working,” with election officials sending out more equipment, said Smith.

The issue was believed to be linked to simple machine malfunction, “more likely age than anything else,” Smith said. While not a hack, some online misinformation was sent under a Twitter handle of @CNN Politics. The real CNN account handle is @CNNPolitics.

The account tweeted false first exit poll numbers from Florida, putting Trump far ahead of Clinton. The account was quickly suspended. Twitter declined to comment on the account or the suspension.

Nationally, the Department of Homeland Security, FBI and other federal and state law enforcement agencies had incident response teams ready to take action. Election Protection  staffed hotlines for voters and had an election geek squad ready to answer technical questions from jurisdictions. Individual state election offices also convened their own SWAT teams, though most did not publicly discuss their plans.

The high level of readiness came in part due to US government assertions that Russia has been attempting to destabilise the election and accusations by Republican candidate Donald Trump that the process was rigged.

USA Today:      ‘How The Russians Won An American Election’ - Opinion By Ronald Marks:
 

« IoT Is A Cyberwar Nightmare
NATO Cyberwar: Establishing Rules Of Engagement »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Rubicon Workflow Solutions

Rubicon Workflow Solutions

Rubicon is a leading provider of managed IT support and strategic services, specialising in creative and mixed platform environments.

Schneider Electric

Schneider Electric

Schneider Electric develops connected technologies and solutions to manage energy and process in ways that are safe, reliable and sustainable.

Rogue Wave Software

Rogue Wave Software

At Rogue Wave, our mission is to simplify your hardest problems, improve software quality and security, and shorten the time it takes to deliver value.

Wipro

Wipro

Wipro Limited is a leading global information technology, consulting and business process services company.

Pluribus One

Pluribus One

Pluribus One develops customized solutions and other data-driven applications to secure your business and your devices.

Crosser

Crosser

The Crosser Platform enables real-time processing of streaming or batch data for Industrial IoT, Data Transformation, Analytics, Automation and Integration.

The Security Company (TSC)

The Security Company (TSC)

The Security Company is a leading provider of creative employee security awareness programmes.

SearchInform

SearchInform

SearchInform is a leading risk management product developer, protecting business and government institutions against data theft, harmful human behavior, compliance breaches and incomplete audit.

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions is a leader in the design, manufacture, testing, and support of hardware and software solutions for the embedded computing market.

Microminder Cyber Security

Microminder Cyber Security

Microminder Cyber Security are innovators, advisors, strategists committed to solving your cyber security challenges.

Security BSides Cayman Islands

Security BSides Cayman Islands

Security BSides is a non-profit, community-driven event built for and by information security community members. Our aim is to help build an Information Security community in the Cayman Islands.

Wavenet

Wavenet

Wavenet has grown from simple beginnings to become one of the UK’s market leaders in unified communications, business telephony, and Cyber Security solutions.

Allure Security

Allure Security

Allure Security AI-driven brand protection scans more of the online world for faster, more accurate detection & removal of spoof websites, social media & mobile apps -- before customers fall victim.

Digital Encode

Digital Encode

Digital Encode is a leading consulting and integration firm that specializes in the design, management, and security of business-critical networks, telecommunications, and IT infrastructures.

Nagomi Security

Nagomi Security

Nagomi is changing the way security teams balance risk and defense, empowering customers to focus on what matters now.

Fernao Group

Fernao Group

Fernao offer you all solutions from a single source - from cyber security, business resilience and digital infrastructure to cloud technologies and pentesting.