"Russian Interference in the 2016 United States Election”, 2016 elections, 2018 elections, ballot boxes, corruption, democracy, Dominion Voting Systems, Election equipment vendors, election hacking, Election Systems & Software, Hart InterCivic, level machines, paper ballot, Putin, Russia, Russian Hacking, Russian Intel, Russian interference elections, Source code, Trump, USA, voting, voting machines
The only sensible and safe way to secure the vote is to either count paper ballots at least three times by hand with observers from both parties and independent observers or there can be one machine count and one paper count and if they don’t match up, additional counts. Even the adding itself should be by an old fashioned adding machine with print-out probably in conjunction with hand adding (volunteers will be old enough to remember how to add by hand.). If local community institutions like schools, public librairies, etc., are used, then this process is not so onerous as might appear. The paper should be recycled, of course. This blogger has seen many voting methods and worked as a poll watcher. The only time I felt my vote safe was voting in a tiny town library with paper ballots. Of course, I knew the old ladies and that they were honest. The first time I voted was with an old lever machine and the counter at the top looked like odometers which people used to roll over to indicate a lower car mileage. I instantly knew my vote was in danger, before I entered the voting booth.
This is the biggest reason not to trust the current voting machines, though the risk of fraud has always been there: “According to voting machine testing and certification from the Election Assistance Commission, most voting machines contain software from firms which were alleged to have shared their source code with Russian entities.” https://miningawareness.wordpress.com/2018/03/12/did-us-election-equipment-vendors-share-source-code-or-other-sensitive-or-proprietary-details-with-russia-us-senators-klobuchar-shaheen-inquire/
This is the most important-better of their draft recommendations: “States should rapidly replace outdated and vulnerable voting systems. At a minimum, any machine purchased going forward should have a voter-verified paper trail and no WiFi capability. If use of paper ballots becomes more widespread, election officials should re-examine current practices for securing the chain of custody of all paper ballots and verify no opportunities exist for the introduction of fraudulent votes. • States should consider implementing more widespread, statistically sound audits of election results. • DHS should work with vendors to educate them about the vulnerabilities of both the machines and the supply chains.
Assistance for the States • The Committee recommends Congress urgently pass legislation increasing assistance and establishing a voluntary grant program for the states.” Read more further below.
Advisory: Senate Intel to Hold Open Hearing on Election Security
WASHINGTON – Senator Richard Burr (R-NC), Chairman of the Senate Select Committee on Intelligence, and Senator Mark Warner (D-VA), Vice Chairman of the Senate Select Committee on Intelligence, today announced that the Committee will hold an open hearing on Wednesday, March 21, 2018, on the threats to election infrastructure. The hearing will cover attempted attacks on state election infrastructure in 2016, DHS and FBI efforts to improve election security, and the view from the states on their cybersecurity posture.
Hearing: Open Hearing on Election Security
* Secretary of DHS Kirstjen Nielsen
* Former Secretary of DHS Jeh Johnson
* National Protection and Programs Directorate, Office of Cyber Security and Communications, DHS
* Election Assistance Commission
* National Association of Secretaries of State
* National Association of State Election Directors
* Harvard Kennedy School’s Belfer Center for Science and International Affairs
When: Wednesday, March 21, 2018 at 9:30 am.
Where: Hart Senate Office Building Room 216
“RUSSIAN TARGETING OF ELECTION INFRASTRUCTURE DURING THE 2016 ELECTION
SUMMARY OF DRAFT SSCI RECOMMENDATIONS
The Senate Select Committee on Intelligence has examined evidence of Russian attempts to target election infrastructure during the 2016 U.S. elections. The Committee has reviewed the steps state and local election officials take to ensure the integrity of our elections and agrees that U.S. election infrastructure is fundamentally resilient. The Department of Homeland Security, the Election Assistance Commission, state and local governments, and other groups have already taken beneficial steps toward addressing the vulnerabilities exposed during the 2016 election cycle, including some of the measures listed below, but more needs to be done. The Committee recommends the following steps to better defend against a hostile nation-state who may seek to undermine our democracy:
1. Reinforce States’ Primacy in Running Elections • States should remain firmly in the lead on running elections, and the Federal government should ensure they receive the necessary resources and information.
2. Build a Stronger Defense, Part I: Create Effective Deterrence • The U.S. Government should clearly communicate to adversaries that an attack on our election infrastructure is a hostile act, and we will respond accordingly. • The Federal government, in particular the State Department and Defense Department, should engage allies and partners to establish new international cyber norms.
3. Build a Stronger Defense, Part II: Improve Information Sharing on Threats • The Intelligence Community should put a high priority on attributing cyber attacks both quickly and accurately. Similarly, policymakers should make plans to operate prior to attribution. • DHS must create clear channels of communication between the Federal government and appropriate officials at the state and local levels. We recommend that state and local governments reciprocate that communication. • Election experts, security officials, cybersecurity experts, and the media should develop a common set of precise and well-defined election security terms to improve communication. • DHS should expedite security clearances for appropriate state and local officials. • The Intelligence Community should work to declassify information quickly, whenever possible, to provide warning to appropriate state and local officials.
4. Build a Stronger Defense, Part III: Secure Election-Related Systems • Cybersecurity should be a high priority for those managing election-related systems. Basic but crucial security steps like two-factor authentication for those logging into voter databases can improve the overall election security posture. States and localities should also take advantage of DHS offerings, to include DHS’s network monitoring capabilities.
The Committee recommends DHS take the following steps: o Working closely with election experts, develop a risk management framework that can be used in engagements with state and local election infrastructure owners to document and mitigate risks to all components of the electoral process. o Create voluntary guidelines on cybersecurity best practices and a public awareness campaign to promote election security awareness, working through the U.S. Election Assistance Commission (EAC), the National Association of Secretaries of State (NASS), and the National Association of State Election Directors (NASED). o Expand capacity to reduce wait times for DHS cybersecurity services. o Work with GSA to establish a list of credible private sector vendors who can provide services similar to those provided by DHS.
5. Build a Stronger Defense, Part IV: Take Steps to Secure the Vote Itself
• States should rapidly replace outdated and vulnerable voting systems. At a minimum, any machine purchased going forward should have a voter-verified paper trail and no WiFi capability. If use of paper ballots becomes more widespread, election officials should re-examine current practices for securing the chain of custody of all paper ballots and verify no opportunities exist for the introduction of fraudulent votes.
• States should consider implementing more widespread, statistically sound audits of election results.
• DHS should work with vendors to educate them about the vulnerabilities of both the machines and the supply chains.
6. Assistance for the States • The Committee recommends Congress urgently pass legislation increasing assistance and establishing a voluntary grant program for the states. o States should use grant funds to improve cybersecurity by hiring additional Information Technology staff, updating software, and contracting vendors to provide cybersecurity services, among other steps. o Funds should also be available to defray the costs of instituting audits. ”
See original here: https://www.burr.senate.gov/download/one-pager-recs-final-version-