Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Elections: The Hidden Security Danger for Governments

By Roy E. Hadley, Jr.
November 01, 2018

The news is replete with alleged actions of foreign governments and hackers trying to impact the democratic election process in the United States. What most people do not realize is that almost all elections, even national elections for the office of President, are actually run by state and local governments. As such, it is incumbent upon the state and local governments to ensure the security of all elections, which underpin the faith and trust in our democracy and our democratic process.

While there are many technical things that can be done to ensure the integrity of elections and the voting process, this article will attempt to focus on more holistic approaches to the security of elections. I note that the ideas expressed herein should not be thought of as an exhaustive list but more as a beginning for thinking about security measures.

Voting Machines

Voting machines should provide some kind of vote verification and authentication. While many machines provide an audit function, these audits are only as good as the security around the software and hardware that underpins the voting machines. As such, all voting machines should have a mechanism to create a paper record of a vote cast by a citizen. These paper records can then be used by the electoral board of the state or municipality to audit and authenticate all voting records.

If there is no paper record, the entity running the election is at the mercy of the data provided by the voting machines' software and hardware for not only the vote count but also the information used to conduct an audit. If the hardware or software has been compromised and miscounts or somehow otherwise alters a vote, that same compromise will probably rear its head in the audit, making such an audit virtually useless.

Passwords

All electoral systems, including voting machines, should have a requirement for very strong passwords with two-factor authentication. Many hacks on electoral systems, and on cyber systems in general, begin with stolen credentials. If two-factor authentication is not implemented, those stolen credentials can lead to havoc being reeked upon the electoral process.

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
Major Differences In UK, U.S. Copyright Laws Image

This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.

Strategy vs. Tactics: Two Sides of a Difficult Coin Image

With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.

The Article 8 Opt In Image

The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.

Removing Restrictive Covenants In New York Image

In Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?

Fresh Filings Image

Notable recent court filings in entertainment law.