59 online
 
Most Popular Choices
Share on Facebook 86 Printer Friendly Page More Sharing
Exclusive to OpEd News:
General News    H2'ed 1/22/17

Cyber-Security Expert Weighs in on Recount, Anonymous Threats and More

By       (Page 4 of 9 pages) Become a premium member to see this article and all articles as one long page.   No comments, 4 series
Follow Me on Twitter     Message Joan Brunwasser
Become a Fan
  (89 fans)

Instead, every potential victim has to defend against every possible threat vector, where every attacker has to find just one mistake. This is an asymmetric challenge, because even with the best security, almost every computer user is not only dependent on the security software in use, but the underlying network architecture and, below that, the programming that runs all of it -- all often supplied by different vendors.

We now have best practices that can mitigate the threat of penetrations or find and limit them once inside a network, but given the complexity of the network, the ability for a well-funded adversary to find even one mistake in any organization's digital defense grid is almost guaranteed.

This is where most of the work needs to be done by technology companies, technology users, and our government. The fundamental architecture of the Internet allows and exacerbates these flaws, and until we pretty much redesign everything from the ground up for security, we're going to be at risk.

That said, there are many good practices that can reduce the risk, practices that many people ignore. For example, way too many of us use terrible passwords and avoid the use of multi-factor authentication. I'm guessing that Mr. Podesta did not use MFA on his Gmail account, because it would have been much, much harder for the Wikileak attackers to get in if they had to have an authentication device on hand to access his account.

For the record, multi-factor authentication on Gmail (or almost all other online services) isn't some special service restricted to government leaders. MFA is available to anyone using any of those services and if you don't set up Gmail, Facebook, and your other services with multi-factor security, your personal information remains at great risk.

David Gewirtz
David Gewirtz
(Image by courtesy of the author)
  Details   DMCA

JB: Okay. Let's now move from the personal and the business to the electronic election system we have in place. How secure is it? How worried should we be, not necessarily about foreign attacks, but by any attacks at all? After all, look at all the multi-million or -billion dollar decisions that get made based on who wins the Oval Office and/or controls Congress in any given election cycle.

DG: Because each region chooses and manages its own voting machines, it's not really easy to make a blanket declaration about security. I'll tell you one thing: if you keep hearing about leaks and breaches on systems operated by federal, state, and local governments on an absurdly regular basis, you can be pretty sure that an electronic election system is equally at risk.

JB: Back to the recount. Where we seem to differ is on how to confirm the accuracy of the vote and whether that happened. I feel like the two of us are looking at the proverbial elephant from totally different angles. What I read and heard about was that the price of the recounts was jacked up to an almost insurmountable level, seriously predicating against concerned citizens' right to know.

Next Page  1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9

(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).

Rate It | View Ratings

Joan Brunwasser Social Media Pages: Facebook page url on login Profile not filled in       Twitter page url on login Profile not filled in       Linkedin page url on login Profile not filled in       Instagram page url on login Profile not filled in

Joan Brunwasser is a co-founder of Citizens for Election Reform (CER) which since 2005 existed for the sole purpose of raising the public awareness of the critical need for election reform. Our goal: to restore fair, accurate, transparent, secure elections where votes are cast in private and counted in public. Because the problems with electronic (computerized) voting systems include a lack of (more...)
 

Go To Commenting
The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.
Follow Me on Twitter     Writers Guidelines

 
Contact AuthorContact Author Contact EditorContact Editor Author PageView Authors' Articles
Support OpEdNews

OpEdNews depends upon can't survive without your help.

If you value this article and the work of OpEdNews, please either Donate or Purchase a premium membership.

STAY IN THE KNOW
If you've enjoyed this, sign up for our daily or weekly newsletter to get lots of great progressive content.
Daily Weekly     OpEd News Newsletter
Name
Email
   (Opens new browser window)
 

Other Series: View All 4 Articles in "recount"

Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

Interview with Dr. Margaret Flowers, Arrested Tuesday at Senate Roundtable on Health Care

Renowned Stanford Psychologist Carol Dweck on "Mindset: The New Psychology of Success"

Howard Zinn on "The People Speak," the Supreme Court and Haiti

Snopes confirms danger of Straight Ticket Voting (STV)

Fed Up With Corporate Tax Dodgers? Check Out PayUpNow.org!

Literary Agent Shares Trade Secrets With New Writers

To View Comments or Join the Conversation:

Tell A Friend