Southern California Counties Gird Elections Systems Ahead of 2018 Vote
|
|
- Warren Hicks
- 5 years ago
- Views:
Transcription
1 www. Govtech.com Southern California Counties Gird Elections Systems Ahead of 2018 Vote - p. 1 May 9, 2018 Southern California Counties Gird Elections Systems Ahead of 2018 Vote (TNS) At a recent conference on election security, Orange County Registrar of Voters Neal Kelley said he d asked former CIA Director Michael Hayden if Russian hackers will try to disrupt the 2018 mid-term elections. He didn t hesitate, Kelley recounted. He said, They will be targeting congressional races. In Southern California, home to some of the nation s most-competitive congressional contests, that threat is being taken seriously. Consider just a few of the many new security protocols being adopted by election officials in the four-county region. Office s are being encrypted and networks buttressed. Election employees are randomly being mock phished to see if they ll fall for simulated online invaders. Federal officials are being invited to inspect and test the region s many voting systems. Even the seemingly oldest of old-school safety protocols counting up some election results by hand is expected to play an expanded role in the 2018 midterms. The local upgrades are part of a national response to Russia s meddling in America s 2016 elections. Intelligence agencies have determined that, among other things,
2 www. Govtech.com Southern California Counties Gird Elections Systems Ahead of 2018 Vote - p. 2 Russian agents and their operatives executed a cyberattack on a U.S. voting software supplier, sent spear-phishing s to election officials, and targeted voter rolls in at least 21 states, breaching a small (but undisclosed) number of them. Since then, Congress has authorized $380 million to help states strengthen voting systems digital defenses, including $34 million earmarked to protect the integrity of elections in California. In the last weeks of the Obama administration, the Department of Homeland Security also designated state-run election systems as critical infrastructure, elevating them to the same classification as nuclear reactors and the Hoover Dam. And the FBI and other federal officials are offering free cybersecurity assessments to local election offices. To date, there s no evidence that votes were changed or voting machines infected during the 2016 cyberattacks. And election security experts say such threats are remote in any specific jurisdiction, and nearly impossible on a substantial scale. But the upcoming midterms are the first national election since And those same election experts caution that attacks remain feasible in some American elections systems, particularly if existing vulnerabilities aren t fixed. Risk is low; security high California s voting infrastructure is, in many ways, far more secure than those of most other states. Counties in California are legally required to keep paper ballots as fixed records of electronic voting tallies and to hand-count the ballots cast at one percent of all precincts to verify digital totals. That means even if voting machines are compromised, there s a physical backup to warn of a discrepancy. That s not true in 11 states, where voting equipment can t be audited manually and a hack that alters voting results could go entirely undetected. (Interestingly, most of the un-auditable, all-digital machines in those states were put into use after Florida s hanging-chad debacle during the 2000 presidential election scared officials away from punch-card voting systems to what were perceived as more reliable electronic machines.) Despite California s superior safeguards, cybersecurity experts say the state s voting systems remain susceptible to some forms of attack. Recognizing the threat, election officials in Los Angeles, Orange, San Bernardino and Riverside counties all said recently that they ve become more vigilant since the 2016 campaign and have welcomed help from federal agents to assess their systems. But implementing fixes has happened at different speeds across the region, with some counties addressing potential vulnerabilities more aggressively than others. The leader of the pack seems to be Orange County, where four congressional contests in longtime GOP-held districts are being targeted by national Democrats in their effort to take control of the House of Representatives. In April, Kelley released a 28-page 2018 Election Security Playbook outlining new security protocols his office has implemented: from improving its ability to detect network intrusions and malware, to encrypting its s, to enhancing building security,
3 www. Govtech.com Southern California Counties Gird Elections Systems Ahead of 2018 Vote - p. 3 to implementing a third-party cybersecurity audit, to randomly testing its employees by sending them faux phishing s and seeing if they bite. The most substantial of the county s new fixes is its risk-limiting audit a protection that verifies electronic tallies with an even higher degree of certainty by hand-counting a random sample of paper ballots, with the number of votes scrutinized corresponding to the margin of victory in a given race. Kelley knows firsthand that malicious actors are constantly probing local voting systems. At the election security conference, held at UC Irvine in March, Kelley revealed that he and Los Angeles County Registrar of Voters Dean Logan were contacted by federal officials in spring They warned Kelley that people using overseas IP addresses had prodded his office s networks in a move that was described as checking to see if the front door of your house was locked. Kelley said his office s defenses withstood the test, but he immediately worked to strengthen protections anyway. We ve reevaluated every piece of the voting system and process, identified potential vulnerabilities, and made sure those are solid and secure, said Kelley, who serves on a recently created federal 25-member election security council. Even though the risk is low, (the potential for hacking) is being taken very seriously, he said. And that should inspire voter confidence, just to know that there s a different approach being taken to elections than there was in In Los Angeles County, home to another one of the nation s most competitive congressional races, Logan has educated his staff on cyber threats by having them see firsthand how voting machines can be hacked. Last year, he sent members of his team to DEF CON in Las Vegas, one of the world s largest hacker conventions. There, at something called the Voting Machine Hacking Village, they watched white-hat hackers go through and show the vulnerability of voting systems, a process that helped Logan s office identify its own potential shortcomings. Since the 2016 elections, the office has upgraded its malware protection and mandated cybersecurity training for staff. It soon will implement vulnerabilityassessment and phishing exercises to further test its new systems. If we don t know those vulnerabilities, we can t respond to them, Logan said at the conference. San Bernardino County Registrar of Voters Michael Scarpello was more cryptic about what he d done to enhance election security in his jurisdiction. Scarpello said his office had been working with federal agents and the county s IT department to harden its voting systems, website and local voter registration database from attack. He noted the effort was partially in response to a heightened level of scrutiny, based on what s going on at a national level. Scarpello declined to identify any specific security system or protocol changes and even refused to disclose the federal agency his office worked with.
4 www. Govtech.com Southern California Counties Gird Elections Systems Ahead of 2018 Vote - p. 4 And in Riverside County, election officials say the FBI and Department of Homeland Security are helping to monitor their network traffic and supplying a list of IP addresses to watch out for. Riverside County Registrar of Voters Rebecca Spencer said the increased vigilance isn t in response to a July 2017 Time magazine cover story. In that article, the Riverside County District Attorney stated that hackers had changed a small number of county residents voter registration data in advance of the 2016 primary. And unnamed national cybersecurity officials said the incident may have been a test run by the Russians (to see) what kind of chaos they could unleash on Election Day. Since then, that version of events has been rebuffed by election officials. California Secretary of State Alex Padilla s office, which operates the state s voter registration database, said his office had no evidence that voter rolls were breached. And Spencer said her office had identified the cause of nearly all the voter roll changes, many of which occurred because voters simply forgot they had updated their information. Hacking your confidence Despite all the recent upgrades to Southern California s election infrastructure, cybersecurity experts say most voting systems even bolstered local ones still have vulnerabilities. Many Southern California polling places use 15-to-20-year-old voting machines with outdated operating systems that officials acknowledge are less secure than modern versions. While voting machines are tightly protected, some need to be programmed with a separate memory card, which, depending on the offices protocols, could be a vehicle for malicious code. And experts say some voting machines are serviced by outside vendors with varying security protocols, sometimes via computers that might occasionally be connected to the internet, providing a pathway for attack. Another feasible mode of attack, experts say, could target the state s voter registration system. Intruders might seek to change or delete portions of voter rolls in a way to deter citizens from voting similar to what was alleged in Riverside County. To prevent such a breach, Padilla s office has buttressed its information systems in advance of the 2018 elections by conducting an agency-wide security audit, enhancing its server security and replacing antiquated infrastructure. The state also has implemented increased 24/7 monitoring to detect and block potential strikes. I think we re in a much better place in 2016 because we really have our antennas up, UC Irvine law professor Jack Lerner, who studies electronic voting, said of California s system. I don t think we re totally safe unless we have a (mandatory risk-limiting) audit, the way experts have recommended. But we re in way better shape than other jurisdictions. Even if the elections systems are never breached, though, many election-security experts worry the intrusions and hacking attempts are damaging elections in a more intangible way.
5 www. Govtech.com Southern California Counties Gird Elections Systems Ahead of 2018 Vote - p. 5 Mary Beth Long, a former CIA intelligence officer and Assistant Secretary of Defense, said at the UC Irvine conference that a central aim of Russia s efforts is to foster distrust of the democratic process and amplify divisive dialogues by causing voters to think elections are able to be rigged. It sows discord, controversy and a real lack of confidence in our system And that has a tremendous impact in how we conduct ourselves, and how we move forward with our elections, Long said. We ll definitely see more (attempts) in 2018 and That knowledge has put election officials and others in a delicate position when deciding whether or not to sound the alarm about potential election security threats and the need to safeguard and modernize voting systems. Tread too softly, and the fixes might never come. Announce the vulnerabilities too loudly, and you risk cultivating skepticism among voters. There are election officials who worry that if voters know what the risks are, they might not come to the polling place, said Alex Halderman, a University of Michigan computer scientist who in 2017 testified before U.S. Senate Select Committee on Intelligence about cyber threats to U.S. elections. There are election officials who worry that if voters know what the risks are, they might not come to the polling place, said Alex Halderman, a University of Michigan computer scientist who in 2017 testified before U.S. Senate Select Committee on Intelligence about cyber threats to U.S. elections. But if we don t talk about them, nothing is ever going to get done The Orange County Register (Santa Ana, Calif.) Distributed by Tribune Content Agency, LLC.
Cybersecurity of Voting Machines
Statement from the Honorable Tom Schedler Louisiana Secretary of State Former President, National Association of Secretaries of State (NASS), Co-Chair, NASS Elections Committee Member, NASS Election Cybersecurity
More information2018 NASS IDEAS Award Application State of Colorado
2018 NASS IDEAS Award Application State of Colorado Nominating State Office: Secretary of State Wayne W. Williams 1700 Broadway, Suite 200 Denver, CO 80290 303-894-2200 Project Lead and Staff Contact for
More informationThe State of US Voting System Security DEFCON Voting Machine Hacking Village July 2017
The State of US Voting System Security DEFCON Voting Machine Hacking Village July 2017 Joshua M Franklin National Institute of Standards and Technology Election Fraud Types - 1934 Registration fraud Repeating
More informationGRAND JURY CASTS VOTE OF CONFIDENCE IN OC ELECTION PROCESS
GRAND JURY CASTS VOTE OF CONFIDENCE IN OC ELECTION PROCESS SUMMARY When Orange County voters go to the polls in February, can they trust their electronic voting machines? The 2007-2008 Orange County Grand
More informationCYBER SECURITY PROTECTION. Section III of the DOD Cyber Strategy
CYBER SECURITY PROTECTION Section III of the DOD Cyber Strategy Overview Build and maintain ready forces and capabilities to conduct cyberspace operations Defend the DOD information network, secure DOD
More informationCoalition for Good Governance 7035 Marching Duck Drive E504 Charlotte, NC
Coalition for Good Governance 7035 Marching Duck Drive E504 Charlotte, NC 28210 704 552 1618 October 29, 2017 Re: Open Letter to Georgia Municipal, County, and State Election Officials Dear Georgia Election
More information[Discussion Draft] [DISCUSSION DRAFT] SEPTEMBER 9, H. R. ll
F:\M\JOHNGA\JOHNGA_03.XML [Discussion Draft] 4TH CONGRESS 2D SESSION [DISCUSSION DRAFT] SEPTEMBER, H. R. ll To direct the Secretary of Homeland Security to conduct research and development to mitigate
More informationIN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA
IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ELECTRONIC PRIVACY INFORMATION CENTER 1718 Connecticut Avenue, N.W., Suite 200 Washington, D.C. 20009, Plaintiff, v. UNITED STATES DEPARTMENT
More informationSTATEMENT OF JAMES R. CLAPPER FORMER DIRECTOR OF NATIONAL INTELLIGENCE BEFORE THE
STATEMENT OF JAMES R. CLAPPER FORMER DIRECTOR OF NATIONAL INTELLIGENCE BEFORE THE COMMITTEE ON THE JUDICIARY SUBCOMMITTEE ON CRIME AND TERRORISM UNITED STATES SENATE CONCERNING RUSSIAN INTERFERENCE IN
More informationHospitals Face Steep Cybersecurity Challenges with Less Government Help
www. Govtech.com Hospitals Face Steep Cybersecurity Challenges with Less Government Help - p. 1 January 4, 2018 Hospitals Face Steep Cybersecurity Challenges with Less Government Help The Erie County Medical
More informationSenate Select Committee on Intelligence. July 3, 2018
Senate Select Committee on Intelligence July 3, 2018 The Senate Select Committee on Intelligence (SSCI) is conducting a bipartisan investigation into a wide range of Russian activities relating to the
More information2009 AT&T Business Continuity Study SOUTHERN CALIFORNIA Results
2009 AT&T Business Continuity Study SOUTHERN CALIFORNIA Results Methodology The following results are based on an online survey of 101 Information Technology (IT) executives in the Los Angeles, Orange
More informationUnited States Army. Criminal Investigation Command. Hunting The Hackers CCIU Detectives Deliver Digital Justice
United States Army Criminal Investigation Command Media contact: 571-305-4041 FOR IMMEDIATE RELEASE Hunting The Hackers CCIU Detectives Deliver Digital Justice By Colby Hauser CID Public Affairs QUANTICO,
More informationFederal Voting Assistance Program (FVAP) Department of Defense. Military Voter Training
Federal Voting Assistance Program (FVAP) Department of Defense Military Voter Training 1 Introduction If you wish to complete you Voter Registration and Absentee Ballot Request Form, click here. If you
More informationThe current Army operating concept is to Win in a complex
Army Expansibility Mobilization: The State of the Field Ken S. Gilliam and Barrett K. Parker ABSTRACT: This article provides an overview of key definitions and themes related to mobilization, especially
More informationKELLY HART & HALLMAN LLP
KELLY HART & HALLMAN LLP 201 MAIN STREET, SUITE 2500 FORT WORTH. TEXAS 76102 Telephone: (817) 332-2500 301 Congress. Suite 2000 Telecopy: (817) 878-9280 Austin, Texas 78701 Writer's Direct Dial: 817-878-3542
More informationVacancy Announcement
Vacancy Announcement ***When applying for this position, refer to "POSITION # 5345" on your application package.*** POSITION: Cybersecurity Senior Specialist (#5345) DEPARTMENT: Cybersecurity / Systems
More informationLAB4-W12: Nation Under Attack: Live Cyber- Exercise
LAB4-W12: Nation Under Attack: Live Cyber- Exercise A sophisticated cyberattack is in progress against the United States. Multiple industries are impacted and things are about to get much worse. How will
More informationThis Proposal has been Electronically Signed by the Authorized Organizational Representative (AOR).
Proposal Information Proposal Number 0433606 Collaborative Research: A Center for Correct, Usable, Reliable, Proposal Title Auditable and Transparent Elections (ACCURATE) Received on 03/31/04 Principal
More informationNATO Moving to Create New Intelligence Chief Post - WSJ
This copy is for your personal, non-commercial use only. To order presentation-ready copies for distribution to your colleagues, clients or customers visit http://www.djreprints.com. http://www.wsj.com/articles/nato-considers-new-intelligence-chief-post-1464968453
More informationAn Interview with Gen John E. Hyten
Commander, USSTRATCOM Conducted 27 July 2017 General John E. Hyten is Commander of US Strategic Command (USSTRATCOM), one of nine Unified Commands under the Department of Defense. USSTRATCOM is responsible
More informationMinutes Board of Trustees
Minutes Board of Trustees Action Without a Meeting September 14, 2009 On September 14, 2009, the members of the Board of Trustees of the North American Electric Reliability Corporation consented in writing
More informationFor Publication. August 2015
Dominion Voting Systems, Inc. Sequoia WinEDS Release 4.0.175, Version 2 For Publication August 2015 Florida Department of State R. A. Gray Building, Room 316 500 S. Bronough Street Tallahassee, FL 32399-0250
More informationRISK MANAGEMENT BULLETIN
Maryland s New License Plate Readers and Captured Plate Data Law Historically, privacy was almost implicit, because it was hard to find and gather information. But in the digital world, whether it's digital
More information8/11/2015. Navigation in the Meeting Room. Cyber Enabled Threats to Cleared Industry. Host: Rebecca Morgan Counterintelligence Instructor CDSE
Host: Rebecca Morgan Counterintelligence Instructor CDSE Guest: Jeffrey Burlette DSS Counterintelligence Directorate Producer: Sandy Vega CDSE Navigation in the Meeting Room Enlarge Screen Q & A Closed
More informationStudent Orientation: HIPAA Health Insurance Portability & Accountability Act
_ Student Orientation: HIPAA Health Insurance Portability & Accountability Act HIPAA: National Privacy Law History of HIPAA What was once an ethical responsibility to protect a patient s privacy is now
More informationSecurity Risk Analysis
Security Risk Analysis Risk analysis and risk management may be performed by reviewing and answering the following questions and keeping this review (with date and signature) for evidence of this analysis.
More informationProtecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information
Protecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information Mr. Brian D. Hughes Office of the Deputy Assistant Secretary of Defense for
More informationIntelligence Preparation of the Information and Communications Environment
Intelligence Preparation of the Information and Communications Environment By Jeffrey Carr While the Joint Intelligence Preparation of the Operational Environment (JIPOE) is for offensive purposes, this
More informationThe Uniformed and Overseas Citizens Absentee Voting Act: Background and Issues
Order Code RS20764 Updated March 8, 2007 The Uniformed and Overseas Citizens Absentee Voting Act: Background and Issues Summary Kevin J. Coleman Analyst in American National Government Government and Finance
More informationFreeway Complex Fire 11/15/08 11/17/08 After Action Report. Orange County Sheriff Department Emergency Management
Freeway Complex Fire 11/15/08 11/17/08 After Action Report Preface The intent of this After Action Report is to document the County of Orange s response efforts during the Santiago Fire from November 15-17,
More informationCourse Assistants and staff
IGA-240: CYBER AND INFORMATION OPERATIONS: TECHNOLOGY, POLICY AND THE LAW Fall 2017/18, T/Th 8:45 10:00am L230 Instructor Eric Rosenbach eric_rosenbach@hks.harvard.edu L-362 Course Assistants and staff
More informationAIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY UNDERSTANDING THE UNIQUE CHALLENGES OF THE CYBER DOMAIN. Kenneth J. Miller, Major, USAF
AU/ACSC/MILLER/AY10 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY UNDERSTANDING THE UNIQUE CHALLENGES OF THE CYBER DOMAIN by Kenneth J. Miller, Major, USAF A Short Research Paper Submitted to the Faculty
More informationNATO MEASURES ON ISSUES RELATING TO THE LINKAGE BETWEEN THE FIGHT AGAINST TERRORISM AND THE PROLIFERATION OF WEAPONS OF MASS DESTRUCTION
NATO MEASURES ON ISSUES RELATING TO THE LINKAGE BETWEEN THE FIGHT AGAINST TERRORISM AND THE PROLIFERATION OF WEAPONS OF MASS DESTRUCTION Executive Summary Proliferation of WMD NATO s 2009 Comprehensive
More informationHelp America Vote Act of 2002
Help America Vote Act of 2002 2010 Revisions (Update to Puerto Rico s State Plan - initial Plan submitted in Aug. 2003; two subsequent Plan Revisions submitted in 2004 and 2005) 1 December 13, 2009 Dear
More informationPrepared Statement of GEN (Ret) Keith B. Alexander*
Prepared Statement of GEN (Ret) Keith B. Alexander * on Cyber Warfare Today: Preparing for 21st Century Challenges in an Information-Enabled Society before the House Armed Services Committee April 11,
More informationTHE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 17, January 17, 2014
THE WHITE HOUSE Office of the Press Secretary For Immediate Release January 17, 2014 January 17, 2014 PRESIDENTIAL POLICY DIRECTIVE/PPD-28 SUBJECT: Signals Intelligence Activities The United States, like
More information(U) Summary Table of Findings
(U) Summary Table of Findings CHAPTER 1: RUSS'IAN CAMPAIGNS IN EUROPE ( U) Finding #1: The Kremlin exploits free or independent media spaces and open democra - cies to conduct active measures in Europe.
More informationSecurity Update. Kenneth E. Eultgen, Jr. Director of Homeland Security Union Pacific Railroad 2008
Security Update Kenneth E. Eultgen, Jr. Director of Homeland Security Union Pacific Railroad 2008 The Rail Network Is Vital to the Nations Economy, National Defense and Public Health 64% of coal used for
More informationDifferences Between House and Senate FY 2019 NDAA on Major Nuclear Provisions
Differences Between House and Senate FY 2019 NDAA on Major Nuclear Provisions Topline President s Request House Approved Senate Approved Department of Defense base budget $617.1 billion $616.7 billion
More informationSocial Engineering & How to Counteract Advanced Attacks. Joe Ferrara, President and CEO Wombat Security Technologies, Inc.
Social Engineering & How to Counteract Advanced Attacks Joe Ferrara, President and CEO Wombat Security Technologies, Inc. Agenda Social Engineering DEFCON Competition Recent Examples Countermeasures What
More informationChecklist for Minimum Security Procedures for Voting Systems 1S Section (4),F.S.
County: Date Received: Start review date: End review date: Reviewed by: Eleonor G. Lipman Signature: Date : Reviewed by: Signature: Date : REFERENCE REQUIREMENT 1. Purpose: This checklist provides the
More informationPrepared Remarks for the Honorable Richard V. Spencer Secretary of the Navy Defense Science Board Arlington, VA 01 November 2017
Prepared Remarks for the Honorable Richard V. Spencer Secretary of the Navy Defense Science Board Arlington, VA 01 November 2017 Thank you for the invitation to speak to you today. It s a real pleasure
More informationCOUNTING VOTES 2012: A State by State look at Voting Technology Preparedness
COUNTING VOTES 2012: A State by State look at Voting Technology Preparedness Executive Summary Susannah Goodman Common Cause Education Fund Michelle Mulder Rutgers School of Law - Newark Constitutional
More informationVolunteer Action Network Toolkit: PASSING A LOCAL RESOLUTION
Volunteer Action Network Toolkit: PASSING A LOCAL RESOLUTION Passing a Local Resolution Local government resolutions, proclamations or declarations expressions of support from an elected city or county
More informationPRESS RELEASE. Chester County Law Enforcement Is Prepared for Active Threat Incidents
CHESTER COUNTY DISTRICT ATTORNEY S OFFICE TELEPHONE: 610-344-6801 FAX: 610-344-5905 THOMAS P. HOGAN DISTRICT ATTORNEY 201 W. MARKET STREET, SUITE 4450 POST OFFICE BOX 2748 WEST CHESTER, PA 19380-0991 March
More informationVoting Systems Testing Board Major Deficiencies Report Hart InterCivic
STATE OF COLORADO Department of State 1700 Broadway Suite 250 Denver, CO 80290 Mike Coffman Secretary of State Holly Z. Lowder Director of Elections Voting Systems Testing Board Major Deficiencies Report
More informationFor Immediate Release October 7, 2011 EXECUTIVE ORDER
THE WHITE HOUSE Office of the Press Secretary For Immediate Release October 7, 2011 EXECUTIVE ORDER - - - - - - - STRUCTURAL REFORMS TO IMPROVE THE SECURITY OF CLASSIFIED NETWORKS AND THE RESPONSIBLE SHARING
More informationLearning from Critical Incidents Michael A. Stoto, PhD Georgetown University
Learning from Critical Incidents Michael A. Stoto, PhD Georgetown University Learning from critical incidents The only way to really know how well a public health emergency preparedness system will perform
More informationDepartment of Defense INSTRUCTION. SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems
Department of Defense INSTRUCTION NUMBER 8582.01 June 6, 2012 Incorporating Change 1, October 27, 2017 SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems References: See Enclosure
More informationUNITED STATES SENATE
Stenographic Transcript Before the COMMITTEE ON ARMED SERVICES UNITED STATES SENATE HEARING TO RECEIVE TESTIMONY ON ENCRYPTION AND CYBER MATTERS Tuesday, September 13, 2016 Washington, D.C. ALDERSON COURT
More informationNRC REGULATORY ISSUE SUMMARY TRANSPORTATION OF RADIOACTIVE MATERIAL QUANTITIES OF CONCERN NRC THREAT ADVISORY AND PROTECTIVE MEASURES SYSTEM
SAFEGUARDS INFORMATION-MODIFIED HANDLING UNITED STATES NUCLEAR REGULATORY COMMISSION OFFICE OF NUCLEAR REACTOR REGULATION OFFICE OF NUCLEAR MATERIALS SAFETY AND SAFEGUARDS WASHINGTON. D.C. 20555-0001 July
More informationSecurity Risk Analysis and 365 Days of Meaningful Use. Rodney Gauna & Val Tuerk, Object Health
Security Risk Analysis and 365 Days of Meaningful Use Rodney Gauna & Val Tuerk, Object Health 2 3 Agenda Guidelines for Conducting a Security Risk Analysis Scope of Analysis Risk of a Breach Security Risks
More informationBoard of Supervisors' Agenda Items
A. Roll Call COUNTY OF SAN DIEGO BOARD OF SUPERVISORS REGULAR MEETING MEETING AGENDA WEDNESDAY, MARCH 16, 2016, 9:00 A.M. BOARD OF SUPERVISORS NORTH CHAMBER 1600 PACIFIC HIGHWAY, ROOM 310, SAN DIEGO, CALIFORNIA
More informationELECTIONS 166 GENERAL GOVERNMENT. Mission Statement. Mandates. Expenditure Budget: $2,015, % of General Government
Mission Statement The mission of the Office of Elections is to: Provide equal opportunity for all qualified citizens of Prince William County to register to vote Maintain accurate voter records used in
More informationHomeland/National Security
Homeland/National Security May 215 Needs Assessment Prepared by Danielle Pearson Date: May 19, 215 Homeland/National Security Homeland/National Security Page 1 Scope Data compiled in this rept covers San
More informationA Tool to Inject Credible Warfighter-Focused Non- Kinetic Attack Effects into the BMDS M&S Environment
A Tool to Inject Credible Warfighter-Focused Non- Kinetic Attack Effects into the BMDS M&S Environment SMD Symposium 2018 Denise Jefferson Software Engineer Northrop Grumman Today s Threats Ballistic Missile
More informationRECOMMENDED CITATION: Pew Research Center, September 2014, Bipartisan Support for Obama s Military Campaign Against ISIS
NUMBERS, FACTS AND TRENDS SHAPING THE WORLD FOR RELEASE SEPTEMBER 15, 2014 FOR FURTHER INFORMATION ON THIS REPORT: Carroll Doherty, Director of Political Research Alec Tyson, Senior Researcher Rachel Weisel,
More informationDEPARTMENT OF HOMELAND SECURITY REORGANIZATION PLAN November 25, 2002
DEPARTMENT OF HOMELAND SECURITY REORGANIZATION PLAN November 25, 2002 Introduction This Reorganization Plan is submitted pursuant to Section 1502 of the Department of Homeland Security Act of 2002 ( the
More informationGerontology. September 2014 Needs Assessment. Gerontology Needs Assessment Page 1. Prepared by Danielle Pearson Date: September 11, 2014 Gerontology
Gerontology September 2014 Needs Assessment Prepared by Danielle Pearson Date: September 11, 2014 Gerontology Gerontology Needs Assessment Page 1 Scope Data compiled in this report covers San Bernardino,
More informationNuclear/Radiological Outreach
Nuclear/Radiological Outreach Bernadette R. Bland, Supervisory Special Agent Countermeasures Oscar R. Hernandez, SNL IPA Intelligence Analysis OFFICIAL USE ONLY 1 Overview FBI Jurisdiction WMD Directorate
More informationChapter 9 Legal Aspects of Health Information Management
Chapter 9 Legal Aspects of Health Information Management EXERCISE 9-1 Legal and Regulatory Terms 1. T 2. F 3. F 4. F 5. F EXERCISE 9-2 Maintaining the Patient Record in the Normal Course of Business 1.
More informationPURCHASING DEPARTMENT
PURCHASING DEPARTMENT September 10, 2018 General Information 1 RFP # 2018-049-6742 REQUEST FOR PROPOSALS FOR ELECTIONS ELECTRONIC POLL BOOK THIS DOCUMENT IS BEING PROVIDED FOR GENERAL INFORMATION PURPOSES
More informationINTRODUCTION TO Mobile Diagnostic Imaging. A quick-start guide designed to help you learn the basics of mobile diagnostic imaging
INTRODUCTION TO Mobile Diagnostic Imaging A quick-start guide designed to help you learn the basics of mobile diagnostic imaging INTRODUCTION TO Mobile Diagnostic Imaging TABLE OF CONTENTS How does mobile
More informationNational Defense University. Institute for National Strategic Studies
National Defense University Institute for National Strategic Studies Interim Research Work Plan National Defense University Institute for National Strategic Studies Interim Research Work Plan Contents
More informationBlueprint for CYBER SECURITY in HEALTH AND CARE. June bcs.org/blueprint
Blueprint for CYBER SECURITY in HEALTH AND CARE June 2017 bcs.org/blueprint In health and care we have dedicated digital teams striving to protect our patients and public. I believe it is right to recognise
More informationCAPT Jody Grady, USN USCYBERCOM LNO to USPACOM
1 CAPT Jody Grady, USN USCYBERCOM LNO to USPACOM The overall classification of this briefing is: Classified By: jhgrady Derived From: USCYBERCOM SCG Dated: 20150415 2 3 4 Organizational Structure Commander
More informationVoting System Qualification Test Report Election Systems & Software, LLC
Election Systems & Software, LLC EVS Release 4.5.2.0, Version 1 For Publication June 2016 Florida Department of State R. A. Gray Building, Room 316 500 S. Bronough Street Tallahassee, FL 32399-0250 Contents
More information2013 Lien Conference on Public Administration Singapore
Dean Jack H. Knott Price School of Public Policy University of Southern California 2013 Lien Conference on Public Administration Singapore It s great to be here. I want to say how honored I am to participate
More informationPRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Advanced Skills Management (ASM) U.S. Navy, NAVSEA Division Keyport SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD) information system or
More informationMyDistrictBuilder Building Districts in the Clouds
MyDistrictBuilder Building Districts in the Clouds Presentation to: NCSL National Redistricting Seminar By: Bob West and J. Alex Kelly House Office of Reapportionment Florida House of Representatives Tuesday,
More informationFY 2017 Year In Review
WEINGART FOUNDATION FY 2017 Year In Review ANGELA CARR, BELEN VARGAS, JOYCE YBARRA With the announcement of our equity commitment in August 2016, FY 2017 marked a year of transition for the Weingart Foundation.
More informationWBUR Poll Survey of 500 Registered Nurses in Massachusetts Field Dates: October 5-10, 2018
Conducted for WBUR by WBUR Poll Survey of 500 Registered Nurses in Massachusetts Field Dates: October 5-10, 2018 Which of the following best describes your main place of work as a nurse? A teaching hospital
More informationAlso this week, we celebrate the signing of the New START Treaty, which was ratified and entered into force in 2011.
April 9, 2015 The Honorable Barack Obama The White House Washington, DC 20500 Dear Mr. President: Six years ago this week in Prague you gave hope to the world when you spoke clearly and with conviction
More informationSummary & Recommendations
Summary & Recommendations Since 2008, the US has dramatically increased its lethal targeting of alleged militants through the use of weaponized drones formally called unmanned aerial vehicles (UAV) or
More informationCITY AND COUNTY OF SAN FRANCISCO DEPARTMENT OF ELECTIONS
CITY AND COUNTY OF SAN FRANCISCO DEPARTMENT OF ELECTIONS ADDENDUM #1 ISSUSED ON May 13, 2005 REQUEST FOR PROPOSALS FOR A NEW VOTING SYSTEM RFP#NVS0305 1) Please add and substitute the following Addendum
More informationFederal Funding for Homeland Security. B Border and transportation security Encompasses airline
CBO Federal Funding for Homeland Security A series of issue summaries from the Congressional Budget Office APRIL 30, 2004 The tragic events of September 11, 2001, have brought increased Congressional and
More informationCity of Torrance Police Department
City of Torrance Police Department Testimony of John J. Neu Chief of Police Hearing on Radicalization, Information Sharing and Community Outreach: Protecting the Homeland from Homegrown Terror United States
More informationPatient Safety Reporting System for Nursing Homes Patient Safety Authority Commonwealth of Pennsylvania. Government to Business (G to B)
Patient Safety Reporting System for Nursing Homes Patient Safety Authority Commonwealth of Pennsylvania Government to Business (G to B) Prepared by: Howard Newstadt, JD, MBA CIO/Finance Manager Pennsylvania
More informationU.S. Election Assistance Commission Testimony before the U.S. Senate Committee on Armed Services September 28, 2006
Good morning Chairman Warner and Members of the Committee. I am pleased to be here this morning on behalf of the U.S. Election Assistance Commission (EAC) to discuss the responsibility EAC has in supporting
More informationINTRADEPARTMENTAL CORRESPONDENCE. June 7, 2016 BPC #
INTRADEPARTMENTAL CORRESPONDENCE June 7, 2016 BPC #16-0173 1.0 TO: The Honorable Board of Police Commissioners FROM: Inspector General, Police Commission SUBJECT: OFFICE OF THE INSPECTOR GENERAL INVESTIGATION
More informationEAC Survey. Pat Wolfe Elections Administrator
EAC Survey Pat Wolfe Elections Administrator EAC Survey Election Assistance Commission (EAC) issues survey every two years Required by the Help America Vote Act (HAVA) Survey gathers information on federal
More informationBay Area UASI. Introduction to the Bay Area UASI (Urban Areas Security Initiative) Urban Shield Task Force Meeting
Bay Area UASI Introduction to the Bay Area UASI (Urban Areas Security Initiative) Urban Shield Task Force Meeting 1221 Oak Street Room 225, Oakland, CA March 10, 2017 About the Bay Area UASI Its mission
More informationDepartment of Defense INSTRUCTION. DoD Unclassified Controlled Nuclear Information (UCNI)
Department of Defense INSTRUCTION NUMBER 5210.83 July 12, 2012 Incorporating Change 1, Effective February 22, 2018 USD(I) SUBJECT: DoD Unclassified Controlled Nuclear Information (UCNI) References: See
More informationAttorney General's Guidelines for Domestic FBI Operations V2.0
ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DNHISBS Page 1 of 2 Attorney General's Guidelines for Domestic FBI Operations V2.0 Module 1: Introduction Overview This training
More informationRunning a Bug Bounty Program
Running a Bug Bounty Program Julian Berton Application Security Engineer at SEEK Web developer in a previous life Climber of rocks Contact Twitter - @JulianBerton LinkedIn - julianberton Website - julianberton.com
More informationNational Special Security Events
National Special Security Events 1 INVESTIGATIONS One Agency - Two Missions 1865 - established within Treasury Department to suppress counterfeiting during U.S. Civil War PROTECTION 1902 - formally authorized
More informationTechnology Standards of Practice
2016 Technology Standards of Practice Used with permission from the Association of Social Work Boards (2016) Table of Contents Technology Standards of Practice 2 Definitions 2 Section 1 Practitioner Competence
More informationThe Role of Exercises in Training the Nation's Cyber First-Responders
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2004 Proceedings Americas Conference on Information Systems (AMCIS) December 2004 The Role of Exercises in Training the Nation's
More informationSecond Line of Defense Program
Preprint UCRL-JC-135067 Second Line of Defense Program L. Cantuti, L. Thomas This article was submitted to The Institute of Nuclear Materials Management Phoenix, AZ, July 26-29, 1999 July 15, 1999 U.S.
More informationDe Anza College Office of Institutional Research and Planning
De Anza College Office of Institutional Research and Planning To: Senior Staff From: Mallory Newell, De Anza Researcher Date: 12/21/2016 Subject: Associate Degrees for - Outcomes 2014-15 and 2015-16 In
More informationCASE STUDY. Denton County s Smooth Transition to Paper-Ballot Elections
CASE STUDY Denton County s Smooth Transition to Paper-Ballot Elections CASE STUDY: DENTON COUNTY S SMOOTH TRANSITION TO PAPER-BALLOT ELECTIONS Acceptance testing Verity Scan in-person digital scanners
More information1
Understanding Iran s Nuclear Issue Why has the Security Council ordered Iran to stop enrichment? Because the technology used to enrich uranium to the level needed for nuclear power can also be used to
More informationTECHNOLOGY SOLUTIONS TO ADVANCE MILITARY & OVERSEAS VOTING CSG OVERSEAS VOTING INITIATIVE TECHNOLOGY WORKING GROUP NASED - FEBRUARY 17, 2017
TECHNOLOGY SOLUTIONS TO ADVANCE MILITARY & OVERSEAS VOTING CSG OVERSEAS VOTING INITIATIVE TECHNOLOGY WORKING GROUP NASED - FEBRUARY 17, 2017 OVERVIEW OF CSG OVERSEAS VOTING INITIATIVE & THE TECHNOLOGY
More informationA Deep Dive into the Privacy Landscape
A Deep Dive into the Privacy Landscape David Goodis Assistant Commissioner Information and Privacy Commissioner of Ontario Canadian Institute Advertising & Marketing Law January 22, 2018 Who is the Information
More informationCYBER ATTACK SCENARIO
SCENARIO A disgruntled former hospital employee with exceptional computer skills hacks into the hospital network from their home computer and plants a very aggressive computer virus into the Computer-Aided
More informationPRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Marine Sierra Hotel Aviation Readiness Program (M-SHARP) Department of the Navy - United States Marine Corps (USMC) SECTION 1: IS A PIA REQUIRED? a. Will this Department
More informationMedicare Fraud Strike Force Teams Turn Up The HEAT. By Craig A. Conway, J.D., LL.M.
Medicare Fraud Strike Force Teams Turn Up The HEAT By Craig A. Conway, J.D., LL.M. caconway@central.uh.edu Federal agents have been serving warrants, conducting raids, and making arrests across Houston,
More informationSTARTUP INTELLIGENCE STARTUP ACCELERATION
STARTUP INTELLIGENCE STARTUP ACCELERATION STARTUP INTELLIGENCE 50m startups forming each year. 1.35m high-tech startups. Source: Global Entrepreneurship Monitor 2015. Which startups are relevant? Which
More informationThe Uniformed and Overseas Citizens Absentee Voting Act: Overview and Issues
The Uniformed and Overseas Citizens Absentee Voting Act: Overview and Issues Kevin J. Coleman Analyst in Elections October 4, 2012 CRS Report for Congress Prepared for Members and Committees of Congress
More information