Southern California Counties Gird Elections Systems Ahead of 2018 Vote

Size: px
Start display at page:

Download "Southern California Counties Gird Elections Systems Ahead of 2018 Vote"

Transcription

1 www. Govtech.com Southern California Counties Gird Elections Systems Ahead of 2018 Vote - p. 1 May 9, 2018 Southern California Counties Gird Elections Systems Ahead of 2018 Vote (TNS) At a recent conference on election security, Orange County Registrar of Voters Neal Kelley said he d asked former CIA Director Michael Hayden if Russian hackers will try to disrupt the 2018 mid-term elections. He didn t hesitate, Kelley recounted. He said, They will be targeting congressional races. In Southern California, home to some of the nation s most-competitive congressional contests, that threat is being taken seriously. Consider just a few of the many new security protocols being adopted by election officials in the four-county region. Office s are being encrypted and networks buttressed. Election employees are randomly being mock phished to see if they ll fall for simulated online invaders. Federal officials are being invited to inspect and test the region s many voting systems. Even the seemingly oldest of old-school safety protocols counting up some election results by hand is expected to play an expanded role in the 2018 midterms. The local upgrades are part of a national response to Russia s meddling in America s 2016 elections. Intelligence agencies have determined that, among other things,

2 www. Govtech.com Southern California Counties Gird Elections Systems Ahead of 2018 Vote - p. 2 Russian agents and their operatives executed a cyberattack on a U.S. voting software supplier, sent spear-phishing s to election officials, and targeted voter rolls in at least 21 states, breaching a small (but undisclosed) number of them. Since then, Congress has authorized $380 million to help states strengthen voting systems digital defenses, including $34 million earmarked to protect the integrity of elections in California. In the last weeks of the Obama administration, the Department of Homeland Security also designated state-run election systems as critical infrastructure, elevating them to the same classification as nuclear reactors and the Hoover Dam. And the FBI and other federal officials are offering free cybersecurity assessments to local election offices. To date, there s no evidence that votes were changed or voting machines infected during the 2016 cyberattacks. And election security experts say such threats are remote in any specific jurisdiction, and nearly impossible on a substantial scale. But the upcoming midterms are the first national election since And those same election experts caution that attacks remain feasible in some American elections systems, particularly if existing vulnerabilities aren t fixed. Risk is low; security high California s voting infrastructure is, in many ways, far more secure than those of most other states. Counties in California are legally required to keep paper ballots as fixed records of electronic voting tallies and to hand-count the ballots cast at one percent of all precincts to verify digital totals. That means even if voting machines are compromised, there s a physical backup to warn of a discrepancy. That s not true in 11 states, where voting equipment can t be audited manually and a hack that alters voting results could go entirely undetected. (Interestingly, most of the un-auditable, all-digital machines in those states were put into use after Florida s hanging-chad debacle during the 2000 presidential election scared officials away from punch-card voting systems to what were perceived as more reliable electronic machines.) Despite California s superior safeguards, cybersecurity experts say the state s voting systems remain susceptible to some forms of attack. Recognizing the threat, election officials in Los Angeles, Orange, San Bernardino and Riverside counties all said recently that they ve become more vigilant since the 2016 campaign and have welcomed help from federal agents to assess their systems. But implementing fixes has happened at different speeds across the region, with some counties addressing potential vulnerabilities more aggressively than others. The leader of the pack seems to be Orange County, where four congressional contests in longtime GOP-held districts are being targeted by national Democrats in their effort to take control of the House of Representatives. In April, Kelley released a 28-page 2018 Election Security Playbook outlining new security protocols his office has implemented: from improving its ability to detect network intrusions and malware, to encrypting its s, to enhancing building security,

3 www. Govtech.com Southern California Counties Gird Elections Systems Ahead of 2018 Vote - p. 3 to implementing a third-party cybersecurity audit, to randomly testing its employees by sending them faux phishing s and seeing if they bite. The most substantial of the county s new fixes is its risk-limiting audit a protection that verifies electronic tallies with an even higher degree of certainty by hand-counting a random sample of paper ballots, with the number of votes scrutinized corresponding to the margin of victory in a given race. Kelley knows firsthand that malicious actors are constantly probing local voting systems. At the election security conference, held at UC Irvine in March, Kelley revealed that he and Los Angeles County Registrar of Voters Dean Logan were contacted by federal officials in spring They warned Kelley that people using overseas IP addresses had prodded his office s networks in a move that was described as checking to see if the front door of your house was locked. Kelley said his office s defenses withstood the test, but he immediately worked to strengthen protections anyway. We ve reevaluated every piece of the voting system and process, identified potential vulnerabilities, and made sure those are solid and secure, said Kelley, who serves on a recently created federal 25-member election security council. Even though the risk is low, (the potential for hacking) is being taken very seriously, he said. And that should inspire voter confidence, just to know that there s a different approach being taken to elections than there was in In Los Angeles County, home to another one of the nation s most competitive congressional races, Logan has educated his staff on cyber threats by having them see firsthand how voting machines can be hacked. Last year, he sent members of his team to DEF CON in Las Vegas, one of the world s largest hacker conventions. There, at something called the Voting Machine Hacking Village, they watched white-hat hackers go through and show the vulnerability of voting systems, a process that helped Logan s office identify its own potential shortcomings. Since the 2016 elections, the office has upgraded its malware protection and mandated cybersecurity training for staff. It soon will implement vulnerabilityassessment and phishing exercises to further test its new systems. If we don t know those vulnerabilities, we can t respond to them, Logan said at the conference. San Bernardino County Registrar of Voters Michael Scarpello was more cryptic about what he d done to enhance election security in his jurisdiction. Scarpello said his office had been working with federal agents and the county s IT department to harden its voting systems, website and local voter registration database from attack. He noted the effort was partially in response to a heightened level of scrutiny, based on what s going on at a national level. Scarpello declined to identify any specific security system or protocol changes and even refused to disclose the federal agency his office worked with.

4 www. Govtech.com Southern California Counties Gird Elections Systems Ahead of 2018 Vote - p. 4 And in Riverside County, election officials say the FBI and Department of Homeland Security are helping to monitor their network traffic and supplying a list of IP addresses to watch out for. Riverside County Registrar of Voters Rebecca Spencer said the increased vigilance isn t in response to a July 2017 Time magazine cover story. In that article, the Riverside County District Attorney stated that hackers had changed a small number of county residents voter registration data in advance of the 2016 primary. And unnamed national cybersecurity officials said the incident may have been a test run by the Russians (to see) what kind of chaos they could unleash on Election Day. Since then, that version of events has been rebuffed by election officials. California Secretary of State Alex Padilla s office, which operates the state s voter registration database, said his office had no evidence that voter rolls were breached. And Spencer said her office had identified the cause of nearly all the voter roll changes, many of which occurred because voters simply forgot they had updated their information. Hacking your confidence Despite all the recent upgrades to Southern California s election infrastructure, cybersecurity experts say most voting systems even bolstered local ones still have vulnerabilities. Many Southern California polling places use 15-to-20-year-old voting machines with outdated operating systems that officials acknowledge are less secure than modern versions. While voting machines are tightly protected, some need to be programmed with a separate memory card, which, depending on the offices protocols, could be a vehicle for malicious code. And experts say some voting machines are serviced by outside vendors with varying security protocols, sometimes via computers that might occasionally be connected to the internet, providing a pathway for attack. Another feasible mode of attack, experts say, could target the state s voter registration system. Intruders might seek to change or delete portions of voter rolls in a way to deter citizens from voting similar to what was alleged in Riverside County. To prevent such a breach, Padilla s office has buttressed its information systems in advance of the 2018 elections by conducting an agency-wide security audit, enhancing its server security and replacing antiquated infrastructure. The state also has implemented increased 24/7 monitoring to detect and block potential strikes. I think we re in a much better place in 2016 because we really have our antennas up, UC Irvine law professor Jack Lerner, who studies electronic voting, said of California s system. I don t think we re totally safe unless we have a (mandatory risk-limiting) audit, the way experts have recommended. But we re in way better shape than other jurisdictions. Even if the elections systems are never breached, though, many election-security experts worry the intrusions and hacking attempts are damaging elections in a more intangible way.

5 www. Govtech.com Southern California Counties Gird Elections Systems Ahead of 2018 Vote - p. 5 Mary Beth Long, a former CIA intelligence officer and Assistant Secretary of Defense, said at the UC Irvine conference that a central aim of Russia s efforts is to foster distrust of the democratic process and amplify divisive dialogues by causing voters to think elections are able to be rigged. It sows discord, controversy and a real lack of confidence in our system And that has a tremendous impact in how we conduct ourselves, and how we move forward with our elections, Long said. We ll definitely see more (attempts) in 2018 and That knowledge has put election officials and others in a delicate position when deciding whether or not to sound the alarm about potential election security threats and the need to safeguard and modernize voting systems. Tread too softly, and the fixes might never come. Announce the vulnerabilities too loudly, and you risk cultivating skepticism among voters. There are election officials who worry that if voters know what the risks are, they might not come to the polling place, said Alex Halderman, a University of Michigan computer scientist who in 2017 testified before U.S. Senate Select Committee on Intelligence about cyber threats to U.S. elections. There are election officials who worry that if voters know what the risks are, they might not come to the polling place, said Alex Halderman, a University of Michigan computer scientist who in 2017 testified before U.S. Senate Select Committee on Intelligence about cyber threats to U.S. elections. But if we don t talk about them, nothing is ever going to get done The Orange County Register (Santa Ana, Calif.) Distributed by Tribune Content Agency, LLC.

Cybersecurity of Voting Machines

Cybersecurity of Voting Machines Statement from the Honorable Tom Schedler Louisiana Secretary of State Former President, National Association of Secretaries of State (NASS), Co-Chair, NASS Elections Committee Member, NASS Election Cybersecurity

More information

2018 NASS IDEAS Award Application State of Colorado

2018 NASS IDEAS Award Application State of Colorado 2018 NASS IDEAS Award Application State of Colorado Nominating State Office: Secretary of State Wayne W. Williams 1700 Broadway, Suite 200 Denver, CO 80290 303-894-2200 Project Lead and Staff Contact for

More information

The State of US Voting System Security DEFCON Voting Machine Hacking Village July 2017

The State of US Voting System Security DEFCON Voting Machine Hacking Village July 2017 The State of US Voting System Security DEFCON Voting Machine Hacking Village July 2017 Joshua M Franklin National Institute of Standards and Technology Election Fraud Types - 1934 Registration fraud Repeating

More information

GRAND JURY CASTS VOTE OF CONFIDENCE IN OC ELECTION PROCESS

GRAND JURY CASTS VOTE OF CONFIDENCE IN OC ELECTION PROCESS GRAND JURY CASTS VOTE OF CONFIDENCE IN OC ELECTION PROCESS SUMMARY When Orange County voters go to the polls in February, can they trust their electronic voting machines? The 2007-2008 Orange County Grand

More information

CYBER SECURITY PROTECTION. Section III of the DOD Cyber Strategy

CYBER SECURITY PROTECTION. Section III of the DOD Cyber Strategy CYBER SECURITY PROTECTION Section III of the DOD Cyber Strategy Overview Build and maintain ready forces and capabilities to conduct cyberspace operations Defend the DOD information network, secure DOD

More information

Coalition for Good Governance 7035 Marching Duck Drive E504 Charlotte, NC

Coalition for Good Governance 7035 Marching Duck Drive E504 Charlotte, NC Coalition for Good Governance 7035 Marching Duck Drive E504 Charlotte, NC 28210 704 552 1618 October 29, 2017 Re: Open Letter to Georgia Municipal, County, and State Election Officials Dear Georgia Election

More information

[Discussion Draft] [DISCUSSION DRAFT] SEPTEMBER 9, H. R. ll

[Discussion Draft] [DISCUSSION DRAFT] SEPTEMBER 9, H. R. ll F:\M\JOHNGA\JOHNGA_03.XML [Discussion Draft] 4TH CONGRESS 2D SESSION [DISCUSSION DRAFT] SEPTEMBER, H. R. ll To direct the Secretary of Homeland Security to conduct research and development to mitigate

More information

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ELECTRONIC PRIVACY INFORMATION CENTER 1718 Connecticut Avenue, N.W., Suite 200 Washington, D.C. 20009, Plaintiff, v. UNITED STATES DEPARTMENT

More information

STATEMENT OF JAMES R. CLAPPER FORMER DIRECTOR OF NATIONAL INTELLIGENCE BEFORE THE

STATEMENT OF JAMES R. CLAPPER FORMER DIRECTOR OF NATIONAL INTELLIGENCE BEFORE THE STATEMENT OF JAMES R. CLAPPER FORMER DIRECTOR OF NATIONAL INTELLIGENCE BEFORE THE COMMITTEE ON THE JUDICIARY SUBCOMMITTEE ON CRIME AND TERRORISM UNITED STATES SENATE CONCERNING RUSSIAN INTERFERENCE IN

More information

Hospitals Face Steep Cybersecurity Challenges with Less Government Help

Hospitals Face Steep Cybersecurity Challenges with Less Government Help www. Govtech.com Hospitals Face Steep Cybersecurity Challenges with Less Government Help - p. 1 January 4, 2018 Hospitals Face Steep Cybersecurity Challenges with Less Government Help The Erie County Medical

More information

Senate Select Committee on Intelligence. July 3, 2018

Senate Select Committee on Intelligence. July 3, 2018 Senate Select Committee on Intelligence July 3, 2018 The Senate Select Committee on Intelligence (SSCI) is conducting a bipartisan investigation into a wide range of Russian activities relating to the

More information

2009 AT&T Business Continuity Study SOUTHERN CALIFORNIA Results

2009 AT&T Business Continuity Study SOUTHERN CALIFORNIA Results 2009 AT&T Business Continuity Study SOUTHERN CALIFORNIA Results Methodology The following results are based on an online survey of 101 Information Technology (IT) executives in the Los Angeles, Orange

More information

United States Army. Criminal Investigation Command. Hunting The Hackers CCIU Detectives Deliver Digital Justice

United States Army. Criminal Investigation Command. Hunting The Hackers CCIU Detectives Deliver Digital Justice United States Army Criminal Investigation Command Media contact: 571-305-4041 FOR IMMEDIATE RELEASE Hunting The Hackers CCIU Detectives Deliver Digital Justice By Colby Hauser CID Public Affairs QUANTICO,

More information

Federal Voting Assistance Program (FVAP) Department of Defense. Military Voter Training

Federal Voting Assistance Program (FVAP) Department of Defense. Military Voter Training Federal Voting Assistance Program (FVAP) Department of Defense Military Voter Training 1 Introduction If you wish to complete you Voter Registration and Absentee Ballot Request Form, click here. If you

More information

The current Army operating concept is to Win in a complex

The current Army operating concept is to Win in a complex Army Expansibility Mobilization: The State of the Field Ken S. Gilliam and Barrett K. Parker ABSTRACT: This article provides an overview of key definitions and themes related to mobilization, especially

More information

KELLY HART & HALLMAN LLP

KELLY HART & HALLMAN LLP KELLY HART & HALLMAN LLP 201 MAIN STREET, SUITE 2500 FORT WORTH. TEXAS 76102 Telephone: (817) 332-2500 301 Congress. Suite 2000 Telecopy: (817) 878-9280 Austin, Texas 78701 Writer's Direct Dial: 817-878-3542

More information

Vacancy Announcement

Vacancy Announcement Vacancy Announcement ***When applying for this position, refer to "POSITION # 5345" on your application package.*** POSITION: Cybersecurity Senior Specialist (#5345) DEPARTMENT: Cybersecurity / Systems

More information

LAB4-W12: Nation Under Attack: Live Cyber- Exercise

LAB4-W12: Nation Under Attack: Live Cyber- Exercise LAB4-W12: Nation Under Attack: Live Cyber- Exercise A sophisticated cyberattack is in progress against the United States. Multiple industries are impacted and things are about to get much worse. How will

More information

This Proposal has been Electronically Signed by the Authorized Organizational Representative (AOR).

This Proposal has been Electronically Signed by the Authorized Organizational Representative (AOR). Proposal Information Proposal Number 0433606 Collaborative Research: A Center for Correct, Usable, Reliable, Proposal Title Auditable and Transparent Elections (ACCURATE) Received on 03/31/04 Principal

More information

NATO Moving to Create New Intelligence Chief Post - WSJ

NATO Moving to Create New Intelligence Chief Post - WSJ This copy is for your personal, non-commercial use only. To order presentation-ready copies for distribution to your colleagues, clients or customers visit http://www.djreprints.com. http://www.wsj.com/articles/nato-considers-new-intelligence-chief-post-1464968453

More information

An Interview with Gen John E. Hyten

An Interview with Gen John E. Hyten Commander, USSTRATCOM Conducted 27 July 2017 General John E. Hyten is Commander of US Strategic Command (USSTRATCOM), one of nine Unified Commands under the Department of Defense. USSTRATCOM is responsible

More information

Minutes Board of Trustees

Minutes Board of Trustees Minutes Board of Trustees Action Without a Meeting September 14, 2009 On September 14, 2009, the members of the Board of Trustees of the North American Electric Reliability Corporation consented in writing

More information

For Publication. August 2015

For Publication. August 2015 Dominion Voting Systems, Inc. Sequoia WinEDS Release 4.0.175, Version 2 For Publication August 2015 Florida Department of State R. A. Gray Building, Room 316 500 S. Bronough Street Tallahassee, FL 32399-0250

More information

RISK MANAGEMENT BULLETIN

RISK MANAGEMENT BULLETIN Maryland s New License Plate Readers and Captured Plate Data Law Historically, privacy was almost implicit, because it was hard to find and gather information. But in the digital world, whether it's digital

More information

8/11/2015. Navigation in the Meeting Room. Cyber Enabled Threats to Cleared Industry. Host: Rebecca Morgan Counterintelligence Instructor CDSE

8/11/2015. Navigation in the Meeting Room. Cyber Enabled Threats to Cleared Industry. Host: Rebecca Morgan Counterintelligence Instructor CDSE Host: Rebecca Morgan Counterintelligence Instructor CDSE Guest: Jeffrey Burlette DSS Counterintelligence Directorate Producer: Sandy Vega CDSE Navigation in the Meeting Room Enlarge Screen Q & A Closed

More information

Student Orientation: HIPAA Health Insurance Portability & Accountability Act

Student Orientation: HIPAA Health Insurance Portability & Accountability Act _ Student Orientation: HIPAA Health Insurance Portability & Accountability Act HIPAA: National Privacy Law History of HIPAA What was once an ethical responsibility to protect a patient s privacy is now

More information

Security Risk Analysis

Security Risk Analysis Security Risk Analysis Risk analysis and risk management may be performed by reviewing and answering the following questions and keeping this review (with date and signature) for evidence of this analysis.

More information

Protecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information

Protecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information Protecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information Mr. Brian D. Hughes Office of the Deputy Assistant Secretary of Defense for

More information

Intelligence Preparation of the Information and Communications Environment

Intelligence Preparation of the Information and Communications Environment Intelligence Preparation of the Information and Communications Environment By Jeffrey Carr While the Joint Intelligence Preparation of the Operational Environment (JIPOE) is for offensive purposes, this

More information

The Uniformed and Overseas Citizens Absentee Voting Act: Background and Issues

The Uniformed and Overseas Citizens Absentee Voting Act: Background and Issues Order Code RS20764 Updated March 8, 2007 The Uniformed and Overseas Citizens Absentee Voting Act: Background and Issues Summary Kevin J. Coleman Analyst in American National Government Government and Finance

More information

Freeway Complex Fire 11/15/08 11/17/08 After Action Report. Orange County Sheriff Department Emergency Management

Freeway Complex Fire 11/15/08 11/17/08 After Action Report. Orange County Sheriff Department Emergency Management Freeway Complex Fire 11/15/08 11/17/08 After Action Report Preface The intent of this After Action Report is to document the County of Orange s response efforts during the Santiago Fire from November 15-17,

More information

Course Assistants and staff

Course Assistants and staff IGA-240: CYBER AND INFORMATION OPERATIONS: TECHNOLOGY, POLICY AND THE LAW Fall 2017/18, T/Th 8:45 10:00am L230 Instructor Eric Rosenbach eric_rosenbach@hks.harvard.edu L-362 Course Assistants and staff

More information

AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY UNDERSTANDING THE UNIQUE CHALLENGES OF THE CYBER DOMAIN. Kenneth J. Miller, Major, USAF

AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY UNDERSTANDING THE UNIQUE CHALLENGES OF THE CYBER DOMAIN. Kenneth J. Miller, Major, USAF AU/ACSC/MILLER/AY10 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY UNDERSTANDING THE UNIQUE CHALLENGES OF THE CYBER DOMAIN by Kenneth J. Miller, Major, USAF A Short Research Paper Submitted to the Faculty

More information

NATO MEASURES ON ISSUES RELATING TO THE LINKAGE BETWEEN THE FIGHT AGAINST TERRORISM AND THE PROLIFERATION OF WEAPONS OF MASS DESTRUCTION

NATO MEASURES ON ISSUES RELATING TO THE LINKAGE BETWEEN THE FIGHT AGAINST TERRORISM AND THE PROLIFERATION OF WEAPONS OF MASS DESTRUCTION NATO MEASURES ON ISSUES RELATING TO THE LINKAGE BETWEEN THE FIGHT AGAINST TERRORISM AND THE PROLIFERATION OF WEAPONS OF MASS DESTRUCTION Executive Summary Proliferation of WMD NATO s 2009 Comprehensive

More information

Help America Vote Act of 2002

Help America Vote Act of 2002 Help America Vote Act of 2002 2010 Revisions (Update to Puerto Rico s State Plan - initial Plan submitted in Aug. 2003; two subsequent Plan Revisions submitted in 2004 and 2005) 1 December 13, 2009 Dear

More information

Prepared Statement of GEN (Ret) Keith B. Alexander*

Prepared Statement of GEN (Ret) Keith B. Alexander* Prepared Statement of GEN (Ret) Keith B. Alexander * on Cyber Warfare Today: Preparing for 21st Century Challenges in an Information-Enabled Society before the House Armed Services Committee April 11,

More information

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 17, January 17, 2014

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 17, January 17, 2014 THE WHITE HOUSE Office of the Press Secretary For Immediate Release January 17, 2014 January 17, 2014 PRESIDENTIAL POLICY DIRECTIVE/PPD-28 SUBJECT: Signals Intelligence Activities The United States, like

More information

(U) Summary Table of Findings

(U) Summary Table of Findings (U) Summary Table of Findings CHAPTER 1: RUSS'IAN CAMPAIGNS IN EUROPE ( U) Finding #1: The Kremlin exploits free or independent media spaces and open democra - cies to conduct active measures in Europe.

More information

Security Update. Kenneth E. Eultgen, Jr. Director of Homeland Security Union Pacific Railroad 2008

Security Update. Kenneth E. Eultgen, Jr. Director of Homeland Security Union Pacific Railroad 2008 Security Update Kenneth E. Eultgen, Jr. Director of Homeland Security Union Pacific Railroad 2008 The Rail Network Is Vital to the Nations Economy, National Defense and Public Health 64% of coal used for

More information

Differences Between House and Senate FY 2019 NDAA on Major Nuclear Provisions

Differences Between House and Senate FY 2019 NDAA on Major Nuclear Provisions Differences Between House and Senate FY 2019 NDAA on Major Nuclear Provisions Topline President s Request House Approved Senate Approved Department of Defense base budget $617.1 billion $616.7 billion

More information

Social Engineering & How to Counteract Advanced Attacks. Joe Ferrara, President and CEO Wombat Security Technologies, Inc.

Social Engineering & How to Counteract Advanced Attacks. Joe Ferrara, President and CEO Wombat Security Technologies, Inc. Social Engineering & How to Counteract Advanced Attacks Joe Ferrara, President and CEO Wombat Security Technologies, Inc. Agenda Social Engineering DEFCON Competition Recent Examples Countermeasures What

More information

Checklist for Minimum Security Procedures for Voting Systems 1S Section (4),F.S.

Checklist for Minimum Security Procedures for Voting Systems 1S Section (4),F.S. County: Date Received: Start review date: End review date: Reviewed by: Eleonor G. Lipman Signature: Date : Reviewed by: Signature: Date : REFERENCE REQUIREMENT 1. Purpose: This checklist provides the

More information

Prepared Remarks for the Honorable Richard V. Spencer Secretary of the Navy Defense Science Board Arlington, VA 01 November 2017

Prepared Remarks for the Honorable Richard V. Spencer Secretary of the Navy Defense Science Board Arlington, VA 01 November 2017 Prepared Remarks for the Honorable Richard V. Spencer Secretary of the Navy Defense Science Board Arlington, VA 01 November 2017 Thank you for the invitation to speak to you today. It s a real pleasure

More information

COUNTING VOTES 2012: A State by State look at Voting Technology Preparedness

COUNTING VOTES 2012: A State by State look at Voting Technology Preparedness COUNTING VOTES 2012: A State by State look at Voting Technology Preparedness Executive Summary Susannah Goodman Common Cause Education Fund Michelle Mulder Rutgers School of Law - Newark Constitutional

More information

Volunteer Action Network Toolkit: PASSING A LOCAL RESOLUTION

Volunteer Action Network Toolkit: PASSING A LOCAL RESOLUTION Volunteer Action Network Toolkit: PASSING A LOCAL RESOLUTION Passing a Local Resolution Local government resolutions, proclamations or declarations expressions of support from an elected city or county

More information

PRESS RELEASE. Chester County Law Enforcement Is Prepared for Active Threat Incidents

PRESS RELEASE. Chester County Law Enforcement Is Prepared for Active Threat Incidents CHESTER COUNTY DISTRICT ATTORNEY S OFFICE TELEPHONE: 610-344-6801 FAX: 610-344-5905 THOMAS P. HOGAN DISTRICT ATTORNEY 201 W. MARKET STREET, SUITE 4450 POST OFFICE BOX 2748 WEST CHESTER, PA 19380-0991 March

More information

Voting Systems Testing Board Major Deficiencies Report Hart InterCivic

Voting Systems Testing Board Major Deficiencies Report Hart InterCivic STATE OF COLORADO Department of State 1700 Broadway Suite 250 Denver, CO 80290 Mike Coffman Secretary of State Holly Z. Lowder Director of Elections Voting Systems Testing Board Major Deficiencies Report

More information

For Immediate Release October 7, 2011 EXECUTIVE ORDER

For Immediate Release October 7, 2011 EXECUTIVE ORDER THE WHITE HOUSE Office of the Press Secretary For Immediate Release October 7, 2011 EXECUTIVE ORDER - - - - - - - STRUCTURAL REFORMS TO IMPROVE THE SECURITY OF CLASSIFIED NETWORKS AND THE RESPONSIBLE SHARING

More information

Learning from Critical Incidents Michael A. Stoto, PhD Georgetown University

Learning from Critical Incidents Michael A. Stoto, PhD Georgetown University Learning from Critical Incidents Michael A. Stoto, PhD Georgetown University Learning from critical incidents The only way to really know how well a public health emergency preparedness system will perform

More information

Department of Defense INSTRUCTION. SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems

Department of Defense INSTRUCTION. SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems Department of Defense INSTRUCTION NUMBER 8582.01 June 6, 2012 Incorporating Change 1, October 27, 2017 SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems References: See Enclosure

More information

UNITED STATES SENATE

UNITED STATES SENATE Stenographic Transcript Before the COMMITTEE ON ARMED SERVICES UNITED STATES SENATE HEARING TO RECEIVE TESTIMONY ON ENCRYPTION AND CYBER MATTERS Tuesday, September 13, 2016 Washington, D.C. ALDERSON COURT

More information

NRC REGULATORY ISSUE SUMMARY TRANSPORTATION OF RADIOACTIVE MATERIAL QUANTITIES OF CONCERN NRC THREAT ADVISORY AND PROTECTIVE MEASURES SYSTEM

NRC REGULATORY ISSUE SUMMARY TRANSPORTATION OF RADIOACTIVE MATERIAL QUANTITIES OF CONCERN NRC THREAT ADVISORY AND PROTECTIVE MEASURES SYSTEM SAFEGUARDS INFORMATION-MODIFIED HANDLING UNITED STATES NUCLEAR REGULATORY COMMISSION OFFICE OF NUCLEAR REACTOR REGULATION OFFICE OF NUCLEAR MATERIALS SAFETY AND SAFEGUARDS WASHINGTON. D.C. 20555-0001 July

More information

Security Risk Analysis and 365 Days of Meaningful Use. Rodney Gauna & Val Tuerk, Object Health

Security Risk Analysis and 365 Days of Meaningful Use. Rodney Gauna & Val Tuerk, Object Health Security Risk Analysis and 365 Days of Meaningful Use Rodney Gauna & Val Tuerk, Object Health 2 3 Agenda Guidelines for Conducting a Security Risk Analysis Scope of Analysis Risk of a Breach Security Risks

More information

Board of Supervisors' Agenda Items

Board of Supervisors' Agenda Items A. Roll Call COUNTY OF SAN DIEGO BOARD OF SUPERVISORS REGULAR MEETING MEETING AGENDA WEDNESDAY, MARCH 16, 2016, 9:00 A.M. BOARD OF SUPERVISORS NORTH CHAMBER 1600 PACIFIC HIGHWAY, ROOM 310, SAN DIEGO, CALIFORNIA

More information

ELECTIONS 166 GENERAL GOVERNMENT. Mission Statement. Mandates. Expenditure Budget: $2,015, % of General Government

ELECTIONS 166 GENERAL GOVERNMENT. Mission Statement. Mandates. Expenditure Budget: $2,015, % of General Government Mission Statement The mission of the Office of Elections is to: Provide equal opportunity for all qualified citizens of Prince William County to register to vote Maintain accurate voter records used in

More information

Homeland/National Security

Homeland/National Security Homeland/National Security May 215 Needs Assessment Prepared by Danielle Pearson Date: May 19, 215 Homeland/National Security Homeland/National Security Page 1 Scope Data compiled in this rept covers San

More information

A Tool to Inject Credible Warfighter-Focused Non- Kinetic Attack Effects into the BMDS M&S Environment

A Tool to Inject Credible Warfighter-Focused Non- Kinetic Attack Effects into the BMDS M&S Environment A Tool to Inject Credible Warfighter-Focused Non- Kinetic Attack Effects into the BMDS M&S Environment SMD Symposium 2018 Denise Jefferson Software Engineer Northrop Grumman Today s Threats Ballistic Missile

More information

RECOMMENDED CITATION: Pew Research Center, September 2014, Bipartisan Support for Obama s Military Campaign Against ISIS

RECOMMENDED CITATION: Pew Research Center, September 2014, Bipartisan Support for Obama s Military Campaign Against ISIS NUMBERS, FACTS AND TRENDS SHAPING THE WORLD FOR RELEASE SEPTEMBER 15, 2014 FOR FURTHER INFORMATION ON THIS REPORT: Carroll Doherty, Director of Political Research Alec Tyson, Senior Researcher Rachel Weisel,

More information

DEPARTMENT OF HOMELAND SECURITY REORGANIZATION PLAN November 25, 2002

DEPARTMENT OF HOMELAND SECURITY REORGANIZATION PLAN November 25, 2002 DEPARTMENT OF HOMELAND SECURITY REORGANIZATION PLAN November 25, 2002 Introduction This Reorganization Plan is submitted pursuant to Section 1502 of the Department of Homeland Security Act of 2002 ( the

More information

Gerontology. September 2014 Needs Assessment. Gerontology Needs Assessment Page 1. Prepared by Danielle Pearson Date: September 11, 2014 Gerontology

Gerontology. September 2014 Needs Assessment. Gerontology Needs Assessment Page 1. Prepared by Danielle Pearson Date: September 11, 2014 Gerontology Gerontology September 2014 Needs Assessment Prepared by Danielle Pearson Date: September 11, 2014 Gerontology Gerontology Needs Assessment Page 1 Scope Data compiled in this report covers San Bernardino,

More information

Nuclear/Radiological Outreach

Nuclear/Radiological Outreach Nuclear/Radiological Outreach Bernadette R. Bland, Supervisory Special Agent Countermeasures Oscar R. Hernandez, SNL IPA Intelligence Analysis OFFICIAL USE ONLY 1 Overview FBI Jurisdiction WMD Directorate

More information

Chapter 9 Legal Aspects of Health Information Management

Chapter 9 Legal Aspects of Health Information Management Chapter 9 Legal Aspects of Health Information Management EXERCISE 9-1 Legal and Regulatory Terms 1. T 2. F 3. F 4. F 5. F EXERCISE 9-2 Maintaining the Patient Record in the Normal Course of Business 1.

More information

PURCHASING DEPARTMENT

PURCHASING DEPARTMENT PURCHASING DEPARTMENT September 10, 2018 General Information 1 RFP # 2018-049-6742 REQUEST FOR PROPOSALS FOR ELECTIONS ELECTRONIC POLL BOOK THIS DOCUMENT IS BEING PROVIDED FOR GENERAL INFORMATION PURPOSES

More information

INTRODUCTION TO Mobile Diagnostic Imaging. A quick-start guide designed to help you learn the basics of mobile diagnostic imaging

INTRODUCTION TO Mobile Diagnostic Imaging. A quick-start guide designed to help you learn the basics of mobile diagnostic imaging INTRODUCTION TO Mobile Diagnostic Imaging A quick-start guide designed to help you learn the basics of mobile diagnostic imaging INTRODUCTION TO Mobile Diagnostic Imaging TABLE OF CONTENTS How does mobile

More information

National Defense University. Institute for National Strategic Studies

National Defense University. Institute for National Strategic Studies National Defense University Institute for National Strategic Studies Interim Research Work Plan National Defense University Institute for National Strategic Studies Interim Research Work Plan Contents

More information

Blueprint for CYBER SECURITY in HEALTH AND CARE. June bcs.org/blueprint

Blueprint for CYBER SECURITY in HEALTH AND CARE. June bcs.org/blueprint Blueprint for CYBER SECURITY in HEALTH AND CARE June 2017 bcs.org/blueprint In health and care we have dedicated digital teams striving to protect our patients and public. I believe it is right to recognise

More information

CAPT Jody Grady, USN USCYBERCOM LNO to USPACOM

CAPT Jody Grady, USN USCYBERCOM LNO to USPACOM 1 CAPT Jody Grady, USN USCYBERCOM LNO to USPACOM The overall classification of this briefing is: Classified By: jhgrady Derived From: USCYBERCOM SCG Dated: 20150415 2 3 4 Organizational Structure Commander

More information

Voting System Qualification Test Report Election Systems & Software, LLC

Voting System Qualification Test Report Election Systems & Software, LLC Election Systems & Software, LLC EVS Release 4.5.2.0, Version 1 For Publication June 2016 Florida Department of State R. A. Gray Building, Room 316 500 S. Bronough Street Tallahassee, FL 32399-0250 Contents

More information

2013 Lien Conference on Public Administration Singapore

2013 Lien Conference on Public Administration Singapore Dean Jack H. Knott Price School of Public Policy University of Southern California 2013 Lien Conference on Public Administration Singapore It s great to be here. I want to say how honored I am to participate

More information

PRIVACY IMPACT ASSESSMENT (PIA) For the

PRIVACY IMPACT ASSESSMENT (PIA) For the PRIVACY IMPACT ASSESSMENT (PIA) For the Advanced Skills Management (ASM) U.S. Navy, NAVSEA Division Keyport SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD) information system or

More information

MyDistrictBuilder Building Districts in the Clouds

MyDistrictBuilder Building Districts in the Clouds MyDistrictBuilder Building Districts in the Clouds Presentation to: NCSL National Redistricting Seminar By: Bob West and J. Alex Kelly House Office of Reapportionment Florida House of Representatives Tuesday,

More information

FY 2017 Year In Review

FY 2017 Year In Review WEINGART FOUNDATION FY 2017 Year In Review ANGELA CARR, BELEN VARGAS, JOYCE YBARRA With the announcement of our equity commitment in August 2016, FY 2017 marked a year of transition for the Weingart Foundation.

More information

WBUR Poll Survey of 500 Registered Nurses in Massachusetts Field Dates: October 5-10, 2018

WBUR Poll Survey of 500 Registered Nurses in Massachusetts Field Dates: October 5-10, 2018 Conducted for WBUR by WBUR Poll Survey of 500 Registered Nurses in Massachusetts Field Dates: October 5-10, 2018 Which of the following best describes your main place of work as a nurse? A teaching hospital

More information

Also this week, we celebrate the signing of the New START Treaty, which was ratified and entered into force in 2011.

Also this week, we celebrate the signing of the New START Treaty, which was ratified and entered into force in 2011. April 9, 2015 The Honorable Barack Obama The White House Washington, DC 20500 Dear Mr. President: Six years ago this week in Prague you gave hope to the world when you spoke clearly and with conviction

More information

Summary & Recommendations

Summary & Recommendations Summary & Recommendations Since 2008, the US has dramatically increased its lethal targeting of alleged militants through the use of weaponized drones formally called unmanned aerial vehicles (UAV) or

More information

CITY AND COUNTY OF SAN FRANCISCO DEPARTMENT OF ELECTIONS

CITY AND COUNTY OF SAN FRANCISCO DEPARTMENT OF ELECTIONS CITY AND COUNTY OF SAN FRANCISCO DEPARTMENT OF ELECTIONS ADDENDUM #1 ISSUSED ON May 13, 2005 REQUEST FOR PROPOSALS FOR A NEW VOTING SYSTEM RFP#NVS0305 1) Please add and substitute the following Addendum

More information

Federal Funding for Homeland Security. B Border and transportation security Encompasses airline

Federal Funding for Homeland Security. B Border and transportation security Encompasses airline CBO Federal Funding for Homeland Security A series of issue summaries from the Congressional Budget Office APRIL 30, 2004 The tragic events of September 11, 2001, have brought increased Congressional and

More information

City of Torrance Police Department

City of Torrance Police Department City of Torrance Police Department Testimony of John J. Neu Chief of Police Hearing on Radicalization, Information Sharing and Community Outreach: Protecting the Homeland from Homegrown Terror United States

More information

Patient Safety Reporting System for Nursing Homes Patient Safety Authority Commonwealth of Pennsylvania. Government to Business (G to B)

Patient Safety Reporting System for Nursing Homes Patient Safety Authority Commonwealth of Pennsylvania. Government to Business (G to B) Patient Safety Reporting System for Nursing Homes Patient Safety Authority Commonwealth of Pennsylvania Government to Business (G to B) Prepared by: Howard Newstadt, JD, MBA CIO/Finance Manager Pennsylvania

More information

U.S. Election Assistance Commission Testimony before the U.S. Senate Committee on Armed Services September 28, 2006

U.S. Election Assistance Commission Testimony before the U.S. Senate Committee on Armed Services September 28, 2006 Good morning Chairman Warner and Members of the Committee. I am pleased to be here this morning on behalf of the U.S. Election Assistance Commission (EAC) to discuss the responsibility EAC has in supporting

More information

INTRADEPARTMENTAL CORRESPONDENCE. June 7, 2016 BPC #

INTRADEPARTMENTAL CORRESPONDENCE. June 7, 2016 BPC # INTRADEPARTMENTAL CORRESPONDENCE June 7, 2016 BPC #16-0173 1.0 TO: The Honorable Board of Police Commissioners FROM: Inspector General, Police Commission SUBJECT: OFFICE OF THE INSPECTOR GENERAL INVESTIGATION

More information

EAC Survey. Pat Wolfe Elections Administrator

EAC Survey. Pat Wolfe Elections Administrator EAC Survey Pat Wolfe Elections Administrator EAC Survey Election Assistance Commission (EAC) issues survey every two years Required by the Help America Vote Act (HAVA) Survey gathers information on federal

More information

Bay Area UASI. Introduction to the Bay Area UASI (Urban Areas Security Initiative) Urban Shield Task Force Meeting

Bay Area UASI. Introduction to the Bay Area UASI (Urban Areas Security Initiative) Urban Shield Task Force Meeting Bay Area UASI Introduction to the Bay Area UASI (Urban Areas Security Initiative) Urban Shield Task Force Meeting 1221 Oak Street Room 225, Oakland, CA March 10, 2017 About the Bay Area UASI Its mission

More information

Department of Defense INSTRUCTION. DoD Unclassified Controlled Nuclear Information (UCNI)

Department of Defense INSTRUCTION. DoD Unclassified Controlled Nuclear Information (UCNI) Department of Defense INSTRUCTION NUMBER 5210.83 July 12, 2012 Incorporating Change 1, Effective February 22, 2018 USD(I) SUBJECT: DoD Unclassified Controlled Nuclear Information (UCNI) References: See

More information

Attorney General's Guidelines for Domestic FBI Operations V2.0

Attorney General's Guidelines for Domestic FBI Operations V2.0 ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE 10-14-2011 BY 65179 DNHISBS Page 1 of 2 Attorney General's Guidelines for Domestic FBI Operations V2.0 Module 1: Introduction Overview This training

More information

Running a Bug Bounty Program

Running a Bug Bounty Program Running a Bug Bounty Program Julian Berton Application Security Engineer at SEEK Web developer in a previous life Climber of rocks Contact Twitter - @JulianBerton LinkedIn - julianberton Website - julianberton.com

More information

National Special Security Events

National Special Security Events National Special Security Events 1 INVESTIGATIONS One Agency - Two Missions 1865 - established within Treasury Department to suppress counterfeiting during U.S. Civil War PROTECTION 1902 - formally authorized

More information

Technology Standards of Practice

Technology Standards of Practice 2016 Technology Standards of Practice Used with permission from the Association of Social Work Boards (2016) Table of Contents Technology Standards of Practice 2 Definitions 2 Section 1 Practitioner Competence

More information

The Role of Exercises in Training the Nation's Cyber First-Responders

The Role of Exercises in Training the Nation's Cyber First-Responders Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2004 Proceedings Americas Conference on Information Systems (AMCIS) December 2004 The Role of Exercises in Training the Nation's

More information

Second Line of Defense Program

Second Line of Defense Program Preprint UCRL-JC-135067 Second Line of Defense Program L. Cantuti, L. Thomas This article was submitted to The Institute of Nuclear Materials Management Phoenix, AZ, July 26-29, 1999 July 15, 1999 U.S.

More information

De Anza College Office of Institutional Research and Planning

De Anza College Office of Institutional Research and Planning De Anza College Office of Institutional Research and Planning To: Senior Staff From: Mallory Newell, De Anza Researcher Date: 12/21/2016 Subject: Associate Degrees for - Outcomes 2014-15 and 2015-16 In

More information

CASE STUDY. Denton County s Smooth Transition to Paper-Ballot Elections

CASE STUDY. Denton County s Smooth Transition to Paper-Ballot Elections CASE STUDY Denton County s Smooth Transition to Paper-Ballot Elections CASE STUDY: DENTON COUNTY S SMOOTH TRANSITION TO PAPER-BALLOT ELECTIONS Acceptance testing Verity Scan in-person digital scanners

More information

1

1 Understanding Iran s Nuclear Issue Why has the Security Council ordered Iran to stop enrichment? Because the technology used to enrich uranium to the level needed for nuclear power can also be used to

More information

TECHNOLOGY SOLUTIONS TO ADVANCE MILITARY & OVERSEAS VOTING CSG OVERSEAS VOTING INITIATIVE TECHNOLOGY WORKING GROUP NASED - FEBRUARY 17, 2017

TECHNOLOGY SOLUTIONS TO ADVANCE MILITARY & OVERSEAS VOTING CSG OVERSEAS VOTING INITIATIVE TECHNOLOGY WORKING GROUP NASED - FEBRUARY 17, 2017 TECHNOLOGY SOLUTIONS TO ADVANCE MILITARY & OVERSEAS VOTING CSG OVERSEAS VOTING INITIATIVE TECHNOLOGY WORKING GROUP NASED - FEBRUARY 17, 2017 OVERVIEW OF CSG OVERSEAS VOTING INITIATIVE & THE TECHNOLOGY

More information

A Deep Dive into the Privacy Landscape

A Deep Dive into the Privacy Landscape A Deep Dive into the Privacy Landscape David Goodis Assistant Commissioner Information and Privacy Commissioner of Ontario Canadian Institute Advertising & Marketing Law January 22, 2018 Who is the Information

More information

CYBER ATTACK SCENARIO

CYBER ATTACK SCENARIO SCENARIO A disgruntled former hospital employee with exceptional computer skills hacks into the hospital network from their home computer and plants a very aggressive computer virus into the Computer-Aided

More information

PRIVACY IMPACT ASSESSMENT (PIA) For the

PRIVACY IMPACT ASSESSMENT (PIA) For the PRIVACY IMPACT ASSESSMENT (PIA) For the Marine Sierra Hotel Aviation Readiness Program (M-SHARP) Department of the Navy - United States Marine Corps (USMC) SECTION 1: IS A PIA REQUIRED? a. Will this Department

More information

Medicare Fraud Strike Force Teams Turn Up The HEAT. By Craig A. Conway, J.D., LL.M.

Medicare Fraud Strike Force Teams Turn Up The HEAT. By Craig A. Conway, J.D., LL.M. Medicare Fraud Strike Force Teams Turn Up The HEAT By Craig A. Conway, J.D., LL.M. caconway@central.uh.edu Federal agents have been serving warrants, conducting raids, and making arrests across Houston,

More information

STARTUP INTELLIGENCE STARTUP ACCELERATION

STARTUP INTELLIGENCE STARTUP ACCELERATION STARTUP INTELLIGENCE STARTUP ACCELERATION STARTUP INTELLIGENCE 50m startups forming each year. 1.35m high-tech startups. Source: Global Entrepreneurship Monitor 2015. Which startups are relevant? Which

More information

The Uniformed and Overseas Citizens Absentee Voting Act: Overview and Issues

The Uniformed and Overseas Citizens Absentee Voting Act: Overview and Issues The Uniformed and Overseas Citizens Absentee Voting Act: Overview and Issues Kevin J. Coleman Analyst in Elections October 4, 2012 CRS Report for Congress Prepared for Members and Committees of Congress

More information