Editorials: Canada’s federal election could be under attack. Are we prepared? | Wesley Wark/The Globe and Mail

Canadians have witnessed a steady drumbeat of stern warnings about likely foreign interference in the coming federal election. The Minister for Democratic Institutions, Karina Gould, sounded the latest alarm in a news conference Monday, in which she delivered the latest report on election threats authored by the government’s cybersecurity agency, the Communications Security Establishment (CSE), which laid out the potential for a sophisticated, co-ordinated and determined effort by foreign state actors to maliciously interfere in the upcoming election. “Nothing is more important to this government than protecting our democracy and ensuring that our next election is fair, free and secure,” Ms. Gould said. Her concern around the Canadian federal election is based on the rising tempo of foreign interference in elections globally, and of technological change that has made cyber meddling easier and cheaper. CSE argues that for foreign adversaries, the potential benefits of cyber electoral interference – which can range from sowing confusion and loss of faith in politics, to trying to steer an election – far outweigh the costs. The threat was basically non-existent in the 2015 federal election, and the true scale of the threat to the 2019 election and our ability to meet it remain to be seen. But there have been some positive developments around our readiness. There’s more public attention than ever on the issue, and intelligence capabilities to detect and assess threats have been increased substantially. A system to alert the public has been created, based on an intelligence fusion centre and a senior panel of government officials who can independently ring the alarm bells.

Finland: Cyber attack on election system, as 1.5 million Finns vote in advance | News Now Finland

The National Bureau of Investigation NBI is looking into the circumstances around an apparent cyber attack against Finland’s election information systems. It happened over the weekend, when the official results service was hit by a denial of service attack. The service sends results to the media, among others. The incident is being investigated as ‘grave telecommunications harassment’ under Finnish law. “The preliminary investigation is at an early stage, so the exact type of criminal charge might become more accurate as the investigation progresses” says Marko Leponen from the NBI’s Cyber Centre. “The authorities have prepared for this type of suspected cyber crime in the elections. In general, attacks on public services are quite common, and especially current or publicly available services are often attractive targets” Leponen explains. Meanwhile more than 1.5 million eligible Finns voted in advance of the general election, as the early voting period came to a close on Monday night.

Spain: Spain vows to boost cybersecurity, fight disinformation | Associated Press

Spanish Prime Minister Pedro Sánchez on Tuesday called on all political forces in the country to back a new national cybersecurity fight against “attempts to hack democracy and undermine citizens’ trust in the political system.” Spain’s April 28 general election is seen as a testing ground for new measures that the European Union is adopting to shield elections to the European Parliament a month later. The Europe-wide efforts include a “rapid alert system” linking specialized coordination units in all EU member states and require internet companies to share regular updates on their efforts to eradicate disinformation campaigns. Spain joined the Europe-wide initiative in early March, establishing a high-level unit to coordinate the fight against cyberattacks and fake news. The experts report directly to Sánchez, who on Tuesday equated disinformation to attacks on “the quality of democracy.” “We need to protect Europe in order for Europe to be able to protect its citizens,” the Socialist leader said during a visit to the national cybersecurity institute, or INCIBE, in the northern province of León. Sánchez also called for new cybersecurity guidelines that are currently being designed to be backed by all national parties, regardless of who wins the upcoming election.

National: Lack of security clearances hampers federal Election Assistance Commission | Politico

Only half the members of a federal commission advising states on election threats have security clearances, raising questions about whether it can effectively help local and state officials defend against adversaries such as Russian hackers. And no members of the four-person Election Assistance Commission had clearances during the past two election cycles, including the period when Kremlin-linked hackers are suspected of mounting a range of cyberattacks against state election offices, the Democratic Party and Hillary Clinton’s campaign in 2016. The delay in issuing security clearances for commission members is part of a massive backlog of application approvals throughout the entire federal government. But it’s a particularly acute problem for the EAC, one of the key agencies offering guidance to state and local officials about how to protect themselves from security risks. “The people entrusted with securing our elections need to know what threats they’re supposed to address,” Sen. Ron Wyden (D-Ore.), one of the lawmakers who has focused the most on election security, told POLITICO in a statement. “An Election Assistance [Commission member] without a security clearance is like making a baseball player hit without a bat.”

National: Nielsen departure could deal a blow to Trump administration’s cybersecurity efforts | The Washington Post

Kirstjen Nielsen’s resignation as secretary of homeland security could deal a blow to the Trump administration’s cybersecurity efforts — as she was one of the last civilians in its top ranks with extensive cybersecurity expertise. That’s a dangerous position, experts say, as the nation barrels toward a 2020 election that will likely be targeted by Russian hackers and the Homeland Security Department launches a major campaign to get government and industry to stop buying technology from China’s Huawei and other companies deemed national security threats. “Hopefully whoever runs DHS will prioritize its vital cybersecurity mission, but it makes a difference if the person at the top has a background in cyber and knows from experience how important it is rather than just being told,” former State Department cyber coordinator Chris Painter told me. “DHS is spread thin among multiple priorities as it is, and without a clear mandate from department leadership that cybersecurity is a prime mission, their efforts risk being sidelined.” Nielsen – who The Post reported was forced to step down because Trump was dissatisfied with her handling of the border — had, by far, the longest cybersecurity resume of any DHS secretary in history. She advised President George W. Bush on cybersecurity and homeland security issues, founded a consulting group called Sunesis Consulting focused on cybersecurity and critical infrastructure, and served as a senior fellow at George Washington University’s Center for Cyber and Homeland Security. Her acting successor, U.S. Customs and Border Protection Commissioner Kevin K. McAleenan, by contrast, has no substantial background in the field.

National: Scrutiny and suspicion as Mueller report undergoes redaction | The Washington Post

The escalating political battle over special counsel Robert S. Mueller III’s report centers on redactions — a lawyerly editing process that has angered distrustful Democrats eager to see the all evidence and conclusions from his 22-month investigation of President Trump’s conduct and Russia’s elaborate interference operation during the 2016 campaign. Attorney General William P. Barr is redacting at least four categories of information from the report, which spans nearly 400 pages, before issuing it to Congress and the public. Legal experts say he has wide discretion to determine what should not be revealed, meaning the fight over blacked-out boxes is likely to spawn months of fights between Congress and the Justice Department, and it may end up in the courts. The first public confrontation is imminent, with Barr scheduled to appear Tuesday and Wednesday before the House and Senate Appropriations committees for hearings ostensibly about the Justice Department’s budget. He is expected to face extensive questioning about the Mueller report and his ongoing redaction process, though, and his testimony will be scrutinized for any sign he is trying to protect the president. “There’s a lot of pressure all pointing in the direction of doing a robust release,” said John Bies, who held senior roles in the Justice Department during the Obama administration and now works at American Oversight, a liberal watchdog group. “We are very hopeful the attorney general will do the right thing here and make everything public that can lawfully be made public.”

Georgia: State moving forward with new type of voting system; some opponents react | WSAV

How you vote in Georgia will be changing, according to a new law signed recently by Governor Brian Kemp. The law calls for scrapping the old, and now somewhat controversial, voting machines. Those will be replaced with a new system including what is termed “Electronic Ballot Marking Devices” as well as new types of digital scanners to actually record votes. Supporters, which include many state lawmakers as well as Georgia’s Secretary of State Brad Raffensperger, say the new system will provide a verifiable paper trail. Opponents say just the opposite. “The state is going to spend $150 million to $200 million and not be one bit better off than they are today,” said Marilyn Marks from the Coalition for Good Governance. “They should just keep the un-auditable system.”  Marks’ group is still embroiled in a lawsuit with the State of Georgia over issues from the 2018 election. Marks has a list of concerns starting with the Electronic Marking Devices, which it’s said will print out a paper ballot that can then be verified by a voter and ultimately scanned by the digital scanner to actually cast the ballot. She says two of the largest vendors that make these machines don’t really provide a paper ballot per se, but actually something more like a bar code. Marks asserts any new system will not truly have a verifiable paper trail and that she expects “many court challenges.”

Editorials: New Pennsylvania voting security measures could disenfranchise voters with disabilities | Imani Barbarin and Gabe Labella/Philadelphia Inquirer

Imagine getting up early on election day having done your homework on the issues, educated yourself on candidates’ positions, and chosen whom to vote for, only to find poll workers who do not know how to turn on, set up, or assist you in using the voting machine. That is exactly the type of story we at Disability Rights Pennsylvania heard, along with a host of others, during the last presidential election in 2016 when we ran a hotline for disabled voters. During the 2016 election, less than 20 percent of polling places were accessible to people with disabilities. Some voting systems rarely had instructions included, others lacked tactile buttons for people with low vision, and for some systems, the voters could not verify that the ballot reflected their choices. For these reasons, voter turnout for people with disabilities remains under 50 percent. According to the American Association of People With Disabilities, 16 million of the eligible 35 million voters with disabilities cast a ballot in the 2016 election. With election security on the minds of legislators, there is fear that changes to polling technology will only further disenfranchise citizens with disabilities in the coming election. Pennsylvania Bills S.B. 411-419 have been introduced in the House and Senate to update and reform the election system. This comes as counties and the disabled across the state test new voting systems that create a paper trail through different formats.

South Dakota: Secretary of State Office received another $3 million to beef up election security | KELO

Among the many adjustments the South Dakota Legislature made last month to state government’s current budget was adding $150,000 to the Secretary of State Office’s operational budget. That’s so the office can move ahead with using $3 million from a 2018 federal election security grant that Congress approved, according to Kea Warne. She is deputy secretary for elections for Secretary of State Steve Barnett, who took office in early January. Congress took the action in March 2018 after people from other nations such as Russia tried ways to influence the 2016 U.S. elections. Many states including South Dakota still needed approval from their legislatures before channeling the money toward greater election security. “Our office has not spent any of those funds to date, as we asked for the Legislature to provide the five percent match money for the federal grant during the 2019 legislative session,” Warne said. South Dakota’s lawmakers approved that $150,000 request as part of SB 180, which amended the 2019 general-appropriations act for state government. It becomes effective June 28. The 2020 state budget starts July 1, 2019. “Our office has been approved by the federal Election Assistance Commission to spend the full $3 million on new election equipment for the counties,” Warne said.

Wisconsin: Election security bolstered by cybersecurity, other measures | The Capitol Report

On the eve of the 2018 midterm elections, computer security specialists from across the country descended on the DEFCON 26 Hacking Conference in Las Vegas. These “white hat” hackers sought to probe the security features of voting machines and election systems in an effort to identify weaknesses. The results were alarming to election security experts. Hackers at DEFCON’s Voting Village found that an 11-year old trained only in basic coding techniques was able to hack into a mock-up of Florida’s election results website and change its reported vote totals. Conference attendees were also able to identify a vote tabulation machine — the Election Systems & Software M650 — that could be hacked in under two minutes, or as the report says, “within the time it takes to vote.” In recent years, Wisconsin’s election security practices have come under scrutiny, most notably by Democrats in the U.S. House Administration Committee, who concluded in July 2018 that Wisconsin was one of the 18 states most vulnerable to cyber attacks on election infrastructure.

Canada: Rebuking Tech Giants, Canada Braces for Possible Election Interference | The New York Times

Canada is expecting foreign interference in its national election in October, and is considering stronger regulation of social media companies to ensure they block meddling in the voting, the minister responsible for election integrity said on Monday. The minister spoke after the release of an updated report by Canada’s electronic eavesdropping and security agency on online interference by other countries in the Canadian election. “We judge it very likely that Canadian voters will encounter some form of foreign cyber interference related to the 2019 federal election,” the report said. “However, at this time, it is improbable that this foreign cyber interference will be of the scale of Russian activity against the 2016 United States presidential election.” “Canada is a target of choice for those who seek to undermine our democracy,” said the minister, Karina Gould, at a news conference in Ottawa. The report does not indicate what countries are likely to attack Canada, and both Harjit Sajjan, the defense minister, and Shelly Bruce, who heads the electronic security agency, declined to elaborate.

Canada: Freeland says foreign election meddling in October federal vote is likely | CTV

Malign foreign actors will likely try to meddle in the Canadian federal election in October, Foreign Affairs Minister Chrystia Freeland warned Friday, and Prime Minister Justin Trudeau pointed the finger at Russia as the most likely culprit. Freeland sounded the alarm over election interference at a G7 foreign ministers’ gathering in France. At a parallel G7 meeting of interior ministers, Public Safety Minister Ralph Goodale said the bloc wants the world’s big internet companies — Google, Facebook, Twitter and Microsoft — to do more to stop their platforms from being exploited. The dual G7 ministerial mirrored a similar joint meeting in Toronto almost one year ago that unfolded against the backdrop of a van attack on Yonge Street that left 10 people dead. A year later, their meetings occurred just weeks after 50 people were killed in two attacks on mosques in Christchurch, New Zealand. Canada’s upcoming federal election also attracted interest, sparking a question to Freeland about the likelihood of Russian interference. “We are very concerned,” the minister replied. “I think our judgment is interference is very likely and we think there has probably already been efforts by malign foreign actors to disrupt our democracy.”

India: Supreme Court orders Election Commission to increase VVPAT verification from one Electronic Voting Machine to five | India Today

The Supreme Court on Monday ordered the Election Commission to increase the Voter-Verified Paper Audit Trail (VVPAT) slips from one Electronic Voting Machine (EVM) per Assembly constituency to five. The Supreme Court observed that increase in VVPAT verification “would be of greater satisfaction not only of political parties but also for the entire electorate”. “This court would like to observe that neither the satisfaction of the Election Commission, which is a constitutional body, nor the system of EVMs, is being doubted,” the bench said. The bench also said that it was not questioning the accuracy of election results, but the issue was of satisfaction of the electorate. The court’s direction came on a plea by leaders of 21 opposition parties who wanted it to be hiked to 50 per cent of EVMs per Assembly constituency. The opposition parties had argued that the Election Commission was conducting VVPAT matching for less than 0.44 per cent of EVMs in the country.

Israel: Hackers stole Israeli voters information; officials deny theft | IBT

A group of Israel based hackers claimed that just a few days prior to the parliamentary election, they conducted a cyber-attack into the database of Israeli voters. But the officials have dismissed the claims. Israel’s parliamentary election or Knesset election will take place on Tuesday, April 9. But, on Saturday, April 6 the hacking group claimed that they have stolen important information of on millions of Israelis as they successfully broke into the voter registry. Later, the Central Elections Committee of Israel stated that they had no evidence of any cyber breach. As per a Hebrew-language daily newspaper, Hamodia, the authority has dismissed the hackers’ claims and mentioned that the accessed data was from another data leak in 2006. The report also added that there are thousands of hackers around the world and they aim regularly to attack Israel-based web sites.

Turkey: Erdogan’s party seeks full recount in Istanbul | Associated Press

Turkey’s ruling party said Sunday that it will appeal for a full recount of all votes cast in Istanbul’s mayoral election, which the opposition narrowly won in a major setback for President Recep Tayyip Erdogan. In the March 31 local elections, the opposition not only prevailed in a tight race in Istanbul’s financial and cultural center, it also took control of Ankara, the capital. Erdogan’s party, which held both cities for decades, contested the results, claiming the elections were “tainted.” The ruling Justice and Development Party, or AKP, won the right for a recount of votes previously deemed invalid. On Sunday, Ali Ihsan Yavuz, an AKP deputy chairman, said the party would appeal to the country’s top election authority for a total recount of votes in Istanbul’s 38 districts, not just of ballots that were canceled.

National: States slow to spend funds to enhance election security, report finds | CNN

US states and territories given $380 million in combined federal funds for election upgrades last year only spent 8.1% of that money in the first six months it was available, the agency responsible for distributing the funds said on Thursday. That money was distributed as part of a 2018 bill, which was passed after Homeland Security secretary Kirstjen Nielsen warned it is a “national security concern” that US elections can’t be audited with paper ballots.
Security experts have in recent years called for major elections to have a physical paper trail so a trustworthy audit can be performed. However, brands and types of voting equipment vary by state. Many states use some machines that don’t leave a paper trail, and five states are entirely paperless for the general population. The report from the US Election Assistance Commission only tracked spending through September 2018, and many states have since spent or plan to spend some of their money on cybersecurity features or staff or upgraded equipment that badly needs replacing.

National: States spent just a fraction of $380 million in election security money before midterms | The Washington Post

Congress scrambled in early 2018 to deliver a surge in election security money before the midterms. But it turns out that states only spent about 8 percent of the $380 million Congress approved by the time the elections rolled around. That’s the bad news in a spending report released Thursday by the Election Assistance Commission, which is responsible for disbursing the money. The good news is that states are on track to spend the majority of the money before the 2020 elections — which intelligence officials say are far likelier than the midterms to be a hacking target for Russia and other U.S. adversaries. The report highlights the lengthy process of investigations and reviews that are necessary before states can make major upgrades to specialized election equipment. Given the tight time frame — Congress approved the money in March and the EAC began disbursing it to states in June — EAC Chairwoman Christy McCormick told me that 8 percent is a reasonable amount to have spent and about what the commission expected. It’s also a warning to Congress that the clock is ticking if it wants to deliver more election security money that will make a meaningful difference in 2020.

National: States’ spending on election security expected to pick up in 2019 | StateScoop

States and territories spent just 8 percent of the $380 million in federal election-security grants in the six months after they were distributed last year, according to the U.S. Election Assistance Commission. But in a report Thursday, the commission said it expects the bulk of that funding to be spent before the 2020 presidential election. The report follows states’ spending on new voting equipment, cybersecurity resources and personnel between last April and Sept. 30, when the federal government’s 2018 fiscal year ended. But the EAC said it expects spending to pick up this year as more grant money is transferred to states and as legislatures approve spending plans. “There hasn’t been a lot of money spent, but there is a lot of activity,” Mark Abbott, the commission’s grants director, told StateScoop. Of the $31.4 million states spent through last September, more than half — $18.3 million — went toward cybersecurity, including hiring new personnel dedicated to network security, implementing risk assessments and vulnerability scans and putting up stronger firewalls around statewide voter registration systems, which were infamously targeted by Russian hackers during the 2016 presidential election.

National: Blockchain Voting: Unwelcome Disruption or Senseless Distraction? | U.S. Vote Foundation

It really gets old being a guinea pig. Not because of the cagey confines, but for the insistence of those who try their ideas out on you. Overseas and military voters continue to be the guinea pigs for unvetted online voting ideas, the new one being “blockchain voting”. We have been here before. Overseas and military voters do need continued meaningful reforms across all states, and it is good when people truly care enough to examine and invest in solutions. What we do not need is a distraction that introduces new threats to overseas and military ballot integrity. The cliché “disruption model” doesn’t belong in our elections. Particularly in light of Russia’s cyber-interference in elections in Ukraine in 2014 and the US in 2016, we should consider with extra caution the idea of putting the entire voting process online. Russia itself is pushing to use this same technology for voting. Maybe it is worth a deeper look at it before we rush to its implementation? Perhaps investment in a threat detection system, which most state election offices cannot yet afford, would, at minimum, be a wise first course of action. Typically election systems must undergo formal testing and certification. Public access and examination is crucial. With a fully online system, that requirement is far more serious. Internet voting is not the same sort of simple transaction as is online banking; it is far more complex due to the fact that there must be a separation of the transaction from the identity of the person executing it. Just because there is a “blockchain” for the transaction doesn’t make the total voting system secure. The bottom line: it should not be possible to implement these systems in real elections without full and complete public examination. It is not sufficient to declare a technology as “tested” when it is used only in private elections and by outside companies hired to do “security audits”.

National: Democrats in Congress authorize subpoenas for Trump-Russia report, legal battle looms | Reuters

U.S. congressional Democrats on Wednesday authorized a powerful committee chairman to subpoena Special Counsel Robert Mueller’s full report on Russia’s role in the 2016 election, moving closer to a legal clash with President Donald Trump’s administration. The Democratic-led House of Representatives Judiciary Committee voted to enable its chairman, Jerrold Nadler, to subpoena the Justice Department to obtain Mueller’s unredacted report and all underlying evidence as well as documents and testimony from five former Trump aides including political strategist Steve Bannon. Nadler has not yet exercised that authority, with the timing of any such move uncertain. The committee vote was 24-17 along party lines, with Democrats in favor and Trump’s fellow Republicans opposed. Attorney General William Barr, a Trump appointee, issued a four-page summary of Mueller’s main conclusions last month including that the special counsel did not establish that the Trump campaign conspired with Russia during the election.

Georgia: Governor inks law to replace voting machines  | Atlanta Journal Constitution

Gov. Brian Kemp signed legislation to replace Georgia’s electronic voting machines with a touchscreen-and-paper ballot election system, after a polarizing debate over how to balance the integrity of the vote with ensuring accurate election results. The Republican was long expected to sign House Bill 316, which divided Republicans and Democrats over whether voters should use computer-printed ballots or paper ballots bubbled in with a pen.But the timing and quiet nature of the bill signing was peculiar: His office said in a notice posted on his website Wednesday that Kemp inked the bill, along with 20 lower-profile measures, on Tuesday during the last day of the legislative session.The overhaul was introduced with Kemp’s blessing after his narrow election victory over Democrat Stacey Abrams, who cast the Republican as an “architect of voter suppression” and accused him of creating barriers to ballot access. 

Ohio: Senate OKs creation of cyber security division | Richland Source

Ohio Senate President Larry Obhof (R-Medina) Thursday announced passage of legislation to create the Ohio Cyber Reserve — a new division of the Ohio National Guard that specializes in cyber security. “Cyberattacks are a growing threat,” said Obhof, who co-sponsored the bill. “This legislation will help our state better prepare against these sophisticated attacks.” Obhof’s district includes Richland and Ashland counties. The new force will consist of qualified, civilian cyber security experts and will maintain regional Cyber Response Teams capable of deterring, mitigating, and remedying cyber-attacks against our local governments, businesses, critical infrastructure and citizens. Senate Bill 52 was initially suggested by Ohio Secretary of State Frank LaRose, in order to address concerns related to elections and protecting the integrity of election-related data.

Australia: Electoral Commission gets AU$11m for polling place tech and IT upgrades | ZDNet

The Australian Electoral Commission (AEC) will be given AU$10.8 million over the next two years to upgrade its IT infrastructure and implement more polling place technology under the 2019-20 Federal Budget. The funding will be separated into AU$4 million in 2019-20 and AU$6.7 million in 2020-21. It will specifically see the AEC “approach the market to scope the deployment of new polling place technology and upgrades to the AEC’s ageing core ICT infrastructure”, according to the Budget documents. The funding follows electronic voting for citizens previously gaining bipartisan support, with both former Prime Minister Malcolm Turnbull and current opposition leader Bill Shorten advocating for electronic voting following the 2016 federal election. “We’re a grown-up democracy; it shouldn’t be taking eight days to find out who’s won and who’s lost,” Shorten said while conceding the election a week after polls closed.

Israel: The cybersecurity election | Jerusalem Post

There has been one theme running through this election almost from the day it was called: Cybersecurity. The past few months have been colored with stories of online influence campaigns, hacking, bots and Internet trolls. It began in November, when the Knesset hadn’t been dissolved yet but election fever was in the air, and The Jerusalem Post uncovered Twitter accounts sending links to falsified websites with outlandish news stories about Israeli politicians. The Foreign Ministry reported some incidents to Twitter and got some of the accounts shut down, but it also sent a warning to journalists, a top target for these scams: “The modes of action to influence the political discourse in Israel are similar to those that were seen in the elections in the United States, the vote on Brexit in the United Kingdom and the elections in France. Their preferred network is Twitter, which is seen as a social media of influencers and opinion leaders.” In January, less than two weeks after the Knesset made the elections official, Shin Bet (Israel Security Agency) chief Nadav Argaman warned about foreign intervention in the election using cyber capabilities, though he did not say which country was interfering and to what end. Many in the political field assumed he was referring to Russia, based on the aforementioned precedents, but Argaman has yet to make a follow-up statement nor has there been any serious evidence of a Russian effort.

Israel: Israelis prepare for elections as experts cite cyber threats | Associated Press

As Israel prepares to hold a national election next week, experts say it is vulnerable to the kind of foreign hacks and cyber campaigns that have disrupted the political process in other countries. Prime Minister Benjamin Netanyahu says there is “no country better prepared” to combat election interference. But despite Israel’s thriving tech sector and vaunted security capabilities, experts say its laws are outdated and that Netanyahu’s government hasn’t made cyber threats a priority. Campaigning had just started to ramp up in January when the director of the Shin Bet, Israel’s internal security agency, told a closed audience that a world power had tried to disrupt the April 9 vote. Suspicion fell on Russian operatives, now infamous for their alleged cyber meddling in America’s 2016 presidential race and the Brexit referendum. Soon after, news erupted that Iranian agents had hacked the cellphone of Benny Gantz, a former general who is the main challenger to Netanyahu. Although the breach occurred months before Gantz joined the race, the scandal threatened to derail his campaign, which is largely based on his security credentials.

Switzerland: Swiss Post’s e-voting system pulled for May votes | SWI

The e-voting system operated by Swiss Post will not be available for nationwide votes on May 19. This is the consequence of “critical errors” found during a public intrusion test, the Federal Chancellery and Swiss Post announced on Friday. The Federal Chancellery said in a statementexternal link it would review the licensing and certification procedures for e-voting systems. It added that it had no indication that these flaws had resulted in votes being manipulated in previous ballots. Swiss Post’s e-voting system had been in use in four cantons: Basel City, Fribourg, Neuchâtel and Thurgau. The Organisation of the Swiss Abroad said on Fridayexternal link it was deeply disappointed by the news, describing it as a blow against online voting “and thus a denial of the democratic rights of the Swiss Abroad”.

National: U.S. senators want stiff sanctions to deter Russia election meddling | Reuters

U.S. Republican and Democratic senators will introduce legislation on Wednesday seeking to deter Russia from meddling in U.S. elections by threatening stiff sanctions on its banking, energy and defense industries and sovereign debt. Known as the “Deter Act,” the legislation is the latest effort by U.S. lawmakers to ratchet up pressure on Moscow over what they see as a range of bad behavior, from its aggression in Ukraine and involvement in Syria’s civil war to attempts to influence U.S. elections. The measure will be introduced by Senators Chris Van Hollen, a Democrat, and Marco Rubio, a Republican. They offered a similar measure last year, when it also had bipartisan support but was never brought up for a vote by the Senate’s Republican leaders, who have close ties to President Donald Trump. Trump has gone along with some previous congressional efforts to increase sanctions on Russia, although sometimes reluctantly. According to details of the legislation seen by Reuters, it would require the U.S. Director of National Intelligence (DNI) to determine, within 30 days of any federal election, whether Russia or any other foreign government, or anyone acting as an agent of that government, had engaged in election interference.

National: 2020 Census likely target of hacking, disinformation campaigns, officials say | The Washington Post

With just a year to go before the 2020 Census, the U.S. government is urgently working to safeguard against hacking and disinformation campaigns as it perfects a plan to count about 330 million people largely online for the first time. Going digital is intended to cut costs. But cybersecurity experts say it may also put the survey at unprecedented risk in a nation embroiled in fallout from Russian interference in the 2016 election. Any outside attempt to discredit or manipulate the decennial survey could drive down response rates, imperiling the integrity of data that help determine a decade’s worth of federal funding, congressional apportionment and redistricting throughout the country. “Just as with voting, completing the census is a powerful exercise in our democracy, and there are always people who want to prevent others from exercising their power,” said Indivar Dutta-Gupta, co-executive director of the Georgetown Center on Poverty and Inequality and an expert on the census. “I think there will be lots of attempts. We should be concerned.”

National: American Security Requires a Cyber-Savvy Congress | The National Interest

On March 13, Arkansas Sen. Tom Cotton and Oregon Sen. Ron Wyden submitted a bipartisan letter to the Senate sergeant-at-arms asking for an annual report tallying the number of times Senate computers have been hacked. The letter also requests the SAA adopt a policy of informing Senate leadership within five days of any new data breaches that occur. Cotton and Wyden should be lauded for requesting greater clarity regarding government cybersecurity. Yet this important and reasonable petition reveals an unfortunate reality: We expect our lawmakers to enact policy protecting our nation from cyberattacks when they don’t even know whether their own computers have been hacked. For the sake of national security, this must change. Government agencies, in general, are legally required to disclose breaches, but Congress is under no similar obligation. According to the letter, the last time there was a publicly disclosed report of a congressional data breach was in 2009. Indeed, the two examples of cyberattacks on Senate computers that Cotton and Wyden cite (one against former Virginia representative Frank Wolf in 2006 and one against former Florida senator Bill Nelson in 2009) are both at least a decade old. But a lack of data for the years since then doesn’t mean that hackers haven’t been active. In fact, in 2018, both the Democratic National Committee and the National Republican Congressional Committee lost emails in data breaches. Moreover, the Department of Defense wards off approximately thirty-six million attempted data breaches each day.