Internet Voting
- Internet Voting: the National Security Risks (Soper, 2/13)
- Why Internet Voting is Dangerous (Simons, 2/16)
- NO to Calif. IV Initiatives (Soper, 2/16)
- When Will We Be Able to Vote Online? (Scientific American, 1/16)
- “There Is No Need For Internet Voting” (Kiniry, 9/15)
- iVote Advisory Committee, Final Report (Utah, 2/15)
- The Dangers of Internet Voting (von Spakovsky, 7/15)
- Election, Tech Experts to Obama: Yes, “We Need to Fix That,” But E-Voting Not the Answer (Verified Voting, 12/12)
- Internet Voting in the U.S. (ACM, 9/12)
- NIST: Internet voting not yet feasible (5/12)
- Computer Technologists’ Statement on Internet Voting (12/12)
- Internet voting not ready for elections, says DHS official (4/12)
- Internet Voting (CountedAsCast.com) (Soper, 11/11)
- Internet Voting In California? (7/11)
- Election Integrity Advocates Take On Internet Voting In California (Soper, 7/11)
- Security Considerations for Remote Electronic UOCAVA Voting (NIST, 2/11)
- Hacking the D.C. Internet Voting Pilot (U. Mich., 10/10)
- A Security Analysis of the Secure Electronic Registration and Voting Experiment (SERVE) (7/07)
Email Voting
- Hazards Of Email Voting (Jefferson, 4/17)
- AB 1403: Email Voting (Soper, 4/17)
- What About Email and Fax? (Jefferson, 2011)
- Email Voting: A National Security Threat in Government Elections (Jefferson, 6/11)
- Emailed Ballots: A Security Assessment (Jefferson, 6/10)
Computer Security Issues
- See the Ars Technica security page, WIRED Magazine’s security page, or DARKReading.com for the latest news.
- High-severity bug in OpenSSL allows attackers to decrypt HTTPS traffic (1/16)
- Huge Number Of Critical Flaws Revealed In Apple, Android, Linux And Oracle Systems (1/16)
- NSA Hacker Chief Explains How to Keep Him Out of Your System (1/16)
- How to Make Your Own NSA Bulk Surveillance System (WIRED, 1/16)
- Securing your website: A tough job, but someone’s got to do it (Ars Technica, 2/13)
- Viruses, Trojans, and worms, oh my: The basics on malware (2/13)
- Looking back: the five most important security stories of 2012 (Ars Technica, 12/12)
- 10 security stories that shaped 2012 (ZDNet, 2012)
- Why passwords have never been weaker—and crackers have never been stronger (Ars Technica, 8/12)
Elections As Critical Infrastructure
- Statement by Secretary Jeh Johnson on the Designation of Election Infrastructure as a Critical Infrastructure Subsector (DHS, 1/17)
- Designation of Election Infrastructure as Critical Infrastructure (1/17)
- Statement by Secretary Johnson Concerning the Cybersecurity of the Nation’s Election Systems (DHS, 9/16)
- Targeting Activity Against State Board of Election Systems (FBI 8/16)
Elections
- “Ex-CIA director warns about problems Russians could cause in next election” (Woolsey, 3/17)
- “Enhanced Analysis of GRIZZLY STEPPE Activity” (DHS, 2/17)
- Google finds Iranians hacked on election eve (6/13)
Banking Online
- If I can shop and bank online, why can’t I vote online? (Jefferson, 11/11)
- Billion dollar bank heist foiled by hacker’s typo (The Telegraph, 3/16)
- Online banking fraud ‘up by 48%’ (BBC, 3/15)
- Online banking fraud increases by 71% in a year (9/14)
- Online Banking Fraud Made Simple (Banktech, 3/14)
- Cyber attacks against banks more severe than most realize (Reuters, 5/13)
- Banking malware is getting sneakier, security firms warn (PC World, 2/13)
- Federal Reserve hacked (Guardian, 2/13)
- Threat of mass cyberattacks on U.S. banks is real, McAfee warns (CNet, 12/12)
- Zeus botnet gang targets Charles Schwab accounts (10/10)
- Security researcher demonstrates ATM hacking (CNet, 7/10)
Blockchain (Bitcoin) Technology
- “Blockchains are useful, and can certainly be part of a secure voting solution. But they are only a small piece—they do an adequate job of solving an easy part of the security challenges in Internet voting, but nothing at all to solve the hard parts.” – Blockchains and Elections (10/16)
- “There have been many cases of bitcoin theft.” (Wikipedia)
- “Some malware can steal private keys for bitcoin wallets allowing the bitcoins themselves to be stolen.” (Wikipedia)
- “Theft of bitcoin has been documented on numerous occasions.“ (Wikipedia)
- Bitcoin rival Ethereum fights for its survival after $50 million heist (Ars Technica, 6/16)
Smartphones, Tablets
- The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle (2/15)
- SIM card makers hacked by NSA and GCHQ leaving cell networks wide open (Ars Technica, 2/15)
Economic Threats
- Cyberattacks Against U.S. Corporations Are on the Rise (5/13)
- Chinese cyber-espionage threatens U.S. economy, DoD says (5/12)
- NSA: China is Destroying U.S. Economy Via Security Hacks (3/12)
Estonia
- iVoting: The Estonia Experience Cannot Be an American Expectation …Anytime Soon (OSET, 12/14)
- Centre Party: e-voting should be banned (5/14)
- Security Analysis of the Estonian E-Voting System (U. Mich, Video, 5/14)
- Report on the Estonian Internet Voting System (Verified Voting, 9/11)
Specific, Non-Election But Serious “Exploits”
- Everything We Know About Ukraine’s Power Plant Hack (1/16)
- Crooks steal security firm’s crypto key, use it to sign malware (2/13)
- Facebook helps FBI foil $850m-cybercrime ring (12/12)
- FBI.gov hacked, 294 plain text passwords leaked by The Hackers Army (10/12)
- CIA Website Hacked, Struggles To Recover (2/12)
- Anonymous Fires Back at NATO with FBI Hack, Releases 400MB of Their Data (7/11)
- Pentagon admits suffering major cyber attack in March(3/11)
- NSA to Investigate Nasdaq Hack (3/11)
Videos
- NSA’s chief hacker explains how to keep the NSA out of your business (1/16)
- Security Analysis of the Estonian E-Voting System (U. Mich, 5/14)
- Internet Voting: Is Now The Time? (2/13, Dr. Barbara Simons, 1 hr)
- I Can Bank Online, Why Can’t I Vote Online? (1/13, TED Talk by Dr. Barbara Simons, 25 mins)
- Dr. Barbara Simons on Charlie Rose (10/12, 15 mins)
- Internet Voting: An Idea Whose Time Has Not Come (8/12, Dr. Barbara Simons, 1 hr)
- All Your Devices Can Be Hacked (12/11, TED Talk by Dr. Avi Rubin, 17 mins)
- Electronic and Internet Voting: The Threat of Internet Voting in Public Elections (1/11, Google Tech Talk Dr. David Jefferson, 1:20)