{"id":33224,"date":"2020-03-19T03:33:00","date_gmt":"2020-03-19T07:33:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=33224"},"modified":"2020-03-19T03:33:00","modified_gmt":"2020-03-19T07:33:00","slug":"internet-of-things-could-be-an-unseen-threat-to-elections","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2020\/03\/19\/internet-of-things-could-be-an-unseen-threat-to-elections\/","title":{"rendered":"Internet of things&#8217; could be an unseen threat to elections"},"content":{"rendered":"\n<p>BY LAURA DENARDIS &#8211; The app failure that led to a chaotic\u00a0<a href=\"https:\/\/www.cnbc.com\/2020\/02\/04\/iowa-caucus-app-debacle-is-one-of-the-most-stunning-it-failures-ever.html\">2020 Iowa caucus<\/a>\u00a0was a reminder of how vulnerable the democratic process is to technological problems &#8212; even without any malicious outside intervention. Far more sophisticated foreign hacking continues to try to disrupt democracy, as a\u00a0<a href=\"https:\/\/www.fbi.gov\/news\/pressrel\/press-releases\/joint-statement-from-dos-doj-dod-dhs-odni-fbi-nsa-and-cisa-on-preparations-for-super-tuesday\">rare joint federal agency warning<\/a>\u00a0advised prior to Super Tuesday. Russia\u2019s attempt to\u00a0<a href=\"https:\/\/www.intelligence.senate.gov\/sites\/default\/files\/documents\/Report_Volume1.pdf\">interfere in the 2016 election<\/a>\u00a0has already revealed how this could happen: social media disinformation, email hacking and probing of voter registration systems.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.pixabay.com\/photo\/2016\/03\/31\/19\/21\/ballot-1294935__340.png\" alt=\"\" width=\"250\" height=\"255\"\/><\/figure><\/div>\n\n\n\n<p>The threats to the 2020 election may be even more insidious. As I explain in my new book, \u201c<a href=\"https:\/\/yalebooks.yale.edu\/book\/9780300233070\/internet-everything\">The Internet in Everything: Freedom and Security in a World with No Off Switch<\/a>,\u201d election interference may well come through the vast constellation of always-on, always-connected cameras, thermostats, alarm systems and other physical objects collectively known as the internet of things.<\/p>\n\n\n\n<p>The social and economic benefits of these devices are tremendous. But, in large part because the devices are not yet adequately secure, they also raise concerns for consumer safety, national security and privacy. And they create new vulnerabilities for democracy.<\/p>\n\n\n\n<p>It is not necessary to hack into voting systems themselves but merely co-opt internet-connected objects to attack political information sites, stop people from voting, or exploit the intimate personal data these devices capture to manipulate voters.  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/gcn.com\/articles\/2020\/03\/10\/iot-election-security.aspx&amp;ct=ga&amp;cd=CAEYACoUMTIwOTAwMzI5NDcyODQxMDA4NjQyGmEyZDc1YTAxNDlhODIxZDc6Y29tOmVuOlVT&amp;usg=AFQjCNHr6v6wLojj-DX4rd4Nv9dr91RILQ\">Read On:<\/a><\/p>\n\n\n\n<iframe style=\"width:120px;height:240px;\" align=\"left\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" frameborder=\"0\" src=\"\/\/ws-na.amazon-adsystem.com\/widgets\/q?ServiceVersion=20070822&#038;OneJS=1&#038;Operation=GetAdHtml&#038;MarketPlace=US&#038;source=ss&#038;ref=as_ss_li_til&#038;ad_type=product_link&#038;tracking_id=cyberconservi-20&#038;language=en_US&#038;marketplace=amazon&#038;region=US&#038;placement=B000IZ95CQ&#038;asins=B000IZ95CQ&#038;linkId=481f128503491e6912b2bcbaac0b46ec&#038;show_border=true&#038;link_opens_in_new_window=true\"><\/iframe>\n","protected":false},"excerpt":{"rendered":"<p>BY LAURA DENARDIS &#8211; The app failure that led to a chaotic\u00a02020 Iowa caucus\u00a0was a reminder of how vulnerable the democratic process is to technological problems &#8212; even without any malicious outside intervention. Far more sophisticated foreign hacking continues to <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2020\/03\/19\/internet-of-things-could-be-an-unseen-threat-to-elections\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[626],"tags":[627],"class_list":["post-33224","post","type-post","status-publish","format-standard","hentry","category-iot","tag-iot"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/33224","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=33224"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/33224\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=33224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=33224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=33224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}