Industry News by Bret Piatt Oct 24, 2017 Cyber Security and Elections - Week 56 Cyber Talk Radio Bret Piatt, CTR Host and Jacque Callanen, Bexar County Elections Administrator - Week 56 of Cyber Talk Radio Show Summary This past Saturday, October 21st, episode 56 of Cyber Talk Radio hit the air on 1200 WOAI and iHeartRadio streaming. I was joined by Jacque Callanen, the Bexar County Elections Administrator. In the first half of the show Jacque introduced herself telling us about her 22 years of elections experience in Bexar County including 13 in her current role as Elections Administrator. Jacque also gave us a history lesson detailing the changes that have happened to the elections department since she began working there. We learned that Bexar County was among the first counties in America to switch to electronic voting, back in 2002, using the DRE (Direct Recording Equipment) method of touchscreen voting. Jacque then talked us through the electoral process in Bexar County and the State of Texas. She explained that across Bexar County’s 782 precincts in a Presidential Election year there are up to 900 difference ballot paper combinations. The complexity of this set of combinations was, she explained, the main impetus behind the switch to electronic voting, allowing people to vote electronically meant that the county would no longer have to worry about running out of ballot papers. Bexar county now has a fleet of over 2,800 voting machines, and the machines are able to ensure that unlike with the paper ballot, no vote is lost. On the administrative side, Jacque explained that different states and indeed cities conduct elections in very different ways across America, the result of the constitution delegating to states the conduct of elections. As a result in places like Illinois cities conduct elections on their own, but in the State of Texas the Texas Constitution delegates elections to Texas’ 254 counties, 109 of which have Elections Administrators. Jacque explained that for early voting Bexar County has 34 early voting locations and citizens can vote in any location they choose, additionally, if you’re over 65, out of the county on election day or in jail but not convicted you have the right to vote by mail. Bexar county has also been the lead pioneer of email voting. Military service men and women stationed overseas are able to email their ballots to the county, given our status as Military City USA Bexar County now has the biggest email voting operation in America. As she reflected on the changes she has seen since she started out as an elections official, Jacque observed that long term she sees a move to iPhone voting but that it will take a while for security apparatus to be able to process the change. Jacque also observed that the election code isn’t advancing as fast as technology which is why we end up with laws prohibiting taking selfies in polling places. In the second half of the show, Jacque explained the process for officiating election results and the steps taken to secure the ballot. During the entire election process there are always three officials in every polling place to ensure that if one needs to step out there are still 2 people looking at the machines to check no one tries to interfere with the machines themselves. When the election is complete the local officials harvest all of the data from the machines as a pair and carry the results back to 7 different centers where results are collated, at the same time, the machines are transported to the machine site and can also be checked which verifies and secure the result. Every election official is also subject to a background check to further ensure the security of the ballot, even the transportation company used to transport the machines goes through background vetting! While at the Defcon annual conference hackers succeeded in hacking a bunch of election machines, Jacque is very confident in the election security process. This is because none of the machines are ever connected to the internet, when the data arrives back in elections HQ (by hard disk) and is then combined with the results from all other precincts still, the computer is still not connected to the internet. The election results are then taken by hard disk from that computer to an internet connected computer where results are uploaded and made visible to the public. This means that for hackers to disrupt the system they would have to gain physical access to a bunch of election machines, but they can’t do that because two officials are with the machines at all times. The area that Jacque conceded has been more vulnerable to attacks is the voter registration system as this is more online (because data must be transmitted to the Secretary of State to verify IDs), however, even this system because of the ID check remains extremely secure. Finally Jacque told us that the county is always looking for technical volunteers to help people vote, and to help explain the many measures in place to ensure security. To learn more, listen to the full episode replay available here! Upcoming episode – Saturday nights from 11:00 p.m. to Midnight - Episode 57, October 28: Cyber Security and Data Science Listen to a replay of this episode or past episodes on a Cyber Talk Radio Podcast stream. Replays are available via the below podcast services: Pocket Casts iTunes Recent episodes – available to stream from our YouTube channel - Cybersecurity Legislation with Congressman Will Hurd Creating a “Culture of Security” with Dr. Greg White of University of Texas San Antonio Codeup’s Approach to Developing Responsible Programmers with Ryan Orsinger Career Matching for Military Cyber Jobs with Cyber Warrior Network Ethics of Artificial Intelligence and Paying Ransoms to Hackers with Van Lindberg 24th Air Force Cyber Operations with Sherri Hanson Bunker Labs and Empowering Military Veterans as Leaders in Innovation with Johnathan Paul Wojtewicz STEM Education and the Geek Bus in San Antonio with Jake Lopez at SASTEMIC Cybersecurity Program at Texas A&M University San Antonio Cybersecurity Master’s Program at St. Mary’s University Cyber Risk Management with Innove Cyber Security Awareness and Training with Inspired eLearning How to Secure Wordpress with WP Engine Have an idea for a topic or want to be a guest? Contact Cyber Talk Radio via our request a topic or be a guest form.