{"id":143193,"date":"2018-11-01T07:56:53","date_gmt":"2018-11-01T11:56:53","guid":{"rendered":"https:\/\/today.uconn.edu\/?p=143193"},"modified":"2019-10-01T15:37:27","modified_gmt":"2019-10-01T19:37:27","slug":"uconns-key-role-ensuring-integrity-state-elections","status":"publish","type":"post","link":"https:\/\/today.uconn.edu\/2018\/11\/uconns-key-role-ensuring-integrity-state-elections\/","title":{"rendered":"UConn&#8217;s Key Role in Ensuring Integrity of State Elections"},"content":{"rendered":"<p>Both before and after the November election, the University of Connecticut will run forensic analyses on memory cards in the state\u2019s voting equipment, deploying software to carry out audits of actual election results.<\/p>\n<p>The need for this kind of expertise is pressing, especially with the growing threat that states experience from hackers. According to a recent <a href=\"https:\/\/www.washingtonpost.com\/news\/powerpost\/paloma\/the-cybersecurity-202\/2018\/06\/05\/the-cybersecurity-202-voters-distrust-of-election-security-is-just-as-powerful-as-an-actual-hack-officials-worry\/5b1567091b326b08e883912f\/?noredirect=on&amp;utm_term\">Washington Post<\/a> article, 21 states faced cybersecurity threats in the 2016 election, leading many states \u2013 including Connecticut \u2013 to strengthen their defenses.<\/p>\n<p>This election, the work in Connecticut is being led by Alexander Russell, director of UConn\u2019s <a href=\"https:\/\/voter.engr.uconn.edu\/voter\/\">Voting Technology Research Center<\/a>\u00a0(VoTeR), which advises the state on the use of election technology, investigates voting solutions and voting equipment, and develops and recommends safe-use procedures for electronic systems used in the electoral process.<\/p>\n<p>Launched by the Connecticut Secretary of State\u2019s office in 2006, the original vision for the VoTeR center was to advise the state on new voting technology, but that has expanded as technology \u2013 and the threats to that technology \u2013 has advanced.<\/p>\n<p>\u201cOf course, the most sensational attack against an electronic voting system is one which undetectably changes the reported outcome of an election,\u201d says Russell, professor of computer science and engineering. \u201cWhile the James Bond-appeal of these attacks elevates them to a common topic of conversation, the fact of the matter is that along the spectrum of various attacks those are comparatively difficult, expensive, and high-risk.\u201d<\/p>\n<p>Instead, the voting machines themselves need a human safeguard to ensure that the goal of the state to ensure the integrity of election results is foremost.<\/p>\n<p>\u201cOne present difficulty is that vendors are primarily focused on functionality and ease-of-use rather than security,\u201d says Russell. \u201cIn fact, we even lack clear standards for exactly what \u2018security\u2019 means for voting equipment.\u201d<\/p>\n<p>As a result, states cannot simply trust that vendors will provide &#8220;secure&#8221; devices, he says, creating the need for external security advice.<\/p>\n<p>Steps like training voting staff in best practices, and teaching them what to look out for in terms of suspicious activity, are key to safeguarding the entire voting system, Russell adds.\u00a0Connecticut has done a good job in these areas.<\/p>\n<p>Connecticut also makes certain that optical scan tabulators are not connected to the internet, and that each town performs logic and accuracy testing before each election or primary, to ensure that the voting equipment and ballots accurately collect the votes and tabulate the results, he says.<\/p>\n<p>\u201cFor the near future, the combination of voter-verified paper trails in conjunction with improving tabulators and audits will provide stronger security,\u201d says Russell. \u201cIn the long term, cryptography can do amazing things, and I think we can expect to see completely digital elections with so-called &#8216;end-to-end&#8217; security at some point.\u201d<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Both before and after the November election, UConn\u2019s Voting Technology Research Center will run forensic analyses on memory cards in the state\u2019s voting equipment.<\/p>\n","protected":false},"author":122,"featured_media":143218,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","wds_primary_category":0,"wds_primary_series":0,"wds_primary_attribution":0,"footnotes":""},"categories":[1866,1715,2192,2193,2197,2196,2194,2199,2076,2198,2225,2195],"tags":[],"magazine-issues":[],"coauthors":[2110],"class_list":["post-143193","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-engr","category-community-impact","category-fairfield-county","category-hartford-county","category-litchfield-county","category-middlesex-county","category-new-haven-county","category-new-london-county","category-research","category-tolland-county","category-uconn-storrs","category-windham-county"],"pp_statuses_selecting_workflow":false,"pp_workflow_action":"current","pp_status_selection":"publish","acf":[],"publishpress_future_action":{"enabled":false,"date":"2026-05-07 05:38:01","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts\/143193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/users\/122"}],"replies":[{"embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/comments?post=143193"}],"version-history":[{"count":9,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts\/143193\/revisions"}],"predecessor-version":[{"id":143212,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts\/143193\/revisions\/143212"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/media\/143218"}],"wp:attachment":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/media?parent=143193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/categories?post=143193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/tags?post=143193"},{"taxonomy":"magazine-issue","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/magazine-issues?post=143193"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/coauthors?post=143193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}